Auto-Update: 2025-02-20T05:00:49.355886+00:00

This commit is contained in:
cad-safe-bot 2025-02-20 05:04:16 +00:00
parent 3c48ee83c8
commit 921d7fca4d
11 changed files with 476 additions and 24 deletions

View File

@ -2,13 +2,20 @@
"id": "CVE-2021-44967",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-02-24T15:15:24.547",
"lastModified": "2024-11-21T06:31:45.313",
"lastModified": "2025-02-20T03:15:11.197",
"vulnStatus": "Modified",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Remote Code Execution (RCE) vulnerabilty exists in LimeSurvey 5.2.4 via the upload and install plugins function, which could let a remote malicious user upload an arbitrary PHP code file."
"value": "A Remote Code Execution (RCE) vulnerabilty exists in LimeSurvey 5.2.4 via the upload and install plugins function, which could let a remote malicious user upload an arbitrary PHP code file. NOTE: the Supplier's position is that plugins intentionally can contain arbitrary PHP code, and can only be installed by a superadmin, and therefore the security model is not violated by this finding."
},
{
"lang": "es",
@ -111,6 +118,10 @@
"VDB Entry"
]
},
{
"url": "https://www.limesurvey.org/manual/Plugins_-_advanced",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Y1LD1R1M-1337/Limesurvey-RCE",
"source": "af854a3a-2127-422b-91ae-364da2661108",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43196",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:09.630",
"lastModified": "2025-02-20T04:15:09.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM OpenPages with Watson 8.3 and 9.0\u00a0\n\napplication could allow an authenticated user to manipulate data in the Questionnaires application allowing the user to spoof other users' responses."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-296"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49355",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:10.670",
"lastModified": "2025-02-20T04:15:10.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM OpenPages with Watson 8.3 and 9.0\u00a0may write improperly neutralized data to server log files when the tracing is enabled per the System Tracing feature."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-117"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49780",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:10.827",
"lastModified": "2025-02-20T04:15:10.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM OpenPages with Watson 8.3 and 9.0\u00a0\n\nIBM OpenPages could allow a remote attacker to traverse directories on the system. An attacker with privileges to perform Import Configuration could send a specially crafted http request containing \"dot dot\" sequences (/../) in the file name parameter used in Import Configuration to write files to arbitrary locations outside of the specified directory and possibly overwrite arbitrary files."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49782",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T04:15:10.973",
"lastModified": "2025-02-20T04:15:10.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM OpenPages with Watson 8.3 and 9.0\u00a0\n\n\n\ncould allow a remote attacker to spoof mail server identity when using SSL/TLS security. An attacker could exploit this vulnerability to gain access to sensitive information disclosed through email notifications generated by OpenPages or disrupt notification delivery."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-297"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183541",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0108",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2025-02-12T21:15:16.290",
"lastModified": "2025-02-20T02:00:02.853",
"lastModified": "2025-02-20T03:15:12.317",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -378,6 +378,30 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/iSee857/CVE-2025-0108-PoC",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://slcyber.io/blog/nginx-apache-path-confusion-to-auth-bypass-in-pan-os/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.bleepingcomputer.com/news/security/palo-alto-networks-tags-new-firewall-bug-as-exploited-in-attacks/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.darkreading.com/remote-workforce/patch-now-cisa-researchers-warn-palo-alto-flaw-exploited-wild",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.securityweek.com/palo-alto-networks-confirms-exploitation-of-firewall-vulnerability/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.theregister.com/2025/02/19/palo_alto_firewall_attack/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23020",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T03:15:12.630",
"lastModified": "2025-02-20T03:15:12.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Kwik before 0.10.1. A hash collision vulnerability (in the hash table used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-407"
}
]
}
],
"references": [
{
"url": "https://github.com/ncc-pbottine/QUIC-Hash-Dos-Advisory",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ptrd/kwik/releases/tag/v0.10.1",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-24946",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T03:15:12.800",
"lastModified": "2025-02-20T03:15:12.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The hash table used to manage connections in picoquic before b80fd3f uses a weak hash function, allowing remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-407"
}
]
}
],
"references": [
{
"url": "https://github.com/ncc-pbottine/QUIC-Hash-Dos-Advisory",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/private-octopus/picoquic/commit/b80fd3f5903279ae3e7714ee4109363d9ab4491a",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-24947",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T03:15:12.943",
"lastModified": "2025-02-20T03:15:12.943",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A hash collision vulnerability (in the hash table used to manage connections) in LSQUIC (aka LiteSpeed QUIC) before 4.2.0 allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs). This is caused by XXH32 usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-407"
}
]
}
],
"references": [
{
"url": "https://github.com/litespeedtech/lsquic/releases/tag/v4.2.0",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ncc-pbottine/QUIC-Hash-Dos-Advisory",
"source": "cve@mitre.org"
},
{
"url": "https://xxhash.com",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-20T03:00:20.419216+00:00
2025-02-20T05:00:49.355886+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-20T02:15:38.553000+00:00
2025-02-20T04:15:10.973000+00:00
```
### Last Data Feed Release
@ -33,26 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
281858
281865
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `7`
- [CVE-2025-1222](CVE-2025/CVE-2025-12xx/CVE-2025-1222.json) (`2025-02-20T01:15:09.707`)
- [CVE-2025-1223](CVE-2025/CVE-2025-12xx/CVE-2025-1223.json) (`2025-02-20T01:15:09.837`)
- [CVE-2025-1293](CVE-2025/CVE-2025-12xx/CVE-2025-1293.json) (`2025-02-20T01:15:09.950`)
- [CVE-2025-1492](CVE-2025/CVE-2025-14xx/CVE-2025-1492.json) (`2025-02-20T02:15:38.553`)
- [CVE-2024-43196](CVE-2024/CVE-2024-431xx/CVE-2024-43196.json) (`2025-02-20T04:15:09.630`)
- [CVE-2024-49355](CVE-2024/CVE-2024-493xx/CVE-2024-49355.json) (`2025-02-20T04:15:10.670`)
- [CVE-2024-49780](CVE-2024/CVE-2024-497xx/CVE-2024-49780.json) (`2025-02-20T04:15:10.827`)
- [CVE-2024-49782](CVE-2024/CVE-2024-497xx/CVE-2024-49782.json) (`2025-02-20T04:15:10.973`)
- [CVE-2025-23020](CVE-2025/CVE-2025-230xx/CVE-2025-23020.json) (`2025-02-20T03:15:12.630`)
- [CVE-2025-24946](CVE-2025/CVE-2025-249xx/CVE-2025-24946.json) (`2025-02-20T03:15:12.800`)
- [CVE-2025-24947](CVE-2025/CVE-2025-249xx/CVE-2025-24947.json) (`2025-02-20T03:15:12.943`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `2`
- [CVE-2024-11218](CVE-2024/CVE-2024-112xx/CVE-2024-11218.json) (`2025-02-20T02:15:37.010`)
- [CVE-2024-9404](CVE-2024/CVE-2024-94xx/CVE-2024-9404.json) (`2025-02-20T02:15:38.303`)
- [CVE-2025-0108](CVE-2025/CVE-2025-01xx/CVE-2025-0108.json) (`2025-02-20T02:00:02.853`)
- [CVE-2021-44967](CVE-2021/CVE-2021-449xx/CVE-2021-44967.json) (`2025-02-20T03:15:11.197`)
- [CVE-2025-0108](CVE-2025/CVE-2025-01xx/CVE-2025-0108.json) (`2025-02-20T03:15:12.317`)
## Download and Usage

View File

@ -185901,7 +185901,7 @@ CVE-2021-44962,0,0,6b5404d2564389d7d954d2efcd26b1a169e808286c7a04c0574a78ae6dfec
CVE-2021-44964,0,0,a29c8b41ce952d132250f961bf843db2dac2dac35e4e4a1685cb71067c5bda2c,2024-11-21T06:31:44.853000
CVE-2021-44965,0,0,d539910bf4b079dd58192a37478123ea2c808d9814c9c3473ec9173bfbb9cb7e,2024-11-21T06:31:45
CVE-2021-44966,0,0,17db83e3e27acd3b6e77940c42e665a988e0c392e5b12968a89459ac43592efa,2024-11-21T06:31:45.160000
CVE-2021-44967,0,0,c256683b32c91944ce85e02e9c04c828e454744fd7e5b05c01db84eeda3a4d52,2024-11-21T06:31:45.313000
CVE-2021-44967,0,1,22bb0d0821fa4cae167a8fc904e1b0ff50327b356af7ded15af73b5c5fa41c61,2025-02-20T03:15:11.197000
CVE-2021-44968,0,0,a34270f244ed1d1fc37861c8c57831235d2cfacd1831736c12558995b31be60b,2024-11-21T06:31:45.470000
CVE-2021-44969,0,0,753f053147fceb1feb6dd227db64ea10d2fc9b9f6e375d8eb13897547295b701,2024-11-21T06:31:45.617000
CVE-2021-44970,0,0,17586336aba2f48dc598e39d3224e27347fd18a332b997cec159ac2b324489a6,2024-11-21T06:31:45.760000
@ -244562,7 +244562,7 @@ CVE-2024-11213,0,0,733d387bcd2a89a3baf6e6af87e9925096408112067fd16bf967badff3e2e
CVE-2024-11214,0,0,8f15fb853ae573991dd8377f3fdb07743acb2a14953115059875124aefd71a4f,2024-11-19T15:38:59.060000
CVE-2024-11215,0,0,649934bde3315408f935571e43aced9541face2e1cac41750a3378db1c35aaf3,2024-11-15T13:58:08.913000
CVE-2024-11217,0,0,cb24a1bdb987ee2ebd888113abdd2cecfb9cb2fe9a3dca74044179030beb620c,2024-11-18T17:11:56.587000
CVE-2024-11218,0,1,554b7e5af26720a758bdd87368bb6efc9f5253c4eccd189666c25ca4a0af7a80,2025-02-20T02:15:37.010000
CVE-2024-11218,0,0,554b7e5af26720a758bdd87368bb6efc9f5253c4eccd189666c25ca4a0af7a80,2025-02-20T02:15:37.010000
CVE-2024-11219,0,0,e0425cf1f1ca40cc6d95ef04e03e17b5776d09d72a88fcf5abbcb2ac00f59570,2024-11-27T06:15:18.110000
CVE-2024-1122,0,0,4a647161edb6d6dbac08921722ee9f0f3f3f764af2a44d6cd56ac17a7d3d92e5,2024-11-21T08:49:50.943000
CVE-2024-11220,0,0,2bacf5e02725323b27ba9cab9bc5f331ae5ef28bd238022ab9e1ae19b09e4fbc,2025-01-23T16:54:24.970000
@ -265270,6 +265270,7 @@ CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216
CVE-2024-43189,0,0,167da65acb79f1d31d6282e0f7371fa322d7e1ea30726b85e9e01b0a45ea77c4,2024-11-18T17:11:56.587000
CVE-2024-4319,0,0,e167e76473e812074495ec236ec0a27727cfd54ad2188a3f78327f54417068db,2024-11-21T09:42:37.037000
CVE-2024-43191,0,0,d5199499d5a91eb79af242e34e3162c18fd6ecd91ff3af4ecfe818744df5d4b8,2024-09-30T12:46:20.237000
CVE-2024-43196,1,1,4a020ed7d95b50b6484595f6b9846dfb086d5a35b6921a89feff86efefe818c1,2025-02-20T04:15:09.630000
CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000
CVE-2024-4320,0,0,66936457ccf92d087f54d9a7056c5f1c270eaa9e639ccc366ce51fdb54afa27d,2024-11-21T09:42:37.150000
CVE-2024-43201,0,0,e638a7f8526c6643b3022caa891a343f1b876f7a5aa0673ac1dcca77850b734f,2024-09-30T13:55:38.390000
@ -269681,6 +269682,7 @@ CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6
CVE-2024-49352,0,0,5b54f9b75518511305c412ed74c5838fc4e1568e8431a075550c1b801ecdf820,2025-02-05T11:15:14.540000
CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000
CVE-2024-49354,0,0,9932955dc8f1f42bc5bd9552d18c452e3eba49c8f646b04262c7f057d2eb1053,2025-01-18T16:15:39.040000
CVE-2024-49355,1,1,8b38b03596da340e2134fedff5517cd6778fa94a8e4954d71df54ae23c048c08,2025-02-20T04:15:10.670000
CVE-2024-49357,0,0,60dd20801e0d688d79febf6ddf905b7a0f6bb6d52339368c8c03007d3568ef2f,2024-11-06T15:28:38.160000
CVE-2024-49358,0,0,9b3087a9abf7bda8601a66a382dce9cb35757f55c0440ca46162af784c9d23d1,2024-11-06T15:27:26.637000
CVE-2024-49359,0,0,f7b8bcd2f4e26f53c20b7ffd38bd81c3325d7981bb7902337d9402d860e0b277,2024-11-06T15:27:02.347000
@ -269996,6 +269998,8 @@ CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750
CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000
CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000
CVE-2024-4978,0,0,de30ddfe983833699ad8e2f2543285ea22a567f389ca513dff29646a99a121fd,2025-01-27T21:42:09.123000
CVE-2024-49780,1,1,aeca1444b9977ee8d7ac813fad06f05ad465cec901b12558471d6fc9509b8d40,2025-02-20T04:15:10.827000
CVE-2024-49782,1,1,0bc087b291a089e65a143cf89914514d05076b15dbb30d3729c21d37dca3c647,2025-02-20T04:15:10.973000
CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000
CVE-2024-49791,0,0,436e3ec68e0463377f56d61753d1a9ed190ae95d7dd892d9e3c8a12bd564a16b,2025-02-12T18:59:58.627000
CVE-2024-49792,0,0,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000
@ -278312,7 +278316,7 @@ CVE-2024-9400,0,0,4e0eb218b5de55a15a4a85f62e9e541831946bea4c202524d5661f5eb345d7
CVE-2024-9401,0,0,96a7de06dd58c9c71f25b07ec603b05ba47f7dd964cd736693ec4ab35f2b79cc,2024-10-04T13:51:25.567000
CVE-2024-9402,0,0,63b01a6aa3f666e567eb1543fc626efc5699e53df1a2e8aefcfc7ec04c0a715c,2024-10-04T13:51:25.567000
CVE-2024-9403,0,0,07762c94afe8c9eb67ff9236f95ee323f5f0ee5c2916cd9e1970af8b1532841e,2024-10-04T13:51:25.567000
CVE-2024-9404,0,1,38f9756ea08ef2abf9728db871324cf0507413fa48c231c8758f4fcd70c33b52,2025-02-20T02:15:38.303000
CVE-2024-9404,0,0,38f9756ea08ef2abf9728db871324cf0507413fa48c231c8758f4fcd70c33b52,2025-02-20T02:15:38.303000
CVE-2024-9405,0,0,8642cd3daffd984afd6c8d211f16ccc5e756252d3a00aefbed32c81bc22b44d9,2024-10-04T13:51:25.567000
CVE-2024-9407,0,0,c3bb216c57e02389fdc038abc31ad60ae236af3d0e61fe20fe1466db79b4cb67,2024-12-20T13:15:22.430000
CVE-2024-9409,0,0,7757f41524ac185e8a2f43a3d9c1ce47c218b14282678873dd27fa00ce011244,2024-11-19T15:59:21.690000
@ -278848,7 +278852,7 @@ CVE-2025-0104,0,0,21c4318a0d99e7fa45fcf41d38940b721a051c25e3dcd31ab0543aa8393743
CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000
CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000
CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000
CVE-2025-0108,0,1,b725ae6df493e1755d31b8240dde1e1bbafcd7225dd2a0cb9798328343ff2010,2025-02-20T02:00:02.853000
CVE-2025-0108,0,1,32fc5b68a56685a0b9b51207f2482d34ad1064df89ea1f574e01f75f06d01c3c,2025-02-20T03:15:12.317000
CVE-2025-0109,0,0,5a24ce2e009561b2fb59096b6f1ded171180346c747fdc8ee1c0182acced781c,2025-02-12T21:15:16.470000
CVE-2025-0110,0,0,b411c8390eb932e9490dd491fe7ec15b7990f1154a6a3792e2622d16f01feb5d,2025-02-12T21:15:16.630000
CVE-2025-0111,0,0,d60da8cc044b71f9b25ea01714abe57066c4c3bbb42322d107bb92238a35c6ee,2025-02-20T00:15:20.483000
@ -279473,8 +279477,8 @@ CVE-2025-1213,0,0,2b7e70e47f8a65f033caad3807af6c64741ecb841fb41a9781c263ed91f0ab
CVE-2025-1214,0,0,570b6de5ce068661fd900040490763a6a2aff52883cdffee187d7e67c3f71c23,2025-02-12T20:15:39.200000
CVE-2025-1215,0,0,8ed64c4cea73bec1cddd1a2a6008416951076fc76020e0d97ec001cf6bd35d72,2025-02-12T20:15:39.773000
CVE-2025-1216,0,0,164f15453cadee8b1ef141164e20a61cdb9617e764303cd0a4fe4230725306e1,2025-02-12T20:15:39.907000
CVE-2025-1222,1,1,8b2d91661240eec9308211a9746cfa7fd5f6c09218a7574e3f401d4ff0cc7429,2025-02-20T01:15:09.707000
CVE-2025-1223,1,1,f8e46630ae17f3cc6d05cf04b482c0b48e16e8f3f90922493824b655ad9a325b,2025-02-20T01:15:09.837000
CVE-2025-1222,0,0,8b2d91661240eec9308211a9746cfa7fd5f6c09218a7574e3f401d4ff0cc7429,2025-02-20T01:15:09.707000
CVE-2025-1223,0,0,f8e46630ae17f3cc6d05cf04b482c0b48e16e8f3f90922493824b655ad9a325b,2025-02-20T01:15:09.837000
CVE-2025-1224,0,0,dbf9ca25612f3b15663509f5a8c0ad24581ded6705dd4635bcfc69168f7d2196,2025-02-13T15:15:20.500000
CVE-2025-1225,0,0,b84393f2cecfe0f2937bfc6c2d96d8aecba40fa1e0b4eaa3e5689fd294d1fdb2,2025-02-12T20:15:40.203000
CVE-2025-1226,0,0,4474226f547c434d76495d8a78597f2407b4a7ecd22a98eb405419ef19e7c568,2025-02-12T21:15:20.470000
@ -279492,7 +279496,7 @@ CVE-2025-1269,0,0,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d
CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813a0,2025-02-13T22:15:11.413000
CVE-2025-1293,1,1,de22ea463bb11f59b8d001bee87aa35e3db1395d25b26c300642e262a14ba018,2025-02-20T01:15:09.950000
CVE-2025-1293,0,0,de22ea463bb11f59b8d001bee87aa35e3db1395d25b26c300642e262a14ba018,2025-02-20T01:15:09.950000
CVE-2025-1298,0,0,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000
CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000
CVE-2025-1332,0,0,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000
@ -279542,7 +279546,7 @@ CVE-2025-1447,0,0,0171066f5cc38b75ed48310b7b051ba77753a7de710aef2fb49270a13c1b06
CVE-2025-1448,0,0,8646602fe654ea9c8b8dc30e88ebd580a07aa04ffb2e255dc4fb4a77857c3ea4,2025-02-19T02:15:08.833000
CVE-2025-1464,0,0,b14d16c6baac3507cd4582169a63151cc0fa9ea50d60b1fe8184ca7d2a79a3df,2025-02-19T14:15:30.337000
CVE-2025-1465,0,0,2910b362fc4eb01a626127c50d683f7ea305894f7d9657ebb7cc043987c8c3ee,2025-02-19T16:15:40.667000
CVE-2025-1492,1,1,4cf0d4c2a3031b043d71ffc226830ce9ea797081b5a3ae5a1323a931931fb733,2025-02-20T02:15:38.553000
CVE-2025-1492,0,0,4cf0d4c2a3031b043d71ffc226830ce9ea797081b5a3ae5a1323a931931fb733,2025-02-20T02:15:38.553000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
@ -280532,6 +280536,7 @@ CVE-2025-23015,0,0,45b302f2cec3cbe0c8e5d07505c76b93a083cf4972c8927214f2b54e92bdd
CVE-2025-23016,0,0,d6f57b5b395a069df7f809c3df8ada91e41979cd2f4b4f4edc46accb02e126b8,2025-01-10T12:15:25.480000
CVE-2025-23018,0,0,56e80d02e024f696b384ef49ed4d211481ba7fbade5b33c2ad0870cd52e237b6,2025-01-29T18:01:47.313000
CVE-2025-23019,0,0,d086114380d5b72aae48f2dd063fe423ce3274d7a5a6c9dc170a5da44914e82d,2025-01-29T18:02:06.240000
CVE-2025-23020,1,1,1cad767f2302c7908ad3edcfc982475af1f01ae8b6a8dad5900e7ee9940543ba,2025-02-20T03:15:12.630000
CVE-2025-23022,0,0,bb805305ea96825569d9891ea5d8911d64b95f766e73f0709e01ab6077884661,2025-01-16T21:12:15.537000
CVE-2025-23023,0,0,8d62189672cb787e5081908c4fe2e78759d3475dd1f1ecf661879211c3f1488e,2025-02-04T21:15:28.083000
CVE-2025-23025,0,0,a430643fad54c298ac56c82186034eeeea39626036838a2f98e7e7672f4b6ffd,2025-01-14T18:16:05.650000
@ -281526,6 +281531,8 @@ CVE-2025-24904,0,0,922b25d3a9b426b643b71230fe8a3d6600552e09598c6cd6bc1bcb32f760c
CVE-2025-24905,0,0,ecc12daf91d871ae88d04f98498257679fd02d46bd8922b3f82316cc94d8878c,2025-02-13T19:00:37.593000
CVE-2025-24906,0,0,13b689df14524878d89525acaf7cfd0d975a63297d29c07d6d881d3b3e914d54,2025-02-13T18:59:59.940000
CVE-2025-24928,0,0,e5fd8968e5c5c56f275d71a964d0b667b12bcc4ba8d81e28fd60cc19579119bd,2025-02-18T23:15:10.250000
CVE-2025-24946,1,1,769aff2d278507029154d8fce6a8e725f41ddd2141a4b639ffa5f01c2acd7a76,2025-02-20T03:15:12.800000
CVE-2025-24947,1,1,b15ef7a206749c7ca6e5f1749af8a5217d2c969ef411171626e3cb4aa045511b,2025-02-20T03:15:12.943000
CVE-2025-24956,0,0,60f62dbd8ca3ec9022b0bbf689d92a9416e8938202e5bdb77bb2e05ca0ed67f7,2025-02-11T11:15:17.273000
CVE-2025-24957,0,0,4c6009fdcebadcde59c81c994d42af877595682fdef18bb7378b4f2679eaf5d8,2025-02-13T18:59:32.867000
CVE-2025-24958,0,0,83843e5baca1cb66509cb1b7cb198ebfd9f486662ffcb2ce9c260edca5373dcd,2025-02-13T18:58:56.320000

Can't render this file because it is too large.