Auto-Update: 2025-02-18T09:00:58.525029+00:00

This commit is contained in:
cad-safe-bot 2025-02-18 09:04:27 +00:00
parent 82ba60dc9d
commit 9b160ed85c
16 changed files with 1017 additions and 64 deletions

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11376",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T08:15:08.153",
"lastModified": "2025-02-18T08:15:08.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The s2Member \u2013 Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 241114. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/s2member/tags/241114/s2member.php#L210",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3240794%40s2member&new=3240794%40s2member&sfp_email=&sfph_mail=#file1",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5c8f46-a686-4b77-8a22-8dec92a96350?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,76 @@
{
"id": "CVE-2024-11895",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T08:15:09.313",
"lastModified": "2025-02-18T08:15:09.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Online Payments \u2013 Get Paid with PayPal, Square & Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.20.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L129",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L22",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L50",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L91",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3241650%40paypal-payment-button-by-vcita&new=3241650%40paypal-payment-button-by-vcita&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aab33299-f02d-44a1-9522-5309eed6fd38?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13465",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T08:15:09.490",
"lastModified": "2025-02-18T08:15:09.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The aBlocks \u2013 WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \"Table Of Content\" Block, specifically in the \"markerView\" attribute, in all versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3236611%40ablocks&new=3236611%40ablocks&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/abdb6632-d579-4650-b058-da10201cca8c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13523",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T07:15:08.303",
"lastModified": "2025-02-18T07:15:08.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MemorialDay plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.4. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3232363%40memorialday%2Ftrunk&old=3207291%40memorialday%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/96cec16e-7bb3-4279-8c17-eca88d413ad8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-13575",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T08:15:09.653",
"lastModified": "2025-02-18T08:15:09.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Web Stories Enhancer \u2013 Level Up Your Web Stories plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'web_stories_enhancer' shortcode in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/web-stories-enhancer/trunk/includes/shortcode.php#L99",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3238312%40web-stories-enhancer&new=3238312%40web-stories-enhancer&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fdc614f2-37a6-474a-828a-1f34f98715c5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13704",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T08:15:09.820",
"lastModified": "2025-02-18T08:15:09.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'st_user_title' parameter in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3240039%40super-testimonial&new=3240039%40super-testimonial&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/20720912-6bfd-4df1-97c7-7025c16d7a0f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13795",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T08:15:09.980",
"lastModified": "2025-02-18T08:15:09.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.12.27. This is due to missing or incorrect nonce validation on the ecwid_deactivate_feedback() function. This makes it possible for unauthenticated attackers to send deactivation messages on behalf of a site owner via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3241777%40ecwid-shopping-cart&new=3241777%40ecwid-shopping-cart&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f1eb9ec6-897a-4c38-a85c-033d7050dcfa?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-57963",
"sourceIdentifier": "hirt@hitachi.co.jp",
"published": "2025-02-18T07:15:08.713",
"lastModified": "2025-02-18T07:15:08.713",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "hirt@hitachi.co.jp",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure Loading of Dynamic Link Libraries have been discovered in USB-CONVERTERCABLE DRIVER, which could allow local attackers to potentially disclose information or execute arbitray code on affected systems.\nThis issue affects USB-CONVERTERCABLE DRIVER:."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "hirt@hitachi.co.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "hirt@hitachi.co.jp",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://www.hitachi.com/hirt/hitachi-sec/2025/001.html",
"source": "hirt@hitachi.co.jp"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-57964",
"sourceIdentifier": "hirt@hitachi.co.jp",
"published": "2025-02-18T07:15:08.920",
"lastModified": "2025-02-18T07:15:08.920",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "hirt@hitachi.co.jp",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure Loading of Dynamic Link Libraries have been discovered in HVAC Energy Saving Program, which could allow local attackers to potentially disclose information or execute arbitray code on affected systems.\nThis issue affects HVAC Energy Saving Program:."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "hirt@hitachi.co.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "hirt@hitachi.co.jp",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://www.hitachi.com/hirt/hitachi-sec/2025/001.html",
"source": "hirt@hitachi.co.jp"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0422",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2025-02-18T08:15:10.147",
"lastModified": "2025-02-18T08:15:10.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated user in the \"bestinformed Web\" application can execute commands on the underlying server running the application. (Remote Code Execution) For this, the user must be able to create \"ScriptVars\" with the type \u201escript\" and preview them by, for example, creating a new \"Info\". By default, admin users have those permissions, but with the granular permission system, those permissions may be assigned to other users.\u00a0An attacker is able to execute commands on the server running the \"bestinformed Web\" application if an account with the correct permissions was compromised before."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0423",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2025-02-18T08:15:10.360",
"lastModified": "2025-02-18T08:15:10.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the \"bestinformed Web\" application, some user input was not properly sanitized. This leads to multiple unauthenticated stored cross-site scripting vulnerabilities.\u00a0An unauthenticated attacker is able to compromise the sessions of users on the server by injecting JavaScript code into their session using an \"Unauthenticated Stored Cross-Site Scripting\". The attacker is then able to ride the session of those users and can abuse their privileges on the \"bestinformed Web\" application."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0424",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2025-02-18T08:15:10.490",
"lastModified": "2025-02-18T08:15:10.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the \"bestinformed Web\" application, some user input was not properly sanitized. This leads to multiple authenticated stored cross-site scripting vulnerabilities.\u00a0An authenticated attacker is able to compromise the sessions of other users on the server by injecting JavaScript code into their session using an \"Authenticated Stored Cross-Site Scripting\". Those other users might have more privileges than the attacker, enabling a form of horizontal movement."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-0425",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2025-02-18T08:15:10.597",
"lastModified": "2025-02-18T08:15:10.597",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Via the GUI of the \"bestinformed Infoclient\", a low-privileged user is by default able to change the server address of the \"bestinformed Server\" to which this client connects. This is dangerous as the \"bestinformed Infoclient\" runs with elevated permissions (\"nt authority\\system\"). By changing the server address to a malicious server, or a script simulating a server, the user is able to escalate his privileges by abusing certain features of the \"bestinformed Web\" server. Those features include:\n * Pushing of malicious update packages\n * Arbitrary Registry Read as \"nt authority\\system\"\n\n\nAn attacker is able to escalate his privileges to \"nt authority\\system\" on the Windows client running the \"bestinformed Infoclient\".\u00a0\n\n\nThis attack is not possible if a custom configuration (\"Infoclient.ini\")\u00a0containing the flags \"ShowOnTaskbar=false\" or \"DisabledItems=stPort,stAddress\" is deployed."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-15"
}
]
}
],
"references": [
{
"url": "https://www.cordaware.com/changelog/en/version-6_3_8_1.html",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-0864",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T08:15:10.723",
"lastModified": "2025-02-18T08:15:10.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'shortcodes_set' parameter in all versions up to, and including, 1.0.6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L1624",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L88",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3235888%40profit-products-tables-for-woocommerce&new=3235888%40profit-products-tables-for-woocommerce&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f93dcb51-1caf-4d63-a8f3-f6251dd0d19f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-18T07:00:19.803216+00:00
2025-02-18T09:00:58.525029+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-18T06:15:12.060000+00:00
2025-02-18T08:15:10.723000+00:00
```
### Last Data Feed Release
@ -33,38 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
281604
281618
```
### CVEs added in the last Commit
Recently added CVEs: `35`
Recently added CVEs: `14`
- [CVE-2024-13540](CVE-2024/CVE-2024-135xx/CVE-2024-13540.json) (`2025-02-18T05:15:13.427`)
- [CVE-2024-13555](CVE-2024/CVE-2024-135xx/CVE-2024-13555.json) (`2025-02-18T05:15:13.597`)
- [CVE-2024-13556](CVE-2024/CVE-2024-135xx/CVE-2024-13556.json) (`2025-02-18T06:15:11.900`)
- [CVE-2024-13565](CVE-2024/CVE-2024-135xx/CVE-2024-13565.json) (`2025-02-18T05:15:13.803`)
- [CVE-2024-13573](CVE-2024/CVE-2024-135xx/CVE-2024-13573.json) (`2025-02-18T05:15:14.007`)
- [CVE-2024-13576](CVE-2024/CVE-2024-135xx/CVE-2024-13576.json) (`2025-02-18T05:15:14.157`)
- [CVE-2024-13577](CVE-2024/CVE-2024-135xx/CVE-2024-13577.json) (`2025-02-18T05:15:14.487`)
- [CVE-2024-13578](CVE-2024/CVE-2024-135xx/CVE-2024-13578.json) (`2025-02-18T05:15:14.913`)
- [CVE-2024-13579](CVE-2024/CVE-2024-135xx/CVE-2024-13579.json) (`2025-02-18T05:15:15.310`)
- [CVE-2024-13581](CVE-2024/CVE-2024-135xx/CVE-2024-13581.json) (`2025-02-18T05:15:15.590`)
- [CVE-2024-13582](CVE-2024/CVE-2024-135xx/CVE-2024-13582.json) (`2025-02-18T05:15:15.897`)
- [CVE-2024-13587](CVE-2024/CVE-2024-135xx/CVE-2024-13587.json) (`2025-02-18T05:15:16.267`)
- [CVE-2024-13588](CVE-2024/CVE-2024-135xx/CVE-2024-13588.json) (`2025-02-18T05:15:16.417`)
- [CVE-2024-13595](CVE-2024/CVE-2024-135xx/CVE-2024-13595.json) (`2025-02-18T05:15:16.710`)
- [CVE-2024-13609](CVE-2024/CVE-2024-136xx/CVE-2024-13609.json) (`2025-02-18T05:15:17.160`)
- [CVE-2024-13622](CVE-2024/CVE-2024-136xx/CVE-2024-13622.json) (`2025-02-18T05:15:17.557`)
- [CVE-2024-13677](CVE-2024/CVE-2024-136xx/CVE-2024-13677.json) (`2025-02-18T05:15:17.893`)
- [CVE-2024-13684](CVE-2024/CVE-2024-136xx/CVE-2024-13684.json) (`2025-02-18T05:15:18.050`)
- [CVE-2024-13687](CVE-2024/CVE-2024-136xx/CVE-2024-13687.json) (`2025-02-18T05:15:18.273`)
- [CVE-2024-13725](CVE-2024/CVE-2024-137xx/CVE-2024-13725.json) (`2025-02-18T05:15:18.707`)
- [CVE-2024-13848](CVE-2024/CVE-2024-138xx/CVE-2024-13848.json) (`2025-02-18T05:15:19.157`)
- [CVE-2024-13852](CVE-2024/CVE-2024-138xx/CVE-2024-13852.json) (`2025-02-18T05:15:19.423`)
- [CVE-2024-45320](CVE-2024/CVE-2024-453xx/CVE-2024-45320.json) (`2025-02-18T06:15:12.060`)
- [CVE-2025-0796](CVE-2025/CVE-2025-07xx/CVE-2025-0796.json) (`2025-02-18T05:15:19.597`)
- [CVE-2025-0805](CVE-2025/CVE-2025-08xx/CVE-2025-0805.json) (`2025-02-18T05:15:20.053`)
- [CVE-2024-11376](CVE-2024/CVE-2024-113xx/CVE-2024-11376.json) (`2025-02-18T08:15:08.153`)
- [CVE-2024-11895](CVE-2024/CVE-2024-118xx/CVE-2024-11895.json) (`2025-02-18T08:15:09.313`)
- [CVE-2024-13465](CVE-2024/CVE-2024-134xx/CVE-2024-13465.json) (`2025-02-18T08:15:09.490`)
- [CVE-2024-13523](CVE-2024/CVE-2024-135xx/CVE-2024-13523.json) (`2025-02-18T07:15:08.303`)
- [CVE-2024-13575](CVE-2024/CVE-2024-135xx/CVE-2024-13575.json) (`2025-02-18T08:15:09.653`)
- [CVE-2024-13704](CVE-2024/CVE-2024-137xx/CVE-2024-13704.json) (`2025-02-18T08:15:09.820`)
- [CVE-2024-13795](CVE-2024/CVE-2024-137xx/CVE-2024-13795.json) (`2025-02-18T08:15:09.980`)
- [CVE-2024-57963](CVE-2024/CVE-2024-579xx/CVE-2024-57963.json) (`2025-02-18T07:15:08.713`)
- [CVE-2024-57964](CVE-2024/CVE-2024-579xx/CVE-2024-57964.json) (`2025-02-18T07:15:08.920`)
- [CVE-2025-0422](CVE-2025/CVE-2025-04xx/CVE-2025-0422.json) (`2025-02-18T08:15:10.147`)
- [CVE-2025-0423](CVE-2025/CVE-2025-04xx/CVE-2025-0423.json) (`2025-02-18T08:15:10.360`)
- [CVE-2025-0424](CVE-2025/CVE-2025-04xx/CVE-2025-0424.json) (`2025-02-18T08:15:10.490`)
- [CVE-2025-0425](CVE-2025/CVE-2025-04xx/CVE-2025-0425.json) (`2025-02-18T08:15:10.597`)
- [CVE-2025-0864](CVE-2025/CVE-2025-08xx/CVE-2025-0864.json) (`2025-02-18T08:15:10.723`)
### CVEs modified in the last Commit

View File

@ -244690,6 +244690,7 @@ CVE-2024-11370,0,0,dd87b64b129f6809c8edd7b234994b231659964606722e4f84f6ae489936a
CVE-2024-11371,0,0,940d4acb1660319dcaf9e79be7b51b02d713b6710d41c4a41d256d4b90485073,2024-12-16T15:53:39.657000
CVE-2024-11374,0,0,a5a1e58c0241313798d5870304d6ab4fd613b7c8d39f72ddd8edd6b514e2a94b,2024-12-07T10:15:05.643000
CVE-2024-11375,0,0,09113c9c4c16e936568b412fc506dc02ef629e8e628c654e3f6f629cd5e5088f,2025-01-07T05:15:11.907000
CVE-2024-11376,1,1,45917b214ca5f15f67d5330d816dc29f69e2e80a0293c4110070cf3104a3cbe0,2025-02-18T08:15:08.153000
CVE-2024-11377,0,0,7c2553183c73f79520591c880309a16f7b34fb51c625dbcc41841afeb50b2cc9,2025-01-07T05:15:12.083000
CVE-2024-11378,0,0,b38085a589e7c1c3c829e70c4c335030fed608a8aaf3232abbfcaba2499cd265,2025-01-07T05:15:12.270000
CVE-2024-11379,0,0,9fd00eb3fec3062cfc458a7971d09425d25dcca0c806b20326864d85b70adea6,2024-12-06T05:15:05.813000
@ -245204,6 +245205,7 @@ CVE-2024-11891,0,0,f8a38032fa61b45ae7f4fd61d15412795ca770178ff882a3a6fac619a51ce
CVE-2024-11892,0,0,d5c6270385b92d8aef9bbc883d47c18aabd1b1a329cb2704b1f0105fbc287876,2025-01-11T08:15:24.463000
CVE-2024-11893,0,0,ab78f78c6e435c83f3f5f09a281780ac0636482d65ec96c7c75ce803df2c5017,2024-12-20T07:15:11.747000
CVE-2024-11894,0,0,9e31b28fa56a41e12b82fdf98576d9a13777f5eed7b6c3fc1f71a85af109ef81,2024-12-14T05:15:10.227000
CVE-2024-11895,1,1,7eda2af854879f2186b2649c5004ae2b8ef5a0461e69212879c04067c083c531,2025-02-18T08:15:09.313000
CVE-2024-11896,0,0,34f349ccc91bcf6d6c27bb81a454efc17924954cfa878d33ee370546a785a3f4,2024-12-24T09:15:05.663000
CVE-2024-11897,0,0,63c2369fafd5da048dd57864988be95602290ce10df0f51d423ab54c866c15e0,2024-12-04T03:15:05.380000
CVE-2024-11898,0,0,e843212abf00805a20f8b4b65b36c01f75cc2096cf65f2d0e7899f11eb517a82,2024-12-03T08:15:06.857000
@ -245572,7 +245574,7 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f
CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000
CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000
CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000
CVE-2024-12314,1,1,c20827041d848ecbf5686ded1fb9a73197d9fdbafadd7d83946334d083c7cb2f,2025-02-18T05:15:09.987000
CVE-2024-12314,0,0,c20827041d848ecbf5686ded1fb9a73197d9fdbafadd7d83946334d083c7cb2f,2025-02-18T05:15:09.987000
CVE-2024-12315,0,0,7515fa7554c61b93e76895b43c863ec546b100360ca8461bec95776b4fc48d0f,2025-02-12T15:15:12.527000
CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000
CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000
@ -245765,7 +245767,7 @@ CVE-2024-12520,0,0,886c4e74a7980fda960a92b5a62600949c9fea0564fe68f7b22e9e1786c04
CVE-2024-12521,0,0,5ef3982f9bbd97c224cda76723fce3c98e248e5aec737e88bf0802be4e43c585,2025-01-08T04:15:06.827000
CVE-2024-12523,0,0,185a41d328f0e130d8ed17ada12f64a855433449910369cbbb025fff8ce0f4d8,2024-12-14T05:15:11.640000
CVE-2024-12524,0,0,872d50ee592086b62712ad11fcac01017f02cae2a37a1857d75b736f2a220d93,2025-01-30T11:15:10.840000
CVE-2024-12525,1,1,2bed9d9749d6c8ef22bb23af585ca60c77e578bcc12b11b932323186ccb93ede,2025-02-18T05:15:10.813000
CVE-2024-12525,0,0,2bed9d9749d6c8ef22bb23af585ca60c77e578bcc12b11b932323186ccb93ede,2025-02-18T05:15:10.813000
CVE-2024-12526,0,0,b192d6e45212a3c6d09a8a6cd2198d071bb3ba4da94a4e2bf151be7ad2c18324,2024-12-12T05:15:13.577000
CVE-2024-12527,0,0,a734fa6fae374e1f78bf0ed5836acb2d88c39ac4a4907ac1228b4122e65ad067,2025-01-11T08:15:25.913000
CVE-2024-12528,0,0,f4af9cf65ffcc6bdde0559258762f791c056b91239412bbfffbf03d13aedbfde,2025-01-07T04:15:08.543000
@ -245984,7 +245986,7 @@ CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe
CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5dd3c,2025-01-17T03:15:07.167000
CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000
CVE-2024-12807,0,0,1d134b4e10fd5c2df6e8d1acfd31e14ba142e002cf7d83d94986fb0c56cb2884,2025-01-28T16:15:37.633000
CVE-2024-12813,1,1,b81db5d427e66d191a6688e1b68cecd7e2131e5a0c88b7b320c1ca3c45597596,2025-02-18T05:15:11.287000
CVE-2024-12813,0,0,b81db5d427e66d191a6688e1b68cecd7e2131e5a0c88b7b320c1ca3c45597596,2025-02-18T05:15:11.287000
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
CVE-2024-12816,0,0,94a80e9971eaa7e870e47359d4c3d1f8fa9ff5419e2a80ed33d726940db7be36,2025-01-25T08:15:08.137000
CVE-2024-12817,0,0,177c0c1ee17fbeb45fd7a30a85d211f5e3e78b0121812fcf822599a3e7e7f5fa,2025-01-25T08:15:08.300000
@ -246439,7 +246441,7 @@ CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1f
CVE-2024-13310,0,0,c7d7f61ed943995654d2d7f670a6eebe7c0fd61f9032347d9fa323e6d73361eb,2025-01-31T16:15:33.080000
CVE-2024-13311,0,0,8f1f9a5d171f95a7ba0f9eaa7d2951798d439c8a220f4f2f7df62ba50bf29d83,2025-01-31T16:15:33.280000
CVE-2024-13312,0,0,816e38c6c7477b967986b1dc1563e84c09b9a93286b16913543c3869e5b6d36c,2025-01-31T16:15:33.413000
CVE-2024-13315,1,1,7d561707348c1d83e16868d78f576052a99fa3248701028b7d3303356e834cd1,2025-02-18T06:15:11.540000
CVE-2024-13315,0,0,7d561707348c1d83e16868d78f576052a99fa3248701028b7d3303356e834cd1,2025-02-18T06:15:11.540000
CVE-2024-13317,0,0,bf6e98353834aadd569c32731a32e07929f7d2ec68ca0c813c445806410cf741,2025-01-18T07:15:08.290000
CVE-2024-13318,0,0,e578de8b4719417613441e3d599820c7f899466a7f87935725f122dcda9b3d95,2025-01-10T12:15:24.257000
CVE-2024-13319,0,0,7991c2dfb6aefea7f96696a61d541e78c477eeff53b34652065a2f9dce798e51,2025-01-24T21:06:34.310000
@ -246529,7 +246531,7 @@ CVE-2024-13433,0,0,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc
CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000
CVE-2024-13435,0,0,d15c9c331d26c4aefe3cc08b7475a5a438e857c1614d3c9f92ce729847209da9,2025-02-12T15:15:13.093000
CVE-2024-13437,0,0,ac4ee3cde1737eec9f740e3f4e2e3bc68da9f2e601434dcfb63740e8fa129b22,2025-02-12T10:15:10.920000
CVE-2024-13438,1,1,c5aede0e8f4f03085f5bfd3812915c95c58edbe7342df19989694e57452a24a1,2025-02-18T06:15:11.740000
CVE-2024-13438,0,0,c5aede0e8f4f03085f5bfd3812915c95c58edbe7342df19989694e57452a24a1,2025-02-18T06:15:11.740000
CVE-2024-13439,0,0,9977a2cc02f20b148bdbeb2cb70da6b957cfc1fa7b049bde9614c22678a6305a,2025-02-15T12:15:30.300000
CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000
CVE-2024-13440,0,0,5766e7a438a8e4269354aacca2cf4360d814b2b0ba936161bc318042a1e4abc8,2025-02-13T17:17:19.413000
@ -246549,7 +246551,8 @@ CVE-2024-13459,0,0,74cc2f10cd16edbcf5659e7d8fe3729e3fc652b8068739b9dd5ffb5ed7a19
CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000
CVE-2024-13460,0,0,9c101ce4e9a0b77c24ea9727b59b3a3bfa4cbf94a343064a0ab69a083a2820cf,2025-01-31T18:07:24.277000
CVE-2024-13463,0,0,a74bd740de3fc458ef5c03de3331d5acaeffdc8e1dd114982c1f405dca936e7c,2025-01-31T04:15:07.497000
CVE-2024-13464,1,1,c7ce95854847c11fde5a1ddc21e150442b9e815758c964241dcc7c0eae02ec39,2025-02-18T05:15:11.673000
CVE-2024-13464,0,0,c7ce95854847c11fde5a1ddc21e150442b9e815758c964241dcc7c0eae02ec39,2025-02-18T05:15:11.673000
CVE-2024-13465,1,1,302d64000d9a85e10d940c0dfda219f6bc435a7608c762c13e680b4ba83050b8,2025-02-18T08:15:09.490000
CVE-2024-13466,0,0,2cbafb86d6f68fe0c2186e724ab662f025c2b1cb3226dee696694b166c55fb4c,2025-01-30T14:15:34.217000
CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
@ -246572,7 +246575,7 @@ CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4
CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000
CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000
CVE-2024-13500,0,0,0c429174cca57ae83685b1f496a3cf42bd0c51ad39e20a565f4f68cce4f1c5cf,2025-02-15T12:15:30.610000
CVE-2024-13501,1,1,38d87f70bedff5fc9fdfe37055275cd533c9f08814bf6da62517ae17e2845e24,2025-02-18T05:15:12.117000
CVE-2024-13501,0,0,38d87f70bedff5fc9fdfe37055275cd533c9f08814bf6da62517ae17e2845e24,2025-02-18T05:15:12.117000
CVE-2024-13502,0,0,b6bd5e7a8ccd125fd10c3c602ef666035a1824dda1c710321e34fb9d3259b3fe,2025-01-17T14:15:31.147000
CVE-2024-13503,0,0,ffb0135326ea2a3ea18800ce3bd83bc523a9e303f03b2acc60a1815003b2400e,2025-01-17T14:15:31.317000
CVE-2024-13504,0,0,65d5eda0db4362f31390d7f75ebf33f34fcbb67dce33bcab3e8868827236c840,2025-01-31T06:15:29.603000
@ -246591,7 +246594,8 @@ CVE-2024-13517,0,0,cfab1b395558d480252b3d9445658f67696997e56c4b9d51564795ba8972f
CVE-2024-13519,0,0,dc09c545fe78d4520b3958b8cc7f812509309ee95d98546daffd0145d2c455d7,2025-01-18T07:15:09.510000
CVE-2024-1352,0,0,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f667,2025-01-17T17:23:55.973000
CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70b11,2025-01-30T17:41:52.897000
CVE-2024-13522,1,1,1ec5bbee168af71e2c569fc16b8aceb6b0c6360701cfbb6feabd58c3768384f3,2025-02-18T05:15:12.463000
CVE-2024-13522,0,0,1ec5bbee168af71e2c569fc16b8aceb6b0c6360701cfbb6feabd58c3768384f3,2025-02-18T05:15:12.463000
CVE-2024-13523,1,1,a01422a75b98041b28e49f24f2d7440e366f8a9a4929907951037686a612b3c8,2025-02-18T07:15:08.303000
CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000
CVE-2024-13525,0,0,974cc77357d10bdeddefe2341db48f6fd4cfe789b2cdee428681d1b46764d32d,2025-02-15T09:15:08.833000
CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000
@ -246601,12 +246605,12 @@ CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba7
CVE-2024-13530,0,0,79b95d03a65d37f6bd7247a320ee91efecfa7853e8fca4111e89d02aab16e68f,2025-01-31T08:15:07.543000
CVE-2024-13531,0,0,d0896acc17735e856b06d8e0c3a5b2f52d9e0cbd22880e913d28c402f6195055,2025-02-12T10:15:12.317000
CVE-2024-13532,0,0,afd84c2f186b0b681f34e67a86ddb00ec0310f61d9e69cd64ac60428b6884a22,2025-02-12T12:15:29.023000
CVE-2024-13535,1,1,dec80695a517d3768819588f0daa6dc70d633cccd453511cce85b18d61e52a4d,2025-02-18T05:15:12.773000
CVE-2024-13535,0,0,dec80695a517d3768819588f0daa6dc70d633cccd453511cce85b18d61e52a4d,2025-02-18T05:15:12.773000
CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000
CVE-2024-13538,1,1,aa825465172755b9863036b91c4745396a22ef52b7b6e5c9f1490e637d5ab375,2025-02-18T05:15:13.127000
CVE-2024-13538,0,0,aa825465172755b9863036b91c4745396a22ef52b7b6e5c9f1490e637d5ab375,2025-02-18T05:15:13.127000
CVE-2024-13539,0,0,4b7e0c70558e34f6819b9b46d3f48cda096658439289d18effcd3cdff1bec624,2025-02-12T04:15:09.197000
CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000
CVE-2024-13540,1,1,b68ecde40b732145c347461191cbcc1ffd4b9ba81b4500231d1f6c3e44c75163,2025-02-18T05:15:13.427000
CVE-2024-13540,0,0,b68ecde40b732145c347461191cbcc1ffd4b9ba81b4500231d1f6c3e44c75163,2025-02-18T05:15:13.427000
CVE-2024-13541,0,0,4e9d1f97a299ff6127f5d36e7cb13e30abee458413408a9b4f57ec8d00d54529,2025-02-12T04:15:09.347000
CVE-2024-13542,0,0,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000
CVE-2024-13543,0,0,e978bc49ff488db2b344d5d8ed3663103952e081a7e5e2e0d652ffcd5a679db1,2025-02-11T15:15:16.633000
@ -246619,35 +246623,36 @@ CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a6120298
CVE-2024-13550,0,0,a4fead6d03b6144abe5ac40b03d52a1da2858d08b4f2df68e9fe9b57926c0bff,2025-02-04T19:25:13.807000
CVE-2024-13551,0,0,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000
CVE-2024-13554,0,0,593696d24f43140274834fa7c9a7ab6a89ace00d66aec05e7d998911a54b4ba1,2025-02-12T04:15:09.503000
CVE-2024-13555,1,1,3200643e8c32cab10ee18a48199edd6eb143f7592c7375364c0412c5fef4c9c9,2025-02-18T05:15:13.597000
CVE-2024-13556,1,1,86edfe22b56e2b4b89aad7099009b803389782a1ceb5999e6e1bd006be446f3f,2025-02-18T06:15:11.900000
CVE-2024-13555,0,0,3200643e8c32cab10ee18a48199edd6eb143f7592c7375364c0412c5fef4c9c9,2025-02-18T05:15:13.597000
CVE-2024-13556,0,0,86edfe22b56e2b4b89aad7099009b803389782a1ceb5999e6e1bd006be446f3f,2025-02-18T06:15:11.900000
CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000
CVE-2024-13561,0,0,2147326d45c7c96265106b6ff772f1393a83793dfac14b78a483fca6de875c16,2025-01-29T12:15:27.617000
CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000
CVE-2024-13563,0,0,a22d7bca0cd120477dc1fa3e57922c805548e0065756a928efb634339816e060,2025-02-15T09:15:09.897000
CVE-2024-13565,1,1,09484b11000b3ae55a8d4aa1c14df152d867ff650645b8d7539db7f4a1952ba8,2025-02-18T05:15:13.803000
CVE-2024-13565,0,0,09484b11000b3ae55a8d4aa1c14df152d867ff650645b8d7539db7f4a1952ba8,2025-02-18T05:15:13.803000
CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000
CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000
CVE-2024-13570,0,0,bd29cdd9a7035d220844b35d0e7ba2f79edf50e314a280da902fd81fc517776e,2025-02-11T16:15:39.090000
CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000
CVE-2024-13573,1,1,4c15c78a9615e8ce64f7592c831c2a81f25bc5a0e24ca1c3a58f764690185d7a,2025-02-18T05:15:14.007000
CVE-2024-13576,1,1,d35998f4d69291c9bf0c6a64cbfb55e2da2868a469ebe7a1cc5d71e6b9258231,2025-02-18T05:15:14.157000
CVE-2024-13577,1,1,a40dbddd747a29435bc9cd61b63bc4b95a8a8703143f38d72b41d587221a2be2,2025-02-18T05:15:14.487000
CVE-2024-13578,1,1,ce304e79d496c1935a636594ed7d0ce3622b36585f28fc55bec0149ceaa84b2b,2025-02-18T05:15:14.913000
CVE-2024-13579,1,1,99ad1125b9e8cd7ccf0d5b4f2c0a1560bc0879f6c3e5b45e5019c65d65214c74,2025-02-18T05:15:15.310000
CVE-2024-13573,0,0,4c15c78a9615e8ce64f7592c831c2a81f25bc5a0e24ca1c3a58f764690185d7a,2025-02-18T05:15:14.007000
CVE-2024-13575,1,1,17926a8a3c44e671cffd1d8c13b88294d3fea4b6a59023fa8be054801e0a5de0,2025-02-18T08:15:09.653000
CVE-2024-13576,0,0,d35998f4d69291c9bf0c6a64cbfb55e2da2868a469ebe7a1cc5d71e6b9258231,2025-02-18T05:15:14.157000
CVE-2024-13577,0,0,a40dbddd747a29435bc9cd61b63bc4b95a8a8703143f38d72b41d587221a2be2,2025-02-18T05:15:14.487000
CVE-2024-13578,0,0,ce304e79d496c1935a636594ed7d0ce3622b36585f28fc55bec0149ceaa84b2b,2025-02-18T05:15:14.913000
CVE-2024-13579,0,0,99ad1125b9e8cd7ccf0d5b4f2c0a1560bc0879f6c3e5b45e5019c65d65214c74,2025-02-18T05:15:15.310000
CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000
CVE-2024-13581,1,1,c6817592c92440ad44a8fa228f7b53b9ed51e9e0cca7d9b47bb33079647af765,2025-02-18T05:15:15.590000
CVE-2024-13582,1,1,7aa6cafae2a67f9f655defd9ac99bed39ce0c4c8c5f69a27d738b628034d125b,2025-02-18T05:15:15.897000
CVE-2024-13581,0,0,c6817592c92440ad44a8fa228f7b53b9ed51e9e0cca7d9b47bb33079647af765,2025-02-18T05:15:15.590000
CVE-2024-13582,0,0,7aa6cafae2a67f9f655defd9ac99bed39ce0c4c8c5f69a27d738b628034d125b,2025-02-18T05:15:15.897000
CVE-2024-13583,0,0,74ad7b83b093ee530d03665dfed8aeb7981ef34d0b7fd0bb7def11fe8ca86354,2025-02-05T01:38:33.527000
CVE-2024-13584,0,0,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f364,2025-01-24T18:20:40.760000
CVE-2024-13586,0,0,031371a39e86dab11794d85bebc5761cfd2812bcdc21ab474a79e1589e56730a,2025-02-04T18:14:20.930000
CVE-2024-13587,1,1,720c8e9f332be08c97824f7294ce236301b592a585cd761de003bc321877436a,2025-02-18T05:15:16.267000
CVE-2024-13588,1,1,ff7590ea531a386de3592f06b0d190afe6e1a5e182fc0c9290b6473914c2c325,2025-02-18T05:15:16.417000
CVE-2024-13587,0,0,720c8e9f332be08c97824f7294ce236301b592a585cd761de003bc321877436a,2025-02-18T05:15:16.267000
CVE-2024-13588,0,0,ff7590ea531a386de3592f06b0d190afe6e1a5e182fc0c9290b6473914c2c325,2025-02-18T05:15:16.417000
CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000
CVE-2024-13590,0,0,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000
CVE-2024-13593,0,0,fa3fece164aaf9e5bdce4149920be38daaf35514256e02e0d8ee1f95b69ca49c,2025-02-04T21:08:45.723000
CVE-2024-13594,0,0,e40694f60357c551d50cfd64c32b62fc5a068d57b870210e0ac9e99e736df254,2025-02-05T17:01:24.577000
CVE-2024-13595,1,1,857054eef2128780cfc93b39c44c7c6d11a927de9b29d4814b8b4c364f2d10c0,2025-02-18T05:15:16.710000
CVE-2024-13595,0,0,857054eef2128780cfc93b39c44c7c6d11a927de9b29d4814b8b4c364f2d10c0,2025-02-18T05:15:16.710000
CVE-2024-13596,0,0,2b347cb4a79836e676774e7c831f562b3de9868f3b716c19ca500dd58b6901ef,2025-01-31T18:16:35.347000
CVE-2024-13599,0,0,03405f2c3d79b505fbb84b1ff3dea79fdc81e050ef9a41f4a5537eddbfaf081d,2025-02-04T18:13:20.930000
CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb8486a,2025-02-05T21:46:19.363000
@ -246657,12 +246662,12 @@ CVE-2024-13603,0,0,f5ddc39376765e5cf70d139b9cd0562a2cffa9ee9e42ff0700edf6701aa0d
CVE-2024-13606,0,0,1cbdd85184ccb544c93c1632b6d2d3443b7aae450a16746f7539ee65d5330de1,2025-02-13T10:15:09.310000
CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e5527f8,2025-02-04T07:15:12.973000
CVE-2024-13608,0,0,730b0ed6d14a39f661d8b58e3582ab1ffb56662a72ce1d07024da3747f0e1f13,2025-02-17T06:15:11.717000
CVE-2024-13609,1,1,f6b426da9160449350ccd1dc2595915af601bdc725430ae991e1018a5193a1be,2025-02-18T05:15:17.160000
CVE-2024-13609,0,0,f6b426da9160449350ccd1dc2595915af601bdc725430ae991e1018a5193a1be,2025-02-18T05:15:17.160000
CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000
CVE-2024-13612,0,0,552127c2046be21ad3d3bc25df0920820f31b497c8eb5b9bb46c66cbfd8336ca,2025-02-01T13:15:21.320000
CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000
CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000
CVE-2024-13622,1,1,2a60756e3c1f8e2c67b3815a15c7e2ffcb84513035babc6bcdd160486b03b340,2025-02-18T05:15:17.557000
CVE-2024-13622,0,0,2a60756e3c1f8e2c67b3815a15c7e2ffcb84513035babc6bcdd160486b03b340,2025-02-18T05:15:17.557000
CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000
CVE-2024-13625,0,0,13fe8a9d23e71af19d049c26713d37681ab17ff9be556309bc6aff2602f296b7,2025-02-17T06:15:11.820000
CVE-2024-13626,0,0,ed2b03a934796ec0d9dda4598897fce51405472dd7901847b82ba4dfaac12a2b,2025-02-17T06:15:11.940000
@ -246691,12 +246696,12 @@ CVE-2024-13665,0,0,18a0fb900dfdb3589ce932f5ee4cb2705e9546782c74f6ed6faf4400a1ef2
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000
CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693b44,2025-01-31T17:50:24.757000
CVE-2024-13677,1,1,8c3dbbbad614c82756be5f87314c06d94f2c3bdc57d66eee8a7cfa5797e10d79,2025-02-18T05:15:17.893000
CVE-2024-13677,0,0,8c3dbbbad614c82756be5f87314c06d94f2c3bdc57d66eee8a7cfa5797e10d79,2025-02-18T05:15:17.893000
CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
CVE-2024-13684,1,1,40f905038d5fa7555de5181028fa41153678ad0c3f5a58f630a868dcfb14cb33,2025-02-18T05:15:18.050000
CVE-2024-13687,1,1,0bb37ef6a8e3ccf2122a39c9ab998f2d6a038a6c8ba655818034cfc1a0dd838f,2025-02-18T05:15:18.273000
CVE-2024-13684,0,0,40f905038d5fa7555de5181028fa41153678ad0c3f5a58f630a868dcfb14cb33,2025-02-18T05:15:18.050000
CVE-2024-13687,0,0,0bb37ef6a8e3ccf2122a39c9ab998f2d6a038a6c8ba655818034cfc1a0dd838f,2025-02-18T05:15:18.273000
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000
CVE-2024-13694,0,0,f76307657ffe1cf961458e88374ab5be6334165284f8bcf86e9ac130fdc702fd,2025-02-04T18:47:41.800000
@ -246706,6 +246711,7 @@ CVE-2024-13699,0,0,6c179d99e1e68d225e4cf32bfc134108fb7e1de353e5a047f158d68ed9ec8
CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000
CVE-2024-13700,0,0,9ce20ac3b11103f5abdc5f2758b97ef5dcc76de719f13fdbcb103d53e58691eb,2025-01-31T16:49:24.477000
CVE-2024-13701,0,0,f834def27c90b870381ae372b4e05326550a31cd496de38386bfaad9d9f3cc5e,2025-02-12T04:15:09.647000
CVE-2024-13704,1,1,5d025f249049217a682825fa38cf36a8b48d6c8857075fa19cc8fdc62297f9d0,2025-02-18T08:15:09.820000
CVE-2024-13705,0,0,5ec6ac499cda9ee218cf1587251a6725974948adf52db55dc1b1fdc60e1d5cc2,2025-01-31T18:17:10.220000
CVE-2024-13706,0,0,92bfb58090ec2cfc6ac0f1405cc2482324ffba82002ca538da8b57da6032c8b7,2025-01-30T14:15:36.180000
CVE-2024-13707,0,0,032e2a9cb1b090228bf905c1e52e11efae679d2f0165154d533e21d339074c69,2025-01-31T18:12:42.913000
@ -246719,7 +246725,7 @@ CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd
CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000
CVE-2024-13722,0,0,fac6574297fad520484336a8f32a80c91be5643d31918d246727bb21994df2e7,2025-02-06T15:15:12.867000
CVE-2024-13723,0,0,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f870,2025-02-06T15:15:13.050000
CVE-2024-13725,1,1,5b3ffde79c6593edc557a532adabb9014e463a2a853b68295ede31defe90aed8,2025-02-18T05:15:18.707000
CVE-2024-13725,0,0,5b3ffde79c6593edc557a532adabb9014e463a2a853b68295ede31defe90aed8,2025-02-18T05:15:18.707000
CVE-2024-13726,0,0,ed40e7d0ccfa3e513d937bd8d71cc7ba5769f17f2351ac80377e14058de87ee2,2025-02-17T06:15:12.170000
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000
@ -246743,6 +246749,7 @@ CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b8
CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000
CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba37212823df,2025-02-14T11:15:09.320000
CVE-2024-13794,0,0,6f5cfea229e5d029358c5daefcebc44ce458400ca82e6dd1a7b59d94adccdac4,2025-02-12T15:15:14.040000
CVE-2024-13795,1,1,5ff186d2b18ebdd910aed1b17c910f62f178a43b9b5396d894a01eab3d2cf2bf,2025-02-18T08:15:09.980000
CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000
CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
@ -246760,10 +246767,10 @@ CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7
CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede14a2,2025-02-07T07:15:14.573000
CVE-2024-13842,0,0,955b2791810b1a10a02616a1134c790dde9472870ffb2ecef1b260eb338bf89c,2025-02-11T16:15:39.513000
CVE-2024-13843,0,0,510b2676ce058323607c3a8a5ac880be2eb8da89d56b6ba23759e15b6c5d2ded,2025-02-11T16:15:39.667000
CVE-2024-13848,1,1,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2cfbe,2025-02-18T05:15:19.157000
CVE-2024-13848,0,0,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2cfbe,2025-02-18T05:15:19.157000
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
CVE-2024-13850,0,0,6b9449e6648abb1edf82833d79485652b7d8e214965b03129c424b1f771ff336,2025-02-08T13:15:06.840000
CVE-2024-13852,1,1,face120ea95fed62ec099664fadaf77219da01c7521b566ddd6f702b5c620406,2025-02-18T05:15:19.423000
CVE-2024-13852,0,0,face120ea95fed62ec099664fadaf77219da01c7521b566ddd6f702b5c620406,2025-02-18T05:15:19.423000
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
CVE-2024-13867,0,0,b22bb2f54b64760b76b696bbb0a0a23f6d99826e999c63e0854f07bc507510b1,2025-02-13T10:15:09.847000
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
@ -266850,7 +266857,7 @@ CVE-2024-45317,0,0,5f43c76e9ff743bd3a3e5058ccc2d1ee5b77faf16f692fa3d7b6e565fa265
CVE-2024-45318,0,0,75989837b2772ed0bee9b8d611c5c445760df07141b272a0d99d94a5a5004185,2024-12-05T17:15:11.880000
CVE-2024-45319,0,0,f54a68d148467026440ad15f341a6bfb542cacddb35ec8506cc4659fa4aa336e,2024-12-05T17:15:12.040000
CVE-2024-4532,0,0,014dcf5f2708015805e201ab211b9cd9fe192f81599e256bd8dd0d34d23e73ac,2024-11-21T09:43:02.993000
CVE-2024-45320,1,1,e478cfe896354b43d3025ebc3913c99bb1bf2ec6c99ae9e67f251dc1dd0d0b9c,2025-02-18T06:15:12.060000
CVE-2024-45320,0,0,e478cfe896354b43d3025ebc3913c99bb1bf2ec6c99ae9e67f251dc1dd0d0b9c,2025-02-18T06:15:12.060000
CVE-2024-45321,0,0,7c76da4e7fbb2242661f83a4480b440b53d8e0cb0dfda635981d7f5cbb74ebaf,2024-12-05T18:47:30.633000
CVE-2024-45323,0,0,0b7a355a77d8731838f1cae0db38407098fd6b4582cf218a996117fa53bb1c18,2024-09-20T16:23:51.397000
CVE-2024-45326,0,0,8cf2e70ef6584a36126584463aee675c9d52e03d915cd6d7f65314e9c17ce38b,2025-01-31T16:36:15.783000
@ -275021,6 +275028,8 @@ CVE-2024-5796,0,0,10c3848976491ca5eeb295d89b1679f80388276c56109509ef1777f493022a
CVE-2024-57960,0,0,773b522c706cbc49414ca08e8ce62c9b452c14ceb463659dc8cf301c1c68526d,2025-02-06T13:15:40.270000
CVE-2024-57961,0,0,70e7b1214aba97db422e1a3b3f233758ab9ca724b4d145bac1ebcb3fd7fbccf1,2025-02-06T13:15:40.417000
CVE-2024-57962,0,0,54a498ba952c380e086f823bc80eb1c13badd26229709ca796a347944d7ffac6,2025-02-06T13:15:40.600000
CVE-2024-57963,1,1,f3292c7bb0a42acc5163ed15b47d421c57318fc3cc3b463bd3fc84d9df19e300,2025-02-18T07:15:08.713000
CVE-2024-57964,1,1,637613af4d74c60604771ff7eb969de4e439548306825583031fb9f32f69d7a4,2025-02-18T07:15:08.920000
CVE-2024-57965,0,0,1ec783f88325ed02c1810413dbff411d8a59c49db780f7d0fa48c580055559d5,2025-01-29T10:15:08.113000
CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e1c9,2025-02-09T05:15:32.883000
CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000
@ -278872,6 +278881,10 @@ CVE-2025-0410,0,0,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc7136
CVE-2025-0411,0,0,963fb93dc9f22be5b01fb4ee24ffe0ff364fead29af110d8c8255d7fa3a39b9c,2025-02-12T18:14:13.143000
CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000
CVE-2025-0413,0,0,5baedddf5946af9550556770de7dca6787e2b2456cc377371a820cf1ed6c2bef,2025-02-05T00:15:28.173000
CVE-2025-0422,1,1,e3c5a06c0c96e5b0131758ea8d9f32a2ee2c48b0c3e97a36b47be9b84aecd05b,2025-02-18T08:15:10.147000
CVE-2025-0423,1,1,c05e49f8bc53a5bcbcc1c2ecd8ffe5916ceff7106cf7d8443073a918e1f8cb6b,2025-02-18T08:15:10.360000
CVE-2025-0424,1,1,d05eb660349a1243a1bbacf43923c5dac99d9efb16a2f8cb5d47ed724d5e60f2,2025-02-18T08:15:10.490000
CVE-2025-0425,1,1,0197be9b9b61d28cf57a84b48764c854a48a9c5583689fbdfa0627c74d94c9a5,2025-02-18T08:15:10.597000
CVE-2025-0426,0,0,3066c25cbdc0db466cbcd8d2b93cf410724b054db8536dfcb0c3e103d2688218,2025-02-13T17:17:19.863000
CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000
CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000
@ -279087,7 +279100,7 @@ CVE-2025-0792,0,0,571c846d961e8b86c56927f453b9245146da4bf154d8adacec1a6f2ac61420
CVE-2025-0793,0,0,8be19ff13515f07895e2086e5466aca03e8900014540b1bb4c6de4c4a0098cb9,2025-01-29T14:15:27.653000
CVE-2025-0794,0,0,d0f8610657a801d90303b5fa19f71a1cc9d8ef6c1284239115ffdbbe58a9a796,2025-01-29T01:15:07.943000
CVE-2025-0795,0,0,78c31d616d37a01317d5bb724bd6c565c80d9cf22aaf5d4fae4283f153b591de,2025-01-29T02:15:26.830000
CVE-2025-0796,1,1,c995664118edfa498400dc41d59bdd55577b9c45bfcb1ea26abe5be298bf9865,2025-02-18T05:15:19.597000
CVE-2025-0796,0,0,c995664118edfa498400dc41d59bdd55577b9c45bfcb1ea26abe5be298bf9865,2025-02-18T05:15:19.597000
CVE-2025-0797,0,0,6473915a793ff9884aafab236f62e144affe799470e5962b8e5351b78ec1cbf9,2025-01-29T02:15:27.010000
CVE-2025-0798,0,0,f979c1c8f68dd351170669e51288efee24790cc09665b119a10fc6d4d02457d2,2025-01-29T02:15:27.190000
CVE-2025-0799,0,0,af43bf4a5768ce0bfb94d428736daaedcdfb3eccbac5f00bb0b5a7f9f2fd815b,2025-02-06T01:15:09.580000
@ -279095,7 +279108,7 @@ CVE-2025-0800,0,0,9e70c7ae7b67598c33ec1be994b15b025cffe8ea4961b83f2cb2dbf2f54224
CVE-2025-0802,0,0,058667df6e6f167c26958b65b8647dee5b306173c5334271f5f14ad30de88b99,2025-02-10T14:06:03.410000
CVE-2025-0803,0,0,a9f14556ef67fd49c2c0c4e57733c9351d270dba138685c5a84cb2509244be40,2025-02-11T19:48:06.860000
CVE-2025-0804,0,0,53f7fab3a5e8ab11732155ff3e17826c7a6f61d1fcafd348f26f842f26491509,2025-01-29T04:15:07.193000
CVE-2025-0805,1,1,9ded96f70be4cb9168e0560b9d556200e9f9ac3b16a2dc16cb8df95bf70a5b0b,2025-02-18T05:15:20.053000
CVE-2025-0805,0,0,9ded96f70be4cb9168e0560b9d556200e9f9ac3b16a2dc16cb8df95bf70a5b0b,2025-02-18T05:15:20.053000
CVE-2025-0806,0,0,a209d9e787c8d84edf5bd62206346babb48d1b53bd04304b3ccb35e3e13950e3,2025-02-11T19:46:22.923000
CVE-2025-0808,0,0,428483e8e66f55834849f1a517bd4a05acd223bb58e42750cf8cf49bc8e92e73,2025-02-12T04:15:09.950000
CVE-2025-0809,0,0,886fb9b396d2aad5cff53c02349fc0fee570a4920d4c4e68da65e25a660a34b2,2025-01-31T06:15:29.933000
@ -279122,6 +279135,7 @@ CVE-2025-0859,0,0,aa1ef6a1093a15ab4491e05a4c630743ada11578233ef06a5ca4a6f0316692
CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e97,2025-01-31T20:42:08.143000
CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000
CVE-2025-0862,0,0,dee81cd1ce38cab472cf28eb1ce5e1d9037dd3bdafbd545dddc7d172ac5b30e6,2025-02-11T11:15:16.043000
CVE-2025-0864,1,1,e56e1de16064acc329a5a32cc0ae2f68a867a09df61e368d37eca098dd9d89f8,2025-02-18T08:15:10.723000
CVE-2025-0867,0,0,00bdec3c0865b5f1af866315340e7f0b0b67377723af000ff55ae7ae60c91aed,2025-02-14T13:15:42.620000
CVE-2025-0869,0,0,c00b46e6ec082bb5acc28b4863ecc13d05083b8391495aa8cb5415a092650002,2025-02-07T17:15:31.307000
CVE-2025-0870,0,0,1d396f929e817f7895a91994ddee9c76172e4af1ca8cb701d53be58252025809,2025-01-30T13:15:10.483000

Can't render this file because it is too large.