Auto-Update: 2025-01-31T07:00:20.431302+00:00

This commit is contained in:
cad-safe-bot 2025-01-31 07:03:46 +00:00
parent e53222364b
commit a6530ec433
28 changed files with 1050 additions and 28 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-10867",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T05:15:09.803",
"lastModified": "2025-01-31T05:15:09.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Borderless \u2013 Widgets, Elements, Templates and Toolkit for Elementor & Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.5.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/borderless/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/88b0acee-f378-487d-8ab9-96146e0cde10?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-11886",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T06:15:27.347",
"lastModified": "2025-01-31T06:15:27.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'vCitaMeetingScheduler ' shortcode in all versions up to, and including, 2.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/lead-capturing-call-to-actions-by-vcita/trunk/lead-capturing-call-to-actions.php#L44",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/lead-capturing-call-to-actions-by-vcita/trunk/vcita-widgets-functions.php#L104",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/lead-capturing-call-to-actions-by-vcita/trunk/vcita-widgets-functions.php#L63",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4a9021b4-54f8-4ba3-bc81-49271dde1b44?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-12275",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:27.690",
"lastModified": "2025-01-31T06:15:27.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Canvasflow for WordPress plugin through 1.5.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/ca5bf8bd-a124-4088-a267-fd8a01cb4f4a/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-12772",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:27.783",
"lastModified": "2025-01-31T06:15:27.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ninja Tables WordPress plugin before 5.0.17 does not sanitize and escape a parameter before outputting it back in the page when importing a CSV, leading to a Cross Site Scripting vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/7b6d0f95-6632-4079-8c1b-517a8d02c330/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-12872",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:27.870",
"lastModified": "2025-01-31T06:15:27.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Zalomen\u00ed WordPress plugin through 1.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/a8a706c6-7f0f-4148-9f6f-40c0ca95dd9a/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13100",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:27.970",
"lastModified": "2025-01-31T06:15:27.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The OPSI Israel Domestic Shipments WordPress plugin through 2.6.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/b9261010-ab55-4d18-8fd2-2003f8692ae8/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13101",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:28.070",
"lastModified": "2025-01-31T06:15:28.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP MediaTagger WordPress plugin through 4.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/03f51b54-0ec2-40ce-a0fa-ef0c4ab0ea99/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13112",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:28.160",
"lastModified": "2025-01-31T06:15:28.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP MediaTagger WordPress plugin through 4.1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/155df231-30ef-47bb-aa91-a7deb1779bd1/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13216",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T06:15:28.267",
"lastModified": "2025-01-31T06:15:28.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The HT Event \u2013 WordPress Event Manager Plugin for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.7 via the 'render' function in /includes/widgets/htevent_sponsor.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, scheduled, and draft template data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-359"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ht-event/trunk/includes/widgets/htevent_sponsor.php#L443",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/155f494b-be25-4269-9d3b-379309619bbe?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13218",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:28.427",
"lastModified": "2025-01-31T06:15:28.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Fast Tube WordPress plugin through 2.3.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/79eb9432-3e3c-4a23-88a8-05aa3146061c/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13219",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:28.520",
"lastModified": "2025-01-31T06:15:28.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Privacy Policy Genius WordPress plugin through 2.0.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/3ad02238-dce1-48ce-986f-fef36b110b2d/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13220",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:28.623",
"lastModified": "2025-01-31T06:15:28.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WordPress Google Map Professional (Map In Your Language) WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/33ef27b4-e88f-46ec-9b3f-0a3e16d6f82e/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13221",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:28.713",
"lastModified": "2025-01-31T06:15:28.713",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Fantastic ElasticSearch WordPress plugin through 4.1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/693f4cc4-a082-46bc-abc9-a08919f70157/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13222",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:28.813",
"lastModified": "2025-01-31T06:15:28.813",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The User Messages WordPress plugin through 1.2.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/069e1f81-448d-4d27-b288-87111dade2f2/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13223",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:28.910",
"lastModified": "2025-01-31T06:15:28.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Tabulate WordPress plugin through 2.10.3 does not sanitise and escape some parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/e3a52af1-7cb6-4361-b1c7-a50e0cc62fb1/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13224",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:29.013",
"lastModified": "2025-01-31T06:15:29.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SlideDeck 1 Lite Content Slider WordPress plugin through 1.4.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/32a90907-e82f-41b3-b20e-d10a722e2999/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13225",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:29.117",
"lastModified": "2025-01-31T06:15:29.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ECT Home Page Products WordPress plugin through 1.9 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/8efd7d62-3f74-4108-970e-bd5ed24914ff/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-13226",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-31T06:15:29.210",
"lastModified": "2025-01-31T06:15:29.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The A5 Custom Login Page WordPress plugin through 2.8.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/dd09fe99-2334-4d6f-8a70-e1cd856b1486/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-13415",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T06:15:29.287",
"lastModified": "2025-01-31T06:15:29.287",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Food Menu \u2013 Restaurant Menu & Online Ordering for WooCommerce plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the response() function in all versions up to, and including, 5.1.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the plugin's settings."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.svn.wordpress.org/tlp-food-menu/tags/5.1.4/app/Controllers/Admin/Ajax/Settings.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3231030%40tlp-food-menu&new=3231030%40tlp-food-menu&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab6dd645-8831-49bc-b6b1-bb153ef79204?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13424",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T06:15:29.443",
"lastModified": "2025-01-31T06:15:29.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ni Sales Commission For WooCommerce plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'niwoosc_ajax' AJAX endpoint in all versions up to, and including, 1.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugins settings and modify commission amounts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/ni-woo-sales-commission/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac4a026b-ed1c-4864-8900-1d70d95af6f4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-13504",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T06:15:29.603",
"lastModified": "2025-01-31T06:15:29.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Shared Files \u2013 Frontend File Upload Form & Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via dfxp File uploads in all versions up to, and including, 1.7.42 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the dfxp file. This issue affects only Apache-based environments, where dfxp files are handled by default."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/shared-files/tags/1.7.40",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3231372%40shared-files%2Ftrunk&old=3229309%40shared-files%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9f4210a0-5448-4ff6-876a-37db4ad9b23a?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13717",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T06:15:29.770",
"lastModified": "2025-01-31T06:15:29.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vcita_ajax_toggle_ae and vcita_ajax_toggle_contact functions in all versions up to, and including, 2.7.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to enabled and disable widgets."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/lead-capturing-call-to-actions-by-vcita/trunk/vcita-ajax-function.php#L5",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/93800bd9-5d11-4d5b-99b2-4c5c78510af7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-0493",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T05:15:10.087",
"lastModified": "2025-01-31T05:15:10.087",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MultiVendorX \u2013 The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Limited Local File Inclusion in all versions up to, and including, 4.2.14 via the tabname parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.14/classes/class-mvx-ajax.php#L661",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.15/classes/class-mvx-ajax.php#L661",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/812029d9-95d6-4bc9-98b2-700f462163b3?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-0507",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T05:15:10.280",
"lastModified": "2025-01-31T05:15:10.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Ticketmeo \u2013 Sell Tickets \u2013 Event Ticketing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 2.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ploxel/tags/2.2.0/ploxel.php#L49",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3231203/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/149edbdf-4a27-4d79-8dd1-b5b3efbf648b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-0809",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T06:15:29.933",
"lastModified": "2025-01-31T06:15:29.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Link Fixer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via broken links in all versions up to, and including, 3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/permalink-finder/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37198f2f-2b45-40d3-b4ae-aa94213996bd?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-22216",
"sourceIdentifier": "security@vmware.com",
"published": "2025-01-31T06:15:30.090",
"lastModified": "2025-01-31T06:15:30.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A UAA configured with multiple identity zones, does not properly validate session information across those zones. A User authenticated against a corporate IDP can re-use their jsessionid to access other zones."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://www.cloudfoundry.org/blog/cve-2025-22216-uaa-missing-zone-validation/",
"source": "security@vmware.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-31T05:00:32.764070+00:00
2025-01-31T07:00:20.431302+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-31T04:15:09.053000+00:00
2025-01-31T06:15:30.090000+00:00
```
### Last Data Feed Release
@ -33,25 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
279589
279615
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `26`
- [CVE-2024-13396](CVE-2024/CVE-2024-133xx/CVE-2024-13396.json) (`2025-01-31T03:15:09.993`)
- [CVE-2024-13397](CVE-2024/CVE-2024-133xx/CVE-2024-13397.json) (`2025-01-31T03:15:10.240`)
- [CVE-2024-13399](CVE-2024/CVE-2024-133xx/CVE-2024-13399.json) (`2025-01-31T03:15:10.470`)
- [CVE-2024-13463](CVE-2024/CVE-2024-134xx/CVE-2024-13463.json) (`2025-01-31T04:15:07.497`)
- [CVE-2024-13767](CVE-2024/CVE-2024-137xx/CVE-2024-13767.json) (`2025-01-31T03:15:10.693`)
- [CVE-2024-13817](CVE-2024/CVE-2024-138xx/CVE-2024-13817.json) (`2025-01-31T03:15:10.910`)
- [CVE-2024-46974](CVE-2024/CVE-2024-469xx/CVE-2024-46974.json) (`2025-01-31T03:15:11.053`)
- [CVE-2024-47891](CVE-2024/CVE-2024-478xx/CVE-2024-47891.json) (`2025-01-31T04:15:08.553`)
- [CVE-2024-47898](CVE-2024/CVE-2024-478xx/CVE-2024-47898.json) (`2025-01-31T04:15:08.683`)
- [CVE-2024-47899](CVE-2024/CVE-2024-478xx/CVE-2024-47899.json) (`2025-01-31T04:15:08.800`)
- [CVE-2024-47900](CVE-2024/CVE-2024-479xx/CVE-2024-47900.json) (`2025-01-31T04:15:08.930`)
- [CVE-2025-0470](CVE-2025/CVE-2025-04xx/CVE-2025-0470.json) (`2025-01-31T04:15:09.053`)
- [CVE-2024-11886](CVE-2024/CVE-2024-118xx/CVE-2024-11886.json) (`2025-01-31T06:15:27.347`)
- [CVE-2024-12275](CVE-2024/CVE-2024-122xx/CVE-2024-12275.json) (`2025-01-31T06:15:27.690`)
- [CVE-2024-12772](CVE-2024/CVE-2024-127xx/CVE-2024-12772.json) (`2025-01-31T06:15:27.783`)
- [CVE-2024-12872](CVE-2024/CVE-2024-128xx/CVE-2024-12872.json) (`2025-01-31T06:15:27.870`)
- [CVE-2024-13100](CVE-2024/CVE-2024-131xx/CVE-2024-13100.json) (`2025-01-31T06:15:27.970`)
- [CVE-2024-13101](CVE-2024/CVE-2024-131xx/CVE-2024-13101.json) (`2025-01-31T06:15:28.070`)
- [CVE-2024-13112](CVE-2024/CVE-2024-131xx/CVE-2024-13112.json) (`2025-01-31T06:15:28.160`)
- [CVE-2024-13216](CVE-2024/CVE-2024-132xx/CVE-2024-13216.json) (`2025-01-31T06:15:28.267`)
- [CVE-2024-13218](CVE-2024/CVE-2024-132xx/CVE-2024-13218.json) (`2025-01-31T06:15:28.427`)
- [CVE-2024-13219](CVE-2024/CVE-2024-132xx/CVE-2024-13219.json) (`2025-01-31T06:15:28.520`)
- [CVE-2024-13220](CVE-2024/CVE-2024-132xx/CVE-2024-13220.json) (`2025-01-31T06:15:28.623`)
- [CVE-2024-13221](CVE-2024/CVE-2024-132xx/CVE-2024-13221.json) (`2025-01-31T06:15:28.713`)
- [CVE-2024-13222](CVE-2024/CVE-2024-132xx/CVE-2024-13222.json) (`2025-01-31T06:15:28.813`)
- [CVE-2024-13223](CVE-2024/CVE-2024-132xx/CVE-2024-13223.json) (`2025-01-31T06:15:28.910`)
- [CVE-2024-13224](CVE-2024/CVE-2024-132xx/CVE-2024-13224.json) (`2025-01-31T06:15:29.013`)
- [CVE-2024-13225](CVE-2024/CVE-2024-132xx/CVE-2024-13225.json) (`2025-01-31T06:15:29.117`)
- [CVE-2024-13226](CVE-2024/CVE-2024-132xx/CVE-2024-13226.json) (`2025-01-31T06:15:29.210`)
- [CVE-2024-13415](CVE-2024/CVE-2024-134xx/CVE-2024-13415.json) (`2025-01-31T06:15:29.287`)
- [CVE-2024-13424](CVE-2024/CVE-2024-134xx/CVE-2024-13424.json) (`2025-01-31T06:15:29.443`)
- [CVE-2024-13504](CVE-2024/CVE-2024-135xx/CVE-2024-13504.json) (`2025-01-31T06:15:29.603`)
- [CVE-2024-13717](CVE-2024/CVE-2024-137xx/CVE-2024-13717.json) (`2025-01-31T06:15:29.770`)
- [CVE-2025-0493](CVE-2025/CVE-2025-04xx/CVE-2025-0493.json) (`2025-01-31T05:15:10.087`)
- [CVE-2025-0507](CVE-2025/CVE-2025-05xx/CVE-2025-0507.json) (`2025-01-31T05:15:10.280`)
- [CVE-2025-0809](CVE-2025/CVE-2025-08xx/CVE-2025-0809.json) (`2025-01-31T06:15:29.933`)
- [CVE-2025-22216](CVE-2025/CVE-2025-222xx/CVE-2025-22216.json) (`2025-01-31T06:15:30.090`)
### CVEs modified in the last Commit

View File

@ -244118,6 +244118,7 @@ CVE-2024-10861,0,0,a0a9ed450f8163c1435b46341b966a17dde352d3f4e975547d6d20959f881
CVE-2024-10862,0,0,8d0469751c4a45e9a11849af14ded70548f7b3b67c046bcdbd1a895c0f05bb5b,2025-01-17T14:53:51.413000
CVE-2024-10863,0,0,b5b227485fbe2ef5029ee042bb93b4e86d4e47bdafc29c909ac7a75d6e0d47a4,2024-11-22T16:15:21.257000
CVE-2024-10866,0,0,13e110d5a19cfea89d073cb1ad5330e517869c323a871281199fd8e329b3e697,2025-01-07T08:15:23.060000
CVE-2024-10867,1,1,bcd5f45105676c29e584cabe9af3159658116ac2ce9d14c0bdf54340ae8f3701,2025-01-31T05:15:09.803000
CVE-2024-10868,0,0,596abebd416284f3193ea1ca5b889802ac9c927bb78e6530bbcb8067de4bbeb3,2025-01-23T16:58:10.220000
CVE-2024-10869,0,0,24e83078acb589a8bf17812dbc3140ca72ecc1dc51859fe588758bfcf79e45ac,2024-11-23T04:15:08.073000
CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000
@ -245044,6 +245045,7 @@ CVE-2024-11882,0,0,c14c2af9493e334fe3da2508e7ca83b6d319f8d382e00a76baaf2e7e94429
CVE-2024-11883,0,0,3efb818468ee15a4b72e48a1c8061e4502ee7a82e825630c64edf1ae726709d5,2024-12-14T05:15:09.440000
CVE-2024-11884,0,0,cc9f4dc6cbe1c2166ce740e309ba0401705b8efb2b8ab841325213a1f1dfb2c1,2024-12-14T05:15:09.640000
CVE-2024-11885,0,0,04f2670653faa6c8c44289cb974ffa09eb74041d205c6bf3342ab059c2818d96,2024-12-24T06:15:32.093000
CVE-2024-11886,1,1,99022b1de81d8c19288d78cf3ba7b575423fb91cb82ec1fc1e91f0d890108d78,2025-01-31T06:15:27.347000
CVE-2024-11887,0,0,80f81ee5482294a9d428701089d311162ead8be6f57af34e5bb35113293ce607,2025-01-07T06:15:15.147000
CVE-2024-11888,0,0,8a06477d55991ecfcdfbbbe13cfc5cc7673a7932d3eb8f15153aab2ef7344e32,2024-12-14T05:15:09.837000
CVE-2024-11889,0,0,c40f4924de6b0709ad2ac4ea75e730ab583fde8e75b7967e6c96aa9146701117,2024-12-14T05:15:10.030000
@ -245368,6 +245370,7 @@ CVE-2024-12270,0,0,a59b36ad08a62409fa966fc5cef53e6796ba20371cadd9c7e001162bc2771
CVE-2024-12271,0,0,e756524ee3996486f46fc9dfb0848744c8a90daec55e50296545ffd31d194dcb,2024-12-12T13:15:07.570000
CVE-2024-12272,0,0,cbbb238a5fc49c4ada4f96dbd5ec3bf6a1bab33a6ad37ef5b0235e516631a83b,2024-12-25T04:15:06.457000
CVE-2024-12274,0,0,754c33d384166421b8530c0b6be4d1f50e294eb962f01142a13c10f72064a9a9,2025-01-13T15:15:07.727000
CVE-2024-12275,1,1,60d89a17ab81de3d699e529bb3d9f93132dc8c29ba55715f2a719e9798d6eeb8,2025-01-31T06:15:27.690000
CVE-2024-12279,0,0,28f926ab6f57c2b10bee59d6914cc0152fa6a23fa0d172ad6d11e3d9d407b5c2,2025-01-04T12:15:24.453000
CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000
CVE-2024-12280,0,0,877a1ef9090370a5789c2e7362afe046232f3567d1b51a01b5cd894549fa6293,2025-01-28T21:15:16.317000
@ -245754,6 +245757,7 @@ CVE-2024-12757,0,0,001b6506f2f8c2c25161ff7428c9761e0eb53687dc4724791aa2f4c1d0893
CVE-2024-1276,0,0,7fd672f8ab2d0313a55eef11978a3cbaaea942b78d4dfb1702b583b731b53a9a,2025-01-08T18:37:36.067000
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000
CVE-2024-12772,1,1,aebd14797dad5b000b7b30dd2cc61fcad13daed0fb6d0f27e36d3accddc1c06a,2025-01-31T06:15:27.783000
CVE-2024-12773,0,0,3b6ccba6d5a0d86034acd0b69772715b708483a05c85a38abdbf411e59a1e181,2025-01-27T17:15:15.290000
CVE-2024-12774,0,0,831f06cba5c40ca0ae40312b61d66a0fcc179465b4ec30109a7e37db55ec771b,2025-01-27T15:15:09.803000
CVE-2024-1278,0,0,5fc68c762fc836b6c12a71eed788de7c0888610c449a9d12f31cc3647bf88af1,2025-01-29T16:26:48.717000
@ -245823,6 +245827,7 @@ CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee91
CVE-2024-12861,0,0,8a93d399c32f464da067c6d51dff2d544ffb8ae828286360d6f36cf768b3a2c1,2025-01-30T14:15:33.170000
CVE-2024-12867,0,0,732c7583e9efa2618fe2f4098930414e7eb5e8b8eea2432950087191a298a004,2024-12-20T20:15:22.740000
CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000
CVE-2024-12872,1,1,bfa4cf797dce8a539b3ce58947f660b3d172df6695f14758492ef3b7a576a2e8,2025-01-31T06:15:27.870000
CVE-2024-12875,0,0,65f6ca3bff49bc2fd9ea644c89d99467e02d0f3d3859a576808fcf00ae63e813,2024-12-21T12:15:20.910000
CVE-2024-12877,0,0,a9e389a679e420f1b0a9a06268a68a8b0a86295a1a7eef4bfea3f46105e61e67,2025-01-11T08:15:26.127000
CVE-2024-12879,0,0,a421a5e4db3a04db3d207087595051348d7d155e9057f63ac7b875e4bac6c451,2025-01-24T18:07:31.260000
@ -246016,6 +246021,8 @@ CVE-2024-13093,0,0,efaf6e963b0d924999f6d8167a81917175f763e9f833fbf291aa1961a6ad2
CVE-2024-13094,0,0,ff89d51df0f55e55e053e6eb04680580a78be0201255f2c5e137b3c57d192608,2025-01-27T20:15:33.390000
CVE-2024-13095,0,0,09539e5e7a6afc7749c47ed659ed27b3a015bec4283229fae0e1cc00475de367,2025-01-28T21:15:16.453000
CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000
CVE-2024-13100,1,1,ebf780d2f8057a73d0020c510d17d94cc537b21da9cc65d7011e20818c25655c,2025-01-31T06:15:27.970000
CVE-2024-13101,1,1,2a272ca306690bbdc24085ad49ffd21fd35d53fc0ab34f71b6362fcada3c1203,2025-01-31T06:15:28.070000
CVE-2024-13102,0,0,2b3c51e550e0e3ae0feed858b8e9db25b6ba6af497f98896174a6e376c50dc7b,2025-01-02T18:15:16.517000
CVE-2024-13103,0,0,c39bf73e6ec2cebc85583a67f9a2540764bad904165de34e6f27feb6bbbccbbf,2025-01-02T18:15:16.747000
CVE-2024-13104,0,0,d9f251cb616308a07615da5d3de3f3686b150f86f710013d498e30a56d5803fb,2025-01-02T18:15:16.890000
@ -246027,6 +246034,7 @@ CVE-2024-13109,0,0,45b5042c6767743a421781b4dc3b51295e1d8552da0dbc6b056c91fa29571
CVE-2024-1311,0,0,2ba6d2321400f10c87ddc27c76143645bc9a4dbe9eea0a653dcae1cf2feda935,2025-01-16T15:27:31.173000
CVE-2024-13110,0,0,3af34e021045f1f321eb3e27d67d0cda816b86ed4d944ed6768c463b9396b88e,2025-01-02T14:15:06.240000
CVE-2024-13111,0,0,111a0995b810edb3a95164b3ad0483dc838f87262c9575afeeb4b85a996b26d6,2025-01-02T17:15:08.223000
CVE-2024-13112,1,1,0e434b03d8af38162101ecf7a6eb2536ed5224d369e9552d41afad398507642c,2025-01-31T06:15:28.160000
CVE-2024-13116,0,0,e981c3a85ff55755b4f4e40b775a103b2cae5890c545f2acba8d391997a10e1c,2025-01-27T06:15:23.540000
CVE-2024-13117,0,0,aea173812a96fbd368d60f0650c58f3441503a1ea615789719449c0532f79b02,2025-01-27T06:15:23.637000
CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000
@ -246108,7 +246116,17 @@ CVE-2024-13211,0,0,ce07bd4dec4e71ee51c53bd7e26b1aa6c9e58b64ba82b1ae528c62444e9a6
CVE-2024-13212,0,0,5d3d9340b90adc02a73b2a397cbc7b9a824f5e41958bbb77ca0e0a733f439b87,2025-01-09T04:15:12.277000
CVE-2024-13213,0,0,3077bf102e80b6ad26d9de82b06cecbfeedc1b0a01c454e5ec2b3b19555a517b,2025-01-09T04:15:12.453000
CVE-2024-13215,0,0,17507f2f85733790cb9f937f15c22b6e61ece58878b7af9bb53a95a8347aa1ca,2025-01-23T17:35:41.723000
CVE-2024-13216,1,1,224c5493bbe628af64ac133ca5981ce684fc185a19dece15bcf76de0459d206d,2025-01-31T06:15:28.267000
CVE-2024-13218,1,1,e4d71133cca5118508fafb2529fa4b3d00bc7d822a24e4007088975074a0e46c,2025-01-31T06:15:28.427000
CVE-2024-13219,1,1,86b9ae940169e1b77a0ac9650f210286a65e189f154c9b0b7ee7a8a2146f095d,2025-01-31T06:15:28.520000
CVE-2024-1322,0,0,a87df03aa9d8a817a942ae8ebad8afc3111ac175155d7ee73a384181ec986bff,2024-11-21T08:50:19.883000
CVE-2024-13220,1,1,ae468b3a10a14f28e56d2ff530054b9ab4b389b1d54c84f0e9ce7b41ada294b5,2025-01-31T06:15:28.623000
CVE-2024-13221,1,1,67dbc572835c270ed4f23e35e654ecd4fcbcd4e864b9a3bfa994d9ee508fbdde,2025-01-31T06:15:28.713000
CVE-2024-13222,1,1,d833ccc17d77988ebdbc4af3dc0c886ad82365715fe3c5e49803aaf244a3a49a,2025-01-31T06:15:28.813000
CVE-2024-13223,1,1,87cb4d3740ec3daf90e28d4ac6f39065ed9177966688ddc86e58fa395e81bca3,2025-01-31T06:15:28.910000
CVE-2024-13224,1,1,3583586b20e63f869d82a9338f8e93f4826cb1f6eb9b9c1c401b12a88a695866,2025-01-31T06:15:29.013000
CVE-2024-13225,1,1,87c048d1fe9b31bfb83aa6f35c0719c1265febc33335b3e9a42f9e857d363164,2025-01-31T06:15:29.117000
CVE-2024-13226,1,1,9d9716e2f7c4fc7bdb36ad2bc418f5bc2c24a3b24da6cef44c7c7e6ee0d2620d,2025-01-31T06:15:29.210000
CVE-2024-1323,0,0,4b7fa94b4154618460e40e6b98637f7cb2a430b6e413bf16925f79721ae6c94f,2025-01-16T19:29:54.047000
CVE-2024-13230,0,0,77b1ecbf192b34e98ac8a66dc9d4d1a94979c767aa5e8f2b9158ee6752bafedc,2025-01-21T11:15:09.267000
CVE-2024-13234,0,0,4b6e5502689689de17e4347d4d632259e748bbbf3b9e6488223819ef00a2b882,2025-01-23T11:15:10.373000
@ -246235,10 +246253,10 @@ CVE-2024-13391,0,0,4ddc50634aa74744390d79b0906c8f88dd9a00cc29aaa55a9724acf7a1d06
CVE-2024-13392,0,0,a78e961d1cefdda1764b180676e0657379c1e1a7ef9b8f0223e522e6fb2917ca,2025-01-18T08:15:24.327000
CVE-2024-13393,0,0,6c538726beb67e787d4cc0c97ae28498348fafb8453c26bd442a25ec75fb47c0,2025-01-18T07:15:08.810000
CVE-2024-13394,0,0,2f438b906efb781207eeefa07105a693bc0286f21e9f9257684cfec9ce3d8d32,2025-01-15T06:15:16.150000
CVE-2024-13396,1,1,8f9b216d61df004f5a3a389e5f252f4dacec1a814e9386d75a8b562f8535181a,2025-01-31T03:15:09.993000
CVE-2024-13397,1,1,52a4d35f33a185d46200d821e6a6abbb5fe5e472f164bee40167ec54b045b4e5,2025-01-31T03:15:10.240000
CVE-2024-13396,0,0,8f9b216d61df004f5a3a389e5f252f4dacec1a814e9386d75a8b562f8535181a,2025-01-31T03:15:09.993000
CVE-2024-13397,0,0,52a4d35f33a185d46200d821e6a6abbb5fe5e472f164bee40167ec54b045b4e5,2025-01-31T03:15:10.240000
CVE-2024-13398,0,0,1cf1394b81ba2d9f5d04722bdb6d4c350d6d6a7eb8c0a059d873a1872c1d84e5,2025-01-17T05:15:08.613000
CVE-2024-13399,1,1,2e30c11a6d597564bf359c76cce5fdff6dd78b4d606f8ccf1282933503b9ec42,2025-01-31T03:15:10.470000
CVE-2024-13399,0,0,2e30c11a6d597564bf359c76cce5fdff6dd78b4d606f8ccf1282933503b9ec42,2025-01-31T03:15:10.470000
CVE-2024-1340,0,0,779cbb4786989b99b13d0df5bfadd47a6bb17fb76227d8a826f245b565dc9020,2024-11-21T08:50:22.180000
CVE-2024-13400,0,0,34740cf0471b61baf60d00c1f8ff7acf3ccfa0b1eeded6af29d51e1069bf370e,2025-01-30T14:15:33.710000
CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509538,2025-01-17T05:15:09.077000
@ -246247,8 +246265,10 @@ CVE-2024-13406,0,0,3a9e7471bf5857762896fdd475ef755ed514b70430254f571b98831752a93
CVE-2024-13408,0,0,b897a089b5a6edca0f964aeef9bec0c400d26812061d65e34515c7ccadccb7b9,2025-01-24T11:15:09.043000
CVE-2024-13409,0,0,9a9934c96e1b3b594722c2aa6970db5452530e9596d366c39c81c530d063b0cd,2025-01-24T11:15:09.213000
CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000
CVE-2024-13415,1,1,078aa9b6eeb5af1c8634c02c595bbb40a0a7ec1b15e21674b1397103dd29c669,2025-01-31T06:15:29.287000
CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000
CVE-2024-13422,0,0,3d45f2466e53dfac69ec8dd343775dbe7473e4817099b26926d3d7b297be7b01,2025-01-23T12:15:28.163000
CVE-2024-13424,1,1,60791b2caef2c4384bda44bc4634febeec12d84f3bded4fd1a0d6202fd13ad5f,2025-01-31T06:15:29.443000
CVE-2024-13426,0,0,86fab2a47173ecbfa78b3dbc75ac72da294fc64d34b2b04366fafee0f3e9a13d,2025-01-24T18:37:38.503000
CVE-2024-1343,0,0,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f075e,2024-11-21T08:50:22.433000
CVE-2024-13432,0,0,2420e31f27384cf3a3b972e6593316283200b18cb659242a854ce1e6ee4aeb4a,2025-01-18T07:15:08.983000
@ -246268,7 +246288,7 @@ CVE-2024-13457,0,0,ee21f13468edd90777973ef610f3f5c579a070972ee0693035f0f1c680be9
CVE-2024-13458,0,0,a0d55037d220aaf8fdb1343c6a981e032ff9c796368506b8230ae875396a583f,2025-01-25T08:15:09.337000
CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000
CVE-2024-13460,0,0,db165e050b3a29a73040ab80da8c798ae3d9c2c9765ce3807d2cd6e8bf05aa94,2025-01-30T14:15:34.057000
CVE-2024-13463,1,1,0c2c67358b653b95788c4f55a3de9bf7ad2cf74b20a8d233c988324f44adb186,2025-01-31T04:15:07.497000
CVE-2024-13463,0,0,0c2c67358b653b95788c4f55a3de9bf7ad2cf74b20a8d233c988324f44adb186,2025-01-31T04:15:07.497000
CVE-2024-13466,0,0,653560f144409636354c1af48613afa8ec813df2848486a87387de21636b460d,2025-01-30T14:15:34.217000
CVE-2024-13467,0,0,bcd6474463b1a69c9a46d9b4d6f6f02b302b85f9777a4b31585c7467fbf3f38a,2025-01-25T08:15:09.520000
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
@ -246282,6 +246302,7 @@ CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed
CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000
CVE-2024-13502,0,0,b6bd5e7a8ccd125fd10c3c602ef666035a1824dda1c710321e34fb9d3259b3fe,2025-01-17T14:15:31.147000
CVE-2024-13503,0,0,ffb0135326ea2a3ea18800ce3bd83bc523a9e303f03b2acc60a1815003b2400e,2025-01-17T14:15:31.317000
CVE-2024-13504,1,1,8195199f012bc0dcb778476b6eeeb02169d03bad34700db8adeb8423060fcdda,2025-01-31T06:15:29.603000
CVE-2024-13505,0,0,8cfee4eef351da06016ab9b10f867ee856aa66c9481e93ffeb4ce296549af983,2025-01-26T12:15:28.613000
CVE-2024-13509,0,0,4616681e9925b5001099930aae74cd3c34870295df83ba209474cc01f26318f5,2025-01-30T17:56:17.080000
CVE-2024-1351,0,0,0ee767ddd9bd942759d1902d3186de90141de07710cd1c9cc0aaf86395d89b28,2024-11-21T08:50:23.450000
@ -246351,6 +246372,7 @@ CVE-2024-13707,0,0,dbc1b5a717c1082149ce8c2cd9992383140a9b7fd71c9758aaaaf161ef561
CVE-2024-13709,0,0,7d11e0e002d231ab97d4c4838853b33e61be12c236e56c435ef75a396b4f88ea,2025-01-25T04:15:07.670000
CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000
CVE-2024-13715,0,0,38005cd61af6e983c66b610d56b4fe11f16a873dfb8c6edee7228cd58d944ddd,2025-01-30T18:53:45.883000
CVE-2024-13717,1,1,71a3650f5ab531cb9a1850d83e24949bbb405dc3cae790e8ec5ec60af0ddf1d1,2025-01-31T06:15:29.770000
CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000
CVE-2024-13720,0,0,bfc3bf7df1795a21acc62f0d176e603f61dbe387abe952aae6803b00ca88d145,2025-01-30T18:44:43.053000
CVE-2024-13721,0,0,1ec94cb9c62b02c9472486b901c3addbef65df476872a8f8db6b902dfdcff790,2025-01-25T06:15:27.860000
@ -246361,13 +246383,13 @@ CVE-2024-13742,0,0,129edd5e741e9cdce96ab5fb2097261b5940d7eb0831b7a9604d963ded71e
CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000
CVE-2024-13758,0,0,a097fd11965a28b272757c9dfc06c78d140777aeb26eb25ec8fe43c25c2e8873,2025-01-30T09:15:08.547000
CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000
CVE-2024-13767,1,1,637f964cc18d2f02c2957e6987a03c02d6a99ae90fe95c08f63815c95a4ae60e,2025-01-31T03:15:10.693000
CVE-2024-13767,0,0,637f964cc18d2f02c2957e6987a03c02d6a99ae90fe95c08f63815c95a4ae60e,2025-01-31T03:15:10.693000
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000
CVE-2024-1380,0,0,5e58429e812779e5b01ebfe83f389083ec54823fd1aa2e429e923f21c4d1de2d,2024-11-21T08:50:27.317000
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
CVE-2024-13817,1,1,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000
CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000
CVE-2024-1382,0,0,065d5a502095560d09e225f241029e6e7787474027d13ed90041c25b81cd3dbf,2025-01-21T17:04:33.737000
CVE-2024-1383,0,0,59b5f34a837fb68b850c9929786dc2e35071d4c4d7ba3d2784cb584749f9b1cc,2024-11-21T08:50:27.733000
CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000
@ -267290,7 +267312,7 @@ CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9e
CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000
CVE-2024-46972,0,0,e19d7ffbd835a75458fdf16b6890ed1469688eeb0b4a5070c87028b8ff0ad2ab,2025-01-09T17:15:15.030000
CVE-2024-46973,0,0,0437a0b4f343551c70c990e4fd559a1c21cac753a3df1f8e90ebfba823ecbaf4,2024-12-28T17:15:07.420000
CVE-2024-46974,1,1,48bb854d0c3b7d4fb93028580ed86135c0475e3d370e2ddd18fd8dafc485718a,2025-01-31T03:15:11.053000
CVE-2024-46974,0,0,48bb854d0c3b7d4fb93028580ed86135c0475e3d370e2ddd18fd8dafc485718a,2025-01-31T03:15:11.053000
CVE-2024-46976,0,0,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000
CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000
CVE-2024-46978,0,0,8cb25f9777f3da72a7e17ebb1025b8204e0c9f0cad9bc43c4f3e91460b0c6504,2024-09-20T12:30:17.483000
@ -268106,15 +268128,15 @@ CVE-2024-47887,0,0,05e0a87333ebcefed57bd44f1f3c52d3dd803588d2239babfcd7a157a94de
CVE-2024-47888,0,0,f29473c64160f0d588a7ca069a65eb155d847c3556eac13a0a5e08def2ade22e,2024-10-18T12:53:04.627000
CVE-2024-47889,0,0,fbc19ced86c6fe97c19cf36af507f82d2f6cb4f350a639ca6656c9db442c9b66,2024-10-18T12:53:04.627000
CVE-2024-4789,0,0,cb1fce1149cb253592c06cf88232fe30f43f7e24305ca3501b7b2ce5d58908d4,2024-11-21T09:43:36.877000
CVE-2024-47891,1,1,4d4d66d2b722230b43a2e9e1a5aecb92c40e2821632bdf43777b5a842a059a8f,2025-01-31T04:15:08.553000
CVE-2024-47891,0,0,4d4d66d2b722230b43a2e9e1a5aecb92c40e2821632bdf43777b5a842a059a8f,2025-01-31T04:15:08.553000
CVE-2024-47892,0,0,e300db381f4cf7705266e90cba53b1a4b7a7defd036013afcd4a8d8ee5ca06f1,2024-12-16T19:15:08.393000
CVE-2024-47894,0,0,90877e14f180160e2f32b8f7e31918f3a5d81d9927bb9299954c6f367495fa91,2025-01-13T18:15:18.693000
CVE-2024-47895,0,0,3f8324ce2dbaf96facf113693c7520ff3a56a3e4203f9d7908ed4fe8545f1692,2025-01-13T18:15:18.933000
CVE-2024-47897,0,0,43de61f3d9732c029298f61d67d2b56903f91c6fc88a72bdb868652d4446e1a4,2025-01-13T18:15:19.310000
CVE-2024-47898,1,1,5a7d16c962da746f9b0d07790cd1a9b512e734b8a49c948a1205aaf25cd773e5,2025-01-31T04:15:08.683000
CVE-2024-47899,1,1,f207d243394939b9b794eefb37f1726f57215004cba9df373fce4b7f9ef6870b,2025-01-31T04:15:08.800000
CVE-2024-47898,0,0,5a7d16c962da746f9b0d07790cd1a9b512e734b8a49c948a1205aaf25cd773e5,2025-01-31T04:15:08.683000
CVE-2024-47899,0,0,f207d243394939b9b794eefb37f1726f57215004cba9df373fce4b7f9ef6870b,2025-01-31T04:15:08.800000
CVE-2024-4790,0,0,b9d76a36166d9f8d4bd7b87bb2c3b8f2d1cb59ae69b213b42a13db79aa975016,2024-11-21T09:43:36.990000
CVE-2024-47900,1,1,cfdf7daa18d9c5735ccce04e4ae9da0ca1500be3eb39fec9e4409a63627f04a9,2025-01-31T04:15:08.930000
CVE-2024-47900,0,0,cfdf7daa18d9c5735ccce04e4ae9da0ca1500be3eb39fec9e4409a63627f04a9,2025-01-31T04:15:08.930000
CVE-2024-47901,0,0,3165d7a5ba37411c22ef300e066496e43f11ee0c48270295fa8bb2b50803f6e5,2024-10-30T15:39:47.430000
CVE-2024-47902,0,0,fdda8971bba9d387ffd8bac2920cf21627a1eb6b178788f8572a5ebbd51c29b6,2024-10-30T15:48:39.207000
CVE-2024-47903,0,0,0c6cef1ca40c315b435460659456fbef42fad928d34e10fedc61c687cf9e7cd1,2024-10-30T15:54:34.647000
@ -277972,7 +277994,7 @@ CVE-2025-0462,0,0,7dad614f764d437d5dfbf965df87b3792548e23ef19b9c5ee869ca20188cea
CVE-2025-0463,0,0,833cfce061a9e4c6aff0214160b0daaa486ede160bebd86f70699079f3bd166e,2025-01-14T17:15:21.210000
CVE-2025-0464,0,0,c8401a32c4444b2726245a3c43b8df320378bbc93ad0870418154cbe59af4a9c,2025-01-14T17:15:21.387000
CVE-2025-0465,0,0,5201faa2dfa57bd14d4b6fb9a33615d85c230f753e445d877363ab9565749298,2025-01-14T18:15:29.883000
CVE-2025-0470,1,1,d648604f736437a425afba4a29cc22147082a3251a261c3e63d895935200f0af,2025-01-31T04:15:09.053000
CVE-2025-0470,0,0,d648604f736437a425afba4a29cc22147082a3251a261c3e63d895935200f0af,2025-01-31T04:15:09.053000
CVE-2025-0471,0,0,9169e9b54a074f1e0d8f97ed160fc9e64cab0efe853cd7456e368c08c8fa7679,2025-01-16T13:15:06.973000
CVE-2025-0472,0,0,0f40580898fe8da8d58e11b525a8aafe4140ddc85dd699a671742e2ebf135a96,2025-01-16T13:15:07.353000
CVE-2025-0473,0,0,1dd10a9273539100ae454eabb570ef30f5a1ca54c056c49681717a1070ea05e3,2025-01-16T13:15:07.540000
@ -277993,11 +278015,13 @@ CVE-2025-0489,0,0,a24dc8200140f72a873da603310104369ecbf6fd64e7830d413cb9f47b4c7d
CVE-2025-0490,0,0,1f384416061d2dbf3f188e10aae42ad077e67eabf02b270fb3286b559e5f665e,2025-01-16T16:15:35.653000
CVE-2025-0491,0,0,a2df37225351b197908dab4eef671d4122bfdb72a19e53971029c11f697c589c,2025-01-15T22:15:26.990000
CVE-2025-0492,0,0,84421fce7cc144b94f0258c9d48e69eeae8d312d182afca6c8016ab8e7304bc8,2025-01-15T22:15:27.157000
CVE-2025-0493,1,1,fe01d31f4493d8b48043a10fc26ead17fe9baa081eec91eabd053396d8e36e40,2025-01-31T05:15:10.087000
CVE-2025-0497,0,0,626fcecf4762904ef75b1e51d2d0a4f0f55f0b8bf49789ae7d8981e20e6d72f0,2025-01-30T18:15:32.493000
CVE-2025-0498,0,0,98cdac1bf315865441346a1f4ad9efdd13659aa6fe4e7d21b0d50010b260a2a7,2025-01-30T18:15:33.253000
CVE-2025-0500,0,0,ef67500424af835c1f75d32db89a4d3f8d70b570d80dc7e061c5614d7c9ed205,2025-01-29T19:15:18.870000
CVE-2025-0501,0,0,548edfbc8288b6ff7e57bf4d8a97bca009c549459d9d27e51c8af872c31d24f2,2025-01-29T19:15:18.993000
CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000
CVE-2025-0507,1,1,c71309f02e1e1a70cd7841937b6297c5bb1df964c2538ccde7cab1ea15c8c533,2025-01-31T05:15:10.280000
CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a4731,2025-01-18T07:15:09.903000
CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000
CVE-2025-0527,0,0,290a49b972de635b98003404e947a6429993db3c6731bc1fc678a3824730e7d5,2025-01-17T14:15:32.840000
@ -278132,6 +278156,7 @@ CVE-2025-0802,0,0,25d4724a5f59ec41d081db9fe30f350340de9808525e7ebdb2de0977ada211
CVE-2025-0803,0,0,3f62b1106b9b241043cd75bd2f1af692daaa38b2e387b0f59bc1dafe03d8bba2,2025-01-29T02:15:27.723000
CVE-2025-0804,0,0,92d829297868e08fc58c84215de89a1b6c3e7063565ee446f2d16b4211c5e258,2025-01-29T04:15:07.193000
CVE-2025-0806,0,0,457ccc849d51cf01d8a6f731c86ad5d9c7b0b2b236df12a7bec76c069f344e74,2025-01-29T03:15:06.900000
CVE-2025-0809,1,1,6ac613b1e050877076ee97d33f9f05d07be9a26746d7a212d0ba0c21df26e426,2025-01-31T06:15:29.933000
CVE-2025-0834,0,0,69d4601cb385a5207b3f60f39c37ba05447d3080f10cb05b9f81bad71cc46120,2025-01-30T09:15:09.703000
CVE-2025-0840,0,0,a7c58fa4e0ce69af30f8715823f12410e36099cec55a9762135e8f1b574089a6,2025-01-29T20:15:35.007000
CVE-2025-0841,0,0,5bffa2ec7965608d2e54d39bbd52de0c242469924a21cfc1ceec4dd7102b7d58,2025-01-29T21:15:20.973000
@ -278527,6 +278552,7 @@ CVE-2025-22152,0,0,089f04aace28abfa88265f6c9c2782b5476de8a0e353916617123187c142e
CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc85bf,2025-01-23T18:15:33.267000
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000
CVE-2025-22216,1,1,f8959507d86dc266ef703070ddf792f1739e2dd0f0d9ae0e840c4960f56331a1,2025-01-31T06:15:30.090000
CVE-2025-22217,0,0,feb391972c0b9cea12eac2644fa650dfd74fa775909a2be34ec05a7261c4fd8e,2025-01-28T19:15:14.640000
CVE-2025-22218,0,0,836ab65655ed2b3f519b6fee527b320c95f0b22b468f06c5346ef7ce0ca0c595,2025-01-30T15:15:18.487000
CVE-2025-22219,0,0,45a9d478146875c58c04215315d263d7929148968ff42c1529a986918c1732fe,2025-01-30T16:15:31.013000

Can't render this file because it is too large.