mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2025-02-14T09:00:37.747043+00:00
This commit is contained in:
parent
74b52a2358
commit
3f72c90a48
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-11078",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-11-11T20:15:17.400",
|
||||
"lastModified": "2024-11-23T01:26:39.680",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-02-14T07:15:31.900",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument e leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument e/role leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
60
CVE-2024/CVE-2024-579xx/CVE-2024-57969.json
Normal file
60
CVE-2024/CVE-2024-579xx/CVE-2024-57969.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-57969",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-14T07:15:32.340",
|
||||
"lastModified": "2025-02-14T07:15:32.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "app/Model/Attribute.php in MISP before 2.4.198 ignores an ACL during a GUI attribute search."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MISP/MISP/commit/4f27f83a775aba4d3cca9255f69c3c9998b7df7f",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/MISP/MISP/compare/v2.4.197...v2.4.198",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-96xx/CVE-2024-9601.json
Normal file
64
CVE-2024/CVE-2024-96xx/CVE-2024-9601.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-9601",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-14T07:15:32.570",
|
||||
"lastModified": "2025-02-14T07:15:32.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Qubely \u2013 Advanced Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018align\u2019 and 'UniqueID' parameter in all versions up to, and including, 1.8.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/qubely/trunk/core/blocks/postgrid.php#L1419",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3235188/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58387a60-ef68-4911-9349-97b0f7e7726f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2025/CVE-2025-12xx/CVE-2025-1298.json
Normal file
37
CVE-2025/CVE-2025-12xx/CVE-2025-1298.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2025-1298",
|
||||
"sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
|
||||
"published": "2025-02-14T08:15:30.877",
|
||||
"lastModified": "2025-02-14T08:15:30.877",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Logic vulnerability in the mobile application (com.transsion.carlcare) may lead to the risk of account takeover."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.tecno.com/SRC/blogdetail/383?lang=en_US",
|
||||
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea"
|
||||
},
|
||||
{
|
||||
"url": "https://security.tecno.com/SRC/securityUpdates",
|
||||
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-226xx/CVE-2025-22630.json
Normal file
56
CVE-2025/CVE-2025-226xx/CVE-2025-22630.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-22630",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-14T07:15:32.750",
|
||||
"lastModified": "2025-02-14T07:15:32.750",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in MarketingFire Widget Options allows OS Command Injection.This issue affects Widget Options: from n/a through 4.1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/widget-options/vulnerability/wordpress-widget-options-plugin-4-1-0-arbitrary-code-execution-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26788.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26788.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26788",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-14T08:15:31.183",
|
||||
"lastModified": "2025-02-14T08:15:31.183",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "StrongKey FIDO Server before 4.15.1 treats a non-discoverable (namedcredential) flow as a discoverable transaction."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.strongkey.com/index.php/skfs-v3/skfs-release-notes",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-267xx/CVE-2025-26789.json
Normal file
78
CVE-2025/CVE-2025-267xx/CVE-2025-26789.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-26789",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-14T08:15:31.357",
|
||||
"lastModified": "2025-02-14T08:15:31.357",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Logpoint AgentX before 1.5.0. A vulnerability caused by limited access controls allowed li-admin users to access sensitive information about AgentX Manager in a Logpoint deployment."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://servicedesk.logpoint.com/hc/en-us/articles/24749416515741-Unauthorized-information-access-due-to-inadequate-access-controls",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
README.md
21
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-14T07:00:19.858173+00:00
|
||||
2025-02-14T09:00:37.747043+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-14T06:15:20.350000+00:00
|
||||
2025-02-14T08:15:31.357000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,25 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
281324
|
||||
281330
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-13493](CVE-2024/CVE-2024-134xx/CVE-2024-13493.json) (`2025-02-14T06:15:19.740`)
|
||||
- [CVE-2024-13641](CVE-2024/CVE-2024-136xx/CVE-2024-13641.json) (`2025-02-14T06:15:19.957`)
|
||||
- [CVE-2024-13692](CVE-2024/CVE-2024-136xx/CVE-2024-13692.json) (`2025-02-14T06:15:20.140`)
|
||||
- [CVE-2024-2240](CVE-2024/CVE-2024-22xx/CVE-2024-2240.json) (`2025-02-14T05:15:11.550`)
|
||||
- [CVE-2024-7052](CVE-2024/CVE-2024-70xx/CVE-2024-7052.json) (`2025-02-14T06:15:20.350`)
|
||||
- [CVE-2025-23406](CVE-2025/CVE-2025-234xx/CVE-2025-23406.json) (`2025-02-14T05:15:12.567`)
|
||||
- [CVE-2024-57969](CVE-2024/CVE-2024-579xx/CVE-2024-57969.json) (`2025-02-14T07:15:32.340`)
|
||||
- [CVE-2024-9601](CVE-2024/CVE-2024-96xx/CVE-2024-9601.json) (`2025-02-14T07:15:32.570`)
|
||||
- [CVE-2025-1298](CVE-2025/CVE-2025-12xx/CVE-2025-1298.json) (`2025-02-14T08:15:30.877`)
|
||||
- [CVE-2025-22630](CVE-2025/CVE-2025-226xx/CVE-2025-22630.json) (`2025-02-14T07:15:32.750`)
|
||||
- [CVE-2025-26788](CVE-2025/CVE-2025-267xx/CVE-2025-26788.json) (`2025-02-14T08:15:31.183`)
|
||||
- [CVE-2025-26789](CVE-2025/CVE-2025-267xx/CVE-2025-26789.json) (`2025-02-14T08:15:31.357`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-11078](CVE-2024/CVE-2024-110xx/CVE-2024-11078.json) (`2025-02-14T07:15:31.900`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
20
_state.csv
20
_state.csv
@ -244414,7 +244414,7 @@ CVE-2024-11074,0,0,9ddd701162e98311d74e0a8bfa122cb1361e573e5cdd3c644d4ea5411ff07
|
||||
CVE-2024-11075,0,0,1453691218eaa30381e9b896380b7d3816e51e01355ecf6bb51d349da772dacc,2024-11-19T21:57:32.967000
|
||||
CVE-2024-11076,0,0,82524b74886a82ba09f33edf13fd9a8f5f86e092e9bbf909a4e53028c97856fb,2024-11-14T19:14:26.717000
|
||||
CVE-2024-11077,0,0,a548949903d5d799c3512cf90a23f879ee8299884e96a824994982a4f1a0ff5f,2024-11-14T18:57:17.743000
|
||||
CVE-2024-11078,0,0,0bd64d79edb4bca6b6662894de14196529e42eaf34f19ad82faa60601adf2c0a,2024-11-23T01:26:39.680000
|
||||
CVE-2024-11078,0,1,0920bb7e0657f830205c7e5026e87a05aa8532129d29ae669124476468117fcd,2025-02-14T07:15:31.900000
|
||||
CVE-2024-11079,0,0,4429678b1338007ef95bc9554c7c9cf15512d4d01927364e7ca6363e4b71338b,2024-12-18T04:15:06.310000
|
||||
CVE-2024-1108,0,0,41de46f3dcaf9533283bc7e75a781616c5054e3d3c6e5f547b16c496a7c97db1,2025-01-28T02:43:57.227000
|
||||
CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000
|
||||
@ -246547,7 +246547,7 @@ CVE-2024-13487,0,0,e42f90a861119fddb567fba0eb7966e50fcc402fe16882839f676096df9b8
|
||||
CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000
|
||||
CVE-2024-13490,0,0,61b1110e3ea573589f69702404cb2c4dc6b4f345244280cfa5a3ba73763f2bda,2025-02-12T10:15:11.973000
|
||||
CVE-2024-13492,0,0,b366a1d0934eccf698617fb1fc1f766d6bf66d42fc2eb6cd7208ba290ff487ca,2025-02-07T16:15:36.123000
|
||||
CVE-2024-13493,1,1,43f2714c2b78bb494654d68bcc6f4a261a1b9cd5d544969b6af161cdf4b641c6,2025-02-14T06:15:19.740000
|
||||
CVE-2024-13493,0,0,43f2714c2b78bb494654d68bcc6f4a261a1b9cd5d544969b6af161cdf4b641c6,2025-02-14T06:15:19.740000
|
||||
CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000
|
||||
CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000
|
||||
CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000
|
||||
@ -246622,7 +246622,7 @@ CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf7
|
||||
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
|
||||
CVE-2024-13639,0,0,4407b7ba25a3acfefed293f60c57e90651a998c527d7ca15ce0c95a01e3346ec,2025-02-13T09:15:07.273000
|
||||
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
|
||||
CVE-2024-13641,1,1,40196144b6370d50846f27868b94418a681b195f3122e85e15112c8a0d9b0dea,2025-02-14T06:15:19.957000
|
||||
CVE-2024-13641,0,0,40196144b6370d50846f27868b94418a681b195f3122e85e15112c8a0d9b0dea,2025-02-14T06:15:19.957000
|
||||
CVE-2024-13642,0,0,e62737ae89b22b0d2ca4d332b68aa19e6175af0f52e0500481826051778e9daf,2025-02-04T16:00:49.540000
|
||||
CVE-2024-13643,0,0,a38744f20924e820268602d30e3b0d726767a57f9b6238974eea21b5a7b2b1af,2025-02-11T08:15:30.450000
|
||||
CVE-2024-13644,0,0,11d1ee1072eb0a7c54d807f92bf9d118898d798d047f0051b16a3f45360f7464,2025-02-13T02:15:29.320000
|
||||
@ -246647,7 +246647,7 @@ CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a
|
||||
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
|
||||
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
|
||||
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
|
||||
CVE-2024-13692,1,1,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000
|
||||
CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000
|
||||
CVE-2024-13694,0,0,f76307657ffe1cf961458e88374ab5be6334165284f8bcf86e9ac130fdc702fd,2025-02-04T18:47:41.800000
|
||||
CVE-2024-13696,0,0,ddda7d8ee3b5db6631ae21ebb6abc15e9b483b8978d4e9a66c9fc1507010682e,2025-01-29T08:15:19.677000
|
||||
CVE-2024-13698,0,0,ea43a0ffeb82eb62bdf790bb3904a4694fa6ec80884e9d936dc30a8e05897d00,2025-02-07T20:15:27.277000
|
||||
@ -249450,7 +249450,7 @@ CVE-2024-22396,0,0,a6f86b280685a8077d64ea0c4e6e62471b49d7ff7e81586c6e52ac5aa39b1
|
||||
CVE-2024-22397,0,0,01399fd328b3875d3cba807f43194ce1c518378bb4f49faacd426911edda9d25,2024-11-21T08:56:11.887000
|
||||
CVE-2024-22398,0,0,dfd55b15b360ca1655d53463ee39d2e2f8fc335d78f1021104df189fbcc47922,2024-11-21T08:56:12.003000
|
||||
CVE-2024-22399,0,0,440fe391b5ec2015da468cab093328959c1b38c96ded1c0d9adb3003d7cd4bf8,2024-11-21T08:56:12.200000
|
||||
CVE-2024-2240,1,1,16a10f4a1ac0ccd76202fef3186f83cb5364c39fd5bd0c984fb5f954401af798,2025-02-14T05:15:11.550000
|
||||
CVE-2024-2240,0,0,16a10f4a1ac0ccd76202fef3186f83cb5364c39fd5bd0c984fb5f954401af798,2025-02-14T05:15:11.550000
|
||||
CVE-2024-22400,0,0,5930ebcf2866e03427e30d4762c0c3b8aeae3ff4116c2beec8fd91037b7d32d4,2024-11-21T08:56:12.393000
|
||||
CVE-2024-22401,0,0,37c4e9c09afc5473d51bfbb7104c0cda826d003022619855b6d7e90cb4694716,2024-11-21T08:56:12.540000
|
||||
CVE-2024-22402,0,0,645886260abde48d7718fc6c6c2e9b322fc883f67f629caa855db20c63710f23,2024-11-21T08:56:12.680000
|
||||
@ -274941,6 +274941,7 @@ CVE-2024-57965,0,0,1ec783f88325ed02c1810413dbff411d8a59c49db780f7d0fa48c58005555
|
||||
CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e1c9,2025-02-09T05:15:32.883000
|
||||
CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000
|
||||
CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000
|
||||
CVE-2024-57969,1,1,b371badd84f84271fd7c4769fff6f836cd92998659f71f251308fa31806e425a,2025-02-14T07:15:32.340000
|
||||
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
|
||||
CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000
|
||||
CVE-2024-5800,0,0,0f1ba4e6921bceda8aa9f69d4954ff1ca271a0069f260f484c22f7b777658fee,2024-08-12T13:41:36.517000
|
||||
@ -276074,7 +276075,7 @@ CVE-2024-7048,0,0,f97f3592e9a62156744d6e051c2a46f407bbff37b6d74b038dcb4f6ca33e3e
|
||||
CVE-2024-7049,0,0,3ed1b44b3add6a7b5afeddf885ae26eaf09447a652c502b043770537058cabd9,2024-10-17T14:22:44.653000
|
||||
CVE-2024-7050,0,0,e7e264104cea78047b76892b2fd1d390f9cbe010098741cea3997c4dcffc5e50,2024-11-21T09:50:48.257000
|
||||
CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000
|
||||
CVE-2024-7052,1,1,1f434523bd2abb1a4f04a2bc7ea5914aaf4882e3a35a765c40593bc3b64cfc20,2025-02-14T06:15:20.350000
|
||||
CVE-2024-7052,0,0,1f434523bd2abb1a4f04a2bc7ea5914aaf4882e3a35a765c40593bc3b64cfc20,2025-02-14T06:15:20.350000
|
||||
CVE-2024-7054,0,0,dae977ba195c466d627a19bcd62fa740dafe560e6a8fd5014878665bd52d8b35,2024-08-20T15:44:20.567000
|
||||
CVE-2024-7055,0,0,eda6ef490df5a6117a32915d1ec352603ee024f358dd3007691ca0ac4a1981c5,2024-08-06T16:30:24.547000
|
||||
CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000
|
||||
@ -278255,6 +278256,7 @@ CVE-2024-9595,0,0,affe800d4ccb9fbe30c63eaf437475e7b4f1b8f6ed06b3135e5296a266d83c
|
||||
CVE-2024-9596,0,0,97d2b24b69eeab4b46fc850bb8355e0549024bcd45410c14a3bd69da526dabde,2024-10-16T17:00:19.787000
|
||||
CVE-2024-9598,0,0,5c0fa148e22055423c63f1a7155091692b712567127d27765647509813b47724,2024-10-25T12:56:07.750000
|
||||
CVE-2024-9600,0,0,ea15b50099d09f31b8281c72f2e9f7d888450824868eb6eb5785430b8539a997,2024-11-21T18:15:15.853000
|
||||
CVE-2024-9601,1,1,81b6958d2d5ea875a80fc76ae37785ac7d2772cfdcb27aaa31ffe9273b852d61,2025-02-14T07:15:32.570000
|
||||
CVE-2024-9602,0,0,97e94b3551b8a143150ba66a2e724dafe158b773cf8b0069e0eeb8d400c5b732,2025-01-02T16:48:01.163000
|
||||
CVE-2024-9603,0,0,50669f21073ac14122f480035b4c1b46d69ab6d3ffcc460bb7bd86545f71cc92,2025-01-02T16:48:21.323000
|
||||
CVE-2024-9607,0,0,54c7fa609071a2960fe8514c7e09434070f7928dbf6bf2601a0c6b5966a0c0f2,2024-11-05T17:40:57.777000
|
||||
@ -279215,6 +279217,7 @@ CVE-2025-1247,0,0,c04092dcf345103badb80fdd95e22fac8a6844256bbf5405f306402957fc9e
|
||||
CVE-2025-1270,0,0,236281c7e2f02c32874e4e3709dfb4e8e9ebb69fe161a8786e8aa1222fe115b8,2025-02-13T13:15:09.273000
|
||||
CVE-2025-1271,0,0,5d817e390688ef07b23033305a3d61b54ec7909b543740a3f3f14f0970450461,2025-02-13T13:15:09.433000
|
||||
CVE-2025-1283,0,0,e0bfe5d939a3d4bf1cd2099051e27f05a10fae661af34307090edba35da62446,2025-02-13T22:15:11.413000
|
||||
CVE-2025-1298,1,1,c241b07b63fa1a12db4bf2cbddc777a3c460534a51a196b1be44ba87a34980ab,2025-02-14T08:15:30.877000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000
|
||||
@ -279990,6 +279993,7 @@ CVE-2025-22618,0,0,c19d0c974c1e5e33f6d26b1c1e9e7666054e0a20c6f455c24ab32d4bd2226
|
||||
CVE-2025-22619,0,0,94078c2e9a44454365aeb387ac2d1c51351bb08f1b9ba4f80444a5076273dcd6,2025-02-13T19:44:19.580000
|
||||
CVE-2025-22620,0,0,428c7806e74732326369c718351571848c196156b9eb9eb7ffe99ba9002a1b52,2025-01-20T16:15:28.017000
|
||||
CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff27e,2025-01-15T17:15:20.810000
|
||||
CVE-2025-22630,1,1,79b3801f8ae7e0fc2c6a6c47d25a128abd9fd0016caa673d59d6e5ab1ad69955,2025-02-14T07:15:32.750000
|
||||
CVE-2025-22641,0,0,6bee2e22f4c2218c32261d50c3b76051122c36d8b22f1fe821f826f72b0d1ffb,2025-02-04T15:15:19.923000
|
||||
CVE-2025-22642,0,0,d0279d5449b2366770bc36c2393099b2add7493668b07ac0032c83f0b12bbe59,2025-02-04T15:15:20.120000
|
||||
CVE-2025-22643,0,0,fd67cfd00b1e33d83319275ceba21fc740b30ef0e3446cfe07e423c7f8efc474,2025-02-04T15:15:20.350000
|
||||
@ -280276,7 +280280,7 @@ CVE-2025-23369,0,0,3d547a50b40d16b552809387aa654ff4614f9ee138b9c9b23c533e36ce07a
|
||||
CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000
|
||||
CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000
|
||||
CVE-2025-23403,0,0,6d407c3e99373ae4903bfa5d6d7fa08d06d40485486c2ac644fbc1bd23d41148,2025-02-11T11:15:16.420000
|
||||
CVE-2025-23406,1,1,0697e08c7f212b286b17523f0a64ed0d5e5826076f22b9355dfd8ce23e8d359b,2025-02-14T05:15:12.567000
|
||||
CVE-2025-23406,0,0,0697e08c7f212b286b17523f0a64ed0d5e5826076f22b9355dfd8ce23e8d359b,2025-02-14T05:15:12.567000
|
||||
CVE-2025-23411,0,0,f1aae55185556b21d8e0c24272337daecb9be6df1974e1404054d93277defe14,2025-02-13T22:15:11.913000
|
||||
CVE-2025-23412,0,0,ff772db46e84a8229b30da8226c3ba3ad9fc7920b08b4af19acab47bd1c2d2d6,2025-02-05T18:15:31.580000
|
||||
CVE-2025-23413,0,0,0d307b1166a05846ecd25a2b94e745105afb47dc17ea7dedca05f511b414c7de,2025-02-05T18:15:31.930000
|
||||
@ -281323,3 +281327,5 @@ CVE-2025-26577,0,0,cc2f8c1ac7aa0d1b35a1f7b5d360e0b2d07e13834785542e837aebe416cbf
|
||||
CVE-2025-26578,0,0,cd72ae9257326f25b0cb5e50eefc8b87bc4caefa625d6784329a0c22f9290202,2025-02-13T14:16:23.990000
|
||||
CVE-2025-26580,0,0,916e7b90eb27b1f7f000689c1c2c0d448ca25a3cef16eef15cec717bb455efdc,2025-02-13T14:16:24.250000
|
||||
CVE-2025-26582,0,0,6e8fe3f3ea1ebd2d8730cc1aef1506305d1a9b31eb701ca7bcc9103287dcd909,2025-02-13T14:16:24.407000
|
||||
CVE-2025-26788,1,1,64332a85fdb9912d1b73ed075990a903c9543c33a30078e66d3be5a1bd8bc2eb,2025-02-14T08:15:31.183000
|
||||
CVE-2025-26789,1,1,b98c32efc76bff07b26dd009ea99782108b024ce84abc7d87c0e368d23f6c39a,2025-02-14T08:15:31.357000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user