Auto-Update: 2025-02-12T03:00:57.960645+00:00

This commit is contained in:
cad-safe-bot 2025-02-12 03:04:24 +00:00
parent 10f199b403
commit b12b73d26b
24 changed files with 1084 additions and 117 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0142",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2025-02-12T00:15:08.423",
"lastModified": "2025-02-12T00:15:08.423",
"lastModified": "2025-02-12T01:15:08.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,6 +51,10 @@
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596",
"source": "psirt@nvidia.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2080",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-0143",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2025-02-12T01:15:08.347",
"lastModified": "2025-02-12T02:15:09.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause an out-of-bounds write issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596",
"source": "psirt@nvidia.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2095",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-0144",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2025-02-12T01:15:08.483",
"lastModified": "2025-02-12T02:15:10.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to data tampering."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596",
"source": "psirt@nvidia.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2113",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-0145",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2025-02-12T01:15:08.630",
"lastModified": "2025-02-12T02:15:10.263",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA nvJPEG2000 library contains a vulnerability where an attacker can cause a heap-based buffer overflow issue by means of a specially crafted JPEG2000 file. A successful exploit of this vulnerability might lead to code execution and data tampering."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5596",
"source": "psirt@nvidia.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2108",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12085",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-14T18:15:25.123",
"lastModified": "2025-02-11T12:15:34.047",
"lastModified": "2025-02-12T01:15:08.777",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -100,6 +100,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:1120",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:1123",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-12085",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1702",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-21T17:15:08.583",
"lastModified": "2024-11-21T08:51:07.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T01:01:24.223",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:keerti1924:php_mysql_user_signup_login_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C400362C-F44F-4C21-ADA4-E1547FFAF327"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.254390",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254390",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/omarexala/PHP-MYSQL-User-Login-System---SQL-Injection",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.254390",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254390",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1706",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-21T18:15:51.057",
"lastModified": "2024-11-21T08:51:07.893",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T01:03:35.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -76,30 +96,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zkteco:zkbio_access_ivs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.3.2",
"matchCriteriaId": "3F72FFB6-F055-42A3-8048-79CDAC6D9374"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.githubusercontent.com/whiteman007/8d3a09991de4ef336937ba91c07b7856/raw/adc00538d7a8c3c54bde4797a10d9b6af393711d/gistfile1.txt",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.254396",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254396",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://gist.githubusercontent.com/whiteman007/8d3a09991de4ef336937ba91c07b7856/raw/adc00538d7a8c3c54bde4797a10d9b6af393711d/gistfile1.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.254396",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254396",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1707",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-21T19:15:08.453",
"lastModified": "2024-11-21T08:51:08.030",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T01:21:17.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -76,38 +96,93 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:garo:wallbox_glb\\+_t2ev7_firmware:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "46BAEB34-C2A0-443C-8F88-B276448A14BA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:garo:wallbox_glb\\+_t2ev7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A66DE61-F5E2-4C07-B79B-F04E3AA49A36"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1spsElvU8rgCs4gUxc662SCBjTI9VAqth/view",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.254397",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254397",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://drive.google.com/file/d/1spsElvU8rgCs4gUxc662SCBjTI9VAqth/view",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/strik3r0x1/Vulns/blob/main/GARO_GLBDCMB-T274WO_Stored_XSS.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.254397",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254397",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25898",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T18:15:51.820",
"lastModified": "2024-11-21T09:01:32.087",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T01:12:54.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "Se encontr\u00f3 una vulnerabilidad XSS en la funcionalidad ChurchCRM v.5.5.0, edite su evento, donde se puede insertar c\u00f3digo JS o HTML malicioso en el campo Event Sermon en EventEditor.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:churchcrm:churchcrm:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1FEB8DD0-3ADC-4C06-84DF-9296533BFBD7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ChurchCRM/CRM/issues/6851",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/ChurchCRM/CRM/issues/6851",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-29171",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-02-12T02:15:10.363",
"lastModified": "2025-02-12T02:15:10.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell BSAFE SSL-J contains an Improper certificate verification vulnerability. A remote attacker could potentially exploit this vulnerability, leading to information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000226620/dsa-2024-221-security-update-for-dell-bsafe-ssl-j-multiple-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-29172",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-02-12T02:15:10.500",
"lastModified": "2025-02-12T02:15:10.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell BSAFE SSL-J contains a deadlock vulnerability. A remote attacker could potentially exploit this vulnerability, leading to a Denial of Service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-833"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000226620/dsa-2024-221-security-update-for-dell-bsafe-ssl-j-multiple-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29793",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-27T13:15:50.637",
"lastModified": "2024-11-21T09:08:20.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T01:24:37.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailmunch:mailchimp_forms:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.2.3",
"matchCriteriaId": "3EA10CAE-BAD7-41C3-AA46-71D9AA71AB83"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mailchimp-forms-by-mailmunch/wordpress-mailchimp-forms-by-mailmunch-plugin-3-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/mailchimp-forms-by-mailmunch/wordpress-mailchimp-forms-by-mailmunch-plugin-3-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31349",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-07T18:15:13.240",
"lastModified": "2024-11-21T09:13:20.733",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T01:27:43.223",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailmunch:mailmunch:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.7",
"matchCriteriaId": "C93CA6A5-4DE5-4179-AF22-5132B04B8292"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mailmunch/wordpress-mailmunch-grow-your-email-list-plugin-3-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/mailmunch/wordpress-mailmunch-grow-your-email-list-plugin-3-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34566",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-08T11:15:24.930",
"lastModified": "2024-11-21T09:18:57.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T01:40:13.093",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vanderwijk:content_blocks:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.3.1",
"matchCriteriaId": "7FC7A8B6-066A-48C3-891D-20F747BE2359"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/custom-post-widget/wordpress-content-blocks-custom-post-widget-plugin-3-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/custom-post-widget/wordpress-content-blocks-custom-post-widget-plugin-3-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3459",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-05-14T15:41:12.060",
"lastModified": "2024-11-21T09:29:38.633",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-12T01:48:00.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,32 +69,78 @@
"value": "CWE-424"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kioware:kioware:*:*:*:*:*:windows:*:*",
"versionEndIncluding": "8.34",
"matchCriteriaId": "08120DB6-BEF8-4C1E-B969-3F661CB25C70"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Broken Link"
]
},
{
"url": "https://cert.pl/posts/2024/04/CVE-2024-3459",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.kioware.com/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Product"
]
},
{
"url": "https://cert.pl/en/posts/2024/04/CVE-2024-3459",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://cert.pl/posts/2024/04/CVE-2024-3459",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.kioware.com/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40890",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2025-02-04T10:15:08.717",
"lastModified": "2025-02-04T10:15:08.717",
"lastModified": "2025-02-12T02:00:01.980",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -46,6 +46,10 @@
}
]
},
"cisaExploitAdd": "2025-02-11",
"cisaActionDue": "2025-03-04",
"cisaRequiredAction": "The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.",
"cisaVulnerabilityName": "Zyxel DSL CPE OS Command Injection Vulnerability",
"weaknesses": [
{
"source": "security@zyxel.com.tw",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40891",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2025-02-04T10:15:08.920",
"lastModified": "2025-02-04T10:15:08.920",
"lastModified": "2025-02-12T02:00:01.980",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -46,6 +46,10 @@
}
]
},
"cisaExploitAdd": "2025-02-11",
"cisaActionDue": "2025-03-04",
"cisaRequiredAction": "The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.",
"cisaVulnerabilityName": "Zyxel DSL CPE OS Command Injection Vulnerability",
"weaknesses": [
{
"source": "security@zyxel.com.tw",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-53880",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2025-02-12T01:15:08.940",
"lastModified": "2025-02-12T01:15:08.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA Triton Inference Server contains a vulnerability in the model loading API, where a user could cause an integer overflow or wraparound error by loading a model with an extra-large file size that overflows an internal variable. A successful exploit of this vulnerability might lead to denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5612",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-1243",
"sourceIdentifier": "security@temporal.io",
"published": "2025-02-12T01:15:09.073",
"lastModified": "2025-02-12T01:15:09.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Temporal api-go library prior to version 1.44.1 did not send `update response` information to Data Converter when the proxy package within the api-go module was used in a gRPC proxy prior to transmission. This resulted in\u00a0information contained within the `update response` field not having Data Converter transformations (e.g. encryption) applied. This is an issue only when using the UpdateWorkflowExecution APIs (released on 13th January 2025) with a proxy leveraging the api-go library before version 1.44.1.\n\nOther data fields were correctly sent to Data Converter. This issue does not impact the Data Converter server. Data was encrypted in transit. Temporal Cloud services are not impacted."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security@temporal.io",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.0,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security@temporal.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-311"
}
]
}
],
"references": [
{
"url": "https://github.com/temporalio/api-go/releases/tag/v1.44.1",
"source": "security@temporal.io"
},
{
"url": "https://temporal.io/blog/announcing-a-new-operation-workflow-update",
"source": "security@temporal.io"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21391",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:37.723",
"lastModified": "2025-02-11T18:15:37.723",
"vulnStatus": "Received",
"lastModified": "2025-02-12T02:00:01.980",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -35,6 +35,10 @@
}
]
},
"cisaExploitAdd": "2025-02-11",
"cisaActionDue": "2025-03-04",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows Storage Link Following Vulnerability",
"weaknesses": [
{
"source": "secure@microsoft.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21418",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-02-11T18:15:40.023",
"lastModified": "2025-02-11T18:15:40.023",
"vulnStatus": "Received",
"lastModified": "2025-02-12T02:00:01.980",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -35,6 +35,10 @@
}
]
},
"cisaExploitAdd": "2025-02-11",
"cisaActionDue": "2025-03-04",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability",
"weaknesses": [
{
"source": "secure@microsoft.com",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23359",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2025-02-12T01:15:09.230",
"lastModified": "2025-02-12T01:15:09.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Use (TOCTOU) vulnerability when used with default configuration, where a crafted container image could gain access to the host file system. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@nvidia.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@nvidia.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5616",
"source": "psirt@nvidia.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-12T00:56:43.013705+00:00
2025-02-12T03:00:57.960645+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-12T00:54:22.470000+00:00
2025-02-12T02:15:10.500000+00:00
```
### Last Data Feed Release
@ -27,44 +27,47 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-02-11T01:00:04.373607+00:00
2025-02-12T01:00:04.376896+00:00
```
### Total Number of included CVEs
```plain
280919
280927
```
### CVEs added in the last Commit
Recently added CVEs: `16`
Recently added CVEs: `8`
- [CVE-2020-3432](CVE-2020/CVE-2020-34xx/CVE-2020-3432.json) (`2025-02-12T00:15:07.670`)
- [CVE-2022-37660](CVE-2022/CVE-2022-376xx/CVE-2022-37660.json) (`2025-02-11T23:15:08.140`)
- [CVE-2023-20508](CVE-2023/CVE-2023-205xx/CVE-2023-20508.json) (`2025-02-12T00:15:07.850`)
- [CVE-2023-31342](CVE-2023/CVE-2023-313xx/CVE-2023-31342.json) (`2025-02-11T23:15:08.277`)
- [CVE-2023-31343](CVE-2023/CVE-2023-313xx/CVE-2023-31343.json) (`2025-02-11T23:15:08.407`)
- [CVE-2023-31345](CVE-2023/CVE-2023-313xx/CVE-2023-31345.json) (`2025-02-12T00:15:08.003`)
- [CVE-2023-31352](CVE-2023/CVE-2023-313xx/CVE-2023-31352.json) (`2025-02-11T23:15:08.537`)
- [CVE-2024-0112](CVE-2024/CVE-2024-01xx/CVE-2024-0112.json) (`2025-02-12T00:15:08.263`)
- [CVE-2024-0142](CVE-2024/CVE-2024-01xx/CVE-2024-0142.json) (`2025-02-12T00:15:08.423`)
- [CVE-2024-21971](CVE-2024/CVE-2024-219xx/CVE-2024-21971.json) (`2025-02-12T00:15:08.750`)
- [CVE-2024-33469](CVE-2024/CVE-2024-334xx/CVE-2024-33469.json) (`2025-02-11T23:15:08.903`)
- [CVE-2024-44336](CVE-2024/CVE-2024-443xx/CVE-2024-44336.json) (`2025-02-11T23:15:09.020`)
- [CVE-2024-54772](CVE-2024/CVE-2024-547xx/CVE-2024-54772.json) (`2025-02-11T23:15:09.117`)
- [CVE-2024-54916](CVE-2024/CVE-2024-549xx/CVE-2024-54916.json) (`2025-02-11T23:15:09.227`)
- [CVE-2024-57000](CVE-2024/CVE-2024-570xx/CVE-2024-57000.json) (`2025-02-11T23:15:09.337`)
- [CVE-2025-25203](CVE-2025/CVE-2025-252xx/CVE-2025-25203.json) (`2025-02-11T23:15:09.450`)
- [CVE-2024-0143](CVE-2024/CVE-2024-01xx/CVE-2024-0143.json) (`2025-02-12T01:15:08.347`)
- [CVE-2024-0144](CVE-2024/CVE-2024-01xx/CVE-2024-0144.json) (`2025-02-12T01:15:08.483`)
- [CVE-2024-0145](CVE-2024/CVE-2024-01xx/CVE-2024-0145.json) (`2025-02-12T01:15:08.630`)
- [CVE-2024-29171](CVE-2024/CVE-2024-291xx/CVE-2024-29171.json) (`2025-02-12T02:15:10.363`)
- [CVE-2024-29172](CVE-2024/CVE-2024-291xx/CVE-2024-29172.json) (`2025-02-12T02:15:10.500`)
- [CVE-2024-53880](CVE-2024/CVE-2024-538xx/CVE-2024-53880.json) (`2025-02-12T01:15:08.940`)
- [CVE-2025-1243](CVE-2025/CVE-2025-12xx/CVE-2025-1243.json) (`2025-02-12T01:15:09.073`)
- [CVE-2025-23359](CVE-2025/CVE-2025-233xx/CVE-2025-23359.json) (`2025-02-12T01:15:09.230`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `14`
- [CVE-2023-31356](CVE-2023/CVE-2023-313xx/CVE-2023-31356.json) (`2025-02-11T23:15:08.640`)
- [CVE-2024-12797](CVE-2024/CVE-2024-127xx/CVE-2024-12797.json) (`2025-02-11T23:15:08.807`)
- [CVE-2024-1705](CVE-2024/CVE-2024-17xx/CVE-2024-1705.json) (`2025-02-12T00:54:22.470`)
- [CVE-2024-0142](CVE-2024/CVE-2024-01xx/CVE-2024-0142.json) (`2025-02-12T01:15:08.230`)
- [CVE-2024-12085](CVE-2024/CVE-2024-120xx/CVE-2024-12085.json) (`2025-02-12T01:15:08.777`)
- [CVE-2024-1702](CVE-2024/CVE-2024-17xx/CVE-2024-1702.json) (`2025-02-12T01:01:24.223`)
- [CVE-2024-1706](CVE-2024/CVE-2024-17xx/CVE-2024-1706.json) (`2025-02-12T01:03:35.347`)
- [CVE-2024-1707](CVE-2024/CVE-2024-17xx/CVE-2024-1707.json) (`2025-02-12T01:21:17.617`)
- [CVE-2024-25898](CVE-2024/CVE-2024-258xx/CVE-2024-25898.json) (`2025-02-12T01:12:54.453`)
- [CVE-2024-29793](CVE-2024/CVE-2024-297xx/CVE-2024-29793.json) (`2025-02-12T01:24:37.180`)
- [CVE-2024-31349](CVE-2024/CVE-2024-313xx/CVE-2024-31349.json) (`2025-02-12T01:27:43.223`)
- [CVE-2024-34566](CVE-2024/CVE-2024-345xx/CVE-2024-34566.json) (`2025-02-12T01:40:13.093`)
- [CVE-2024-3459](CVE-2024/CVE-2024-34xx/CVE-2024-3459.json) (`2025-02-12T01:48:00.043`)
- [CVE-2024-40890](CVE-2024/CVE-2024-408xx/CVE-2024-40890.json) (`2025-02-12T02:00:01.980`)
- [CVE-2024-40891](CVE-2024/CVE-2024-408xx/CVE-2024-40891.json) (`2025-02-12T02:00:01.980`)
- [CVE-2025-21391](CVE-2025/CVE-2025-213xx/CVE-2025-21391.json) (`2025-02-12T02:00:01.980`)
- [CVE-2025-21418](CVE-2025/CVE-2025-214xx/CVE-2025-21418.json) (`2025-02-12T02:00:01.980`)
## Download and Usage

View File

@ -158131,7 +158131,7 @@ CVE-2020-3428,0,0,1d203dfb64afc88635ecdea956d4e399018ec66b0845e3a3c519582ad91af9
CVE-2020-3429,0,0,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000
CVE-2020-3430,0,0,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000
CVE-2020-3431,0,0,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000
CVE-2020-3432,1,1,9b69615c3842cce8448bfa4502eb2b040fae2656051ffa06bd712b3dcf30a12d,2025-02-12T00:15:07.670000
CVE-2020-3432,0,0,9b69615c3842cce8448bfa4502eb2b040fae2656051ffa06bd712b3dcf30a12d,2025-02-12T00:15:07.670000
CVE-2020-3433,0,0,0e0fb5bb51a05c6c75a030d839f72e158a7c69e2a7cb7718d94fd50b680f41ff,2024-11-21T05:31:03.480000
CVE-2020-3434,0,0,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000
CVE-2020-3435,0,0,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000
@ -204650,7 +204650,7 @@ CVE-2022-3763,0,0,c2299b9c134ab1c6cdc29ea9bb0d35812068c7827af0b605982e68cbb64811
CVE-2022-3764,0,0,ec247594a5e83915ba6098faf7bda0926c3802dc302b6ea5fc586fe275d41890,2024-11-21T07:20:12.047000
CVE-2022-3765,0,0,55d4910aeb7e21447906423f7a9ff627183c7bc0e9d3c6b6eb67cc428a00617d,2024-11-21T07:20:12.173000
CVE-2022-3766,0,0,632191e742f432ebfc8c7e158ebc5aec2e0cf696db2bc4f54bff144bc238f89c,2024-11-21T07:20:12.303000
CVE-2022-37660,1,1,706da5f82e3e20762b65ebef634761bd18a7d103e1bba95b01495248679e0311,2025-02-11T23:15:08.140000
CVE-2022-37660,0,0,706da5f82e3e20762b65ebef634761bd18a7d103e1bba95b01495248679e0311,2025-02-11T23:15:08.140000
CVE-2022-37661,0,0,aabf45886c066567135fb17b01f6d8fdfa9a25c171f31720d62ad8227e48a8df,2024-11-21T07:15:04.177000
CVE-2022-3767,0,0,4e5d8fb3c9ad7d92e363d8284cf09f4ef86f4da536880a591d9b22149d210ced,2024-11-21T07:20:12.433000
CVE-2022-37679,0,0,30163e65f6c85937f7e28a683176b09d9eb146c2cfb64fbb7a583e8bbaaa62f6,2024-11-21T07:15:04.353000
@ -215413,7 +215413,7 @@ CVE-2023-2048,0,0,a3fd93a0062ac104ab7685f0c38c5fdd726a12306b1269a975bd7db45101d5
CVE-2023-2049,0,0,a8c5ed7acd162068a2a9410c64cd0f59bf4dff352a99ca706b6abf6f7afe2aab,2024-11-21T07:57:50.160000
CVE-2023-2050,0,0,0f2d06f2759566b1898e0808f1100f70849c771723b910ff4d0d791d8bbccaed,2024-11-21T07:57:50.287000
CVE-2023-20507,0,0,5fed0288869bdcd6c0eeefc00d71017461fdff4b91e72fc9217d348444cdc77e,2025-02-11T21:15:10.620000
CVE-2023-20508,1,1,e0e25a5ac3b708d7b324829c8fac6754eb617d0c39ee1f5150932999484b1b6a,2025-02-12T00:15:07.850000
CVE-2023-20508,0,0,e0e25a5ac3b708d7b324829c8fac6754eb617d0c39ee1f5150932999484b1b6a,2025-02-12T00:15:07.850000
CVE-2023-20509,0,0,134094f09fd2dc07b9b6920005f6ed24e5bf76664c20df20b585bc7031e48136,2024-11-04T18:35:02.490000
CVE-2023-2051,0,0,e835721eb03a78486652d47f32bc2d564aae9456947669d05b669f8ccff34422,2024-11-21T07:57:50.417000
CVE-2023-20510,0,0,a6c482788f115b3798feb6c0849d19428006a08ae6d7047f8994f722afc3ac01,2024-12-12T20:28:55.010000
@ -224430,17 +224430,17 @@ CVE-2023-31331,0,0,e046140d99705d1ececd3a0382c331bc7f6e3f9774e2e662b44c32bf8207d
CVE-2023-31339,0,0,55016df2b1f62c6b4660412aa764fde8ebdeabe77b5e76cdf782b4574058e985,2024-11-27T15:55:02.843000
CVE-2023-3134,0,0,b41055d7bc0dc4c054369608e6a2b8131a42873b85a487dd8d397c15935034b8,2024-11-21T08:16:32.053000
CVE-2023-31341,0,0,4d30d8bcca3cc5a6fb3cb512a407b048c8089f2e2668f1d6af1cd5e924a75c8b,2024-12-13T16:22:04.967000
CVE-2023-31342,1,1,a817ff9e2cec63e3d67cf98475fc467af022afb1295290ec211db96327d3bae0,2025-02-11T23:15:08.277000
CVE-2023-31343,1,1,8d45208539fe42cc4465d051f2eb072fa687af3d01b5e5fbf556092a6c328054,2025-02-11T23:15:08.407000
CVE-2023-31345,1,1,52bd9b4e735c6d4324a9a389c2634de5e45a9ce6291ab51b212c860b31254e01,2025-02-12T00:15:08.003000
CVE-2023-31342,0,0,a817ff9e2cec63e3d67cf98475fc467af022afb1295290ec211db96327d3bae0,2025-02-11T23:15:08.277000
CVE-2023-31343,0,0,8d45208539fe42cc4465d051f2eb072fa687af3d01b5e5fbf556092a6c328054,2025-02-11T23:15:08.407000
CVE-2023-31345,0,0,52bd9b4e735c6d4324a9a389c2634de5e45a9ce6291ab51b212c860b31254e01,2025-02-12T00:15:08.003000
CVE-2023-31346,0,0,0f3aef9cb82d734f42dadff61934c6e7356f408812c277f7c7dc139cdf72f4ea,2024-11-21T08:01:46.650000
CVE-2023-31347,0,0,40bd095adcf20e32bd278c5ac69186bfbd901c6c106b24da3be411afb7fb0f7e,2024-11-21T08:01:46.837000
CVE-2023-31348,0,0,36de6f4439a3c352fc026755e75a90df41c385c2a4dc4700523138475af8101f,2024-12-12T01:21:40.110000
CVE-2023-31349,0,0,71bf4a5703aad3a9f91fdab88a68f528b7c5cf5a77563430c2326a8beb20b035,2024-12-12T01:21:40.263000
CVE-2023-3135,0,0,5525abaed0951618afc57f6ab0cf7d86c246aa704e41354313c6c2430b9e4078,2024-11-21T08:16:32.173000
CVE-2023-31352,1,1,967c1f5cda2114de699a733dc03834d083cead864706f901ef53a9e79ab9560b,2025-02-12T00:15:08.140000
CVE-2023-31352,0,0,967c1f5cda2114de699a733dc03834d083cead864706f901ef53a9e79ab9560b,2025-02-12T00:15:08.140000
CVE-2023-31355,0,0,69aec8bfd9cbbdf6fccaa5a3f23ea5d697dcae13123e85a3c8dc9b60288b0210,2024-11-26T19:10:21.797000
CVE-2023-31356,0,1,07bf4f71e776193f1a6a37e4a0f9ba6134d79d38be24c782426c1fd54808f2af,2025-02-11T23:15:08.640000
CVE-2023-31356,0,0,07bf4f71e776193f1a6a37e4a0f9ba6134d79d38be24c782426c1fd54808f2af,2025-02-11T23:15:08.640000
CVE-2023-3136,0,0,0082a969c34110c3bc77819ecd8198dbee6358cca1ed9acd2e0be2b757fea739,2024-11-21T08:16:32.297000
CVE-2023-31360,0,0,e7f92144bd68f5fb73c54ecfe395f6f555bcbb0068d8a55734c120f7f108127d,2025-02-11T20:15:32.950000
CVE-2023-31361,0,0,3f53f70de9580819e880ee58267a5a944926e79c159bf78735edbe5c8a56f4e4,2025-02-11T21:15:12.160000
@ -242619,7 +242619,7 @@ CVE-2024-0108,0,0,6439b357fa8fa1da14854e67071d1b4030b146adfc75863fd5dbfa76b8b638
CVE-2024-0109,0,0,4e3c7f891f30f73ffea8812d68ca13e592b4af5ffbdce626b768e60669e5b0c4,2024-09-18T15:18:06.117000
CVE-2024-0110,0,0,f27210557f0c26fcfbedc193e4d0a41f340a75f32164d31e726fe652317f285c,2024-09-18T15:16:37.990000
CVE-2024-0111,0,0,bdef68470cbe972dbf78a48ee8c036044ad45c278e474af19b34bfbde7237a38,2024-09-18T15:22:14.727000
CVE-2024-0112,1,1,be8cd03119d802758714824c57d15bd51b4e76c795126f3a56e576fda5f69386,2025-02-12T00:15:08.263000
CVE-2024-0112,0,0,be8cd03119d802758714824c57d15bd51b4e76c795126f3a56e576fda5f69386,2025-02-12T00:15:08.263000
CVE-2024-0113,0,0,ddc72489479f075436bf2bede7a3c83b1b0eed041894108c913ed6a4245e286a,2024-12-26T19:21:52.380000
CVE-2024-0115,0,0,04fb8f6e5724a3bbcfb8807084f7db88a3df8dcc171391e4ae1eeafce22d77c1,2024-12-26T19:21:45.613000
CVE-2024-0116,0,0,7e098634cd96469f401e47ab7ff401cb9f2ab3f597905b45f057f27f5d24a16b,2024-10-04T13:51:25.567000
@ -242647,7 +242647,10 @@ CVE-2024-0137,0,0,81bf66fb14b39da555a4d311dc1e072621ee9f6fdd9b89b32897086011f9e7
CVE-2024-0138,0,0,46b8bd281343bee2ec8e5c4452aa2b9e0b3ce4964c0c71b43db0559960702d7e,2024-11-23T00:15:04.367000
CVE-2024-0139,0,0,97175888b963c6f6c4d9af1853169dc46a253002be2bfcb37fc1cbdc17d01939,2024-12-06T20:15:23.763000
CVE-2024-0140,0,0,b1c3d4b9e03087faeab3c6b32b57a2d8e93481139427d7ea4f9e253833a83c15,2025-01-28T04:15:08.730000
CVE-2024-0142,1,1,5a0886fa1cc35a8f3ebd456d261a655f0296ebae692baed5cb7342468b73179c,2025-02-12T00:15:08.423000
CVE-2024-0142,0,1,261b501d3b1c6d9204171cc97a2b9eaa15dd08e26ef75f2cf5f87385800414ae,2025-02-12T01:15:08.230000
CVE-2024-0143,1,1,2d6a775a99432800a0b296cde8d2dfd26489facfd8334a2df675b06faf561ec6,2025-02-12T02:15:09.253000
CVE-2024-0144,1,1,bdb76e9bda487a77b5d7e400acce3daa73596d4ac300f78220fb30f99715119d,2025-02-12T02:15:10.163000
CVE-2024-0145,1,1,3e1a5d12b12b13ee22f1d69fc3c32f9b40b092eb936e7c0e22e0dfa65e26aa4b,2025-02-12T02:15:10.263000
CVE-2024-0146,0,0,91247f908f4680f036c365cc7286ed9057cd8a10421a385a7ebe691b4e035d85,2025-01-28T04:15:09.447000
CVE-2024-0147,0,0,d266f38b1ebfcf418fb12ec7ba0c16644759f3d46ae142b8376ac2cc8dbc66b0,2025-01-28T04:15:09.590000
CVE-2024-0149,0,0,57c8b5d113e1d5b272dcbe1421dbea4404017873433aea02126d802ef03cb727,2025-01-28T04:15:09.733000
@ -245317,7 +245320,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669
CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000
CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000
CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000
CVE-2024-12085,0,0,a1a2583f6c82a273a7bdf431f022975e9740d33314ad6c5f1864990651c9e5a2,2025-02-11T12:15:34.047000
CVE-2024-12085,0,1,4b4eeb835cd84654fb59f6e8ed766dfa536d170d944378d12098517e4998c73d,2025-02-12T01:15:08.777000
CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000
CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000
CVE-2024-12088,0,0,43a2123ff1daddac120d556957600405449568b28a84ca944004ee72fa7fff31,2025-02-10T12:15:28.537000
@ -245915,7 +245918,7 @@ CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7a
CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000
CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72540,2025-01-06T15:16:15.037000
CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000
CVE-2024-12797,0,1,37278789a176c7094e2d1358902e5b1073a52e129a2399d6b9e3c257451d319f,2025-02-11T23:15:08.807000
CVE-2024-12797,0,0,37278789a176c7094e2d1358902e5b1073a52e129a2399d6b9e3c257451d319f,2025-02-11T23:15:08.807000
CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000
CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000
CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000
@ -246894,12 +246897,12 @@ CVE-2024-1697,0,0,c470a81452f09db0e40146053a7ca6ac44c10328d8eb381864ced3a9cc5f2c
CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e4a,2024-11-21T08:51:06.797000
CVE-2024-1700,0,0,c890221edc7d723da200984cd50788ad3f9477e6671e40a4826dd37ab78bdf87,2024-11-21T08:51:06.933000
CVE-2024-1701,0,0,999a1855aff758dd3bea1c889c669b741d70388f4ca26ec930896a676a7eec80,2024-11-21T08:51:07.080000
CVE-2024-1702,0,0,b6175d9dc80a18f6f7cfdc8d7ccd672b051b17d818dc95fbcd9de4275081d0be,2024-11-21T08:51:07.220000
CVE-2024-1702,0,1,6bdc90b2a17f9cc720ccacf951a7c6fa4bbea546083aa1d1c8d973e97e935554,2025-02-12T01:01:24.223000
CVE-2024-1703,0,0,967f5b800879b74b8a5834ee2ca69d6ccd277ef7fdf67155513b4a3e4c5c9375,2025-01-03T19:11:33.877000
CVE-2024-1704,0,0,ade83be8825a88be560eefedd4a80ce29b73b997a3bc381116fac086a8487d74,2025-01-03T19:11:28.830000
CVE-2024-1705,0,1,af7b09e99e734f63ef2ea7268ab25172e3aeb4f4332770b78a46d2b1534caf79,2025-02-12T00:54:22.470000
CVE-2024-1706,0,0,bb2fa26be71c93f252750ad503aa5f22cf00468ca8b87351c6c26fbbe19a743a,2024-11-21T08:51:07.893000
CVE-2024-1707,0,0,a9020d35f22c4489f7cfd2297cfe28080eadd0f70b288122f51ccc5023ec8af1,2024-11-21T08:51:08.030000
CVE-2024-1705,0,0,af7b09e99e734f63ef2ea7268ab25172e3aeb4f4332770b78a46d2b1534caf79,2025-02-12T00:54:22.470000
CVE-2024-1706,0,1,71fc36de238f0366dd55cbea7bcd8880ece128b41623b8bba05a9729ba48f898,2025-02-12T01:03:35.347000
CVE-2024-1707,0,1,386296f7b2d2f93198c912dd937a6be54a5c06c07c6e4c13ded38903cb47478e,2025-02-12T01:21:17.617000
CVE-2024-1708,0,0,9046bf6df7b5407027e6526b317a707fb0e597c8a478298cf2e268d00d5efe65,2024-11-21T08:51:08.173000
CVE-2024-1709,0,0,f75e75be5b68325f5e70652bc5e84a1c7f6bf9317747292f6c8f81b5bf5aa7a7,2025-01-27T21:48:25.323000
CVE-2024-1710,0,0,1e40e71747a8b12de39d769c827824fe24840a5de6160030b181cc2a6ca82e52,2024-11-21T08:51:08.487000
@ -248945,7 +248948,7 @@ CVE-2024-21958,0,0,e5206ffa0444f8572c1e9e167d9a12d914a6e0246055c05b0d98e9036149b
CVE-2024-2196,0,0,b69b6a180eaa2677dec83ce612fd6894dd1a1d839791fdc8c079145ded6dd346,2024-11-21T09:09:14.183000
CVE-2024-21966,0,0,95a7f244be612e572f7740e2431610bd1fd7003e288efea01d1c8140b03e252a,2025-02-11T20:15:34.210000
CVE-2024-2197,0,0,a2f883967a50a9a8d4e6369039be76593be79f2ff1288beb4c800f9afb124cb4,2024-11-21T09:09:14.310000
CVE-2024-21971,1,1,da2a88b8f8a101424f4fcd39f6a734c5199f566dd4b14a8b4119c3882702a6f1,2025-02-12T00:15:08.750000
CVE-2024-21971,0,0,da2a88b8f8a101424f4fcd39f6a734c5199f566dd4b14a8b4119c3882702a6f1,2025-02-12T00:15:08.750000
CVE-2024-21972,0,0,39505a9051e09d87e478fcc5f7515870aabb113eb6e35a2873ad7cf108e230e1,2024-11-21T08:55:18.060000
CVE-2024-21974,0,0,23f4ca1528e717237fe841fef4e4a6ef8c37c85aafce9b5c42cec363da075a34,2024-11-15T19:20:09.980000
CVE-2024-21975,0,0,85139c939620bb495fd621b698ae8c235d9f4ec5c4743aa119dda8b2c0db20fc,2024-11-15T19:15:18.770000
@ -251721,7 +251724,7 @@ CVE-2024-25894,0,0,cb4e57455d9b80e2e8f11d1a23185865c70db5ef798e325cb010e2b0b6d33
CVE-2024-25895,0,0,ea845c5a4bfac820a7d6804261ac8359407017ef5c604fa51deecedebeb1f020,2024-11-21T09:01:31.480000
CVE-2024-25896,0,0,27e7ea1636a151061689223212aece2065c7f69b7c98d93f82bbadf54d10c93c,2024-11-21T21:15:19.023000
CVE-2024-25897,0,0,234d7bc3ad5db294358ea8462de8ed3775160c86133962c3d1daeea643b0d5f6,2024-11-21T09:01:31.853000
CVE-2024-25898,0,0,6347051ac44c0ca971bdaf6528e1d0976bd821a3938179893f95e9c94967e810,2024-11-21T09:01:32.087000
CVE-2024-25898,0,1,86006dde909e57a7bb647fd23ecf23a25c1344653211bfc4f446ecc8f96a3aa0,2025-02-12T01:12:54.453000
CVE-2024-2590,0,0,60a3bdaafc99a02849a3826c8a92974160c52fb0a8b38349972ea2276121fa28,2024-11-21T09:10:04.693000
CVE-2024-25902,0,0,50baecac8959a69ff064266e41b61821003e4b15caea11793c8b90ccdbd36bb5,2024-11-21T09:01:32.237000
CVE-2024-25903,0,0,510043d77f476a7b8dd893b0aa41ef8c44bea446cf82cb2f0af241f86238cb7c,2024-11-21T09:01:32.363000
@ -254384,6 +254387,8 @@ CVE-2024-29168,0,0,76da846afbf9a55737b5d5153c7075fb50544a452bceda1dfcbdd4dbae96e
CVE-2024-29169,0,0,d2a39941096d1cea2fb67256e6d405f7dadbfc7f6cf149bb994f4d72fa9e7ae2,2025-02-04T17:21:08.633000
CVE-2024-2917,0,0,b5f4311ed824c628747b6d6d6b66642d4215c934be667bd71791c2a5029b2dec,2024-11-21T09:10:50.053000
CVE-2024-29170,0,0,370cd60a5ddffa88cf8f7934c452c63f52b7ba07af57e96fdb32da3666fff09f,2025-01-08T16:25:58.207000
CVE-2024-29171,1,1,3c82c3ed083bb886f21ca548be00ba108a1c61e9fb5593f79f450724196c7bab,2025-02-12T02:15:10.363000
CVE-2024-29172,1,1,32298838eaebc5d1ea2496c4582652366c07713ae35bfafa61ac679d92cf6fb8,2025-02-12T02:15:10.500000
CVE-2024-29173,0,0,8f66bdd18b6f7192b1d98e3f67c2fa7b88807a5fecb3bffa3f651ea2750e1735,2025-02-03T15:08:59.513000
CVE-2024-29174,0,0,65010050e670e870e2ab6c488596f4f6fc1385fbeba243078e77aa3e825c9f1d,2024-11-21T09:07:43.507000
CVE-2024-29175,0,0,1a7114481e9b20c8eff6bf81f7575050706de007b87f7c2ddbf4ca9624c9a616,2024-11-21T09:07:43.653000
@ -254678,7 +254683,7 @@ CVE-2024-2979,0,0,169364e1b852ff19eb4d89578c5260ea1664b46f15655b4e30fc73711f61d6
CVE-2024-29790,0,0,4ffc45027b2f086e430b392874a445504ac1e7739db800cb2ffc6c260cdab45e,2024-11-21T09:08:20.387000
CVE-2024-29791,0,0,85a4d58c4a829257279f8d65f2f235a00f3ee6099db60d44f44693f14d788eea,2024-11-21T09:08:20.517000
CVE-2024-29792,0,0,34e590205d2f418692ebf9014a875d8e00e620d9fce1b035a6741819f3890f75,2025-02-05T15:40:41.777000
CVE-2024-29793,0,0,b83bf35d70ed5fefa81aa917a86052a2cab25d1fd31eb4ba1db86890386b59d2,2024-11-21T09:08:20.773000
CVE-2024-29793,0,1,c5d9c74c41987492ebade1b57d87fdaf3bfd4d1a3de11698ad8abc8119120590,2025-02-12T01:24:37.180000
CVE-2024-29794,0,0,70800983f55d41173548f798a538d577c2723effa998974108d8c11c876be532,2024-11-21T09:08:20.910000
CVE-2024-29795,0,0,7cde9d85141c898a41540349f913ce42b8abc1f9285faa500037755a789a809f,2024-11-21T09:08:21.040000
CVE-2024-29796,0,0,14e02f618887b491d5254cacc44f3e2a453bf69cb6f08ac2aea28174bd15e322,2024-11-21T09:08:21.173000
@ -256005,7 +256010,7 @@ CVE-2024-31345,0,0,14c52f9c3da5bdb90298c2b06fd58a68d1c79361ab0ea506debd4e9a43a47
CVE-2024-31346,0,0,b972a4a46a8f82aecb8e6a911642668b9c99df971421a9cdb94fecde63fc42f7,2024-11-21T09:13:20.400000
CVE-2024-31347,0,0,fbe2b413b7eff6717602ddd334ae28e4d6a1bc4991f31ed08ca6e39c79a3eba8,2024-11-21T09:13:20.513000
CVE-2024-31348,0,0,2e98ac178df5c221fd6690a2f1a2bc14e79e9523c14699479d5406069a39380a,2024-11-21T09:13:20.623000
CVE-2024-31349,0,0,717aebb22adc3da84f95e90451aabf762069a5b289b6eaeb300c3179e06e25de,2024-11-21T09:13:20.733000
CVE-2024-31349,0,1,16e17cf1acfc4a804075d3c2eac540c448394a1ef345218dffd55a47e0b455f5,2025-02-12T01:27:43.223000
CVE-2024-3135,0,0,a8ab488dcb130f07beccc80a8f4ebc2149cdf0280a6b66ffe02a28c850b4d100,2024-11-21T09:28:58.417000
CVE-2024-31350,0,0,d28e6c1f64725b53d92b4f35582c3333676898df2f97b9e93654a4411eeafad8,2024-11-21T09:13:20.840000
CVE-2024-31351,0,0,92c50237d42e95d85681af7f04333b2484437293a310d18109874b28fa58170e,2024-11-21T09:13:20.970000
@ -257535,7 +257540,7 @@ CVE-2024-33453,0,0,1fbe82c644fb8bbe113912cb00a4a5d1a1c94bafa8eab10745ce875253c5c
CVE-2024-33454,0,0,828c3154586cb9467c595c29d55b5edffb58459441e838ece7c4b76998774cd3,2024-11-21T09:16:59.873000
CVE-2024-3346,0,0,59b56dd3f76b482f3f46a4f5168e1d1df055d74f08cce67e579a69f871f78046,2024-11-21T09:29:25.567000
CVE-2024-33465,0,0,028b0b409a1d692a647c2520d19ecf0970cde52f7911daddec0b497be9b02421,2024-11-21T09:17:00.083000
CVE-2024-33469,1,1,495c710f8d26a286929310ebe6bba90cf8d173cc5d9918b7540497a710f68650,2025-02-11T23:15:08.903000
CVE-2024-33469,0,0,495c710f8d26a286929310ebe6bba90cf8d173cc5d9918b7540497a710f68650,2025-02-11T23:15:08.903000
CVE-2024-3347,0,0,84580b9ac972f7e1b9b68290f45a4841524b704cb60fa893b96efa9e425529ef,2024-11-21T09:29:25.703000
CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d00d,2024-11-21T09:17:00.293000
CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000
@ -258403,7 +258408,7 @@ CVE-2024-34562,0,0,22e9af7c3c7972513883b09b828274e40ff3fe33753cfb2dd3842a5691b68
CVE-2024-34563,0,0,040e10566a3859791595a0c0a3fd8df23d5dfb5e509404b6b78f66aa609377b8,2024-11-21T09:18:56.630000
CVE-2024-34564,0,0,cda6ebc66c36b8b0b609a35365d30e1dec81e59451dcb9e93db6bc2f43d200c0,2024-11-21T09:18:56.760000
CVE-2024-34565,0,0,cad1f1315da853e64ba67f67cf4501a859399268359dcdf02f7b21194a3856e0,2024-11-21T09:18:56.890000
CVE-2024-34566,0,0,2671e0b5139844bb2688036f565bfd7344554ba83df594d02643341f22296441,2024-11-21T09:18:57.020000
CVE-2024-34566,0,1,551c9639368b69fc3a51ac711b9940c7917ef958d0e7556eb6b33c06b1a5e2a5,2025-02-12T01:40:13.093000
CVE-2024-34567,0,0,2ab276be8a7d5ba54eff2226d21311c587c26eddbddaace14bc714e7d0243fe0,2024-11-21T09:18:57.143000
CVE-2024-34568,0,0,e2a99021dbe034875bba53eef3b45ca37b51ca7526699e547fd5d14e77646bbc,2024-11-21T09:18:57.270000
CVE-2024-34569,0,0,cd8352582a68c7f60aec609b227b4580a06f5f85d280b7f4cd9eabb100d8aa73,2024-11-21T09:18:57.397000
@ -258427,7 +258432,7 @@ CVE-2024-34586,0,0,dd61ac39e080637c3d06cb160b51db7d6028a8ae3c7acedaea446e122ae60
CVE-2024-34587,0,0,a1ea0c2bc61320f1c19b728274877a0035d53c1740b926a40db9be507484bd32,2024-11-21T09:18:59.630000
CVE-2024-34588,0,0,7fd384a050a91a1492743c2c9bc72e1345a594b8c12774ff795ba64a2b6923f7,2024-11-21T09:18:59.783000
CVE-2024-34589,0,0,6fef5e07338107638aef6817dbd0c411c0299c6afcc66be7b7eb8ff397efd304,2024-11-21T09:18:59.933000
CVE-2024-3459,0,0,eb6950b6e6b398f4f248bb57e02e28661732e5479fa83345a1eead742c901f56,2024-11-21T09:29:38.633000
CVE-2024-3459,0,1,edda0f4899447a7e6b858b8951f50319e74b549a64650bcda8c3f37500b4d328,2025-02-12T01:48:00.043000
CVE-2024-34590,0,0,d172563a087c8cc3fc0f18ab9f59b7a38684c26fe9d7eb21c9f28503c3607b69,2024-11-21T09:19:00.083000
CVE-2024-34591,0,0,38f4e77aa79e1fe352794c9dd648e5c24d0b6c108df771e74aa53e4a7f38804e,2024-11-21T09:19:01.973000
CVE-2024-34592,0,0,2348be36c9bc2af83e1b7f1822c29ed34295e7b533f76caeff201627048bb319,2024-11-21T09:19:02.133000
@ -263229,8 +263234,8 @@ CVE-2024-40884,0,0,ed9954ff74e93284dab776e5f85f657d7b2f3e463ef905e91d917d70faae6
CVE-2024-40885,0,0,c819fb6dd4b0136231d7f32857f3d24a5008c3818051b19ae2000f42a9494ee6,2024-11-15T14:00:09.720000
CVE-2024-40886,0,0,d6046df7f06d5f5712a2972118d791b3c29f6fc6001fad542f39cc79b75e1580,2024-08-23T16:09:31.887000
CVE-2024-4089,0,0,7a035608d08862b8a3927991cbc7bcfd8e0cb13815d39b3b58eaf685ec21d6c5,2024-10-17T19:41:36.467000
CVE-2024-40890,0,0,5268031b6b0c69c868b634e8d2dcc745299983ca826dbcb0aeb2308ae94d43c6,2025-02-04T10:15:08.717000
CVE-2024-40891,0,0,efbfdb62d645eed67f121c1bccca906620c7719c0e0f11f26167858d6df188a2,2025-02-04T10:15:08.920000
CVE-2024-40890,0,1,a2545f7bb3a1bbfdaf9948a013d36581b2d3b0971e991c0417acda97a4bb7112,2025-02-12T02:00:01.980000
CVE-2024-40891,0,1,da753debbb056ccce6e92cb3a629df90a9c092073c1b0fbda1dae1b05e2f10de,2025-02-12T02:00:01.980000
CVE-2024-40892,0,0,0bef0c096de1fd9b74596dba063b1cf9ffb172ff0abd417611d342278b46245f,2024-08-21T18:15:09.710000
CVE-2024-40893,0,0,291c1cc414cfaa66f88e6f282a2cb52f9787a1f732797e904eca670adbd8e574,2024-08-21T18:15:09.803000
CVE-2024-40895,0,0,9bfbe451c0a62cc469c348ecf829cab564e06b39ab7ab75fbb9a00c7abd49483,2024-11-21T09:31:48.250000
@ -266040,7 +266045,7 @@ CVE-2024-44331,0,0,42b00072d48078e0b9a060027e505c6c6396591a3a5817312b42a22a13dd2
CVE-2024-44333,0,0,c5d624202dbc9a9b1670ac84eba11673bfacf2e3bd54495df9c00726b1f1c22f,2024-09-09T21:35:11.347000
CVE-2024-44334,0,0,2a3b81ccad3fcc31e1a06c0adb7939fa911851042ebf4e5dd5061206cc9f639c,2024-09-09T20:35:12.473000
CVE-2024-44335,0,0,4962d89eefd697dbe30866ff3edf68624ec476c2d20b191be41bf6d9942ab0b8,2024-09-09T20:35:17.330000
CVE-2024-44336,1,1,b336e2ea7f1da09debaa046d4f249f821a074a273864f2d0a5e68a498672bb62,2025-02-11T23:15:09.020000
CVE-2024-44336,0,0,b336e2ea7f1da09debaa046d4f249f821a074a273864f2d0a5e68a498672bb62,2025-02-11T23:15:09.020000
CVE-2024-44337,0,0,030514f9e40e38f59570e28e764a82624613b34238346a3330ba41ff1d541657,2024-11-14T16:35:14.613000
CVE-2024-4434,0,0,7c3e3d7c9744d63a28cc3bc3d3c440c5b3c9ccfe3f078d9d12a3b43c238ce6e4,2025-01-15T20:05:02.353000
CVE-2024-44340,0,0,83e58ea9785ebdf6a4101ac95bdee1fca6e905c550b6bbbcea8839f08b665ae8,2024-08-30T14:56:38.207000
@ -272562,6 +272567,7 @@ CVE-2024-53867,0,0,72e506c917a884d4217cf064e51169da2e7b7e498f38ccd1a1ee0446ccb5b
CVE-2024-53869,0,0,c1261311436db2434e8425ca6c3b255cdf8ad346c162ecff4729cd3488762e70,2025-01-28T04:15:10.023000
CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000
CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000
CVE-2024-53880,1,1,34183cceeecf9f65c439b51cd1afbc636f6139fbfbd07e606a43b81980ad32fb,2025-02-12T01:15:08.940000
CVE-2024-53881,0,0,9961109f8d29619e875e57c963e9962bf41cbd2a63df9c973c97fd1f736a0a6c,2025-01-28T04:15:10.170000
CVE-2024-5389,0,0,7b62c041501e93209780667aacd1d527276730dd1c9ab622b7a27b2efa3d1409,2024-11-21T09:47:33.420000
CVE-2024-53899,0,0,6a1e5c5e75d5e15fff4f2ff3855d9c19b45498a7a802333e24ea4271ef180bd9,2025-02-10T18:12:06.107000
@ -273167,7 +273173,7 @@ CVE-2024-54762,0,0,cb8e4aa44b5cf3cee838feac63d68a9bf187e0e1794dfb8457350541c6231
CVE-2024-54763,0,0,35fe6aeaf8ff2a2d9d1415d3e6f03dd3382c26dbe16edd942f9dacbafebc435a,2025-01-07T22:15:30.950000
CVE-2024-54764,0,0,7108368b95c8c33cd12f1a88712752ff55f9a1ed7ed83d67f4ddea2a12f4ec62,2025-01-07T22:15:31.113000
CVE-2024-54767,0,0,84c265d2aae9152ded289b8afe6572e4e60031d668299b365ef2804b7e7ac1df,2025-01-07T16:15:36.157000
CVE-2024-54772,1,1,596a344d20e5016fe86f597976bbdf92a2ea5a5e50bbc7dbd6f918da880df294,2025-02-11T23:15:09.117000
CVE-2024-54772,0,0,596a344d20e5016fe86f597976bbdf92a2ea5a5e50bbc7dbd6f918da880df294,2025-02-11T23:15:09.117000
CVE-2024-54774,0,0,4ed84230e45b966235391401edd82584405ef683a3e2fc4ff18ea7ccdbfb6480,2024-12-28T18:15:10.397000
CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000
CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000
@ -273207,7 +273213,7 @@ CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18
CVE-2024-54909,0,0,73dbe9c0eacf924ee5d6ba5f8aea112f03b6c84bae4083891b6147c1b1e4a2ff,2025-02-11T22:15:28.733000
CVE-2024-5491,0,0,e331b82e31ebdfe13500034914a1c37ca8ae8114dde41994ac12e59a5b4284ca,2024-11-21T09:47:47.017000
CVE-2024-54910,0,0,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000
CVE-2024-54916,1,1,fff3ee0e89c570a0b653b311b6ad0eaae0c786e449fdb988eba614851470bc4d,2025-02-11T23:15:09.227000
CVE-2024-54916,0,0,fff3ee0e89c570a0b653b311b6ad0eaae0c786e449fdb988eba614851470bc4d,2025-02-11T23:15:09.227000
CVE-2024-54918,0,0,8d1c74ed435285d94b09f28fd23f5ea9a7eeb2cd4aab9028349afde0dfc746c6,2024-12-12T18:15:25.790000
CVE-2024-54919,0,0,d240fd7b13ed8b141b8975d3eb4f4e201c9093f582cb0ecbb49a96c5b085f2d9,2024-12-10T18:15:42.770000
CVE-2024-5492,0,0,bef41c141414e91a737f6b5c4fcaf83f2ee31e6e95a9e2405d6f4dc30a93092c,2024-11-21T09:47:47.140000
@ -274277,7 +274283,7 @@ CVE-2024-56990,0,0,d73542476af2136f4500771d27d3e44f35a9b22fb9d2fc461dbdfee0bbfd6
CVE-2024-56997,0,0,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b7e9,2025-01-21T20:15:35.757000
CVE-2024-56998,0,0,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000
CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000
CVE-2024-57000,1,1,bebb7ca545f033dce1711143b34b63e5e0bf44eaefebdf05145ea507a027fbc2,2025-02-11T23:15:09.337000
CVE-2024-57000,0,0,bebb7ca545f033dce1711143b34b63e5e0bf44eaefebdf05145ea507a027fbc2,2025-02-11T23:15:09.337000
CVE-2024-57004,0,0,f586a360af706a58378cf0329b6a642e0d827f8c0f318cf23dcc24fe8bb6abf1,2025-02-03T19:15:12.777000
CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000
CVE-2024-57011,0,0,e423cf8108eeaccf1a4a6a564034672c57143be7df30237f44f891951f76e1ce,2025-01-16T15:15:13.873000
@ -278937,6 +278943,7 @@ CVE-2025-1193,0,0,fcc052109589eb1970f90d1d7ff13b99a2b86ca08fe73a0a45a738ed06ce3e
CVE-2025-1211,0,0,6ad766f197b6f1fef6e3f3a893bb15bcbebd409cf163deb595b57c10dde2bea9,2025-02-11T16:15:50.660000
CVE-2025-1231,0,0,649e1b02ffb9b2bdea0c0d5302a32991e98ee2dd95c7154e6cc11a5ff00876a1,2025-02-11T15:15:20.643000
CVE-2025-1240,0,0,9246fa8e04ff02b401e811c0a0ea877726af12834c8315ffa6c43657c8f2f12a,2025-02-11T22:15:29.800000
CVE-2025-1243,1,1,ce5d6de4aa6c9e357b98e042ebbfccf5742c455f48067e48b6f93d2620d3c5f5,2025-02-12T01:15:09.073000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000
@ -279255,7 +279262,7 @@ CVE-2025-21386,0,0,587925b9f51c6f3c61d2c5fdab169ea945b83965a4922958f2a0d4035a486
CVE-2025-21387,0,0,45b75cfa0e3c3024e9e9758b140c1e6a57941eb5f03adacfbe13ff717267ca19,2025-02-11T18:15:37.337000
CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000
CVE-2025-21390,0,0,14697f02c8baf4b55b17c007d56cdc55e364c61db4a64d4a3dca6609d3016329,2025-02-11T18:15:37.523000
CVE-2025-21391,0,0,6e4fd4950bb5758240b222f52711872c75e6883808a4a98384b300fa35641d63,2025-02-11T18:15:37.723000
CVE-2025-21391,0,1,0010a0d8103c312adae0e6ab52ff5b2f6efb1301caae82c7257918d8825b7799,2025-02-12T02:00:01.980000
CVE-2025-21392,0,0,faf0d0e3f0fb591c7fa30ae6371bf66c37572648e7b14e075224882a96d4548d,2025-02-11T18:15:37.907000
CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000
CVE-2025-21394,0,0,17cc60461eb9eb8df29e62503902c081c32c2e62dd8a0d75bc2ce09b707ad17e,2025-02-11T18:15:38.100000
@ -279278,7 +279285,7 @@ CVE-2025-21413,0,0,92246b94b6ff8ad6af923e8c9e956388783c15bc49ee5b2dd584abbbec413
CVE-2025-21414,0,0,3e2427e2ed7c2a71e7ca3cdd20bff3b54a00c32904d4ae8308a39097ff4a1289,2025-02-11T18:15:39.787000
CVE-2025-21415,0,0,a73e69cb370d0dac47b98a4826a11694e5572b74f5784ab533acee4e37f95f59,2025-02-07T14:11:24.557000
CVE-2025-21417,0,0,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a05545552d9,2025-01-16T20:34:03.303000
CVE-2025-21418,0,0,80fc1ee196509b1d5b15447fb529df5ce42a9131defec74112587798a6a8394d,2025-02-11T18:15:40.023000
CVE-2025-21418,0,1,3ae3c511b74f45afb2582057b40d6d6e504500f2e441f4a2e37971243dae5c45,2025-02-12T02:00:01.980000
CVE-2025-21419,0,0,8d4a4ce1854ce64d5e9a1632a620dc74ee76e1214f2cab758271d527d93a2f57,2025-02-11T18:15:40.227000
CVE-2025-21420,0,0,4b5efeb1f002453a12ea1479627a151320581653d00a87f90e1240101e9780c2,2025-02-11T18:15:40.427000
CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000
@ -279974,6 +279981,7 @@ CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe
CVE-2025-23236,0,0,9ed63f7bfbe943272f760ab493d54bc59838c975bd594d259d2bee944c4c3a3d,2025-02-06T08:15:30.170000
CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000
CVE-2025-23239,0,0,7a585763d6c168ccfac8bf02954dc56c5ae9d7a095f70655a5a1ee00b3dbe979,2025-02-05T18:15:31.373000
CVE-2025-23359,1,1,ca000ea1c09e6d84d7ca20124740a5199de0048ccb1fcc97aaaa4891bafa68b3,2025-02-12T01:15:09.230000
CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000
CVE-2025-23363,0,0,0a9aef70d0345148f50c8be1d50129f0d5255e87312c25a23579bd06a0945ffc,2025-02-11T11:15:16.250000
CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000
@ -280894,7 +280902,7 @@ CVE-2025-25190,0,0,e0da5cc0fc69e9aeec609eb916069649e239fce8ec02b2e1997642ab3a06b
CVE-2025-25193,0,0,6313f18b0cc99557f7bb698f851fc47bc1114c9ea466bbb50c1e509a16b993db,2025-02-11T16:15:52.523000
CVE-2025-25194,0,0,3cfb92d0adf1aa48727a5bef815057c2df69f4fc0b8dbd2b306994cdf6b88680,2025-02-10T23:15:16.067000
CVE-2025-25202,0,0,44a9f4b6846ddccd75106a09a7d9e63e6d44f1833e59d9edfd1f84930b624155,2025-02-11T19:15:18.690000
CVE-2025-25203,1,1,fafc3c78a1f4e39a87b4d68e2295b38c2910ef2359dd9409bb1510258a4c87e7,2025-02-11T23:15:09.450000
CVE-2025-25203,0,0,fafc3c78a1f4e39a87b4d68e2295b38c2910ef2359dd9409bb1510258a4c87e7,2025-02-11T23:15:09.450000
CVE-2025-25241,0,0,3f1a5e9f52cb19b464445ba11bc8902290ee3de6281565f07fab135133fb799f,2025-02-11T06:15:24.120000
CVE-2025-25243,0,0,4a1fb2a2f647dbb24d92bc1eec2013806163e245973af288dc8e801924ea4b36,2025-02-11T06:15:24.330000
CVE-2025-25246,0,0,0ae0916aaea4283fe6ce79729127d0aa8edfdf07242f3416b5c2d5ec885c2c98,2025-02-05T05:15:11.663000

Can't render this file because it is too large.