Auto-Update: 2025-01-30T23:00:33.211774+00:00

This commit is contained in:
cad-safe-bot 2025-01-30 23:04:00 +00:00
parent 173be1a07b
commit 3463d248b7
46 changed files with 2140 additions and 169 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41400", "id": "CVE-2022-41400",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T13:15:13.560", "published": "2023-04-28T13:15:13.560",
"lastModified": "2024-11-21T07:23:09.593", "lastModified": "2025-01-30T21:15:09.157",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-798" "value": "CWE-798"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24269", "id": "CVE-2023-24269",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T22:15:08.887", "published": "2023-04-28T22:15:08.887",
"lastModified": "2024-11-21T07:47:38.710", "lastModified": "2025-01-30T21:15:09.913",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-434" "value": "CWE-434"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27971", "id": "CVE-2023-27971",
"sourceIdentifier": "hp-security-alert@hp.com", "sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-04-28T16:15:09.840", "published": "2023-04-28T16:15:09.840",
"lastModified": "2024-11-21T07:53:50.490", "lastModified": "2025-01-30T21:15:10.260",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-120" "value": "CWE-120"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28821", "id": "CVE-2023-28821",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T14:15:10.753", "published": "2023-04-28T14:15:10.753",
"lastModified": "2024-11-21T07:56:04.903", "lastModified": "2025-01-30T21:15:10.470",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-640" "value": "CWE-640"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28882", "id": "CVE-2023-28882",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T04:15:38.017", "published": "2023-04-28T04:15:38.017",
"lastModified": "2024-11-21T07:56:13.220", "lastModified": "2025-01-30T21:15:10.640",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-400" "value": "CWE-400"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29268", "id": "CVE-2023-29268",
"sourceIdentifier": "security@tibco.com", "sourceIdentifier": "security@tibco.com",
"published": "2023-04-26T18:15:09.160", "published": "2023-04-26T18:15:09.160",
"lastModified": "2024-11-21T07:56:46.553", "lastModified": "2025-01-30T22:15:07.977",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-434" "value": "CWE-434"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29815", "id": "CVE-2023-29815",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T15:15:10.737", "published": "2023-04-28T15:15:10.737",
"lastModified": "2024-11-21T07:57:32.690", "lastModified": "2025-01-30T21:15:10.877",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-352" "value": "CWE-352"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30204", "id": "CVE-2023-30204",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-03T21:15:23.643", "published": "2023-05-03T21:15:23.643",
"lastModified": "2024-11-21T07:59:54.240", "lastModified": "2025-01-30T21:15:11.507",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-89" "value": "CWE-89"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30205", "id": "CVE-2023-30205",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-03T21:15:24.230", "published": "2023-05-03T21:15:24.230",
"lastModified": "2024-11-21T07:59:54.377", "lastModified": "2025-01-30T21:15:11.693",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 1.7, "exploitabilityScore": 1.7,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30300", "id": "CVE-2023-30300",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-03T20:15:10.327", "published": "2023-05-03T20:15:10.327",
"lastModified": "2024-11-21T07:59:59.290", "lastModified": "2025-01-30T21:15:11.870",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-835" "value": "CWE-835"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30405", "id": "CVE-2023-30405",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T21:15:09.083", "published": "2023-04-28T21:15:09.083",
"lastModified": "2024-11-21T08:00:08.217", "lastModified": "2025-01-30T21:15:12.067",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 2.3, "exploitabilityScore": 2.3,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30454", "id": "CVE-2023-30454",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T19:15:16.993", "published": "2023-04-28T19:15:16.993",
"lastModified": "2024-11-21T08:00:13.123", "lastModified": "2025-01-30T21:15:12.300",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 2.7 "impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30455", "id": "CVE-2023-30455",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T18:15:26.680", "published": "2023-04-28T18:15:26.680",
"lastModified": "2024-11-21T08:00:13.273", "lastModified": "2025-01-30T21:15:12.490",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo" "value": "NVD-CWE-noinfo"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31290", "id": "CVE-2023-31290",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-04-27T05:15:08.807", "published": "2023-04-27T05:15:08.807",
"lastModified": "2024-11-21T08:01:44.153", "lastModified": "2025-01-30T21:15:12.700",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -32,6 +32,26 @@
}, },
"exploitabilityScore": 2.2, "exploitabilityScore": 2.2,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
} }
] ]
}, },
@ -45,6 +65,16 @@
"value": "CWE-338" "value": "CWE-338"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-338"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11609",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-01-30T21:15:13.163",
"lastModified": "2025-01-30T21:15:13.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AutomationDirect C-More EA9 EAP9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24772."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1673/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11610",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-01-30T21:15:13.303",
"lastModified": "2025-01-30T21:15:13.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24773."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1674/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11611",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-01-30T21:15:13.450",
"lastModified": "2025-01-30T21:15:13.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24774."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1675/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12085", "id": "CVE-2024-12085",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-14T18:15:25.123", "published": "2025-01-14T18:15:25.123",
"lastModified": "2025-01-30T17:15:17.527", "lastModified": "2025-01-30T22:15:08.410",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -84,6 +84,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:0790", "url": "https://access.redhat.com/errata/RHSA-2025:0790",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2025:0849",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2024-12085", "url": "https://access.redhat.com/security/cve/CVE-2024-12085",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13269", "id": "CVE-2024-13269",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T20:15:35.687", "published": "2025-01-09T20:15:35.687",
"lastModified": "2025-01-09T20:15:35.687", "lastModified": "2025-01-30T22:15:08.550",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en datos enviados en Drupal Advanced Varnish permite una navegaci\u00f3n forzada. Este problema afecta a Advanced Varnish: desde la versi\u00f3n 0.0.0 hasta la 4.0.11." "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en datos enviados en Drupal Advanced Varnish permite una navegaci\u00f3n forzada. Este problema afecta a Advanced Varnish: desde la versi\u00f3n 0.0.0 hasta la 4.0.11."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [ "weaknesses": [
{ {
"source": "mlhess@drupal.org", "source": "mlhess@drupal.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13308", "id": "CVE-2024-13308",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T21:15:28.623", "published": "2025-01-09T21:15:28.623",
"lastModified": "2025-01-09T21:15:28.623", "lastModified": "2025-01-30T22:15:08.723",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Browser Back Button permite Cross-Site Scripting (XSS). Este problema afecta al bot\u00f3n Atr\u00e1s del navegador: desde la versi\u00f3n 1.0.0 hasta la 2.0.2." "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Browser Back Button permite Cross-Site Scripting (XSS). Este problema afecta al bot\u00f3n Atr\u00e1s del navegador: desde la versi\u00f3n 1.0.0 hasta la 2.0.2."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 3.8,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
]
},
"weaknesses": [ "weaknesses": [
{ {
"source": "mlhess@drupal.org", "source": "mlhess@drupal.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13309", "id": "CVE-2024-13309",
"sourceIdentifier": "mlhess@drupal.org", "sourceIdentifier": "mlhess@drupal.org",
"published": "2025-01-09T21:15:28.740", "published": "2025-01-09T21:15:28.740",
"lastModified": "2025-01-09T21:15:28.740", "lastModified": "2025-01-30T22:15:08.880",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "La vulnerabilidad de autenticaci\u00f3n incorrecta en Login Disable de Drupal permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Login Disable: desde 2.0.0 antes de 2.1.1." "value": "La vulnerabilidad de autenticaci\u00f3n incorrecta en Login Disable de Drupal permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Login Disable: desde 2.0.0 antes de 2.1.1."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [ "weaknesses": [
{ {
"source": "mlhess@drupal.org", "source": "mlhess@drupal.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1488", "id": "CVE-2024-1488",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2024-02-15T05:15:10.257", "published": "2024-02-15T05:15:10.257",
"lastModified": "2025-01-24T06:15:26.913", "lastModified": "2025-01-30T22:15:09.037",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -62,7 +62,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "secalert@redhat.com", "source": "secalert@redhat.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -416,6 +416,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://access.redhat.com/errata/RHSA-2025:0837",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2024-1488", "url": "https://access.redhat.com/security/cve/CVE-2024-1488",
"source": "secalert@redhat.com", "source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54156", "id": "CVE-2024-54156",
"sourceIdentifier": "cve@jetbrains.com", "sourceIdentifier": "cve@jetbrains.com",
"published": "2024-12-04T12:15:20.340", "published": "2024-12-04T12:15:20.340",
"lastModified": "2024-12-04T12:15:20.340", "lastModified": "2025-01-30T21:46:25.813",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.6, "exploitabilityScore": 1.6,
"impactScore": 2.5 "impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
} }
] ]
}, },
@ -51,10 +71,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.52635",
"matchCriteriaId": "88F95E9A-5078-436A-A171-96E49C05447B"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com" "source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54157", "id": "CVE-2024-54157",
"sourceIdentifier": "cve@jetbrains.com", "sourceIdentifier": "cve@jetbrains.com",
"published": "2024-12-04T12:15:20.473", "published": "2024-12-04T12:15:20.473",
"lastModified": "2024-12-04T12:15:20.473", "lastModified": "2025-01-30T21:47:10.683",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
} }
] ]
}, },
@ -51,10 +71,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.52635",
"matchCriteriaId": "88F95E9A-5078-436A-A171-96E49C05447B"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com" "source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54158", "id": "CVE-2024-54158",
"sourceIdentifier": "cve@jetbrains.com", "sourceIdentifier": "cve@jetbrains.com",
"published": "2024-12-04T12:15:20.623", "published": "2024-12-04T12:15:20.623",
"lastModified": "2024-12-04T12:15:20.623", "lastModified": "2025-01-30T21:50:32.770",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,25 +36,76 @@
}, },
"exploitabilityScore": 2.1, "exploitabilityScore": 2.1,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
} }
] ]
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "cve@jetbrains.com", "source": "cve@jetbrains.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-173" "value": "CWE-173"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.52635",
"matchCriteriaId": "88F95E9A-5078-436A-A171-96E49C05447B"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com" "source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57276", "id": "CVE-2024-57276",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2025-01-27T17:15:16.827", "published": "2025-01-27T17:15:16.827",
"lastModified": "2025-01-27T17:15:16.827", "lastModified": "2025-01-30T22:15:09.297",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In Electronic Arts Dragon Age Origins 1.05, the DAUpdaterSVC service contains an unquoted service path vulnerability. This service is configured with insecure permissions, allowing users to modify the executable file path used by the service. The service runs with NT AUTHORITY\\SYSTEM privileges, enabling attackers to escalate privileges by replacing or placing a malicious executable in the service path." "value": "In Electronic Arts Dragon Age Origins 1.05, the DAUpdaterSVC service contains an unquoted service path vulnerability. This service is configured with insecure permissions, allowing users to modify the executable file path used by the service. The service runs with NT AUTHORITY\\SYSTEM privileges, enabling attackers to escalate privileges by replacing or placing a malicious executable in the service path."
},
{
"lang": "es",
"value": "En Electronic Arts Dragon Age Origins 1.05, el servicio DAUpdaterSVC contiene una vulnerabilidad de ruta de servicio sin comillas. Este servicio est\u00e1 configurado con permisos inseguros, lo que permite a los usuarios modificar la ruta del archivo ejecutable que utiliza el servicio. El servicio se ejecuta con privilegios NT AUTHORITY\\sistema, lo que permite a los atacantes aumentar los privilegios reemplazando o colocando un ejecutable malicioso en la ruta del servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://github.com/yamerooo123/CVE/blob/main/CVE-2024-57276/Description.md", "url": "https://github.com/yamerooo123/CVE/blob/main/CVE-2024-57276/Description.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0241", "id": "CVE-2025-0241",
"sourceIdentifier": "security@mozilla.org", "sourceIdentifier": "security@mozilla.org",
"published": "2025-01-07T16:15:38.767", "published": "2025-01-07T16:15:38.767",
"lastModified": "2025-01-13T22:15:15.330", "lastModified": "2025-01-30T22:15:09.700",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Al segmentar texto especialmente manipulado, la segmentaci\u00f3n corromp\u00eda la memoria y provocaba un bloqueo que pod\u00eda explotarse. Esta vulnerabilidad afecta a Firefox < 134 y Firefox ESR < 128.6." "value": "Al segmentar texto especialmente manipulado, la segmentaci\u00f3n corromp\u00eda la memoria y provocaba un bloqueo que pod\u00eda explotarse. Esta vulnerabilidad afecta a Firefox < 134 y Firefox ESR < 128.6."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933023", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933023",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0568",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-01-30T21:15:13.587",
"lastModified": "2025-01-30T21:15:13.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25302."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-049/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0569",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-01-30T21:15:13.710",
"lastModified": "2025-01-30T21:15:13.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25303."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-052/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0570",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-01-30T21:15:13.830",
"lastModified": "2025-01-30T21:15:13.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25304."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-050/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0571",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-01-30T21:15:13.960",
"lastModified": "2025-01-30T21:15:13.960",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25305."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-051/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0572",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-01-30T21:15:14.093",
"lastModified": "2025-01-30T21:15:14.093",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sante PACS Server Web Portal DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of the current user. Was ZDI-CAN-25308."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-054/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0573",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-01-30T21:15:14.227",
"lastModified": "2025-01-30T21:15:14.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sante PACS Server DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of the current user. Was ZDI-CAN-25309."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-053/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0574",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-01-30T21:15:14.357",
"lastModified": "2025-01-30T21:15:14.357",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Sante PACS Server URL path Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of URLs in the web server module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25318."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-055/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-0880",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-30T21:15:14.487",
"lastModified": "2025-01-30T21:15:14.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/updateplan.php. The manipulation of the argument planid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.294125",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.294125",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.488716",
"source": "cna@vuldb.com"
},
{
"url": "https://www.yuque.com/u21735104/brookes/za83ilxr9g2fkv8b",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0881",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-30T21:15:14.650",
"lastModified": "2025-01-30T22:15:09.950",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /dashboard/admin/saveroutine.php. The manipulation of the argument rname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/wizdzz/CVE/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.294126",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.294126",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.489192",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/wizdzz/CVE/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0882",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-30T21:15:14.820",
"lastModified": "2025-01-30T21:15:14.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Chat System up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user/addnewmember.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/LamentXU123/cve/blob/main/sql_injection3.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.294127",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.294127",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.491463",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-24099", "id": "CVE-2025-24099",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2025-01-30T17:15:18.473", "published": "2025-01-30T17:15:18.473",
"lastModified": "2025-01-30T17:15:18.473", "lastModified": "2025-01-30T22:15:10.160",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -11,7 +11,42 @@
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Ventura 13.7.3, macOS Sonoma 14.7.3. A local attacker may be able to elevate their privileges." "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Ventura 13.7.3, macOS Sonoma 14.7.3. A local attacker may be able to elevate their privileges."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24456", "id": "CVE-2025-24456",
"sourceIdentifier": "cve@jetbrains.com", "sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:18.320", "published": "2025-01-21T18:15:18.320",
"lastModified": "2025-01-21T18:15:18.320", "lastModified": "2025-01-30T21:28:52.003",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,25 +36,76 @@
}, },
"exploitabilityScore": 1.2, "exploitabilityScore": 1.2,
"impactScore": 5.5 "impactScore": 5.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
} }
] ]
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "cve@jetbrains.com", "source": "cve@jetbrains.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-288" "value": "CWE-288"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.55417",
"matchCriteriaId": "7C6F9298-B076-46A1-BBF5-92D75CCD7F9A"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com" "source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24457", "id": "CVE-2025-24457",
"sourceIdentifier": "cve@jetbrains.com", "sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:18.520", "published": "2025-01-21T18:15:18.520",
"lastModified": "2025-01-21T18:15:18.520", "lastModified": "2025-01-30T21:31:24.150",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
] ]
}, },
@ -51,10 +71,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.55417",
"matchCriteriaId": "273778FC-DBA5-40E4-A8F7-D7786652D8C1"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com" "source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24458", "id": "CVE-2025-24458",
"sourceIdentifier": "cve@jetbrains.com", "sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:18.697", "published": "2025-01-21T18:15:18.697",
"lastModified": "2025-01-21T18:15:18.697", "lastModified": "2025-01-30T21:35:05.127",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.2 "impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
} }
] ]
}, },
@ -51,10 +71,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.3.55417",
"matchCriteriaId": "273778FC-DBA5-40E4-A8F7-D7786652D8C1"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com" "source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24459", "id": "CVE-2025-24459",
"sourceIdentifier": "cve@jetbrains.com", "sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:18.890", "published": "2025-01-21T18:15:18.890",
"lastModified": "2025-01-21T18:15:18.890", "lastModified": "2025-01-30T21:22:22.917",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.1, "exploitabilityScore": 2.1,
"impactScore": 2.5 "impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
} }
] ]
}, },
@ -51,10 +71,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.12.1",
"matchCriteriaId": "F955D6EE-CC8E-4782-B7A4-2F915A7BF290"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com" "source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24460", "id": "CVE-2025-24460",
"sourceIdentifier": "cve@jetbrains.com", "sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:19.067", "published": "2025-01-21T18:15:19.067",
"lastModified": "2025-01-21T18:15:19.067", "lastModified": "2025-01-30T21:25:18.337",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
} }
] ]
}, },
@ -51,10 +71,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.12.1",
"matchCriteriaId": "F955D6EE-CC8E-4782-B7A4-2F915A7BF290"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com" "source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24461", "id": "CVE-2025-24461",
"sourceIdentifier": "cve@jetbrains.com", "sourceIdentifier": "cve@jetbrains.com",
"published": "2025-01-21T18:15:19.260", "published": "2025-01-21T18:15:19.260",
"lastModified": "2025-01-21T18:15:19.260", "lastModified": "2025-01-30T21:26:17.583",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
} }
] ]
}, },
@ -51,10 +71,30 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:teamcity:2024.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F0E73863-CD45-441D-8935-DEEBF201E302"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/", "url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com" "source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-01-30T21:00:30.606915+00:00 2025-01-30T23:00:33.211774+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-01-30T20:15:51.010000+00:00 2025-01-30T22:15:10.160000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,56 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
279541 279554
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `24` Recently added CVEs: `13`
- [CVE-2024-10026](CVE-2024/CVE-2024-100xx/CVE-2024-10026.json) (`2025-01-30T20:15:32.600`) - [CVE-2024-11609](CVE-2024/CVE-2024-116xx/CVE-2024-11609.json) (`2025-01-30T21:15:13.163`)
- [CVE-2024-10603](CVE-2024/CVE-2024-106xx/CVE-2024-10603.json) (`2025-01-30T20:15:32.803`) - [CVE-2024-11610](CVE-2024/CVE-2024-116xx/CVE-2024-11610.json) (`2025-01-30T21:15:13.303`)
- [CVE-2024-10604](CVE-2024/CVE-2024-106xx/CVE-2024-10604.json) (`2025-01-30T20:15:33.003`) - [CVE-2024-11611](CVE-2024/CVE-2024-116xx/CVE-2024-11611.json) (`2025-01-30T21:15:13.450`)
- [CVE-2024-12248](CVE-2024/CVE-2024-122xx/CVE-2024-12248.json) (`2025-01-30T19:15:13.390`) - [CVE-2025-0568](CVE-2025/CVE-2025-05xx/CVE-2025-0568.json) (`2025-01-30T21:15:13.587`)
- [CVE-2024-44142](CVE-2024/CVE-2024-441xx/CVE-2024-44142.json) (`2025-01-30T19:15:13.910`) - [CVE-2025-0569](CVE-2025/CVE-2025-05xx/CVE-2025-0569.json) (`2025-01-30T21:15:13.710`)
- [CVE-2025-0142](CVE-2025/CVE-2025-01xx/CVE-2025-0142.json) (`2025-01-30T20:15:33.853`) - [CVE-2025-0570](CVE-2025/CVE-2025-05xx/CVE-2025-0570.json) (`2025-01-30T21:15:13.830`)
- [CVE-2025-0143](CVE-2025/CVE-2025-01xx/CVE-2025-0143.json) (`2025-01-30T20:15:34.050`) - [CVE-2025-0571](CVE-2025/CVE-2025-05xx/CVE-2025-0571.json) (`2025-01-30T21:15:13.960`)
- [CVE-2025-0144](CVE-2025/CVE-2025-01xx/CVE-2025-0144.json) (`2025-01-30T20:15:34.210`) - [CVE-2025-0572](CVE-2025/CVE-2025-05xx/CVE-2025-0572.json) (`2025-01-30T21:15:14.093`)
- [CVE-2025-0145](CVE-2025/CVE-2025-01xx/CVE-2025-0145.json) (`2025-01-30T20:15:34.547`) - [CVE-2025-0573](CVE-2025/CVE-2025-05xx/CVE-2025-0573.json) (`2025-01-30T21:15:14.227`)
- [CVE-2025-0146](CVE-2025/CVE-2025-01xx/CVE-2025-0146.json) (`2025-01-30T20:15:34.907`) - [CVE-2025-0574](CVE-2025/CVE-2025-05xx/CVE-2025-0574.json) (`2025-01-30T21:15:14.357`)
- [CVE-2025-0147](CVE-2025/CVE-2025-01xx/CVE-2025-0147.json) (`2025-01-30T20:15:35.253`) - [CVE-2025-0880](CVE-2025/CVE-2025-08xx/CVE-2025-0880.json) (`2025-01-30T21:15:14.487`)
- [CVE-2025-0626](CVE-2025/CVE-2025-06xx/CVE-2025-0626.json) (`2025-01-30T19:15:14.010`) - [CVE-2025-0881](CVE-2025/CVE-2025-08xx/CVE-2025-0881.json) (`2025-01-30T21:15:14.650`)
- [CVE-2025-0680](CVE-2025/CVE-2025-06xx/CVE-2025-0680.json) (`2025-01-30T19:15:14.147`) - [CVE-2025-0882](CVE-2025/CVE-2025-08xx/CVE-2025-0882.json) (`2025-01-30T21:15:14.820`)
- [CVE-2025-0681](CVE-2025/CVE-2025-06xx/CVE-2025-0681.json) (`2025-01-30T19:15:14.300`)
- [CVE-2025-0683](CVE-2025/CVE-2025-06xx/CVE-2025-0683.json) (`2025-01-30T19:15:14.460`)
- [CVE-2025-24500](CVE-2025/CVE-2025-245xx/CVE-2025-24500.json) (`2025-01-30T19:15:14.600`)
- [CVE-2025-24501](CVE-2025/CVE-2025-245xx/CVE-2025-24501.json) (`2025-01-30T19:15:14.723`)
- [CVE-2025-24502](CVE-2025/CVE-2025-245xx/CVE-2025-24502.json) (`2025-01-30T19:15:14.863`)
- [CVE-2025-24503](CVE-2025/CVE-2025-245xx/CVE-2025-24503.json) (`2025-01-30T19:15:16.453`)
- [CVE-2025-24504](CVE-2025/CVE-2025-245xx/CVE-2025-24504.json) (`2025-01-30T19:15:16.967`)
- [CVE-2025-24505](CVE-2025/CVE-2025-245xx/CVE-2025-24505.json) (`2025-01-30T19:15:17.210`)
- [CVE-2025-24506](CVE-2025/CVE-2025-245xx/CVE-2025-24506.json) (`2025-01-30T19:15:17.590`)
- [CVE-2025-24507](CVE-2025/CVE-2025-245xx/CVE-2025-24507.json) (`2025-01-30T19:15:17.920`)
- [CVE-2025-24802](CVE-2025/CVE-2025-248xx/CVE-2025-24802.json) (`2025-01-30T20:15:51.010`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `13` Recently modified CVEs: `31`
- [CVE-2023-1526](CVE-2023/CVE-2023-15xx/CVE-2023-1526.json) (`2025-01-30T20:15:30.230`) - [CVE-2023-29815](CVE-2023/CVE-2023-298xx/CVE-2023-29815.json) (`2025-01-30T21:15:10.877`)
- [CVE-2023-27972](CVE-2023/CVE-2023-279xx/CVE-2023-27972.json) (`2025-01-30T20:15:31.307`) - [CVE-2023-30204](CVE-2023/CVE-2023-302xx/CVE-2023-30204.json) (`2025-01-30T21:15:11.507`)
- [CVE-2023-27973](CVE-2023/CVE-2023-279xx/CVE-2023-27973.json) (`2025-01-30T19:15:09.283`) - [CVE-2023-30205](CVE-2023/CVE-2023-302xx/CVE-2023-30205.json) (`2025-01-30T21:15:11.693`)
- [CVE-2023-29639](CVE-2023/CVE-2023-296xx/CVE-2023-29639.json) (`2025-01-30T19:15:11.527`) - [CVE-2023-30300](CVE-2023/CVE-2023-303xx/CVE-2023-30300.json) (`2025-01-30T21:15:11.870`)
- [CVE-2023-29641](CVE-2023/CVE-2023-296xx/CVE-2023-29641.json) (`2025-01-30T19:15:12.073`) - [CVE-2023-30405](CVE-2023/CVE-2023-304xx/CVE-2023-30405.json) (`2025-01-30T21:15:12.067`)
- [CVE-2023-29643](CVE-2023/CVE-2023-296xx/CVE-2023-29643.json) (`2025-01-30T19:15:12.503`) - [CVE-2023-30454](CVE-2023/CVE-2023-304xx/CVE-2023-30454.json) (`2025-01-30T21:15:12.300`)
- [CVE-2023-29680](CVE-2023/CVE-2023-296xx/CVE-2023-29680.json) (`2025-01-30T19:15:12.690`) - [CVE-2023-30455](CVE-2023/CVE-2023-304xx/CVE-2023-30455.json) (`2025-01-30T21:15:12.490`)
- [CVE-2023-29681](CVE-2023/CVE-2023-296xx/CVE-2023-29681.json) (`2025-01-30T19:15:12.900`) - [CVE-2023-31290](CVE-2023/CVE-2023-312xx/CVE-2023-31290.json) (`2025-01-30T21:15:12.700`)
- [CVE-2023-30123](CVE-2023/CVE-2023-301xx/CVE-2023-30123.json) (`2025-01-30T20:15:31.857`) - [CVE-2024-12085](CVE-2024/CVE-2024-120xx/CVE-2024-12085.json) (`2025-01-30T22:15:08.410`)
- [CVE-2023-31486](CVE-2023/CVE-2023-314xx/CVE-2023-31486.json) (`2025-01-30T20:15:32.297`) - [CVE-2024-13269](CVE-2024/CVE-2024-132xx/CVE-2024-13269.json) (`2025-01-30T22:15:08.550`)
- [CVE-2024-35633](CVE-2024/CVE-2024-356xx/CVE-2024-35633.json) (`2025-01-30T19:52:10.193`) - [CVE-2024-13308](CVE-2024/CVE-2024-133xx/CVE-2024-13308.json) (`2025-01-30T22:15:08.723`)
- [CVE-2024-4697](CVE-2024/CVE-2024-46xx/CVE-2024-4697.json) (`2025-01-30T19:43:10.207`) - [CVE-2024-13309](CVE-2024/CVE-2024-133xx/CVE-2024-13309.json) (`2025-01-30T22:15:08.880`)
- [CVE-2025-24113](CVE-2025/CVE-2025-241xx/CVE-2025-24113.json) (`2025-01-30T19:10:53.077`) - [CVE-2024-1488](CVE-2024/CVE-2024-14xx/CVE-2024-1488.json) (`2025-01-30T22:15:09.037`)
- [CVE-2024-54156](CVE-2024/CVE-2024-541xx/CVE-2024-54156.json) (`2025-01-30T21:46:25.813`)
- [CVE-2024-54157](CVE-2024/CVE-2024-541xx/CVE-2024-54157.json) (`2025-01-30T21:47:10.683`)
- [CVE-2024-54158](CVE-2024/CVE-2024-541xx/CVE-2024-54158.json) (`2025-01-30T21:50:32.770`)
- [CVE-2024-57276](CVE-2024/CVE-2024-572xx/CVE-2024-57276.json) (`2025-01-30T22:15:09.297`)
- [CVE-2025-0241](CVE-2025/CVE-2025-02xx/CVE-2025-0241.json) (`2025-01-30T22:15:09.700`)
- [CVE-2025-24099](CVE-2025/CVE-2025-240xx/CVE-2025-24099.json) (`2025-01-30T22:15:10.160`)
- [CVE-2025-24456](CVE-2025/CVE-2025-244xx/CVE-2025-24456.json) (`2025-01-30T21:28:52.003`)
- [CVE-2025-24457](CVE-2025/CVE-2025-244xx/CVE-2025-24457.json) (`2025-01-30T21:31:24.150`)
- [CVE-2025-24458](CVE-2025/CVE-2025-244xx/CVE-2025-24458.json) (`2025-01-30T21:35:05.127`)
- [CVE-2025-24459](CVE-2025/CVE-2025-244xx/CVE-2025-24459.json) (`2025-01-30T21:22:22.917`)
- [CVE-2025-24460](CVE-2025/CVE-2025-244xx/CVE-2025-24460.json) (`2025-01-30T21:25:18.337`)
- [CVE-2025-24461](CVE-2025/CVE-2025-244xx/CVE-2025-24461.json) (`2025-01-30T21:26:17.583`)
## Download and Usage ## Download and Usage

View File

@ -207471,7 +207471,7 @@ CVE-2022-41397,0,0,e550e999db9fb97f17a47593dc51cf6c030770f72f449972298740d3093e2
CVE-2022-41398,0,0,c17218acd420ff655b26811137f78a5661b0edf354c55ad9ff3d225542cc956e,2024-11-21T07:23:09.297000 CVE-2022-41398,0,0,c17218acd420ff655b26811137f78a5661b0edf354c55ad9ff3d225542cc956e,2024-11-21T07:23:09.297000
CVE-2022-41399,0,0,fcc852656cb71fcabc26dc07cae79fcdb4063aa98e94541d9d75741dded7cecf,2024-11-21T07:23:09.440000 CVE-2022-41399,0,0,fcc852656cb71fcabc26dc07cae79fcdb4063aa98e94541d9d75741dded7cecf,2024-11-21T07:23:09.440000
CVE-2022-4140,0,0,7e63f4a6ccaabd415fca8d4da1a93c4238ce031863fb255cdc6459952944a879,2024-11-21T07:34:39.223000 CVE-2022-4140,0,0,7e63f4a6ccaabd415fca8d4da1a93c4238ce031863fb255cdc6459952944a879,2024-11-21T07:34:39.223000
CVE-2022-41400,0,0,e66ae562bf6f123d22a26c5862571d1ba6606e3e2d4692e9c9e43aca10aacfc8,2024-11-21T07:23:09.593000 CVE-2022-41400,0,1,b470023b601676d4a30a303d35e0a2b5766f41b951dc4f2c3a182bc32261e6f1,2025-01-30T21:15:09.157000
CVE-2022-41401,0,0,f6dc1a80aa2c4c3b1e1657937140fae471690a1cc072966b25f9a2e8573d6694,2024-11-21T07:23:09.723000 CVE-2022-41401,0,0,f6dc1a80aa2c4c3b1e1657937140fae471690a1cc072966b25f9a2e8573d6694,2024-11-21T07:23:09.723000
CVE-2022-41403,0,0,0086c7298073cbccbda5a8f09c32b1d1dbb0d6d1030e2855337110eb05e244d0,2024-11-21T07:23:09.880000 CVE-2022-41403,0,0,0086c7298073cbccbda5a8f09c32b1d1dbb0d6d1030e2855337110eb05e244d0,2024-11-21T07:23:09.880000
CVE-2022-41404,0,0,a5cb6dc1041f1669e9e1adb6dd7a90b0e9e235a9fc2ddaa84ffd2c30379279a5,2024-11-21T07:23:10.010000 CVE-2022-41404,0,0,a5cb6dc1041f1669e9e1adb6dd7a90b0e9e235a9fc2ddaa84ffd2c30379279a5,2024-11-21T07:23:10.010000
@ -214619,7 +214619,7 @@ CVE-2023-1522,0,0,070dcf9d4bee913fff5d64a61e497177354768261de777323e89038b498e33
CVE-2023-1523,0,0,e33d8037be249eb9c37a3baeaa357b5ce6cf643d512a05007dcdf784033b647c,2024-11-21T07:39:21.537000 CVE-2023-1523,0,0,e33d8037be249eb9c37a3baeaa357b5ce6cf643d512a05007dcdf784033b647c,2024-11-21T07:39:21.537000
CVE-2023-1524,0,0,f8b678f6be7ad1e8e7316c0ff029f2f0b1c061101505f9c1a3fb4ce2fdbd092d,2025-01-10T21:15:10.800000 CVE-2023-1524,0,0,f8b678f6be7ad1e8e7316c0ff029f2f0b1c061101505f9c1a3fb4ce2fdbd092d,2025-01-10T21:15:10.800000
CVE-2023-1525,0,0,87c70f3d61d61d75374dcd01bd6c995692b55b602d7e76a135e18fad1943c07f,2025-01-30T15:15:12.910000 CVE-2023-1525,0,0,87c70f3d61d61d75374dcd01bd6c995692b55b602d7e76a135e18fad1943c07f,2025-01-30T15:15:12.910000
CVE-2023-1526,0,1,96b8bf57979dbc863563294472f67f71b675e2ae3fec7e648b659714a8a27702,2025-01-30T20:15:30.230000 CVE-2023-1526,0,0,96b8bf57979dbc863563294472f67f71b675e2ae3fec7e648b659714a8a27702,2025-01-30T20:15:30.230000
CVE-2023-1527,0,0,df9e594ef91e55df45549cbbbe7ee59c84351454cd8897cabe1194089effbb36,2024-11-21T07:39:22.037000 CVE-2023-1527,0,0,df9e594ef91e55df45549cbbbe7ee59c84351454cd8897cabe1194089effbb36,2024-11-21T07:39:22.037000
CVE-2023-1528,0,0,16b4cebb9dd63d94e0854c1038605ed283b1f79a7036d21e1aa4daaf763ab7c6,2024-11-21T07:39:22.163000 CVE-2023-1528,0,0,16b4cebb9dd63d94e0854c1038605ed283b1f79a7036d21e1aa4daaf763ab7c6,2024-11-21T07:39:22.163000
CVE-2023-1529,0,0,2487285e765808b0f7ba1f72e36427b931583b7d2d6f3e08e8c267fcf3f4be2a,2024-11-21T07:39:22.407000 CVE-2023-1529,0,0,2487285e765808b0f7ba1f72e36427b931583b7d2d6f3e08e8c267fcf3f4be2a,2024-11-21T07:39:22.407000
@ -218701,7 +218701,7 @@ CVE-2023-24256,0,0,ab94b83dee58fd204888899d968128cc2e8cfb1fe9d90e9913108287ee7d6
CVE-2023-24258,0,0,c560e94249e7effb2fba83ba9a90735af30e031ae8bca37a27f2e5c6457522ef,2024-11-21T07:47:38.410000 CVE-2023-24258,0,0,c560e94249e7effb2fba83ba9a90735af30e031ae8bca37a27f2e5c6457522ef,2024-11-21T07:47:38.410000
CVE-2023-2426,0,0,ef02528cf3f86e2dade0f21ec20e5bc5ef91f7d9f0dafb0b0a6d4993b908e464,2024-11-21T07:58:35.860000 CVE-2023-2426,0,0,ef02528cf3f86e2dade0f21ec20e5bc5ef91f7d9f0dafb0b0a6d4993b908e464,2024-11-21T07:58:35.860000
CVE-2023-24261,0,0,1df1249714b381fb797a02b61181770e71af0c6f3534b72a552b166bc02cf9fa,2024-12-06T20:15:20.260000 CVE-2023-24261,0,0,1df1249714b381fb797a02b61181770e71af0c6f3534b72a552b166bc02cf9fa,2024-12-06T20:15:20.260000
CVE-2023-24269,0,0,f48af64cfd982b88f7a378571f946d21d8722e142349c9b7ae16fcb1b805aa2e,2024-11-21T07:47:38.710000 CVE-2023-24269,0,1,cad8a6e2e2ae03275129640ff93a4a599628066511c1c528afaca1d9bef90fe9,2025-01-30T21:15:09.913000
CVE-2023-2427,0,0,cc7634109d3dc8efda5374a98b8468e9436866ef3fb52d0740fea4b0f208142c,2024-11-21T07:58:35.980000 CVE-2023-2427,0,0,cc7634109d3dc8efda5374a98b8468e9436866ef3fb52d0740fea4b0f208142c,2024-11-21T07:58:35.980000
CVE-2023-24276,0,0,67044dbae195360ca724641eac5e1a7bea343e1ce78ece2a40996fd1418543cb,2024-11-21T07:47:38.850000 CVE-2023-24276,0,0,67044dbae195360ca724641eac5e1a7bea343e1ce78ece2a40996fd1418543cb,2024-11-21T07:47:38.850000
CVE-2023-24278,0,0,ea2aba4c7ef6892eaabe0ca8ca8a379b85908d877edfb3c6028c5a568eb0a3f0,2024-11-21T07:47:38.993000 CVE-2023-24278,0,0,ea2aba4c7ef6892eaabe0ca8ca8a379b85908d877edfb3c6028c5a568eb0a3f0,2024-11-21T07:47:38.993000
@ -221660,9 +221660,9 @@ CVE-2023-27968,0,0,d4ae6b7569d5b9f939ef1dc58eac523afec32ff9892f263680ad6667e5edd
CVE-2023-27969,0,0,b14fe3920ce4e5145aeb4a2fd9b653cb023aca86c3063a47505324ad70d2a67f,2025-01-29T16:15:40.977000 CVE-2023-27969,0,0,b14fe3920ce4e5145aeb4a2fd9b653cb023aca86c3063a47505324ad70d2a67f,2025-01-29T16:15:40.977000
CVE-2023-2797,0,0,fb89d0dd696fa3fd3bf50998e2011f08d07f94aacecb091584283fafb9123a12,2024-11-21T07:59:18.557000 CVE-2023-2797,0,0,fb89d0dd696fa3fd3bf50998e2011f08d07f94aacecb091584283fafb9123a12,2024-11-21T07:59:18.557000
CVE-2023-27970,0,0,7f6a3a9f3ad0761499e2da341caa65ba339cee5161ff202ac656ff31b834ed66,2025-01-29T16:15:41.147000 CVE-2023-27970,0,0,7f6a3a9f3ad0761499e2da341caa65ba339cee5161ff202ac656ff31b834ed66,2025-01-29T16:15:41.147000
CVE-2023-27971,0,0,697871038e9f195dda48b8c3a640aa8bbf063c21a5ff59442a2ac68d2ea6c782,2024-11-21T07:53:50.490000 CVE-2023-27971,0,1,f3547f8f1fc06fdd31c84236d22098a7b906bb7ffd0e1b4e6ad04ca2e328e5d7,2025-01-30T21:15:10.260000
CVE-2023-27972,0,1,7ab67790d615e4c8b945a6af12e8e64fd25bf0b85ec30b3b9d0757f78917e73f,2025-01-30T20:15:31.307000 CVE-2023-27972,0,0,7ab67790d615e4c8b945a6af12e8e64fd25bf0b85ec30b3b9d0757f78917e73f,2025-01-30T20:15:31.307000
CVE-2023-27973,0,1,b8493437848190632d4b12d9f6e464f837fffb2c5d6bf69bd85e93768a5a9d6d,2025-01-30T19:15:09.283000 CVE-2023-27973,0,0,b8493437848190632d4b12d9f6e464f837fffb2c5d6bf69bd85e93768a5a9d6d,2025-01-30T19:15:09.283000
CVE-2023-27974,0,0,3ad1eff0022adec35468a53c0c2dda6cdf1c1306b3acd8c5eb169ac126c3b376,2024-11-21T07:53:50.983000 CVE-2023-27974,0,0,3ad1eff0022adec35468a53c0c2dda6cdf1c1306b3acd8c5eb169ac126c3b376,2024-11-21T07:53:50.983000
CVE-2023-27975,0,0,cad6a6a46caf1f602a761162c88f04c91eb374d47dcef656f5e96ae11a1132f6,2024-12-11T19:33:27.327000 CVE-2023-27975,0,0,cad6a6a46caf1f602a761162c88f04c91eb374d47dcef656f5e96ae11a1132f6,2024-12-11T19:33:27.327000
CVE-2023-27976,0,0,c9e7b6414182280b5321204dda9a565d1b11b5480c1526060214744a17382832,2024-11-21T07:53:51.340000 CVE-2023-27976,0,0,c9e7b6414182280b5321204dda9a565d1b11b5480c1526060214744a17382832,2024-11-21T07:53:51.340000
@ -222504,7 +222504,7 @@ CVE-2023-28818,0,0,79d36f0c7cbe3e9da98253142830e529bc5af2bf12294a4aeadb32b61c200
CVE-2023-28819,0,0,bf58c4e71ab50881bb2ffbc84d1c7fa3a8784d89494821093a5ed0aaa8ee47b9,2024-11-21T07:56:04.597000 CVE-2023-28819,0,0,bf58c4e71ab50881bb2ffbc84d1c7fa3a8784d89494821093a5ed0aaa8ee47b9,2024-11-21T07:56:04.597000
CVE-2023-2882,0,0,547a60c36b1f71c0384a0e2edbdc3677ea8064a56e3eb94f89b4b3f016b80700,2024-11-21T07:59:29.350000 CVE-2023-2882,0,0,547a60c36b1f71c0384a0e2edbdc3677ea8064a56e3eb94f89b4b3f016b80700,2024-11-21T07:59:29.350000
CVE-2023-28820,0,0,e10d4a00308ba1ab34db498a843935a90acbe0ade20fa15055d9a0ff7f590453,2024-11-21T07:56:04.757000 CVE-2023-28820,0,0,e10d4a00308ba1ab34db498a843935a90acbe0ade20fa15055d9a0ff7f590453,2024-11-21T07:56:04.757000
CVE-2023-28821,0,0,3b23d992637d21ecb74fbbedbe80ce17d8ac3cda960cc9ac7ffb7824e8f934ee,2024-11-21T07:56:04.903000 CVE-2023-28821,0,1,afa76c8a009539aae0198682bc90e862e42f3a76d4259436095052fa1a40e0cc,2025-01-30T21:15:10.470000
CVE-2023-28823,0,0,b38855621f61c058dba0e2d9c38b33206b84c1d843699145c318ad3909e98d3c,2024-11-21T07:56:05.053000 CVE-2023-28823,0,0,b38855621f61c058dba0e2d9c38b33206b84c1d843699145c318ad3909e98d3c,2024-11-21T07:56:05.053000
CVE-2023-28824,0,0,8caf82701251f8229a6994b01253e38294b5b02a55174bcabc24c5ed5118a657,2025-01-09T20:15:32.740000 CVE-2023-28824,0,0,8caf82701251f8229a6994b01253e38294b5b02a55174bcabc24c5ed5118a657,2025-01-09T20:15:32.740000
CVE-2023-28826,0,0,a9e9528aa9c3972fd09362058c3be3f967ed732ddc79dfa5a2473b385e1b19c1,2024-12-20T17:09:10.193000 CVE-2023-28826,0,0,a9e9528aa9c3972fd09362058c3be3f967ed732ddc79dfa5a2473b385e1b19c1,2024-12-20T17:09:10.193000
@ -222564,7 +222564,7 @@ CVE-2023-28876,0,0,c1806b7567a07b6cd5bad89db8f8e663f0abfbc4dc05ab4f0a81a9cd8dd1c
CVE-2023-28877,0,0,627be02d2c5299af68f11f8c96f6b7aada4171df85e2baa2b1f21f3a8ad679d4,2024-11-21T07:56:12.927000 CVE-2023-28877,0,0,627be02d2c5299af68f11f8c96f6b7aada4171df85e2baa2b1f21f3a8ad679d4,2024-11-21T07:56:12.927000
CVE-2023-28879,0,0,60cfcaff1525c3d961f9d460730fe7f9b4cdfbbd84fe1d0f2487d7d6fb6987b6,2024-11-21T07:56:13.057000 CVE-2023-28879,0,0,60cfcaff1525c3d961f9d460730fe7f9b4cdfbbd84fe1d0f2487d7d6fb6987b6,2024-11-21T07:56:13.057000
CVE-2023-2888,0,0,733c180cbb32ecf6bf022f0642b31e69e75e65e424d1dfab8b5653572373f8cd,2024-11-21T07:59:30.160000 CVE-2023-2888,0,0,733c180cbb32ecf6bf022f0642b31e69e75e65e424d1dfab8b5653572373f8cd,2024-11-21T07:59:30.160000
CVE-2023-28882,0,0,c5bdbfa5e7447d196129d5a1545ef5d61fea128b86b10c66c438ea6977ab503d,2024-11-21T07:56:13.220000 CVE-2023-28882,0,1,bc3618c2bba907bca3f9aa9f8805ff257885286929515e723c141b37d4fc5cf0,2025-01-30T21:15:10.640000
CVE-2023-28883,0,0,13fb4d539b10aabd1da3181f43ed36ef1e089eb05afaff3d3ea2e3bab420b8e6,2024-11-21T07:56:13.360000 CVE-2023-28883,0,0,13fb4d539b10aabd1da3181f43ed36ef1e089eb05afaff3d3ea2e3bab420b8e6,2024-11-21T07:56:13.360000
CVE-2023-28884,0,0,4f01d869cc02df48ff436a2fda2a2686d4bd4e20ae90aed5def51856ad72acc5,2024-11-21T07:56:13.503000 CVE-2023-28884,0,0,4f01d869cc02df48ff436a2fda2a2686d4bd4e20ae90aed5def51856ad72acc5,2024-11-21T07:56:13.503000
CVE-2023-28885,0,0,1bfa45a7cd263e2b756f199a2cb3130bf8cccc6aef28faf9f20192196ba060d3,2024-11-21T07:56:13.647000 CVE-2023-28885,0,0,1bfa45a7cd263e2b756f199a2cb3130bf8cccc6aef28faf9f20192196ba060d3,2024-11-21T07:56:13.647000
@ -222881,7 +222881,7 @@ CVE-2023-2926,0,0,e170779cbdb918f6b82fda64b55ac82af1d75547be3a52cc9653ae8c1e1011
CVE-2023-29260,0,0,5408599e6cd86b2024a7083620ca9e1157b82ab64940c6b91e6344545ff43157,2024-11-21T07:56:46.190000 CVE-2023-29260,0,0,5408599e6cd86b2024a7083620ca9e1157b82ab64940c6b91e6344545ff43157,2024-11-21T07:56:46.190000
CVE-2023-29261,0,0,000cb61df9c131f78dc46594dae178995161d7f97bedafeb6092b59e914e453a,2024-11-21T07:56:46.300000 CVE-2023-29261,0,0,000cb61df9c131f78dc46594dae178995161d7f97bedafeb6092b59e914e453a,2024-11-21T07:56:46.300000
CVE-2023-29267,0,0,f1d5e4709b78cdc02762d88ffdde6af1b8b3c8f402c90acb9448493f3d4a9426,2024-11-21T07:56:46.417000 CVE-2023-29267,0,0,f1d5e4709b78cdc02762d88ffdde6af1b8b3c8f402c90acb9448493f3d4a9426,2024-11-21T07:56:46.417000
CVE-2023-29268,0,0,1fefceb330f7b63e4a39a102ebde4873626aa6b341fa88e9a8393e3f0ed1912f,2024-11-21T07:56:46.553000 CVE-2023-29268,0,1,a7d326511142a04650060778e408b03f298f713386898c6fb0b233b9b2dafebf,2025-01-30T22:15:07.977000
CVE-2023-2927,0,0,f90bf785db0896781f165401b7930a7505d713ae2a675c0fc18800b00f36de39,2024-11-21T07:59:34.940000 CVE-2023-2927,0,0,f90bf785db0896781f165401b7930a7505d713ae2a675c0fc18800b00f36de39,2024-11-21T07:59:34.940000
CVE-2023-29273,0,0,3500ec904dda178d9f2b96c75ba1aa9e15356cce2d5939ccbde1d811b000d8b0,2024-11-21T07:56:46.677000 CVE-2023-29273,0,0,3500ec904dda178d9f2b96c75ba1aa9e15356cce2d5939ccbde1d811b000d8b0,2024-11-21T07:56:46.677000
CVE-2023-29274,0,0,674c4f2006d12755378e1ad4454840e82cbf88b3d7ac122ced0d5e22dc37afad,2024-11-21T07:56:46.780000 CVE-2023-29274,0,0,674c4f2006d12755378e1ad4454840e82cbf88b3d7ac122ced0d5e22dc37afad,2024-11-21T07:56:46.780000
@ -223203,18 +223203,18 @@ CVE-2023-29635,0,0,7b7e122f0d8c9b413f472665250e3516b44a5ecfd295ecf840be5aaed663e
CVE-2023-29636,0,0,4b9a9a6e898f80609b34c7e02aaa5b4343653cad5f96db32b805d904ca44b12f,2025-01-30T17:15:14.333000 CVE-2023-29636,0,0,4b9a9a6e898f80609b34c7e02aaa5b4343653cad5f96db32b805d904ca44b12f,2025-01-30T17:15:14.333000
CVE-2023-29637,0,0,c1e444d3c369fd37ce81c4fe1917992d80cada9fcd11c4f6d20198373be12d0c,2025-01-30T17:15:14.483000 CVE-2023-29637,0,0,c1e444d3c369fd37ce81c4fe1917992d80cada9fcd11c4f6d20198373be12d0c,2025-01-30T17:15:14.483000
CVE-2023-29638,0,0,e50ce1c402f4f8b6e90b82f00d1b01d2f40bb391b5df29154b81d06ca1e488d3,2025-01-30T17:15:14.640000 CVE-2023-29638,0,0,e50ce1c402f4f8b6e90b82f00d1b01d2f40bb391b5df29154b81d06ca1e488d3,2025-01-30T17:15:14.640000
CVE-2023-29639,0,1,23dc52eb44854aa5ff0c590d1d07f20c87e31b185260618e19170ae79ed5ccf3,2025-01-30T19:15:11.527000 CVE-2023-29639,0,0,23dc52eb44854aa5ff0c590d1d07f20c87e31b185260618e19170ae79ed5ccf3,2025-01-30T19:15:11.527000
CVE-2023-2964,0,0,1d3278bf302564765627761894f402290b8c52e46be3d5e4f4bb1deddc4a2b2f,2024-11-21T07:59:39.620000 CVE-2023-2964,0,0,1d3278bf302564765627761894f402290b8c52e46be3d5e4f4bb1deddc4a2b2f,2024-11-21T07:59:39.620000
CVE-2023-29641,0,1,a6a072ff9104e0b27a3d1b50525dfba2aecbe9fae2c0a14df6068163f9557db4,2025-01-30T19:15:12.073000 CVE-2023-29641,0,0,a6a072ff9104e0b27a3d1b50525dfba2aecbe9fae2c0a14df6068163f9557db4,2025-01-30T19:15:12.073000
CVE-2023-29643,0,1,8cab4df3005126ac1023ad61113e5caf336627d9fc525087584bb7391abbf578,2025-01-30T19:15:12.503000 CVE-2023-29643,0,0,8cab4df3005126ac1023ad61113e5caf336627d9fc525087584bb7391abbf578,2025-01-30T19:15:12.503000
CVE-2023-29656,0,0,a190f968c9b1e7640b2ec05941bfad4eda34e6985b30539e83a1f8e9649a3b3b,2024-11-21T07:57:22.500000 CVE-2023-29656,0,0,a190f968c9b1e7640b2ec05941bfad4eda34e6985b30539e83a1f8e9649a3b3b,2024-11-21T07:57:22.500000
CVE-2023-29657,0,0,aa8f581305ab53803794f1539ce0a704fb05194c2ac57e21afcf877a051f25e0,2025-01-24T20:15:29.760000 CVE-2023-29657,0,0,aa8f581305ab53803794f1539ce0a704fb05194c2ac57e21afcf877a051f25e0,2025-01-24T20:15:29.760000
CVE-2023-29659,0,0,132ae2d10add93c7773c8520ebaa4453b39811fd3670fff631ea0b0365f174c7,2025-01-29T20:15:31.107000 CVE-2023-29659,0,0,132ae2d10add93c7773c8520ebaa4453b39811fd3670fff631ea0b0365f174c7,2025-01-29T20:15:31.107000
CVE-2023-29665,0,0,dc5bcda9680e3e806a58c210d638989728a9beeb191b9384e06e9fdf34c58cb4,2024-11-21T07:57:22.933000 CVE-2023-29665,0,0,dc5bcda9680e3e806a58c210d638989728a9beeb191b9384e06e9fdf34c58cb4,2024-11-21T07:57:22.933000
CVE-2023-2967,0,0,68b3934288b12b39ac75de572ea12e8a00d7bce5b33663c2007fc9474a10f59f,2024-11-21T07:59:39.733000 CVE-2023-2967,0,0,68b3934288b12b39ac75de572ea12e8a00d7bce5b33663c2007fc9474a10f59f,2024-11-21T07:59:39.733000
CVE-2023-2968,0,0,a3845e13a87af48a0e68b2259b826b32bb5677da3feff4e6d7abb46b7f02345a,2024-11-21T07:59:39.843000 CVE-2023-2968,0,0,a3845e13a87af48a0e68b2259b826b32bb5677da3feff4e6d7abb46b7f02345a,2024-11-21T07:59:39.843000
CVE-2023-29680,0,1,2d798067b093f5651bf6d94d903f17f76bb8195866a4e67223d7d18f32cc04c7,2025-01-30T19:15:12.690000 CVE-2023-29680,0,0,2d798067b093f5651bf6d94d903f17f76bb8195866a4e67223d7d18f32cc04c7,2025-01-30T19:15:12.690000
CVE-2023-29681,0,1,dfc9f188a3452f4abeaff8d760933a4e34a3d929f9c867c08e0462693d2cf08f,2025-01-30T19:15:12.900000 CVE-2023-29681,0,0,dfc9f188a3452f4abeaff8d760933a4e34a3d929f9c867c08e0462693d2cf08f,2025-01-30T19:15:12.900000
CVE-2023-29689,0,0,962e47d4421172abd4f6a1330537e1d28be98a1502580c517300e3c2b2ee7d61,2024-11-21T07:57:23.383000 CVE-2023-29689,0,0,962e47d4421172abd4f6a1330537e1d28be98a1502580c517300e3c2b2ee7d61,2024-11-21T07:57:23.383000
CVE-2023-29693,0,0,709f39f2818705690323691653131c15063e3d7ec3771ad2324a6717c9d9590f,2025-01-29T19:15:16.267000 CVE-2023-29693,0,0,709f39f2818705690323691653131c15063e3d7ec3771ad2324a6717c9d9590f,2025-01-29T19:15:16.267000
CVE-2023-29696,0,0,eca44308ce4c869f65e5e1aa1a665534ee73c24004fe10991f0dfa64898fe4e0,2025-01-29T19:15:16.473000 CVE-2023-29696,0,0,eca44308ce4c869f65e5e1aa1a665534ee73c24004fe10991f0dfa64898fe4e0,2025-01-29T19:15:16.473000
@ -223293,7 +223293,7 @@ CVE-2023-29805,0,0,eab8f6c7a340db7effd1da4e68fd842071ac192aa93dc09c9185af7e7d598
CVE-2023-29808,0,0,4b785c8755117024629672fd0053300c9be30727acd66fbd1146301239d1c1d5,2025-01-24T16:15:29.357000 CVE-2023-29808,0,0,4b785c8755117024629672fd0053300c9be30727acd66fbd1146301239d1c1d5,2025-01-24T16:15:29.357000
CVE-2023-29809,0,0,f2324c252c4e3b480546fe0c11564d7532207b0aa3e092380e867cca3e7d94ff,2025-01-24T16:15:29.680000 CVE-2023-29809,0,0,f2324c252c4e3b480546fe0c11564d7532207b0aa3e092380e867cca3e7d94ff,2025-01-24T16:15:29.680000
CVE-2023-2981,0,0,9fb4d1314e0567ac8aec055caebe6d7a58f037e10eefe707bba2b1061e47c270,2024-11-21T07:59:41.567000 CVE-2023-2981,0,0,9fb4d1314e0567ac8aec055caebe6d7a58f037e10eefe707bba2b1061e47c270,2024-11-21T07:59:41.567000
CVE-2023-29815,0,0,b2eae5a9d28b68d854f53e61f1466bb75eb7be05b1159364fb38e6c41e10819f,2024-11-21T07:57:32.690000 CVE-2023-29815,0,1,54dad311a1ec1a264294e3060385a6f5077ffc3a2954ca147f88d5436f80b641,2025-01-30T21:15:10.877000
CVE-2023-29818,0,0,2e150953091693314133e4abcfacfde113a23cd4be7a162e0146616bfc82af3a,2025-01-24T16:15:29.943000 CVE-2023-29818,0,0,2e150953091693314133e4abcfacfde113a23cd4be7a162e0146616bfc82af3a,2025-01-24T16:15:29.943000
CVE-2023-29819,0,0,42a3e498f4b71e6c349fc664a2c1989d31ee4f09c12e281cbe701df604c85826,2025-01-24T16:15:30.210000 CVE-2023-29819,0,0,42a3e498f4b71e6c349fc664a2c1989d31ee4f09c12e281cbe701df604c85826,2025-01-24T16:15:30.210000
CVE-2023-2982,0,0,8f7ccf530e35fb0c640011a15ad5fe3228bd641c44c701174542b27028f37cf4,2024-11-21T07:59:41.720000 CVE-2023-2982,0,0,8f7ccf530e35fb0c640011a15ad5fe3228bd641c44c701174542b27028f37cf4,2024-11-21T07:59:41.720000
@ -223434,7 +223434,7 @@ CVE-2023-30111,0,0,ae639ee4dbb45cc529dd569295ef6283beb3098da5dab82c355bdd3331498
CVE-2023-30112,0,0,eb88d49610e14bb452be0cdc8abb09b062387d49578867ecc9f658123761c3a4,2024-11-21T07:59:48.637000 CVE-2023-30112,0,0,eb88d49610e14bb452be0cdc8abb09b062387d49578867ecc9f658123761c3a4,2024-11-21T07:59:48.637000
CVE-2023-3012,0,0,9b668710106159ca738a322b3cf3ca60bc39f1660572ac1a75fa4a3a7a6c2b75,2024-11-21T08:16:14.317000 CVE-2023-3012,0,0,9b668710106159ca738a322b3cf3ca60bc39f1660572ac1a75fa4a3a7a6c2b75,2024-11-21T08:16:14.317000
CVE-2023-30122,0,0,cf1197ad825b0483d6b8203bdfaf9c646b0bc2395f7c3bbd304572d272957e5e,2025-01-29T17:15:24.350000 CVE-2023-30122,0,0,cf1197ad825b0483d6b8203bdfaf9c646b0bc2395f7c3bbd304572d272957e5e,2025-01-29T17:15:24.350000
CVE-2023-30123,0,1,74eca865bc948a86533b39002f306fafcb68a7a5107a6ae9888812e82a125bdf,2025-01-30T20:15:31.857000 CVE-2023-30123,0,0,74eca865bc948a86533b39002f306fafcb68a7a5107a6ae9888812e82a125bdf,2025-01-30T20:15:31.857000
CVE-2023-30124,0,0,f6d6551541f17153a38fa0c2056b81805b77294c78e3ebdf6e8a039b5b0025e3,2025-01-23T20:15:27.850000 CVE-2023-30124,0,0,f6d6551541f17153a38fa0c2056b81805b77294c78e3ebdf6e8a039b5b0025e3,2025-01-23T20:15:27.850000
CVE-2023-30125,0,0,ddfbbcc2295c6563d91cd153a8cffb73381935c4f3636f46ef8f6367ce01a373,2024-11-21T07:59:49.257000 CVE-2023-30125,0,0,ddfbbcc2295c6563d91cd153a8cffb73381935c4f3636f46ef8f6367ce01a373,2024-11-21T07:59:49.257000
CVE-2023-3013,0,0,509acd34da124c1d7d9ccb7ed0713e0819213ff1b5d2ad46c88df5b81dbc0538,2024-11-21T08:16:14.467000 CVE-2023-3013,0,0,509acd34da124c1d7d9ccb7ed0713e0819213ff1b5d2ad46c88df5b81dbc0538,2024-11-21T08:16:14.467000
@ -223477,8 +223477,8 @@ CVE-2023-30199,0,0,f29f761dc02750e028aca8343aa3ac92342336f18e6c3f4c4724ff2bb8be3
CVE-2023-3020,0,0,dc6b0a3b052e0c37cf22c64ca8f4745b185c0203822cf010875cad2a22a94e3a,2024-11-21T08:16:15.523000 CVE-2023-3020,0,0,dc6b0a3b052e0c37cf22c64ca8f4745b185c0203822cf010875cad2a22a94e3a,2024-11-21T08:16:15.523000
CVE-2023-30200,0,0,fb6b9c5a436448ae06419b546257db7987ffc421ea2ea2af3fac0b985d318608,2024-11-21T07:59:53.940000 CVE-2023-30200,0,0,fb6b9c5a436448ae06419b546257db7987ffc421ea2ea2af3fac0b985d318608,2024-11-21T07:59:53.940000
CVE-2023-30203,0,0,db5e5cb3e727c16ca621fa367686a24b4a325fdb3b5ae291e095fa72773bca43,2025-01-29T21:15:19.083000 CVE-2023-30203,0,0,db5e5cb3e727c16ca621fa367686a24b4a325fdb3b5ae291e095fa72773bca43,2025-01-29T21:15:19.083000
CVE-2023-30204,0,0,84b81496405155a1e4b270d2b3945fb8f6cff24839d57d0372100bc234eda985,2024-11-21T07:59:54.240000 CVE-2023-30204,0,1,d5ffcadcb8d15bfedbfb38f6fe262b7f90dac86d61a95305b0ddef65b3dbaa6f,2025-01-30T21:15:11.507000
CVE-2023-30205,0,0,94411d8885974287d109e5df893a6ff626175a36b0253832b634b59018d3dbe4,2024-11-21T07:59:54.377000 CVE-2023-30205,0,1,614d6f5b15d2f822c49fe7e35216e74c845bf51fc1f6080fd96b781b69d54905,2025-01-30T21:15:11.693000
CVE-2023-30207,0,0,e4e400d118227bc9bcc50b0f0195a26f7b5f119c4fb0fa579c8b46c178e9bc74,2024-11-21T07:59:54.520000 CVE-2023-30207,0,0,e4e400d118227bc9bcc50b0f0195a26f7b5f119c4fb0fa579c8b46c178e9bc74,2024-11-21T07:59:54.520000
CVE-2023-3021,0,0,39083733feaf1ca9158e423c2c5c309ee67b60700ade907df5cb34181f493ad9,2024-11-21T08:16:15.660000 CVE-2023-3021,0,0,39083733feaf1ca9158e423c2c5c309ee67b60700ade907df5cb34181f493ad9,2024-11-21T08:16:15.660000
CVE-2023-30210,0,0,6c1b077c53cde49a468f6661ba3c7e006d0afd4e39b08c3e1f95f6a495153e87,2024-11-21T07:59:54.673000 CVE-2023-30210,0,0,6c1b077c53cde49a468f6661ba3c7e006d0afd4e39b08c3e1f95f6a495153e87,2024-11-21T07:59:54.673000
@ -223521,7 +223521,7 @@ CVE-2023-30282,0,0,6199bbb0fff6b877509d0886de3b68999859c9b5ce34636b44c7531255493
CVE-2023-30285,0,0,b017c76829843f812705e981d9e63efeb2edeb15c827ffda1a53fea998af3178,2025-01-10T17:15:11.410000 CVE-2023-30285,0,0,b017c76829843f812705e981d9e63efeb2edeb15c827ffda1a53fea998af3178,2025-01-10T17:15:11.410000
CVE-2023-3029,0,0,58c4f4735b5d302f2156f5d47abc0e2a3b0bad61864afaca5f7bb668ac9ae636,2024-11-21T08:16:16.747000 CVE-2023-3029,0,0,58c4f4735b5d302f2156f5d47abc0e2a3b0bad61864afaca5f7bb668ac9ae636,2024-11-21T08:16:16.747000
CVE-2023-30297,0,0,80d95eb10669043c6c7c71c4ea5a34d6ceb46a1b738615f09e959374780bd9ac,2024-11-21T07:59:59.137000 CVE-2023-30297,0,0,80d95eb10669043c6c7c71c4ea5a34d6ceb46a1b738615f09e959374780bd9ac,2024-11-21T07:59:59.137000
CVE-2023-30300,0,0,e890e3ff6b42d2de8311bc8ad45d62bfa494e2f3577279edea119d2328c81f79,2024-11-21T07:59:59.290000 CVE-2023-30300,0,1,384b34c8970c8d94d27211f584968a001e6158aadffb2a719513f04e0e593772,2025-01-30T21:15:11.870000
CVE-2023-30305,0,0,efcc6031cb842cec6a10873af5c5020bf7f98f4c36b8622da4831b343c2d0a30,2024-11-21T07:59:59.433000 CVE-2023-30305,0,0,efcc6031cb842cec6a10873af5c5020bf7f98f4c36b8622da4831b343c2d0a30,2024-11-21T07:59:59.433000
CVE-2023-30306,0,0,c8f0f46b8ba8922a429dbfec91e18ff3a0965912d67d9956ce6e7220f019c740,2024-11-22T22:15:06.373000 CVE-2023-30306,0,0,c8f0f46b8ba8922a429dbfec91e18ff3a0965912d67d9956ce6e7220f019c740,2024-11-22T22:15:06.373000
CVE-2023-30307,0,0,087e9eab98b87d158cd636389adf77b228cd5ed4727022dd198802074c4f4fe8,2024-11-21T07:59:59.780000 CVE-2023-30307,0,0,087e9eab98b87d158cd636389adf77b228cd5ed4727022dd198802074c4f4fe8,2024-11-21T07:59:59.780000
@ -223584,7 +223584,7 @@ CVE-2023-30400,0,0,12950301b15d2ff0df9404bed25a6b84a57d9a17ff834ac2eba356cba5785
CVE-2023-30402,0,0,efa5059955c4d7e3b68dacb1538cae5e0c524acca0015b8971b4926f93dbd6aa,2024-11-21T08:00:07.747000 CVE-2023-30402,0,0,efa5059955c4d7e3b68dacb1538cae5e0c524acca0015b8971b4926f93dbd6aa,2024-11-21T08:00:07.747000
CVE-2023-30403,0,0,6646a770c6966c90e080a74c4537c3ee2429ae4a97d239a9f77e37d12b09fa48,2025-01-30T17:15:16.387000 CVE-2023-30403,0,0,6646a770c6966c90e080a74c4537c3ee2429ae4a97d239a9f77e37d12b09fa48,2025-01-30T17:15:16.387000
CVE-2023-30404,0,0,87b22d02f8d2dc3fb5adecb232d7bdadb45a7cec15c53d553846e4223dd2f9c5,2024-11-21T08:00:08.073000 CVE-2023-30404,0,0,87b22d02f8d2dc3fb5adecb232d7bdadb45a7cec15c53d553846e4223dd2f9c5,2024-11-21T08:00:08.073000
CVE-2023-30405,0,0,d308e1f015f226b1b626f7ff94eb00262640e4a5bad27494fff1cd9fe9039a81,2024-11-21T08:00:08.217000 CVE-2023-30405,0,1,f7e4fa427c57bcf1c9c6861612ffcad1ae14994e8d0a25ac5c7acb06b73af467,2025-01-30T21:15:12.067000
CVE-2023-30406,0,0,fa9afd5bd076e3e8831acab2919a774ba44387bc923f37b2837294e8b8e09705,2024-11-21T08:00:08.373000 CVE-2023-30406,0,0,fa9afd5bd076e3e8831acab2919a774ba44387bc923f37b2837294e8b8e09705,2024-11-21T08:00:08.373000
CVE-2023-30408,0,0,9c809e244a2ceda8f32503a1ce049bf7b134ed789f943a21ba335089c084de1f,2024-11-21T08:00:08.533000 CVE-2023-30408,0,0,9c809e244a2ceda8f32503a1ce049bf7b134ed789f943a21ba335089c084de1f,2024-11-21T08:00:08.533000
CVE-2023-3041,0,0,5d9735759b6eb180a5aec85a6a9af513a610cae56f1554b261f6c6d4655aa049,2024-11-21T08:16:18.350000 CVE-2023-3041,0,0,5d9735759b6eb180a5aec85a6a9af513a610cae56f1554b261f6c6d4655aa049,2024-11-21T08:16:18.350000
@ -223620,8 +223620,8 @@ CVE-2023-30450,0,0,e8abf2288be578f9aba31e86a7a71291da0ebac6855ef6c8dd30603a62411
CVE-2023-30451,0,0,8e73bc937560e2499ae7dd02dd63adee96d9b76893fb220c5930fcd72c859320,2024-11-21T08:00:12.673000 CVE-2023-30451,0,0,8e73bc937560e2499ae7dd02dd63adee96d9b76893fb220c5930fcd72c859320,2024-11-21T08:00:12.673000
CVE-2023-30452,0,0,7cc813c03671747dfd20433bfdf987765f42d3d9636d86717f2f69bbf4b598eb,2025-01-23T16:15:28.487000 CVE-2023-30452,0,0,7cc813c03671747dfd20433bfdf987765f42d3d9636d86717f2f69bbf4b598eb,2025-01-23T16:15:28.487000
CVE-2023-30453,0,0,926bc7eb7d121418cfa67de0f19eae48d919bef0dc4029cb8db196fab44a2a95,2024-12-12T18:15:22.400000 CVE-2023-30453,0,0,926bc7eb7d121418cfa67de0f19eae48d919bef0dc4029cb8db196fab44a2a95,2024-12-12T18:15:22.400000
CVE-2023-30454,0,0,c6fadb94020df9aaf92dc893b8ce24b95889eb58aec92ff2ca0bcf4372297d2d,2024-11-21T08:00:13.123000 CVE-2023-30454,0,1,3fafbb3121fab4c133d0302016abe464ea1509fe7e4e59f512a22beb3dc1babd,2025-01-30T21:15:12.300000
CVE-2023-30455,0,0,67590854388925a6ee11408360c4660ec765b5d5fb3440442ef818dd0e0bb85d,2024-11-21T08:00:13.273000 CVE-2023-30455,0,1,bb2ed26b995f4c7e22c1b6b92d8ddb92da99a13a854f4762cea43640b004fd91,2025-01-30T21:15:12.490000
CVE-2023-30456,0,0,582cc4837cac9e0c6425d36b5ca7cd4153d16811065c143c0f6c163ba2a87cb4,2024-11-21T08:00:13.423000 CVE-2023-30456,0,0,582cc4837cac9e0c6425d36b5ca7cd4153d16811065c143c0f6c163ba2a87cb4,2024-11-21T08:00:13.423000
CVE-2023-30458,0,0,09555f36350c1c2d55bf95b2d5ae168b57fbc294feac451796d2b438bf429edb,2024-11-21T08:00:13.580000 CVE-2023-30458,0,0,09555f36350c1c2d55bf95b2d5ae168b57fbc294feac451796d2b438bf429edb,2024-11-21T08:00:13.580000
CVE-2023-30459,0,0,1594b6a4d64fc4adace8fc7d42491da96f1bfb63eab0e0f9cc596f98b0207729,2024-11-21T08:00:13.730000 CVE-2023-30459,0,0,1594b6a4d64fc4adace8fc7d42491da96f1bfb63eab0e0f9cc596f98b0207729,2024-11-21T08:00:13.730000
@ -224375,7 +224375,7 @@ CVE-2023-31286,0,0,78567364971f63d5dc94c49ad0a4cb4faacaab1686439f1a823e21f28b851
CVE-2023-31287,0,0,3a03f62439a882d85b9a72ca261c059079bfd17741e815c49d4465abc1960857,2024-11-21T08:01:43.890000 CVE-2023-31287,0,0,3a03f62439a882d85b9a72ca261c059079bfd17741e815c49d4465abc1960857,2024-11-21T08:01:43.890000
CVE-2023-31289,0,0,b5289b010564c962b69e25a674ef9122b77cd431f84040e8589168ff372131e4,2024-11-21T08:01:44.020000 CVE-2023-31289,0,0,b5289b010564c962b69e25a674ef9122b77cd431f84040e8589168ff372131e4,2024-11-21T08:01:44.020000
CVE-2023-3129,0,0,d664dde9f63c31c193279cc3e3c97a69882c532883740cc20c888b8e54853ef5,2024-11-21T08:16:31.393000 CVE-2023-3129,0,0,d664dde9f63c31c193279cc3e3c97a69882c532883740cc20c888b8e54853ef5,2024-11-21T08:16:31.393000
CVE-2023-31290,0,0,cffcf74ec2fdf8c5b7fa9cc68f3500d69bea2adaf30ff3e096343990ee34cd3d,2024-11-21T08:01:44.153000 CVE-2023-31290,0,1,54d0c58d31ebc2dfa3a1bae530350c0c41097e12539308fff3fde2e94b846481,2025-01-30T21:15:12.700000
CVE-2023-31292,0,0,1d2a6f0e823d77efda2534865fa074b4a97ddd71fe364113839cf71749e04d69,2024-11-21T08:01:44.307000 CVE-2023-31292,0,0,1d2a6f0e823d77efda2534865fa074b4a97ddd71fe364113839cf71749e04d69,2024-11-21T08:01:44.307000
CVE-2023-31293,0,0,069c09646788d69fb7802dd78607017cdd7ec1d48e58ef379945478c23567200,2024-11-21T08:01:44.443000 CVE-2023-31293,0,0,069c09646788d69fb7802dd78607017cdd7ec1d48e58ef379945478c23567200,2024-11-21T08:01:44.443000
CVE-2023-31294,0,0,6ba11e240ce7af8f8728e2ecc2c891acf96c500b00abbf0921cb215dfb990c90,2024-11-21T08:01:44.580000 CVE-2023-31294,0,0,6ba11e240ce7af8f8728e2ecc2c891acf96c500b00abbf0921cb215dfb990c90,2024-11-21T08:01:44.580000
@ -224492,7 +224492,7 @@ CVE-2023-3148,0,0,9236ef71fc0458d505ab03b01d49be5b44ba8909a5ef5119004368313b8abe
CVE-2023-31483,0,0,90c896255a77971ac7375f5d97d33ae506954cddccbc35ddb5f2b069a45b2dc7,2024-11-21T08:01:57.570000 CVE-2023-31483,0,0,90c896255a77971ac7375f5d97d33ae506954cddccbc35ddb5f2b069a45b2dc7,2024-11-21T08:01:57.570000
CVE-2023-31484,0,0,ac8044426721e93fc87d0e5d5467129d6b0022bd19bc1007e3e36549118fd8cb,2024-11-21T08:01:57.707000 CVE-2023-31484,0,0,ac8044426721e93fc87d0e5d5467129d6b0022bd19bc1007e3e36549118fd8cb,2024-11-21T08:01:57.707000
CVE-2023-31485,0,0,d8b205f112088ed074b7d15996adcda6d085f8c031d20bf59e2e472a4c3a13c5,2024-11-21T08:01:57.940000 CVE-2023-31485,0,0,d8b205f112088ed074b7d15996adcda6d085f8c031d20bf59e2e472a4c3a13c5,2024-11-21T08:01:57.940000
CVE-2023-31486,0,1,d38250d2e093246198acd1201cbdb68b6bc49fb9b9e38744443377ce9de99ea6,2025-01-30T20:15:32.297000 CVE-2023-31486,0,0,d38250d2e093246198acd1201cbdb68b6bc49fb9b9e38744443377ce9de99ea6,2025-01-30T20:15:32.297000
CVE-2023-31488,0,0,94d2bf236ac6daa5715166465e0b7e10e06d184e0318c00b1cd3ef51756b85dd,2024-11-21T08:01:58.237000 CVE-2023-31488,0,0,94d2bf236ac6daa5715166465e0b7e10e06d184e0318c00b1cd3ef51756b85dd,2024-11-21T08:01:58.237000
CVE-2023-31489,0,0,bc328c2d0f93306e05e68d84815df5005bf7c9ceb3dd7621b7d0866ee9a28b65,2024-11-21T08:01:58.453000 CVE-2023-31489,0,0,bc328c2d0f93306e05e68d84815df5005bf7c9ceb3dd7621b7d0866ee9a28b65,2024-11-21T08:01:58.453000
CVE-2023-3149,0,0,c00821dd1818f517bfa5a1fd3e0f2f402c593877879e7a9264f9788304c549d2,2024-11-21T08:16:34.067000 CVE-2023-3149,0,0,c00821dd1818f517bfa5a1fd3e0f2f402c593877879e7a9264f9788304c549d2,2024-11-21T08:16:34.067000
@ -243388,7 +243388,7 @@ CVE-2024-10022,0,0,ab83f849a016205a813821491cb51c85544a67e413305379de2e1bfd4a31c
CVE-2024-10023,0,0,5b8d8edf9a844b7972623fe44d4aea076d5b42f40a729205390dae97ed207470,2024-10-21T13:14:37.300000 CVE-2024-10023,0,0,5b8d8edf9a844b7972623fe44d4aea076d5b42f40a729205390dae97ed207470,2024-10-21T13:14:37.300000
CVE-2024-10024,0,0,a2e50c196836e2a02faf1b4faaee4d9b40ca67c3c882116658a7e4828f4ee1ee,2024-10-21T13:15:01.730000 CVE-2024-10024,0,0,a2e50c196836e2a02faf1b4faaee4d9b40ca67c3c882116658a7e4828f4ee1ee,2024-10-21T13:15:01.730000
CVE-2024-10025,0,0,0e159e5b7f83ed3baac904fb63455340f13a4d77960b5067cf099ced0b349ce8,2024-10-18T12:52:33.507000 CVE-2024-10025,0,0,0e159e5b7f83ed3baac904fb63455340f13a4d77960b5067cf099ced0b349ce8,2024-10-18T12:52:33.507000
CVE-2024-10026,1,1,1a54ab890af9dabc952d7d70dc78582b3aece933a18765ad9ec3bd4da0cf381e,2025-01-30T20:15:32.600000 CVE-2024-10026,0,0,1a54ab890af9dabc952d7d70dc78582b3aece933a18765ad9ec3bd4da0cf381e,2025-01-30T20:15:32.600000
CVE-2024-10027,0,0,2ce81bd167c32a3d01aeb267dfbd0bca6e3b397ce9c6e6baa5c31b253cd0d4b2,2024-11-08T19:01:03.880000 CVE-2024-10027,0,0,2ce81bd167c32a3d01aeb267dfbd0bca6e3b397ce9c6e6baa5c31b253cd0d4b2,2024-11-08T19:01:03.880000
CVE-2024-10028,0,0,0796fbf5be7450f26989dd3e322b5d85f94909c55543905274765b89027cb4f3,2024-11-08T21:21:47.240000 CVE-2024-10028,0,0,0796fbf5be7450f26989dd3e322b5d85f94909c55543905274765b89027cb4f3,2024-11-08T21:21:47.240000
CVE-2024-1003,0,0,86ca1680684d7f5c1f1b25eaafdbb92bc310c2a58aa6e811c7dcd01deebd374b,2024-11-21T08:49:34.143000 CVE-2024-1003,0,0,86ca1680684d7f5c1f1b25eaafdbb92bc310c2a58aa6e811c7dcd01deebd374b,2024-11-21T08:49:34.143000
@ -243879,8 +243879,8 @@ CVE-2024-1060,0,0,30e8ae85c484341766ca7dee2c575cc98f2671a1165107d5d27a56d9672b13
CVE-2024-10600,0,0,1588f7b76a375177b6b8778e578d8222171a047be7e445b41697af92165f60b0,2024-11-04T19:45:26.723000 CVE-2024-10600,0,0,1588f7b76a375177b6b8778e578d8222171a047be7e445b41697af92165f60b0,2024-11-04T19:45:26.723000
CVE-2024-10601,0,0,2969748da0f7cf7d0d9603a0488fb632296f873a3a0b7ab6085037cc5349f21c,2024-11-04T19:45:45.603000 CVE-2024-10601,0,0,2969748da0f7cf7d0d9603a0488fb632296f873a3a0b7ab6085037cc5349f21c,2024-11-04T19:45:45.603000
CVE-2024-10602,0,0,c915109d93366e27d5d2725dd7110022f25bb25a357ea875612a439aa00aa3b1,2024-11-04T19:46:22.830000 CVE-2024-10602,0,0,c915109d93366e27d5d2725dd7110022f25bb25a357ea875612a439aa00aa3b1,2024-11-04T19:46:22.830000
CVE-2024-10603,1,1,6fce784118a8afc12a1cbdf4535e2e77dee1da9e5e1fc05c8262f652c564f994,2025-01-30T20:15:32.803000 CVE-2024-10603,0,0,6fce784118a8afc12a1cbdf4535e2e77dee1da9e5e1fc05c8262f652c564f994,2025-01-30T20:15:32.803000
CVE-2024-10604,1,1,c4b1c4c6b40fe74688855caf21d8135ed0fe6d24471a771059646b7f825b6d05,2025-01-30T20:15:33.003000 CVE-2024-10604,0,0,c4b1c4c6b40fe74688855caf21d8135ed0fe6d24471a771059646b7f825b6d05,2025-01-30T20:15:33.003000
CVE-2024-10605,0,0,9c4d2b3f5c9573445354fad5cf617a36da10f12735dc4eac88cc4ea22a030d7b,2024-11-05T16:22:08.017000 CVE-2024-10605,0,0,9c4d2b3f5c9573445354fad5cf617a36da10f12735dc4eac88cc4ea22a030d7b,2024-11-05T16:22:08.017000
CVE-2024-10606,0,0,6b8aa1c124a8bd07d97b00841d43181d26fed96fe4b97b24267bdccee0185633,2024-11-23T05:15:05.223000 CVE-2024-10606,0,0,6b8aa1c124a8bd07d97b00841d43181d26fed96fe4b97b24267bdccee0185633,2024-11-23T05:15:05.223000
CVE-2024-10607,0,0,250026f787272e38f4463c472ef3fa91de5074ff5ae4f5010bbfc430ceadc741,2024-11-05T16:21:46.193000 CVE-2024-10607,0,0,250026f787272e38f4463c472ef3fa91de5074ff5ae4f5010bbfc430ceadc741,2024-11-05T16:21:46.193000
@ -244767,7 +244767,10 @@ CVE-2024-11605,0,0,60d00021c065e6f38e758db8986f6f41c042a104c692f051aa09c9422ba7d
CVE-2024-11606,0,0,cec53aed2aa35dc5dcc09928013265f08303f051378a3304152c040cdd6a4f8b,2025-01-07T17:15:18.253000 CVE-2024-11606,0,0,cec53aed2aa35dc5dcc09928013265f08303f051378a3304152c040cdd6a4f8b,2025-01-07T17:15:18.253000
CVE-2024-11607,0,0,64db1cb50de786964ba95a2d2de30c3c373b3627734b2fcf18c662efd5d3b19e,2024-12-27T15:15:09.637000 CVE-2024-11607,0,0,64db1cb50de786964ba95a2d2de30c3c373b3627734b2fcf18c662efd5d3b19e,2024-12-27T15:15:09.637000
CVE-2024-11608,0,0,8ddbc230a8730b76ffe6955779ba3c4d90ea8f23edd3f564c2db516009c0d0dc,2024-12-09T18:15:22.580000 CVE-2024-11608,0,0,8ddbc230a8730b76ffe6955779ba3c4d90ea8f23edd3f564c2db516009c0d0dc,2024-12-09T18:15:22.580000
CVE-2024-11609,1,1,54c05120181bbe5d026c1e91c4165767bdcaedcf5abe5cce3aa41c3ff6aeacdd,2025-01-30T21:15:13.163000
CVE-2024-1161,0,0,59404f907ebea7b8dd839befaa6ff35913219617a7e1db7c77652ef34247d4c1,2025-01-16T15:08:00.773000 CVE-2024-1161,0,0,59404f907ebea7b8dd839befaa6ff35913219617a7e1db7c77652ef34247d4c1,2025-01-16T15:08:00.773000
CVE-2024-11610,1,1,c802b71d58309a60621c4ba5c15f67dfafda5bd5bf39db94219018744e2dbed1,2025-01-30T21:15:13.303000
CVE-2024-11611,1,1,b1272e810d8d420c6fae20c5fe47ecc25db508a92cd4fb3a203c9d8933606621,2025-01-30T21:15:13.450000
CVE-2024-11612,0,0,bb444eed2bab8dc9d7d3d2707a19c782bc9311cf8cab3a2875a904169993bb7a,2024-11-22T21:15:17.387000 CVE-2024-11612,0,0,bb444eed2bab8dc9d7d3d2707a19c782bc9311cf8cab3a2875a904169993bb7a,2024-11-22T21:15:17.387000
CVE-2024-11613,0,0,7e86a7b71c3d95aae4dbcb0c03692293907b720ebfe581d24518da2d412862bf,2025-01-08T07:15:26.407000 CVE-2024-11613,0,0,7e86a7b71c3d95aae4dbcb0c03692293907b720ebfe581d24518da2d412862bf,2025-01-08T07:15:26.407000
CVE-2024-11614,0,0,7fc209ca70347672f57de5cba21effe4e1d493165b83e201eaf5da4b6f065fbc,2025-01-09T19:15:17.283000 CVE-2024-11614,0,0,7fc209ca70347672f57de5cba21effe4e1d493165b83e201eaf5da4b6f065fbc,2025-01-09T19:15:17.283000
@ -245196,7 +245199,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669
CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000 CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000
CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000 CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000
CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000 CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000
CVE-2024-12085,0,0,a0d98fb431979f376125472a60db274f19d60a6b64ff4ab0286409d32e7ba632,2025-01-30T17:15:17.527000 CVE-2024-12085,0,1,788c3ec9423047f08ea5b66503ee10816232f6b232d17e66884fde630208fb19,2025-01-30T22:15:08.410000
CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000 CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000
CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000 CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000
CVE-2024-12088,0,0,789608af69629f4130f54998ea59694fde701c19a329a9d8093e26a51277e55d,2025-01-14T22:15:26.600000 CVE-2024-12088,0,0,789608af69629f4130f54998ea59694fde701c19a329a9d8093e26a51277e55d,2025-01-14T22:15:26.600000
@ -245332,7 +245335,7 @@ CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000 CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
CVE-2024-12240,0,0,6672995b52813f98387098ac3b3013676e82d4cc5e92b1023b4a144f1eea1a77,2025-01-14T11:15:15.137000 CVE-2024-12240,0,0,6672995b52813f98387098ac3b3013676e82d4cc5e92b1023b4a144f1eea1a77,2025-01-14T11:15:15.137000
CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4ac25,2024-12-05T16:15:25.243000 CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4ac25,2024-12-05T16:15:25.243000
CVE-2024-12248,1,1,c8b02ea390d9cd4d4f577628dbd04dfb02e11738aa4f8e4025ea40fc4a63373e,2025-01-30T19:15:13.390000 CVE-2024-12248,0,0,c8b02ea390d9cd4d4f577628dbd04dfb02e11738aa4f8e4025ea40fc4a63373e,2025-01-30T19:15:13.390000
CVE-2024-12249,0,0,e2547863ff0e51895fdd9ac079296565876947375b7269d971dfde5e35972170,2025-01-09T11:15:12.683000 CVE-2024-12249,0,0,e2547863ff0e51895fdd9ac079296565876947375b7269d971dfde5e35972170,2025-01-09T11:15:12.683000
CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000 CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000
CVE-2024-12250,0,0,e5f748db33ee246e1110b31eaf24b071ff8e9ad960657a91bc37454c3187e14e,2024-12-18T04:15:07.657000 CVE-2024-12250,0,0,e5f748db33ee246e1110b31eaf24b071ff8e9ad960657a91bc37454c3187e14e,2024-12-18T04:15:07.657000
@ -246139,7 +246142,7 @@ CVE-2024-13265,0,0,b50153d1795e3b59befc7c1df0d2d6441a951e42ef1ce3b27ccdff78e9e67
CVE-2024-13266,0,0,ae9ed5d6d4efb501aacb0e2cf1c7295f9e10ccdad8130d6b12c89c95eed905c0,2025-01-14T17:15:14.753000 CVE-2024-13266,0,0,ae9ed5d6d4efb501aacb0e2cf1c7295f9e10ccdad8130d6b12c89c95eed905c0,2025-01-14T17:15:14.753000
CVE-2024-13267,0,0,15108bd27c21eab0c2a7ce0b2e4a90abbe641b3902c75a0df20fec2e532b85e3,2025-01-14T17:15:14.903000 CVE-2024-13267,0,0,15108bd27c21eab0c2a7ce0b2e4a90abbe641b3902c75a0df20fec2e532b85e3,2025-01-14T17:15:14.903000
CVE-2024-13268,0,0,ab2ca4df69353c6af407bf3f87301555d4bd9eb6134717d5cb44ff3bc0de1ef5,2025-01-09T20:15:35.577000 CVE-2024-13268,0,0,ab2ca4df69353c6af407bf3f87301555d4bd9eb6134717d5cb44ff3bc0de1ef5,2025-01-09T20:15:35.577000
CVE-2024-13269,0,0,15b723abdab3cac8f057c2a93357bfc122f6550e17e83fbff1dade6d5652d0de,2025-01-09T20:15:35.687000 CVE-2024-13269,0,1,a0c61ccab76d132efe513a5a4a456b1965f80d3971b03da92de2924fedeeb544,2025-01-30T22:15:08.550000
CVE-2024-1327,0,0,33c0adc6d164d2527ed98cdbc1917c4fbc66104aec7ae664b0eb02e15371b5a7,2025-01-15T18:08:20.797000 CVE-2024-1327,0,0,33c0adc6d164d2527ed98cdbc1917c4fbc66104aec7ae664b0eb02e15371b5a7,2025-01-15T18:08:20.797000
CVE-2024-13270,0,0,e87c63bda0333ee4a66f449c899d74f2e08b74af6a5ebb363e5ef4b3e3167359,2025-01-09T20:15:35.790000 CVE-2024-13270,0,0,e87c63bda0333ee4a66f449c899d74f2e08b74af6a5ebb363e5ef4b3e3167359,2025-01-09T20:15:35.790000
CVE-2024-13271,0,0,59799f40be37f28c79189be8aa28d2139d3ba52e710292e27d885484c5ab45c0,2025-01-09T20:15:35.910000 CVE-2024-13271,0,0,59799f40be37f28c79189be8aa28d2139d3ba52e710292e27d885484c5ab45c0,2025-01-09T20:15:35.910000
@ -246180,8 +246183,8 @@ CVE-2024-13302,0,0,c2e2f829e272ce3710b30cde276e1b51b430dd27cc63cc0d3e8565746bc82
CVE-2024-13303,0,0,45400694ac4670f48d80d8a7e39a4bc849293c35e8276e2742f48056b9fcfa36,2025-01-10T18:15:20.910000 CVE-2024-13303,0,0,45400694ac4670f48d80d8a7e39a4bc849293c35e8276e2742f48056b9fcfa36,2025-01-10T18:15:20.910000
CVE-2024-13304,0,0,24b1a36018af16d753703a5b5b1bb932f9f36c2f21a7231aac95060bf05434cb,2025-01-10T18:15:21.263000 CVE-2024-13304,0,0,24b1a36018af16d753703a5b5b1bb932f9f36c2f21a7231aac95060bf05434cb,2025-01-10T18:15:21.263000
CVE-2024-13305,0,0,3a4cf301307578a6e63a4f0538c798b9e10f6efb81525d14d4ca11f02d0c6cd6,2025-01-10T17:15:16.820000 CVE-2024-13305,0,0,3a4cf301307578a6e63a4f0538c798b9e10f6efb81525d14d4ca11f02d0c6cd6,2025-01-10T17:15:16.820000
CVE-2024-13308,0,0,628dfc7afada6f39009e3075b904110e0898bfe72715ceaf39a1a966cfc45777,2025-01-09T21:15:28.623000 CVE-2024-13308,0,1,5a7c5de49dea6dce6146be04ca3299c64c19e3ab1de1461d50a35b802bb7ee20,2025-01-30T22:15:08.723000
CVE-2024-13309,0,0,7804e59975687c811f41086ccb055124503b48f1f5cb86a86be5d217498799ec,2025-01-09T21:15:28.740000 CVE-2024-13309,0,1,0b3b8b334a1de7768f2a2e87180e2cff3c33f0ede7bad89f9b0bac93a7d10749,2025-01-30T22:15:08.880000
CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1fdc,2024-11-21T08:50:21.027000 CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1fdc,2024-11-21T08:50:21.027000
CVE-2024-13310,0,0,34b833dc43272c485330d8f4a3479ba2fe514cfb2fea7226b333743fa866e9aa,2025-01-09T21:15:28.867000 CVE-2024-13310,0,0,34b833dc43272c485330d8f4a3479ba2fe514cfb2fea7226b333743fa866e9aa,2025-01-09T21:15:28.867000
CVE-2024-13311,0,0,043082a8dd739b5eb445323387334add04ddcec723a1cf1ae43347104de3b9ea,2025-01-09T21:15:28.970000 CVE-2024-13311,0,0,043082a8dd739b5eb445323387334add04ddcec723a1cf1ae43347104de3b9ea,2025-01-09T21:15:28.970000
@ -246457,7 +246460,7 @@ CVE-2024-1484,0,0,9a32df126759987e5250b83dcafa91beffdf56c507b193272d399891f10765
CVE-2024-1485,0,0,a1102d636093aae5526e62d4563fc2a331d4ec97c0bcd4b7a9835d6f29d54493,2024-11-21T08:50:41.090000 CVE-2024-1485,0,0,a1102d636093aae5526e62d4563fc2a331d4ec97c0bcd4b7a9835d6f29d54493,2024-11-21T08:50:41.090000
CVE-2024-1486,0,0,94a421c2203bd3bbfc3e3f87675332dfca46e0ee2e1454f84651bf7b647d4382,2024-11-21T08:50:41.247000 CVE-2024-1486,0,0,94a421c2203bd3bbfc3e3f87675332dfca46e0ee2e1454f84651bf7b647d4382,2024-11-21T08:50:41.247000
CVE-2024-1487,0,0,4bf4dc233cedcf1304e22719e3f6a10f2632e690cb333bf8786ae34bb05e7089,2024-11-21T08:50:41.383000 CVE-2024-1487,0,0,4bf4dc233cedcf1304e22719e3f6a10f2632e690cb333bf8786ae34bb05e7089,2024-11-21T08:50:41.383000
CVE-2024-1488,0,0,05fd1f5b51446658fa063dfafdb885da66cb82f65503a858653fb976e97b16a3,2025-01-24T06:15:26.913000 CVE-2024-1488,0,1,bdde88c2dae24117dcff9e354ec8b5114157ed5561cc258eab2815d179ac3088,2025-01-30T22:15:09.037000
CVE-2024-1489,0,0,afea3aca1b285be7aec593bac44b1d70889e5ff452f20f2949bf1810002f41ac,2024-11-21T08:50:41.657000 CVE-2024-1489,0,0,afea3aca1b285be7aec593bac44b1d70889e5ff452f20f2949bf1810002f41ac,2024-11-21T08:50:41.657000
CVE-2024-1491,0,0,f8c906d36296d24716d3f1699c8be966291b4ddbcb9b5f082cca20cf66fb517b,2024-11-21T08:50:41.773000 CVE-2024-1491,0,0,f8c906d36296d24716d3f1699c8be966291b4ddbcb9b5f082cca20cf66fb517b,2024-11-21T08:50:41.773000
CVE-2024-1492,0,0,1639bcc1c5a688973fe7c2ddc64c02acd6aaac9cda8a0ad97ec52db83771b7b2,2024-11-21T08:50:41.923000 CVE-2024-1492,0,0,1639bcc1c5a688973fe7c2ddc64c02acd6aaac9cda8a0ad97ec52db83771b7b2,2024-11-21T08:50:41.923000
@ -258836,7 +258839,7 @@ CVE-2024-3563,0,0,adbe59bd1d49de614b2ea4a992cfe827d7a619deaf1bf1464db4b2b89b108b
CVE-2024-35630,0,0,d541a7211e4a4d6c5a2f20a343e8e95d9f10aa9cbeef960f44a29523803c201c,2024-11-21T09:20:32.267000 CVE-2024-35630,0,0,d541a7211e4a4d6c5a2f20a343e8e95d9f10aa9cbeef960f44a29523803c201c,2024-11-21T09:20:32.267000
CVE-2024-35631,0,0,b2bbd1735567440b9b14ad520f237690a3057c6ed397900c04e1d91f83019b5f,2024-11-21T09:20:32.397000 CVE-2024-35631,0,0,b2bbd1735567440b9b14ad520f237690a3057c6ed397900c04e1d91f83019b5f,2024-11-21T09:20:32.397000
CVE-2024-35632,0,0,8ac93b6b70685393e559dcc17c63c410cb875b3ae02f4c6fbe77b112a65c27ea,2024-11-21T09:20:32.550000 CVE-2024-35632,0,0,8ac93b6b70685393e559dcc17c63c410cb875b3ae02f4c6fbe77b112a65c27ea,2024-11-21T09:20:32.550000
CVE-2024-35633,0,1,d7644db9fa1d0b0d2e952ea33967366420ddcce410d59c8213023c0fefdb33df,2025-01-30T19:52:10.193000 CVE-2024-35633,0,0,d7644db9fa1d0b0d2e952ea33967366420ddcce410d59c8213023c0fefdb33df,2025-01-30T19:52:10.193000
CVE-2024-35634,0,0,25c1cdf095c30445149b468d7e95e6aed7e59b2a3eec6f8e0b3fe71e56cf4891,2024-11-21T09:20:32.793000 CVE-2024-35634,0,0,25c1cdf095c30445149b468d7e95e6aed7e59b2a3eec6f8e0b3fe71e56cf4891,2024-11-21T09:20:32.793000
CVE-2024-35635,0,0,2ac54f88aa487a3c53c8e85ca3b7adc88898cc1636e05afea4e762250a08503a,2024-11-21T09:20:32.940000 CVE-2024-35635,0,0,2ac54f88aa487a3c53c8e85ca3b7adc88898cc1636e05afea4e762250a08503a,2024-11-21T09:20:32.940000
CVE-2024-35636,0,0,e9db72b2bb839318f35abc14fee35d4b2e9afcebda20a56da5c23ce078615d5b,2024-11-21T09:20:33.070000 CVE-2024-35636,0,0,e9db72b2bb839318f35abc14fee35d4b2e9afcebda20a56da5c23ce078615d5b,2024-11-21T09:20:33.070000
@ -265531,7 +265534,7 @@ CVE-2024-44136,0,0,6f174c4211aefd4ed089ffc5069f9b8c0ec85bf908cf7d127360d8595626b
CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000 CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000
CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000 CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000
CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000 CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000
CVE-2024-44142,1,1,8e314cec4403216694641013c1f96b6f688f2b85f039c39572061c0028c5d370,2025-01-30T19:15:13.910000 CVE-2024-44142,0,0,8e314cec4403216694641013c1f96b6f688f2b85f039c39572061c0028c5d370,2025-01-30T19:15:13.910000
CVE-2024-44144,0,0,9b76d7b551b1f0186bb586552a7b8b7528c49f9926c44e33ae408477bdfe743a,2024-10-29T21:35:14.290000 CVE-2024-44144,0,0,9b76d7b551b1f0186bb586552a7b8b7528c49f9926c44e33ae408477bdfe743a,2024-10-29T21:35:14.290000
CVE-2024-44145,0,0,b5a7d8159d070a1738fbfcb4faf809263b03e283915c6233a643bc6179c97626,2024-12-12T19:10:46.387000 CVE-2024-44145,0,0,b5a7d8159d070a1738fbfcb4faf809263b03e283915c6233a643bc6179c97626,2024-12-12T19:10:46.387000
CVE-2024-44146,0,0,9fc3cf91a523a17011d8ddc92710ccca41ad98f894b85050d976b55965940506,2024-09-24T16:14:02.090000 CVE-2024-44146,0,0,9fc3cf91a523a17011d8ddc92710ccca41ad98f894b85050d976b55965940506,2024-09-24T16:14:02.090000
@ -267256,7 +267259,7 @@ CVE-2024-46963,0,0,a859b9e5f6b3e0fb9a390e0ac1d69993a48f6c4330c0e3f29a577b8ffe400
CVE-2024-46964,0,0,516d10df6478d71d107821ead9437fd7d5dc5eb20d9662b114242f44f50941fc,2024-11-12T16:35:19.933000 CVE-2024-46964,0,0,516d10df6478d71d107821ead9437fd7d5dc5eb20d9662b114242f44f50941fc,2024-11-12T16:35:19.933000
CVE-2024-46965,0,0,1066f06ee90db61e408bbe2d843509e64ad66e7a9a1562e4d7a7d1ae721e0df5,2024-11-12T17:35:09.427000 CVE-2024-46965,0,0,1066f06ee90db61e408bbe2d843509e64ad66e7a9a1562e4d7a7d1ae721e0df5,2024-11-12T17:35:09.427000
CVE-2024-46966,0,0,9cdd2da38a787da29e0b07f0d6dcd10da33561e25fc912ee27f59b8909bf77c4,2024-11-12T16:35:20.790000 CVE-2024-46966,0,0,9cdd2da38a787da29e0b07f0d6dcd10da33561e25fc912ee27f59b8909bf77c4,2024-11-12T16:35:20.790000
CVE-2024-4697,0,1,8e82abe27d6a35462bbbe0c449d2874070a3d828458d11fd360588d5ff83dd67,2025-01-30T19:43:10.207000 CVE-2024-4697,0,0,8e82abe27d6a35462bbbe0c449d2874070a3d828458d11fd360588d5ff83dd67,2025-01-30T19:43:10.207000
CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9eab6,2024-09-20T13:23:29.700000 CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9eab6,2024-09-20T13:23:29.700000
CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000 CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000
CVE-2024-46972,0,0,e19d7ffbd835a75458fdf16b6890ed1469688eeb0b4a5070c87028b8ff0ad2ab,2025-01-09T17:15:15.030000 CVE-2024-46972,0,0,e19d7ffbd835a75458fdf16b6890ed1469688eeb0b4a5070c87028b8ff0ad2ab,2025-01-09T17:15:15.030000
@ -272288,9 +272291,9 @@ CVE-2024-54152,0,0,64d47547e5307ed80a7f425b825ed1812b96ec6e10500fe8d7bfb0506a4a9
CVE-2024-54153,0,0,c29012def2c5ac24434214b7603f1646c45a2cdd2239c37ce825446301614236,2024-12-04T12:15:19.853000 CVE-2024-54153,0,0,c29012def2c5ac24434214b7603f1646c45a2cdd2239c37ce825446301614236,2024-12-04T12:15:19.853000
CVE-2024-54154,0,0,76050c8799b790ecdccc98071593d36c99d7c13c97b41bc2ac908cace65d646b,2024-12-04T12:15:20.047000 CVE-2024-54154,0,0,76050c8799b790ecdccc98071593d36c99d7c13c97b41bc2ac908cace65d646b,2024-12-04T12:15:20.047000
CVE-2024-54155,0,0,16c7ad428747a68496c8d8073118d7a1fd49d9b325dffe11220faa0ccdf4be12,2024-12-04T12:15:20.190000 CVE-2024-54155,0,0,16c7ad428747a68496c8d8073118d7a1fd49d9b325dffe11220faa0ccdf4be12,2024-12-04T12:15:20.190000
CVE-2024-54156,0,0,1521b1a0fd39f5583feeda1b5748dd8268c43a64aeaf9d7cd843e09343fde576,2024-12-04T12:15:20.340000 CVE-2024-54156,0,1,81c21f4d51f2ebbd7641443638ae29350bc0d803dc7655de8082c14d2dcfa440,2025-01-30T21:46:25.813000
CVE-2024-54157,0,0,7977a0376cc458678287d7bc0e3bd127d398f022dc92eb660ddab27ca55beca1,2024-12-04T12:15:20.473000 CVE-2024-54157,0,1,651aaab1ba3fa67919b2a83ef120e30379ceac97443b3f5f57e4b98ff3e217ee,2025-01-30T21:47:10.683000
CVE-2024-54158,0,0,99ca6004d0064eb33285ff878f08d19b9a0bd1469f489ae6980279eee93eafce,2024-12-04T12:15:20.623000 CVE-2024-54158,0,1,8c6dc67958b420fa6c8d095b96806595ddd0e8ce477f8baa35f7cadb7e0151dd,2025-01-30T21:50:32.770000
CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000 CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000
CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000 CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000
CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000 CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000
@ -273831,7 +273834,7 @@ CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050
CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000 CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000
CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000 CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000
CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000 CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000
CVE-2024-57276,0,0,56f9d8dfeaea339eb4f7830f5e47071be6d43333a2aa1e4e9551dc0218c18991,2025-01-27T17:15:16.827000 CVE-2024-57276,0,1,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000
CVE-2024-57277,0,0,cf3bfbd32910c82a101c705fc837da91aff2f392e35fb884cbc5ee32ed42427b,2025-01-24T20:15:33.587000 CVE-2024-57277,0,0,cf3bfbd32910c82a101c705fc837da91aff2f392e35fb884cbc5ee32ed42427b,2025-01-24T20:15:33.587000
CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000 CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000
CVE-2024-5729,0,0,aadee3b7646ed860effd8dd252b041b4d71b9abc4abf921ad91790c2248d1201,2024-11-21T09:48:14.543000 CVE-2024-5729,0,0,aadee3b7646ed860effd8dd252b041b4d71b9abc4abf921ad91790c2248d1201,2024-11-21T09:48:14.543000
@ -277776,12 +277779,12 @@ CVE-2025-0104,0,0,21c4318a0d99e7fa45fcf41d38940b721a051c25e3dcd31ab0543aa8393743
CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000 CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000
CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000 CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000
CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000 CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000
CVE-2025-0142,1,1,1abda10a5eada4193fe274562c17d232e8ca8c79a0709a64d249cdd64a883f20,2025-01-30T20:15:33.853000 CVE-2025-0142,0,0,1abda10a5eada4193fe274562c17d232e8ca8c79a0709a64d249cdd64a883f20,2025-01-30T20:15:33.853000
CVE-2025-0143,1,1,296248dfc8911afb81aba91a9155c349bbfc6c793c50a0f97328fecc5f67a13d,2025-01-30T20:15:34.050000 CVE-2025-0143,0,0,296248dfc8911afb81aba91a9155c349bbfc6c793c50a0f97328fecc5f67a13d,2025-01-30T20:15:34.050000
CVE-2025-0144,1,1,beb7b312e9d023ff83a9190648ca8c0dd1a6406acec35769a36446e22b8014ca,2025-01-30T20:15:34.210000 CVE-2025-0144,0,0,beb7b312e9d023ff83a9190648ca8c0dd1a6406acec35769a36446e22b8014ca,2025-01-30T20:15:34.210000
CVE-2025-0145,1,1,d5e8ce1643ab2424dd4c50d4dcdd6c8e0ad6e5b1aea57d7d46d4c5890c841d73,2025-01-30T20:15:34.547000 CVE-2025-0145,0,0,d5e8ce1643ab2424dd4c50d4dcdd6c8e0ad6e5b1aea57d7d46d4c5890c841d73,2025-01-30T20:15:34.547000
CVE-2025-0146,1,1,0667e58df7061f5dd21d67dba7596996019fabb4824e8dc52013f1eb1eec1021,2025-01-30T20:15:34.907000 CVE-2025-0146,0,0,0667e58df7061f5dd21d67dba7596996019fabb4824e8dc52013f1eb1eec1021,2025-01-30T20:15:34.907000
CVE-2025-0147,1,1,3e8b25a8d80a15a2641c707ce901f8b885916c5ca52ca562a71e14d50f3a5060,2025-01-30T20:15:35.253000 CVE-2025-0147,0,0,3e8b25a8d80a15a2641c707ce901f8b885916c5ca52ca562a71e14d50f3a5060,2025-01-30T20:15:35.253000
CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000 CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000
CVE-2025-0170,0,0,189d0bf364a93d57ec260c3b6216a914d346455ba37daa3da83434c071198308,2025-01-16T02:15:27.043000 CVE-2025-0170,0,0,189d0bf364a93d57ec260c3b6216a914d346455ba37daa3da83434c071198308,2025-01-16T02:15:27.043000
CVE-2025-0171,0,0,794beb23430fc32560ad8b14e91c70f576fc5b74a30bc3307d04a635424cf206,2025-01-02T18:15:21.173000 CVE-2025-0171,0,0,794beb23430fc32560ad8b14e91c70f576fc5b74a30bc3307d04a635424cf206,2025-01-02T18:15:21.173000
@ -277832,7 +277835,7 @@ CVE-2025-0237,0,0,726b9fd4a1cc35feeb251f210c4adbb8387d0cfa8a7807bfe531c06c5d5e23
CVE-2025-0238,0,0,25dbf44aaff9981e33a49ac3143d2e91673102899f26dc07cf35f0cbe2b9b8b2,2025-01-13T22:15:14.917000 CVE-2025-0238,0,0,25dbf44aaff9981e33a49ac3143d2e91673102899f26dc07cf35f0cbe2b9b8b2,2025-01-13T22:15:14.917000
CVE-2025-0239,0,0,1372c31ba223568cd951d4698f35589535891c561ef4e423909537c35f403cb4,2025-01-13T22:15:15.057000 CVE-2025-0239,0,0,1372c31ba223568cd951d4698f35589535891c561ef4e423909537c35f403cb4,2025-01-13T22:15:15.057000
CVE-2025-0240,0,0,ef3a6d8c0e079e8738470ebcc85f8c6810fc9d47e51bebee036347d11413c427,2025-01-13T22:15:15.190000 CVE-2025-0240,0,0,ef3a6d8c0e079e8738470ebcc85f8c6810fc9d47e51bebee036347d11413c427,2025-01-13T22:15:15.190000
CVE-2025-0241,0,0,f609fcea9ea7559d4c69256019cabe3315eee4193ade298c5176418a8d1b2cf1,2025-01-13T22:15:15.330000 CVE-2025-0241,0,1,a0bdcf70fd4da55c1667c939c86352d55f81eaf4e4e33ce9139ad56bc1c71ee5,2025-01-30T22:15:09.700000
CVE-2025-0242,0,0,8fd084f80d7f2c40909e904cf4af210f4c9950a52651432fdf9e9addd4031c69,2025-01-13T22:15:15.420000 CVE-2025-0242,0,0,8fd084f80d7f2c40909e904cf4af210f4c9950a52651432fdf9e9addd4031c69,2025-01-13T22:15:15.420000
CVE-2025-0243,0,0,e50730930ccff5df1662900646661e118cddb3593274bb28086fa9abd413c548,2025-01-13T22:15:15.560000 CVE-2025-0243,0,0,e50730930ccff5df1662900646661e118cddb3593274bb28086fa9abd413c548,2025-01-13T22:15:15.560000
CVE-2025-0244,0,0,a007094477ee1c52bbc6ad80ad1856461cbdef97dbf9502d29b149d107af9f25,2025-01-08T16:15:37.520000 CVE-2025-0244,0,0,a007094477ee1c52bbc6ad80ad1856461cbdef97dbf9502d29b149d107af9f25,2025-01-08T16:15:37.520000
@ -277993,6 +277996,13 @@ CVE-2025-0564,0,0,650024fd0623317926e582a4bc38450ac7a271a00a83ea4a9c09178300ec95
CVE-2025-0565,0,0,6d54c323cb03fbdc464fad55525c07932b33678b23db46f9285fc46354f35617,2025-01-19T06:15:06.820000 CVE-2025-0565,0,0,6d54c323cb03fbdc464fad55525c07932b33678b23db46f9285fc46354f35617,2025-01-19T06:15:06.820000
CVE-2025-0566,0,0,0c4672880628de41f7c45af060cc7b25efbd38a8957fdd01f169568312b347b3,2025-01-19T07:15:06.407000 CVE-2025-0566,0,0,0c4672880628de41f7c45af060cc7b25efbd38a8957fdd01f169568312b347b3,2025-01-19T07:15:06.407000
CVE-2025-0567,0,0,b74c6df89c0fcb1255eef76d90ddfd33f5a9dfee00996fcba186fc7c7f150e7e,2025-01-19T08:15:06.637000 CVE-2025-0567,0,0,b74c6df89c0fcb1255eef76d90ddfd33f5a9dfee00996fcba186fc7c7f150e7e,2025-01-19T08:15:06.637000
CVE-2025-0568,1,1,8d0a05c8043bee98423ba6864a9bab1dd2831ab16af703e3c47395d083efbcb6,2025-01-30T21:15:13.587000
CVE-2025-0569,1,1,6aa361cd183208e6f48d0af7ae70f952114c8b890907ec8fcbe80c72fbf6381b,2025-01-30T21:15:13.710000
CVE-2025-0570,1,1,2f71d7720e6c338ca428f1b0f16342bc64b3d89cdaf10a0ad12618a14f673407,2025-01-30T21:15:13.830000
CVE-2025-0571,1,1,5d206173b5fa262732ea2fca9cfca58cefc24b524f6ee30aeaf8ca6b0949fb5d,2025-01-30T21:15:13.960000
CVE-2025-0572,1,1,1e050d3dc3737c3f353cd212470d11d19d2ca27c2b96469c09a08960b37a5471,2025-01-30T21:15:14.093000
CVE-2025-0573,1,1,8b2b5adb09f895ff991fed750b57e2959c03ca9d9a490dc916c95f354740ed0f,2025-01-30T21:15:14.227000
CVE-2025-0574,1,1,ce0c94ad105196a95d4a85b805b59b4914ea27c1e277b12dda1daa397236726b,2025-01-30T21:15:14.357000
CVE-2025-0575,0,0,03dc0a766dd40ef1508c8693499211717a20a0fac5daca493e9cc3db02b14fbc,2025-01-19T23:15:20.013000 CVE-2025-0575,0,0,03dc0a766dd40ef1508c8693499211717a20a0fac5daca493e9cc3db02b14fbc,2025-01-19T23:15:20.013000
CVE-2025-0576,0,0,0748bbaf647d6707eade27f8dc93756df57bac5912fbaf14160dda0b1ead7d0c,2025-01-20T00:15:16.320000 CVE-2025-0576,0,0,0748bbaf647d6707eade27f8dc93756df57bac5912fbaf14160dda0b1ead7d0c,2025-01-20T00:15:16.320000
CVE-2025-0578,0,0,f37c1d0a7be8fd73d8bd509c7e4aac11e1c01571a42f10fb7d9157af68e7ed19,2025-01-20T02:15:18.913000 CVE-2025-0578,0,0,f37c1d0a7be8fd73d8bd509c7e4aac11e1c01571a42f10fb7d9157af68e7ed19,2025-01-20T02:15:18.913000
@ -278014,7 +278024,7 @@ CVE-2025-0617,0,0,85ac8b1513a28e4252ed84928ab0ab641a8952008a852587e89f1b03f01e6a
CVE-2025-0619,0,0,76104b7b24094ee59b4cec6d4f4ee7db8e2e97a6bfdfd21603079adfc8fdb2bd,2025-01-23T11:15:10.700000 CVE-2025-0619,0,0,76104b7b24094ee59b4cec6d4f4ee7db8e2e97a6bfdfd21603079adfc8fdb2bd,2025-01-23T11:15:10.700000
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
CVE-2025-0625,0,0,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06f3,2025-01-22T19:15:10.397000 CVE-2025-0625,0,0,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06f3,2025-01-22T19:15:10.397000
CVE-2025-0626,1,1,b95b3517a13a66c6bae56b5c7a375838e0f83067e69d901447ab670090da89fc,2025-01-30T19:15:14.010000 CVE-2025-0626,0,0,b95b3517a13a66c6bae56b5c7a375838e0f83067e69d901447ab670090da89fc,2025-01-30T19:15:14.010000
CVE-2025-0631,0,0,3196a9fbde6d9168d64fe97245fb465de3553c9c773b397433d0b7598697488d,2025-01-28T19:15:14.270000 CVE-2025-0631,0,0,3196a9fbde6d9168d64fe97245fb465de3553c9c773b397433d0b7598697488d,2025-01-28T19:15:14.270000
CVE-2025-0635,0,0,48e9501b358d6daac6b23f86a2f36310ca1507ac697731ba1d1365d13a451552,2025-01-23T11:15:10.890000 CVE-2025-0635,0,0,48e9501b358d6daac6b23f86a2f36310ca1507ac697731ba1d1365d13a451552,2025-01-23T11:15:10.890000
CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000 CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000
@ -278024,10 +278034,10 @@ CVE-2025-0650,0,0,663c6fb0447de5acea936c032379a880e4e49090359ea8a19f79bd3aea4faf
CVE-2025-0651,0,0,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000 CVE-2025-0651,0,0,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000
CVE-2025-0659,0,0,a3f0ecf6d7f28b7588d33ff468ced196ec3e2b7300202b748557cb9cf9f876c2,2025-01-28T16:15:40.360000 CVE-2025-0659,0,0,a3f0ecf6d7f28b7588d33ff468ced196ec3e2b7300202b748557cb9cf9f876c2,2025-01-28T16:15:40.360000
CVE-2025-0662,0,0,bc6e86ff659735808e41cf9ff8dd95196e371ffb0d943fcf675b74a5d300ebd8,2025-01-30T05:15:10.653000 CVE-2025-0662,0,0,bc6e86ff659735808e41cf9ff8dd95196e371ffb0d943fcf675b74a5d300ebd8,2025-01-30T05:15:10.653000
CVE-2025-0680,1,1,ec333cf56e54e10a72253f3b33aa12ac442fec49122e56aaca2c0fa65157ab4a,2025-01-30T19:15:14.147000 CVE-2025-0680,0,0,ec333cf56e54e10a72253f3b33aa12ac442fec49122e56aaca2c0fa65157ab4a,2025-01-30T19:15:14.147000
CVE-2025-0681,1,1,b8363a650ef7fdaa5d28101486b8255e2b2a7fc158d1635f2fbff97adeaba420,2025-01-30T19:15:14.300000 CVE-2025-0681,0,0,b8363a650ef7fdaa5d28101486b8255e2b2a7fc158d1635f2fbff97adeaba420,2025-01-30T19:15:14.300000
CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000 CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000
CVE-2025-0683,1,1,8c96ddbc6080430b0e948da9310a6801fe4a1e6fe9406e655f9134920e4dae2c,2025-01-30T19:15:14.460000 CVE-2025-0683,0,0,8c96ddbc6080430b0e948da9310a6801fe4a1e6fe9406e655f9134920e4dae2c,2025-01-30T19:15:14.460000
CVE-2025-0693,0,0,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000 CVE-2025-0693,0,0,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000
CVE-2025-0695,0,0,70836bbbf6325136c9e0a957ced44b18d2c2228a6b15d655a939dfb6142b3b68,2025-01-27T11:15:11.087000 CVE-2025-0695,0,0,70836bbbf6325136c9e0a957ced44b18d2c2228a6b15d655a939dfb6142b3b68,2025-01-27T11:15:11.087000
CVE-2025-0696,0,0,067c55df7ddd7d3450a8d9809198ef8633f7872bc632480e2c80e723c4cafb5b,2025-01-27T11:15:11.267000 CVE-2025-0696,0,0,067c55df7ddd7d3450a8d9809198ef8633f7872bc632480e2c80e723c4cafb5b,2025-01-27T11:15:11.267000
@ -278109,6 +278119,9 @@ CVE-2025-0871,0,0,24dddddb7292c73ee5114bcb016776d1fe668a27680ab7f838511f0d646009
CVE-2025-0872,0,0,2a97903a346db7626f149e531952c9a73336859fa952991f9ebb15445e299ad6,2025-01-30T16:15:30.737000 CVE-2025-0872,0,0,2a97903a346db7626f149e531952c9a73336859fa952991f9ebb15445e299ad6,2025-01-30T16:15:30.737000
CVE-2025-0873,0,0,f96722cf650d777df13efd7b0f61fc08757016f39189f71415796b266e7ec0a6,2025-01-30T17:15:18.293000 CVE-2025-0873,0,0,f96722cf650d777df13efd7b0f61fc08757016f39189f71415796b266e7ec0a6,2025-01-30T17:15:18.293000
CVE-2025-0874,0,0,6da7a8f87f2786d1b42e4f0c31d8a24660ad2dce7cac8549bf8e2ee9e365d7da,2025-01-30T18:15:33.753000 CVE-2025-0874,0,0,6da7a8f87f2786d1b42e4f0c31d8a24660ad2dce7cac8549bf8e2ee9e365d7da,2025-01-30T18:15:33.753000
CVE-2025-0880,1,1,7ab5ca29a799a8fac267066c2eb589d01834fa921e902d70d4517ec3592f8581,2025-01-30T21:15:14.487000
CVE-2025-0881,1,1,f6d8aeab8275692b8ab74f77e788a17bc4f5e9922e816ca6e72b12616473f8e1,2025-01-30T22:15:09.950000
CVE-2025-0882,1,1,a4fc441f84f917a5c60004573d3c20412d06b968e92fa39cb0a0be846d1c9a39,2025-01-30T21:15:14.820000
CVE-2025-20014,0,0,708b5660539e4ab2830a732991daead462d3c8df88b4205953edf58b017cb8b0,2025-01-29T20:15:35.207000 CVE-2025-20014,0,0,708b5660539e4ab2830a732991daead462d3c8df88b4205953edf58b017cb8b0,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
@ -279278,7 +279291,7 @@ CVE-2025-24092,0,0,9182d2bd14456360ddd97d7de31dcf6654228ea7b89126369b3c5c054d65c
CVE-2025-24093,0,0,3f6f51243a5ac658564583998d5988ce49d27677fb4c413db03a4c9b2dd0ea15,2025-01-28T16:15:41.847000 CVE-2025-24093,0,0,3f6f51243a5ac658564583998d5988ce49d27677fb4c413db03a4c9b2dd0ea15,2025-01-28T16:15:41.847000
CVE-2025-24094,0,0,9752c4fcf0542c9a14c29e1c06a8a87f40d0c52a3267427d743fb5e9dc5aef3d,2025-01-30T18:17:08.090000 CVE-2025-24094,0,0,9752c4fcf0542c9a14c29e1c06a8a87f40d0c52a3267427d743fb5e9dc5aef3d,2025-01-30T18:17:08.090000
CVE-2025-24096,0,0,bc6af13ce18ffbaee061a39b643a737430849df914344499b977f4fe1613eb41,2025-01-30T18:16:40.440000 CVE-2025-24096,0,0,bc6af13ce18ffbaee061a39b643a737430849df914344499b977f4fe1613eb41,2025-01-30T18:16:40.440000
CVE-2025-24099,0,0,20f7dc916a389edc92101fc45e85459d6fd6b507a4303a4de3fe6f8ee24eb249,2025-01-30T17:15:18.473000 CVE-2025-24099,0,1,ae84459fb59861397fcfa19fe58321bea97795e963bc811d2e971534f0407179,2025-01-30T22:15:10.160000
CVE-2025-24100,0,0,d35ad28704e6b165a7814523e9ddab98d243bbac9edf72e469cfe41a8f6cfb09,2025-01-30T18:16:04.177000 CVE-2025-24100,0,0,d35ad28704e6b165a7814523e9ddab98d243bbac9edf72e469cfe41a8f6cfb09,2025-01-30T18:16:04.177000
CVE-2025-24101,0,0,dae89b1167004681c237272fea45914f96a54415fc2aa5c9187504f4af2012ba,2025-01-29T17:15:29.547000 CVE-2025-24101,0,0,dae89b1167004681c237272fea45914f96a54415fc2aa5c9187504f4af2012ba,2025-01-29T17:15:29.547000
CVE-2025-24102,0,0,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000 CVE-2025-24102,0,0,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000
@ -279289,7 +279302,7 @@ CVE-2025-24107,0,0,a6cfe430786da61a82799ac1488a919055b479fc4fe81ab16f82560299f05
CVE-2025-24108,0,0,bb0a5bc48c4dd7d6d7190906e431796a1e5028444f7a13e38e07dbc67caf502c,2025-01-28T17:15:26.433000 CVE-2025-24108,0,0,bb0a5bc48c4dd7d6d7190906e431796a1e5028444f7a13e38e07dbc67caf502c,2025-01-28T17:15:26.433000
CVE-2025-24109,0,0,e18d20f0f5bde6ebc7b6d46d58e1c12c70a45bfdfde42833a6a2af9ef10a02f4,2025-01-28T17:15:26.610000 CVE-2025-24109,0,0,e18d20f0f5bde6ebc7b6d46d58e1c12c70a45bfdfde42833a6a2af9ef10a02f4,2025-01-28T17:15:26.610000
CVE-2025-24112,0,0,73122401c6f0bff2db58ac2e4c8d3c7092fb0878620319286c89df67ac0aee54,2025-01-30T18:54:08.913000 CVE-2025-24112,0,0,73122401c6f0bff2db58ac2e4c8d3c7092fb0878620319286c89df67ac0aee54,2025-01-30T18:54:08.913000
CVE-2025-24113,0,1,06e6fc9a2d4f031956069ec451e08e736a017280ec601264276e7994ad5e6595,2025-01-30T19:10:53.077000 CVE-2025-24113,0,0,06e6fc9a2d4f031956069ec451e08e736a017280ec601264276e7994ad5e6595,2025-01-30T19:10:53.077000
CVE-2025-24114,0,0,41dfbc3389d2f3872b919168ecf2d8e3d41ab841e34b753245c022d9f84c5e21,2025-01-27T22:15:16.620000 CVE-2025-24114,0,0,41dfbc3389d2f3872b919168ecf2d8e3d41ab841e34b753245c022d9f84c5e21,2025-01-27T22:15:16.620000
CVE-2025-24115,0,0,4ee06b5245630f5df72b1f842156b340b5aa79d371e3d93606b60490bb5625de,2025-01-28T16:15:42.150000 CVE-2025-24115,0,0,4ee06b5245630f5df72b1f842156b340b5aa79d371e3d93606b60490bb5625de,2025-01-28T16:15:42.150000
CVE-2025-24116,0,0,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e2229a,2025-01-27T22:15:16.803000 CVE-2025-24116,0,0,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e2229a,2025-01-27T22:15:16.803000
@ -279362,25 +279375,25 @@ CVE-2025-24400,0,0,d4e33d3f64ab5857e07ca7edc1c70e091d835e180e9973f0447b96fc45e31
CVE-2025-24401,0,0,61fdb52a27a3fd9c35b206712217d25525cc5027272fe2bab11517220f296eb5,2025-01-23T16:15:41.050000 CVE-2025-24401,0,0,61fdb52a27a3fd9c35b206712217d25525cc5027272fe2bab11517220f296eb5,2025-01-23T16:15:41.050000
CVE-2025-24402,0,0,3418f6cf5d47b4d89538cc87e13ea06bddcc57e548cfa7657c6e36ff20730512,2025-01-23T16:15:41.190000 CVE-2025-24402,0,0,3418f6cf5d47b4d89538cc87e13ea06bddcc57e548cfa7657c6e36ff20730512,2025-01-23T16:15:41.190000
CVE-2025-24403,0,0,b2088ac01a9c55c649a445287155d64d27005e5dcd4113b43fe4eee61a530dc4,2025-01-23T16:15:41.333000 CVE-2025-24403,0,0,b2088ac01a9c55c649a445287155d64d27005e5dcd4113b43fe4eee61a530dc4,2025-01-23T16:15:41.333000
CVE-2025-24456,0,0,6523f3c101f4627bc76fe98572471b61eebbe2b2db1478b5e2b49419a77df538,2025-01-21T18:15:18.320000 CVE-2025-24456,0,1,d9c9319558b4dc57fc03dad7b8a246937d533b449f10c003d5f195a9361f5e8b,2025-01-30T21:28:52.003000
CVE-2025-24457,0,0,8215739f2c45f2f128765b5c9586342100742ab36e76214e9002205ed3878a50,2025-01-21T18:15:18.520000 CVE-2025-24457,0,1,05da9f488d0dcdd3961130ee761713c1c134c5d7cd87b42c0364b434d3a85623,2025-01-30T21:31:24.150000
CVE-2025-24458,0,0,03e16f621e1b9e4e70e73985609e6df9be85cc317385d52b463a59fae87ddc54,2025-01-21T18:15:18.697000 CVE-2025-24458,0,1,8fdab3bff09e0d5a6505ed060bcf7556a504946ddbff2902aa6888f1df89808e,2025-01-30T21:35:05.127000
CVE-2025-24459,0,0,c083202f8944227211ab4ec18f1b1811e261bceb2079bbb92a48c6e7c058d3bc,2025-01-21T18:15:18.890000 CVE-2025-24459,0,1,257e6112464c1679ae0abd32e184bcf8f361e1385cb92f80002e53f6e2f87c39,2025-01-30T21:22:22.917000
CVE-2025-24460,0,0,91287787f4d848d8e28c04d17a6364c6b1da8dd244cdf6af640fa2b8371b6e01,2025-01-21T18:15:19.067000 CVE-2025-24460,0,1,4f72eb3be22e4f1df5ebc3a0bd9e4b0215891e7379b9cb7c39c53c2299ad1aa4,2025-01-30T21:25:18.337000
CVE-2025-24461,0,0,ad0935e17c290ba8ab95f02ea53cd2528798caff1030b0f8ad947dd515e65dfd,2025-01-21T18:15:19.260000 CVE-2025-24461,0,1,25f37a551c58c38f8a12f7c46f3328964394f6bf5bab9d552ab0758339b513f4,2025-01-30T21:26:17.583000
CVE-2025-24478,0,0,489807abc8b3ac20963ab9718a91a7aef5527f911d78441ab168e0bbd3662f38,2025-01-28T19:15:14.777000 CVE-2025-24478,0,0,489807abc8b3ac20963ab9718a91a7aef5527f911d78441ab168e0bbd3662f38,2025-01-28T19:15:14.777000
CVE-2025-24479,0,0,5b17b976259e83197a8085e93f801f9d4ec374bab1cdd4bfcdb02db805fe2920,2025-01-28T19:15:14.910000 CVE-2025-24479,0,0,5b17b976259e83197a8085e93f801f9d4ec374bab1cdd4bfcdb02db805fe2920,2025-01-28T19:15:14.910000
CVE-2025-24480,0,0,6175dc6a2dc51becbf31db587b185fc0cf5ca4083049b1eeaefe14ce192b439b,2025-01-28T19:15:15.033000 CVE-2025-24480,0,0,6175dc6a2dc51becbf31db587b185fc0cf5ca4083049b1eeaefe14ce192b439b,2025-01-28T19:15:15.033000
CVE-2025-24481,0,0,d4c5f694be1964c793671f83858574d39267f41102637d90efe71d5e986d8cd1,2025-01-28T21:15:18.520000 CVE-2025-24481,0,0,d4c5f694be1964c793671f83858574d39267f41102637d90efe71d5e986d8cd1,2025-01-28T21:15:18.520000
CVE-2025-24482,0,0,bffc5c2a6aec76e0e32e2e073e316933365710b3f1f42623c1fb53cca20472b6,2025-01-28T21:15:18.687000 CVE-2025-24482,0,0,bffc5c2a6aec76e0e32e2e073e316933365710b3f1f42623c1fb53cca20472b6,2025-01-28T21:15:18.687000
CVE-2025-24500,1,1,35190c317ddcce19d4aee8ee748c17d45f2476c9549f6a6b80f1e6eda5312f25,2025-01-30T19:15:14.600000 CVE-2025-24500,0,0,35190c317ddcce19d4aee8ee748c17d45f2476c9549f6a6b80f1e6eda5312f25,2025-01-30T19:15:14.600000
CVE-2025-24501,1,1,25016f3b803dc8e09093f9516f3e0f21fda9167105445fb9cc37e2fe6c19edcb,2025-01-30T19:15:14.723000 CVE-2025-24501,0,0,25016f3b803dc8e09093f9516f3e0f21fda9167105445fb9cc37e2fe6c19edcb,2025-01-30T19:15:14.723000
CVE-2025-24502,1,1,1eb316836513de80497e296ec6ea7bd00b7cff1ab9bf0070420a7499a20eab2e,2025-01-30T20:15:50.460000 CVE-2025-24502,0,0,1eb316836513de80497e296ec6ea7bd00b7cff1ab9bf0070420a7499a20eab2e,2025-01-30T20:15:50.460000
CVE-2025-24503,1,1,7584a07b3748c523d6c3eadf63ca15c07501165a1b0dce638379355412d9dc9a,2025-01-30T20:15:50.580000 CVE-2025-24503,0,0,7584a07b3748c523d6c3eadf63ca15c07501165a1b0dce638379355412d9dc9a,2025-01-30T20:15:50.580000
CVE-2025-24504,1,1,d2a2bec9c28d157a0b68c3cedeca7ffbdbb4dfa39cf9a567e098e1424f8e7f29,2025-01-30T19:15:16.967000 CVE-2025-24504,0,0,d2a2bec9c28d157a0b68c3cedeca7ffbdbb4dfa39cf9a567e098e1424f8e7f29,2025-01-30T19:15:16.967000
CVE-2025-24505,1,1,bcb0d90a6d83572cd1c4650b0d17fa3f0e1466b11ba85158c5fa2c6f2c4fc5cd,2025-01-30T20:15:50.737000 CVE-2025-24505,0,0,bcb0d90a6d83572cd1c4650b0d17fa3f0e1466b11ba85158c5fa2c6f2c4fc5cd,2025-01-30T20:15:50.737000
CVE-2025-24506,1,1,4aa7d5faac8a004ebe67dab09520b2fb3c0013e78b52aca36223b603926a2a29,2025-01-30T20:15:50.850000 CVE-2025-24506,0,0,4aa7d5faac8a004ebe67dab09520b2fb3c0013e78b52aca36223b603926a2a29,2025-01-30T20:15:50.850000
CVE-2025-24507,1,1,50d6927f61db4847e3d9a4b8c496706f34df535200780511fff92e4528acf764,2025-01-30T19:15:17.920000 CVE-2025-24507,0,0,50d6927f61db4847e3d9a4b8c496706f34df535200780511fff92e4528acf764,2025-01-30T19:15:17.920000
CVE-2025-24527,0,0,8f5d99489f05ec903e1b0ba411b4f26945dcb60c4d1c8d36f935f4c612211f10,2025-01-29T17:15:29.873000 CVE-2025-24527,0,0,8f5d99489f05ec903e1b0ba411b4f26945dcb60c4d1c8d36f935f4c612211f10,2025-01-29T17:15:29.873000
CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000 CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000
CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000 CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000
@ -279532,7 +279545,7 @@ CVE-2025-24793,0,0,d4e07940239b9e00a0a69537d9f171e93d29bd100812c005125832500a710
CVE-2025-24794,0,0,2f11cb6d90041da254b8f99c352894c2b43558b53ed02d7114c4604602ab34d0,2025-01-29T21:15:21.397000 CVE-2025-24794,0,0,2f11cb6d90041da254b8f99c352894c2b43558b53ed02d7114c4604602ab34d0,2025-01-29T21:15:21.397000
CVE-2025-24795,0,0,02b3fee7a40cc82ee8b1315243aa5224def5b0913e0f89e5c85904feb21dfca6,2025-01-29T21:15:21.533000 CVE-2025-24795,0,0,02b3fee7a40cc82ee8b1315243aa5224def5b0913e0f89e5c85904feb21dfca6,2025-01-29T21:15:21.533000
CVE-2025-24800,0,0,92ce9341d9d5dcab9ec4de59a19d838c194a1a5ea345070b5216d35b2e3823ef,2025-01-28T16:15:45.063000 CVE-2025-24800,0,0,92ce9341d9d5dcab9ec4de59a19d838c194a1a5ea345070b5216d35b2e3823ef,2025-01-28T16:15:45.063000
CVE-2025-24802,1,1,3d0dd73d8f8fb01b2266159815cf7c33b5253a3fd988ae894a9cd0d8e1bf6678,2025-01-30T20:15:51.010000 CVE-2025-24802,0,0,3d0dd73d8f8fb01b2266159815cf7c33b5253a3fd988ae894a9cd0d8e1bf6678,2025-01-30T20:15:51.010000
CVE-2025-24810,0,0,9aadcf7445dd03539c4634635be857a9e6e77ee72d1b60352718480c3867482c,2025-01-28T05:15:11.413000 CVE-2025-24810,0,0,9aadcf7445dd03539c4634635be857a9e6e77ee72d1b60352718480c3867482c,2025-01-28T05:15:11.413000
CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000 CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000
CVE-2025-24826,0,0,a7644a31e02355bb510bf7d19c7cfad2325be8f7fb1f39c773cd5bf91edd8ae9,2025-01-28T21:15:18.817000 CVE-2025-24826,0,0,a7644a31e02355bb510bf7d19c7cfad2325be8f7fb1f39c773cd5bf91edd8ae9,2025-01-28T21:15:18.817000

Can't render this file because it is too large.