Auto-Update: 2025-01-04T00:55:19.776186+00:00

This commit is contained in:
cad-safe-bot 2025-01-04 00:58:41 +00:00
parent 6e65b3a25b
commit 399cb89b03
23 changed files with 1072 additions and 111 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32221",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-06-12T21:15:22.737",
"lastModified": "2024-11-21T08:02:55.783",
"lastModified": "2025-01-04T00:15:06.207",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-11624",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-01-03T04:15:06.030",
"lastModified": "2025-01-03T04:15:06.030",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:06.157",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "there is a possible to add apps to bypass VPN due to Undeclared Permission . This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "Existe la posibilidad de agregar aplicaciones para omitir la VPN debido a permisos no declarados. Esto podr\u00eda generar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11733",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-03T23:15:06.313",
"lastModified": "2025-01-03T23:15:06.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The WordPress Popular Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 7.1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wordpress-popular-posts/tags/7.1.0/src/Rest/ViewLoggerEndpoint.php#L70",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c38ac8d6-c6de-4be7-bf7b-198e085a0ad2?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-12237",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-03T23:15:06.473",
"lastModified": "2025-01-03T23:15:06.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Photo Gallery Slideshow & Masonry Tiled Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.15 via the rjg_get_youtube_info_justified_gallery_callback function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to retrieve limited information from internal services."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-responsive-photo-gallery/tags/1.0.15/wp-responsive-photo-gallery.php#L3023",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-responsive-photo-gallery/tags/1.0.15/wp-responsive-photo-gallery.php#L3044",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/08e44434-8908-4c63-9e5b-9a8b387255d9?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-43767",
"sourceIdentifier": "security@android.com",
"published": "2025-01-03T01:15:07.847",
"lastModified": "2025-01-03T01:15:07.847",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:06.627",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In prepare_to_draw_into_mask of SkBlurMaskFilterImpl.cpp, there is a possible heap overflow due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En prepare_to_draw_into_mask de SkBlurMaskFilterImpl.cpp, existe un posible desbordamiento de pila debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/external/skia/+/796c2040f641bb287dba66c9823ce45e9f8b5807",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-43768",
"sourceIdentifier": "security@android.com",
"published": "2025-01-03T01:15:07.923",
"lastModified": "2025-01-03T01:15:07.923",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:06.767",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In skia_alloc_func of SkDeflate.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En skia_alloc_func de SkDeflate.cpp, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/external/skia/+/b5543cb8c6b95623743016055220378efe73eb93",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-43769",
"sourceIdentifier": "security@android.com",
"published": "2025-01-03T01:15:08.003",
"lastModified": "2025-01-03T01:15:08.003",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:06.903",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In isPackageDeviceAdmin of PackageManagerService.java, there is a possible edge case which could prevent the uninstallation of CloudDpc due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En isPackageDeviceAdmin de PackageManagerService.java, existe un posible caso extremo que podr\u00eda impedir la desinstalaci\u00f3n de CloudDpc debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/619ffc299bf33566ba6daee8301ee0fc96e015f4",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-47032",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-01-03T04:15:06.137",
"lastModified": "2025-01-03T04:15:06.137",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:07.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In construct_transaction_from_cmd of lwis_ioctl.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En construct_transaction_from_cmd de lwis_ioctl.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento del b\u00fafer de mont\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53834",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-01-03T04:15:06.310",
"lastModified": "2025-01-03T04:15:06.310",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:07.190",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In sms_DisplayHexDumpOfPrivacyBuffer of sms_Utilities.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En sms_DisplayHexDumpOfPrivacyBuffer de sms_Utilities.c, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53835",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-01-03T04:15:06.383",
"lastModified": "2025-01-03T04:15:06.383",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:07.333",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "Existe la posibilidad de una omisi\u00f3n biom\u00e9trica debido a una causa ra\u00edz inusual. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53836",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-01-03T04:15:06.470",
"lastModified": "2025-01-03T04:15:06.470",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:07.470",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wbrc_bt_dev_write of wb_regon_coordinator.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En wbrc_bt_dev_write de wb_regon_coordinator.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53837",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-01-03T04:15:06.560",
"lastModified": "2025-01-03T04:15:06.560",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:07.620",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In prepare_response of lwis_periodic_io.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En prepare_response de lwis_periodic_io.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de n\u00fameros enteros. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53838",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-01-03T04:15:06.650",
"lastModified": "2025-01-03T04:15:06.650",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:07.747",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Exynos_parsing_user_data_registered_itu_t_t35 of VendorVideoAPI.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En Exynos_parsing_user_data_registered_itu_t_t35 de VendorVideoAPI.cpp, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53839",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-01-03T04:15:06.727",
"lastModified": "2025-01-03T04:15:06.727",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:07.883",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In GetCellInfoList() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En GetCellInfoList() de protocolnetadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local y comprometer el firmware de banda base. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53840",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-01-03T04:15:06.810",
"lastModified": "2025-01-03T04:15:06.810",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:08.020",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "Existe la posibilidad de una omisi\u00f3n biom\u00e9trica debido a una causa ra\u00edz inusual. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53841",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-01-03T04:15:06.893",
"lastModified": "2025-01-03T04:15:06.893",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:08.153",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In startListeningForDeviceStateChanges, there is a possible Permission Bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En startListeningForDeviceStateChanges, existe una posible omisi\u00f3n de permisos debido a un subordinado confundido. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53842",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-01-03T04:15:06.980",
"lastModified": "2025-01-03T04:15:06.980",
"vulnStatus": "Received",
"lastModified": "2025-01-03T23:15:08.293",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In cc_SendCcImsInfoIndMsg of cc_MmConManagement.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En cc_SendCcImsInfoIndMsg de cc_MmConManagement.c, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-12-01",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-55896",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-03T23:15:08.437",
"lastModified": "2025-01-03T23:15:08.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM PowerHA SystemMirror for i 7.4 and 7.5 contains improper restrictions when rendering content via iFrames. \u00a0This vulnerability could allow an attacker to gain improper access and perform unauthorized actions on the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-451"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7180036",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-55897",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-03T23:15:08.573",
"lastModified": "2025-01-03T23:15:08.573",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM PowerHA SystemMirror for i 7.4 and 7.5 \n\ndoes not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7180036",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0199",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-03T23:15:08.707",
"lastModified": "2025-01-03T23:15:08.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in code-projects Point of Sales and Inventory Management System 1.0. Affected is an unknown function of the file /user/minus_cart.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/Masamuneee/eff0a0865d54305faa78624e63172a92",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290136",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290136",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.473384",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-22376",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-03T22:15:07.917",
"lastModified": "2025-01-03T22:15:07.917",
"lastModified": "2025-01-03T23:15:08.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
@ -22,6 +45,16 @@
"value": "CWE-338"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-338"
}
]
}
],
"references": [

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-03T23:00:21.059268+00:00
2025-01-04T00:55:19.776186+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-03T22:49:49.463000+00:00
2025-01-04T00:15:06.207000+00:00
```
### Last Data Feed Release
@ -33,42 +33,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
275673
275678
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `5`
- [CVE-2024-13129](CVE-2024/CVE-2024-131xx/CVE-2024-13129.json) (`2025-01-03T22:15:06.677`)
- [CVE-2024-56332](CVE-2024/CVE-2024-563xx/CVE-2024-56332.json) (`2025-01-03T21:15:13.550`)
- [CVE-2025-0198](CVE-2025/CVE-2025-01xx/CVE-2025-0198.json) (`2025-01-03T21:15:14.053`)
- [CVE-2025-22376](CVE-2025/CVE-2025-223xx/CVE-2025-22376.json) (`2025-01-03T22:15:07.917`)
- [CVE-2024-11733](CVE-2024/CVE-2024-117xx/CVE-2024-11733.json) (`2025-01-03T23:15:06.313`)
- [CVE-2024-12237](CVE-2024/CVE-2024-122xx/CVE-2024-12237.json) (`2025-01-03T23:15:06.473`)
- [CVE-2024-55896](CVE-2024/CVE-2024-558xx/CVE-2024-55896.json) (`2025-01-03T23:15:08.437`)
- [CVE-2024-55897](CVE-2024/CVE-2024-558xx/CVE-2024-55897.json) (`2025-01-03T23:15:08.573`)
- [CVE-2025-0199](CVE-2025/CVE-2025-01xx/CVE-2025-0199.json) (`2025-01-03T23:15:08.707`)
### CVEs modified in the last Commit
Recently modified CVEs: `19`
Recently modified CVEs: `16`
- [CVE-2022-27539](CVE-2022/CVE-2022-275xx/CVE-2022-27539.json) (`2025-01-03T21:15:07.173`)
- [CVE-2022-27541](CVE-2022/CVE-2022-275xx/CVE-2022-27541.json) (`2025-01-03T21:15:08.570`)
- [CVE-2023-27837](CVE-2023/CVE-2023-278xx/CVE-2023-27837.json) (`2025-01-03T21:15:11.333`)
- [CVE-2023-29160](CVE-2023/CVE-2023-291xx/CVE-2023-29160.json) (`2025-01-03T21:15:11.997`)
- [CVE-2023-29167](CVE-2023/CVE-2023-291xx/CVE-2023-29167.json) (`2025-01-03T21:15:12.217`)
- [CVE-2023-29498](CVE-2023/CVE-2023-294xx/CVE-2023-29498.json) (`2025-01-03T21:15:12.417`)
- [CVE-2023-29562](CVE-2023/CVE-2023-295xx/CVE-2023-29562.json) (`2025-01-03T21:15:12.693`)
- [CVE-2024-35365](CVE-2024/CVE-2024-353xx/CVE-2024-35365.json) (`2025-01-03T21:15:12.940`)
- [CVE-2024-36613](CVE-2024/CVE-2024-366xx/CVE-2024-36613.json) (`2025-01-03T21:15:13.140`)
- [CVE-2024-43077](CVE-2024/CVE-2024-430xx/CVE-2024-43077.json) (`2025-01-03T22:15:07.360`)
- [CVE-2024-43097](CVE-2024/CVE-2024-430xx/CVE-2024-43097.json) (`2025-01-03T22:15:07.503`)
- [CVE-2024-43762](CVE-2024/CVE-2024-437xx/CVE-2024-43762.json) (`2025-01-03T22:15:07.640`)
- [CVE-2024-43764](CVE-2024/CVE-2024-437xx/CVE-2024-43764.json) (`2025-01-03T22:15:07.783`)
- [CVE-2024-55507](CVE-2024/CVE-2024-555xx/CVE-2024-55507.json) (`2025-01-03T21:15:13.340`)
- [CVE-2024-56410](CVE-2024/CVE-2024-564xx/CVE-2024-56410.json) (`2025-01-03T21:15:13.723`)
- [CVE-2024-8811](CVE-2024/CVE-2024-88xx/CVE-2024-8811.json) (`2025-01-03T22:49:49.463`)
- [CVE-2024-9257](CVE-2024/CVE-2024-92xx/CVE-2024-9257.json) (`2025-01-03T22:07:42.553`)
- [CVE-2024-9665](CVE-2024/CVE-2024-96xx/CVE-2024-9665.json) (`2025-01-03T21:58:29.893`)
- [CVE-2024-9710](CVE-2024/CVE-2024-97xx/CVE-2024-9710.json) (`2025-01-03T21:36:39.877`)
- [CVE-2023-32221](CVE-2023/CVE-2023-322xx/CVE-2023-32221.json) (`2025-01-04T00:15:06.207`)
- [CVE-2024-11624](CVE-2024/CVE-2024-116xx/CVE-2024-11624.json) (`2025-01-03T23:15:06.157`)
- [CVE-2024-43767](CVE-2024/CVE-2024-437xx/CVE-2024-43767.json) (`2025-01-03T23:15:06.627`)
- [CVE-2024-43768](CVE-2024/CVE-2024-437xx/CVE-2024-43768.json) (`2025-01-03T23:15:06.767`)
- [CVE-2024-43769](CVE-2024/CVE-2024-437xx/CVE-2024-43769.json) (`2025-01-03T23:15:06.903`)
- [CVE-2024-47032](CVE-2024/CVE-2024-470xx/CVE-2024-47032.json) (`2025-01-03T23:15:07.047`)
- [CVE-2024-53834](CVE-2024/CVE-2024-538xx/CVE-2024-53834.json) (`2025-01-03T23:15:07.190`)
- [CVE-2024-53835](CVE-2024/CVE-2024-538xx/CVE-2024-53835.json) (`2025-01-03T23:15:07.333`)
- [CVE-2024-53836](CVE-2024/CVE-2024-538xx/CVE-2024-53836.json) (`2025-01-03T23:15:07.470`)
- [CVE-2024-53837](CVE-2024/CVE-2024-538xx/CVE-2024-53837.json) (`2025-01-03T23:15:07.620`)
- [CVE-2024-53838](CVE-2024/CVE-2024-538xx/CVE-2024-53838.json) (`2025-01-03T23:15:07.747`)
- [CVE-2024-53839](CVE-2024/CVE-2024-538xx/CVE-2024-53839.json) (`2025-01-03T23:15:07.883`)
- [CVE-2024-53840](CVE-2024/CVE-2024-538xx/CVE-2024-53840.json) (`2025-01-03T23:15:08.020`)
- [CVE-2024-53841](CVE-2024/CVE-2024-538xx/CVE-2024-53841.json) (`2025-01-03T23:15:08.153`)
- [CVE-2024-53842](CVE-2024/CVE-2024-538xx/CVE-2024-53842.json) (`2025-01-03T23:15:08.293`)
- [CVE-2025-22376](CVE-2025/CVE-2025-223xx/CVE-2025-22376.json) (`2025-01-03T23:15:08.897`)
## Download and Usage

View File

@ -196418,10 +196418,10 @@ CVE-2022-27535,0,0,1cd6253a7592e69bce8f5422a0f47245fc510e8ea772b035a7451e9ed1d4f
CVE-2022-27536,0,0,68d5018ea0b495266f2ee0d5eb27a828a98d13012d37fb7e54356414e829f58f,2024-11-21T06:55:54.037000
CVE-2022-27537,0,0,f9fe620e75010dd8c009107b59488ac897d990c050930c096c76d6907e67be7c,2024-11-21T06:55:54.200000
CVE-2022-27538,0,0,038809a6acf0fdd8065c85744209857483747d8b095257d7aa8ab4fb763ae904,2024-11-21T06:55:54.680000
CVE-2022-27539,0,1,305343dc51cb29f32e5f8b5c0de7755277fc06188452fa8709ed65660d1fb348,2025-01-03T21:15:07.173000
CVE-2022-27539,0,0,305343dc51cb29f32e5f8b5c0de7755277fc06188452fa8709ed65660d1fb348,2025-01-03T21:15:07.173000
CVE-2022-2754,0,0,5fd204098138c7c579a0e559edbbb117b8423f6089a27ae9bbe02e85b1b02437,2024-11-21T07:01:38.577000
CVE-2022-27540,0,0,7b937f21398b8778219a017044700af59f5e3b174221c511754c41d0c25a2e92,2024-11-21T06:55:55.787000
CVE-2022-27541,0,1,63759ab83ad42605ce46899d88d69ab81bacd2fdcff23e3b2348c9128ac5d05d,2025-01-03T21:15:08.570000
CVE-2022-27541,0,0,63759ab83ad42605ce46899d88d69ab81bacd2fdcff23e3b2348c9128ac5d05d,2025-01-03T21:15:08.570000
CVE-2022-27544,0,0,97ae1750c0bbb6eb1b440ad74287f9286e451a76c0331131ed2e992416febf46,2024-11-21T06:55:56.463000
CVE-2022-27545,0,0,f9d013f4fcb59c90d804839c16351243550a2e96b6123a0a0202783eae7ae12e,2024-11-21T06:55:56.570000
CVE-2022-27546,0,0,320ed5ca83e4d364579d1d5a1bc45e960c5bf0f910433ed6485e80c2179e0b99,2024-11-21T06:55:56.677000
@ -221460,7 +221460,7 @@ CVE-2023-27826,0,0,6347975b3ad6cd0a6c56e8ad212042e6480582857697baae9c7d72978fd34
CVE-2023-2783,0,0,096c3b26e537bed1ca5ddb3ac65f36398fc1d487c37d85c199430095b0e32907,2024-11-21T07:59:16.937000
CVE-2023-27830,0,0,31134275eb53f6f7a000d54b47d97c7e7c9a150ff8289e7f25052e8f6b4f75b8,2024-11-21T07:53:32.780000
CVE-2023-27836,0,0,30b937837ffa1713e4b2f825e29485760bfb12129ee96c2dc2625ffc70ca344b,2024-11-21T07:53:32.950000
CVE-2023-27837,0,1,09ca7af765c2ff6927776c1eecc7d27a9e98a3793e382e704f3567fa1aeeb314,2025-01-03T21:15:11.333000
CVE-2023-27837,0,0,09ca7af765c2ff6927776c1eecc7d27a9e98a3793e382e704f3567fa1aeeb314,2025-01-03T21:15:11.333000
CVE-2023-2784,0,0,3beb45ba8d37afa28c5b710c953916c9a0cc09ed1f3ea22bda898c6b758d70ca,2024-11-21T07:59:17.050000
CVE-2023-27842,0,0,ff4319ffbaa6389afa0396471ae6b5a71fce4f1fe6e68640710e37a063b03c1c,2024-11-21T07:53:33.280000
CVE-2023-27843,0,0,b9d62937a262e9ac3f834c7160d689a0eba062e6de695ff9490a67ccc210c47d,2024-11-21T07:53:33.437000
@ -222728,13 +222728,13 @@ CVE-2023-29157,0,0,e139a470842d9e5b9d6b09da86981de056cc51c8cf1ef74955e9869ec1f8a
CVE-2023-29158,0,0,d93e1a8f6332e77a5b3ca2ca77ab8702fcdee0067fa37722a2ec00c716cd850d,2024-11-21T07:56:38.070000
CVE-2023-29159,0,0,cd911818f734775dab3175db6db6b98b2b6ea2654ed5bee8d236e6c77f00c323,2024-11-21T07:56:38.187000
CVE-2023-2916,0,0,27d1944ec651f5d060d75979b808931283d2f3099341e8c0d7dabfe85c912ba8,2024-11-21T07:59:33.867000
CVE-2023-29160,0,1,90cdb364b9f59b891f577b51f1a47efe44108a1bb1f4b09369f322cf5f660038,2025-01-03T21:15:11.997000
CVE-2023-29160,0,0,90cdb364b9f59b891f577b51f1a47efe44108a1bb1f4b09369f322cf5f660038,2025-01-03T21:15:11.997000
CVE-2023-29161,0,0,5b1e47c04c48e3ea1336e82805801b0c1e10ade49f6d9266884d11fc74b88a63,2024-11-21T07:56:38.390000
CVE-2023-29162,0,0,fc28511a9719aa19e64a9b38fb6b29e7ab41ba9bfec25fae87ebdae7a06b9409,2024-11-21T07:56:38.497000
CVE-2023-29163,0,0,6fe755248c7818416bda58be22dd7bac179c1b8424232d05103993a92144726d,2024-11-21T07:56:38.597000
CVE-2023-29165,0,0,513a382e25d229a444bf0100c637a4c3c0cf34fbe4e610f1518192cfb01a884a,2024-11-21T07:56:38.713000
CVE-2023-29166,0,0,781d1c4cdc98c38865af67de3e342edcdaa26bab1d1d367be9bc1b6a262c4326,2024-11-21T07:56:38.820000
CVE-2023-29167,0,1,50bbb020d2d5b15cdc81b400e0346114ca39038d0cdf9c0f42bad8ef9e761e0f,2025-01-03T21:15:12.217000
CVE-2023-29167,0,0,50bbb020d2d5b15cdc81b400e0346114ca39038d0cdf9c0f42bad8ef9e761e0f,2025-01-03T21:15:12.217000
CVE-2023-29168,0,0,ce7a65b098bfe1db2cfe961b9e43bf6907bc45d619666ff5139f14b8bfc0b281,2024-11-21T07:56:39.030000
CVE-2023-29169,0,0,b1e43b6c91c4546837cc8ae5fbf5d45f4b0f577ebfea6d949e629653b0642587,2024-11-21T07:56:39.137000
CVE-2023-2917,0,0,53f93b220e6679003249d2250d092dbb4f1cbeaaee0e29556caf9766d81bb020,2024-11-21T07:59:34
@ -223032,7 +223032,7 @@ CVE-2023-29492,0,0,6d699c439c5d8ded49fa6cb032f9de89a3509187577d5869add282334a403
CVE-2023-29494,0,0,b90d8ceeaef9906bc47b80cee9467055cedc2b0aec3c6d26d3bf34d2bba0b1cf,2024-11-21T07:57:10.290000
CVE-2023-29495,0,0,7dad3d0d134689f5f27d6c90d7fbacbcb08c849eae64453f5313d9b46f471707,2024-11-21T07:57:10.430000
CVE-2023-29497,0,0,275bcab71fa31aec3c61d00134fc188f3391177ede5a5f6c28eeb79ddddcfae6,2024-11-21T07:57:10.543000
CVE-2023-29498,0,1,417c42363d496c93ed7d4765456e872dcdfbdf55653776a21f3143dd5b35c322,2025-01-03T21:15:12.417000
CVE-2023-29498,0,0,417c42363d496c93ed7d4765456e872dcdfbdf55653776a21f3143dd5b35c322,2025-01-03T21:15:12.417000
CVE-2023-29499,0,0,2039f92e848bda727c21c637c0c728fcf67f1b356f9be9a855b92af1487b4057,2024-11-21T07:57:10.807000
CVE-2023-2950,0,0,94be811c0c225a7d48b00d9c04d7ec06df07ac373a433760ce36652d9061d8fa,2024-11-21T07:59:37.900000
CVE-2023-29500,0,0,9566a3121b981ba012c5c86adc4c99589ab87eca50d6597b2c90f5856c8264c0,2024-11-21T07:57:10.947000
@ -223093,7 +223093,7 @@ CVE-2023-2955,0,0,9c0e18923443b98b3624f6a20eb4112985b6c80a66e21eac353915004989ba
CVE-2023-29550,0,0,e4f3c9ebf56266ae93a8b7654d890809fa02038cee320637c5e05da2e3b4034c,2024-11-21T07:57:16.793000
CVE-2023-29551,0,0,228f453bf40162e0ca56f9725a8243132d56c710990db765203fc98361e41d2b,2024-11-21T07:57:16.907000
CVE-2023-29552,0,0,581b98f26884acaa09a2e45c7906b5ad297c852b04af26ae94e2904276792077,2024-11-21T07:57:17.017000
CVE-2023-29562,0,1,1ce691e8d9f6f5deb206e8ff10b9ec0045c33f0503241d0cacef281445620ccd,2025-01-03T21:15:12.693000
CVE-2023-29562,0,0,1ce691e8d9f6f5deb206e8ff10b9ec0045c33f0503241d0cacef281445620ccd,2025-01-03T21:15:12.693000
CVE-2023-29566,0,0,72613a9047e5b74b43c598afd3a5332b14dad8bfb67cbbb4132d5bdb7fd4eb17,2024-11-21T07:57:17.310000
CVE-2023-29569,0,0,e838e1f5bbabf47f4c66b50e6c41d8d01307a1cf9562ef1e35b62f66e5510cd1,2024-11-21T07:57:17.467000
CVE-2023-2957,0,0,a1631a9ecee9b51a2f65999ed32ce5f5f06e2698dd986aecf16ed77d51c874ca,2024-11-21T07:59:38.720000
@ -224921,7 +224921,7 @@ CVE-2023-32218,0,0,f4668f6dec2ad787cba45f10fd52cbffde113c4295d5e52527a0a3bed9829
CVE-2023-32219,0,0,5016bb311111e2171cad0226da9875250b1431f46d617615133b7b54b63a5333,2024-11-21T08:02:55.563000
CVE-2023-3222,0,0,7d57eac9a2b5e14a32fbb1633baffee38ba9604df950673d8180481bf98f3795,2024-11-21T08:16:43.900000
CVE-2023-32220,0,0,7a8e9a38143bd8064ad289215094e013695d95e6076448cf1074f8c028ef2b55,2024-11-21T08:02:55.670000
CVE-2023-32221,0,0,ea601fc168225037ab26ac2ed11558bbef2c8c782572003af5f24916723d9cd0,2024-11-21T08:02:55.783000
CVE-2023-32221,0,1,1bb9ec77a45c6795dd7cc048448a8dd2a2768ee4ce6488cb5a868e5cc39185b0,2025-01-04T00:15:06.207000
CVE-2023-32222,0,0,628471b60fe838500aed372d2bdccfc395d9e95fc54bc2874983f952d5f04ce1,2024-11-21T08:02:55.893000
CVE-2023-32223,0,0,917c1b5258b903e7b790f68cd6060630779eb688b3bea354bbc98d7b17f4b584,2024-11-27T17:15:05.937000
CVE-2023-32224,0,0,7c5c385f9388cab92c949ae1ed149caba7d8c92dca8e737241ce6522dad13863,2024-11-21T08:02:56.113000
@ -244502,7 +244502,7 @@ CVE-2024-11619,0,0,17535dfba9741d471fadae0fb91280b5ae16dfa5d4f7978c2708116e3a1ee
CVE-2024-1162,0,0,3088f9ddfe31234409eeca0c6733f6625e00a303f5f7e9ffe94fe1a6782630d7,2024-11-21T08:49:56.270000
CVE-2024-11620,0,0,ead70690aa114308aae0c5f2f4d204a542be8af8676c2ad1b4207bb367ac689c,2024-11-28T11:15:48.533000
CVE-2024-11622,0,0,28607ca43edf19c5b150264789340f2f339c16fe9934fd58cd66cc9c45bc71df,2024-12-12T19:52:24.527000
CVE-2024-11624,0,0,ffaf727b2fec9588d0225dcdd2218f3951c43d9f9a52eaef07026e9a1fa7747c,2025-01-03T04:15:06.030000
CVE-2024-11624,0,1,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000
CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2cea,2024-11-21T08:49:56.403000
CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000
CVE-2024-11631,0,0,ec063b412cc8e1fc69f64e54e806f8de997f3af353f8bd5c4b78d65e3cccfe32,2024-11-25T16:54:46.333000
@ -244602,6 +244602,7 @@ CVE-2024-11729,0,0,efdcf50f70e4aaed57e8feef0a7a962846d2881b2d7c26550ce5bf699f2f4
CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9eb,2024-11-21T08:49:57.650000
CVE-2024-11730,0,0,8b97f2620613ee8f1fad8f89fdaf2fb138dbc90ea591ed763e6c771986c201aa,2024-12-06T11:15:08.033000
CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000
CVE-2024-11733,1,1,5fbecc5531d69a0d2ffc426edbd6573fb38d88d5bfbaa1a7120ba352ee22cf2b,2025-01-03T23:15:06.313000
CVE-2024-11737,0,0,82b4de15247bbd822a2abb2f56467686fd4a6957a6b87fe1370247ce71679d0b,2024-12-11T10:15:06.677000
CVE-2024-11738,0,0,f587c97dbd4b1ce8e0f6a611dd679c71e26fa6d4305ce8c0e3ca3797b0619379,2024-12-06T15:15:07.723000
CVE-2024-1174,0,0,6b46be4d722ab187c094170b7547b36656d9ec8ed90fcec0cd49c5c30bebda75,2024-11-21T08:49:57.790000
@ -244940,6 +244941,7 @@ CVE-2024-12233,0,0,d89c9263a4f22f201b1dce8be51578aec307181a11a72f57d5d6a093a5589
CVE-2024-12234,0,0,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000
CVE-2024-12235,0,0,92689efaa37165c78224efb1efe409523be7fb3f3558d4576511504eb96aac91,2024-12-05T18:15:21.660000
CVE-2024-12236,0,0,390d11985338138a2913d618c1818ae388b2b2c32249174c40691687eabfe343,2024-12-10T15:15:07.147000
CVE-2024-12237,1,1,f56cec9b9a8561960e0bd6e6b1543c245e67760db1999f8a3bac457cc9192e98,2025-01-03T23:15:06.473000
CVE-2024-12238,0,0,4bf6bf8d9d561e93dab20ec932a5f35fe4b6b4442d292c9962ed57407d619434,2024-12-29T06:15:05.487000
CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d141,2024-12-17T03:15:06.710000
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
@ -245431,7 +245433,7 @@ CVE-2024-1311,0,0,01ebf083283fbdbf324aa4188b2056da81574dace6d1d37e23fa5b3fb17648
CVE-2024-13110,0,0,e4c3d49099bb33bcc7fe964c1285248d09f034b160a163d3fe86517eab3248ea,2025-01-02T14:15:06.240000
CVE-2024-13111,0,0,9810366fb45686c2113f1215d5c29bc6bc3772afbead961538a5f37f182e34f1,2025-01-02T17:15:08.223000
CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000
CVE-2024-13129,1,1,9ca6456491ec5676f6b1be848e2f99ae604ad63b1a6f5bc3973f8c9dea216d3e,2025-01-03T22:15:06.677000
CVE-2024-13129,0,0,9ca6456491ec5676f6b1be848e2f99ae604ad63b1a6f5bc3973f8c9dea216d3e,2025-01-03T22:15:06.677000
CVE-2024-1313,0,0,cad1078661641c2022e5f0188a431d9a70908db5ab4b61d98e0389abbba8b680,2024-11-21T08:50:18.207000
CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000
CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000
@ -257742,7 +257744,7 @@ CVE-2024-35359,0,0,ebd79174dfb7ac257fb41388eea21839910657d0184b40fdf6359090d4089
CVE-2024-3536,0,0,f61f758feff8e86a26533bd96329f276bdabc00164a17283a9ca7edca8ea810e,2024-11-21T09:29:48.253000
CVE-2024-35361,0,0,ba078c8fe5aa2f3cfaede9b86bade7ec878c218d84d169b517462fabd4369970,2024-11-21T09:20:13.143000
CVE-2024-35362,0,0,c9ceca7447b8a557451b5967fa218d930b5f59694547d29930113b4859836719,2024-11-21T09:20:13.357000
CVE-2024-35365,0,1,a26045c87b4e71a6df02377717030d5e23552eab779f5a833cbd0688a2eb325e,2025-01-03T21:15:12.940000
CVE-2024-35365,0,0,a26045c87b4e71a6df02377717030d5e23552eab779f5a833cbd0688a2eb325e,2025-01-03T21:15:12.940000
CVE-2024-35366,0,0,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000
CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000
CVE-2024-35368,0,0,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000
@ -258751,7 +258753,7 @@ CVE-2024-3661,0,0,11a579560faa5cc1a7695ecebefa36af8b143192151784b4c1d37ba82796f9
CVE-2024-36610,0,0,086f8f5b46926c0d5b801e2f18812ba0aac4c04dd5f1ff997c802b3134a682c8,2024-12-24T21:15:18.280000
CVE-2024-36611,0,0,8ae1129d2c6d7f04820dc25a51b35eeb79c0ea9714d3891bb92ee90d865f9805,2024-12-03T21:15:06.783000
CVE-2024-36612,0,0,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000
CVE-2024-36613,0,1,5e0f7ef111e3993750bd6438d4abc44d38bd901ae1fa2a88c7ea99f930b7978c,2025-01-03T21:15:13.140000
CVE-2024-36613,0,0,5e0f7ef111e3993750bd6438d4abc44d38bd901ae1fa2a88c7ea99f930b7978c,2025-01-03T21:15:13.140000
CVE-2024-36615,0,0,c3893c90b5581100f420f26ee0ccf784458a2107b295d3c77defc3849a0f0672,2024-12-03T16:15:22.197000
CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000
CVE-2024-36617,0,0,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000
@ -263385,7 +263387,7 @@ CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b
CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000
CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000
CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000
CVE-2024-43077,0,1,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000
CVE-2024-43077,0,0,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000
CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000
CVE-2024-43080,0,0,cbdb75ee710ea05bfcc86299182b203ee944c795380cbed1c1ab4a87225ab537,2024-12-17T19:10:30.250000
CVE-2024-43081,0,0,8bed9f6165013dc4c983bb0dd11cd660d0d155d067474bbffbb46b60a90bbdd1,2024-12-17T18:56:04.590000
@ -263401,7 +263403,7 @@ CVE-2024-4309,0,0,cf6d99d40224d9ea0048df61a24b0034afd2baf32b8f2402feb311af37805c
CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1fbf,2024-12-17T20:43:24.893000
CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000
CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000
CVE-2024-43097,0,1,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000
CVE-2024-43097,0,0,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000
CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec5f9,2024-09-14T11:47:14.677000
CVE-2024-4310,0,0,dd5cf151edf7d2cd055572eb00e97620ec8e8024a5783f50f0a1b0ae59db4b35,2024-11-21T09:42:35.913000
CVE-2024-43102,0,0,b6aa6225bd8ed19c424a914e97c361ac2900c128d3e8c90742dfa8fa3a85a13f,2024-11-21T09:35:00.713000
@ -264009,11 +264011,11 @@ CVE-2024-43758,0,0,0f26a442661cf8c474cf15fed83c27096c39a987496f8728b4b680b80eec8
CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b8941c2,2024-09-13T17:13:35.427000
CVE-2024-4376,0,0,54ab76d9fd6742e25c4ca941b8688277ccbde54c93ac0337a04e833897b0d9f6,2024-11-21T09:42:43.643000
CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e04019cc,2024-09-13T17:00:30.440000
CVE-2024-43762,0,1,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000
CVE-2024-43764,0,1,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000
CVE-2024-43767,0,0,544837330e934fbd5665893a012e6ea136cc65551faeb81d27d6db256649d51f,2025-01-03T01:15:07.847000
CVE-2024-43768,0,0,2a680b4666dbfb8855cfe115cfa668526d1408b554a74aebafb074e52b898e4c,2025-01-03T01:15:07.923000
CVE-2024-43769,0,0,58a508b817a2419a010d84131e35f15b9d1d2e8f44fce65b53ae8e870eccbd1e,2025-01-03T01:15:08.003000
CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000
CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000
CVE-2024-43767,0,1,af155cf93cc328c05c081440c1f007ae01c3d33d1458fc2c3459ea52a0cc31d8,2025-01-03T23:15:06.627000
CVE-2024-43768,0,1,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000
CVE-2024-43769,0,1,13983ee3cb62290dd1770f68b2a21cae6948e8a4eebfe4f723c6f963b63155be,2025-01-03T23:15:06.903000
CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000
CVE-2024-43772,0,0,63f7dc411da3ded034b2d2ffb4e0bad8e95b60c318b3d1e644db504bb5e5c6e9,2024-09-04T12:11:13.073000
CVE-2024-43773,0,0,826b7c5200d245cfd0c67f5d1708290c5274b8ea410b663d2bc4e8259de07c4c,2024-09-04T12:26:08.270000
@ -266097,7 +266099,7 @@ CVE-2024-47029,0,0,dee30063661ea67866801cfb2ecb7654f2218f2ce68d1de08a24516b75279
CVE-2024-4703,0,0,8dae3b499efe136db7f398d4c41a1bfd4bf3b9aac5a043a02f530bb618a966e5,2024-11-21T09:43:24.660000
CVE-2024-47030,0,0,2dfbd4a7868cc0b2ce9fa4921a019a022ddf4de093912df68c067097e504d63d,2024-10-28T20:35:16.973000
CVE-2024-47031,0,0,9f628d7d133c819b06ff3de82f92bb7205005b4a410eced9d57c7a79d43f1b1d,2024-10-28T20:35:17.223000
CVE-2024-47032,0,0,c7442eac99225f8e83b038eb1a35a3adc5f73c5ed83bb8881288208a5f506b92,2025-01-03T04:15:06.137000
CVE-2024-47032,0,1,076184930f346804876fe8563cdb7177daeee4d33dda02193fbb41b28949d924,2025-01-03T23:15:07.047000
CVE-2024-47033,0,0,55edc3ae29717e555bfd0e3e7b6b8889d14495fe139b3a950485b7473e7a9dca,2024-10-28T17:57:30.110000
CVE-2024-47034,0,0,25c2ef9ecb4e73ca1fa8dabb5e685185efaa515e35621fde72c2d30b8491c723,2024-10-28T17:56:51.787000
CVE-2024-47035,0,0,a7a178fa9ebc80aea368dd0425eaa85245240ba008a832e23a0cba77ab278738,2024-10-31T00:05:18.113000
@ -270627,16 +270629,16 @@ CVE-2024-53826,0,0,0b04b1b5846f39442507bbeb125d0ae4870d599699b329db9d8ecf7c2429b
CVE-2024-5383,0,0,093acdd4201567d005275d52c1174349cc9fb95effb23b8b65de339d75e5f1d2,2024-11-21T09:47:32.963000
CVE-2024-53832,0,0,1b2ce5c4938b0e1ecf47a9786c83880b95c4a4c43364160d8ae6a9eea87843bf,2024-12-10T14:30:46.853000
CVE-2024-53833,0,0,83c2cd6c738c3b63237afc3b0a6973df3ebd3dd1be66df5ff62c4687f53f40a1,2025-01-03T04:15:06.227000
CVE-2024-53834,0,0,95f824b0b20df943abd0cb3d475d26b1dc2d3fba585e091b536a3198607e6dcc,2025-01-03T04:15:06.310000
CVE-2024-53835,0,0,a1cd0002f78945fcfeb24343b003794cf9ef09c52fa428c012cb7b469f05bb36,2025-01-03T04:15:06.383000
CVE-2024-53836,0,0,1e0ff647b7d73bbae1146a38d8def42b43a2ce04fccf1bde2e572af18d4f066b,2025-01-03T04:15:06.470000
CVE-2024-53837,0,0,22c83a1fa83f94b1accf37f58ddea874267ffadefc09a5121d07d6630619b5c5,2025-01-03T04:15:06.560000
CVE-2024-53838,0,0,5a800c4c9a2319a3d123ac97e773b3bbeb257bc5749786382c54285e6a02c3ce,2025-01-03T04:15:06.650000
CVE-2024-53839,0,0,e9203295f71f0456c08caa806e994cb13e5d7b534b2e0e475c5963a8d53c952b,2025-01-03T04:15:06.727000
CVE-2024-53834,0,1,f772be6a6b7318016d93e00bbab730f9e5090ffcca9973fc1b51d0f863c6079d,2025-01-03T23:15:07.190000
CVE-2024-53835,0,1,1738259f50e1a13907bddecfb4df1723018cc354975bc160261abe6109d648b3,2025-01-03T23:15:07.333000
CVE-2024-53836,0,1,2cbfd30f09c54112dbd3816407bb73044cb7653f40cd6cff2fd0a50442342b4b,2025-01-03T23:15:07.470000
CVE-2024-53837,0,1,f41af45311ad1bb885024e938f5dd0283c1cb94b0c08f83d203f8491fac68ffd,2025-01-03T23:15:07.620000
CVE-2024-53838,0,1,392a823cc6a1952d1acd20e30cddfb92a6889451bd907c5666f408cbdfe8e068,2025-01-03T23:15:07.747000
CVE-2024-53839,0,1,f65317495801cff20541ac718a9f26747a8df7faf061323c9d11e324e4d26033,2025-01-03T23:15:07.883000
CVE-2024-5384,0,0,8d376a2ca7902f4602c393c8e22120c83f3a08831ccd742c2d440f44affa2cad,2024-11-21T09:47:33.103000
CVE-2024-53840,0,0,fd45d26350e6982c7cc334de85696b0442912dd4fdff65234ff9258cce036a54,2025-01-03T04:15:06.810000
CVE-2024-53841,0,0,fe11be69b03118bc0d7bb6525bbe40e05a80d09ca9456ee9b0308de0a1f3f74b,2025-01-03T04:15:06.893000
CVE-2024-53842,0,0,854e77d323c245e8752f72a677b4da1f2264d9d88ba6cda8173c9d7ada535690,2025-01-03T04:15:06.980000
CVE-2024-53840,0,1,5a68e56ca18880b684acf85af94e13342de4c159ea66263c82861f03b2fcb290,2025-01-03T23:15:08.020000
CVE-2024-53841,0,1,62ff2515a5c055bf7059847a5dc1f7cb41127e9f90e2360a3c63316668562633,2025-01-03T23:15:08.153000
CVE-2024-53842,0,1,fbef0b0e07e65be6623298279f9a4f845fdf9f741f681b6904541542384fe4d2,2025-01-03T23:15:08.293000
CVE-2024-53843,0,0,c44c99ef4402ecef78ac8c1b113f8d73cb64b635f31482723ce78cbb921e8259,2024-11-26T00:15:07.430000
CVE-2024-53844,0,0,b0e1409716740a79089a588f0454ff38097ac555d54020c4c21a59c02d9d74a3,2024-11-26T19:15:31.463000
CVE-2024-53845,0,0,6016d80f197703cecce3c68f8c667ba88f504a297b5ec5a264d36bac2815592b,2024-12-12T02:15:29.087000
@ -271312,7 +271314,7 @@ CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e87
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000
CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000
CVE-2024-55507,0,1,b1b3683e335ef1ef06b85193f76d2faa87feb69c749286244d6d7ec154c3df08,2025-01-03T21:15:13.340000
CVE-2024-55507,0,0,b1b3683e335ef1ef06b85193f76d2faa87feb69c749286244d6d7ec154c3df08,2025-01-03T21:15:13.340000
CVE-2024-55509,0,0,4a5021013466b75dc19dd985fac6f59929ccb3fafbd7ec75f16f4601bde3282f,2024-12-26T20:15:23.067000
CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000
CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74ed00,2024-12-18T16:15:14.720000
@ -271412,6 +271414,8 @@ CVE-2024-55888,0,0,2dd59816688a6ea0fa98f443aa3b9b64966d8d29cc6ba2efa912b5e16a3e3
CVE-2024-55889,0,0,4fe80ccef310d79116a068c6ac228ca3c43ec868733cbb7b1340936879db80bb,2024-12-13T21:15:13.483000
CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000
CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000
CVE-2024-55896,1,1,58f855d897602f0ddd25272da3b6accb2a00ce40a285c9003204ef42399d7775,2025-01-03T23:15:08.437000
CVE-2024-55897,1,1,965b449aed633549369e65253663c8ef0d14436fec1119cd03952115edc2e4cf,2025-01-03T23:15:08.573000
CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000
CVE-2024-5591,0,0,ff8d1cdc789b69475beac70a994291467b1640cdafedbde74dd787145239b1f1,2025-01-03T15:15:10.813000
CVE-2024-55917,0,0,1f325af2a96e8ad41709dbd189d0ddfc8263df5691046d9ed51f18d85360c21b,2024-12-31T17:15:09.140000
@ -271669,7 +271673,7 @@ CVE-2024-56329,0,0,8fdf810f87f9e68d511be79347aafa1a2f560fbe7ecef214b0341e7d568b9
CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000
CVE-2024-56330,0,0,cc2469855b48dd40812f7fbbf009598abdbeb1081f50cb0a33dff8e3cf6f718e,2024-12-20T20:15:24.167000
CVE-2024-56331,0,0,56bb9f9373efee702b7689a46e1daacea45f4bf1b3344e95d6a09a02cb29916d,2024-12-20T20:15:24.337000
CVE-2024-56332,1,1,1ca8b3e3c7310aca62a4b73a32a15bcab556c8d36748bd113633f34cfb638a59,2025-01-03T21:15:13.550000
CVE-2024-56332,0,0,1ca8b3e3c7310aca62a4b73a32a15bcab556c8d36748bd113633f34cfb638a59,2025-01-03T21:15:13.550000
CVE-2024-56333,0,0,fe45e753af8e2751ee1e363cda61187450051dec4bd66c266f1a6acfb0239817,2024-12-20T20:15:24.520000
CVE-2024-56334,0,0,dd145a89bec8d5c627af1aa8e241a3a3cc8f1f4441c2e387ed54258794c2f5a4,2024-12-24T17:15:09.760000
CVE-2024-56335,0,0,68042c7d7012ee80feaa30ed25472b1a3afe996d5346e3cfc0fb43c7dcee7c7c,2024-12-20T21:15:10.277000
@ -271704,7 +271708,7 @@ CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c
CVE-2024-56408,0,0,cd4b6b211e0a160b70acb972ac8ce8a8f58fca4bf287c8875ce7a1ecf63f672e,2025-01-03T19:15:12.533000
CVE-2024-56409,0,0,d99656fa69c650421ca8cbabcdd83e678caa5cfb8b9a6a9a68c5e4694cb43a45,2025-01-03T19:15:12.627000
CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000
CVE-2024-56410,0,1,947e02e2c3f21927d299084b1a9e59d7ee26973dfb0ebd320064a45fbd7d954e,2025-01-03T21:15:13.723000
CVE-2024-56410,0,0,947e02e2c3f21927d299084b1a9e59d7ee26973dfb0ebd320064a45fbd7d954e,2025-01-03T21:15:13.723000
CVE-2024-56411,0,0,d520d39d2728c6661a63e679ea00870498cc041f14a81399120c6c5ace601ae5,2025-01-03T18:15:16.203000
CVE-2024-56412,0,0,7ed733bbffe237b9cbc747cbba38f4b908e9d7eb10b7d53914ac34ca4f2c496a,2025-01-03T18:15:16.380000
CVE-2024-56413,0,0,80435b57c7c9048773680d783c015ac26d2a1a27538e161c950af9d463318406,2025-01-02T16:15:08.570000
@ -274697,7 +274701,7 @@ CVE-2024-8807,0,0,a3194d6f7254173351134c6667ba0ab69ff4954825d1b3258d592d08d98a97
CVE-2024-8808,0,0,97dc891df3d9a3e3e84cc6d2301fb4dbe91fc0ade39658278ca48e61412ce9b9,2024-12-20T17:46:19.670000
CVE-2024-8809,0,0,ddcec2f4533e074351604de84f4e1e1092a516d94554ae853c415169483cb0c2,2024-11-22T21:15:19.110000
CVE-2024-8810,0,0,4054bd11d0a58049adbca132e9cb8f89aa5e0709e583c7f8d6f2e3c10841c942,2024-11-08T19:01:03.880000
CVE-2024-8811,0,1,efd1e1c7a12a1d68e4b8fbca926671ec65f16d85c01df729a2e729ed2aa509eb,2025-01-03T22:49:49.463000
CVE-2024-8811,0,0,efd1e1c7a12a1d68e4b8fbca926671ec65f16d85c01df729a2e729ed2aa509eb,2025-01-03T22:49:49.463000
CVE-2024-8812,0,0,b302d09d72bb26c6b8a77cc5743f5dc39c42e30907950ec8ee651ff959fb9767,2024-12-04T14:56:07.463000
CVE-2024-8813,0,0,3fdeb0e42e1f0b2ec132d72cdddab3a3e88fd6d1f776048bdf5fdfbe967da3ce,2024-12-04T14:56:03.620000
CVE-2024-8814,0,0,b7d91a5acc439f46e09af24d678f7610aaf43632fd42bfe8fa08f3612c8551d8,2024-12-04T14:55:59.677000
@ -275050,7 +275054,7 @@ CVE-2024-9253,0,0,8deb45874f368402d2e8267bdd80d22218d667a369f413173fc1bab2f02e0c
CVE-2024-9254,0,0,8ddbd67d95e607f435cddadf820f6b8a493bce024ad0e3a2a2fd3478d0537cfa,2024-11-29T18:17:31.663000
CVE-2024-9255,0,0,cebd6fb0e3bd38591c9ac35321c4111f3a938526041eb33febcdad00871c8366,2024-11-29T18:17:15.040000
CVE-2024-9256,0,0,3cca80ad6510af9986479b87828fe97955ba908cd307377d7659a0e4289380d2,2024-11-29T18:17:00.713000
CVE-2024-9257,0,1,56d949a6b9532c08babf6ca3ed0f1bd04c0075ed5ddb6a7732235f8801d5cfb9,2025-01-03T22:07:42.553000
CVE-2024-9257,0,0,56d949a6b9532c08babf6ca3ed0f1bd04c0075ed5ddb6a7732235f8801d5cfb9,2025-01-03T22:07:42.553000
CVE-2024-9258,0,0,dfeacc96c4cbe2d903f9c98e056fc6af76a986a9830050ecfb795eca6832c408,2024-11-25T17:15:32.283000
CVE-2024-9259,0,0,8199f5373fafb1bc0110a9ab29f4a6bb990bedca0d1854f1f17c52cddd1870c9,2024-11-25T17:13:49.060000
CVE-2024-9260,0,0,fb15d05363604469725e6c13cee9e50285abd70981488963df56e48460b3435e,2024-11-25T17:16:40.663000
@ -275365,7 +275369,7 @@ CVE-2024-9656,0,0,fe9df299e1627df8ed3d1b46925ce86dfb46c361033644f0c6f5f5d626358e
CVE-2024-9657,0,0,d6a40760f79cba273a7653e656cf0460e958ee7ff325e76af903d63b399e35b9,2024-11-08T16:00:28.320000
CVE-2024-9659,0,0,61d80596c8eeece9a279644799e43a0096a680cf6e7f5012ddc6e840730623b6,2024-11-23T08:15:03.860000
CVE-2024-9660,0,0,604fbe7b326b0e24567d0c1c45833d32f6a2dfc816b9bf095d9b2fea052201c6,2024-11-23T08:15:04.033000
CVE-2024-9665,0,1,6520201a8f38e50caaffa5b156dc56878fad06e9292eebdead6dbd51411251ff,2025-01-03T21:58:29.893000
CVE-2024-9665,0,0,6520201a8f38e50caaffa5b156dc56878fad06e9292eebdead6dbd51411251ff,2025-01-03T21:58:29.893000
CVE-2024-9666,0,0,6c38470f0d709ef8f8b86da6cc48d947838dc50ebd4f9c3888341c719b6a8f91,2024-11-25T08:15:10.943000
CVE-2024-9667,0,0,cd67020c0637f62cf6584504253f57e6151bc5b9ac2da6f70bd06c3cab478063,2024-11-08T15:27:25.697000
CVE-2024-9668,0,0,b123975089368f5aaa425cf98477e50260db5149c9b36255b367650786092773,2024-11-19T15:55:00.840000
@ -275399,7 +275403,7 @@ CVE-2024-9705,0,0,d3e6e0cdfa50d1f44cfdccc6623bdd59d96e39c6b3b67c956a243ca7bda34d
CVE-2024-9706,0,0,0990872c6794dc6bd9cf2f3c5fd27263b0ba4cad305032f2567799b99ef0e2f1,2024-12-06T09:15:08.727000
CVE-2024-9707,0,0,f20a21de398140b8d6cd9fa80d26368471f3c29d9493920f2122c5232d98d04a,2024-11-25T18:50:39.867000
CVE-2024-9708,0,0,f728686179ba13414752570ea9b9034e944845f8c6fd05717e98b48a3f80f48a,2024-11-25T19:59:31.110000
CVE-2024-9710,0,1,7bbf75040646e84218057b076df46853b5b15199cb58878b75e4c1b0c9f87049,2025-01-03T21:36:39.877000
CVE-2024-9710,0,0,7bbf75040646e84218057b076df46853b5b15199cb58878b75e4c1b0c9f87049,2025-01-03T21:36:39.877000
CVE-2024-9712,0,0,3c0025ed12da22fff31c874b55bf94d1f6bd79f9e74da0748a61a1382c7caa7b,2024-12-19T19:17:34.457000
CVE-2024-9713,0,0,eab37c74e5a6a8128766965a86c4f26e4851c463a4609ddef74e4502f569d29d,2024-12-19T19:16:28.340000
CVE-2024-9714,0,0,0f3ce79bd55096572e33f259d58ea23abd9525db69dd9124bf8561703c89aea5,2024-12-19T19:14:46.480000
@ -275666,9 +275670,10 @@ CVE-2025-0176,0,0,762135cafd60f24293f16082ad1fa3ab2ac7264ff4dd90fdc233deab7e6819
CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8d0,2025-01-03T18:15:17.317000
CVE-2025-0196,0,0,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000
CVE-2025-0197,0,0,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000
CVE-2025-0198,1,1,968dd1b493127f8e631dd345bdaa3f8c9507ccd8a35d54e73951fabb2c2ecd77,2025-01-03T21:15:14.053000
CVE-2025-0198,0,0,968dd1b493127f8e631dd345bdaa3f8c9507ccd8a35d54e73951fabb2c2ecd77,2025-01-03T21:15:14.053000
CVE-2025-0199,1,1,57de8d567970e2c3ac2428151686deec2058a3256dee56257a4a398a50eeca44,2025-01-03T23:15:08.707000
CVE-2025-21609,0,0,debac97612532639eda73000ed423c6055a43cea29689a043be2143f9409c2e8,2025-01-03T17:15:09.147000
CVE-2025-21610,0,0,91f58e52c41e26ee8c782751f380f5e6f82b9b51c281135ca06080d1bc5407a4,2025-01-03T17:15:09.290000
CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000
CVE-2025-22275,0,0,ae7bb36b063c3378386b214c3e5016593366cb52d21141261157b091c3ceba6a,2025-01-03T07:15:25.297000
CVE-2025-22376,1,1,41b448fcde4d9ad88cdc8d51c6f7ffc1e85de423001807db846fdb1c49d736b9,2025-01-03T22:15:07.917000
CVE-2025-22376,0,1,5718c706cab54399c824e81247fa8725e0b2da3334acc9f4e812565255340de1,2025-01-03T23:15:08.897000

Can't render this file because it is too large.