Auto-Update: 2025-02-19T03:02:54.694460+00:00

This commit is contained in:
cad-safe-bot 2025-02-19 03:06:22 +00:00
parent 5f43604711
commit 349bd9e034
11 changed files with 568 additions and 55 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53704",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2025-01-09T07:15:27.203",
"lastModified": "2025-02-18T21:15:22.547",
"lastModified": "2025-02-19T02:00:02.000",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,10 @@
}
]
},
"cisaExploitAdd": "2025-02-18",
"cisaActionDue": "2025-03-11",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "SonicWall SonicOS SSLVPN Improper Authentication Vulnerability",
"weaknesses": [
{
"source": "PSIRT@sonicwall.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57257",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T23:15:09.800",
"lastModified": "2025-02-18T23:15:09.800",
"lastModified": "2025-02-19T01:15:08.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A stack consumption issue in sqfs_size in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with deep symlink nesting."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 2.0,
"baseSeverity": "LOW",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-674"
}
]
}
],
"references": [
{
"url": "https://source.denx.de/u-boot/u-boot/-/commit/4f5cc096bfd0a591f8a11e86999e3d90a9484c34",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57258",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T23:15:09.893",
"lastModified": "2025-02-18T23:15:09.893",
"lastModified": "2025-02-19T01:15:09.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur for a crafted squashfs filesystem via sbrk, via request2size, or because ptrdiff_t is mishandled on x86_64."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://source.denx.de/u-boot/u-boot/-/commit/0a10b49206a29b4aa2f80233a3e53ca0466bb0b3",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57259",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T23:15:09.980",
"lastModified": "2025-02-18T23:15:09.980",
"lastModified": "2025-02-19T01:15:09.257",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "sqfs_search_dir in Das U-Boot before 2025.01-rc1 exhibits an off-by-one error and resultant heap memory corruption for squashfs directory listing because the path separator is not considered in a size calculation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-193"
}
]
}
],
"references": [
{
"url": "https://source.denx.de/u-boot/u-boot/-/commit/048d795bb5b3d9c5701b4855f5e74bcf6849bf5e",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-57261",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T02:15:08.480",
"lastModified": "2025-02-19T02:15:08.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In barebox before 2025.01.0, request2size in common/dlmalloc.c has an integer overflow, a related issue to CVE-2024-57258."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://git.pengutronix.de/cgit/barebox/commit/?id=7cf25e0733f08f68d1bf0ca0c3cf6e2dfe51bd3c",
"source": "cve@mitre.org"
},
{
"url": "https://lists.infradead.org/pipermail/barebox/2024-November/048631.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-57262",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T02:15:08.677",
"lastModified": "2025-02-19T02:15:08.677",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In barebox before 2025.01.0, ext4fs_read_symlink has an integer overflow for zalloc (adding one to an le32 variable) via a crafted ext4 filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite, a related issue to CVE-2024-57256."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://git.pengutronix.de/cgit/barebox/commit/?id=a2b76550f7d8",
"source": "cve@mitre.org"
},
{
"url": "https://git.pengutronix.de/cgit/barebox/commit/?id=a2b76550f7d87ba6f88a9ea50e71f107b514ff4e",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0108",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-02-12T21:15:16.290",
"lastModified": "2025-02-12T21:15:16.290",
"vulnStatus": "Received",
"lastModified": "2025-02-19T02:00:02.000",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,10 @@
}
]
},
"cisaExploitAdd": "2025-02-18",
"cisaActionDue": "2025-03-11",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Palo Alto PAN-OS Authentication Bypass Vulnerability",
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-1447",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-19T01:15:09.407",
"lastModified": "2025-02-19T01:15:09.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in kasuganosoras Pigeon 1.0.177. It has been declared as critical. This vulnerability affects unknown code of the file /pigeon/imgproxy/index.php. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. Upgrading to version 1.0.181 is able to address this issue. The patch is identified as 84cea5fe73141689da2e7ec8676d47435bd6423e. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/kasuganosoras/Pigeon/commit/84cea5fe73141689da2e7ec8676d47435bd6423e",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/kasuganosoras/Pigeon/releases/tag/1.0.181",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/sheratan4/cve/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.296134",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.296134",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.501978",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-1448",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-19T02:15:08.833",
"lastModified": "2025-02-19T02:15:08.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Synway SMG Gateway Management Software up to 20250204. It has been rated as critical. This issue affects some unknown processing of the file 9-12ping.php. The manipulation of the argument retry leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/stevenchen0x01/CVE/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.296135",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.296135",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.494788",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-19T00:55:26.738110+00:00
2025-02-19T03:02:54.694460+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-19T00:15:10.550000+00:00
2025-02-19T02:15:08.833000+00:00
```
### Last Data Feed Release
@ -27,44 +27,34 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-02-18T01:00:04.385107+00:00
2025-02-19T01:00:04.358936+00:00
```
### Total Number of included CVEs
```plain
281727
281731
```
### CVEs added in the last Commit
Recently added CVEs: `18`
Recently added CVEs: `4`
- [CVE-2024-13508](CVE-2024/CVE-2024-135xx/CVE-2024-13508.json) (`2025-02-19T00:15:09.360`)
- [CVE-2024-13743](CVE-2024/CVE-2024-137xx/CVE-2024-13743.json) (`2025-02-18T23:15:09.267`)
- [CVE-2024-57254](CVE-2024/CVE-2024-572xx/CVE-2024-57254.json) (`2025-02-18T23:15:09.523`)
- [CVE-2024-57255](CVE-2024/CVE-2024-572xx/CVE-2024-57255.json) (`2025-02-18T23:15:09.620`)
- [CVE-2024-57256](CVE-2024/CVE-2024-572xx/CVE-2024-57256.json) (`2025-02-18T23:15:09.710`)
- [CVE-2024-57257](CVE-2024/CVE-2024-572xx/CVE-2024-57257.json) (`2025-02-18T23:15:09.800`)
- [CVE-2024-57258](CVE-2024/CVE-2024-572xx/CVE-2024-57258.json) (`2025-02-18T23:15:09.893`)
- [CVE-2024-57259](CVE-2024/CVE-2024-572xx/CVE-2024-57259.json) (`2025-02-18T23:15:09.980`)
- [CVE-2025-22919](CVE-2025/CVE-2025-229xx/CVE-2025-22919.json) (`2025-02-18T23:15:10.073`)
- [CVE-2025-22920](CVE-2025/CVE-2025-229xx/CVE-2025-22920.json) (`2025-02-18T23:15:10.160`)
- [CVE-2025-24928](CVE-2025/CVE-2025-249xx/CVE-2025-24928.json) (`2025-02-18T23:15:10.250`)
- [CVE-2025-25471](CVE-2025/CVE-2025-254xx/CVE-2025-25471.json) (`2025-02-18T23:15:10.370`)
- [CVE-2025-25472](CVE-2025/CVE-2025-254xx/CVE-2025-25472.json) (`2025-02-18T23:15:10.453`)
- [CVE-2025-25473](CVE-2025/CVE-2025-254xx/CVE-2025-25473.json) (`2025-02-18T23:15:10.543`)
- [CVE-2025-25474](CVE-2025/CVE-2025-254xx/CVE-2025-25474.json) (`2025-02-18T23:15:10.627`)
- [CVE-2025-25475](CVE-2025/CVE-2025-254xx/CVE-2025-25475.json) (`2025-02-18T23:15:10.720`)
- [CVE-2025-26624](CVE-2025/CVE-2025-266xx/CVE-2025-26624.json) (`2025-02-18T23:15:10.810`)
- [CVE-2025-27113](CVE-2025/CVE-2025-271xx/CVE-2025-27113.json) (`2025-02-18T23:15:10.960`)
- [CVE-2024-57261](CVE-2024/CVE-2024-572xx/CVE-2024-57261.json) (`2025-02-19T02:15:08.480`)
- [CVE-2024-57262](CVE-2024/CVE-2024-572xx/CVE-2024-57262.json) (`2025-02-19T02:15:08.677`)
- [CVE-2025-1447](CVE-2025/CVE-2025-14xx/CVE-2025-1447.json) (`2025-02-19T01:15:09.407`)
- [CVE-2025-1448](CVE-2025/CVE-2025-14xx/CVE-2025-1448.json) (`2025-02-19T02:15:08.833`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `5`
- [CVE-2024-56171](CVE-2024/CVE-2024-561xx/CVE-2024-56171.json) (`2025-02-18T23:15:09.413`)
- [CVE-2024-53704](CVE-2024/CVE-2024-537xx/CVE-2024-53704.json) (`2025-02-19T02:00:02.000`)
- [CVE-2024-57257](CVE-2024/CVE-2024-572xx/CVE-2024-57257.json) (`2025-02-19T01:15:08.963`)
- [CVE-2024-57258](CVE-2024/CVE-2024-572xx/CVE-2024-57258.json) (`2025-02-19T01:15:09.117`)
- [CVE-2024-57259](CVE-2024/CVE-2024-572xx/CVE-2024-57259.json) (`2025-02-19T01:15:09.257`)
- [CVE-2025-0108](CVE-2025/CVE-2025-01xx/CVE-2025-0108.json) (`2025-02-19T02:00:02.000`)
## Download and Usage

View File

@ -246586,7 +246586,7 @@ CVE-2024-13503,0,0,ffb0135326ea2a3ea18800ce3bd83bc523a9e303f03b2acc60a1815003b24
CVE-2024-13504,0,0,65d5eda0db4362f31390d7f75ebf33f34fcbb67dce33bcab3e8868827236c840,2025-01-31T06:15:29.603000
CVE-2024-13505,0,0,895d0e00033b2fc93f737f0101cc08804d47354317cd9b6a35dce5b9b4d90dcc,2025-02-04T17:20:18.253000
CVE-2024-13506,0,0,930bb6bf4f5f135719a404ee3e3d8937d2d3b23c92567785b27ff7a81d86db45,2025-02-11T11:15:12.263000
CVE-2024-13508,1,1,cb500d45d3d1c5f13cf603c102bdf058371a7c70fc790b3143ee2ca90431b0e4,2025-02-19T00:15:09.360000
CVE-2024-13508,0,0,cb500d45d3d1c5f13cf603c102bdf058371a7c70fc790b3143ee2ca90431b0e4,2025-02-19T00:15:09.360000
CVE-2024-13509,0,0,4616681e9925b5001099930aae74cd3c34870295df83ba209474cc01f26318f5,2025-01-30T17:56:17.080000
CVE-2024-1351,0,0,405f7ca5457b566dd144bafd06aaa6f59a3ff04b5a8a69549d30c39336936faa,2025-02-13T18:16:24.043000
CVE-2024-13510,0,0,bf025b224548dff5677e13c6095ef04edc46d236692642ff5d521730071b549d,2025-02-04T10:15:08.167000
@ -246747,7 +246747,7 @@ CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269d
CVE-2024-13740,0,0,ba6332fba984f0b615db8e6ca888f7060538e8c0e0b28351d9f7958c938b931d,2025-02-18T03:15:10.273000
CVE-2024-13741,0,0,175049f3021b19cf7fa751f03fe80f12100c24edbb7e3c159d12f4c96d5eb8a9,2025-02-18T02:15:13.047000
CVE-2024-13742,0,0,aa7b21df6f3ec325db10419962054c1a324c9ebd12e6b4ba3b8ccbdda20e9f49,2025-01-30T18:38:19.663000
CVE-2024-13743,1,1,27ea41ebfcfb791fdac8994b9a3c60039e7203f73b7d197f4d7616cc1f730a6d,2025-02-18T23:15:09.267000
CVE-2024-13743,0,0,27ea41ebfcfb791fdac8994b9a3c60039e7203f73b7d197f4d7616cc1f730a6d,2025-02-18T23:15:09.267000
CVE-2024-13749,0,0,80f262ecaea974125eab2d55e54ea371d41d3a900599102c4f121cdbe4bfacc8,2025-02-12T04:15:09.793000
CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000
CVE-2024-13752,0,0,90982070281cf6fac387cb369b7b78fff5885316e613711da2e6fb3910f9109c,2025-02-15T10:15:08.533000
@ -272676,7 +272676,7 @@ CVE-2024-5370,0,0,48c7315107625a479797e074526b223c8b52af346ac3d015ac5eeb0155616f
CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000
CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000
CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000
CVE-2024-53704,0,0,27969c48b5153c259e07425a651025ffafc5f424229dab59a6c01f93d4252f9a,2025-02-18T21:15:22.547000
CVE-2024-53704,0,1,5a29d0026803cfefd80daeb2effed8634f8ef892ba81f5bbfbab498237e4d8ea,2025-02-19T02:00:02
CVE-2024-53705,0,0,cb2aece8a5d68261ccbbe06bdcbef5f15dc8b4b71fbf212b281c5c2102470ea9,2025-01-09T15:15:18.800000
CVE-2024-53706,0,0,df37bc87068a5b2ce03429b7e89276c6f6c8ca589f496366856bc396d49be328,2025-01-09T16:16:21.743000
CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000
@ -273978,7 +273978,7 @@ CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b18
CVE-2024-56161,0,0,2a6c7438bc454e067e4c7217ccd5cceb54331357f693b69fc6ab4e188462cd9e,2025-02-04T12:15:28.027000
CVE-2024-56169,0,0,567a94aa793aa7d8ac0858cf8e15bf66684dbd548103356ddbc53b2c4594c82e,2025-02-10T23:15:15.203000
CVE-2024-56170,0,0,32611264582c3e86fc6149b20f12d5acbffe58d1028228c5f9baa4ad2faec8d4,2024-12-26T19:15:08.283000
CVE-2024-56171,0,1,a57b28947d21118f6e92b6897a79ff02d9554d30c40f0d4e932307aae08f766f,2025-02-18T23:15:09.413000
CVE-2024-56171,0,0,a57b28947d21118f6e92b6897a79ff02d9554d30c40f0d4e932307aae08f766f,2025-02-18T23:15:09.413000
CVE-2024-56173,0,0,5336dffcdc7d9618ebdef949381efb90ee1b3998a2588e22f737fe5a77849f25,2024-12-18T16:15:15.600000
CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e97c,2024-12-18T17:15:15.190000
CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000
@ -274688,13 +274688,15 @@ CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e82
CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000
CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000
CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050e7d,2025-01-17T22:15:28.817000
CVE-2024-57254,1,1,78f3756f504d64aafe3c7fe030d998338c4f68eeebca5a88a1ee7746dcf3b080,2025-02-19T00:15:10.243000
CVE-2024-57255,1,1,47d85e6c518447f6b2398d380509ce606bb346706e2218bb1c2ffeae53aec47c,2025-02-19T00:15:10.397000
CVE-2024-57256,1,1,04cbb17411d01c78be02ff0e779795e92b0782215dfab979123c37fbfd98ae11,2025-02-19T00:15:10.550000
CVE-2024-57257,1,1,c02469de9d1b543cabfa11e611ceef6b6ed25780e09ca62798f2a6a8f745f628,2025-02-18T23:15:09.800000
CVE-2024-57258,1,1,b1226ae97e32f2a04e094c1e261a53664906621f290009196c615659226fd163,2025-02-18T23:15:09.893000
CVE-2024-57259,1,1,7f3f9f1c92708c0da6871a7c74e2205f47948119c8e641f13a3345092a6e6157,2025-02-18T23:15:09.980000
CVE-2024-57254,0,0,78f3756f504d64aafe3c7fe030d998338c4f68eeebca5a88a1ee7746dcf3b080,2025-02-19T00:15:10.243000
CVE-2024-57255,0,0,47d85e6c518447f6b2398d380509ce606bb346706e2218bb1c2ffeae53aec47c,2025-02-19T00:15:10.397000
CVE-2024-57256,0,0,04cbb17411d01c78be02ff0e779795e92b0782215dfab979123c37fbfd98ae11,2025-02-19T00:15:10.550000
CVE-2024-57257,0,1,0f11b41937fa4627d73472deb52deae8f6bc85d7966ebb62d9c4447ed3649650,2025-02-19T01:15:08.963000
CVE-2024-57258,0,1,22fe56d0f81aba8abf95644ff85b0581abf3fa4849ede72d307ace4cb2da41cb,2025-02-19T01:15:09.117000
CVE-2024-57259,0,1,7a6eb23f5e3eaefce3e01258346d6c3c63f7f8eb3b1eabb3adf0a779bd3162ae,2025-02-19T01:15:09.257000
CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000
CVE-2024-57261,1,1,ca42f68e153d0be6e9cb0cd79e10c17f8af4df029f55193e9ee3cebd8e1524d1,2025-02-19T02:15:08.480000
CVE-2024-57262,1,1,9450e719a6c12b68a90f479bb3c057c51a8162807b8fbaf825e482631247111d,2025-02-19T02:15:08.677000
CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000
CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000
CVE-2024-57276,0,0,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000
@ -278767,7 +278769,7 @@ CVE-2025-0104,0,0,21c4318a0d99e7fa45fcf41d38940b721a051c25e3dcd31ab0543aa8393743
CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000
CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000
CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000
CVE-2025-0108,0,0,00274592986205c6ad43614425baa116d11a253f878966ea5c2ab772d032a552,2025-02-12T21:15:16.290000
CVE-2025-0108,0,1,9984445b2ca5afb1526508f1260cfbe552aa27c58dc311866cf73b702ffbbe92,2025-02-19T02:00:02
CVE-2025-0109,0,0,5a24ce2e009561b2fb59096b6f1ded171180346c747fdc8ee1c0182acced781c,2025-02-12T21:15:16.470000
CVE-2025-0110,0,0,b411c8390eb932e9490dd491fe7ec15b7990f1154a6a3792e2622d16f01feb5d,2025-02-12T21:15:16.630000
CVE-2025-0111,0,0,aa2258940e699552d6ad0522d6bc535ee5e05cc6ed6d0935f57d5a6bf309cd74,2025-02-12T21:15:16.793000
@ -279433,6 +279435,8 @@ CVE-2025-1390,0,0,02ff75a3058ee51af8713fa469c7bed94932b28a55e59655029e36f100f66a
CVE-2025-1391,0,0,a1f2e3a8ca093b8de620c0e72b50119acca7a6fd87679168958e3acea938ff79,2025-02-17T14:15:08.413000
CVE-2025-1392,0,0,381fc64763a47738c9a933c7e4bcfcc84ef66c73e4a81eacddf01751da768947,2025-02-17T16:15:16.120000
CVE-2025-1414,0,0,b6f2fa5b41b9076d018bd1d274a1717bfb4b17a7162b38316b8f5f46b587bbc9,2025-02-18T21:15:25.440000
CVE-2025-1447,1,1,0171066f5cc38b75ed48310b7b051ba77753a7de710aef2fb49270a13c1b0697,2025-02-19T01:15:09.407000
CVE-2025-1448,1,1,8646602fe654ea9c8b8dc30e88ebd580a07aa04ffb2e255dc4fb4a77857c3ea4,2025-02-19T02:15:08.833000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
@ -280384,8 +280388,8 @@ CVE-2025-22913,0,0,cd3c3aefe7c3a5669cde7a2ee1d89cefb3b13bfe1cdbf0f6d928668a7ec0e
CVE-2025-22916,0,0,6c28d06c66a3a04473870372fc3d915bb705229b4ce4207a1272b25cfd8538c4,2025-02-18T21:15:27.950000
CVE-2025-22917,0,0,0d72f7ff6d66913d2820416ce95685d3bc853139131a9698fa080019dc84bb06,2025-01-29T16:15:43.907000
CVE-2025-22918,0,0,2fd7b69a5783a0816fd30844977f8382a02d00bf28fb9a113c66c1ed7d87d02d,2025-02-18T19:15:26.700000
CVE-2025-22919,1,1,1b0d00aaf6631f840ce13a016b207283d93d827c42bc5445866edb031c55f281,2025-02-18T23:15:10.073000
CVE-2025-22920,1,1,fd7b66fc43d3a9481e10e6d16eeabb06cbc7558b61e61ab2d56633a397652b91,2025-02-18T23:15:10.160000
CVE-2025-22919,0,0,1b0d00aaf6631f840ce13a016b207283d93d827c42bc5445866edb031c55f281,2025-02-18T23:15:10.073000
CVE-2025-22920,0,0,fd7b66fc43d3a9481e10e6d16eeabb06cbc7558b61e61ab2d56633a397652b91,2025-02-18T23:15:10.160000
CVE-2025-22921,0,0,debc99abe53255cfa5a22b0ec7ab8f1dfb477f7032a6902bbdfd515f66bcedf6,2025-02-18T22:15:18.040000
CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000
CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000
@ -281407,7 +281411,7 @@ CVE-2025-24903,0,0,f94c50d2f0574a93b5b48805712360c1af6392fea087d65c2ed61830aedff
CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c1d1,2025-02-13T16:16:49.053000
CVE-2025-24905,0,0,ecc12daf91d871ae88d04f98498257679fd02d46bd8922b3f82316cc94d8878c,2025-02-13T19:00:37.593000
CVE-2025-24906,0,0,13b689df14524878d89525acaf7cfd0d975a63297d29c07d6d881d3b3e914d54,2025-02-13T18:59:59.940000
CVE-2025-24928,1,1,e5fd8968e5c5c56f275d71a964d0b667b12bcc4ba8d81e28fd60cc19579119bd,2025-02-18T23:15:10.250000
CVE-2025-24928,0,0,e5fd8968e5c5c56f275d71a964d0b667b12bcc4ba8d81e28fd60cc19579119bd,2025-02-18T23:15:10.250000
CVE-2025-24956,0,0,60f62dbd8ca3ec9022b0bbf689d92a9416e8938202e5bdb77bb2e05ca0ed67f7,2025-02-11T11:15:17.273000
CVE-2025-24957,0,0,4c6009fdcebadcde59c81c994d42af877595682fdef18bb7378b4f2679eaf5d8,2025-02-13T18:59:32.867000
CVE-2025-24958,0,0,83843e5baca1cb66509cb1b7cb198ebfd9f486662ffcb2ce9c260edca5373dcd,2025-02-13T18:58:56.320000
@ -281555,11 +281559,11 @@ CVE-2025-25389,0,0,9f7198ffc91c33105d03adb0c3ce8e30d33f5591c78e15ae8d3046dd1ba01
CVE-2025-25467,0,0,61ffc7e889c5c4d70b42d956678cc9ed638e9d5b8d680d26869fea336cad8905,2025-02-18T22:15:18.373000
CVE-2025-25468,0,0,85057d249a185badd8089bc6bcbf97fd2a496ee7b42fd2afcf4045da21103a1d,2025-02-18T22:15:18.477000
CVE-2025-25469,0,0,e9ca9bae21c00b3260ea3e00b66e7b1daf3a8f35534912c9c9e5bdd584776714,2025-02-18T22:15:18.587000
CVE-2025-25471,1,1,1cf8cabe5ddcb48378e820b0e4aeb116707ed6be0c741b8dc51daf45d68d9938,2025-02-18T23:15:10.370000
CVE-2025-25472,1,1,c2f5cc257d7e5a6c5a49c63bafb1948a39e5c850debde3aec5b79fd0d4b3f6fa,2025-02-18T23:15:10.453000
CVE-2025-25473,1,1,c3377abea32643377986d4a6c8e6cee28a2c25045f9979e0b4cd6a8ce35d70a2,2025-02-18T23:15:10.543000
CVE-2025-25474,1,1,b925b7428c677c1e850c370ad9f0ec38d1213c70f43bec4b9eca1ff32d89c5ca,2025-02-18T23:15:10.627000
CVE-2025-25475,1,1,748ef3834a42c41684ceff00188d0797766715b6cc9289f8a3a26c427d42cf2e,2025-02-18T23:15:10.720000
CVE-2025-25471,0,0,1cf8cabe5ddcb48378e820b0e4aeb116707ed6be0c741b8dc51daf45d68d9938,2025-02-18T23:15:10.370000
CVE-2025-25472,0,0,c2f5cc257d7e5a6c5a49c63bafb1948a39e5c850debde3aec5b79fd0d4b3f6fa,2025-02-18T23:15:10.453000
CVE-2025-25473,0,0,c3377abea32643377986d4a6c8e6cee28a2c25045f9979e0b4cd6a8ce35d70a2,2025-02-18T23:15:10.543000
CVE-2025-25474,0,0,b925b7428c677c1e850c370ad9f0ec38d1213c70f43bec4b9eca1ff32d89c5ca,2025-02-18T23:15:10.627000
CVE-2025-25475,0,0,748ef3834a42c41684ceff00188d0797766715b6cc9289f8a3a26c427d42cf2e,2025-02-18T23:15:10.720000
CVE-2025-25522,0,0,9f2c0bc0a6dbb67154353c2da3969483621b5d35364f73acfaa2a34b0ff5a40b,2025-02-13T17:17:20.517000
CVE-2025-25523,0,0,9c6d5a6c8c747b7673e69ebf58bf535f17db00e0831b58073ddd586410cf36d9,2025-02-13T18:18:23.400000
CVE-2025-25524,0,0,40af9c5e5be067f2e684b500c6cae4a5dab6d519bde35d9c0fd3353781274a87,2025-02-13T18:18:23.597000
@ -281699,7 +281703,7 @@ CVE-2025-26616,0,0,adfc76ec40903a204c1832e3daed3f0e44bf0c652172addd04989d3ff972b
CVE-2025-26617,0,0,1b0fc09fd0258e134911cacd2ad1e559b3734d07d890bba395627bae512ac0ad,2025-02-18T21:15:30.137000
CVE-2025-26620,0,0,b52554701527e486a669272c32db538b4af2be9f7d05b83de248aad0441a11da,2025-02-18T18:15:36.767000
CVE-2025-26623,0,0,8058a54e26172919c4073d93d1e5d8c8b4196bc60cec9ced7fa5cc190a1b8657,2025-02-18T20:15:33.153000
CVE-2025-26624,1,1,b1ee6d12b9f4cff5337865530f2b95198c23875bf3e99102a3d462bb47eeba02,2025-02-18T23:15:10.810000
CVE-2025-26624,0,0,b1ee6d12b9f4cff5337865530f2b95198c23875bf3e99102a3d462bb47eeba02,2025-02-18T23:15:10.810000
CVE-2025-26700,0,0,a62049a64dad278ca1213054f25f2aed479e1d05d98e9fdc2dc613607ff558b5,2025-02-17T03:15:09.750000
CVE-2025-26754,0,0,402a2759dad93da9f23b2492c07100626d0693520f28e20423238f6ecd814d8a,2025-02-17T12:15:28.267000
CVE-2025-26755,0,0,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000
@ -281725,4 +281729,4 @@ CVE-2025-26793,0,0,23a8e0213a0ca1b8120177cee0a8b3703ebe8289aad842eda98d1b97dcb6b
CVE-2025-26819,0,0,7afd4e7cb03752c52e5526c11c2ec114770ff5f83e4468a7bb7571814f4cc158,2025-02-15T00:15:28.510000
CVE-2025-27013,0,0,f948cc3f5edcc63c02fbe1aa3ab5587f3b1659a21b1a5f943b19bb040cbb2d15,2025-02-18T20:15:33.880000
CVE-2025-27016,0,0,04fa07ed62d9b49f3b31ebda2ac8455c38c6351226a3cae9904a3c1abe91e83f,2025-02-18T20:15:34.013000
CVE-2025-27113,1,1,5361e7323e42f3b09824985b5c3b788849d795bb02cd5dec29aec9ac11d6b7a1,2025-02-18T23:15:10.960000
CVE-2025-27113,0,0,5361e7323e42f3b09824985b5c3b788849d795bb02cd5dec29aec9ac11d6b7a1,2025-02-18T23:15:10.960000

Can't render this file because it is too large.