Auto-Update: 2025-02-12T11:00:41.831475+00:00

This commit is contained in:
cad-safe-bot 2025-02-12 11:04:09 +00:00
parent 64b31c28ec
commit 74672c35b7
27 changed files with 1666 additions and 59 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12213",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:08.737",
"lastModified": "2025-02-12T10:15:08.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Job Board Pro plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.2.76. This is due to the plugin allowing a user to supply the 'role' field when registering. This makes it possible for unauthenticated attackers to register as an administrator on vulnerable sites."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://themeforest.net/item/superio-job-board-wordpress-theme/32180231",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7cdfce88-b6c2-4820-9d6f-446f61b9b596?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12296",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:10.230",
"lastModified": "2025-02-12T10:15:10.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Apus Framework plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'import_page_options' function in all versions up to, and including, 2.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://themeforest.net/item/superio-job-board-wordpress-theme/32180231",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dda2c437-8f41-480a-8816-2c07ab0eafa7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-12315",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T09:15:08.247",
"lastModified": "2025-02-12T09:15:08.247",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Export All Posts, Products, Orders, Refunds & Users plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.3 via the exports directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/smack_uci_uploads/exports/ directory which can contain information like exported user data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-ultimate-exporter/trunk/exportExtensions/ExportExtension.php#L1678",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3230400%40wp-ultimate-exporter&new=3230400%40wp-ultimate-exporter&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/075709e0-5f00-4d7b-80f6-96e3b4b4a895?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13365",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:10.547",
"lastModified": "2025-02-12T10:15:10.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Security & Malware scan by CleanTalk plugin for WordPress is vulnerable to arbitrary file uploads due to the plugin uploading and extracting .zip archives when scanning them for malware through the checkUploadedArchive() function in all versions up to, and including, 2.149. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3229205/security-malware-firewall#file527",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9fa30fa2-6c42-4e5f-a0b5-8711ce5d8121?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13435",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:10.727",
"lastModified": "2025-02-12T10:15:10.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ebook Downloader plugin for WordPress is vulnerable to SQL Injection via the 'download' parameter in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ebook-downloader/trunk/ebook_plugin.php#L278",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/51b0c1e5-08f7-44b3-8518-6b0902b84758?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13437",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:10.920",
"lastModified": "2025-02-12T10:15:10.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Book a Room plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.9. This is due to missing or incorrect nonce validation on the 'bookaroom_Settings' page. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/book-a-room/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bfef57b6-26b1-433b-9037-46f908422f72?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13456",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:11.240",
"lastModified": "2025-02-12T10:15:11.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Easy Quiz Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wqt-question' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/n-media-wp-simple-quiz/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/788c94a7-a8d6-4ae3-b4ca-f5c60e536f57?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13459",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:11.440",
"lastModified": "2025-02-12T10:15:11.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The FuseDesk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fusedesk_newcase' shortcode in all versions up to, and including, 6.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/fusedesk/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a69a99af-3d1d-4ad2-b6b5-e4fcea56be51?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-13473",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:11.610",
"lastModified": "2025-02-12T10:15:11.610",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LTL Freight Quotes \u2013 Worldwide Express Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameter in all versions up to, and including, 5.0.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ltl-freight-quotes-worldwide-express-edition/trunk/warehouse-dropship/wild/includes/wwe-ltl-wild-delivery-save.php#L264",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ltl-freight-quotes-worldwide-express-edition/trunk/warehouse-dropship/wild/includes/wwe-ltl-wild-delivery-save.php#L387",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3215844%40ltl-freight-quotes-worldwide-express-edition&new=3215844%40ltl-freight-quotes-worldwide-express-edition&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4e72828e-a6f6-43fc-8a10-d9908004c0fc?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13475",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:11.777",
"lastModified": "2025-02-12T10:15:11.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Small Package Quotes \u2013 UPS Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' parameter in all versions up to, and including, 4.5.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3237693/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c62680b5-e9e0-497f-b957-9b223a623917?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13490",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:11.973",
"lastModified": "2025-02-12T10:15:11.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LTL Freight Quotes \u2013 XPO Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 4.3.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3235163",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8bcfbc26-9b5d-4df8-9f16-293734bd2805?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-13528",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:12.130",
"lastModified": "2025-02-12T10:15:12.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.9.5. This is due to the presence of a shortcode that will generate a confirmation link with a placeholder email. This makes it possible for authenticated attackers, with Contributor-level access and above, to generate a verification link for any unverified user and log into the account. The 'Fine tune placement' option must be enabled in the plugin settings in order to exploit the vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.9.2/includes/class-alg-wc-ev-emails.php#L151",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3238136/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0b3798e3-45fe-4829-9012-dc728d4af87f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13531",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:12.317",
"lastModified": "2025-02-12T10:15:12.317",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ShipEngine Shipping Quotes plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' parameter in all versions up to, and including, 1.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/shipengine-shipping-quotes/trunk/admin/tab/shipping-rules/shipping-rules-save.php#L77",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cbb7bdcf-9f93-4c86-a4b3-ad5aaf7521b0?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-13814",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T09:15:08.433",
"lastModified": "2025-02-12T09:15:08.433",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Global Gallery - WordPress Responsive Gallery plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 9.1.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/global-gallery-wordpress-responsive-gallery/3310108",
"source": "security@wordfence.com"
},
{
"url": "https://lcweb.it/global-gallery-wordpress-photogallery-plugin/changelog/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b5ba815-ce92-4d7b-aa80-29d6fddd7f63?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-24772",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-28T12:15:47.273",
"lastModified": "2024-12-31T16:22:12.747",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-12T10:15:12.600",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A guest user could exploit a chart data REST API and send arbitrary SQL statements that on error could leak information from the underlying analytics database.This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1.\n\nUsers are recommended to upgrade to version 3.1.1 or 3.0.4, which fixes the issue.\n\n"
"value": "A guest user could exploit a chart data REST API and send arbitrary SQL statements that on error could leak information from the underlying analytics database.This issue affects Apache Superset: before 3.0.4, from 3.1.0 before 3.1.1.\n\n\nUsers are recommended to upgrade to version 3.1.1 or 3.0.4, which fixes the issue."
},
{
"lang": "es",
@ -62,17 +62,17 @@
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -107,14 +107,6 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/28/5",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5",
"source": "security@apache.org",

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-32838",
"sourceIdentifier": "security@apache.org",
"published": "2025-02-12T10:15:13.043",
"lastModified": "2025-02-12T10:15:13.043",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in various API endpoints - offices, dashboards, etc. Apache Fineract versions 1.9 and before have a vulnerability that allows an authenticated attacker to inject malicious data into some of the REST API endpoints' query parameter.\u00a0\nUsers are recommended to upgrade to version 1.10.1, which fixes this issue.\n\nA SQL Validator has been implemented which allows us to configure a series of tests and checks against our SQL queries that will allow us to validate and protect against nearly all potential SQL injection attacks."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/7l88h17pn9nf8zpx5bbojk7ko5oxo1dy",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45461",
"sourceIdentifier": "security@apache.org",
"published": "2024-10-16T08:15:05.717",
"lastModified": "2024-11-21T09:37:48.267",
"lastModified": "2025-02-12T10:15:13.277",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -62,17 +62,17 @@
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -143,6 +143,10 @@
"Vendor Advisory"
]
},
{
"url": "https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-4-and-4-19-1-2/",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/10/15/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52046",
"sourceIdentifier": "security@apache.org",
"published": "2024-12-25T10:15:05.437",
"lastModified": "2025-02-11T16:08:28.597",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-12T10:15:13.573",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -86,17 +86,17 @@
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53949",
"sourceIdentifier": "security@apache.org",
"published": "2024-12-09T14:15:12.647",
"lastModified": "2025-02-11T15:31:54.757",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-12T10:15:13.790",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -86,17 +86,17 @@
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
"value": "CWE-863"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55633",
"sourceIdentifier": "security@apache.org",
"published": "2024-12-12T15:15:17.600",
"lastModified": "2025-02-11T15:28:05.557",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-12T10:15:14.143",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -86,17 +86,17 @@
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
"value": "CWE-863"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-0506",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:14.360",
"lastModified": "2025-02-12T10:15:14.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Rise Blocks \u2013 A Complete Gutenberg Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the titleTag parameter in all versions up to, and including, 3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/rise-blocks/tags/3.6/classes/blocks/site-identity.php#L375",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ec012e7-b997-466e-8676-8e9467473eae?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-1187",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-12T09:15:08.613",
"lastModified": "2025-02-12T09:15:08.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in code-projects Police FIR Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Delete Record Handler. The manipulation leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 4.3,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/zzzxc643/cve/blob/main/STACK_OVERFLOW_cve.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.295093",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.295093",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.495921",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-1188",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-12T09:15:08.803",
"lastModified": "2025-02-12T09:15:08.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /dashboard/admin/updateroutine.php. The manipulation of the argument tid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/takakie/CVE/blob/main/cve_1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.295094",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.295094",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.496409",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-1189",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-12T10:15:14.540",
"lastModified": "2025-02-12T10:15:14.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in 1000 Projects Attendance Tracking Management System 1.0. This affects an unknown part of the file /admin/chart1.php. The manipulation of the argument course_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/takakie/CVE/blob/main/cve_2.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.295095",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.295095",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.496452",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-1190",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-12T10:15:14.740",
"lastModified": "2025-02-12T10:15:14.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. This vulnerability affects unknown code of the file /_parse/load_user-profile.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. Multiple parameters might be affected."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/1337g/CVE-2025-X/blob/main/job-recruitment-load_applicants-xss.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.295096",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.295096",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.496670",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-12T09:00:49.487916+00:00
2025-02-12T11:00:41.831475+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-12T08:15:09.153000+00:00
2025-02-12T10:15:14.740000+00:00
```
### Last Data Feed Release
@ -33,27 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
280955
280975
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `20`
- [CVE-2023-49780](CVE-2023/CVE-2023-497xx/CVE-2023-49780.json) (`2025-02-12T08:15:08.013`)
- [CVE-2024-13794](CVE-2024/CVE-2024-137xx/CVE-2024-13794.json) (`2025-02-12T08:15:08.430`)
- [CVE-2024-13821](CVE-2024/CVE-2024-138xx/CVE-2024-13821.json) (`2025-02-12T08:15:08.660`)
- [CVE-2025-1183](CVE-2025/CVE-2025-11xx/CVE-2025-1183.json) (`2025-02-12T07:15:07.863`)
- [CVE-2025-1184](CVE-2025/CVE-2025-11xx/CVE-2025-1184.json) (`2025-02-12T07:15:08.410`)
- [CVE-2025-1185](CVE-2025/CVE-2025-11xx/CVE-2025-1185.json) (`2025-02-12T08:15:08.870`)
- [CVE-2025-1186](CVE-2025/CVE-2025-11xx/CVE-2025-1186.json) (`2025-02-12T08:15:09.153`)
- [CVE-2025-26520](CVE-2025/CVE-2025-265xx/CVE-2025-26520.json) (`2025-02-12T07:15:08.617`)
- [CVE-2024-12213](CVE-2024/CVE-2024-122xx/CVE-2024-12213.json) (`2025-02-12T10:15:08.737`)
- [CVE-2024-12296](CVE-2024/CVE-2024-122xx/CVE-2024-12296.json) (`2025-02-12T10:15:10.230`)
- [CVE-2024-12315](CVE-2024/CVE-2024-123xx/CVE-2024-12315.json) (`2025-02-12T09:15:08.247`)
- [CVE-2024-13365](CVE-2024/CVE-2024-133xx/CVE-2024-13365.json) (`2025-02-12T10:15:10.547`)
- [CVE-2024-13435](CVE-2024/CVE-2024-134xx/CVE-2024-13435.json) (`2025-02-12T10:15:10.727`)
- [CVE-2024-13437](CVE-2024/CVE-2024-134xx/CVE-2024-13437.json) (`2025-02-12T10:15:10.920`)
- [CVE-2024-13456](CVE-2024/CVE-2024-134xx/CVE-2024-13456.json) (`2025-02-12T10:15:11.240`)
- [CVE-2024-13459](CVE-2024/CVE-2024-134xx/CVE-2024-13459.json) (`2025-02-12T10:15:11.440`)
- [CVE-2024-13473](CVE-2024/CVE-2024-134xx/CVE-2024-13473.json) (`2025-02-12T10:15:11.610`)
- [CVE-2024-13475](CVE-2024/CVE-2024-134xx/CVE-2024-13475.json) (`2025-02-12T10:15:11.777`)
- [CVE-2024-13490](CVE-2024/CVE-2024-134xx/CVE-2024-13490.json) (`2025-02-12T10:15:11.973`)
- [CVE-2024-13528](CVE-2024/CVE-2024-135xx/CVE-2024-13528.json) (`2025-02-12T10:15:12.130`)
- [CVE-2024-13531](CVE-2024/CVE-2024-135xx/CVE-2024-13531.json) (`2025-02-12T10:15:12.317`)
- [CVE-2024-13814](CVE-2024/CVE-2024-138xx/CVE-2024-13814.json) (`2025-02-12T09:15:08.433`)
- [CVE-2024-32838](CVE-2024/CVE-2024-328xx/CVE-2024-32838.json) (`2025-02-12T10:15:13.043`)
- [CVE-2025-0506](CVE-2025/CVE-2025-05xx/CVE-2025-0506.json) (`2025-02-12T10:15:14.360`)
- [CVE-2025-1187](CVE-2025/CVE-2025-11xx/CVE-2025-1187.json) (`2025-02-12T09:15:08.613`)
- [CVE-2025-1188](CVE-2025/CVE-2025-11xx/CVE-2025-1188.json) (`2025-02-12T09:15:08.803`)
- [CVE-2025-1189](CVE-2025/CVE-2025-11xx/CVE-2025-1189.json) (`2025-02-12T10:15:14.540`)
- [CVE-2025-1190](CVE-2025/CVE-2025-11xx/CVE-2025-1190.json) (`2025-02-12T10:15:14.740`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `5`
- [CVE-2024-24772](CVE-2024/CVE-2024-247xx/CVE-2024-24772.json) (`2025-02-12T10:15:12.600`)
- [CVE-2024-45461](CVE-2024/CVE-2024-454xx/CVE-2024-45461.json) (`2025-02-12T10:15:13.277`)
- [CVE-2024-52046](CVE-2024/CVE-2024-520xx/CVE-2024-52046.json) (`2025-02-12T10:15:13.573`)
- [CVE-2024-53949](CVE-2024/CVE-2024-539xx/CVE-2024-53949.json) (`2025-02-12T10:15:13.790`)
- [CVE-2024-55633](CVE-2024/CVE-2024-556xx/CVE-2024-55633.json) (`2025-02-12T10:15:14.143`)
## Download and Usage

View File

@ -238344,7 +238344,7 @@ CVE-2023-49777,0,0,33c519d5a7962fa4046ad12f5cca27992322c652fb741caea4eb8367807f6
CVE-2023-49778,0,0,32696ac80ddb602c52e8fe776f284fb0ae6da43b7282b564f5a7f39ba2f17407,2024-11-21T08:33:49.730000
CVE-2023-49779,0,0,208a0c4daf9d511825be4208e7428526e848b797a262491bdae905a77266c88f,2024-11-21T08:33:49.890000
CVE-2023-4978,0,0,9bf211ab4eda87736cc28a34ba658d0ccd93638d5da330e5c54fe73d74302125,2024-11-21T08:36:23.437000
CVE-2023-49780,1,1,60daf4253794893b3ee28669d55a4025930edb13bb38438bc9caba7bc4c994a6,2025-02-12T08:15:08.013000
CVE-2023-49780,0,0,60daf4253794893b3ee28669d55a4025930edb13bb38438bc9caba7bc4c994a6,2025-02-12T08:15:08.013000
CVE-2023-49781,0,0,3563f4405dfa96098f4f59027cce7c23b059b81f69ad6687b4bbd7d42605bb73,2024-11-21T08:33:50.010000
CVE-2023-49782,0,0,d88bb5846ccf235986a34db8ee7ec2e7c4f993cc0c87f8a5d3589de125363ba3,2024-11-21T08:33:50.137000
CVE-2023-49783,0,0,cd66debb4e559f3c84e5128cc8085a7de9859741fad8a54e1384a18a6f8b2960,2024-11-21T08:33:50.277000
@ -245440,6 +245440,7 @@ CVE-2024-1221,0,0,992589062229663edb93b0d8ce0f2928fe9cc25fcf6d182d572f9549d84b72
CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000
CVE-2024-12211,0,0,deb11f537ecb2479a2bce6b180557d850bc7e81da75598fcd5b04e01b9150472,2025-01-13T18:15:15.157000
CVE-2024-12212,0,0,4068a90166bc858f8bfa4c7fe1dbc180f7e4e033930f31a1b74471c9abd7763b,2024-12-13T01:15:05.810000
CVE-2024-12213,1,1,43fea85fb3b17ef500b815b15aafeff02cdcd2f122ce566f9454ab67cc1def40,2025-02-12T10:15:08.737000
CVE-2024-12214,0,0,145b7db175966477886a9ffd7c811efe626794ad8e1d70413662bfa5c01eb691,2025-01-07T05:15:16.470000
CVE-2024-12218,0,0,c54e0970e9fa3f5da91494a744c33c1884c0ee1f4d82830e251b56e753e1af4a,2025-01-09T11:15:12.280000
CVE-2024-12219,0,0,30a275e193bbba91aa16bdcd2e01caf0ae8c253910825d417094094009d7c6a9,2024-12-17T08:15:05.010000
@ -245512,6 +245513,7 @@ CVE-2024-12291,0,0,92bd6430c2e668a17bac8eff58d5c2110f868302e763b561cafc443091528
CVE-2024-12292,0,0,9c2e3f4715c47523d2f1e1d813aca821c280ab211aff2eeed6650ad59c376aa9,2024-12-12T12:15:22.470000
CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192ecb7,2024-12-17T09:15:05.347000
CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000
CVE-2024-12296,1,1,f4a075247b74dcdce18f90e756037116afe74f235086e1a7462ca397c76be5ae,2025-02-12T10:15:10.230000
CVE-2024-12297,0,0,fd281d2af15f3a460c7c72b16a57d9adb41153bf01efdd2829811ff4b89362f7,2025-01-15T10:15:07.237000
CVE-2024-12298,0,0,cc5fe609045dfd20e01ee8b5a4a2dfa91435af5a3c75ddd1927f875f5047d786,2025-01-14T01:15:09.423000
CVE-2024-12299,0,0,6bf8e5e626459eb3d35ab60bd9555f090eb208e414339f648c4215470dc975d2,2025-01-31T18:22:07.800000
@ -245527,6 +245529,7 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f
CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000
CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000
CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000
CVE-2024-12315,1,1,a269ae6b9c70d5e4e29227595da8aae5a2d94a7a3da788fd09a6e80da0a226f9,2025-02-12T09:15:08.247000
CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000
CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000
CVE-2024-12320,0,0,4634e0ec62d582413588701c85691767f88539a726ad91381c2adf94162c1cd5,2025-01-31T18:25:31.050000
@ -246407,6 +246410,7 @@ CVE-2024-13356,0,0,4c62ebf770eb8ffd31345cb0ef6c5025a9e134a147f2b545dcf049e579341
CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000
CVE-2024-13360,0,0,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000
CVE-2024-13361,0,0,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000
CVE-2024-13365,1,1,833943d8f13200f1945429e054583c699c1742157d80d0f9cee8a86b98e7cb53,2025-02-12T10:15:10.547000
CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000
CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000
CVE-2024-13368,0,0,dbbfa255c3d339e91eb07214cc7014e309e9bdb61391ed3e68917c31e101db69,2025-02-04T19:39:27.553000
@ -246457,6 +246461,8 @@ CVE-2024-1343,0,0,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f07
CVE-2024-13432,0,0,2420e31f27384cf3a3b972e6593316283200b18cb659242a854ce1e6ee4aeb4a,2025-01-18T07:15:08.983000
CVE-2024-13433,0,0,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc564,2025-01-18T07:15:09.160000
CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000
CVE-2024-13435,1,1,4060806b05dc19a584a0d9852c4337693011f1519912083540e24c06b76f3f55,2025-02-12T10:15:10.727000
CVE-2024-13437,1,1,503d6adff5da567fee536ffb324a5ccc786c3d759f53a9923743108aaa32218f,2025-02-12T10:15:10.920000
CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000
CVE-2024-13440,0,0,549e7c3669e086bd81446d9710c683b16be57d85613f91aefe2f2a123a5522db,2025-02-11T18:02:02.523000
CVE-2024-13441,0,0,c4feb7fa45e58abcf7c01d5df380ea3f267be46791773adc8606a649a8a16fa9,2025-02-04T19:37:08.100000
@ -246468,8 +246474,10 @@ CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649
CVE-2024-13450,0,0,43fcdfa95c84c4f9958bcf0ed96f0c3b1c10185c108adb08c789dbe5f2feb02b,2025-02-04T20:48:58
CVE-2024-13453,0,0,06294509141aad47f8448241fbfd046c29dc34b48e64b560f728719f3766672f,2025-01-30T14:15:33.873000
CVE-2024-13454,0,0,14313d18c59abf0795f9e65c924b2232675b3f5fcf8c69fe1d32af5f5cac5a65,2025-01-21T20:15:30.793000
CVE-2024-13456,1,1,684db7350be6005d533aca579f8375efe6909d8acb4ce8d28aecac2ac529d9f2,2025-02-12T10:15:11.240000
CVE-2024-13457,0,0,51be24ad36e285925bb980a73e7213c707c5621ab118dd91f24b07146640a607,2025-02-07T15:34:15.553000
CVE-2024-13458,0,0,b0c82b9a6a2ae8ab3e75191e77bf09ecd6761e542d7fe4c0d50e106a0dd3473b,2025-02-04T19:35:30.473000
CVE-2024-13459,1,1,1c840751e10f8e0a793feba978ea30eaf7ef513ec8c1cab3ce518e5a5a1609b8,2025-02-12T10:15:11.440000
CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000
CVE-2024-13460,0,0,9c101ce4e9a0b77c24ea9727b59b3a3bfa4cbf94a343064a0ab69a083a2820cf,2025-01-31T18:07:24.277000
CVE-2024-13463,0,0,a74bd740de3fc458ef5c03de3331d5acaeffdc8e1dd114982c1f405dca936e7c,2025-01-31T04:15:07.497000
@ -246478,10 +246486,13 @@ CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000
CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000
CVE-2024-13473,1,1,ca5c941d54ea016e4da3c9a29909e71ffeef3af2854e9540262f8303241a7fc8,2025-02-12T10:15:11.610000
CVE-2024-13475,1,1,58d8b87c302e2e66d53481676d4898485dca464c18876016c693f276944834c7,2025-02-12T10:15:11.777000
CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000
CVE-2024-13484,0,0,b509d432b9417c6dc7770eef09b6babb2b5c674097e16fc65cdfc3ab8c5eaf0d,2025-01-28T19:15:13.753000
CVE-2024-13487,0,0,e42f90a861119fddb567fba0eb7966e50fcc402fe16882839f676096df9b809f,2025-02-06T15:15:12.660000
CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000
CVE-2024-13490,1,1,61b1110e3ea573589f69702404cb2c4dc6b4f345244280cfa5a3ba73763f2bda,2025-02-12T10:15:11.973000
CVE-2024-13492,0,0,b366a1d0934eccf698617fb1fc1f766d6bf66d42fc2eb6cd7208ba290ff487ca,2025-02-07T16:15:36.123000
CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000
CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000
@ -246506,9 +246517,11 @@ CVE-2024-1352,0,0,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f6
CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70b11,2025-01-30T17:41:52.897000
CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000
CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000
CVE-2024-13528,1,1,cd44b8b64bd470349066ed39405dc062a72d3f9ca0a92d916296984162aedc00,2025-02-12T10:15:12.130000
CVE-2024-13529,0,0,200d7b0e051dd0616db8204a0f4feb61aaed03439a2d376a4ab184bb8a3a6125,2025-02-04T10:15:08.333000
CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000
CVE-2024-13530,0,0,79b95d03a65d37f6bd7247a320ee91efecfa7853e8fca4111e89d02aab16e68f,2025-01-31T08:15:07.543000
CVE-2024-13531,1,1,725576a974d2ed87163ed893a99332425d0718be0c9a94f638f432ea423a76a4,2025-02-12T10:15:12.317000
CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000
CVE-2024-13539,0,0,a61aa965cdeae0ee338ee06125441cf5e68ab079c32a2caa32c5b0a3f9f3e038,2025-02-12T04:15:09.197000
CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000
@ -246610,14 +246623,15 @@ CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c
CVE-2024-13775,0,0,1960bdf058198508440d85f951a3bd6116d9785e359b0700d7138122fee08aaa,2025-02-01T13:15:22.847000
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000
CVE-2024-13794,1,1,7d9dc720ed1b17f60d4475ce9f7785e093d0beb0d60109fa4ad6fb5c6dd9e9f7,2025-02-12T08:15:08.430000
CVE-2024-13794,0,0,7d9dc720ed1b17f60d4475ce9f7785e093d0beb0d60109fa4ad6fb5c6dd9e9f7,2025-02-12T08:15:08.430000
CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000
CVE-2024-13800,0,0,d24862aeca571805a2d7558bc0f1c00468e4df7532225a53769a89d86c445f41,2025-02-12T05:15:12.810000
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
CVE-2024-13813,0,0,6191208acb6a8a8377d4636aded0b7fea86db6b2ce6012bae163079aa1f69cb4,2025-02-11T16:15:39.220000
CVE-2024-13814,1,1,66e4c5f712d0d3cac700cf324f2c7529d43feaa35c8e1c5e7d866503db95b7b9,2025-02-12T09:15:08.433000
CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000
CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000
CVE-2024-13821,1,1,99ee2f50b17f976ecdf6165ebfdad40599d47ebaeb5704438b3b907b44f1a5b6,2025-02-12T08:15:08.660000
CVE-2024-13821,0,0,99ee2f50b17f976ecdf6165ebfdad40599d47ebaeb5704438b3b907b44f1a5b6,2025-02-12T08:15:08.660000
CVE-2024-13829,0,0,b39aa81be1f98cadde5a8564db1794206153bbf387222b17a1b12873f0417acd,2025-02-05T06:15:31.257000
CVE-2024-1383,0,0,59b5f34a837fb68b850c9929786dc2e35071d4c4d7ba3d2784cb584749f9b1cc,2024-11-21T08:50:27.733000
CVE-2024-13830,0,0,134f69652329a8366ec7bf0f4f83ab58cf4e0130ba5b293cb74aa2d647f91906,2025-02-11T16:15:39.363000
@ -250938,7 +250952,7 @@ CVE-2024-24768,0,0,f4716eea5cbfdded2fe5819f0fafcdfc1765e4a8285654efd5160f3d68471
CVE-2024-2477,0,0,d4fbb6a7199582203d04c57c4a507f5e44f438036cba94fbb2367befe030bb8a,2024-11-21T09:09:50.353000
CVE-2024-24770,0,0,edfb7c51cf2941d43343c18f1e3c5112e25a691c8b6403b153771dc1a6637c61,2024-11-21T08:59:39.977000
CVE-2024-24771,0,0,7009a7a317e9017a3c8d089f11274418ce8fa0caca973c650c21be34c755d8be,2024-11-21T08:59:40.127000
CVE-2024-24772,0,0,fa8d8afa3e6ee94ef81794f1afdf8fa58557e5bb82b8f60f170c5a1ad8ce93e7,2024-12-31T16:22:12.747000
CVE-2024-24772,0,1,113611fb087a2528273f37e1b290b29212ceb1c113030883b47b9ac3cd66a93b,2025-02-12T10:15:12.600000
CVE-2024-24773,0,0,be5dbf7a6261cbe0532f99bcba9db1f6241b8c06edacadc478f7c52545d83eb5,2024-12-31T16:23:25.093000
CVE-2024-24774,0,0,f6081191014f835b364f01c2d06774fe804398159465de16dc62a593984303eb,2024-11-21T08:59:40.547000
CVE-2024-24775,0,0,7f0cbc7d6af894e75c1d6dc5713fcd9f630cd471f82e9ecb0a63fc95da2f7ff6,2025-01-23T19:53:31.737000
@ -257149,6 +257163,7 @@ CVE-2024-32833,0,0,2f6b6db4ebf550ab6abc8090dd8e329317573fd251f942534bdd268f93130
CVE-2024-32834,0,0,a227e1ccf0152a47fd85db9549d82fdb8761b715ed85b010cbc316593bbd6e17,2024-11-21T09:15:49.263000
CVE-2024-32835,0,0,05b62705f8fe1947a07363b4e892df8f42409b05042069433afef41ce49f6c53,2024-11-21T09:15:49.390000
CVE-2024-32836,0,0,ea0f93a2bb527667ea20b3ee245821cb666f4877955ddb999c58bdb00d1eda3c,2024-11-21T09:15:49.520000
CVE-2024-32838,1,1,2de77f34b12f6d3820c0608dd3023889b2339c0f8b087084de89f3acb9292000,2025-02-12T10:15:13.043000
CVE-2024-32839,0,0,effbb78e054c1e702b27672f49d98c97e8196be19e4c903bd6639cf8548989eb,2024-11-13T17:35:03.780000
CVE-2024-32840,0,0,f81f56762fcdecdeada25fe978b6c3c4e0defbd18145eaff57266ffe44bdeb6a,2024-09-12T22:35:01.747000
CVE-2024-32841,0,0,cb04c1ed9fc3a164fd94ab42162387504166891d188c1af1c4f36b0577f48202,2024-11-13T17:01:16.850000
@ -266745,7 +266760,7 @@ CVE-2024-45458,0,0,b6c2bfb9613241bc1db732a55990fddff0a2453ef09377101aa3d9c9c0d80
CVE-2024-45459,0,0,d75d44b4557f3f6cd7a49bb8d21b6091a90dc43a62ead27cd6afbfb4c716eb18,2024-09-27T14:46:32.483000
CVE-2024-4546,0,0,b7cdc4b543e15e201ed44f8fc6e4cf20dc32164dd66216ed33114a6069162576,2024-11-21T09:43:04.703000
CVE-2024-45460,0,0,001c0d271f13fdcf16be449aeee5552f7fdd01ce5de21517068cf8da4d5ecf67,2024-09-27T14:51:08.120000
CVE-2024-45461,0,0,84f3694fbb53484ea1b2f0e2bd825429789554960bc7428029266b0247d5f511,2024-11-21T09:37:48.267000
CVE-2024-45461,0,1,ade97268614e7fa67f7333c402c7ad4b04643c5ba122479bcab55eddfb459dad,2025-02-12T10:15:13.277000
CVE-2024-45462,0,0,679ab98d004fc84696d7aa25657c07a27c6a4b24d431913dd55e8732360ace45,2024-11-21T09:37:48.420000
CVE-2024-45463,0,0,f60a60763ea126ac87ad92ea49c6db7eb5bfabda30dea86bfe724050021d4f8e,2024-12-10T14:30:40.500000
CVE-2024-45464,0,0,869d73137028696bd0ae01df293f32632ece1ec08a86fa3c5a7785f9023b22f0,2024-12-10T14:30:41.117000
@ -271403,7 +271418,7 @@ CVE-2024-52033,0,0,0dfe20fd02897926b6d074909c30d74601a5c2c41f63e04fe1072b7b927bd
CVE-2024-52034,0,0,8072163119d29e3d7cc1af6d3ff22d184e9e2263ebc70094a6b8e6922599c7b2,2024-11-22T23:15:05.640000
CVE-2024-5204,0,0,861a03c6b8b38defa5d93991a4825262ae7b814b89fc2ffc1e32a59f04171e4e,2024-11-21T09:47:10.927000
CVE-2024-52043,0,0,e434d805f99fdc6c5e33568cd1a8288e62a5c6170cf35ff5cddabfded34908c6,2024-11-08T20:39:36.233000
CVE-2024-52046,0,0,42c0b1652ebfdaba6dff635c79fc840cfff68e942f3bcce7e6ff210083747743,2025-02-11T16:08:28.597000
CVE-2024-52046,0,1,e166b1bf1e0b41f99bcedba2eb17827d6a25b1e4d6f9beabd9213128380e6858,2025-02-12T10:15:13.573000
CVE-2024-52047,0,0,6ecb2cc57cfbb85c6cec2e5013298e03b186e96436ece31ca8bbb4eadb7f8409,2025-01-02T20:16:05.163000
CVE-2024-52048,0,0,1e078330880d0288fe6f18e7f68258446e3ecf39417d40d314383386f65e0547,2024-12-31T16:15:26.063000
CVE-2024-52049,0,0,f8a0e8b38f04cbca4f2d1554addf580ecfac2556a3acd3d36089ae2c411f0a0a,2024-12-31T16:15:26.193000
@ -272630,7 +272645,7 @@ CVE-2024-53942,0,0,a82102ce95ecba9d91a325449993277e8666efd3fba33597504408ca5c2b2
CVE-2024-53943,0,0,437d28c72b812c4593516003fc2aba4b613f671a694938fbad086ef025289004,2025-02-05T19:15:44.257000
CVE-2024-53947,0,0,b42db7838a4330c67a4fe62e48645e7bfb198c9a3c642c30c8c0bf4ba786d6fa,2024-12-09T14:15:12.267000
CVE-2024-53948,0,0,b3d726d03ac5bb44151016e2190cf661b3901a0bee5c01681d65f576dc3ec03d,2025-02-11T16:27:31.023000
CVE-2024-53949,0,0,a13bbd2b034f14a810ef11370ca988d762a1e5809a724ee6299e0cd0712654dd,2025-02-11T15:31:54.757000
CVE-2024-53949,0,1,e6b9e69d49b032ccd0101f81928ad74ff4792c6996f261665810f89cba506d0e,2025-02-12T10:15:13.790000
CVE-2024-5395,0,0,ef2ed2f3041cf418f048505dcadd678630289408fbf19e617bbf9672f71e3b7e,2025-02-10T16:22:40.860000
CVE-2024-53951,0,0,bed406754e2e414b104efd3eb1c72bdfbbfd0447862bc041d6f24ed2188caeb2,2024-12-18T15:08:14.407000
CVE-2024-53952,0,0,e709da7c68f85daad426a8b159797750fb6868aacc174441eebd3216c961f6c5,2024-12-18T15:07:51.167000
@ -273458,7 +273473,7 @@ CVE-2024-55629,0,0,780c4ce46e3fedeaf6697f3af5ec57ff4a22df8fc3c5787a22f379165797a
CVE-2024-55630,0,0,461e7ca4168571cb7872317b8b85a2b3692fe26b6a4de15aeaee0a48767f2f22,2025-02-10T18:15:30.540000
CVE-2024-55631,0,0,c61e02e505f7e07e3ce0e8957584b0fef970130675c3fb922500870845563192,2024-12-31T17:15:08.870000
CVE-2024-55632,0,0,b094f90539addcb66cb3e41a3fa71e13de9a88f56b85fd9467860f7182935280,2024-12-31T17:15:09.007000
CVE-2024-55633,0,0,c664b892b3e1504242133e8dc7cff74a56164558d78c5fa7c8d8cf7dc963c9f5,2025-02-11T15:28:05.557000
CVE-2024-55633,0,1,b920c48d6d3db0695cfdb30d126cfa5a69f028868bcabb84fe2eb66a7b7e5dc9,2025-02-12T10:15:14.143000
CVE-2024-55634,0,0,daf076478546658d85b949599812ed8a4838ad415ad3f0107863e0715848bc3c,2024-12-11T17:15:21.243000
CVE-2024-55635,0,0,392082c131c01336e2210c07f5a3e2fcbd7cb3b3f9054eec0bafd4ca472aaecc,2024-12-10T22:15:28.190000
CVE-2024-55636,0,0,e49650b1673b5336fe0733d223e8fc2e472caad48f40b65ffc4ecff5eab92986,2024-12-16T18:15:11.463000
@ -278661,6 +278676,7 @@ CVE-2025-0499,0,0,42871b7d04896bad08e4e2a0f52be498a4b936aaa56513408d624ca2987d2d
CVE-2025-0500,0,0,ef67500424af835c1f75d32db89a4d3f8d70b570d80dc7e061c5614d7c9ed205,2025-01-29T19:15:18.870000
CVE-2025-0501,0,0,548edfbc8288b6ff7e57bf4d8a97bca009c549459d9d27e51c8af872c31d24f2,2025-01-29T19:15:18.993000
CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000
CVE-2025-0506,1,1,b858444b2919cc63b6e750a00d2589e673084acaa2fd03cd370dda36b52ce603,2025-02-12T10:15:14.360000
CVE-2025-0507,0,0,0741f2f025f4b48581d4d58f022e9dc19c48a922e6141a54aefd8981045d22c9,2025-01-31T05:15:10.280000
CVE-2025-0509,0,0,5c3664ffdd7f56763bb1b43873c2b214da02799f3bd4d544bc23e17ac3c97665,2025-02-04T20:15:49.763000
CVE-2025-0510,0,0,05652079849e71bfd50a60b32906a66a5fcd428ffe6c5caaa29432e1f6b204cf,2025-02-06T21:15:22.083000
@ -278962,10 +278978,14 @@ CVE-2025-1179,0,0,0ad6d408a4c217fcd2f0909da4acda484e872fa130d8cbaf0a20fe64a3a013
CVE-2025-1180,0,0,d1d8d021051706334ac9a6030ae7ee53a7be8dad213687a1d844e003d2aa2979,2025-02-11T15:15:20.260000
CVE-2025-1181,0,0,5744a84c9cc40c25fd0c78ba42e9c10937962bb69eac9a569d4d076d61e43914,2025-02-11T15:15:20.393000
CVE-2025-1182,0,0,813fe4ea4720937754bba6fc4a1d1e3d64c610460d89e01f2f7be5cbad40fd72,2025-02-11T15:15:20.523000
CVE-2025-1183,1,1,c50f23eb27c5b89a5407b3fc357488245ef96cf500619544044ab07479b825dd,2025-02-12T07:15:07.863000
CVE-2025-1184,1,1,8131a2a4601c6312f2be80133d491273bcd19bb85edd90fe334f633ee19a75ca,2025-02-12T07:15:08.410000
CVE-2025-1185,1,1,d7d60669b8d029a70e5905da8185e5960e0963b635c54b43748534bea8b261a0,2025-02-12T08:15:08.870000
CVE-2025-1186,1,1,547fd5e0a4619f219ac2583ed0200393212b444eb24e675c33f239c4a07dc330,2025-02-12T08:15:09.153000
CVE-2025-1183,0,0,c50f23eb27c5b89a5407b3fc357488245ef96cf500619544044ab07479b825dd,2025-02-12T07:15:07.863000
CVE-2025-1184,0,0,8131a2a4601c6312f2be80133d491273bcd19bb85edd90fe334f633ee19a75ca,2025-02-12T07:15:08.410000
CVE-2025-1185,0,0,d7d60669b8d029a70e5905da8185e5960e0963b635c54b43748534bea8b261a0,2025-02-12T08:15:08.870000
CVE-2025-1186,0,0,547fd5e0a4619f219ac2583ed0200393212b444eb24e675c33f239c4a07dc330,2025-02-12T08:15:09.153000
CVE-2025-1187,1,1,43f3ee88fa37af31ad67e166fbe6ad94a2bfae0a2b2c2cfaf9fc12673460f41b,2025-02-12T09:15:08.613000
CVE-2025-1188,1,1,18bebbbb20a4fb87b4a75dd6596b3b417690e341ae1b534eb541221170a7c80e,2025-02-12T09:15:08.803000
CVE-2025-1189,1,1,1e88f29d1eddbfa7a88b6fffffc75999f3d987abafd9713fdca1605bf31701ac,2025-02-12T10:15:14.540000
CVE-2025-1190,1,1,da811d3d30f112190fe172c4b017c4318948c541b09c054d804548ae31d5325a,2025-02-12T10:15:14.740000
CVE-2025-1193,0,0,fcc052109589eb1970f90d1d7ff13b99a2b86ca08fe73a0a45a738ed06ce3eca,2025-02-10T18:15:34.273000
CVE-2025-1211,0,0,6ad766f197b6f1fef6e3f3a893bb15bcbebd409cf163deb595b57c10dde2bea9,2025-02-11T16:15:50.660000
CVE-2025-1231,0,0,649e1b02ffb9b2bdea0c0d5302a32991e98ee2dd95c7154e6cc11a5ff00876a1,2025-02-11T15:15:20.643000
@ -280953,4 +280973,4 @@ CVE-2025-26492,0,0,5b41311733a5614d57ba5ee7777fd90be55aaaf83f70eb2ee27bd92694b6e
CVE-2025-26493,0,0,1099023a6dd0784f561a6e33a794f1b6b69f51c22042510a0826814d283df5c1,2025-02-11T14:15:31.473000
CVE-2025-26494,0,0,fbc26c80357160dc793881bb81bca8973032cb78045f64dc3903e7fb3d3f359e,2025-02-11T18:15:47.060000
CVE-2025-26495,0,0,0731ad2cc6d733334de4696008327b6e5ee6279ed8bc678e0a689b6be160a2fa,2025-02-11T18:15:47.237000
CVE-2025-26520,1,1,b83a456ccd02c927137ed430a7b7666fceb0cc753b6c14f6ee5654a1a893266c,2025-02-12T07:15:08.617000
CVE-2025-26520,0,0,b83a456ccd02c927137ed430a7b7666fceb0cc753b6c14f6ee5654a1a893266c,2025-02-12T07:15:08.617000

Can't render this file because it is too large.