Auto-Update: 2025-01-04T15:00:19.929154+00:00

This commit is contained in:
cad-safe-bot 2025-01-04 15:03:41 +00:00
parent 5009eb7865
commit 8a82360455
7 changed files with 525 additions and 17 deletions

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-10957",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-04T14:15:22.430",
"lastModified": "2025-01-04T14:15:22.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The UpdraftPlus: WP Backup & Migration Plugin plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.24.11 via deserialization of untrusted input in the 'recursive_unserialized_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must perform a search and replace action to trigger the exploit."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/updraftplus/trunk/includes/class-search-replace.php#L411",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3212299/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4729ed37-96b2-4717-8a72-89b9a21ec058?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-13042", "id": "CVE-2024-13042",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-30T21:15:06.523", "published": "2024-12-30T21:15:06.523",
"lastModified": "2024-12-30T21:15:06.523", "lastModified": "2025-01-04T13:15:06.483",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability was found in Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532). It has been classified as problematic. Affected is the function download of the file SubjectController.class.php. The manipulation of the argument path leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." "value": "A vulnerability was found in Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532). It has been classified as problematic. Affected is the function download of the file /Searchnew/Subject/download.html. The manipulation of the argument path leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en Tsinghua Unigroup Electronic Archives Management System 3.2.210802(62532). Se ha clasificado como problem\u00e1tica. La funci\u00f3n de descarga del archivo SubjectController.class.php est\u00e1 afectada. La manipulaci\u00f3n de la ruta de argumentos conduce a la divulgaci\u00f3n de informaci\u00f3n. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
} }
], ],
"metrics": { "metrics": {
@ -107,7 +111,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0207",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-04T13:15:07.383",
"lastModified": "2025-01-04T13:15:07.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. Affected by this issue is some unknown functionality of the file /function/login.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/th4s1s/d10dfaebae75c8dbe54ad83d63725d81",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290144",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290144",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.474035",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0208",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-04T13:15:07.557",
"lastModified": "2025-01-04T13:15:07.557",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in code-projects Online Shoe Store 1.0. This affects an unknown part of the file /summary.php. The manipulation of the argument tid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/th4s1s/24925a20d1f9336858dee1cbbb30c249",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290145",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290145",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.474038",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0210",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-04T14:15:22.590",
"lastModified": "2025-01-04T14:15:22.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Campcodes School Faculty Scheduling System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/ajax.php?action=login. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/shaturo1337/POCs/blob/main/Blind%20SQL%20Injection%20in%20School%20Faculty%20Scheduling%20System.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290155",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290155",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.474112",
"source": "cna@vuldb.com"
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-01-04T13:00:19.451859+00:00 2025-01-04T15:00:19.929154+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-01-04T12:15:24.830000+00:00 2025-01-04T14:15:22.590000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,23 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
275704 275708
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `4` Recently added CVEs: `4`
- [CVE-2024-12195](CVE-2024/CVE-2024-121xx/CVE-2024-12195.json) (`2025-01-04T12:15:22.953`) - [CVE-2024-10957](CVE-2024/CVE-2024-109xx/CVE-2024-10957.json) (`2025-01-04T14:15:22.430`)
- [CVE-2024-12279](CVE-2024/CVE-2024-122xx/CVE-2024-12279.json) (`2025-01-04T12:15:24.453`) - [CVE-2025-0207](CVE-2025/CVE-2025-02xx/CVE-2025-0207.json) (`2025-01-04T13:15:07.383`)
- [CVE-2024-12475](CVE-2024/CVE-2024-124xx/CVE-2024-12475.json) (`2025-01-04T12:15:24.650`) - [CVE-2025-0208](CVE-2025/CVE-2025-02xx/CVE-2025-0208.json) (`2025-01-04T13:15:07.557`)
- [CVE-2025-0206](CVE-2025/CVE-2025-02xx/CVE-2025-0206.json) (`2025-01-04T12:15:24.830`) - [CVE-2025-0210](CVE-2025/CVE-2025-02xx/CVE-2025-0210.json) (`2025-01-04T14:15:22.590`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `1`
- [CVE-2024-13042](CVE-2024/CVE-2024-130xx/CVE-2024-13042.json) (`2025-01-04T13:15:06.483`)
## Download and Usage ## Download and Usage

View File

@ -243957,6 +243957,7 @@ CVE-2024-10947,0,0,9ca33a842e00d3bfcba6a4108f29e96d0bb33f4c08646ed141de399ea04b7
CVE-2024-1095,0,0,b594dd5cefff941d80a5aca1439ec1658c5df6b960761544886b2b48f93c7e36,2024-11-21T08:49:47.093000 CVE-2024-1095,0,0,b594dd5cefff941d80a5aca1439ec1658c5df6b960761544886b2b48f93c7e36,2024-11-21T08:49:47.093000
CVE-2024-10952,0,0,edff8b29d26accda4a8e33f169e18ac16231b4d8b9445539c32344bf5f44c6f1,2024-12-04T03:15:04.593000 CVE-2024-10952,0,0,edff8b29d26accda4a8e33f169e18ac16231b4d8b9445539c32344bf5f44c6f1,2024-12-04T03:15:04.593000
CVE-2024-10953,0,0,94ed881c1741c9a6db86af195e84904697442fcf31d986afec17a96f3fc5a311,2024-11-12T13:56:54.483000 CVE-2024-10953,0,0,94ed881c1741c9a6db86af195e84904697442fcf31d986afec17a96f3fc5a311,2024-11-12T13:56:54.483000
CVE-2024-10957,1,1,234550d4342c83a2d2cf74003cdad0693cbb0e280d62294ab5ca067fea36b58e,2025-01-04T14:15:22.430000
CVE-2024-10958,0,0,ef36e0bbdfdc2ca66f68ef0f42219502fb71c2dbb5344b8f90bed966330b4e84,2024-11-14T14:57:23.103000 CVE-2024-10958,0,0,ef36e0bbdfdc2ca66f68ef0f42219502fb71c2dbb5344b8f90bed966330b4e84,2024-11-14T14:57:23.103000
CVE-2024-10959,0,0,fa8e8dfd4e8771ae8c76641a0e2a5e25525492fab6efcc641940a89152f76196,2024-12-10T11:15:05.913000 CVE-2024-10959,0,0,fa8e8dfd4e8771ae8c76641a0e2a5e25525492fab6efcc641940a89152f76196,2024-12-10T11:15:05.913000
CVE-2024-1096,0,0,361a397f658718594f88eb8768eb59d67142285dd6bbccd93ad2ca45f5461047,2024-11-21T08:49:47.217000 CVE-2024-1096,0,0,361a397f658718594f88eb8768eb59d67142285dd6bbccd93ad2ca45f5461047,2024-11-21T08:49:47.217000
@ -244920,7 +244921,7 @@ CVE-2024-12191,0,0,1e8bd8b2f07b3fe146f4b61013f2b06e2a8540311589dff28519979e9314f
CVE-2024-12192,0,0,834144ca9fc9b2f489354c4c77819ed4316907b7c59c9cd340994d34c3340476,2024-12-17T16:15:24.130000 CVE-2024-12192,0,0,834144ca9fc9b2f489354c4c77819ed4316907b7c59c9cd340994d34c3340476,2024-12-17T16:15:24.130000
CVE-2024-12193,0,0,10ce2992a46aa457016dda8b80435b1cc3164a5282166d2cf793af020fd1e4f2,2024-12-17T16:15:24.247000 CVE-2024-12193,0,0,10ce2992a46aa457016dda8b80435b1cc3164a5282166d2cf793af020fd1e4f2,2024-12-17T16:15:24.247000
CVE-2024-12194,0,0,0e20cc1461477ab11889597d984f84204a7b805ad5300cb09bfa539588353be0,2024-12-17T16:15:24.370000 CVE-2024-12194,0,0,0e20cc1461477ab11889597d984f84204a7b805ad5300cb09bfa539588353be0,2024-12-17T16:15:24.370000
CVE-2024-12195,1,1,73ca58f0e099117114caa56ab58ab900ae81f0d95755208245f9eca55423290a,2025-01-04T12:15:22.953000 CVE-2024-12195,0,0,73ca58f0e099117114caa56ab58ab900ae81f0d95755208245f9eca55423290a,2025-01-04T12:15:22.953000
CVE-2024-12196,0,0,9fa580adf43e9cbf06e25fc8b96bbf2ae78be5e0921b9598efca40b2ec0f8630,2024-12-04T21:15:21.090000 CVE-2024-12196,0,0,9fa580adf43e9cbf06e25fc8b96bbf2ae78be5e0921b9598efca40b2ec0f8630,2024-12-04T21:15:21.090000
CVE-2024-12197,0,0,dedd56b6ad9e63809150ef147450d70c9b3fa5f2f9c5fcfc5fb76bd61ec18f37,2024-12-17T16:15:24.493000 CVE-2024-12197,0,0,dedd56b6ad9e63809150ef147450d70c9b3fa5f2f9c5fcfc5fb76bd61ec18f37,2024-12-17T16:15:24.493000
CVE-2024-12198,0,0,1ae05c6d195d1fa95932ba78f37c94c53257b7fbac2ea052346fcb00c2f64367,2024-12-17T16:15:24.617000 CVE-2024-12198,0,0,1ae05c6d195d1fa95932ba78f37c94c53257b7fbac2ea052346fcb00c2f64367,2024-12-17T16:15:24.617000
@ -244971,7 +244972,7 @@ CVE-2024-1227,0,0,2b74966c63acb4b53db9100814c0ea98b900c2b18de594c13a326b21bfb265
CVE-2024-12270,0,0,a59b36ad08a62409fa966fc5cef53e6796ba20371cadd9c7e001162bc2771bae,2024-12-07T10:15:06.200000 CVE-2024-12270,0,0,a59b36ad08a62409fa966fc5cef53e6796ba20371cadd9c7e001162bc2771bae,2024-12-07T10:15:06.200000
CVE-2024-12271,0,0,e756524ee3996486f46fc9dfb0848744c8a90daec55e50296545ffd31d194dcb,2024-12-12T13:15:07.570000 CVE-2024-12271,0,0,e756524ee3996486f46fc9dfb0848744c8a90daec55e50296545ffd31d194dcb,2024-12-12T13:15:07.570000
CVE-2024-12272,0,0,cbbb238a5fc49c4ada4f96dbd5ec3bf6a1bab33a6ad37ef5b0235e516631a83b,2024-12-25T04:15:06.457000 CVE-2024-12272,0,0,cbbb238a5fc49c4ada4f96dbd5ec3bf6a1bab33a6ad37ef5b0235e516631a83b,2024-12-25T04:15:06.457000
CVE-2024-12279,1,1,9733fcc263294614cb14c679edb202184bedb7555bf9f6fd2b2bb344049bfd1a,2025-01-04T12:15:24.453000 CVE-2024-12279,0,0,9733fcc263294614cb14c679edb202184bedb7555bf9f6fd2b2bb344049bfd1a,2025-01-04T12:15:24.453000
CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000 CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000
CVE-2024-12283,0,0,27e00fa0bc574ce5113c52cfd02ee2100414eb1f36a7d99001797949356bf37d,2024-12-11T09:15:05.697000 CVE-2024-12283,0,0,27e00fa0bc574ce5113c52cfd02ee2100414eb1f36a7d99001797949356bf37d,2024-12-11T09:15:05.697000
CVE-2024-12286,0,0,a2cf97a2f897256d80732f72cb83c0245f2eb4e867cc795bfeda6550048be20a,2024-12-10T18:15:27.150000 CVE-2024-12286,0,0,a2cf97a2f897256d80732f72cb83c0245f2eb4e867cc795bfeda6550048be20a,2024-12-10T18:15:27.150000
@ -245070,7 +245071,7 @@ CVE-2024-12468,0,0,20d3be8a82fb7f9b6094ff27e59754b2c2151696c1841d3d96ac080fb2a03
CVE-2024-12469,0,0,871c3c1e000bdae5610f745ffefecdbdcd7d22ba906daf923687641c197ab750,2024-12-17T10:15:05.997000 CVE-2024-12469,0,0,871c3c1e000bdae5610f745ffefecdbdcd7d22ba906daf923687641c197ab750,2024-12-17T10:15:05.997000
CVE-2024-1247,0,0,87dd54613b1838220658d2242080e8fb0b79934df6e5afef144b61ee319c0ba1,2024-11-21T08:50:09.013000 CVE-2024-1247,0,0,87dd54613b1838220658d2242080e8fb0b79934df6e5afef144b61ee319c0ba1,2024-11-21T08:50:09.013000
CVE-2024-12474,0,0,2858a766a8bcbd6035c2be4131a605cddb7bb17f787cc233f6060efa0069c36f,2024-12-14T06:15:19.627000 CVE-2024-12474,0,0,2858a766a8bcbd6035c2be4131a605cddb7bb17f787cc233f6060efa0069c36f,2024-12-14T06:15:19.627000
CVE-2024-12475,1,1,f15ae25929cc8f0bd288861c59cbb63f77614f57516a7a95543988715ffc6cd3,2025-01-04T12:15:24.650000 CVE-2024-12475,0,0,f15ae25929cc8f0bd288861c59cbb63f77614f57516a7a95543988715ffc6cd3,2025-01-04T12:15:24.650000
CVE-2024-12478,0,0,9740cd4243776bc4b985718131b1bfcc5e0a94370bd612144af92e9b380848b7,2024-12-16T11:15:04.890000 CVE-2024-12478,0,0,9740cd4243776bc4b985718131b1bfcc5e0a94370bd612144af92e9b380848b7,2024-12-16T11:15:04.890000
CVE-2024-12479,0,0,71e9962db709a4fb365c50c76ea2678c0c0be3cc10bb9fad5f99b55609975bac,2024-12-13T17:10:45.860000 CVE-2024-12479,0,0,71e9962db709a4fb365c50c76ea2678c0c0be3cc10bb9fad5f99b55609975bac,2024-12-13T17:10:45.860000
CVE-2024-12480,0,0,278aebffcfd2515ae9c7caddd55ce9bc13fc09babf1329c96da477d94bc16635,2024-12-13T17:11:08.800000 CVE-2024-12480,0,0,278aebffcfd2515ae9c7caddd55ce9bc13fc09babf1329c96da477d94bc16635,2024-12-13T17:11:08.800000
@ -245395,7 +245396,7 @@ CVE-2024-13038,0,0,4583c4724ce1695329d04a091cf334038675ae1fc4b89e1e9c52332e7b115
CVE-2024-13039,0,0,5fcf5529e0f60e939c342e8ff9bcb8e9371ea109f210669df3b0c791fd94ef0a,2024-12-30T17:15:08.597000 CVE-2024-13039,0,0,5fcf5529e0f60e939c342e8ff9bcb8e9371ea109f210669df3b0c791fd94ef0a,2024-12-30T17:15:08.597000
CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000 CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000
CVE-2024-13040,0,0,a1b5d05401cf418a59b0f679ad1dde1d9e5e2bdf3e303602eafaafe8d09ac44b,2024-12-31T02:15:06.303000 CVE-2024-13040,0,0,a1b5d05401cf418a59b0f679ad1dde1d9e5e2bdf3e303602eafaafe8d09ac44b,2024-12-31T02:15:06.303000
CVE-2024-13042,0,0,79d3038a3776ed8900f4502faeed80d95c375db4f2c3ae792b7f1b6168d6c4e8,2024-12-30T21:15:06.523000 CVE-2024-13042,0,1,1f81fc2eec05a9223456735091886113e5fb919c6582ca39f0497333c1ba2b59,2025-01-04T13:15:06.483000
CVE-2024-13043,0,0,d417b605205dbe84f83258ea316ba45f837391250bcff3253069ffacb1fd1864,2025-01-03T20:56:34.317000 CVE-2024-13043,0,0,d417b605205dbe84f83258ea316ba45f837391250bcff3253069ffacb1fd1864,2025-01-03T20:56:34.317000
CVE-2024-13044,0,0,2a60dae76075d731a7a10d4f5dd3f064d1a9a7527f55b8c35dfff24662fef8aa,2025-01-03T17:38:23.907000 CVE-2024-13044,0,0,2a60dae76075d731a7a10d4f5dd3f064d1a9a7527f55b8c35dfff24662fef8aa,2025-01-03T17:38:23.907000
CVE-2024-13045,0,0,1f934630021b4e488823382e82fbebf720404ebaf4be3e7e4ace7215a3b3f593,2025-01-03T17:38:40.123000 CVE-2024-13045,0,0,1f934630021b4e488823382e82fbebf720404ebaf4be3e7e4ace7215a3b3f593,2025-01-03T17:38:40.123000
@ -275689,7 +275690,10 @@ CVE-2025-0202,0,0,134321c7f40a118fdc086dc6dd45aa3f434bd152f41ac44b0e1b8cf73eaa9b
CVE-2025-0203,0,0,0936b8fabe5939ab217834cf3af41d8e076c72b533695acdc6213f3dd9c3be39,2025-01-04T07:15:18.153000 CVE-2025-0203,0,0,0936b8fabe5939ab217834cf3af41d8e076c72b533695acdc6213f3dd9c3be39,2025-01-04T07:15:18.153000
CVE-2025-0204,0,0,8d815f9dfba8c16d95951db6f88c1d79e7832a34dc8aeff650469bbc3a37f4d1,2025-01-04T08:15:06.923000 CVE-2025-0204,0,0,8d815f9dfba8c16d95951db6f88c1d79e7832a34dc8aeff650469bbc3a37f4d1,2025-01-04T08:15:06.923000
CVE-2025-0205,0,0,aa5b68b00b98dba8a0d346b3f72ea3ad15db09dde4cd37bb1ce9c2f4b99ff43e,2025-01-04T09:15:06.280000 CVE-2025-0205,0,0,aa5b68b00b98dba8a0d346b3f72ea3ad15db09dde4cd37bb1ce9c2f4b99ff43e,2025-01-04T09:15:06.280000
CVE-2025-0206,1,1,2c51d520a4879eb37fad3da037af175b82b1f84ee273be776d242bffb65c08ab,2025-01-04T12:15:24.830000 CVE-2025-0206,0,0,2c51d520a4879eb37fad3da037af175b82b1f84ee273be776d242bffb65c08ab,2025-01-04T12:15:24.830000
CVE-2025-0207,1,1,f8e0e5696643458076493e3f93737513cc0c01701399e87dcf38e6f95da67118,2025-01-04T13:15:07.383000
CVE-2025-0208,1,1,4363e7b55c7d81cd4bb24af8aa707b774a793375e9ae8a8453bfff3f13c6a198,2025-01-04T13:15:07.557000
CVE-2025-0210,1,1,18250167a2190dfee9b92f3f6a39d2159faab5611a88842d989bbdb417acb98f,2025-01-04T14:15:22.590000
CVE-2025-21609,0,0,debac97612532639eda73000ed423c6055a43cea29689a043be2143f9409c2e8,2025-01-03T17:15:09.147000 CVE-2025-21609,0,0,debac97612532639eda73000ed423c6055a43cea29689a043be2143f9409c2e8,2025-01-03T17:15:09.147000
CVE-2025-21610,0,0,91f58e52c41e26ee8c782751f380f5e6f82b9b51c281135ca06080d1bc5407a4,2025-01-03T17:15:09.290000 CVE-2025-21610,0,0,91f58e52c41e26ee8c782751f380f5e6f82b9b51c281135ca06080d1bc5407a4,2025-01-03T17:15:09.290000
CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000 CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000

Can't render this file because it is too large.