Auto-Update: 2025-02-05T03:00:38.333123+00:00

This commit is contained in:
cad-safe-bot 2025-02-05 03:04:05 +00:00
parent 25c0a7b52b
commit 65ffd999cb
19 changed files with 521 additions and 101 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-19410",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-11-21T16:29:00.347",
"lastModified": "2025-02-04T16:15:30.963",
"lastModified": "2025-02-05T02:00:01.767",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -86,6 +86,10 @@
}
]
},
"cisaExploitAdd": "2025-02-04",
"cisaActionDue": "2025-02-25",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Paessler PRTG Network Monitor Local File Inclusion Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9276",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-07-02T16:29:00.600",
"lastModified": "2025-02-04T16:15:31.603",
"lastModified": "2025-02-05T02:00:01.767",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -84,6 +84,10 @@
}
]
},
"cisaExploitAdd": "2025-02-04",
"cisaActionDue": "2025-02-25",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Paessler PRTG Network Monitor OS Command Injection Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13335",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-24T11:15:07.973",
"lastModified": "2025-01-24T11:15:07.973",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-05T01:37:46.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:templatescoder:spexo_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.15",
"matchCriteriaId": "4F105988-7B06-446F-91B4-0678246B8067"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3227353/sastra-essential-addons-for-elementor/trunk/inc/wizard/wizard-ajax-api.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4edc7ef9-33db-4433-8ef2-cd06089ee8d5?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13354",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-24T11:15:08.887",
"lastModified": "2025-01-24T11:15:08.887",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-05T01:36:55.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cyberchimps:responsive_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6.5",
"matchCriteriaId": "94445C04-EB66-4616-850A-ED63DDB4A2F7"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3226779%40responsive-addons-for-elementor&new=3226779%40responsive-addons-for-elementor&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c46d71fb-ccf1-4cbe-8088-edb7fba225e9?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13408",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-24T11:15:09.043",
"lastModified": "2025-01-24T11:15:09.043",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-05T01:37:13.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -36,29 +36,83 @@
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pickplugins:post_grid:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7",
"matchCriteriaId": "E6088334-1942-4C11-89B2-963D748B5EEA"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3227281/post-grid-carousel-ultimate/tags/1.7/includes/classes/shortcode.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff346465-62c2-4a2b-8a4a-c88558d7cabd?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13409",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-24T11:15:09.213",
"lastModified": "2025-01-24T11:15:09.213",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-05T01:36:36.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -36,37 +36,97 @@
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpwax:post_grid\\,_slider_\\&_carousel_ultimate:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7",
"matchCriteriaId": "AC5313B7-8A99-4B78-945C-3D410468DB47"
}
]
}
]
}
],
"references": [
{
"url": "https://ja.wordpress.org/plugins/post-grid-carousel-ultimate/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/post-grid-carousel-ultimate/tags/1.6.10/includes/classes/ajax.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3227281/post-grid-carousel-ultimate/tags/1.7/includes/classes/ajax.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/38672a45-b7a7-445f-9e77-7050df6920fa?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13542",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-24T11:15:09.377",
"lastModified": "2025-01-24T11:15:09.377",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-05T01:35:33.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:agenceseo:wp_google_street_view:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.4",
"matchCriteriaId": "07E98D68-890A-457F-8224-728263872E1A"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227140%40wp-google-street-view&new=3227140%40wp-google-street-view&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b1944a9-4bc4-4ac2-83c3-55d6d61f405c?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13572",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-24T11:15:09.520",
"lastModified": "2025-01-24T11:15:09.520",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-05T01:25:51.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nfusionsolutions:precious_metals_charts_and_widgets:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.9",
"matchCriteriaId": "EBF191BC-66D2-44ED-9586-ECFC241846FE"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227123%40precious-metals-chart-and-widgets&new=3227123%40precious-metals-chart-and-widgets&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f2c8c5f-2017-4b22-a864-dc142b3b1afb?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13583",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-24T10:15:07.770",
"lastModified": "2025-01-24T10:15:07.770",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-05T01:38:33.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:come2theweb:simple_gallery_with_filter:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.1",
"matchCriteriaId": "820ED387-41D1-450A-9C0D-56612DD8C364"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/simple-gallery-with-filter/trunk/simple-gallery-with-filter.php#L377",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227234%40simple-gallery-with-filter&new=3227234%40simple-gallery-with-filter&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c088264-64a2-4a36-ae3b-fdf60f3837e2?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13722",
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"published": "2025-02-04T22:15:40.113",
"lastModified": "2025-02-04T22:15:40.113",
"lastModified": "2025-02-05T01:15:08.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -36,6 +36,14 @@
{
"url": "https://www.nagvis.org/downloads/changelog/1.9.42",
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Feb/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/02/04/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13723",
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
"published": "2025-02-04T22:15:40.227",
"lastModified": "2025-02-04T22:15:40.227",
"lastModified": "2025-02-05T01:15:08.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -36,6 +36,14 @@
{
"url": "https://www.nagvis.org/downloads/changelog/1.9.42",
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Feb/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/02/04/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29059",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-03-23T00:15:09.150",
"lastModified": "2025-01-08T18:33:02.303",
"lastModified": "2025-02-05T02:00:01.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -39,6 +39,10 @@
}
]
},
"cisaExploitAdd": "2025-02-04",
"cisaActionDue": "2025-02-25",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft .NET Framework Information Disclosure Vulnerability",
"weaknesses": [
{
"source": "secure@microsoft.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45195",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-04T09:15:04.397",
"lastModified": "2024-11-21T09:37:28.073",
"lastModified": "2025-02-05T02:00:01.767",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -59,6 +59,10 @@
}
]
},
"cisaExploitAdd": "2025-02-04",
"cisaActionDue": "2025-02-25",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Apache OFBiz Forced Browsing Vulnerability",
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,13 +2,20 @@
"id": "CVE-2025-23087",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-22T02:15:34.080",
"lastModified": "2025-01-23T22:15:16.260",
"lastModified": "2025-02-05T02:15:28.267",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "support@hackerone.com",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
"value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\nNOTE: use of the CVE List to report that a product is unsupported, without reference to a specific defect, is novel and the CVE Program is actively assessing both the validity and potential value of this approach.\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
},
{
"lang": "es",

View File

@ -2,13 +2,20 @@
"id": "CVE-2025-23088",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-22T02:15:34.207",
"lastModified": "2025-01-23T22:15:16.370",
"lastModified": "2025-02-05T02:15:28.413",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "support@hackerone.com",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
"value": "NOTE: use of the CVE List to report that a product is unsupported, without reference to a specific defect, is novel and the CVE Program is actively assessing both the validity and potential value of this approach.\r\n\r\nThis CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
},
{
"lang": "es",

View File

@ -2,13 +2,20 @@
"id": "CVE-2025-23089",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-22T02:15:34.327",
"lastModified": "2025-01-23T22:15:16.460",
"lastModified": "2025-02-05T02:15:28.517",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "support@hackerone.com",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
"value": "NOTE: use of the CVE List to report that a product is unsupported, without reference to a specific defect, is novel and the CVE Program is actively assessing both the validity and potential value of this approach.\r\n\r\nThis CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
},
{
"lang": "es",

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-23114",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-02-05T02:15:28.610",
"lastModified": "2025-02-05T02:15:28.610",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Veeam Updater component allows Man-in-the-Middle attackers to execute arbitrary code on the affected server. This issue occurs due to a failure to properly validate TLS certificate."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://www.veeam.com/kb4712",
"source": "support@hackerone.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-05T00:55:19.822768+00:00
2025-02-05T03:00:38.333123+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-05T00:15:28.173000+00:00
2025-02-05T02:15:28.610000+00:00
```
### Last Data Feed Release
@ -27,37 +27,42 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-02-04T01:00:10.100475+00:00
2025-02-05T01:00:04.367301+00:00
```
### Total Number of included CVEs
```plain
280097
280098
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `1`
- [CVE-2023-39943](CVE-2023/CVE-2023-399xx/CVE-2023-39943.json) (`2025-02-04T23:15:08.237`)
- [CVE-2023-40222](CVE-2023/CVE-2023-402xx/CVE-2023-40222.json) (`2025-02-04T23:15:08.413`)
- [CVE-2024-11467](CVE-2024/CVE-2024-114xx/CVE-2024-11467.json) (`2025-02-04T23:15:08.580`)
- [CVE-2024-11468](CVE-2024/CVE-2024-114xx/CVE-2024-11468.json) (`2025-02-04T23:15:08.717`)
- [CVE-2024-48445](CVE-2024/CVE-2024-484xx/CVE-2024-48445.json) (`2025-02-04T23:15:08.850`)
- [CVE-2024-53962](CVE-2024/CVE-2024-539xx/CVE-2024-53962.json) (`2025-02-05T00:15:27.410`)
- [CVE-2024-53963](CVE-2024/CVE-2024-539xx/CVE-2024-53963.json) (`2025-02-05T00:15:27.580`)
- [CVE-2024-53964](CVE-2024/CVE-2024-539xx/CVE-2024-53964.json) (`2025-02-05T00:15:27.723`)
- [CVE-2024-53965](CVE-2024/CVE-2024-539xx/CVE-2024-53965.json) (`2025-02-05T00:15:27.870`)
- [CVE-2024-53966](CVE-2024/CVE-2024-539xx/CVE-2024-53966.json) (`2025-02-05T00:15:28.023`)
- [CVE-2025-0413](CVE-2025/CVE-2025-04xx/CVE-2025-0413.json) (`2025-02-05T00:15:28.173`)
- [CVE-2025-23114](CVE-2025/CVE-2025-231xx/CVE-2025-23114.json) (`2025-02-05T02:15:28.610`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `16`
- [CVE-2014-0546](CVE-2014/CVE-2014-05xx/CVE-2014-0546.json) (`2025-02-04T23:15:07.950`)
- [CVE-2018-19410](CVE-2018/CVE-2018-194xx/CVE-2018-19410.json) (`2025-02-05T02:00:01.767`)
- [CVE-2018-9276](CVE-2018/CVE-2018-92xx/CVE-2018-9276.json) (`2025-02-05T02:00:01.767`)
- [CVE-2024-13335](CVE-2024/CVE-2024-133xx/CVE-2024-13335.json) (`2025-02-05T01:37:46.517`)
- [CVE-2024-13354](CVE-2024/CVE-2024-133xx/CVE-2024-13354.json) (`2025-02-05T01:36:55.960`)
- [CVE-2024-13408](CVE-2024/CVE-2024-134xx/CVE-2024-13408.json) (`2025-02-05T01:37:13.827`)
- [CVE-2024-13409](CVE-2024/CVE-2024-134xx/CVE-2024-13409.json) (`2025-02-05T01:36:36.047`)
- [CVE-2024-13542](CVE-2024/CVE-2024-135xx/CVE-2024-13542.json) (`2025-02-05T01:35:33.207`)
- [CVE-2024-13572](CVE-2024/CVE-2024-135xx/CVE-2024-13572.json) (`2025-02-05T01:25:51.813`)
- [CVE-2024-13583](CVE-2024/CVE-2024-135xx/CVE-2024-13583.json) (`2025-02-05T01:38:33.527`)
- [CVE-2024-13722](CVE-2024/CVE-2024-137xx/CVE-2024-13722.json) (`2025-02-05T01:15:08.323`)
- [CVE-2024-13723](CVE-2024/CVE-2024-137xx/CVE-2024-13723.json) (`2025-02-05T01:15:08.440`)
- [CVE-2024-29059](CVE-2024/CVE-2024-290xx/CVE-2024-29059.json) (`2025-02-05T02:00:01.767`)
- [CVE-2024-45195](CVE-2024/CVE-2024-451xx/CVE-2024-45195.json) (`2025-02-05T02:00:01.767`)
- [CVE-2025-23087](CVE-2025/CVE-2025-230xx/CVE-2025-23087.json) (`2025-02-05T02:15:28.267`)
- [CVE-2025-23088](CVE-2025/CVE-2025-230xx/CVE-2025-23088.json) (`2025-02-05T02:15:28.413`)
- [CVE-2025-23089](CVE-2025/CVE-2025-230xx/CVE-2025-23089.json) (`2025-02-05T02:15:28.517`)
## Download and Usage

View File

@ -65026,7 +65026,7 @@ CVE-2014-0542,0,0,fbbae5aa5bd2b99837b91bc5a55d0d23bc0909ce012aa658a0a70de3681197
CVE-2014-0543,0,0,b274c780f0466077acaf027916a755319f6e77f2db6123359b58b5b34ee1a354,2024-11-21T02:02:21.360000
CVE-2014-0544,0,0,0fa0ea93aa9a3f0a22963adfb2e80712f5ab07190ea3e8b339366579d2c88455,2024-11-21T02:02:21.500000
CVE-2014-0545,0,0,528d5e5b2f44f2a0536e86fe2e8c2c1c24a8ab5b69df4e81e30d9f0fa2293a72,2024-11-21T02:02:21.623000
CVE-2014-0546,0,1,5ba5cfcc1a82a7200d1de1b761989cd76312a5d0d561fd2749f70459e5df9db2,2025-02-04T23:15:07.950000
CVE-2014-0546,0,0,5ba5cfcc1a82a7200d1de1b761989cd76312a5d0d561fd2749f70459e5df9db2,2025-02-04T23:15:07.950000
CVE-2014-0547,0,0,b30a2293b7d47a6ccba0e0df5c871196625c5e65ff5adfc657babd1c1b1be8ed,2024-11-21T02:02:21.870000
CVE-2014-0548,0,0,fb4c5f4dc7a5879154d5c4c94ade40155233e90da3caaeda714406abdcecdd40,2024-11-21T02:02:22.010000
CVE-2014-0549,0,0,0d1e6ae4e25c16d5596402e35fb70d20b3121eb60ba76da993d65abdfa62050a,2024-11-21T02:02:22.150000
@ -119242,7 +119242,7 @@ CVE-2018-19406,0,0,43a6b9abcb935b102d54df72d8bec105050eff0847d09bee05a843fd0844c
CVE-2018-19407,0,0,24fea91ce6b2e274d978c9dab0a2381b2df1539d9b3c9be92ca0e5747b6e9a79,2024-11-21T03:57:51.883000
CVE-2018-19409,0,0,1876e55a2d65afba0be02ce8a4b2444f17432a36bc272a7f6b07999057ecb22f,2024-11-21T03:57:52.067000
CVE-2018-1941,0,0,7221aec0ebd68fd329a49613886292da9a4f97973fdf56aa45caaa0dfabf726c,2024-11-21T04:00:38.130000
CVE-2018-19410,0,0,9ea6f866e5c7e8905aa7260db22ca43a297aefa8acf8dd23373d75a72b6c93ba,2025-02-04T16:15:30.963000
CVE-2018-19410,0,1,3c3e182d325d17685928baf094ba73945add27a392163f3ff03155eb6d1891c8,2025-02-05T02:00:01.767000
CVE-2018-19411,0,0,af45ed89010d349c21ea79a761116ae9a975994d2004d0d769bee072e0e3e153,2024-11-21T03:57:52.390000
CVE-2018-19413,0,0,f4113187e10bf90fb789c0d6906ec800aca2db8949bd6c22eb87b2974b518c1a,2024-11-21T03:57:52.540000
CVE-2018-19414,0,0,8ef7b90d3ca4f10c7d7d78e3d33ab0b1878ed67276ca2eb97b5dc76432c2fb6c,2024-11-21T03:57:52.690000
@ -126869,7 +126869,7 @@ CVE-2018-9272,0,0,ac554883181ea7a8e6a7dc5aae78490d576013aafb81a6f499cfcb5caabdc3
CVE-2018-9273,0,0,87b88345c90ffaef935bcb7a09ce9476b02fca862f53f32581cc84e26fac9166,2024-11-21T04:15:16.210000
CVE-2018-9274,0,0,2eb92080af4fbf961f1e5f751288f455e1c66b2f5e2512eefdfab3ef55f08244,2024-11-21T04:15:16.370000
CVE-2018-9275,0,0,a8d6e5bdcca45958f73a4232e8f17755e94443388e2a9fc9a136fe387e6300a1,2024-11-21T04:15:16.520000
CVE-2018-9276,0,0,0c0c9a2d80fdde1b8717f7d134d8b49d9dec54d47b9886b1f54bd6f26073a6fc,2025-02-04T16:15:31.603000
CVE-2018-9276,0,1,ce6bbfab058f2da75089192a60f4b78830dad189451aa000a753c5d2e3b5ccc2,2025-02-05T02:00:01.767000
CVE-2018-9279,0,0,0a86219880870026a4d53c5397bc07946d9c71712fd7e40dcc9f1723b2e42de2,2024-11-21T04:15:16.833000
CVE-2018-9280,0,0,a32154fcbceddb33a222c921a469a97842c8df1742b170e1248af4f6c92328b2,2024-11-21T04:15:16.980000
CVE-2018-9281,0,0,db4c44c2f0239c12c4e1201d93237d902949521e082bcf8f5a76fde8a4caf846,2024-11-21T04:15:17.127000
@ -231011,7 +231011,7 @@ CVE-2023-39938,0,0,7e109afc9eac03484142ad7ce4a33710b94b2e3183fb9389d992c4ec0028b
CVE-2023-39939,0,0,9ef48a7bfc7f05d96edc1ca825e661088d75871ac2f741da3911c5c17344852f,2024-11-21T08:16:04.723000
CVE-2023-3994,0,0,5eadb5656ef683f50a27dc29b7fb2429811878a8a7202505763e365a3355dbec,2024-11-21T08:18:29.510000
CVE-2023-39941,0,0,e3ac3f7d1daba525a3ab09017ce65465e29792eb0e3d7b5b68368f5a862f5249,2024-11-21T08:16:04.863000
CVE-2023-39943,1,1,e661ca2e105c5e25998c2f8d858df936e430a2441217c4759ab9bda81aa87045,2025-02-04T23:15:08.237000
CVE-2023-39943,0,0,e661ca2e105c5e25998c2f8d858df936e430a2441217c4759ab9bda81aa87045,2025-02-04T23:15:08.237000
CVE-2023-39944,0,0,9f6156ae2b84f5ad79f0a55f25f28359e708025cd5e96110436a0c3be335d2a0,2024-11-21T08:16:05.017000
CVE-2023-39945,0,0,ce324f7e0ce427a27c5aab4f1517864e619374db1b79381165b92ad9fb7980d6,2024-11-21T08:16:05.163000
CVE-2023-39946,0,0,11f47a58d2fac4f19d0f78f83831675635eabe780007119732a2ec66fa0b2bff,2024-11-21T08:16:05.313000
@ -231295,7 +231295,7 @@ CVE-2023-40219,0,0,d312cff569dae579b11a2237538409084b8189381ad409b7b26a9e9c9cf4f
CVE-2023-4022,0,0,7d28cfa5cb69299ac816454a0ce6e4287487b976b7e847836ca22e4bb44c1918,2024-11-21T08:34:14.873000
CVE-2023-40220,0,0,4e4c8d42b37fdc492577d4df159739563bf50d025eb5eae2e90cdd97ddf5718f,2024-11-21T08:19:01.780000
CVE-2023-40221,0,0,0f5c4c77c15a1563f65ecaa72879d46af8c8213e98a1889ade52c63df5bdb7d3,2024-11-21T08:19:01.930000
CVE-2023-40222,1,1,af47ed954dfb107b325ee1c0f57d52f7328de88f20f4da77b456047ef86157d7,2025-02-04T23:15:08.413000
CVE-2023-40222,0,0,af47ed954dfb107b325ee1c0f57d52f7328de88f20f4da77b456047ef86157d7,2025-02-04T23:15:08.413000
CVE-2023-40223,0,0,9aaaac728328ced048b6d6b5cb0c8d5341ea770b71a983787e5f397c0b28849c,2024-11-21T08:19:02.073000
CVE-2023-40224,0,0,9cd3bec58e8169eaf67cb8ce0484da56183a2fef50788503a91b137a9042fc9f,2024-11-21T08:19:02.240000
CVE-2023-40225,0,0,821a9a37066f54cbe57bb3d978f89daa73ce11405043e140b875f5eb678ef55b,2024-11-21T08:19:02.407000
@ -244657,8 +244657,8 @@ CVE-2024-11463,0,0,ad17f3fab6bfb40a789d68c4383c6c0e1f14efa77f86cc521d310c195559f
CVE-2024-11464,0,0,5828db9c008addcaa10da0b57e51f0230f10838dab3e51e60f8d2fcb9d133719,2024-12-07T12:15:19.567000
CVE-2024-11465,0,0,0028662c24c58537e31fc6c5ac2f25bde09edc01df058369957c93345fce2c39,2025-01-07T05:15:13.287000
CVE-2024-11466,0,0,36ba29a0e83960f183cdc1bb8910604befb538a9ed8bdd074a88ef8b7f706e46,2024-12-04T08:15:06.523000
CVE-2024-11467,1,1,c9ea79d54665ec7d1ef0e18e111f36fba68f9d474624eb445b41de6faf036d99,2025-02-04T23:15:08.580000
CVE-2024-11468,1,1,0f61495e13150fc5d894544aa63baf379c278b18eb392545f932046f2648e26e,2025-02-04T23:15:08.717000
CVE-2024-11467,0,0,c9ea79d54665ec7d1ef0e18e111f36fba68f9d474624eb445b41de6faf036d99,2025-02-04T23:15:08.580000
CVE-2024-11468,0,0,0f61495e13150fc5d894544aa63baf379c278b18eb392545f932046f2648e26e,2025-02-04T23:15:08.717000
CVE-2024-1147,0,0,7c585dad4e071b38d649d847ff37c79a25a5d07f7a32720dda50f90a08541bc4,2024-11-21T08:49:54.360000
CVE-2024-11477,0,0,3e8ae99590c1aecc53c52bff36b8f44bed9b32563a126fb58a5303ed844daede,2024-12-11T19:23:36.800000
CVE-2024-11479,0,0,e45a25bfdd55a73dd4f84ed406864a56b4c33194e1807e98971c4aae47176800,2024-12-04T01:15:04.650000
@ -246270,7 +246270,7 @@ CVE-2024-13331,0,0,67f23a0941a92763c02801e346ee19705f3ba74d128320b19fba8a2229105
CVE-2024-13332,0,0,4ad8a5df5830f0dd48ac9bc5ca6772cb81eb2d689d83a2ad63ea4e51ca0615c4,2025-02-04T19:15:31.070000
CVE-2024-13333,0,0,413ea7e4b64b8aef5dd8714980de1abedc1d4af046b4d782740c89a880443e55,2025-01-17T06:15:15.663000
CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655747,2025-01-15T04:15:19.720000
CVE-2024-13335,0,0,883609986959eecbf4b52df3f1201d22b952563f6ac4db46fce38bded4906e66,2025-01-24T11:15:07.973000
CVE-2024-13335,0,1,20c8c7696547a710a7247fc1375c3fab2f06247460845b286129a3d00d1d053e,2025-02-05T01:37:46.517000
CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000
CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000
CVE-2024-13341,0,0,16acded92547be67b8d1319a2af71c7cc4dd793d079329b45b0485cf9f1e2a5f,2025-02-01T07:15:07.900000
@ -246280,7 +246280,7 @@ CVE-2024-13348,0,0,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1b
CVE-2024-13349,0,0,1a00cf757b3ec26bd50ea0e563207e24798d3893002c58755b8b9af1d412744e,2025-01-31T17:58:59.027000
CVE-2024-1335,0,0,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000
CVE-2024-13351,0,0,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508284,2025-01-15T10:15:07.993000
CVE-2024-13354,0,0,8104a8377e052429ffa2c678ce64430177e47e4937649c16c7151cde05098eb9,2025-01-24T11:15:08.887000
CVE-2024-13354,0,1,70c8df8ffc765e671782c1c5275e6f7668ade0103b0f3f6fd1920147a9a818fb,2025-02-05T01:36:55.960000
CVE-2024-13355,0,0,b14926ff025e929de229a84af4734d711f0473d16ba82bc6498a7b20173af029,2025-01-16T10:15:08.750000
CVE-2024-13356,0,0,f3405be94fa5e0088d8ef4745cf6cc2338fbdcc120e93d37a7b197caba86bf8c,2025-02-04T10:15:07.920000
CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000
@ -246317,8 +246317,8 @@ CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509
CVE-2024-13403,0,0,53112ccd99e8ee31939326de2318b841f77ef05c302cd465c214793ac11aacc4,2025-02-04T09:15:09.303000
CVE-2024-13404,0,0,c306a147bdbb783a3f22c9c4f49bd90e70cf49c0fec041c52ab9283c517d7448,2025-01-31T20:18:46.230000
CVE-2024-13406,0,0,3a9e7471bf5857762896fdd475ef755ed514b70430254f571b98831752a93703,2025-01-24T21:20:06.183000
CVE-2024-13408,0,0,5a61f24d04804b18fc95b4d76e02f04de48f1f1d0fd8c225d8f32c1476fa755b,2025-01-24T11:15:09.043000
CVE-2024-13409,0,0,ef75f85c40cb8c0d26f22e5e99ad37fd39e21b13fa81537ad4d13708c767c6bc,2025-01-24T11:15:09.213000
CVE-2024-13408,0,1,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332fd0,2025-02-05T01:37:13.827000
CVE-2024-13409,0,1,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000
CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000
CVE-2024-13415,0,0,078aa9b6eeb5af1c8634c02c595bbb40a0a7ec1b15e21674b1397103dd29c669,2025-01-31T06:15:29.287000
CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000
@ -246382,7 +246382,7 @@ CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba7
CVE-2024-13530,0,0,a32dca6d75c33e81a9c9eaf2b59e70f20fcbfe169ec3d31442792a7d94733be9,2025-01-31T08:15:07.543000
CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000
CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000
CVE-2024-13542,0,0,92be261b7b22511b7a14a7364c0a2fabe3ed7cc5767629b3e380a688f4c23391,2025-01-24T11:15:09.377000
CVE-2024-13542,0,1,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000
CVE-2024-13545,0,0,c419b260e5a66c4272590c9c114312d98eb46bbf6a795d5e8b27dcfd0cbd5983,2025-01-24T09:15:22.797000
CVE-2024-13547,0,0,849d60eb07b94b7aa81e2128c4cccb0dc411bc9ac2be92bb4bc290f57219516d,2025-02-01T04:15:30.857000
CVE-2024-13548,0,0,ce678384d6879b1518296d0bd59d7e5e9b3276f2861356166fcc86ea2354903e,2025-02-04T19:27:08.967000
@ -246395,9 +246395,9 @@ CVE-2024-13561,0,0,719ad5f42c168a91e69745d9f00b297089a3701fa296893125c9677392872
CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000
CVE-2024-13566,0,0,dd455b5c6c79c50cc3a56ce23db0039a6651194309cff2d1529e0608cc927c54,2025-01-31T09:15:06.847000
CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000
CVE-2024-13572,0,0,9a0b06840f3a79424e6a2863adf0ec6c6f5cf9f46dd5ec042edf40bb0610b8ec,2025-01-24T11:15:09.520000
CVE-2024-13572,0,1,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000
CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000
CVE-2024-13583,0,0,aa71d32a09ba879a6f774fda37b6b3f51d13e60a01dbcf4e234a899913383527,2025-01-24T10:15:07.770000
CVE-2024-13583,0,1,74ad7b83b093ee530d03665dfed8aeb7981ef34d0b7fd0bb7def11fe8ca86354,2025-02-05T01:38:33.527000
CVE-2024-13584,0,0,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f364,2025-01-24T18:20:40.760000
CVE-2024-13586,0,0,031371a39e86dab11794d85bebc5761cfd2812bcdc21ab474a79e1589e56730a,2025-02-04T18:14:20.930000
CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000
@ -246447,8 +246447,8 @@ CVE-2024-13717,0,0,71a3650f5ab531cb9a1850d83e24949bbb405dc3cae790e8ec5ec60af0ddf
CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000
CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd2f2,2025-01-30T18:44:43.053000
CVE-2024-13721,0,0,3d01fd2636d19e08bbb60da04d18cfa1babbccecb03f24b5143393a600e41ccf,2025-01-25T06:15:27.860000
CVE-2024-13722,0,0,984de06d3a9c465e200c05cef6d40bb3f46c015149533726268b5e191bb48830,2025-02-04T22:15:40.113000
CVE-2024-13723,0,0,220a65234a04b8063a9dc0c78b80767c7281b83b5d90bc3c6853b5c77aa6ff22,2025-02-04T22:15:40.227000
CVE-2024-13722,0,1,a7a480ea59a28cb898a57ce0712e00dc1b8ef881355807ed8706440a3f5ab3c5,2025-02-05T01:15:08.323000
CVE-2024-13723,0,1,49a8c971bcd70a22dfe8db41b8c54d4295f983ea1a08ec0646d0192cced65554,2025-02-05T01:15:08.440000
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000
CVE-2024-13733,0,0,a9a8d1da3e9ca0d26485df457906e375bbd443f277cddd0693ddf9e0d40b866c,2025-02-04T10:15:08.527000
@ -254116,7 +254116,7 @@ CVE-2024-29054,0,0,ca067f10dbd952f549de490b8a143c5a74d49758923d6326376ec876a34a7
CVE-2024-29055,0,0,a04fe25ba883ccb44f78366a38aa31576d1a4456a77504bb73087df877c40a47,2024-11-21T09:07:27.810000
CVE-2024-29056,0,0,af2d4852194edc6cf7527ac504763a06fb815f736d4d1949ca388fe427539418,2024-11-21T09:07:27.943000
CVE-2024-29057,0,0,3deaebdc7af567eb027e3b4630e3d0b2f66daac347366af604fd2bccf7d6f841,2024-11-21T09:07:28.087000
CVE-2024-29059,0,0,044a6984feb8642a951af040c98024cedfb7a63fd2dcd127eff738d3575cbc8b,2025-01-08T18:33:02.303000
CVE-2024-29059,0,1,cb45373de82efd1b114a127f282f5fbad3837065f2fdac0d80a10c43fbeec6d2,2025-02-05T02:00:01.767000
CVE-2024-2906,0,0,e78fa1cdb9d009f1e1f59fe20ffafc00d26c9427eeacf6bf57bd9ccb61ba19e2,2024-11-21T09:10:48.327000
CVE-2024-29060,0,0,2d9ad229edcbd026ed72ca28f505019f3a24ccfb94a95ee3aaf358451d2c435c,2024-11-21T09:07:28.380000
CVE-2024-29061,0,0,7c8701c84f59f89a131d2c90ff8025ec8c1c9a0e30cbf5684bfc2e3a344ea597,2024-11-21T09:07:28.530000
@ -266311,7 +266311,7 @@ CVE-2024-45191,0,0,85750924302de32758668d824c400f03ec874589b01e5f9cc93263d9b344c
CVE-2024-45192,0,0,43a7c431a16c707384aad36a7c459b5416237a7f09d05eece76501eccaa0c165,2024-09-10T19:35:09.943000
CVE-2024-45193,0,0,97e23cf5bb2e50a369e95a1523b175851171783613d8e26e1d3a20ce3e5a05bc,2024-09-10T19:35:10.143000
CVE-2024-45194,0,0,39e2c5f5618c81787bf696cee2375dcc2cb2276d4de328350b388d7b61cd41b4,2024-11-21T18:15:07.483000
CVE-2024-45195,0,0,2b90b3e4454ab1c867846fcba998fb7c1f6d9604201ed0a09c53de22f7de3d81,2024-11-21T09:37:28.073000
CVE-2024-45195,0,1,342f0a98e5a9e3f3efadce0277aa1afa0c0fcf49ef1de377ceb006160be59a37,2025-02-05T02:00:01.767000
CVE-2024-4520,0,0,ee81a89389de5b30bb2a69c5a856e44bc0ce84cd6ef34fd29b4c99337e9f4fec,2024-11-21T09:43:01.267000
CVE-2024-45200,0,0,816959e7602786604e30587a4aecd68df769826aff5588f51b07d55181578adc,2024-09-30T18:35:06.983000
CVE-2024-45201,0,0,1008d923104020063a79ec3ff9863805234d3d78944913eab118b0fc97b0b3b3,2024-11-25T19:15:10.473000
@ -268528,7 +268528,7 @@ CVE-2024-4844,0,0,e58a1488c0c0593272657966464e317ce8795e1fe0f905dd08d4a2064b2cc0
CVE-2024-48440,0,0,b12e8f498b4696e14421c46fd8136a99002c348d0bb6cd00947a8f2b0d282013,2024-10-25T20:35:11.890000
CVE-2024-48441,0,0,e18fc6f4de2b212db2b7205e1d5eeff25b33b83c871c639edef8600af54d0283,2024-10-25T20:35:12.680000
CVE-2024-48442,0,0,2d256703959d5674c7059d0fc373d70703c32fa535ede7e1382722511cb6ae8e,2024-10-25T20:35:13.447000
CVE-2024-48445,1,1,754c26197b39498b1ca324dcef9ff45a474b08fe8dac482dc0c5895595eb7b88,2025-02-04T23:15:08.850000
CVE-2024-48445,0,0,754c26197b39498b1ca324dcef9ff45a474b08fe8dac482dc0c5895595eb7b88,2025-02-04T23:15:08.850000
CVE-2024-48448,0,0,a99f12680e27f2aa26c82e15e379e1be001a083141c2de9e36bbeee9d3fd22db,2024-10-29T21:35:22.540000
CVE-2024-4845,0,0,e1e461ef60509dabf0e7e2dde808d36cb958becba4b5c88bdf30fa8f1c23ed01,2024-11-21T09:43:43.393000
CVE-2024-48450,0,0,2ad4bca80a954b5a64850267d64cde36a0cc73a58476afe8de69f997e4304a47,2024-10-29T21:35:23.350000
@ -272361,11 +272361,11 @@ CVE-2024-53959,0,0,68036dd248b75f87e5f3d9391181f98f189af951a522aae2a41316aec0dfe
CVE-2024-5396,0,0,a2e12a462b12b592c06259ea229afce64d9cb2b529021eb0ae1f63c97dd38d23,2024-11-21T09:47:34.430000
CVE-2024-53960,0,0,980ae01bf410da0473069e1a3eb7a3f001cc1d8a12dcc0d46a5730cb7c2b0449,2024-12-13T17:50:01.533000
CVE-2024-53961,0,0,9476593ad781206d835ddd97d7ad8f5f64796abb2b22390811ef79dd9710b498,2024-12-23T21:15:05.820000
CVE-2024-53962,1,1,5ada91f70fb611dc3ff8e79d9d59abd44c27e78ab4a135c76c4c1eb63f7b93c2,2025-02-05T00:15:27.410000
CVE-2024-53963,1,1,d8ef373a285e43953bfbdd64a974ce79a1682e32c9055599e87ae94cecb2d899,2025-02-05T00:15:27.580000
CVE-2024-53964,1,1,39b4daee6f959c4eab6377c16baae80ab0f8d3779b690dc68ea92595f1bfcd58,2025-02-05T00:15:27.723000
CVE-2024-53965,1,1,7e4ac7b9cb09dcb6ffc3a37e9699d2075413829afbc7b2594d4ec1e111cab34f,2025-02-05T00:15:27.870000
CVE-2024-53966,1,1,69ac2ee473a569d89ec9f7498ebd6cbc25967ca7c5aa1aa37957115924efcb10,2025-02-05T00:15:28.023000
CVE-2024-53962,0,0,5ada91f70fb611dc3ff8e79d9d59abd44c27e78ab4a135c76c4c1eb63f7b93c2,2025-02-05T00:15:27.410000
CVE-2024-53963,0,0,d8ef373a285e43953bfbdd64a974ce79a1682e32c9055599e87ae94cecb2d899,2025-02-05T00:15:27.580000
CVE-2024-53964,0,0,39b4daee6f959c4eab6377c16baae80ab0f8d3779b690dc68ea92595f1bfcd58,2025-02-05T00:15:27.723000
CVE-2024-53965,0,0,7e4ac7b9cb09dcb6ffc3a37e9699d2075413829afbc7b2594d4ec1e111cab34f,2025-02-05T00:15:27.870000
CVE-2024-53966,0,0,69ac2ee473a569d89ec9f7498ebd6cbc25967ca7c5aa1aa37957115924efcb10,2025-02-05T00:15:28.023000
CVE-2024-5397,0,0,1c1b9f46c7fae3545f6c6bff25b88c782d3838975abd0364f3776c48ef8d8b3f,2024-11-21T09:47:34.563000
CVE-2024-53975,0,0,1c6eb06597883327a72f325fc0f751cbd0dc5c99b87a33d8b2ef4784e7416fa6,2024-11-27T15:15:26.923000
CVE-2024-53976,0,0,e0e34654e2920917adcad83ccc486a90e5a6d39da581d67f84c5bbc103fd6b7b,2024-11-26T16:15:21.430000
@ -278169,7 +278169,7 @@ CVE-2025-0409,0,0,9622ef176974a666883ccef87aa9961f8329f556e68cbb6ca3f25010c47796
CVE-2025-0410,0,0,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc713659,2025-01-13T18:15:21.730000
CVE-2025-0411,0,0,50368b34154b513a9bcb2ab4aae83a9d7a98678098c0e282e61908345b547a92,2025-01-29T21:15:20.860000
CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000
CVE-2025-0413,1,1,38efd3e293bb98a44c17e06abb1696e33085bfc382a611893a29f93413278776,2025-02-05T00:15:28.173000
CVE-2025-0413,0,0,38efd3e293bb98a44c17e06abb1696e33085bfc382a611893a29f93413278776,2025-02-05T00:15:28.173000
CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000
CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000
CVE-2025-0430,0,0,a8200addb62401843f5be6a163be32dcec6bbc5c81068c809f1c7b05c4147e88,2025-01-17T18:15:30.920000
@ -279287,9 +279287,9 @@ CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9
CVE-2025-23083,0,0,8381bb96d9de4f3a833b9505098a4089bf36e1c1fc3d25063d3a10cff18f7c26,2025-01-22T02:15:33.930000
CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000
CVE-2025-23086,0,0,8c64985aeb33aba8982533ad038d52f283116181730bf252db15e74dc52799fa,2025-01-21T15:15:14.833000
CVE-2025-23087,0,0,ff3ef66bbdfadd92f4bceb83f017cee238f01afd217540d38de3c3bc4241e457,2025-01-23T22:15:16.260000
CVE-2025-23088,0,0,351c4fc9ce77a4e8c7f582485a4c81d867817a4e67e2a7d92df2d5afd4de1eba,2025-01-23T22:15:16.370000
CVE-2025-23089,0,0,53211e365cb35c1ca6468f83d4cfd887f23da2be04794ebbf5b6bdd46246c6fa,2025-01-23T22:15:16.460000
CVE-2025-23087,0,1,c09e00448cf3f3ebc786843b0cc82ad81bcd87d56a57ec6e0048a7e42908b3f3,2025-02-05T02:15:28.267000
CVE-2025-23088,0,1,11e8939209f02d223d02a8c736a60c091ca0a72e8830769054cd9ade82334ee6,2025-02-05T02:15:28.413000
CVE-2025-23089,0,1,e62b1ec51c57d0b0d2343387b9c8a249bdf7ad82d31087c994126a1fe23e1a8f,2025-02-05T02:15:28.517000
CVE-2025-23090,0,0,1fa9642da31f6a1f285e901b43018a8c7dae722f8fb49437e281ea29c270fa57,2025-01-22T02:15:34.443000
CVE-2025-23091,0,0,b0cc14c8e209fbe6063fb24eff4314bed321c702e3c91518f97b3035bbea10ee,2025-02-01T07:15:08.277000
CVE-2025-23108,0,0,0867ae52bf9537919e00df206497183b5abf45a3a43e56579f476cc3d26e8d6c,2025-01-13T18:15:22.680000
@ -279298,6 +279298,7 @@ CVE-2025-23110,0,0,b9e32d20d7e6cf23b28c590dc2ad7f239b5186f27517cd303db97f7275b07
CVE-2025-23111,0,0,d3dc6414a9d0db9ed3cb07471714e79beac7db7fd4adde1f55f9ce769eca585e,2025-01-10T22:15:27.723000
CVE-2025-23112,0,0,15db9896b5b2ea6c9a640fa45af2c0a8239e079375c847ac6ebc4eb1f4c0822a,2025-01-10T22:15:27.863000
CVE-2025-23113,0,0,1f4b2afdfc961e6cff47003c2a8a61938611b1820102bae5e7ebdff42c0ff218,2025-01-10T23:15:08.810000
CVE-2025-23114,1,1,84db4de895d9dd2188899e59f93dd681a6b72b6548b6baa41d1b67547aa85c24,2025-02-05T02:15:28.610000
CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000
CVE-2025-23125,0,0,2e6f0fce9ee8e787d649705f4cf1025930f6b72d6ac2efc70c4c1837b8d7d15b,2025-01-11T15:15:09.023000
CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4089,2025-01-11T15:15:09.100000

Can't render this file because it is too large.