Auto-Update: 2025-01-30T11:00:23.694407+00:00

This commit is contained in:
cad-safe-bot 2025-01-30 11:03:50 +00:00
parent a60318688d
commit 65267e8477
11 changed files with 508 additions and 14 deletions

View File

@ -2,9 +2,16 @@
"id": "CVE-2024-12236",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2024-12-10T15:15:07.147",
"lastModified": "2024-12-10T15:15:07.147",
"lastModified": "2025-01-30T09:15:07.970",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve-coordination@google.com",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-13694",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-30T09:15:08.180",
"lastModified": "2025-01-30T09:15:08.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WooCommerce Wishlist (High customization, fast setup,Free Elementor Wishlist, most features) plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.8.7 via the download_pdf_file() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to extract data from wishlists that they should not have access to."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/smart-wishlist-for-more-convert/trunk/includes/class-wlfmc-form-handler.php#L607",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/smart-wishlist-for-more-convert/trunk/includes/class-wlfmc-wishlist.php#L529",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3229758/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/smart-wishlist-for-more-convert/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/59fe7630-ab94-419f-aca5-39b74d86ae4e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-13732",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-30T09:15:08.363",
"lastModified": "2025-01-30T09:15:08.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Responsive Blocks \u2013 WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018section_tag\u2019 parameter in all versions up to, and including, 1.9.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/responsive-block-editor-addons/trunk/src/blocks/post-carousel/index.php#L643",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3231017/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/responsive-block-editor-addons",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c0e5c85-72c3-4f09-aade-ec5a82b9cc41?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-13758",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-30T09:15:08.547",
"lastModified": "2025-01-30T09:15:08.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The CP Contact Form with PayPal plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.52. This is due to missing or incorrect nonce validation on the cp_contact_form_paypal_check_init_actions() function. This makes it possible for unauthenticated attackers to add discount codes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/cp-contact-form-with-paypal/trunk/cp_contactformpp_functions.php#L616",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3230873/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/cp-contact-form-with-paypal/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/495183b6-dc7c-4ff7-bc99-fc05a10d1269?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0834",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-30T09:15:09.703",
"lastModified": "2025-01-30T09:15:09.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Privilege escalation vulnerability has been found in Wondershare Dr.Fone version 13.5.21. This vulnerability could allow an attacker to escalate privileges by replacing the binary \u2018C:\\ProgramData\\Wondershare\\wsServices\\ElevationService.exe\u2019 with a malicious binary. This binary will be executed by SYSTEM automatically."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/wondershare-drfone-privilege-scalation-vulnerability",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-0860",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-30T10:15:08.723",
"lastModified": "2025-01-30T10:15:08.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The VR-Frases (collect & share quotes) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via several parameters in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.svn.wordpress.org/vr-frases/tags/3.0.1/includes/vr-frases-admin.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5ea3e03-fafa-431e-b1fe-a527f491da79?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-0861",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-30T10:15:08.907",
"lastModified": "2025-01-30T10:15:08.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The VR-Frases (collect & share quotes) plugin for WordPress is vulnerable to SQL Injection via several parameters in all versions up to, and including, 3.0.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.svn.wordpress.org/vr-frases/tags/3.0.1/includes/vr-frases-admin.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d9d5afb-d38d-442c-8511-f1683739a1da?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-21107",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-01-30T10:15:09.100",
"lastModified": "2025-01-30T10:15:09.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell NetWorker, version(s) prior to 19.11.0.3, all versions of 19.10 & prior versions contain(s) an Unquoted Search Path or Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000278811/dsa-2025-064-security-update-for-dell-networker-networker-virtual-edition-and-networker-management-console-multiple-component-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2025-23007",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2025-01-30T10:15:09.283",
"lastModified": "2025-01-30T10:15:09.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the NetExtender Windows client log export function allows unauthorized access to sensitive Windows system files, potentially leading to privilege escalation."
}
],
"metrics": {},
"weaknesses": [
{
"source": "PSIRT@sonicwall.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0005",
"source": "PSIRT@sonicwall.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-30T09:00:28.840439+00:00
2025-01-30T11:00:23.694407+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-30T08:15:26.690000+00:00
2025-01-30T10:15:09.283000+00:00
```
### Last Data Feed Release
@ -33,22 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
279432
279440
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `8`
- [CVE-2024-13457](CVE-2024/CVE-2024-134xx/CVE-2024-13457.json) (`2025-01-30T07:15:07.067`)
- [CVE-2024-13470](CVE-2024/CVE-2024-134xx/CVE-2024-13470.json) (`2025-01-30T08:15:26.690`)
- [CVE-2024-13642](CVE-2024/CVE-2024-136xx/CVE-2024-13642.json) (`2025-01-30T07:15:08.700`)
- [CVE-2024-13694](CVE-2024/CVE-2024-136xx/CVE-2024-13694.json) (`2025-01-30T09:15:08.180`)
- [CVE-2024-13732](CVE-2024/CVE-2024-137xx/CVE-2024-13732.json) (`2025-01-30T09:15:08.363`)
- [CVE-2024-13758](CVE-2024/CVE-2024-137xx/CVE-2024-13758.json) (`2025-01-30T09:15:08.547`)
- [CVE-2025-0834](CVE-2025/CVE-2025-08xx/CVE-2025-0834.json) (`2025-01-30T09:15:09.703`)
- [CVE-2025-0860](CVE-2025/CVE-2025-08xx/CVE-2025-0860.json) (`2025-01-30T10:15:08.723`)
- [CVE-2025-0861](CVE-2025/CVE-2025-08xx/CVE-2025-0861.json) (`2025-01-30T10:15:08.907`)
- [CVE-2025-21107](CVE-2025/CVE-2025-211xx/CVE-2025-21107.json) (`2025-01-30T10:15:09.100`)
- [CVE-2025-23007](CVE-2025/CVE-2025-230xx/CVE-2025-23007.json) (`2025-01-30T10:15:09.283`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2024-12236](CVE-2024/CVE-2024-122xx/CVE-2024-12236.json) (`2025-01-30T09:15:07.970`)
## Download and Usage

View File

@ -245313,7 +245313,7 @@ CVE-2024-12232,0,0,77e6bcdf869c1b2c2ff00e17ec72efc5854b4ce8067c2c9fccf0d3cc1c2d3
CVE-2024-12233,0,0,d89c9263a4f22f201b1dce8be51578aec307181a11a72f57d5d6a093a558942d,2024-12-10T23:24:57.237000
CVE-2024-12234,0,0,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000
CVE-2024-12235,0,0,92689efaa37165c78224efb1efe409523be7fb3f3558d4576511504eb96aac91,2024-12-05T18:15:21.660000
CVE-2024-12236,0,0,390d11985338138a2913d618c1818ae388b2b2c32249174c40691687eabfe343,2024-12-10T15:15:07.147000
CVE-2024-12236,0,1,f78ff3b6e1937e0a0b8855ba0165cfb50cc78b4d879a8a6174545df90419a7d2,2025-01-30T09:15:07.970000
CVE-2024-12237,0,0,bc9c0d4c537bace6ba73f5084a4978adc8d5b928619c3c4d0e52cb7bef9d5351,2025-01-03T23:15:06.473000
CVE-2024-12238,0,0,0b2506120279c72470fe6ced119aba981e066d08bdac68bd9b96e39e9d942dde,2024-12-29T06:15:05.487000
CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d141,2024-12-17T03:15:06.710000
@ -246225,12 +246225,12 @@ CVE-2024-13449,0,0,b603466190e6e620bd51a093bef2226b1aa9a640893cd2b54c10f03577e6c
CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649da,2024-11-21T08:50:22.667000
CVE-2024-13450,0,0,6d0c6e9ad465925bb0f00b48f72e6f84db20d9e217507e863ef423d4f9e1193a,2025-01-25T09:15:07.733000
CVE-2024-13454,0,0,14313d18c59abf0795f9e65c924b2232675b3f5fcf8c69fe1d32af5f5cac5a65,2025-01-21T20:15:30.793000
CVE-2024-13457,1,1,ee21f13468edd90777973ef610f3f5c579a070972ee0693035f0f1c680be9101,2025-01-30T07:15:07.067000
CVE-2024-13457,0,0,ee21f13468edd90777973ef610f3f5c579a070972ee0693035f0f1c680be9101,2025-01-30T07:15:07.067000
CVE-2024-13458,0,0,a0d55037d220aaf8fdb1343c6a981e032ff9c796368506b8230ae875396a583f,2025-01-25T08:15:09.337000
CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000
CVE-2024-13467,0,0,bcd6474463b1a69c9a46d9b4d6f6f02b302b85f9777a4b31585c7467fbf3f38a,2025-01-25T08:15:09.520000
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
CVE-2024-13470,1,1,cd366f2d848ecaaaa8e2a5a38b4333677f61cb3a569faf0b3b65023a656393a3,2025-01-30T08:15:26.690000
CVE-2024-13470,0,0,cd366f2d848ecaaaa8e2a5a38b4333677f61cb3a569faf0b3b65023a656393a3,2025-01-30T08:15:26.690000
CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000
CVE-2024-13484,0,0,712c057c7d39146a8afa657b40a8d67e5499db561a28666fb52dbcced8221de3,2025-01-28T19:15:13.753000
CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000
@ -246280,7 +246280,7 @@ CVE-2024-1361,0,0,8a11a93152fbfa05be2934d541581f2e8e8c1350c348ceb554a6a47ec08e0e
CVE-2024-1362,0,0,ebe61894e3dd1fecb8d4711188e9d8f7e6a2ff043508a2ee93131b033a0336dd,2025-01-15T18:40:30.490000
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
CVE-2024-13642,1,1,305a541671cd97a16b24d4e91a357de627282533e6d955bf781fd96606eff81c,2025-01-30T07:15:08.700000
CVE-2024-13642,0,0,305a541671cd97a16b24d4e91a357de627282533e6d955bf781fd96606eff81c,2025-01-30T07:15:08.700000
CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000
CVE-2024-13659,0,0,2ab949cac371b153f030d675a94a51cc0bb444218e14414679e2bc62713fba54,2025-01-24T06:15:26.557000
CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000
@ -246289,6 +246289,7 @@ CVE-2024-1368,0,0,e78cd290aff3eda879ea71814281e9fb9dbaef60630fac7d18ff14dae3d223
CVE-2024-13680,0,0,f3164c1a021ffb39e27590d49b20eab131951c6817a6dc8655e0dfc9f53950e4,2025-01-24T07:15:06.930000
CVE-2024-13683,0,0,afca8ca5733f1981ab92ff6f92163a36f62ba84bc4cae91c9eb4b4db6612f745,2025-01-24T07:15:08.523000
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
CVE-2024-13694,1,1,ebe38224e859cd407ff4de74de6e70b014035e321c635173f5352f302ebed11f,2025-01-30T09:15:08.180000
CVE-2024-13696,0,0,1705bcf2f6a6958e20414c0c17b533dd95f6dfcba36bb76e0b9f7d75e553f199,2025-01-29T08:15:19.677000
CVE-2024-13698,0,0,dc17e4312525981bb14f68ea913383417af07334780551d0e9684f2f5489da45,2025-01-24T16:15:34.597000
CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000
@ -246297,8 +246298,10 @@ CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8
CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000
CVE-2024-13721,0,0,1ec94cb9c62b02c9472486b901c3addbef65df476872a8f8db6b902dfdcff790,2025-01-25T06:15:27.860000
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
CVE-2024-13732,1,1,b775a3a52bd8c32b27fbee5637d183d86ad28923005f664ac49c2fca8b421b84,2025-01-30T09:15:08.363000
CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000
CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000
CVE-2024-13758,1,1,a097fd11965a28b272757c9dfc06c78d140777aeb26eb25ec8fe43c25c2e8873,2025-01-30T09:15:08.547000
CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
@ -278012,6 +278015,7 @@ CVE-2025-0802,0,0,25d4724a5f59ec41d081db9fe30f350340de9808525e7ebdb2de0977ada211
CVE-2025-0803,0,0,3f62b1106b9b241043cd75bd2f1af692daaa38b2e387b0f59bc1dafe03d8bba2,2025-01-29T02:15:27.723000
CVE-2025-0804,0,0,92d829297868e08fc58c84215de89a1b6c3e7063565ee446f2d16b4211c5e258,2025-01-29T04:15:07.193000
CVE-2025-0806,0,0,457ccc849d51cf01d8a6f731c86ad5d9c7b0b2b236df12a7bec76c069f344e74,2025-01-29T03:15:06.900000
CVE-2025-0834,1,1,69d4601cb385a5207b3f60f39c37ba05447d3080f10cb05b9f81bad71cc46120,2025-01-30T09:15:09.703000
CVE-2025-0840,0,0,a7c58fa4e0ce69af30f8715823f12410e36099cec55a9762135e8f1b574089a6,2025-01-29T20:15:35.007000
CVE-2025-0841,0,0,5bffa2ec7965608d2e54d39bbd52de0c242469924a21cfc1ceec4dd7102b7d58,2025-01-29T21:15:20.973000
CVE-2025-0842,0,0,38cc4a8025ec24c462922fa371791c66c4862e27e0e666a0e81248517d26bffc,2025-01-29T22:15:30.283000
@ -278022,6 +278026,8 @@ CVE-2025-0847,0,0,0a7600abd9c4c4a8ba48a01fbe3301dceafaf8bc59cdeac7b4d5032a63057f
CVE-2025-0848,0,0,29b23e58777e7d4680c64590420c76142330bc9428b559d8eda7ca20b5e2d7bb,2025-01-30T02:15:25.597000
CVE-2025-0849,0,0,2080b1314603620cb3f8746fb1f255655b1b7caaf0a70104b6b1966e3468cbf3,2025-01-30T02:15:25.783000
CVE-2025-0851,0,0,49552e625992bdb3a412aeacb5ef8fcb2bb7c90acfd6cc180846494a5bc52610,2025-01-29T22:15:30.463000
CVE-2025-0860,1,1,57eb159251c47f86690502a6468f7bb73145fb297d274d97d9f0ac6ac7ddded6,2025-01-30T10:15:08.723000
CVE-2025-0861,1,1,62f8d40ca04d4b5490a690c9c53c17fca5090134b2a22ca70beef3bfaf8e9ef0,2025-01-30T10:15:08.907000
CVE-2025-20014,0,0,708b5660539e4ab2830a732991daead462d3c8df88b4205953edf58b017cb8b0,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
@ -278047,6 +278053,7 @@ CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a16501
CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000
CVE-2025-21101,0,0,1ef0167ef283dbabcdd7bd0e2debfd81378d1bf596b30170903b5a150ed83abb,2025-01-15T05:15:09.097000
CVE-2025-21102,0,0,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000
CVE-2025-21107,1,1,f6a3cd48c035c96b02630639e70765c960bf1a51a6020aecdb61017fadef6d98,2025-01-30T10:15:09.100000
CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000
CVE-2025-21122,0,0,ea413e582ae453fe56a0d16448a41ab087511f8fc84dce169b1dd1e0cebc7d9c,2025-01-14T19:15:33.070000
CVE-2025-21127,0,0,f4bc482a58e381a20321cbbdeaa050ed9cde9073a4c43797f44f5c980d42dfdf,2025-01-14T19:15:33.230000
@ -278713,6 +278720,7 @@ CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c597
CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000
CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000
CVE-2025-23006,0,0,b3740c3859b8a4699d7be6a4cb26c3615e83be583cc4689a6f760ded3dcd5dec,2025-01-27T18:41:17.650000
CVE-2025-23007,1,1,701c6b7319256781b35f2ac3ce69cecd8bf921f3065b0394fe019c623e4f41ae,2025-01-30T10:15:09.283000
CVE-2025-23011,0,0,6ddf557c800a2528d5545b3d7911f3e609af1e4dccfa1a674d933303fd996813,2025-01-23T21:15:15.010000
CVE-2025-23012,0,0,6b2b3bdfc203a9a9abe46f57ea7f825047d32c413c20c9ae87597afaa81bd3df,2025-01-23T21:15:15.173000
CVE-2025-23013,0,0,1fb74d6ea76ff5844d786cdd2a74f412fea41ae3954a5796fa59991a0a874edb,2025-01-16T22:15:40.520000

Can't render this file because it is too large.