Auto-Update: 2025-01-03T03:00:21.535798+00:00

This commit is contained in:
cad-safe-bot 2025-01-03 03:03:48 +00:00
parent 6ff8ab5324
commit 0a833705e6
13 changed files with 699 additions and 15 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23227",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-14T18:15:10.303",
"lastModified": "2024-12-19T02:00:02.193",
"lastModified": "2025-01-03T02:00:01.953",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -87,7 +87,7 @@
"cisaExploitAdd": "2024-12-18",
"cisaActionDue": "2025-01-08",
"cisaRequiredAction": "The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.",
"cisaVulnerabilityName": "NUUO NVRmini 2 Devices Missing Authentication Vulnerability ",
"cisaVulnerabilityName": "NUUO NVRmini2 Devices Missing Authentication Vulnerability ",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-43077",
"sourceIdentifier": "security@android.com",
"published": "2025-01-03T01:15:07.483",
"lastModified": "2025-01-03T01:15:07.483",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In DevmemValidateFlags of devicemem_server.c , there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2024-12-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-43097",
"sourceIdentifier": "security@android.com",
"published": "2025-01-03T01:15:07.590",
"lastModified": "2025-01-03T01:15:07.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In resizeToAtLeast of SkRegion.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/external/skia/+/8d355fe1d0795fc30b84194b87563f75c6f8f2a7",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-12-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-43762",
"sourceIdentifier": "security@android.com",
"published": "2025-01-03T01:15:07.680",
"lastModified": "2025-01-03T01:15:07.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple locations, there is a possible way to avoid unbinding of a service from the system due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/ae43ac7f3d3d5112b0f54b5315a15b08208acf9c",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-12-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-43764",
"sourceIdentifier": "security@android.com",
"published": "2025-01-03T01:15:07.760",
"lastModified": "2025-01-03T01:15:07.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In onPrimaryClipChanged of ClipboardListener.java, there is a possible way to partially bypass lock screen. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/70eb75df7d342429c3ee225feb7c011df727442f",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-12-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-43767",
"sourceIdentifier": "security@android.com",
"published": "2025-01-03T01:15:07.847",
"lastModified": "2025-01-03T01:15:07.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In prepare_to_draw_into_mask of SkBlurMaskFilterImpl.cpp, there is a possible heap overflow due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/external/skia/+/796c2040f641bb287dba66c9823ce45e9f8b5807",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-12-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-43768",
"sourceIdentifier": "security@android.com",
"published": "2025-01-03T01:15:07.923",
"lastModified": "2025-01-03T01:15:07.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In skia_alloc_func of SkDeflate.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/external/skia/+/b5543cb8c6b95623743016055220378efe73eb93",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-12-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-43769",
"sourceIdentifier": "security@android.com",
"published": "2025-01-03T01:15:08.003",
"lastModified": "2025-01-03T01:15:08.003",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In isPackageDeviceAdmin of PackageManagerService.java, there is a possible edge case which could prevent the uninstallation of CloudDpc due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/619ffc299bf33566ba6daee8301ee0fc96e015f4",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-12-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,175 @@
{
"id": "CVE-2025-0174",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-03T01:15:08.100",
"lastModified": "2025-01-03T02:15:07.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been classified as critical. This affects an unknown part of the file /user/search_result2.php of the component Parameter Handler. The manipulation of the argument search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/Masamuneee/ca3f96ac0ec34bb7c1dd4bfd180f11bb",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290103",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290103",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.473330",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,175 @@
{
"id": "CVE-2025-0175",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-03T01:15:08.263",
"lastModified": "2025-01-03T02:15:07.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Online Shop 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /view.php. The manipulation of the argument name/details leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/th4s1s/fc65dafa7237cc66a18ef6005075c31b",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290104",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290104",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.473333",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0176",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-03T02:15:07.870",
"lastModified": "2025-01-03T02:15:07.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /user/add_cart.php. The manipulation of the argument id/qty leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/Masamuneee/9c539b89dad40033a5037b744e394ae0",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290105",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290105",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.473347",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-03T00:55:28.776612+00:00
2025-01-03T03:00:21.535798+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-02T23:06:29.123000+00:00
2025-01-03T02:15:07.870000+00:00
```
### Last Data Feed Release
@ -27,28 +27,36 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-01-02T01:00:10.078674+00:00
2025-01-03T01:00:04.355427+00:00
```
### Total Number of included CVEs
```plain
275618
275628
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `10`
- [CVE-2024-43077](CVE-2024/CVE-2024-430xx/CVE-2024-43077.json) (`2025-01-03T01:15:07.483`)
- [CVE-2024-43097](CVE-2024/CVE-2024-430xx/CVE-2024-43097.json) (`2025-01-03T01:15:07.590`)
- [CVE-2024-43762](CVE-2024/CVE-2024-437xx/CVE-2024-43762.json) (`2025-01-03T01:15:07.680`)
- [CVE-2024-43764](CVE-2024/CVE-2024-437xx/CVE-2024-43764.json) (`2025-01-03T01:15:07.760`)
- [CVE-2024-43767](CVE-2024/CVE-2024-437xx/CVE-2024-43767.json) (`2025-01-03T01:15:07.847`)
- [CVE-2024-43768](CVE-2024/CVE-2024-437xx/CVE-2024-43768.json) (`2025-01-03T01:15:07.923`)
- [CVE-2024-43769](CVE-2024/CVE-2024-437xx/CVE-2024-43769.json) (`2025-01-03T01:15:08.003`)
- [CVE-2025-0174](CVE-2025/CVE-2025-01xx/CVE-2025-0174.json) (`2025-01-03T01:15:08.100`)
- [CVE-2025-0175](CVE-2025/CVE-2025-01xx/CVE-2025-0175.json) (`2025-01-03T01:15:08.263`)
- [CVE-2025-0176](CVE-2025/CVE-2025-01xx/CVE-2025-0176.json) (`2025-01-03T02:15:07.870`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `1`
- [CVE-2024-27923](CVE-2024/CVE-2024-279xx/CVE-2024-27923.json) (`2025-01-02T23:02:44.890`)
- [CVE-2024-28119](CVE-2024/CVE-2024-281xx/CVE-2024-28119.json) (`2025-01-02T23:00:20.203`)
- [CVE-2024-34082](CVE-2024/CVE-2024-340xx/CVE-2024-34082.json) (`2025-01-02T23:06:29.123`)
- [CVE-2022-23227](CVE-2022/CVE-2022-232xx/CVE-2022-23227.json) (`2025-01-03T02:00:01.953`)
## Download and Usage

View File

@ -192785,7 +192785,7 @@ CVE-2022-23220,0,0,587bdddc175569ce15f6940da02ed26c837c2a2634f31dc1b11143496f1ef
CVE-2022-23221,0,0,5d57b4180b48987f7f4bfea9bdf7f6d1d256fcf67bfadd1791154e8dad339a61,2024-11-21T06:48:13.213000
CVE-2022-23222,0,0,fbcfcb02bfa7b24347fade63f729949c1d8bf5ab948cbe460e536a4e6f01d068,2024-11-21T06:48:13.447000
CVE-2022-23223,0,0,25ae342ae40f88bf1945d23f9f75dfe8fce27795096bf371c09a001e1246210b,2024-11-21T06:48:13.633000
CVE-2022-23227,0,0,766e03533ad1f511938fe3b1d5e3086e97ab4e4a2b97f736cc8cdb2518173d52,2024-12-19T02:00:02.193000
CVE-2022-23227,0,1,351b3ed1866a1ffc1d54c35001ab133fc6249c37b1bf9e4c035c96651f05ff7a,2025-01-03T02:00:01.953000
CVE-2022-23228,0,0,4a44e8524a7adb66befd4b46314168d27b1bea7184eb2236a14910edb3b3678f,2024-11-21T06:48:13.933000
CVE-2022-2323,0,0,42b9bd1c8aca4c05c89da17a9dd6087ee600d18c2ac835582ed3b37915420177,2024-11-21T07:00:46.103000
CVE-2022-23232,0,0,dcff8a87ed3c8132e455f844254418de8e1ef002dbc4192a1cbdc4832e1bee81,2024-11-21T06:48:14.080000
@ -252261,7 +252261,7 @@ CVE-2024-2792,0,0,7e6e0e5c11de921a78433556096218f512124c326f028d684b17df336bbb44
CVE-2024-27920,0,0,7529506d89ae657bc1d09fec49e45bdabda75fcad10b5ccb28a8f81dd2d2d6d1,2024-11-21T09:05:25.550000
CVE-2024-27921,0,0,e263e05a3a945f73f889147063226d993430d9593728cdf6066076a5790a32c9,2025-01-02T22:57:17.910000
CVE-2024-27922,0,0,d2a4f4646149c83b52c024e6f8f646d184549b341a5ef0916ae728a38a105083,2024-11-21T09:05:25.837000
CVE-2024-27923,0,1,f66988b430b7f01835f17b10b666ac1e0b710ac0ade2d98b0a14eb0f27a73ee6,2025-01-02T23:02:44.890000
CVE-2024-27923,0,0,f66988b430b7f01835f17b10b666ac1e0b710ac0ade2d98b0a14eb0f27a73ee6,2025-01-02T23:02:44.890000
CVE-2024-27926,0,0,a5cc0212ccfedfa08adb595fc3e705725d544592dda1a9e4b89c76a146271a25,2024-11-21T09:05:26.097000
CVE-2024-27927,0,0,a452b1cf7dafd2bef249a2f01cb521b04ba244564b2fb3675d7c7bbdabb96c76,2024-11-21T09:05:26.230000
CVE-2024-27929,0,0,55be7d5487612f331a20293a9178c49765e1a92dcb14c57365dae12024c39afb,2024-11-21T09:05:26.350000
@ -252447,7 +252447,7 @@ CVE-2024-28115,0,0,22c183804756e395faece574c368d4cae136c9c5ac642ca5fa899dd4c72bd
CVE-2024-28116,0,0,06ab2acc19d3b1b085641d8b752eae550641fce1928137c9f5fc8bf2298f4ec1,2025-01-02T22:57:51.510000
CVE-2024-28117,0,0,25a818d5b218e308783785ed799f95754af9a77920e6452a88595579929a615b,2025-01-02T22:58:56.197000
CVE-2024-28118,0,0,8a17fe4656f03151b71f31ade8b3e0ea1b4b854e460eb59f1fa702e29a157fd6,2025-01-02T22:59:47.963000
CVE-2024-28119,0,1,c8ac53973d5fba3d8aeba4ef26061df88c4485e6766013a46858768ef5a83340,2025-01-02T23:00:20.203000
CVE-2024-28119,0,0,c8ac53973d5fba3d8aeba4ef26061df88c4485e6766013a46858768ef5a83340,2025-01-02T23:00:20.203000
CVE-2024-2812,0,0,8b6d30205bee6181242e8d31f403e11341462f2307faa4f20deb252027c2cc74,2024-11-21T09:10:34.993000
CVE-2024-28120,0,0,f67a74ade784860bc36724d086a9a9d5dcadc390fc95662e9246160ff40605b4,2024-11-21T09:05:51.580000
CVE-2024-28121,0,0,115a1c99aefa939b04cce33a32ba74eeb00b430abe11ed901a01a0cbd0e0e021,2024-11-21T09:05:51.707000
@ -256800,7 +256800,7 @@ CVE-2024-34079,0,0,c9aa484cc01d1a9e01f9cd10e818e4cee344da9ebd23bfda12807cf0f21f3
CVE-2024-3408,0,0,29872d3e65afbe1ecf9c7c874018aeba31fa57b43cf60907dab2721d8b5990b8,2024-11-21T09:29:32.273000
CVE-2024-34080,0,0,a5ef10c627bc0473f1fc9cd26a53841c25dc22bbfb3774d349ac875972752f84,2024-11-21T09:18:02.957000
CVE-2024-34081,0,0,8a18537575eea0713231caa9c4263cd37531e7c621a6c62c390eecb017212318,2024-11-21T09:18:03.090000
CVE-2024-34082,0,1,36c8c189b285b5f8508fe3147d7a2cebea9f08e37c8431fe406a0bebc15eefd7,2025-01-02T23:06:29.123000
CVE-2024-34082,0,0,36c8c189b285b5f8508fe3147d7a2cebea9f08e37c8431fe406a0bebc15eefd7,2025-01-02T23:06:29.123000
CVE-2024-34083,0,0,1e08b8cd0a0c82cc0ee55cf3dfb5c71fbf9c3a2b42ac088fff3d0e17c3e3ea6c,2024-11-21T09:18:03.363000
CVE-2024-34084,0,0,6d5b2c4cc74a8a272805777a26892ffa63284ae7c193c1aa4167ffec5688b5cf,2024-11-21T09:18:03.513000
CVE-2024-34085,0,0,31b5f1d8778cf0c791642cbcb9dac301680a6b89a7e3c57182e8b1e18eb53626,2024-11-21T09:18:03.637000
@ -263379,6 +263379,7 @@ CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b
CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000
CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000
CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000
CVE-2024-43077,1,1,3824d6658d71cb3a8a50c8ef70c7588c6aab2b5684bc2a9f597ee73290d5cc1a,2025-01-03T01:15:07.483000
CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000
CVE-2024-43080,0,0,cbdb75ee710ea05bfcc86299182b203ee944c795380cbed1c1ab4a87225ab537,2024-12-17T19:10:30.250000
CVE-2024-43081,0,0,8bed9f6165013dc4c983bb0dd11cd660d0d155d067474bbffbb46b60a90bbdd1,2024-12-17T18:56:04.590000
@ -263394,6 +263395,7 @@ CVE-2024-4309,0,0,cf6d99d40224d9ea0048df61a24b0034afd2baf32b8f2402feb311af37805c
CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1fbf,2024-12-17T20:43:24.893000
CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000
CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000
CVE-2024-43097,1,1,3d0c1a966f33fb45834a067b603622ec944dedd57e43117f0b609fbd79010284,2025-01-03T01:15:07.590000
CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec5f9,2024-09-14T11:47:14.677000
CVE-2024-4310,0,0,dd5cf151edf7d2cd055572eb00e97620ec8e8024a5783f50f0a1b0ae59db4b35,2024-11-21T09:42:35.913000
CVE-2024-43102,0,0,b6aa6225bd8ed19c424a914e97c361ac2900c128d3e8c90742dfa8fa3a85a13f,2024-11-21T09:35:00.713000
@ -264001,6 +264003,11 @@ CVE-2024-43758,0,0,0f26a442661cf8c474cf15fed83c27096c39a987496f8728b4b680b80eec8
CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b8941c2,2024-09-13T17:13:35.427000
CVE-2024-4376,0,0,54ab76d9fd6742e25c4ca941b8688277ccbde54c93ac0337a04e833897b0d9f6,2024-11-21T09:42:43.643000
CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e04019cc,2024-09-13T17:00:30.440000
CVE-2024-43762,1,1,1753712eb57291969679cd25220cdcc7e3c2bf0c2dc836955425c402477d3e7d,2025-01-03T01:15:07.680000
CVE-2024-43764,1,1,ee896735e327e9b14d9d72b48ea40c7ab76dc28a7d8a0a63b9d92212b5c872b2,2025-01-03T01:15:07.760000
CVE-2024-43767,1,1,544837330e934fbd5665893a012e6ea136cc65551faeb81d27d6db256649d51f,2025-01-03T01:15:07.847000
CVE-2024-43768,1,1,2a680b4666dbfb8855cfe115cfa668526d1408b554a74aebafb074e52b898e4c,2025-01-03T01:15:07.923000
CVE-2024-43769,1,1,58a508b817a2419a010d84131e35f15b9d1d2e8f44fce65b53ae8e870eccbd1e,2025-01-03T01:15:08.003000
CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000
CVE-2024-43772,0,0,63f7dc411da3ded034b2d2ffb4e0bad8e95b60c318b3d1e644db504bb5e5c6e9,2024-09-04T12:11:13.073000
CVE-2024-43773,0,0,826b7c5200d245cfd0c67f5d1708290c5274b8ea410b663d2bc4e8259de07c4c,2024-09-04T12:26:08.270000
@ -275616,4 +275623,7 @@ CVE-2025-0168,0,0,fde79a3f95dbae8045d22c8e981cbdd84ae894d89db499f6872ba4edd67b57
CVE-2025-0171,0,0,9df660d0bd85fd30ba70144d79c054c55f685c42b30cd4d4685cbaa76a79261d,2025-01-02T18:15:21.173000
CVE-2025-0172,0,0,52d8e9b23781f72db93517107fba3a4dacce2fa0b9c1933202d67ec972e26c9d,2025-01-02T18:15:21.327000
CVE-2025-0173,0,0,7e3fc99444e621658643e55cf01044b7a151c6ec6043aaa26a942f36cc25b7c0,2025-01-02T18:15:21.630000
CVE-2025-0174,1,1,9d66653b35dce22a5e13bcd4d218f8b859e23f7e6e6c85f7fc84bbc507e489f5,2025-01-03T02:15:07.480000
CVE-2025-0175,1,1,ac95c9697b04739d886090fb337a8da173389b48ecd5972d04d24955935380d8,2025-01-03T02:15:07.680000
CVE-2025-0176,1,1,2a22ffa81ac729c3387660dd6a8fe5bfa9ef0ae8a6a4a9c7a653c15c3464b03c,2025-01-03T02:15:07.870000
CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000

Can't render this file because it is too large.