mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-09 03:57:14 +00:00
Auto-Update: 2025-03-20T09:00:19.835598+00:00
This commit is contained in:
parent
c7080a86a4
commit
777d4d9b80
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-11218",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-01-22T05:15:08.903",
|
||||
"lastModified": "2025-03-19T23:15:12.280",
|
||||
"lastModified": "2025-03-20T08:15:11.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -144,6 +144,14 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2456",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2701",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2703",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2710",
|
||||
"source": "secalert@redhat.com"
|
||||
|
63
CVE-2024/CVE-2024-120xx/CVE-2024-12016.json
Normal file
63
CVE-2024/CVE-2024-120xx/CVE-2024-12016.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-12016",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2025-03-20T08:15:11.547",
|
||||
"lastModified": "2025-03-20T08:15:11.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CM Informatics CM News allows SQL Injection.This issue affects CM News: through 6.0.\n\n\n\n\n\nNOTE: The vendor was contacted and it was learned that the product is not supported."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-25-0072",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12085",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-01-14T18:15:25.123",
|
||||
"lastModified": "2025-02-26T15:15:20.790",
|
||||
"lastModified": "2025-03-20T07:15:37.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -124,6 +124,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:1451",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2701",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-12085",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-1635",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-19T22:15:48.647",
|
||||
"lastModified": "2025-02-27T11:15:10.813",
|
||||
"lastModified": "2025-03-20T07:15:37.460",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:3354",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:4884",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1635",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-9675",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-10-09T15:15:17.837",
|
||||
"lastModified": "2025-03-19T23:15:12.527",
|
||||
"lastModified": "2025-03-20T07:15:37.973",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -423,6 +423,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2454",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2701",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:2710",
|
||||
"source": "secalert@redhat.com"
|
||||
|
78
CVE-2025/CVE-2025-13xx/CVE-2025-1385.json
Normal file
78
CVE-2025/CVE-2025-13xx/CVE-2025-1385.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-1385",
|
||||
"sourceIdentifier": "cb7ba516-3b07-4c98-b0c2-715220f1a8f6",
|
||||
"published": "2025-03-20T08:15:11.723",
|
||||
"lastModified": "2025-03-20T08:15:11.723",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When the library bridge feature is enabled, the clickhouse-library-bridge exposes an HTTP API on localhost. This allows clickhouse-server to dynamically load a library from a specified path and execute it in an isolated process. Combined with the ClickHouse table engine functionality that permits file uploads to specific directories, a misconfigured server can be exploited by an attacker with privilege to access to both table engines to execute arbitrary code on the ClickHouse server.\n\nYou can check if your ClickHouse server is vulnerable to this vulnerability by inspecting the configuration file and confirming if the following setting is enabled:\n\n<library_bridge>\n <port>9019</port>\n</library_bridge>"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cb7ba516-3b07-4c98-b0c2-715220f1a8f6",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cb7ba516-3b07-4c98-b0c2-715220f1a8f6",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-5phv-x8x4-83x5",
|
||||
"source": "cb7ba516-3b07-4c98-b0c2-715220f1a8f6"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-21xx/CVE-2025-2108.json
Normal file
64
CVE-2025/CVE-2025-21xx/CVE-2025-2108.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-2108",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-20T07:15:38.187",
|
||||
"lastModified": "2025-03-20T07:15:38.187",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The 140+ Widgets | Xpro Addons For Elementor \u2013 FREE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018Site Title\u2019 widget's 'title_tag' and 'html_tag' parameters in all versions up to, and including, 1.4.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/xpro-elementor-addons/trunk/widgets/site-title/layout/frontend.php#L29",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3255986/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/009b9b0d-6cbd-402e-bc81-24661ff16b9d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-25xx/CVE-2025-2505.json
Normal file
64
CVE-2025/CVE-2025-25xx/CVE-2025-2505.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-2505",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-20T08:15:11.873",
|
||||
"lastModified": "2025-03-20T08:15:11.873",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Age Gate plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 3.5.3 via the 'lang' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary PHP files on the server, allowing the execution of code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/age-gate/trunk/vendor/agegate/common/src/Settings.php#L27",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3258075/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6ac2996-098f-474c-b44e-78d5af7b503a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
30
README.md
30
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-20T07:00:19.753181+00:00
|
||||
2025-03-20T09:00:19.835598+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-20T06:15:23.087000+00:00
|
||||
2025-03-20T08:15:11.873000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,31 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
285735
|
||||
285739
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-13875](CVE-2024/CVE-2024-138xx/CVE-2024-13875.json) (`2025-03-20T06:15:20.620`)
|
||||
- [CVE-2024-13876](CVE-2024/CVE-2024-138xx/CVE-2024-13876.json) (`2025-03-20T06:15:21.910`)
|
||||
- [CVE-2024-13877](CVE-2024/CVE-2024-138xx/CVE-2024-13877.json) (`2025-03-20T06:15:22.007`)
|
||||
- [CVE-2024-13878](CVE-2024/CVE-2024-138xx/CVE-2024-13878.json) (`2025-03-20T06:15:22.113`)
|
||||
- [CVE-2024-13880](CVE-2024/CVE-2024-138xx/CVE-2024-13880.json) (`2025-03-20T06:15:22.213`)
|
||||
- [CVE-2024-13881](CVE-2024/CVE-2024-138xx/CVE-2024-13881.json) (`2025-03-20T06:15:22.317`)
|
||||
- [CVE-2025-1314](CVE-2025/CVE-2025-13xx/CVE-2025-1314.json) (`2025-03-20T06:15:22.437`)
|
||||
- [CVE-2025-1766](CVE-2025/CVE-2025-17xx/CVE-2025-1766.json) (`2025-03-20T06:15:22.740`)
|
||||
- [CVE-2025-1770](CVE-2025/CVE-2025-17xx/CVE-2025-1770.json) (`2025-03-20T06:15:22.903`)
|
||||
- [CVE-2025-22228](CVE-2025/CVE-2025-222xx/CVE-2025-22228.json) (`2025-03-20T06:15:23.087`)
|
||||
- [CVE-2024-12016](CVE-2024/CVE-2024-120xx/CVE-2024-12016.json) (`2025-03-20T08:15:11.547`)
|
||||
- [CVE-2025-1385](CVE-2025/CVE-2025-13xx/CVE-2025-1385.json) (`2025-03-20T08:15:11.723`)
|
||||
- [CVE-2025-2108](CVE-2025/CVE-2025-21xx/CVE-2025-2108.json) (`2025-03-20T07:15:38.187`)
|
||||
- [CVE-2025-2505](CVE-2025/CVE-2025-25xx/CVE-2025-2505.json) (`2025-03-20T08:15:11.873`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `4`
|
||||
|
||||
- [CVE-2024-10445](CVE-2024/CVE-2024-104xx/CVE-2024-10445.json) (`2025-03-20T05:15:38.783`)
|
||||
- [CVE-2024-50629](CVE-2024/CVE-2024-506xx/CVE-2024-50629.json) (`2025-03-20T05:15:39.483`)
|
||||
- [CVE-2024-11218](CVE-2024/CVE-2024-112xx/CVE-2024-11218.json) (`2025-03-20T08:15:11.387`)
|
||||
- [CVE-2024-12085](CVE-2024/CVE-2024-120xx/CVE-2024-12085.json) (`2025-03-20T07:15:37.273`)
|
||||
- [CVE-2024-1635](CVE-2024/CVE-2024-16xx/CVE-2024-1635.json) (`2025-03-20T07:15:37.460`)
|
||||
- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2025-03-20T07:15:37.973`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
36
_state.csv
36
_state.csv
@ -244741,7 +244741,7 @@ CVE-2024-10441,0,0,aebae05b36ac6cb47759e06fdd5cb056920a99df39c38c73f4a48586f0216
|
||||
CVE-2024-10442,0,0,e70304607e1a9fcff67a7d0da96dd66a959139b41dd01258f3a99b5d3ca40002,2025-03-19T03:15:11.790000
|
||||
CVE-2024-10443,0,0,9a248fde514219a3f9853f6d0a6319c7fe25a6f75bf2697069d2e08ef9a76558,2025-01-14T19:29:55.853000
|
||||
CVE-2024-10444,0,0,1c5145ef8af107fe13950f2b19576a35cd6ac8c804342d4235202a1f865c009b,2025-03-19T02:15:28.297000
|
||||
CVE-2024-10445,0,1,00101347e241c4fa89fa12b5ad3c4d6469ccf3820d75b549fa2f2ad986007cb8,2025-03-20T05:15:38.783000
|
||||
CVE-2024-10445,0,0,00101347e241c4fa89fa12b5ad3c4d6469ccf3820d75b549fa2f2ad986007cb8,2025-03-20T05:15:38.783000
|
||||
CVE-2024-10446,0,0,3d25a165556e0fad6d8407d42b9edffae95ba1513463aa6427887274dcd60e3e,2024-11-01T16:39:25.890000
|
||||
CVE-2024-10447,0,0,1aabb36338a0fb4db4a2b1a8bcc54889f8acb58ed831d08462413a477f5f50d0,2024-10-31T01:23:46.300000
|
||||
CVE-2024-10448,0,0,30527750f046c9cbebeef89666183ad8cc7981e5e7641fb5f3c0c165f52e1c10,2024-11-01T18:26:55.980000
|
||||
@ -245444,7 +245444,7 @@ CVE-2024-11214,0,0,ce293b49fa3792aed1bdef0278728de22346b7c8c6fd060fecdb1a211d7c2
|
||||
CVE-2024-11215,0,0,649934bde3315408f935571e43aced9541face2e1cac41750a3378db1c35aaf3,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11216,0,0,1790dce4ed18369b069802903838bd872fdd72a0844adda5fdce5af19cc6cdfc,2025-03-05T13:15:11.493000
|
||||
CVE-2024-11217,0,0,cb24a1bdb987ee2ebd888113abdd2cecfb9cb2fe9a3dca74044179030beb620c,2024-11-18T17:11:56.587000
|
||||
CVE-2024-11218,0,0,5e620da52fc9e67d79a2d53b52fa421f7790fb7ccd4f4b2cb1028eb695817ee3,2025-03-19T23:15:12.280000
|
||||
CVE-2024-11218,0,1,a0e3b0e7dacab6fce6f750a083c630728558a86c9a67ee10ce93c4745ce16a69,2025-03-20T08:15:11.387000
|
||||
CVE-2024-11219,0,0,e0425cf1f1ca40cc6d95ef04e03e17b5776d09d72a88fcf5abbcb2ac00f59570,2024-11-27T06:15:18.110000
|
||||
CVE-2024-1122,0,0,4a647161edb6d6dbac08921722ee9f0f3f3f764af2a44d6cd56ac17a7d3d92e5,2024-11-21T08:49:50.943000
|
||||
CVE-2024-11220,0,0,bea01215af1b0ab3953945bb3fe68c48439557338f0129d7423ffdb58e634441,2025-01-23T16:54:24.970000
|
||||
@ -246235,6 +246235,7 @@ CVE-2024-12012,0,0,14e98b5ac64b0045db87c72ad7846ff409f949761b743388daf77e1918c1b
|
||||
CVE-2024-12013,0,0,0cd473350b3884feea6dfce21eb5c412ab8c70283b9ee64d68edf79d425156af,2025-02-13T16:15:44.050000
|
||||
CVE-2024-12014,0,0,2d6762db2905bcc9c5eb93189e954e10d2f874e11a0da8203dab0ca08dafa9e3,2024-12-20T16:15:23.030000
|
||||
CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000
|
||||
CVE-2024-12016,1,1,f76d2c569cc6a5ec69e1d54c9d300a8ebcf857e2860052b9074b6b75ee7630c9,2025-03-20T08:15:11.547000
|
||||
CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000
|
||||
CVE-2024-12019,0,0,bbe72b42e8316bd1350dbac16adf5394bb28bfe435f4909cdade380f4723f4d8,2025-03-14T18:15:27.230000
|
||||
CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000
|
||||
@ -246291,7 +246292,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669
|
||||
CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000
|
||||
CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000
|
||||
CVE-2024-12084,0,0,09f03b9789ff761106bb1f3be0d03a40a943d9b32f44fa2457c69ada372f11ea,2025-02-26T14:15:10.473000
|
||||
CVE-2024-12085,0,0,a26c674a2ee75c06843a39f7d7fc7c1d719143bc404b993b02db8dda47ca8141,2025-02-26T15:15:20.790000
|
||||
CVE-2024-12085,0,1,6327110f4afed370432415f28af95b82497d74d03c532d5f071f6072439a2df5,2025-03-20T07:15:37.273000
|
||||
CVE-2024-12086,0,0,eddb6eda122eaf0dac2b18ce83df4e5fbbd9d253ae3afef485d18d17f7300647,2025-02-26T15:15:21.020000
|
||||
CVE-2024-12087,0,0,dab16f771659d9b3a68e5b4f67e018530e819147e3a54748641c8439474a16b2,2025-03-11T04:15:23.443000
|
||||
CVE-2024-12088,0,0,840c3f7106724c89f22b5bd71291f0d46922a187018b26f01ff24d06752ceb27,2025-03-11T04:15:23.830000
|
||||
@ -247959,14 +247960,14 @@ CVE-2024-13870,0,0,3cb87b62ec130122ba819c9d907ccf45e4d470775a7726fc8ca4fa815401f
|
||||
CVE-2024-13871,0,0,6914e75153aa8ac82856a10614a4ab71bf74b973b9197753b08e3467b50ff7e4,2025-03-12T12:15:14.087000
|
||||
CVE-2024-13872,0,0,8441a8b9821b99dd5d66f21ca116b3982d70866c01c29996d1bcba8ba0374b87,2025-03-12T12:15:14.273000
|
||||
CVE-2024-13873,0,0,55e5174b0343fd72e7abadc33d2c5cbba17148439d124d339cc41ecc820eadf2,2025-03-11T13:32:22.040000
|
||||
CVE-2024-13875,1,1,4c4cecd6b115bd318fac78ba810a7e795d1c9ba3a8dc6f2ae96b08e6c9c2e698,2025-03-20T06:15:20.620000
|
||||
CVE-2024-13876,1,1,a6ebb82a1fbefbec5c14d68f2b73e5515e609b6de3baf8cad239c22497244595,2025-03-20T06:15:21.910000
|
||||
CVE-2024-13877,1,1,86f0106017c8b156183efc0f8f67c29d774d90ea066e396d3e86f4f2bc1d0895,2025-03-20T06:15:22.007000
|
||||
CVE-2024-13878,1,1,76be53f327d568ac30dae8c2a9f910a385d388d6c51d3af1e9b6d00145e8e707,2025-03-20T06:15:22.113000
|
||||
CVE-2024-13875,0,0,4c4cecd6b115bd318fac78ba810a7e795d1c9ba3a8dc6f2ae96b08e6c9c2e698,2025-03-20T06:15:20.620000
|
||||
CVE-2024-13876,0,0,a6ebb82a1fbefbec5c14d68f2b73e5515e609b6de3baf8cad239c22497244595,2025-03-20T06:15:21.910000
|
||||
CVE-2024-13877,0,0,86f0106017c8b156183efc0f8f67c29d774d90ea066e396d3e86f4f2bc1d0895,2025-03-20T06:15:22.007000
|
||||
CVE-2024-13878,0,0,76be53f327d568ac30dae8c2a9f910a385d388d6c51d3af1e9b6d00145e8e707,2025-03-20T06:15:22.113000
|
||||
CVE-2024-13879,0,0,840cef42e99ba3012c3b31f8bded69776814665d9c25d0869b7b55ae4acecc40,2025-02-17T16:15:15.950000
|
||||
CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000
|
||||
CVE-2024-13880,1,1,f43a7abb0507806a71f44c2a191537323a6d4b532fc4e4c876f6db3e8144a038,2025-03-20T06:15:22.213000
|
||||
CVE-2024-13881,1,1,8b65cb8fa8cbde3862235205edca969a348d00c229e25f68f803d628efd02697,2025-03-20T06:15:22.317000
|
||||
CVE-2024-13880,0,0,f43a7abb0507806a71f44c2a191537323a6d4b532fc4e4c876f6db3e8144a038,2025-03-20T06:15:22.213000
|
||||
CVE-2024-13881,0,0,8b65cb8fa8cbde3862235205edca969a348d00c229e25f68f803d628efd02697,2025-03-20T06:15:22.317000
|
||||
CVE-2024-13882,0,0,84433ff5336d8ffd4f3b9e1900997873e762c753471a7d076048637860bc8a15,2025-03-13T13:06:16.947000
|
||||
CVE-2024-13883,0,0,1e82cdf8d40eea1cf0fdba117374eff50482e8082835729e73b8298b4bf2a5eb,2025-02-25T03:39:21.267000
|
||||
CVE-2024-13884,0,0,a633c4be0fc2c6cc5ab3035b1404e8e38cf9bff027e285ddb96ab884f66c4960,2025-03-14T17:15:41.327000
|
||||
@ -248222,7 +248223,7 @@ CVE-2024-1631,0,0,e9e6578f8c2841fcf55accc66d2d8ed4ff49074482673094d89548de7e2bc4
|
||||
CVE-2024-1632,0,0,2cc9b424d1e45f344508e96412d6a0780302c60e8fef2d13cc2533af910269a7,2024-12-16T21:04:13.760000
|
||||
CVE-2024-1633,0,0,56d60136a7442b514c5e6b403331b5f9aef17563c47e24eae33412d5bd81684c,2025-01-24T15:21:06.727000
|
||||
CVE-2024-1634,0,0,45305cb187d566717a04251929f56eb3faac05db3d2b4efc70507b416ff13ab0,2024-11-21T08:50:58.150000
|
||||
CVE-2024-1635,0,0,a45e8df046020dab7d7c53111f1b795e8e98ceea7601897848c16e1a6894c3fd,2025-02-27T11:15:10.813000
|
||||
CVE-2024-1635,0,1,4d6db81055ae58cb7e4188b26b68208d05500d21c36346ce79a0198a302b1b7a,2025-03-20T07:15:37.460000
|
||||
CVE-2024-1636,0,0,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000
|
||||
CVE-2024-1637,0,0,b7437c704fbfb1b3fca1af15d0ef06f6ecbdc8f18471c8100476373d9e2e55cd,2024-11-21T08:50:58.600000
|
||||
CVE-2024-1638,0,0,3645fc3fd5a53c71cfa58f98ad075d1348bbc5dcf758960e5203009589cfd13a,2025-01-17T16:26:03.767000
|
||||
@ -272119,7 +272120,7 @@ CVE-2024-50625,0,0,600a63b94c23d23207c426e1e43b071296b787357ca99d17c5661761f04e2
|
||||
CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34c43,2024-12-12T02:06:32.817000
|
||||
CVE-2024-50627,0,0,54f35ecd4423ba348ca66129853a9258eaef3460345ced0ea32309ba3face4cb,2024-12-11T17:15:17.200000
|
||||
CVE-2024-50628,0,0,0643f111de6b649c82d0d465a05ff1bea2d7a2ca8f3d6abb1fa505b9869b41b4,2024-12-11T17:15:17.350000
|
||||
CVE-2024-50629,0,1,6a085e7a99631135fbebbaf60fda4592036c7aabcdb7966ee6230a71459481a5,2025-03-20T05:15:39.483000
|
||||
CVE-2024-50629,0,0,6a085e7a99631135fbebbaf60fda4592036c7aabcdb7966ee6230a71459481a5,2025-03-20T05:15:39.483000
|
||||
CVE-2024-5063,0,0,e630fa0c680d15c2ffb71fb0fff853109ca27af8a13b608135186f60d8e0f3a0,2025-03-03T16:05:23.833000
|
||||
CVE-2024-50630,0,0,42480fa67393e893874111e10def74090d1580a476b884485586f78334425893,2025-03-19T06:15:15.620000
|
||||
CVE-2024-50631,0,0,6556b6fba30659d0e3b45c702b6e019d0f671fd06e0aa4fb8ca6f932b0269b12,2025-03-19T06:15:15.773000
|
||||
@ -280186,7 +280187,7 @@ CVE-2024-9671,0,0,8da8355260be5bb56e0e5351a4b43035f95e0a0ad3494b67b9bb7fbd8d577c
|
||||
CVE-2024-9672,0,0,86cfa21f9d605c119ad8f12206e2a4e62457c3e0d7e7be3b9be9abdd26e1b1e9,2025-01-30T14:55:08.713000
|
||||
CVE-2024-9673,0,0,c836764540f1e4671a3678fdc4656eb5e3fdeb2561ecec798df30be3de129dbc,2025-01-17T17:15:12.997000
|
||||
CVE-2024-9674,0,0,dcc152f68b1f7c703678ea1798dc92c1fa87e3588d3559438d5c688c6e83e0d4,2024-10-22T14:02:50.473000
|
||||
CVE-2024-9675,0,0,6b3403e91bcebffc24ce8e7e063c890025752454a6c78f83a744f2bff25de99e,2025-03-19T23:15:12.527000
|
||||
CVE-2024-9675,0,1,9ce176a3f8d6bc88140744542358cfaeba9ff7a82d9f55fc25007f5988b2f226,2025-03-20T07:15:37.973000
|
||||
CVE-2024-9676,0,0,670c82e1ffb602c9b1ee5c8db176d1926dde6787061ec29de9d7f51f9d42fb5a,2025-03-20T00:15:13.600000
|
||||
CVE-2024-9677,0,0,8ac7fd75efed77835a38e0d5d30fbebdcc1b6d67032d9bfdfc464e20115a7f11,2024-12-05T22:11:15.217000
|
||||
CVE-2024-9678,0,0,8a9aac36cdd1afadf3a2846ff6bcb7bda613879cb4254453bb0b517c3a415a98,2024-12-16T07:15:06.917000
|
||||
@ -281285,7 +281286,7 @@ CVE-2025-1302,0,0,4c600c674f22378513ee28ce145975f04e5b0e89605ff80d937b77394d750b
|
||||
CVE-2025-1306,0,0,de526cacf8bf273c9432977eceb9f985b41588e9255fe87d024d0d9921890929,2025-03-05T18:45:32.943000
|
||||
CVE-2025-1307,0,0,f5a65a0d70e64918e5c1a7d1d02a502ae3db9a76fffe081c38f2a5d059c1eb26,2025-03-05T13:55:29.927000
|
||||
CVE-2025-1309,0,0,5d2b17215fed7de1b66f6e9e5fd86a1c64bff76093266d0c2270f4eeb2161dcf,2025-03-07T08:15:42.017000
|
||||
CVE-2025-1314,1,1,bef0af46751d157bebb1445681f0889869bad06628324dcac2c91ae6407a6677,2025-03-20T06:15:22.437000
|
||||
CVE-2025-1314,0,0,bef0af46751d157bebb1445681f0889869bad06628324dcac2c91ae6407a6677,2025-03-20T06:15:22.437000
|
||||
CVE-2025-1315,0,0,c9e8745dbefb0bf0261b2f91c12e9e98e3cc98d8ec5104e6ca17c1728c337c11,2025-03-13T15:00:51.697000
|
||||
CVE-2025-1316,0,0,b820806d7f30742e1f310d479db0e6f1081291250a05ea270fa97a86d0378e82,2025-03-20T01:00:01.543000
|
||||
CVE-2025-1319,0,0,5608e8fed0951b886a3c35a412349882285377e0e71940df00323908f2c62220,2025-03-06T15:09:58.827000
|
||||
@ -281334,6 +281335,7 @@ CVE-2025-1380,0,0,7ec337c9b7d3226eb945ee86e72b56068996db39674e4d48869c07d60e2a44
|
||||
CVE-2025-1381,0,0,a7ba87fad7a72f1bffe925c9548fe9143d4d449a7f8ce12fa978a99f26accdf5,2025-02-18T20:15:24.667000
|
||||
CVE-2025-1382,0,0,f394f1bf08f0724fd105e399ff64ae7d15c16e18835cf062e0212ba4779b9249,2025-03-10T14:15:24.567000
|
||||
CVE-2025-1383,0,0,c9fb1a308be655ba73427b329ae1663f0ab56dcb4706e7cabab9a87230c6ae97,2025-03-19T20:47:28.020000
|
||||
CVE-2025-1385,1,1,6b878c8300656f2014463423192ba75f470dcdc0fac3155eb37cec874ef0279b,2025-03-20T08:15:11.723000
|
||||
CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b93688f,2025-02-17T04:15:08.807000
|
||||
CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000
|
||||
CVE-2025-1389,0,0,795a35efe21e6a34ebaee5d031621504f5de1cd150eb87bc8f92558df8e46474,2025-02-17T05:15:10.317000
|
||||
@ -281548,10 +281550,10 @@ CVE-2025-1756,0,0,787bba2bf34abbaae222d1a9edb902cd4b5b03484def1773bc6176dae0327c
|
||||
CVE-2025-1757,0,0,d127b6a3ffac663a4e001beb8dfa5007692cd7ce23f31435b6a43f3b159cc775,2025-03-10T16:48:47.823000
|
||||
CVE-2025-1758,0,0,6e7273d280b144143a8cb958771624064d702636d9b502f05afaec79b1ceb45f,2025-03-19T16:15:30.527000
|
||||
CVE-2025-1764,0,0,2349f087fbe3740df3245b33b9534c78e758d2c1712d6b5913bb9ce7cf3580a6,2025-03-14T06:15:24.860000
|
||||
CVE-2025-1766,1,1,02b1b243fe7cb40bb62deeed4b2a391d24d57727a42d8f3a6c8b5cef7fdc54a9,2025-03-20T06:15:22.740000
|
||||
CVE-2025-1766,0,0,02b1b243fe7cb40bb62deeed4b2a391d24d57727a42d8f3a6c8b5cef7fdc54a9,2025-03-20T06:15:22.740000
|
||||
CVE-2025-1767,0,0,2d7a67a49e2d8224d71f3f81db0cee88468897d8d69262d33481730c6124ca91,2025-03-13T21:15:43.127000
|
||||
CVE-2025-1768,0,0,21c4d8708441d636d3d85a241f0a7821ff945f56838f66ee7adb3147ed9da671,2025-03-07T11:15:15.653000
|
||||
CVE-2025-1770,1,1,13645f43cf69bb3c76ece6bd3fa7072e9be79814027bfd73f476cbe1b659aec9,2025-03-20T06:15:22.903000
|
||||
CVE-2025-1770,0,0,13645f43cf69bb3c76ece6bd3fa7072e9be79814027bfd73f476cbe1b659aec9,2025-03-20T06:15:22.903000
|
||||
CVE-2025-1771,0,0,c171ed55fed0a4a64976e6e8eeb1698997415eae3c2cf608015436b6fb242c77,2025-03-15T05:15:47.253000
|
||||
CVE-2025-1773,0,0,795daaa3f258262b445a3a99a79426a4cfa2d8aa55ca3c162cbe1a93dbd5c998,2025-03-15T05:15:47.403000
|
||||
CVE-2025-1774,0,0,8e0367ed8bb2061d3c8c88202d36163a48bcaa3789cd28f90c30f0871f7acaaa,2025-03-17T15:15:43.523000
|
||||
@ -281934,6 +281936,7 @@ CVE-2025-2103,0,0,abd9e3c6d3a1e8179c44bebeff04e3663a861d8411eb8bab2034ae0252f7a6
|
||||
CVE-2025-2104,0,0,99febe8d4699db51e7d6405c4f1a88d56649c78c3105bcf79fec85d2eeddc67f,2025-03-13T05:15:28.303000
|
||||
CVE-2025-2106,0,0,329d8eca738f81dd7271cb4e07c0a37dfafd100699b0aa9fc30418a19545ca66,2025-03-13T02:15:13.097000
|
||||
CVE-2025-2107,0,0,ae72c9753a13e5ae907cf85381445f5fb4f2b29ba47f80df1bbf8a89b6bf588c,2025-03-13T02:15:13.250000
|
||||
CVE-2025-2108,1,1,906481620e288163794939f917f0ba3f997ad6240f9b3784f65bcac8ff040ea1,2025-03-20T07:15:38.187000
|
||||
CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000
|
||||
CVE-2025-21084,0,0,af34ba3562290d89d6e1fadbcb1efbf04888823c3570480deec642a909378dd0,2025-03-04T17:42:20.943000
|
||||
CVE-2025-21087,0,0,28561df062c57bddb73cb1503a50933afccce81ed6c2872e01fa7d13e8dbf5f5,2025-02-05T18:15:30.430000
|
||||
@ -282679,7 +282682,7 @@ CVE-2025-22222,0,0,58fbf61f1e86261177996a1b70d050ee1228a83c36092ff3d83feec937c30
|
||||
CVE-2025-22224,0,0,0c0906335b7f86da24b3fde710fab603a9c0fb60b93cf41fdeb4c7c486105569,2025-03-05T16:18:36.103000
|
||||
CVE-2025-22225,0,0,3e24abbf0adc5a228537b56235fd143ccfc793c2f301e3da3c6a729ab38579e2,2025-03-05T16:21:26.263000
|
||||
CVE-2025-22226,0,0,082732854e25a0da9d3d2451729acf57e56fc1a000d9bb5bff3b534351f8cdf6,2025-03-05T16:22:52.433000
|
||||
CVE-2025-22228,1,1,631f2a9704603135b25c1f0231162c8eee30537c895b26265bf8e03a65c63644,2025-03-20T06:15:23.087000
|
||||
CVE-2025-22228,0,0,631f2a9704603135b25c1f0231162c8eee30537c895b26265bf8e03a65c63644,2025-03-20T06:15:23.087000
|
||||
CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000
|
||||
CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000
|
||||
CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000
|
||||
@ -284497,6 +284500,7 @@ CVE-2025-25015,0,0,517a5f794d9ef96e036d38106986c029ffdcb54286c093adebeb06454d858
|
||||
CVE-2025-25039,0,0,0813deff770f203e3046b12b8be008534814496b4b844d44f12a77231cb87b8b,2025-03-13T18:15:50.610000
|
||||
CVE-2025-25040,0,0,9aa342623320cb25b7aef006218815a621e0a84a14ab71ccca4fb4715f43c17b,2025-03-18T20:15:26.030000
|
||||
CVE-2025-25042,0,0,173240ef75cbc3876c445852de0562738a10b9cebfbe843338c88c026677e7b3,2025-03-18T20:15:26.177000
|
||||
CVE-2025-2505,1,1,28de035d9839578ff426713a3e2bca48426105e561363b62cf7aa7032a079d40,2025-03-20T08:15:11.873000
|
||||
CVE-2025-25054,0,0,5be11f7aa8767f62986e873818aa7bafb83a58f1dfa102f5a36254246868acc6,2025-02-19T06:15:22.010000
|
||||
CVE-2025-25055,0,0,715a07bb29b79c7fb7ed93b83baf8d9d3a9109839cf0cb0b13f9fa08d28e54fd,2025-02-18T00:15:21.277000
|
||||
CVE-2025-25062,0,0,c25c343fff538b868333c18656ef24f68b7ac30942ec67bd9f1be9d92e00b2a9,2025-02-03T04:15:09.587000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user