mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2025-03-05T13:00:19.691050+00:00
This commit is contained in:
parent
264604f1e2
commit
22fa98c696
60
CVE-2024/CVE-2024-111xx/CVE-2024-11153.json
Normal file
60
CVE-2024/CVE-2024-111xx/CVE-2024-11153.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11153",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-05T12:15:33.287",
|
||||
"lastModified": "2025-03-05T12:15:33.287",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Content Control \u2013 The Ultimate Content Restriction Plugin! Restrict Content, Create Conditional Blocks & More plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.5.0 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as logged-in users."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/content-control/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bbe51f96-82b2-4091-acd8-a8131a47eb07?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-119xx/CVE-2024-11951.json
Normal file
60
CVE-2024/CVE-2024-119xx/CVE-2024-11951.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11951",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-05T12:15:34.510",
|
||||
"lastModified": "2025-03-05T12:15:34.510",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Homey Login Register plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.4.0. This is due to the plugin allowing users who are registering new accounts to set their own role. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/homey-booking-wordpress-theme/23338013",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/67c4066f-b8bc-4cd0-ae47-844af23e003f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-122xx/CVE-2024-12281.json
Normal file
60
CVE-2024/CVE-2024-122xx/CVE-2024-12281.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-12281",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-05T12:15:34.657",
|
||||
"lastModified": "2025-03-05T12:15:34.657",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Homey theme for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.4.2. This is due to the plugin allowing users who are registering new accounts to set their own role. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the Editor or Shop Manager role."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/homey-booking-wordpress-theme/23338013",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3b93c33c-4ab1-48a2-b84d-3cb38ccea829?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-126xx/CVE-2024-12650.json
Normal file
56
CVE-2024/CVE-2024-126xx/CVE-2024-12650.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-12650",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2025-03-05T12:15:34.803",
|
||||
"lastModified": "2025-03-05T12:15:34.803",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An attacker with low privileges can manipulate the requested memory size, causing the application to use an invalid memory area. This could lead to a crash of the application but it does not affected other applications."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-252"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.vde.com/en/advisories/VDE-2025-004",
|
||||
"source": "info@cert.vde.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-134xx/CVE-2024-13423.json
Normal file
64
CVE-2024/CVE-2024-134xx/CVE-2024-13423.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-13423",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-05T12:15:34.960",
|
||||
"lastModified": "2025-03-05T12:15:34.960",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Sparkling theme for WordPress is vulnerable to unauthorized plugin activation/deactivation due to a missing capability check on the 'sparkling_activate_plugin' and 'sparkling_deactivate_plugin' functions in versions up to, and including, 2.4.9. This makes it possible for unauthenticated attackers to activate/deactivate arbitrary plugins."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/browser/sparkling/2.4.9/inc/welcome-screen/class-sparkling-welcome.php#L69",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/browser/sparkling/2.4.9/inc/welcome-screen/class-sparkling-welcome.php#L82",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1fa8dba0-0227-428d-a6de-c4247c40e481?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-134xx/CVE-2024-13471.json
Normal file
60
CVE-2024/CVE-2024-134xx/CVE-2024-13471.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13471",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-05T12:15:35.110",
|
||||
"lastModified": "2025-03-05T12:15:35.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The DesignThemes Core Features plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the dt_process_imported_file function in all versions up to, and including, 4.7. This makes it possible for unauthenticated attackers to read arbitrary files on the underlying operating system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/lms-learning-management-system-education-lms-wordpress-theme/7867581",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1729d0de-1f5f-4349-b592-5841d01ed33a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-14xx/CVE-2025-1463.json
Normal file
72
CVE-2025/CVE-2025-14xx/CVE-2025-1463.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-1463",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-05T12:15:35.270",
|
||||
"lastModified": "2025-03-05T12:15:35.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Spreadsheet Integration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.2. This is due to improper nonce validation within the class-wpgsi-show.php script. This makes it possible for unauthenticated attackers to publish arbitrary posts, including private, granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wpgsi/trunk/admin/class-wpgsi-show.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3250077/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3250077/#file352",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wpgsi/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/034ba83f-4ee3-40f1-a41a-8b3d0055a1ba?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
76
CVE-2025/CVE-2025-17xx/CVE-2025-1702.json
Normal file
76
CVE-2025/CVE-2025-17xx/CVE-2025-1702.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2025-1702",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-05T12:15:35.420",
|
||||
"lastModified": "2025-03-05T12:15:35.420",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ultimate Member \u2013 User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 2.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ultimatemember/ultimatemember/pull/1654/commits/74647d42cc8d63f5d4f687efcd0792c246c23039",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/includes/core/class-member-directory.php#L1775",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/includes/core/class-member-directory.php#L1863",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3249862/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/ultimate-member/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/34adbae5-d615-4f8d-a845-6741d897f06c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
41
README.md
41
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-05T11:00:21.846465+00:00
|
||||
2025-03-05T13:00:19.691050+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-05T10:15:20.160000+00:00
|
||||
2025-03-05T12:15:35.420000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,38 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
284221
|
||||
284229
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `28`
|
||||
Recently added CVEs: `8`
|
||||
|
||||
- [CVE-2024-13350](CVE-2024/CVE-2024-133xx/CVE-2024-13350.json) (`2025-03-05T09:15:09.163`)
|
||||
- [CVE-2024-13747](CVE-2024/CVE-2024-137xx/CVE-2024-13747.json) (`2025-03-05T10:15:14.617`)
|
||||
- [CVE-2024-13757](CVE-2024/CVE-2024-137xx/CVE-2024-13757.json) (`2025-03-05T10:15:14.923`)
|
||||
- [CVE-2024-13777](CVE-2024/CVE-2024-137xx/CVE-2024-13777.json) (`2025-03-05T10:15:15.367`)
|
||||
- [CVE-2024-13778](CVE-2024/CVE-2024-137xx/CVE-2024-13778.json) (`2025-03-05T10:15:15.720`)
|
||||
- [CVE-2024-13779](CVE-2024/CVE-2024-137xx/CVE-2024-13779.json) (`2025-03-05T10:15:16.213`)
|
||||
- [CVE-2024-13780](CVE-2024/CVE-2024-137xx/CVE-2024-13780.json) (`2025-03-05T10:15:16.513`)
|
||||
- [CVE-2024-13787](CVE-2024/CVE-2024-137xx/CVE-2024-13787.json) (`2025-03-05T10:15:16.810`)
|
||||
- [CVE-2024-13809](CVE-2024/CVE-2024-138xx/CVE-2024-13809.json) (`2025-03-05T10:15:17.313`)
|
||||
- [CVE-2024-13810](CVE-2024/CVE-2024-138xx/CVE-2024-13810.json) (`2025-03-05T10:15:17.503`)
|
||||
- [CVE-2024-13811](CVE-2024/CVE-2024-138xx/CVE-2024-13811.json) (`2025-03-05T10:15:17.877`)
|
||||
- [CVE-2024-13815](CVE-2024/CVE-2024-138xx/CVE-2024-13815.json) (`2025-03-05T10:15:18.210`)
|
||||
- [CVE-2024-13827](CVE-2024/CVE-2024-138xx/CVE-2024-13827.json) (`2025-03-05T09:15:09.390`)
|
||||
- [CVE-2024-13839](CVE-2024/CVE-2024-138xx/CVE-2024-13839.json) (`2025-03-05T10:15:18.443`)
|
||||
- [CVE-2024-13866](CVE-2024/CVE-2024-138xx/CVE-2024-13866.json) (`2025-03-05T09:15:09.587`)
|
||||
- [CVE-2024-5667](CVE-2024/CVE-2024-56xx/CVE-2024-5667.json) (`2025-03-05T10:15:18.910`)
|
||||
- [CVE-2024-8682](CVE-2024/CVE-2024-86xx/CVE-2024-8682.json) (`2025-03-05T09:15:09.770`)
|
||||
- [CVE-2025-0954](CVE-2025/CVE-2025-09xx/CVE-2025-0954.json) (`2025-03-05T10:15:19.130`)
|
||||
- [CVE-2025-0956](CVE-2025/CVE-2025-09xx/CVE-2025-0956.json) (`2025-03-05T10:15:19.480`)
|
||||
- [CVE-2025-0990](CVE-2025/CVE-2025-09xx/CVE-2025-0990.json) (`2025-03-05T09:15:09.947`)
|
||||
- [CVE-2025-1008](CVE-2025/CVE-2025-10xx/CVE-2025-1008.json) (`2025-03-05T09:15:10.110`)
|
||||
- [CVE-2025-1435](CVE-2025/CVE-2025-14xx/CVE-2025-1435.json) (`2025-03-05T09:15:10.267`)
|
||||
- [CVE-2025-1515](CVE-2025/CVE-2025-15xx/CVE-2025-1515.json) (`2025-03-05T10:15:19.850`)
|
||||
- [CVE-2025-22493](CVE-2025/CVE-2025-224xx/CVE-2025-22493.json) (`2025-03-05T09:15:10.443`)
|
||||
- [CVE-2025-25015](CVE-2025/CVE-2025-250xx/CVE-2025-25015.json) (`2025-03-05T10:15:20.160`)
|
||||
- [CVE-2024-11153](CVE-2024/CVE-2024-111xx/CVE-2024-11153.json) (`2025-03-05T12:15:33.287`)
|
||||
- [CVE-2024-11951](CVE-2024/CVE-2024-119xx/CVE-2024-11951.json) (`2025-03-05T12:15:34.510`)
|
||||
- [CVE-2024-12281](CVE-2024/CVE-2024-122xx/CVE-2024-12281.json) (`2025-03-05T12:15:34.657`)
|
||||
- [CVE-2024-12650](CVE-2024/CVE-2024-126xx/CVE-2024-12650.json) (`2025-03-05T12:15:34.803`)
|
||||
- [CVE-2024-13423](CVE-2024/CVE-2024-134xx/CVE-2024-13423.json) (`2025-03-05T12:15:34.960`)
|
||||
- [CVE-2024-13471](CVE-2024/CVE-2024-134xx/CVE-2024-13471.json) (`2025-03-05T12:15:35.110`)
|
||||
- [CVE-2025-1463](CVE-2025/CVE-2025-14xx/CVE-2025-1463.json) (`2025-03-05T12:15:35.270`)
|
||||
- [CVE-2025-1702](CVE-2025/CVE-2025-17xx/CVE-2025-1702.json) (`2025-03-05T12:15:35.420`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
64
_state.csv
64
_state.csv
@ -245287,6 +245287,7 @@ CVE-2024-11148,0,0,f1a9b14e986a1cdbe7196e88d3aefe9d741f79a0512dc67842ac7d7556ea6
|
||||
CVE-2024-11149,0,0,8ad93fc62008b87e3a1f42f9b1f7c4174a7c4102476e1865f181fd8fd630ab52,2024-12-06T02:15:18.127000
|
||||
CVE-2024-1115,0,0,dd875c679e12a582e34ee954cd3620e780335d232c345f8362745b6ecc6a1bb8,2024-11-21T08:49:49.887000
|
||||
CVE-2024-11150,0,0,ee08facb687c71e0758a3f80ca5be44dd7cddce83b66eb6f473227f03ba9086e,2024-11-19T16:57:05.407000
|
||||
CVE-2024-11153,1,1,11f526a66842234fb7480415b0e2ca7bbb8c158ecfa0ce80b582af047f25caf6,2025-03-05T12:15:33.287000
|
||||
CVE-2024-11154,0,0,1d007c9319ffd27da392e9be5bae93f9e0fe9120d11601f0387b6b03bc9f2945,2024-11-21T13:57:24.187000
|
||||
CVE-2024-11155,0,0,b7062c0b399995063fe2a625442bd6626c60aa76fcb13e89717b66c8ebee721d,2024-12-06T19:15:10.730000
|
||||
CVE-2024-11156,0,0,ea1fe2a973d15fdece4824e57dc16a1bcfe810ffcf2d9b4d711f82a25c787244,2024-12-17T15:52:01.670000
|
||||
@ -245841,7 +245842,7 @@ CVE-2024-11728,0,0,5e9159dace0814fc830296f55a0ef2bdfd45169f1876af9b643a1fa92428c
|
||||
CVE-2024-11729,0,0,caceb42e577677b25830d89e8b00977431d6b11836cf2743d53fd41981238f7f,2025-02-05T14:43:07.597000
|
||||
CVE-2024-1173,0,0,09593502756eff2c1a7f19d3864d082fe5b606a2b3bd8feeb9fa5c26088825cd,2025-01-30T15:55:07.793000
|
||||
CVE-2024-11730,0,0,66d346922147603139b8a4c96d43965a67c99833d69103da415f26d21f19a6e2,2025-02-05T14:41:42.507000
|
||||
CVE-2024-11731,1,1,fa1081a73fa42b77d748f5cc43d66fc2996e7cb469f30ade5cede49dca150ca9,2025-03-05T10:15:10.123000
|
||||
CVE-2024-11731,0,0,fa1081a73fa42b77d748f5cc43d66fc2996e7cb469f30ade5cede49dca150ca9,2025-03-05T10:15:10.123000
|
||||
CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000
|
||||
CVE-2024-11733,0,0,95cac917a7c172e334d8c411bd7e32914cf640694af4ffd3d3de8eaf57fddbb7,2025-01-03T23:15:06.313000
|
||||
CVE-2024-11734,0,0,78c28d43096a77334429bffad85c310a594f71e1430baf5f4b291aea9769bdcc,2025-01-14T09:15:19.443000
|
||||
@ -246060,6 +246061,7 @@ CVE-2024-11948,0,0,63c29d57ca2d54a9012c75c22d15bb5abf864d6477c7fa55fde21714e103a
|
||||
CVE-2024-11949,0,0,8c8ca0b9d255f5a6445ed2a115142b5d13432f7081db7ee9affe350ed098a50e,2024-12-13T19:28:30.873000
|
||||
CVE-2024-1195,0,0,3368bf518c27a729a23598a4bc9bc8456794ebbc8ed421e1b9fb54311a27af0c,2024-11-21T08:50:00.723000
|
||||
CVE-2024-11950,0,0,df36014500ed7b6f7946ef04cfd4a777d6bd62d2ab461c18fe6d382ea2d08354,2024-12-12T01:40:21.820000
|
||||
CVE-2024-11951,1,1,e9883c17437e660660b4a15b0609483f54271d2d34fa6ff9c1f8df9c2fbd0648,2025-03-05T12:15:34.510000
|
||||
CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b941,2024-12-04T09:15:04.637000
|
||||
CVE-2024-11954,0,0,4285770ed381cd7f5197033d510494069e724ce14634f9774d473591316f5acd,2025-01-28T15:15:11.130000
|
||||
CVE-2024-11955,0,0,2af5adda5da26b6323fd1ffc39c86bb8d22bbc8895e47ad587f94331f0b10e55,2025-03-04T13:49:18.880000
|
||||
@ -246355,6 +246357,7 @@ CVE-2024-12276,0,0,e5bd927071e71d6948c4a1baa287eb37d95c029623029cf811ef1986567a1
|
||||
CVE-2024-12279,0,0,28f926ab6f57c2b10bee59d6914cc0152fa6a23fa0d172ad6d11e3d9d407b5c2,2025-01-04T12:15:24.453000
|
||||
CVE-2024-1228,0,0,d9ad08a0c1348634a61421c1ad7147deaf6d1d0acee23e78628f7298f108b1d0,2024-11-21T08:50:06.280000
|
||||
CVE-2024-12280,0,0,877a1ef9090370a5789c2e7362afe046232f3567d1b51a01b5cd894549fa6293,2025-01-28T21:15:16.317000
|
||||
CVE-2024-12281,1,1,69dd31685f0952daaba34ef0bc28dc9dff9bcbebbbb3027cc1f38a03e65ec354,2025-03-05T12:15:34.657000
|
||||
CVE-2024-12283,0,0,27e00fa0bc574ce5113c52cfd02ee2100414eb1f36a7d99001797949356bf37d,2024-12-11T09:15:05.697000
|
||||
CVE-2024-12284,0,0,58f0822b9c3e54960af89f6bf167625557218b7bd5211a87b1cc3ca0764a5320,2025-02-20T00:15:19.360000
|
||||
CVE-2024-12285,0,0,a4a2b41992c880fc476ecd11de1a7b15521385b3ddf2ced01c35545193640e43,2025-01-09T11:15:12.883000
|
||||
@ -246692,6 +246695,7 @@ CVE-2024-12647,0,0,097229fbc22a476768b6d005bd091a1df5d7c888609e99d7b0178db2af7e0
|
||||
CVE-2024-12648,0,0,f7105fbfd47374a1794df860725a9911e48791c9ed50a1aba7744dbecb1d01d1,2025-01-28T01:15:08.700000
|
||||
CVE-2024-12649,0,0,e7a3943e3bdcf0ae90e97fc59e152e3a3496d0b67d2aae6d30f2c730ae8aee45,2025-01-28T01:15:08.823000
|
||||
CVE-2024-1265,0,0,b39c324e3936d2b2eba136bb9fb37e8f905e9dd3fbb95d7d724d951e7512509f,2024-11-21T08:50:11.610000
|
||||
CVE-2024-12650,1,1,d053b6261299479d23db53f81d49d03fe3c0125bb240ae71049339dcc113149b,2025-03-05T12:15:34.803000
|
||||
CVE-2024-12651,0,0,837aacbe578de000aea5728f06a396783e15fde3692a8a521fed4e89c370dbc1,2025-02-14T14:15:31.487000
|
||||
CVE-2024-12652,0,0,7f5cf7f8bad74d2992fb68b5b70492ca046a7d5637ddd855697e567c2221bb7f,2024-12-26T04:15:05.660000
|
||||
CVE-2024-12653,0,0,5da61cf03f4157427ca9b9c8435df3b2d30c5b41ddc62a189ca0d7a75c1c8975,2024-12-18T13:53:28.700000
|
||||
@ -246810,7 +246814,7 @@ CVE-2024-12807,0,0,1d134b4e10fd5c2df6e8d1acfd31e14ba142e002cf7d83d94986fb0c56cb2
|
||||
CVE-2024-12811,0,0,7b65aed7c38336017d2295502f243dfa9e67fffcf73b1c7d1e13c0db617852f7,2025-02-28T00:15:35.790000
|
||||
CVE-2024-12813,0,0,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000
|
||||
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
|
||||
CVE-2024-12815,1,1,3b2ba5b8c2b3264395cc1bb7b90d5a5255aaeb67f7649b89ead6051135f61295,2025-03-05T10:15:13.563000
|
||||
CVE-2024-12815,0,0,3b2ba5b8c2b3264395cc1bb7b90d5a5255aaeb67f7649b89ead6051135f61295,2025-03-05T10:15:13.563000
|
||||
CVE-2024-12816,0,0,94a80e9971eaa7e870e47359d4c3d1f8fa9ff5419e2a80ed33d726940db7be36,2025-01-25T08:15:08.137000
|
||||
CVE-2024-12817,0,0,177c0c1ee17fbeb45fd7a30a85d211f5e3e78b0121812fcf822599a3e7e7f5fa,2025-01-25T08:15:08.300000
|
||||
CVE-2024-12818,0,0,84584f689c6c77a45a4884a21e812302b20927c35cf898200120c33746d2aaa2,2025-01-15T10:15:07.803000
|
||||
@ -247191,7 +247195,7 @@ CVE-2024-13229,0,0,537699d3a79de9fbc27e9b2746c3e5b03ecf899f1fa640e3c8fa1fd5bdf5f
|
||||
CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000
|
||||
CVE-2024-13230,0,0,77b1ecbf192b34e98ac8a66dc9d4d1a94979c767aa5e8f2b9158ee6752bafedc,2025-01-21T11:15:09.267000
|
||||
CVE-2024-13231,0,0,e7167177f9b23ac9afad3eac07b555a05861f1dc2e64891ec43f7636c5cda4d2,2025-02-19T09:15:08.930000
|
||||
CVE-2024-13232,1,1,f036609e4d8f0beba878db5f7c74fe0dbd7cad8905042cfc3d1a6197e09f841c,2025-03-05T10:15:14.197000
|
||||
CVE-2024-13232,0,0,f036609e4d8f0beba878db5f7c74fe0dbd7cad8905042cfc3d1a6197e09f841c,2025-03-05T10:15:14.197000
|
||||
CVE-2024-13234,0,0,4c493a769573d261245a83332615004948f6e06f366df55b9e6c3d12849e4b0c,2025-02-04T21:05:33.863000
|
||||
CVE-2024-13235,0,0,716a7c5d7c159a6b2d91aeded07fe8d912083980a02e58547aa8d39dbb30ccd0,2025-02-25T17:46:21.047000
|
||||
CVE-2024-13236,0,0,64abe32b85dcd45ec9ab991a4d5209e0313b6971aeb9b551d0d126d46b2b126d,2025-01-31T16:03:09.630000
|
||||
@ -247311,7 +247315,7 @@ CVE-2024-13347,0,0,b0b65e85dad4db5b5f94ca2399763501cda822d2d7559302507963a880f04
|
||||
CVE-2024-13348,0,0,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1ba28,2025-01-30T15:15:16.223000
|
||||
CVE-2024-13349,0,0,1a00cf757b3ec26bd50ea0e563207e24798d3893002c58755b8b9af1d412744e,2025-01-31T17:58:59.027000
|
||||
CVE-2024-1335,0,0,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000
|
||||
CVE-2024-13350,1,1,e9c5b87923a91edcb842bb6a28d1d6fd2f2943c4b4751dbc1e510c5e7ccbce8a,2025-03-05T09:15:09.163000
|
||||
CVE-2024-13350,0,0,e9c5b87923a91edcb842bb6a28d1d6fd2f2943c4b4751dbc1e510c5e7ccbce8a,2025-03-05T09:15:09.163000
|
||||
CVE-2024-13351,0,0,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508284,2025-01-15T10:15:07.993000
|
||||
CVE-2024-13352,0,0,e3b517ead7778233dbb1fb4b3ec3651780c4dec33a82aff69cd76909bd75eb05,2025-02-07T16:15:35.960000
|
||||
CVE-2024-13353,0,0,81d2cc0d68c32fbd9c01652b235787fa907c22cf877db2ecf0577a18d517802d,2025-02-25T03:32:38.597000
|
||||
@ -247374,6 +247378,7 @@ CVE-2024-13417,0,0,8cab866664bb2b3a861f8a2fd2fcba4e1325fa44575c36d479d147ebcdc09
|
||||
CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000
|
||||
CVE-2024-13421,0,0,dff352970d11f97bef9f2004dfd5104aef40893ad488e84401453d94e51e2f24,2025-02-25T04:00:16.123000
|
||||
CVE-2024-13422,0,0,edac0508b914957f5223777fa87a143f36eeebdc6522d4663ecb13bbee620189,2025-01-23T12:15:28.163000
|
||||
CVE-2024-13423,1,1,ad013cf7063530c189cad33688cbc60e935d1ca37076a9be20295ddb2eaec2f4,2025-03-05T12:15:34.960000
|
||||
CVE-2024-13424,0,0,370975f1d5c5dbca69325f5ce6d38bab2ed23e0268961523b76c7b51bd5cfd1d,2025-01-31T06:15:29.443000
|
||||
CVE-2024-13425,0,0,237ea5cb491f715b975686bb5ff57420b8d04b440f81d846e123cb2cd3c6bc41,2025-02-05T16:08:25.610000
|
||||
CVE-2024-13426,0,0,86fab2a47173ecbfa78b3dbc75ac72da294fc64d34b2b04366fafee0f3e9a13d,2025-01-24T18:37:38.503000
|
||||
@ -247418,6 +247423,7 @@ CVE-2024-13468,0,0,b48d1fa3d35721ccb47a1fb4394610e679bd03891ed40ec26ea0d83834fe3
|
||||
CVE-2024-13469,0,0,59dce6c462c5a88a80921bfc05a3a5bb68a1971f53d52b089cd62613870d0a02,2025-02-28T09:15:09.823000
|
||||
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
|
||||
CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000
|
||||
CVE-2024-13471,1,1,c2b3475b8b9340ee7eafc3015ca60d311a7a71d13802743276d03f35c7f296e9,2025-03-05T12:15:35.110000
|
||||
CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000
|
||||
CVE-2024-13473,0,0,373b88cb5ad56591f1b1770e530e918a12459beb69655014b2f5d50cfdfcd511,2025-02-18T18:15:18.990000
|
||||
CVE-2024-13474,0,0,119b2bcc9f6d7ee06993a83df97481ecb1d6f18c67fd910f35088fb4eaa5cb22,2025-02-22T05:15:12.410000
|
||||
@ -247667,7 +247673,7 @@ CVE-2024-13741,0,0,78f05de9655a03d53c2e8400793bb4a26c0069c47279ba1e219e404df9296
|
||||
CVE-2024-13742,0,0,aa7b21df6f3ec325db10419962054c1a324c9ebd12e6b4ba3b8ccbdda20e9f49,2025-01-30T18:38:19.663000
|
||||
CVE-2024-13743,0,0,55c8dc190eb39157b66a10e1b93cb1305bc4d10ce4cb3fd182854193f3e3c946,2025-02-18T23:15:09.267000
|
||||
CVE-2024-13746,0,0,45f35ee3764d47b28653409950f2c901c1dd16389bb6dfa869d16b5b737ece40,2025-03-01T05:15:15.103000
|
||||
CVE-2024-13747,1,1,0722e9214a8d8932f08f4c85730f4f5420b18fd6467ccbbf76398fb9b25cdfac,2025-03-05T10:15:14.617000
|
||||
CVE-2024-13747,0,0,0722e9214a8d8932f08f4c85730f4f5420b18fd6467ccbbf76398fb9b25cdfac,2025-03-05T10:15:14.617000
|
||||
CVE-2024-13748,0,0,434305d89c46996e593a1c20227391db3e976db9a09c9806ae0372c5517d7c24,2025-02-25T20:54:55.803000
|
||||
CVE-2024-13749,0,0,1bb4ba9b57bf7068dfada9bae681ca9d14d8a8db535388f781f86c86d7cb8a7e,2025-02-25T03:54:36.293000
|
||||
CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000
|
||||
@ -247675,7 +247681,7 @@ CVE-2024-13750,0,0,60d2ac37a119c74457a43f16e0c72392975ebfbcb619894e9f656befe0d71
|
||||
CVE-2024-13751,0,0,0e5e1a96a42a91f86024c5c9d88e569f1562fea2d46c5a10de41a49f75bc1fa9,2025-02-25T17:11:28.037000
|
||||
CVE-2024-13752,0,0,58abec1a9c719742a0301542b70a1d6e3b887ea15505a7f86a0c807e31da0095,2025-02-24T12:30:24.827000
|
||||
CVE-2024-13753,0,0,35689cdd5b64ee3991abd63fa8ef5f0b529fd8b40e65045b74e26e44ce0a06bd,2025-02-25T20:55:58.420000
|
||||
CVE-2024-13757,1,1,5995cc65fdbedf43c54445a608a23fd0f5333d3ce6f4a7aa69eb1a8c69fe5ff0,2025-03-05T10:15:14.923000
|
||||
CVE-2024-13757,0,0,5995cc65fdbedf43c54445a608a23fd0f5333d3ce6f4a7aa69eb1a8c69fe5ff0,2025-03-05T10:15:14.923000
|
||||
CVE-2024-13758,0,0,2e4bd9fb3fef024cef02d2b8f2dacb7555196f6b2dc915351eaf15ff5ed3368d,2025-01-31T20:28:53.477000
|
||||
CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000
|
||||
CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15dea7c,2025-01-31T03:15:10.693000
|
||||
@ -247683,13 +247689,13 @@ CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72c
|
||||
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
|
||||
CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000
|
||||
CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
|
||||
CVE-2024-13777,1,1,c2d4f81a8dc3230470a4ddcfe8af4c9f8f5e51801d3ccbf118c1aa1e9f87533b,2025-03-05T10:15:15.367000
|
||||
CVE-2024-13778,1,1,673d14896e529308de549f2928918225a2196f03731d1b9fcc9954d189005174,2025-03-05T10:15:15.720000
|
||||
CVE-2024-13779,1,1,b99bad6f9e8dab81292dacf47b36bc0dcc6133647baf854afd6307e5257a8b27,2025-03-05T10:15:16.213000
|
||||
CVE-2024-13777,0,0,c2d4f81a8dc3230470a4ddcfe8af4c9f8f5e51801d3ccbf118c1aa1e9f87533b,2025-03-05T10:15:15.367000
|
||||
CVE-2024-13778,0,0,673d14896e529308de549f2928918225a2196f03731d1b9fcc9954d189005174,2025-03-05T10:15:15.720000
|
||||
CVE-2024-13779,0,0,b99bad6f9e8dab81292dacf47b36bc0dcc6133647baf854afd6307e5257a8b27,2025-03-05T10:15:16.213000
|
||||
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
|
||||
CVE-2024-13780,1,1,f38211ca5b11c6d5cd76c7738bc5c283f5fd75664e09e943a4af464361a3c1f8,2025-03-05T10:15:16.513000
|
||||
CVE-2024-13780,0,0,f38211ca5b11c6d5cd76c7738bc5c283f5fd75664e09e943a4af464361a3c1f8,2025-03-05T10:15:16.513000
|
||||
CVE-2024-13783,0,0,4d1adc087edd34d52079e199658ef345cbd94c9c74350c99493fda1d34bf23f7,2025-02-21T12:19:42.537000
|
||||
CVE-2024-13787,1,1,03e570e664ce22f94ad75fa40c6deb8d23c12b83a62b56497cc82237079e1cd5,2025-03-05T10:15:16.810000
|
||||
CVE-2024-13787,0,0,03e570e664ce22f94ad75fa40c6deb8d23c12b83a62b56497cc82237079e1cd5,2025-03-05T10:15:16.810000
|
||||
CVE-2024-13789,0,0,2b0af9ac1cf71402f1bdf617ac72ff1dc3e5b91a3734626a9c4e88889f4b7dad,2025-02-25T20:56:25.757000
|
||||
CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000
|
||||
CVE-2024-13791,0,0,87d34d666cc6abe64fd811a08f4df25c9dcd54e5f0bd075f781061adfbd26e98,2025-02-25T04:01:52.803000
|
||||
@ -247705,19 +247711,19 @@ CVE-2024-13800,0,0,db269d664e8ffceb549584ac138b0b3d8532020dce3ad8c5501401929c306
|
||||
CVE-2024-13802,0,0,799c1258f4b5634a2f6e5dae2a8b0b5fa69324e493bf460e3d6851ce5d4c3675,2025-02-25T20:57:34.193000
|
||||
CVE-2024-13803,0,0,a4ca05408d0abeceec03de1e4e8a92703bc1137cacd6d3f3c6907b063c9f6ae7,2025-02-26T13:15:38.027000
|
||||
CVE-2024-13806,0,0,063c52d53f81bbfeb772e150fd3eb5657c9535abcd0ad4b4f1bb05b9b53e7d78,2025-03-01T08:15:33.653000
|
||||
CVE-2024-13809,1,1,6be28e896bf75936478f58fa45f377cf413bed10859f0939689dc8ea299b4f20,2025-03-05T10:15:17.313000
|
||||
CVE-2024-13809,0,0,6be28e896bf75936478f58fa45f377cf413bed10859f0939689dc8ea299b4f20,2025-03-05T10:15:17.313000
|
||||
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
|
||||
CVE-2024-13810,1,1,861c61a523529d8053cf536a51b7d802aa6990937f6cb4926ae7f49fc0b3dc67,2025-03-05T10:15:17.503000
|
||||
CVE-2024-13811,1,1,5b94a426632e0b7858178241c275865820be67c397c2529c7a30884806a0bfbc,2025-03-05T10:15:17.877000
|
||||
CVE-2024-13810,0,0,861c61a523529d8053cf536a51b7d802aa6990937f6cb4926ae7f49fc0b3dc67,2025-03-05T10:15:17.503000
|
||||
CVE-2024-13811,0,0,5b94a426632e0b7858178241c275865820be67c397c2529c7a30884806a0bfbc,2025-03-05T10:15:17.877000
|
||||
CVE-2024-13813,0,0,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000
|
||||
CVE-2024-13814,0,0,1eaa34671c59ff347de019eb0f7db92c91d554728619786a007d058e64ccd6e0,2025-02-18T21:30:00.523000
|
||||
CVE-2024-13815,1,1,c26d747b30e16449187df89ae1a63f232878b2518b742ef230f0e1b934e49302,2025-03-05T10:15:18.210000
|
||||
CVE-2024-13815,0,0,c26d747b30e16449187df89ae1a63f232878b2518b742ef230f0e1b934e49302,2025-03-05T10:15:18.210000
|
||||
CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000
|
||||
CVE-2024-13818,0,0,b34cef01cb19d809209555e3902d48d3c034a9e483326b43d02f63f2eb6722a8,2025-02-25T17:03:16.093000
|
||||
CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000
|
||||
CVE-2024-13821,0,0,74f5b87067df469dcc6e71e5e4a2f7f3dcf26b1308f6ab7ad834a12bda68d3f3,2025-02-25T19:37:29.223000
|
||||
CVE-2024-13822,0,0,3edf451af12e328cb622d46a3fda862fd00644484907c17ca32254fbaff076b3,2025-02-24T12:15:11.193000
|
||||
CVE-2024-13827,1,1,40b9b2f1bee49602bcbc26b5d44dfb98f0e80093153eca031d92ad08d38031db,2025-03-05T09:15:09.390000
|
||||
CVE-2024-13827,0,0,40b9b2f1bee49602bcbc26b5d44dfb98f0e80093153eca031d92ad08d38031db,2025-03-05T09:15:09.390000
|
||||
CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000
|
||||
CVE-2024-1383,0,0,93ff0b2eb9f4abe59909f3b49d94bb9635c166ee2ef0054262af8a40f59e1121,2025-02-13T20:02:55.647000
|
||||
CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000
|
||||
@ -247726,7 +247732,7 @@ CVE-2024-13832,0,0,ec5b2acd93db5978e9a901bf338782a10b26bfa5fce10324f0a5b3fac0b88
|
||||
CVE-2024-13833,0,0,25224aa5db16e2fcf2ffae150064444414666930ac899e8863e3333ed3af74b5,2025-03-01T12:15:33.230000
|
||||
CVE-2024-13834,0,0,43e5ae6cc904537a30eeccc37c7b9a07fd2bfb264b9574278bc2a72960c00c36,2025-02-24T12:37:18.957000
|
||||
CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000
|
||||
CVE-2024-13839,1,1,62f4a375bbf895765f28a4885fa21c7e3b5b50d77a9c8d8b3041b6036594e93c,2025-03-05T10:15:18.443000
|
||||
CVE-2024-13839,0,0,62f4a375bbf895765f28a4885fa21c7e3b5b50d77a9c8d8b3041b6036594e93c,2025-03-05T10:15:18.443000
|
||||
CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000
|
||||
CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede14a2,2025-02-07T07:15:14.573000
|
||||
CVE-2024-13842,0,0,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567fcd,2025-02-20T15:55:29.770000
|
||||
@ -247741,7 +247747,7 @@ CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0
|
||||
CVE-2024-13854,0,0,b568f01b297c5912b2612b134f4f5250b2d30544244315a9c47edd8900e54042,2025-02-19T08:15:21.440000
|
||||
CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000
|
||||
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
|
||||
CVE-2024-13866,1,1,7b6522806f9fda20a87affc69ae1455066ad3672ed7237b6480428aa11037ef9,2025-03-05T09:15:09.587000
|
||||
CVE-2024-13866,0,0,7b6522806f9fda20a87affc69ae1455066ad3672ed7237b6480428aa11037ef9,2025-03-05T09:15:09.587000
|
||||
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
|
||||
CVE-2024-13869,0,0,0918273a7ae15011be1debf6016e48d8cf14f846fa38b8a2ca6e7c9fb94375dd,2025-02-23T04:15:23.797000
|
||||
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
|
||||
@ -275553,7 +275559,7 @@ CVE-2024-56666,0,0,21f26ce12addeba29595c53677883f3a92e9d33b51f0211bdc6b5982f3c5d
|
||||
CVE-2024-56667,0,0,1a9434d05c1117f8ebea126370a3323c87f5ea30d38cebd3e2ed4ea6d126e457,2025-01-06T18:21:07.280000
|
||||
CVE-2024-56668,0,0,bb0b1b28b41959171a614b3f974621ac0d2ac6eb7e9f87ec2a3ef420c316bb90,2025-01-06T18:20:19.580000
|
||||
CVE-2024-56669,0,0,76b9a886334184c642413928921758334a8bfa8c2d41db9984b5b251de81dfa7,2025-02-11T16:15:47.333000
|
||||
CVE-2024-5667,1,1,29f4f8a3f893c802c08b765dee7f22b2665101f41127421981899c33d6ca7588,2025-03-05T10:15:18.910000
|
||||
CVE-2024-5667,0,0,29f4f8a3f893c802c08b765dee7f22b2665101f41127421981899c33d6ca7588,2025-03-05T10:15:18.910000
|
||||
CVE-2024-56670,0,0,09dfad71a0a648bb5acf88bdf9f65707f93ff084785c319fcc16bdd4e85df5fb,2025-01-06T18:13:02.807000
|
||||
CVE-2024-56671,0,0,965424f9a0cbe2a465372879236df9fbdb2bda68b251d088efe5ee351e22168f,2025-01-06T16:56:36.777000
|
||||
CVE-2024-56672,0,0,8417cd992fb4acd954e058be26fcceec7435ffb29efc02edc31fe1a61610bfcc,2025-02-10T18:15:31.643000
|
||||
@ -278896,7 +278902,7 @@ CVE-2024-8678,0,0,c9f19131bded613da0c19c1444b8e8a8b9cc51fc5c1cf15447ee67809c6ea1
|
||||
CVE-2024-8679,0,0,2b814e408085282aa43a44f419617020b8c9c8c614fcd1f864e869f9853d89cd,2024-12-07T02:15:19.457000
|
||||
CVE-2024-8680,0,0,d26d5eba91e9e07ee9b59e08affa3d4d4587baedebb8830ed04ba5321bbb1f0e,2024-09-27T13:53:47.910000
|
||||
CVE-2024-8681,0,0,cc400ecaa32dd9e4f3bd8a7ca6c51e9d6c2c86f98de06f0d89656986f17c2119,2024-10-04T19:04:49.490000
|
||||
CVE-2024-8682,1,1,daddf41a6d4cb8d01566af592e3a1c558195f98ff5032141058ebb14a08fe832,2025-03-05T09:15:09.770000
|
||||
CVE-2024-8682,0,0,daddf41a6d4cb8d01566af592e3a1c558195f98ff5032141058ebb14a08fe832,2025-03-05T09:15:09.770000
|
||||
CVE-2024-8684,0,0,654446cab325131fc0e44f97b13320fdc554516047e5f89a6437f77c3112522f,2025-02-10T13:15:26.103000
|
||||
CVE-2024-8685,0,0,f81829db7e24f10a279a46bb1f2309fba8584ad62cd972b00bc9c625257a6f1f,2025-02-10T13:15:26.270000
|
||||
CVE-2024-8686,0,0,5fbeef78ba158f7453367f08deedd44d4c0bfb4e67586077c3301c73e0fcba8c,2024-10-03T01:35:10.317000
|
||||
@ -280564,8 +280570,8 @@ CVE-2025-0948,0,0,3906e65d2be079846a7fc328fa3e08005b25ee0a1547c5d7622270f9efb6c8
|
||||
CVE-2025-0949,0,0,0738bb2b66672fae5fd020ba0f9a70fb106ebc19e1971dce25f2e18c30dd0c12,2025-02-03T18:15:41.727000
|
||||
CVE-2025-0950,0,0,7903835c96a972c16989f2cc1ccaf15a7fc2f203d2ad321ca6bcf09943e4f0e2,2025-02-03T18:15:41.847000
|
||||
CVE-2025-0953,0,0,921a82da6ab0ef8d3d98803db3946d447f0517778af0c3f71c90d1c8292a158b,2025-02-22T13:15:11.850000
|
||||
CVE-2025-0954,1,1,55c8c6eabee890f4a1412381487e5b6ca68e980f9a34924a7044201a06392acf,2025-03-05T10:15:19.130000
|
||||
CVE-2025-0956,1,1,90ca98fb49cd01a3ccd80c5453322603e06017a60dda3995c69f6a47d8f4e41d,2025-03-05T10:15:19.480000
|
||||
CVE-2025-0954,0,0,55c8c6eabee890f4a1412381487e5b6ca68e980f9a34924a7044201a06392acf,2025-03-05T10:15:19.130000
|
||||
CVE-2025-0956,0,0,90ca98fb49cd01a3ccd80c5453322603e06017a60dda3995c69f6a47d8f4e41d,2025-03-05T10:15:19.480000
|
||||
CVE-2025-0957,0,0,495f2d5b6e1d536933c2ca0f5f42b3b064381124c6d04bc27597b46752e07780,2025-02-22T14:15:29.710000
|
||||
CVE-2025-0958,0,0,571b6daa8412a8dbab85a507fad7b4f36ac7400535cbebe7229ffe82ac243e85,2025-03-04T10:15:10.817000
|
||||
CVE-2025-0960,0,0,499907aaf0daa1209acd23a8382909ccee8a784758e88e7f103cadb30772d3d2,2025-02-04T20:15:50.103000
|
||||
@ -280582,7 +280588,7 @@ CVE-2025-0981,0,0,c89c9554a0a46e5bb181583fd08bedc64f240c126360b9216686d47b4afcea
|
||||
CVE-2025-0982,0,0,521fffa92ca7a4349f9839f1725ef4c0f2728323e40055a01784086e989d43e4,2025-02-06T12:15:27.267000
|
||||
CVE-2025-0985,0,0,b26b31af0c06da0ecdbbec5923f39fbb50dadbe219faf9bd5908c2a08e5b3d3e,2025-02-28T17:15:15.937000
|
||||
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
|
||||
CVE-2025-0990,1,1,92e6e15cb16b6e29b8e9ac767cd0ef53fbf77548976d34469bb9d167b90fd0a7,2025-03-05T09:15:09.947000
|
||||
CVE-2025-0990,0,0,92e6e15cb16b6e29b8e9ac767cd0ef53fbf77548976d34469bb9d167b90fd0a7,2025-03-05T09:15:09.947000
|
||||
CVE-2025-0994,0,0,7e9665376804e5d3cecbef020101144a587ced5be1a96d3160dfb8d1e8544f4a,2025-02-12T19:29:30.383000
|
||||
CVE-2025-0995,0,0,0a5529eb09e1f54f24a3e7e605d2f8400aae44234054dd248f74781d7e042133,2025-02-19T15:15:16.073000
|
||||
CVE-2025-0996,0,0,f5bee85fd326d78b72ed64a9f49b28f7be5f9f9202e5d7fbf61706dd2200814c,2025-02-19T15:15:16.243000
|
||||
@ -280596,7 +280602,7 @@ CVE-2025-1004,0,0,9cae67c415976182c9e721c9cd510a26d80715a77eb7b99e0e645fceac3cfb
|
||||
CVE-2025-1005,0,0,6634395cbbb9a7c65c4fbb122df0f4ce8e0e536d41583c0c210842e7f1160ca8,2025-02-24T12:31:01.313000
|
||||
CVE-2025-1006,0,0,d649cff08ce4b1c1c688483cba24b8f6211ab5d71e1f74150bdc986243148c7c,2025-02-19T20:15:36.163000
|
||||
CVE-2025-1007,0,0,a3f70a46cd73e0586b87b15b1921e7689062414b24fcb0ed834a9ea125db4d4f,2025-02-19T09:15:10.117000
|
||||
CVE-2025-1008,1,1,51e628e9e44fe449c04c94758013fbbd1872f4c3055304670259874b4c1ea543,2025-03-05T09:15:10.110000
|
||||
CVE-2025-1008,0,0,51e628e9e44fe449c04c94758013fbbd1872f4c3055304670259874b4c1ea543,2025-03-05T09:15:10.110000
|
||||
CVE-2025-1009,0,0,2eaef1afd010c535fd50fceaedaa339dbea694d459d94247ca2cdf1816ccd1a0,2025-02-06T19:28:52.820000
|
||||
CVE-2025-1010,0,0,62a03586b01b5384628b2b24394869ef4f272c9b8354e05188dae652a849042c,2025-02-06T19:30:13.637000
|
||||
CVE-2025-1011,0,0,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c93d,2025-02-06T19:31:38.610000
|
||||
@ -280837,13 +280843,14 @@ CVE-2025-1414,0,0,b3b9c3affbe2798ab158992b46088a156edfb77f4ed4319f53d9b7d1a64ef9
|
||||
CVE-2025-1424,0,0,7bc1486ceca0565cfcc9a2d34ce95560808df7da09f34dab3d4f23862348c153,2025-03-04T16:15:36.663000
|
||||
CVE-2025-1425,0,0,43fb3b1f1ada208e5c93084c37982591e83549c344ec272dd4837e6ef4cf756b,2025-03-04T16:15:36.803000
|
||||
CVE-2025-1426,0,0,834f194c9c92d88c2a5fa9395038ff6b865679b1740d05e480244e8e7428755b,2025-02-19T20:15:36.467000
|
||||
CVE-2025-1435,1,1,5769f1e4d835d83465db5788f65be161aa498d69888f34e730e0859889f385a0,2025-03-05T09:15:10.267000
|
||||
CVE-2025-1435,0,0,5769f1e4d835d83465db5788f65be161aa498d69888f34e730e0859889f385a0,2025-03-05T09:15:10.267000
|
||||
CVE-2025-1441,0,0,a148724949d3a67ddbdb90d03ba8b4c0c01959027f1d8b9da83469468076f49e,2025-02-28T19:47:07.220000
|
||||
CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000
|
||||
CVE-2025-1448,0,0,dcd55b821241f3fcd52c60ec5d939cca30ac2e0644079f21a4efc2df8a0c8c2d,2025-02-19T02:15:08.833000
|
||||
CVE-2025-1450,0,0,49a816e7c5a69e24720ab368bac5ce58ec4ef269578dc55c279521400fe5c40f,2025-02-27T10:15:10.677000
|
||||
CVE-2025-1459,0,0,d4ba0fca00fb1394af6261aef7e66ea4aa76dab54f464d17b8cd4c337f3e2ffd,2025-03-01T07:15:10.980000
|
||||
CVE-2025-1460,0,0,a5c8e5382cd35abbaca03691402634777bdd210b53f824eaa70027825fcc1ff3,2025-02-26T23:15:10.193000
|
||||
CVE-2025-1463,1,1,d248ef273a3b5e888e172d8fd07cc9fd97f2fb7f97e8edd42c6b6898096b1d0e,2025-03-05T12:15:35.270000
|
||||
CVE-2025-1464,0,0,ea6fca9902a8d66594a81d7b3846b2dc6106ea09c92a543daddd03a001b2d75e,2025-02-19T14:15:30.337000
|
||||
CVE-2025-1465,0,0,41a404e0122a844f3dcf572de60d74f1a85e1ffddfa3b480532531f09012cc4f,2025-02-25T21:07:23.137000
|
||||
CVE-2025-1467,0,0,f546a361731baa7bcb46e4389211cb2202d736c84cdfe0fcff550dc198f81f26,2025-02-23T16:15:08.400000
|
||||
@ -280861,7 +280868,7 @@ CVE-2025-1509,0,0,96513da0fa9cb03c336b83bf5bddf52acacdda9db2e967b5f8ef0dc0a4de0f
|
||||
CVE-2025-1510,0,0,5e7f4e908d48e1455cf18a81d8dfff338614746cef18c3315cc85b0c64b8c8df,2025-02-22T04:15:10.040000
|
||||
CVE-2025-1511,0,0,92d16ec9cdb5f4e3f37d1ead50a4ecde4e869b1ac9e9b474b39bd9ef65a37b75,2025-02-28T06:15:25.750000
|
||||
CVE-2025-1513,0,0,49686153eb93c741adb1d6d7e23372a0773d0f92ceeb66d85a64053bd21ac0c5,2025-02-28T06:15:25.937000
|
||||
CVE-2025-1515,1,1,40fb5af3561fa8566133f431829f949e2515107ad298d86ca1e6887d1d266212,2025-03-05T10:15:19.850000
|
||||
CVE-2025-1515,0,0,40fb5af3561fa8566133f431829f949e2515107ad298d86ca1e6887d1d266212,2025-03-05T10:15:19.850000
|
||||
CVE-2025-1517,0,0,f77151ae5031cf639b38b016ea952fb6438aadc87174ef04eae6ee15efb2dd99,2025-02-26T13:15:41.193000
|
||||
CVE-2025-1535,0,0,6080c0c0968f3ab3c5259d9031c93f6d6c93dcaef1c71aa8b7e3b62645a6a84e,2025-02-21T12:15:30.877000
|
||||
CVE-2025-1536,0,0,13d2bb79966b022c194b53190d029539a3b9db0220df5fb889249e7f79d2fadc,2025-02-21T15:15:12.270000
|
||||
@ -280948,6 +280955,7 @@ CVE-2025-1691,0,0,fa342911d8aff1f1c916fab2606c8daed81ceb012a2ca7f67eb6c905e0ec58
|
||||
CVE-2025-1692,0,0,ada4fe9963e6bfb9428a6effda149b259cc8c8d330fa71a5cddb43ce0441e458,2025-02-27T13:15:11.413000
|
||||
CVE-2025-1693,0,0,78bee8ea11b0f84269d8265b773d2949284a15da89c9262684dc7b4564686390,2025-02-27T13:15:11.563000
|
||||
CVE-2025-1695,0,0,357cfe78a2c92e1c865a0bb908329007d0ab26040698f97311ebba02a25bd231,2025-03-04T01:15:10.063000
|
||||
CVE-2025-1702,1,1,a6760250977384f237a2063ccd808fd8627b14562a8964bf2c4c378b796fc78e,2025-03-05T12:15:35.420000
|
||||
CVE-2025-1716,0,0,db3aecae26e7981ab8a106cfd43bc335b9dad5cbc10d04d2c9d637c981434378,2025-03-03T16:15:39.520000
|
||||
CVE-2025-1717,0,0,531ae6ccf2948d3fb4bab20d73b08fd6766b8bf8893677c6840dec6217d1f072,2025-02-27T08:15:31.130000
|
||||
CVE-2025-1723,0,0,bd3dc44ce79d918f1eca963344abea138edda86e5a9253ac44f547b43e3ab229,2025-03-03T08:15:15.717000
|
||||
@ -281954,7 +281962,7 @@ CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fd
|
||||
CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000
|
||||
CVE-2025-22491,0,0,e26a392df2afadce272fd73c1e836888f4b2c5b4ac6036088413dff6be206365,2025-02-28T09:15:12.540000
|
||||
CVE-2025-22492,0,0,e9bde4f21fb6310ad0cfe4e54a5331c3fe81f9a835d2382636a7b0f15d89bca3,2025-02-28T09:15:12.680000
|
||||
CVE-2025-22493,1,1,3fd8c45326186b19600084db23ec5bee27e935681d6364607bb1969dbbc7ba96,2025-03-05T09:15:10.443000
|
||||
CVE-2025-22493,0,0,3fd8c45326186b19600084db23ec5bee27e935681d6364607bb1969dbbc7ba96,2025-03-05T09:15:10.443000
|
||||
CVE-2025-22495,0,0,8392620cb3f5289df4103c4151ecb349dfb461cd09122f2d139b36566f51370b,2025-02-24T17:15:13.723000
|
||||
CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000
|
||||
CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000
|
||||
@ -283434,7 +283442,7 @@ CVE-2025-24980,0,0,a17fd16fc181710dc23e803283e1d6d1f933f1a8ebddaf620892759c050de
|
||||
CVE-2025-24981,0,0,53e7b164e1e8344d44125c41e4616160d5eab5393458f601a78911be7625504e,2025-02-06T18:15:32.847000
|
||||
CVE-2025-24982,0,0,bb2e7ed21733f592bc39cfa057a56b08d6aa180f6c36351b70c6f04a2bffef43,2025-02-04T05:15:10.543000
|
||||
CVE-2025-24989,0,0,41bc3ff3ec452f1ed2e007691180803f1ca2c43c5c00d6d0ec8842763c09b177,2025-02-24T14:55:58.823000
|
||||
CVE-2025-25015,1,1,eb1050bd5b65a4dad7d526191a26a4661ea59db9fd330a6daf35730bcf0718dc,2025-03-05T10:15:20.160000
|
||||
CVE-2025-25015,0,0,eb1050bd5b65a4dad7d526191a26a4661ea59db9fd330a6daf35730bcf0718dc,2025-03-05T10:15:20.160000
|
||||
CVE-2025-25039,0,0,2c724cd99b172314f0551d5e25be43761b6ee80f3cb5f750659e6bd374aa7b28,2025-02-04T19:15:33.977000
|
||||
CVE-2025-25054,0,0,5be11f7aa8767f62986e873818aa7bafb83a58f1dfa102f5a36254246868acc6,2025-02-19T06:15:22.010000
|
||||
CVE-2025-25055,0,0,715a07bb29b79c7fb7ed93b83baf8d9d3a9109839cf0cb0b13f9fa08d28e54fd,2025-02-18T00:15:21.277000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user