mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 10:42:17 +00:00
Auto-Update: 2025-02-05T03:00:38.333123+00:00
This commit is contained in:
parent
25c0a7b52b
commit
65ffd999cb
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-19410",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-11-21T16:29:00.347",
|
||||
"lastModified": "2025-02-04T16:15:30.963",
|
||||
"lastModified": "2025-02-05T02:00:01.767",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -86,6 +86,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-04",
|
||||
"cisaActionDue": "2025-02-25",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Paessler PRTG Network Monitor Local File Inclusion Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-9276",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2018-07-02T16:29:00.600",
|
||||
"lastModified": "2025-02-04T16:15:31.603",
|
||||
"lastModified": "2025-02-05T02:00:01.767",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -84,6 +84,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-04",
|
||||
"cisaActionDue": "2025-02-25",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Paessler PRTG Network Monitor OS Command Injection Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13335",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-24T11:15:07.973",
|
||||
"lastModified": "2025-01-24T11:15:07.973",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-05T01:37:46.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:templatescoder:spexo_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.0.15",
|
||||
"matchCriteriaId": "4F105988-7B06-446F-91B4-0678246B8067"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3227353/sastra-essential-addons-for-elementor/trunk/inc/wizard/wizard-ajax-api.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4edc7ef9-33db-4433-8ef2-cd06089ee8d5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13354",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-24T11:15:08.887",
|
||||
"lastModified": "2025-01-24T11:15:08.887",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-05T01:36:55.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cyberchimps:responsive_addons:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.6.5",
|
||||
"matchCriteriaId": "94445C04-EB66-4616-850A-ED63DDB4A2F7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3226779%40responsive-addons-for-elementor&new=3226779%40responsive-addons-for-elementor&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c46d71fb-ccf1-4cbe-8088-edb7fba225e9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13408",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-24T11:15:09.043",
|
||||
"lastModified": "2025-01-24T11:15:09.043",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-05T01:37:13.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -36,29 +36,83 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-98"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pickplugins:post_grid:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.7",
|
||||
"matchCriteriaId": "E6088334-1942-4C11-89B2-963D748B5EEA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3227281/post-grid-carousel-ultimate/tags/1.7/includes/classes/shortcode.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff346465-62c2-4a2b-8a4a-c88558d7cabd?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13409",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-24T11:15:09.213",
|
||||
"lastModified": "2025-01-24T11:15:09.213",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-05T01:36:36.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -36,37 +36,97 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpwax:post_grid\\,_slider_\\&_carousel_ultimate:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.7",
|
||||
"matchCriteriaId": "AC5313B7-8A99-4B78-945C-3D410468DB47"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ja.wordpress.org/plugins/post-grid-carousel-ultimate/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/post-grid-carousel-ultimate/tags/1.6.10/includes/classes/ajax.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3227281/post-grid-carousel-ultimate/tags/1.7/includes/classes/ajax.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/38672a45-b7a7-445f-9e77-7050df6920fa?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13542",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-24T11:15:09.377",
|
||||
"lastModified": "2025-01-24T11:15:09.377",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-05T01:35:33.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:agenceseo:wp_google_street_view:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.1.4",
|
||||
"matchCriteriaId": "07E98D68-890A-457F-8224-728263872E1A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227140%40wp-google-street-view&new=3227140%40wp-google-street-view&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b1944a9-4bc4-4ac2-83c3-55d6d61f405c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13572",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-24T11:15:09.520",
|
||||
"lastModified": "2025-01-24T11:15:09.520",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-05T01:25:51.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:nfusionsolutions:precious_metals_charts_and_widgets:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2.9",
|
||||
"matchCriteriaId": "EBF191BC-66D2-44ED-9586-ECFC241846FE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227123%40precious-metals-chart-and-widgets&new=3227123%40precious-metals-chart-and-widgets&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f2c8c5f-2017-4b22-a864-dc142b3b1afb?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13583",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-24T10:15:07.770",
|
||||
"lastModified": "2025-01-24T10:15:07.770",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-05T01:38:33.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,18 +71,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:come2theweb:simple_gallery_with_filter:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1",
|
||||
"matchCriteriaId": "820ED387-41D1-450A-9C0D-56612DD8C364"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/simple-gallery-with-filter/trunk/simple-gallery-with-filter.php#L377",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227234%40simple-gallery-with-filter&new=3227234%40simple-gallery-with-filter&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c088264-64a2-4a36-ae3b-fdf60f3837e2?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-13722",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2025-02-04T22:15:40.113",
|
||||
"lastModified": "2025-02-04T22:15:40.113",
|
||||
"lastModified": "2025-02-05T01:15:08.323",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,14 @@
|
||||
{
|
||||
"url": "https://www.nagvis.org/downloads/changelog/1.9.42",
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Feb/3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/02/04/3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-13723",
|
||||
"sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9",
|
||||
"published": "2025-02-04T22:15:40.227",
|
||||
"lastModified": "2025-02-04T22:15:40.227",
|
||||
"lastModified": "2025-02-05T01:15:08.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,14 @@
|
||||
{
|
||||
"url": "https://www.nagvis.org/downloads/changelog/1.9.42",
|
||||
"source": "bbf0bd87-ece2-41be-b873-96928ee8fab9"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Feb/4",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/02/04/4",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29059",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-03-23T00:15:09.150",
|
||||
"lastModified": "2025-01-08T18:33:02.303",
|
||||
"lastModified": "2025-02-05T02:00:01.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
@ -39,6 +39,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-04",
|
||||
"cisaActionDue": "2025-02-25",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Microsoft .NET Framework Information Disclosure Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-45195",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2024-09-04T09:15:04.397",
|
||||
"lastModified": "2024-11-21T09:37:28.073",
|
||||
"lastModified": "2025-02-05T02:00:01.767",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,6 +59,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-02-04",
|
||||
"cisaActionDue": "2025-02-25",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Apache OFBiz Forced Browsing Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,13 +2,20 @@
|
||||
"id": "CVE-2025-23087",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-01-22T02:15:34.080",
|
||||
"lastModified": "2025-01-23T22:15:16.260",
|
||||
"lastModified": "2025-02-05T02:15:28.267",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
|
||||
"value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\nNOTE: use of the CVE List to report that a product is unsupported, without reference to a specific defect, is novel and the CVE Program is actively assessing both the validity and potential value of this approach.\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,20 @@
|
||||
"id": "CVE-2025-23088",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-01-22T02:15:34.207",
|
||||
"lastModified": "2025-01-23T22:15:16.370",
|
||||
"lastModified": "2025-02-05T02:15:28.413",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
|
||||
"value": "NOTE: use of the CVE List to report that a product is unsupported, without reference to a specific defect, is novel and the CVE Program is actively assessing both the validity and potential value of this approach.\r\n\r\nThis CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,20 @@
|
||||
"id": "CVE-2025-23089",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-01-22T02:15:34.327",
|
||||
"lastModified": "2025-01-23T22:15:16.460",
|
||||
"lastModified": "2025-02-05T02:15:28.517",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
|
||||
"value": "NOTE: use of the CVE List to report that a product is unsupported, without reference to a specific defect, is novel and the CVE Program is actively assessing both the validity and potential value of this approach.\r\n\r\nThis CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
44
CVE-2025/CVE-2025-231xx/CVE-2025-23114.json
Normal file
44
CVE-2025/CVE-2025-231xx/CVE-2025-23114.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-23114",
|
||||
"sourceIdentifier": "support@hackerone.com",
|
||||
"published": "2025-02-05T02:15:28.610",
|
||||
"lastModified": "2025-02-05T02:15:28.610",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in Veeam Updater component allows Man-in-the-Middle attackers to execute arbitrary code on the affected server. This issue occurs due to a failure to properly validate TLS certificate."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "support@hackerone.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.veeam.com/kb4712",
|
||||
"source": "support@hackerone.com"
|
||||
}
|
||||
]
|
||||
}
|
41
README.md
41
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-05T00:55:19.822768+00:00
|
||||
2025-02-05T03:00:38.333123+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-05T00:15:28.173000+00:00
|
||||
2025-02-05T02:15:28.610000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,37 +27,42 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-02-04T01:00:10.100475+00:00
|
||||
2025-02-05T01:00:04.367301+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
280097
|
||||
280098
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
- [CVE-2023-39943](CVE-2023/CVE-2023-399xx/CVE-2023-39943.json) (`2025-02-04T23:15:08.237`)
|
||||
- [CVE-2023-40222](CVE-2023/CVE-2023-402xx/CVE-2023-40222.json) (`2025-02-04T23:15:08.413`)
|
||||
- [CVE-2024-11467](CVE-2024/CVE-2024-114xx/CVE-2024-11467.json) (`2025-02-04T23:15:08.580`)
|
||||
- [CVE-2024-11468](CVE-2024/CVE-2024-114xx/CVE-2024-11468.json) (`2025-02-04T23:15:08.717`)
|
||||
- [CVE-2024-48445](CVE-2024/CVE-2024-484xx/CVE-2024-48445.json) (`2025-02-04T23:15:08.850`)
|
||||
- [CVE-2024-53962](CVE-2024/CVE-2024-539xx/CVE-2024-53962.json) (`2025-02-05T00:15:27.410`)
|
||||
- [CVE-2024-53963](CVE-2024/CVE-2024-539xx/CVE-2024-53963.json) (`2025-02-05T00:15:27.580`)
|
||||
- [CVE-2024-53964](CVE-2024/CVE-2024-539xx/CVE-2024-53964.json) (`2025-02-05T00:15:27.723`)
|
||||
- [CVE-2024-53965](CVE-2024/CVE-2024-539xx/CVE-2024-53965.json) (`2025-02-05T00:15:27.870`)
|
||||
- [CVE-2024-53966](CVE-2024/CVE-2024-539xx/CVE-2024-53966.json) (`2025-02-05T00:15:28.023`)
|
||||
- [CVE-2025-0413](CVE-2025/CVE-2025-04xx/CVE-2025-0413.json) (`2025-02-05T00:15:28.173`)
|
||||
- [CVE-2025-23114](CVE-2025/CVE-2025-231xx/CVE-2025-23114.json) (`2025-02-05T02:15:28.610`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `16`
|
||||
|
||||
- [CVE-2014-0546](CVE-2014/CVE-2014-05xx/CVE-2014-0546.json) (`2025-02-04T23:15:07.950`)
|
||||
- [CVE-2018-19410](CVE-2018/CVE-2018-194xx/CVE-2018-19410.json) (`2025-02-05T02:00:01.767`)
|
||||
- [CVE-2018-9276](CVE-2018/CVE-2018-92xx/CVE-2018-9276.json) (`2025-02-05T02:00:01.767`)
|
||||
- [CVE-2024-13335](CVE-2024/CVE-2024-133xx/CVE-2024-13335.json) (`2025-02-05T01:37:46.517`)
|
||||
- [CVE-2024-13354](CVE-2024/CVE-2024-133xx/CVE-2024-13354.json) (`2025-02-05T01:36:55.960`)
|
||||
- [CVE-2024-13408](CVE-2024/CVE-2024-134xx/CVE-2024-13408.json) (`2025-02-05T01:37:13.827`)
|
||||
- [CVE-2024-13409](CVE-2024/CVE-2024-134xx/CVE-2024-13409.json) (`2025-02-05T01:36:36.047`)
|
||||
- [CVE-2024-13542](CVE-2024/CVE-2024-135xx/CVE-2024-13542.json) (`2025-02-05T01:35:33.207`)
|
||||
- [CVE-2024-13572](CVE-2024/CVE-2024-135xx/CVE-2024-13572.json) (`2025-02-05T01:25:51.813`)
|
||||
- [CVE-2024-13583](CVE-2024/CVE-2024-135xx/CVE-2024-13583.json) (`2025-02-05T01:38:33.527`)
|
||||
- [CVE-2024-13722](CVE-2024/CVE-2024-137xx/CVE-2024-13722.json) (`2025-02-05T01:15:08.323`)
|
||||
- [CVE-2024-13723](CVE-2024/CVE-2024-137xx/CVE-2024-13723.json) (`2025-02-05T01:15:08.440`)
|
||||
- [CVE-2024-29059](CVE-2024/CVE-2024-290xx/CVE-2024-29059.json) (`2025-02-05T02:00:01.767`)
|
||||
- [CVE-2024-45195](CVE-2024/CVE-2024-451xx/CVE-2024-45195.json) (`2025-02-05T02:00:01.767`)
|
||||
- [CVE-2025-23087](CVE-2025/CVE-2025-230xx/CVE-2025-23087.json) (`2025-02-05T02:15:28.267`)
|
||||
- [CVE-2025-23088](CVE-2025/CVE-2025-230xx/CVE-2025-23088.json) (`2025-02-05T02:15:28.413`)
|
||||
- [CVE-2025-23089](CVE-2025/CVE-2025-230xx/CVE-2025-23089.json) (`2025-02-05T02:15:28.517`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
57
_state.csv
57
_state.csv
@ -65026,7 +65026,7 @@ CVE-2014-0542,0,0,fbbae5aa5bd2b99837b91bc5a55d0d23bc0909ce012aa658a0a70de3681197
|
||||
CVE-2014-0543,0,0,b274c780f0466077acaf027916a755319f6e77f2db6123359b58b5b34ee1a354,2024-11-21T02:02:21.360000
|
||||
CVE-2014-0544,0,0,0fa0ea93aa9a3f0a22963adfb2e80712f5ab07190ea3e8b339366579d2c88455,2024-11-21T02:02:21.500000
|
||||
CVE-2014-0545,0,0,528d5e5b2f44f2a0536e86fe2e8c2c1c24a8ab5b69df4e81e30d9f0fa2293a72,2024-11-21T02:02:21.623000
|
||||
CVE-2014-0546,0,1,5ba5cfcc1a82a7200d1de1b761989cd76312a5d0d561fd2749f70459e5df9db2,2025-02-04T23:15:07.950000
|
||||
CVE-2014-0546,0,0,5ba5cfcc1a82a7200d1de1b761989cd76312a5d0d561fd2749f70459e5df9db2,2025-02-04T23:15:07.950000
|
||||
CVE-2014-0547,0,0,b30a2293b7d47a6ccba0e0df5c871196625c5e65ff5adfc657babd1c1b1be8ed,2024-11-21T02:02:21.870000
|
||||
CVE-2014-0548,0,0,fb4c5f4dc7a5879154d5c4c94ade40155233e90da3caaeda714406abdcecdd40,2024-11-21T02:02:22.010000
|
||||
CVE-2014-0549,0,0,0d1e6ae4e25c16d5596402e35fb70d20b3121eb60ba76da993d65abdfa62050a,2024-11-21T02:02:22.150000
|
||||
@ -119242,7 +119242,7 @@ CVE-2018-19406,0,0,43a6b9abcb935b102d54df72d8bec105050eff0847d09bee05a843fd0844c
|
||||
CVE-2018-19407,0,0,24fea91ce6b2e274d978c9dab0a2381b2df1539d9b3c9be92ca0e5747b6e9a79,2024-11-21T03:57:51.883000
|
||||
CVE-2018-19409,0,0,1876e55a2d65afba0be02ce8a4b2444f17432a36bc272a7f6b07999057ecb22f,2024-11-21T03:57:52.067000
|
||||
CVE-2018-1941,0,0,7221aec0ebd68fd329a49613886292da9a4f97973fdf56aa45caaa0dfabf726c,2024-11-21T04:00:38.130000
|
||||
CVE-2018-19410,0,0,9ea6f866e5c7e8905aa7260db22ca43a297aefa8acf8dd23373d75a72b6c93ba,2025-02-04T16:15:30.963000
|
||||
CVE-2018-19410,0,1,3c3e182d325d17685928baf094ba73945add27a392163f3ff03155eb6d1891c8,2025-02-05T02:00:01.767000
|
||||
CVE-2018-19411,0,0,af45ed89010d349c21ea79a761116ae9a975994d2004d0d769bee072e0e3e153,2024-11-21T03:57:52.390000
|
||||
CVE-2018-19413,0,0,f4113187e10bf90fb789c0d6906ec800aca2db8949bd6c22eb87b2974b518c1a,2024-11-21T03:57:52.540000
|
||||
CVE-2018-19414,0,0,8ef7b90d3ca4f10c7d7d78e3d33ab0b1878ed67276ca2eb97b5dc76432c2fb6c,2024-11-21T03:57:52.690000
|
||||
@ -126869,7 +126869,7 @@ CVE-2018-9272,0,0,ac554883181ea7a8e6a7dc5aae78490d576013aafb81a6f499cfcb5caabdc3
|
||||
CVE-2018-9273,0,0,87b88345c90ffaef935bcb7a09ce9476b02fca862f53f32581cc84e26fac9166,2024-11-21T04:15:16.210000
|
||||
CVE-2018-9274,0,0,2eb92080af4fbf961f1e5f751288f455e1c66b2f5e2512eefdfab3ef55f08244,2024-11-21T04:15:16.370000
|
||||
CVE-2018-9275,0,0,a8d6e5bdcca45958f73a4232e8f17755e94443388e2a9fc9a136fe387e6300a1,2024-11-21T04:15:16.520000
|
||||
CVE-2018-9276,0,0,0c0c9a2d80fdde1b8717f7d134d8b49d9dec54d47b9886b1f54bd6f26073a6fc,2025-02-04T16:15:31.603000
|
||||
CVE-2018-9276,0,1,ce6bbfab058f2da75089192a60f4b78830dad189451aa000a753c5d2e3b5ccc2,2025-02-05T02:00:01.767000
|
||||
CVE-2018-9279,0,0,0a86219880870026a4d53c5397bc07946d9c71712fd7e40dcc9f1723b2e42de2,2024-11-21T04:15:16.833000
|
||||
CVE-2018-9280,0,0,a32154fcbceddb33a222c921a469a97842c8df1742b170e1248af4f6c92328b2,2024-11-21T04:15:16.980000
|
||||
CVE-2018-9281,0,0,db4c44c2f0239c12c4e1201d93237d902949521e082bcf8f5a76fde8a4caf846,2024-11-21T04:15:17.127000
|
||||
@ -231011,7 +231011,7 @@ CVE-2023-39938,0,0,7e109afc9eac03484142ad7ce4a33710b94b2e3183fb9389d992c4ec0028b
|
||||
CVE-2023-39939,0,0,9ef48a7bfc7f05d96edc1ca825e661088d75871ac2f741da3911c5c17344852f,2024-11-21T08:16:04.723000
|
||||
CVE-2023-3994,0,0,5eadb5656ef683f50a27dc29b7fb2429811878a8a7202505763e365a3355dbec,2024-11-21T08:18:29.510000
|
||||
CVE-2023-39941,0,0,e3ac3f7d1daba525a3ab09017ce65465e29792eb0e3d7b5b68368f5a862f5249,2024-11-21T08:16:04.863000
|
||||
CVE-2023-39943,1,1,e661ca2e105c5e25998c2f8d858df936e430a2441217c4759ab9bda81aa87045,2025-02-04T23:15:08.237000
|
||||
CVE-2023-39943,0,0,e661ca2e105c5e25998c2f8d858df936e430a2441217c4759ab9bda81aa87045,2025-02-04T23:15:08.237000
|
||||
CVE-2023-39944,0,0,9f6156ae2b84f5ad79f0a55f25f28359e708025cd5e96110436a0c3be335d2a0,2024-11-21T08:16:05.017000
|
||||
CVE-2023-39945,0,0,ce324f7e0ce427a27c5aab4f1517864e619374db1b79381165b92ad9fb7980d6,2024-11-21T08:16:05.163000
|
||||
CVE-2023-39946,0,0,11f47a58d2fac4f19d0f78f83831675635eabe780007119732a2ec66fa0b2bff,2024-11-21T08:16:05.313000
|
||||
@ -231295,7 +231295,7 @@ CVE-2023-40219,0,0,d312cff569dae579b11a2237538409084b8189381ad409b7b26a9e9c9cf4f
|
||||
CVE-2023-4022,0,0,7d28cfa5cb69299ac816454a0ce6e4287487b976b7e847836ca22e4bb44c1918,2024-11-21T08:34:14.873000
|
||||
CVE-2023-40220,0,0,4e4c8d42b37fdc492577d4df159739563bf50d025eb5eae2e90cdd97ddf5718f,2024-11-21T08:19:01.780000
|
||||
CVE-2023-40221,0,0,0f5c4c77c15a1563f65ecaa72879d46af8c8213e98a1889ade52c63df5bdb7d3,2024-11-21T08:19:01.930000
|
||||
CVE-2023-40222,1,1,af47ed954dfb107b325ee1c0f57d52f7328de88f20f4da77b456047ef86157d7,2025-02-04T23:15:08.413000
|
||||
CVE-2023-40222,0,0,af47ed954dfb107b325ee1c0f57d52f7328de88f20f4da77b456047ef86157d7,2025-02-04T23:15:08.413000
|
||||
CVE-2023-40223,0,0,9aaaac728328ced048b6d6b5cb0c8d5341ea770b71a983787e5f397c0b28849c,2024-11-21T08:19:02.073000
|
||||
CVE-2023-40224,0,0,9cd3bec58e8169eaf67cb8ce0484da56183a2fef50788503a91b137a9042fc9f,2024-11-21T08:19:02.240000
|
||||
CVE-2023-40225,0,0,821a9a37066f54cbe57bb3d978f89daa73ce11405043e140b875f5eb678ef55b,2024-11-21T08:19:02.407000
|
||||
@ -244657,8 +244657,8 @@ CVE-2024-11463,0,0,ad17f3fab6bfb40a789d68c4383c6c0e1f14efa77f86cc521d310c195559f
|
||||
CVE-2024-11464,0,0,5828db9c008addcaa10da0b57e51f0230f10838dab3e51e60f8d2fcb9d133719,2024-12-07T12:15:19.567000
|
||||
CVE-2024-11465,0,0,0028662c24c58537e31fc6c5ac2f25bde09edc01df058369957c93345fce2c39,2025-01-07T05:15:13.287000
|
||||
CVE-2024-11466,0,0,36ba29a0e83960f183cdc1bb8910604befb538a9ed8bdd074a88ef8b7f706e46,2024-12-04T08:15:06.523000
|
||||
CVE-2024-11467,1,1,c9ea79d54665ec7d1ef0e18e111f36fba68f9d474624eb445b41de6faf036d99,2025-02-04T23:15:08.580000
|
||||
CVE-2024-11468,1,1,0f61495e13150fc5d894544aa63baf379c278b18eb392545f932046f2648e26e,2025-02-04T23:15:08.717000
|
||||
CVE-2024-11467,0,0,c9ea79d54665ec7d1ef0e18e111f36fba68f9d474624eb445b41de6faf036d99,2025-02-04T23:15:08.580000
|
||||
CVE-2024-11468,0,0,0f61495e13150fc5d894544aa63baf379c278b18eb392545f932046f2648e26e,2025-02-04T23:15:08.717000
|
||||
CVE-2024-1147,0,0,7c585dad4e071b38d649d847ff37c79a25a5d07f7a32720dda50f90a08541bc4,2024-11-21T08:49:54.360000
|
||||
CVE-2024-11477,0,0,3e8ae99590c1aecc53c52bff36b8f44bed9b32563a126fb58a5303ed844daede,2024-12-11T19:23:36.800000
|
||||
CVE-2024-11479,0,0,e45a25bfdd55a73dd4f84ed406864a56b4c33194e1807e98971c4aae47176800,2024-12-04T01:15:04.650000
|
||||
@ -246270,7 +246270,7 @@ CVE-2024-13331,0,0,67f23a0941a92763c02801e346ee19705f3ba74d128320b19fba8a2229105
|
||||
CVE-2024-13332,0,0,4ad8a5df5830f0dd48ac9bc5ca6772cb81eb2d689d83a2ad63ea4e51ca0615c4,2025-02-04T19:15:31.070000
|
||||
CVE-2024-13333,0,0,413ea7e4b64b8aef5dd8714980de1abedc1d4af046b4d782740c89a880443e55,2025-01-17T06:15:15.663000
|
||||
CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655747,2025-01-15T04:15:19.720000
|
||||
CVE-2024-13335,0,0,883609986959eecbf4b52df3f1201d22b952563f6ac4db46fce38bded4906e66,2025-01-24T11:15:07.973000
|
||||
CVE-2024-13335,0,1,20c8c7696547a710a7247fc1375c3fab2f06247460845b286129a3d00d1d053e,2025-02-05T01:37:46.517000
|
||||
CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000
|
||||
CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000
|
||||
CVE-2024-13341,0,0,16acded92547be67b8d1319a2af71c7cc4dd793d079329b45b0485cf9f1e2a5f,2025-02-01T07:15:07.900000
|
||||
@ -246280,7 +246280,7 @@ CVE-2024-13348,0,0,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1b
|
||||
CVE-2024-13349,0,0,1a00cf757b3ec26bd50ea0e563207e24798d3893002c58755b8b9af1d412744e,2025-01-31T17:58:59.027000
|
||||
CVE-2024-1335,0,0,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000
|
||||
CVE-2024-13351,0,0,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508284,2025-01-15T10:15:07.993000
|
||||
CVE-2024-13354,0,0,8104a8377e052429ffa2c678ce64430177e47e4937649c16c7151cde05098eb9,2025-01-24T11:15:08.887000
|
||||
CVE-2024-13354,0,1,70c8df8ffc765e671782c1c5275e6f7668ade0103b0f3f6fd1920147a9a818fb,2025-02-05T01:36:55.960000
|
||||
CVE-2024-13355,0,0,b14926ff025e929de229a84af4734d711f0473d16ba82bc6498a7b20173af029,2025-01-16T10:15:08.750000
|
||||
CVE-2024-13356,0,0,f3405be94fa5e0088d8ef4745cf6cc2338fbdcc120e93d37a7b197caba86bf8c,2025-02-04T10:15:07.920000
|
||||
CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000
|
||||
@ -246317,8 +246317,8 @@ CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509
|
||||
CVE-2024-13403,0,0,53112ccd99e8ee31939326de2318b841f77ef05c302cd465c214793ac11aacc4,2025-02-04T09:15:09.303000
|
||||
CVE-2024-13404,0,0,c306a147bdbb783a3f22c9c4f49bd90e70cf49c0fec041c52ab9283c517d7448,2025-01-31T20:18:46.230000
|
||||
CVE-2024-13406,0,0,3a9e7471bf5857762896fdd475ef755ed514b70430254f571b98831752a93703,2025-01-24T21:20:06.183000
|
||||
CVE-2024-13408,0,0,5a61f24d04804b18fc95b4d76e02f04de48f1f1d0fd8c225d8f32c1476fa755b,2025-01-24T11:15:09.043000
|
||||
CVE-2024-13409,0,0,ef75f85c40cb8c0d26f22e5e99ad37fd39e21b13fa81537ad4d13708c767c6bc,2025-01-24T11:15:09.213000
|
||||
CVE-2024-13408,0,1,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332fd0,2025-02-05T01:37:13.827000
|
||||
CVE-2024-13409,0,1,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000
|
||||
CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000
|
||||
CVE-2024-13415,0,0,078aa9b6eeb5af1c8634c02c595bbb40a0a7ec1b15e21674b1397103dd29c669,2025-01-31T06:15:29.287000
|
||||
CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000
|
||||
@ -246382,7 +246382,7 @@ CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba7
|
||||
CVE-2024-13530,0,0,a32dca6d75c33e81a9c9eaf2b59e70f20fcbfe169ec3d31442792a7d94733be9,2025-01-31T08:15:07.543000
|
||||
CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000
|
||||
CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000
|
||||
CVE-2024-13542,0,0,92be261b7b22511b7a14a7364c0a2fabe3ed7cc5767629b3e380a688f4c23391,2025-01-24T11:15:09.377000
|
||||
CVE-2024-13542,0,1,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000
|
||||
CVE-2024-13545,0,0,c419b260e5a66c4272590c9c114312d98eb46bbf6a795d5e8b27dcfd0cbd5983,2025-01-24T09:15:22.797000
|
||||
CVE-2024-13547,0,0,849d60eb07b94b7aa81e2128c4cccb0dc411bc9ac2be92bb4bc290f57219516d,2025-02-01T04:15:30.857000
|
||||
CVE-2024-13548,0,0,ce678384d6879b1518296d0bd59d7e5e9b3276f2861356166fcc86ea2354903e,2025-02-04T19:27:08.967000
|
||||
@ -246395,9 +246395,9 @@ CVE-2024-13561,0,0,719ad5f42c168a91e69745d9f00b297089a3701fa296893125c9677392872
|
||||
CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000
|
||||
CVE-2024-13566,0,0,dd455b5c6c79c50cc3a56ce23db0039a6651194309cff2d1529e0608cc927c54,2025-01-31T09:15:06.847000
|
||||
CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000
|
||||
CVE-2024-13572,0,0,9a0b06840f3a79424e6a2863adf0ec6c6f5cf9f46dd5ec042edf40bb0610b8ec,2025-01-24T11:15:09.520000
|
||||
CVE-2024-13572,0,1,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000
|
||||
CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000
|
||||
CVE-2024-13583,0,0,aa71d32a09ba879a6f774fda37b6b3f51d13e60a01dbcf4e234a899913383527,2025-01-24T10:15:07.770000
|
||||
CVE-2024-13583,0,1,74ad7b83b093ee530d03665dfed8aeb7981ef34d0b7fd0bb7def11fe8ca86354,2025-02-05T01:38:33.527000
|
||||
CVE-2024-13584,0,0,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f364,2025-01-24T18:20:40.760000
|
||||
CVE-2024-13586,0,0,031371a39e86dab11794d85bebc5761cfd2812bcdc21ab474a79e1589e56730a,2025-02-04T18:14:20.930000
|
||||
CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000
|
||||
@ -246447,8 +246447,8 @@ CVE-2024-13717,0,0,71a3650f5ab531cb9a1850d83e24949bbb405dc3cae790e8ec5ec60af0ddf
|
||||
CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000
|
||||
CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd2f2,2025-01-30T18:44:43.053000
|
||||
CVE-2024-13721,0,0,3d01fd2636d19e08bbb60da04d18cfa1babbccecb03f24b5143393a600e41ccf,2025-01-25T06:15:27.860000
|
||||
CVE-2024-13722,0,0,984de06d3a9c465e200c05cef6d40bb3f46c015149533726268b5e191bb48830,2025-02-04T22:15:40.113000
|
||||
CVE-2024-13723,0,0,220a65234a04b8063a9dc0c78b80767c7281b83b5d90bc3c6853b5c77aa6ff22,2025-02-04T22:15:40.227000
|
||||
CVE-2024-13722,0,1,a7a480ea59a28cb898a57ce0712e00dc1b8ef881355807ed8706440a3f5ab3c5,2025-02-05T01:15:08.323000
|
||||
CVE-2024-13723,0,1,49a8c971bcd70a22dfe8db41b8c54d4295f983ea1a08ec0646d0192cced65554,2025-02-05T01:15:08.440000
|
||||
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
|
||||
CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000
|
||||
CVE-2024-13733,0,0,a9a8d1da3e9ca0d26485df457906e375bbd443f277cddd0693ddf9e0d40b866c,2025-02-04T10:15:08.527000
|
||||
@ -254116,7 +254116,7 @@ CVE-2024-29054,0,0,ca067f10dbd952f549de490b8a143c5a74d49758923d6326376ec876a34a7
|
||||
CVE-2024-29055,0,0,a04fe25ba883ccb44f78366a38aa31576d1a4456a77504bb73087df877c40a47,2024-11-21T09:07:27.810000
|
||||
CVE-2024-29056,0,0,af2d4852194edc6cf7527ac504763a06fb815f736d4d1949ca388fe427539418,2024-11-21T09:07:27.943000
|
||||
CVE-2024-29057,0,0,3deaebdc7af567eb027e3b4630e3d0b2f66daac347366af604fd2bccf7d6f841,2024-11-21T09:07:28.087000
|
||||
CVE-2024-29059,0,0,044a6984feb8642a951af040c98024cedfb7a63fd2dcd127eff738d3575cbc8b,2025-01-08T18:33:02.303000
|
||||
CVE-2024-29059,0,1,cb45373de82efd1b114a127f282f5fbad3837065f2fdac0d80a10c43fbeec6d2,2025-02-05T02:00:01.767000
|
||||
CVE-2024-2906,0,0,e78fa1cdb9d009f1e1f59fe20ffafc00d26c9427eeacf6bf57bd9ccb61ba19e2,2024-11-21T09:10:48.327000
|
||||
CVE-2024-29060,0,0,2d9ad229edcbd026ed72ca28f505019f3a24ccfb94a95ee3aaf358451d2c435c,2024-11-21T09:07:28.380000
|
||||
CVE-2024-29061,0,0,7c8701c84f59f89a131d2c90ff8025ec8c1c9a0e30cbf5684bfc2e3a344ea597,2024-11-21T09:07:28.530000
|
||||
@ -266311,7 +266311,7 @@ CVE-2024-45191,0,0,85750924302de32758668d824c400f03ec874589b01e5f9cc93263d9b344c
|
||||
CVE-2024-45192,0,0,43a7c431a16c707384aad36a7c459b5416237a7f09d05eece76501eccaa0c165,2024-09-10T19:35:09.943000
|
||||
CVE-2024-45193,0,0,97e23cf5bb2e50a369e95a1523b175851171783613d8e26e1d3a20ce3e5a05bc,2024-09-10T19:35:10.143000
|
||||
CVE-2024-45194,0,0,39e2c5f5618c81787bf696cee2375dcc2cb2276d4de328350b388d7b61cd41b4,2024-11-21T18:15:07.483000
|
||||
CVE-2024-45195,0,0,2b90b3e4454ab1c867846fcba998fb7c1f6d9604201ed0a09c53de22f7de3d81,2024-11-21T09:37:28.073000
|
||||
CVE-2024-45195,0,1,342f0a98e5a9e3f3efadce0277aa1afa0c0fcf49ef1de377ceb006160be59a37,2025-02-05T02:00:01.767000
|
||||
CVE-2024-4520,0,0,ee81a89389de5b30bb2a69c5a856e44bc0ce84cd6ef34fd29b4c99337e9f4fec,2024-11-21T09:43:01.267000
|
||||
CVE-2024-45200,0,0,816959e7602786604e30587a4aecd68df769826aff5588f51b07d55181578adc,2024-09-30T18:35:06.983000
|
||||
CVE-2024-45201,0,0,1008d923104020063a79ec3ff9863805234d3d78944913eab118b0fc97b0b3b3,2024-11-25T19:15:10.473000
|
||||
@ -268528,7 +268528,7 @@ CVE-2024-4844,0,0,e58a1488c0c0593272657966464e317ce8795e1fe0f905dd08d4a2064b2cc0
|
||||
CVE-2024-48440,0,0,b12e8f498b4696e14421c46fd8136a99002c348d0bb6cd00947a8f2b0d282013,2024-10-25T20:35:11.890000
|
||||
CVE-2024-48441,0,0,e18fc6f4de2b212db2b7205e1d5eeff25b33b83c871c639edef8600af54d0283,2024-10-25T20:35:12.680000
|
||||
CVE-2024-48442,0,0,2d256703959d5674c7059d0fc373d70703c32fa535ede7e1382722511cb6ae8e,2024-10-25T20:35:13.447000
|
||||
CVE-2024-48445,1,1,754c26197b39498b1ca324dcef9ff45a474b08fe8dac482dc0c5895595eb7b88,2025-02-04T23:15:08.850000
|
||||
CVE-2024-48445,0,0,754c26197b39498b1ca324dcef9ff45a474b08fe8dac482dc0c5895595eb7b88,2025-02-04T23:15:08.850000
|
||||
CVE-2024-48448,0,0,a99f12680e27f2aa26c82e15e379e1be001a083141c2de9e36bbeee9d3fd22db,2024-10-29T21:35:22.540000
|
||||
CVE-2024-4845,0,0,e1e461ef60509dabf0e7e2dde808d36cb958becba4b5c88bdf30fa8f1c23ed01,2024-11-21T09:43:43.393000
|
||||
CVE-2024-48450,0,0,2ad4bca80a954b5a64850267d64cde36a0cc73a58476afe8de69f997e4304a47,2024-10-29T21:35:23.350000
|
||||
@ -272361,11 +272361,11 @@ CVE-2024-53959,0,0,68036dd248b75f87e5f3d9391181f98f189af951a522aae2a41316aec0dfe
|
||||
CVE-2024-5396,0,0,a2e12a462b12b592c06259ea229afce64d9cb2b529021eb0ae1f63c97dd38d23,2024-11-21T09:47:34.430000
|
||||
CVE-2024-53960,0,0,980ae01bf410da0473069e1a3eb7a3f001cc1d8a12dcc0d46a5730cb7c2b0449,2024-12-13T17:50:01.533000
|
||||
CVE-2024-53961,0,0,9476593ad781206d835ddd97d7ad8f5f64796abb2b22390811ef79dd9710b498,2024-12-23T21:15:05.820000
|
||||
CVE-2024-53962,1,1,5ada91f70fb611dc3ff8e79d9d59abd44c27e78ab4a135c76c4c1eb63f7b93c2,2025-02-05T00:15:27.410000
|
||||
CVE-2024-53963,1,1,d8ef373a285e43953bfbdd64a974ce79a1682e32c9055599e87ae94cecb2d899,2025-02-05T00:15:27.580000
|
||||
CVE-2024-53964,1,1,39b4daee6f959c4eab6377c16baae80ab0f8d3779b690dc68ea92595f1bfcd58,2025-02-05T00:15:27.723000
|
||||
CVE-2024-53965,1,1,7e4ac7b9cb09dcb6ffc3a37e9699d2075413829afbc7b2594d4ec1e111cab34f,2025-02-05T00:15:27.870000
|
||||
CVE-2024-53966,1,1,69ac2ee473a569d89ec9f7498ebd6cbc25967ca7c5aa1aa37957115924efcb10,2025-02-05T00:15:28.023000
|
||||
CVE-2024-53962,0,0,5ada91f70fb611dc3ff8e79d9d59abd44c27e78ab4a135c76c4c1eb63f7b93c2,2025-02-05T00:15:27.410000
|
||||
CVE-2024-53963,0,0,d8ef373a285e43953bfbdd64a974ce79a1682e32c9055599e87ae94cecb2d899,2025-02-05T00:15:27.580000
|
||||
CVE-2024-53964,0,0,39b4daee6f959c4eab6377c16baae80ab0f8d3779b690dc68ea92595f1bfcd58,2025-02-05T00:15:27.723000
|
||||
CVE-2024-53965,0,0,7e4ac7b9cb09dcb6ffc3a37e9699d2075413829afbc7b2594d4ec1e111cab34f,2025-02-05T00:15:27.870000
|
||||
CVE-2024-53966,0,0,69ac2ee473a569d89ec9f7498ebd6cbc25967ca7c5aa1aa37957115924efcb10,2025-02-05T00:15:28.023000
|
||||
CVE-2024-5397,0,0,1c1b9f46c7fae3545f6c6bff25b88c782d3838975abd0364f3776c48ef8d8b3f,2024-11-21T09:47:34.563000
|
||||
CVE-2024-53975,0,0,1c6eb06597883327a72f325fc0f751cbd0dc5c99b87a33d8b2ef4784e7416fa6,2024-11-27T15:15:26.923000
|
||||
CVE-2024-53976,0,0,e0e34654e2920917adcad83ccc486a90e5a6d39da581d67f84c5bbc103fd6b7b,2024-11-26T16:15:21.430000
|
||||
@ -278169,7 +278169,7 @@ CVE-2025-0409,0,0,9622ef176974a666883ccef87aa9961f8329f556e68cbb6ca3f25010c47796
|
||||
CVE-2025-0410,0,0,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc713659,2025-01-13T18:15:21.730000
|
||||
CVE-2025-0411,0,0,50368b34154b513a9bcb2ab4aae83a9d7a98678098c0e282e61908345b547a92,2025-01-29T21:15:20.860000
|
||||
CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000
|
||||
CVE-2025-0413,1,1,38efd3e293bb98a44c17e06abb1696e33085bfc382a611893a29f93413278776,2025-02-05T00:15:28.173000
|
||||
CVE-2025-0413,0,0,38efd3e293bb98a44c17e06abb1696e33085bfc382a611893a29f93413278776,2025-02-05T00:15:28.173000
|
||||
CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000
|
||||
CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000
|
||||
CVE-2025-0430,0,0,a8200addb62401843f5be6a163be32dcec6bbc5c81068c809f1c7b05c4147e88,2025-01-17T18:15:30.920000
|
||||
@ -279287,9 +279287,9 @@ CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9
|
||||
CVE-2025-23083,0,0,8381bb96d9de4f3a833b9505098a4089bf36e1c1fc3d25063d3a10cff18f7c26,2025-01-22T02:15:33.930000
|
||||
CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000
|
||||
CVE-2025-23086,0,0,8c64985aeb33aba8982533ad038d52f283116181730bf252db15e74dc52799fa,2025-01-21T15:15:14.833000
|
||||
CVE-2025-23087,0,0,ff3ef66bbdfadd92f4bceb83f017cee238f01afd217540d38de3c3bc4241e457,2025-01-23T22:15:16.260000
|
||||
CVE-2025-23088,0,0,351c4fc9ce77a4e8c7f582485a4c81d867817a4e67e2a7d92df2d5afd4de1eba,2025-01-23T22:15:16.370000
|
||||
CVE-2025-23089,0,0,53211e365cb35c1ca6468f83d4cfd887f23da2be04794ebbf5b6bdd46246c6fa,2025-01-23T22:15:16.460000
|
||||
CVE-2025-23087,0,1,c09e00448cf3f3ebc786843b0cc82ad81bcd87d56a57ec6e0048a7e42908b3f3,2025-02-05T02:15:28.267000
|
||||
CVE-2025-23088,0,1,11e8939209f02d223d02a8c736a60c091ca0a72e8830769054cd9ade82334ee6,2025-02-05T02:15:28.413000
|
||||
CVE-2025-23089,0,1,e62b1ec51c57d0b0d2343387b9c8a249bdf7ad82d31087c994126a1fe23e1a8f,2025-02-05T02:15:28.517000
|
||||
CVE-2025-23090,0,0,1fa9642da31f6a1f285e901b43018a8c7dae722f8fb49437e281ea29c270fa57,2025-01-22T02:15:34.443000
|
||||
CVE-2025-23091,0,0,b0cc14c8e209fbe6063fb24eff4314bed321c702e3c91518f97b3035bbea10ee,2025-02-01T07:15:08.277000
|
||||
CVE-2025-23108,0,0,0867ae52bf9537919e00df206497183b5abf45a3a43e56579f476cc3d26e8d6c,2025-01-13T18:15:22.680000
|
||||
@ -279298,6 +279298,7 @@ CVE-2025-23110,0,0,b9e32d20d7e6cf23b28c590dc2ad7f239b5186f27517cd303db97f7275b07
|
||||
CVE-2025-23111,0,0,d3dc6414a9d0db9ed3cb07471714e79beac7db7fd4adde1f55f9ce769eca585e,2025-01-10T22:15:27.723000
|
||||
CVE-2025-23112,0,0,15db9896b5b2ea6c9a640fa45af2c0a8239e079375c847ac6ebc4eb1f4c0822a,2025-01-10T22:15:27.863000
|
||||
CVE-2025-23113,0,0,1f4b2afdfc961e6cff47003c2a8a61938611b1820102bae5e7ebdff42c0ff218,2025-01-10T23:15:08.810000
|
||||
CVE-2025-23114,1,1,84db4de895d9dd2188899e59f93dd681a6b72b6548b6baa41d1b67547aa85c24,2025-02-05T02:15:28.610000
|
||||
CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000
|
||||
CVE-2025-23125,0,0,2e6f0fce9ee8e787d649705f4cf1025930f6b72d6ac2efc70c4c1837b8d7d15b,2025-01-11T15:15:09.023000
|
||||
CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4089,2025-01-11T15:15:09.100000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user