mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2025-03-14T09:00:19.189318+00:00
This commit is contained in:
parent
aa0a97f993
commit
f9959deb54
60
CVE-2024/CVE-2024-133xx/CVE-2024-13321.json
Normal file
60
CVE-2024/CVE-2024-133xx/CVE-2024-13321.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13321",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T08:15:11.447",
|
||||
"lastModified": "2025-03-14T08:15:11.447",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The AnalyticsWP plugin for WordPress is vulnerable to SQL Injection via the 'custom_sql' parameter in all versions up to, and including, 2.0.0 due to insufficient authorization checks on the handle_get_stats() function. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://analyticswp.com/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6507318-92c0-457c-8c87-2d023428a77f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-134xx/CVE-2024-13407.json
Normal file
60
CVE-2024/CVE-2024-134xx/CVE-2024-13407.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13407",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T08:15:11.620",
|
||||
"lastModified": "2025-03-14T08:15:11.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Omnipress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.5.4 via the megamenu block due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3254484/omnipress/trunk/includes/Blocks/BlockTypes/Megamenu.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa17f78a-5e4a-441e-bbbb-d13bad648c39?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-138xx/CVE-2024-13824.json
Normal file
60
CVE-2024/CVE-2024-138xx/CVE-2024-13824.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13824",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T07:15:34.517",
|
||||
"lastModified": "2025-03-14T07:15:34.517",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The CiyaShop - Multipurpose WooCommerce Theme theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.19.0 via deserialization of untrusted input in the 'add_ciyashop_wishlist' and 'ciyashop_get_compare' functions. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/ciyashop-responsive-multipurpose-woocommerce-wordpress-theme/22055376#item-description__changelog",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b69c86f4-d81d-4e14-baff-3402008bb9c6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6655",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-07-16T15:15:12.597",
|
||||
"lastModified": "2024-11-21T09:50:05.080",
|
||||
"lastModified": "2025-03-14T08:15:11.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -72,6 +72,10 @@
|
||||
"url": "https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2024/09/09/1",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/09/09/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
|
64
CVE-2025/CVE-2025-15xx/CVE-2025-1526.json
Normal file
64
CVE-2025/CVE-2025-15xx/CVE-2025-1526.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-1526",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T08:15:12.120",
|
||||
"lastModified": "2025-03-14T08:15:12.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The DethemeKit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the De Product Display Widget (countdown feature) in all versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/dethemekit-for-elementor/trunk/assets/frontend/js/dethemekit-addons.js#L815",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255121%40dethemekit-for-elementor&new=3255121%40dethemekit-for-elementor&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e01ae00-0d07-4e9a-928e-e10cf679df2e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-22xx/CVE-2025-2221.json
Normal file
64
CVE-2025/CVE-2025-22xx/CVE-2025-2221.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-2221",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T07:15:38.477",
|
||||
"lastModified": "2025-03-14T07:15:38.477",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WPCOM Member plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018user_phone\u2019 parameter in all versions up to, and including, 1.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wpcom-member/tags/1.7.6/includes/class-sesstion.php#L35",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3255171/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8f491d48-935c-4fd9-a342-44d98c5601b3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
30
README.md
30
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-14T07:00:22.567467+00:00
|
||||
2025-03-14T09:00:19.189318+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-14T06:15:25.230000+00:00
|
||||
2025-03-14T08:15:12.120000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,35 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
285213
|
||||
285218
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-11283](CVE-2024/CVE-2024-112xx/CVE-2024-11283.json) (`2025-03-14T05:15:37.577`)
|
||||
- [CVE-2024-11284](CVE-2024/CVE-2024-112xx/CVE-2024-11284.json) (`2025-03-14T05:15:40.463`)
|
||||
- [CVE-2024-11285](CVE-2024/CVE-2024-112xx/CVE-2024-11285.json) (`2025-03-14T05:15:40.693`)
|
||||
- [CVE-2024-11286](CVE-2024/CVE-2024-112xx/CVE-2024-11286.json) (`2025-03-14T05:15:40.917`)
|
||||
- [CVE-2024-13376](CVE-2024/CVE-2024-133xx/CVE-2024-13376.json) (`2025-03-14T06:15:22.860`)
|
||||
- [CVE-2024-13913](CVE-2024/CVE-2024-139xx/CVE-2024-13913.json) (`2025-03-14T06:15:24.490`)
|
||||
- [CVE-2025-0952](CVE-2025/CVE-2025-09xx/CVE-2025-0952.json) (`2025-03-14T06:15:24.683`)
|
||||
- [CVE-2025-0955](CVE-2025/CVE-2025-09xx/CVE-2025-0955.json) (`2025-03-14T05:15:41.760`)
|
||||
- [CVE-2025-1285](CVE-2025/CVE-2025-12xx/CVE-2025-1285.json) (`2025-03-14T05:15:41.977`)
|
||||
- [CVE-2025-1528](CVE-2025/CVE-2025-15xx/CVE-2025-1528.json) (`2025-03-14T05:15:42.170`)
|
||||
- [CVE-2025-1764](CVE-2025/CVE-2025-17xx/CVE-2025-1764.json) (`2025-03-14T06:15:24.860`)
|
||||
- [CVE-2025-2056](CVE-2025/CVE-2025-20xx/CVE-2025-2056.json) (`2025-03-14T05:15:42.523`)
|
||||
- [CVE-2025-2103](CVE-2025/CVE-2025-21xx/CVE-2025-2103.json) (`2025-03-14T06:15:25.057`)
|
||||
- [CVE-2025-2166](CVE-2025/CVE-2025-21xx/CVE-2025-2166.json) (`2025-03-14T05:15:42.723`)
|
||||
- [CVE-2025-2289](CVE-2025/CVE-2025-22xx/CVE-2025-2289.json) (`2025-03-14T06:15:25.230`)
|
||||
- [CVE-2024-13321](CVE-2024/CVE-2024-133xx/CVE-2024-13321.json) (`2025-03-14T08:15:11.447`)
|
||||
- [CVE-2024-13407](CVE-2024/CVE-2024-134xx/CVE-2024-13407.json) (`2025-03-14T08:15:11.620`)
|
||||
- [CVE-2024-13824](CVE-2024/CVE-2024-138xx/CVE-2024-13824.json) (`2025-03-14T07:15:34.517`)
|
||||
- [CVE-2025-1526](CVE-2025/CVE-2025-15xx/CVE-2025-1526.json) (`2025-03-14T08:15:12.120`)
|
||||
- [CVE-2025-2221](CVE-2025/CVE-2025-22xx/CVE-2025-2221.json) (`2025-03-14T07:15:38.477`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2025-27363](CVE-2025/CVE-2025-273xx/CVE-2025-27363.json) (`2025-03-14T05:15:42.377`)
|
||||
- [CVE-2024-6655](CVE-2024/CVE-2024-66xx/CVE-2024-6655.json) (`2025-03-14T08:15:11.803`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
39
_state.csv
39
_state.csv
@ -245425,10 +245425,10 @@ CVE-2024-1128,0,0,54a69d705f12085e9815f97438893085defbeff56c788628eb3154f79b1c48
|
||||
CVE-2024-11280,0,0,55a96727b2485e04cc5b6b8add864215b2cd1aa8bc4bdf75a3cee41a9da85d1e,2024-12-17T12:15:19.343000
|
||||
CVE-2024-11281,0,0,90e2bd5c8205361ece3136c81be65d202c124421a44b94b51cee816a97580eff,2024-12-25T07:15:11.777000
|
||||
CVE-2024-11282,0,0,d7544003139ef4914de1b710d30955127d71a03465256a078e5049afe1c984af,2025-01-07T07:15:25.293000
|
||||
CVE-2024-11283,1,1,7361b5961afb6717cd1f613bfc1536324a1dbd5f870472a9e6a185b6fe4d321c,2025-03-14T05:15:37.577000
|
||||
CVE-2024-11284,1,1,6d118d07dfa9d62e096a4ee0e802fceb271bda56f186b4f7ae13c28ca881d8fe,2025-03-14T05:15:40.463000
|
||||
CVE-2024-11285,1,1,ed0565e1a3c87ec26347b946da6d4fac7493cd79c52491fd48aa7b251b101940,2025-03-14T05:15:40.693000
|
||||
CVE-2024-11286,1,1,61a8018cdd03e2c3ffc561e827052580a0556eeb23cbb9decdd4f385bc7c54c1,2025-03-14T05:15:40.917000
|
||||
CVE-2024-11283,0,0,7361b5961afb6717cd1f613bfc1536324a1dbd5f870472a9e6a185b6fe4d321c,2025-03-14T05:15:37.577000
|
||||
CVE-2024-11284,0,0,6d118d07dfa9d62e096a4ee0e802fceb271bda56f186b4f7ae13c28ca881d8fe,2025-03-14T05:15:40.463000
|
||||
CVE-2024-11285,0,0,ed0565e1a3c87ec26347b946da6d4fac7493cd79c52491fd48aa7b251b101940,2025-03-14T05:15:40.693000
|
||||
CVE-2024-11286,0,0,61a8018cdd03e2c3ffc561e827052580a0556eeb23cbb9decdd4f385bc7c54c1,2025-03-14T05:15:40.917000
|
||||
CVE-2024-11287,0,0,34325f8b73601eba04369df077cf259142375500fa57730b8919568f65568e95,2025-02-24T19:01:49.687000
|
||||
CVE-2024-11288,0,0,dd8a3651b65598db1e821ae128b6008d07487cb5109df54c50f8ebe2ba545930,2025-02-11T02:15:33.440000
|
||||
CVE-2024-11289,0,0,1d2443a1a9242c04e29818ad13875ac1c58e80e7866f1501dec4b2d1a8559f61,2024-12-06T10:15:05.450000
|
||||
@ -247351,6 +247351,7 @@ CVE-2024-13318,0,0,234665f0f68f8330142422de1967c3be9edc8bd894792fcd281141ced7359
|
||||
CVE-2024-13319,0,0,7991c2dfb6aefea7f96696a61d541e78c477eeff53b34652065a2f9dce798e51,2025-01-24T21:06:34.310000
|
||||
CVE-2024-1332,0,0,43a2cb0465d1ed7fa77b51d32b9ef650ccc5cd8e8f972f53915014a8e37bc428,2024-11-21T08:50:21.220000
|
||||
CVE-2024-13320,0,0,af7335ff4cc17942ccca9ae284458fdb391d127da6e0b42295de78f44f601d8e,2025-03-07T07:15:22.963000
|
||||
CVE-2024-13321,1,1,546ce8f0ee2301a4b3c63cc9386282aec644a4f8d45ff254a45da29734a9c0a4,2025-03-14T08:15:11.447000
|
||||
CVE-2024-13323,0,0,efd40c86d011875eb32911cd9900428905ab90bbe91720def3e774b362e547ea,2025-01-14T06:15:15.480000
|
||||
CVE-2024-13324,0,0,e28b727b7b2e4ff67b104bb8829ddea65c155869cb67c2e17008296310ed866b,2025-01-13T21:15:12.053000
|
||||
CVE-2024-13325,0,0,1c94f1553295ec886b2176c4775fd77610c5cce71819e74a0cbadc1909108d7c,2025-02-04T19:15:30.377000
|
||||
@ -247403,7 +247404,7 @@ CVE-2024-13372,0,0,015d2d808909d66f440a14d43df20bdac81e725da4ef18a7b74b1dc0c8861
|
||||
CVE-2024-13373,0,0,9d44977237f116718720d9d00cfafd61d5daa8953cb39a9e131699dc8586025a,2025-03-01T07:15:10.770000
|
||||
CVE-2024-13374,0,0,3fc707056196afc6ff18dfb5640666c2f82725f50c06780da5f362e975810d58,2025-02-24T15:55:44.733000
|
||||
CVE-2024-13375,0,0,509bfd3a7c3f76e008f9bf54ba53750a8708a5d8eaf24ea17a33be3c80dc44d0,2025-01-18T09:15:07.120000
|
||||
CVE-2024-13376,1,1,13447b8c554d47dc67998eac21b2fe43626f0c6a3379b52a306bd5295a9bf534,2025-03-14T06:15:22.860000
|
||||
CVE-2024-13376,0,0,13447b8c554d47dc67998eac21b2fe43626f0c6a3379b52a306bd5295a9bf534,2025-03-14T06:15:22.860000
|
||||
CVE-2024-13377,0,0,a25050bd2bbff023d447f5d602b24decf0d9fe3f99412e4f96b0e55aac73332f,2025-01-17T10:15:07.240000
|
||||
CVE-2024-13378,0,0,7ea1d4cbb0f87859cae348c2da93d49f3902e773337fd492c684caf29392972d,2025-01-17T10:15:07.457000
|
||||
CVE-2024-13379,0,0,ebe77b8be5bdd70ba192f2850f9b10f6648b43e1ba162a550ae4527fcdc56169,2025-02-25T17:40:45.270000
|
||||
@ -247433,6 +247434,7 @@ CVE-2024-13403,0,0,f48009abe82bf9e29ae1b7a46417bc2967746c0b5702def33976d86176d1f
|
||||
CVE-2024-13404,0,0,c306a147bdbb783a3f22c9c4f49bd90e70cf49c0fec041c52ab9283c517d7448,2025-01-31T20:18:46.230000
|
||||
CVE-2024-13405,0,0,94146d9ff91e9f262c16e44af2895907f5ccb65ae44733b1b3451e628b70096f,2025-02-19T08:15:15.167000
|
||||
CVE-2024-13406,0,0,3a9e7471bf5857762896fdd475ef755ed514b70430254f571b98831752a93703,2025-01-24T21:20:06.183000
|
||||
CVE-2024-13407,1,1,4ab4f0e025140609de16dd1e5adf2f51fe35cfbb803b22be6d881b5fc6edf005,2025-03-14T08:15:11.620000
|
||||
CVE-2024-13408,0,0,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332fd0,2025-02-05T01:37:13.827000
|
||||
CVE-2024-13409,0,0,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000
|
||||
CVE-2024-1341,0,0,0f2620bc97b1f0cf788f06e44b2f32f0f1cdd0eb0e1ad8244b0c81b21bf65271,2025-02-26T15:14:42.477000
|
||||
@ -247809,6 +247811,7 @@ CVE-2024-13818,0,0,b34cef01cb19d809209555e3902d48d3c034a9e483326b43d02f63f2eb672
|
||||
CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000
|
||||
CVE-2024-13821,0,0,c4eb4e44a47cc783a97d83164c517f80c21576edac7bfce0a1b9d4ee6f34830b,2025-02-25T19:37:29.223000
|
||||
CVE-2024-13822,0,0,3edf451af12e328cb622d46a3fda862fd00644484907c17ca32254fbaff076b3,2025-02-24T12:15:11.193000
|
||||
CVE-2024-13824,1,1,d13b2e01527a627b360c0e49307596d37df9794698590ea5a5a23178bb33e3f7,2025-03-14T07:15:34.517000
|
||||
CVE-2024-13825,0,0,71493fd1d48d0d842d256208931e7dc7eb27b21d21ff8bccb7803a3f2c80deb6,2025-03-10T18:15:28.793000
|
||||
CVE-2024-13826,0,0,4bf4fca4bc827f8230936e1661739c4e4d10085199dc6f814c2ceba2fedee25a,2025-03-10T18:15:28.940000
|
||||
CVE-2024-13827,0,0,2f0ca45e1aed4689f4e667f770fa7c2c2b82b3b6b79c11996f3151fecdcc8143,2025-03-05T09:15:09.390000
|
||||
@ -247881,7 +247884,7 @@ CVE-2024-13908,0,0,1c73e211b4b58a00a46dae8694d4200f0e6f3fc60c1daa97b090d322baf4e
|
||||
CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
|
||||
CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000
|
||||
CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000
|
||||
CVE-2024-13913,1,1,982203190546063692eb2fde623ca80fd2479893721e008958e2b6b1acdf8c1a,2025-03-14T06:15:24.490000
|
||||
CVE-2024-13913,0,0,982203190546063692eb2fde623ca80fd2479893721e008958e2b6b1acdf8c1a,2025-03-14T06:15:24.490000
|
||||
CVE-2024-13918,0,0,dd3246088d0020e60eea2c9a743f405ac80e445444e7d8b0b4c1330698a621f4,2025-03-10T17:15:34.383000
|
||||
CVE-2024-13919,0,0,a449fd88163dd2c8f4cc42377a274723f7166a46202a509ead9b299715d86a4e,2025-03-10T17:15:34.540000
|
||||
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
||||
@ -277395,7 +277398,7 @@ CVE-2024-6651,0,0,a4781e28925027a5ab244f480cd88bd079c01f30be1e8b73b56732969688d9
|
||||
CVE-2024-6652,0,0,5652218e66653b40cb1f1758003b60ec7838cc9f220048781065b3fa7a0c3a50,2024-11-21T09:50:04.710000
|
||||
CVE-2024-6653,0,0,4108167d12666de6c39e5a237e3145b9962ab760426ea3cb98ff3f68cf88be0a,2025-03-03T16:25:24.627000
|
||||
CVE-2024-6654,0,0,f805b0729a3c46b8be827fad378328d1ed2614783c392da30990213f3c0be59b,2024-10-09T09:15:06.713000
|
||||
CVE-2024-6655,0,0,cd84fc0b2c91b2bd9ab26bb80467662001cb12ff5fa86634c3654ff0dea4aaa7,2024-11-21T09:50:05.080000
|
||||
CVE-2024-6655,0,1,a096cd32ad66dd019b17497ca47f3e6438e3f9fba7bfaaa2ec44d6ba12a507c1,2025-03-14T08:15:11.803000
|
||||
CVE-2024-6656,0,0,dd8d93127fb59afa87e8332076ccbf05d54c72d83e0b40e7ed5f4d6dde708cff,2024-09-19T13:05:44.953000
|
||||
CVE-2024-6657,0,0,f163680fee98ee1841251ba0750f011cc9e392ae0810a20ee3d4f17874de7661,2024-11-04T15:15:24.440000
|
||||
CVE-2024-6658,0,0,f63dc2aecc9b014ab81982cf92e0930d84a67fedd75e8cb612a8e64258ecc1f3,2024-09-23T20:15:05.560000
|
||||
@ -280854,10 +280857,10 @@ CVE-2025-0947,0,0,54992aef26727e095f19651dace58e0751a58da1d32b3005bb44e21372f29d
|
||||
CVE-2025-0948,0,0,3906e65d2be079846a7fc328fa3e08005b25ee0a1547c5d7622270f9efb6c849,2025-02-03T18:15:41.580000
|
||||
CVE-2025-0949,0,0,0738bb2b66672fae5fd020ba0f9a70fb106ebc19e1971dce25f2e18c30dd0c12,2025-02-03T18:15:41.727000
|
||||
CVE-2025-0950,0,0,7903835c96a972c16989f2cc1ccaf15a7fc2f203d2ad321ca6bcf09943e4f0e2,2025-02-03T18:15:41.847000
|
||||
CVE-2025-0952,1,1,6c3228c9c9f9f122e4a6382a097401f4b233c482b4603d9863e65505c235d857,2025-03-14T06:15:24.683000
|
||||
CVE-2025-0952,0,0,6c3228c9c9f9f122e4a6382a097401f4b233c482b4603d9863e65505c235d857,2025-03-14T06:15:24.683000
|
||||
CVE-2025-0953,0,0,13d291258e4c30c78d80b709e158097d095b4eb5e4d1fb760e2f7e371f933aaf,2025-03-05T21:28:15.293000
|
||||
CVE-2025-0954,0,0,81ac52e2c35d2d0384ad093852f1aae6a07415f826817f32adad7fbd23a98566,2025-03-05T10:15:19.130000
|
||||
CVE-2025-0955,1,1,a8ce44388d3533d0aac55865f4f1b883c05c46ecc4c0cbb210430e9f66a48ad7,2025-03-14T05:15:41.760000
|
||||
CVE-2025-0955,0,0,a8ce44388d3533d0aac55865f4f1b883c05c46ecc4c0cbb210430e9f66a48ad7,2025-03-14T05:15:41.760000
|
||||
CVE-2025-0956,0,0,f70f22dd7aad885845100de1c08ba9be5fe6fcac9e909ba285c16ccd3c4dc18d,2025-03-05T10:15:19.480000
|
||||
CVE-2025-0957,0,0,495f2d5b6e1d536933c2ca0f5f42b3b064381124c6d04bc27597b46752e07780,2025-02-22T14:15:29.710000
|
||||
CVE-2025-0958,0,0,6a8abacfef7e74902962072738d5b34e6ea938b59880ac4107bc2c79fd800440,2025-03-05T16:39:32.083000
|
||||
@ -281069,7 +281072,7 @@ CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc4
|
||||
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
|
||||
CVE-2025-1282,0,0,124879e93e6bb778f215176375d975ac746201c3f19a3ffa344b76a1a781600c,2025-03-11T16:08:00.790000
|
||||
CVE-2025-1283,0,0,4175667403ef8488e39c5e8c2dd94a274e533a8ac41a5d588031878a218b6b1e,2025-03-04T20:59:05.417000
|
||||
CVE-2025-1285,1,1,978a0efe88885b4cbd8d81a3802fbeec4ea7a149d66abbaabde90aa3d535eacf,2025-03-14T05:15:41.977000
|
||||
CVE-2025-1285,0,0,978a0efe88885b4cbd8d81a3802fbeec4ea7a149d66abbaabde90aa3d535eacf,2025-03-14T05:15:41.977000
|
||||
CVE-2025-1287,0,0,37b8d6e5bb02fec4db4fe6ebb7f78e649494f82b2a965d784db2bbf955be9dfb,2025-03-08T09:15:31.590000
|
||||
CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000
|
||||
CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000
|
||||
@ -281194,8 +281197,9 @@ CVE-2025-1511,0,0,b1b588667a5e649574877e42702a5753176a9b5bb63efe10313a554d2504ba
|
||||
CVE-2025-1513,0,0,3e83881e26d14d0e87001b4c3ba5dc79f7552c69b46afe7ea910cd8458998dde,2025-03-06T17:52:55.370000
|
||||
CVE-2025-1515,0,0,6745568ce7f500454ddf7cbbbf3fe5b80633db8da56aea69750d807282006f92,2025-03-05T10:15:19.850000
|
||||
CVE-2025-1517,0,0,2fa9cdc1e0143bd8e9da49275eaa45f04a63792c53ac8ebc4aa9796acfc194c9,2025-02-26T13:15:41.193000
|
||||
CVE-2025-1526,1,1,d9874dedce0f2ba6a6226af765691493f6d2ebdbd14f08c75088117527d07481,2025-03-14T08:15:12.120000
|
||||
CVE-2025-1527,0,0,8a93ae9d546da00b62910a2f9d137a31ff943086ede2e40a6b788d063ddbf81c,2025-03-12T12:15:14.473000
|
||||
CVE-2025-1528,1,1,2e67df38b65f44722b54fac5c2d2ae415bc3662a344dd77ad0e461c4327f6eb1,2025-03-14T05:15:42.170000
|
||||
CVE-2025-1528,0,0,2e67df38b65f44722b54fac5c2d2ae415bc3662a344dd77ad0e461c4327f6eb1,2025-03-14T05:15:42.170000
|
||||
CVE-2025-1535,0,0,6080c0c0968f3ab3c5259d9031c93f6d6c93dcaef1c71aa8b7e3b62645a6a84e,2025-02-21T12:15:30.877000
|
||||
CVE-2025-1536,0,0,13d2bb79966b022c194b53190d029539a3b9db0220df5fb889249e7f79d2fadc,2025-02-21T15:15:12.270000
|
||||
CVE-2025-1537,0,0,861630e1b0372f1f37852ff12813e7a5ac2fa6d179d082cf3113227aa130bf0c,2025-02-21T15:15:12.460000
|
||||
@ -281321,7 +281325,7 @@ CVE-2025-1751,0,0,abfc84328e2199f31a54a26b50388e665ca54aab7fd0cce8bda2194b6d8236
|
||||
CVE-2025-1755,0,0,09476b6d542bfcc927e067fe8e3ce0d3ca1fbe0a9d5ffac658df7f448d43f354,2025-02-27T16:15:39.137000
|
||||
CVE-2025-1756,0,0,787bba2bf34abbaae222d1a9edb902cd4b5b03484def1773bc6176dae0327cd2,2025-02-27T16:15:39.287000
|
||||
CVE-2025-1757,0,0,dc2ff923c8c3145193c6561db00b356fb8535b7d409d9e1ae9c89572d47684fe,2025-03-06T20:21:36.547000
|
||||
CVE-2025-1764,1,1,a0772d13ae7c80ed5a68a77c5e9e29582c4c3cb8221fdf31ef9438995646ffb7,2025-03-14T06:15:24.860000
|
||||
CVE-2025-1764,0,0,a0772d13ae7c80ed5a68a77c5e9e29582c4c3cb8221fdf31ef9438995646ffb7,2025-03-14T06:15:24.860000
|
||||
CVE-2025-1767,0,0,2d7a67a49e2d8224d71f3f81db0cee88468897d8d69262d33481730c6124ca91,2025-03-13T21:15:43.127000
|
||||
CVE-2025-1768,0,0,c05b89cadd612720776009e6e0d5cd82f5ad65495c19a7bd41a71ec158195a94,2025-03-07T11:15:15.653000
|
||||
CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000
|
||||
@ -281584,7 +281588,7 @@ CVE-2025-2051,0,0,20b55bb39ea3b7aa97a8d3fb6e3ceb82d4c28a82e34b83316b328be5641117
|
||||
CVE-2025-2052,0,0,566c8b891ad98044cf1ebec9ad90f909f9dc50c34eba6b99806cf450bf0c0077,2025-03-07T01:15:13.173000
|
||||
CVE-2025-2053,0,0,907740e769a477f285f8f478f320bf99234fb5fa0ab7900774540384eedc6bb4,2025-03-07T01:15:13.373000
|
||||
CVE-2025-2054,0,0,ab2a594941b94086fffcf5b37cb53c9b330e51d0f114b5825d0c1aa68d4f0782,2025-03-07T02:15:38.060000
|
||||
CVE-2025-2056,1,1,a45cb5faec73ceb0907788d6601d60a42a6b796dbef4e0f9f0f371e41d843599,2025-03-14T05:15:42.523000
|
||||
CVE-2025-2056,0,0,a45cb5faec73ceb0907788d6601d60a42a6b796dbef4e0f9f0f371e41d843599,2025-03-14T05:15:42.523000
|
||||
CVE-2025-2057,0,0,d7d92d6c13bb3b056a662c7a1158142789edd7c088582f23e801cdd24b69629a,2025-03-07T02:15:38.237000
|
||||
CVE-2025-2058,0,0,b8c0ed4c6c9a30dd784843b19947dfc086e37f9bd6154d2b78254e871b32183f,2025-03-07T02:15:38.413000
|
||||
CVE-2025-2059,0,0,5b6795d03e7b228aaf929737773f90cae866266639b998d7652a8491cad7d1dc,2025-03-07T02:15:38.600000
|
||||
@ -281696,7 +281700,7 @@ CVE-2025-2094,0,0,dd3722c7d873584c1bcf5ee76e4241bd89a98d004b5cffc0e9c748e218c083
|
||||
CVE-2025-2095,0,0,a3dfeac2273a29e9d569952f61ac273a484328c8ec1f4d0ba33ca66ad911ad03,2025-03-07T23:15:16.010000
|
||||
CVE-2025-2096,0,0,096c4c8099150287c2f34ad390aeed2c4059a697160d0641900caf1a5bf991ce,2025-03-07T23:15:16.137000
|
||||
CVE-2025-2097,0,0,3811d560cd910c2df494c5d4404118f3eb75c9be64144887386fb0328a407e37,2025-03-10T18:15:30.680000
|
||||
CVE-2025-2103,1,1,3b023b812e0f92fc53b3ecfe0dcea0ad9a688d279085c6883b1c9379ad226ff1,2025-03-14T06:15:25.057000
|
||||
CVE-2025-2103,0,0,3b023b812e0f92fc53b3ecfe0dcea0ad9a688d279085c6883b1c9379ad226ff1,2025-03-14T06:15:25.057000
|
||||
CVE-2025-2104,0,0,c9c6df034f61bd4a99ed7e78e660c734daac9721b7b6a8eaf9c4465eecd8b823,2025-03-13T05:15:28.303000
|
||||
CVE-2025-2106,0,0,143e4c5dbe02a3747cf463a093e6e5a5cf905ac42e2ced475942abac66b0049e,2025-03-13T02:15:13.097000
|
||||
CVE-2025-2107,0,0,6d7a52b701e101c90bda727cc98862452375f64ee7eb80539bc204426a2ec437,2025-03-13T02:15:13.250000
|
||||
@ -282154,7 +282158,7 @@ CVE-2025-21656,0,0,a701e9e2df732a25c44be693e4bcc732f0353202bde61b2316a6229f867fa
|
||||
CVE-2025-21657,0,0,1965d9c3d1118ed3d2f0e817295e796ed532b053adb84b7658e4c043ba09b4dd,2025-01-21T13:15:09.340000
|
||||
CVE-2025-21658,0,0,49f4fb1da0e36dec3735688e008c1d1b6e11cd524605dedd795d9dba62770702,2025-01-22T23:02:59.383000
|
||||
CVE-2025-21659,0,0,c34fae85ac5791c6acdfb8c055236ca0db3c10e1f998433ca0b29112c1552ff1,2025-01-21T13:15:09.540000
|
||||
CVE-2025-2166,1,1,6e45545000e1b6b04b294b0ae4f0ab313379a10e458b4c0663c9f560b02e0321,2025-03-14T05:15:42.723000
|
||||
CVE-2025-2166,0,0,6e45545000e1b6b04b294b0ae4f0ab313379a10e458b4c0663c9f560b02e0321,2025-03-14T05:15:42.723000
|
||||
CVE-2025-21660,0,0,62f40623237245457c3e1282812660b56ee49a4868b504432c0ca95a3b8af3bc,2025-01-21T13:15:09.643000
|
||||
CVE-2025-21661,0,0,35570a826135021930919d68ecfb81fa996d5609fcae3470eeb02a50f2465a44,2025-02-28T18:59:45.207000
|
||||
CVE-2025-21662,0,0,a5b1a0271d3432d1de3ee1bda0755a5b6602cc0585dec57fd031d28aaec3d7e4,2025-01-21T13:15:09.847000
|
||||
@ -282420,6 +282424,7 @@ CVE-2025-22206,0,0,094330103ef881a5c8f14e940f719b75f142ae139c1345e47cbc22b02438b
|
||||
CVE-2025-22207,0,0,227e1dd024a03046d5aad9d73b27b2d6f23b1761e7c90a962fa1e9e855255c16,2025-02-18T16:15:20.467000
|
||||
CVE-2025-22208,0,0,4da3f6139c6e9c40f33488344972941101e9c73e7b48ee2d6c4ba83ac4c0595f,2025-02-21T13:15:11.400000
|
||||
CVE-2025-22209,0,0,6259f847301f1e17e539d0555807865e6f3eb75df7ef5140d83a13597977cfcd,2025-02-21T13:15:11.553000
|
||||
CVE-2025-2221,1,1,84a120745c62005f70ab627664183408236bd719ddbf6e383e84400d4d326472,2025-03-14T07:15:38.477000
|
||||
CVE-2025-22210,0,0,abd3877e40c6e9332d48e0a8769aa45708e26e2efdd35254a970ae6f9ad61b2e,2025-02-25T22:15:15.060000
|
||||
CVE-2025-22211,0,0,701fcba8693972a604c82eb97a96bbdace18ebf7fb6001a7afd61c15a8dd5788,2025-03-03T16:15:39.843000
|
||||
CVE-2025-22212,0,0,587f2bcb35f24add109a85302f7771cf3c9f55817e236b14182bc2f7d7261bea,2025-03-05T16:15:37.643000
|
||||
@ -282854,7 +282859,7 @@ CVE-2025-22870,0,0,d29b93c9805eca35e2b06772d602aab8a0115de9a56383949d29f6eb50d0a
|
||||
CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000
|
||||
CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000
|
||||
CVE-2025-22888,0,0,83c67ff923e9645ec5fafd719e12957b03331dea9b9bd08e509c66897fdc51d1,2025-02-19T06:15:21.687000
|
||||
CVE-2025-2289,1,1,a0d3f1c0e099ef96760fa262cff57e9d850b41d51a6ea308e92b7da1739f1b91,2025-03-14T06:15:25.230000
|
||||
CVE-2025-2289,0,0,a0d3f1c0e099ef96760fa262cff57e9d850b41d51a6ea308e92b7da1739f1b91,2025-03-14T06:15:25.230000
|
||||
CVE-2025-22890,0,0,8dd6ffe45f0151dcb8b41a48dac74b1e668a5294c2f1614982860358b9b03cd6,2025-02-06T07:15:17.113000
|
||||
CVE-2025-22891,0,0,5058a67448259ac9abdaa428b056ef85a9f11123cf1683cf0699d5426be467a6,2025-02-05T18:15:31.190000
|
||||
CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29a1c,2025-02-06T08:15:30.027000
|
||||
@ -284967,7 +284972,7 @@ CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165de
|
||||
CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000
|
||||
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
|
||||
CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000
|
||||
CVE-2025-27363,0,1,5d7226be659cf0a5d75c9183710cee7e9d31f4aae92e2da6b82d7565ed062834,2025-03-14T05:15:42.377000
|
||||
CVE-2025-27363,0,0,5d7226be659cf0a5d75c9183710cee7e9d31f4aae92e2da6b82d7565ed062834,2025-03-14T05:15:42.377000
|
||||
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
|
||||
CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000
|
||||
CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user