Auto-Update: 2025-02-14T09:00:37.747043+00:00

This commit is contained in:
cad-safe-bot 2025-02-14 09:04:04 +00:00
parent 74b52a2358
commit 3f72c90a48
9 changed files with 378 additions and 20 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-11078",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-11T20:15:17.400",
"lastModified": "2024-11-23T01:26:39.680",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-14T07:15:31.900",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument e leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
"value": "A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /register.php. The manipulation of the argument e/role leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-57969",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-14T07:15:32.340",
"lastModified": "2025-02-14T07:15:32.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "app/Model/Attribute.php in MISP before 2.4.198 ignores an ACL during a GUI attribute search."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/MISP/MISP/commit/4f27f83a775aba4d3cca9255f69c3c9998b7df7f",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/MISP/MISP/compare/v2.4.197...v2.4.198",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-9601",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-14T07:15:32.570",
"lastModified": "2025-02-14T07:15:32.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Qubely \u2013 Advanced Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018align\u2019 and 'UniqueID' parameter in all versions up to, and including, 1.8.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/qubely/trunk/core/blocks/postgrid.php#L1419",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3235188/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58387a60-ef68-4911-9349-97b0f7e7726f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-1298",
"sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
"published": "2025-02-14T08:15:30.877",
"lastModified": "2025-02-14T08:15:30.877",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Logic vulnerability in the mobile application (com.transsion.carlcare) may lead to the risk of account takeover."
}
],
"metrics": {},
"weaknesses": [
{
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://security.tecno.com/SRC/blogdetail/383?lang=en_US",
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea"
},
{
"url": "https://security.tecno.com/SRC/securityUpdates",
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-22630",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-14T07:15:32.750",
"lastModified": "2025-02-14T07:15:32.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in MarketingFire Widget Options allows OS Command Injection.This issue affects Widget Options: from n/a through 4.1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/widget-options/vulnerability/wordpress-widget-options-plugin-4-1-0-arbitrary-code-execution-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26788",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-14T08:15:31.183",
"lastModified": "2025-02-14T08:15:31.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "StrongKey FIDO Server before 4.15.1 treats a non-discoverable (namedcredential) flow as a discoverable transaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://docs.strongkey.com/index.php/skfs-v3/skfs-release-notes",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-26789",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-14T08:15:31.357",
"lastModified": "2025-02-14T08:15:31.357",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Logpoint AgentX before 1.5.0. A vulnerability caused by limited access controls allowed li-admin users to access sensitive information about AgentX Manager in a Logpoint deployment."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://servicedesk.logpoint.com/hc/en-us/articles/24749416515741-Unauthorized-information-access-due-to-inadequate-access-controls",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-14T07:00:19.858173+00:00
2025-02-14T09:00:37.747043+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-14T06:15:20.350000+00:00
2025-02-14T08:15:31.357000+00:00
```
### Last Data Feed Release
@ -33,25 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
281324
281330
```
### CVEs added in the last Commit
Recently added CVEs: `6`
- [CVE-2024-13493](CVE-2024/CVE-2024-134xx/CVE-2024-13493.json) (`2025-02-14T06:15:19.740`)
- [CVE-2024-13641](CVE-2024/CVE-2024-136xx/CVE-2024-13641.json) (`2025-02-14T06:15:19.957`)
- [CVE-2024-13692](CVE-2024/CVE-2024-136xx/CVE-2024-13692.json) (`2025-02-14T06:15:20.140`)
- [CVE-2024-2240](CVE-2024/CVE-2024-22xx/CVE-2024-2240.json) (`2025-02-14T05:15:11.550`)
- [CVE-2024-7052](CVE-2024/CVE-2024-70xx/CVE-2024-7052.json) (`2025-02-14T06:15:20.350`)
- [CVE-2025-23406](CVE-2025/CVE-2025-234xx/CVE-2025-23406.json) (`2025-02-14T05:15:12.567`)
- [CVE-2024-57969](CVE-2024/CVE-2024-579xx/CVE-2024-57969.json) (`2025-02-14T07:15:32.340`)
- [CVE-2024-9601](CVE-2024/CVE-2024-96xx/CVE-2024-9601.json) (`2025-02-14T07:15:32.570`)
- [CVE-2025-1298](CVE-2025/CVE-2025-12xx/CVE-2025-1298.json) (`2025-02-14T08:15:30.877`)
- [CVE-2025-22630](CVE-2025/CVE-2025-226xx/CVE-2025-22630.json) (`2025-02-14T07:15:32.750`)
- [CVE-2025-26788](CVE-2025/CVE-2025-267xx/CVE-2025-26788.json) (`2025-02-14T08:15:31.183`)
- [CVE-2025-26789](CVE-2025/CVE-2025-267xx/CVE-2025-26789.json) (`2025-02-14T08:15:31.357`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2024-11078](CVE-2024/CVE-2024-110xx/CVE-2024-11078.json) (`2025-02-14T07:15:31.900`)
## Download and Usage

View File

@ -244414,7 +244414,7 @@ CVE-2024-11074,0,0,9ddd701162e98311d74e0a8bfa122cb1361e573e5cdd3c644d4ea5411ff07
CVE-2024-11075,0,0,1453691218eaa30381e9b896380b7d3816e51e01355ecf6bb51d349da772dacc,2024-11-19T21:57:32.967000
CVE-2024-11076,0,0,82524b74886a82ba09f33edf13fd9a8f5f86e092e9bbf909a4e53028c97856fb,2024-11-14T19:14:26.717000
CVE-2024-11077,0,0,a548949903d5d799c3512cf90a23f879ee8299884e96a824994982a4f1a0ff5f,2024-11-14T18:57:17.743000
CVE-2024-11078,0,0,0bd64d79edb4bca6b6662894de14196529e42eaf34f19ad82faa60601adf2c0a,2024-11-23T01:26:39.680000
CVE-2024-11078,0,1,0920bb7e0657f830205c7e5026e87a05aa8532129d29ae669124476468117fcd,2025-02-14T07:15:31.900000
CVE-2024-11079,0,0,4429678b1338007ef95bc9554c7c9cf15512d4d01927364e7ca6363e4b71338b,2024-12-18T04:15:06.310000
CVE-2024-1108,0,0,41de46f3dcaf9533283bc7e75a781616c5054e3d3c6e5f547b16c496a7c97db1,2025-01-28T02:43:57.227000
CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000
@ -246547,7 +246547,7 @@ CVE-2024-13487,0,0,e42f90a861119fddb567fba0eb7966e50fcc402fe16882839f676096df9b8
CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000
CVE-2024-13490,0,0,61b1110e3ea573589f69702404cb2c4dc6b4f345244280cfa5a3ba73763f2bda,2025-02-12T10:15:11.973000
CVE-2024-13492,0,0,b366a1d0934eccf698617fb1fc1f766d6bf66d42fc2eb6cd7208ba290ff487ca,2025-02-07T16:15:36.123000
CVE-2024-13493,1,1,43f2714c2b78bb494654d68bcc6f4a261a1b9cd5d544969b6af161cdf4b641c6,2025-02-14T06:15:19.740000
CVE-2024-13493,0,0,43f2714c2b78bb494654d68bcc6f4a261a1b9cd5d544969b6af161cdf4b641c6,2025-02-14T06:15:19.740000
CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000
CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000
CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000
@ -246622,7 +246622,7 @@ CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf7
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
CVE-2024-13639,0,0,4407b7ba25a3acfefed293f60c57e90651a998c527d7ca15ce0c95a01e3346ec,2025-02-13T09:15:07.273000
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
CVE-2024-13641,1,1,40196144b6370d50846f27868b94418a681b195f3122e85e15112c8a0d9b0dea,2025-02-14T06:15:19.957000
CVE-2024-13641,0,0,40196144b6370d50846f27868b94418a681b195f3122e85e15112c8a0d9b0dea,2025-02-14T06:15:19.957000
CVE-2024-13642,0,0,e62737ae89b22b0d2ca4d332b68aa19e6175af0f52e0500481826051778e9daf,2025-02-04T16:00:49.540000
CVE-2024-13643,0,0,a38744f20924e820268602d30e3b0d726767a57f9b6238974eea21b5a7b2b1af,2025-02-11T08:15:30.450000
CVE-2024-13644,0,0,11d1ee1072eb0a7c54d807f92bf9d118898d798d047f0051b16a3f45360f7464,2025-02-13T02:15:29.320000
@ -246647,7 +246647,7 @@ CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
CVE-2024-13692,1,1,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000
CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000
CVE-2024-13694,0,0,f76307657ffe1cf961458e88374ab5be6334165284f8bcf86e9ac130fdc702fd,2025-02-04T18:47:41.800000
CVE-2024-13696,0,0,ddda7d8ee3b5db6631ae21ebb6abc15e9b483b8978d4e9a66c9fc1507010682e,2025-01-29T08:15:19.677000
CVE-2024-13698,0,0,ea43a0ffeb82eb62bdf790bb3904a4694fa6ec80884e9d936dc30a8e05897d00,2025-02-07T20:15:27.277000
@ -249450,7 +249450,7 @@ CVE-2024-22396,0,0,a6f86b280685a8077d64ea0c4e6e62471b49d7ff7e81586c6e52ac5aa39b1
CVE-2024-22397,0,0,01399fd328b3875d3cba807f43194ce1c518378bb4f49faacd426911edda9d25,2024-11-21T08:56:11.887000
CVE-2024-22398,0,0,dfd55b15b360ca1655d53463ee39d2e2f8fc335d78f1021104df189fbcc47922,2024-11-21T08:56:12.003000
CVE-2024-22399,0,0,440fe391b5ec2015da468cab093328959c1b38c96ded1c0d9adb3003d7cd4bf8,2024-11-21T08:56:12.200000
CVE-2024-2240,1,1,16a10f4a1ac0ccd76202fef3186f83cb5364c39fd5bd0c984fb5f954401af798,2025-02-14T05:15:11.550000
CVE-2024-2240,0,0,16a10f4a1ac0ccd76202fef3186f83cb5364c39fd5bd0c984fb5f954401af798,2025-02-14T05:15:11.550000
CVE-2024-22400,0,0,5930ebcf2866e03427e30d4762c0c3b8aeae3ff4116c2beec8fd91037b7d32d4,2024-11-21T08:56:12.393000
CVE-2024-22401,0,0,37c4e9c09afc5473d51bfbb7104c0cda826d003022619855b6d7e90cb4694716,2024-11-21T08:56:12.540000
CVE-2024-22402,0,0,645886260abde48d7718fc6c6c2e9b322fc883f67f629caa855db20c63710f23,2024-11-21T08:56:12.680000
@ -274941,6 +274941,7 @@ CVE-2024-57965,0,0,1ec783f88325ed02c1810413dbff411d8a59c49db780f7d0fa48c58005555
CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e1c9,2025-02-09T05:15:32.883000
CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000
CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000
CVE-2024-57969,1,1,b371badd84f84271fd7c4769fff6f836cd92998659f71f251308fa31806e425a,2025-02-14T07:15:32.340000
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000
CVE-2024-5800,0,0,0f1ba4e6921bceda8aa9f69d4954ff1ca271a0069f260f484c22f7b777658fee,2024-08-12T13:41:36.517000
@ -276074,7 +276075,7 @@ CVE-2024-7048,0,0,f97f3592e9a62156744d6e051c2a46f407bbff37b6d74b038dcb4f6ca33e3e
CVE-2024-7049,0,0,3ed1b44b3add6a7b5afeddf885ae26eaf09447a652c502b043770537058cabd9,2024-10-17T14:22:44.653000
CVE-2024-7050,0,0,e7e264104cea78047b76892b2fd1d390f9cbe010098741cea3997c4dcffc5e50,2024-11-21T09:50:48.257000
CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000
CVE-2024-7052,1,1,1f434523bd2abb1a4f04a2bc7ea5914aaf4882e3a35a765c40593bc3b64cfc20,2025-02-14T06:15:20.350000
CVE-2024-7052,0,0,1f434523bd2abb1a4f04a2bc7ea5914aaf4882e3a35a765c40593bc3b64cfc20,2025-02-14T06:15:20.350000
CVE-2024-7054,0,0,dae977ba195c466d627a19bcd62fa740dafe560e6a8fd5014878665bd52d8b35,2024-08-20T15:44:20.567000
CVE-2024-7055,0,0,eda6ef490df5a6117a32915d1ec352603ee024f358dd3007691ca0ac4a1981c5,2024-08-06T16:30:24.547000
CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000
@ -278255,6 +278256,7 @@ CVE-2024-9595,0,0,affe800d4ccb9fbe30c63eaf437475e7b4f1b8f6ed06b3135e5296a266d83c
CVE-2024-9596,0,0,97d2b24b69eeab4b46fc850bb8355e0549024bcd45410c14a3bd69da526dabde,2024-10-16T17:00:19.787000
CVE-2024-9598,0,0,5c0fa148e22055423c63f1a7155091692b712567127d27765647509813b47724,2024-10-25T12:56:07.750000
CVE-2024-9600,0,0,ea15b50099d09f31b8281c72f2e9f7d888450824868eb6eb5785430b8539a997,2024-11-21T18:15:15.853000
CVE-2024-9601,1,1,81b6958d2d5ea875a80fc76ae37785ac7d2772cfdcb27aaa31ffe9273b852d61,2025-02-14T07:15:32.570000
CVE-2024-9602,0,0,97e94b3551b8a143150ba66a2e724dafe158b773cf8b0069e0eeb8d400c5b732,2025-01-02T16:48:01.163000
CVE-2024-9603,0,0,50669f21073ac14122f480035b4c1b46d69ab6d3ffcc460bb7bd86545f71cc92,2025-01-02T16:48:21.323000
CVE-2024-9607,0,0,54c7fa609071a2960fe8514c7e09434070f7928dbf6bf2601a0c6b5966a0c0f2,2024-11-05T17:40:57.777000
@ -279215,6 +279217,7 @@ CVE-2025-1247,0,0,c04092dcf345103badb80fdd95e22fac8a6844256bbf5405f306402957fc9e
CVE-2025-1270,0,0,236281c7e2f02c32874e4e3709dfb4e8e9ebb69fe161a8786e8aa1222fe115b8,2025-02-13T13:15:09.273000
CVE-2025-1271,0,0,5d817e390688ef07b23033305a3d61b54ec7909b543740a3f3f14f0970450461,2025-02-13T13:15:09.433000
CVE-2025-1283,0,0,e0bfe5d939a3d4bf1cd2099051e27f05a10fae661af34307090edba35da62446,2025-02-13T22:15:11.413000
CVE-2025-1298,1,1,c241b07b63fa1a12db4bf2cbddc777a3c460534a51a196b1be44ba87a34980ab,2025-02-14T08:15:30.877000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000
@ -279990,6 +279993,7 @@ CVE-2025-22618,0,0,c19d0c974c1e5e33f6d26b1c1e9e7666054e0a20c6f455c24ab32d4bd2226
CVE-2025-22619,0,0,94078c2e9a44454365aeb387ac2d1c51351bb08f1b9ba4f80444a5076273dcd6,2025-02-13T19:44:19.580000
CVE-2025-22620,0,0,428c7806e74732326369c718351571848c196156b9eb9eb7ffe99ba9002a1b52,2025-01-20T16:15:28.017000
CVE-2025-22621,0,0,6ff4aa50f3e07d892cb8ed858e238d42c832836da0723e6a77be4111c28ff27e,2025-01-15T17:15:20.810000
CVE-2025-22630,1,1,79b3801f8ae7e0fc2c6a6c47d25a128abd9fd0016caa673d59d6e5ab1ad69955,2025-02-14T07:15:32.750000
CVE-2025-22641,0,0,6bee2e22f4c2218c32261d50c3b76051122c36d8b22f1fe821f826f72b0d1ffb,2025-02-04T15:15:19.923000
CVE-2025-22642,0,0,d0279d5449b2366770bc36c2393099b2add7493668b07ac0032c83f0b12bbe59,2025-02-04T15:15:20.120000
CVE-2025-22643,0,0,fd67cfd00b1e33d83319275ceba21fc740b30ef0e3446cfe07e423c7f8efc474,2025-02-04T15:15:20.350000
@ -280276,7 +280280,7 @@ CVE-2025-23369,0,0,3d547a50b40d16b552809387aa654ff4614f9ee138b9c9b23c533e36ce07a
CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000
CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000
CVE-2025-23403,0,0,6d407c3e99373ae4903bfa5d6d7fa08d06d40485486c2ac644fbc1bd23d41148,2025-02-11T11:15:16.420000
CVE-2025-23406,1,1,0697e08c7f212b286b17523f0a64ed0d5e5826076f22b9355dfd8ce23e8d359b,2025-02-14T05:15:12.567000
CVE-2025-23406,0,0,0697e08c7f212b286b17523f0a64ed0d5e5826076f22b9355dfd8ce23e8d359b,2025-02-14T05:15:12.567000
CVE-2025-23411,0,0,f1aae55185556b21d8e0c24272337daecb9be6df1974e1404054d93277defe14,2025-02-13T22:15:11.913000
CVE-2025-23412,0,0,ff772db46e84a8229b30da8226c3ba3ad9fc7920b08b4af19acab47bd1c2d2d6,2025-02-05T18:15:31.580000
CVE-2025-23413,0,0,0d307b1166a05846ecd25a2b94e745105afb47dc17ea7dedca05f511b414c7de,2025-02-05T18:15:31.930000
@ -281323,3 +281327,5 @@ CVE-2025-26577,0,0,cc2f8c1ac7aa0d1b35a1f7b5d360e0b2d07e13834785542e837aebe416cbf
CVE-2025-26578,0,0,cd72ae9257326f25b0cb5e50eefc8b87bc4caefa625d6784329a0c22f9290202,2025-02-13T14:16:23.990000
CVE-2025-26580,0,0,916e7b90eb27b1f7f000689c1c2c0d448ca25a3cef16eef15cec717bb455efdc,2025-02-13T14:16:24.250000
CVE-2025-26582,0,0,6e8fe3f3ea1ebd2d8730cc1aef1506305d1a9b31eb701ca7bcc9103287dcd909,2025-02-13T14:16:24.407000
CVE-2025-26788,1,1,64332a85fdb9912d1b73ed075990a903c9543c33a30078e66d3be5a1bd8bc2eb,2025-02-14T08:15:31.183000
CVE-2025-26789,1,1,b98c32efc76bff07b26dd009ea99782108b024ce84abc7d87c0e368d23f6c39a,2025-02-14T08:15:31.357000

Can't render this file because it is too large.