Auto-Update: 2025-02-21T19:00:34.974656+00:00

This commit is contained in:
cad-safe-bot 2025-02-21 19:04:04 +00:00
parent 3143b52185
commit 9e1fad94ca
85 changed files with 3335 additions and 692 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47186",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-10T19:15:47.430",
"lastModified": "2024-11-21T06:35:35.017",
"lastModified": "2025-02-21T17:15:10.273",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,42 +15,7 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: tipc: verifique si hay valores nulos despu\u00e9s de llamar a kmemdup kmemdup puede devolver un puntero nulo, por lo que es necesario verificarlo; de lo contrario, se eliminar\u00e1 la referencia a la clave nula m\u00e1s adelante en tipc_crypto_key_xmit, como se puede ver en el seguimiento. [1]. [1] https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-690"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23021",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T19:15:21.027",
"lastModified": "2024-11-21T07:45:48.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T18:53:16.480",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "Vulnerabilidad de Cross Site Scripting (XSS) en sourcecodester oretnom23 pos point sale system 1.0, permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de las entradas de c\u00f3digo, nombre y descripci\u00f3n en el archivo Main.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:pos_-_point_of_sale_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3A2B3AD9-CF00-43B4-B9B9-B30CBB05A814"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/enferas/fe381bcc4a020f22cec31cb00e73f43c",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/enferas/fe381bcc4a020f22cec31cb00e73f43c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23022",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T19:15:21.073",
"lastModified": "2024-11-21T07:45:48.700",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T18:51:59.343",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "Vulnerabilidad de Cross Site Scripting (XSS) en sourcecodester oretnom23 employee's payroll management system 1.0, permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de las entradas c\u00f3digo, t\u00edtulo, desde_fecha y hasta_fecha en el archivo Main.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:employees_payroll_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02198796-88F0-4375-9503-100D083EFA79"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/enferas/ffc4d8e38e238709a3dedf3002cb321d",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/enferas/ffc4d8e38e238709a3dedf3002cb321d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24625",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-24T15:15:10.287",
"lastModified": "2024-11-21T07:48:15.387",
"lastModified": "2025-02-21T18:15:14.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-639"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25350",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-24T20:15:15.403",
"lastModified": "2024-11-21T07:49:25.943",
"lastModified": "2025-02-21T18:15:15.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51313",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:12.437",
"lastModified": "2025-02-20T15:15:12.437",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:15.350",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file."
},
{
"lang": "es",
"value": "PHPJabbers Restaurant Booking System v3.0 es afectado por una vulnerabilidad de inyecci\u00f3n CSV que permite a un atacante ejecutar c\u00f3digo remoto. La vulnerabilidad existe debido a una validaci\u00f3n de entrada insuficiente en la secci\u00f3n Idiomas Etiqueta cualquier campo de par\u00e1metros en System Options que se utiliza para construir el archivo CSV."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://packetstormsecurity.com/files/176498/PHPJabbers-Restaurant-Booking-System-3.0-CSV-Injection.html",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51314",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:12.563",
"lastModified": "2025-02-20T15:15:12.563",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:15.567",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Restaurant Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
},
{
"lang": "es",
"value": "La falta de limitaci\u00f3n de velocidad en las funciones 'Forgot Password', 'Email Settings' de PHPJabbers Restaurant Booking System v3.0 permite a los atacantes enviar una cantidad excesiva de correo electr\u00f3nico a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176496",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51316",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:12.810",
"lastModified": "2025-02-20T15:15:12.810",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:15.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Bus Reservation System v1.1 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
},
{
"lang": "es",
"value": "La falta de limitaci\u00f3n de velocidad en la funci\u00f3n 'Forgot Password' de PHPJabbers Bus Reservation System v1.1 permite a los atacantes enviar una cantidad excesiva de correo electr\u00f3nico a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176497",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51339",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T19:15:11.510",
"lastModified": "2025-02-20T19:15:11.510",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:15.993",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Event Ticketing System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
},
{
"lang": "es",
"value": "La falta de limitaci\u00f3n de velocidad en la funci\u00f3n 'Forgot Password' de PHPJabbers Event Ticketing System v1.0 permite a los atacantes enviar una cantidad excesiva de correo electr\u00f3nico a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176519",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12173",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-02-19T06:15:21.003",
"lastModified": "2025-02-20T18:15:24.483",
"vulnStatus": "Received",
"lastModified": "2025-02-21T17:15:11.000",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -22,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13314",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-02-21T06:15:20.440",
"lastModified": "2025-02-21T06:15:20.440",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:16.297",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "The Carousel, Slider, Gallery by WP Carousel WordPress plugin before 2.7.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/ae234bbe-a4af-49f5-8e0a-4fb960821e05/",

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-13577",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T05:15:14.487",
"lastModified": "2025-02-18T05:15:14.487",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:34:11.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The CATS Job Listings plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'catsone' shortcode in all versions up to, and including, 2.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento CATS Job Listings para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'CatSone' del complemento en todas las versiones hasta 2.0.9 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -47,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:catsone:cats_job_listings:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.0.9",
"matchCriteriaId": "1CB23508-AEB8-48F3-91A9-AECA42597206"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/cats-job-listings/trunk/CATSJobListingUser.php#L57",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c0af593-2674-484a-a6a5-715f6fb488cf?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-13578",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T05:15:14.913",
"lastModified": "2025-02-18T05:15:14.913",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:33:08.770",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP-BibTeX plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'WpBibTeX' shortcode in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento WP-Bibtex para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del corto c\u00f3digo 'wpbibtex' del complemento en todas las versiones hasta 3.0.1 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -47,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haozhexie:wp-bibtex:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.0.1",
"matchCriteriaId": "9FDFBA68-628B-413F-A8C7-63C4D906614D"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-bibtex/trunk/wp-bibtex.php#L180",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2011db9d-7237-4843-8c15-63b8fb60de5d?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-13579",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T05:15:15.310",
"lastModified": "2025-02-18T05:15:15.310",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:32:31.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP-Asambleas plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'polls_popup' shortcode in all versions up to, and including, 2.85.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento WP-ASAMBleas para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'Polls_Popup' del complemento en todas las versiones hasta 2.85.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -47,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:platcom:wp-asambleas:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.85.0",
"matchCriteriaId": "64C6AACA-A56A-42C9-B122-AE967AB9CE84"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-asambleas/trunk/modules/shortcodes.php#L999",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ad542c9-2025-4875-bd37-f42095c058bd?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-13581",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T05:15:15.590",
"lastModified": "2025-02-18T05:15:15.590",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:31:11.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simple Charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'simple_chart' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Simple Charts para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'Simple_Chart' del complemento en todas las versiones hasta 1.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible a los atacantes autenticados, con acceso a nivel de contribuyente y superior, para inyectar Web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -47,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:supporthost:simple_charts:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "166D2786-D495-4112-A5A4-B650E61DC202"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/simple-charts/tags/1.0/simple-charts.php#L69",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0dca2c66-64df-44c7-9c75-330dddf582c8?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-13582",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T05:15:15.897",
"lastModified": "2025-02-18T05:15:15.897",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:29:05.973",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simple Pricing Tables For WPBakery Page Builder(Formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wdo_simple_pricing_table_free' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Simple Pricing Tables For WPBakery Page Builder (anteriormente Visual Composer) para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'wdo_simple_pricing_table_free' del complemento en todas las versiones hasta la 1.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -47,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webdevocean:pricing_tables:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "8A719372-0D1F-4135-A7DE-0BDD624C3DEE"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/simple-pricing-tables-vc-extension/tags/1.0/plugin.class.php#L403",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d94cd171-c2a4-4ef0-bc9a-5fdd2b704b5b?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13585",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-02-21T06:15:20.557",
"lastModified": "2025-02-21T06:15:20.557",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:16.483",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,7 +11,30 @@
"value": "The Ajax Search Lite WordPress plugin before 4.12.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/270f213a-2fde-471c-ad09-2b44d11891ec/",

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-13587",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T05:15:16.267",
"lastModified": "2025-02-18T05:15:16.267",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:26:02.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Zigaform \u2013 Price Calculator & Cost Estimation Form Builder Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'zgfm_fvar' shortcode in all versions up to, and including, 7.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Zigaform \u2013 Price Calculator & Cost Estimation Form Builder Lite para WordPress es vulnerable a Cross-Site Scriptin almacenado a trav\u00e9s del c\u00f3digo abreviado 'zgfm_fvar' del complemento en todas las versiones hasta la 7.4.2 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -47,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:softdiscover:zigaform:*:*:*:*:lite:wordpress:*:*",
"versionEndExcluding": "7.4.8",
"matchCriteriaId": "3B56A123-02D6-44EA-B328-796E21E34805"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/zigaform-calculator-cost-estimation-form-builder-lite/trunk/modules/formbuilder/controllers/uiform-fb-controller-frontend.php#L999",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0946fab3-6299-4f62-9664-c0a049e2dbb3?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-13588",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T05:15:16.417",
"lastModified": "2025-02-18T05:15:16.417",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:14:48.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simplebooklet PDF Viewer and Embedder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'simplebooklet' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Simplebooklet PDF Viewer and Embedder para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo corto 'simplebooklet' del complemento en todas las versiones hasta la 1.1.0 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -47,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simplebooklet:simplebooklet:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.3",
"matchCriteriaId": "9A32EFD7-2BA9-48A8-9FA0-431ACEE40CB9"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/simplebooklet/trunk/simplebooklet.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://wordpress.org/plugins/simplebooklet/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/59d9ff2e-4b0b-4096-91ca-1a029f31796b?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,43 @@
"id": "CVE-2024-13595",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-18T05:15:16.710",
"lastModified": "2025-02-18T05:15:16.710",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:11:08.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simple Signup Form plugin for WordPress is vulnerable to SQL Injection via the 'id' attribute of the 'ssf' shortcode in all versions up to, and including, 1.6.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
},
{
"lang": "es",
"value": "El complemento Simple Signup Form para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del atributo 'id' del shortcode 'ssf' en todas las versiones hasta la 1.6.5 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -47,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:modalsurvey:simple_signup_form:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.6.5",
"matchCriteriaId": "59E4AA2F-0714-457F-8BA8-6F39C961CA1E"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/simple-signup-form/trunk/simple_signup_form.php#L120",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26c4008a-9043-4293-aaf3-8e72de667ad8?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25376",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T21:15:07.937",
"lastModified": "2024-11-21T09:00:41.780",
"lastModified": "2025-02-21T17:15:11.430",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,42 +15,7 @@
"value": "Un problema descubierto en los instaladores basados en MSI de Thesycon Software Solutions Gmbh & Co. KG TUSBAudio anteriores a 5.68.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del modo de reparaci\u00f3n msiexec.exe."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://www.thesycon.de/eng/usb_audiodriver.shtml#SecurityAdvisory",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2768",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T22:15:12.710",
"lastModified": "2024-11-21T09:10:28.463",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T17:07:47.053",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -76,30 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:complete_online_beauty_parlor_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD543A8E-7603-44C9-A44E-158B1F8D12B5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%203.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257604",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257604",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%203.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257604",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257604",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2769",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T22:15:12.943",
"lastModified": "2024-11-21T09:10:28.620",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T17:14:54.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -76,30 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:complete_online_beauty_parlor_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD543A8E-7603-44C9-A44E-158B1F8D12B5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%205.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257605",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257605",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%205.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257605",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257605",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2770",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T23:15:11.617",
"lastModified": "2024-11-21T09:10:28.753",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T17:27:26.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -76,30 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:complete_online_beauty_parlor_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD543A8E-7603-44C9-A44E-158B1F8D12B5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%204.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257606",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257606",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Beauty%20Parlor%20Management%20System/Complete%20Online%20Beauty%20Parlor%20Management%20System%20-%20vuln%204.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257606",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257606",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2774",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-21T23:15:12.133",
"lastModified": "2024-11-21T09:10:29.250",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T17:49:07.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -76,30 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_marriage_registration_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6723869-7A39-47FB-8719-6DAB5E08E3DC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%201.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257608",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257608",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%201.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257608",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257608",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2776",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T00:15:07.827",
"lastModified": "2024-11-21T09:10:29.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T18:36:45.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -76,30 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_marriage_registration_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6723869-7A39-47FB-8719-6DAB5E08E3DC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%201.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257610",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257610",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%201.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257610",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257610",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2777",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-22T00:15:08.090",
"lastModified": "2024-11-21T09:10:29.723",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T18:33:30.590",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -76,30 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_marriage_registration_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6723869-7A39-47FB-8719-6DAB5E08E3DC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%202.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257611",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257611",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%202.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257611",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257611",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-2859",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-27T00:15:07.010",
"lastModified": "2024-11-21T09:10:41.990",
"lastModified": "2025-02-21T17:15:11.730",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account. "
"value": "By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account."
},
{
"lang": "es",
@ -39,18 +39,6 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240628-0003/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29500",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T20:15:07.510",
"lastModified": "2024-11-21T09:08:05.340",
"lastModified": "2025-02-21T17:15:11.583",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,42 +15,7 @@
"value": "Un problema en el modo quiosco de Secure Lockdown Multi Application Edition v2.00.219 permite a los atacantes ejecutar c\u00f3digo arbitrario ejecutando una instancia de aplicaci\u00f3n ClickOnce."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2943",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T03:15:13.820",
"lastModified": "2024-11-21T09:10:53.903",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T18:30:31.883",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -76,38 +96,85 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%203.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.258034",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258034",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304759",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%203.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.258034",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258034",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304759",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2944",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T03:15:14.160",
"lastModified": "2024-11-21T09:10:54.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T18:25:37.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -76,38 +96,85 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%204.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.258035",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258035",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304760",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%204.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.258035",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258035",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304760",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2945",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T03:15:14.477",
"lastModified": "2024-11-21T09:10:54.200",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T18:04:55.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -76,38 +96,85 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%205.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.258036",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258036",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304762",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%205.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.258036",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258036",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.304762",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3000",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T22:15:10.150",
"lastModified": "2024-11-21T09:28:38.813",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T18:00:32.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,38 +96,87 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anisha:online_book_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DCA33E-D442-4126-BE6D-27C56A4D00DC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.258202",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258202",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.305052",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.258202",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258202",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.305052",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-27T22:15:10.673",
"lastModified": "2024-11-21T09:28:39.010",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T17:56:43.633",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,38 +96,87 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anisha:online_book_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DCA33E-D442-4126-BE6D-27C56A4D00DC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.258203",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258203",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.305055",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.258203",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.258203",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.305055",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31391",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-12T15:15:26.157",
"lastModified": "2025-02-13T18:17:59.253",
"lastModified": "2025-02-21T17:15:11.887",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,30 +15,7 @@
"value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en un archivo de registro en el operador Apache Solr. Este problema afecta a todas las versiones del operador Apache Solr desde la 0.3.0 hasta la 0.8.0. Cuando se le solicite iniciar la seguridad de Solr, el operador habilitar\u00e1 la autenticaci\u00f3n b\u00e1sica y crear\u00e1 varias cuentas para acceder a Solr: incluidas las cuentas \"solr\" y \"admin\" para uso de los usuarios finales, y una cuenta \"k8s-oper\" que utiliza el operador. para sus propias solicitudes a Solr. Una fuente com\u00fan de estas solicitudes de operadores son las comprobaciones de estado: las sondas de actividad, preparaci\u00f3n y arranque se utilizan para determinar el estado de Solr y su capacidad para recibir tr\u00e1fico. De forma predeterminada, el operador configura las API de Solr utilizadas para estas sondas para que est\u00e9n exentas de autenticaci\u00f3n, pero los usuarios pueden solicitar espec\u00edficamente que tambi\u00e9n se requiera autenticaci\u00f3n en los endpoints de las sondas. Cada vez que una de estas sondas fallaba, si se estaba utilizando la autenticaci\u00f3n, el operador Solr crear\u00eda un \"evento\" de Kubernetes que conten\u00eda el nombre de usuario y la contrase\u00f1a de la cuenta \"k8s-oper\". Dentro del rango de versiones afectadas, esta vulnerabilidad afecta a cualquier recurso de solrcloud que (1) haya iniciado la seguridad mediante el uso de la opci\u00f3n `.solrOptions.security.authenticationType=basic` y (2) requiera que se use autenticaci\u00f3n en las sondas configurando `.solrOptions. seguridad.probesRequireAuth=true`. Se recomienda a los usuarios actualizar a Solr Operador versi\u00f3n 0.8.1, que soluciona este problema al garantizar que las sondas ya no impriman las credenciales utilizadas para las solicitudes de Solr. Los usuarios tambi\u00e9n pueden mitigar la vulnerabilidad deshabilitando la autenticaci\u00f3n en sus sondas de verificaci\u00f3n de estado usando la configuraci\u00f3n `.solrOptions.security.probesRequireAuth=false`."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33558",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T09:15:07.890",
"lastModified": "2024-11-21T09:17:08.957",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-21T18:58:47.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:8theme:xstore_core:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.3.9",
"matchCriteriaId": "DEE21332-92D7-4583-A3DE-4BF4A2921CB7"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-limited-arbitrary-file-download-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-limited-arbitrary-file-download-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33601",
"sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"published": "2024-05-06T20:15:11.603",
"lastModified": "2025-02-13T18:18:03.770",
"lastModified": "2025-02-21T17:15:12.100",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,30 +15,7 @@
"value": "nscd: la cach\u00e9 de netgroup puede terminar el daemon ante una falla en la asignaci\u00f3n de memoria La cach\u00e9 de netgroup del daemon de cach\u00e9 del servicio de nombres (nscd) usa xmalloc o xrealloc y estas funciones pueden terminar el proceso debido a una falla en la asignaci\u00f3n de memoria que resulta en una denegaci\u00f3n de servicio a los clientes. La falla se introdujo en glibc 2.15 cuando se agreg\u00f3 el cach\u00e9 a nscd. Esta vulnerabilidad s\u00f3lo est\u00e1 presente en el binario nscd."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"metrics": {},
"weaknesses": [
{
"source": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
@ -49,16 +26,6 @@
"value": "CWE-617"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34069",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-06T15:15:23.990",
"lastModified": "2024-11-21T09:18:01.527",
"lastModified": "2025-02-21T18:15:16.663",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -80,6 +80,10 @@
"url": "https://github.com/pallets/werkzeug/security/advisories/GHSA-2g68-c3qc-8985",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00026.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4SH32AM3CTPMAAEOIDAN7VU565LO4IR/",
"source": "af854a3a-2127-422b-91ae-364da2661108"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39864",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-05T14:15:03.203",
"lastModified": "2025-02-13T18:18:09.037",
"lastModified": "2025-02-21T17:15:12.390",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,26 +36,6 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41107",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-19T11:15:03.323",
"lastModified": "2025-02-13T18:18:13.340",
"lastModified": "2025-02-21T17:15:12.663",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,26 +36,6 @@
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43709",
"sourceIdentifier": "bressers@elastic.co",
"published": "2025-01-21T11:15:09.807",
"lastModified": "2025-01-31T20:20:21.053",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-21T18:15:16.913",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -114,6 +114,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20250221-0007/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45310",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-03T19:15:15.243",
"lastModified": "2024-11-21T09:37:39.410",
"lastModified": "2025-02-21T18:15:17.080",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -79,6 +79,10 @@
{
"url": "http://www.openwall.com/lists/oss-security/2024/09/03/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250221-0008/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45336",
"sourceIdentifier": "security@golang.org",
"published": "2025-01-28T02:15:28.807",
"lastModified": "2025-01-28T16:15:38.220",
"lastModified": "2025-02-21T18:15:17.400",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,6 +59,10 @@
{
"url": "https://pkg.go.dev/vuln/GO-2025-3420",
"source": "security@golang.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250221-0003/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45338",
"sourceIdentifier": "security@golang.org",
"published": "2024-12-18T21:15:08.173",
"lastModified": "2024-12-31T20:16:06.603",
"lastModified": "2025-02-21T18:15:17.717",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -67,6 +67,10 @@
{
"url": "https://pkg.go.dev/vuln/GO-2024-3333",
"source": "security@golang.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250221-0001/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45341",
"sourceIdentifier": "security@golang.org",
"published": "2025-01-28T02:15:29.147",
"lastModified": "2025-01-28T16:15:38.650",
"lastModified": "2025-02-21T18:15:17.960",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,6 +59,10 @@
{
"url": "https://pkg.go.dev/vuln/GO-2025-3373",
"source": "security@golang.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250221-0004/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2024-45673",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-21T17:15:12.900",
"lastModified": "2025-02-21T18:15:18.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Bridge Directory Sync 1.0.1 through 1.0.12, IBM Security Verify Gateway for Windows Login 1.0.1 through 1.0.10, and IBM Security Verify Gateway for Radius 1.0.1 through 1.0.11 stores user credentials in configuration files which can be read by a local user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-260"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-260"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183801",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-49203",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T21:15:08.090",
"lastModified": "2025-02-13T17:17:19.683",
"lastModified": "2025-02-21T17:15:13.070",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -22,42 +22,7 @@
"value": "Querydsl 5.1.0 y OpenFeign Querydsl 6.8 permiten la inyecci\u00f3n de SQL/HQL en orderBy en JPAQuery."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/OpenFeign/querydsl/",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-55156",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T18:15:18.540",
"lastModified": "2025-02-21T18:15:18.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An XML External Entity (XXE) vulnerability in the deserializeArgs() method of Java SDK for CloudEvents v4.0.1 allows attackers to access sensitive information via supplying a crafted XML-formatted event message."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/aixiao0621/CVE/blob/main/CVE-2024-55156/README.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-55159",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T18:15:18.707",
"lastModified": "2025-02-21T18:15:18.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GFast between v2 to v3.2 was discovered to contain a SQL injection vulnerability via the SortName parameter at /system/loginLog/list."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/SuperDu1/CVE/issues/1",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/tiger1103/gfast/blob/os-v3.2/internal/app/system/logic/sysLoginLog/sys_login_log.go#L75",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-57176",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T18:15:18.877",
"lastModified": "2025-02-21T18:15:18.877",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the shiroFilter function of White-Jotter project v0.2.2 allows attackers to execute a directory traversal and access sensitive endpoints via a crafted URL."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DYX217/Incorrect-Access-Control",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57401",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:13.347",
"lastModified": "2025-02-20T15:15:13.347",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:19.040",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Uniclare Student portal v.2 and before allows a remote attacker to execute arbitrary code via the Forgot Password function."
},
{
"lang": "es",
"value": "La vulnerabilidad de inyecci\u00f3n SQL en Uniclare Student portal v.2 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n Olvid\u00e9 mi contrase\u00f1a."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/aksingh82/CVE-2024-57401",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0306",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-09T04:15:13.000",
"lastModified": "2025-01-09T04:15:13.000",
"lastModified": "2025-02-21T18:15:19.290",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -59,6 +59,10 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2336100",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250221-0009/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-1094",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2025-02-13T13:15:09.130",
"lastModified": "2025-02-21T11:15:09.800",
"lastModified": "2025-02-21T18:15:20.033",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -71,6 +71,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250221-0010/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-1403",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-21T17:15:13.437",
"lastModified": "2025-02-21T18:15:20.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Qiskit SDK 0.45.0 through 1.2.4 could allow a remote attacker to cause a denial of service using a maliciously crafted QPY file containing a malformed symengine serialization stream which can cause a segfault within the symengine library."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183868",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,171 @@
{
"id": "CVE-2025-1546",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-21T17:15:13.710",
"lastModified": "2025-02-21T18:15:21.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in BDCOM Behavior Management and Auditing System up to 20250210 and classified as critical. Affected by this vulnerability is the function log_operate_clear of the file /webui/modules/log/operate.mds. The manipulation of the argument start_code leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
},
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/koishi0x01/CVE/blob/main/CVE_2.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.296491",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.296491",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.497558",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-1548",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-21T17:15:13.897",
"lastModified": "2025-02-21T17:15:13.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in iteachyou Dreamer CMS 4.1.3. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/archives/edit. The manipulation of the argument editorValue/answer/content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/dreamercms/RemoteFileInclusion-ArticleEditorImageUpload.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.296494",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.296494",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.497602",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-22866",
"sourceIdentifier": "security@golang.org",
"published": "2025-02-06T17:15:21.410",
"lastModified": "2025-02-11T15:15:20.870",
"lastModified": "2025-02-21T18:15:32.243",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -55,6 +55,10 @@
{
"url": "https://pkg.go.dev/vuln/GO-2025-3447",
"source": "security@golang.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250221-0002/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-22973",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:12.120",
"lastModified": "2025-02-20T23:15:12.120",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:32.480",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in QiboSoft QiboCMS X1.0 allows a remote attacker to obtain sensitive information via the http_curl() function in the '/application/common. php' file that directly retrieves the URL request response content."
},
{
"lang": "es",
"value": "Un problema en QiboSoft QiboCMS X1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n http_curl() en el archivo '/application/common. php' que recupera directamente el contenido de la respuesta de la solicitud de URL."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/202110420106/CVE/blob/master/CVE-2025-22973.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-23001",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-31T17:15:16.693",
"lastModified": "2025-02-21T05:15:13.173",
"lastModified": "2025-02-21T17:15:14.103",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -22,7 +22,42 @@
"value": "Existe una vulnerabilidad de inyecci\u00f3n de encabezado de host en CTFd 3.7.5, debido a que la aplicaci\u00f3n no puede validar o desinfectar correctamente el encabezado de host. Un atacante puede manipular el encabezado de host en solicitudes HTTP, lo que puede provocar ataques de phishing, restablecimiento de contrase\u00f1as o envenenamiento de cach\u00e9."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-644"
}
]
}
],
"references": [
{
"url": "https://blog.ctfd.io/ctfd-3-7-6/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-24970",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-10T22:15:38.057",
"lastModified": "2025-02-11T16:15:51.920",
"lastModified": "2025-02-21T18:15:36.383",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -60,6 +60,10 @@
"url": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw",
"source": "security-advisories@github.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250221-0005/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"

View File

@ -2,20 +2,24 @@
"id": "CVE-2025-24989",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-19T23:15:15.167",
"lastModified": "2025-02-19T23:15:15.167",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:36.903",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control.\nThis vulnerability has already been mitigated in the service and all affected cusomters have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you."
"value": "An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control.\nThis vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you."
},
{
"lang": "es",
"value": "Una vulnerabilidad de control de acceso inadecuado en Power Pages permite a un atacante no autorizado elevar privilegios en una red y posiblemente eludir el control de registro de usuarios. Esta vulnerabilidad ya se ha mitigado en el servicio y se ha notificado a todos los clientes afectados. Esta actualizaci\u00f3n solucion\u00f3 el problema de eludir el control de registro. Se han dado instrucciones a los clientes afectados para que revisen sus sitios en busca de posibles explotaciones y m\u00e9todos de depuraci\u00f3n. Si no ha recibido una notificaci\u00f3n, esta vulnerabilidad no le afecta."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
@ -38,7 +42,7 @@
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-25193",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-10T22:15:38.450",
"lastModified": "2025-02-11T16:15:52.523",
"lastModified": "2025-02-21T18:15:37.253",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -60,6 +60,10 @@
"url": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx",
"source": "security-advisories@github.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20250221-0006/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25505",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T17:15:14.333",
"lastModified": "2025-02-21T17:15:14.333",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC6 15.03.05.16_multi is vulnerable to Buffer Overflow in the sub_452A4 function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC6_getRootStatus_callback_overflow/detail.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25507",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T17:15:14.453",
"lastModified": "2025-02-21T17:15:14.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a RCE vulnerability in Tenda AC6 15.03.05.16_multi. In the formexeCommand function, the parameter cmdinput will cause remote command execution."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC6_formexecommand_cmdinput_rce/detail.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25510",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T17:15:14.567",
"lastModified": "2025-02-21T17:15:14.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC8 V16.03.34.06 is vulnerable to Buffer Overflow in the get_parentControl_list_Info function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC8_get_parentControl_list_Info_urls_overflow/detail.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25662",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:12.233",
"lastModified": "2025-02-20T23:15:12.233",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:37.760",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda O4 V3.0 V1.0.0.10(2936) is vulnerable to Buffer Overflow in the function SafeSetMacFilter of the file /goform/setMacFilterList via the argument remark/type/time."
},
{
"lang": "es",
"value": "Tenda O4 V3.0 V1.0.0.10(2936) es vulnerable a un desbordamiento de b\u00fafer en la funci\u00f3n SafeSetMacFilter del archivo /goform/setMacFilterList a trav\u00e9s del argumento remark/type/time."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/O4V3/setMacFilterList.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25663",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:12.350",
"lastModified": "2025-02-20T23:15:12.350",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:41.693",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC8V4 V16.03.34.06. Affected is the function SUB_0046AC38 of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad en Tenda AC8V4 V16.03.34.06. La funci\u00f3n SUB_0046AC38 del archivo /goform/WifiExtraSet est\u00e1 afectada. La manipulaci\u00f3n del argumento wpapsk_crypto provoca un desbordamiento del b\u00fafer basado en la pila."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/WifiExtraSet.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25664",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:12.453",
"lastModified": "2025-02-20T23:15:12.453",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:45.417",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_49E098 function."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda AC8V4 V16.03.34.06 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro shareSpeed en la funci\u00f3n sub_49E098."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/SetIpMacBind.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25667",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:12.560",
"lastModified": "2025-02-20T23:15:12.560",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:49.247",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the urls parameter in the function get_parentControl_list_Info."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda AC8V4 V16.03.34.06 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro urls en la funci\u00f3n get_parentControl_list_Info."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/saveParentControlInfo.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25668",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:12.660",
"lastModified": "2025-02-20T23:15:12.660",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:53.063",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC8V4 V16.03.34.06 was discovered to contain a stack overflow via the shareSpeed parameter in the sub_47D878 function."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda AC8V4 V16.03.34.06 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro shareSpeed en la funci\u00f3n sub_47D878."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC8V4/setMacFilterCfg.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25674",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:12.767",
"lastModified": "2025-02-20T23:15:12.767",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:15:56.900",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC10 V1.0 V15.03.06.23 is vulnerable to Buffer Overflow in form_fast_setting_wifi_set via the parameter ssid."
},
{
"lang": "es",
"value": "Tenda AC10 V1.0 V15.03.06.23 es vulnerable a un desbordamiento de b\u00fafer en form_fast_setting_wifi_set a trav\u00e9s del par\u00e1metro ssid."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC10V1/fast_setting_wifi_set.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25675",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:12.870",
"lastModified": "2025-02-20T23:15:12.870",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:16:00.790",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC10 V1.0 V15.03.06.23 has a command injection vulnerablility located in the formexeCommand function. The str variable receives the cmdinput parameter from a POST request and is later assigned to the cmd_buf variable, which is directly used in the doSystemCmd function, causing an arbitrary command execution."
},
{
"lang": "es",
"value": "Tenda AC10 V1.0 V15.03.06.23 tiene una vulnerabilidad de inyecci\u00f3n de comandos ubicada en la funci\u00f3n formexeCommand. La variable str recibe el par\u00e1metro cmdinput de una solicitud POST y luego se asigna a la variable cmd_buf, que se utiliza directamente en la funci\u00f3n doSystemCmd, lo que provoca la ejecuci\u00f3n arbitraria de un comando."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/AC10V1/formexeCommand.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25676",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:12.977",
"lastModified": "2025-02-20T23:15:12.977",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:16:04.577",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDset function."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda i12 V1.0.0.10(3805) contiene un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro de lista en la funci\u00f3n formwrlSSIDset."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/wifiSSIDget.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25678",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:13.077",
"lastModified": "2025-02-20T23:15:13.077",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:16:08.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda i12 V1.0.0.10(3805) was discovered to contain a buffer overflow via the funcpara1 parameter in the formSetCfm function."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda i12 V1.0.0.10(3805) contiene un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro funcpara1 en la funci\u00f3n formSetCfm."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/setcfm.md",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25765",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T18:16:12.420",
"lastModified": "2025-02-21T18:16:12.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MRCMS v3.1.2 was discovered to contain an arbitrary file write vulnerability via the component /file/save.do."
}
],
"metrics": {},
"references": [
{
"url": "https://flowus.cn/share/be03dd2c-b760-457a-a919-e388d7566ff2",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25766",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T18:16:12.647",
"lastModified": "2025-02-21T18:16:12.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the component /file/savefile.do of MRCMS v3.1.2 allows attackers to execute arbitrary code via uploading a crafted .jsp file."
}
],
"metrics": {},
"references": [
{
"url": "https://flowus.cn/share/7097c747-ae3e-4cef-a198-285863698607",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25875",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T18:16:12.873",
"lastModified": "2025-02-21T18:16:12.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ITSourcecode Simple ChatBox up to 1.0. This vulnerability affects unknown code of the file /message.php. The attack can use SQL injection to obtain sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/SticKManII/cve-poc/blob/main/chat-box/4/poc.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25876",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T18:16:13.090",
"lastModified": "2025-02-21T18:16:13.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ITSourcecode Simple ChatBox up to 1.0. This vulnerability affects unknown code of the file /delete.php. The attack can use SQL injection to obtain sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/SticKManII/cve-poc/blob/main/chat-box/2/poc.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25877",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T18:16:13.320",
"lastModified": "2025-02-21T18:16:13.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ITSourcecode Simple ChatBox up to 1.0. This vulnerability affects unknown code of the file /admin.php. The attack can use SQL injection to obtain sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/SticKManII/cve-poc/blob/main/chat-box/1/poc.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25878",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T18:16:13.547",
"lastModified": "2025-02-21T18:16:13.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ITSourcecode Simple ChatBox up to 1.0. This vulnerability affects unknown code of the file /del.php. The attack can use SQL injection to obtain sensitive data."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/SticKManII/cve-poc/blob/main/chat-box/3/poc.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-26014",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T17:15:14.680",
"lastModified": "2025-02-21T17:15:14.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Remote Code Execution (RCE) vulnerability in Loggrove v.1.0 allows a remote attacker to execute arbitrary code via the path parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/olajowon/loggrove/",
"source": "cve@mitre.org"
},
{
"url": "https://gitee.com/olajowon/loggrove/issues/IBJT1K",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/olajowon/loggrove/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-26309",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T17:15:12.853",
"lastModified": "2025-02-20T17:15:12.853",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:16:13.790",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A memory leak has been identified in the parseSWF_DEFINESCENEANDFRAMEDATA function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file."
},
{
"lang": "es",
"value": "Se ha identificado una p\u00e9rdida de memoria en la funci\u00f3n parseSWF_DEFINESCENEANDFRAMEDATA en util/parser.c de libming v0.4.8, que permite a los atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de un archivo SWF manipulado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/libming/libming/issues/327",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-26310",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T17:15:12.967",
"lastModified": "2025-02-20T17:15:12.967",
"vulnStatus": "Received",
"lastModified": "2025-02-21T18:16:17.950",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple memory leaks have been identified in the ABC file parsing functions (parseABC_CONSTANT_POOL and `parseABC_FILE) in util/parser.c of libming v0.4.8, which allow attackers to cause a denial of service via a crafted ABC file."
},
{
"lang": "es",
"value": "Se han identificado m\u00faltiples fugas de memoria en las funciones de an\u00e1lisis de archivos ABC (parseABC_CONSTANT_POOL y `parseABC_FILE) en util/parser.c de libming v0.4.8, que permiten a los atacantes provocar una denegaci\u00f3n de servicio a trav\u00e9s de un archivo ABC manipulado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/libming/libming/issues/328",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-21T17:00:55.416363+00:00
2025-02-21T19:00:34.974656+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-21T16:59:39.160000+00:00
2025-02-21T18:58:47.877000+00:00
```
### Last Data Feed Release
@ -33,52 +33,61 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
282018
282035
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `17`
- [CVE-2025-0838](CVE-2025/CVE-2025-08xx/CVE-2025-0838.json) (`2025-02-21T15:15:11.890`)
- [CVE-2025-1536](CVE-2025/CVE-2025-15xx/CVE-2025-1536.json) (`2025-02-21T15:15:12.270`)
- [CVE-2025-1537](CVE-2025/CVE-2025-15xx/CVE-2025-1537.json) (`2025-02-21T15:15:12.460`)
- [CVE-2025-1538](CVE-2025/CVE-2025-15xx/CVE-2025-1538.json) (`2025-02-21T15:15:12.630`)
- [CVE-2025-1539](CVE-2025/CVE-2025-15xx/CVE-2025-1539.json) (`2025-02-21T15:15:12.830`)
- [CVE-2025-1543](CVE-2025/CVE-2025-15xx/CVE-2025-1543.json) (`2025-02-21T16:15:32.787`)
- [CVE-2025-1544](CVE-2025/CVE-2025-15xx/CVE-2025-1544.json) (`2025-02-21T16:15:32.953`)
- [CVE-2025-26013](CVE-2025/CVE-2025-260xx/CVE-2025-26013.json) (`2025-02-21T16:15:33.313`)
- [CVE-2024-45673](CVE-2024/CVE-2024-456xx/CVE-2024-45673.json) (`2025-02-21T17:15:12.900`)
- [CVE-2024-55156](CVE-2024/CVE-2024-551xx/CVE-2024-55156.json) (`2025-02-21T18:15:18.540`)
- [CVE-2024-55159](CVE-2024/CVE-2024-551xx/CVE-2024-55159.json) (`2025-02-21T18:15:18.707`)
- [CVE-2024-57176](CVE-2024/CVE-2024-571xx/CVE-2024-57176.json) (`2025-02-21T18:15:18.877`)
- [CVE-2025-1403](CVE-2025/CVE-2025-14xx/CVE-2025-1403.json) (`2025-02-21T17:15:13.437`)
- [CVE-2025-1546](CVE-2025/CVE-2025-15xx/CVE-2025-1546.json) (`2025-02-21T17:15:13.710`)
- [CVE-2025-1548](CVE-2025/CVE-2025-15xx/CVE-2025-1548.json) (`2025-02-21T17:15:13.897`)
- [CVE-2025-25505](CVE-2025/CVE-2025-255xx/CVE-2025-25505.json) (`2025-02-21T17:15:14.333`)
- [CVE-2025-25507](CVE-2025/CVE-2025-255xx/CVE-2025-25507.json) (`2025-02-21T17:15:14.453`)
- [CVE-2025-25510](CVE-2025/CVE-2025-255xx/CVE-2025-25510.json) (`2025-02-21T17:15:14.567`)
- [CVE-2025-25765](CVE-2025/CVE-2025-257xx/CVE-2025-25765.json) (`2025-02-21T18:16:12.420`)
- [CVE-2025-25766](CVE-2025/CVE-2025-257xx/CVE-2025-25766.json) (`2025-02-21T18:16:12.647`)
- [CVE-2025-25875](CVE-2025/CVE-2025-258xx/CVE-2025-25875.json) (`2025-02-21T18:16:12.873`)
- [CVE-2025-25876](CVE-2025/CVE-2025-258xx/CVE-2025-25876.json) (`2025-02-21T18:16:13.090`)
- [CVE-2025-25877](CVE-2025/CVE-2025-258xx/CVE-2025-25877.json) (`2025-02-21T18:16:13.320`)
- [CVE-2025-25878](CVE-2025/CVE-2025-258xx/CVE-2025-25878.json) (`2025-02-21T18:16:13.547`)
- [CVE-2025-26014](CVE-2025/CVE-2025-260xx/CVE-2025-26014.json) (`2025-02-21T17:15:14.680`)
### CVEs modified in the last Commit
Recently modified CVEs: `75`
Recently modified CVEs: `66`
- [CVE-2024-2714](CVE-2024/CVE-2024-27xx/CVE-2024-2714.json) (`2025-02-21T16:41:36.737`)
- [CVE-2024-2766](CVE-2024/CVE-2024-27xx/CVE-2024-2766.json) (`2025-02-21T16:56:50.517`)
- [CVE-2024-2767](CVE-2024/CVE-2024-27xx/CVE-2024-2767.json) (`2025-02-21T16:59:39.160`)
- [CVE-2024-28179](CVE-2024/CVE-2024-281xx/CVE-2024-28179.json) (`2025-02-21T16:37:13.663`)
- [CVE-2024-34066](CVE-2024/CVE-2024-340xx/CVE-2024-34066.json) (`2025-02-21T15:15:38.680`)
- [CVE-2024-34068](CVE-2024/CVE-2024-340xx/CVE-2024-34068.json) (`2025-02-21T15:19:39.417`)
- [CVE-2024-38657](CVE-2024/CVE-2024-386xx/CVE-2024-38657.json) (`2025-02-21T16:15:32.340`)
- [CVE-2024-57716](CVE-2024/CVE-2024-577xx/CVE-2024-57716.json) (`2025-02-21T16:15:32.453`)
- [CVE-2024-57950](CVE-2024/CVE-2024-579xx/CVE-2024-57950.json) (`2025-02-21T16:50:43.010`)
- [CVE-2025-0796](CVE-2025/CVE-2025-07xx/CVE-2025-0796.json) (`2025-02-21T15:47:52.213`)
- [CVE-2025-0805](CVE-2025/CVE-2025-08xx/CVE-2025-0805.json) (`2025-02-21T15:46:08.020`)
- [CVE-2025-0864](CVE-2025/CVE-2025-08xx/CVE-2025-0864.json) (`2025-02-21T15:32:38.470`)
- [CVE-2025-0939](CVE-2025/CVE-2025-09xx/CVE-2025-0939.json) (`2025-02-21T15:38:36.803`)
- [CVE-2025-0981](CVE-2025/CVE-2025-09xx/CVE-2025-0981.json) (`2025-02-21T15:23:43.717`)
- [CVE-2025-1023](CVE-2025/CVE-2025-10xx/CVE-2025-1023.json) (`2025-02-21T15:21:54.417`)
- [CVE-2025-21681](CVE-2025/CVE-2025-216xx/CVE-2025-21681.json) (`2025-02-21T16:54:12.800`)
- [CVE-2025-21687](CVE-2025/CVE-2025-216xx/CVE-2025-21687.json) (`2025-02-21T16:49:03.180`)
- [CVE-2025-21688](CVE-2025/CVE-2025-216xx/CVE-2025-21688.json) (`2025-02-21T16:41:20.307`)
- [CVE-2025-21689](CVE-2025/CVE-2025-216xx/CVE-2025-21689.json) (`2025-02-21T16:36:30.260`)
- [CVE-2025-21690](CVE-2025/CVE-2025-216xx/CVE-2025-21690.json) (`2025-02-21T16:30:37.037`)
- [CVE-2025-21692](CVE-2025/CVE-2025-216xx/CVE-2025-21692.json) (`2025-02-21T15:59:44.317`)
- [CVE-2025-24807](CVE-2025/CVE-2025-248xx/CVE-2025-24807.json) (`2025-02-21T15:26:57.507`)
- [CVE-2025-25957](CVE-2025/CVE-2025-259xx/CVE-2025-25957.json) (`2025-02-21T15:15:13.067`)
- [CVE-2025-25958](CVE-2025/CVE-2025-259xx/CVE-2025-25958.json) (`2025-02-21T16:15:33.173`)
- [CVE-2025-26307](CVE-2025/CVE-2025-263xx/CVE-2025-26307.json) (`2025-02-21T15:15:13.223`)
- [CVE-2024-45310](CVE-2024/CVE-2024-453xx/CVE-2024-45310.json) (`2025-02-21T18:15:17.080`)
- [CVE-2024-45336](CVE-2024/CVE-2024-453xx/CVE-2024-45336.json) (`2025-02-21T18:15:17.400`)
- [CVE-2024-45338](CVE-2024/CVE-2024-453xx/CVE-2024-45338.json) (`2025-02-21T18:15:17.717`)
- [CVE-2024-45341](CVE-2024/CVE-2024-453xx/CVE-2024-45341.json) (`2025-02-21T18:15:17.960`)
- [CVE-2024-49203](CVE-2024/CVE-2024-492xx/CVE-2024-49203.json) (`2025-02-21T17:15:13.070`)
- [CVE-2024-57401](CVE-2024/CVE-2024-574xx/CVE-2024-57401.json) (`2025-02-21T18:15:19.040`)
- [CVE-2025-0306](CVE-2025/CVE-2025-03xx/CVE-2025-0306.json) (`2025-02-21T18:15:19.290`)
- [CVE-2025-1094](CVE-2025/CVE-2025-10xx/CVE-2025-1094.json) (`2025-02-21T18:15:20.033`)
- [CVE-2025-22866](CVE-2025/CVE-2025-228xx/CVE-2025-22866.json) (`2025-02-21T18:15:32.243`)
- [CVE-2025-22973](CVE-2025/CVE-2025-229xx/CVE-2025-22973.json) (`2025-02-21T18:15:32.480`)
- [CVE-2025-23001](CVE-2025/CVE-2025-230xx/CVE-2025-23001.json) (`2025-02-21T17:15:14.103`)
- [CVE-2025-24970](CVE-2025/CVE-2025-249xx/CVE-2025-24970.json) (`2025-02-21T18:15:36.383`)
- [CVE-2025-24989](CVE-2025/CVE-2025-249xx/CVE-2025-24989.json) (`2025-02-21T18:15:36.903`)
- [CVE-2025-25193](CVE-2025/CVE-2025-251xx/CVE-2025-25193.json) (`2025-02-21T18:15:37.253`)
- [CVE-2025-25662](CVE-2025/CVE-2025-256xx/CVE-2025-25662.json) (`2025-02-21T18:15:37.760`)
- [CVE-2025-25663](CVE-2025/CVE-2025-256xx/CVE-2025-25663.json) (`2025-02-21T18:15:41.693`)
- [CVE-2025-25664](CVE-2025/CVE-2025-256xx/CVE-2025-25664.json) (`2025-02-21T18:15:45.417`)
- [CVE-2025-25667](CVE-2025/CVE-2025-256xx/CVE-2025-25667.json) (`2025-02-21T18:15:49.247`)
- [CVE-2025-25668](CVE-2025/CVE-2025-256xx/CVE-2025-25668.json) (`2025-02-21T18:15:53.063`)
- [CVE-2025-25674](CVE-2025/CVE-2025-256xx/CVE-2025-25674.json) (`2025-02-21T18:15:56.900`)
- [CVE-2025-25675](CVE-2025/CVE-2025-256xx/CVE-2025-25675.json) (`2025-02-21T18:16:00.790`)
- [CVE-2025-25676](CVE-2025/CVE-2025-256xx/CVE-2025-25676.json) (`2025-02-21T18:16:04.577`)
- [CVE-2025-25678](CVE-2025/CVE-2025-256xx/CVE-2025-25678.json) (`2025-02-21T18:16:08.493`)
- [CVE-2025-26309](CVE-2025/CVE-2025-263xx/CVE-2025-26309.json) (`2025-02-21T18:16:13.790`)
- [CVE-2025-26310](CVE-2025/CVE-2025-263xx/CVE-2025-26310.json) (`2025-02-21T18:16:17.950`)
## Download and Usage

View File

@ -159452,7 +159452,7 @@ CVE-2020-3667,0,0,264d7d22bdb04bf3ee4d0b6e1445559a7a23411035a59139362522400501c4
CVE-2020-36670,0,0,dd742561912b98734c67e2059a40b6e9c49e2a7bb8506b8ac2656bbb84b0d600,2024-11-21T05:30:04.460000
CVE-2020-3668,0,0,c3436d699b131c3818e42f07057290d899d23f2031d183ca0ba4f8e7233fadf2,2024-11-21T05:31:32.323000
CVE-2020-3669,0,0,01769a236e037b35e9c14d4a43538f74b58fccb15d5af9d61648df6d957adc05,2024-11-21T05:31:32.473000
CVE-2020-36691,0,1,b7988a941548b9bf797b2ef3396d79e2cc1273b02bd6bd77f86c9d6c8c0f474c,2025-02-21T16:15:30.657000
CVE-2020-36691,0,0,b7988a941548b9bf797b2ef3396d79e2cc1273b02bd6bd77f86c9d6c8c0f474c,2025-02-21T16:15:30.657000
CVE-2020-36692,0,0,a42cca2443917712009f76d98b37bc7ae9a17917996bd1f84bc2d5743f87d155,2025-02-11T15:15:14.393000
CVE-2020-36694,0,0,b25ccfc4e5797c9946ad3e3cab0db5dda23b168f51fc777d13a2616352aa97be,2025-01-31T18:15:29.737000
CVE-2020-36695,0,0,9747ed2e7bdef069543b60a932de21bb019d1ae5ae02433721e3c0b76ca58913,2024-11-21T05:30:05.247000
@ -187427,7 +187427,7 @@ CVE-2021-47182,0,0,639ad06be2a6517cd3152f844460c6d89d5631a9bb3a9b0d16574f25f9340
CVE-2021-47183,0,0,a6b52c941b31a268622bdcac7229e9ed96a7a8d63c15312452fa966d6e2d9693,2025-01-27T15:03:17.013000
CVE-2021-47184,0,0,d3f6da044f20b443e32a18293da1d6a01b702e6354de9a5b57ed13aafdd07dd1,2025-01-14T16:41:58.690000
CVE-2021-47185,0,0,45623a7520c43f2a5e6e681d610545dca832cc64c1f9e193f4443e9b4459ee0b,2024-11-21T06:35:34.797000
CVE-2021-47186,0,0,a394c86f0d639d2ea19b5f4049d6893cfec880c1b84d050667fdab1792f266c2,2024-11-21T06:35:35.017000
CVE-2021-47186,0,1,ed9fff03a2b4e146cf87fb5d5b5d1e22b61df038807874f4218753a2f3b6d71b,2025-02-21T17:15:10.273000
CVE-2021-47187,0,0,a4aa540b0dd14ad359c36d2a9ab5f7f6e0f4d25d40cc6e094f3e9a0ba8dd3469,2024-11-21T06:35:35.210000
CVE-2021-47188,0,0,00c30f21ab6336a4d9e2b45fd4a8928bec19589009838353b371e0a1fa3f8015,2024-11-21T06:35:35.330000
CVE-2021-47189,0,0,6b5a3eaa80084a3e837e6115663c571962e3f793536fa8f08533d74f389c8aef,2024-11-21T06:35:35.463000
@ -215848,7 +215848,7 @@ CVE-2023-20955,0,0,7101800252d7f107e86f4f481b9dd5f14cb2d6457692e95b4a8236120c7ef
CVE-2023-20956,0,0,b758305221d6d25e11c9148a1a07342840b5453755a989d2402210b7cf49f4f4,2024-11-21T07:41:53.417000
CVE-2023-20957,0,0,aa52522fadbc56b201e0f2d935ef96aae6e68a5322de2b3d33e39fa971b9f500,2024-11-21T07:41:53.523000
CVE-2023-20958,0,0,fe7be067d1136344b617ad11e1fe378ec1228250cd72f0a37e88e64ddee23610,2024-11-21T07:41:53.640000
CVE-2023-20959,0,1,4b6a3d6916f454b1d3ee5c3e3767135027f658d7b6dd9bfa48e96915996d7107,2025-02-21T16:15:31.377000
CVE-2023-20959,0,0,4b6a3d6916f454b1d3ee5c3e3767135027f658d7b6dd9bfa48e96915996d7107,2025-02-21T16:15:31.377000
CVE-2023-2096,0,0,6790c0c4173f2a80c8fc6364bb8dca1458979a9c781f50f9a4a474739559a5fd,2024-11-21T07:57:55.790000
CVE-2023-20960,0,0,ee956132d1bab46972109c103afdccdb34c3b343cc4c9aeb125968a6a16df02e,2024-11-21T07:41:53.850000
CVE-2023-20962,0,0,aecae52f40c1b7322ccfbf481d8efa3135d014b332cf776666acf7d6237969cb,2024-11-21T07:41:53.980000
@ -215975,7 +215975,7 @@ CVE-2023-21075,0,0,33f147a4cced41aba21070c5bb2cc61018f3622811867970c3c10df2e194d
CVE-2023-21076,0,0,27103e20521e31db6e1937216021d5b2de4104a53920e056ac82d7b0692a6a94,2024-11-21T07:42:07.013000
CVE-2023-21077,0,0,851a5b7345056eafdf93a04decc8f6b23adcd96451b30090f1f010fac817ba0d,2024-11-21T07:42:07.123000
CVE-2023-21078,0,0,99650f1b4bea7f6bfe00b0249a3870899d5493be0b16d659974106e8f5abdac6,2024-11-21T07:42:07.233000
CVE-2023-21079,0,1,4f54c60621c5f43073a41dc8cceeb8fad3212158ce3a48406980e2aa6155c867,2025-02-21T16:15:31.570000
CVE-2023-21079,0,0,4f54c60621c5f43073a41dc8cceeb8fad3212158ce3a48406980e2aa6155c867,2025-02-21T16:15:31.570000
CVE-2023-2108,0,0,81a66d01e388988a71bb3aba87cae02ae215e5d5f31267560c99d65f4d7746b9,2024-11-21T07:57:57.323000
CVE-2023-21080,0,0,62003e88fe3c324ade4c8835d51efb91f2bfcaba5a586f2675b377f915c7fd4e,2025-02-05T19:15:12.323000
CVE-2023-21081,0,0,9d92b768ca7c8e4d9b440b07d6cc4296a37cf68747f3cb686fdc4b908ac6bb49,2025-02-05T19:15:12.487000
@ -217788,8 +217788,8 @@ CVE-2023-23014,0,0,9cd6e8d6016047fb1ae99e666271de44606868b3f06eb3aed8e4261524f99
CVE-2023-23015,0,0,d0df99d21d959de5ef6ca5ef41519474b95948e67493f30a62f330b9252515f8,2024-11-21T07:45:48.207000
CVE-2023-23019,0,0,6fa0f085d84aa642703ad0112ad1d5d370abb78a90a932c7ada8d2b4a972061c,2024-11-21T07:45:48.347000
CVE-2023-2302,0,0,34ef982b498e7430ee832284943c8a861cec9e7cabdf617316655fb267a14723,2024-11-21T07:58:20.680000
CVE-2023-23021,0,0,98f9eecb03b1b35010b884fc639c7d67b66b641612dfe7ff6180cfec588da3f2,2024-11-21T07:45:48.567000
CVE-2023-23022,0,0,39da44adc14d3b0aa91d83d1972d47b405ace7fd7963ab2233b0221ff74ff21c,2024-11-21T07:45:48.700000
CVE-2023-23021,0,1,af65000cf9cdf3a306277ff48c020a44996e20883779be140c18bf95be70ca60,2025-02-21T18:53:16.480000
CVE-2023-23022,0,1,0f37886017fe1297da1a267cc90e24e31dded5308a3ce9c851c6067ea4487b35,2025-02-21T18:51:59.343000
CVE-2023-23024,0,0,838283ba567bc9263f7dddf82097b0db2f7d4a69538d24890a976311d9b10f81,2024-11-21T07:45:48.837000
CVE-2023-23026,0,0,6f65b9b09976cd13e082fc8eee6ad98c95f1b42e08e2d12be5ab90abe6ffb15c,2024-11-21T07:45:48.973000
CVE-2023-2303,0,0,53c6ca013fee93e9a9c264612546e6d3efdc4ff61f00e0d79a5af0ced51a13af,2024-11-21T07:58:20.807000
@ -219046,7 +219046,7 @@ CVE-2023-24620,0,0,3a3bc66320b549a4417001163bc5252914addae68831682c8e3b9eaa5826f
CVE-2023-24621,0,0,05389959742ec3278497f8c9309bd0abe76641449fdb280196a465b94d7bc800,2024-11-21T07:48:14.927000
CVE-2023-24622,0,0,c066aa46ee63fbd74f051268e86dde35fde0e6bb5c6c60b992fae7fc835b9267,2024-11-21T07:48:15.090000
CVE-2023-24623,0,0,33390f24adfdc7a5e62bed25c8eee7ece2e7dd3803d0d8ccb6bcdb0ca591df18,2024-11-21T07:48:15.237000
CVE-2023-24625,0,0,59197d12ab32c33e45b7af281b34f6b8257dabd32ac48ad4271fd545249b19d6,2024-11-21T07:48:15.387000
CVE-2023-24625,0,1,031358c3cce9ece3e30c39fd1b6a6435b4b4b6ec9c94eaf2c55f80be98ffa71c,2025-02-21T18:15:14.160000
CVE-2023-24626,0,0,f8c05a82508ace6da42ff99c3373707d59b1b90f2c4e5f8dccbbb2c862bb909b,2025-02-12T17:15:14.380000
CVE-2023-2463,0,0,f46badffb051b802c8d4c418e9ad13db7cd5c54b60cd8c2536b7f64dd0d44ee8,2024-11-21T07:58:40.123000
CVE-2023-2464,0,0,b8ae76a72e47db531a3bbe43222f04869a83359178fae5aa13a60312ce5c538a,2024-11-21T07:58:40.250000
@ -219605,7 +219605,7 @@ CVE-2023-25346,0,0,1545a193327540134d9d675ee16977b31fe2260b58497e6c55a05aab12a87
CVE-2023-25347,0,0,7dd18f4e49becbf7027509d47983052d9cc5e16b21885845ebdbbaf2c5086acf,2025-02-04T17:15:11.847000
CVE-2023-25348,0,0,7b24e64ac0df04bfc1b24e00ef9e1851d7c486926aa7bdf9d8bc8b9ef222eb15,2025-02-04T16:15:34.780000
CVE-2023-2535,0,0,ecbc3c1119751bb16ffbe409b3f09b7cc832d1bb36bfa91e0d8b9eb72f3e94ea,2023-11-07T04:12:51.317000
CVE-2023-25350,0,0,7c58eaa57d66254e13765ebf86b30641b26b6ed22bff7e285e4c3070a3c3ec1b,2024-11-21T07:49:25.943000
CVE-2023-25350,0,1,db7df5cac393750897fcdc337a21e2f740dbd09982396e38d708bdfcc3e797c5,2025-02-21T18:15:15.100000
CVE-2023-25355,0,0,6b9b62c05e2b1c9a3232a1048d5b259d801a232c11200ed5e06db450c607257e,2025-02-13T16:15:38.707000
CVE-2023-25356,0,0,5fb606199eca30d5951706e2fbb5a7eba5b39535bfc1c7d9d569d83923c02373,2025-02-13T16:15:38.870000
CVE-2023-25358,0,0,c293b186724c778961eaee7691e3edb8240ff2943c5c22a7bf4907fb0cf4942c,2024-11-21T07:49:26.333000
@ -222404,7 +222404,7 @@ CVE-2023-2868,0,0,c98319dc1a3c4180016074dbca3a3d8b7219c5bd111d86a85ef5cf32a083ee
CVE-2023-28680,0,0,b1b8739488aafc769a63ef0b051e8ded2b845670faf36f5795e78f5178de34df,2024-11-21T07:55:47.667000
CVE-2023-28681,0,0,95bd95b3371f2d02b2afda85f523faab72dd02ebd211a6ccd1aed342f4c41880,2024-11-21T07:55:47.773000
CVE-2023-28682,0,0,4baebd5e01dadc25d40e00e1275088f5c0932a710aca5cef28ec4404f090498e,2024-11-21T07:55:47.893000
CVE-2023-28683,0,1,bf56f73ac3376691a41c3ba0b05d8d66ab0e836e852cd7d6e07e04bae6e9a810,2025-02-21T16:15:31.807000
CVE-2023-28683,0,0,bf56f73ac3376691a41c3ba0b05d8d66ab0e836e852cd7d6e07e04bae6e9a810,2025-02-21T16:15:31.807000
CVE-2023-28684,0,0,3d5ef9444463524f57fde213fef9f58c5bf57ade30cb16ffb0ec868310dbee5b,2025-02-20T22:15:30.487000
CVE-2023-28685,0,0,658083785298e53ddf6aa90648b9d44e88c968a84e6bb685839c5265a01391fd,2024-11-21T07:55:48.230000
CVE-2023-28686,0,0,ad1c64a874f05e7a4b6092d7d1962734d7835d50862e6e2d1722875a373bf303,2025-02-19T22:15:16.367000
@ -239311,16 +239311,16 @@ CVE-2023-51302,0,0,2a2a629e028fadf85676a9ec90e701230400ff0e14da25614e070b1b12c7a
CVE-2023-51303,0,0,5607bb153ecb6857b5c285c2d78c60ac93b1768ce62baab40912356cb664f295,2025-02-20T15:15:11.333000
CVE-2023-51305,0,0,94c9859147775854f4fe017d88d7dc2aa4c058076353100b1d5ee8642d3a3620,2025-02-20T15:15:11.507000
CVE-2023-51306,0,0,4ee512037b5a17f44d41cb85824b3aa21cbf2013fd9687b1c54a56b2512be0e8,2025-02-20T18:15:21.527000
CVE-2023-51308,0,1,4bcbdb7b793145ac3b10d8145b7d5335bf14b807b86268829f166f3300b36c04,2025-02-21T16:15:31.997000
CVE-2023-51308,0,0,4bcbdb7b793145ac3b10d8145b7d5335bf14b807b86268829f166f3300b36c04,2025-02-21T16:15:31.997000
CVE-2023-51309,0,0,e8a267fb846fdf7ab7dcb6178679f00727db2db3808c8e0a0d4d14c04ce996de,2025-02-20T18:15:22.890000
CVE-2023-5131,0,0,ea7fb93c4dbd8bd2f769e40008c92349338343ffec9aef4cd684c52a4f03daea,2024-11-21T08:41:07.410000
CVE-2023-51310,0,0,f4d071c477d5fdc5cab7b5b3fa4720e6ca8a83f4159e2d11461587a7973502bb,2025-02-20T18:15:23.090000
CVE-2023-51311,0,0,6575096cf9588af68549263dd8fe4fd9ac6ca19f8c16fd21ce87579eec4885a8,2025-02-20T15:15:12.170000
CVE-2023-51312,0,0,af0e37187ed278587c858c2f07fd240cea5d64346e1f10c5fb7311e4a0e68208,2025-02-20T18:15:23.293000
CVE-2023-51313,0,0,ecb7283cecdf3851dcd9f3dac756939e43c63a6abab5a2801b24b0ce64cd7004,2025-02-20T15:15:12.437000
CVE-2023-51314,0,0,8e6485d513acdb9b63f3ce03417ddc6a6d52c1f9a2853c47e64af6c834ab1777,2025-02-20T15:15:12.563000
CVE-2023-51313,0,1,6a2045e17d1649f3a297166f69c1bb87652b9a1ee94412aac61dddb35d0383d3,2025-02-21T18:15:15.350000
CVE-2023-51314,0,1,ed0c0946f48ea9e4165925b66798a07395b88ccd084d7b53e90b457b808050fa,2025-02-21T18:15:15.567000
CVE-2023-51315,0,0,93388a032dcef67ad051bc5698be424af785a597baf012fcfffa6e19240ae44a,2025-02-20T18:15:23.490000
CVE-2023-51316,0,0,24f90e52eb9f2ee3efdd4303af4204fb2b2db48dc9ee4e66c7e4c2ca06dae737,2025-02-20T15:15:12.810000
CVE-2023-51316,0,1,3e42aca365f3744587d02d82a83a1d315ee807d1f89c97fb204c4d1d04bc3c59,2025-02-21T18:15:15.783000
CVE-2023-51317,0,0,7f9f5b550e35dd8e634965b30be68534535138097cec95e49eb38256e5f53431,2025-02-20T16:15:34.600000
CVE-2023-51318,0,0,e156ff65231831e807af792d62b39f920a1b080c98fa76e62945fdf2d761f0ab,2025-02-20T18:15:23.683000
CVE-2023-51319,0,0,e0b9a5510eaef731e2564d7aeac202daae6076fe5bd9b7dfe04466db07bd2e3a,2025-02-20T20:15:45.180000
@ -239342,7 +239342,7 @@ CVE-2023-51335,0,0,dd33a6344436fa665172187aac9f004f93282c327a2db992d84e7a2bdf0eb
CVE-2023-51336,0,0,29132fd1df966a62f32eb5325c8f9070768e142723e0bbd22b24885e360ec543,2025-02-20T19:15:11.240000
CVE-2023-51337,0,0,dfd38d5a8b324d267bd7f687ad56321b1fb0183db7f70dfb2660ca67a7dfe89c,2025-02-20T19:15:11.340000
CVE-2023-51338,0,0,43123f5087788ef2cd530dd675cadb02fc821c3e444b1b36c18f60a0b04eeb77,2025-02-20T19:15:11.423000
CVE-2023-51339,0,0,a4dc2ccd6e30a7b50986c0e7eda81fc2bfdcd0d812e951d0ec5706bf7e1315e6,2025-02-20T19:15:11.510000
CVE-2023-51339,0,1,46130be144d70d7717f34638d17bcb922ba5bdffc38788d706d1125b8b9b37c8,2025-02-21T18:15:15.993000
CVE-2023-5134,0,0,4883dceb94c3f0cc4b1b00f2283b580de20b785803ef8febb697d90c06bd591d,2024-11-21T08:41:07.850000
CVE-2023-5135,0,0,877454aba62f703a281ed8cbe6f67c849efb5f5f63261252e74d9df5c2c3773f,2024-11-21T08:41:07.980000
CVE-2023-51350,0,0,3e6b1a93404e3494b28f6f9c928c88f04bb91fa7582d839166c6383b89c1b64d,2024-11-21T08:37:56.867000
@ -242271,7 +242271,7 @@ CVE-2023-6933,0,0,d598bd64df7b1f90f5a4fbee348836ca7a036d43d333519168af348662fcfc
CVE-2023-6934,0,0,775630978666c14635bd5a34aef70e9940735e81f166dadcf41ac01815f012d4,2024-11-21T08:44:52.087000
CVE-2023-6935,0,0,ad7e648afd3c153ad4009369fe6e5cfe2af0b9f0392166eedd6efb57fc744a0c,2024-11-21T08:44:52.217000
CVE-2023-6936,0,0,83efbac6b69256756d9bf7707281cc47bcc927f7d4d370ce9d055a1b9c86d5d3,2025-02-12T17:01:14.790000
CVE-2023-6937,0,1,7964903882a5e576b2b89954fa626bbbcd3c53506b0cc388cf5980bdf52dfdda,2025-02-21T15:03:59.663000
CVE-2023-6937,0,0,7964903882a5e576b2b89954fa626bbbcd3c53506b0cc388cf5980bdf52dfdda,2025-02-21T15:03:59.663000
CVE-2023-6938,0,0,bf6ce0bd25ccb84e8585516f5f1e96599e70c565d5e6071dfb462f8acaae7aff,2024-11-21T08:44:52.623000
CVE-2023-6939,0,0,9013c4f20cfa53f9418c260cc38f77fa6695014f1b33d48beba0b416f70e2975,2024-11-21T08:44:52.757000
CVE-2023-6940,0,0,1c68075899f5f28aacff5c0715f7a3755d2bf8d797a66e5c13ff31fd3decf9da,2024-11-21T08:44:52.890000
@ -244251,7 +244251,7 @@ CVE-2024-10808,0,0,b834da74949831a7f897c4183bba04078cfb4d8a1c3e61f6ae2ad410f56b2
CVE-2024-10809,0,0,51f78f7a787236cbad7aac7472721fb340d976c70790233c6cce2c1b1b05b8b6,2024-11-06T15:14:48.213000
CVE-2024-1081,0,0,36ea2be7caa79712411936962b91a7b0f2cbdab9074b0e92ae142c39cf167f2f,2025-02-04T20:59:54.337000
CVE-2024-10810,0,0,462940493f0b1c5b280616ee9b6e4ca0acc2fe73d901d9b38b41895de26ba591,2024-11-06T15:16:12.497000
CVE-2024-10811,0,1,c3de83a510cb59d263e0e8c93301ed1a241d3eb6f5f2090c3798f3c75e7894bb,2025-02-21T15:15:11.143000
CVE-2024-10811,0,0,c3de83a510cb59d263e0e8c93301ed1a241d3eb6f5f2090c3798f3c75e7894bb,2025-02-21T15:15:11.143000
CVE-2024-10813,0,0,8f0d87c8561d66a428b124b04ac3dd7eb7202f93dd365239b75e2107b61a0c57,2024-11-23T04:15:07.800000
CVE-2024-10814,0,0,24cd3cc9c72ab7020b87ed743b9bbaf59702cba37c3042eada5a620d131514e7,2024-11-12T13:56:24.513000
CVE-2024-10815,0,0,8293b7f99c0a99e37b8296b8a7313de52e7c982a394f3ff15ff11be7d8d607b8,2025-01-09T16:15:35.800000
@ -244743,7 +244743,7 @@ CVE-2024-11370,0,0,dd87b64b129f6809c8edd7b234994b231659964606722e4f84f6ae489936a
CVE-2024-11371,0,0,940d4acb1660319dcaf9e79be7b51b02d713b6710d41c4a41d256d4b90485073,2024-12-16T15:53:39.657000
CVE-2024-11374,0,0,a5a1e58c0241313798d5870304d6ab4fd613b7c8d39f72ddd8edd6b514e2a94b,2024-12-07T10:15:05.643000
CVE-2024-11375,0,0,09113c9c4c16e936568b412fc506dc02ef629e8e628c654e3f6f629cd5e5088f,2025-01-07T05:15:11.907000
CVE-2024-11376,0,1,5609ceefbc58fb4309dc8f69fb79b730f8dace0410f91558d90169df386137aa,2025-02-21T15:38:34.793000
CVE-2024-11376,0,0,5609ceefbc58fb4309dc8f69fb79b730f8dace0410f91558d90169df386137aa,2025-02-21T15:38:34.793000
CVE-2024-11377,0,0,7c2553183c73f79520591c880309a16f7b34fb51c625dbcc41841afeb50b2cc9,2025-01-07T05:15:12.083000
CVE-2024-11378,0,0,b38085a589e7c1c3c829e70c4c335030fed608a8aaf3232abbfcaba2499cd265,2025-01-07T05:15:12.270000
CVE-2024-11379,0,0,9fd00eb3fec3062cfc458a7971d09425d25dcca0c806b20326864d85b70adea6,2024-12-06T05:15:05.813000
@ -245261,7 +245261,7 @@ CVE-2024-11891,0,0,f8a38032fa61b45ae7f4fd61d15412795ca770178ff882a3a6fac619a51ce
CVE-2024-11892,0,0,d5c6270385b92d8aef9bbc883d47c18aabd1b1a329cb2704b1f0105fbc287876,2025-01-11T08:15:24.463000
CVE-2024-11893,0,0,ab78f78c6e435c83f3f5f09a281780ac0636482d65ec96c7c75ce803df2c5017,2024-12-20T07:15:11.747000
CVE-2024-11894,0,0,9e31b28fa56a41e12b82fdf98576d9a13777f5eed7b6c3fc1f71a85af109ef81,2024-12-14T05:15:10.227000
CVE-2024-11895,0,1,6ff552343322b3aae06291c698f7c9f591f6864604cedad87a6ad70b084caf4d,2025-02-21T15:36:37.803000
CVE-2024-11895,0,0,6ff552343322b3aae06291c698f7c9f591f6864604cedad87a6ad70b084caf4d,2025-02-21T15:36:37.803000
CVE-2024-11896,0,0,34f349ccc91bcf6d6c27bb81a454efc17924954cfa878d33ee370546a785a3f4,2024-12-24T09:15:05.663000
CVE-2024-11897,0,0,63c2369fafd5da048dd57864988be95602290ce10df0f51d423ab54c866c15e0,2024-12-04T03:15:05.380000
CVE-2024-11898,0,0,e843212abf00805a20f8b4b65b36c01f75cc2096cf65f2d0e7899f11eb517a82,2024-12-03T08:15:06.857000
@ -245499,7 +245499,7 @@ CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbc
CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000
CVE-2024-12171,0,0,02bdcd1ee67eefd33d15b29c0f023f4ae1c93e77bdd7b1fc34ccf1ee81e2337a,2025-02-01T04:15:30.303000
CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e319,2024-12-12T06:15:23.587000
CVE-2024-12173,0,0,40318b60c711aa39885ed06dd8b46aeaf2fc04d2ff227d24f115d1ef6b46e01b,2025-02-20T18:15:24.483000
CVE-2024-12173,0,1,7d944d4e8e3eae3c31019309f9ace7394848c049126e10d571e77e1246f0e144,2025-02-21T17:15:11
CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000
CVE-2024-12175,0,0,d343e9c859734ac59607cdd69472323b5b2b24ca1f02ce9797a72fd283ae52a1,2025-01-10T21:26:56.183000
CVE-2024-12176,0,0,c0f27faa92b2096f6d155f1bdd3b84e12e907e1e8188f65eb3c16d954de1037d,2025-01-07T05:15:15.900000
@ -246058,7 +246058,7 @@ CVE-2024-12819,0,0,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b
CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000
CVE-2024-12821,0,0,7372c2b0dab41e9efab53321f64857db82fe2b13cccde335b3d3062f730a0707,2025-01-30T14:15:32.843000
CVE-2024-12822,0,0,1237e8d30b34608b9228bf4eac8a25382e97ffcf3e8959f1fd3fc8d0a61375ef,2025-01-30T14:15:33.017000
CVE-2024-12825,0,1,e5a4d7f38d6d259b5737402affdabce23860527403323be321069fe15e333462,2025-02-21T15:34:58.803000
CVE-2024-12825,0,0,e5a4d7f38d6d259b5737402affdabce23860527403323be321069fe15e333462,2025-02-21T15:34:58.803000
CVE-2024-12826,0,0,5299c46313436d68c9289650a6ef6457bf429f032709c773f24c86ea6949c331,2025-01-25T08:15:08.463000
CVE-2024-12828,0,0,a29f7d175d08af9e9a3e3b2d9a239843d4c47c7b84f9529c7b9ddf19ae5c7fea,2024-12-30T17:15:07.717000
CVE-2024-12829,0,0,b6def8373fb939ecec35d929ec57c311d0480519af7a0919a5038b5b832e9ed5,2025-01-03T17:46:48.507000
@ -246094,7 +246094,7 @@ CVE-2024-12856,0,0,9babd12091bd3794c40f556b84241a138bc1e45b107552b0272431ce40e98
CVE-2024-12857,0,0,ef7076837ea8a02d79d9d26c8f73cc7fa350cecedb358a5c02f6632362e827cc,2025-01-24T19:18:01.417000
CVE-2024-12859,0,0,522b6f7d54bc3f8885b1a7396ac68fe43464c4991625c739aac1411423caa7fa,2025-02-03T20:15:32.940000
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
CVE-2024-12860,0,1,c946dd349d9f463ff9a66a9415fdb183af2c6694025c861121198a372bbb3472,2025-02-21T15:30:47.383000
CVE-2024-12860,0,0,c946dd349d9f463ff9a66a9415fdb183af2c6694025c861121198a372bbb3472,2025-02-21T15:30:47.383000
CVE-2024-12861,0,0,2e6551729d4e6153dcb30ad0ddedc7b2053441c7fdf06c9991efe154d5e21335,2025-01-31T19:01:20.827000
CVE-2024-12867,0,0,732c7583e9efa2618fe2f4098930414e7eb5e8b8eea2432950087191a298a004,2024-12-20T20:15:22.740000
CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000
@ -246349,10 +246349,10 @@ CVE-2024-13155,0,0,abc846c187ee610be36b9327ce826db0bbe36e3bd8c2ca0e9dc519f899621
CVE-2024-13156,0,0,30f08a5146793529d2149bd8fe28d1d230f7d62ef9b057e2393b31a9d88e81a0,2025-01-14T09:15:20.910000
CVE-2024-13157,0,0,80e03db47d7aeaaff8ebfe5d3bb0d4e0a672091f1b6d6e0617afb0f75c61e9a3,2025-01-31T09:15:06.617000
CVE-2024-13158,0,0,d921bcc53f0c4810cb7f77f962be3471977624bd876c8c3eed3db3c6a249539e,2025-01-14T18:15:26.020000
CVE-2024-13159,0,1,c8687413c2f815733b269b2640c1d1df0915a002cd43906bf55f0ecfb8f2c282,2025-02-21T15:15:11.380000
CVE-2024-13159,0,0,c8687413c2f815733b269b2640c1d1df0915a002cd43906bf55f0ecfb8f2c282,2025-02-21T15:15:11.380000
CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000
CVE-2024-13160,0,1,b18c67a0d503ccfafb935af1ae68681b5f4ae341cd2a4d932b7425bece3a76f2,2025-02-21T15:15:11.477000
CVE-2024-13161,0,1,699da4a1911d96fd029491b629fabe0bcf17006a5766de4aa8d9fddc609c7cdb,2025-02-21T15:15:11.577000
CVE-2024-13160,0,0,b18c67a0d503ccfafb935af1ae68681b5f4ae341cd2a4d932b7425bece3a76f2,2025-02-21T15:15:11.477000
CVE-2024-13161,0,0,699da4a1911d96fd029491b629fabe0bcf17006a5766de4aa8d9fddc609c7cdb,2025-02-21T15:15:11.577000
CVE-2024-13162,0,0,da666b41a7d98c9e3b9af1e27b198252acb00cdb0ecec4980b750fd64eed2fe4,2025-01-14T18:15:26.840000
CVE-2024-13163,0,0,bfd7b222341b4eeb132c53cc185879949445b8743e8f9a1b980d00c942a7fc15,2025-01-14T18:15:27.033000
CVE-2024-13164,0,0,5e00467d585bd74d24cb5c4fbdec02b53f0efb7f0a08f8e18116c4133fca3a2a,2025-01-14T18:15:27.257000
@ -246508,9 +246508,9 @@ CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1f
CVE-2024-13310,0,0,c7d7f61ed943995654d2d7f670a6eebe7c0fd61f9032347d9fa323e6d73361eb,2025-01-31T16:15:33.080000
CVE-2024-13311,0,0,8f1f9a5d171f95a7ba0f9eaa7d2951798d439c8a220f4f2f7df62ba50bf29d83,2025-01-31T16:15:33.280000
CVE-2024-13312,0,0,816e38c6c7477b967986b1dc1563e84c09b9a93286b16913543c3869e5b6d36c,2025-01-31T16:15:33.413000
CVE-2024-13314,0,0,6e27553951fcfe12183af99f1b9adec8ab74697304da1058375528c9fe26f24c,2025-02-21T06:15:20.440000
CVE-2024-13315,0,1,4230d16584ac54504af61ee61aeb80a96b9eb3fae8091facc2f2a8a9c284a210,2025-02-21T15:44:49.533000
CVE-2024-13316,0,1,25d5ed6e5d616a5feaaead62ba45936d1b7cd3d51545edb9bef6427ff89c1be6,2025-02-21T15:28:43.690000
CVE-2024-13314,0,1,9961922c20617444ea3f3735c0cbf11c9ac00da8255fa1024905b98c477e4b96,2025-02-21T18:15:16.297000
CVE-2024-13315,0,0,4230d16584ac54504af61ee61aeb80a96b9eb3fae8091facc2f2a8a9c284a210,2025-02-21T15:44:49.533000
CVE-2024-13316,0,0,25d5ed6e5d616a5feaaead62ba45936d1b7cd3d51545edb9bef6427ff89c1be6,2025-02-21T15:28:43.690000
CVE-2024-13317,0,0,bf6e98353834aadd569c32731a32e07929f7d2ec68ca0c813c445806410cf741,2025-01-18T07:15:08.290000
CVE-2024-13318,0,0,e578de8b4719417613441e3d599820c7f899466a7f87935725f122dcda9b3d95,2025-01-10T12:15:24.257000
CVE-2024-13319,0,0,7991c2dfb6aefea7f96696a61d541e78c477eeff53b34652065a2f9dce798e51,2025-01-24T21:06:34.310000
@ -246533,7 +246533,7 @@ CVE-2024-13336,0,0,bb991eddb9d6dca57629f03b2496d9ddcd626f1b8283912d91a624feb94fc
CVE-2024-13339,0,0,ec5a27af237e49842908b435dbfc33b6109d676dd112fee42b660f932b06c304,2025-02-19T09:15:09.240000
CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000
CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000
CVE-2024-13341,0,1,128797d9a3fd1b4d0be904e2ffac7e537df76d379d0475c080eeeed959f797db,2025-02-21T15:41:10.603000
CVE-2024-13341,0,0,128797d9a3fd1b4d0be904e2ffac7e537df76d379d0475c080eeeed959f797db,2025-02-21T15:41:10.603000
CVE-2024-13343,0,0,bc527145f8c71b096b9e058e2eb6af0513530e49a2213ad37da3c9d8054436b1,2025-02-01T04:15:30.717000
CVE-2024-13345,0,0,6201c4257ed3a1ebbb87baac8176155e7c93515b6dda93cfafdaf22ca9b1cc80,2025-02-13T07:15:08.177000
CVE-2024-13346,0,0,66f93cf3bfe9465a49d11c88fea5d478d98cfe45b424ebdbe43b702973f58f32,2025-02-13T07:15:09.760000
@ -246556,7 +246556,7 @@ CVE-2024-13365,0,0,d4c9fb3b4eb02bb797a58b6d290aa4b0d82f091aa00e734ed2f1582490728
CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000
CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000
CVE-2024-13368,0,0,dbbfa255c3d339e91eb07214cc7014e309e9bdb61391ed3e68917c31e101db69,2025-02-04T19:39:27.553000
CVE-2024-13369,0,1,47ecd3c90365b0b8806608698978244aa8d9548459c2826cb276965402432233,2025-02-21T15:26:29.267000
CVE-2024-13369,0,0,47ecd3c90365b0b8806608698978244aa8d9548459c2826cb276965402432233,2025-02-21T15:26:29.267000
CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0fa,2024-11-21T08:50:21.857000
CVE-2024-13370,0,0,6c3d5d3b19e588eca43d0624f2d920a1fb872d4b883b63a2898ed54009994a1b,2025-02-04T19:38:23.390000
CVE-2024-13371,0,0,b33252fa1aed7179836637ba006b2c21a7f2a8eddb64462e7f01328a3a0fc612,2025-02-05T16:16:22.397000
@ -246579,7 +246579,7 @@ CVE-2024-13391,0,0,4ddc50634aa74744390d79b0906c8f88dd9a00cc29aaa55a9724acf7a1d06
CVE-2024-13392,0,0,a78e961d1cefdda1764b180676e0657379c1e1a7ef9b8f0223e522e6fb2917ca,2025-01-18T08:15:24.327000
CVE-2024-13393,0,0,6c538726beb67e787d4cc0c97ae28498348fafb8453c26bd442a25ec75fb47c0,2025-01-18T07:15:08.810000
CVE-2024-13394,0,0,2f438b906efb781207eeefa07105a693bc0286f21e9f9257684cfec9ce3d8d32,2025-01-15T06:15:16.150000
CVE-2024-13395,0,1,dc8073c467a5ac8831c30dc516982a5bfe4a639d045be944b3794c1bb1bda722,2025-02-21T15:27:57.623000
CVE-2024-13395,0,0,dc8073c467a5ac8831c30dc516982a5bfe4a639d045be944b3794c1bb1bda722,2025-02-21T15:27:57.623000
CVE-2024-13396,0,0,d40dddb5bbef2ceb0d99779812d043b82b74e26f4354d1873d73eeffa86295bc,2025-01-31T03:15:09.993000
CVE-2024-13397,0,0,02f1ca5e9655c42bfc977bed181f9baeb574d1f47ee120196f480f736b1319fc,2025-01-31T03:15:10.240000
CVE-2024-13398,0,0,1cf1394b81ba2d9f5d04722bdb6d4c350d6d6a7eb8c0a059d873a1872c1d84e5,2025-01-17T05:15:08.613000
@ -246611,7 +246611,7 @@ CVE-2024-13433,0,0,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc
CVE-2024-13434,0,0,292fbae0324c9bc0e0a4304860c64d8e4dabea0f0444b12419bd12eebd083320,2025-01-17T05:15:09.290000
CVE-2024-13435,0,0,89f24bc446706fa5fcd2115cd25029503fee212a6b4fbe4fee449edba1db576c,2025-02-18T18:15:18.680000
CVE-2024-13437,0,0,ac4ee3cde1737eec9f740e3f4e2e3bc68da9f2e601434dcfb63740e8fa129b22,2025-02-12T10:15:10.920000
CVE-2024-13438,0,1,368c1d2de10ebc37c011dce97979d0a38fdf4ed2a5b5de964fc559be5e3d5055,2025-02-21T15:44:25.023000
CVE-2024-13438,0,0,368c1d2de10ebc37c011dce97979d0a38fdf4ed2a5b5de964fc559be5e3d5055,2025-02-21T15:44:25.023000
CVE-2024-13439,0,0,9977a2cc02f20b148bdbeb2cb70da6b957cfc1fa7b049bde9614c22678a6305a,2025-02-15T12:15:30.300000
CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000
CVE-2024-13440,0,0,5766e7a438a8e4269354aacca2cf4360d814b2b0ba936161bc318042a1e4abc8,2025-02-13T17:17:19.413000
@ -246637,7 +246637,7 @@ CVE-2024-13461,0,0,7310b23419daedb24e559d3e84e89095cccd323ffb73d8e4bc88880b2b6bd
CVE-2024-13462,0,0,bd808375ae18220a9dd6d9ebbed45c53c83edb8ab02aeb633cd1274f400f3576,2025-02-19T08:15:15.620000
CVE-2024-13463,0,0,a74bd740de3fc458ef5c03de3331d5acaeffdc8e1dd114982c1f405dca936e7c,2025-01-31T04:15:07.497000
CVE-2024-13464,0,0,c7ce95854847c11fde5a1ddc21e150442b9e815758c964241dcc7c0eae02ec39,2025-02-18T05:15:11.673000
CVE-2024-13465,0,1,ec8251f01c9f88d7585f9bf4822b9e6fe7e3358f78bb522053829572311149c1,2025-02-21T15:35:58.387000
CVE-2024-13465,0,0,ec8251f01c9f88d7585f9bf4822b9e6fe7e3358f78bb522053829572311149c1,2025-02-21T15:35:58.387000
CVE-2024-13466,0,0,ad9c9053e3167555f400e28f8c129f78ebaefbfea867abbbb84a69e9c4118ca4,2025-02-18T19:15:13.923000
CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000
CVE-2024-13468,0,0,f5287d148e3a11717ac8973e6248eb65dafac48689ef1e2f6acd92e99c685cd5,2025-02-19T08:15:16.027000
@ -246691,7 +246691,7 @@ CVE-2024-1352,0,0,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f6
CVE-2024-13520,0,0,0d022892f28692b2ae8762509ce4aad5b3f48413ebef3a0cfb18328336d55b8b,2025-02-20T10:15:10.167000
CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70b11,2025-01-30T17:41:52.897000
CVE-2024-13522,0,0,1ec5bbee168af71e2c569fc16b8aceb6b0c6360701cfbb6feabd58c3768384f3,2025-02-18T05:15:12.463000
CVE-2024-13523,0,1,a22589ae6ec5992efe47bdb0fb01b8cdac2a43ff89103cd45e22c3f11d842d97,2025-02-21T15:41:26.060000
CVE-2024-13523,0,0,a22589ae6ec5992efe47bdb0fb01b8cdac2a43ff89103cd45e22c3f11d842d97,2025-02-21T15:41:26.060000
CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000
CVE-2024-13525,0,0,974cc77357d10bdeddefe2341db48f6fd4cfe789b2cdee428681d1b46764d32d,2025-02-15T09:15:08.833000
CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000
@ -246723,7 +246723,7 @@ CVE-2024-13550,0,0,a4fead6d03b6144abe5ac40b03d52a1da2858d08b4f2df68e9fe9b57926c0
CVE-2024-13551,0,0,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000
CVE-2024-13554,0,0,593696d24f43140274834fa7c9a7ab6a89ace00d66aec05e7d998911a54b4ba1,2025-02-12T04:15:09.503000
CVE-2024-13555,0,0,3200643e8c32cab10ee18a48199edd6eb143f7592c7375364c0412c5fef4c9c9,2025-02-18T05:15:13.597000
CVE-2024-13556,0,1,227f79da3d8af7739955eed8b3ebf27bbbf505836c230601eee8e2a82464e9ab,2025-02-21T15:41:41.720000
CVE-2024-13556,0,0,227f79da3d8af7739955eed8b3ebf27bbbf505836c230601eee8e2a82464e9ab,2025-02-21T15:41:41.720000
CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000
CVE-2024-13561,0,0,2147326d45c7c96265106b6ff772f1393a83793dfac14b78a483fca6de875c16,2025-01-29T12:15:27.617000
CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000
@ -246734,20 +246734,20 @@ CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996
CVE-2024-13570,0,0,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000
CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000
CVE-2024-13573,0,0,4c15c78a9615e8ce64f7592c831c2a81f25bc5a0e24ca1c3a58f764690185d7a,2025-02-18T05:15:14.007000
CVE-2024-13575,0,1,16cadedde273d2e44dd03e3555b4c264bb672dfe1040b3f8027897e23779bbe3,2025-02-21T15:35:18.820000
CVE-2024-13575,0,0,16cadedde273d2e44dd03e3555b4c264bb672dfe1040b3f8027897e23779bbe3,2025-02-21T15:35:18.820000
CVE-2024-13576,0,0,d35998f4d69291c9bf0c6a64cbfb55e2da2868a469ebe7a1cc5d71e6b9258231,2025-02-18T05:15:14.157000
CVE-2024-13577,0,0,a40dbddd747a29435bc9cd61b63bc4b95a8a8703143f38d72b41d587221a2be2,2025-02-18T05:15:14.487000
CVE-2024-13578,0,0,ce304e79d496c1935a636594ed7d0ce3622b36585f28fc55bec0149ceaa84b2b,2025-02-18T05:15:14.913000
CVE-2024-13579,0,0,99ad1125b9e8cd7ccf0d5b4f2c0a1560bc0879f6c3e5b45e5019c65d65214c74,2025-02-18T05:15:15.310000
CVE-2024-13577,0,1,7ec226add5baf80fe65c72cfac22716a4ed179a333ffd2c2c08673fb55d268bb,2025-02-21T18:34:11.867000
CVE-2024-13578,0,1,2e03d593d9cc9c5cb01e1d2f1b7697601c3fdfe810a05cbd665a89f4ae6da901,2025-02-21T18:33:08.770000
CVE-2024-13579,0,1,9640388d79eec1df931f220b7238300cfc32ad9fa9f52686d215010fe1b6e407,2025-02-21T18:32:31.837000
CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000
CVE-2024-13581,0,0,c6817592c92440ad44a8fa228f7b53b9ed51e9e0cca7d9b47bb33079647af765,2025-02-18T05:15:15.590000
CVE-2024-13582,0,0,7aa6cafae2a67f9f655defd9ac99bed39ce0c4c8c5f69a27d738b628034d125b,2025-02-18T05:15:15.897000
CVE-2024-13581,0,1,23b802948fc1ec2e74b6a22e5bf61730cbf3169612c89a9c03c344016e0c5f8b,2025-02-21T18:31:11.640000
CVE-2024-13582,0,1,8d1bcfb1104599f11a579c3e54940cf5492586d1eaf9dd31aaec9254649458fc,2025-02-21T18:29:05.973000
CVE-2024-13583,0,0,74ad7b83b093ee530d03665dfed8aeb7981ef34d0b7fd0bb7def11fe8ca86354,2025-02-05T01:38:33.527000
CVE-2024-13584,0,0,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f364,2025-01-24T18:20:40.760000
CVE-2024-13585,0,0,ce9b902de9cd5c692bfabc19d03451112a70a2e40f445056b2c75ced2f282088,2025-02-21T06:15:20.557000
CVE-2024-13585,0,1,8b429a5fdcb1d17a6b9f6c7205b1c4a053bc1e58a2ece96449aff53b2ac13b99,2025-02-21T18:15:16.483000
CVE-2024-13586,0,0,031371a39e86dab11794d85bebc5761cfd2812bcdc21ab474a79e1589e56730a,2025-02-04T18:14:20.930000
CVE-2024-13587,0,0,720c8e9f332be08c97824f7294ce236301b592a585cd761de003bc321877436a,2025-02-18T05:15:16.267000
CVE-2024-13588,0,0,ff7590ea531a386de3592f06b0d190afe6e1a5e182fc0c9290b6473914c2c325,2025-02-18T05:15:16.417000
CVE-2024-13587,0,1,78718d4624faf32704d9f7233c2994e3a7207724b6cc3a9ba3ffea55a1b05b95,2025-02-21T18:26:02.027000
CVE-2024-13588,0,1,63f6205e8c2e76a94b6fb9e47b748b2b301f4ec9cc2a02b8acc0bf99fd9e40b7,2025-02-21T18:14:48.753000
CVE-2024-13589,0,0,8634e98206d01df693d56e69e48e93eb7f9edba40831365b0c5fb968bd98fabf,2025-02-19T08:15:16.453000
CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000
CVE-2024-13590,0,0,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000
@ -246755,7 +246755,7 @@ CVE-2024-13591,0,0,059c4cbd8eede965314c9395245280bcce16ff543735609c2d21c27a3fd9b
CVE-2024-13592,0,0,c09356b512438608a2e6306845fe8a94f1bd10d08c5c60fe45a11194fb74a4b0,2025-02-19T08:15:17.233000
CVE-2024-13593,0,0,fa3fece164aaf9e5bdce4149920be38daaf35514256e02e0d8ee1f95b69ca49c,2025-02-04T21:08:45.723000
CVE-2024-13594,0,0,e40694f60357c551d50cfd64c32b62fc5a068d57b870210e0ac9e99e736df254,2025-02-05T17:01:24.577000
CVE-2024-13595,0,0,857054eef2128780cfc93b39c44c7c6d11a927de9b29d4814b8b4c364f2d10c0,2025-02-18T05:15:16.710000
CVE-2024-13595,0,1,0af37cc42779bfca530d3961d770211d9305aca9c7ecdc98a5bd6399b4365465,2025-02-21T18:11:08.257000
CVE-2024-13596,0,0,2b347cb4a79836e676774e7c831f562b3de9868f3b716c19ca500dd58b6901ef,2025-01-31T18:16:35.347000
CVE-2024-13599,0,0,03405f2c3d79b505fbb84b1ff3dea79fdc81e050ef9a41f4a5537eddbfaf081d,2025-02-04T18:13:20.930000
CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb8486a,2025-02-05T21:46:19.363000
@ -246765,18 +246765,18 @@ CVE-2024-13603,0,0,fc202802068da8bc55cd46c39e4a97a0db9f2a327bd5fc1b7575fa3aa107c
CVE-2024-13606,0,0,3678a6b8c1379d0e1b01e3251fb76bf1b3c0d7e3ee42e4cf605940cc5ab858d5,2025-02-18T18:46:05.887000
CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e5527f8,2025-02-04T07:15:12.973000
CVE-2024-13608,0,0,b8b173401de3e1097c36a401f8928ae8cd5257912fc8cac1e3eea9f3234c491d,2025-02-19T19:15:14.260000
CVE-2024-13609,0,1,007c027106c3ec1d23edeaef367a828bff90431ee7cff957b7b00cd86e9cc2ee,2025-02-21T16:06:13.673000
CVE-2024-13609,0,0,007c027106c3ec1d23edeaef367a828bff90431ee7cff957b7b00cd86e9cc2ee,2025-02-21T16:06:13.673000
CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000
CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000
CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000
CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000
CVE-2024-13622,0,1,d2688be4d32a38fa0003e8b919920c245dea1fd4a1949bfeea892e9dd65d3580,2025-02-21T16:05:34.047000
CVE-2024-13622,0,0,d2688be4d32a38fa0003e8b919920c245dea1fd4a1949bfeea892e9dd65d3580,2025-02-21T16:05:34.047000
CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000
CVE-2024-13625,0,0,556dbc652a367567d8dc0a1aca4ef96fa3721288585ae7ce8b84a84c5a8c12d9,2025-02-19T22:15:22.630000
CVE-2024-13626,0,0,5f376c892890a386d15b17c9d9f7768803772784cb9f45a9f61e63e74ea1223e,2025-02-19T22:15:22.753000
CVE-2024-13627,0,0,faf1d9bd245281ef1f9edc55f8aca71639e95b5ef38efdbbf353c5fc7ae2924c,2025-02-19T19:15:14.720000
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
CVE-2024-13636,0,1,8f7090f3cee37c858f7afaf2983a2cabcdc65da940d26a01a270d2b24bb2e042,2025-02-21T15:21:17.950000
CVE-2024-13636,0,0,8f7090f3cee37c858f7afaf2983a2cabcdc65da940d26a01a270d2b24bb2e042,2025-02-21T15:21:17.950000
CVE-2024-13639,0,0,071381e5184000ecf8c72dcde14c2011c1cb4ea4b355e15fb5e9c5b4fb270c14,2025-02-18T18:15:51.587000
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
CVE-2024-13641,0,0,40196144b6370d50846f27868b94418a681b195f3122e85e15112c8a0d9b0dea,2025-02-14T06:15:19.957000
@ -246786,7 +246786,7 @@ CVE-2024-13644,0,0,103d60e076f3c7bd4ae30253359a8c34e6a584ab6c0d85823d2a2e5827ff1
CVE-2024-13646,0,0,df579ebc80f166383afd2bf72cceedaa012995a592dad78c8758f9a4e2dd62bd,2025-01-31T18:19:45.780000
CVE-2024-13648,0,0,f589efbdd78e1f30099fe430f3ef2d8f3f3a111a9876802924f438e5321ec20b,2025-02-21T10:15:10.927000
CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000
CVE-2024-13651,0,1,3106185ed2d2390fe0c7db6d51838d5c676d3b37bd6958033551790a08b59a48,2025-02-21T15:55:18.263000
CVE-2024-13651,0,0,3106185ed2d2390fe0c7db6d51838d5c676d3b37bd6958033551790a08b59a48,2025-02-21T15:55:18.263000
CVE-2024-13652,0,0,ed8d8236d1a3115f336400cbdd4ac56e250a414778c3b1c32835210395f1f04d,2025-01-31T18:21:53.167000
CVE-2024-13653,0,0,770f4a34ec62861070a9f7aec2b86de3f221ce9b95996de0b65265b14bc1c12d,2025-02-12T05:15:11.820000
CVE-2024-13654,0,0,2a35a17fe264f64bb6af7c966578a0e3f22643a1d92580b28b17070dab12d401,2025-02-12T05:15:11.987000
@ -246808,14 +246808,14 @@ CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693
CVE-2024-13672,0,0,98ff804d86690a48289eebd38819c69a1ea39c58f0316b0ac80ac7e733fd1773,2025-02-21T04:15:09.683000
CVE-2024-13674,0,0,ac3642212117e2e4dbcdf6bf845cb1df3b30736364ba81890bc6e7f12c727bf2,2025-02-19T08:15:18.823000
CVE-2024-13676,0,0,4f8bf0d44a971fbbb44d738bbf0fff36757bda864393a0685528bb1e1a4d43ad,2025-02-19T08:15:19.190000
CVE-2024-13677,0,1,13401c1b73282722904b75cd499f0a3bc9825602c732ed33fda81e11a6c0d93a,2025-02-21T16:03:44.037000
CVE-2024-13677,0,0,13401c1b73282722904b75cd499f0a3bc9825602c732ed33fda81e11a6c0d93a,2025-02-21T16:03:44.037000
CVE-2024-13679,0,0,be4c7776f570cfcb80df59f8e2fc23e16ea058f72d1ce76bfc1747acc3dfaf40,2025-02-19T08:15:19.623000
CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
CVE-2024-13681,0,0,f9b5888e5600eddb54eab02d107b8219d0a2ff1dd821d3ec69a804f466f47fda,2025-02-21T14:22:38.737000
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
CVE-2024-13684,0,1,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000
CVE-2024-13687,0,1,8a954d90e2ecf3e0bfefe90b1ebf331e7dcd9b3ff81bc3892382c9536696e182,2025-02-21T16:00:16.287000
CVE-2024-13684,0,0,29bd0282adaed7c145caec3d49c703050082025937ad2fcfe46d4b20fa2f4a61,2025-02-21T15:57:57.993000
CVE-2024-13687,0,0,8a954d90e2ecf3e0bfefe90b1ebf331e7dcd9b3ff81bc3892382c9536696e182,2025-02-21T16:00:16.287000
CVE-2024-13689,0,0,580ed5bdddc877a6b1d4ec6f1abe3105a7f67f812d85021b3af64f6e62676730,2025-02-18T15:15:15.547000
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
CVE-2024-13691,0,0,e2ffbabc297e59a5c1d2ebf52a7761c6c116f558696876672f6c292ae9c9a1ee,2025-02-21T14:22:06.687000
@ -246827,7 +246827,7 @@ CVE-2024-13699,0,0,6c179d99e1e68d225e4cf32bfc134108fb7e1de353e5a047f158d68ed9ec8
CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000
CVE-2024-13700,0,0,9ce20ac3b11103f5abdc5f2758b97ef5dcc76de719f13fdbcb103d53e58691eb,2025-01-31T16:49:24.477000
CVE-2024-13701,0,0,f834def27c90b870381ae372b4e05326550a31cd496de38386bfaad9d9f3cc5e,2025-02-12T04:15:09.647000
CVE-2024-13704,0,1,edacb1bf034aad21d3de74c25d716996b7c2a06ccbd4adcf15412220d4bc97f7,2025-02-21T15:34:38.797000
CVE-2024-13704,0,0,edacb1bf034aad21d3de74c25d716996b7c2a06ccbd4adcf15412220d4bc97f7,2025-02-21T15:34:38.797000
CVE-2024-13705,0,0,5ec6ac499cda9ee218cf1587251a6725974948adf52db55dc1b1fdc60e1d5cc2,2025-01-31T18:17:10.220000
CVE-2024-13706,0,0,ab3c260451f5aeaf628499ae0037d8fc16844264bd9ec15ebc42f8eab05dd8b8,2025-02-18T19:15:14.357000
CVE-2024-13707,0,0,032e2a9cb1b090228bf905c1e52e11efae679d2f0165154d533e21d339074c69,2025-01-31T18:12:42.913000
@ -246839,14 +246839,14 @@ CVE-2024-13713,0,0,325bf5535693a886456d4dc30288f32e2355aa6c0f7fe640457617c4bf8a5
CVE-2024-13714,0,0,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000
CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000
CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000
CVE-2024-13718,0,1,2a66de61882126095d3053f4a883ea3530a7a8c40923166079a0a9d06dc8603b,2025-02-21T15:25:03.847000
CVE-2024-13718,0,0,2a66de61882126095d3053f4a883ea3530a7a8c40923166079a0a9d06dc8603b,2025-02-21T15:25:03.847000
CVE-2024-13719,0,0,96b9dda9a58b9bd7960bc82f0f45bdf70117123abedc9395edc605858d81a5c6,2025-02-19T08:15:20.737000
CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000
CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd2f2,2025-01-30T18:44:43.053000
CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000
CVE-2024-13722,0,0,fac6574297fad520484336a8f32a80c91be5643d31918d246727bb21994df2e7,2025-02-06T15:15:12.867000
CVE-2024-13723,0,0,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f870,2025-02-06T15:15:13.050000
CVE-2024-13725,0,1,3ae67647de598849d6499031064f2ab84aae12fe373705e9378e4edd2b924528,2025-02-21T15:56:24.220000
CVE-2024-13725,0,0,3ae67647de598849d6499031064f2ab84aae12fe373705e9378e4edd2b924528,2025-02-21T15:56:24.220000
CVE-2024-13726,0,0,6f933b5330ba37986acbe4c29892bcb7173ac142380eeae5f3195ee1c4836999,2025-02-19T22:15:23.043000
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000
@ -246878,7 +246878,7 @@ CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062
CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba37212823df,2025-02-14T11:15:09.320000
CVE-2024-13792,0,0,5eea2eb9c2e9b718585e09fb9464cf4787dcedab1db15551defa783e010d8240,2025-02-20T10:15:10.850000
CVE-2024-13794,0,0,27d6b89d805464403aa5cd7b47bffa4f0df39472970f2a8182a5a27be68e3d41,2025-02-18T18:15:19.290000
CVE-2024-13795,0,1,5c01555cf2ad62d519339aa7fca734aa9775ae1bd36f752424bbf014d4c482c0,2025-02-21T15:33:49.100000
CVE-2024-13795,0,0,5c01555cf2ad62d519339aa7fca734aa9775ae1bd36f752424bbf014d4c482c0,2025-02-21T15:33:49.100000
CVE-2024-13797,0,0,784cf91e048f4958bdad15f96921115cca7505f76e057d124aec3331890c0072,2025-02-21T12:17:17.200000
CVE-2024-13799,0,0,ec8cb514ef31404e1cd13657eea18c026b0b0f4d5ffefec8356a7aac820d1c0c,2025-02-19T06:15:21.283000
CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000
@ -246901,11 +246901,11 @@ CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede1
CVE-2024-13842,0,0,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567fcd,2025-02-20T15:55:29.770000
CVE-2024-13843,0,0,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000
CVE-2024-13846,0,0,7a6b2d68f6b35a1c0346eb229a9db02fce41ef7ca697acebf08e29ec1c1313dc,2025-02-21T12:15:30.183000
CVE-2024-13848,0,1,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78ceadbd1,2025-02-21T15:51:59.213000
CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78ceadbd1,2025-02-21T15:51:59.213000
CVE-2024-13849,0,0,d98f7937784c29e9abe71d6667822b62b2ca578c3586a491787af9ba63c49a21,2025-02-20T10:15:11.330000
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
CVE-2024-13850,0,0,6b9449e6648abb1edf82833d79485652b7d8e214965b03129c424b1f771ff336,2025-02-08T13:15:06.840000
CVE-2024-13852,0,1,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000
CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000
CVE-2024-13854,0,0,da76605e45e5cccb1e4ac357ef915fd87a7797a2aa194293a861365173d04915,2025-02-19T08:15:21.440000
CVE-2024-13855,0,0,87ff80a4a4bcadf924c0b68cea8cd371d8a19ee5f045d490959e15e51f021d88,2025-02-20T10:15:11.530000
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
@ -251700,7 +251700,7 @@ CVE-2024-25369,0,0,1a5279686e5277f0474570d04c1907565b1c826db6e265d9d5232bbf5aaaa
CVE-2024-2537,0,0,245581af9cb0004fabdffbfca72e0fda0e6cf99c56b5dfae5408c1dd2468d6fa,2024-11-21T09:09:58.103000
CVE-2024-25371,0,0,02370958f1fcb5a2b09fff3d567983d7c7d1e4ab210b6dca6193d9dd108edb58,2025-01-14T15:15:14.490000
CVE-2024-25373,0,0,d4bb0f33d1aeb2a5a53c5ed2764be7945bf1d210aae7d091cb88bf312c0ab5f9,2024-11-21T09:00:41.553000
CVE-2024-25376,0,0,b9162f08a32a4213913d51b909fda1191d4711871cec0062f7a25dc6ad917cb9,2024-11-21T09:00:41.780000
CVE-2024-25376,0,1,527942be27854de4efe810bbff7f3ba932add1dd20642033fae33518b7242246,2025-02-21T17:15:11.430000
CVE-2024-2538,0,0,b85aea9765c05329fd4e9b8025754899d55685165e7227e89329268047059847,2025-02-05T18:15:22.620000
CVE-2024-25381,0,0,41718fab1364a06f6dcb130d239d6764dc030d3199b449114ae1d63e5d3a6ef8,2024-11-21T09:00:42
CVE-2024-25385,0,0,59ac22d49f2fad863547dec5a90c0c7a9b9f0475e0a1175434939147054bace5,2024-11-21T09:00:42.210000
@ -252679,7 +252679,7 @@ CVE-2024-26686,0,0,c1cdfdf069774f9f1a258f3fcde20f093223b3fed9526d89f0a4d95e2acb3
CVE-2024-26687,0,0,55d2e164366a53f2463770b85dedb6b40cdbd484c5c1068cd2bbd41cd0d1cb60,2024-11-21T09:02:50.820000
CVE-2024-26688,0,0,a0933753ecf706512391da968c1bf6e01179d03229619ccebb51447535c3b458,2025-01-07T21:12:29.727000
CVE-2024-26689,0,0,45aef623305996e79be3f7e9accf7726333231f3f2e12fd9e4b9fa27d10e7a24,2025-01-14T17:26:26.393000
CVE-2024-2669,0,1,f9471b163440c0cdda967029f9665700cf935edd6c2a1bb0a81b9e232cd43f09,2025-02-21T15:14:07.237000
CVE-2024-2669,0,0,f9471b163440c0cdda967029f9665700cf935edd6c2a1bb0a81b9e232cd43f09,2025-02-21T15:14:07.237000
CVE-2024-26690,0,0,2c7b24fb82937969d4004e2fcf893dbb69bba8a0a64d7e77bdd23c96decb3399,2024-11-21T09:02:51.193000
CVE-2024-26691,0,0,7878b9be6d1b840ce81b6b9ba5d2bb037a477b0ec0114b4a6fa216b7702e37ca,2024-11-21T09:02:51.377000
CVE-2024-26692,0,0,e7f487356d74c96106975bf2abfe9db6d6da6422f0939133b174aaec264ed9e0,2024-11-21T09:02:51.487000
@ -252690,7 +252690,7 @@ CVE-2024-26696,0,0,265278528371538cc023600a4c7d8dbbc5ef61d12e3796a87a5522e53c60b
CVE-2024-26697,0,0,45e5cf8cc205b6572bf2614df87fc02ee354aaf14f2ce522f92421e8870dc643,2024-11-21T09:02:52.090000
CVE-2024-26698,0,0,f3c474569b48f60e66044478a18c11a89915914693da10adf07718688bd99993,2024-11-21T09:02:52.217000
CVE-2024-26699,0,0,0b80c7a4d186d8dc0c9dedc04a03a65f2409d878d3e6a8441dd6b732b9a45aeb,2024-11-21T09:02:52.340000
CVE-2024-2670,0,1,8bf571b45e5a0f9f2f2f7f29218c47b9f435fc3d26bbb11853c68d013882dc52,2025-02-21T15:15:55.763000
CVE-2024-2670,0,0,8bf571b45e5a0f9f2f2f7f29218c47b9f435fc3d26bbb11853c68d013882dc52,2025-02-21T15:15:55.763000
CVE-2024-26700,0,0,d340b64f76c76c9e47b3fd93523ba35bc98d09d990c5461e898e1d4216e0399a,2025-01-07T20:26:40.460000
CVE-2024-26701,0,0,b03e1ce32248050afb32bc7948ab24791df0affca83332817771b6e5cd8267b8,2024-04-03T17:15:50.720000
CVE-2024-26702,0,0,b5af06f31671bccc450c0989ef4ab99a946595a7c4a168f34f6c9ec495d6a954,2024-11-21T09:02:52.640000
@ -252701,7 +252701,7 @@ CVE-2024-26706,0,0,b6e079a708d094b83bb5d7417439ddccf1c4f1876e5690709f65a27475209
CVE-2024-26707,0,0,1806350bbacbb6f76de5db409398dc8a7b1e6f15c7084d9e746c55e2adf05efe,2024-11-21T09:02:53.313000
CVE-2024-26708,0,0,47ec8499304cab94bfbfa9b8a22b56db0f85ef56b77fce5b97de36f3113336c9,2024-11-21T09:02:53.433000
CVE-2024-26709,0,0,84265dc256d943df4540d48ae1b11a8d0310b66ecceaef365d267322aba660bc,2025-01-13T20:03:28.797000
CVE-2024-2671,0,1,feb61bcc32f9be1106f3722b1adf31c8f856b81af916505898aab968cf19b588,2025-02-21T15:22:57.597000
CVE-2024-2671,0,0,feb61bcc32f9be1106f3722b1adf31c8f856b81af916505898aab968cf19b588,2025-02-21T15:22:57.597000
CVE-2024-26710,0,0,6ac3ed3e058c9245f76455df758aa5822954706d5927ffde47193e09cb8d8b8c,2024-11-21T09:02:53.723000
CVE-2024-26711,0,0,8dccb84b3c19a8be9b5c23386e56431114b107c936ab5d88e825fada25c33413,2024-11-21T09:02:53.837000
CVE-2024-26712,0,0,fb8685ddd0683cdabb2327df61ff8cea2e7e86fcfa201af9434b63269c960077,2024-11-21T09:02:53.947000
@ -252712,7 +252712,7 @@ CVE-2024-26716,0,0,fd0bb09e387c4c792e9af49d76ec08db20adb4a2f2405ca74a5c652c09a1a
CVE-2024-26717,0,0,46c391c98b1b32eddf64a008a07bf662b627805646f0b2a7812f9b60cc4c81f0,2025-01-07T21:16:14.697000
CVE-2024-26718,0,0,b71c0a254c7aad42c306d673849eee87146b27e1c3e5db37335467c2a89b2d97,2024-11-21T09:02:54.723000
CVE-2024-26719,0,0,127c79e4e3640043dfa27a58f7d546dc2b243e766cd4031de3f639ee197dca89,2025-02-03T16:17:03.783000
CVE-2024-2672,0,1,a76eae905fe5c5af825e8e36531b8c12dabfcf0af54a0fb3b1e790b12eafac1c,2025-02-21T15:25:55.243000
CVE-2024-2672,0,0,a76eae905fe5c5af825e8e36531b8c12dabfcf0af54a0fb3b1e790b12eafac1c,2025-02-21T15:25:55.243000
CVE-2024-26720,0,0,1ca9f5c1cf45272d711bbb341b9a3a3e8a66cb323b330efba47b2d4d73910e9a,2024-12-19T12:15:06.417000
CVE-2024-26721,0,0,ca9a0496ef9381a3510ada8cf6ba88673a4cc89acefb09f26c80679837546878,2024-11-21T09:02:55.100000
CVE-2024-26722,0,0,12d674d56dcf1067f7c24e779fb92b06855d0b7019ccfecfbfdcc292981abf0d,2025-01-07T17:35:32.710000
@ -252723,7 +252723,7 @@ CVE-2024-26726,0,0,a2e6006099000b7188e7331f1757708510f6f822879749731a4c6d16b7b3a
CVE-2024-26727,0,0,f9e493a2bebe6568fa8635c090fa7c3e7b404bd3fd35053c77015e7873b7cdd0,2024-11-21T09:02:55.880000
CVE-2024-26728,0,0,7a1b5252bba1cef22267913e083366e2f39c736eb8eef161449f7ded9aaebcba,2025-01-07T21:15:57.473000
CVE-2024-26729,0,0,24cf9adc4db4b9564630e9709ebc75b534e05f18a43df73e371a82f4fe1149a6,2025-01-07T21:14:13.190000
CVE-2024-2673,0,1,3b348684b11f482dbfdc6a99c2eb24f4a48803ca091c7188ef07e5a51620c9f8,2025-02-21T15:31:50.453000
CVE-2024-2673,0,0,3b348684b11f482dbfdc6a99c2eb24f4a48803ca091c7188ef07e5a51620c9f8,2025-02-21T15:31:50.453000
CVE-2024-26730,0,0,4282f275af7b9ab810034661a7d2fe758e353eb17c2f903213e76a01d8248927,2024-11-21T09:02:56.220000
CVE-2024-26731,0,0,93df8098dbc8b35339297c34d2cc186ab96abe59edc56773a7bed56c8ef330b4,2024-11-21T09:02:56.323000
CVE-2024-26732,0,0,93d68c2245823b23f9cd1f7e63a32b54ddda53966feab1e3f497dd7c79e0833d,2025-02-03T16:17:25.537000
@ -252734,7 +252734,7 @@ CVE-2024-26736,0,0,b29129ddb5d3afb3852cff1b0fe131c66351f86286513d203d1c2dae3f9ca
CVE-2024-26737,0,0,03a6f3a24bd6f11bc15a839c4e708d9160bb2b3e53fb885adad418a2aca958d6,2024-11-21T09:02:57.210000
CVE-2024-26738,0,0,7401dc8ccba47014fc09b50b349b2fbe5d1a660cb458a9c717c4b0bf3e62c9a2,2025-01-07T21:13:43.273000
CVE-2024-26739,0,0,3e91524254897924d33159faf525041742412059c301b8791dc3047a5453f1e7,2025-01-07T17:28:37.057000
CVE-2024-2674,0,1,80a66d2afa37b26f97e60d6fdea15af0c59deefece42bba01a8930d39e5e7d3e,2025-02-21T15:49:25.710000
CVE-2024-2674,0,0,80a66d2afa37b26f97e60d6fdea15af0c59deefece42bba01a8930d39e5e7d3e,2025-02-21T15:49:25.710000
CVE-2024-26740,0,0,5c985b6d9944a225321eb8d8626fe328a08a180b8b9ad6ec1127b25a27e4e7b4,2024-11-21T09:02:57.653000
CVE-2024-26741,0,0,07c5a92acb340b29068c32dceb2487e34761abe12c58d1829d69712440cc0bbc,2024-11-21T09:02:57.780000
CVE-2024-26742,0,0,e0e60fb6f1d49178708e8d427e4aba631ca93532220f47d194a5e78164a7a57e,2024-11-21T09:02:57.910000
@ -252745,7 +252745,7 @@ CVE-2024-26746,0,0,86aa0528dca44c4fb5b6b5072954273d7d042341aa7f2115eafd32b46402b
CVE-2024-26747,0,0,323d7942a2bf93956c96ff7aa8e4bf36497c276d5a0d7fc71fdc942c53c206ca,2024-11-21T09:02:58.743000
CVE-2024-26748,0,0,de80e1b40a25ded51f067fff844d8e2ac1ed0e390911ce7796a7ad960020e65b,2025-01-14T17:27:49.057000
CVE-2024-26749,0,0,aa7e7096104dbac75ed8cd854b66b0ce094be82817161ad941c47ae83e7cde08,2025-01-14T17:28:07.793000
CVE-2024-2675,0,1,a432f663f36093d2797dff29d97cb824a0923a29fe5d01cf99dea2b13534d1ca,2025-02-21T15:52:43.843000
CVE-2024-2675,0,0,a432f663f36093d2797dff29d97cb824a0923a29fe5d01cf99dea2b13534d1ca,2025-02-21T15:52:43.843000
CVE-2024-26750,0,0,94dd61c3c28ff5b4b8be06dbb38fde205c5b9d50e1d14542fa5032faf9ddf704,2024-11-21T09:02:59.203000
CVE-2024-26751,0,0,1e619e8fe0318e1c48482a9e82bff0725291c1d0b69bffec38f5e08d3f2af80b,2024-11-21T09:02:59.333000
CVE-2024-26752,0,0,8b44b0cbe238350cd3aba9d2cef251b57898811e1fd6d1e9877c06b446f7e0df,2024-11-21T09:02:59.473000
@ -252756,7 +252756,7 @@ CVE-2024-26756,0,0,277504566c3f61e232c5a3428990fe53a476b409dd55cca3fc33763192194
CVE-2024-26757,0,0,ea19223d6591c0bb304a57b49e3343899072ac606ffd2b71bfbed5f59d9bfd66,2024-11-21T09:03:00.147000
CVE-2024-26758,0,0,c89d8554b475b329ed0ac9ff1b69624897deb142b13dfbc35a85f8d82feeb354,2024-11-21T09:03:00.333000
CVE-2024-26759,0,0,c16a8feb5c03575808a38e891cf9c009a3d4bd2625d12119e088f14de118118c,2024-11-21T09:03:00.527000
CVE-2024-2676,0,1,909464e30d2c10e8a9af079a102bd07a257c9534a32f512f1c3ed8618aa3e4c5,2025-02-21T16:06:24.990000
CVE-2024-2676,0,0,909464e30d2c10e8a9af079a102bd07a257c9534a32f512f1c3ed8618aa3e4c5,2025-02-21T16:06:24.990000
CVE-2024-26760,0,0,69e0e20e1edd89e10f4f5528addc8b53eb3e58f943a3723b3ee4ced16f81ba3d,2024-11-21T09:03:00.647000
CVE-2024-26761,0,0,aa1a20a0803d63a54b19e75f2a8a8f8bec9c12a955e5a2a8d3004b5d801f81f9,2024-11-21T09:03:00.763000
CVE-2024-26762,0,0,a287f1e9fd29a626fe10dbe6954ee97461b04e8a4deb899f82974d34c52e8f61,2024-11-21T09:03:00.880000
@ -252767,7 +252767,7 @@ CVE-2024-26766,0,0,68fc4b89d6403948bcb3c1a46456d541b6b2a5a051c19a0f4b0d3b1b2c089
CVE-2024-26767,0,0,e4a372ff53fbe10d1d76dcedc9f9b1e20359a57170473ffbbac7226ab5aeb4f4,2024-11-21T09:03:01.447000
CVE-2024-26768,0,0,6fafd2ec3e7cdf9346d5cf413e5e98785829ef156a7452d7bcbd56c557bb4b27,2024-11-21T09:03:01.570000
CVE-2024-26769,0,0,9ba21540aec936514403e64bdad200b6edb1d7f751bc14c530bdb954115ae255,2024-11-21T09:03:01.763000
CVE-2024-2677,0,1,6a44ca783f96afdf6daeb2ac346e3e6dbf371bf3fa88ba024936355e01095fea,2025-02-21T16:16:38.053000
CVE-2024-2677,0,0,6a44ca783f96afdf6daeb2ac346e3e6dbf371bf3fa88ba024936355e01095fea,2025-02-21T16:16:38.053000
CVE-2024-26770,0,0,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c490ac,2025-01-27T14:58:19.130000
CVE-2024-26771,0,0,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000
CVE-2024-26772,0,0,fe8524e99fc68d449508f3ebfd8f6afb4c482f632501c09f5f84e454baa54b83,2024-11-21T09:03:02.190000
@ -252778,7 +252778,7 @@ CVE-2024-26776,0,0,df60d24175807dcc1374919feb99e25e818fb7996e5941b5c63c03df3065b
CVE-2024-26777,0,0,8288575773c8b9e98cd7567bfb1c915cea2788a3ad332ac377ebf312fe765642,2024-11-21T09:03:02.893000
CVE-2024-26778,0,0,eaee91601af1eee3696590fba0d785b9e73f9a5f1749926c481404d032d40a2b,2024-11-21T09:03:03.020000
CVE-2024-26779,0,0,d1dc3ab9d0793413ef8d6f7d472f6b251827d39f169d2e3624611da23e742948,2024-11-21T09:03:03.160000
CVE-2024-2678,0,1,1b8569b660baa62f28f36408544cf75e14fd1bbcb0868691da73c3b9150b92e8,2025-02-21T16:19:14.340000
CVE-2024-2678,0,0,1b8569b660baa62f28f36408544cf75e14fd1bbcb0868691da73c3b9150b92e8,2025-02-21T16:19:14.340000
CVE-2024-26780,0,0,fee0ab2d14222179966bcf01d07c058d2d30ea8f43041aa94eb3ef9c96c6dd91,2024-11-21T09:03:03.370000
CVE-2024-26781,0,0,8363890f5e40c49be0f36bf4bb23c5384620993df3f14b874ae1a4280c959004,2025-01-07T17:11:31.483000
CVE-2024-26782,0,0,55ed570f6e1cef5c54e218da555ee7a45ff77501097bebd5d3acda607a85eb10,2025-01-10T17:44:44.130000
@ -252877,7 +252877,7 @@ CVE-2024-26866,0,0,756688ec73c3d1d3b26008c60785a42a61b0c4d24a84e40b003bd3a768e21
CVE-2024-26867,0,0,f4c3e98cf18f5362ba9d8cbace769954683f72425fbef623fdb1cff3c29bca91,2024-11-21T09:03:15.117000
CVE-2024-26868,0,0,470780f3eedbe54e0715c09aacacd15d602e690928f9f1f3cc056aa7f149c140,2025-01-14T14:45:52.020000
CVE-2024-26869,0,0,02922038ad2af42246888c4202e00a6e69990dd39e8a7ee4b0bde6c82bbc6099,2024-11-21T09:03:15.370000
CVE-2024-2687,0,1,6f0c6f512aea2d159b998919ae3a9f3bca3478e9a3a7d98bdba876ef95bb49f0,2025-02-21T16:30:17.263000
CVE-2024-2687,0,0,6f0c6f512aea2d159b998919ae3a9f3bca3478e9a3a7d98bdba876ef95bb49f0,2025-02-21T16:30:17.263000
CVE-2024-26870,0,0,2bd6a183ad1975d0b6c0de2939cb199738c8340cd55c7843614845b5df49e754,2024-11-21T09:03:15.490000
CVE-2024-26871,0,0,869aa89d9c16dccb1fc19ae6f3deafd10c976839580428434667c5b886257213,2025-01-14T14:46:37.293000
CVE-2024-26872,0,0,773bd0049df3a502bc881bea139866eb1ac745c3ead80bada6bc450bdf539b7a,2024-11-21T09:03:15.740000
@ -253145,7 +253145,7 @@ CVE-2024-27112,0,0,12b7db48eaab61d03d7eb1e2934fe0ec85a795c19f68b02a572bb40d62a6a
CVE-2024-27113,0,0,4bf43d1f1f29896d4bf8ba2c9e6966a54a7fa2d6ad003f0b20bc4337c6110a9e,2024-09-18T18:43:00.140000
CVE-2024-27114,0,0,5a8a21436b0cd49ec6171202416788b05b7f3a1673fc30681bbd00b32cc0691d,2024-09-19T14:27:11.790000
CVE-2024-27115,0,0,23a704a991128549e4058297cc183510e2f019911bda8330d9d373e7628e6883,2024-09-18T20:32:26.717000
CVE-2024-2712,0,1,4b93906e16ec65f8a2d1c9643b8a3d1325498d99545c57b1745107946880b7c9,2025-02-21T16:46:24.487000
CVE-2024-2712,0,0,4b93906e16ec65f8a2d1c9643b8a3d1325498d99545c57b1745107946880b7c9,2025-02-21T16:46:24.487000
CVE-2024-27120,0,0,978b2d808accd7bc8081bc8a0bd6550ccb316467ae17faddcc157095d9d04beb,2024-08-20T19:08:54.490000
CVE-2024-27121,0,0,be0329e24db65a8da36a413498190604f5646307297a4d866c7be2e68be90acf,2024-11-21T09:03:53.850000
CVE-2024-27122,0,0,185f0648513e97bbf03bb758600504cd9e9f116f22af26eb5d561914b444f922,2024-12-20T15:48:58.860000
@ -253155,7 +253155,7 @@ CVE-2024-27126,0,0,3793bc1732fc2d346704b0b1504a0754792f903d694561b105633abfaff80
CVE-2024-27127,0,0,56f7770e9c17ad7419c2c7a4c9b3a0f42f7e5ab48afbee6ee86b77eec58bfbe7,2024-11-21T09:03:54.430000
CVE-2024-27128,0,0,25abf69fc83895a13784e9349a98139b1d75374ed7ab65f669ba6c5628c6f842,2024-11-21T09:03:54.590000
CVE-2024-27129,0,0,675d38ad59f656bb9de2a8532dded9ee79e6e9ec1860c1ad35fe28a7fec1161e,2024-11-21T09:03:54.740000
CVE-2024-2713,0,1,b2518ab10e4dc65814b0dfd3420756fc9f13df34abea659276817fd99b20af69,2025-02-21T16:47:44.787000
CVE-2024-2713,0,0,b2518ab10e4dc65814b0dfd3420756fc9f13df34abea659276817fd99b20af69,2025-02-21T16:47:44.787000
CVE-2024-27130,0,0,c9d6b28e2a18273de881a42f0dd25c4fe8494c26ad6475c525d0437de22d4449,2024-11-21T09:03:54.880000
CVE-2024-27132,0,0,97112c2430a1efdd24acd2d9a19461523930f5b80f33a45ebf983e3f77055e65,2025-01-22T14:15:26.130000
CVE-2024-27133,0,0,0bc1efdc0e9ed092d39790d962760e4b53b0fb29de201e5b7a8c363318010504,2025-01-22T13:46:56.667000
@ -253165,7 +253165,7 @@ CVE-2024-27136,0,0,bb37721f8ed99b1ce670c8cc12d36d4a8ef9b3720f3c4a42663714f551f67
CVE-2024-27137,0,0,406ba8cc1005b2f95b39ccb2925e400d63ab30eca0da28ad8c183d1a82564e36,2025-02-15T01:15:10.420000
CVE-2024-27138,0,0,a1f246d3f04fa003abe3c6091fd793bedb6f5dde95bf6dd32eacf1451a4a5a52,2025-02-13T18:17:20.050000
CVE-2024-27139,0,0,0ff86b04adb0fc7c1c33cb6bd863a62db5b9916e1f7bb82deb2ed5771b9ccaa6,2025-02-13T18:17:20.287000
CVE-2024-2714,0,1,b7ff31657727354bf5b6bb9b78b96d7a91d48c3c84177401bd09ae418852e7f1,2025-02-21T16:41:36.737000
CVE-2024-2714,0,0,b7ff31657727354bf5b6bb9b78b96d7a91d48c3c84177401bd09ae418852e7f1,2025-02-21T16:41:36.737000
CVE-2024-27140,0,0,8e2969cd571f810b8fe5ed4e874643dd3577e2db3bcdd03e58688527595650e8,2025-02-13T18:17:20.490000
CVE-2024-27141,0,0,b2de5b269da6e425f930c7b3223b824a3400296bcab35f8eb1de8e43d4cd41d7,2024-11-21T09:03:56.060000
CVE-2024-27142,0,0,8e5886895b7cb2f5e77869b5c90229b5dc990358f909e5d479539fef65fe3d7b,2024-11-21T09:03:56.237000
@ -253571,25 +253571,25 @@ CVE-2024-27656,0,0,68f3453eec67e27bd69569bc008dd807d641f5cc4dd19bbc4b6e65dd6883e
CVE-2024-27657,0,0,aa83ece6f7ede02f84fcbdbfb40aa14e1e784ec9454470534310c727804b3979,2024-11-21T09:04:51.290000
CVE-2024-27658,0,0,ec2bdec5247f3c97bd8546879baee27bca19da5c364ab8a35116d58a9e5e25d3,2024-11-21T09:04:51.503000
CVE-2024-27659,0,0,2f78ac40c65414d5d1c59c189d21ae35d2a9ecbb557df1e8dd5ee3e398e64600,2024-11-21T09:04:51.713000
CVE-2024-2766,0,1,de51f5ecc0e7ecad5af7ae30bc6aebed0c074fc036092bd677e69185173b5884,2025-02-21T16:56:50.517000
CVE-2024-2766,0,0,de51f5ecc0e7ecad5af7ae30bc6aebed0c074fc036092bd677e69185173b5884,2025-02-21T16:56:50.517000
CVE-2024-27660,0,0,835ac63ab012d73e58b5daf1fc09a9c03cb7c25a8cb7d04cf00ed24bee7d8f19,2024-11-21T09:04:51.933000
CVE-2024-27661,0,0,cd47d5ad50a1483352849e84cca220184c60f0c47ac978c4451290afc18a5f3f,2024-11-21T09:04:52.157000
CVE-2024-27662,0,0,91e7bd9706f6bfa8a26a1422fc84aa4cc748e01c07009e6625a25cad5d5fb1b3,2024-11-21T09:04:52.400000
CVE-2024-27665,0,0,d3058ef20841fa8a41f5abbcdc1600eb1abacf632b9f9e89e0646ba4b85eddd5,2024-11-21T16:15:23.677000
CVE-2024-27668,0,0,116e8cc6e476911f17a7640007f3a1a6213d9752178aff6ef55c8dfa8afd7aae,2024-11-21T09:04:52.770000
CVE-2024-2767,0,1,9d4b13e3def7f38db3b6a06853d5184f33e7cbd07b686b0ba35c53dba43e694c,2025-02-21T16:59:39.160000
CVE-2024-2767,0,0,9d4b13e3def7f38db3b6a06853d5184f33e7cbd07b686b0ba35c53dba43e694c,2025-02-21T16:59:39.160000
CVE-2024-27673,0,0,b827936180312254f56c8c18e1a9e00f4dbc9d441e499ec6aaa928d4b3451535,2024-04-03T16:15:07.173000
CVE-2024-27674,0,0,34ccb3f85191f3225246fe31e6b6aa02ad062724f279521d20a183c721e94258,2024-11-21T09:04:52.927000
CVE-2024-2768,0,0,4b397a5a3428bcae5b00748d98f31427940a4b391a5d38b4e6375b1f9c647f49,2024-11-21T09:10:28.463000
CVE-2024-2768,0,1,2f5d816641a32f83856eadae154a4a4fa038192a49084bfaa47992c7e84ac4ec,2025-02-21T17:07:47.053000
CVE-2024-27680,0,0,03e0b85897908f590edededca26ae33bfb173df38dd28e91259cc537ee4bbbf1,2024-11-21T09:04:53.150000
CVE-2024-27683,0,0,e240f9a72cf4b7568ca46ea6bb64ddcf3a6ec5aa03a9416b260ae22da9008b86,2024-11-21T09:04:53.367000
CVE-2024-27684,0,0,8f9956a4a0b43c906740d1106a32a742a9fcef0903170255a4a05b3de7b55181,2024-11-21T09:04:53.583000
CVE-2024-27689,0,0,b8125c9204d9b7912d4a758cf2a362c6f50eefc46a69eade4a7f53332972070e,2024-11-21T09:04:53.813000
CVE-2024-2769,0,0,755e4f123f306a6d0cffa224db743f0c95f41105e79a412d7a533d67df142550,2024-11-21T09:10:28.620000
CVE-2024-2769,0,1,4ac495a42f8890ffa14a3e84c257dbc8406f584ac86aa46dc84a11abd8c40b98,2025-02-21T17:14:54.783000
CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfdc36,2024-03-01T17:15:07.617000
CVE-2024-27694,0,0,65be1510c627f1b7ae975b30c061f7f32000663aae7cc739ce3905e521a11919,2024-11-21T09:04:54.060000
CVE-2024-27698,0,0,d2be8f7c8e71227d00832ec4e65de145e12c9d05abf2103ca0b08b325e7399ca,2024-03-09T23:15:49.403000
CVE-2024-2770,0,0,f7fd6efc5b5fb0bc4f7de21ab91633224b4e1f6dde315f2ccddea627275d9adb,2024-11-21T09:10:28.753000
CVE-2024-2770,0,1,b8c141c3150f063d7bf002b94681992fc65f55582aad98110bfa782a792ad95f,2025-02-21T17:27:26.197000
CVE-2024-27703,0,0,d86e3985bc292ed5320cde8fcbceb0172c63d70520347c4e265befce860d6d03,2024-11-21T09:04:54.307000
CVE-2024-27705,0,0,3233e9b763f57c6dfaf8627c6d6ec7d3ff266929e0ec29e347f4290ec6ac96c5,2024-11-21T09:04:54.517000
CVE-2024-27706,0,0,09be5dff0dff62897d4b671897beea1323154b3e00d34465281c351db1a9a829,2024-11-21T09:04:54.783000
@ -253613,7 +253613,7 @@ CVE-2024-27730,0,0,acfcf7485c8d77fdf14cfede383a631f0141a2fb98231e83b41705b53ce22
CVE-2024-27731,0,0,0d3ba0916b089cf85ebb0d7f3b887a2201a141773d2892b38832e38a6bc4a12b,2024-08-19T13:00:23.117000
CVE-2024-27733,0,0,539349bc579d8094317996ab3ddf62f89037e0f53da0557ec04eca7f3ed5858f,2024-11-21T09:04:58.253000
CVE-2024-27734,0,0,5520fe6516adbd7c3f921cf16d2643163c02ae324582977bf7301b0b4ba5b2bc,2024-11-21T09:04:58.490000
CVE-2024-2774,0,0,760a9c87a0c4d99bb94cfcc2afcbfc5adbf514610161261f3b5c541aaf89cc1a,2024-11-21T09:10:29.250000
CVE-2024-2774,0,1,eb6f509eb01fd0da262ac4a9abce71d7fd44efc8c7bd24ce99541e38ce1fef9c,2025-02-21T17:49:07.243000
CVE-2024-27743,0,0,8a8023dce84e20698a8622f127a9a4605329e9ae56a693b1b628391bea5a5bde,2024-11-21T09:04:58.713000
CVE-2024-27744,0,0,d87bcdd72cf7cf7c0ffdb2aaccde30128c133219c9b50f003c292157283c3c73,2024-11-21T09:04:58.937000
CVE-2024-27746,0,0,cccbd29f894f9698774bcae5e4bc2377fa7c94e3f6464de4b19ea803ef2d352b,2024-11-21T09:04:59.170000
@ -253623,14 +253623,14 @@ CVE-2024-27752,0,0,51f44ea4d791b236f1be7a96290ec94dc23c429a938add370ee6be6fe01f7
CVE-2024-27756,0,0,e93ad2fc2a071bfb70f8b4c256623e40cfa1d2e82cb7ead180eb27a2cd889aaf,2024-11-21T09:04:59.863000
CVE-2024-27757,0,0,da813ae164b43a62f4abf9ccd54f7d6818fa328eab81f6c5f191e6a935f228c7,2024-11-21T09:05:00.087000
CVE-2024-27758,0,0,0de54cc7d1bb775e1a420d07eaf51d2b86419d1e732ab9300e9b648b00610ff2,2024-11-21T09:05:00.297000
CVE-2024-2776,0,0,84768c38157959837e7592c7173aff81748d42f11110d7f5df66d0375fef94fe,2024-11-21T09:10:29.563000
CVE-2024-2776,0,1,5a8760b1a1b415fec8c0d53d84557734030fe5df558e90f4cc2aaaf71f63eedc,2025-02-21T18:36:45.960000
CVE-2024-27764,0,0,0de26073946e11961ce062555628b344b9ee32e76db8ae9da9255839134e25c8,2025-01-21T18:32:16.707000
CVE-2024-27765,0,0,04aaaded443f604ce4ee49a08aa743343ef15860fdace32095dfbefb0b186792,2025-01-21T16:52:29.603000
CVE-2024-27766,0,0,4d93d17ae285c958f465adc24a7cf5f24274982fb56935552c3f47d118ead87c,2024-10-21T00:15:12.173000
CVE-2024-27767,0,0,14866d957c386aabce0c76ee6e3b53eef5ac1c018fac7f223d3f28882adacaec,2024-11-21T09:05:01.170000
CVE-2024-27768,0,0,6b3e88d7427d022cff68fc576d37b15c85fa018650acab8c69862312ea4ad0a0,2024-11-21T09:05:01.313000
CVE-2024-27769,0,0,cef999d9b0cf95b65c6309eaea8213c569635dca7adf6cf6b576ca1d2bc3fc99,2024-11-21T09:05:01.453000
CVE-2024-2777,0,0,2949158148d63676c74a938e9442a2b580de32e8e3f15c9eaaa9e72c61fc61a2,2024-11-21T09:10:29.723000
CVE-2024-2777,0,1,3d14d6a0d116f1e241e3815d376a67043eb26436ab43f59a526d7cb4efc6dc9b,2025-02-21T18:33:30.590000
CVE-2024-27770,0,0,74674cdd65132754e1fb103e3a0767605fff455305fea28320a89adaaa674386,2024-11-21T09:05:01.600000
CVE-2024-27771,0,0,a31ba237e0ad8593d52e9214442b6f9e1272667c752ae33966daaa778eaa6721,2024-11-21T09:05:01.737000
CVE-2024-27772,0,0,382c305cd846d5a30ad35bd61d3aa56f63db66c1de69259926b60ff8a7a8caed,2024-11-21T09:05:01.870000
@ -254031,7 +254031,7 @@ CVE-2024-28173,0,0,ea128472b844ae9d393924075ea3785042942393668417797d1acc5674d32
CVE-2024-28174,0,0,6dfd63f7b3e20facd0f59fc87c055b11b6d81d8ff8cd2c3f65e9da350b856bce,2024-12-16T15:07:02.497000
CVE-2024-28175,0,0,4e11aa87236922581b63e066b241a3364104fbe40e76d7a6ad650937e71103fd,2025-01-09T17:05:59.063000
CVE-2024-28176,0,0,8e2712bfe1ea7116f11f8ad9a2861387b20c6463817c56944eede5e5ddf4bb41,2024-11-21T09:05:57.947000
CVE-2024-28179,0,1,7ed5d00dbc9ee111ec2d1d6cbc2429a4de417111e7905f28d98bf89d5a7a4295,2025-02-21T16:37:13.663000
CVE-2024-28179,0,0,7ed5d00dbc9ee111ec2d1d6cbc2429a4de417111e7905f28d98bf89d5a7a4295,2025-02-21T16:37:13.663000
CVE-2024-2818,0,0,0911c1acc4d9c090902c611e6719e3f0aa3c0379c78a97d42dc069d2ec5f6dee,2024-12-11T20:25:14.693000
CVE-2024-28180,0,0,b2c09a3c3b5ea99d184b000454ceee123a130c8a68088ff4edba228a8948817d,2025-02-13T18:17:48.353000
CVE-2024-28181,0,0,6bd311faaf46af3dff9fd97c3b0355e1ad7f1917e6cc72e0605e0852aabed029,2024-11-21T09:05:58.393000
@ -254242,7 +254242,7 @@ CVE-2024-28582,0,0,04799e93ceccd9cc4b3d5e6db53e76424895199be69cbe96cfb9fe2b3cd39
CVE-2024-28583,0,0,dd3c0b8d8072bd6a8dcd0e860b02c395eb40124b9c8f43138e219d628568beb0,2024-11-21T09:06:40.073000
CVE-2024-28584,0,0,48b2b30bfacc95821daf411318d5a1df0132f3fefe454b07829432d1245ec198,2024-11-21T09:06:40.357000
CVE-2024-28589,0,0,1bfa399e8667380e57d79d60e7e8112d34b500470544fbd640b99eb387afba8c,2024-11-21T09:06:40.680000
CVE-2024-2859,0,0,dac8d21db08b510f0688c306fab175a2c2b28639dec048727d7d670e2d55c32b,2024-11-21T09:10:41.990000
CVE-2024-2859,0,1,9b68da83743c2e33a01665913e56717c8d334fd541d9c664f0d2fa6aaf74282d,2025-02-21T17:15:11.730000
CVE-2024-28593,0,0,1a079ea18745517fd72417a437989c95fe391bb286fe69494ae3e8d32ae13d70,2024-11-21T09:06:40.980000
CVE-2024-28595,0,0,66c34ce4bde45fe86231be9499209a487847155b52f1ce03ae9c3349832dd0c2,2024-11-21T09:06:41.353000
CVE-2024-2860,0,0,10251222dd61f264c5573f16801b3605bbe75235d60096fd89f14c7bdd2709e8,2025-02-06T17:54:45.057000
@ -254844,13 +254844,13 @@ CVE-2024-29417,0,0,59ed7330a649e9c190a03d2824c71e319289766718abccd335aa458a7d271
CVE-2024-29419,0,0,2f3442ac6427a352cbbf9021272e009750360630cf456587e3262353974b9774,2024-11-21T09:08:01.520000
CVE-2024-2942,0,0,26108ec70f2b46a3e343d5e817ecb446a8d832968925c86c71a2e6e00c547f59,2025-02-20T18:06:40.927000
CVE-2024-29421,0,0,beb9c3d391776927bc0509fe96d1996ccda24e4a7b2806b30c432e1112a2c867,2024-11-21T09:08:01.653000
CVE-2024-2943,0,0,dca16f8713e0f1bd75fb8d30a5211fbafd09ffd45538f6138cf1e61114441d88,2024-11-21T09:10:53.903000
CVE-2024-2943,0,1,beca67e7e14d7fa541ce7bb02133b5918a7ee95ca547f351aa0b1a0c61776892,2025-02-21T18:30:31.883000
CVE-2024-29432,0,0,ade0c38d544c4d9d932c5077e1bc9211169c5c1f27ec5bc2376eb60f136730e7,2024-11-21T09:08:01.873000
CVE-2024-29433,0,0,7c8a681e2a5501ad90bf8142c8c464638b1bd9836d2502bf52bc4077716e322e,2024-11-21T09:08:02.087000
CVE-2024-29434,0,0,18c063d8500ac6bd9a7ae25fdaecc8c0bfb8d5e88ab8829d1a63dfce1bdf271c,2024-11-21T09:08:02.293000
CVE-2024-29435,0,0,9fd00e264c073685065b0f3e36cc0dcf62daedad11446589da4b314e7ad8c4ba,2024-11-21T09:08:02.430000
CVE-2024-29439,0,0,071dc3c8f449deb74ddce6b8d054e2fea88eca6c0700f7f8d6ed7663f767e1ba,2024-05-27T01:15:14.397000
CVE-2024-2944,0,0,aa2bfbdebed16621c0d5c600498954e670e46ef4d99f190aea2178038c3fb876,2024-11-21T09:10:54.050000
CVE-2024-2944,0,1,b6c918d90cac77a45a383e57ea5c137ca849cd64976e54c3b501ac9f8970e8c0,2025-02-21T18:25:37.167000
CVE-2024-29440,0,0,5b5e3b17b0e40e37a1bc2598ac1913c0af07a4c46f5b9983183aaa750b04d2f6,2024-05-27T01:15:14.497000
CVE-2024-29441,0,0,cb65ef4fb5c246bbe8d639b72a01747b296d3278168ce57db1b31e30e7320e47,2024-05-27T01:15:14.590000
CVE-2024-29442,0,0,c91319c60e40ba5db2d5e717d3add1b60e963058fb982d284576f9a9ae60670f,2024-05-27T01:15:14.673000
@ -254860,7 +254860,7 @@ CVE-2024-29445,0,0,c20c812be8b93513b8c78363fdb8391e67ecb3f262479e9e680905447609b
CVE-2024-29447,0,0,d368dd39193aa090b100f727e87e9930be731e7e2fc580a9d2508f77d0605f1d,2024-05-27T01:15:15.013000
CVE-2024-29448,0,0,fd52391d9f5324f36cd5e80944ab86bef000aef5c2a54d7e27dd891476ef0874,2024-05-27T01:15:15.103000
CVE-2024-29449,0,0,582b5738b3c18d00bb3a22579edfa25e470c269d856db06c302f26d41aa15df8,2024-05-27T01:15:15.200000
CVE-2024-2945,0,0,67143f9bc0cc307421bf312d5d761f33dc526ab62f3b096495aaf813bd96f730,2024-11-21T09:10:54.200000
CVE-2024-2945,0,1,e2a9fa767daa651eb84212ed27c1762b5ec296bc25ea92b89b8f447203034a67,2025-02-21T18:04:55.813000
CVE-2024-29450,0,0,f8cf179f4a6add956335a8b5f4847b5af52a5d30ae676cfa0c38b4dea920790a,2024-05-27T01:15:15.293000
CVE-2024-29452,0,0,8e1bfc2abfc91b5ca6aaff5eaf1d9a62e09db612bd6386c944cc6eed8e948f68,2024-05-27T01:15:15.387000
CVE-2024-29454,0,0,1c893aa9fc261c831d35b219df714ee3ff6151f3ab4ae74ce0e7125ab45089bf,2024-05-27T01:15:15.473000
@ -254882,7 +254882,7 @@ CVE-2024-29489,0,0,07f5b3a5e4c9d9dd4bd17cfda9a58f8a163c6a3150e80753fbcf5f8a1d2c0
CVE-2024-2949,0,0,44b03c660eb796ee2db79b5a81991de10bff87f430df8e723853928b2eb565d7,2024-11-21T09:10:54.757000
CVE-2024-29499,0,0,bd4ce64f6211e7fc23490fa7c7f55cdf17a8ef0d6b6835f5123192a44428f6cd,2024-11-21T09:08:05.103000
CVE-2024-2950,0,0,35f8cc61f427e786033c5f9544ee2b64976de1778273d60b77000161914e2c70,2024-11-21T09:10:54.877000
CVE-2024-29500,0,0,4f15bfc9bfb28a0e0baa97184540d9688e5b7956ed8975507181a392295936e8,2024-11-21T09:08:05.340000
CVE-2024-29500,0,1,ad46c577f881754394a64146f58971e607b60852c9a92a6949948e14750a53a0,2025-02-21T17:15:11.583000
CVE-2024-29502,0,0,8b281ceab8400deda3cbd9fc2a92390088e4502010861b3ce65f71a4a35dd1ba,2025-02-10T23:15:13.337000
CVE-2024-29504,0,0,53fc663b9e6d96ca964c735e36e903d675794b657641161dbc25730d9236f310,2024-11-21T09:08:05.703000
CVE-2024-29506,0,0,33bf7b54456a7e4cb2ab4766502f70f6f853d9cd67666f22c7f233033f9462b7,2024-11-21T09:08:05.937000
@ -255221,7 +255221,7 @@ CVE-2024-29996,0,0,f661a852bae8c473aa8b126123e2a25c17ef9e749612eb99af0c37be04840
CVE-2024-29997,0,0,defc107fe9ea79a2bf62f30d8bbcdf35032a204044383d9980ebbc63f162afd6,2024-11-21T09:08:46.403000
CVE-2024-29998,0,0,74ca6e6a372674194fc55eebd9ffe24e2f18418426acd322a32804210dfc6c92,2024-11-21T09:08:46.563000
CVE-2024-29999,0,0,5c8c7491630bf34216341268eafef470fe4da64c699a4ab247cf5eb902826f10,2024-11-21T09:08:46.707000
CVE-2024-3000,0,0,2512f042eaa626effd9cd0bdd2a9e568f794fe3135c096093c64137bf0a32558,2024-11-21T09:28:38.813000
CVE-2024-3000,0,1,e63924c0572a29a2240758fc03eff0e70268a9f490829bdb4feaa3a69eaeca78,2025-02-21T18:00:32.757000
CVE-2024-30000,0,0,bc48f4f724a68341c0c2b613e02c70592db3b94e4e26527614dec6e3b21a1528,2024-11-21T09:11:01.630000
CVE-2024-30001,0,0,0656676b145a170361adf24d7a4e039fadccba7f294588687bdbb30dd8bf8b55,2024-11-21T09:11:01.807000
CVE-2024-30002,0,0,04a245cfdbcd8929c9c179da6d63caa062cc9d38a4646e1f4f755002c517fcce,2024-11-21T09:11:01.967000
@ -255232,7 +255232,7 @@ CVE-2024-30006,0,0,be5db2465144bb259c8f82f5d1b35bd436984e6fdee41cfd6a81bfbc3e65b
CVE-2024-30007,0,0,6969f53c602df9b8b1a9651ceeaaf013496fe697b331e6a013532ca7de82247f,2025-01-16T19:12:10.263000
CVE-2024-30008,0,0,6fcd65c7fee7e47bc29fffb6ba0b0b2735e263c49e2ed2618552719f0740104f,2025-01-16T19:12:19.507000
CVE-2024-30009,0,0,519183ab82ec905f6b077be9a5d0a04d562e7a35de2be05eac5481b723c0db0b,2025-01-16T19:12:54.190000
CVE-2024-3001,0,0,a7374e476d7442a06066a14e1bd58098fcf6ff210b0ec172c2e3dfeb580cd5c2,2024-11-21T09:28:39.010000
CVE-2024-3001,0,1,8fbbe1d765e16281415e0f305c11bc565bee3dcf05cba967de875fdbe59441cd,2025-02-21T17:56:43.633000
CVE-2024-30010,0,0,3b57dded1365346a40ef9d907acf2a62b1045574e11d0dc8d1e83f92596365c8,2025-01-08T15:40:07.350000
CVE-2024-30011,0,0,8698cc7e598dbb37b92763d8e362b5b0a3356d14c02c04e229cb06f65db99a11,2025-01-28T17:15:22.727000
CVE-2024-30012,0,0,7463e00544a9b12ad72daf0ee2ff341e31ea7c6c2ec9ff1689ad29f0e02e7d41,2025-01-08T15:40:37.453000
@ -256387,7 +256387,7 @@ CVE-2024-31388,0,0,969b791e4fda50e2951bfa1c1b7c4b19f1267ec11ef79ab157b990117c9e8
CVE-2024-31389,0,0,08af152747ff407e3026afce016704b24317def223e62ecb4990aa88b6ae4f5e,2024-11-21T09:13:25.770000
CVE-2024-3139,0,0,ee5d1f7884fa2b89f120299c3dc630a0c1e25c56358d05f6bf675aa682ed34cb,2025-01-24T16:29:06.287000
CVE-2024-31390,0,0,09006f43013da697eb3ff65b55900b18a5bda9bb9eed07955cb886886fd9d7be,2024-11-21T09:13:25.903000
CVE-2024-31391,0,0,a61ad53380cbc9ce932d030cffdd1cbf30c52720de0bde554297b0ef6526065f,2025-02-13T18:17:59.253000
CVE-2024-31391,0,1,4880c78b8128255e5f53d9cc8f383bc425e5697e6649b76178745798701ccab5,2025-02-21T17:15:11.887000
CVE-2024-31392,0,0,2cf7bb0bb7b3840b5de6d2fa2cf618e252d13dcf4ceb1d56e669ff5d64f29037,2024-11-21T09:13:26.240000
CVE-2024-31393,0,0,ce47fcc28609b6c0ed26f97c537e1ae26f49073568af13541130e1b1fae8fdd1,2024-11-22T21:15:17.823000
CVE-2024-31394,0,0,ae89c528d783d2874788aca5b3fe4b3a004f4230d032ef63e3856498b25610cb,2024-11-21T09:13:26.533000
@ -257951,7 +257951,7 @@ CVE-2024-33554,0,0,e7b380bb1b113efec2113aa2dc179c074a7e8cf0828ce9585a6b5cdb06d73
CVE-2024-33555,0,0,6f80f9bc2404a51494bae2a82f25c8c74ead7881518cc61d180e98b88475db98,2024-11-21T09:17:08.533000
CVE-2024-33556,0,0,3572498c6e5076ee49982a96222698198f88a32bdcbf2a6ca2a55442b2969b12,2024-11-21T09:17:08.683000
CVE-2024-33557,0,0,55c7b29141677b64faa1da269b64f4e55a33cf03de0ac6c57ce12c80759a4a01,2024-11-21T09:17:08.833000
CVE-2024-33558,0,0,058f32dbbf4bb325d3e7f38e934d46ea38a9831dfee6affa5c786573aa970685,2024-11-21T09:17:08.957000
CVE-2024-33558,0,1,5c3c9c72e5b2451e2576964191f213e9a701a0da02164f092bc6a0e91db45db8,2025-02-21T18:58:47.877000
CVE-2024-33559,0,0,61adae8a090bd00a6937d8df7fa0d4974682800beec0f9609a7943b4d15394ba,2024-11-21T09:17:09.073000
CVE-2024-3356,0,0,e4dc1102abe1151ba5a690c4aa469ce25164d15da3c3994ae8e5bfbe6ac40444,2025-02-11T14:48:57.577000
CVE-2024-33560,0,0,a8571ae124428bdababc55f32fd7cd85296477f15cd29f91ed0756f5487364a9,2024-11-21T09:17:09.200000
@ -257999,7 +257999,7 @@ CVE-2024-33598,0,0,d18b88b92de282a6e298e97b6b8298eb03639e013519623be4c3a6ce12426
CVE-2024-33599,0,0,7562b04f66c6d54d64426cb393ec1c5ece9c8a879f7afa7f5dac99b57a77072d,2025-02-13T18:18:03.513000
CVE-2024-3360,0,0,cc6d76ae5db0ce9bab65b748413469a70f295699df8c796e1ea5796d4203b12e,2025-02-10T23:10:22.100000
CVE-2024-33600,0,0,e7823dcd14d5bdee96702b4a26e8a35b47f7712e7aac9f5d7aaf271585ac0d3b,2025-02-13T18:18:03.643000
CVE-2024-33601,0,0,0b3440b0b0773c385fcb6c09c6a31b34bb23a2788fc3b96ca0db8e5eaf2cdf1f,2025-02-13T18:18:03.770000
CVE-2024-33601,0,1,52eea2a235b9d6ab4f411c5b985e9ac6eee2f6b4710c12580c23463499fb4aa3,2025-02-21T17:15:12.100000
CVE-2024-33602,0,0,a9e22864890268ec8ff59de2c91d6473b5de5b495cf2c7b4e8c59156a6a79698,2025-02-13T18:18:03.950000
CVE-2024-33603,0,0,aab47ae0f47b94871d557c2edba07334d57457a2f8cbeb3e6bc397cd050c8cc5,2024-11-21T09:17:14.493000
CVE-2024-33604,0,0,b3da24552fb32841e75513561ad454f118005aa176ebb44510170968fd4ffa39,2024-11-21T09:17:14.630000
@ -258361,10 +258361,10 @@ CVE-2024-34062,0,0,3e3d7a23f0ddf40bb9b7e477a0b08aa1b4578a3842d34dce881954b773b52
CVE-2024-34063,0,0,b643c186253dea78886cdc164848b2150252d41fc3260449c6470a9b018af9ed,2024-11-21T09:18:00.687000
CVE-2024-34064,0,0,ba07e5a57e091536ae38201a75b8c1e3b5eedf3dcac1d8fb41d7408878690c9b,2025-02-04T17:15:18.667000
CVE-2024-34065,0,0,4d85ab326ecb53235af3ff0a7f41a0c6b0f15838f98dde2b100e9a0c37c4fc30,2024-11-21T09:18:00.980000
CVE-2024-34066,0,1,a6c7f9e2fa625444e66819f02de5f84ab05035e76b2d9a7a68ee6024511c806e,2025-02-21T15:15:38.680000
CVE-2024-34066,0,0,a6c7f9e2fa625444e66819f02de5f84ab05035e76b2d9a7a68ee6024511c806e,2025-02-21T15:15:38.680000
CVE-2024-34067,0,0,9cf35acc8d550e37df248e2c0d775660104cfca0398d1074bdb86cea57aa25bb,2024-11-21T09:18:01.257000
CVE-2024-34068,0,1,746c105ea0ce54757cf5de08407840037e20da226e2ff660f2606589bddf9680,2025-02-21T15:19:39.417000
CVE-2024-34069,0,0,272daf01091fd40b7e79c1d5d4afc7c83f6a52a4b429177799d0b69f29ec7ffa,2024-11-21T09:18:01.527000
CVE-2024-34068,0,0,746c105ea0ce54757cf5de08407840037e20da226e2ff660f2606589bddf9680,2025-02-21T15:19:39.417000
CVE-2024-34069,0,1,e06af822099f29af869bb5334ce574287bfc7df782eee0154ea8f805cc040597,2025-02-21T18:15:16.663000
CVE-2024-3407,0,0,1dd5d82b06a7cc20a14e63b07e1ddd6e99e77ef41257161f9f7dfedc8de831cf,2024-11-21T09:29:32.093000
CVE-2024-34070,0,0,5f1575a2d850d50c576f98c42a1ebac69cc9b6e5bffefc5b41bc301cd97009a0,2024-11-21T09:18:01.680000
CVE-2024-34071,0,0,ffc35012c653d1b9edadd40a1fccd85a11c326f53822c11dd0077d4d3aab57be,2025-02-12T15:39:05.367000
@ -262110,7 +262110,7 @@ CVE-2024-38653,0,0,e523aab1476ea94d5dabc706292fc0fd759279e8366cb1ac9b6db46f1b485
CVE-2024-38654,0,0,ca9fd02c81f92d035bbda3976da1a8f0602f8a83a501777869aafa32900f0836,2024-11-13T17:35:06.447000
CVE-2024-38655,0,0,964fd1eec58e9d88a93e97e9c3a61acc0dbeaa16c974275ef46e2bd52d60a331,2024-11-23T21:15:14.393000
CVE-2024-38656,0,0,7a761f228145d4c9c0ed8d92c300e9df17f7d325bea623f24e15c901a006d981,2024-12-01T19:15:04.440000
CVE-2024-38657,0,1,927bf4cd8e8ccc78daa7d5b881bffb32ffe8d439b0c35f5a2720062f808254e1,2025-02-21T16:15:32.340000
CVE-2024-38657,0,0,927bf4cd8e8ccc78daa7d5b881bffb32ffe8d439b0c35f5a2720062f808254e1,2025-02-21T16:15:32.340000
CVE-2024-38658,0,0,e6ea9cd2600e863335625bfa75713e2218e611a3fa971502d028f479b505f7e3,2024-11-29T21:15:05.633000
CVE-2024-38659,0,0,82d734add9c8fe44d6c176df3c0f51f534c34dbe8895a35bd5c5151111066a4d,2024-11-21T09:26:34.527000
CVE-2024-3866,0,0,3d2e18514cb96e5078ab80a25332e4c14f82e4fa37ddfe53c6bf65150d31d746,2024-10-02T18:26:59.520000
@ -263071,7 +263071,7 @@ CVE-2024-3985,0,0,8f03264baafc07298f97f70b4ff78c785056a15ca84e8beab59019b2a1407b
CVE-2024-39853,0,0,a224043399891653f1bf55094c6d78bc499427db95adef716d68626986175f2f,2024-11-21T09:28:26.447000
CVE-2024-3986,0,0,821905e2ab820467455b5a5f470d0c3f3b3637df80998a6d83e1cdb055d8c204,2024-11-21T09:30:49.873000
CVE-2024-39863,0,0,2a4fab41b36270083c53945f9453e9d3f204a719fe1df5d3475aa7899200c551,2024-11-21T09:28:26.660000
CVE-2024-39864,0,0,b2fce52787fe7b7a4ca2b4cf31272fb4940ebc67da655815f0670100b8514716,2025-02-13T18:18:09.037000
CVE-2024-39864,0,1,10b29ab568357c4a70ca03209ec5ca5fadc9a07daf9c9ad9f016daf775a7027f,2025-02-21T17:15:12.390000
CVE-2024-39865,0,0,1704a51de2f9ae14e5928b85c3113f9cc2a875b2d30d3c010e6a392280963775,2024-11-21T09:28:27.120000
CVE-2024-39866,0,0,4d5ae3fa1277b5840d25f739dc26c250d84a67fa9a8309305e333dec56e523ca,2024-11-21T09:28:27.273000
CVE-2024-39867,0,0,febd9e7e2e0df37da15f3d3209abc7d860e42c778e6f5de8753886a986c9bd99,2024-11-21T09:28:27.420000
@ -263840,7 +263840,7 @@ CVE-2024-41095,0,0,a4a292866e3068d2f57a8254661b1866731b922f2dd7e200baf567ba1f054
CVE-2024-41096,0,0,8fd4c9d4ed264f2885567b62f2a34922ebfa56dcdd0edc053176d3013a5b2964,2024-11-21T09:32:14.257000
CVE-2024-41097,0,0,da1adf0b3a12bf0132b0aa72e2097d79037ba33782764c156f4094087589b6d9,2024-11-21T09:32:14.393000
CVE-2024-41098,0,0,338154d5c432c0e0ee0395715fa8ca7d8a8d003c58d81c84bc992eb6634064fd,2024-11-21T09:32:14.563000
CVE-2024-41107,0,0,eed062825d8a2d9df553d21f7e15e50657f4e6afea3ba400789757a8a5323788,2025-02-13T18:18:13.340000
CVE-2024-41107,0,1,302eac7888c9ff531fea3d713232f282d23a92c95feb7fd379cd4d8102d6ba01,2025-02-21T17:15:12.663000
CVE-2024-41108,0,0,85bcf4b3bee4475a1b0965555c8b6cfa268f15dd754911b3b3bd214e1e4db83a,2024-09-05T16:27:50.103000
CVE-2024-41109,0,0,0544d00889fd70a6306bb2ecc94e1e71af3d9bb7a8ecd81ec693e3e34a9bebab,2024-11-21T09:32:15.027000
CVE-2024-4111,0,0,d268156164f48b0f0e9e51ae197234d15d46877663cf4d3313a338684ed5680f,2025-01-27T16:25:51.970000
@ -265835,7 +265835,7 @@ CVE-2024-43704,0,0,82c22af109add6551b6eea89e99a6b50accfdf02d564899eae149615096d5
CVE-2024-43705,0,0,29f69c0cebaa0d9dd3b94a974b4686ab8ab2fbc5f28104cf63225fbecfd597b0,2024-12-28T17:15:07.190000
CVE-2024-43707,0,0,c086df33301b56db6990f90f5532c67331696838b257e3be47983d37a2ff18c3,2025-01-23T06:15:27.380000
CVE-2024-43708,0,0,bb58672c949baaa0c0f0449c9266c7da5957c20f91573903a5d8f34b6754633f,2025-01-23T11:15:10.553000
CVE-2024-43709,0,0,5e077aa22e9abb9c9ede034cc1ccd92164ff82e4b1ec9e4a9c1586c8b23d2a27,2025-01-31T20:20:21.053000
CVE-2024-43709,0,1,0cfe36144398dd836604426e745d703e101291314062998e88fa4323425c0bad,2025-02-21T18:15:16.913000
CVE-2024-4371,0,0,e83d972dfd798c0045589442b000f085f252e3d21fb48583dd2590000a3618ae,2024-11-21T09:42:43.087000
CVE-2024-43710,0,0,bc7660403b840726168e99deeddf503fca1d13d3cbf029a1d717ec430b75b20e,2025-01-23T06:15:27.550000
CVE-2024-43712,0,0,9ab3fe760e8f19464e8d37dd73b7335ae43d5382e27e4d6ab5795a2dd3e62314,2024-12-17T15:23:11.173000
@ -267001,7 +267001,7 @@ CVE-2024-45307,0,0,c0938238a10d49b688802cde3f1c9838a9991cf67078061088a0047210b89
CVE-2024-45308,0,0,0f79468bde0219bbc1921311b430acdbec9661a65c2c22179e8cd6046b5e6ccb,2024-09-03T12:59:02.453000
CVE-2024-45309,0,0,a36ddce4b18a73d8f35d3b9fd8812ff9dcd77219ae5797b4887aa7d647ca90ce,2024-11-14T19:39:31.233000
CVE-2024-4531,0,0,a6e555a5a43f85fed8288eab085e9cbd110c29345d131ef5286c2ae4dd0d6939,2024-11-21T09:43:02.823000
CVE-2024-45310,0,0,9027cc7e3e7adc908fa7707fe880db47b9555de68db6064b6f7c0e737a0e0dfe,2024-11-21T09:37:39.410000
CVE-2024-45310,0,1,3d474dfb5d0dd5306e83b6792f34c1f277b630de98e8c3c64ebaee5805776f9e,2025-02-21T18:15:17.080000
CVE-2024-45311,0,0,c642a7773e515e1e1ea4c3a879f906273fa4dcb135dab8aa83df2b930a50b20f,2024-09-25T17:03:36.817000
CVE-2024-45312,0,0,0c55308fa116483adc769105d1616035fadcd65ca8ea2495f3e81521735be04f,2024-09-25T18:37:23.867000
CVE-2024-45313,0,0,ffabf2497368b182081cd5c0b8f0370a40d21c279eab9f868fa173421d78bf34,2024-09-25T18:12:53.543000
@ -267022,13 +267022,13 @@ CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44
CVE-2024-45331,0,0,6674a987e07ef5cefafbccbf3dee14b9068d9520dc28ed378470c190db2d6c7f,2025-02-03T21:03:06.133000
CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000
CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000
CVE-2024-45336,0,0,fe73a42ff3e2ab154f5274280efb95e7cafdf2051c26cad0bfba3d1769494881,2025-01-28T16:15:38.220000
CVE-2024-45336,0,1,912b26cbfdb0850573b5152c55cee476cd436e54f9cc125bc9ac89addedf64dd,2025-02-21T18:15:17.400000
CVE-2024-45337,0,0,d88f164018feb99c2b0337f4097dfc62480727f20cbc5aa75be77fe4eca590a9,2025-02-18T21:15:22.187000
CVE-2024-45338,0,0,4b2d696f8670e697ae1161a5584acef0120067536ac2182d79f6e6c35006631f,2024-12-31T20:16:06.603000
CVE-2024-45338,0,1,bb9a7ba2917c203b256b1c8772a09fc039040ed4d6f45807f5a98773d7bae680,2025-02-21T18:15:17.717000
CVE-2024-45339,0,0,e6d397175d9bcb76fd8af378a16cb908a9d604092238dabef9c11d7f03953b3b,2025-02-17T11:15:08.753000
CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000
CVE-2024-45340,0,0,066a3008a8c83bd6293b47b22df614347947c4a76e770f61b0b4f0306520b0ce,2025-01-28T16:15:38.517000
CVE-2024-45341,0,0,4dd9aad0b4d057a4c057d74153e4003151702a7f08212eb9af53532c125a70fd,2025-01-28T16:15:38.650000
CVE-2024-45341,0,1,35d1905dfe94aedfe1e83ac22b614ded734370bf02c1ed5cecb7591db39164b3,2025-02-21T18:15:17.960000
CVE-2024-45342,0,0,a4a31e9769756ae24649b74b18bd2d95ae5ebb0482440ad62570ce13c5ec4304,2025-01-08T20:15:27.583000
CVE-2024-45343,0,0,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b72fb,2025-01-08T20:15:27.690000
CVE-2024-45344,0,0,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000
@ -267260,6 +267260,7 @@ CVE-2024-45663,0,0,f5982f696eb561ee89ceacd8a652ce2095dd2ab2ec4564026ad75a7cdf0b6
CVE-2024-4567,0,0,22751845307af6a336c20a91c0c6d397e4abd955b5d1c7b822f192181225c614,2024-11-21T09:43:07.517000
CVE-2024-45670,0,0,884f280837c803b089861d2cd0800b5b952f4567c75753b35001e2a46ace7ee6,2024-11-16T00:24:57.203000
CVE-2024-45672,0,0,1f284c4606417b08ac2cd87243460783df32e665537ee9aa04c2649281078873,2025-01-23T18:15:30.057000
CVE-2024-45673,1,1,b50f9b3cca27a5eab3aa620e67058c57e72c73213bc98aa4723d6d9801e635f2,2025-02-21T18:15:18.163000
CVE-2024-45676,0,0,eb22d41374a33aad487840972b05f99b6866c07ad3faeb5bebf20d811966d571,2024-12-11T03:21:10.387000
CVE-2024-45678,0,0,e2a0d8da3cf25ebb49239ae7c4c164f5edac3b90ddc52e1952c353b2d0051611,2024-09-12T20:07:09.640000
CVE-2024-45679,0,0,48441f1f5183f0d7a57b97dcb6b4ce06cc54aa383bc180413d74ccec8981a81d,2024-09-20T12:30:51.220000
@ -269598,7 +269599,7 @@ CVE-2024-49195,0,0,f09eab8729e42b8f90de1ca9d2dd22f865dd713c9e6432237b0fc072c9131
CVE-2024-4920,0,0,8ddb159b65bb71eebdadb1f35aa2e308ca8bb76730bd69f57b0336adb1e54d0a,2025-02-10T13:20:10.720000
CVE-2024-49201,0,0,f1f1cb98a0aac9265c70b98ee9e2458c0a72a188affe8a16068d4f679ccae7e2,2024-12-21T00:15:27.887000
CVE-2024-49202,0,0,dd6d2289be67b77fcac21858ac749dc1834785d3abfe754ac83242d097e946b2,2024-12-21T00:15:28.090000
CVE-2024-49203,0,0,2f72f719e11be857bd710b7bcd13dfc2e6d4e64df0d6e25d68df588739661b22,2025-02-13T17:17:19.683000
CVE-2024-49203,0,1,be27ef0783bba9da31a96a5001ada95e347452b30d269789b7a1f6757f08eb81,2025-02-21T17:15:13.070000
CVE-2024-49208,0,0,015cd020401085ebeb441a6e29c2c511b67ebda9206e8568e89e3ddff73bd4ca,2024-10-25T20:18:20.550000
CVE-2024-49209,0,0,9ae848f5908051a81c06c0975ec096052c93e9171594c97faafd9f3378f596d0,2024-10-25T20:17:36.353000
CVE-2024-4921,0,0,db437d50c0e63eab8540b040892e04c10bb589de50d891730796ec6ff834da22,2025-02-10T13:23:20.033000
@ -273730,6 +273731,8 @@ CVE-2024-5512,0,0,e291a0f62c622b98719d0669427609426642277e7e0c79f3db83875786e582
CVE-2024-5513,0,0,6fc05209f2de569aa2d53ff875b7b70727a658dcae4b0d69e9a3aacc36b9dc55,2024-11-22T20:15:09.673000
CVE-2024-5514,0,0,6d73bd915478cd828b6f77d6b9022a4594908acfd7833b25b5547bc7dc07697a,2024-11-25T03:15:12.733000
CVE-2024-5515,0,0,8089212455f7b2c3b98e72662921aa0308dc6e1003e78be2340ad30b90c55717,2025-02-10T13:56:46.470000
CVE-2024-55156,1,1,97db152165177e0429aa8d78293514ee0ba9968ca664750f7718a2f8645feeb7,2025-02-21T18:15:18.540000
CVE-2024-55159,1,1,5dbd6940bbc09b9bd2015e6356cd9dab657cbf640342ae26466f7ff7febd11c8,2025-02-21T18:15:18.707000
CVE-2024-5516,0,0,5c86b2fe8e27122754331e7128941e901950eb58ebd967dcf3d55e78bc92790f,2025-02-11T15:12:30.713000
CVE-2024-5517,0,0,41b75060f241bf0c01a48c7ad523f68820f85057bd838606921f1935dd3f34e4,2025-02-11T15:11:46.037000
CVE-2024-5518,0,0,3a465cb42f091e8b18a06f67206fd2abb62c493cdf88c67566720ab0e17d2428,2025-02-11T15:10:47.877000
@ -274817,6 +274820,7 @@ CVE-2024-57161,0,0,0495a61cce9967abce04c38c66d6e333bd202089322d89ea341f73e5c8ecf
CVE-2024-57162,0,0,6b8ec48279083ede2559fb26afae6b179dc7a8a459c2b2e06f9ad78b7dc11bad,2025-02-18T21:15:23.657000
CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000
CVE-2024-57175,0,0,e96a8c9420e12c8730fd044f61e074cae6b4f8900e0333d25afa5aec6b9ff461,2025-02-03T18:15:37.437000
CVE-2024-57176,1,1,d3cfb0da410e06c83385af0cb0bfe3fc267d8b062d189d344e72e0d1d67688b6,2025-02-21T18:15:18.877000
CVE-2024-57177,0,0,06dae5d3ddad2a6c66f8afbd40a9c732b2a499e75a1412c2d2989dabc4f217a2,2025-02-10T22:15:36.257000
CVE-2024-57178,0,0,1f6e448ac583dbc5dc66b3e862fb64a834e1fd6ac65d6692ba488ccfc0af0396,2025-02-10T20:15:42.013000
CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee719,2024-11-22T20:15:10.340000
@ -274887,7 +274891,7 @@ CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b
CVE-2024-5739,0,0,c5c2a01c52729f34b70d0ba17b3b2c0fc6065fac9c4acf57edb649a485cbd474,2025-02-20T11:15:09.400000
CVE-2024-57392,0,0,7b9989fcc73c1df35c96288876a5368c643f8db4e87836a57a99cbb5dea65395,2025-02-11T15:15:18.900000
CVE-2024-57395,0,0,2c6b9838d8d0a9b17c18c2b5c319e27ac8a0ab4c8fbbb39ded3167ef6bff33f1,2025-01-31T21:15:11.383000
CVE-2024-57401,0,0,2859063cdfe20a40f5a31b63fc9e0efa3eb2097c3ed482aa578fc1d041897bac,2025-02-20T15:15:13.347000
CVE-2024-57401,0,1,3e6dff374c710f8b12cb1c7362393b753fe5f2b7a5b106fc3c4641cd281923d4,2025-02-21T18:15:19.040000
CVE-2024-57407,0,0,45e1a10510320897f48f1620e894947df2f73cd6e1f003632125a8e02b442b2e,2025-02-19T21:15:15.393000
CVE-2024-57408,0,0,175db0428293ce57c99d60d486d8cbd43e580b93d14f299c67a8f76d88381cb5,2025-02-11T00:15:28.707000
CVE-2024-57409,0,0,0b05f5863a283decb12d24250619815c0ec7b2696059e21578dc2420bbab0e60,2025-02-11T00:15:28.863000
@ -275060,7 +275064,7 @@ CVE-2024-57703,0,0,d743eff85f5c1f058398ac2e48beaddc31cc085b96c135580c81255c71093
CVE-2024-57704,0,0,388d13d725b2d6b848e05df34aea7c5a2dcb3a5641239200e2639502ff2e9d9d,2025-02-03T21:15:14.990000
CVE-2024-57707,0,0,256285bb0e4c937fcd8fcd84fe295c9ba07342d1410e4f5a401c2306ce0e91b0,2025-02-10T17:15:18.353000
CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000
CVE-2024-57716,0,1,79da6b902a2967abf048782629438cae155ee0d179ea2083ddc6c325108a1865,2025-02-21T16:15:32.453000
CVE-2024-57716,0,0,79da6b902a2967abf048782629438cae155ee0d179ea2083ddc6c325108a1865,2025-02-21T16:15:32.453000
CVE-2024-57719,0,0,9af381064dc4b979246282f21dfbef1d0e1e6baf2733f304b6946b2054a0e999,2025-02-18T20:15:22.603000
CVE-2024-5772,0,0,a130ac538e53608257b53eec354d0ff395f00d63a43d268bd6c4f0666ec5359a,2025-01-29T17:46:54.753000
CVE-2024-57720,0,0,a92cd4ff4b9ce08012253caea48a1eedf30cd05c41e4bdf4daafaed100b4bd5b,2025-02-18T20:15:22.690000
@ -275220,7 +275224,7 @@ CVE-2024-57947,0,0,0f394f81965ff60be8ebf8ad0ab0612e0d5ea1bd9618d127584b4c77570cc
CVE-2024-57948,0,0,1a6e7a2592dc090b9c5651ce7d9dfb9cd17ca0fde703644781c208aeb34be331,2025-02-02T11:15:14.713000
CVE-2024-57949,0,0,ad521c28195b2cc8544ff311f495a1ba663d19f7873d7e81a8712409a3128dda,2025-02-11T16:06:53.447000
CVE-2024-5795,0,0,8c27870eb8f46b4876cdd6a9335698b3a6adeccd1af066b5f5391281ef70b349,2024-11-21T09:48:20.780000
CVE-2024-57950,0,1,4de3196a05a324d80ab81777eda50b90c773f35aad875db623dc77da16531c37,2025-02-21T16:50:43.010000
CVE-2024-57950,0,0,4de3196a05a324d80ab81777eda50b90c773f35aad875db623dc77da16531c37,2025-02-21T16:50:43.010000
CVE-2024-57951,0,0,f76b42abdfb86704a9c0f0688028e52627d4292026dcbe9e66fcb6fdcc25a743,2025-02-14T15:57:18.047000
CVE-2024-57952,0,0,4a13802904b48d770e3732d2a4be26769b2ca0854368681c7bafc9fb5cc58fc2,2025-02-14T15:52:04.957000
CVE-2024-57954,0,0,9470f77aeb1fbbfe941de0105e102e20083ecada6b6ee53e11c0487d84f43bb0,2025-02-06T13:15:39.467000
@ -279026,7 +279030,7 @@ CVE-2025-0301,0,0,cda9ba0b82510401c2a22912601ff18ed3f9b7d844758d6122fa1a90dc462c
CVE-2025-0302,0,0,520b4ce71044c2e5dd315ae70c4e78b808744ca684e983c2820d810ca427b2fc,2025-02-11T17:25:36.827000
CVE-2025-0303,0,0,427e73f8656e75f13eb1b1ae61974ae7fcbdff3a8a9b74fdeed4977c74ce26a7,2025-02-11T17:25:01.207000
CVE-2025-0304,0,0,43b635378f7d41d7ad8fab43684b25af88aaa82c7d23dc9598f346a0a6654f13,2025-02-11T17:24:47.520000
CVE-2025-0306,0,0,4d323f73db0781dad08a71cd877278ed734b33cabf11626e82510c57e39603e9,2025-01-09T04:15:13
CVE-2025-0306,0,1,d624312a1c8b12756fc5d0bd3e740f6bb7afb0946b71499dfca32a0f9d8ebfcd,2025-02-21T18:15:19.290000
CVE-2025-0307,0,0,4e3801b147f3e7e52232663dc15ea796a293389a992c3bbff51b0d288d5da39d,2025-02-07T18:15:28.337000
CVE-2025-0308,0,0,20b4c30a137b0aa706dc02a1057e58a96a971a6dabc5b03c8f76206a7f24265f,2025-01-18T06:15:27.880000
CVE-2025-0311,0,0,366f4de7a1625931fb622647148fc1b4e4ac9da9319c64a1d46f443dbcb2d417,2025-01-16T21:29:36.977000
@ -279322,7 +279326,7 @@ CVE-2025-0792,0,0,571c846d961e8b86c56927f453b9245146da4bf154d8adacec1a6f2ac61420
CVE-2025-0793,0,0,8be19ff13515f07895e2086e5466aca03e8900014540b1bb4c6de4c4a0098cb9,2025-01-29T14:15:27.653000
CVE-2025-0794,0,0,d0f8610657a801d90303b5fa19f71a1cc9d8ef6c1284239115ffdbbe58a9a796,2025-01-29T01:15:07.943000
CVE-2025-0795,0,0,78c31d616d37a01317d5bb724bd6c565c80d9cf22aaf5d4fae4283f153b591de,2025-01-29T02:15:26.830000
CVE-2025-0796,0,1,f761e4ee9090b929108a57155497189521139b54b85523bfa7225477c9e9a330,2025-02-21T15:47:52.213000
CVE-2025-0796,0,0,f761e4ee9090b929108a57155497189521139b54b85523bfa7225477c9e9a330,2025-02-21T15:47:52.213000
CVE-2025-0797,0,0,6473915a793ff9884aafab236f62e144affe799470e5962b8e5351b78ec1cbf9,2025-01-29T02:15:27.010000
CVE-2025-0798,0,0,f979c1c8f68dd351170669e51288efee24790cc09665b119a10fc6d4d02457d2,2025-01-29T02:15:27.190000
CVE-2025-0799,0,0,af43bf4a5768ce0bfb94d428736daaedcdfb3eccbac5f00bb0b5a7f9f2fd815b,2025-02-06T01:15:09.580000
@ -279330,7 +279334,7 @@ CVE-2025-0800,0,0,9e70c7ae7b67598c33ec1be994b15b025cffe8ea4961b83f2cb2dbf2f54224
CVE-2025-0802,0,0,058667df6e6f167c26958b65b8647dee5b306173c5334271f5f14ad30de88b99,2025-02-10T14:06:03.410000
CVE-2025-0803,0,0,a9f14556ef67fd49c2c0c4e57733c9351d270dba138685c5a84cb2509244be40,2025-02-11T19:48:06.860000
CVE-2025-0804,0,0,53f7fab3a5e8ab11732155ff3e17826c7a6f61d1fcafd348f26f842f26491509,2025-01-29T04:15:07.193000
CVE-2025-0805,0,1,0a80fc7fbb29af386989077a6ae0b2952958eaaed9c0ad64bd4348d006405869,2025-02-21T15:46:08.020000
CVE-2025-0805,0,0,0a80fc7fbb29af386989077a6ae0b2952958eaaed9c0ad64bd4348d006405869,2025-02-21T15:46:08.020000
CVE-2025-0806,0,0,a209d9e787c8d84edf5bd62206346babb48d1b53bd04304b3ccb35e3e13950e3,2025-02-11T19:46:22.923000
CVE-2025-0808,0,0,428483e8e66f55834849f1a517bd4a05acd223bb58e42750cf8cf49bc8e92e73,2025-02-12T04:15:09.950000
CVE-2025-0809,0,0,886fb9b396d2aad5cff53c02349fc0fee570a4920d4c4e68da65e25a660a34b2,2025-01-31T06:15:29.933000
@ -279343,7 +279347,7 @@ CVE-2025-0822,0,0,19eb63234ef431f63c50ebd89131653cdb608481cafa3dc46ad8d59b634f7d
CVE-2025-0825,0,0,7f81ca19fb96d77c0731181ff23092e49d4e8a157f0a8fa4a0ca13f53bda7923,2025-02-04T15:15:19.420000
CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000
CVE-2025-0837,0,0,01e74bd6a538b225c25e0ddb96358a3be7f6e922db9f297c9866ebad58b8fb7d,2025-02-13T05:15:14.623000
CVE-2025-0838,1,1,b3bedc01b96cdbe25c8f6922cea4e94abd529b95831b6c6b3a257c0f4033b9cb,2025-02-21T15:15:11.890000
CVE-2025-0838,0,0,b3bedc01b96cdbe25c8f6922cea4e94abd529b95831b6c6b3a257c0f4033b9cb,2025-02-21T15:15:11.890000
CVE-2025-0840,0,0,dcc73de0595740e9bb877d1b68b6e13f7a74ad4d50a26f82e22ce56d8c04db6b,2025-01-29T20:15:35.007000
CVE-2025-0841,0,0,d34ffb164e9f6e4e065c3a7bf9858f8af34d279265f630e92f70d22138303c3f,2025-01-29T21:15:20.973000
CVE-2025-0842,0,0,817f7fca87e6acf8de7da5acb91e6b0b68dcf3f7c69a8b83dc023ca38974b3a1,2025-01-29T22:15:30.283000
@ -279359,7 +279363,7 @@ CVE-2025-0859,0,0,aa1ef6a1093a15ab4491e05a4c630743ada11578233ef06a5ca4a6f0316692
CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e97,2025-01-31T20:42:08.143000
CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000
CVE-2025-0862,0,0,dee81cd1ce38cab472cf28eb1ce5e1d9037dd3bdafbd545dddc7d172ac5b30e6,2025-02-11T11:15:16.043000
CVE-2025-0864,0,1,f624aa3dae4420585b7ecd223f0cdc2320b0f2cdeffb279c09c255206ab70361,2025-02-21T15:32:38.470000
CVE-2025-0864,0,0,f624aa3dae4420585b7ecd223f0cdc2320b0f2cdeffb279c09c255206ab70361,2025-02-21T15:32:38.470000
CVE-2025-0865,0,0,80ee86109bc8176d915ab531176f207ba267c3135c04d72fc66dcd322326ed90,2025-02-19T08:15:21.853000
CVE-2025-0866,0,0,3255655eeba447d8936ae6bd9253ad70311926c87296ef63be450f30c50c2dad,2025-02-20T10:15:11.980000
CVE-2025-0867,0,0,00bdec3c0865b5f1af866315340e7f0b0b67377723af000ff55ae7ae60c91aed,2025-02-14T13:15:42.620000
@ -279399,7 +279403,7 @@ CVE-2025-0934,0,0,d8e0246ff2efc1b37a4d2ecfb87caa8fb3d271a34e502eac17b8e8e5be8b0f
CVE-2025-0935,0,0,4892b6ddf9de8c08a2def271507f8b9a6082ba4602bb2223678f98953998cf06,2025-02-15T09:15:10.583000
CVE-2025-0937,0,0,4d23918c79b57f87e4232ec5cbaefc29cbda81d3f6ffaa451d12f8c2e2e91465,2025-02-12T19:15:09.687000
CVE-2025-0938,0,0,48d7b602c8da430d9ec862aa287f133d1b7490f6d69b5ae38b3ee95dfcfec97c,2025-02-04T21:15:27.543000
CVE-2025-0939,0,1,762c206abd21032a2362d7d03f8696dc3cda9bf876a13f8c73ebb711762a318f,2025-02-21T15:38:36.803000
CVE-2025-0939,0,0,762c206abd21032a2362d7d03f8696dc3cda9bf876a13f8c73ebb711762a318f,2025-02-21T15:38:36.803000
CVE-2025-0943,0,0,812d30b4c0a4e8e8699f3b3fb871a6a6493f30967e63a2f74a7571847c91c34d,2025-02-07T14:03:39.237000
CVE-2025-0944,0,0,cdd675de7ca01f9e1244cd84900251a7dc3afbeb2151f5098fb67f204d1a23c5,2025-02-07T14:02:27.067000
CVE-2025-0945,0,0,626a8bb0e1e3d33d2410c60e4622d35d1cc8f4aaecba827352e38bd8bc8d062e,2025-02-07T14:00:06.057000
@ -279417,7 +279421,7 @@ CVE-2025-0971,0,0,633a244c07788fdbfdfdcc8863df0b7c407fe050fbfbd58b149dfe7ef4b5bb
CVE-2025-0972,0,0,5f696e03d949e1a49551d14d8f8b313b3e334794f668dc156f7f61acec16e7d4,2025-02-03T00:15:28.007000
CVE-2025-0973,0,0,43196315f17909695c2c467d44bd1754687d87efefe1c24665042841ac303abc,2025-02-03T01:15:07.263000
CVE-2025-0974,0,0,ed110dbaf1b5b967bb38884e7ebb961da1c8692b7e1576cd2f418134ffba9e99,2025-02-03T02:15:26.433000
CVE-2025-0981,0,1,77670fbd06993c72f858090d230bbbd76961e50ba2a7e6b7437ae6f3246e33de,2025-02-21T15:23:43.717000
CVE-2025-0981,0,0,77670fbd06993c72f858090d230bbbd76961e50ba2a7e6b7437ae6f3246e33de,2025-02-21T15:23:43.717000
CVE-2025-0982,0,0,743f39b6fc5d357ba3083d9f8f3d69f42ae53e58d798d8fd1e36d71ec2810d37,2025-02-06T12:15:27.267000
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
CVE-2025-0994,0,0,b317a7cd26062958ea654021aa4ef82b6a50be87030a20bb16c21acb6e3b9a13,2025-02-12T19:29:30.383000
@ -279446,7 +279450,7 @@ CVE-2025-1018,0,0,2c63b770ee1eb8404a9ddd357bafe82e637b324657da1135e622c93e59b669
CVE-2025-1019,0,0,97756c2ae277aabeaedab68cc3d112cc358adac0f1529efc7a271f2ce7df17b0,2025-02-06T19:40:29.267000
CVE-2025-1020,0,0,cf2c558f0a30d0c315344260ca52b6874799bcd8941b5300ae30cd6ec90d92d0,2025-02-06T21:15:22.943000
CVE-2025-1022,0,0,6e0bbfd94dedae55deabfe77a158c108c89075d5003cd8db6b7f154724b291e0,2025-02-05T20:15:45.470000
CVE-2025-1023,0,1,3d7ca211f2845b56c811ba42573b04f2b32d2538fff5ede6dadf5b8df8ad3d9c,2025-02-21T15:21:54.417000
CVE-2025-1023,0,0,3d7ca211f2845b56c811ba42573b04f2b32d2538fff5ede6dadf5b8df8ad3d9c,2025-02-21T15:21:54.417000
CVE-2025-1024,0,0,ed4a0103ce1a587d6b8e89274d412a572e44ce4224afbc332cb8a5ea9879c094,2025-02-19T09:15:10.280000
CVE-2025-1025,0,0,88de3d5b0a73f8ebb31a09c003423921c8f28cb5c5fcc232fde8c177bdee9679,2025-02-05T20:15:45.593000
CVE-2025-1026,0,0,035fc1dc2474697a852e52233cc9d299f677e1a0207511b21278e18a7e117de5,2025-02-05T05:15:10.687000
@ -279479,7 +279483,7 @@ CVE-2025-1083,0,0,16064cc59146b17006d53d67046a65a9c0b364257a94b2b373fa99c27da341
CVE-2025-1084,0,0,93fee3949ec546a58cb9da1c1619fb657dbde041632da87d4ac6e93d0d865098,2025-02-07T00:15:28.180000
CVE-2025-1085,0,0,1ad67fc3dcecff349f45b0918fd96e4db08dcd56b6d0ad12a44043dc90d21f08,2025-02-07T01:15:07.930000
CVE-2025-1086,0,0,224643d9b2f43f102432df09cca95386bdc4432ae24da6e421d85411b67c24c6,2025-02-07T02:15:30.523000
CVE-2025-1094,0,0,afe463c9103362ac899e2882edae895a7387cb03ad909215aec875f07598b388,2025-02-21T11:15:09.800000
CVE-2025-1094,0,1,dca1378d2e11e054a0baff76bda52bd172b0e41af32ad66e0ce66e679989e2ec,2025-02-21T18:15:20.033000
CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000
CVE-2025-1099,0,0,866ea005495998eedc94be57a64f094566d9af9b611a4dc7ae3f41bc7a1f4d42,2025-02-14T12:15:29.460000
CVE-2025-1100,0,0,006211606093ec28f1ff8daf942d69911ef4c534c65359a0897a00ee27f87cf6,2025-02-12T14:15:31.647000
@ -279638,6 +279642,7 @@ CVE-2025-1390,0,0,02ff75a3058ee51af8713fa469c7bed94932b28a55e59655029e36f100f66a
CVE-2025-1391,0,0,a1f2e3a8ca093b8de620c0e72b50119acca7a6fd87679168958e3acea938ff79,2025-02-17T14:15:08.413000
CVE-2025-1392,0,0,381fc64763a47738c9a933c7e4bcfcc84ef66c73e4a81eacddf01751da768947,2025-02-17T16:15:16.120000
CVE-2025-1402,0,0,d705975e2d4d051899b63fd949106f689e6c20cfe60f25e8d672a004176300f9,2025-02-21T12:15:30.607000
CVE-2025-1403,1,1,cdf9a8de03213e0ac7f7767452341bf79edc3d976615c3099248fc0b29544461,2025-02-21T18:15:20.550000
CVE-2025-1406,0,0,4b4d1ff21a0ba0811215bc35d6774baf51e77603ba63fc9e650d11b6ceed4f86,2025-02-21T04:15:10.347000
CVE-2025-1407,0,0,70f77407081cff4de8b8d13a9badac21a5019470fe2d018139382b1f1331d1e8,2025-02-21T04:15:10.510000
CVE-2025-1410,0,0,f4fa6259cc030a3c18635b5a57715bd57396d86c3ee145748700746fe04576c9,2025-02-21T09:15:10.200000
@ -279654,12 +279659,14 @@ CVE-2025-1483,0,0,76cafe28555a10dbbf45546d6f75e89aec9e95ad54aaa4bc0e47714c7e682b
CVE-2025-1489,0,0,33b499615f5a9d47836021ac5ca54335451238d68926a899e34dbf51c4c427a7,2025-02-21T12:15:30.740000
CVE-2025-1492,0,0,4cf0d4c2a3031b043d71ffc226830ce9ea797081b5a3ae5a1323a931931fb733,2025-02-20T02:15:38.553000
CVE-2025-1535,0,0,c8067c833343598442009f0c070dbd08eddedc896cdd41576fc32acd051fac52,2025-02-21T12:15:30.877000
CVE-2025-1536,1,1,10f03af38479b02a7f4a530d7c1cc2f1541bce31ead11e490c0a23f9eb3125a3,2025-02-21T15:15:12.270000
CVE-2025-1537,1,1,f2adfd985c6cb9647b8158d323777cef6f7e47a1a971653763a33752159d0490,2025-02-21T15:15:12.460000
CVE-2025-1538,1,1,f23820c68e18f9b69992cbbd638dc9234157058e65383774c87c2d0963dfe840,2025-02-21T15:15:12.630000
CVE-2025-1539,1,1,5db1c9ba382e4f2310cd1437a19e21756ae2ea026c47a9ed1bdfc313a5fae36a,2025-02-21T15:15:12.830000
CVE-2025-1543,1,1,079e018e26abed20b54fa2585c54e2a36ef2ea5d437d5ac399037949b75daa24,2025-02-21T16:15:32.787000
CVE-2025-1544,1,1,6dfefee8c1beb9250313ea7950237ab90994f9ae50b689b8e2c00c600bd9529e,2025-02-21T16:15:32.953000
CVE-2025-1536,0,0,10f03af38479b02a7f4a530d7c1cc2f1541bce31ead11e490c0a23f9eb3125a3,2025-02-21T15:15:12.270000
CVE-2025-1537,0,0,f2adfd985c6cb9647b8158d323777cef6f7e47a1a971653763a33752159d0490,2025-02-21T15:15:12.460000
CVE-2025-1538,0,0,f23820c68e18f9b69992cbbd638dc9234157058e65383774c87c2d0963dfe840,2025-02-21T15:15:12.630000
CVE-2025-1539,0,0,5db1c9ba382e4f2310cd1437a19e21756ae2ea026c47a9ed1bdfc313a5fae36a,2025-02-21T15:15:12.830000
CVE-2025-1543,0,0,079e018e26abed20b54fa2585c54e2a36ef2ea5d437d5ac399037949b75daa24,2025-02-21T16:15:32.787000
CVE-2025-1544,0,0,6dfefee8c1beb9250313ea7950237ab90994f9ae50b689b8e2c00c600bd9529e,2025-02-21T16:15:32.953000
CVE-2025-1546,1,1,7a27654d265dd0e0c87a112414ca356bea46a4aa4326e4b6c538ca7fa17cdb3d,2025-02-21T18:15:21.523000
CVE-2025-1548,1,1,dc77eed63b703112b11128556adaac7473d7e2c58e805a91497e7bcaa94271fc,2025-02-21T17:15:13.897000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
@ -280177,18 +280184,18 @@ CVE-2025-21677,0,0,aee79bcda6ce5184f23bc0dd5a0019eff6afcdacb0d17d6f4e33d3cff1406
CVE-2025-21678,0,0,9cb21e99665adcd569ac2adfbdf98ef6f92d8c1c4c0a5b5709324da1e0646d05,2025-02-02T11:15:16.117000
CVE-2025-21679,0,0,009d8fd88ff602d149cf09ea780bd027b79138cc9787bf079d7e8b5eae764ff3,2025-01-31T12:15:29.070000
CVE-2025-21680,0,0,ab176bb9040b4730f514a36acb954e8ef4736becce0eddc54061e7998d46f0ed,2025-02-04T15:28:08.510000
CVE-2025-21681,0,1,8393a1e343743a2babeb70a3eb9de6b474277c6ffc77e16b2f335b553e34479a,2025-02-21T16:54:12.800000
CVE-2025-21681,0,0,8393a1e343743a2babeb70a3eb9de6b474277c6ffc77e16b2f335b553e34479a,2025-02-21T16:54:12.800000
CVE-2025-21682,0,0,462d4deac5e2e59ee2d3e31f4dfc91555e87d58a1e47d6fecad84acad53c8a69,2025-02-04T15:25:48.707000
CVE-2025-21683,0,0,eb90b34b8c26cfd5a6fc922b697d6b0c2dfe15c32e6ed59da1ae357c1a3f7802,2025-02-03T20:01:29.163000
CVE-2025-21684,0,0,de5856d3b307402a660ae10df3d9a42e6c6793685f8030f7896a6f7cf99333ff,2025-02-21T14:15:52.103000
CVE-2025-21685,0,0,ddcc9f74d2788921662827130d064ca08f136819e30b8929e36a7dc983d8aa08,2025-02-11T16:11:19.543000
CVE-2025-21686,0,0,75eca37a2a9f73fbbcf8475c4f690bd033d8354a0d1793366da443130059b4db,2025-02-10T16:15:38.100000
CVE-2025-21687,0,1,d2be3c07fa40d2b0700c26116c096842bd5c6c7ed676a7a97931879912c5713b,2025-02-21T16:49:03.180000
CVE-2025-21688,0,1,83d96137942cce89d182c2e18cb17480888099104bcec5d853760c9570117a30,2025-02-21T16:41:20.307000
CVE-2025-21689,0,1,08605a9dadcb5e6f41f433e2a7a386a3665d3af78ce886565ea8e399d128b89e,2025-02-21T16:36:30.260000
CVE-2025-21690,0,1,be2b9cba4362e4032926d1ec773a3725bd1e1480c8cf9a50976015a301688b92,2025-02-21T16:30:37.037000
CVE-2025-21687,0,0,d2be3c07fa40d2b0700c26116c096842bd5c6c7ed676a7a97931879912c5713b,2025-02-21T16:49:03.180000
CVE-2025-21688,0,0,83d96137942cce89d182c2e18cb17480888099104bcec5d853760c9570117a30,2025-02-21T16:41:20.307000
CVE-2025-21689,0,0,08605a9dadcb5e6f41f433e2a7a386a3665d3af78ce886565ea8e399d128b89e,2025-02-21T16:36:30.260000
CVE-2025-21690,0,0,be2b9cba4362e4032926d1ec773a3725bd1e1480c8cf9a50976015a301688b92,2025-02-21T16:30:37.037000
CVE-2025-21691,0,0,0be10dae2960ce4184af79c8851fe271b17975e4a70fbd2fd5e02d9fceba956d,2025-02-10T16:15:38.660000
CVE-2025-21692,0,1,035869e70635131e4bc45eada54414f9b05505ca42a556efe739e328b5ef2fc9,2025-02-21T15:59:44.317000
CVE-2025-21692,0,0,035869e70635131e4bc45eada54414f9b05505ca42a556efe739e328b5ef2fc9,2025-02-21T15:59:44.317000
CVE-2025-21693,0,0,48af54d2ad51fc33b163ee78589c7ffe2bb45cfe36de093cbf657150eff1c50b,2025-02-10T18:15:35.367000
CVE-2025-21694,0,0,4d66a5057f1d2e8907f5e975a4f0fe5e549c1e634550338b1bfb73de2ad5699c,2025-02-14T15:46:40.857000
CVE-2025-21695,0,0,4438167eeca6bd858c177d9ae492872f06b6184828f1c921782c8da088e8c482,2025-02-14T15:44:28.450000
@ -280603,7 +280610,7 @@ CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8
CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000
CVE-2025-22846,0,0,76c8291b8e60796d4d231c4f9e93fb703f0a242f7c8e1a0b68b5fb28dc77455b,2025-02-05T18:15:31
CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000
CVE-2025-22866,0,0,fc628e612226994670042c6a80d861aab3b14ae86f86a5f49a1359b3e287ae21,2025-02-11T15:15:20.870000
CVE-2025-22866,0,1,c708175c229fdd910b5da4acb829b622112b0d84eed2186edc0f9bf19e465443,2025-02-21T18:15:32.243000
CVE-2025-22867,0,0,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000
CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000
CVE-2025-22888,0,0,f5d32f8dd85089b4081119504cdbaa08e62536c566f34b631736ce9146eeb63c,2025-02-19T06:15:21.687000
@ -280633,7 +280640,7 @@ CVE-2025-22962,0,0,edfa6947f0850e24eb9cdf90af6759e9e22a516ea9c64433cee19e5c5eaec
CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000
CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000
CVE-2025-22968,0,0,d3d48189e9b72af1c9aeb72931ff25b490499842dd9dca10fe5551a85839cd34,2025-02-18T22:15:18.143000
CVE-2025-22973,0,0,48f3f25c02a26c1325a96f8c42c2c1691b076404cc9687b2a0d5f976b5b0aea1,2025-02-20T23:15:12.120000
CVE-2025-22973,0,1,b448437ac24e0d115300ac0a18a33b0f031d26cd6428b09fcc05bcdedc10d677,2025-02-21T18:15:32.480000
CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000
CVE-2025-22978,0,0,c26d3b35b5f5b247c22bc9e725ddb59da99594ad5fac650f59f0b0b41ffbe946,2025-02-18T19:15:26.930000
CVE-2025-22980,0,0,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000
@ -280643,7 +280650,7 @@ CVE-2025-22992,0,0,9c2224e338558ccc5fdf942d723bafbe861c5e19d73a3269c58858cc57989
CVE-2025-22994,0,0,82a19f803fc092043edd0b748f001df679276a70393f74dc553062174651b1db,2025-02-18T19:15:27.050000
CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000
CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000
CVE-2025-23001,0,0,e67bba795a0e7662c0de688d2cbb0a560d07c101a7dbbf29a35b6188802b9bfe,2025-02-21T05:15:13.173000
CVE-2025-23001,0,1,a661c9ff25c543dcf089dc4c4188fedb40f499aceeca183680e7eb66234e4f62,2025-02-21T17:15:14.103000
CVE-2025-23006,0,0,6a102100f33be5cd88a3ed9a70e7948fb90e89028ab000876d344a5774cdca9c,2025-02-18T20:15:27.493000
CVE-2025-23007,0,0,8755d54df92e87b37e4145f55351bcaff32866353888bcdbfad8a65ec70ebf2c,2025-02-18T19:15:27.263000
CVE-2025-23011,0,0,0ac026798cd262001be0206676fdedf031be9d5d65106916b11a08692a6fcc17,2025-02-03T20:15:36.823000
@ -281599,7 +281606,7 @@ CVE-2025-24803,0,0,fe008de1670d752b88603be7275331d65ec4b62f8fa4ecdcde55edf7b9113
CVE-2025-24804,0,0,02d18037eaeb1381e664f001332da6db5511dc7ada5361921f722c1c2db334f2,2025-02-05T19:15:46.350000
CVE-2025-24805,0,0,d4af857e51dcf82a508fb39999b1c3ef58f60bf41c569739cac4b4e9ff451531,2025-02-05T19:15:46.487000
CVE-2025-24806,0,0,3615a80d11e6d5be762749831aafa9affc57f87da9591fbb247c0bfd6040a946,2025-02-19T18:15:24.467000
CVE-2025-24807,0,1,4f25fdb831d136a8bb01cf6e1cb78254f8ee6bb89343164d5968c2910e78b68f,2025-02-21T15:26:57.507000
CVE-2025-24807,0,0,4f25fdb831d136a8bb01cf6e1cb78254f8ee6bb89343164d5968c2910e78b68f,2025-02-21T15:26:57.507000
CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000
CVE-2025-24811,0,0,ffb489ebd0b78eee2cb2623897d29c3c6f63b8d9575fa93eac16db339b1da16f,2025-02-11T11:15:16.907000
CVE-2025-24812,0,0,4df5af9a6492be99a429ed0818190022be21ded8f5dd8f61d775491997406b73,2025-02-11T11:15:17.080000
@ -281664,14 +281671,14 @@ CVE-2025-24965,0,0,1eea1c93df3753c9a78c066452578697bf3a1e6ada6180e7fc21b687c62b3
CVE-2025-24966,0,0,b80836066f16ef60a21a0a7b9508ce5a1c7fd944d74b490ee39c70017ee4f012,2025-02-04T20:15:50.627000
CVE-2025-24967,0,0,4e055c98bc0e7b8b0c7152c15ae500f83c57d83dd2d7c88e7592a2fe0a4c5eca,2025-02-04T20:15:50.813000
CVE-2025-24968,0,0,e07f901cf7b356f85243eb69a8d49d189b396867f0cba0e1d10bbb82d5ac61c1,2025-02-04T20:15:50.997000
CVE-2025-24970,0,0,0e83d01cc62fa2a3b33f8519a11d8a80d944db867b8df42ca0423db69356caa1,2025-02-11T16:15:51.920000
CVE-2025-24970,0,1,1ec79588f47d61fc7f5eddb1acee5b0ffee64dc90dbd9954713ce89fba4e7d11,2025-02-21T18:15:36.383000
CVE-2025-24971,0,0,86b807652e33ff44dd3b142b2761514007dc81b34e3a1e7b26dd65d9b5964489,2025-02-04T20:15:51.150000
CVE-2025-24973,0,0,4e0ec487b13ad29adffd9e40afc6f86ee9194b71c6b3a7da9dc820821aed9598,2025-02-11T16:15:52.020000
CVE-2025-24976,0,0,edf3d8769237d54851dd3a3135d0c605355b9e2500561e211400c75569bec9ec,2025-02-11T16:15:52.163000
CVE-2025-24980,0,0,93f5736ad811fe47d31660fba8d04da062656820cb9c23ad70329bc04caee348,2025-02-07T22:15:14.617000
CVE-2025-24981,0,0,53e7b164e1e8344d44125c41e4616160d5eab5393458f601a78911be7625504e,2025-02-06T18:15:32.847000
CVE-2025-24982,0,0,bb2e7ed21733f592bc39cfa057a56b08d6aa180f6c36351b70c6f04a2bffef43,2025-02-04T05:15:10.543000
CVE-2025-24989,0,0,18398a7ff9954e9bafbbadc9352561b54361754d94c4a6b2fed25e77f5d4c120,2025-02-19T23:15:15.167000
CVE-2025-24989,0,1,21cf3fae3328bb32e07663aa2ecb239822c3a9af0543e753f6592f49ac90b222,2025-02-21T18:15:36.903000
CVE-2025-25039,0,0,2c724cd99b172314f0551d5e25be43761b6ee80f3cb5f750659e6bd374aa7b28,2025-02-04T19:15:33.977000
CVE-2025-25054,0,0,bdc6a9739f43c6ee9f7dd792b2a86b688f134fb79a9c00222c307f085f96633f,2025-02-19T06:15:22.010000
CVE-2025-25055,0,0,7bdf77ab21026e12270a24a96ec203744f408d808d0439c316497fbe0f801ffc,2025-02-18T00:15:21.277000
@ -281752,7 +281759,7 @@ CVE-2025-25187,0,0,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef
CVE-2025-25188,0,0,8332b0ed663268898f9dc507eb6ba5a1e3efef5bd07e1eeae60d0874cbfc0e96,2025-02-10T18:15:35.827000
CVE-2025-25189,0,0,a628e87e2edecc47dcfffa2e7708c10cb2b7cfab3038d1b46f221f2a9f0dada1,2025-02-11T16:15:52.313000
CVE-2025-25190,0,0,4b725faaa031d99f25796e8b66ce91cf84616a2e443190ddbf07d361baa5a988,2025-02-11T16:15:52.420000
CVE-2025-25193,0,0,9558fa41c42a9fe022dbb8b56e9a742f8cc51b4e80cd395542625bebe245b7b4,2025-02-11T16:15:52.523000
CVE-2025-25193,0,1,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
CVE-2025-25195,0,0,9f82ad0eee600ff678607270c492d4cbcd33d9a3de8e83d2ecd9f2fbea3012e4,2025-02-13T22:15:13.100000
CVE-2025-25196,0,0,64d311cb70cf393ffdb832d996d10fccb4f0f78c9555223154c14b6cdbd71102,2025-02-19T21:15:15.577000
@ -281808,6 +281815,9 @@ CVE-2025-25472,0,0,8e8e171c0300ed9c4535deaeb2c2bc6dfdc66f8eea702fd32fbe4b063c04d
CVE-2025-25473,0,0,55a66f96efd34a8bf6959b64a64a5a6f9abb5389cacde3b98abeba35f1566b08,2025-02-20T22:15:30.863000
CVE-2025-25474,0,0,19b4b9815528a4b62620eec453fddeb47ce33007b3a5a250ea134223fc74a338,2025-02-20T22:15:31.027000
CVE-2025-25475,0,0,da2a2d1f29106b1a0859c6a65cc60cebccb336e99ff5a9bda978918b583eb1de,2025-02-20T22:15:31.190000
CVE-2025-25505,1,1,a2eed0cc5f04f9168a6eda8517a9fd9a9e746f7397238d6dadc78b8e4e5407f4,2025-02-21T17:15:14.333000
CVE-2025-25507,1,1,44d6e918ef0bc440e8cbab5160b92642b731f7412ff0fef6a4d16173cb3aaf74,2025-02-21T17:15:14.453000
CVE-2025-25510,1,1,c740e6708648b84dbdfc8d5dc75d7e835040649721331c8b20efee2024d1c283,2025-02-21T17:15:14.567000
CVE-2025-25522,0,0,9f2c0bc0a6dbb67154353c2da3969483621b5d35364f73acfaa2a34b0ff5a40b,2025-02-13T17:17:20.517000
CVE-2025-25523,0,0,9c6d5a6c8c747b7673e69ebf58bf535f17db00e0831b58073ddd586410cf36d9,2025-02-13T18:18:23.400000
CVE-2025-25524,0,0,40af9c5e5be067f2e684b500c6cae4a5dab6d519bde35d9c0fd3353781274a87,2025-02-13T18:18:23.597000
@ -281817,15 +281827,15 @@ CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09
CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000
CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000
CVE-2025-25530,0,0,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000
CVE-2025-25662,0,0,9633e7f3b8f59c6e43d297b89d8d63c3b765d10fd1ce3ef006a57e6d7aaa1aa0,2025-02-20T23:15:12.233000
CVE-2025-25663,0,0,11f6fe586c7309f7c404b1a4660d84bf0ff2637aa33fef6376abb9eb9047a7ae,2025-02-20T23:15:12.350000
CVE-2025-25664,0,0,fd5e33bbcf182bc19c85627ba3958c29fc1634aa20cfe43370fb7e30e8083445,2025-02-20T23:15:12.453000
CVE-2025-25667,0,0,04cd22c46670270f6f71473f21ec8f3c99204556438247cd1d1beabf97f08124,2025-02-20T23:15:12.560000
CVE-2025-25668,0,0,3df5760d364e88ade9438b44542c5d4358e136bcaa43c5fc301696018382cc38,2025-02-20T23:15:12.660000
CVE-2025-25674,0,0,14b6436fbbb1c91abf2546b8ce130c55edf26735e0ed8e2fab0518ad767666b9,2025-02-20T23:15:12.767000
CVE-2025-25675,0,0,3e57c2d3bc2aa887684bb713b138a772b1d559831219b79651e09f2e40dceb8a,2025-02-20T23:15:12.870000
CVE-2025-25676,0,0,7032e39077bd2daf2ff52588ad7d7ec71ac13fa1a2cd0aa37e871716af3cdbae,2025-02-20T23:15:12.977000
CVE-2025-25678,0,0,c6f1766b0d37ffc159f7d9618b225606accb22db180898536b660b550377464d,2025-02-20T23:15:13.077000
CVE-2025-25662,0,1,d4416cf9571f254ff138d844bee48a97de56cce7c015b6a71760613be494b90e,2025-02-21T18:15:37.760000
CVE-2025-25663,0,1,2c66463e17f0da9d9b59da03f32234807a5e0504a922f80726e5f203d3e2d884,2025-02-21T18:15:41.693000
CVE-2025-25664,0,1,a850b1756187529b43d44abf29c2e6255214e11c23d9ad57a237c7a415fbb154,2025-02-21T18:15:45.417000
CVE-2025-25667,0,1,6c0b0297748635f776714c0ebe80a05f6adac25162cb42e550787d760f969504,2025-02-21T18:15:49.247000
CVE-2025-25668,0,1,729e4fefbc7da0d23aa96e4833b1abc314e453357edfa400169abdda747d409f,2025-02-21T18:15:53.063000
CVE-2025-25674,0,1,6d025ae220f91c2a57ba855f1dbf317fed89516da1582298cc4667448bef52a0,2025-02-21T18:15:56.900000
CVE-2025-25675,0,1,bcf48b74286fdf685bef73e0a7e4d2cb90868ad9ff8b8120157d8f7bb75cd351,2025-02-21T18:16:00.790000
CVE-2025-25676,0,1,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000
CVE-2025-25678,0,1,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000
CVE-2025-25679,0,0,cf57aa8cf629bd0d8913086ddf39d8a39e3aaa047fd06d8634cc4ab8c13ad856,2025-02-20T23:15:13.183000
CVE-2025-25740,0,0,e293852be5217bbbef8df2d3ca6ee22f2f657a54490e20535567ff73eeb99c95,2025-02-14T15:15:13.190000
CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000
@ -281834,6 +281844,12 @@ CVE-2025-25743,0,0,65b470adc61c7865b16e040e95e97b019f65181411fb698ca491a4d95f9cd
CVE-2025-25744,0,0,a94e293e8b090a3f233edd8811f540b50467cbc536ca78f870a52d5731bb3874,2025-02-19T19:02:27.687000
CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000
CVE-2025-25746,0,0,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000
CVE-2025-25765,1,1,3adfd18b0523627b6799d8f3fe18ae9718bbe1da9964013c36335171c37fde7a,2025-02-21T18:16:12.420000
CVE-2025-25766,1,1,57af4b18309fbf59a64f83f90aab5cd3bfbe39741914f4dbb52a684f7edb326e,2025-02-21T18:16:12.647000
CVE-2025-25875,1,1,4ae4a41a47ee817f194e373119e06368304ab5bcd19c90c39f2f631e9bca1c06,2025-02-21T18:16:12.873000
CVE-2025-25876,1,1,781cc67b1526b7a9d84c6edde310d5978d0151552f4a02b76b75b21b7f2ba981,2025-02-21T18:16:13.090000
CVE-2025-25877,1,1,cb9bc4b1ef47ac3fd40fb13bdf959cf0b5dc1602d72021367ffc063cdf49d596,2025-02-21T18:16:13.320000
CVE-2025-25878,1,1,eb2481ef9a3e483d2a262f535e1fbfbcc96b61c6e5e3423e1f37d26dcf604e34,2025-02-21T18:16:13.547000
CVE-2025-25891,0,0,9ffea80911f1e47c70786967af69881dfb74e93322751a9813ef61512aae0c90,2025-02-19T16:15:41.447000
CVE-2025-25892,0,0,5da0a3f25cf580ce2a0d5ec98e1c2a6fcbac4e2bca4f1888dc83cf1e3c60adc9,2025-02-19T16:15:41.600000
CVE-2025-25893,0,0,3668fbd05f91f142c0368e72bcb53f03aa560730fd7cf7b399c07758d1bacf87,2025-02-19T16:15:41.763000
@ -281851,8 +281867,8 @@ CVE-2025-25944,0,0,be3957e03ef6cc753272acb47a0146e6f3e330f45af5947134f7dfc1abcce
CVE-2025-25945,0,0,11a45dbb9f85298a4f5f5f1ffa2ff82703bd23ae19884ad1bb8a03ee40102cde,2025-02-20T15:15:15.073000
CVE-2025-25946,0,0,b9c23bf08cd92d7c9cca31f0d0d39dfabaeeb4f8fda065f73ab8d2322e4edf92,2025-02-20T15:15:15.227000
CVE-2025-25947,0,0,bf5a589bf21a858d30ce3f9e75804530a939c4b2ce95d48bea111bb37f0f00d5,2025-02-20T15:15:15.530000
CVE-2025-25957,0,1,989735baea9eccbb2abe8e79b59e670ad8c367df2d7fb160bdfc8f4518f1efa0,2025-02-21T15:15:13.067000
CVE-2025-25958,0,1,0f8b1b28a95747b988ec24f56374cc73cf997d93ede793e430858c23744338af,2025-02-21T16:15:33.173000
CVE-2025-25957,0,0,989735baea9eccbb2abe8e79b59e670ad8c367df2d7fb160bdfc8f4518f1efa0,2025-02-21T15:15:13.067000
CVE-2025-25958,0,0,0f8b1b28a95747b988ec24f56374cc73cf997d93ede793e430858c23744338af,2025-02-21T16:15:33.173000
CVE-2025-25960,0,0,228783659f244747218c1b28275971690dda017b55124f28a600dc65d83f2d89,2025-02-20T22:15:31.493000
CVE-2025-25968,0,0,09bd93194eede08beb1dc709f5461851717c635b130d25408ef11afa03180ff0,2025-02-20T20:15:46.993000
CVE-2025-25973,0,0,bc6886ccb2c9ecf1c1935d02cb042518ac538d8013efc592ae1b5fb12fc0b35c,2025-02-20T20:15:47.153000
@ -281863,7 +281879,8 @@ CVE-2025-25992,0,0,3d1e4e5fceffc298e311378ec712b3436e60db9d6c9a25f2ff71f3ddce497
CVE-2025-25993,0,0,b265230a291556165ba6f150cab5c736bd9594a64a150461cb0009dc8129dba1,2025-02-14T19:15:14.763000
CVE-2025-25994,0,0,aada5f394d667f977ebabeb966b8805ece67cc43768150de72852a4683195b84,2025-02-18T15:15:18.923000
CVE-2025-25997,0,0,8311ed2a6df06b368ecafa86d7532bb151f440bce533690a11763d40390899ab,2025-02-18T15:15:19.063000
CVE-2025-26013,1,1,da1c2fe2b2e8d2bd9dd72315d47e7dfcae0c492932728e9a04e7993832212c37,2025-02-21T16:15:33.313000
CVE-2025-26013,0,0,da1c2fe2b2e8d2bd9dd72315d47e7dfcae0c492932728e9a04e7993832212c37,2025-02-21T16:15:33.313000
CVE-2025-26014,1,1,4c1a90c8dc606f24e0044dd527fca4e86b8cdadd364a955283c3e7a026ac0a07,2025-02-21T17:15:14.680000
CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8cee5,2025-02-19T21:15:15.920000
CVE-2025-26156,0,0,ed50a78dc07d84b8a6cd1651b254bd95afaa0a14b0b845be84f546d924c3a171,2025-02-14T19:15:15.033000
CVE-2025-26157,0,0,d004ab43d8fe8ea78bd140330b58a555de4fee9e9368d957f123229a36026b7e,2025-02-14T20:15:37.543000
@ -281871,10 +281888,10 @@ CVE-2025-26158,0,0,a0e00f753c83eabc9278c9305568ba6da08dc96a9ef521b68e39e9b3fd8a7
CVE-2025-26304,0,0,4aba16d7a61da7bc2842eb12b4bf3c9c6246498e6a8b53b4a819b512fc92d4ae,2025-02-20T17:15:12.260000
CVE-2025-26305,0,0,3dc5b1438bcbf16d99e86f03c2d33af491ec29c798bc0acfd78d8d014fc73cc0,2025-02-20T17:15:12.377000
CVE-2025-26306,0,0,ad0323aa5286b06e3a2496c2f503724f28b4742676b125b1f5a4176f3e7db0fb,2025-02-20T17:15:12.490000
CVE-2025-26307,0,1,985beed55a8f638fd04d0a13d2505a90eaf2bf50598c60df60e93fb1afdd71ae,2025-02-21T15:15:13.223000
CVE-2025-26307,0,0,985beed55a8f638fd04d0a13d2505a90eaf2bf50598c60df60e93fb1afdd71ae,2025-02-21T15:15:13.223000
CVE-2025-26308,0,0,3e072877f412939a3c50a2422a54d75c10bdf23be48f05068cfdfbe70a89a12d,2025-02-20T17:15:12.730000
CVE-2025-26309,0,0,d91dfb16f99b8b177a88ed69fb910d1699945bbbc6ceb6223bd02a4bc745f70c,2025-02-20T17:15:12.853000
CVE-2025-26310,0,0,29f1fcba38b2588cfaea820a424c57e92680a0eca4091920c8fd5bfcf8d6fd62,2025-02-20T17:15:12.967000
CVE-2025-26309,0,1,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000
CVE-2025-26310,0,1,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000
CVE-2025-26311,0,0,13656d99d63094c8d41b810c6263cffd50113ae9c1f9bd8a88dff3952f87e18f,2025-02-20T21:15:25.907000
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000

Can't render this file because it is too large.