mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2025-01-30T09:00:28.840439+00:00
This commit is contained in:
parent
746770fa4c
commit
a60318688d
60
CVE-2024/CVE-2024-134xx/CVE-2024-13457.json
Normal file
60
CVE-2024/CVE-2024-134xx/CVE-2024-13457.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13457",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-30T07:15:07.067",
|
||||
"lastModified": "2025-01-30T07:15:07.067",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Event Tickets and Registration plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.18.1 via the tc-order-id parameter due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view order details of orders they did not place, which includes ticket prices, user emails and order date."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3229935%40event-tickets%2Ftags%2F5.18.1.1&old=3227011%40event-tickets%2Ftags%2F5.18.1",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0cc2261a-889e-40ec-8382-48de65b91b34?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2024/CVE-2024-134xx/CVE-2024-13470.json
Normal file
72
CVE-2024/CVE-2024-134xx/CVE-2024-13470.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2024-13470",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-30T08:15:26.690",
|
||||
"lastModified": "2025-01-30T08:15:26.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ninja Forms \u2013 The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode in all versions up to, and including, 3.8.24 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ninja-forms/tags/3.8.23/includes/Display/Render.php#L708",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ninja-forms/tags/3.8.23/includes/Display/Shortcodes.php#L8",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ninja-forms/tags/3.8.23/ninja-forms.php#L953",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3229932%40ninja-forms%2Ftrunk&old=3226451%40ninja-forms%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f2b46a9-d228-43b4-84af-d56218076087?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-136xx/CVE-2024-13642.json
Normal file
60
CVE-2024/CVE-2024-136xx/CVE-2024-13642.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13642",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-30T07:15:08.700",
|
||||
"lastModified": "2025-01-30T07:15:08.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Stratum \u2013 Elementor Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Hotspot widget in all versions up to, and including, 1.4.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3228058#file6",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ccaee26-277e-4730-8242-9b5e6a281fcc?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
22
README.md
22
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-30T07:00:20.887229+00:00
|
||||
2025-01-30T09:00:28.840439+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-30T06:15:29.653000+00:00
|
||||
2025-01-30T08:15:26.690000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,24 +33,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
279429
|
||||
279432
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-10309](CVE-2024/CVE-2024-103xx/CVE-2024-10309.json) (`2025-01-30T06:15:28.827`)
|
||||
- [CVE-2024-12163](CVE-2024/CVE-2024-121xx/CVE-2024-12163.json) (`2025-01-30T06:15:29.113`)
|
||||
- [CVE-2024-12400](CVE-2024/CVE-2024-124xx/CVE-2024-12400.json) (`2025-01-30T06:15:29.223`)
|
||||
- [CVE-2024-12638](CVE-2024/CVE-2024-126xx/CVE-2024-12638.json) (`2025-01-30T06:15:29.333`)
|
||||
- [CVE-2024-12708](CVE-2024/CVE-2024-127xx/CVE-2024-12708.json) (`2025-01-30T06:15:29.440`)
|
||||
- [CVE-2024-12709](CVE-2024/CVE-2024-127xx/CVE-2024-12709.json) (`2025-01-30T06:15:29.557`)
|
||||
- [CVE-2024-12921](CVE-2024/CVE-2024-129xx/CVE-2024-12921.json) (`2025-01-30T06:15:29.653`)
|
||||
- [CVE-2025-0373](CVE-2025/CVE-2025-03xx/CVE-2025-0373.json) (`2025-01-30T05:15:09.590`)
|
||||
- [CVE-2025-0374](CVE-2025/CVE-2025-03xx/CVE-2025-0374.json) (`2025-01-30T05:15:10.527`)
|
||||
- [CVE-2025-0662](CVE-2025/CVE-2025-06xx/CVE-2025-0662.json) (`2025-01-30T05:15:10.653`)
|
||||
- [CVE-2025-23374](CVE-2025/CVE-2025-233xx/CVE-2025-23374.json) (`2025-01-30T05:15:10.787`)
|
||||
- [CVE-2024-13457](CVE-2024/CVE-2024-134xx/CVE-2024-13457.json) (`2025-01-30T07:15:07.067`)
|
||||
- [CVE-2024-13470](CVE-2024/CVE-2024-134xx/CVE-2024-13470.json) (`2025-01-30T08:15:26.690`)
|
||||
- [CVE-2024-13642](CVE-2024/CVE-2024-136xx/CVE-2024-13642.json) (`2025-01-30T07:15:08.700`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
25
_state.csv
25
_state.csv
@ -243609,7 +243609,7 @@ CVE-2024-1030,0,0,6d2d82ef3072f02e7c34d7489d5c3e0649bc9fdc5d37c6ed18885f5f961ee1
|
||||
CVE-2024-10300,0,0,b331a7250f0bb5e96bf1a56c31d026cc1e60b1d8760e3a75fc1ea9661d4f29cf,2024-10-25T18:49:01.953000
|
||||
CVE-2024-10301,0,0,1f7fa6a8df34271bc05be880ddb0769e183b93603d32248bd264a0ee91ace111,2024-10-25T18:47:54.033000
|
||||
CVE-2024-10308,0,0,7d25344eaafedd87dec065a0c2fdf72a371424d31caf12f177490522cd87b5ec,2025-01-09T20:30:43.060000
|
||||
CVE-2024-10309,1,1,7259f2fc8fba57aaf8a460d59c540d51c2e9ece4fcfc21f4851d3f26a27a4787,2025-01-30T06:15:28.827000
|
||||
CVE-2024-10309,0,0,7259f2fc8fba57aaf8a460d59c540d51c2e9ece4fcfc21f4851d3f26a27a4787,2025-01-30T06:15:28.827000
|
||||
CVE-2024-1031,0,0,3efe13ab8e8ca0afb2b2c16acf09e60475f45cbc86bc8540948b9d2e079bf4c2,2024-11-21T08:49:38.437000
|
||||
CVE-2024-10310,0,0,9ff9c4ae788e99e7944a2ba13b3b5ac1a4941438452794ec0f6f96d02747c9be,2024-11-04T13:06:20.190000
|
||||
CVE-2024-10311,0,0,99dd0a164fd5d198ec222660ccc9d29dd982dc019194a41db7c03f5195e8b984,2024-11-19T17:03:19.177000
|
||||
@ -245248,7 +245248,7 @@ CVE-2024-12159,0,0,a32ab90e71369424b90b3e2689249267ea99ad1f074ba09875b9ba6ba23f1
|
||||
CVE-2024-1216,0,0,2ac4284b62a708a705b7ab9ac6ff4ec2f3952b584d951b1f83e5c9b3524c781f,2024-03-21T02:51:38.760000
|
||||
CVE-2024-12160,0,0,2c6191a6a825b29c030b8d3eb20fe09ec5c665c03e8080de9d738d6bc79c2538,2024-12-12T09:15:05.220000
|
||||
CVE-2024-12162,0,0,74000f06bf15c8250a3d3772859e4a16bab71460bbdb53ca978f73d57f64b12c,2024-12-12T05:15:11.750000
|
||||
CVE-2024-12163,1,1,f2907af9c955110c6fa8c424e2a24da47ebc01f1fae6a51ccd6ca53baf88e25e,2025-01-30T06:15:29.113000
|
||||
CVE-2024-12163,0,0,f2907af9c955110c6fa8c424e2a24da47ebc01f1fae6a51ccd6ca53baf88e25e,2025-01-30T06:15:29.113000
|
||||
CVE-2024-12165,0,0,565f6113f161726a36dcd8f87106f931ffa1dad23df770638714143fb4529a90,2024-12-07T02:15:18.790000
|
||||
CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bfc3e,2024-12-07T02:15:18.923000
|
||||
CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000
|
||||
@ -245441,7 +245441,7 @@ CVE-2024-12397,0,0,661288be67552f431f0a0bf144bed2d313b12b592e50cdc78451d7c1272f6
|
||||
CVE-2024-12398,0,0,3ddf453ac35312a996d38b789ad3b4ef0601d638e0d2eee33b4135d2d780af47,2025-01-21T21:12:02.310000
|
||||
CVE-2024-12399,0,0,93b1cedb21d025aa2a7c64672a0deaba138e4d19bf64f3997c97cc28126eb1c9,2025-01-17T10:15:06.697000
|
||||
CVE-2024-1240,0,0,28733ede53b96385ee0de4a7c5187b3db0d925b1e4ab6e977522dc277dee75de,2024-11-19T19:04:53.913000
|
||||
CVE-2024-12400,1,1,8a8fb219c8377c7d27f8aaf5fc8b1b7bf89ec6ec58a08cb4462aa0bef84734e9,2025-01-30T06:15:29.223000
|
||||
CVE-2024-12400,0,0,8a8fb219c8377c7d27f8aaf5fc8b1b7bf89ec6ec58a08cb4462aa0bef84734e9,2025-01-30T06:15:29.223000
|
||||
CVE-2024-12401,0,0,ba741c7b51198b95eba245807f65253a1c54ea777ddd918337cd97bd144396fe,2024-12-12T09:15:05.790000
|
||||
CVE-2024-12402,0,0,36e3ce185be6b6d4714b97d0b9e949abc75eb52a2fa273901aa2b4c0f962b168,2025-01-07T04:15:07.990000
|
||||
CVE-2024-12403,0,0,f86e636eddc7cdb9b8bf4adcd4515238330a01facfd5633ebda91511666728a4,2025-01-15T10:15:07.433000
|
||||
@ -245634,7 +245634,7 @@ CVE-2024-12633,0,0,aa2de65b34cad526fad2ad4462ad560794d8e7fd2121b7b4323cbcbfceffb
|
||||
CVE-2024-12635,0,0,3c7aa75fcbe7aad344d7ab6a29830b91315b8c91a45f35c3746137d636be222e,2024-12-21T07:15:09.380000
|
||||
CVE-2024-12636,0,0,42a82168ce07b7a4b358fd4a7a39c0f3a390399d55754f2ae0215aa2892ce194,2024-12-25T05:15:08.067000
|
||||
CVE-2024-12637,0,0,0a511df96db32a9b14e55f4c161efe09af214577bd9827e9baeb5f267eebf5c8,2025-01-17T07:15:26.773000
|
||||
CVE-2024-12638,1,1,5dce2bbca13ffbcced52a1c47fe15d01e4e2f18249768352fe9dda4a860788cf,2025-01-30T06:15:29.333000
|
||||
CVE-2024-12638,0,0,5dce2bbca13ffbcced52a1c47fe15d01e4e2f18249768352fe9dda4a860788cf,2025-01-30T06:15:29.333000
|
||||
CVE-2024-1264,0,0,0a400b50d7c5417af4540851d66c40fe9607cfb1bbd030ca37354551feca3778,2024-11-21T08:50:11.460000
|
||||
CVE-2024-12641,0,0,6e6b1aa53bd8553222049d57d01527b85aa1b46f94f8dd550c03e6967ee19a5d,2024-12-16T07:15:05.787000
|
||||
CVE-2024-12642,0,0,a401d76248880d01d3fa48196afb4bda331b127bc27a94608f221d11c2863778,2024-12-16T07:15:06.023000
|
||||
@ -245687,8 +245687,8 @@ CVE-2024-12700,0,0,c161ba4e53ce97164ad141dae69781306c514830255596765fa43a667338f
|
||||
CVE-2024-12701,0,0,cd6b08f28311d78389b2479a22ff0ce00f8e2d386b94e3b072290f303be9f2ff,2025-01-04T08:15:06.670000
|
||||
CVE-2024-12703,0,0,c565183eb12abdb4955b338c8bd40c3325b4b163523b9159fd30bcbf11e5936b,2025-01-17T11:15:08.903000
|
||||
CVE-2024-12705,0,0,35bbeaf0ccf51c179b5b23432f4a08b92b558523c47c996d329a2f0b90b85502,2025-01-29T22:15:28.800000
|
||||
CVE-2024-12708,1,1,524be7962f883ad9a0d6d9b36d3c868f692fb50255f949fc2ecccd304cafabbc,2025-01-30T06:15:29.440000
|
||||
CVE-2024-12709,1,1,f897c0b9684a18484cc04977ff44371300c3ef356b44076a227dffe251816075,2025-01-30T06:15:29.557000
|
||||
CVE-2024-12708,0,0,524be7962f883ad9a0d6d9b36d3c868f692fb50255f949fc2ecccd304cafabbc,2025-01-30T06:15:29.440000
|
||||
CVE-2024-12709,0,0,f897c0b9684a18484cc04977ff44371300c3ef356b44076a227dffe251816075,2025-01-30T06:15:29.557000
|
||||
CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000
|
||||
CVE-2024-12710,0,0,47453914e1b74979b7cb104fe22d1ae9255e40512305ca5e5237f17f98821657,2024-12-24T05:15:07.193000
|
||||
CVE-2024-12711,0,0,9b677fb642029180fdaa553160a64c71aa90c9b6592fc5efc1139f03e5c4de5f,2025-01-07T12:15:24.503000
|
||||
@ -245821,7 +245821,7 @@ CVE-2024-1291,0,0,8f051cca86e07e915f10677720017dd69f0d69620ffe64fe34f7d04e63b0ee
|
||||
CVE-2024-12912,0,0,746e63a7cfb944606513a06821763c045edbf693309ba8391961cb9c8e0e7197,2025-01-02T09:15:17.470000
|
||||
CVE-2024-12919,0,0,267cd9cf604b008de2f506d778d176d8d6c4286f989194d3cfe533433123b414,2025-01-22T17:29:01.883000
|
||||
CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000
|
||||
CVE-2024-12921,1,1,8ce1e6fbfc9c82ab71190cccc97be466744245aecd9c798f0b5f89d52e4cc267,2025-01-30T06:15:29.653000
|
||||
CVE-2024-12921,0,0,8ce1e6fbfc9c82ab71190cccc97be466744245aecd9c798f0b5f89d52e4cc267,2025-01-30T06:15:29.653000
|
||||
CVE-2024-12926,0,0,fc2a26ab92b192ae501d4e54cc781c262c43c0b12662ce958be5565acbb713e7,2024-12-27T15:15:10.360000
|
||||
CVE-2024-12927,0,0,29caca6ad2306153fa9ab094fa9e0334461e2ea665f8d59bbd5e4f726fcaf708,2024-12-27T15:15:10.513000
|
||||
CVE-2024-12928,0,0,f27fc1e72c3253dacf2ae81bd17f6b9bf8d3454200381b8820589af6760ad200,2024-12-27T15:15:10.650000
|
||||
@ -246225,10 +246225,12 @@ CVE-2024-13449,0,0,b603466190e6e620bd51a093bef2226b1aa9a640893cd2b54c10f03577e6c
|
||||
CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649da,2024-11-21T08:50:22.667000
|
||||
CVE-2024-13450,0,0,6d0c6e9ad465925bb0f00b48f72e6f84db20d9e217507e863ef423d4f9e1193a,2025-01-25T09:15:07.733000
|
||||
CVE-2024-13454,0,0,14313d18c59abf0795f9e65c924b2232675b3f5fcf8c69fe1d32af5f5cac5a65,2025-01-21T20:15:30.793000
|
||||
CVE-2024-13457,1,1,ee21f13468edd90777973ef610f3f5c579a070972ee0693035f0f1c680be9101,2025-01-30T07:15:07.067000
|
||||
CVE-2024-13458,0,0,a0d55037d220aaf8fdb1343c6a981e032ff9c796368506b8230ae875396a583f,2025-01-25T08:15:09.337000
|
||||
CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000
|
||||
CVE-2024-13467,0,0,bcd6474463b1a69c9a46d9b4d6f6f02b302b85f9777a4b31585c7467fbf3f38a,2025-01-25T08:15:09.520000
|
||||
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
|
||||
CVE-2024-13470,1,1,cd366f2d848ecaaaa8e2a5a38b4333677f61cb3a569faf0b3b65023a656393a3,2025-01-30T08:15:26.690000
|
||||
CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000
|
||||
CVE-2024-13484,0,0,712c057c7d39146a8afa657b40a8d67e5499db561a28666fb52dbcced8221de3,2025-01-28T19:15:13.753000
|
||||
CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000
|
||||
@ -246278,6 +246280,7 @@ CVE-2024-1361,0,0,8a11a93152fbfa05be2934d541581f2e8e8c1350c348ceb554a6a47ec08e0e
|
||||
CVE-2024-1362,0,0,ebe61894e3dd1fecb8d4711188e9d8f7e6a2ff043508a2ee93131b033a0336dd,2025-01-15T18:40:30.490000
|
||||
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
|
||||
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
|
||||
CVE-2024-13642,1,1,305a541671cd97a16b24d4e91a357de627282533e6d955bf781fd96606eff81c,2025-01-30T07:15:08.700000
|
||||
CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000
|
||||
CVE-2024-13659,0,0,2ab949cac371b153f030d675a94a51cc0bb444218e14414679e2bc62713fba54,2025-01-24T06:15:26.557000
|
||||
CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000
|
||||
@ -277818,8 +277821,8 @@ CVE-2025-0356,0,0,00c4e703b995e5d2c2e4f165848b6efa20e85198e0b810bdb74efa5802e75a
|
||||
CVE-2025-0357,0,0,637a6ef73ca88597a9faee7a213f2c9e042293b4e1599306e7baf4be91a58fdb,2025-01-25T02:15:26.990000
|
||||
CVE-2025-0369,0,0,968f1c7b7fff7a404f2212aa81591bd64fc1ef313f079e18ed81ef90b8b12902,2025-01-18T07:15:09.720000
|
||||
CVE-2025-0371,0,0,18ffada388be2678f214977e07d493519ae075018ff1c002d7153323b6bcbb2a,2025-01-21T09:15:07.747000
|
||||
CVE-2025-0373,1,1,4acb67680ff2d64644ade478d3bb3e9ec0ef068a2d752ecc91d9c5b3ded68fce,2025-01-30T05:15:09.590000
|
||||
CVE-2025-0374,1,1,ee327bf08caf8b2ae7eafa657fdf9309baedef81faafb4ef0275e4d0ad4b3dc5,2025-01-30T05:15:10.527000
|
||||
CVE-2025-0373,0,0,4acb67680ff2d64644ade478d3bb3e9ec0ef068a2d752ecc91d9c5b3ded68fce,2025-01-30T05:15:09.590000
|
||||
CVE-2025-0374,0,0,ee327bf08caf8b2ae7eafa657fdf9309baedef81faafb4ef0275e4d0ad4b3dc5,2025-01-30T05:15:10.527000
|
||||
CVE-2025-0377,0,0,1df5153b8a72b25478d0a1c4aa2347b3a7ff1e86a04300cb39dc18c1f91a367e,2025-01-21T16:15:14.290000
|
||||
CVE-2025-0390,0,0,a9cacf0ddfe16d7ce6aba119743e725f69b4f5561bb60e372a0dcb6744d412ca,2025-01-11T08:15:26.527000
|
||||
CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a35599f,2025-01-11T09:15:05.937000
|
||||
@ -277954,7 +277957,7 @@ CVE-2025-0648,0,0,7c07f8a9922bc43bc4487ab208bcf7a7d7e60788bb09a129a0ee4eabefb874
|
||||
CVE-2025-0650,0,0,663c6fb0447de5acea936c032379a880e4e49090359ea8a19f79bd3aea4faf70,2025-01-23T18:15:33.110000
|
||||
CVE-2025-0651,0,0,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000
|
||||
CVE-2025-0659,0,0,a3f0ecf6d7f28b7588d33ff468ced196ec3e2b7300202b748557cb9cf9f876c2,2025-01-28T16:15:40.360000
|
||||
CVE-2025-0662,1,1,bc6e86ff659735808e41cf9ff8dd95196e371ffb0d943fcf675b74a5d300ebd8,2025-01-30T05:15:10.653000
|
||||
CVE-2025-0662,0,0,bc6e86ff659735808e41cf9ff8dd95196e371ffb0d943fcf675b74a5d300ebd8,2025-01-30T05:15:10.653000
|
||||
CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000
|
||||
CVE-2025-0693,0,0,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000
|
||||
CVE-2025-0695,0,0,70836bbbf6325136c9e0a957ced44b18d2c2228a6b15d655a939dfb6142b3b68,2025-01-27T11:15:11.087000
|
||||
@ -278799,7 +278802,7 @@ CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08
|
||||
CVE-2025-23362,0,0,1b94e2fb0c40adc071aa869f9b4973eb9cf09ca0af55a23699e64fa6aa0684ff,2025-01-29T02:15:27.910000
|
||||
CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000
|
||||
CVE-2025-23369,0,0,66187faf123cd1b620a69cca574fbe971b43952983c5e4f566d4fb3bc1049429,2025-01-21T19:15:12.147000
|
||||
CVE-2025-23374,1,1,36c3b1c296397ec3c6fcd57ba11be579fc8474e390570baba348f95e84355229,2025-01-30T05:15:10.787000
|
||||
CVE-2025-23374,0,0,36c3b1c296397ec3c6fcd57ba11be579fc8474e390570baba348f95e84355229,2025-01-30T05:15:10.787000
|
||||
CVE-2025-23385,0,0,1cca13617e43c9bbbebf0fb602e4964d98053328c9c544d2017c39482fdeda55,2025-01-28T16:15:41.377000
|
||||
CVE-2025-23422,0,0,0bfcbffa99a5b85a71c8ee37755dbd0aca82e1025173efce8505c4ff37c6deb2,2025-01-24T11:15:09.987000
|
||||
CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user