Auto-Update: 2025-02-19T11:01:42.746148+00:00

This commit is contained in:
cad-safe-bot 2025-02-19 11:05:10 +00:00
parent 313d9165c2
commit 64412cd47a
18 changed files with 1014 additions and 68 deletions

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-13231",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-19T09:15:08.930",
"lastModified": "2025-02-19T09:15:08.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WordPress Portfolio Builder \u2013 Portfolio Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'add_video' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to add arbitrary videos to any portfolio gallery."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/tags/1.1.7/src/Admin.php#L14",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/tags/1.1.7/src/Admin.php#L149",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/tags/1.1.7/src/Admin.php#L76",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/tags/1.1.7/src/Admin.php#L86",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/28d9ab98-c1ab-45ee-a371-6598a8347b10?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13336",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-19T09:15:09.083",
"lastModified": "2025-02-19T09:15:09.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Disable Auto Updates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'disable-auto-updates' page. This makes it possible for unauthenticated attackers to disable all auto updates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/disable-auto-updates/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/60413b3b-f9b0-40ca-af0a-f7cf87ab793a?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13339",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-19T09:15:09.240",
"lastModified": "2025-02-19T09:15:09.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DeBounce Email Validator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.6.6. This is due to missing or incorrect nonce validation on the 'debounce_email_validator' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/debounce-io-email-validator/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9121ab04-d16b-468b-880f-8f00bcec6489?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-13363",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-19T09:15:09.390",
"lastModified": "2025-02-19T09:15:09.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Raptive Ads plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'poc' parameter in all versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/adthrive-ads/trunk/components/static-files/partials/eyereturn",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/adthrive-ads/trunk/components/static-files/partials/eyereturn/eyereturn.html",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3d535b3-ad52-4322-988e-7d560dbfe3a3?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13364",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-19T09:15:09.547",
"lastModified": "2025-02-19T09:15:09.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Raptive Ads plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the site_ads_files_reset() and cls_file_reset() functions in all versions up to, and including, 3.6.3. This makes it possible for unauthenticated attackers to reset the ad and cls files."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/adthrive-ads/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7a08d857-c8be-4ba8-b9fb-eed222a8cd8c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13489",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-19T10:15:08.870",
"lastModified": "2025-02-19T10:15:08.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LTL Freight Quotes \u2013 Old Dominion Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 4.2.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3242160%40ltl-freight-quotes-odfl-edition&new=3242160%40ltl-freight-quotes-odfl-edition&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3c7d63fc-288b-4f2f-85cd-e94add07a536?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-56000",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-18T20:15:22.367",
"lastModified": "2025-02-18T20:15:22.367",
"lastModified": "2025-02-19T09:15:09.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Privilege Assignment vulnerability in NotFound K Elements allows Privilege Escalation. This issue affects K Elements: from n/a through n/a."
"value": "Incorrect Privilege Assignment vulnerability in SeventhQueen K Elements allows Privilege Escalation.This issue affects K Elements: from n/a before 5.4.0."
}
],
"metrics": {
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -48,9 +48,17 @@
}
],
"references": [
{
"url": "https://patchstack.com/articles/critical-privilege-escalation-patched-in-kleo-themes-plugin?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/wordpress/plugin/k-elements/vulnerability/wordpress-k-elements-plugin-5-2-0-unauthenticated-account-takeover-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://themeforest.net/item/kleo-pro-community-focused-multipurpose-buddypress-theme/6776630?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-0714",
"sourceIdentifier": "a341c0d1-ebf7-493f-a84e-38cf86618674",
"published": "2025-02-17T12:15:27.570",
"lastModified": "2025-02-17T12:15:27.570",
"vulnStatus": "Received",
"lastModified": "2025-02-19T09:15:09.863",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The vulnerability existed in the password storage of Mobateks MobaXterm below 25.0.\nMobaXTerm uses an initialization vector (IV) that is generated by encrypting null bytes with a derivate of the users master key. As both the master key is static, and AES ECB produces the same output with the same input the IV for AES CFB is always the same.The static IV makes it easier to obtain sensitive information and decrypt data if the data is stored at rest."
"value": "The vulnerability exists in the password storage of Mobateks MobaXterm in versions below 25.0. MobaXTerm uses an initialisation vector (IV) consisting only of zero bytes and a master key to encrypt each password individually. In the default configuration, on opening MobaXTerm, the user is prompted for their password. A derivative of the password is used as the master key. As both the master key and the IV are the same for each stored password, the AES CFB ciphertext depends only on the plaintext (the password). The static IV and master key make it easier to obtain sensitive information and to decrypt data when it is stored at rest."
},
{
"lang": "es",
"value": "La vulnerabilidad exist\u00eda en el almacenamiento de contrase\u00f1as de MobaXterm de Mobatek en versiones anteriores a 25.0. MobaXTerm utiliza un vector de inicializaci\u00f3n (IV) que se genera cifrando bytes nulos con un derivado de la clave maestra del usuario. Como la clave maestra es est\u00e1tica y AES ECB produce la misma salida con la misma entrada, el IV para AES CFB es siempre el mismo. El IV est\u00e1tico facilita la obtenci\u00f3n de informaci\u00f3n confidencial y el descifrado de datos si estos se almacenan en reposo."
}
],
"metrics": {

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-0981",
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"published": "2025-02-18T10:15:10.333",
"lastModified": "2025-02-18T10:15:10.333",
"vulnStatus": "Received",
"lastModified": "2025-02-19T09:15:09.993",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in ChurchCRM\u00a05.13.0 and prior that allows an attacker to hijack a user's session by exploiting a Stored Cross Site Scripting (XSS) vulnerability in the Group Editor page. This allows admin users to inject malicious JavaScript, which captures the session cookie of authenticated users. The cookie can then be sent to an external server, enabling session hijacking. It can also lead to information disclosure, as exposed session cookies can be used to impersonate users and gain unauthorised access to sensitive information."
"value": "A vulnerability exists in ChurchCRM\u00a05.13.0 and prior that allows an attacker to hijack a user's session by exploiting a Stored Cross Site Scripting (XSS) vulnerability in the Group Editor page. This allows admin users to inject malicious JavaScript in the description field, which captures the session cookie of authenticated users. The cookie can then be sent to an external server, enabling session hijacking. It can also lead to information disclosure, as exposed session cookies can be used to impersonate users and gain unauthorised access to sensitive information."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad en ChurchCRM 5.13.0 y antes que permite a un atacante secuestrar una sesi\u00f3n de usuario explotando una vulnerabilidad de Cross Site Scripting (XSS) Almacenado en la p\u00e1gina del editor de grupos. Esto permite a los usuarios administradores inyectar JavaScript malicioso, que captura la cookie de sesi\u00f3n de usuarios autenticados. La cookie se puede enviar a un servidor externo, lo que permite el secuestro de sesi\u00f3n. Tambi\u00e9n puede conducir a la divulgaci\u00f3n de informaci\u00f3n, ya que las cookies de sesi\u00f3n expuestas se pueden usar para hacerse pasar por usuarios y obtener acceso no autorizado a informaci\u00f3n confidencial."
}
],
"metrics": {

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-1007",
"sourceIdentifier": "emo@eclipse.org",
"published": "2025-02-19T09:15:10.117",
"lastModified": "2025-02-19T09:15:10.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In OpenVSX version v0.9.0 to v0.20.0, the \n/user/namespace/{namespace}/details API allows a user to edit all \nnamespace details, even if the user is not a namespace Owner or \nContributor. The details include: name, description, website, support \nlink and social media links. The same issues existed in \n/user/namespace/{namespace}/details/logo and allowed a user to change \nthe logo."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "emo@eclipse.org",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "emo@eclipse.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-283"
},
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/eclipse/openvsx/security/advisories/GHSA-wc7c-xq2f-qp4h",
"source": "emo@eclipse.org"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-1024",
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"published": "2025-02-19T09:15:10.280",
"lastModified": "2025-02-19T09:15:10.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in ChurchCRM 5.13.0\u00a0that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php\u00a0page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookies, perform actions on behalf of an authenticated user, and gain unauthorized access to the application."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:L/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:Amber",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "YES",
"recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "LOW",
"providerUrgency": "AMBER"
}
}
]
},
"weaknesses": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/ChurchCRM/CRM/issues/7250",
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-1075",
"sourceIdentifier": "security@checkmk.com",
"published": "2025-02-19T10:15:09.043",
"lastModified": "2025-02-19T10:15:09.043",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p27, <2.2.0p40, and 2.1.0p51 (EOL) causes LDAP credentials to be written to Apache error log file accessible to administrators."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/17495",
"source": "security@checkmk.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-1132",
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"published": "2025-02-19T09:15:10.417",
"lastModified": "2025-02-19T09:15:10.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A time-based blind SQL Injection\u00a0vulnerability exists in the ChurchCRM 5.13.0 and prior\u00a0EditEventAttendees.php\u00a0within the EN_tyid\u00a0parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires Administrator permissions.\u00a0This flaw can potentially allow attackers to delay the response, indicating the presence of an SQL injection vulnerability. While it is a time-based blind injection, it can be exploited to gain insights into the underlying database, and with further exploitation, sensitive data could be retrieved."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "YES",
"recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "HIGH",
"providerUrgency": "RED"
}
}
]
},
"weaknesses": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ChurchCRM/CRM/issues/7251",
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-1133",
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"published": "2025-02-19T09:15:10.550",
"lastModified": "2025-02-19T09:15:10.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in ChurchCRM 5.13.0 and prior\u00a0that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection\u00a0vulnerability in the EditEventAttendees\u00a0functionality. The EID\u00a0parameter is directly concatenated into an SQL query without proper sanitization, making it susceptible to SQL injection attacks. An attacker can manipulate the query, potentially leading to data exfiltration, modification, or deletion.\u00a0 Please note that this vulnerability requires Administrator privileges."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "YES",
"recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "HIGH",
"providerUrgency": "RED"
}
}
]
},
"weaknesses": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ChurchCRM/CRM/issues/7252",
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-1134",
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"published": "2025-02-19T09:15:10.687",
"lastModified": "2025-02-19T09:15:10.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in ChurchCRM\u00a05.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection\u00a0vulnerability in the DonatedItemEditor\u00a0functionality. The CurrentFundraiser\u00a0parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note that this vulnerability requires Administrator privileges."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "YES",
"recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "HIGH",
"providerUrgency": "RED"
}
}
]
},
"weaknesses": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ChurchCRM/CRM/issues/7253",
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-1135",
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"published": "2025-02-19T09:15:10.823",
"lastModified": "2025-02-19T09:15:10.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in ChurchCRM\u00a05.13.0. and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection\u00a0vulnerability in the BatchWinnerEntry\u00a0functionality. The CurrentFundraiser\u00a0parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion.\u00a0Please note the vulnerability requires Administrator privileges."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "YES",
"recovery": "USER",
"valueDensity": "CONCENTRATED",
"vulnerabilityResponseEffort": "HIGH",
"providerUrgency": "RED"
}
}
]
},
"weaknesses": [
{
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ChurchCRM/CRM/issues/7254",
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-19T09:00:29.131843+00:00
2025-02-19T11:01:42.746148+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-19T08:15:21.853000+00:00
2025-02-19T10:15:09.043000+00:00
```
### Last Data Feed Release
@ -33,44 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
281767
281780
```
### CVEs added in the last Commit
Recently added CVEs: `26`
Recently added CVEs: `13`
- [CVE-2024-11753](CVE-2024/CVE-2024-117xx/CVE-2024-11753.json) (`2025-02-19T08:15:12.593`)
- [CVE-2024-11778](CVE-2024/CVE-2024-117xx/CVE-2024-11778.json) (`2025-02-19T08:15:13.027`)
- [CVE-2024-12069](CVE-2024/CVE-2024-120xx/CVE-2024-12069.json) (`2025-02-19T08:15:13.470`)
- [CVE-2024-12339](CVE-2024/CVE-2024-123xx/CVE-2024-12339.json) (`2025-02-19T08:15:13.907`)
- [CVE-2024-12522](CVE-2024/CVE-2024-125xx/CVE-2024-12522.json) (`2025-02-19T08:15:14.323`)
- [CVE-2024-13390](CVE-2024/CVE-2024-133xx/CVE-2024-13390.json) (`2025-02-19T08:15:14.743`)
- [CVE-2024-13405](CVE-2024/CVE-2024-134xx/CVE-2024-13405.json) (`2025-02-19T08:15:15.167`)
- [CVE-2024-13462](CVE-2024/CVE-2024-134xx/CVE-2024-13462.json) (`2025-02-19T08:15:15.620`)
- [CVE-2024-13468](CVE-2024/CVE-2024-134xx/CVE-2024-13468.json) (`2025-02-19T08:15:16.027`)
- [CVE-2024-13589](CVE-2024/CVE-2024-135xx/CVE-2024-13589.json) (`2025-02-19T08:15:16.453`)
- [CVE-2024-13591](CVE-2024/CVE-2024-135xx/CVE-2024-13591.json) (`2025-02-19T08:15:16.863`)
- [CVE-2024-13592](CVE-2024/CVE-2024-135xx/CVE-2024-13592.json) (`2025-02-19T08:15:17.233`)
- [CVE-2024-13657](CVE-2024/CVE-2024-136xx/CVE-2024-13657.json) (`2025-02-19T08:15:17.620`)
- [CVE-2024-13660](CVE-2024/CVE-2024-136xx/CVE-2024-13660.json) (`2025-02-19T08:15:18.013`)
- [CVE-2024-13663](CVE-2024/CVE-2024-136xx/CVE-2024-13663.json) (`2025-02-19T08:15:18.433`)
- [CVE-2024-13674](CVE-2024/CVE-2024-136xx/CVE-2024-13674.json) (`2025-02-19T08:15:18.823`)
- [CVE-2024-13676](CVE-2024/CVE-2024-136xx/CVE-2024-13676.json) (`2025-02-19T08:15:19.190`)
- [CVE-2024-13679](CVE-2024/CVE-2024-136xx/CVE-2024-13679.json) (`2025-02-19T08:15:19.623`)
- [CVE-2024-13711](CVE-2024/CVE-2024-137xx/CVE-2024-13711.json) (`2025-02-19T08:15:20.007`)
- [CVE-2024-13712](CVE-2024/CVE-2024-137xx/CVE-2024-13712.json) (`2025-02-19T08:15:20.380`)
- [CVE-2024-13719](CVE-2024/CVE-2024-137xx/CVE-2024-13719.json) (`2025-02-19T08:15:20.737`)
- [CVE-2024-13736](CVE-2024/CVE-2024-137xx/CVE-2024-13736.json) (`2025-02-19T08:15:21.077`)
- [CVE-2024-13854](CVE-2024/CVE-2024-138xx/CVE-2024-13854.json) (`2025-02-19T08:15:21.440`)
- [CVE-2025-0633](CVE-2025/CVE-2025-06xx/CVE-2025-0633.json) (`2025-02-19T07:15:33.537`)
- [CVE-2025-0865](CVE-2025/CVE-2025-08xx/CVE-2025-0865.json) (`2025-02-19T08:15:21.853`)
- [CVE-2024-13231](CVE-2024/CVE-2024-132xx/CVE-2024-13231.json) (`2025-02-19T09:15:08.930`)
- [CVE-2024-13336](CVE-2024/CVE-2024-133xx/CVE-2024-13336.json) (`2025-02-19T09:15:09.083`)
- [CVE-2024-13339](CVE-2024/CVE-2024-133xx/CVE-2024-13339.json) (`2025-02-19T09:15:09.240`)
- [CVE-2024-13363](CVE-2024/CVE-2024-133xx/CVE-2024-13363.json) (`2025-02-19T09:15:09.390`)
- [CVE-2024-13364](CVE-2024/CVE-2024-133xx/CVE-2024-13364.json) (`2025-02-19T09:15:09.547`)
- [CVE-2024-13489](CVE-2024/CVE-2024-134xx/CVE-2024-13489.json) (`2025-02-19T10:15:08.870`)
- [CVE-2025-1007](CVE-2025/CVE-2025-10xx/CVE-2025-1007.json) (`2025-02-19T09:15:10.117`)
- [CVE-2025-1024](CVE-2025/CVE-2025-10xx/CVE-2025-1024.json) (`2025-02-19T09:15:10.280`)
- [CVE-2025-1075](CVE-2025/CVE-2025-10xx/CVE-2025-1075.json) (`2025-02-19T10:15:09.043`)
- [CVE-2025-1132](CVE-2025/CVE-2025-11xx/CVE-2025-1132.json) (`2025-02-19T09:15:10.417`)
- [CVE-2025-1133](CVE-2025/CVE-2025-11xx/CVE-2025-1133.json) (`2025-02-19T09:15:10.550`)
- [CVE-2025-1134](CVE-2025/CVE-2025-11xx/CVE-2025-1134.json) (`2025-02-19T09:15:10.687`)
- [CVE-2025-1135](CVE-2025/CVE-2025-11xx/CVE-2025-1135.json) (`2025-02-19T09:15:10.823`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `3`
- [CVE-2024-56000](CVE-2024/CVE-2024-560xx/CVE-2024-56000.json) (`2025-02-19T09:15:09.710`)
- [CVE-2025-0714](CVE-2025/CVE-2025-07xx/CVE-2025-0714.json) (`2025-02-19T09:15:09.863`)
- [CVE-2025-0981](CVE-2025/CVE-2025-09xx/CVE-2025-0981.json) (`2025-02-19T09:15:09.993`)
## Download and Usage

View File

@ -244650,7 +244650,7 @@ CVE-2024-11331,0,0,687d03f55922d90d247fc3f94ca3f96e9c39bed85fd707b3c5cab0e8ddca9
CVE-2024-11332,0,0,36669df4e93715465b64ec1799e55f470058053e193a811269619d8d50b4e0c9,2024-11-23T05:15:06.520000
CVE-2024-11333,0,0,00c71a7929b275d875b9539b6f0a2f4cc66b516eced93f3c2cfad9bb181a4a5b,2024-11-28T09:15:04.170000
CVE-2024-11334,0,0,f7fc893b8a37cca506fd20fe68edd8509ed855f99666ff9db346702f3632cf66,2024-11-26T17:33:49.477000
CVE-2024-11335,1,1,c9a537eb5a65cbbf5d82aa6246b658830e47a60579bc2ab61bbd4bb743696d93,2025-02-19T08:15:10.870000
CVE-2024-11335,0,0,c9a537eb5a65cbbf5d82aa6246b658830e47a60579bc2ab61bbd4bb743696d93,2025-02-19T08:15:10.870000
CVE-2024-11336,0,0,f6d676d5a427fada73f852223dfd1f8d78278266b2c8c37478ab18b05a16f6ad,2024-12-06T09:15:06.323000
CVE-2024-11337,0,0,b01b2d91cb611a25f6f6c6a23755d6fd83423220b4845fa1731e3136f57cb3af,2025-01-07T05:15:11.320000
CVE-2024-11338,0,0,16b8e4df470f18ecee94a466e04ad75959cffb7412dbd289584a85008e652ba5,2025-01-07T05:15:11.520000
@ -245065,7 +245065,7 @@ CVE-2024-1175,0,0,f997875411f4ee3836569f05e6ded063f5984d7986ed98f909a5423e1a302c
CVE-2024-11750,0,0,7ad8eba5e612b45089b0006a10c8f5004dc37025f0797564ad303213ba0cd10f,2024-12-12T05:15:09.577000
CVE-2024-11751,0,0,cbc44290cddf15ae35c92a8e4b75351046563158eb1fedf91f48e5c8b200a32b,2024-12-14T05:15:06.923000
CVE-2024-11752,0,0,c48a168f2b3a172a5086d93afa4f6d610d49141a00f07210bee49dcaa523a5b5,2024-12-14T06:15:19.210000
CVE-2024-11753,1,1,56d8aa7869baf0adff365edb20566cdfdd96fa8e09d061e53bdef58fa211c9c4,2025-02-19T08:15:12.593000
CVE-2024-11753,0,0,56d8aa7869baf0adff365edb20566cdfdd96fa8e09d061e53bdef58fa211c9c4,2025-02-19T08:15:12.593000
CVE-2024-11754,0,0,115157a8a0f024c3ba84de7edd359cbde1e25041eace45096f12b0e339d7e447,2024-12-13T09:15:05.630000
CVE-2024-11755,0,0,c883abaefa6170cee64d3b62a0d846726e75234488258495594582792094520e,2024-12-14T05:15:07.100000
CVE-2024-11756,0,0,1b15032d5138c63a9bc74c14a17064d85dfaaa7feb6ae78db162c60925186a36,2025-01-07T06:15:14.943000
@ -245091,7 +245091,7 @@ CVE-2024-11774,0,0,2f351d61aa038a49c773ab74e882e8cd2203f9cf3f3df13c0faa462f8ee3a
CVE-2024-11775,0,0,0be2b5775aa12c2634dedea0534264de5c8544551afcfc7760cb6a86958e9dd8,2024-12-20T07:15:10.597000
CVE-2024-11776,0,0,db96a767ae984aa946e97339afd57034a67d2d93961a6fe48dad1a311ebfe8b3,2024-12-20T03:15:06.420000
CVE-2024-11777,0,0,e460b779a976f9c561c46b6e58a92b7a7419f3751a2cd77a73598001765e2023,2025-01-07T04:15:07.200000
CVE-2024-11778,1,1,8e00158d62d41b7afea6cce05c05c100d3a15f9d8feede829c202a96b984c9f0,2025-02-19T08:15:13.027000
CVE-2024-11778,0,0,8e00158d62d41b7afea6cce05c05c100d3a15f9d8feede829c202a96b984c9f0,2025-02-19T08:15:13.027000
CVE-2024-11779,0,0,66ab9533cf27509ff85b54c7dc6f857efc44402b9c1a2b7fc4f1c1fbd8a0b4e7,2024-12-05T10:31:39.980000
CVE-2024-1178,0,0,8ab0a2a01e80408842a29a813ae0f71a9342bc7b3eeef6127c8bbe6845a6d705,2025-01-08T17:16:27.800000
CVE-2024-11780,0,0,c6444630583b2209a32c825c71dee702f00b48010f91cb4fad7b61435fdcfa0e,2025-02-01T04:15:29.523000
@ -245359,7 +245359,7 @@ CVE-2024-12062,0,0,72735736917491b453ec9a8b66f16471859e8308b17c93b657198e604c611
CVE-2024-12064,0,0,5bbffd5016c2c66c65f1cad07469a2c9304ddde32e6765225186e453c653a401,2024-12-05T22:15:20.080000
CVE-2024-12066,0,0,b8b74ff74daf8006195a72a7866cbbcaf66d537ba02c482e9dfaf1c6e82963a9,2024-12-21T07:15:08.907000
CVE-2024-12067,0,0,1e92db34fdb6070fa741c6f0fc31b2e9eacb1c54540470e816605dc679b61bb9,2025-01-09T11:15:11.647000
CVE-2024-12069,1,1,f7d8e988d9bd3f09c5fc11f1ebad6e028a23de2908e1ac7dd9b4c68efe76b728,2025-02-19T08:15:13.470000
CVE-2024-12069,0,0,f7d8e988d9bd3f09c5fc11f1ebad6e028a23de2908e1ac7dd9b4c68efe76b728,2025-02-19T08:15:13.470000
CVE-2024-1207,0,0,7ca2a33c54192dfcfa7fe7f99bed16fbfa1215b4ac8ba5de485b890ce26af06c,2024-11-21T08:50:02.457000
CVE-2024-12071,0,0,7773df08bf117af1ddaaee700084b2910f6a68d7f25642ff336de1e992525428,2025-01-18T04:15:06.690000
CVE-2024-12072,0,0,a174c14ab62255e805373ea4d76cdd13bc3d9cbde3ba4a3927979f9e7d419d41,2024-12-12T06:15:23.383000
@ -245604,7 +245604,7 @@ CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9
CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000
CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000
CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000
CVE-2024-12339,1,1,be52c2d0084e1b737e32b52a9a6a5d871bb4fa98b0d35a295c3be3dad2db1689,2025-02-19T08:15:13.907000
CVE-2024-12339,0,0,be52c2d0084e1b737e32b52a9a6a5d871bb4fa98b0d35a295c3be3dad2db1689,2025-02-19T08:15:13.907000
CVE-2024-1234,0,0,1d2032d774427adab4981e078c05751946e3432eadc2f7e196ff1cacacccf797,2025-01-23T19:50:50.457000
CVE-2024-12340,0,0,e64d9154ce721e0cef963ec962023bf662e8b1885905905ffc386c61964f035d,2024-12-18T10:15:07.827000
CVE-2024-12341,0,0,73d0614d7c98b23e49242f0be40422e4e73b095a6a96061a926bb2fee6b56681,2024-12-12T04:15:07.660000
@ -245773,7 +245773,7 @@ CVE-2024-12519,0,0,8512ecfe11d3f5f606f5fdf06fefea6ed5c0603f03aafcb3163b8596fbd0b
CVE-2024-1252,0,0,d03beb126367df5b21be601ec7e2ecf5f48cece91d0754af14f589827736f3cf,2024-11-21T08:50:09.700000
CVE-2024-12520,0,0,886c4e74a7980fda960a92b5a62600949c9fea0564fe68f7b22e9e1786c04bac,2025-01-11T08:15:25.720000
CVE-2024-12521,0,0,5ef3982f9bbd97c224cda76723fce3c98e248e5aec737e88bf0802be4e43c585,2025-01-08T04:15:06.827000
CVE-2024-12522,1,1,ed1fb5baf064c0028580073ee6b976f9886f98b4d500acd8b695b42a96f92e6f,2025-02-19T08:15:14.323000
CVE-2024-12522,0,0,ed1fb5baf064c0028580073ee6b976f9886f98b4d500acd8b695b42a96f92e6f,2025-02-19T08:15:14.323000
CVE-2024-12523,0,0,185a41d328f0e130d8ed17ada12f64a855433449910369cbbb025fff8ce0f4d8,2024-12-14T05:15:11.640000
CVE-2024-12524,0,0,872d50ee592086b62712ad11fcac01017f02cae2a37a1857d75b736f2a220d93,2025-01-30T11:15:10.840000
CVE-2024-12525,0,0,2bed9d9749d6c8ef22bb23af585ca60c77e578bcc12b11b932323186ccb93ede,2025-02-18T05:15:10.813000
@ -246366,6 +246366,7 @@ CVE-2024-13227,0,0,f396acd62ff517fde269ff6e013e5c0bee9fbdf4ae486ca2fb2f74214892d
CVE-2024-13229,0,0,8005008cc5eaf6f49dbd4877e33b66dc904c20bdee3b20c47739bf10cb4a210c,2025-02-13T05:15:13.930000
CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000
CVE-2024-13230,0,0,77b1ecbf192b34e98ac8a66dc9d4d1a94979c767aa5e8f2b9158ee6752bafedc,2025-01-21T11:15:09.267000
CVE-2024-13231,1,1,a0a3c8be09c487da7ac229fd27d81f962d27d05f64eff04a5adbb152439dda3b,2025-02-19T09:15:08.930000
CVE-2024-13234,0,0,4c493a769573d261245a83332615004948f6e06f366df55b9e6c3d12849e4b0c,2025-02-04T21:05:33.863000
CVE-2024-13236,0,0,64abe32b85dcd45ec9ab991a4d5209e0313b6971aeb9b551d0d126d46b2b126d,2025-01-31T16:03:09.630000
CVE-2024-13237,0,0,757f6068109954aeb708ce365b1ff5e5adf5204baad7d55d37a565a85d7816ad,2025-01-09T21:15:24.977000
@ -246471,6 +246472,8 @@ CVE-2024-13332,0,0,dac8734d921a69995688399552e86863e8f706d7756f9f6bda00d7ba7dffb
CVE-2024-13333,0,0,413ea7e4b64b8aef5dd8714980de1abedc1d4af046b4d782740c89a880443e55,2025-01-17T06:15:15.663000
CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655747,2025-01-15T04:15:19.720000
CVE-2024-13335,0,0,20c8c7696547a710a7247fc1375c3fab2f06247460845b286129a3d00d1d053e,2025-02-05T01:37:46.517000
CVE-2024-13336,1,1,bb991eddb9d6dca57629f03b2496d9ddcd626f1b8283912d91a624feb94fc82a,2025-02-19T09:15:09.083000
CVE-2024-13339,1,1,ec5a27af237e49842908b435dbfc33b6109d676dd112fee42b660f932b06c304,2025-02-19T09:15:09.240000
CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000
CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000
CVE-2024-13341,0,0,d1044f531e9718ed5ff21a517ae457f54f64b706f2e309176203ab8df13f04c9,2025-02-01T07:15:07.900000
@ -246489,6 +246492,8 @@ CVE-2024-13356,0,0,4c62ebf770eb8ffd31345cb0ef6c5025a9e134a147f2b545dcf049e579341
CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000
CVE-2024-13360,0,0,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000
CVE-2024-13361,0,0,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000
CVE-2024-13363,1,1,d21488ec7f458338ccd20de07e20eba3496f9cd581ddf0ac36e8680afdaaa6e4,2025-02-19T09:15:09.390000
CVE-2024-13364,1,1,e8c23a5a2067b6574dada082a7e9e7683f39c89e5e5291058031d74b9c8fe13c,2025-02-19T09:15:09.547000
CVE-2024-13365,0,0,d4c9fb3b4eb02bb797a58b6d290aa4b0d82f091aa00e734ed2f15824907289b9,2025-02-18T18:15:18.303000
CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000
CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000
@ -246509,7 +246514,7 @@ CVE-2024-13386,0,0,6ff136adf169af3d89231135a7ce4b15faa5760d31440cb4c68dca430369b
CVE-2024-13387,0,0,4fa5b6a4b1e6e7fbc2f3075a5d8980b29e2968b35b02e0f8e5098804434c72ad,2025-01-16T10:15:09.103000
CVE-2024-13389,0,0,d3a247569299e0cec1414509995cd3f6c342ffef8797b534d3731670cf5721e8,2025-01-31T15:59:43.907000
CVE-2024-1339,0,0,a64c4c68c8a9a926adb37b05ad26ad3fdfdc4a14ba534fc12b29b0c3bcb239b6,2024-12-31T16:52:24.407000
CVE-2024-13390,1,1,e705fb41e6b9b2a446429c2afaf7228aa6c9783c5c2b2e53f9b8f7c3b1540c75,2025-02-19T08:15:14.743000
CVE-2024-13390,0,0,e705fb41e6b9b2a446429c2afaf7228aa6c9783c5c2b2e53f9b8f7c3b1540c75,2025-02-19T08:15:14.743000
CVE-2024-13391,0,0,4ddc50634aa74744390d79b0906c8f88dd9a00cc29aaa55a9724acf7a1d0640c,2025-01-18T07:15:08.637000
CVE-2024-13392,0,0,a78e961d1cefdda1764b180676e0657379c1e1a7ef9b8f0223e522e6fb2917ca,2025-01-18T08:15:24.327000
CVE-2024-13393,0,0,6c538726beb67e787d4cc0c97ae28498348fafb8453c26bd442a25ec75fb47c0,2025-01-18T07:15:08.810000
@ -246524,7 +246529,7 @@ CVE-2024-13400,0,0,a0da00543409991e4d6711b443cdf6fcdbfddf916acf7563da4678bdf041b
CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509538,2025-01-17T05:15:09.077000
CVE-2024-13403,0,0,f48009abe82bf9e29ae1b7a46417bc2967746c0b5702def33976d86176d1ffc8,2025-02-04T09:15:09.303000
CVE-2024-13404,0,0,c306a147bdbb783a3f22c9c4f49bd90e70cf49c0fec041c52ab9283c517d7448,2025-01-31T20:18:46.230000
CVE-2024-13405,1,1,8500742a3a71a92155698ea107ad646961d23eca5b705f80a37a996fb2e10f63,2025-02-19T08:15:15.167000
CVE-2024-13405,0,0,8500742a3a71a92155698ea107ad646961d23eca5b705f80a37a996fb2e10f63,2025-02-19T08:15:15.167000
CVE-2024-13406,0,0,3a9e7471bf5857762896fdd475ef755ed514b70430254f571b98831752a93703,2025-01-24T21:20:06.183000
CVE-2024-13408,0,0,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332fd0,2025-02-05T01:37:13.827000
CVE-2024-13409,0,0,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000
@ -246566,13 +246571,13 @@ CVE-2024-13458,0,0,b0c82b9a6a2ae8ab3e75191e77bf09ecd6761e542d7fe4c0d50e106a0dd34
CVE-2024-13459,0,0,a9fe845bd277299369bc3f6cedb4f513e577d0a95806c4e189fd9614c9d6fa2e,2025-02-18T19:11:47.197000
CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000
CVE-2024-13460,0,0,9c101ce4e9a0b77c24ea9727b59b3a3bfa4cbf94a343064a0ab69a083a2820cf,2025-01-31T18:07:24.277000
CVE-2024-13462,1,1,bd808375ae18220a9dd6d9ebbed45c53c83edb8ab02aeb633cd1274f400f3576,2025-02-19T08:15:15.620000
CVE-2024-13462,0,0,bd808375ae18220a9dd6d9ebbed45c53c83edb8ab02aeb633cd1274f400f3576,2025-02-19T08:15:15.620000
CVE-2024-13463,0,0,a74bd740de3fc458ef5c03de3331d5acaeffdc8e1dd114982c1f405dca936e7c,2025-01-31T04:15:07.497000
CVE-2024-13464,0,0,c7ce95854847c11fde5a1ddc21e150442b9e815758c964241dcc7c0eae02ec39,2025-02-18T05:15:11.673000
CVE-2024-13465,0,0,302d64000d9a85e10d940c0dfda219f6bc435a7608c762c13e680b4ba83050b8,2025-02-18T08:15:09.490000
CVE-2024-13466,0,0,ad9c9053e3167555f400e28f8c129f78ebaefbfea867abbbb84a69e9c4118ca4,2025-02-18T19:15:13.923000
CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000
CVE-2024-13468,1,1,f5287d148e3a11717ac8973e6248eb65dafac48689ef1e2f6acd92e99c685cd5,2025-02-19T08:15:16.027000
CVE-2024-13468,0,0,f5287d148e3a11717ac8973e6248eb65dafac48689ef1e2f6acd92e99c685cd5,2025-02-19T08:15:16.027000
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000
CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000
@ -246584,6 +246589,7 @@ CVE-2024-13480,0,0,321567d1345fefc0890e4d3a03a4c0335890e5df8d4b67eb97bbb9ba1c937
CVE-2024-13484,0,0,4fd55912c77d8dadbebe472ff2c71e4e3fb03970b04450aedc08c21b110060a9,2025-02-12T17:15:23.177000
CVE-2024-13487,0,0,8a4e4265754362ec1c9263cf9e3081850883bf6400106e8f9bffb81274d80844,2025-02-18T19:15:14.073000
CVE-2024-13488,0,0,4b8066bce6198329d93f932502dadbbf2e639dfefb1f2df4c60df4f085c6e1e4,2025-02-15T12:15:30.457000
CVE-2024-13489,1,1,d540270a20044e19f885eb9c1b6edeac3dc59f7c6064bf65855c9960dc59957b,2025-02-19T10:15:08.870000
CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000
CVE-2024-13490,0,0,261a201adcbc7bc2dbe4303b4c424a3f72ae3e81ef333b356e5b443e47516d97,2025-02-12T10:15:11.973000
CVE-2024-13492,0,0,e986e613e4183bc9c7afb601a232e5681edf1984e4b97b5e25f6a769df2e2a60,2025-02-07T16:15:36.123000
@ -246667,11 +246673,11 @@ CVE-2024-13584,0,0,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f
CVE-2024-13586,0,0,031371a39e86dab11794d85bebc5761cfd2812bcdc21ab474a79e1589e56730a,2025-02-04T18:14:20.930000
CVE-2024-13587,0,0,720c8e9f332be08c97824f7294ce236301b592a585cd761de003bc321877436a,2025-02-18T05:15:16.267000
CVE-2024-13588,0,0,ff7590ea531a386de3592f06b0d190afe6e1a5e182fc0c9290b6473914c2c325,2025-02-18T05:15:16.417000
CVE-2024-13589,1,1,8634e98206d01df693d56e69e48e93eb7f9edba40831365b0c5fb968bd98fabf,2025-02-19T08:15:16.453000
CVE-2024-13589,0,0,8634e98206d01df693d56e69e48e93eb7f9edba40831365b0c5fb968bd98fabf,2025-02-19T08:15:16.453000
CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000
CVE-2024-13590,0,0,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000
CVE-2024-13591,1,1,059c4cbd8eede965314c9395245280bcce16ff543735609c2d21c27a3fd9b898,2025-02-19T08:15:16.863000
CVE-2024-13592,1,1,c09356b512438608a2e6306845fe8a94f1bd10d08c5c60fe45a11194fb74a4b0,2025-02-19T08:15:17.233000
CVE-2024-13591,0,0,059c4cbd8eede965314c9395245280bcce16ff543735609c2d21c27a3fd9b898,2025-02-19T08:15:16.863000
CVE-2024-13592,0,0,c09356b512438608a2e6306845fe8a94f1bd10d08c5c60fe45a11194fb74a4b0,2025-02-19T08:15:17.233000
CVE-2024-13593,0,0,fa3fece164aaf9e5bdce4149920be38daaf35514256e02e0d8ee1f95b69ca49c,2025-02-04T21:08:45.723000
CVE-2024-13594,0,0,e40694f60357c551d50cfd64c32b62fc5a068d57b870210e0ac9e99e736df254,2025-02-05T17:01:24.577000
CVE-2024-13595,0,0,857054eef2128780cfc93b39c44c7c6d11a927de9b29d4814b8b4c364f2d10c0,2025-02-18T05:15:16.710000
@ -246709,24 +246715,24 @@ CVE-2024-13652,0,0,ed8d8236d1a3115f336400cbdd4ac56e250a414778c3b1c32835210395f1f
CVE-2024-13653,0,0,770f4a34ec62861070a9f7aec2b86de3f221ce9b95996de0b65265b14bc1c12d,2025-02-12T05:15:11.820000
CVE-2024-13654,0,0,2a35a17fe264f64bb6af7c966578a0e3f22643a1d92580b28b17070dab12d401,2025-02-12T05:15:11.987000
CVE-2024-13656,0,0,0b9d444c7c97e411e4ea27cc87641e7cb92ad285f00faceee8008c4cb10f50a1,2025-02-12T05:15:12.143000
CVE-2024-13657,1,1,60a44e2d645da9e47eb235800bc9c18bced979a00904293529414d276150722a,2025-02-19T08:15:17.620000
CVE-2024-13657,0,0,60a44e2d645da9e47eb235800bc9c18bced979a00904293529414d276150722a,2025-02-19T08:15:17.620000
CVE-2024-13658,0,0,d03a5dca2864c8417f9018e7bf90bf0489d89a07c14724289f58406d6fa3a508,2025-02-12T05:15:12.320000
CVE-2024-13659,0,0,dbe630e285c8f72dabbec8cebaf54bef8da7c792e6b5f98321e2c39fc417940f,2025-02-05T17:40:49.037000
CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000
CVE-2024-13660,1,1,a49d9476a5008e62d51a6b2a832dfe61828f91b18b4b8cde7e3993179e3b9e04,2025-02-19T08:15:18.013000
CVE-2024-13660,0,0,a49d9476a5008e62d51a6b2a832dfe61828f91b18b4b8cde7e3993179e3b9e04,2025-02-19T08:15:18.013000
CVE-2024-13661,0,0,3be24e05b81fe01b8fbf6ee3a938c303c059e6983fd80a8d451cf6089d020b33,2025-01-31T18:08:05.420000
CVE-2024-13662,0,0,8eed535a30180a19d960f2273d8a6d88ed11a0c316177a8c8d801e83b1bee14c,2025-02-18T19:15:14.220000
CVE-2024-13663,1,1,4afc7501b59f2c8209bf8490c661f82ac8f691d34758c934a3e9bd65364ca6cd,2025-02-19T08:15:18.433000
CVE-2024-13663,0,0,4afc7501b59f2c8209bf8490c661f82ac8f691d34758c934a3e9bd65364ca6cd,2025-02-19T08:15:18.433000
CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000
CVE-2024-13665,0,0,18a0fb900dfdb3589ce932f5ee4cb2705e9546782c74f6ed6faf4400a1ef2d61,2025-02-12T05:15:12.483000
CVE-2024-13667,0,0,7a7967e05d1d5b5042b47255b9bffaf2e69713cc939fb41aa3c2d040ad9766d9,2025-02-18T11:15:11.090000
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000
CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693b44,2025-01-31T17:50:24.757000
CVE-2024-13674,1,1,ac3642212117e2e4dbcdf6bf845cb1df3b30736364ba81890bc6e7f12c727bf2,2025-02-19T08:15:18.823000
CVE-2024-13676,1,1,4f8bf0d44a971fbbb44d738bbf0fff36757bda864393a0685528bb1e1a4d43ad,2025-02-19T08:15:19.190000
CVE-2024-13674,0,0,ac3642212117e2e4dbcdf6bf845cb1df3b30736364ba81890bc6e7f12c727bf2,2025-02-19T08:15:18.823000
CVE-2024-13676,0,0,4f8bf0d44a971fbbb44d738bbf0fff36757bda864393a0685528bb1e1a4d43ad,2025-02-19T08:15:19.190000
CVE-2024-13677,0,0,8c3dbbbad614c82756be5f87314c06d94f2c3bdc57d66eee8a7cfa5797e10d79,2025-02-18T05:15:17.893000
CVE-2024-13679,1,1,be4c7776f570cfcb80df59f8e2fc23e16ea058f72d1ce76bfc1747acc3dfaf40,2025-02-19T08:15:19.623000
CVE-2024-13679,0,0,be4c7776f570cfcb80df59f8e2fc23e16ea058f72d1ce76bfc1747acc3dfaf40,2025-02-19T08:15:19.623000
CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
CVE-2024-13681,0,0,be24051b53da6911bff00c852db57b208df86bc968babb1536de5487be5312bf,2025-02-18T11:15:11.270000
@ -246750,13 +246756,13 @@ CVE-2024-13706,0,0,ab3c260451f5aeaf628499ae0037d8fc16844264bd9ec15ebc42f8eab05dd
CVE-2024-13707,0,0,032e2a9cb1b090228bf905c1e52e11efae679d2f0165154d533e21d339074c69,2025-01-31T18:12:42.913000
CVE-2024-13709,0,0,89bb0c649902e7b71dd397a2d1262eb45ecb5db3a49c5090d0564ce4341f03af,2025-01-25T04:15:07.670000
CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000
CVE-2024-13711,1,1,28001e86fb043564d3a2fa90df9b7c35a4ccbdf5b6fc94ce2c871cacc4e4e50c,2025-02-19T08:15:20.007000
CVE-2024-13712,1,1,030d96b716f25bafd54e090712c9bb60cc23ce32577681d3cdb6f0bf5f78f893,2025-02-19T08:15:20.380000
CVE-2024-13711,0,0,28001e86fb043564d3a2fa90df9b7c35a4ccbdf5b6fc94ce2c871cacc4e4e50c,2025-02-19T08:15:20.007000
CVE-2024-13712,0,0,030d96b716f25bafd54e090712c9bb60cc23ce32577681d3cdb6f0bf5f78f893,2025-02-19T08:15:20.380000
CVE-2024-13714,0,0,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000
CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000
CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000
CVE-2024-13718,0,0,4d64ea92ba0808da8cfb81955fc62477b7fae6a3deb6523f8005881040f88340,2025-02-18T09:15:09.723000
CVE-2024-13719,1,1,96b9dda9a58b9bd7960bc82f0f45bdf70117123abedc9395edc605858d81a5c6,2025-02-19T08:15:20.737000
CVE-2024-13719,0,0,96b9dda9a58b9bd7960bc82f0f45bdf70117123abedc9395edc605858d81a5c6,2025-02-19T08:15:20.737000
CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000
CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd2f2,2025-01-30T18:44:43.053000
CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000
@ -246768,7 +246774,7 @@ CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef
CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000
CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df02e1,2025-02-04T10:15:08.527000
CVE-2024-13735,0,0,5831f6a512bd98ee3e9e0b41a189da9a28ce9d6efc5226591d1a0439e0759ef9,2025-02-14T10:15:09.207000
CVE-2024-13736,1,1,642ff0262a392915ca94c3ffce9d077b9ffae6211006cc282752a825aa5395b6,2025-02-19T08:15:21.077000
CVE-2024-13736,0,0,642ff0262a392915ca94c3ffce9d077b9ffae6211006cc282752a825aa5395b6,2025-02-19T08:15:21.077000
CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000
CVE-2024-13740,0,0,ba6332fba984f0b615db8e6ca888f7060538e8c0e0b28351d9f7958c938b931d,2025-02-18T03:15:10.273000
CVE-2024-13741,0,0,175049f3021b19cf7fa751f03fe80f12100c24edbb7e3c159d12f4c96d5eb8a9,2025-02-18T02:15:13.047000
@ -246813,7 +246819,7 @@ CVE-2024-13848,0,0,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2c
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
CVE-2024-13850,0,0,6b9449e6648abb1edf82833d79485652b7d8e214965b03129c424b1f771ff336,2025-02-08T13:15:06.840000
CVE-2024-13852,0,0,face120ea95fed62ec099664fadaf77219da01c7521b566ddd6f702b5c620406,2025-02-18T05:15:19.423000
CVE-2024-13854,1,1,da76605e45e5cccb1e4ac357ef915fd87a7797a2aa194293a861365173d04915,2025-02-19T08:15:21.440000
CVE-2024-13854,0,0,da76605e45e5cccb1e4ac357ef915fd87a7797a2aa194293a861365173d04915,2025-02-19T08:15:21.440000
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
@ -273888,7 +273894,7 @@ CVE-2024-55997,0,0,4ddd75ddbd7e8cba6002090848d5f28f908b98196d746d4696bd512d6e85d
CVE-2024-55998,0,0,d76278d3c46a1747090a2639250ffe1cfc4ff55a8d82cdf9add0285b6a55398c,2024-12-16T15:15:26.957000
CVE-2024-55999,0,0,55efb565e9f4beedd46b3a3d41fbf23eb559d384546ca63d9e1d7ea34eac926b,2024-12-16T16:15:08.973000
CVE-2024-5600,0,0,9ec61c0439dd991245dd59b838c072ef06691da563abf803dab52d51cc92f007,2024-11-21T09:47:59.817000
CVE-2024-56000,0,0,98eaf7b7028e66950efacf06a763c8bf6ccd9da787828db0406c6b09b7ab5df1,2025-02-18T20:15:22.367000
CVE-2024-56000,0,1,2ee6d1a1730d8d4d1d5f47f7f3465648c21682535137d7a34a45989c97b14df8,2025-02-19T09:15:09.710000
CVE-2024-56001,0,0,5139231e1834dfdb01fa94db9cdc4fd99b8a1cdda6840a89cc6d0fd5e49e75db,2024-12-16T15:15:27.090000
CVE-2024-56002,0,0,70b793e56112c1d8aad25f7a55707ed0973d44dd20df2cf309c7250f5eece26e,2024-12-31T14:15:24.120000
CVE-2024-56003,0,0,00f6c93c049c9977ecf4fe9b8499c83382c15c3e34f2e2e2e82b604ea04338d0,2024-12-16T16:15:09.113000
@ -279102,7 +279108,7 @@ CVE-2025-0625,0,0,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06
CVE-2025-0626,0,0,0077dccae97439405bab713571a124bd093984b1ee0c361ef3ff1afd6c248462,2025-01-31T17:15:16.323000
CVE-2025-0630,0,0,a203846e431374935835f3b6e314fad6940377ee142abf426ce77275aa7cba26,2025-02-04T20:15:49.940000
CVE-2025-0631,0,0,a91b2711b77974f80919f9c5b372be80fd124e74c35c8b96965898a857e3e98a,2025-01-28T19:15:14.270000
CVE-2025-0633,1,1,cb8a197e6c4c53fc2cbfd67d19d376a8624ac2f322a88243266a770a17e4624b,2025-02-19T07:15:33.537000
CVE-2025-0633,0,0,cb8a197e6c4c53fc2cbfd67d19d376a8624ac2f322a88243266a770a17e4624b,2025-02-19T07:15:33.537000
CVE-2025-0635,0,0,70c8222d27016e17aff5c1d526075d61ce18278ab51b947a8b84bf01759f271d,2025-01-23T11:15:10.890000
CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000
CVE-2025-0638,0,0,d2f28f2eed7bea7b9f8ec19bd8fd1769a6b74ef8696049ed8fd676bfab511c4b,2025-01-22T16:15:29.977000
@ -279137,7 +279143,7 @@ CVE-2025-0707,0,0,5ea8e0d500b75ba8a0fc0cd19ceb093f4d4acd52cc281fb36710245d3d1c36
CVE-2025-0708,0,0,2c564dec190555666593be94185c7b92f00a312088bb857474e59f691fdbb07a,2025-01-24T20:15:34.200000
CVE-2025-0709,0,0,156b4593a93fa854ef60a86f01a55e00fa0c092a95e57a097f43efa6d6f6b8c5,2025-01-24T21:15:11.237000
CVE-2025-0710,0,0,d434afd262bceee38318c1978d6fd83eef213e4c7163f6e3a198919727021a6b,2025-01-24T21:15:11.420000
CVE-2025-0714,0,0,0057831ca66e3db49b7940154242ccfd79d407347a06e6c8cd85f6d31ee92f18,2025-02-17T12:15:27.570000
CVE-2025-0714,0,1,7a5ace77913ec81f29c63850fa9378895a034df434a64ef2c1dd7b18a728bf62,2025-02-19T09:15:09.863000
CVE-2025-0720,0,0,602262593ab5841efad088d2b78c277a4b7966a622beefaf31478d2cb3826706,2025-01-26T23:15:21.547000
CVE-2025-0721,0,0,9b15b019b479c4479137e55c74f2da2652b1f56c2d67e45558507ea73a96e795,2025-01-27T00:15:26.317000
CVE-2025-0722,0,0,d286657780f2322cec5dfe4e8af4674bbdc5e8a8b778a753270cdbdd213a2c1d,2025-01-27T00:15:26.517000
@ -279214,7 +279220,7 @@ CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e
CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000
CVE-2025-0862,0,0,dee81cd1ce38cab472cf28eb1ce5e1d9037dd3bdafbd545dddc7d172ac5b30e6,2025-02-11T11:15:16.043000
CVE-2025-0864,0,0,e56e1de16064acc329a5a32cc0ae2f68a867a09df61e368d37eca098dd9d89f8,2025-02-18T08:15:10.723000
CVE-2025-0865,1,1,80ee86109bc8176d915ab531176f207ba267c3135c04d72fc66dcd322326ed90,2025-02-19T08:15:21.853000
CVE-2025-0865,0,0,80ee86109bc8176d915ab531176f207ba267c3135c04d72fc66dcd322326ed90,2025-02-19T08:15:21.853000
CVE-2025-0867,0,0,00bdec3c0865b5f1af866315340e7f0b0b67377723af000ff55ae7ae60c91aed,2025-02-14T13:15:42.620000
CVE-2025-0869,0,0,c00b46e6ec082bb5acc28b4863ecc13d05083b8391495aa8cb5415a092650002,2025-02-07T17:15:31.307000
CVE-2025-0870,0,0,1d396f929e817f7895a91994ddee9c76172e4af1ca8cb701d53be58252025809,2025-01-30T13:15:10.483000
@ -279265,7 +279271,7 @@ CVE-2025-0971,0,0,633a244c07788fdbfdfdcc8863df0b7c407fe050fbfbd58b149dfe7ef4b5bb
CVE-2025-0972,0,0,5f696e03d949e1a49551d14d8f8b313b3e334794f668dc156f7f61acec16e7d4,2025-02-03T00:15:28.007000
CVE-2025-0973,0,0,43196315f17909695c2c467d44bd1754687d87efefe1c24665042841ac303abc,2025-02-03T01:15:07.263000
CVE-2025-0974,0,0,ed110dbaf1b5b967bb38884e7ebb961da1c8692b7e1576cd2f418134ffba9e99,2025-02-03T02:15:26.433000
CVE-2025-0981,0,0,391f0270940545eeab79a2413ce96d042a150190fc332923a976cf357e240945,2025-02-18T10:15:10.333000
CVE-2025-0981,0,1,c309731b7ff9893538036e27f735501df9811f94653975fc38c99f19642038c5,2025-02-19T09:15:09.993000
CVE-2025-0982,0,0,743f39b6fc5d357ba3083d9f8f3d69f42ae53e58d798d8fd1e36d71ec2810d37,2025-02-06T12:15:27.267000
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
CVE-2025-0994,0,0,b317a7cd26062958ea654021aa4ef82b6a50be87030a20bb16c21acb6e3b9a13,2025-02-12T19:29:30.383000
@ -279277,6 +279283,7 @@ CVE-2025-1002,0,0,afe3f2c2566c1814726647f8d465ff61266ff8daa4d1910e361f2c337de6f5
CVE-2025-1003,0,0,a253a97b9e0ffcf187092a253ddad8abdb5c903dd7624752d4fb1eb824915a62,2025-02-04T00:15:33.940000
CVE-2025-1004,0,0,4a7f8cac81e12783758f25e1faabe55e828c523da43d9ab1c43c4f1351fb035e,2025-02-06T21:15:22.247000
CVE-2025-1005,0,0,97e80c2f89c5e160cce39e83fa7ef13a9325fdfdb9706abd6a322ead72dbefb2,2025-02-15T10:15:08.740000
CVE-2025-1007,1,1,9f58e9f8dcb0dfafd40422a755b6dd838264ac08d3139ea382726a554d1827d6,2025-02-19T09:15:10.117000
CVE-2025-1009,0,0,2eaef1afd010c535fd50fceaedaa339dbea694d459d94247ca2cdf1816ccd1a0,2025-02-06T19:28:52.820000
CVE-2025-1010,0,0,62a03586b01b5384628b2b24394869ef4f272c9b8354e05188dae652a849042c,2025-02-06T19:30:13.637000
CVE-2025-1011,0,0,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c93d,2025-02-06T19:31:38.610000
@ -279291,6 +279298,7 @@ CVE-2025-1019,0,0,97756c2ae277aabeaedab68cc3d112cc358adac0f1529efc7a271f2ce7df17
CVE-2025-1020,0,0,cf2c558f0a30d0c315344260ca52b6874799bcd8941b5300ae30cd6ec90d92d0,2025-02-06T21:15:22.943000
CVE-2025-1022,0,0,6e0bbfd94dedae55deabfe77a158c108c89075d5003cd8db6b7f154724b291e0,2025-02-05T20:15:45.470000
CVE-2025-1023,0,0,39df3b4906147b7a327b7abf854deb2df3fce38458ba003b8ff0de0bf894760f,2025-02-18T10:15:10.500000
CVE-2025-1024,1,1,ed4a0103ce1a587d6b8e89274d412a572e44ce4224afbc332cb8a5ea9879c094,2025-02-19T09:15:10.280000
CVE-2025-1025,0,0,88de3d5b0a73f8ebb31a09c003423921c8f28cb5c5fcc232fde8c177bdee9679,2025-02-05T20:15:45.593000
CVE-2025-1026,0,0,035fc1dc2474697a852e52233cc9d299f677e1a0207511b21278e18a7e117de5,2025-02-05T05:15:10.687000
CVE-2025-1028,0,0,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000
@ -279309,6 +279317,7 @@ CVE-2025-1070,0,0,5146e4f08b2531ff82fc620bde7cb0c34c86b4487a1fbc38c78ecd14320161
CVE-2025-1071,0,0,7cf48f5c0704f7102ee404aa34c514af5ccf3668a768a5efc6948bb3495dcf52,2025-02-14T14:15:32.560000
CVE-2025-1072,0,0,bb0514ae35802411e3da1596896cb302b1b469b7b79e6814634b3c15db99cbed,2025-02-07T04:15:07.737000
CVE-2025-1074,0,0,1377d1b0ab3296a33846cd316ab7610f3b7b42a12867cb031730fad4726b7a65,2025-02-06T14:15:30.050000
CVE-2025-1075,1,1,b9890760d1f9da8be37b0ea9ac5eb4b3e3178e3338d18497828b678282b4b2d7,2025-02-19T10:15:09.043000
CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000
CVE-2025-1077,0,0,735be86b3f6fc3d707f047f96e1dd513fa1d8afd61d55b887dfbb34478c5ed44,2025-02-07T09:15:08.380000
CVE-2025-1078,0,0,45cc25c666904d6c96dae20f5f19955cbc17db65c9b5b7f07b6396203ce702c3,2025-02-06T17:15:21.040000
@ -279337,6 +279346,10 @@ CVE-2025-1116,0,0,1900baef94df31cdc087bd9edd3d7c5b346aa1791e055e2d94009a8615107e
CVE-2025-1117,0,0,2322fdff6f8393d6ada2664cbf25a349bfc8c7b701fcb01c2d988bad4837c701,2025-02-08T13:15:07.843000
CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000
CVE-2025-1127,0,0,964bb8e082be5f4c3ffe02b7d66d3573c4a806865108fd7e7f64bea0f60eef31,2025-02-13T19:15:14.153000
CVE-2025-1132,1,1,a54d6d00723bbeea5fc156acc54289b0e557a1f1b96ae4af380b54c8586a4ae0,2025-02-19T09:15:10.417000
CVE-2025-1133,1,1,077b3b4fa4c5c74cfca1b9886406871d5d029081fc0f7c73cd8b5fa07fa2c5d3,2025-02-19T09:15:10.550000
CVE-2025-1134,1,1,c96645df83383e6ea20c2c4fb684ee084917bc1d0fed815f4b11bbaeed7ba4dc,2025-02-19T09:15:10.687000
CVE-2025-1135,1,1,b7ed9a1e2697abbe26b8e6bcf33a5eccbddc8e91b444cb8fb8af449ace3fcf99,2025-02-19T09:15:10.823000
CVE-2025-1143,0,0,304257e291412914759d8dd1547bfdc8737e5d301b764158390fad46e11d8a73,2025-02-18T18:15:29.750000
CVE-2025-1144,0,0,c007a9248005240176adbf0d59d7e143608bdb0bc1952b89f1043c4b3e3f4a74,2025-02-11T06:15:20.310000
CVE-2025-1145,0,0,d6e4f6830b1d5bec32355229d5ad379784daf94076f4978b41c854d102fa122e,2025-02-18T18:15:29.940000

Can't render this file because it is too large.