mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-02-21T00:56:48.786397+00:00
This commit is contained in:
parent
b448724c31
commit
e42cadf7c0
29
CVE-2024/CVE-2024-547xx/CVE-2024-54756.json
Normal file
29
CVE-2024/CVE-2024-547xx/CVE-2024-54756.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-54756",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:10.763",
|
||||
"lastModified": "2025-02-20T23:15:10.763",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A remote code execution (RCE) vulnerability in the ZScript function of ZDoom Team GZDoom v4.13.1 allows attackers to execute arbitrary code via supplying a crafted PK3 file containing a malicious ZScript source file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Chainmanner/GZDoom-Arbitrary-Code-Execution-via-ZScript-PoC",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2025/Feb/11",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Feb/11",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-5921",
|
||||
"sourceIdentifier": "psirt@paloaltonetworks.com",
|
||||
"published": "2024-11-27T04:15:14.687",
|
||||
"lastModified": "2024-11-27T04:15:14.687",
|
||||
"lastModified": "2025-02-20T23:15:11.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious software signed by the malicious root certificates on that endpoint.\n\nGlobalProtect App for Android is under evaluation. Please subscribe to our RSS feed https://security.paloaltonetworks.com/rss.xml to be alerted to new updates to this and other advisories."
|
||||
"value": "An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious software signed by the malicious root certificates on that endpoint.\n\nPlease subscribe to our RSS feed https://security.paloaltonetworks.com/rss.xml to be alerted to new updates to this and other advisories."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
16
CVE-2024/CVE-2024-71xx/CVE-2024-7131.json
Normal file
16
CVE-2024/CVE-2024-71xx/CVE-2024-7131.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-7131",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2025-02-20T23:15:11.867",
|
||||
"lastModified": "2025-02-20T23:15:11.867",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-7316",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-10-17T22:15:03.313",
|
||||
"lastModified": "2024-10-18T12:52:33.507",
|
||||
"lastModified": "2025-02-21T00:15:08.203",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -56,10 +56,6 @@
|
||||
"url": "https://jvn.jp/vu/JVNVU92054409/index.html",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-291-03",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-007_en.pdf",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0282",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2025-01-08T23:15:09.763",
|
||||
"lastModified": "2025-01-28T17:15:25.620",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-20T23:15:11.950",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -187,10 +187,6 @@
|
||||
{
|
||||
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-0282",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
},
|
||||
{
|
||||
"url": "https://www.synacktiv.com/sites/default/files/2024-01/synacktiv-pulseconnectsecure-multiple-vulnerabilities.pdf",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-229xx/CVE-2025-22973.json
Normal file
21
CVE-2025/CVE-2025-229xx/CVE-2025-22973.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-22973",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:12.120",
|
||||
"lastModified": "2025-02-20T23:15:12.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in QiboSoft QiboCMS X1.0 allows a remote attacker to obtain sensitive information via the http_curl() function in the '/application/common. php' file that directly retrieves the URL request response content."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/202110420106/CVE/blob/master/CVE-2025-22973.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25662.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25662.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25662",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:12.233",
|
||||
"lastModified": "2025-02-20T23:15:12.233",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda O4 V3.0 V1.0.0.10(2936) is vulnerable to Buffer Overflow in the function SafeSetMacFilter of the file /goform/setMacFilterList via the argument remark/type/time."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/O4V3/setMacFilterList.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25663.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25663.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25663",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:12.350",
|
||||
"lastModified": "2025-02-20T23:15:12.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC8V4 V16.03.34.06. Affected is the function SUB_0046AC38 of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/WifiExtraSet.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25664.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25664.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25664",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:12.453",
|
||||
"lastModified": "2025-02-20T23:15:12.453",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_49E098 function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/SetIpMacBind.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25667.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25667.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25667",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:12.560",
|
||||
"lastModified": "2025-02-20T23:15:12.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the urls parameter in the function get_parentControl_list_Info."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/saveParentControlInfo.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25668.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25668.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25668",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:12.660",
|
||||
"lastModified": "2025-02-20T23:15:12.660",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_47D878 function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/setMacFilterCfg.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25674.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25674.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25674",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:12.767",
|
||||
"lastModified": "2025-02-20T23:15:12.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC10 V1.0 V15.03.06.23 is vulnerable to Buffer Overflow in form_fast_setting_wifi_set via the parameter ssid."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC10V1/fast_setting_wifi_set.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25675.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25675.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25675",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:12.870",
|
||||
"lastModified": "2025-02-20T23:15:12.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC10 V1.0 V15.03.06.23 has a command injection vulnerablility located in the formexeCommand function. The str variable receives the cmdinput parameter from a POST request and is later assigned to the cmd_buf variable, which is directly used in the doSystemCmd function, causing an arbitrary command execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC10V1/formexeCommand.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25676.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25676.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25676",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:12.977",
|
||||
"lastModified": "2025-02-20T23:15:12.977",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDset function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/wifiSSIDget.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25678.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25678.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25678",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:13.077",
|
||||
"lastModified": "2025-02-20T23:15:13.077",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the funcpara1 parameter in the formSetCfm function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/setcfm.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-256xx/CVE-2025-25679.json
Normal file
21
CVE-2025/CVE-2025-256xx/CVE-2025-25679.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25679",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:13.183",
|
||||
"lastModified": "2025-02-20T23:15:13.183",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterSet function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/WifiMacFilterSet.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-259xx/CVE-2025-25957.json
Normal file
21
CVE-2025/CVE-2025-259xx/CVE-2025-25957.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-25957",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T23:15:13.280",
|
||||
"lastModified": "2025-02-20T23:15:13.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerabilities in Xunruicms v.4.6.3 and before allows a remote attacker to escalate privileges via a crafted script."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/dayrui/xunruicms/issues/5",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-270xx/CVE-2025-27088.json
Normal file
86
CVE-2025/CVE-2025-270xx/CVE-2025-27088.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-27088",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-20T23:15:13.397",
|
||||
"lastModified": "2025-02-20T23:15:13.397",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "oxyno-zeta/s3-proxy is an aws s3 proxy written in go. In affected versions a Reflected Cross-site Scripting (XSS) vulnerability enables attackers to create malicious URLs that, when visited, inject scripts into the web application. This can lead to session hijacking or phishing attacks on a trusted domain, posing a moderate risk to all users. It's possible to inject html elements, including scripts through the folder-list template. The affected template allows users to interact with the URL path provided by the `Request.URL.Path` variable, which is then rendered directly into the HTML without proper sanitization or escaping. This can be abused by attackers who craft a malicious URL containing injected HTML or JavaScript. When users visit such a URL, the malicious script will be executed in the user's context. This issue has been addressed in version 4.18.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/oxyno-zeta/s3-proxy/blob/master/templates/folder-list.tpl#L19C21-L19C38",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/oxyno-zeta/s3-proxy/commit/c611c741ed4872ea3f46232be23bb830f96f9564",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/oxyno-zeta/s3-proxy/security/advisories/GHSA-pp9m-qf39-hxjc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-271xx/CVE-2025-27100.json
Normal file
60
CVE-2025/CVE-2025-271xx/CVE-2025-27100.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-27100",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-21T00:15:09.250",
|
||||
"lastModified": "2025-02-21T00:15:09.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lakeFS is an open-source tool that transforms your object storage into a Git-like repository. In affected versions an authenticated user can crash lakeFS by exhausting server memory. This is an authenticated denial-of-service issue. This problem has been patched in version 1.50.0. Users on versions 1.49.1 and below are affected. Users are advised to upgrade. Users unable to upgrade should either set the environment variable `LAKEFS_BLOCKSTORE_S3_DISABLE_PRE_SIGNED_MULTIPART` to `true` or configure the `disable_pre_signed_multipart` key to true in their config yaml."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/treeverse/lakeFS/commit/3a625752acdf3f8e137bec20451e71d0f9fa82f2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/treeverse/lakeFS/security/advisories/GHSA-j7jw-28jm-whr6",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
58
README.md
58
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-20T23:00:20.800854+00:00
|
||||
2025-02-21T00:56:48.786397+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-20T22:15:31.493000+00:00
|
||||
2025-02-21T00:15:09.250000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,48 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
281957
|
||||
281973
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `16`
|
||||
|
||||
- [CVE-2025-25958](CVE-2025/CVE-2025-259xx/CVE-2025-25958.json) (`2025-02-20T22:15:31.390`)
|
||||
- [CVE-2025-25960](CVE-2025/CVE-2025-259xx/CVE-2025-25960.json) (`2025-02-20T22:15:31.493`)
|
||||
- [CVE-2025-27097](CVE-2025/CVE-2025-270xx/CVE-2025-27097.json) (`2025-02-20T21:15:26.227`)
|
||||
- [CVE-2025-27098](CVE-2025/CVE-2025-270xx/CVE-2025-27098.json) (`2025-02-20T21:15:26.370`)
|
||||
- [CVE-2024-54756](CVE-2024/CVE-2024-547xx/CVE-2024-54756.json) (`2025-02-20T23:15:10.763`)
|
||||
- [CVE-2024-7131](CVE-2024/CVE-2024-71xx/CVE-2024-7131.json) (`2025-02-20T23:15:11.867`)
|
||||
- [CVE-2025-22973](CVE-2025/CVE-2025-229xx/CVE-2025-22973.json) (`2025-02-20T23:15:12.120`)
|
||||
- [CVE-2025-25662](CVE-2025/CVE-2025-256xx/CVE-2025-25662.json) (`2025-02-20T23:15:12.233`)
|
||||
- [CVE-2025-25663](CVE-2025/CVE-2025-256xx/CVE-2025-25663.json) (`2025-02-20T23:15:12.350`)
|
||||
- [CVE-2025-25664](CVE-2025/CVE-2025-256xx/CVE-2025-25664.json) (`2025-02-20T23:15:12.453`)
|
||||
- [CVE-2025-25667](CVE-2025/CVE-2025-256xx/CVE-2025-25667.json) (`2025-02-20T23:15:12.560`)
|
||||
- [CVE-2025-25668](CVE-2025/CVE-2025-256xx/CVE-2025-25668.json) (`2025-02-20T23:15:12.660`)
|
||||
- [CVE-2025-25674](CVE-2025/CVE-2025-256xx/CVE-2025-25674.json) (`2025-02-20T23:15:12.767`)
|
||||
- [CVE-2025-25675](CVE-2025/CVE-2025-256xx/CVE-2025-25675.json) (`2025-02-20T23:15:12.870`)
|
||||
- [CVE-2025-25676](CVE-2025/CVE-2025-256xx/CVE-2025-25676.json) (`2025-02-20T23:15:12.977`)
|
||||
- [CVE-2025-25678](CVE-2025/CVE-2025-256xx/CVE-2025-25678.json) (`2025-02-20T23:15:13.077`)
|
||||
- [CVE-2025-25679](CVE-2025/CVE-2025-256xx/CVE-2025-25679.json) (`2025-02-20T23:15:13.183`)
|
||||
- [CVE-2025-25957](CVE-2025/CVE-2025-259xx/CVE-2025-25957.json) (`2025-02-20T23:15:13.280`)
|
||||
- [CVE-2025-27088](CVE-2025/CVE-2025-270xx/CVE-2025-27088.json) (`2025-02-20T23:15:13.397`)
|
||||
- [CVE-2025-27100](CVE-2025/CVE-2025-271xx/CVE-2025-27100.json) (`2025-02-21T00:15:09.250`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `35`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
- [CVE-2022-33901](CVE-2022/CVE-2022-339xx/CVE-2022-33901.json) (`2025-02-20T21:15:21.833`)
|
||||
- [CVE-2022-34154](CVE-2022/CVE-2022-341xx/CVE-2022-34154.json) (`2025-02-20T21:15:22.303`)
|
||||
- [CVE-2022-34839](CVE-2022/CVE-2022-348xx/CVE-2022-34839.json) (`2025-02-20T21:15:22.720`)
|
||||
- [CVE-2022-35235](CVE-2022/CVE-2022-352xx/CVE-2022-35235.json) (`2025-02-20T21:15:23.083`)
|
||||
- [CVE-2022-35726](CVE-2022/CVE-2022-357xx/CVE-2022-35726.json) (`2025-02-20T21:15:23.280`)
|
||||
- [CVE-2022-36284](CVE-2022/CVE-2022-362xx/CVE-2022-36284.json) (`2025-02-20T21:15:23.537`)
|
||||
- [CVE-2023-1202](CVE-2023/CVE-2023-12xx/CVE-2023-1202.json) (`2025-02-20T21:15:24.633`)
|
||||
- [CVE-2023-27042](CVE-2023/CVE-2023-270xx/CVE-2023-27042.json) (`2025-02-20T21:15:24.803`)
|
||||
- [CVE-2023-28684](CVE-2023/CVE-2023-286xx/CVE-2023-28684.json) (`2025-02-20T22:15:30.487`)
|
||||
- [CVE-2024-21543](CVE-2024/CVE-2024-215xx/CVE-2024-21543.json) (`2025-02-20T22:15:30.670`)
|
||||
- [CVE-2024-4906](CVE-2024/CVE-2024-49xx/CVE-2024-4906.json) (`2025-02-20T21:05:49.990`)
|
||||
- [CVE-2024-4907](CVE-2024/CVE-2024-49xx/CVE-2024-4907.json) (`2025-02-20T21:11:55.467`)
|
||||
- [CVE-2024-4908](CVE-2024/CVE-2024-49xx/CVE-2024-4908.json) (`2025-02-20T21:13:10.770`)
|
||||
- [CVE-2024-4909](CVE-2024/CVE-2024-49xx/CVE-2024-4909.json) (`2025-02-20T21:20:22.503`)
|
||||
- [CVE-2024-4910](CVE-2024/CVE-2024-49xx/CVE-2024-4910.json) (`2025-02-20T21:25:32.727`)
|
||||
- [CVE-2024-4911](CVE-2024/CVE-2024-49xx/CVE-2024-4911.json) (`2025-02-20T21:31:52.843`)
|
||||
- [CVE-2024-4919](CVE-2024/CVE-2024-49xx/CVE-2024-4919.json) (`2025-02-20T21:36:10.237`)
|
||||
- [CVE-2025-25471](CVE-2025/CVE-2025-254xx/CVE-2025-25471.json) (`2025-02-20T21:15:25.410`)
|
||||
- [CVE-2025-25472](CVE-2025/CVE-2025-254xx/CVE-2025-25472.json) (`2025-02-20T21:15:25.570`)
|
||||
- [CVE-2025-25473](CVE-2025/CVE-2025-254xx/CVE-2025-25473.json) (`2025-02-20T22:15:30.863`)
|
||||
- [CVE-2025-25474](CVE-2025/CVE-2025-254xx/CVE-2025-25474.json) (`2025-02-20T22:15:31.027`)
|
||||
- [CVE-2025-25475](CVE-2025/CVE-2025-254xx/CVE-2025-25475.json) (`2025-02-20T22:15:31.190`)
|
||||
- [CVE-2025-26311](CVE-2025/CVE-2025-263xx/CVE-2025-26311.json) (`2025-02-20T21:15:25.907`)
|
||||
- [CVE-2025-26618](CVE-2025/CVE-2025-266xx/CVE-2025-26618.json) (`2025-02-20T21:15:26.073`)
|
||||
- [CVE-2025-27218](CVE-2025/CVE-2025-272xx/CVE-2025-27218.json) (`2025-02-20T21:15:26.510`)
|
||||
- [CVE-2024-5921](CVE-2024/CVE-2024-59xx/CVE-2024-5921.json) (`2025-02-20T23:15:11.647`)
|
||||
- [CVE-2024-7316](CVE-2024/CVE-2024-73xx/CVE-2024-7316.json) (`2025-02-21T00:15:08.203`)
|
||||
- [CVE-2025-0282](CVE-2025/CVE-2025-02xx/CVE-2025-0282.json) (`2025-02-20T23:15:11.950`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
100
_state.csv
100
_state.csv
@ -175882,7 +175882,7 @@ CVE-2021-31559,0,0,616ff3ed5176e63f05852dbbd4724c3866444d343e7d2db1ac4b797350f25
|
||||
CVE-2021-3156,0,0,a68ce96f473d8152b7bec60d64e0f3a06dd5b70b419139ec88623d7646c96e3d,2025-02-03T17:15:12.143000
|
||||
CVE-2021-31562,0,0,0545ae3d7502e71abe324f332f28492d7bd2ba97e67b0b8ae5a99752d5f83482,2024-11-21T06:05:55.077000
|
||||
CVE-2021-31566,0,0,ceae3ebc0a2bdabb0e8d901f91062c868b4e74644c777432a2a1f47e3dbfaba4,2024-11-21T06:05:55.217000
|
||||
CVE-2021-31567,0,1,00d15572cff57a319b44f61ded37e9dc176e4e6677c5d44456432a7c43d47a29,2025-02-20T21:15:12.453000
|
||||
CVE-2021-31567,0,0,00d15572cff57a319b44f61ded37e9dc176e4e6677c5d44456432a7c43d47a29,2025-02-20T21:15:12.453000
|
||||
CVE-2021-31571,0,0,856fcf34ab92e37ab5d243f2c37863f3b0df2b9b772b4661151fa45bb28d44c6,2024-11-21T06:05:55.500000
|
||||
CVE-2021-31572,0,0,d5e3842a1b097ab007f528e19cc96abc71cc2f532b0aee723b7f11c9b42d078e,2024-11-21T06:05:55.653000
|
||||
CVE-2021-31573,0,0,76aa3f237adc2d4b8d9e7e653cf950038d291762ea7af09561b1aac3bf6aa06e,2024-11-21T06:05:55.817000
|
||||
@ -193494,7 +193494,7 @@ CVE-2022-23973,0,0,a1220041cf7258eba0dcc9f570e405de543c237316890f7670608733731b9
|
||||
CVE-2022-23974,0,0,2013f1c69ec7cff186da364d6814c50a661a2a14eeb29bfc3e73075e3d70b350,2024-11-21T06:49:33.157000
|
||||
CVE-2022-23975,0,0,895f1dba99962ad28c126a2c188139b180748d4c2e6b91fa4f75a19651dac9b1,2024-11-21T06:49:35.027000
|
||||
CVE-2022-23976,0,0,adb9cff905f59e1ddb0fc75af6da44a647e9ba320962126b3ff86e530b2aca53,2024-11-21T06:49:35.160000
|
||||
CVE-2022-23979,0,1,276136c3ca30779df9b457085ac061972df56ec8fab1950b89221a6e24020e75,2025-02-20T21:15:14.537000
|
||||
CVE-2022-23979,0,0,276136c3ca30779df9b457085ac061972df56ec8fab1950b89221a6e24020e75,2025-02-20T21:15:14.537000
|
||||
CVE-2022-2398,0,0,f262c877c061a93497f4dfc6e56c57d2fb5172591f05794e6243d0367f0fc906,2024-11-21T07:00:54.637000
|
||||
CVE-2022-23980,0,0,ed8d8a0110a2f177793ec325c718c855e2a688a5fde5bc0bdf51a606e7bf1b26,2024-11-21T06:49:35.400000
|
||||
CVE-2022-23981,0,0,6af92bda81a0b6644ca50e908fe46ae54854dd20781a2df0d694acbc33cf5e10,2024-11-21T06:49:35.530000
|
||||
@ -197397,7 +197397,7 @@ CVE-2022-28696,0,0,3cd57b3a771a52acd3b70a7ccc0f9724268acddaa62a8188ff23b87efea36
|
||||
CVE-2022-28697,0,0,ff9d96548ba508768434f38490cfad7bbbd5a04514dc527cf0994605c1194e2e,2024-11-21T06:57:45.567000
|
||||
CVE-2022-28699,0,0,68795e7460152d2442996e92177653efcc5ed2f13e6ea24615ef9b4d3fa94e0e,2024-11-21T06:57:45.670000
|
||||
CVE-2022-2870,0,0,7af93b54a39285424cdf44a5e8097b9882ad10a09e6571e688a3c0a86742b31e,2024-11-21T07:01:50.683000
|
||||
CVE-2022-28700,0,1,24656b47913380344d4eccaa00d804be228971e796e5cba75754e0b6c02ecc95,2025-02-20T21:15:17
|
||||
CVE-2022-28700,0,0,24656b47913380344d4eccaa00d804be228971e796e5cba75754e0b6c02ecc95,2025-02-20T21:15:17
|
||||
CVE-2022-28701,0,0,ba07ab073451eb1523081e05f2861c621ec6813d7dae1a16edf5811134f9bd66,2024-11-21T06:57:45.930000
|
||||
CVE-2022-28702,0,0,8e7c4c8e07d674a426dd99f5930b5db54bb92f77bb0b51f620bf85a993cc8254,2024-11-21T06:57:46.047000
|
||||
CVE-2022-28703,0,0,ce47604d20b1f26fab6c234a00f6680940641d96584e9810002e0c279f249d22,2024-11-21T06:57:46.163000
|
||||
@ -198032,7 +198032,7 @@ CVE-2022-29430,0,0,fcaa8f6ec24728d8b7e0a59d88fd5b94791f0fbe401364df8071c636385f2
|
||||
CVE-2022-29431,0,0,c3a2e9dc9b06eeb719d19024c379c4accab63197b1ecabfa22f7212b2e9a0dae,2024-11-21T06:59:04.353000
|
||||
CVE-2022-29432,0,0,897968c97bbd36db984a4cbf44e07e1c39e65ae330b2e1dbbf93fe6fb271d7b6,2024-11-21T06:59:04.483000
|
||||
CVE-2022-29433,0,0,5b8994ab35640c32403141839de18b11e181adf3c519e9476d86e24f648a7c89,2024-11-21T06:59:04.620000
|
||||
CVE-2022-29434,0,1,9056f85e7de4f4670a282909abf38ad53f972d31b7a509bcc844e5de7ab8134a,2025-02-20T21:15:18.480000
|
||||
CVE-2022-29434,0,0,9056f85e7de4f4670a282909abf38ad53f972d31b7a509bcc844e5de7ab8134a,2025-02-20T21:15:18.480000
|
||||
CVE-2022-29435,0,0,ead009df3251452c1d7283572c89503c966825d82631f3cf84d42ba7c62f3d52,2024-11-21T06:59:04.883000
|
||||
CVE-2022-29436,0,0,a1e80705bc2dcd5ec3f9eff056cf1f3ddc461b5073c53977dd8654b8c63818c0,2024-11-21T06:59:05.010000
|
||||
CVE-2022-29437,0,0,f2ec56ee5c7045c9cfca2d24406131e903287628e13d0ba97dbdf31604bd7a30,2024-11-21T06:59:05.140000
|
||||
@ -198043,9 +198043,9 @@ CVE-2022-29441,0,0,e360a84233b5facb426ab24e7cf98f0e8c18d506e02d94a9d19eba9e9f8c0
|
||||
CVE-2022-29442,0,0,084b75702d5c19daba8ebb568faad41c1e667c80f79b9005b140687b24f7885e,2024-11-21T06:59:05.810000
|
||||
CVE-2022-29443,0,0,8bf74b2e06eca737470cf93d2ee5948960a8c24e701306f6485c4cb18510464d,2024-11-21T06:59:05.930000
|
||||
CVE-2022-29444,0,0,8e84a1e9b62194aed073452b30ed570e6620f68f9651f4d0fb7fce54e0c6fb2d,2024-11-21T06:59:06.043000
|
||||
CVE-2022-29445,0,1,428d0201367fcc2827fe6adaad7c11709d80294017e81f7c00465a8cfbfc7b83,2025-02-20T21:15:19.153000
|
||||
CVE-2022-29446,0,1,f0b03377eb2fc7e68f4130991988eaae617bff2a5691cd1ec5e9a90db60e6e10,2025-02-20T21:15:19.310000
|
||||
CVE-2022-29447,0,1,7378afcb5018e6b127db7891eeea3266f2e29f1f0deda8f0c4a10cc154762a64,2025-02-20T21:15:19.450000
|
||||
CVE-2022-29445,0,0,428d0201367fcc2827fe6adaad7c11709d80294017e81f7c00465a8cfbfc7b83,2025-02-20T21:15:19.153000
|
||||
CVE-2022-29446,0,0,f0b03377eb2fc7e68f4130991988eaae617bff2a5691cd1ec5e9a90db60e6e10,2025-02-20T21:15:19.310000
|
||||
CVE-2022-29447,0,0,7378afcb5018e6b127db7891eeea3266f2e29f1f0deda8f0c4a10cc154762a64,2025-02-20T21:15:19.450000
|
||||
CVE-2022-29448,0,0,d46cbd9939cc17286cd59b448d32b97560391245d7b667e857ddd45c239c5177,2024-11-21T06:59:06.520000
|
||||
CVE-2022-29449,0,0,79e7dc51653fa13848e130f7468b78819a6d45e597a384d363998f9feff6d9a2,2024-11-21T06:59:06.627000
|
||||
CVE-2022-2945,0,0,4952b616b5bdffccab3c981f2a2c266b9092630d5eb212e7bf5cdbacc947f92a,2024-11-21T07:01:57.980000
|
||||
@ -199728,7 +199728,7 @@ CVE-2022-31471,0,0,647489892103383cd9123b26f31ab22c6d518dd895c672ed57e02d876fd34
|
||||
CVE-2022-31472,0,0,4e94a7b86b25a2e926819587665b064e75fdd53cdd1f5a7f49c749d3d5f156ba,2024-11-21T07:04:31.450000
|
||||
CVE-2022-31473,0,0,ae935bbc3dbdcfbc09b30cc165a9ea4335ef76263221f845d5fd82c002da6769,2024-11-21T07:04:31.587000
|
||||
CVE-2022-31474,0,0,8c66fa148973c7c992ad78150e728812a6bbfe43b5ed7732c0a6f5275629e254,2024-11-21T07:04:31.743000
|
||||
CVE-2022-31475,0,1,f7aa3ec6be67dcbdd4530f394a19ca5677ef60e07d3529b13ba00766f57923ca,2025-02-20T21:15:20.617000
|
||||
CVE-2022-31475,0,0,f7aa3ec6be67dcbdd4530f394a19ca5677ef60e07d3529b13ba00766f57923ca,2025-02-20T21:15:20.617000
|
||||
CVE-2022-31476,0,0,0a4d0ba0201c183bbaf174f4299ef78b6592a33123b9569fb057cbfde6ecbc0c,2024-11-21T07:04:32.060000
|
||||
CVE-2022-31477,0,0,b58b7ad5c7097ef569dbb2d16d7eeb100be8152ba58db4c67b695997f1fd0e23,2024-11-21T07:04:32.190000
|
||||
CVE-2022-31478,0,0,b2a750e08e06403dcd43bc6365335c4cb7e38fe582abc333cffcadf353f0b389,2024-11-21T07:04:32.377000
|
||||
@ -201166,7 +201166,7 @@ CVE-2022-33138,0,0,32dbb21163d13b92aafd703e38b6fab13515ef064d32511b7774d5d851a61
|
||||
CVE-2022-33139,0,0,bb982d3d7bc832560dc98dca65ef1c2587ca1489a7e98d8d79923f3c8a4bd105,2024-11-21T07:07:35.323000
|
||||
CVE-2022-3314,0,0,1f7ebc3e4a789fc594821cd441ae977c330b29321d10785da80f217dbfa2f56c,2024-11-21T07:19:16.737000
|
||||
CVE-2022-33140,0,0,988ba7e26273488978916478d86366dd81f8b9d33e1ea008404e36d8c3be6fab,2024-11-21T07:07:35.453000
|
||||
CVE-2022-33142,0,1,8a4cde00e7422437b997c4b8b1c690147bc055427e4a750dee8bb4ee35e4bc80,2025-02-20T21:15:21.377000
|
||||
CVE-2022-33142,0,0,8a4cde00e7422437b997c4b8b1c690147bc055427e4a750dee8bb4ee35e4bc80,2025-02-20T21:15:21.377000
|
||||
CVE-2022-33146,0,0,bd315a76123ed3d3a5309f66c4370cd1a17bbc9ecb4298c22366f904dd8881dd,2024-11-21T07:07:35.720000
|
||||
CVE-2022-33147,0,0,08368455f30802f9e7182fc569e571082680ab23d79b00217c4d347186039cda,2024-11-21T07:07:35.857000
|
||||
CVE-2022-33148,0,0,e3e99eb08e52235eef961dbe9d4cb9dec4c931a646bd285af4cc4596f87bee39,2024-11-21T07:07:35.987000
|
||||
@ -201563,8 +201563,8 @@ CVE-2022-33894,0,0,bae0494b1c6f9164ba568c66b15205f2d6b5fc33e61b9ea8c8ad1e75400a4
|
||||
CVE-2022-33896,0,0,e6e899698691c9ef55e6240a668ba34c2cd180c5eb3f1fa3db81448572d3d809,2024-11-21T07:08:33.270000
|
||||
CVE-2022-33897,0,0,5500f724ae2a2924f4b1765e4062134191f7035f85d3c1846654b4c0891a22dd,2024-11-21T07:08:33.410000
|
||||
CVE-2022-33898,0,0,9e1add19e48d877e6866f9fc45076c0733e5ef93ae6dbfe78bdf66391cf58fb7,2024-11-21T07:08:33.560000
|
||||
CVE-2022-33900,0,1,5b2a8f0ccf2b276e85f70772539d857e533753f15ae28e43027ee9d66304e32c,2025-02-20T21:15:21.680000
|
||||
CVE-2022-33901,0,1,2448ea62ce39886151e113cfab60a8800841e68e06daec1a18a17df21e347520,2025-02-20T21:15:21.833000
|
||||
CVE-2022-33900,0,0,5b2a8f0ccf2b276e85f70772539d857e533753f15ae28e43027ee9d66304e32c,2025-02-20T21:15:21.680000
|
||||
CVE-2022-33901,0,0,2448ea62ce39886151e113cfab60a8800841e68e06daec1a18a17df21e347520,2025-02-20T21:15:21.833000
|
||||
CVE-2022-33902,0,0,947527fafc1b8d1bf3b8a12d33d3177bc9050f64a23c50a28f55f4a3607296d1,2024-11-21T07:08:34
|
||||
CVE-2022-33903,0,0,c2eddf42572f071432b19556993a511009da7279f85dba4eebfa6bee608ef90d,2024-11-21T07:08:34.123000
|
||||
CVE-2022-33905,0,0,3719103482b6a180a6e5d79aea7e2b6f45db92b63bd8f37d8c45e6f637ac2c75,2024-11-21T07:08:34.283000
|
||||
@ -201749,7 +201749,7 @@ CVE-2022-34150,0,0,99e1270b93f05ab72bc54bff99080480ae495f5f667b4a4a2ff828a6126a7
|
||||
CVE-2022-34151,0,0,321b1aa088cfaa06c2a747d1b2651336299d8062e0b45fd1d004c8d2782ec62b,2024-11-21T07:08:57.393000
|
||||
CVE-2022-34152,0,0,bbc7a79d9044c86d54c560bd31944e06d00912d34a8fe02a0af751ee3ddf0005,2025-02-05T21:15:19.090000
|
||||
CVE-2022-34153,0,0,87fb4d9acbff3f43e005361144cf3b21bce67a68671d433ba0d903e2efd34e49,2024-11-21T07:08:57.693000
|
||||
CVE-2022-34154,0,1,08c55b629933d1cde5f4bed128472bd742c0518579ed58fb1e6be328531a575d,2025-02-20T21:15:22.303000
|
||||
CVE-2022-34154,0,0,08c55b629933d1cde5f4bed128472bd742c0518579ed58fb1e6be328531a575d,2025-02-20T21:15:22.303000
|
||||
CVE-2022-34155,0,0,05156f9c78d59a5c28aa79769e2024d697c24f06784f94f6829d3951e1e3d673,2024-11-21T07:08:57.930000
|
||||
CVE-2022-34156,0,0,60d25e51aa91343820b18b9194beaacd9ddbadc920687841ae4afbe7c0cf37f6,2024-11-21T07:08:58.050000
|
||||
CVE-2022-34157,0,0,4182ff7a634fdbd3ff3c2d800464eeace9e39045aa96811bfc8b26512d3cbe87,2024-11-21T07:08:58.170000
|
||||
@ -202390,7 +202390,7 @@ CVE-2022-34835,0,0,bb36b24eb448dbc1c6ade1b55bf64a6f5fb42aa2591241270e1b8c9264747
|
||||
CVE-2022-34836,0,0,66ede4c575c454215db497bc3f34266d7b476148974b5d66e523162079f3406e,2024-11-21T07:10:17.200000
|
||||
CVE-2022-34837,0,0,83810459d7d9a212f494fee74742697cf97c0b9a715059ce60e046b9b9621361,2024-11-21T07:10:17.323000
|
||||
CVE-2022-34838,0,0,40af15ffda62120ab21c1df41781e0deb79553a12198190098063666a157a53c,2024-11-21T07:10:17.437000
|
||||
CVE-2022-34839,0,1,9859a3d49b90523f5e9c6f781dcf16369cdeb00b21a1c31829ce2ce1380ced31,2025-02-20T21:15:22.720000
|
||||
CVE-2022-34839,0,0,9859a3d49b90523f5e9c6f781dcf16369cdeb00b21a1c31829ce2ce1380ced31,2025-02-20T21:15:22.720000
|
||||
CVE-2022-3484,0,0,0665c3267d61147a6e9effba22fc618d99161c6ec8956bef405b065515f7c46c,2024-11-21T07:19:37.820000
|
||||
CVE-2022-34840,0,0,968e49b742ebc89b7854d2deb9ab81a406464163ef615c818b40c4097ffca922,2024-11-21T07:10:17.677000
|
||||
CVE-2022-34841,0,0,ac6101a6a3efd73d35a710203842179afe15cfd57fa6b66f1eaddc7139b8c342,2024-11-21T07:10:17.817000
|
||||
@ -202699,7 +202699,7 @@ CVE-2022-35229,0,0,0132ec5f521cf7fc8501f5791c0847ff68bf796b846026be6b1454df6858f
|
||||
CVE-2022-3523,0,0,4fa8dc8577112ffb95ccf2bab1d95354d54e3cf1e929d73a291c380f9661ff35,2024-11-21T07:19:42.283000
|
||||
CVE-2022-35230,0,0,a5e6be82685a498e663d7b69b4e291f40d0be526cdf7cc4d05da7539df6155fa,2024-11-21T07:10:56.437000
|
||||
CVE-2022-35234,0,0,a011152bc4df907123781a87da2ceeb419b83f4094e2c627941d50bb5dc2b1d1,2024-11-21T07:10:56.557000
|
||||
CVE-2022-35235,0,1,2dad97993a687b4c32e6ad16093d72ae7412050a50e05183811cb0b9459d6be8,2025-02-20T21:15:23.083000
|
||||
CVE-2022-35235,0,0,2dad97993a687b4c32e6ad16093d72ae7412050a50e05183811cb0b9459d6be8,2025-02-20T21:15:23.083000
|
||||
CVE-2022-35236,0,0,1069db2bbaecc525bb5b5c4d021747c17b30cc74d15055582541e3ee5dd1c542,2024-11-21T07:10:56.793000
|
||||
CVE-2022-35238,0,0,69c2f36daed8644b28af641ba0198e7dacac416c0ea5f7cacc53c01666e0c29d,2024-11-21T07:10:56.913000
|
||||
CVE-2022-35239,0,0,d1fc7bf6ac96abd70e0eb79c16aa6e83678ebda7f3916849a6119b289efd36ec,2024-11-21T07:10:57.080000
|
||||
@ -203103,7 +203103,7 @@ CVE-2022-35721,0,0,a23cefd29d89f810853baf632b6c44536647d0adfecdf690ab6c28b9ff68e
|
||||
CVE-2022-35722,0,0,afc6e177017ac3fba2303ae864674c6fec9589e2aac9289522120ae4374f32f2,2024-11-21T07:11:33.230000
|
||||
CVE-2022-35724,0,0,72eae538c60425b606c27f0a6611b2ee47b285a6c7dd927f8bfa45fad4d6976b,2024-11-21T07:11:33.353000
|
||||
CVE-2022-35725,0,0,ed4ebcbbbddfd1d6cb7e69093d321bf9bc61dbc26bddf13fc699383c64275659,2024-11-21T07:11:33.477000
|
||||
CVE-2022-35726,0,1,e03b89baa6bd0160b24ebe4c28c29a3f718a47968b76a6f0f14f41d671418949,2025-02-20T21:15:23.280000
|
||||
CVE-2022-35726,0,0,e03b89baa6bd0160b24ebe4c28c29a3f718a47968b76a6f0f14f41d671418949,2025-02-20T21:15:23.280000
|
||||
CVE-2022-35728,0,0,2d9a29150e8c54f594a3bf63931edbc6643e80515a0b49e3b32b06136d135aea,2024-11-21T07:11:33.717000
|
||||
CVE-2022-35729,0,0,002bd4e7c3948d1a5d2c15807a0aef795eb516b47f3517204eaeee3b153252f6,2024-11-21T07:11:33.860000
|
||||
CVE-2022-3573,0,0,80e5b282f507fba292c667cd8c68c37f5027fd44f3bf13e714129daa2e23882f,2024-11-21T07:19:47.797000
|
||||
@ -203623,7 +203623,7 @@ CVE-2022-36279,0,0,a66d4c57197f2c5a6b7912884c0fc755ca0c71d64040cc75aa18b04e4f7ee
|
||||
CVE-2022-3628,0,0,70cd85acab46dc5db5f17ffeae28ed2277e86a2f41e06ec78cf5f7b25f6d58f7,2024-11-21T07:19:54.720000
|
||||
CVE-2022-36280,0,0,1df104a0af1ea0a83e849519e9a6344e09407dac1e8a4ee39260313492969f3d,2024-11-21T07:12:42.790000
|
||||
CVE-2022-36282,0,0,9265b8c9ebfb1d664e20fc8a404a9239767662818f8dc301300e9a4492e91271,2024-11-21T07:12:42.947000
|
||||
CVE-2022-36284,0,1,0c35b15f332c66ff62dbf233904400b8fbb2836060edbc9c563b5a6630226d14,2025-02-20T21:15:23.537000
|
||||
CVE-2022-36284,0,0,0c35b15f332c66ff62dbf233904400b8fbb2836060edbc9c563b5a6630226d14,2025-02-20T21:15:23.537000
|
||||
CVE-2022-36285,0,0,9bfdf5ef6e7a1f71028535daeedf898d291ca18e3454f38ed656b81b9fdf41a1,2024-11-21T07:12:43.213000
|
||||
CVE-2022-36287,0,0,f58a3683a7abdeaf5e8815da363252f1106a944becec29897d797d4c03640b4b,2024-11-21T07:12:43.350000
|
||||
CVE-2022-36288,0,0,911528e7b3fb2028956bc8ae42159043f53422be6382a1503f29ce6574802807,2024-11-21T07:12:43.467000
|
||||
@ -214344,7 +214344,7 @@ CVE-2023-1197,0,0,86832f5d8e3d2f19e25d554307cda0a38f9c96d8816c29ad3985ff0868049c
|
||||
CVE-2023-1198,0,0,007352a77f8be86abc9014a5228157699faa100b2d96c0aa11fbfdebb3b2fd1f,2024-11-21T07:38:39.327000
|
||||
CVE-2023-1200,0,0,cb5805db4a921d68bdf953c1e086ad953a942ed94e0e68ad6b2ae124e1cf6cd7,2024-11-21T07:38:39.437000
|
||||
CVE-2023-1201,0,0,f4764263a23a32d0db12c78e0cf32f66698f52de21b5dd3f805ae2d534552a96,2024-11-21T07:38:39.553000
|
||||
CVE-2023-1202,0,1,e995e212ebe63e7f0467b64e16d67f68aa9e5461a685e3b0d682958b41fe5915,2025-02-20T21:15:24.633000
|
||||
CVE-2023-1202,0,0,e995e212ebe63e7f0467b64e16d67f68aa9e5461a685e3b0d682958b41fe5915,2025-02-20T21:15:24.633000
|
||||
CVE-2023-1203,0,0,2c91a011fc8bd4ea016cf3e67f1e6f2936594e64abfa5a016428f0a01e709b9b,2024-11-21T07:38:39.760000
|
||||
CVE-2023-1204,0,0,c2aa540d011907285fafc8b079b7b56473284d8f0c49ffb1b78642f39b244f98,2025-01-30T16:15:28.937000
|
||||
CVE-2023-1205,0,0,79721d87fa62d640560ed833c7f7bd2eb94aa422ccee9cd59eb9d37b0e6fe39f,2024-11-21T07:38:39.967000
|
||||
@ -220933,7 +220933,7 @@ CVE-2023-27037,0,0,3e02208b736711e0efb83bf4998fb6bac400b97126ddd20a1da0b5fa551ab
|
||||
CVE-2023-2704,0,0,fc2067be0697d20cac064bbbb25e67cfb2b333847b4e63ff38eeff841f83cc22,2024-11-21T07:59:07.273000
|
||||
CVE-2023-27040,0,0,0c1e56c9e123dabd9a983f681bd2956ae0f064b7b5f935adcd0fff69ad31dcde,2024-11-21T07:52:13.277000
|
||||
CVE-2023-27041,0,0,bc98910a510cebfb5a23592ee77dcdbc816256c370a0d9277bfd5a9de0712e76,2024-11-21T07:52:13.433000
|
||||
CVE-2023-27042,0,1,1cedf843b32c16727863c5a72d3c2800736ca8dabb04be01b541ea6348a2d049,2025-02-20T21:15:24.803000
|
||||
CVE-2023-27042,0,0,1cedf843b32c16727863c5a72d3c2800736ca8dabb04be01b541ea6348a2d049,2025-02-20T21:15:24.803000
|
||||
CVE-2023-27043,0,0,5ea1fc4ec929cf34c45ce62cc3e412b9e4b9786ba8a7b21aee0140712925cd51,2024-11-21T07:52:13.737000
|
||||
CVE-2023-2705,0,0,1d378a1ed7a0999bc4bd863ae6705e50e51e2497f8907ea8cc07553e423078c5,2024-11-21T07:59:07.393000
|
||||
CVE-2023-27052,0,0,ef246db50bc99dae8670b10b9548f6fb8f9a9c37194a9cebc3ce6c5923335e70,2024-11-21T07:52:13.973000
|
||||
@ -222404,7 +222404,7 @@ CVE-2023-28680,0,0,b1b8739488aafc769a63ef0b051e8ded2b845670faf36f5795e78f5178de3
|
||||
CVE-2023-28681,0,0,95bd95b3371f2d02b2afda85f523faab72dd02ebd211a6ccd1aed342f4c41880,2024-11-21T07:55:47.773000
|
||||
CVE-2023-28682,0,0,4baebd5e01dadc25d40e00e1275088f5c0932a710aca5cef28ec4404f090498e,2024-11-21T07:55:47.893000
|
||||
CVE-2023-28683,0,0,61fe5eceabcb2aa38b09688c393a9ae1a5dbeef0f5d1d2a8ca0bc37d8c1de828,2024-11-21T07:55:48.007000
|
||||
CVE-2023-28684,0,1,3d5ef9444463524f57fde213fef9f58c5bf57ade30cb16ffb0ec868310dbee5b,2025-02-20T22:15:30.487000
|
||||
CVE-2023-28684,0,0,3d5ef9444463524f57fde213fef9f58c5bf57ade30cb16ffb0ec868310dbee5b,2025-02-20T22:15:30.487000
|
||||
CVE-2023-28685,0,0,658083785298e53ddf6aa90648b9d44e88c968a84e6bb685839c5265a01391fd,2024-11-21T07:55:48.230000
|
||||
CVE-2023-28686,0,0,ad1c64a874f05e7a4b6092d7d1962734d7835d50862e6e2d1722875a373bf303,2025-02-19T22:15:16.367000
|
||||
CVE-2023-28687,0,0,ceefbdbe598543b06473759f72008a6c46fc5a0e006e0d46fc9ec6c79c82ff45,2024-11-21T07:55:48.500000
|
||||
@ -248879,7 +248879,7 @@ CVE-2024-2154,0,0,ffeeac95960a7865d135456d7433827b762c9eee41da0ca2ab259c73402ce4
|
||||
CVE-2024-21540,0,0,ca361900c1eaa9a3b1242a94b8aed82eaba7c8170c10a4efa35cbfaad6b1984c,2024-11-17T09:15:11.853000
|
||||
CVE-2024-21541,0,0,4e51d4ffec662bfa33031c554d0443805e80d7623a2fcd0aac98e03becc00741,2025-01-14T17:15:16.573000
|
||||
CVE-2024-21542,0,0,0e9211d9ba275aaa70fda3cc5d2a35b6e241035ea603cbf4680a52b4bafb62b7,2025-02-10T23:15:12.820000
|
||||
CVE-2024-21543,0,1,d62706d4fbd8c1ea6bfb9cf360340e942ef383a0039ef39089e46eab62d6a195,2025-02-20T22:15:30.670000
|
||||
CVE-2024-21543,0,0,d62706d4fbd8c1ea6bfb9cf360340e942ef383a0039ef39089e46eab62d6a195,2025-02-20T22:15:30.670000
|
||||
CVE-2024-21544,0,0,541db173143a336d5bc0349fcd445d8d51ea6126b0c28a2aa55a2e0ee867b116,2025-02-04T14:15:30.917000
|
||||
CVE-2024-21545,0,0,12417d057214273e4a76243ffeaf97d513746844d668a1420616fa022f5af746,2024-09-26T13:32:02.803000
|
||||
CVE-2024-21546,0,0,3ea5e480180e9a32c7d44b675d39ba094630d4767cbbc0ceeadcf4b6436e2293,2025-01-27T18:15:36.990000
|
||||
@ -269485,7 +269485,7 @@ CVE-2024-49054,0,0,e87695215142e7438e78ba2963977430a8c70ec06db74df9a8dfda856108d
|
||||
CVE-2024-49056,0,0,2bd2b2266d7b792cf7f1f9d1b8f0dc5da233dfb03d127cfa27eda6bdd0ad0933,2025-01-07T16:33:01.547000
|
||||
CVE-2024-49057,0,0,8adfe1f702587a70c7f28eae242d6d2ab31c9c830cf3607e351e6859f405b09b,2025-01-08T12:39:35.633000
|
||||
CVE-2024-49059,0,0,e3a1c5f117ea373ce84de44e6911c196c1cf3001e2ce847a120a52a5210947bf,2025-01-08T12:40:00.190000
|
||||
CVE-2024-4906,0,1,fff2b9b39721269ca48518b1df14a1d924835ca7824371ef8286f07e24ab0fd4,2025-02-20T21:05:49.990000
|
||||
CVE-2024-4906,0,0,fff2b9b39721269ca48518b1df14a1d924835ca7824371ef8286f07e24ab0fd4,2025-02-20T21:05:49.990000
|
||||
CVE-2024-49060,0,0,d9afe9e6cfde715279031242476e2b09fb65b31ceea6cc2b4ea43c7f01042eb6,2025-01-23T14:15:08.617000
|
||||
CVE-2024-49062,0,0,9d9ec47cd3eeea7827ea04f98b2b8aaf372cee31c80fefc1164038f4a8bc9169,2025-01-08T12:40:16.087000
|
||||
CVE-2024-49063,0,0,5bae376951aeb5fe9cdb1d1299de5b518574decb4573e1aafdd2100842bf44ab,2025-01-08T12:40:50.423000
|
||||
@ -269493,7 +269493,7 @@ CVE-2024-49064,0,0,5f8859e2a458eae48bb53d0abe7352c27271b43719eff3149a2374fd4d762
|
||||
CVE-2024-49065,0,0,f3be03e4fd866d77285137ba980feac6a9ea5da17bc38e876a7bbdb3c1f0a3c7,2025-01-08T12:41:20.163000
|
||||
CVE-2024-49068,0,0,c12c6858a21093ce7fcd1d54c186b8d083ce4945e9d31999541c28fbe17399b5,2025-01-08T12:41:31.827000
|
||||
CVE-2024-49069,0,0,56f767898780cbc8a2abdd91be4f1b82a3156201bc1d7b4c469c861536c3f647,2025-01-08T12:41:46.777000
|
||||
CVE-2024-4907,0,1,8a46ab2f72d92488d18275d1aa32fcd1aa6bfbaf300cd3e4612cf1a9202c9865,2025-02-20T21:11:55.467000
|
||||
CVE-2024-4907,0,0,8a46ab2f72d92488d18275d1aa32fcd1aa6bfbaf300cd3e4612cf1a9202c9865,2025-02-20T21:11:55.467000
|
||||
CVE-2024-49070,0,0,88cb75f6aac561fbd7445fb92e3166640699d9cb76aeb7ad846d28126d07a21f,2025-01-08T12:41:56.687000
|
||||
CVE-2024-49071,0,0,886b1c9c1b263ef75dbae52c4397c53a6e63285a8ff48a5c9607151efd6c9422,2025-01-10T18:24:41.833000
|
||||
CVE-2024-49072,0,0,6480af07c3aa1a2c97c34d32cd03048ae04053c43b8719d92f932c24e1410d95,2025-01-08T12:42:14.327000
|
||||
@ -269504,7 +269504,7 @@ CVE-2024-49076,0,0,28e66c6feb045ee3685aa3725a795702f1c08003279373d21b95367fa18ca
|
||||
CVE-2024-49077,0,0,f2490cf48403adf30a6b3dec0672337910298368a3a2bbc158df2c82c818d30f,2025-01-08T12:42:54.390000
|
||||
CVE-2024-49078,0,0,f9b6b77a2f87d83ff3a7d56400b71f82d700b976175721cf41ce61e731abb2e2,2025-01-08T12:43:01.873000
|
||||
CVE-2024-49079,0,0,1ede54512e1ac45762cdcf7a19a906c825879c7ed32b211fb88c2a6e477a602f,2025-01-08T12:43:12.590000
|
||||
CVE-2024-4908,0,1,58ea5ca82bf8467cb7dae0dd5a8aa587f9a000406e0e949afe2618f8a8d6db19,2025-02-20T21:13:10.770000
|
||||
CVE-2024-4908,0,0,58ea5ca82bf8467cb7dae0dd5a8aa587f9a000406e0e949afe2618f8a8d6db19,2025-02-20T21:13:10.770000
|
||||
CVE-2024-49080,0,0,91ed3e16ad08f1f1891370ba309e83ae357edde0489d3e8928701000aef6c833,2025-01-08T12:43:19.430000
|
||||
CVE-2024-49081,0,0,6440420f7f866a3c46e8de643f39f7500d5422d914fdcf140a1cc71711b03182,2025-01-08T12:43:26.277000
|
||||
CVE-2024-49082,0,0,14f44128b3257bd77cab393990e5dcf4a62a2f3d6c5487dd291b3bb7ebc1e474,2025-01-08T12:43:32.427000
|
||||
@ -269515,7 +269515,7 @@ CVE-2024-49086,0,0,a4bac1c7ac71f0bcd79fbed22b6b3f12a81da8e6a434eb000bf7b6f62f842
|
||||
CVE-2024-49087,0,0,acf1f962400f6c1f979b57b35bb7cb8203f784104771d4c41c37ee921926f651,2025-01-08T12:29:01.230000
|
||||
CVE-2024-49088,0,0,0a034cc8e3563d8daee4b13be1a382fa55dd5fd1516305366b235714b7b924e8,2025-01-08T12:29:25.127000
|
||||
CVE-2024-49089,0,0,460c0b1572143c8a930b42aac219fdb2db630fc205d951d9f978a544d640e022,2025-01-08T12:29:53.087000
|
||||
CVE-2024-4909,0,1,bb1319b973486f55ee3a560de1ad4e4c15e13bdea36db99168644870df98eef3,2025-02-20T21:20:22.503000
|
||||
CVE-2024-4909,0,0,bb1319b973486f55ee3a560de1ad4e4c15e13bdea36db99168644870df98eef3,2025-02-20T21:20:22.503000
|
||||
CVE-2024-49090,0,0,4df7b3dde47cedd69f1e620e8ceff1462cf2c29d65d6357ee9412b05c8bcb25a,2025-01-08T12:30:08.020000
|
||||
CVE-2024-49091,0,0,d5983f99ca1f1eb63c2b4b3ee1c879a63b252c078aaf90f9097eda2df9f321f6,2025-01-08T12:30:48.603000
|
||||
CVE-2024-49092,0,0,4cab59525d9240313502249a3c56e6044a97536fafac2cea4e9b3128c135e2a0,2025-01-08T12:31:00.110000
|
||||
@ -269526,7 +269526,7 @@ CVE-2024-49096,0,0,67f362590922cc53652e4fac22db07937b4abff7804f716b125c110e68718
|
||||
CVE-2024-49097,0,0,cdf9e30dea98375aa5bdde15b052104acd1eb774bb8306a3e2c540581927515c,2025-01-08T12:32:37.693000
|
||||
CVE-2024-49098,0,0,565eb92914c323963a195cdd3892887d52ccac32ec51e83f84e9debb42e8dc94,2025-01-08T12:32:51.780000
|
||||
CVE-2024-49099,0,0,1648daec24598262ea44030a4141e5202d686db9b122e5dba8db9f48c42a49b9,2025-01-08T12:33:01.667000
|
||||
CVE-2024-4910,0,1,82bd9f25915a5a1a9c290cab9cbd54ffdc1a0fe17743a86c0e02df31ba5c445b,2025-02-20T21:25:32.727000
|
||||
CVE-2024-4910,0,0,82bd9f25915a5a1a9c290cab9cbd54ffdc1a0fe17743a86c0e02df31ba5c445b,2025-02-20T21:25:32.727000
|
||||
CVE-2024-49101,0,0,5a26bce4afe1e695853e2790e1727f734ee7e4c17246c7d74717ebcc448aea63,2025-01-08T12:33:13.767000
|
||||
CVE-2024-49102,0,0,5d5d654f110c958a874f513f0998e6fa9f470750b9fd2c4b5dbf2463ddffb17d,2025-01-08T12:33:35.393000
|
||||
CVE-2024-49103,0,0,f8748cdeb11b5515e98add0857d4e2802ff38e1bd40c10136cda20d268beb5c6,2025-01-08T12:33:53.027000
|
||||
@ -269536,7 +269536,7 @@ CVE-2024-49106,0,0,5a155dd673ebcb874ab2e0b60afd6f8d3ac43b0c2f6570f77663fa3b08f1e
|
||||
CVE-2024-49107,0,0,ab4b133bf374ca4bf31f7707a044ab19e9712b86499267bf0f11f04f1e826c86,2025-01-08T12:35:49.377000
|
||||
CVE-2024-49108,0,0,d64219678c7697715ab4efe13bc688da908bd124fe11ba1331073da14bce488e,2025-01-08T12:36:07.647000
|
||||
CVE-2024-49109,0,0,c4a42ecb61c2a0718fcee1360389a87300e72d3a5fc557813f19f70f5b78ab51,2025-01-08T12:36:18
|
||||
CVE-2024-4911,0,1,fcd2ee6e9ddbb3fed226c70be5e5926b40eef8bf14b39b7a3a89092b6bbf5d0a,2025-02-20T21:31:52.843000
|
||||
CVE-2024-4911,0,0,fcd2ee6e9ddbb3fed226c70be5e5926b40eef8bf14b39b7a3a89092b6bbf5d0a,2025-02-20T21:31:52.843000
|
||||
CVE-2024-49110,0,0,33e5a94c6fbd8ccce21a45986759cb1bd4cc3508752631bd590736f5185ddb81,2025-01-14T17:55:39.667000
|
||||
CVE-2024-49111,0,0,fe034774b79b9a52d60a8aa7ca4aea59f1f2ac3f2c9fd8eadbb9d9616a3af457,2025-01-14T17:56:05.673000
|
||||
CVE-2024-49112,0,0,c8543a4160751cef03d79cfb3025ebcd1e56eb2ad1236d7382c39f668d814b30,2025-01-14T17:54:51.813000
|
||||
@ -269568,7 +269568,7 @@ CVE-2024-4915,0,0,0db50bbbf81e6509cf2f04f7c74802ee1539c5988eb17e78bcc8e3a916243d
|
||||
CVE-2024-4916,0,0,46062bb382c89200b166e2e86c9831624440cd917b76f7208234261e0e99e402,2024-11-21T09:43:51.723000
|
||||
CVE-2024-4917,0,0,95cec23e602c996c3b6188d4e4ba043035d85d558b4aed6963a603c245d41e9b,2024-11-21T09:43:51.867000
|
||||
CVE-2024-4918,0,0,190a2472cf82ddf9ece6d5f55c8371f587c5b961e6a0255efb3e1d13b0381b29,2024-11-21T09:43:52.013000
|
||||
CVE-2024-4919,0,1,368fad74919de96a96ea1b7b705df86833ed8de7dc9bf1ce010b2942a41be4d1,2025-02-20T21:36:10.237000
|
||||
CVE-2024-4919,0,0,368fad74919de96a96ea1b7b705df86833ed8de7dc9bf1ce010b2942a41be4d1,2025-02-20T21:36:10.237000
|
||||
CVE-2024-49193,0,0,f107d286fb452265d3af6ba99ec3a3307a498cc5d0a571f0a12f8237ec4bf150,2024-10-16T20:35:16.380000
|
||||
CVE-2024-49194,0,0,0ec8be045d0245140372caea286e91f3e3f2b648af9aa51f5731f3d907f06384,2024-12-18T17:15:13.593000
|
||||
CVE-2024-49195,0,0,f09eab8729e42b8f90de1ca9d2dd22f865dd713c9e6432237b0fc072c91310d7,2024-10-17T18:35:13.253000
|
||||
@ -273580,6 +273580,7 @@ CVE-2024-54749,0,0,2c9d895fdb5b90a3967a9403130c1863e1d8648bd0343f58138b0aee4bfec
|
||||
CVE-2024-5475,0,0,3f93fbbe9009c236ea2c6da72827f7bd871ace2e1ffd3b439453d8900914ef7f,2024-11-21T09:47:45.480000
|
||||
CVE-2024-54750,0,0,a2b9bd793ac60105835f796550f4eca54ad7139b40ad2fdf283a28d5ab7647fe,2024-12-09T23:15:34.020000
|
||||
CVE-2024-54751,0,0,1362ae63d46fa3e6e13ddf6e48994d99d3189782d67a09cf0bde552f8a9a1b0f,2024-12-11T16:15:14.910000
|
||||
CVE-2024-54756,1,1,a11106cf72b81f7a3b22751c40309fa1b7b9090c5f85ab1f0f2be603b39fed27,2025-02-20T23:15:10.763000
|
||||
CVE-2024-54761,0,0,fb39517d0d10d8a3984368819e40bd7b75b522f13a59de64d1058184c9c0f22c,2025-01-10T16:15:29.163000
|
||||
CVE-2024-54762,0,0,cb8e4aa44b5cf3cee838feac63d68a9bf187e0e1794dfb8457350541c62314fd,2025-01-10T16:15:29.337000
|
||||
CVE-2024-54763,0,0,35fe6aeaf8ff2a2d9d1415d3e6f03dd3382c26dbe16edd942f9dacbafebc435a,2025-01-07T22:15:30.950000
|
||||
@ -275334,7 +275335,7 @@ CVE-2024-5917,0,0,0374c61ca43711fa0007048763452cf624fe05803520f6b8df2b2915e1805e
|
||||
CVE-2024-5918,0,0,81bdc2190125b670e90203f3548cb48aebcc8fef030a219189e3db9809744209,2024-11-15T13:58:08.913000
|
||||
CVE-2024-5919,0,0,943f6ef8006790db3993b9e7e6be9754f42ed6ca13d49343ae1cb352e31363f6,2025-01-24T16:06:00.323000
|
||||
CVE-2024-5920,0,0,ecad2ed64a53475eca59c712b0209a60d186710654efe9484b614512aad9b560,2025-01-24T16:06:43.023000
|
||||
CVE-2024-5921,0,0,7b078ebfa77a04f80dea3bb6728403f1db96a3dfaed7c57f149ae4e2d1706244,2024-11-27T04:15:14.687000
|
||||
CVE-2024-5921,0,1,764ee07b5d9183919b9b18306a89535125009bc54323b840a79c25b4e9e40590,2025-02-20T23:15:11.647000
|
||||
CVE-2024-5922,0,0,695f58e2e058442a55c514d990c8f571599bfa26e88ff8cd313f759acf5777fc,2024-11-21T09:48:35.113000
|
||||
CVE-2024-5924,0,0,317522f79ef7e40c3687a78a629fe3c643f265f4648ccabd8de5057b9325f402,2024-11-23T00:42:38.983000
|
||||
CVE-2024-5925,0,0,67af12bebc147252e0cd9548451ac5c5e1430e3a586e92065e0f774eeb53fd78,2024-11-21T09:48:35.373000
|
||||
@ -276415,6 +276416,7 @@ CVE-2024-7127,0,0,74ea77d58ecf556d18acaf9d16337686e906f23336ce730a34b76f4ca6d940
|
||||
CVE-2024-7128,0,0,63ebd08f49c0068667fb6b2f49b7c3f23e6c76a3f34bab8f2c541fe2bb7b0be0,2024-11-21T09:50:55.230000
|
||||
CVE-2024-7129,0,0,87988fd1b36137710339cfba45c7e36a36bf99a87dea14d473728b3b1a3c931e,2024-09-27T18:26:27.560000
|
||||
CVE-2024-7130,0,0,286b36e86013413c0588decfa7340ee715f93d593c123c25bc3162aafc387f8b,2024-11-25T15:15:08.260000
|
||||
CVE-2024-7131,1,1,b08d2afed20a09a710ebfe4d4d3349ae3aed1ab3b039c0e6dd36342e0a8070d6,2025-02-20T23:15:11.867000
|
||||
CVE-2024-7132,0,0,7f00893e6dd2b548c0a141178cd51c01a0e977f2a9e4adc229306e5debe17a1a,2024-10-07T15:44:37.107000
|
||||
CVE-2024-7133,0,0,20a71460acb2cc2918dd1a17d948e3f8e3572ca60a62cc2cedc03afd6786436c,2024-09-27T21:27:50.053000
|
||||
CVE-2024-7134,0,0,e2a5ca3c0db9b7079284acb04005dfa5285d4bba9eb8cb07d690e27ce1cf16fe,2024-08-21T12:30:33.697000
|
||||
@ -276592,7 +276594,7 @@ CVE-2024-7312,0,0,3801107d6364e9f21e7ab3cc10d590b5f333e5281712a24fc975d65dae51b1
|
||||
CVE-2024-7313,0,0,ae740c6d7dd1bf3302aeb883c266930419f35d81ec4b27f2a358900478570646,2024-08-26T18:35:13.207000
|
||||
CVE-2024-7314,0,0,a0e3db9e46a10685462d139958ab3e89d3fb6ba3d18ec1868705f43b6ca9ee6c,2024-09-17T15:45:01.970000
|
||||
CVE-2024-7315,0,0,0276fed18ec3f282200e90c7f7fd4f2076ab30971f9a3c25cda4a70e2661c4dc,2024-10-04T13:50:43.727000
|
||||
CVE-2024-7316,0,0,ead5006fa07151a6566ea5d17b1257586191433f2451251841cd8207be58bdeb,2024-10-18T12:52:33.507000
|
||||
CVE-2024-7316,0,1,923af8c32a3fa170de4981ae877831203fc06eaf1a717938c8ebb060f5f6a697,2025-02-21T00:15:08.203000
|
||||
CVE-2024-7317,0,0,74b94744a502a911bfc3fa448f659d1e62224059149675770167c008b6a94652,2024-11-22T19:12:46.280000
|
||||
CVE-2024-7318,0,0,8cbca515fa6d8fbd9808eb88225bf271b50136ae9aabf8f4edc8bdb9df7d7f7c,2024-10-07T20:15:17.153000
|
||||
CVE-2024-7319,0,0,4525edc8de27c7880ec08e0f3c2fc246097df2a636951ddea8eaec76b898d5fc,2024-10-07T19:15:11.090000
|
||||
@ -278985,7 +278987,7 @@ CVE-2025-0244,0,0,a007094477ee1c52bbc6ad80ad1856461cbdef97dbf9502d29b149d107af9f
|
||||
CVE-2025-0245,0,0,d3f443614cf269edf96a7044d50adaa402232a03e23aa318a1f5e6bf4990a77e,2025-01-08T16:15:37.693000
|
||||
CVE-2025-0246,0,0,c39f5bdf37092ddacf9510ed2d75cd9204291d6d9bc9dd6c5bd8168e56e08082,2025-01-08T16:15:37.880000
|
||||
CVE-2025-0247,0,0,0125f498ef227ebc436135b5d9339a763bd05ec1f3a6e4d4fb60e8d0a9524607,2025-01-14T17:15:20.547000
|
||||
CVE-2025-0282,0,0,8f04f787bbd4bc1106bd61b71ca3eca0ae9568bebdac6faee4108abb0f611ddf,2025-01-28T17:15:25.620000
|
||||
CVE-2025-0282,0,1,193a86684d492a70f8035af4d9672f451f74d0f498147e63c150db661e49e756,2025-02-20T23:15:11.950000
|
||||
CVE-2025-0283,0,0,170559952a9515dd5478b031ee87167014dac9ea49e5e0d222b13defbaf7dddd,2025-01-14T15:58:55.813000
|
||||
CVE-2025-0290,0,0,1b0af77f22124c7fd21050a24684089c59772f145263e66a578112620b4a0b4d,2025-01-28T09:15:09.363000
|
||||
CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb545,2025-02-11T15:16:03.447000
|
||||
@ -280588,6 +280590,7 @@ CVE-2025-22962,0,0,edfa6947f0850e24eb9cdf90af6759e9e22a516ea9c64433cee19e5c5eaec
|
||||
CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000
|
||||
CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000
|
||||
CVE-2025-22968,0,0,d3d48189e9b72af1c9aeb72931ff25b490499842dd9dca10fe5551a85839cd34,2025-02-18T22:15:18.143000
|
||||
CVE-2025-22973,1,1,48f3f25c02a26c1325a96f8c42c2c1691b076404cc9687b2a0d5f976b5b0aea1,2025-02-20T23:15:12.120000
|
||||
CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000
|
||||
CVE-2025-22978,0,0,c26d3b35b5f5b247c22bc9e725ddb59da99594ad5fac650f59f0b0b41ffbe946,2025-02-18T19:15:26.930000
|
||||
CVE-2025-22980,0,0,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000
|
||||
@ -281757,11 +281760,11 @@ CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01
|
||||
CVE-2025-25467,0,0,88e8377464fdf0cf875ec11d3e8371c15a9465f85314cbabc34c80cddb507da4,2025-02-19T15:15:17.760000
|
||||
CVE-2025-25468,0,0,9209daa082de7c38fedec36f5894b79e14469faa71894740e63970dc23df9401,2025-02-19T15:15:17.930000
|
||||
CVE-2025-25469,0,0,741fdd6513e01efbd7a9bf5df4924bb989fc1989e61032b7cef4423372c52af7,2025-02-19T21:15:15.750000
|
||||
CVE-2025-25471,0,1,0912321195e46e46cb23990647f291e1abe244e75e1f9093bb8756dbd9a3ddb7,2025-02-20T21:15:25.410000
|
||||
CVE-2025-25472,0,1,8e8e171c0300ed9c4535deaeb2c2bc6dfdc66f8eea702fd32fbe4b063c04d567,2025-02-20T21:15:25.570000
|
||||
CVE-2025-25473,0,1,55a66f96efd34a8bf6959b64a64a5a6f9abb5389cacde3b98abeba35f1566b08,2025-02-20T22:15:30.863000
|
||||
CVE-2025-25474,0,1,19b4b9815528a4b62620eec453fddeb47ce33007b3a5a250ea134223fc74a338,2025-02-20T22:15:31.027000
|
||||
CVE-2025-25475,0,1,da2a2d1f29106b1a0859c6a65cc60cebccb336e99ff5a9bda978918b583eb1de,2025-02-20T22:15:31.190000
|
||||
CVE-2025-25471,0,0,0912321195e46e46cb23990647f291e1abe244e75e1f9093bb8756dbd9a3ddb7,2025-02-20T21:15:25.410000
|
||||
CVE-2025-25472,0,0,8e8e171c0300ed9c4535deaeb2c2bc6dfdc66f8eea702fd32fbe4b063c04d567,2025-02-20T21:15:25.570000
|
||||
CVE-2025-25473,0,0,55a66f96efd34a8bf6959b64a64a5a6f9abb5389cacde3b98abeba35f1566b08,2025-02-20T22:15:30.863000
|
||||
CVE-2025-25474,0,0,19b4b9815528a4b62620eec453fddeb47ce33007b3a5a250ea134223fc74a338,2025-02-20T22:15:31.027000
|
||||
CVE-2025-25475,0,0,da2a2d1f29106b1a0859c6a65cc60cebccb336e99ff5a9bda978918b583eb1de,2025-02-20T22:15:31.190000
|
||||
CVE-2025-25522,0,0,9f2c0bc0a6dbb67154353c2da3969483621b5d35364f73acfaa2a34b0ff5a40b,2025-02-13T17:17:20.517000
|
||||
CVE-2025-25523,0,0,9c6d5a6c8c747b7673e69ebf58bf535f17db00e0831b58073ddd586410cf36d9,2025-02-13T18:18:23.400000
|
||||
CVE-2025-25524,0,0,40af9c5e5be067f2e684b500c6cae4a5dab6d519bde35d9c0fd3353781274a87,2025-02-13T18:18:23.597000
|
||||
@ -281771,6 +281774,16 @@ CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09
|
||||
CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000
|
||||
CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000
|
||||
CVE-2025-25530,0,0,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000
|
||||
CVE-2025-25662,1,1,9633e7f3b8f59c6e43d297b89d8d63c3b765d10fd1ce3ef006a57e6d7aaa1aa0,2025-02-20T23:15:12.233000
|
||||
CVE-2025-25663,1,1,11f6fe586c7309f7c404b1a4660d84bf0ff2637aa33fef6376abb9eb9047a7ae,2025-02-20T23:15:12.350000
|
||||
CVE-2025-25664,1,1,fd5e33bbcf182bc19c85627ba3958c29fc1634aa20cfe43370fb7e30e8083445,2025-02-20T23:15:12.453000
|
||||
CVE-2025-25667,1,1,04cd22c46670270f6f71473f21ec8f3c99204556438247cd1d1beabf97f08124,2025-02-20T23:15:12.560000
|
||||
CVE-2025-25668,1,1,3df5760d364e88ade9438b44542c5d4358e136bcaa43c5fc301696018382cc38,2025-02-20T23:15:12.660000
|
||||
CVE-2025-25674,1,1,14b6436fbbb1c91abf2546b8ce130c55edf26735e0ed8e2fab0518ad767666b9,2025-02-20T23:15:12.767000
|
||||
CVE-2025-25675,1,1,3e57c2d3bc2aa887684bb713b138a772b1d559831219b79651e09f2e40dceb8a,2025-02-20T23:15:12.870000
|
||||
CVE-2025-25676,1,1,7032e39077bd2daf2ff52588ad7d7ec71ac13fa1a2cd0aa37e871716af3cdbae,2025-02-20T23:15:12.977000
|
||||
CVE-2025-25678,1,1,c6f1766b0d37ffc159f7d9618b225606accb22db180898536b660b550377464d,2025-02-20T23:15:13.077000
|
||||
CVE-2025-25679,1,1,cf57aa8cf629bd0d8913086ddf39d8a39e3aaa047fd06d8634cc4ab8c13ad856,2025-02-20T23:15:13.183000
|
||||
CVE-2025-25740,0,0,e293852be5217bbbef8df2d3ca6ee22f2f657a54490e20535567ff73eeb99c95,2025-02-14T15:15:13.190000
|
||||
CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000
|
||||
CVE-2025-25742,0,0,282d5be2f716e792c8811a9f5fcc30c9e90532841c3863f5b991aec212b10df2,2025-02-19T19:02:59.180000
|
||||
@ -281795,8 +281808,9 @@ CVE-2025-25944,0,0,be3957e03ef6cc753272acb47a0146e6f3e330f45af5947134f7dfc1abcce
|
||||
CVE-2025-25945,0,0,11a45dbb9f85298a4f5f5f1ffa2ff82703bd23ae19884ad1bb8a03ee40102cde,2025-02-20T15:15:15.073000
|
||||
CVE-2025-25946,0,0,b9c23bf08cd92d7c9cca31f0d0d39dfabaeeb4f8fda065f73ab8d2322e4edf92,2025-02-20T15:15:15.227000
|
||||
CVE-2025-25947,0,0,bf5a589bf21a858d30ce3f9e75804530a939c4b2ce95d48bea111bb37f0f00d5,2025-02-20T15:15:15.530000
|
||||
CVE-2025-25958,1,1,2923b2d2ac3d1fd72008f892599a9977842715f0eeffb0aa884afda3f2391ba5,2025-02-20T22:15:31.390000
|
||||
CVE-2025-25960,1,1,228783659f244747218c1b28275971690dda017b55124f28a600dc65d83f2d89,2025-02-20T22:15:31.493000
|
||||
CVE-2025-25957,1,1,6bdeedade5609f579de9c9f7b017f9163781e107636e2e991de828c244d1f425,2025-02-20T23:15:13.280000
|
||||
CVE-2025-25958,0,0,2923b2d2ac3d1fd72008f892599a9977842715f0eeffb0aa884afda3f2391ba5,2025-02-20T22:15:31.390000
|
||||
CVE-2025-25960,0,0,228783659f244747218c1b28275971690dda017b55124f28a600dc65d83f2d89,2025-02-20T22:15:31.493000
|
||||
CVE-2025-25968,0,0,09bd93194eede08beb1dc709f5461851717c635b130d25408ef11afa03180ff0,2025-02-20T20:15:46.993000
|
||||
CVE-2025-25973,0,0,bc6886ccb2c9ecf1c1935d02cb042518ac538d8013efc592ae1b5fb12fc0b35c,2025-02-20T20:15:47.153000
|
||||
CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000
|
||||
@ -281817,7 +281831,7 @@ CVE-2025-26307,0,0,ceb0357c37b88e34244c9f55d7082302d7c6688f50d8028aba18cb4b49669
|
||||
CVE-2025-26308,0,0,3e072877f412939a3c50a2422a54d75c10bdf23be48f05068cfdfbe70a89a12d,2025-02-20T17:15:12.730000
|
||||
CVE-2025-26309,0,0,d91dfb16f99b8b177a88ed69fb910d1699945bbbc6ceb6223bd02a4bc745f70c,2025-02-20T17:15:12.853000
|
||||
CVE-2025-26310,0,0,29f1fcba38b2588cfaea820a424c57e92680a0eca4091920c8fd5bfcf8d6fd62,2025-02-20T17:15:12.967000
|
||||
CVE-2025-26311,0,1,13656d99d63094c8d41b810c6263cffd50113ae9c1f9bd8a88dff3952f87e18f,2025-02-20T21:15:25.907000
|
||||
CVE-2025-26311,0,0,13656d99d63094c8d41b810c6263cffd50113ae9c1f9bd8a88dff3952f87e18f,2025-02-20T21:15:25.907000
|
||||
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
|
||||
CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000
|
||||
CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000
|
||||
@ -281917,7 +281931,7 @@ CVE-2025-26614,0,0,7f8f01d4a30469e9f0e12e94ee15c90de661424965432d6e0ab9c88be2537
|
||||
CVE-2025-26615,0,0,4ecb9621b936b5139fc4ec6e59d6798bda965877e727a76a42a2097c350383d8,2025-02-18T21:15:29.867000
|
||||
CVE-2025-26616,0,0,adfc76ec40903a204c1832e3daed3f0e44bf0c652172addd04989d3ff972bf10,2025-02-18T21:15:30.010000
|
||||
CVE-2025-26617,0,0,1b0fc09fd0258e134911cacd2ad1e559b3734d07d890bba395627bae512ac0ad,2025-02-18T21:15:30.137000
|
||||
CVE-2025-26618,0,1,f8dd04a088e9c1ef15892f10db1e49060d6c91ccfb0e2ca83ac304f0769b1d61,2025-02-20T21:15:26.073000
|
||||
CVE-2025-26618,0,0,f8dd04a088e9c1ef15892f10db1e49060d6c91ccfb0e2ca83ac304f0769b1d61,2025-02-20T21:15:26.073000
|
||||
CVE-2025-26620,0,0,b52554701527e486a669272c32db538b4af2be9f7d05b83de248aad0441a11da,2025-02-18T18:15:36.767000
|
||||
CVE-2025-26623,0,0,8058a54e26172919c4073d93d1e5d8c8b4196bc60cec9ced7fa5cc190a1b8657,2025-02-18T20:15:33.153000
|
||||
CVE-2025-26624,0,0,b1ee6d12b9f4cff5337865530f2b95198c23875bf3e99102a3d462bb47eeba02,2025-02-18T23:15:10.810000
|
||||
@ -281947,12 +281961,14 @@ CVE-2025-26819,0,0,7afd4e7cb03752c52e5526c11c2ec114770ff5f83e4468a7bb7571814f4cc
|
||||
CVE-2025-26856,0,0,97d830a9ee806f0ef850d5b5eea5c095e7e2e4dee4401ad5b7fd9fb34c2341f7,2025-02-20T06:15:21.673000
|
||||
CVE-2025-27013,0,0,f948cc3f5edcc63c02fbe1aa3ab5587f3b1659a21b1a5f943b19bb040cbb2d15,2025-02-18T20:15:33.880000
|
||||
CVE-2025-27016,0,0,04fa07ed62d9b49f3b31ebda2ac8455c38c6351226a3cae9904a3c1abe91e83f,2025-02-18T20:15:34.013000
|
||||
CVE-2025-27088,1,1,c8de1f996e1c19d12f84f074cd856864a2760f2e0c54a70e9ee5766ba849f378,2025-02-20T23:15:13.397000
|
||||
CVE-2025-27089,0,0,e1cd39d7d2d496ca126251592ce334845a8dbaa95837461791aefc38c5c96ee4,2025-02-19T17:15:15.800000
|
||||
CVE-2025-27090,0,0,1f7a1f68f44411e4af49caeac1dba85d17f51b5d72f982d15d3cbe07a63e4481,2025-02-19T22:15:24.247000
|
||||
CVE-2025-27091,0,0,1f31f1738107c079abfb76423f421b24481f1590b449faf518c191e3377a5c93,2025-02-20T18:15:26.850000
|
||||
CVE-2025-27092,0,0,a2d77f19ec65de3c929cda30f22d3993a6f6513f45b321406307690349bba5d0,2025-02-19T23:15:15.957000
|
||||
CVE-2025-27096,0,0,32224f1c51b54efe47a565f7e551ac8c6822a2af21d493c489fef5b8bd7d41a3,2025-02-20T19:15:12.157000
|
||||
CVE-2025-27097,1,1,5b9fc582a5c5e9bf93a07d4ec3deca2e89df01f5ebbf3bb4a854ac4e8c549a46,2025-02-20T21:15:26.227000
|
||||
CVE-2025-27098,1,1,766aa0528b8030648a329da18fe8e03c04c956bcb8a3fc39487da75af24bc862,2025-02-20T21:15:26.370000
|
||||
CVE-2025-27097,0,0,5b9fc582a5c5e9bf93a07d4ec3deca2e89df01f5ebbf3bb4a854ac4e8c549a46,2025-02-20T21:15:26.227000
|
||||
CVE-2025-27098,0,0,766aa0528b8030648a329da18fe8e03c04c956bcb8a3fc39487da75af24bc862,2025-02-20T21:15:26.370000
|
||||
CVE-2025-27100,1,1,c241d778cc69afadd153119784c98cb751150e20e8824ef0500e107bbd54eb0d,2025-02-21T00:15:09.250000
|
||||
CVE-2025-27113,0,0,5361e7323e42f3b09824985b5c3b788849d795bb02cd5dec29aec9ac11d6b7a1,2025-02-18T23:15:10.960000
|
||||
CVE-2025-27218,0,1,e842a62b1f9059ed2d0550b371a27529a7b5793cd2f6846001642d73d1e7ef93,2025-02-20T21:15:26.510000
|
||||
CVE-2025-27218,0,0,e842a62b1f9059ed2d0550b371a27529a7b5793cd2f6846001642d73d1e7ef93,2025-02-20T21:15:26.510000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user