Auto-Update: 2025-03-04T13:00:19.828822+00:00

This commit is contained in:
cad-safe-bot 2025-03-04 13:03:49 +00:00
parent cc289ec20e
commit 884ced27eb
16 changed files with 932 additions and 103 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1841",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-02-29T06:15:45.093",
"lastModified": "2024-11-21T07:40:00.143",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T12:25:10.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -49,24 +69,76 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:honeywell:mpa2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "R1.00.08.05",
"matchCriteriaId": "CAF764CE-1B5E-4BB1-B431-61F506797CCA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:honeywell:mpa2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79B6F95D-6F2A-46FA-8A45-BF8737AA1DCA"
}
]
}
]
}
],
"references": [
{
"url": "https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices",
"source": "psirt@honeywell.com"
"source": "psirt@honeywell.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://https://www.honeywell.com/us/en/product-security",
"source": "psirt@honeywell.com"
"source": "psirt@honeywell.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://https://www.honeywell.com/us/en/product-security",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6132",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-02-29T18:15:16.283",
"lastModified": "2024-11-21T08:43:11.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T12:25:10.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,22 +71,120 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:aveva:platform_common_services:4.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9D5AA794-B71B-4DC2-8254-558DA9EAA18C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:aveva:platform_common_services:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EA195955-5FCD-45B6-8A92-237841971054"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:aveva:platform_common_services:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB04BBFF-711B-4131-9351-2D6368D51551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:aveva:platform_common_services:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BE7D391D-D697-4517-BA2D-207CF0E59D1D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:aveva:batch_management:2020:*:*:*:*:*:*:*",
"matchCriteriaId": "EC211CF9-48DB-499F-8C47-8FA9FBC793F6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:aveva:enterprise_data_management:2021:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E14A30-8B46-4C8F-8D3D-9B1825FCD1F8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:*",
"matchCriteriaId": "1288B3F5-2A5F-4516-96F8-FDB33A71060A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:aveva:mobile_operator:2020:-:*:*:*:*:*:*",
"matchCriteriaId": "B9AA5D22-126E-4E0B-AD44-8990B9218AA6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*",
"matchCriteriaId": "D47F4B07-B67F-4855-AED2-D17B0E76FA8A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*",
"matchCriteriaId": "1ED7E9C7-B882-4F57-B796-59A4F90EE185"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*",
"matchCriteriaId": "33D5FF9C-590D-4BA3-A265-35956E4F36DF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:*",
"matchCriteriaId": "78E65146-9CB1-423B-A565-48530C453382"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:*",
"matchCriteriaId": "64EF2703-3C49-468A-ADA9-E78173DF4F65"
}
]
}
]
}
],
"references": [
{
"url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.aveva.com/en/support-and-success/cyber-security-updates/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0068",
"sourceIdentifier": "security@hypr.com",
"published": "2024-02-29T20:15:41.023",
"lastModified": "2024-11-21T08:45:49.797",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T12:25:10.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
@ -49,16 +69,62 @@
"value": "CWE-59"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hypr:workforce_access:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.7.1",
"matchCriteriaId": "7878A6FB-3848-40A5-A02E-A77F459FD7A2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.hypr.com/trust-center/security-advisories",
"source": "security@hypr.com"
"source": "security@hypr.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.hypr.com/trust-center/security-advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1277",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:46.660",
"lastModified": "2024-11-21T08:50:13.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T12:24:19.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,41 +36,115 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oceanwp:ocean_extra:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.5",
"matchCriteriaId": "16EEA570-1874-48E9-950C-7FE584C8918F"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ocean-extra/trunk/includes/post-settings/apply-settings.php#L750",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/ocean-extra/trunk/includes/post-settings/apply-settings.php#L756",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3035534%40ocean-extra%2Ftrunk&old=3008053%40ocean-extra%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5458e3bf-fd91-4201-8157-572eb1126aaf?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/ocean-extra/trunk/includes/post-settings/apply-settings.php#L750",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/ocean-extra/trunk/includes/post-settings/apply-settings.php#L756",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3035534%40ocean-extra%2Ftrunk&old=3008053%40ocean-extra%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5458e3bf-fd91-4201-8157-572eb1126aaf?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1282",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:46.817",
"lastModified": "2024-11-21T08:50:13.520",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T12:24:19.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,49 +36,129 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jannisthuemmig:email_encoder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.1",
"matchCriteriaId": "25EEDA82-EF1D-4D47-AA8B-C41F2567C172"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/email-encoder-bundle/tags/2.2.0/core/includes/classes/class-email-encoder-bundle-helpers.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/email-encoder-bundle/tags/2.2.0/core/includes/classes/class-email-encoder-bundle-run.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/email-encoder-bundle/tags/2.2.0/core/includes/classes/class-email-encoder-bundle-validate.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3033889%40email-encoder-bundle%2Ftrunk&old=3020142%40email-encoder-bundle%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78da1f88-2446-4ea5-9437-a118324ab6c2?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/email-encoder-bundle/tags/2.2.0/core/includes/classes/class-email-encoder-bundle-helpers.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/email-encoder-bundle/tags/2.2.0/core/includes/classes/class-email-encoder-bundle-run.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/email-encoder-bundle/tags/2.2.0/core/includes/classes/class-email-encoder-bundle-validate.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3033889%40email-encoder-bundle%2Ftrunk&old=3020142%40email-encoder-bundle%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78da1f88-2446-4ea5-9437-a118324ab6c2?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1496",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:52.083",
"lastModified": "2024-11-21T08:50:42.343",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T12:25:17.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fifu:featured_image_from_url:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.6.3",
"matchCriteriaId": "8B3B194C-248C-442A-BB03-4C8B46F47E83"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/featured-image-from-url/tags/4.6.2/elementor/widgets/widget.php#L49",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037479%40featured-image-from-url%2Ftrunk&old=3034300%40featured-image-from-url%2Ftrunk&sfp_email=&sfph_mail=#file9",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d1ea1c5-6a9e-4b77-bfdf-62e50d4a4c03?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/featured-image-from-url/tags/4.6.2/elementor/widgets/widget.php#L49",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3037479%40featured-image-from-url%2Ftrunk&old=3034300%40featured-image-from-url%2Ftrunk&sfp_email=&sfph_mail=#file9",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d1ea1c5-6a9e-4b77-bfdf-62e50d4a4c03?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1586",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:52.833",
"lastModified": "2024-11-21T08:50:53.440",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T12:25:17.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magazine3:schema_\\&_structured_data_for_wp_\\&_amp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.27",
"matchCriteriaId": "A6487F77-3F71-49DF-9606-ADC09B68778A"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/schema-and-structured-data-for-wp/tags/1.26&old=3038020&new_path=/schema-and-structured-data-for-wp/tags/1.27&new=3038020&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e7e6ea7-4e0b-4d8a-9306-45b55d41fbb5?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/schema-and-structured-data-for-wp/tags/1.26&old=3038020&new_path=/schema-and-structured-data-for-wp/tags/1.27&new=3038020&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e7e6ea7-4e0b-4d8a-9306-45b55d41fbb5?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1619",
"sourceIdentifier": "vulnerability@kaspersky.com",
"published": "2024-02-29T10:15:06.807",
"lastModified": "2024-11-21T08:50:56.330",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T12:25:10.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,51 @@
"value": "CWE-74"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaspersky:security:*:*:*:*:*:linux_mail_server:*:*",
"versionStartIncluding": "8.0",
"versionEndIncluding": "8.0.3.30",
"matchCriteriaId": "3C3A751B-5156-415F-8244-1BA92B116270"
}
]
}
]
}
],
"references": [
{
"url": "https://support.kaspersky.com/vulnerability/list-of-advisories/12430#010224",
"source": "vulnerability@kaspersky.com"
"source": "vulnerability@kaspersky.com",
"tags": [
"Not Applicable"
]
},
{
"url": "https://support.kaspersky.com/vulnerability/list-of-advisories/12430#010224",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2001",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-02-29T14:15:45.280",
"lastModified": "2024-11-21T09:08:47.000",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T12:25:10.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:agentejo:cockpit:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "39E40036-A27A-4F86-852D-9B15E34B911E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-cockpit-cms",
"source": "cve-coordination@incibe.es"
"source": "cve-coordination@incibe.es",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-vulnerability-cockpit-cms",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-29T20:15:41.870",
"lastModified": "2024-11-21T09:08:48.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-04T12:25:10.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -76,22 +96,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nway:nway_pro:9:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B581FC-992C-4F2F-8496-3DE528F1D14E"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.255266",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.255266",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?ctiid.255266",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.255266",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"Permissions Required"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-1889",
"sourceIdentifier": "103e4ec9-0a87-450b-af77-479448ddef11",
"published": "2025-03-03T19:15:34.560",
"lastModified": "2025-03-03T19:15:34.560",
"lastModified": "2025-03-04T12:15:32.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic."
"value": "picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle and include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic."
}
],
"metrics": {
@ -64,7 +64,7 @@
"description": [
{
"lang": "en",
"value": "CWE-807"
"value": "CWE-646"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-22224",
"sourceIdentifier": "security@vmware.com",
"published": "2025-03-04T12:15:33.687",
"lastModified": "2025-03-04T12:15:33.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware ESXi, and Workstation\u00a0contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-22225",
"sourceIdentifier": "security@vmware.com",
"published": "2025-03-04T12:15:33.840",
"lastModified": "2025-03-04T12:15:33.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware ESXi contains an arbitrary write\u00a0vulnerability.\u00a0A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-22226",
"sourceIdentifier": "security@vmware.com",
"published": "2025-03-04T12:15:33.973",
"lastModified": "2025-03-04T12:15:33.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware ESXi, Workstation, and Fusion contain\u00a0an information disclosure vulnerability due to an out-of-bounds read in HGFS.\u00a0A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 4.0
}
]
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
"source": "security@vmware.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-04T11:00:19.993484+00:00
2025-03-04T13:00:19.828822+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-04T10:15:10.817000+00:00
2025-03-04T12:25:17.263000+00:00
```
### Last Data Feed Release
@ -33,28 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284051
284054
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `3`
- [CVE-2024-13682](CVE-2024/CVE-2024-136xx/CVE-2024-13682.json) (`2025-03-04T09:15:09.960`)
- [CVE-2024-13724](CVE-2024/CVE-2024-137xx/CVE-2024-13724.json) (`2025-03-04T09:15:10.137`)
- [CVE-2024-9618](CVE-2024/CVE-2024-96xx/CVE-2024-9618.json) (`2025-03-04T09:15:10.450`)
- [CVE-2025-0370](CVE-2025/CVE-2025-03xx/CVE-2025-0370.json) (`2025-03-04T10:15:10.437`)
- [CVE-2025-0433](CVE-2025/CVE-2025-04xx/CVE-2025-0433.json) (`2025-03-04T09:15:10.613`)
- [CVE-2025-0512](CVE-2025/CVE-2025-05xx/CVE-2025-0512.json) (`2025-03-04T09:15:10.763`)
- [CVE-2025-0958](CVE-2025/CVE-2025-09xx/CVE-2025-0958.json) (`2025-03-04T10:15:10.817`)
- [CVE-2025-26849](CVE-2025/CVE-2025-268xx/CVE-2025-26849.json) (`2025-03-04T09:15:10.917`)
- [CVE-2025-22224](CVE-2025/CVE-2025-222xx/CVE-2025-22224.json) (`2025-03-04T12:15:33.687`)
- [CVE-2025-22225](CVE-2025/CVE-2025-222xx/CVE-2025-22225.json) (`2025-03-04T12:15:33.840`)
- [CVE-2025-22226](CVE-2025/CVE-2025-222xx/CVE-2025-22226.json) (`2025-03-04T12:15:33.973`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `11`
- [CVE-2024-48248](CVE-2024/CVE-2024-482xx/CVE-2024-48248.json) (`2025-03-04T09:15:10.307`)
- [CVE-2023-1841](CVE-2023/CVE-2023-18xx/CVE-2023-1841.json) (`2025-03-04T12:25:10.853`)
- [CVE-2023-6132](CVE-2023/CVE-2023-61xx/CVE-2023-6132.json) (`2025-03-04T12:25:10.853`)
- [CVE-2024-0068](CVE-2024/CVE-2024-00xx/CVE-2024-0068.json) (`2025-03-04T12:25:10.853`)
- [CVE-2024-1277](CVE-2024/CVE-2024-12xx/CVE-2024-1277.json) (`2025-03-04T12:24:19.653`)
- [CVE-2024-1282](CVE-2024/CVE-2024-12xx/CVE-2024-1282.json) (`2025-03-04T12:24:19.653`)
- [CVE-2024-1496](CVE-2024/CVE-2024-14xx/CVE-2024-1496.json) (`2025-03-04T12:25:17.263`)
- [CVE-2024-1586](CVE-2024/CVE-2024-15xx/CVE-2024-1586.json) (`2025-03-04T12:25:17.263`)
- [CVE-2024-1619](CVE-2024/CVE-2024-16xx/CVE-2024-1619.json) (`2025-03-04T12:25:10.853`)
- [CVE-2024-2001](CVE-2024/CVE-2024-20xx/CVE-2024-2001.json) (`2025-03-04T12:25:10.853`)
- [CVE-2024-2009](CVE-2024/CVE-2024-20xx/CVE-2024-2009.json) (`2025-03-04T12:25:10.853`)
- [CVE-2025-1889](CVE-2025/CVE-2025-18xx/CVE-2025-1889.json) (`2025-03-04T12:15:32.370`)
## Download and Usage

View File

@ -215676,7 +215676,7 @@ CVE-2023-1837,0,0,843502960ca6e491ad9accfb6c6ed5c829dbb5bc4eee48104dd1d8febf6d10
CVE-2023-1838,0,0,0a8fbbe5d0029b1b3df61a7a56fe1c380ddaf7b537ba283161ca9d35b1cfa6a5,2024-11-21T07:39:59.817000
CVE-2023-1839,0,0,1563748e63ae4a7b7aa6ee515f7ba6b5d2c596fec26a68793f05c8219a249dbd,2025-01-24T22:15:32.847000
CVE-2023-1840,0,0,2b4571b017989f11905a194979f2a3b3e38633e6833968f41eee44adb840c533,2024-11-21T07:40:00.037000
CVE-2023-1841,0,0,ffbd7bf6b77ab4fce3ed850e05377d613c1680cd331f4290e792698ed5b8274d,2024-11-21T07:40:00.143000
CVE-2023-1841,0,1,b1f60dccfb5e24c587de9fd3bca8e91512fb0c8bb8a8473eb2cb7560a6fa8a88,2025-03-04T12:25:10.853000
CVE-2023-1842,0,0,7823b637afff00dcae852589d7e7ca278d53d8ae6240f85cdff16a8b8257733b,2023-11-07T04:05:04.657000
CVE-2023-1843,0,0,46bcdf97a8b4053aec5e646e46be38edf9851a07cef98d532105047515fb2270,2024-11-21T07:40:00.270000
CVE-2023-1844,0,0,70a62885e593f987b4cb298f5e65054e6e1d764eb1cf483c544ff8caf6d73a89,2024-11-21T07:40:00.393000
@ -242294,7 +242294,7 @@ CVE-2023-6128,0,0,f7aeba8b0887a09bdb76a8dfa2b91736c50ae85b567af0e1b74ee7119fdf57
CVE-2023-6129,0,0,6d50580cbfb5d918e323f39a18aa61345ea143bf0a503a01eb18389da1333d2e,2024-11-21T08:43:11.507000
CVE-2023-6130,0,0,4b075222d07198db6db245f43a565f63f23db6407fa836632ba5d588e06d6054,2024-11-21T08:43:11.660000
CVE-2023-6131,0,0,85399921902195d8561cfaf24773c894de5570e8642a60884166d25bfddd1aa1,2024-11-21T08:43:11.797000
CVE-2023-6132,0,0,c713078f0e694838d03123c389001c409bb0595f6ee1c0fae4dbf6914c45a219,2024-11-21T08:43:11.930000
CVE-2023-6132,0,1,44648d79e11ac6735feba84dc2179ba14995c318abbf28cb8f6fcb83b612c271,2025-03-04T12:25:10.853000
CVE-2023-6133,0,0,0a09221a3d9b3ebba402f8c073e00c8cc69e69b053cdf74ba039ee6e080f843b,2024-11-21T08:43:12.060000
CVE-2023-6134,0,0,02f5c864463b4dea5e59fde525626cec2a9900aba6f69e06d0b7242f0d8df6a9,2024-11-21T08:43:12.193000
CVE-2023-6135,0,0,1f8e012a65e6eeca4456aa6063abc00d29d85d43d7090333000c5dc17c6c098b,2024-11-21T08:43:12.387000
@ -243378,7 +243378,7 @@ CVE-2024-0056,0,0,d8360f90b74f6700272d6a41f327dccded97d4f47b60c5e947d2cd48410872
CVE-2024-0057,0,0,6911ea0a6f9a974f33a2bfc84d09461fb97baa310549b7b23ec7e50e49e42a98,2024-11-21T08:45:49.400000
CVE-2024-0066,0,0,05604012307c9d015bd9a1531897b8404a84bf60ae836acbab80c90bdfe9713d,2024-11-21T08:45:49.587000
CVE-2024-0067,0,0,122e4a6c98538d37b86233a014d02728b12f029189e1509f4f04f30898bea208,2024-11-08T09:15:07.517000
CVE-2024-0068,0,0,7f816dd2666393642b48c08cd3ff0a0e0ef0ebe0e683f68216227e5d5b8628db,2024-11-21T08:45:49.797000
CVE-2024-0068,0,1,e81d3c3a38905983fb1e493e973bf4f5a9e831f60e26c84e16caa4d3092b382d,2025-03-04T12:25:10.853000
CVE-2024-0069,0,0,f3ce66513994f3ff028688e20278f0458e6258ba59cf74f690ee7dcc06e666da,2023-11-28T00:15:07.140000
CVE-2024-0070,0,0,cd3a46a295206562a4be32633daf482f59e1d323193385e7677ae8b6c52e190f,2023-11-28T00:15:07.183000
CVE-2024-0071,0,0,808cfb1ed41fb74862eab9e1184017d34215c208a5fcb988910ce14258a73f83,2024-11-21T08:45:49.967000
@ -246769,7 +246769,7 @@ CVE-2024-12763,0,0,828b2bb544f2e61dd11f51daf4dde3c9326c6a38ab958bf084c901608bda1
CVE-2024-12764,0,0,520ef7a415b759131cb40460656f8f00fedd52ee179d3018b43ad66d1c2ea33c,2025-02-11T02:15:33.817000
CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f13711c,2025-02-11T02:15:33.873000
CVE-2024-12768,0,0,9cdda843811199bf9b0e0359033a7a04598a7735ac6f0240aa5e3d0298e2cb55,2025-02-04T21:15:25.547000
CVE-2024-1277,0,0,9222df2a809089733817337f055467fde19a5e7b65c805b1294c187c9976df12,2024-11-21T08:50:13.170000
CVE-2024-1277,0,1,689a839a3a7db10b583a47415b0b9ced4ac1facc3de9b9bff5a5d33a6a1654fa,2025-03-04T12:24:19.653000
CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000
CVE-2024-12772,0,0,e8e2a7e307b24017f1fe59162a8fc87dfcf39277c207b4d15a2a69e2457db255,2025-02-18T19:15:12.523000
CVE-2024-12773,0,0,4a158210ce8f04e63a0cc5644404dce0edf638a1d39d2ff2dbf8f403280ec7de,2025-01-27T17:15:15.290000
@ -246805,7 +246805,7 @@ CVE-2024-12816,0,0,94a80e9971eaa7e870e47359d4c3d1f8fa9ff5419e2a80ed33d726940db7b
CVE-2024-12817,0,0,177c0c1ee17fbeb45fd7a30a85d211f5e3e78b0121812fcf822599a3e7e7f5fa,2025-01-25T08:15:08.300000
CVE-2024-12818,0,0,84584f689c6c77a45a4884a21e812302b20927c35cf898200120c33746d2aaa2,2025-01-15T10:15:07.803000
CVE-2024-12819,0,0,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b06d,2025-01-09T11:15:15.657000
CVE-2024-1282,0,0,d5910d399d68e08ea008aa7f1495198b1e2e317e51fc94d7d9061ead5db7bdd7,2024-11-21T08:50:13.520000
CVE-2024-1282,0,1,8aae000f2e1b957a732f4d9da1a09c6a0b5f298af774808a4763905b81f69a99,2025-03-04T12:24:19.653000
CVE-2024-12820,0,0,e360640a03322169bd3f6f06c3ba39e6c3f29a8f90c8d81b8f4979e1e5e53133,2025-02-28T06:15:24.903000
CVE-2024-12821,0,0,2a46264d0849bd4aa7be7fa7af85f41ff809fdd69397422a1eaf78727791d250,2025-02-28T22:16:37.477000
CVE-2024-12822,0,0,eb26dd9b7803b039e119baab2aef259fd718e2137e365ee06147d8eb4d92eb0a,2025-02-28T22:16:37.477000
@ -247599,7 +247599,7 @@ CVE-2024-13679,0,0,86229dc69131243d51d94ef8cb1d9ef15ccbc5bcaa679afb8c5258e078722
CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
CVE-2024-13681,0,0,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47fda,2025-02-21T14:22:38.737000
CVE-2024-13682,1,1,ab7b0f61263b36adc7c9dfee57d17af70806e6267e316ef0b9cb0fc98f41c6fc,2025-03-04T09:15:09.960000
CVE-2024-13682,0,0,ab7b0f61263b36adc7c9dfee57d17af70806e6267e316ef0b9cb0fc98f41c6fc,2025-03-04T09:15:09.960000
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
CVE-2024-13684,0,0,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000
CVE-2024-13685,0,0,03de3c2f4567b362885b87939b3221f81be18564e943cae2676e8a3616a94948,2025-03-04T06:15:27.240000
@ -247639,7 +247639,7 @@ CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd
CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000
CVE-2024-13722,0,0,fac6574297fad520484336a8f32a80c91be5643d31918d246727bb21994df2e7,2025-02-06T15:15:12.867000
CVE-2024-13723,0,0,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f870,2025-02-06T15:15:13.050000
CVE-2024-13724,1,1,9f38d9be9ba31cc238fe2df178488e48cdb8559bc5569c4432d146d3beb4361d,2025-03-04T09:15:10.137000
CVE-2024-13724,0,0,9f38d9be9ba31cc238fe2df178488e48cdb8559bc5569c4432d146d3beb4361d,2025-03-04T09:15:10.137000
CVE-2024-13725,0,0,3ae67647de598849d6499031064f2ab84aae12fe373705e9378e4edd2b924528,2025-02-21T15:56:24.220000
CVE-2024-13726,0,0,6f933b5330ba37986acbe4c29892bcb7173ac142380eeae5f3195ee1c4836999,2025-02-19T22:15:23.043000
CVE-2024-13728,0,0,fc3600c0f61ce7085e8da7204bc76ef6f37fa32ad9251533dccbbb08ac5789f5,2025-02-23T06:15:08.710000
@ -247835,7 +247835,7 @@ CVE-2024-1491,0,0,d70967d622773fff19c9093c078311d0c0317938407098534f36b503281d0d
CVE-2024-1492,0,0,59343017212ddb64bbe621b975505cb84ad4611a92838c8772b58396c8764654,2024-11-21T08:50:41.923000
CVE-2024-1493,0,0,951758bed46ad6e985cb8d3e1e537f9ab8062a6daa78beef2a278abf219edefe,2024-11-21T08:50:42.043000
CVE-2024-1495,0,0,b3d42a19aa1a62facaef98e7f063ab8c0b4a92d4ea0b89ef5f606fcb4257510d,2024-11-21T08:50:42.197000
CVE-2024-1496,0,0,89eb38a25731619b571de7264c5cc42153898920f8c955053ad284bb9a9267c8,2024-11-21T08:50:42.343000
CVE-2024-1496,0,1,859e7e5d8a917a39094959f5e651d557a15d14e7f8da8d3e05e54ad75be23b72,2025-03-04T12:25:17.263000
CVE-2024-1497,0,0,bbe3250bf4479120430c0f29b882afc9852aab2e448bf41f0296f987b62a68f0,2025-01-22T21:00:03.030000
CVE-2024-1498,0,0,9cbd92d0f33965fc6126a633cc19db346c78e615eab4dbf18c292d9646196f1d,2025-01-07T18:18:04.250000
CVE-2024-1499,0,0,0633316f47685281ee22de44984ee86e019a3a966e3a05caf35512f407ac2251,2025-01-22T20:58:15.017000
@ -247918,7 +247918,7 @@ CVE-2024-1580,0,0,b4c85f804f3ce2bebc9a67ff4f8729e521ce8a5ac9e2676ae788d23145f50c
CVE-2024-1582,0,0,b464a7d153c2341a87cab438d3cbd89bdc0b71381693f648c2e94a9e1b3f1c2d,2025-02-11T15:57:12.813000
CVE-2024-1584,0,0,cfafdb4f5ffc1319288c510c9224a8cb8c2cc5f346f7b847228043c1ff209e06,2024-11-21T08:50:53.187000
CVE-2024-1585,0,0,1d475b7c85f620c08988c251c2895ab948e7f3ba822cf6ec7f5aba08404a5ef1,2024-11-21T08:50:53.310000
CVE-2024-1586,0,0,1a674f7c096768d0bba9e5b13902c8c36e107c11a617db1c9dba87c83e58c4a6,2024-11-21T08:50:53.440000
CVE-2024-1586,0,1,541da7657b20f087f9ba81ec37e77af1ce0070c0f329c6e392de3f525200b8a0,2025-03-04T12:25:17.263000
CVE-2024-1587,0,0,9d367856c23035719b91ca8cb6ecef3700bc507de87dd872f0f3db6ad94fac7e,2025-02-26T19:15:20.073000
CVE-2024-1588,0,0,064c6c0dd6f975ea15e06fcb223479e78a68292a40c160ed7cd24d23d617f190,2024-11-21T08:50:53.673000
CVE-2024-1589,0,0,1931589006a4c51bc1b5b6052d50e4e25fdb31d7b1487761957f59c98cc0a546,2024-11-21T08:50:53.787000
@ -247943,7 +247943,7 @@ CVE-2024-1608,0,0,0a57ef7d0ee1c774c7263d04a6788a7f66bae8cf3338ec576b87a084004d24
CVE-2024-1609,0,0,fccce712d5b51d64f058f686add884943b63cc50b1aa573fc5b42dba9ff87c96,2024-12-25T04:15:06.750000
CVE-2024-1610,0,0,d5812a4c168fe77b942e08446c0de47072455d9314c53f81af852c4034bb9f3a,2024-12-18T16:15:12.060000
CVE-2024-1618,0,0,f900010f21bb70b6581fb91ea7ff15d09cd9f4b411eb32fa913b01f49c3af689,2024-11-21T08:50:56.193000
CVE-2024-1619,0,0,418ba96e6a4d18db916904e55cbeed3525ef9825ce2475252dbe1c11f7e5bf84,2024-11-21T08:50:56.330000
CVE-2024-1619,0,1,1dc4cae75e6ed8035ddda75fc43d6cd5ea02825d1806a78ac187cc30887cfdd6,2025-03-04T12:25:10.853000
CVE-2024-1621,0,0,4f71e917a983b004200d9504ffd2175f3bc02a73b7994fa10c0feba74dd0181d,2024-09-17T14:12:41.620000
CVE-2024-1622,0,0,6230709226e22321ed94885d3b77124257bb246922a7e40fbe69d0e730121d80,2025-02-27T03:05:58.637000
CVE-2024-1623,0,0,11acc09d0781037d56051debbc6de791211a8b87ba326c3093f5bc85aad229af,2025-01-23T18:10:39.310000
@ -248319,7 +248319,7 @@ CVE-2024-20005,0,0,81864e6b98bccdaf19cf86faa064f989d3abe91d785c41a769f319bee2d04
CVE-2024-20006,0,0,123690fda6d54b98716f1dcc2adbe49f785d535a185fe9b4159c2360ed88a9ac,2024-11-21T08:51:46.967000
CVE-2024-20007,0,0,ab19a2494b1d096e2862ed93f193d718b58535b709bff75d63ca0c55cebc750e,2024-11-21T08:51:47.180000
CVE-2024-20009,0,0,4a58a52b68097964e7e1bcf696d9da3d868e5ffe4b53e991be80fb6a46e280b2,2024-11-21T08:51:47.310000
CVE-2024-2001,0,0,1b2f9f6aec09c4eaa80b3167148a95752c7f9a1b608cededba429fe7a7c9478d,2024-11-21T09:08:47
CVE-2024-2001,0,1,b145f3947cfb1e29dada7265c93c9dd24666a55f79102cbd5ad9e7a7be5dd7d8,2025-03-04T12:25:10.853000
CVE-2024-20010,0,0,8edbf766ae1c5f4665b2af7523fb7a6f5200cb0332f487369daeca619902a2ec,2024-11-21T08:51:47.437000
CVE-2024-20011,0,0,87bce25997d86bdef96305e83059e8ef24e00ebd023828f1663236af9db940d9,2024-11-21T08:51:47.577000
CVE-2024-20012,0,0,032eaf44b99fe882a34e6aba7f568f377b39ce8e6869d2f3e491b4a94d24d9c9,2024-11-21T08:51:47.703000
@ -248402,7 +248402,7 @@ CVE-2024-20086,0,0,5f38d98a412fa8e24f7083fe5b59d81c98c8095fbd38cef9f91b5a2fd78ff
CVE-2024-20087,0,0,127fda73dc634b061b298bf97ad3e36651c853da287dbf3edeee880a02dac2e8,2024-09-05T14:26:51.497000
CVE-2024-20088,0,0,799856d2d6a88eb0cbfd91dbeb434761b25f41370ebbfa9762058543c2fbca4b,2024-09-05T14:27:24.840000
CVE-2024-20089,0,0,ab63f2683963fb30bca2be5c703bf1c80e2ef2082975e77e18edca5b61d8b301,2024-09-05T14:28:02.713000
CVE-2024-2009,0,0,79edd0d3a3d4db8110502af9b7bb50d1430660b56f7ea4fe900e8d42a48ebf35,2024-11-21T09:08:48.170000
CVE-2024-2009,0,1,f41104c269d626c0ab9b2253bedae51fb046386d2219528e375dabd255f6c315,2025-03-04T12:25:10.853000
CVE-2024-20090,0,0,a65fed379c4dce4f0c9e874b96968f906ad2b824d77ffe473363a1c9911ded18,2024-10-07T19:36:41.627000
CVE-2024-20091,0,0,52bbd4e5e4ea1b1110e5db08fb1eef905f8b4c771967a4a299c0ee13344532b6,2024-10-27T03:35:01.130000
CVE-2024-20092,0,0,bccf2d6f90e4a3c613ce6cf5daf983cac4e07c4ee3a83bc53222394d67633936,2024-10-07T19:36:41.920000
@ -269963,7 +269963,7 @@ CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bd
CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000
CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000
CVE-2024-48245,0,0,aca39816c4fa40e3329fe946417f7ca9849849875505e3b3a53a29b06062021c,2025-01-07T20:15:29.750000
CVE-2024-48248,0,1,ac3fc0f6c8ce3e0223ebe710a67ff2a29a152ed42554d6cf3798d430ad51a664,2025-03-04T09:15:10.307000
CVE-2024-48248,0,0,ac3fc0f6c8ce3e0223ebe710a67ff2a29a152ed42554d6cf3798d430ad51a664,2025-03-04T09:15:10.307000
CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000
CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000
CVE-2024-48251,0,0,c80def3e238ed0fab4e8dad7bc06f5b33b90fcccea2cf3bdaafbfe1c7c4fb67e,2024-10-17T18:35:12.280000
@ -279650,7 +279650,7 @@ CVE-2024-9613,0,0,f7f019a18c9e01f36efde66dfbb10d6eba11ff87ade2b8efd8a79811ebe631
CVE-2024-9614,0,0,89d6ad4791713c9131b15fd858d4bd9404ef7090c81b08570775178f0867f84e,2024-11-13T17:01:16.850000
CVE-2024-9615,0,0,c9468917c9754e631849fcee424e37c3bdfdc0ce7baf1874e3cbc9e2bb677dcd,2024-11-18T17:11:17.393000
CVE-2024-9616,0,0,6ef77d38c3e8284229b9cc30b59e98636261a63c660e6b9ccf97deb77695f71d,2024-10-15T12:58:51.050000
CVE-2024-9618,1,1,7a56b25cc8076786fa8dbc2faf73c77c06643e856c26b74c5bd7a50dd6aa43c4,2025-03-04T09:15:10.450000
CVE-2024-9618,0,0,7a56b25cc8076786fa8dbc2faf73c77c06643e856c26b74c5bd7a50dd6aa43c4,2025-03-04T09:15:10.450000
CVE-2024-9619,0,0,a7bf5db408a5ec4a6f2bb2b3418fdbfda580c42a8671077d531fc4eac03bc58f,2024-12-20T07:15:12.977000
CVE-2024-9620,0,0,5f4d387a05e8c7d787dc78c4da6b8994737bf87f4aa2585e1708a37b135ad3b4,2024-10-10T12:56:30.817000
CVE-2024-9621,0,0,d01febf4917d7e254a80be80939f9dbe78ca0c8507d48f25eb8390335c29a3af,2024-12-06T10:15:06.327000
@ -280154,7 +280154,7 @@ CVE-2025-0366,0,0,920cbf026bda2b01c51576327bc7f0315b5ccf05dfdbae1172aca359c4e343
CVE-2025-0367,0,0,ab3acf71ca0537fe4a7d80088a2aafb5561d6238415269bf152b7ed9b1300383,2025-01-30T17:15:18.097000
CVE-2025-0368,0,0,a3cd88f6c2e32d5753c4cc60666c98ec19ead45f71b261b7ea54f7fb575f967d,2025-02-04T19:15:32.070000
CVE-2025-0369,0,0,968f1c7b7fff7a404f2212aa81591bd64fc1ef313f079e18ed81ef90b8b12902,2025-01-18T07:15:09.720000
CVE-2025-0370,1,1,e1da10ba8b98d2f08bca2957ca7fb895f13a81e762804e1f73225d236c34ce54,2025-03-04T10:15:10.437000
CVE-2025-0370,0,0,e1da10ba8b98d2f08bca2957ca7fb895f13a81e762804e1f73225d236c34ce54,2025-03-04T10:15:10.437000
CVE-2025-0371,0,0,de30e603b077e64693a9f53a95b364cbc495f2694acb2d5aef6b2eb3aaaea9a8,2025-01-31T20:16:11.363000
CVE-2025-0373,0,0,c896e2039f1868b25d47604a1b505a94cc3030671c646849df8ad1a697ac14ca,2025-02-07T17:15:30.760000
CVE-2025-0374,0,0,8869dd713bc48baec5d2bd3f0b3f9adaccbc12e420edf3f19dd609cc3be6ee1a,2025-02-07T17:15:30.903000
@ -280193,7 +280193,7 @@ CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6
CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000
CVE-2025-0430,0,0,4e18cb7de447c14e34b06241818bd17d9db4853e01a4fdf6d152f010ee011658,2025-01-17T18:15:30.920000
CVE-2025-0432,0,0,be1a96ec1a155389d359c137e77a07190805d57ba524277b7183ba768a401b9a,2025-01-28T16:15:40.183000
CVE-2025-0433,1,1,25c8f9c226d0218f7d83df15e897e9a323a9b58113274c0dfcec7762f2afad67,2025-03-04T09:15:10.613000
CVE-2025-0433,0,0,25c8f9c226d0218f7d83df15e897e9a323a9b58113274c0dfcec7762f2afad67,2025-03-04T09:15:10.613000
CVE-2025-0434,0,0,80805d1fc694dbf391f864cbd97ec8a7e48ef050c445c249811ef890ae257b48,2025-02-18T22:15:16.447000
CVE-2025-0435,0,0,604058ef793e33435759746d46c23b90cc51452de4822b6472440608e3ab5958,2025-02-18T22:15:16.540000
CVE-2025-0436,0,0,72789f2cd8147d5a86876c7b0b79e40e25dcd2c9396b81691e6fd199d1206765,2025-02-18T22:15:16.627000
@ -280259,7 +280259,7 @@ CVE-2025-0507,0,0,0741f2f025f4b48581d4d58f022e9dc19c48a922e6141a54aefd8981045d22
CVE-2025-0509,0,0,913ed89216296740c4c407c24a56b36bddc347f56451a23b8f05b7d47d26ebb6,2025-02-17T12:15:27.370000
CVE-2025-0510,0,0,05652079849e71bfd50a60b32906a66a5fcd428ffe6c5caaa29432e1f6b204cf,2025-02-06T21:15:22.083000
CVE-2025-0511,0,0,208876e26427d3b8f218407b81a5b4afa8bcd5e931fdeb6575b6f455a23596eb,2025-02-20T20:35:03.573000
CVE-2025-0512,1,1,1a8d64be7460acfa44387e3dbb890ecf8847063bb41f9deb094d5af2dcbf3512,2025-03-04T09:15:10.763000
CVE-2025-0512,0,0,1a8d64be7460acfa44387e3dbb890ecf8847063bb41f9deb094d5af2dcbf3512,2025-03-04T09:15:10.763000
CVE-2025-0513,0,0,16e90cd60d3f0b990d0a506119738b488f3ad7bf5bf01e1849a16f8301021207,2025-02-11T15:15:19.257000
CVE-2025-0514,0,0,0ea869b55fb06aba02ed9e48860e6595c30b3a11be9cc65554e0ffc514b5fb9a,2025-02-25T22:15:14.887000
CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a4731,2025-01-18T07:15:09.903000
@ -280529,7 +280529,7 @@ CVE-2025-0949,0,0,0738bb2b66672fae5fd020ba0f9a70fb106ebc19e1971dce25f2e18c30dd0c
CVE-2025-0950,0,0,7903835c96a972c16989f2cc1ccaf15a7fc2f203d2ad321ca6bcf09943e4f0e2,2025-02-03T18:15:41.847000
CVE-2025-0953,0,0,921a82da6ab0ef8d3d98803db3946d447f0517778af0c3f71c90d1c8292a158b,2025-02-22T13:15:11.850000
CVE-2025-0957,0,0,495f2d5b6e1d536933c2ca0f5f42b3b064381124c6d04bc27597b46752e07780,2025-02-22T14:15:29.710000
CVE-2025-0958,1,1,571b6daa8412a8dbab85a507fad7b4f36ac7400535cbebe7229ffe82ac243e85,2025-03-04T10:15:10.817000
CVE-2025-0958,0,0,571b6daa8412a8dbab85a507fad7b4f36ac7400535cbebe7229ffe82ac243e85,2025-03-04T10:15:10.817000
CVE-2025-0960,0,0,499907aaf0daa1209acd23a8382909ccee8a784758e88e7f103cadb30772d3d2,2025-02-04T20:15:50.103000
CVE-2025-0961,0,0,059a317a12e25a50163b21bef6bea5a610b1a05de1674dda2e4a2359a3f086cd,2025-02-10T13:15:26.413000
CVE-2025-0967,0,0,d8c64e0386338d50f41e26d5ea4b324d68ccfa9e57d63544f495e90b3a5b315a,2025-02-25T19:05:40.627000
@ -280994,7 +280994,7 @@ CVE-2025-1879,0,0,acc64ec8d5a295a37fd36d2847aa407b8c77ad841f38a076dbb5ebaf330d51
CVE-2025-1880,0,0,226f0629ce5edc5a5e9b1fc0edae802ea4130e5a975c21f8005cf570735a0f71,2025-03-03T20:15:45.717000
CVE-2025-1881,0,0,f200a1b35fa04fb1cf756c59d318883b14b2ed22445032eb6d28b374aaf8378d,2025-03-03T21:15:18.097000
CVE-2025-1882,0,0,258c65b462c2d3330a44589b1e6146be14f4578339a6a130d959fe1a0c619c59,2025-03-03T21:15:18.267000
CVE-2025-1889,0,0,9e26ff88ce149a7317f011cdb6490eecaa4154d41776e87fe9249b31d210a875,2025-03-03T19:15:34.560000
CVE-2025-1889,0,1,f7cf73293a0ccf1008c443a59d3e7d9e6c3eafe2a69cacf7dd719e71afcc42d7,2025-03-04T12:15:32.370000
CVE-2025-1890,0,0,fb180de0a5553a034ff78b5b5a313fe552ef117fe5eb133cd304c74c41bebb8e,2025-03-04T00:15:31.190000
CVE-2025-1891,0,0,ba5dca5f04b0970d036a786c7821b97cb95f51992163656e2d4e884b26749b04,2025-03-04T00:15:31.377000
CVE-2025-1892,0,0,5f521d1356697805c14d8f756f3eea70794c3f1bece498159531e6576bcea5d0,2025-03-04T01:15:11.147000
@ -281745,6 +281745,9 @@ CVE-2025-22219,0,0,b49955fb2ad7bfd00b8dfa99078cc886448cbbcd0b573429971407c26bc29
CVE-2025-22220,0,0,a00b168f73aec469e4c78128ddc9ae91feb9fbb9ddcfb4c72ca05c1c287f029b,2025-02-06T14:15:30.510000
CVE-2025-22221,0,0,9ab8cb2916b1d2add27df50f24514c36d0740b88ba103377a1c3f59422214b6c,2025-01-30T16:15:31.257000
CVE-2025-22222,0,0,f96218f2ce820065976bcd4294c5a9c60e0f54f4e21cd14eff22d95b2b98eb7e,2025-01-30T16:15:31.367000
CVE-2025-22224,1,1,fd318e5fff77738843cc9b3d3e80d297f64943d387efb764d22c0ea672dc48d8,2025-03-04T12:15:33.687000
CVE-2025-22225,1,1,f4834648c2f6b2494eb42892bf6d82d8181e27a43ce98b17e9726398b9b9f312,2025-03-04T12:15:33.840000
CVE-2025-22226,1,1,d90adfb8715bb1e8dc631ffd086928d68c1066ee4e833d32035e4567da2000ca,2025-03-04T12:15:33.973000
CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000
CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000
CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000
@ -283847,7 +283850,7 @@ CVE-2025-26793,0,0,d30b44911459092c9e08ffe42552727cfd072bd06f4aa8564ac964446a27e
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
CVE-2025-26803,0,0,407dfdf36bb29c1169c55a1bdf56c2857dbd1f6059de4d7853e727c76548a45d,2025-02-28T16:07:41.847000
CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000
CVE-2025-26849,1,1,54decf0050486d8bff18d33a6116f8f7ed807923bef5d3d8bf0649b9106ae882,2025-03-04T09:15:10.917000
CVE-2025-26849,0,0,54decf0050486d8bff18d33a6116f8f7ed807923bef5d3d8bf0649b9106ae882,2025-03-04T09:15:10.917000
CVE-2025-26856,0,0,7824298cfc11aa81d23219a23487dd842dd5c11d44f90723ef1786188c90cd64,2025-02-20T06:15:21.673000
CVE-2025-26868,0,0,cba4f0d0c27029718e2b50a126041299a77ea3636d837c9614e50e9855b0878b,2025-02-25T15:15:23.903000
CVE-2025-26871,0,0,ab850536250644e42a3ba5d883350c3eff02f87d1e660abd32733c03a6449348,2025-02-25T15:15:24.040000

Can't render this file because it is too large.