From 9b160ed85c051d6729db6b1ee86512d09ea3b441 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 18 Feb 2025 09:04:27 +0000 Subject: [PATCH] Auto-Update: 2025-02-18T09:00:58.525029+00:00 --- CVE-2024/CVE-2024-113xx/CVE-2024-11376.json | 64 ++++++++++++++++ CVE-2024/CVE-2024-118xx/CVE-2024-11895.json | 76 +++++++++++++++++++ CVE-2024/CVE-2024-134xx/CVE-2024-13465.json | 60 +++++++++++++++ CVE-2024/CVE-2024-135xx/CVE-2024-13523.json | 60 +++++++++++++++ CVE-2024/CVE-2024-135xx/CVE-2024-13575.json | 64 ++++++++++++++++ CVE-2024/CVE-2024-137xx/CVE-2024-13704.json | 60 +++++++++++++++ CVE-2024/CVE-2024-137xx/CVE-2024-13795.json | 60 +++++++++++++++ CVE-2024/CVE-2024-579xx/CVE-2024-57963.json | 63 ++++++++++++++++ CVE-2024/CVE-2024-579xx/CVE-2024-57964.json | 63 ++++++++++++++++ CVE-2025/CVE-2025-04xx/CVE-2025-0422.json | 78 +++++++++++++++++++ CVE-2025/CVE-2025-04xx/CVE-2025-0423.json | 78 +++++++++++++++++++ CVE-2025/CVE-2025-04xx/CVE-2025-0424.json | 78 +++++++++++++++++++ CVE-2025/CVE-2025-04xx/CVE-2025-0425.json | 78 +++++++++++++++++++ CVE-2025/CVE-2025-08xx/CVE-2025-0864.json | 68 +++++++++++++++++ README.md | 47 +++++------- _state.csv | 84 ++++++++++++--------- 16 files changed, 1017 insertions(+), 64 deletions(-) create mode 100644 CVE-2024/CVE-2024-113xx/CVE-2024-11376.json create mode 100644 CVE-2024/CVE-2024-118xx/CVE-2024-11895.json create mode 100644 CVE-2024/CVE-2024-134xx/CVE-2024-13465.json create mode 100644 CVE-2024/CVE-2024-135xx/CVE-2024-13523.json create mode 100644 CVE-2024/CVE-2024-135xx/CVE-2024-13575.json create mode 100644 CVE-2024/CVE-2024-137xx/CVE-2024-13704.json create mode 100644 CVE-2024/CVE-2024-137xx/CVE-2024-13795.json create mode 100644 CVE-2024/CVE-2024-579xx/CVE-2024-57963.json create mode 100644 CVE-2024/CVE-2024-579xx/CVE-2024-57964.json create mode 100644 CVE-2025/CVE-2025-04xx/CVE-2025-0422.json create mode 100644 CVE-2025/CVE-2025-04xx/CVE-2025-0423.json create mode 100644 CVE-2025/CVE-2025-04xx/CVE-2025-0424.json create mode 100644 CVE-2025/CVE-2025-04xx/CVE-2025-0425.json create mode 100644 CVE-2025/CVE-2025-08xx/CVE-2025-0864.json diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11376.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11376.json new file mode 100644 index 00000000000..624c1433bf2 --- /dev/null +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11376.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-11376", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-18T08:15:08.153", + "lastModified": "2025-02-18T08:15:08.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The s2Member \u2013 Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 241114. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/s2member/tags/241114/s2member.php#L210", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3240794%40s2member&new=3240794%40s2member&sfp_email=&sfph_mail=#file1", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5c8f46-a686-4b77-8a22-8dec92a96350?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11895.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11895.json new file mode 100644 index 00000000000..00c9a050322 --- /dev/null +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11895.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-11895", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-18T08:15:09.313", + "lastModified": "2025-02-18T08:15:09.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Online Payments \u2013 Get Paid with PayPal, Square & Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.20.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L129", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L22", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L50", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L91", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3241650%40paypal-payment-button-by-vcita&new=3241650%40paypal-payment-button-by-vcita&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aab33299-f02d-44a1-9522-5309eed6fd38?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13465.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13465.json new file mode 100644 index 00000000000..920cb9ae0bd --- /dev/null +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13465.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-13465", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-18T08:15:09.490", + "lastModified": "2025-02-18T08:15:09.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The aBlocks \u2013 WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \"Table Of Content\" Block, specifically in the \"markerView\" attribute, in all versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3236611%40ablocks&new=3236611%40ablocks&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/abdb6632-d579-4650-b058-da10201cca8c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13523.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13523.json new file mode 100644 index 00000000000..7fd879adf0b --- /dev/null +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13523.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-13523", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-18T07:15:08.303", + "lastModified": "2025-02-18T07:15:08.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The MemorialDay plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.4. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3232363%40memorialday%2Ftrunk&old=3207291%40memorialday%2Ftrunk&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/96cec16e-7bb3-4279-8c17-eca88d413ad8?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13575.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13575.json new file mode 100644 index 00000000000..c493ec042a2 --- /dev/null +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13575.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-13575", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-18T08:15:09.653", + "lastModified": "2025-02-18T08:15:09.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Web Stories Enhancer \u2013 Level Up Your Web Stories plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'web_stories_enhancer' shortcode in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/web-stories-enhancer/trunk/includes/shortcode.php#L99", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3238312%40web-stories-enhancer&new=3238312%40web-stories-enhancer&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fdc614f2-37a6-474a-828a-1f34f98715c5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13704.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13704.json new file mode 100644 index 00000000000..6499ae51bcf --- /dev/null +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13704.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-13704", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-18T08:15:09.820", + "lastModified": "2025-02-18T08:15:09.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'st_user_title' parameter in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3240039%40super-testimonial&new=3240039%40super-testimonial&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/20720912-6bfd-4df1-97c7-7025c16d7a0f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13795.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13795.json new file mode 100644 index 00000000000..5a994ed3c27 --- /dev/null +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13795.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-13795", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-18T08:15:09.980", + "lastModified": "2025-02-18T08:15:09.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.12.27. This is due to missing or incorrect nonce validation on the ecwid_deactivate_feedback() function. This makes it possible for unauthenticated attackers to send deactivation messages on behalf of a site owner via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3241777%40ecwid-shopping-cart&new=3241777%40ecwid-shopping-cart&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f1eb9ec6-897a-4c38-a85c-033d7050dcfa?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57963.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57963.json new file mode 100644 index 00000000000..6bbb6ca1ca0 --- /dev/null +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57963.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-57963", + "sourceIdentifier": "hirt@hitachi.co.jp", + "published": "2025-02-18T07:15:08.713", + "lastModified": "2025-02-18T07:15:08.713", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "hirt@hitachi.co.jp", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Insecure Loading of Dynamic Link Libraries have been discovered in USB-CONVERTERCABLE DRIVER, which could allow local attackers to potentially disclose information or execute arbitray code on affected systems.\nThis issue affects USB-CONVERTERCABLE DRIVER:." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "hirt@hitachi.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "hirt@hitachi.co.jp", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.hitachi.com/hirt/hitachi-sec/2025/001.html", + "source": "hirt@hitachi.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57964.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57964.json new file mode 100644 index 00000000000..39a95ef382d --- /dev/null +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57964.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-57964", + "sourceIdentifier": "hirt@hitachi.co.jp", + "published": "2025-02-18T07:15:08.920", + "lastModified": "2025-02-18T07:15:08.920", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "hirt@hitachi.co.jp", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Insecure Loading of Dynamic Link Libraries have been discovered in HVAC Energy Saving Program, which could allow local attackers to potentially disclose information or execute arbitray code on affected systems.\nThis issue affects HVAC Energy Saving Program:." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "hirt@hitachi.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "hirt@hitachi.co.jp", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.hitachi.com/hirt/hitachi-sec/2025/001.html", + "source": "hirt@hitachi.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0422.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0422.json new file mode 100644 index 00000000000..8176a8923b2 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0422.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0422", + "sourceIdentifier": "vulnerability@ncsc.ch", + "published": "2025-02-18T08:15:10.147", + "lastModified": "2025-02-18T08:15:10.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated user in the \"bestinformed Web\" application can execute commands on the underlying server running the application. (Remote Code Execution) For this, the user must be able to create \"ScriptVars\" with the type \u201escript\" and preview them by, for example, creating a new \"Info\". By default, admin users have those permissions, but with the granular permission system, those permissions may be assigned to other users.\u00a0An attacker is able to execute commands on the server running the \"bestinformed Web\" application if an account with the correct permissions was compromised before." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html", + "source": "vulnerability@ncsc.ch" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0423.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0423.json new file mode 100644 index 00000000000..8192a8e9602 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0423.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0423", + "sourceIdentifier": "vulnerability@ncsc.ch", + "published": "2025-02-18T08:15:10.360", + "lastModified": "2025-02-18T08:15:10.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the \"bestinformed Web\" application, some user input was not properly sanitized. This leads to multiple unauthenticated stored cross-site scripting vulnerabilities.\u00a0An unauthenticated attacker is able to compromise the sessions of users on the server by injecting JavaScript code into their session using an \"Unauthenticated Stored Cross-Site Scripting\". The attacker is then able to ride the session of those users and can abuse their privileges on the \"bestinformed Web\" application." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html", + "source": "vulnerability@ncsc.ch" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0424.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0424.json new file mode 100644 index 00000000000..a0c3e6e1f73 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0424.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0424", + "sourceIdentifier": "vulnerability@ncsc.ch", + "published": "2025-02-18T08:15:10.490", + "lastModified": "2025-02-18T08:15:10.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the \"bestinformed Web\" application, some user input was not properly sanitized. This leads to multiple authenticated stored cross-site scripting vulnerabilities.\u00a0An authenticated attacker is able to compromise the sessions of other users on the server by injecting JavaScript code into their session using an \"Authenticated Stored Cross-Site Scripting\". Those other users might have more privileges than the attacker, enabling a form of horizontal movement." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html", + "source": "vulnerability@ncsc.ch" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0425.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0425.json new file mode 100644 index 00000000000..789a4241b07 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0425.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-0425", + "sourceIdentifier": "vulnerability@ncsc.ch", + "published": "2025-02-18T08:15:10.597", + "lastModified": "2025-02-18T08:15:10.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Via the GUI of the \"bestinformed Infoclient\", a low-privileged user is by default able to change the server address of the \"bestinformed Server\" to which this client connects. This is dangerous as the \"bestinformed Infoclient\" runs with elevated permissions (\"nt authority\\system\"). By changing the server address to a malicious server, or a script simulating a server, the user is able to escalate his privileges by abusing certain features of the \"bestinformed Web\" server. Those features include:\n * Pushing of malicious update packages\n * Arbitrary Registry Read as \"nt authority\\system\"\n\n\nAn attacker is able to escalate his privileges to \"nt authority\\system\" on the Windows client running the \"bestinformed Infoclient\".\u00a0\n\n\nThis attack is not possible if a custom configuration (\"Infoclient.ini\")\u00a0containing the flags \"ShowOnTaskbar=false\" or \"DisabledItems=stPort,stAddress\" is deployed." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-15" + } + ] + } + ], + "references": [ + { + "url": "https://www.cordaware.com/changelog/en/version-6_3_8_1.html", + "source": "vulnerability@ncsc.ch" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0864.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0864.json new file mode 100644 index 00000000000..15f41e36dfe --- /dev/null +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0864.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-0864", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-18T08:15:10.723", + "lastModified": "2025-02-18T08:15:10.723", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'shortcodes_set' parameter in all versions up to, and including, 1.0.6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L1624", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L88", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3235888%40profit-products-tables-for-woocommerce&new=3235888%40profit-products-tables-for-woocommerce&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f93dcb51-1caf-4d63-a8f3-f6251dd0d19f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index e21c265a8e0..e1ab33372b2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-18T07:00:19.803216+00:00 +2025-02-18T09:00:58.525029+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-18T06:15:12.060000+00:00 +2025-02-18T08:15:10.723000+00:00 ``` ### Last Data Feed Release @@ -33,38 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281604 +281618 ``` ### CVEs added in the last Commit -Recently added CVEs: `35` +Recently added CVEs: `14` -- [CVE-2024-13540](CVE-2024/CVE-2024-135xx/CVE-2024-13540.json) (`2025-02-18T05:15:13.427`) -- [CVE-2024-13555](CVE-2024/CVE-2024-135xx/CVE-2024-13555.json) (`2025-02-18T05:15:13.597`) -- [CVE-2024-13556](CVE-2024/CVE-2024-135xx/CVE-2024-13556.json) (`2025-02-18T06:15:11.900`) -- [CVE-2024-13565](CVE-2024/CVE-2024-135xx/CVE-2024-13565.json) (`2025-02-18T05:15:13.803`) -- [CVE-2024-13573](CVE-2024/CVE-2024-135xx/CVE-2024-13573.json) (`2025-02-18T05:15:14.007`) -- [CVE-2024-13576](CVE-2024/CVE-2024-135xx/CVE-2024-13576.json) (`2025-02-18T05:15:14.157`) -- [CVE-2024-13577](CVE-2024/CVE-2024-135xx/CVE-2024-13577.json) (`2025-02-18T05:15:14.487`) -- [CVE-2024-13578](CVE-2024/CVE-2024-135xx/CVE-2024-13578.json) (`2025-02-18T05:15:14.913`) -- [CVE-2024-13579](CVE-2024/CVE-2024-135xx/CVE-2024-13579.json) (`2025-02-18T05:15:15.310`) -- [CVE-2024-13581](CVE-2024/CVE-2024-135xx/CVE-2024-13581.json) (`2025-02-18T05:15:15.590`) -- [CVE-2024-13582](CVE-2024/CVE-2024-135xx/CVE-2024-13582.json) (`2025-02-18T05:15:15.897`) -- [CVE-2024-13587](CVE-2024/CVE-2024-135xx/CVE-2024-13587.json) (`2025-02-18T05:15:16.267`) -- [CVE-2024-13588](CVE-2024/CVE-2024-135xx/CVE-2024-13588.json) (`2025-02-18T05:15:16.417`) -- [CVE-2024-13595](CVE-2024/CVE-2024-135xx/CVE-2024-13595.json) (`2025-02-18T05:15:16.710`) -- [CVE-2024-13609](CVE-2024/CVE-2024-136xx/CVE-2024-13609.json) (`2025-02-18T05:15:17.160`) -- [CVE-2024-13622](CVE-2024/CVE-2024-136xx/CVE-2024-13622.json) (`2025-02-18T05:15:17.557`) -- [CVE-2024-13677](CVE-2024/CVE-2024-136xx/CVE-2024-13677.json) (`2025-02-18T05:15:17.893`) -- [CVE-2024-13684](CVE-2024/CVE-2024-136xx/CVE-2024-13684.json) (`2025-02-18T05:15:18.050`) -- [CVE-2024-13687](CVE-2024/CVE-2024-136xx/CVE-2024-13687.json) (`2025-02-18T05:15:18.273`) -- [CVE-2024-13725](CVE-2024/CVE-2024-137xx/CVE-2024-13725.json) (`2025-02-18T05:15:18.707`) -- [CVE-2024-13848](CVE-2024/CVE-2024-138xx/CVE-2024-13848.json) (`2025-02-18T05:15:19.157`) -- [CVE-2024-13852](CVE-2024/CVE-2024-138xx/CVE-2024-13852.json) (`2025-02-18T05:15:19.423`) -- [CVE-2024-45320](CVE-2024/CVE-2024-453xx/CVE-2024-45320.json) (`2025-02-18T06:15:12.060`) -- [CVE-2025-0796](CVE-2025/CVE-2025-07xx/CVE-2025-0796.json) (`2025-02-18T05:15:19.597`) -- [CVE-2025-0805](CVE-2025/CVE-2025-08xx/CVE-2025-0805.json) (`2025-02-18T05:15:20.053`) +- [CVE-2024-11376](CVE-2024/CVE-2024-113xx/CVE-2024-11376.json) (`2025-02-18T08:15:08.153`) +- [CVE-2024-11895](CVE-2024/CVE-2024-118xx/CVE-2024-11895.json) (`2025-02-18T08:15:09.313`) +- [CVE-2024-13465](CVE-2024/CVE-2024-134xx/CVE-2024-13465.json) (`2025-02-18T08:15:09.490`) +- [CVE-2024-13523](CVE-2024/CVE-2024-135xx/CVE-2024-13523.json) (`2025-02-18T07:15:08.303`) +- [CVE-2024-13575](CVE-2024/CVE-2024-135xx/CVE-2024-13575.json) (`2025-02-18T08:15:09.653`) +- [CVE-2024-13704](CVE-2024/CVE-2024-137xx/CVE-2024-13704.json) (`2025-02-18T08:15:09.820`) +- [CVE-2024-13795](CVE-2024/CVE-2024-137xx/CVE-2024-13795.json) (`2025-02-18T08:15:09.980`) +- [CVE-2024-57963](CVE-2024/CVE-2024-579xx/CVE-2024-57963.json) (`2025-02-18T07:15:08.713`) +- [CVE-2024-57964](CVE-2024/CVE-2024-579xx/CVE-2024-57964.json) (`2025-02-18T07:15:08.920`) +- [CVE-2025-0422](CVE-2025/CVE-2025-04xx/CVE-2025-0422.json) (`2025-02-18T08:15:10.147`) +- [CVE-2025-0423](CVE-2025/CVE-2025-04xx/CVE-2025-0423.json) (`2025-02-18T08:15:10.360`) +- [CVE-2025-0424](CVE-2025/CVE-2025-04xx/CVE-2025-0424.json) (`2025-02-18T08:15:10.490`) +- [CVE-2025-0425](CVE-2025/CVE-2025-04xx/CVE-2025-0425.json) (`2025-02-18T08:15:10.597`) +- [CVE-2025-0864](CVE-2025/CVE-2025-08xx/CVE-2025-0864.json) (`2025-02-18T08:15:10.723`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index cd81362f909..608840678dc 100644 --- a/_state.csv +++ b/_state.csv @@ -244690,6 +244690,7 @@ CVE-2024-11370,0,0,dd87b64b129f6809c8edd7b234994b231659964606722e4f84f6ae489936a CVE-2024-11371,0,0,940d4acb1660319dcaf9e79be7b51b02d713b6710d41c4a41d256d4b90485073,2024-12-16T15:53:39.657000 CVE-2024-11374,0,0,a5a1e58c0241313798d5870304d6ab4fd613b7c8d39f72ddd8edd6b514e2a94b,2024-12-07T10:15:05.643000 CVE-2024-11375,0,0,09113c9c4c16e936568b412fc506dc02ef629e8e628c654e3f6f629cd5e5088f,2025-01-07T05:15:11.907000 +CVE-2024-11376,1,1,45917b214ca5f15f67d5330d816dc29f69e2e80a0293c4110070cf3104a3cbe0,2025-02-18T08:15:08.153000 CVE-2024-11377,0,0,7c2553183c73f79520591c880309a16f7b34fb51c625dbcc41841afeb50b2cc9,2025-01-07T05:15:12.083000 CVE-2024-11378,0,0,b38085a589e7c1c3c829e70c4c335030fed608a8aaf3232abbfcaba2499cd265,2025-01-07T05:15:12.270000 CVE-2024-11379,0,0,9fd00eb3fec3062cfc458a7971d09425d25dcca0c806b20326864d85b70adea6,2024-12-06T05:15:05.813000 @@ -245204,6 +245205,7 @@ CVE-2024-11891,0,0,f8a38032fa61b45ae7f4fd61d15412795ca770178ff882a3a6fac619a51ce CVE-2024-11892,0,0,d5c6270385b92d8aef9bbc883d47c18aabd1b1a329cb2704b1f0105fbc287876,2025-01-11T08:15:24.463000 CVE-2024-11893,0,0,ab78f78c6e435c83f3f5f09a281780ac0636482d65ec96c7c75ce803df2c5017,2024-12-20T07:15:11.747000 CVE-2024-11894,0,0,9e31b28fa56a41e12b82fdf98576d9a13777f5eed7b6c3fc1f71a85af109ef81,2024-12-14T05:15:10.227000 +CVE-2024-11895,1,1,7eda2af854879f2186b2649c5004ae2b8ef5a0461e69212879c04067c083c531,2025-02-18T08:15:09.313000 CVE-2024-11896,0,0,34f349ccc91bcf6d6c27bb81a454efc17924954cfa878d33ee370546a785a3f4,2024-12-24T09:15:05.663000 CVE-2024-11897,0,0,63c2369fafd5da048dd57864988be95602290ce10df0f51d423ab54c866c15e0,2024-12-04T03:15:05.380000 CVE-2024-11898,0,0,e843212abf00805a20f8b4b65b36c01f75cc2096cf65f2d0e7899f11eb517a82,2024-12-03T08:15:06.857000 @@ -245572,7 +245574,7 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 -CVE-2024-12314,1,1,c20827041d848ecbf5686ded1fb9a73197d9fdbafadd7d83946334d083c7cb2f,2025-02-18T05:15:09.987000 +CVE-2024-12314,0,0,c20827041d848ecbf5686ded1fb9a73197d9fdbafadd7d83946334d083c7cb2f,2025-02-18T05:15:09.987000 CVE-2024-12315,0,0,7515fa7554c61b93e76895b43c863ec546b100360ca8461bec95776b4fc48d0f,2025-02-12T15:15:12.527000 CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 @@ -245765,7 +245767,7 @@ CVE-2024-12520,0,0,886c4e74a7980fda960a92b5a62600949c9fea0564fe68f7b22e9e1786c04 CVE-2024-12521,0,0,5ef3982f9bbd97c224cda76723fce3c98e248e5aec737e88bf0802be4e43c585,2025-01-08T04:15:06.827000 CVE-2024-12523,0,0,185a41d328f0e130d8ed17ada12f64a855433449910369cbbb025fff8ce0f4d8,2024-12-14T05:15:11.640000 CVE-2024-12524,0,0,872d50ee592086b62712ad11fcac01017f02cae2a37a1857d75b736f2a220d93,2025-01-30T11:15:10.840000 -CVE-2024-12525,1,1,2bed9d9749d6c8ef22bb23af585ca60c77e578bcc12b11b932323186ccb93ede,2025-02-18T05:15:10.813000 +CVE-2024-12525,0,0,2bed9d9749d6c8ef22bb23af585ca60c77e578bcc12b11b932323186ccb93ede,2025-02-18T05:15:10.813000 CVE-2024-12526,0,0,b192d6e45212a3c6d09a8a6cd2198d071bb3ba4da94a4e2bf151be7ad2c18324,2024-12-12T05:15:13.577000 CVE-2024-12527,0,0,a734fa6fae374e1f78bf0ed5836acb2d88c39ac4a4907ac1228b4122e65ad067,2025-01-11T08:15:25.913000 CVE-2024-12528,0,0,f4af9cf65ffcc6bdde0559258762f791c056b91239412bbfffbf03d13aedbfde,2025-01-07T04:15:08.543000 @@ -245984,7 +245986,7 @@ CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5dd3c,2025-01-17T03:15:07.167000 CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000 CVE-2024-12807,0,0,1d134b4e10fd5c2df6e8d1acfd31e14ba142e002cf7d83d94986fb0c56cb2884,2025-01-28T16:15:37.633000 -CVE-2024-12813,1,1,b81db5d427e66d191a6688e1b68cecd7e2131e5a0c88b7b320c1ca3c45597596,2025-02-18T05:15:11.287000 +CVE-2024-12813,0,0,b81db5d427e66d191a6688e1b68cecd7e2131e5a0c88b7b320c1ca3c45597596,2025-02-18T05:15:11.287000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 CVE-2024-12816,0,0,94a80e9971eaa7e870e47359d4c3d1f8fa9ff5419e2a80ed33d726940db7be36,2025-01-25T08:15:08.137000 CVE-2024-12817,0,0,177c0c1ee17fbeb45fd7a30a85d211f5e3e78b0121812fcf822599a3e7e7f5fa,2025-01-25T08:15:08.300000 @@ -246439,7 +246441,7 @@ CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1f CVE-2024-13310,0,0,c7d7f61ed943995654d2d7f670a6eebe7c0fd61f9032347d9fa323e6d73361eb,2025-01-31T16:15:33.080000 CVE-2024-13311,0,0,8f1f9a5d171f95a7ba0f9eaa7d2951798d439c8a220f4f2f7df62ba50bf29d83,2025-01-31T16:15:33.280000 CVE-2024-13312,0,0,816e38c6c7477b967986b1dc1563e84c09b9a93286b16913543c3869e5b6d36c,2025-01-31T16:15:33.413000 -CVE-2024-13315,1,1,7d561707348c1d83e16868d78f576052a99fa3248701028b7d3303356e834cd1,2025-02-18T06:15:11.540000 +CVE-2024-13315,0,0,7d561707348c1d83e16868d78f576052a99fa3248701028b7d3303356e834cd1,2025-02-18T06:15:11.540000 CVE-2024-13317,0,0,bf6e98353834aadd569c32731a32e07929f7d2ec68ca0c813c445806410cf741,2025-01-18T07:15:08.290000 CVE-2024-13318,0,0,e578de8b4719417613441e3d599820c7f899466a7f87935725f122dcda9b3d95,2025-01-10T12:15:24.257000 CVE-2024-13319,0,0,7991c2dfb6aefea7f96696a61d541e78c477eeff53b34652065a2f9dce798e51,2025-01-24T21:06:34.310000 @@ -246529,7 +246531,7 @@ CVE-2024-13433,0,0,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000 CVE-2024-13435,0,0,d15c9c331d26c4aefe3cc08b7475a5a438e857c1614d3c9f92ce729847209da9,2025-02-12T15:15:13.093000 CVE-2024-13437,0,0,ac4ee3cde1737eec9f740e3f4e2e3bc68da9f2e601434dcfb63740e8fa129b22,2025-02-12T10:15:10.920000 -CVE-2024-13438,1,1,c5aede0e8f4f03085f5bfd3812915c95c58edbe7342df19989694e57452a24a1,2025-02-18T06:15:11.740000 +CVE-2024-13438,0,0,c5aede0e8f4f03085f5bfd3812915c95c58edbe7342df19989694e57452a24a1,2025-02-18T06:15:11.740000 CVE-2024-13439,0,0,9977a2cc02f20b148bdbeb2cb70da6b957cfc1fa7b049bde9614c22678a6305a,2025-02-15T12:15:30.300000 CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000 CVE-2024-13440,0,0,5766e7a438a8e4269354aacca2cf4360d814b2b0ba936161bc318042a1e4abc8,2025-02-13T17:17:19.413000 @@ -246549,7 +246551,8 @@ CVE-2024-13459,0,0,74cc2f10cd16edbcf5659e7d8fe3729e3fc652b8068739b9dd5ffb5ed7a19 CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000 CVE-2024-13460,0,0,9c101ce4e9a0b77c24ea9727b59b3a3bfa4cbf94a343064a0ab69a083a2820cf,2025-01-31T18:07:24.277000 CVE-2024-13463,0,0,a74bd740de3fc458ef5c03de3331d5acaeffdc8e1dd114982c1f405dca936e7c,2025-01-31T04:15:07.497000 -CVE-2024-13464,1,1,c7ce95854847c11fde5a1ddc21e150442b9e815758c964241dcc7c0eae02ec39,2025-02-18T05:15:11.673000 +CVE-2024-13464,0,0,c7ce95854847c11fde5a1ddc21e150442b9e815758c964241dcc7c0eae02ec39,2025-02-18T05:15:11.673000 +CVE-2024-13465,1,1,302d64000d9a85e10d940c0dfda219f6bc435a7608c762c13e680b4ba83050b8,2025-02-18T08:15:09.490000 CVE-2024-13466,0,0,2cbafb86d6f68fe0c2186e724ab662f025c2b1cb3226dee696694b166c55fb4c,2025-01-30T14:15:34.217000 CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000 CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 @@ -246572,7 +246575,7 @@ CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4 CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000 CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000 CVE-2024-13500,0,0,0c429174cca57ae83685b1f496a3cf42bd0c51ad39e20a565f4f68cce4f1c5cf,2025-02-15T12:15:30.610000 -CVE-2024-13501,1,1,38d87f70bedff5fc9fdfe37055275cd533c9f08814bf6da62517ae17e2845e24,2025-02-18T05:15:12.117000 +CVE-2024-13501,0,0,38d87f70bedff5fc9fdfe37055275cd533c9f08814bf6da62517ae17e2845e24,2025-02-18T05:15:12.117000 CVE-2024-13502,0,0,b6bd5e7a8ccd125fd10c3c602ef666035a1824dda1c710321e34fb9d3259b3fe,2025-01-17T14:15:31.147000 CVE-2024-13503,0,0,ffb0135326ea2a3ea18800ce3bd83bc523a9e303f03b2acc60a1815003b2400e,2025-01-17T14:15:31.317000 CVE-2024-13504,0,0,65d5eda0db4362f31390d7f75ebf33f34fcbb67dce33bcab3e8868827236c840,2025-01-31T06:15:29.603000 @@ -246591,7 +246594,8 @@ CVE-2024-13517,0,0,cfab1b395558d480252b3d9445658f67696997e56c4b9d51564795ba8972f CVE-2024-13519,0,0,dc09c545fe78d4520b3958b8cc7f812509309ee95d98546daffd0145d2c455d7,2025-01-18T07:15:09.510000 CVE-2024-1352,0,0,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f667,2025-01-17T17:23:55.973000 CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70b11,2025-01-30T17:41:52.897000 -CVE-2024-13522,1,1,1ec5bbee168af71e2c569fc16b8aceb6b0c6360701cfbb6feabd58c3768384f3,2025-02-18T05:15:12.463000 +CVE-2024-13522,0,0,1ec5bbee168af71e2c569fc16b8aceb6b0c6360701cfbb6feabd58c3768384f3,2025-02-18T05:15:12.463000 +CVE-2024-13523,1,1,a01422a75b98041b28e49f24f2d7440e366f8a9a4929907951037686a612b3c8,2025-02-18T07:15:08.303000 CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000 CVE-2024-13525,0,0,974cc77357d10bdeddefe2341db48f6fd4cfe789b2cdee428681d1b46764d32d,2025-02-15T09:15:08.833000 CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000 @@ -246601,12 +246605,12 @@ CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba7 CVE-2024-13530,0,0,79b95d03a65d37f6bd7247a320ee91efecfa7853e8fca4111e89d02aab16e68f,2025-01-31T08:15:07.543000 CVE-2024-13531,0,0,d0896acc17735e856b06d8e0c3a5b2f52d9e0cbd22880e913d28c402f6195055,2025-02-12T10:15:12.317000 CVE-2024-13532,0,0,afd84c2f186b0b681f34e67a86ddb00ec0310f61d9e69cd64ac60428b6884a22,2025-02-12T12:15:29.023000 -CVE-2024-13535,1,1,dec80695a517d3768819588f0daa6dc70d633cccd453511cce85b18d61e52a4d,2025-02-18T05:15:12.773000 +CVE-2024-13535,0,0,dec80695a517d3768819588f0daa6dc70d633cccd453511cce85b18d61e52a4d,2025-02-18T05:15:12.773000 CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000 -CVE-2024-13538,1,1,aa825465172755b9863036b91c4745396a22ef52b7b6e5c9f1490e637d5ab375,2025-02-18T05:15:13.127000 +CVE-2024-13538,0,0,aa825465172755b9863036b91c4745396a22ef52b7b6e5c9f1490e637d5ab375,2025-02-18T05:15:13.127000 CVE-2024-13539,0,0,4b7e0c70558e34f6819b9b46d3f48cda096658439289d18effcd3cdff1bec624,2025-02-12T04:15:09.197000 CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000 -CVE-2024-13540,1,1,b68ecde40b732145c347461191cbcc1ffd4b9ba81b4500231d1f6c3e44c75163,2025-02-18T05:15:13.427000 +CVE-2024-13540,0,0,b68ecde40b732145c347461191cbcc1ffd4b9ba81b4500231d1f6c3e44c75163,2025-02-18T05:15:13.427000 CVE-2024-13541,0,0,4e9d1f97a299ff6127f5d36e7cb13e30abee458413408a9b4f57ec8d00d54529,2025-02-12T04:15:09.347000 CVE-2024-13542,0,0,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000 CVE-2024-13543,0,0,e978bc49ff488db2b344d5d8ed3663103952e081a7e5e2e0d652ffcd5a679db1,2025-02-11T15:15:16.633000 @@ -246619,35 +246623,36 @@ CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a6120298 CVE-2024-13550,0,0,a4fead6d03b6144abe5ac40b03d52a1da2858d08b4f2df68e9fe9b57926c0bff,2025-02-04T19:25:13.807000 CVE-2024-13551,0,0,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000 CVE-2024-13554,0,0,593696d24f43140274834fa7c9a7ab6a89ace00d66aec05e7d998911a54b4ba1,2025-02-12T04:15:09.503000 -CVE-2024-13555,1,1,3200643e8c32cab10ee18a48199edd6eb143f7592c7375364c0412c5fef4c9c9,2025-02-18T05:15:13.597000 -CVE-2024-13556,1,1,86edfe22b56e2b4b89aad7099009b803389782a1ceb5999e6e1bd006be446f3f,2025-02-18T06:15:11.900000 +CVE-2024-13555,0,0,3200643e8c32cab10ee18a48199edd6eb143f7592c7375364c0412c5fef4c9c9,2025-02-18T05:15:13.597000 +CVE-2024-13556,0,0,86edfe22b56e2b4b89aad7099009b803389782a1ceb5999e6e1bd006be446f3f,2025-02-18T06:15:11.900000 CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000 CVE-2024-13561,0,0,2147326d45c7c96265106b6ff772f1393a83793dfac14b78a483fca6de875c16,2025-01-29T12:15:27.617000 CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000 CVE-2024-13563,0,0,a22d7bca0cd120477dc1fa3e57922c805548e0065756a928efb634339816e060,2025-02-15T09:15:09.897000 -CVE-2024-13565,1,1,09484b11000b3ae55a8d4aa1c14df152d867ff650645b8d7539db7f4a1952ba8,2025-02-18T05:15:13.803000 +CVE-2024-13565,0,0,09484b11000b3ae55a8d4aa1c14df152d867ff650645b8d7539db7f4a1952ba8,2025-02-18T05:15:13.803000 CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000 CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000 CVE-2024-13570,0,0,bd29cdd9a7035d220844b35d0e7ba2f79edf50e314a280da902fd81fc517776e,2025-02-11T16:15:39.090000 CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000 -CVE-2024-13573,1,1,4c15c78a9615e8ce64f7592c831c2a81f25bc5a0e24ca1c3a58f764690185d7a,2025-02-18T05:15:14.007000 -CVE-2024-13576,1,1,d35998f4d69291c9bf0c6a64cbfb55e2da2868a469ebe7a1cc5d71e6b9258231,2025-02-18T05:15:14.157000 -CVE-2024-13577,1,1,a40dbddd747a29435bc9cd61b63bc4b95a8a8703143f38d72b41d587221a2be2,2025-02-18T05:15:14.487000 -CVE-2024-13578,1,1,ce304e79d496c1935a636594ed7d0ce3622b36585f28fc55bec0149ceaa84b2b,2025-02-18T05:15:14.913000 -CVE-2024-13579,1,1,99ad1125b9e8cd7ccf0d5b4f2c0a1560bc0879f6c3e5b45e5019c65d65214c74,2025-02-18T05:15:15.310000 +CVE-2024-13573,0,0,4c15c78a9615e8ce64f7592c831c2a81f25bc5a0e24ca1c3a58f764690185d7a,2025-02-18T05:15:14.007000 +CVE-2024-13575,1,1,17926a8a3c44e671cffd1d8c13b88294d3fea4b6a59023fa8be054801e0a5de0,2025-02-18T08:15:09.653000 +CVE-2024-13576,0,0,d35998f4d69291c9bf0c6a64cbfb55e2da2868a469ebe7a1cc5d71e6b9258231,2025-02-18T05:15:14.157000 +CVE-2024-13577,0,0,a40dbddd747a29435bc9cd61b63bc4b95a8a8703143f38d72b41d587221a2be2,2025-02-18T05:15:14.487000 +CVE-2024-13578,0,0,ce304e79d496c1935a636594ed7d0ce3622b36585f28fc55bec0149ceaa84b2b,2025-02-18T05:15:14.913000 +CVE-2024-13579,0,0,99ad1125b9e8cd7ccf0d5b4f2c0a1560bc0879f6c3e5b45e5019c65d65214c74,2025-02-18T05:15:15.310000 CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000 -CVE-2024-13581,1,1,c6817592c92440ad44a8fa228f7b53b9ed51e9e0cca7d9b47bb33079647af765,2025-02-18T05:15:15.590000 -CVE-2024-13582,1,1,7aa6cafae2a67f9f655defd9ac99bed39ce0c4c8c5f69a27d738b628034d125b,2025-02-18T05:15:15.897000 +CVE-2024-13581,0,0,c6817592c92440ad44a8fa228f7b53b9ed51e9e0cca7d9b47bb33079647af765,2025-02-18T05:15:15.590000 +CVE-2024-13582,0,0,7aa6cafae2a67f9f655defd9ac99bed39ce0c4c8c5f69a27d738b628034d125b,2025-02-18T05:15:15.897000 CVE-2024-13583,0,0,74ad7b83b093ee530d03665dfed8aeb7981ef34d0b7fd0bb7def11fe8ca86354,2025-02-05T01:38:33.527000 CVE-2024-13584,0,0,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f364,2025-01-24T18:20:40.760000 CVE-2024-13586,0,0,031371a39e86dab11794d85bebc5761cfd2812bcdc21ab474a79e1589e56730a,2025-02-04T18:14:20.930000 -CVE-2024-13587,1,1,720c8e9f332be08c97824f7294ce236301b592a585cd761de003bc321877436a,2025-02-18T05:15:16.267000 -CVE-2024-13588,1,1,ff7590ea531a386de3592f06b0d190afe6e1a5e182fc0c9290b6473914c2c325,2025-02-18T05:15:16.417000 +CVE-2024-13587,0,0,720c8e9f332be08c97824f7294ce236301b592a585cd761de003bc321877436a,2025-02-18T05:15:16.267000 +CVE-2024-13588,0,0,ff7590ea531a386de3592f06b0d190afe6e1a5e182fc0c9290b6473914c2c325,2025-02-18T05:15:16.417000 CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000 CVE-2024-13590,0,0,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000 CVE-2024-13593,0,0,fa3fece164aaf9e5bdce4149920be38daaf35514256e02e0d8ee1f95b69ca49c,2025-02-04T21:08:45.723000 CVE-2024-13594,0,0,e40694f60357c551d50cfd64c32b62fc5a068d57b870210e0ac9e99e736df254,2025-02-05T17:01:24.577000 -CVE-2024-13595,1,1,857054eef2128780cfc93b39c44c7c6d11a927de9b29d4814b8b4c364f2d10c0,2025-02-18T05:15:16.710000 +CVE-2024-13595,0,0,857054eef2128780cfc93b39c44c7c6d11a927de9b29d4814b8b4c364f2d10c0,2025-02-18T05:15:16.710000 CVE-2024-13596,0,0,2b347cb4a79836e676774e7c831f562b3de9868f3b716c19ca500dd58b6901ef,2025-01-31T18:16:35.347000 CVE-2024-13599,0,0,03405f2c3d79b505fbb84b1ff3dea79fdc81e050ef9a41f4a5537eddbfaf081d,2025-02-04T18:13:20.930000 CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb8486a,2025-02-05T21:46:19.363000 @@ -246657,12 +246662,12 @@ CVE-2024-13603,0,0,f5ddc39376765e5cf70d139b9cd0562a2cffa9ee9e42ff0700edf6701aa0d CVE-2024-13606,0,0,1cbdd85184ccb544c93c1632b6d2d3443b7aae450a16746f7539ee65d5330de1,2025-02-13T10:15:09.310000 CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e5527f8,2025-02-04T07:15:12.973000 CVE-2024-13608,0,0,730b0ed6d14a39f661d8b58e3582ab1ffb56662a72ce1d07024da3747f0e1f13,2025-02-17T06:15:11.717000 -CVE-2024-13609,1,1,f6b426da9160449350ccd1dc2595915af601bdc725430ae991e1018a5193a1be,2025-02-18T05:15:17.160000 +CVE-2024-13609,0,0,f6b426da9160449350ccd1dc2595915af601bdc725430ae991e1018a5193a1be,2025-02-18T05:15:17.160000 CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000 CVE-2024-13612,0,0,552127c2046be21ad3d3bc25df0920820f31b497c8eb5b9bb46c66cbfd8336ca,2025-02-01T13:15:21.320000 CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000 CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000 -CVE-2024-13622,1,1,2a60756e3c1f8e2c67b3815a15c7e2ffcb84513035babc6bcdd160486b03b340,2025-02-18T05:15:17.557000 +CVE-2024-13622,0,0,2a60756e3c1f8e2c67b3815a15c7e2ffcb84513035babc6bcdd160486b03b340,2025-02-18T05:15:17.557000 CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000 CVE-2024-13625,0,0,13fe8a9d23e71af19d049c26713d37681ab17ff9be556309bc6aff2602f296b7,2025-02-17T06:15:11.820000 CVE-2024-13626,0,0,ed2b03a934796ec0d9dda4598897fce51405472dd7901847b82ba4dfaac12a2b,2025-02-17T06:15:11.940000 @@ -246691,12 +246696,12 @@ CVE-2024-13665,0,0,18a0fb900dfdb3589ce932f5ee4cb2705e9546782c74f6ed6faf4400a1ef2 CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000 CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000 CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693b44,2025-01-31T17:50:24.757000 -CVE-2024-13677,1,1,8c3dbbbad614c82756be5f87314c06d94f2c3bdc57d66eee8a7cfa5797e10d79,2025-02-18T05:15:17.893000 +CVE-2024-13677,0,0,8c3dbbbad614c82756be5f87314c06d94f2c3bdc57d66eee8a7cfa5797e10d79,2025-02-18T05:15:17.893000 CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000 CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000 CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000 -CVE-2024-13684,1,1,40f905038d5fa7555de5181028fa41153678ad0c3f5a58f630a868dcfb14cb33,2025-02-18T05:15:18.050000 -CVE-2024-13687,1,1,0bb37ef6a8e3ccf2122a39c9ab998f2d6a038a6c8ba655818034cfc1a0dd838f,2025-02-18T05:15:18.273000 +CVE-2024-13684,0,0,40f905038d5fa7555de5181028fa41153678ad0c3f5a58f630a868dcfb14cb33,2025-02-18T05:15:18.050000 +CVE-2024-13687,0,0,0bb37ef6a8e3ccf2122a39c9ab998f2d6a038a6c8ba655818034cfc1a0dd838f,2025-02-18T05:15:18.273000 CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000 CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000 CVE-2024-13694,0,0,f76307657ffe1cf961458e88374ab5be6334165284f8bcf86e9ac130fdc702fd,2025-02-04T18:47:41.800000 @@ -246706,6 +246711,7 @@ CVE-2024-13699,0,0,6c179d99e1e68d225e4cf32bfc134108fb7e1de353e5a047f158d68ed9ec8 CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000 CVE-2024-13700,0,0,9ce20ac3b11103f5abdc5f2758b97ef5dcc76de719f13fdbcb103d53e58691eb,2025-01-31T16:49:24.477000 CVE-2024-13701,0,0,f834def27c90b870381ae372b4e05326550a31cd496de38386bfaad9d9f3cc5e,2025-02-12T04:15:09.647000 +CVE-2024-13704,1,1,5d025f249049217a682825fa38cf36a8b48d6c8857075fa19cc8fdc62297f9d0,2025-02-18T08:15:09.820000 CVE-2024-13705,0,0,5ec6ac499cda9ee218cf1587251a6725974948adf52db55dc1b1fdc60e1d5cc2,2025-01-31T18:17:10.220000 CVE-2024-13706,0,0,92bfb58090ec2cfc6ac0f1405cc2482324ffba82002ca538da8b57da6032c8b7,2025-01-30T14:15:36.180000 CVE-2024-13707,0,0,032e2a9cb1b090228bf905c1e52e11efae679d2f0165154d533e21d339074c69,2025-01-31T18:12:42.913000 @@ -246719,7 +246725,7 @@ CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000 CVE-2024-13722,0,0,fac6574297fad520484336a8f32a80c91be5643d31918d246727bb21994df2e7,2025-02-06T15:15:12.867000 CVE-2024-13723,0,0,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f870,2025-02-06T15:15:13.050000 -CVE-2024-13725,1,1,5b3ffde79c6593edc557a532adabb9014e463a2a853b68295ede31defe90aed8,2025-02-18T05:15:18.707000 +CVE-2024-13725,0,0,5b3ffde79c6593edc557a532adabb9014e463a2a853b68295ede31defe90aed8,2025-02-18T05:15:18.707000 CVE-2024-13726,0,0,ed40e7d0ccfa3e513d937bd8d71cc7ba5769f17f2351ac80377e14058de87ee2,2025-02-17T06:15:12.170000 CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000 CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000 @@ -246743,6 +246749,7 @@ CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b8 CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000 CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba37212823df,2025-02-14T11:15:09.320000 CVE-2024-13794,0,0,6f5cfea229e5d029358c5daefcebc44ce458400ca82e6dd1a7b59d94adccdac4,2025-02-12T15:15:14.040000 +CVE-2024-13795,1,1,5ff186d2b18ebdd910aed1b17c910f62f178a43b9b5396d894a01eab3d2cf2bf,2025-02-18T08:15:09.980000 CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000 CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000 CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 @@ -246760,10 +246767,10 @@ CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7 CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede14a2,2025-02-07T07:15:14.573000 CVE-2024-13842,0,0,955b2791810b1a10a02616a1134c790dde9472870ffb2ecef1b260eb338bf89c,2025-02-11T16:15:39.513000 CVE-2024-13843,0,0,510b2676ce058323607c3a8a5ac880be2eb8da89d56b6ba23759e15b6c5d2ded,2025-02-11T16:15:39.667000 -CVE-2024-13848,1,1,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2cfbe,2025-02-18T05:15:19.157000 +CVE-2024-13848,0,0,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2cfbe,2025-02-18T05:15:19.157000 CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000 CVE-2024-13850,0,0,6b9449e6648abb1edf82833d79485652b7d8e214965b03129c424b1f771ff336,2025-02-08T13:15:06.840000 -CVE-2024-13852,1,1,face120ea95fed62ec099664fadaf77219da01c7521b566ddd6f702b5c620406,2025-02-18T05:15:19.423000 +CVE-2024-13852,0,0,face120ea95fed62ec099664fadaf77219da01c7521b566ddd6f702b5c620406,2025-02-18T05:15:19.423000 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 CVE-2024-13867,0,0,b22bb2f54b64760b76b696bbb0a0a23f6d99826e999c63e0854f07bc507510b1,2025-02-13T10:15:09.847000 CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000 @@ -266850,7 +266857,7 @@ CVE-2024-45317,0,0,5f43c76e9ff743bd3a3e5058ccc2d1ee5b77faf16f692fa3d7b6e565fa265 CVE-2024-45318,0,0,75989837b2772ed0bee9b8d611c5c445760df07141b272a0d99d94a5a5004185,2024-12-05T17:15:11.880000 CVE-2024-45319,0,0,f54a68d148467026440ad15f341a6bfb542cacddb35ec8506cc4659fa4aa336e,2024-12-05T17:15:12.040000 CVE-2024-4532,0,0,014dcf5f2708015805e201ab211b9cd9fe192f81599e256bd8dd0d34d23e73ac,2024-11-21T09:43:02.993000 -CVE-2024-45320,1,1,e478cfe896354b43d3025ebc3913c99bb1bf2ec6c99ae9e67f251dc1dd0d0b9c,2025-02-18T06:15:12.060000 +CVE-2024-45320,0,0,e478cfe896354b43d3025ebc3913c99bb1bf2ec6c99ae9e67f251dc1dd0d0b9c,2025-02-18T06:15:12.060000 CVE-2024-45321,0,0,7c76da4e7fbb2242661f83a4480b440b53d8e0cb0dfda635981d7f5cbb74ebaf,2024-12-05T18:47:30.633000 CVE-2024-45323,0,0,0b7a355a77d8731838f1cae0db38407098fd6b4582cf218a996117fa53bb1c18,2024-09-20T16:23:51.397000 CVE-2024-45326,0,0,8cf2e70ef6584a36126584463aee675c9d52e03d915cd6d7f65314e9c17ce38b,2025-01-31T16:36:15.783000 @@ -275021,6 +275028,8 @@ CVE-2024-5796,0,0,10c3848976491ca5eeb295d89b1679f80388276c56109509ef1777f493022a CVE-2024-57960,0,0,773b522c706cbc49414ca08e8ce62c9b452c14ceb463659dc8cf301c1c68526d,2025-02-06T13:15:40.270000 CVE-2024-57961,0,0,70e7b1214aba97db422e1a3b3f233758ab9ca724b4d145bac1ebcb3fd7fbccf1,2025-02-06T13:15:40.417000 CVE-2024-57962,0,0,54a498ba952c380e086f823bc80eb1c13badd26229709ca796a347944d7ffac6,2025-02-06T13:15:40.600000 +CVE-2024-57963,1,1,f3292c7bb0a42acc5163ed15b47d421c57318fc3cc3b463bd3fc84d9df19e300,2025-02-18T07:15:08.713000 +CVE-2024-57964,1,1,637613af4d74c60604771ff7eb969de4e439548306825583031fb9f32f69d7a4,2025-02-18T07:15:08.920000 CVE-2024-57965,0,0,1ec783f88325ed02c1810413dbff411d8a59c49db780f7d0fa48c580055559d5,2025-01-29T10:15:08.113000 CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e1c9,2025-02-09T05:15:32.883000 CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000 @@ -278872,6 +278881,10 @@ CVE-2025-0410,0,0,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc7136 CVE-2025-0411,0,0,963fb93dc9f22be5b01fb4ee24ffe0ff364fead29af110d8c8255d7fa3a39b9c,2025-02-12T18:14:13.143000 CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000 CVE-2025-0413,0,0,5baedddf5946af9550556770de7dca6787e2b2456cc377371a820cf1ed6c2bef,2025-02-05T00:15:28.173000 +CVE-2025-0422,1,1,e3c5a06c0c96e5b0131758ea8d9f32a2ee2c48b0c3e97a36b47be9b84aecd05b,2025-02-18T08:15:10.147000 +CVE-2025-0423,1,1,c05e49f8bc53a5bcbcc1c2ecd8ffe5916ceff7106cf7d8443073a918e1f8cb6b,2025-02-18T08:15:10.360000 +CVE-2025-0424,1,1,d05eb660349a1243a1bbacf43923c5dac99d9efb16a2f8cb5d47ed724d5e60f2,2025-02-18T08:15:10.490000 +CVE-2025-0425,1,1,0197be9b9b61d28cf57a84b48764c854a48a9c5583689fbdfa0627c74d94c9a5,2025-02-18T08:15:10.597000 CVE-2025-0426,0,0,3066c25cbdc0db466cbcd8d2b93cf410724b054db8536dfcb0c3e103d2688218,2025-02-13T17:17:19.863000 CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000 CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000 @@ -279087,7 +279100,7 @@ CVE-2025-0792,0,0,571c846d961e8b86c56927f453b9245146da4bf154d8adacec1a6f2ac61420 CVE-2025-0793,0,0,8be19ff13515f07895e2086e5466aca03e8900014540b1bb4c6de4c4a0098cb9,2025-01-29T14:15:27.653000 CVE-2025-0794,0,0,d0f8610657a801d90303b5fa19f71a1cc9d8ef6c1284239115ffdbbe58a9a796,2025-01-29T01:15:07.943000 CVE-2025-0795,0,0,78c31d616d37a01317d5bb724bd6c565c80d9cf22aaf5d4fae4283f153b591de,2025-01-29T02:15:26.830000 -CVE-2025-0796,1,1,c995664118edfa498400dc41d59bdd55577b9c45bfcb1ea26abe5be298bf9865,2025-02-18T05:15:19.597000 +CVE-2025-0796,0,0,c995664118edfa498400dc41d59bdd55577b9c45bfcb1ea26abe5be298bf9865,2025-02-18T05:15:19.597000 CVE-2025-0797,0,0,6473915a793ff9884aafab236f62e144affe799470e5962b8e5351b78ec1cbf9,2025-01-29T02:15:27.010000 CVE-2025-0798,0,0,f979c1c8f68dd351170669e51288efee24790cc09665b119a10fc6d4d02457d2,2025-01-29T02:15:27.190000 CVE-2025-0799,0,0,af43bf4a5768ce0bfb94d428736daaedcdfb3eccbac5f00bb0b5a7f9f2fd815b,2025-02-06T01:15:09.580000 @@ -279095,7 +279108,7 @@ CVE-2025-0800,0,0,9e70c7ae7b67598c33ec1be994b15b025cffe8ea4961b83f2cb2dbf2f54224 CVE-2025-0802,0,0,058667df6e6f167c26958b65b8647dee5b306173c5334271f5f14ad30de88b99,2025-02-10T14:06:03.410000 CVE-2025-0803,0,0,a9f14556ef67fd49c2c0c4e57733c9351d270dba138685c5a84cb2509244be40,2025-02-11T19:48:06.860000 CVE-2025-0804,0,0,53f7fab3a5e8ab11732155ff3e17826c7a6f61d1fcafd348f26f842f26491509,2025-01-29T04:15:07.193000 -CVE-2025-0805,1,1,9ded96f70be4cb9168e0560b9d556200e9f9ac3b16a2dc16cb8df95bf70a5b0b,2025-02-18T05:15:20.053000 +CVE-2025-0805,0,0,9ded96f70be4cb9168e0560b9d556200e9f9ac3b16a2dc16cb8df95bf70a5b0b,2025-02-18T05:15:20.053000 CVE-2025-0806,0,0,a209d9e787c8d84edf5bd62206346babb48d1b53bd04304b3ccb35e3e13950e3,2025-02-11T19:46:22.923000 CVE-2025-0808,0,0,428483e8e66f55834849f1a517bd4a05acd223bb58e42750cf8cf49bc8e92e73,2025-02-12T04:15:09.950000 CVE-2025-0809,0,0,886fb9b396d2aad5cff53c02349fc0fee570a4920d4c4e68da65e25a660a34b2,2025-01-31T06:15:29.933000 @@ -279122,6 +279135,7 @@ CVE-2025-0859,0,0,aa1ef6a1093a15ab4491e05a4c630743ada11578233ef06a5ca4a6f0316692 CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e97,2025-01-31T20:42:08.143000 CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000 CVE-2025-0862,0,0,dee81cd1ce38cab472cf28eb1ce5e1d9037dd3bdafbd545dddc7d172ac5b30e6,2025-02-11T11:15:16.043000 +CVE-2025-0864,1,1,e56e1de16064acc329a5a32cc0ae2f68a867a09df61e368d37eca098dd9d89f8,2025-02-18T08:15:10.723000 CVE-2025-0867,0,0,00bdec3c0865b5f1af866315340e7f0b0b67377723af000ff55ae7ae60c91aed,2025-02-14T13:15:42.620000 CVE-2025-0869,0,0,c00b46e6ec082bb5acc28b4863ecc13d05083b8391495aa8cb5415a092650002,2025-02-07T17:15:31.307000 CVE-2025-0870,0,0,1d396f929e817f7895a91994ddee9c76172e4af1ca8cb701d53be58252025809,2025-01-30T13:15:10.483000