Auto-Update: 2025-02-20T13:00:25.739162+00:00

This commit is contained in:
cad-safe-bot 2025-02-20 13:03:54 +00:00
parent bf4edc80e4
commit 3a21252eba
13 changed files with 588 additions and 93 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24867",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-17T16:15:08.157",
"lastModified": "2024-11-21T08:59:52.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T12:44:20.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:plugins-market:wp_visitor_statistics:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "6.9.4",
"matchCriteriaId": "F5D08458-945B-40DB-9F7A-DA645FAD0631"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-stats-manager/wordpress-wp-stats-manager-plugin-6-9-4-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/wp-stats-manager/wordpress-wp-stats-manager-plugin-6-9-4-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49337",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:09.293",
"lastModified": "2025-02-20T12:15:09.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages \n\n\n\n\n\nis vulnerable to HTML injection, caused by improper validation of user-supplied input of text fields used to construct workflow email notifications. A remote authenticated attacker could exploit this vulnerability using HTML tags in a text field of an object to inject malicious script into an email which would be executed in a victim's mail client within the security context of the OpenPages mail message. An attacker could use this for phishing or identity theft attacks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49344",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:10.377",
"lastModified": "2025-02-20T12:15:10.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages \n\n\n\nwith Watson Assistant chat feature enabled the application establishes a session when a user logs in and uses chat, but the chat session is still left active after logout."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49779",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:10.527",
"lastModified": "2025-02-20T12:15:10.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages \n\ncould allow a remote attacker to bypass security restrictions, caused by improper validation and management of authentication cookies. By modifying the CSRF token and Session Id cookie parameters using the cookies of another user, a remote attacker could exploit this vulnerability to bypass security restrictions and gain unauthorized access to the vulnerable application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,20 +2,20 @@
"id": "CVE-2024-49780",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:10.827",
"lastModified": "2025-02-20T04:15:10.827",
"lastModified": "2025-02-20T12:15:10.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM OpenPages with Watson 8.3 and 9.0\u00a0\n\nIBM OpenPages could allow a remote attacker to traverse directories on the system. An attacker with privileges to perform Import Configuration could send a specially crafted http request containing \"dot dot\" sequences (/../) in the file name parameter used in Import Configuration to write files to arbitrary locations outside of the specified directory and possibly overwrite arbitrary files."
"value": "IBM OpenPages with Watson 8.3 and 9.0\u00a0IBM OpenPages could allow a remote attacker to traverse directories on the system. An attacker with privileges to perform Import Configuration could send a specially crafted http request containing \"dot dot\" sequences (/../) in the file name parameter used in Import Configuration to write files to arbitrary locations outside of the specified directory and possibly overwrite arbitrary files."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49781",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T12:15:10.747",
"lastModified": "2025-02-20T12:15:10.747",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5739",
"sourceIdentifier": "dl_cve@linecorp.com",
"published": "2024-06-12T07:15:51.650",
"lastModified": "2024-11-21T09:48:15.850",
"lastModified": "2025-02-20T11:15:09.400",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -16,50 +16,6 @@
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "dl_cve@linecorp.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "dl_cve@linecorp.com",

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-0868",
"sourceIdentifier": "cvd@cert.pl",
"published": "2025-02-20T12:15:10.893",
"lastModified": "2025-02-20T12:15:10.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.\n\nThis issue affects DocsGPT: from 0.8.1 through 0.12.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2025/02/CVE-2025-0868/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2025/02/CVE-2025-0868/",
"source": "cvd@cert.pl"
},
{
"url": "https://github.com/arc53/DocsGPT",
"source": "cvd@cert.pl"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-1043",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-20T12:15:11.030",
"lastModified": "2025-02-20T12:15:11.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Embed Any Document \u2013 Embed PDF, Word, PowerPoint and Excel Files plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.5 via the 'embeddoc' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3242370/embed-any-document",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b9f8c600-d62d-4f27-ba73-1a77a63859bc?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21105",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-02-20T12:15:11.233",
"lastModified": "2025-02-20T12:15:11.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell RecoverPoint for Virtual Machines 6.0.X contains a command execution vulnerability. A Low privileged malicious user with local access could potentially exploit this vulnerability by running the specific binary and perform any administrative action permitted by it resulting in shutting down the server, modifying the configuration leading to gain access to unauthorized data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000287503/dsa-2025-101-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-component-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21106",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-02-20T12:15:11.373",
"lastModified": "2025-02-20T12:15:11.373",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell Recover Point for Virtual Machines 6.0.X contains a Weak file system permission vulnerability. A low privileged Local attacker could potentially exploit this vulnerability, leading to impacting only non-sensitive resources in the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000287503/dsa-2025-101-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-component-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-20T11:01:11.869829+00:00
2025-02-20T13:00:25.739162+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-20T10:15:12.537000+00:00
2025-02-20T12:44:20.437000+00:00
```
### Last Data Feed Release
@ -33,35 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
281885
281893
```
### CVEs added in the last Commit
Recently added CVEs: `16`
Recently added CVEs: `8`
- [CVE-2024-13476](CVE-2024/CVE-2024-134xx/CVE-2024-13476.json) (`2025-02-20T10:15:09.990`)
- [CVE-2024-13520](CVE-2024/CVE-2024-135xx/CVE-2024-13520.json) (`2025-02-20T10:15:10.167`)
- [CVE-2024-13748](CVE-2024/CVE-2024-137xx/CVE-2024-13748.json) (`2025-02-20T10:15:10.303`)
- [CVE-2024-13753](CVE-2024/CVE-2024-137xx/CVE-2024-13753.json) (`2025-02-20T10:15:10.450`)
- [CVE-2024-13789](CVE-2024/CVE-2024-137xx/CVE-2024-13789.json) (`2025-02-20T10:15:10.637`)
- [CVE-2024-13792](CVE-2024/CVE-2024-137xx/CVE-2024-13792.json) (`2025-02-20T10:15:10.850`)
- [CVE-2024-13802](CVE-2024/CVE-2024-138xx/CVE-2024-13802.json) (`2025-02-20T10:15:11.100`)
- [CVE-2024-13849](CVE-2024/CVE-2024-138xx/CVE-2024-13849.json) (`2025-02-20T10:15:11.330`)
- [CVE-2024-13855](CVE-2024/CVE-2024-138xx/CVE-2024-13855.json) (`2025-02-20T10:15:11.530`)
- [CVE-2024-13888](CVE-2024/CVE-2024-138xx/CVE-2024-13888.json) (`2025-02-20T09:15:09.577`)
- [CVE-2024-6432](CVE-2024/CVE-2024-64xx/CVE-2024-6432.json) (`2025-02-20T10:15:11.767`)
- [CVE-2025-0866](CVE-2025/CVE-2025-08xx/CVE-2025-0866.json) (`2025-02-20T10:15:11.980`)
- [CVE-2025-0897](CVE-2025/CVE-2025-08xx/CVE-2025-0897.json) (`2025-02-20T09:15:09.750`)
- [CVE-2025-1064](CVE-2025/CVE-2025-10xx/CVE-2025-1064.json) (`2025-02-20T09:15:09.903`)
- [CVE-2025-1328](CVE-2025/CVE-2025-13xx/CVE-2025-1328.json) (`2025-02-20T10:15:12.337`)
- [CVE-2025-1483](CVE-2025/CVE-2025-14xx/CVE-2025-1483.json) (`2025-02-20T10:15:12.537`)
- [CVE-2024-49337](CVE-2024/CVE-2024-493xx/CVE-2024-49337.json) (`2025-02-20T12:15:09.293`)
- [CVE-2024-49344](CVE-2024/CVE-2024-493xx/CVE-2024-49344.json) (`2025-02-20T12:15:10.377`)
- [CVE-2024-49779](CVE-2024/CVE-2024-497xx/CVE-2024-49779.json) (`2025-02-20T12:15:10.527`)
- [CVE-2024-49781](CVE-2024/CVE-2024-497xx/CVE-2024-49781.json) (`2025-02-20T12:15:10.747`)
- [CVE-2025-0868](CVE-2025/CVE-2025-08xx/CVE-2025-0868.json) (`2025-02-20T12:15:10.893`)
- [CVE-2025-1043](CVE-2025/CVE-2025-10xx/CVE-2025-1043.json) (`2025-02-20T12:15:11.030`)
- [CVE-2025-21105](CVE-2025/CVE-2025-211xx/CVE-2025-21105.json) (`2025-02-20T12:15:11.233`)
- [CVE-2025-21106](CVE-2025/CVE-2025-211xx/CVE-2025-21106.json) (`2025-02-20T12:15:11.373`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `3`
- [CVE-2024-24867](CVE-2024/CVE-2024-248xx/CVE-2024-24867.json) (`2025-02-20T12:44:20.437`)
- [CVE-2024-49780](CVE-2024/CVE-2024-497xx/CVE-2024-49780.json) (`2025-02-20T12:15:10.657`)
- [CVE-2024-5739](CVE-2024/CVE-2024-57xx/CVE-2024-5739.json) (`2025-02-20T11:15:09.400`)
## Download and Usage

View File

@ -246604,7 +246604,7 @@ CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce1678
CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000
CVE-2024-13473,0,0,9f1cf3419ff4cec497cc77086acc28179e477b7bcff14ca4047a6f9eefd9483f,2025-02-18T18:15:18.990000
CVE-2024-13475,0,0,5092e9173eadac632d984f8d6b080371e4a16d09f059f921441142bd53ed3c18,2025-02-12T10:15:11.777000
CVE-2024-13476,1,1,e536d7c12b219bc57ecc07fef47f72334a7428667d6be5f52a983e55580fccce,2025-02-20T10:15:09.990000
CVE-2024-13476,0,0,e536d7c12b219bc57ecc07fef47f72334a7428667d6be5f52a983e55580fccce,2025-02-20T10:15:09.990000
CVE-2024-13477,0,0,994d41dcdca8ea2949161c6a3039cf39facb69cdf429b9bbd695e457cde87ed6,2025-02-12T12:15:28.660000
CVE-2024-13478,0,0,3d283885de2ff5694d473a7458eb6a9fee1962d7b2f3d84adb8d26453f66b0b0,2025-02-19T12:15:29.777000
CVE-2024-13479,0,0,265f3fc391e53c595bed244b3e7c3502077a0bb4298bb2e92ab4714dd5430254,2025-02-19T12:15:30.610000
@ -246646,7 +246646,7 @@ CVE-2024-13516,0,0,5ffb65a61f80c9c94522737749ad7061abe4071a127f73ee8fe2d406cf9b6
CVE-2024-13517,0,0,cfab1b395558d480252b3d9445658f67696997e56c4b9d51564795ba8972f0d2,2025-02-07T17:10:03.317000
CVE-2024-13519,0,0,dc09c545fe78d4520b3958b8cc7f812509309ee95d98546daffd0145d2c455d7,2025-01-18T07:15:09.510000
CVE-2024-1352,0,0,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f667,2025-01-17T17:23:55.973000
CVE-2024-13520,1,1,0d022892f28692b2ae8762509ce4aad5b3f48413ebef3a0cfb18328336d55b8b,2025-02-20T10:15:10.167000
CVE-2024-13520,0,0,0d022892f28692b2ae8762509ce4aad5b3f48413ebef3a0cfb18328336d55b8b,2025-02-20T10:15:10.167000
CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70b11,2025-01-30T17:41:52.897000
CVE-2024-13522,0,0,1ec5bbee168af71e2c569fc16b8aceb6b0c6360701cfbb6feabd58c3768384f3,2025-02-18T05:15:12.463000
CVE-2024-13523,0,0,a01422a75b98041b28e49f24f2d7440e366f8a9a4929907951037686a612b3c8,2025-02-18T07:15:08.303000
@ -246811,11 +246811,11 @@ CVE-2024-13740,0,0,ba6332fba984f0b615db8e6ca888f7060538e8c0e0b28351d9f7958c938b9
CVE-2024-13741,0,0,175049f3021b19cf7fa751f03fe80f12100c24edbb7e3c159d12f4c96d5eb8a9,2025-02-18T02:15:13.047000
CVE-2024-13742,0,0,aa7b21df6f3ec325db10419962054c1a324c9ebd12e6b4ba3b8ccbdda20e9f49,2025-01-30T18:38:19.663000
CVE-2024-13743,0,0,27ea41ebfcfb791fdac8994b9a3c60039e7203f73b7d197f4d7616cc1f730a6d,2025-02-18T23:15:09.267000
CVE-2024-13748,1,1,1697b574f690f336c11060fdfb3f73b4037faf1a5992f7a8b6df68b81a12de40,2025-02-20T10:15:10.303000
CVE-2024-13748,0,0,1697b574f690f336c11060fdfb3f73b4037faf1a5992f7a8b6df68b81a12de40,2025-02-20T10:15:10.303000
CVE-2024-13749,0,0,80f262ecaea974125eab2d55e54ea371d41d3a900599102c4f121cdbe4bfacc8,2025-02-12T04:15:09.793000
CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000
CVE-2024-13752,0,0,90982070281cf6fac387cb369b7b78fff5885316e613711da2e6fb3910f9109c,2025-02-15T10:15:08.533000
CVE-2024-13753,1,1,b2ba220ac3d1a62c609e1defaf324d88eb47f70fafd61d617b1b90635fc079be,2025-02-20T10:15:10.450000
CVE-2024-13753,0,0,b2ba220ac3d1a62c609e1defaf324d88eb47f70fafd61d617b1b90635fc079be,2025-02-20T10:15:10.450000
CVE-2024-13758,0,0,2e4bd9fb3fef024cef02d2b8f2dacb7555196f6b2dc915351eaf15ff5ed3368d,2025-01-31T20:28:53.477000
CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000
CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15dea7c,2025-01-31T03:15:10.693000
@ -246825,17 +246825,17 @@ CVE-2024-13770,0,0,a44f66c1dcb1ed45bbd56efa11122dee804aa0389e710164fb7a159776bdc
CVE-2024-13775,0,0,89d1ec6a71cec12ef8d6fda55cf89bde1f18738024bb28bd682eafe6ee6a6e20,2025-02-01T13:15:22.847000
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
CVE-2024-13783,0,0,ac9bfe0bdafe91bcdd1a8a8c9fc20390084611c0cb7ca54a0c41211f48373302,2025-02-18T11:15:11.600000
CVE-2024-13789,1,1,66685c0c937a45caf4804fdbb0f6a654b7766a4df93c13ce786e130fd2ed5ff5,2025-02-20T10:15:10.637000
CVE-2024-13789,0,0,66685c0c937a45caf4804fdbb0f6a654b7766a4df93c13ce786e130fd2ed5ff5,2025-02-20T10:15:10.637000
CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000
CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba37212823df,2025-02-14T11:15:09.320000
CVE-2024-13792,1,1,5eea2eb9c2e9b718585e09fb9464cf4787dcedab1db15551defa783e010d8240,2025-02-20T10:15:10.850000
CVE-2024-13792,0,0,5eea2eb9c2e9b718585e09fb9464cf4787dcedab1db15551defa783e010d8240,2025-02-20T10:15:10.850000
CVE-2024-13794,0,0,27d6b89d805464403aa5cd7b47bffa4f0df39472970f2a8182a5a27be68e3d41,2025-02-18T18:15:19.290000
CVE-2024-13795,0,0,5ff186d2b18ebdd910aed1b17c910f62f178a43b9b5396d894a01eab3d2cf2bf,2025-02-18T08:15:09.980000
CVE-2024-13797,0,0,fe09b7061fe6273763b2c8668b8146404830403c0458cc4116f6d91c5b5628d2,2025-02-18T11:15:11.753000
CVE-2024-13799,0,0,ec8cb514ef31404e1cd13657eea18c026b0b0f4d5ffefec8356a7aac820d1c0c,2025-02-19T06:15:21.283000
CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000
CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000
CVE-2024-13802,1,1,fd81c83638437a642a8e1df7595c3a3a89a54e0438783fe338ef7efb14df6f36,2025-02-20T10:15:11.100000
CVE-2024-13802,0,0,fd81c83638437a642a8e1df7595c3a3a89a54e0438783fe338ef7efb14df6f36,2025-02-20T10:15:11.100000
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
CVE-2024-13813,0,0,a0414a00a2a30561fb3007f9bc2cc4b58102a245d589b97ea6ee429ccb8e907a,2025-02-11T16:15:39.220000
CVE-2024-13814,0,0,1eaa34671c59ff347de019eb0f7db92c91d554728619786a007d058e64ccd6e0,2025-02-18T21:30:00.523000
@ -246852,18 +246852,18 @@ CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede1
CVE-2024-13842,0,0,955b2791810b1a10a02616a1134c790dde9472870ffb2ecef1b260eb338bf89c,2025-02-11T16:15:39.513000
CVE-2024-13843,0,0,510b2676ce058323607c3a8a5ac880be2eb8da89d56b6ba23759e15b6c5d2ded,2025-02-11T16:15:39.667000
CVE-2024-13848,0,0,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2cfbe,2025-02-18T05:15:19.157000
CVE-2024-13849,1,1,d98f7937784c29e9abe71d6667822b62b2ca578c3586a491787af9ba63c49a21,2025-02-20T10:15:11.330000
CVE-2024-13849,0,0,d98f7937784c29e9abe71d6667822b62b2ca578c3586a491787af9ba63c49a21,2025-02-20T10:15:11.330000
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
CVE-2024-13850,0,0,6b9449e6648abb1edf82833d79485652b7d8e214965b03129c424b1f771ff336,2025-02-08T13:15:06.840000
CVE-2024-13852,0,0,face120ea95fed62ec099664fadaf77219da01c7521b566ddd6f702b5c620406,2025-02-18T05:15:19.423000
CVE-2024-13854,0,0,da76605e45e5cccb1e4ac357ef915fd87a7797a2aa194293a861365173d04915,2025-02-19T08:15:21.440000
CVE-2024-13855,1,1,87ff80a4a4bcadf924c0b68cea8cd371d8a19ee5f045d490959e15e51f021d88,2025-02-20T10:15:11.530000
CVE-2024-13855,0,0,87ff80a4a4bcadf924c0b68cea8cd371d8a19ee5f045d490959e15e51f021d88,2025-02-20T10:15:11.530000
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
CVE-2024-13879,0,0,9feaa77a4a107496b778129b23b28c9a020cd8ce5e3b7bb155fa8c6898d38c2d,2025-02-17T16:15:15.950000
CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000
CVE-2024-13888,1,1,c87839d2bca683e4e01b4f16bf4650844bb0d5c14b76b96fd45e3c4854b6fe97,2025-02-20T09:15:09.577000
CVE-2024-13888,0,0,c87839d2bca683e4e01b4f16bf4650844bb0d5c14b76b96fd45e3c4854b6fe97,2025-02-20T09:15:09.577000
CVE-2024-1389,0,0,44c915b89d8f24815db27dcf9521c10fcca5d968291afb2cbd201094aadb9d12,2025-01-27T17:15:51.567000
CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000
CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
@ -251277,7 +251277,7 @@ CVE-2024-24863,0,0,8412992a0ac3ca864f8b935580111d9f47a451383323c00a5da41176b0aa7
CVE-2024-24864,0,0,27b4318b0077aecacc0bff97a7bfbb119dcfd9017e02ec3f588a32590804df68,2024-11-21T08:59:52.410000
CVE-2024-24865,0,0,d08cc7a5f4e640cb6bc3d4882fe1fb48396562a861f7afa982a5961eb7360320,2024-11-21T08:59:52.543000
CVE-2024-24866,0,0,ca01e7ab9182f580c2df3cc16f43bce2d9101083ab37c189e1385bceb76e0af5,2024-11-21T08:59:52.693000
CVE-2024-24867,0,0,2136bd180ed9150e28edf92d8ce43c9eab9735ea7a9b491ddec9dbdb8f9cdb06,2024-11-21T08:59:52.850000
CVE-2024-24867,0,1,5a246564c5ccaa080317adcae2e224bd6ffc62017f7842c13916429403d09a7e,2025-02-20T12:44:20.437000
CVE-2024-24868,0,0,6630d4d84ad17a02844ec3eafb441b11da6816c82cb6acb3d931eae3bfaadf8f,2024-11-21T08:59:52.977000
CVE-2024-24869,0,0,eaa1bccf1ddb288cf6ae98ff79cb753c80b1b38e0069bd3f25d738e7d525e442,2024-11-21T08:59:53.090000
CVE-2024-2487,0,0,154b62626197a03542ee0c0398cde6999f209ff33e52a9d26afaadde0098fa01,2025-01-14T15:05:51.047000
@ -269684,10 +269684,12 @@ CVE-2024-49333,0,0,e40cf35196ca18dee45163c0748fc145e27ae20ad0111de97528d70fea881
CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000
CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000
CVE-2024-49336,0,0,74b5d6ca5a527605069a19da7232fb13c834e91072ba01d322d091e1df5fa9ca,2025-01-06T14:29:06.027000
CVE-2024-49337,1,1,b8a48e9bc9ebd77c2dc1ec454f60e0193d7bbfcc795cf49651cc8f688caf1ce1,2025-02-20T12:15:09.293000
CVE-2024-49338,0,0,089f0961a6c5fcf1312af989afac1f42747fad3dccba1132721dce2e32b4ec33,2025-01-18T15:15:07.433000
CVE-2024-49339,0,0,9425fb5c81f6dff392aaa0664ff1617cf111ffa2e6ae53225c22b9e873bc9df4,2025-01-31T17:15:15.260000
CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000
CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000
CVE-2024-49344,1,1,ca18aede5d136da2317880edebac0e451734c847e5f1c23223bf9f5d6708ba72,2025-02-20T12:15:10.377000
CVE-2024-49348,0,0,0c6cdfcb5307c005a68c1aff02f6722c257087813897611dd4477d2e900a8fa1,2025-02-05T12:15:28.570000
CVE-2024-49349,0,0,ffc8da5d31c0a7888ad36cdc475b5ebfda5cfed0e4d2d3c1c13edb178b03d3f1,2025-01-31T17:15:15.410000
CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000
@ -270009,8 +270011,10 @@ CVE-2024-49775,0,0,f7b107fd90967d0f5ebc9cc515008c8fdf5fb3cf128e6b60db0d23183670b
CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750f4a,2024-11-15T18:35:34.550000
CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000
CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000
CVE-2024-49779,1,1,6486604c5d581ddf3e0f3b056e09f87bff8e5df54f940cc2f474c3313bb68c34,2025-02-20T12:15:10.527000
CVE-2024-4978,0,0,de30ddfe983833699ad8e2f2543285ea22a567f389ca513dff29646a99a121fd,2025-01-27T21:42:09.123000
CVE-2024-49780,0,0,aeca1444b9977ee8d7ac813fad06f05ad465cec901b12558471d6fc9509b8d40,2025-02-20T04:15:10.827000
CVE-2024-49780,0,1,fff55ad4626a9979eba41a1b34d4616290f7d231f0b1712eef7696601dee4fa8,2025-02-20T12:15:10.657000
CVE-2024-49781,1,1,fa870178578d49a4bc6c9e50419c3540ba055f41fdaf4f69f475d0a8908744f6,2025-02-20T12:15:10.747000
CVE-2024-49782,0,0,0bc087b291a089e65a143cf89914514d05076b15dbb30d3729c21d37dca3c647,2025-02-20T04:15:10.973000
CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000
CVE-2024-49791,0,0,436e3ec68e0463377f56d61753d1a9ed190ae95d7dd892d9e3c8a12bd564a16b,2025-02-12T18:59:58.627000
@ -274820,7 +274824,7 @@ CVE-2024-57376,0,0,1b43a3e4a8037a8c708d6024b6d292337bbf71fefc30954ed4f4a8b250f57
CVE-2024-57378,0,0,dba15be377033085f8e2bb66f3dac5e129faa6437c41577ff7a42e407eb15a43,2025-02-13T22:15:11.167000
CVE-2024-5738,0,0,ed407989160bc277c57b88c071485c42bcb76c7891fe4c3b678e4f981038b562,2025-02-11T02:15:35.480000
CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b1bb,2025-01-31T16:13:06.540000
CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000
CVE-2024-5739,0,1,c5c2a01c52729f34b70d0ba17b3b2c0fc6065fac9c4acf57edb649a485cbd474,2025-02-20T11:15:09.400000
CVE-2024-57392,0,0,7b9989fcc73c1df35c96288876a5368c643f8db4e87836a57a99cbb5dea65395,2025-02-11T15:15:18.900000
CVE-2024-57395,0,0,2c6b9838d8d0a9b17c18c2b5c319e27ac8a0ab4c8fbbb39ded3167ef6bff33f1,2025-01-31T21:15:11.383000
CVE-2024-57407,0,0,45e1a10510320897f48f1620e894947df2f73cd6e1f003632125a8e02b442b2e,2025-02-19T21:15:15.393000
@ -275773,7 +275777,7 @@ CVE-2024-6426,0,0,4ce002f398761811225a9161509362fcf85e9093181ba3d834a2dc27a8c558
CVE-2024-6427,0,0,80de2373d634cddc1315c0548dc19b6640fad9157630b47b6d68e0948ebd24fe,2024-11-21T09:49:38.180000
CVE-2024-6428,0,0,9824e5fb0d614a3d0e710881a83479c00dc37380d4de17daf97ea6d59ba991f6,2024-11-21T09:49:38.313000
CVE-2024-6431,0,0,202245554d16495714b4a50b0b5396dc96bed4c4cca10e8f1efb34aa2485167d,2024-11-21T09:49:38.450000
CVE-2024-6432,1,1,b8b9e37a8ed808ba75a38e5d2d9d9c05235a2a1d87bd14d42f4cb5ef34a79bba,2025-02-20T10:15:11.767000
CVE-2024-6432,0,0,b8b9e37a8ed808ba75a38e5d2d9d9c05235a2a1d87bd14d42f4cb5ef34a79bba,2025-02-20T10:15:11.767000
CVE-2024-6433,0,0,42c6a0efce14f311f1548d33d512d616e158da3b932d3b757e1b72ad689e1dfb,2024-11-21T09:49:38.570000
CVE-2024-6434,0,0,6a4274085a2124b428b913ddcbc2570d1d62abe5639e19e73a17b1e138716c77,2024-11-21T09:49:38.717000
CVE-2024-6435,0,0,4b307bda22842f0e1dad89cbe8433b0a2f5a1573c8d400fddf8a5d2b32d831e0,2025-01-31T15:01:23.807000
@ -279286,8 +279290,9 @@ CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f
CVE-2025-0862,0,0,dee81cd1ce38cab472cf28eb1ce5e1d9037dd3bdafbd545dddc7d172ac5b30e6,2025-02-11T11:15:16.043000
CVE-2025-0864,0,0,e56e1de16064acc329a5a32cc0ae2f68a867a09df61e368d37eca098dd9d89f8,2025-02-18T08:15:10.723000
CVE-2025-0865,0,0,80ee86109bc8176d915ab531176f207ba267c3135c04d72fc66dcd322326ed90,2025-02-19T08:15:21.853000
CVE-2025-0866,1,1,3255655eeba447d8936ae6bd9253ad70311926c87296ef63be450f30c50c2dad,2025-02-20T10:15:11.980000
CVE-2025-0866,0,0,3255655eeba447d8936ae6bd9253ad70311926c87296ef63be450f30c50c2dad,2025-02-20T10:15:11.980000
CVE-2025-0867,0,0,00bdec3c0865b5f1af866315340e7f0b0b67377723af000ff55ae7ae60c91aed,2025-02-14T13:15:42.620000
CVE-2025-0868,1,1,2c448a5ed3ab20073b56135a44718b4d9781c8edb3d0e307328b67014db43ddf,2025-02-20T12:15:10.893000
CVE-2025-0869,0,0,c00b46e6ec082bb5acc28b4863ecc13d05083b8391495aa8cb5415a092650002,2025-02-07T17:15:31.307000
CVE-2025-0870,0,0,1d396f929e817f7895a91994ddee9c76172e4af1ca8cb701d53be58252025809,2025-01-30T13:15:10.483000
CVE-2025-0871,0,0,dd996ab8d2585030114b224f83df5a23f791f2cd7e1f4d3d28ceff15bb663996,2025-01-30T15:15:18.253000
@ -279300,7 +279305,7 @@ CVE-2025-0882,0,0,f8cdd5be4a5ead42b24a22ef4df5e88faf0b516030bc2a511e27ba50d819cc
CVE-2025-0890,0,0,68df14f89e9fe80a79d0a5c45e2ac7eb09be58559d3bae2cdceaf342154a05c6,2025-02-04T11:15:08.880000
CVE-2025-0893,0,0,872c69097c7b2ec13b302ffd3b210287444f3dcfd1f7ff02519c618f95b70473,2025-02-19T18:15:24.127000
CVE-2025-0896,0,0,ecb21883de9b1361a3658cc48f44fdef2f626a3624bc2d70212f10094545a767,2025-02-13T02:15:29.470000
CVE-2025-0897,1,1,cade221d6eb479db908dde72749d854eec08ffca27791d62f68eff32758aed4b,2025-02-20T09:15:09.750000
CVE-2025-0897,0,0,cade221d6eb479db908dde72749d854eec08ffca27791d62f68eff32758aed4b,2025-02-20T09:15:09.750000
CVE-2025-0899,0,0,d8701cd2c405f04761906304023370caa539e5fcf15c63a9325dc062ea45abed,2025-02-12T19:00:59.227000
CVE-2025-0901,0,0,8576e90f3f88086e5daf580b6c523f255280985c9bdf2649941334bc2c0fff8f,2025-02-12T19:00:52.577000
CVE-2025-0902,0,0,d3b3b12c4b0c7e57e30c3d4cf431b37a3914287ec889acdcd9941b6c82bdf01c,2025-02-12T19:00:34.533000
@ -279376,6 +279381,7 @@ CVE-2025-1026,0,0,035fc1dc2474697a852e52233cc9d299f677e1a0207511b21278e18a7e117d
CVE-2025-1028,0,0,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000
CVE-2025-1035,0,0,d903f294151be8a3e62456157037514ca824f897e40f9739bb45f708f03b9002,2025-02-18T12:15:16.087000
CVE-2025-1042,0,0,e4600eb751c0559414826534607894ec791f03e01157094495f2034b236d6aad,2025-02-12T15:15:16.230000
CVE-2025-1043,1,1,c607b275d7254bbcb4ccac200e10fd3b263d060b985922e80bbb9468afeab30b,2025-02-20T12:15:11.030000
CVE-2025-1044,0,0,9f8be6c10874ff2755d0454f22f2307f6446f5aad49de046e6d1d7bccf9d96f4,2025-02-18T21:34:01.863000
CVE-2025-1052,0,0,dd0f54ac7a99856d7d318fe87955632258ed518980dc0996f06ddf7223075097,2025-02-18T21:32:45.863000
CVE-2025-1053,0,0,029ef95d4ca404a127f35d558b999def9d0d35c7fe97a6a586ce48f5dbe97960,2025-02-14T04:15:08.903000
@ -279383,7 +279389,7 @@ CVE-2025-1058,0,0,f0fad2f3f49afeee020cd5166bcf442481ddfb4558eb17fc96aa811a077ae5
CVE-2025-1059,0,0,0ab1d4e680647fc777b1f82262b0090b83c24b4ef86b71d82e6bf1295dac9761,2025-02-13T06:15:21.680000
CVE-2025-1060,0,0,a3af803539184a670e8a1150c8d0a2bc56d4cd2cc859a7263777d630bbc1a271,2025-02-13T06:15:22.213000
CVE-2025-1061,0,0,719d74f0f0646df1bcdf5186f15b6b006503d4de7dcd7fdf659e983ae5a27990,2025-02-07T02:15:29.587000
CVE-2025-1064,1,1,3476c323fbb99f00363316e4eadec811e94f110d7f8898624f63fa6bc0b178c6,2025-02-20T09:15:09.903000
CVE-2025-1064,0,0,3476c323fbb99f00363316e4eadec811e94f110d7f8898624f63fa6bc0b178c6,2025-02-20T09:15:09.903000
CVE-2025-1065,0,0,7a62f98369ffccf4b00a81d8982feffe5ffb0f550549018fa41283fbe2ed1658,2025-02-19T06:15:21.507000
CVE-2025-1066,0,0,3fc22615f942b72b8cf5d09f7bd097e7cf373f3b0fcdec9d31e667deb7a70a15,2025-02-18T19:15:24.243000
CVE-2025-1070,0,0,5146e4f08b2531ff82fc620bde7cb0c34c86b4487a1fbc38c78ecd1432016151,2025-02-13T06:15:22.463000
@ -279515,7 +279521,7 @@ CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813
CVE-2025-1293,0,0,de22ea463bb11f59b8d001bee87aa35e3db1395d25b26c300642e262a14ba018,2025-02-20T01:15:09.950000
CVE-2025-1298,0,0,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000
CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000
CVE-2025-1328,1,1,5679f4d1fb42d96e89d2a315978dab8dea6fffe2e65cd47be423fc2942444d0c,2025-02-20T10:15:12.337000
CVE-2025-1328,0,0,5679f4d1fb42d96e89d2a315978dab8dea6fffe2e65cd47be423fc2942444d0c,2025-02-20T10:15:12.337000
CVE-2025-1332,0,0,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000
CVE-2025-1335,0,0,cca5a5aeab602daf60e1966b659a6706e108a1c270c3d12ddcea19b2340f545f,2025-02-16T04:15:23.230000
CVE-2025-1336,0,0,1d4332a43e181efb84f487de4a15195bff051d66dfbf23e944c2a28a29d70a13,2025-02-16T09:15:09.347000
@ -279563,7 +279569,7 @@ CVE-2025-1447,0,0,0171066f5cc38b75ed48310b7b051ba77753a7de710aef2fb49270a13c1b06
CVE-2025-1448,0,0,8646602fe654ea9c8b8dc30e88ebd580a07aa04ffb2e255dc4fb4a77857c3ea4,2025-02-19T02:15:08.833000
CVE-2025-1464,0,0,b14d16c6baac3507cd4582169a63151cc0fa9ea50d60b1fe8184ca7d2a79a3df,2025-02-19T14:15:30.337000
CVE-2025-1465,0,0,2910b362fc4eb01a626127c50d683f7ea305894f7d9657ebb7cc043987c8c3ee,2025-02-19T16:15:40.667000
CVE-2025-1483,1,1,76cafe28555a10dbbf45546d6f75e89aec9e95ad54aaa4bc0e47714c7e682b94,2025-02-20T10:15:12.537000
CVE-2025-1483,0,0,76cafe28555a10dbbf45546d6f75e89aec9e95ad54aaa4bc0e47714c7e682b94,2025-02-20T10:15:12.537000
CVE-2025-1492,0,0,4cf0d4c2a3031b043d71ffc226830ce9ea797081b5a3ae5a1323a931931fb733,2025-02-20T02:15:38.553000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
@ -279660,6 +279666,8 @@ CVE-2025-21091,0,0,14a5f94bd4155cb401565e2a5aae76cc90c7a8d9e7b6e7f408f118d52738b
CVE-2025-21101,0,0,0410baf8ce887e4bee4e642f5416b4c957a9c2a93d873e61b46c5aa6fe5ccada,2025-02-04T15:50:56.233000
CVE-2025-21102,0,0,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000
CVE-2025-21103,0,0,b6d1fa36e078291047471a4019ca1c4957d97737dc18368f9adb3746c2dfa968,2025-02-17T14:15:08.597000
CVE-2025-21105,1,1,af3ed371268bbaf4c4254c19f89c22d9034887d546e8231180a05b599ca0a738,2025-02-20T12:15:11.233000
CVE-2025-21106,1,1,dc48ca894010b90e2eebb6fe93e39a18e6c6f41f53656ff1ed6cf2df4d15ffed,2025-02-20T12:15:11.373000
CVE-2025-21107,0,0,0827735892f4001f988a0739aad719c8ee1fb9144fe1da312da1da34f24b5ce6,2025-02-07T20:01:14.760000
CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000
CVE-2025-21117,0,0,3c59ddab13aed7617d82cbb9fbab3c190cbfe8b424cc570d2e879fe06ca6cee2,2025-02-05T14:15:27.417000

Can't render this file because it is too large.