mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2025-02-19T11:01:42.746148+00:00
This commit is contained in:
parent
313d9165c2
commit
64412cd47a
72
CVE-2024/CVE-2024-132xx/CVE-2024-13231.json
Normal file
72
CVE-2024/CVE-2024-132xx/CVE-2024-13231.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-13231",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-19T09:15:08.930",
|
||||
"lastModified": "2025-02-19T09:15:08.930",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WordPress Portfolio Builder \u2013 Portfolio Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'add_video' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to add arbitrary videos to any portfolio gallery."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/tags/1.1.7/src/Admin.php#L14",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/tags/1.1.7/src/Admin.php#L149",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/tags/1.1.7/src/Admin.php#L76",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/tags/1.1.7/src/Admin.php#L86",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/28d9ab98-c1ab-45ee-a371-6598a8347b10?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-133xx/CVE-2024-13336.json
Normal file
60
CVE-2024/CVE-2024-133xx/CVE-2024-13336.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13336",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-19T09:15:09.083",
|
||||
"lastModified": "2025-02-19T09:15:09.083",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Disable Auto Updates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'disable-auto-updates' page. This makes it possible for unauthenticated attackers to disable all auto updates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/disable-auto-updates/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/60413b3b-f9b0-40ca-af0a-f7cf87ab793a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-133xx/CVE-2024-13339.json
Normal file
60
CVE-2024/CVE-2024-133xx/CVE-2024-13339.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13339",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-19T09:15:09.240",
|
||||
"lastModified": "2025-02-19T09:15:09.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The DeBounce Email Validator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.6.6. This is due to missing or incorrect nonce validation on the 'debounce_email_validator' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/debounce-io-email-validator/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9121ab04-d16b-468b-880f-8f00bcec6489?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-133xx/CVE-2024-13363.json
Normal file
64
CVE-2024/CVE-2024-133xx/CVE-2024-13363.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-13363",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-19T09:15:09.390",
|
||||
"lastModified": "2025-02-19T09:15:09.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Raptive Ads plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'poc' parameter in all versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/adthrive-ads/trunk/components/static-files/partials/eyereturn",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/adthrive-ads/trunk/components/static-files/partials/eyereturn/eyereturn.html",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3d535b3-ad52-4322-988e-7d560dbfe3a3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-133xx/CVE-2024-13364.json
Normal file
60
CVE-2024/CVE-2024-133xx/CVE-2024-13364.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13364",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-19T09:15:09.547",
|
||||
"lastModified": "2025-02-19T09:15:09.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Raptive Ads plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the site_ads_files_reset() and cls_file_reset() functions in all versions up to, and including, 3.6.3. This makes it possible for unauthenticated attackers to reset the ad and cls files."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/adthrive-ads/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7a08d857-c8be-4ba8-b9fb-eed222a8cd8c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-134xx/CVE-2024-13489.json
Normal file
60
CVE-2024/CVE-2024-134xx/CVE-2024-13489.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13489",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-19T10:15:08.870",
|
||||
"lastModified": "2025-02-19T10:15:08.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LTL Freight Quotes \u2013 Old Dominion Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 4.2.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3242160%40ltl-freight-quotes-odfl-edition&new=3242160%40ltl-freight-quotes-odfl-edition&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3c7d63fc-288b-4f2f-85cd-e94add07a536?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-56000",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-02-18T20:15:22.367",
|
||||
"lastModified": "2025-02-18T20:15:22.367",
|
||||
"lastModified": "2025-02-19T09:15:09.710",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect Privilege Assignment vulnerability in NotFound K Elements allows Privilege Escalation. This issue affects K Elements: from n/a through n/a."
|
||||
"value": "Incorrect Privilege Assignment vulnerability in SeventhQueen K Elements allows Privilege Escalation.This issue affects K Elements: from n/a before 5.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -48,9 +48,17 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/articles/critical-privilege-escalation-patched-in-kleo-themes-plugin?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/k-elements/vulnerability/wordpress-k-elements-plugin-5-2-0-unauthenticated-account-takeover-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://themeforest.net/item/kleo-pro-community-focused-multipurpose-buddypress-theme/6776630?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-0714",
|
||||
"sourceIdentifier": "a341c0d1-ebf7-493f-a84e-38cf86618674",
|
||||
"published": "2025-02-17T12:15:27.570",
|
||||
"lastModified": "2025-02-17T12:15:27.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T09:15:09.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The vulnerability existed in the password storage of Mobateks MobaXterm below 25.0.\nMobaXTerm uses an initialization vector (IV) that is generated by encrypting null bytes with a derivate of the users master key. As both the master key is static, and AES ECB produces the same output with the same input the IV for AES CFB is always the same.The static IV makes it easier to obtain sensitive information and decrypt data if the data is stored at rest."
|
||||
"value": "The vulnerability exists in the password storage of Mobateks MobaXterm in versions below 25.0. MobaXTerm uses an initialisation vector (IV) consisting only of zero bytes and a master key to encrypt each password individually. In the default configuration, on opening MobaXTerm, the user is prompted for their password. A derivative of the password is used as the master key. As both the master key and the IV are the same for each stored password, the AES CFB ciphertext depends only on the plaintext (the password). The static IV and master key make it easier to obtain sensitive information and to decrypt data when it is stored at rest."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad exist\u00eda en el almacenamiento de contrase\u00f1as de MobaXterm de Mobatek en versiones anteriores a 25.0. MobaXTerm utiliza un vector de inicializaci\u00f3n (IV) que se genera cifrando bytes nulos con un derivado de la clave maestra del usuario. Como la clave maestra es est\u00e1tica y AES ECB produce la misma salida con la misma entrada, el IV para AES CFB es siempre el mismo. El IV est\u00e1tico facilita la obtenci\u00f3n de informaci\u00f3n confidencial y el descifrado de datos si estos se almacenan en reposo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-0981",
|
||||
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"published": "2025-02-18T10:15:10.333",
|
||||
"lastModified": "2025-02-18T10:15:10.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-19T09:15:09.993",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in ChurchCRM\u00a05.13.0 and prior that allows an attacker to hijack a user's session by exploiting a Stored Cross Site Scripting (XSS) vulnerability in the Group Editor page. This allows admin users to inject malicious JavaScript, which captures the session cookie of authenticated users. The cookie can then be sent to an external server, enabling session hijacking. It can also lead to information disclosure, as exposed session cookies can be used to impersonate users and gain unauthorised access to sensitive information."
|
||||
"value": "A vulnerability exists in ChurchCRM\u00a05.13.0 and prior that allows an attacker to hijack a user's session by exploiting a Stored Cross Site Scripting (XSS) vulnerability in the Group Editor page. This allows admin users to inject malicious JavaScript in the description field, which captures the session cookie of authenticated users. The cookie can then be sent to an external server, enabling session hijacking. It can also lead to information disclosure, as exposed session cookies can be used to impersonate users and gain unauthorised access to sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad en ChurchCRM 5.13.0 y antes que permite a un atacante secuestrar una sesi\u00f3n de usuario explotando una vulnerabilidad de Cross Site Scripting (XSS) Almacenado en la p\u00e1gina del editor de grupos. Esto permite a los usuarios administradores inyectar JavaScript malicioso, que captura la cookie de sesi\u00f3n de usuarios autenticados. La cookie se puede enviar a un servidor externo, lo que permite el secuestro de sesi\u00f3n. Tambi\u00e9n puede conducir a la divulgaci\u00f3n de informaci\u00f3n, ya que las cookies de sesi\u00f3n expuestas se pueden usar para hacerse pasar por usuarios y obtener acceso no autorizado a informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
82
CVE-2025/CVE-2025-10xx/CVE-2025-1007.json
Normal file
82
CVE-2025/CVE-2025-10xx/CVE-2025-1007.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-1007",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2025-02-19T09:15:10.117",
|
||||
"lastModified": "2025-02-19T09:15:10.117",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In OpenVSX version v0.9.0 to v0.20.0, the \n/user/namespace/{namespace}/details API allows a user to edit all \nnamespace details, even if the user is not a namespace Owner or \nContributor. The details include: name, description, website, support \nlink and social media links. The same issues existed in \n/user/namespace/{namespace}/details/logo and allowed a user to change \nthe logo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "emo@eclipse.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "emo@eclipse.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-283"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/eclipse/openvsx/security/advisories/GHSA-wc7c-xq2f-qp4h",
|
||||
"source": "emo@eclipse.org"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-10xx/CVE-2025-1024.json
Normal file
78
CVE-2025/CVE-2025-10xx/CVE-2025-1024.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-1024",
|
||||
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"published": "2025-02-19T09:15:10.280",
|
||||
"lastModified": "2025-02-19T09:15:10.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in ChurchCRM 5.13.0\u00a0that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php\u00a0page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookies, perform actions on behalf of an authenticated user, and gain unauthorized access to the application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:L/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:Amber",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "YES",
|
||||
"recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "LOW",
|
||||
"providerUrgency": "AMBER"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/7250",
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-10xx/CVE-2025-1075.json
Normal file
78
CVE-2025/CVE-2025-10xx/CVE-2025-1075.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-1075",
|
||||
"sourceIdentifier": "security@checkmk.com",
|
||||
"published": "2025-02-19T10:15:09.043",
|
||||
"lastModified": "2025-02-19T10:15:09.043",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p27, <2.2.0p40, and 2.1.0p51 (EOL) causes LDAP credentials to be written to Apache error log file accessible to administrators."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security@checkmk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@checkmk.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://checkmk.com/werk/17495",
|
||||
"source": "security@checkmk.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-11xx/CVE-2025-1132.json
Normal file
78
CVE-2025/CVE-2025-11xx/CVE-2025-1132.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-1132",
|
||||
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"published": "2025-02-19T09:15:10.417",
|
||||
"lastModified": "2025-02-19T09:15:10.417",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A time-based blind SQL Injection\u00a0vulnerability exists in the ChurchCRM 5.13.0 and prior\u00a0EditEventAttendees.php\u00a0within the EN_tyid\u00a0parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires Administrator permissions.\u00a0This flaw can potentially allow attackers to delay the response, indicating the presence of an SQL injection vulnerability. While it is a time-based blind injection, it can be exploited to gain insights into the underlying database, and with further exploitation, sensitive data could be retrieved."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "YES",
|
||||
"recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "HIGH",
|
||||
"providerUrgency": "RED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/7251",
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-11xx/CVE-2025-1133.json
Normal file
78
CVE-2025/CVE-2025-11xx/CVE-2025-1133.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-1133",
|
||||
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"published": "2025-02-19T09:15:10.550",
|
||||
"lastModified": "2025-02-19T09:15:10.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in ChurchCRM 5.13.0 and prior\u00a0that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection\u00a0vulnerability in the EditEventAttendees\u00a0functionality. The EID\u00a0parameter is directly concatenated into an SQL query without proper sanitization, making it susceptible to SQL injection attacks. An attacker can manipulate the query, potentially leading to data exfiltration, modification, or deletion.\u00a0 Please note that this vulnerability requires Administrator privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "YES",
|
||||
"recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "HIGH",
|
||||
"providerUrgency": "RED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/7252",
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-11xx/CVE-2025-1134.json
Normal file
78
CVE-2025/CVE-2025-11xx/CVE-2025-1134.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-1134",
|
||||
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"published": "2025-02-19T09:15:10.687",
|
||||
"lastModified": "2025-02-19T09:15:10.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in ChurchCRM\u00a05.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection\u00a0vulnerability in the DonatedItemEditor\u00a0functionality. The CurrentFundraiser\u00a0parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note that this vulnerability requires Administrator privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "YES",
|
||||
"recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "HIGH",
|
||||
"providerUrgency": "RED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/7253",
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-11xx/CVE-2025-1135.json
Normal file
78
CVE-2025/CVE-2025-11xx/CVE-2025-1135.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-1135",
|
||||
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"published": "2025-02-19T09:15:10.823",
|
||||
"lastModified": "2025-02-19T09:15:10.823",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in ChurchCRM\u00a05.13.0. and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection\u00a0vulnerability in the BatchWinnerEntry\u00a0functionality. The CurrentFundraiser\u00a0parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion.\u00a0Please note the vulnerability requires Administrator privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "YES",
|
||||
"recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "HIGH",
|
||||
"providerUrgency": "RED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/7254",
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
|
||||
}
|
||||
]
|
||||
}
|
51
README.md
51
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-19T09:00:29.131843+00:00
|
||||
2025-02-19T11:01:42.746148+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-19T08:15:21.853000+00:00
|
||||
2025-02-19T10:15:09.043000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,44 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
281767
|
||||
281780
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `26`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
- [CVE-2024-11753](CVE-2024/CVE-2024-117xx/CVE-2024-11753.json) (`2025-02-19T08:15:12.593`)
|
||||
- [CVE-2024-11778](CVE-2024/CVE-2024-117xx/CVE-2024-11778.json) (`2025-02-19T08:15:13.027`)
|
||||
- [CVE-2024-12069](CVE-2024/CVE-2024-120xx/CVE-2024-12069.json) (`2025-02-19T08:15:13.470`)
|
||||
- [CVE-2024-12339](CVE-2024/CVE-2024-123xx/CVE-2024-12339.json) (`2025-02-19T08:15:13.907`)
|
||||
- [CVE-2024-12522](CVE-2024/CVE-2024-125xx/CVE-2024-12522.json) (`2025-02-19T08:15:14.323`)
|
||||
- [CVE-2024-13390](CVE-2024/CVE-2024-133xx/CVE-2024-13390.json) (`2025-02-19T08:15:14.743`)
|
||||
- [CVE-2024-13405](CVE-2024/CVE-2024-134xx/CVE-2024-13405.json) (`2025-02-19T08:15:15.167`)
|
||||
- [CVE-2024-13462](CVE-2024/CVE-2024-134xx/CVE-2024-13462.json) (`2025-02-19T08:15:15.620`)
|
||||
- [CVE-2024-13468](CVE-2024/CVE-2024-134xx/CVE-2024-13468.json) (`2025-02-19T08:15:16.027`)
|
||||
- [CVE-2024-13589](CVE-2024/CVE-2024-135xx/CVE-2024-13589.json) (`2025-02-19T08:15:16.453`)
|
||||
- [CVE-2024-13591](CVE-2024/CVE-2024-135xx/CVE-2024-13591.json) (`2025-02-19T08:15:16.863`)
|
||||
- [CVE-2024-13592](CVE-2024/CVE-2024-135xx/CVE-2024-13592.json) (`2025-02-19T08:15:17.233`)
|
||||
- [CVE-2024-13657](CVE-2024/CVE-2024-136xx/CVE-2024-13657.json) (`2025-02-19T08:15:17.620`)
|
||||
- [CVE-2024-13660](CVE-2024/CVE-2024-136xx/CVE-2024-13660.json) (`2025-02-19T08:15:18.013`)
|
||||
- [CVE-2024-13663](CVE-2024/CVE-2024-136xx/CVE-2024-13663.json) (`2025-02-19T08:15:18.433`)
|
||||
- [CVE-2024-13674](CVE-2024/CVE-2024-136xx/CVE-2024-13674.json) (`2025-02-19T08:15:18.823`)
|
||||
- [CVE-2024-13676](CVE-2024/CVE-2024-136xx/CVE-2024-13676.json) (`2025-02-19T08:15:19.190`)
|
||||
- [CVE-2024-13679](CVE-2024/CVE-2024-136xx/CVE-2024-13679.json) (`2025-02-19T08:15:19.623`)
|
||||
- [CVE-2024-13711](CVE-2024/CVE-2024-137xx/CVE-2024-13711.json) (`2025-02-19T08:15:20.007`)
|
||||
- [CVE-2024-13712](CVE-2024/CVE-2024-137xx/CVE-2024-13712.json) (`2025-02-19T08:15:20.380`)
|
||||
- [CVE-2024-13719](CVE-2024/CVE-2024-137xx/CVE-2024-13719.json) (`2025-02-19T08:15:20.737`)
|
||||
- [CVE-2024-13736](CVE-2024/CVE-2024-137xx/CVE-2024-13736.json) (`2025-02-19T08:15:21.077`)
|
||||
- [CVE-2024-13854](CVE-2024/CVE-2024-138xx/CVE-2024-13854.json) (`2025-02-19T08:15:21.440`)
|
||||
- [CVE-2025-0633](CVE-2025/CVE-2025-06xx/CVE-2025-0633.json) (`2025-02-19T07:15:33.537`)
|
||||
- [CVE-2025-0865](CVE-2025/CVE-2025-08xx/CVE-2025-0865.json) (`2025-02-19T08:15:21.853`)
|
||||
- [CVE-2024-13231](CVE-2024/CVE-2024-132xx/CVE-2024-13231.json) (`2025-02-19T09:15:08.930`)
|
||||
- [CVE-2024-13336](CVE-2024/CVE-2024-133xx/CVE-2024-13336.json) (`2025-02-19T09:15:09.083`)
|
||||
- [CVE-2024-13339](CVE-2024/CVE-2024-133xx/CVE-2024-13339.json) (`2025-02-19T09:15:09.240`)
|
||||
- [CVE-2024-13363](CVE-2024/CVE-2024-133xx/CVE-2024-13363.json) (`2025-02-19T09:15:09.390`)
|
||||
- [CVE-2024-13364](CVE-2024/CVE-2024-133xx/CVE-2024-13364.json) (`2025-02-19T09:15:09.547`)
|
||||
- [CVE-2024-13489](CVE-2024/CVE-2024-134xx/CVE-2024-13489.json) (`2025-02-19T10:15:08.870`)
|
||||
- [CVE-2025-1007](CVE-2025/CVE-2025-10xx/CVE-2025-1007.json) (`2025-02-19T09:15:10.117`)
|
||||
- [CVE-2025-1024](CVE-2025/CVE-2025-10xx/CVE-2025-1024.json) (`2025-02-19T09:15:10.280`)
|
||||
- [CVE-2025-1075](CVE-2025/CVE-2025-10xx/CVE-2025-1075.json) (`2025-02-19T10:15:09.043`)
|
||||
- [CVE-2025-1132](CVE-2025/CVE-2025-11xx/CVE-2025-1132.json) (`2025-02-19T09:15:10.417`)
|
||||
- [CVE-2025-1133](CVE-2025/CVE-2025-11xx/CVE-2025-1133.json) (`2025-02-19T09:15:10.550`)
|
||||
- [CVE-2025-1134](CVE-2025/CVE-2025-11xx/CVE-2025-1134.json) (`2025-02-19T09:15:10.687`)
|
||||
- [CVE-2025-1135](CVE-2025/CVE-2025-11xx/CVE-2025-1135.json) (`2025-02-19T09:15:10.823`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
- [CVE-2024-56000](CVE-2024/CVE-2024-560xx/CVE-2024-56000.json) (`2025-02-19T09:15:09.710`)
|
||||
- [CVE-2025-0714](CVE-2025/CVE-2025-07xx/CVE-2025-0714.json) (`2025-02-19T09:15:09.863`)
|
||||
- [CVE-2025-0981](CVE-2025/CVE-2025-09xx/CVE-2025-0981.json) (`2025-02-19T09:15:09.993`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
71
_state.csv
71
_state.csv
@ -244650,7 +244650,7 @@ CVE-2024-11331,0,0,687d03f55922d90d247fc3f94ca3f96e9c39bed85fd707b3c5cab0e8ddca9
|
||||
CVE-2024-11332,0,0,36669df4e93715465b64ec1799e55f470058053e193a811269619d8d50b4e0c9,2024-11-23T05:15:06.520000
|
||||
CVE-2024-11333,0,0,00c71a7929b275d875b9539b6f0a2f4cc66b516eced93f3c2cfad9bb181a4a5b,2024-11-28T09:15:04.170000
|
||||
CVE-2024-11334,0,0,f7fc893b8a37cca506fd20fe68edd8509ed855f99666ff9db346702f3632cf66,2024-11-26T17:33:49.477000
|
||||
CVE-2024-11335,1,1,c9a537eb5a65cbbf5d82aa6246b658830e47a60579bc2ab61bbd4bb743696d93,2025-02-19T08:15:10.870000
|
||||
CVE-2024-11335,0,0,c9a537eb5a65cbbf5d82aa6246b658830e47a60579bc2ab61bbd4bb743696d93,2025-02-19T08:15:10.870000
|
||||
CVE-2024-11336,0,0,f6d676d5a427fada73f852223dfd1f8d78278266b2c8c37478ab18b05a16f6ad,2024-12-06T09:15:06.323000
|
||||
CVE-2024-11337,0,0,b01b2d91cb611a25f6f6c6a23755d6fd83423220b4845fa1731e3136f57cb3af,2025-01-07T05:15:11.320000
|
||||
CVE-2024-11338,0,0,16b8e4df470f18ecee94a466e04ad75959cffb7412dbd289584a85008e652ba5,2025-01-07T05:15:11.520000
|
||||
@ -245065,7 +245065,7 @@ CVE-2024-1175,0,0,f997875411f4ee3836569f05e6ded063f5984d7986ed98f909a5423e1a302c
|
||||
CVE-2024-11750,0,0,7ad8eba5e612b45089b0006a10c8f5004dc37025f0797564ad303213ba0cd10f,2024-12-12T05:15:09.577000
|
||||
CVE-2024-11751,0,0,cbc44290cddf15ae35c92a8e4b75351046563158eb1fedf91f48e5c8b200a32b,2024-12-14T05:15:06.923000
|
||||
CVE-2024-11752,0,0,c48a168f2b3a172a5086d93afa4f6d610d49141a00f07210bee49dcaa523a5b5,2024-12-14T06:15:19.210000
|
||||
CVE-2024-11753,1,1,56d8aa7869baf0adff365edb20566cdfdd96fa8e09d061e53bdef58fa211c9c4,2025-02-19T08:15:12.593000
|
||||
CVE-2024-11753,0,0,56d8aa7869baf0adff365edb20566cdfdd96fa8e09d061e53bdef58fa211c9c4,2025-02-19T08:15:12.593000
|
||||
CVE-2024-11754,0,0,115157a8a0f024c3ba84de7edd359cbde1e25041eace45096f12b0e339d7e447,2024-12-13T09:15:05.630000
|
||||
CVE-2024-11755,0,0,c883abaefa6170cee64d3b62a0d846726e75234488258495594582792094520e,2024-12-14T05:15:07.100000
|
||||
CVE-2024-11756,0,0,1b15032d5138c63a9bc74c14a17064d85dfaaa7feb6ae78db162c60925186a36,2025-01-07T06:15:14.943000
|
||||
@ -245091,7 +245091,7 @@ CVE-2024-11774,0,0,2f351d61aa038a49c773ab74e882e8cd2203f9cf3f3df13c0faa462f8ee3a
|
||||
CVE-2024-11775,0,0,0be2b5775aa12c2634dedea0534264de5c8544551afcfc7760cb6a86958e9dd8,2024-12-20T07:15:10.597000
|
||||
CVE-2024-11776,0,0,db96a767ae984aa946e97339afd57034a67d2d93961a6fe48dad1a311ebfe8b3,2024-12-20T03:15:06.420000
|
||||
CVE-2024-11777,0,0,e460b779a976f9c561c46b6e58a92b7a7419f3751a2cd77a73598001765e2023,2025-01-07T04:15:07.200000
|
||||
CVE-2024-11778,1,1,8e00158d62d41b7afea6cce05c05c100d3a15f9d8feede829c202a96b984c9f0,2025-02-19T08:15:13.027000
|
||||
CVE-2024-11778,0,0,8e00158d62d41b7afea6cce05c05c100d3a15f9d8feede829c202a96b984c9f0,2025-02-19T08:15:13.027000
|
||||
CVE-2024-11779,0,0,66ab9533cf27509ff85b54c7dc6f857efc44402b9c1a2b7fc4f1c1fbd8a0b4e7,2024-12-05T10:31:39.980000
|
||||
CVE-2024-1178,0,0,8ab0a2a01e80408842a29a813ae0f71a9342bc7b3eeef6127c8bbe6845a6d705,2025-01-08T17:16:27.800000
|
||||
CVE-2024-11780,0,0,c6444630583b2209a32c825c71dee702f00b48010f91cb4fad7b61435fdcfa0e,2025-02-01T04:15:29.523000
|
||||
@ -245359,7 +245359,7 @@ CVE-2024-12062,0,0,72735736917491b453ec9a8b66f16471859e8308b17c93b657198e604c611
|
||||
CVE-2024-12064,0,0,5bbffd5016c2c66c65f1cad07469a2c9304ddde32e6765225186e453c653a401,2024-12-05T22:15:20.080000
|
||||
CVE-2024-12066,0,0,b8b74ff74daf8006195a72a7866cbbcaf66d537ba02c482e9dfaf1c6e82963a9,2024-12-21T07:15:08.907000
|
||||
CVE-2024-12067,0,0,1e92db34fdb6070fa741c6f0fc31b2e9eacb1c54540470e816605dc679b61bb9,2025-01-09T11:15:11.647000
|
||||
CVE-2024-12069,1,1,f7d8e988d9bd3f09c5fc11f1ebad6e028a23de2908e1ac7dd9b4c68efe76b728,2025-02-19T08:15:13.470000
|
||||
CVE-2024-12069,0,0,f7d8e988d9bd3f09c5fc11f1ebad6e028a23de2908e1ac7dd9b4c68efe76b728,2025-02-19T08:15:13.470000
|
||||
CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af06c,2024-11-21T08:50:02.457000
|
||||
CVE-2024-12071,0,0,7773df08bf117af1ddaaee700084b2910f6a68d7f25642ff336de1e992525428,2025-01-18T04:15:06.690000
|
||||
CVE-2024-12072,0,0,a174c14ab62255e805373ea4d76cdd13bc3d9cbde3ba4a3927979f9e7d419d41,2024-12-12T06:15:23.383000
|
||||
@ -245604,7 +245604,7 @@ CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9
|
||||
CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000
|
||||
CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000
|
||||
CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000
|
||||
CVE-2024-12339,1,1,be52c2d0084e1b737e32b52a9a6a5d871bb4fa98b0d35a295c3be3dad2db1689,2025-02-19T08:15:13.907000
|
||||
CVE-2024-12339,0,0,be52c2d0084e1b737e32b52a9a6a5d871bb4fa98b0d35a295c3be3dad2db1689,2025-02-19T08:15:13.907000
|
||||
CVE-2024-1234,0,0,1d2032d774427adab4981e078c05751946e3432eadc2f7e196ff1cacacccf797,2025-01-23T19:50:50.457000
|
||||
CVE-2024-12340,0,0,e64d9154ce721e0cef963ec962023bf662e8b1885905905ffc386c61964f035d,2024-12-18T10:15:07.827000
|
||||
CVE-2024-12341,0,0,73d0614d7c98b23e49242f0be40422e4e73b095a6a96061a926bb2fee6b56681,2024-12-12T04:15:07.660000
|
||||
@ -245773,7 +245773,7 @@ CVE-2024-12519,0,0,8512ecfe11d3f5f606f5fdf06fefea6ed5c0603f03aafcb3163b8596fbd0b
|
||||
CVE-2024-1252,0,0,d03beb126367df5b21be601ec7e2ecf5f48cece91d0754af14f589827736f3cf,2024-11-21T08:50:09.700000
|
||||
CVE-2024-12520,0,0,886c4e74a7980fda960a92b5a62600949c9fea0564fe68f7b22e9e1786c04bac,2025-01-11T08:15:25.720000
|
||||
CVE-2024-12521,0,0,5ef3982f9bbd97c224cda76723fce3c98e248e5aec737e88bf0802be4e43c585,2025-01-08T04:15:06.827000
|
||||
CVE-2024-12522,1,1,ed1fb5baf064c0028580073ee6b976f9886f98b4d500acd8b695b42a96f92e6f,2025-02-19T08:15:14.323000
|
||||
CVE-2024-12522,0,0,ed1fb5baf064c0028580073ee6b976f9886f98b4d500acd8b695b42a96f92e6f,2025-02-19T08:15:14.323000
|
||||
CVE-2024-12523,0,0,185a41d328f0e130d8ed17ada12f64a855433449910369cbbb025fff8ce0f4d8,2024-12-14T05:15:11.640000
|
||||
CVE-2024-12524,0,0,872d50ee592086b62712ad11fcac01017f02cae2a37a1857d75b736f2a220d93,2025-01-30T11:15:10.840000
|
||||
CVE-2024-12525,0,0,2bed9d9749d6c8ef22bb23af585ca60c77e578bcc12b11b932323186ccb93ede,2025-02-18T05:15:10.813000
|
||||
@ -246366,6 +246366,7 @@ CVE-2024-13227,0,0,f396acd62ff517fde269ff6e013e5c0bee9fbdf4ae486ca2fb2f74214892d
|
||||
CVE-2024-13229,0,0,8005008cc5eaf6f49dbd4877e33b66dc904c20bdee3b20c47739bf10cb4a210c,2025-02-13T05:15:13.930000
|
||||
CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000
|
||||
CVE-2024-13230,0,0,77b1ecbf192b34e98ac8a66dc9d4d1a94979c767aa5e8f2b9158ee6752bafedc,2025-01-21T11:15:09.267000
|
||||
CVE-2024-13231,1,1,a0a3c8be09c487da7ac229fd27d81f962d27d05f64eff04a5adbb152439dda3b,2025-02-19T09:15:08.930000
|
||||
CVE-2024-13234,0,0,4c493a769573d261245a83332615004948f6e06f366df55b9e6c3d12849e4b0c,2025-02-04T21:05:33.863000
|
||||
CVE-2024-13236,0,0,64abe32b85dcd45ec9ab991a4d5209e0313b6971aeb9b551d0d126d46b2b126d,2025-01-31T16:03:09.630000
|
||||
CVE-2024-13237,0,0,757f6068109954aeb708ce365b1ff5e5adf5204baad7d55d37a565a85d7816ad,2025-01-09T21:15:24.977000
|
||||
@ -246471,6 +246472,8 @@ CVE-2024-13332,0,0,dac8734d921a69995688399552e86863e8f706d7756f9f6bda00d7ba7dffb
|
||||
CVE-2024-13333,0,0,413ea7e4b64b8aef5dd8714980de1abedc1d4af046b4d782740c89a880443e55,2025-01-17T06:15:15.663000
|
||||
CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655747,2025-01-15T04:15:19.720000
|
||||
CVE-2024-13335,0,0,20c8c7696547a710a7247fc1375c3fab2f06247460845b286129a3d00d1d053e,2025-02-05T01:37:46.517000
|
||||
CVE-2024-13336,1,1,bb991eddb9d6dca57629f03b2496d9ddcd626f1b8283912d91a624feb94fc82a,2025-02-19T09:15:09.083000
|
||||
CVE-2024-13339,1,1,ec5a27af237e49842908b435dbfc33b6109d676dd112fee42b660f932b06c304,2025-02-19T09:15:09.240000
|
||||
CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000
|
||||
CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000
|
||||
CVE-2024-13341,0,0,d1044f531e9718ed5ff21a517ae457f54f64b706f2e309176203ab8df13f04c9,2025-02-01T07:15:07.900000
|
||||
@ -246489,6 +246492,8 @@ CVE-2024-13356,0,0,4c62ebf770eb8ffd31345cb0ef6c5025a9e134a147f2b545dcf049e579341
|
||||
CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000
|
||||
CVE-2024-13360,0,0,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000
|
||||
CVE-2024-13361,0,0,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000
|
||||
CVE-2024-13363,1,1,d21488ec7f458338ccd20de07e20eba3496f9cd581ddf0ac36e8680afdaaa6e4,2025-02-19T09:15:09.390000
|
||||
CVE-2024-13364,1,1,e8c23a5a2067b6574dada082a7e9e7683f39c89e5e5291058031d74b9c8fe13c,2025-02-19T09:15:09.547000
|
||||
CVE-2024-13365,0,0,d4c9fb3b4eb02bb797a58b6d290aa4b0d82f091aa00e734ed2f15824907289b9,2025-02-18T18:15:18.303000
|
||||
CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000
|
||||
CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000
|
||||
@ -246509,7 +246514,7 @@ CVE-2024-13386,0,0,6ff136adf169af3d89231135a7ce4b15faa5760d31440cb4c68dca430369b
|
||||
CVE-2024-13387,0,0,4fa5b6a4b1e6e7fbc2f3075a5d8980b29e2968b35b02e0f8e5098804434c72ad,2025-01-16T10:15:09.103000
|
||||
CVE-2024-13389,0,0,d3a247569299e0cec1414509995cd3f6c342ffef8797b534d3731670cf5721e8,2025-01-31T15:59:43.907000
|
||||
CVE-2024-1339,0,0,a64c4c68c8a9a926adb37b05ad26ad3fdfdc4a14ba534fc12b29b0c3bcb239b6,2024-12-31T16:52:24.407000
|
||||
CVE-2024-13390,1,1,e705fb41e6b9b2a446429c2afaf7228aa6c9783c5c2b2e53f9b8f7c3b1540c75,2025-02-19T08:15:14.743000
|
||||
CVE-2024-13390,0,0,e705fb41e6b9b2a446429c2afaf7228aa6c9783c5c2b2e53f9b8f7c3b1540c75,2025-02-19T08:15:14.743000
|
||||
CVE-2024-13391,0,0,4ddc50634aa74744390d79b0906c8f88dd9a00cc29aaa55a9724acf7a1d0640c,2025-01-18T07:15:08.637000
|
||||
CVE-2024-13392,0,0,a78e961d1cefdda1764b180676e0657379c1e1a7ef9b8f0223e522e6fb2917ca,2025-01-18T08:15:24.327000
|
||||
CVE-2024-13393,0,0,6c538726beb67e787d4cc0c97ae28498348fafb8453c26bd442a25ec75fb47c0,2025-01-18T07:15:08.810000
|
||||
@ -246524,7 +246529,7 @@ CVE-2024-13400,0,0,a0da00543409991e4d6711b443cdf6fcdbfddf916acf7563da4678bdf041b
|
||||
CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509538,2025-01-17T05:15:09.077000
|
||||
CVE-2024-13403,0,0,f48009abe82bf9e29ae1b7a46417bc2967746c0b5702def33976d86176d1ffc8,2025-02-04T09:15:09.303000
|
||||
CVE-2024-13404,0,0,c306a147bdbb783a3f22c9c4f49bd90e70cf49c0fec041c52ab9283c517d7448,2025-01-31T20:18:46.230000
|
||||
CVE-2024-13405,1,1,8500742a3a71a92155698ea107ad646961d23eca5b705f80a37a996fb2e10f63,2025-02-19T08:15:15.167000
|
||||
CVE-2024-13405,0,0,8500742a3a71a92155698ea107ad646961d23eca5b705f80a37a996fb2e10f63,2025-02-19T08:15:15.167000
|
||||
CVE-2024-13406,0,0,3a9e7471bf5857762896fdd475ef755ed514b70430254f571b98831752a93703,2025-01-24T21:20:06.183000
|
||||
CVE-2024-13408,0,0,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332fd0,2025-02-05T01:37:13.827000
|
||||
CVE-2024-13409,0,0,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000
|
||||
@ -246566,13 +246571,13 @@ CVE-2024-13458,0,0,b0c82b9a6a2ae8ab3e75191e77bf09ecd6761e542d7fe4c0d50e106a0dd34
|
||||
CVE-2024-13459,0,0,a9fe845bd277299369bc3f6cedb4f513e577d0a95806c4e189fd9614c9d6fa2e,2025-02-18T19:11:47.197000
|
||||
CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000
|
||||
CVE-2024-13460,0,0,9c101ce4e9a0b77c24ea9727b59b3a3bfa4cbf94a343064a0ab69a083a2820cf,2025-01-31T18:07:24.277000
|
||||
CVE-2024-13462,1,1,bd808375ae18220a9dd6d9ebbed45c53c83edb8ab02aeb633cd1274f400f3576,2025-02-19T08:15:15.620000
|
||||
CVE-2024-13462,0,0,bd808375ae18220a9dd6d9ebbed45c53c83edb8ab02aeb633cd1274f400f3576,2025-02-19T08:15:15.620000
|
||||
CVE-2024-13463,0,0,a74bd740de3fc458ef5c03de3331d5acaeffdc8e1dd114982c1f405dca936e7c,2025-01-31T04:15:07.497000
|
||||
CVE-2024-13464,0,0,c7ce95854847c11fde5a1ddc21e150442b9e815758c964241dcc7c0eae02ec39,2025-02-18T05:15:11.673000
|
||||
CVE-2024-13465,0,0,302d64000d9a85e10d940c0dfda219f6bc435a7608c762c13e680b4ba83050b8,2025-02-18T08:15:09.490000
|
||||
CVE-2024-13466,0,0,ad9c9053e3167555f400e28f8c129f78ebaefbfea867abbbb84a69e9c4118ca4,2025-02-18T19:15:13.923000
|
||||
CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000
|
||||
CVE-2024-13468,1,1,f5287d148e3a11717ac8973e6248eb65dafac48689ef1e2f6acd92e99c685cd5,2025-02-19T08:15:16.027000
|
||||
CVE-2024-13468,0,0,f5287d148e3a11717ac8973e6248eb65dafac48689ef1e2f6acd92e99c685cd5,2025-02-19T08:15:16.027000
|
||||
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
|
||||
CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000
|
||||
CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000
|
||||
@ -246584,6 +246589,7 @@ CVE-2024-13480,0,0,321567d1345fefc0890e4d3a03a4c0335890e5df8d4b67eb97bbb9ba1c937
|
||||
CVE-2024-13484,0,0,4fd55912c77d8dadbebe472ff2c71e4e3fb03970b04450aedc08c21b110060a9,2025-02-12T17:15:23.177000
|
||||
CVE-2024-13487,0,0,8a4e4265754362ec1c9263cf9e3081850883bf6400106e8f9bffb81274d80844,2025-02-18T19:15:14.073000
|
||||
CVE-2024-13488,0,0,4b8066bce6198329d93f932502dadbbf2e639dfefb1f2df4c60df4f085c6e1e4,2025-02-15T12:15:30.457000
|
||||
CVE-2024-13489,1,1,d540270a20044e19f885eb9c1b6edeac3dc59f7c6064bf65855c9960dc59957b,2025-02-19T10:15:08.870000
|
||||
CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000
|
||||
CVE-2024-13490,0,0,261a201adcbc7bc2dbe4303b4c424a3f72ae3e81ef333b356e5b443e47516d97,2025-02-12T10:15:11.973000
|
||||
CVE-2024-13492,0,0,e986e613e4183bc9c7afb601a232e5681edf1984e4b97b5e25f6a769df2e2a60,2025-02-07T16:15:36.123000
|
||||
@ -246667,11 +246673,11 @@ CVE-2024-13584,0,0,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f
|
||||
CVE-2024-13586,0,0,031371a39e86dab11794d85bebc5761cfd2812bcdc21ab474a79e1589e56730a,2025-02-04T18:14:20.930000
|
||||
CVE-2024-13587,0,0,720c8e9f332be08c97824f7294ce236301b592a585cd761de003bc321877436a,2025-02-18T05:15:16.267000
|
||||
CVE-2024-13588,0,0,ff7590ea531a386de3592f06b0d190afe6e1a5e182fc0c9290b6473914c2c325,2025-02-18T05:15:16.417000
|
||||
CVE-2024-13589,1,1,8634e98206d01df693d56e69e48e93eb7f9edba40831365b0c5fb968bd98fabf,2025-02-19T08:15:16.453000
|
||||
CVE-2024-13589,0,0,8634e98206d01df693d56e69e48e93eb7f9edba40831365b0c5fb968bd98fabf,2025-02-19T08:15:16.453000
|
||||
CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000
|
||||
CVE-2024-13590,0,0,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000
|
||||
CVE-2024-13591,1,1,059c4cbd8eede965314c9395245280bcce16ff543735609c2d21c27a3fd9b898,2025-02-19T08:15:16.863000
|
||||
CVE-2024-13592,1,1,c09356b512438608a2e6306845fe8a94f1bd10d08c5c60fe45a11194fb74a4b0,2025-02-19T08:15:17.233000
|
||||
CVE-2024-13591,0,0,059c4cbd8eede965314c9395245280bcce16ff543735609c2d21c27a3fd9b898,2025-02-19T08:15:16.863000
|
||||
CVE-2024-13592,0,0,c09356b512438608a2e6306845fe8a94f1bd10d08c5c60fe45a11194fb74a4b0,2025-02-19T08:15:17.233000
|
||||
CVE-2024-13593,0,0,fa3fece164aaf9e5bdce4149920be38daaf35514256e02e0d8ee1f95b69ca49c,2025-02-04T21:08:45.723000
|
||||
CVE-2024-13594,0,0,e40694f60357c551d50cfd64c32b62fc5a068d57b870210e0ac9e99e736df254,2025-02-05T17:01:24.577000
|
||||
CVE-2024-13595,0,0,857054eef2128780cfc93b39c44c7c6d11a927de9b29d4814b8b4c364f2d10c0,2025-02-18T05:15:16.710000
|
||||
@ -246709,24 +246715,24 @@ CVE-2024-13652,0,0,ed8d8236d1a3115f336400cbdd4ac56e250a414778c3b1c32835210395f1f
|
||||
CVE-2024-13653,0,0,770f4a34ec62861070a9f7aec2b86de3f221ce9b95996de0b65265b14bc1c12d,2025-02-12T05:15:11.820000
|
||||
CVE-2024-13654,0,0,2a35a17fe264f64bb6af7c966578a0e3f22643a1d92580b28b17070dab12d401,2025-02-12T05:15:11.987000
|
||||
CVE-2024-13656,0,0,0b9d444c7c97e411e4ea27cc87641e7cb92ad285f00faceee8008c4cb10f50a1,2025-02-12T05:15:12.143000
|
||||
CVE-2024-13657,1,1,60a44e2d645da9e47eb235800bc9c18bced979a00904293529414d276150722a,2025-02-19T08:15:17.620000
|
||||
CVE-2024-13657,0,0,60a44e2d645da9e47eb235800bc9c18bced979a00904293529414d276150722a,2025-02-19T08:15:17.620000
|
||||
CVE-2024-13658,0,0,d03a5dca2864c8417f9018e7bf90bf0489d89a07c14724289f58406d6fa3a508,2025-02-12T05:15:12.320000
|
||||
CVE-2024-13659,0,0,dbe630e285c8f72dabbec8cebaf54bef8da7c792e6b5f98321e2c39fc417940f,2025-02-05T17:40:49.037000
|
||||
CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000
|
||||
CVE-2024-13660,1,1,a49d9476a5008e62d51a6b2a832dfe61828f91b18b4b8cde7e3993179e3b9e04,2025-02-19T08:15:18.013000
|
||||
CVE-2024-13660,0,0,a49d9476a5008e62d51a6b2a832dfe61828f91b18b4b8cde7e3993179e3b9e04,2025-02-19T08:15:18.013000
|
||||
CVE-2024-13661,0,0,3be24e05b81fe01b8fbf6ee3a938c303c059e6983fd80a8d451cf6089d020b33,2025-01-31T18:08:05.420000
|
||||
CVE-2024-13662,0,0,8eed535a30180a19d960f2273d8a6d88ed11a0c316177a8c8d801e83b1bee14c,2025-02-18T19:15:14.220000
|
||||
CVE-2024-13663,1,1,4afc7501b59f2c8209bf8490c661f82ac8f691d34758c934a3e9bd65364ca6cd,2025-02-19T08:15:18.433000
|
||||
CVE-2024-13663,0,0,4afc7501b59f2c8209bf8490c661f82ac8f691d34758c934a3e9bd65364ca6cd,2025-02-19T08:15:18.433000
|
||||
CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000
|
||||
CVE-2024-13665,0,0,18a0fb900dfdb3589ce932f5ee4cb2705e9546782c74f6ed6faf4400a1ef2d61,2025-02-12T05:15:12.483000
|
||||
CVE-2024-13667,0,0,7a7967e05d1d5b5042b47255b9bffaf2e69713cc939fb41aa3c2d040ad9766d9,2025-02-18T11:15:11.090000
|
||||
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
|
||||
CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000
|
||||
CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693b44,2025-01-31T17:50:24.757000
|
||||
CVE-2024-13674,1,1,ac3642212117e2e4dbcdf6bf845cb1df3b30736364ba81890bc6e7f12c727bf2,2025-02-19T08:15:18.823000
|
||||
CVE-2024-13676,1,1,4f8bf0d44a971fbbb44d738bbf0fff36757bda864393a0685528bb1e1a4d43ad,2025-02-19T08:15:19.190000
|
||||
CVE-2024-13674,0,0,ac3642212117e2e4dbcdf6bf845cb1df3b30736364ba81890bc6e7f12c727bf2,2025-02-19T08:15:18.823000
|
||||
CVE-2024-13676,0,0,4f8bf0d44a971fbbb44d738bbf0fff36757bda864393a0685528bb1e1a4d43ad,2025-02-19T08:15:19.190000
|
||||
CVE-2024-13677,0,0,8c3dbbbad614c82756be5f87314c06d94f2c3bdc57d66eee8a7cfa5797e10d79,2025-02-18T05:15:17.893000
|
||||
CVE-2024-13679,1,1,be4c7776f570cfcb80df59f8e2fc23e16ea058f72d1ce76bfc1747acc3dfaf40,2025-02-19T08:15:19.623000
|
||||
CVE-2024-13679,0,0,be4c7776f570cfcb80df59f8e2fc23e16ea058f72d1ce76bfc1747acc3dfaf40,2025-02-19T08:15:19.623000
|
||||
CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000
|
||||
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
|
||||
CVE-2024-13681,0,0,be24051b53da6911bff00c852db57b208df86bc968babb1536de5487be5312bf,2025-02-18T11:15:11.270000
|
||||
@ -246750,13 +246756,13 @@ CVE-2024-13706,0,0,ab3c260451f5aeaf628499ae0037d8fc16844264bd9ec15ebc42f8eab05dd
|
||||
CVE-2024-13707,0,0,032e2a9cb1b090228bf905c1e52e11efae679d2f0165154d533e21d339074c69,2025-01-31T18:12:42.913000
|
||||
CVE-2024-13709,0,0,89bb0c649902e7b71dd397a2d1262eb45ecb5db3a49c5090d0564ce4341f03af,2025-01-25T04:15:07.670000
|
||||
CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000
|
||||
CVE-2024-13711,1,1,28001e86fb043564d3a2fa90df9b7c35a4ccbdf5b6fc94ce2c871cacc4e4e50c,2025-02-19T08:15:20.007000
|
||||
CVE-2024-13712,1,1,030d96b716f25bafd54e090712c9bb60cc23ce32577681d3cdb6f0bf5f78f893,2025-02-19T08:15:20.380000
|
||||
CVE-2024-13711,0,0,28001e86fb043564d3a2fa90df9b7c35a4ccbdf5b6fc94ce2c871cacc4e4e50c,2025-02-19T08:15:20.007000
|
||||
CVE-2024-13712,0,0,030d96b716f25bafd54e090712c9bb60cc23ce32577681d3cdb6f0bf5f78f893,2025-02-19T08:15:20.380000
|
||||
CVE-2024-13714,0,0,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000
|
||||
CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000
|
||||
CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000
|
||||
CVE-2024-13718,0,0,4d64ea92ba0808da8cfb81955fc62477b7fae6a3deb6523f8005881040f88340,2025-02-18T09:15:09.723000
|
||||
CVE-2024-13719,1,1,96b9dda9a58b9bd7960bc82f0f45bdf70117123abedc9395edc605858d81a5c6,2025-02-19T08:15:20.737000
|
||||
CVE-2024-13719,0,0,96b9dda9a58b9bd7960bc82f0f45bdf70117123abedc9395edc605858d81a5c6,2025-02-19T08:15:20.737000
|
||||
CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000
|
||||
CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd2f2,2025-01-30T18:44:43.053000
|
||||
CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000
|
||||
@ -246768,7 +246774,7 @@ CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef
|
||||
CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000
|
||||
CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df02e1,2025-02-04T10:15:08.527000
|
||||
CVE-2024-13735,0,0,5831f6a512bd98ee3e9e0b41a189da9a28ce9d6efc5226591d1a0439e0759ef9,2025-02-14T10:15:09.207000
|
||||
CVE-2024-13736,1,1,642ff0262a392915ca94c3ffce9d077b9ffae6211006cc282752a825aa5395b6,2025-02-19T08:15:21.077000
|
||||
CVE-2024-13736,0,0,642ff0262a392915ca94c3ffce9d077b9ffae6211006cc282752a825aa5395b6,2025-02-19T08:15:21.077000
|
||||
CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000
|
||||
CVE-2024-13740,0,0,ba6332fba984f0b615db8e6ca888f7060538e8c0e0b28351d9f7958c938b931d,2025-02-18T03:15:10.273000
|
||||
CVE-2024-13741,0,0,175049f3021b19cf7fa751f03fe80f12100c24edbb7e3c159d12f4c96d5eb8a9,2025-02-18T02:15:13.047000
|
||||
@ -246813,7 +246819,7 @@ CVE-2024-13848,0,0,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2c
|
||||
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
|
||||
CVE-2024-13850,0,0,6b9449e6648abb1edf82833d79485652b7d8e214965b03129c424b1f771ff336,2025-02-08T13:15:06.840000
|
||||
CVE-2024-13852,0,0,face120ea95fed62ec099664fadaf77219da01c7521b566ddd6f702b5c620406,2025-02-18T05:15:19.423000
|
||||
CVE-2024-13854,1,1,da76605e45e5cccb1e4ac357ef915fd87a7797a2aa194293a861365173d04915,2025-02-19T08:15:21.440000
|
||||
CVE-2024-13854,0,0,da76605e45e5cccb1e4ac357ef915fd87a7797a2aa194293a861365173d04915,2025-02-19T08:15:21.440000
|
||||
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
|
||||
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
|
||||
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
|
||||
@ -273888,7 +273894,7 @@ CVE-2024-55997,0,0,4ddd75ddbd7e8cba6002090848d5f28f908b98196d746d4696bd512d6e85d
|
||||
CVE-2024-55998,0,0,d76278d3c46a1747090a2639250ffe1cfc4ff55a8d82cdf9add0285b6a55398c,2024-12-16T15:15:26.957000
|
||||
CVE-2024-55999,0,0,55efb565e9f4beedd46b3a3d41fbf23eb559d384546ca63d9e1d7ea34eac926b,2024-12-16T16:15:08.973000
|
||||
CVE-2024-5600,0,0,9ec61c0439dd991245dd59b838c072ef06691da563abf803dab52d51cc92f007,2024-11-21T09:47:59.817000
|
||||
CVE-2024-56000,0,0,98eaf7b7028e66950efacf06a763c8bf6ccd9da787828db0406c6b09b7ab5df1,2025-02-18T20:15:22.367000
|
||||
CVE-2024-56000,0,1,2ee6d1a1730d8d4d1d5f47f7f3465648c21682535137d7a34a45989c97b14df8,2025-02-19T09:15:09.710000
|
||||
CVE-2024-56001,0,0,5139231e1834dfdb01fa94db9cdc4fd99b8a1cdda6840a89cc6d0fd5e49e75db,2024-12-16T15:15:27.090000
|
||||
CVE-2024-56002,0,0,70b793e56112c1d8aad25f7a55707ed0973d44dd20df2cf309c7250f5eece26e,2024-12-31T14:15:24.120000
|
||||
CVE-2024-56003,0,0,00f6c93c049c9977ecf4fe9b8499c83382c15c3e34f2e2e2e82b604ea04338d0,2024-12-16T16:15:09.113000
|
||||
@ -279102,7 +279108,7 @@ CVE-2025-0625,0,0,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06
|
||||
CVE-2025-0626,0,0,0077dccae97439405bab713571a124bd093984b1ee0c361ef3ff1afd6c248462,2025-01-31T17:15:16.323000
|
||||
CVE-2025-0630,0,0,a203846e431374935835f3b6e314fad6940377ee142abf426ce77275aa7cba26,2025-02-04T20:15:49.940000
|
||||
CVE-2025-0631,0,0,a91b2711b77974f80919f9c5b372be80fd124e74c35c8b96965898a857e3e98a,2025-01-28T19:15:14.270000
|
||||
CVE-2025-0633,1,1,cb8a197e6c4c53fc2cbfd67d19d376a8624ac2f322a88243266a770a17e4624b,2025-02-19T07:15:33.537000
|
||||
CVE-2025-0633,0,0,cb8a197e6c4c53fc2cbfd67d19d376a8624ac2f322a88243266a770a17e4624b,2025-02-19T07:15:33.537000
|
||||
CVE-2025-0635,0,0,70c8222d27016e17aff5c1d526075d61ce18278ab51b947a8b84bf01759f271d,2025-01-23T11:15:10.890000
|
||||
CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000
|
||||
CVE-2025-0638,0,0,d2f28f2eed7bea7b9f8ec19bd8fd1769a6b74ef8696049ed8fd676bfab511c4b,2025-01-22T16:15:29.977000
|
||||
@ -279137,7 +279143,7 @@ CVE-2025-0707,0,0,5ea8e0d500b75ba8a0fc0cd19ceb093f4d4acd52cc281fb36710245d3d1c36
|
||||
CVE-2025-0708,0,0,2c564dec190555666593be94185c7b92f00a312088bb857474e59f691fdbb07a,2025-01-24T20:15:34.200000
|
||||
CVE-2025-0709,0,0,156b4593a93fa854ef60a86f01a55e00fa0c092a95e57a097f43efa6d6f6b8c5,2025-01-24T21:15:11.237000
|
||||
CVE-2025-0710,0,0,d434afd262bceee38318c1978d6fd83eef213e4c7163f6e3a198919727021a6b,2025-01-24T21:15:11.420000
|
||||
CVE-2025-0714,0,0,0057831ca66e3db49b7940154242ccfd79d407347a06e6c8cd85f6d31ee92f18,2025-02-17T12:15:27.570000
|
||||
CVE-2025-0714,0,1,7a5ace77913ec81f29c63850fa9378895a034df434a64ef2c1dd7b18a728bf62,2025-02-19T09:15:09.863000
|
||||
CVE-2025-0720,0,0,602262593ab5841efad088d2b78c277a4b7966a622beefaf31478d2cb3826706,2025-01-26T23:15:21.547000
|
||||
CVE-2025-0721,0,0,9b15b019b479c4479137e55c74f2da2652b1f56c2d67e45558507ea73a96e795,2025-01-27T00:15:26.317000
|
||||
CVE-2025-0722,0,0,d286657780f2322cec5dfe4e8af4674bbdc5e8a8b778a753270cdbdd213a2c1d,2025-01-27T00:15:26.517000
|
||||
@ -279214,7 +279220,7 @@ CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e
|
||||
CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000
|
||||
CVE-2025-0862,0,0,dee81cd1ce38cab472cf28eb1ce5e1d9037dd3bdafbd545dddc7d172ac5b30e6,2025-02-11T11:15:16.043000
|
||||
CVE-2025-0864,0,0,e56e1de16064acc329a5a32cc0ae2f68a867a09df61e368d37eca098dd9d89f8,2025-02-18T08:15:10.723000
|
||||
CVE-2025-0865,1,1,80ee86109bc8176d915ab531176f207ba267c3135c04d72fc66dcd322326ed90,2025-02-19T08:15:21.853000
|
||||
CVE-2025-0865,0,0,80ee86109bc8176d915ab531176f207ba267c3135c04d72fc66dcd322326ed90,2025-02-19T08:15:21.853000
|
||||
CVE-2025-0867,0,0,00bdec3c0865b5f1af866315340e7f0b0b67377723af000ff55ae7ae60c91aed,2025-02-14T13:15:42.620000
|
||||
CVE-2025-0869,0,0,c00b46e6ec082bb5acc28b4863ecc13d05083b8391495aa8cb5415a092650002,2025-02-07T17:15:31.307000
|
||||
CVE-2025-0870,0,0,1d396f929e817f7895a91994ddee9c76172e4af1ca8cb701d53be58252025809,2025-01-30T13:15:10.483000
|
||||
@ -279265,7 +279271,7 @@ CVE-2025-0971,0,0,633a244c07788fdbfdfdcc8863df0b7c407fe050fbfbd58b149dfe7ef4b5bb
|
||||
CVE-2025-0972,0,0,5f696e03d949e1a49551d14d8f8b313b3e334794f668dc156f7f61acec16e7d4,2025-02-03T00:15:28.007000
|
||||
CVE-2025-0973,0,0,43196315f17909695c2c467d44bd1754687d87efefe1c24665042841ac303abc,2025-02-03T01:15:07.263000
|
||||
CVE-2025-0974,0,0,ed110dbaf1b5b967bb38884e7ebb961da1c8692b7e1576cd2f418134ffba9e99,2025-02-03T02:15:26.433000
|
||||
CVE-2025-0981,0,0,391f0270940545eeab79a2413ce96d042a150190fc332923a976cf357e240945,2025-02-18T10:15:10.333000
|
||||
CVE-2025-0981,0,1,c309731b7ff9893538036e27f735501df9811f94653975fc38c99f19642038c5,2025-02-19T09:15:09.993000
|
||||
CVE-2025-0982,0,0,743f39b6fc5d357ba3083d9f8f3d69f42ae53e58d798d8fd1e36d71ec2810d37,2025-02-06T12:15:27.267000
|
||||
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
|
||||
CVE-2025-0994,0,0,b317a7cd26062958ea654021aa4ef82b6a50be87030a20bb16c21acb6e3b9a13,2025-02-12T19:29:30.383000
|
||||
@ -279277,6 +279283,7 @@ CVE-2025-1002,0,0,afe3f2c2566c1814726647f8d465ff61266ff8daa4d1910e361f2c337de6f5
|
||||
CVE-2025-1003,0,0,a253a97b9e0ffcf187092a253ddad8abdb5c903dd7624752d4fb1eb824915a62,2025-02-04T00:15:33.940000
|
||||
CVE-2025-1004,0,0,4a7f8cac81e12783758f25e1faabe55e828c523da43d9ab1c43c4f1351fb035e,2025-02-06T21:15:22.247000
|
||||
CVE-2025-1005,0,0,97e80c2f89c5e160cce39e83fa7ef13a9325fdfdb9706abd6a322ead72dbefb2,2025-02-15T10:15:08.740000
|
||||
CVE-2025-1007,1,1,9f58e9f8dcb0dfafd40422a755b6dd838264ac08d3139ea382726a554d1827d6,2025-02-19T09:15:10.117000
|
||||
CVE-2025-1009,0,0,2eaef1afd010c535fd50fceaedaa339dbea694d459d94247ca2cdf1816ccd1a0,2025-02-06T19:28:52.820000
|
||||
CVE-2025-1010,0,0,62a03586b01b5384628b2b24394869ef4f272c9b8354e05188dae652a849042c,2025-02-06T19:30:13.637000
|
||||
CVE-2025-1011,0,0,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c93d,2025-02-06T19:31:38.610000
|
||||
@ -279291,6 +279298,7 @@ CVE-2025-1019,0,0,97756c2ae277aabeaedab68cc3d112cc358adac0f1529efc7a271f2ce7df17
|
||||
CVE-2025-1020,0,0,cf2c558f0a30d0c315344260ca52b6874799bcd8941b5300ae30cd6ec90d92d0,2025-02-06T21:15:22.943000
|
||||
CVE-2025-1022,0,0,6e0bbfd94dedae55deabfe77a158c108c89075d5003cd8db6b7f154724b291e0,2025-02-05T20:15:45.470000
|
||||
CVE-2025-1023,0,0,39df3b4906147b7a327b7abf854deb2df3fce38458ba003b8ff0de0bf894760f,2025-02-18T10:15:10.500000
|
||||
CVE-2025-1024,1,1,ed4a0103ce1a587d6b8e89274d412a572e44ce4224afbc332cb8a5ea9879c094,2025-02-19T09:15:10.280000
|
||||
CVE-2025-1025,0,0,88de3d5b0a73f8ebb31a09c003423921c8f28cb5c5fcc232fde8c177bdee9679,2025-02-05T20:15:45.593000
|
||||
CVE-2025-1026,0,0,035fc1dc2474697a852e52233cc9d299f677e1a0207511b21278e18a7e117de5,2025-02-05T05:15:10.687000
|
||||
CVE-2025-1028,0,0,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000
|
||||
@ -279309,6 +279317,7 @@ CVE-2025-1070,0,0,5146e4f08b2531ff82fc620bde7cb0c34c86b4487a1fbc38c78ecd14320161
|
||||
CVE-2025-1071,0,0,7cf48f5c0704f7102ee404aa34c514af5ccf3668a768a5efc6948bb3495dcf52,2025-02-14T14:15:32.560000
|
||||
CVE-2025-1072,0,0,bb0514ae35802411e3da1596896cb302b1b469b7b79e6814634b3c15db99cbed,2025-02-07T04:15:07.737000
|
||||
CVE-2025-1074,0,0,1377d1b0ab3296a33846cd316ab7610f3b7b42a12867cb031730fad4726b7a65,2025-02-06T14:15:30.050000
|
||||
CVE-2025-1075,1,1,b9890760d1f9da8be37b0ea9ac5eb4b3e3178e3338d18497828b678282b4b2d7,2025-02-19T10:15:09.043000
|
||||
CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000
|
||||
CVE-2025-1077,0,0,735be86b3f6fc3d707f047f96e1dd513fa1d8afd61d55b887dfbb34478c5ed44,2025-02-07T09:15:08.380000
|
||||
CVE-2025-1078,0,0,45cc25c666904d6c96dae20f5f19955cbc17db65c9b5b7f07b6396203ce702c3,2025-02-06T17:15:21.040000
|
||||
@ -279337,6 +279346,10 @@ CVE-2025-1116,0,0,1900baef94df31cdc087bd9edd3d7c5b346aa1791e055e2d94009a8615107e
|
||||
CVE-2025-1117,0,0,2322fdff6f8393d6ada2664cbf25a349bfc8c7b701fcb01c2d988bad4837c701,2025-02-08T13:15:07.843000
|
||||
CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000
|
||||
CVE-2025-1127,0,0,964bb8e082be5f4c3ffe02b7d66d3573c4a806865108fd7e7f64bea0f60eef31,2025-02-13T19:15:14.153000
|
||||
CVE-2025-1132,1,1,a54d6d00723bbeea5fc156acc54289b0e557a1f1b96ae4af380b54c8586a4ae0,2025-02-19T09:15:10.417000
|
||||
CVE-2025-1133,1,1,077b3b4fa4c5c74cfca1b9886406871d5d029081fc0f7c73cd8b5fa07fa2c5d3,2025-02-19T09:15:10.550000
|
||||
CVE-2025-1134,1,1,c96645df83383e6ea20c2c4fb684ee084917bc1d0fed815f4b11bbaeed7ba4dc,2025-02-19T09:15:10.687000
|
||||
CVE-2025-1135,1,1,b7ed9a1e2697abbe26b8e6bcf33a5eccbddc8e91b444cb8fb8af449ace3fcf99,2025-02-19T09:15:10.823000
|
||||
CVE-2025-1143,0,0,304257e291412914759d8dd1547bfdc8737e5d301b764158390fad46e11d8a73,2025-02-18T18:15:29.750000
|
||||
CVE-2025-1144,0,0,c007a9248005240176adbf0d59d7e143608bdb0bc1952b89f1043c4b3e3f4a74,2025-02-11T06:15:20.310000
|
||||
CVE-2025-1145,0,0,d6e4f6830b1d5bec32355229d5ad379784daf94076f4978b41c854d102fa122e,2025-02-18T18:15:29.940000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user