mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2025-02-17T09:00:46.343484+00:00
This commit is contained in:
parent
acdd98abe3
commit
b1afe7228f
145
CVE-2025/CVE-2025-13xx/CVE-2025-1379.json
Normal file
145
CVE-2025/CVE-2025-13xx/CVE-2025-1379.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-1379",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-17T07:15:08.503",
|
||||
"lastModified": "2025-02-17T07:15:08.503",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in code-projects Real Estate Property Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /Admin/CustomerReport.php. The manipulation of the argument city leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/1337g/realestatepropertymanagement_poc/blob/main/gu3.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295987",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295987",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.501070",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-13xx/CVE-2025-1380.json
Normal file
141
CVE-2025/CVE-2025-13xx/CVE-2025-1380.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-1380",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-17T07:15:08.953",
|
||||
"lastModified": "2025-02-17T07:15:08.953",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /dashboard/admin/del_plan.php. The manipulation of the argument name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295988",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295988",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.501980",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.yuque.com/polaris-pisym/aevk1q/fdkeqw2a2ug9zohn",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-13xx/CVE-2025-1381.json
Normal file
145
CVE-2025/CVE-2025-13xx/CVE-2025-1381.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-1381",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-02-17T08:15:08.540",
|
||||
"lastModified": "2025-02-17T08:15:08.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Real Estate Property Management System 1.0. It has been classified as critical. This affects an unknown part of the file /ajax_city.php. The manipulation of the argument CityName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Lonpeak/cve/blob/main/upload-1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.295989",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.295989",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.502070",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
28
README.md
28
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-17T07:00:19.420526+00:00
|
||||
2025-02-17T09:00:46.343484+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-17T06:15:13.277000+00:00
|
||||
2025-02-17T08:15:08.540000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,34 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
281536
|
||||
281539
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-13603](CVE-2024/CVE-2024-136xx/CVE-2024-13603.json) (`2025-02-17T06:15:11.560`)
|
||||
- [CVE-2024-13608](CVE-2024/CVE-2024-136xx/CVE-2024-13608.json) (`2025-02-17T06:15:11.717`)
|
||||
- [CVE-2024-13625](CVE-2024/CVE-2024-136xx/CVE-2024-13625.json) (`2025-02-17T06:15:11.820`)
|
||||
- [CVE-2024-13626](CVE-2024/CVE-2024-136xx/CVE-2024-13626.json) (`2025-02-17T06:15:11.940`)
|
||||
- [CVE-2024-13627](CVE-2024/CVE-2024-136xx/CVE-2024-13627.json) (`2025-02-17T06:15:12.047`)
|
||||
- [CVE-2024-13726](CVE-2024/CVE-2024-137xx/CVE-2024-13726.json) (`2025-02-17T06:15:12.170`)
|
||||
- [CVE-2024-47935](CVE-2024/CVE-2024-479xx/CVE-2024-47935.json) (`2025-02-17T06:15:13.053`)
|
||||
- [CVE-2025-0924](CVE-2025/CVE-2025-09xx/CVE-2025-0924.json) (`2025-02-17T05:15:09.410`)
|
||||
- [CVE-2025-1376](CVE-2025/CVE-2025-13xx/CVE-2025-1376.json) (`2025-02-17T05:15:09.807`)
|
||||
- [CVE-2025-1377](CVE-2025/CVE-2025-13xx/CVE-2025-1377.json) (`2025-02-17T05:15:10.090`)
|
||||
- [CVE-2025-1378](CVE-2025/CVE-2025-13xx/CVE-2025-1378.json) (`2025-02-17T06:15:13.277`)
|
||||
- [CVE-2025-1389](CVE-2025/CVE-2025-13xx/CVE-2025-1389.json) (`2025-02-17T05:15:10.317`)
|
||||
- [CVE-2025-1379](CVE-2025/CVE-2025-13xx/CVE-2025-1379.json) (`2025-02-17T07:15:08.503`)
|
||||
- [CVE-2025-1380](CVE-2025/CVE-2025-13xx/CVE-2025-1380.json) (`2025-02-17T07:15:08.953`)
|
||||
- [CVE-2025-1381](CVE-2025/CVE-2025-13xx/CVE-2025-1381.json) (`2025-02-17T08:15:08.540`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `3`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2023-39454](CVE-2023/CVE-2023-394xx/CVE-2023-39454.json) (`2025-02-17T06:15:11.097`)
|
||||
- [CVE-2024-22372](CVE-2024/CVE-2024-223xx/CVE-2024-22372.json) (`2025-02-17T06:15:12.283`)
|
||||
- [CVE-2024-39607](CVE-2024/CVE-2024-396xx/CVE-2024-39607.json) (`2025-02-17T06:15:12.527`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
33
_state.csv
33
_state.csv
@ -230773,7 +230773,7 @@ CVE-2023-3945,0,0,8263d87a9b93dea56247488dc65a7788b5db720f93f40331782d887f9f1d7f
|
||||
CVE-2023-39450,0,0,4de064578569970f775d9d82a43af4f13f13093a008a496e7a57f3a8bf4b7184,2024-02-14T18:15:45.960000
|
||||
CVE-2023-39452,0,0,ec53477db78dc80ce467b6a53103a36ca4d2acabea27a4b9bbdc8d8d458e0e57,2024-11-21T08:15:27.053000
|
||||
CVE-2023-39453,0,0,7e466bd82d73f4bfb385d3ba3fb397d6aa0f0fae740693ab9f915d8bf3726f95,2024-11-21T08:15:27.180000
|
||||
CVE-2023-39454,0,1,62d09034a60fb4ba805a7bba050c907169407bec74836df67b33951d5b76fe96,2025-02-17T06:15:11.097000
|
||||
CVE-2023-39454,0,0,62d09034a60fb4ba805a7bba050c907169407bec74836df67b33951d5b76fe96,2025-02-17T06:15:11.097000
|
||||
CVE-2023-39455,0,0,f5ed49d48bc86520f3aa0d5645c06bab09461536f5ba8e1a6f5ecb262af9eeed,2024-11-21T08:15:27.430000
|
||||
CVE-2023-39456,0,0,b37774c19047ba093b48af6cd857648fc4846bf73842688a6aab29f9a3ad1278,2025-02-13T17:16:53.223000
|
||||
CVE-2023-39457,0,0,35d25611e0498538231377222367ab8d89f66267de3b70c40f0f4f090041e05c,2024-11-21T08:15:27.707000
|
||||
@ -246627,18 +246627,18 @@ CVE-2024-13599,0,0,03405f2c3d79b505fbb84b1ff3dea79fdc81e050ef9a41f4a5537eddbfaf0
|
||||
CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb8486a,2025-02-05T21:46:19.363000
|
||||
CVE-2024-13600,0,0,56cac1498188e92740769a93fb9bbd90e1fcbfaecaef35b28b714caf9a59f0b3,2025-02-12T06:15:19.643000
|
||||
CVE-2024-13601,0,0,e0015393c764a503ff79d329184d467cac0f9703697b52d602663376d3e165e8,2025-02-12T06:15:19.830000
|
||||
CVE-2024-13603,1,1,f5ddc39376765e5cf70d139b9cd0562a2cffa9ee9e42ff0700edf6701aa0da37,2025-02-17T06:15:11.560000
|
||||
CVE-2024-13603,0,0,f5ddc39376765e5cf70d139b9cd0562a2cffa9ee9e42ff0700edf6701aa0da37,2025-02-17T06:15:11.560000
|
||||
CVE-2024-13606,0,0,1cbdd85184ccb544c93c1632b6d2d3443b7aae450a16746f7539ee65d5330de1,2025-02-13T10:15:09.310000
|
||||
CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e5527f8,2025-02-04T07:15:12.973000
|
||||
CVE-2024-13608,1,1,730b0ed6d14a39f661d8b58e3582ab1ffb56662a72ce1d07024da3747f0e1f13,2025-02-17T06:15:11.717000
|
||||
CVE-2024-13608,0,0,730b0ed6d14a39f661d8b58e3582ab1ffb56662a72ce1d07024da3747f0e1f13,2025-02-17T06:15:11.717000
|
||||
CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000
|
||||
CVE-2024-13612,0,0,552127c2046be21ad3d3bc25df0920820f31b497c8eb5b9bb46c66cbfd8336ca,2025-02-01T13:15:21.320000
|
||||
CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000
|
||||
CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000
|
||||
CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000
|
||||
CVE-2024-13625,1,1,13fe8a9d23e71af19d049c26713d37681ab17ff9be556309bc6aff2602f296b7,2025-02-17T06:15:11.820000
|
||||
CVE-2024-13626,1,1,ed2b03a934796ec0d9dda4598897fce51405472dd7901847b82ba4dfaac12a2b,2025-02-17T06:15:11.940000
|
||||
CVE-2024-13627,1,1,091818d37bd994aab1b6b18bae211dee9546cb2e17475bf34984a23caeb51798,2025-02-17T06:15:12.047000
|
||||
CVE-2024-13625,0,0,13fe8a9d23e71af19d049c26713d37681ab17ff9be556309bc6aff2602f296b7,2025-02-17T06:15:11.820000
|
||||
CVE-2024-13626,0,0,ed2b03a934796ec0d9dda4598897fce51405472dd7901847b82ba4dfaac12a2b,2025-02-17T06:15:11.940000
|
||||
CVE-2024-13627,0,0,091818d37bd994aab1b6b18bae211dee9546cb2e17475bf34984a23caeb51798,2025-02-17T06:15:12.047000
|
||||
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
|
||||
CVE-2024-13639,0,0,2fa3cbcf0e6974db61fb65364ec620ba817caf77aea64fecbbfef94d3304d5da,2025-02-13T09:15:07.273000
|
||||
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
|
||||
@ -246688,7 +246688,7 @@ CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd
|
||||
CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000
|
||||
CVE-2024-13722,0,0,fac6574297fad520484336a8f32a80c91be5643d31918d246727bb21994df2e7,2025-02-06T15:15:12.867000
|
||||
CVE-2024-13723,0,0,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f870,2025-02-06T15:15:13.050000
|
||||
CVE-2024-13726,1,1,ed40e7d0ccfa3e513d937bd8d71cc7ba5769f17f2351ac80377e14058de87ee2,2025-02-17T06:15:12.170000
|
||||
CVE-2024-13726,0,0,ed40e7d0ccfa3e513d937bd8d71cc7ba5769f17f2351ac80377e14058de87ee2,2025-02-17T06:15:12.170000
|
||||
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
|
||||
CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000
|
||||
CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df02e1,2025-02-04T10:15:08.527000
|
||||
@ -249448,7 +249448,7 @@ CVE-2024-22369,0,0,58e8ca1bec283235a25cd95d49da2325b0c64624136b4dcc1cb8c11767541
|
||||
CVE-2024-2237,0,0,10342a3bcedc4ff39999af4eb389909f61f2ebcb0c10fb4672d2ed188d1b8434,2025-01-23T16:35:26.147000
|
||||
CVE-2024-22370,0,0,154c2c04f020f54de37bfc5e89569563afcd67d6a9da771051468d73c892d8f9,2024-11-21T08:56:08.407000
|
||||
CVE-2024-22371,0,0,d0e92b003134c0fed730aae003a7b80fa3bc3f32abee1c84a03ebdae53062d2f,2024-11-21T08:56:08.540000
|
||||
CVE-2024-22372,0,1,b551e264aeec89c61ff7f8afba5117db921544e7fbe334b539067eccc9f75085,2025-02-17T06:15:12.283000
|
||||
CVE-2024-22372,0,0,b551e264aeec89c61ff7f8afba5117db921544e7fbe334b539067eccc9f75085,2025-02-17T06:15:12.283000
|
||||
CVE-2024-22373,0,0,df42c24604a328ccd0420d248e34b3fdffc796f28184a2239f0afc6ac9ce15b5,2024-11-21T08:56:08.823000
|
||||
CVE-2024-22374,0,0,ae0e375db11b61a422b5846b54d5aff2de92fd29b27c5f7dd525508ff6c72068,2024-08-14T17:49:14.177000
|
||||
CVE-2024-22376,0,0,0b1d42b19b9ab056fcf9859a710f755e5c4d57ddfb85f698630e9d1f09dc1f19,2024-08-14T17:49:14.177000
|
||||
@ -262631,7 +262631,7 @@ CVE-2024-39603,0,0,1437983f8883ed245799b0e5c1e1953f598b12b478ace10cadcd2f37e9d67
|
||||
CVE-2024-39604,0,0,88257eaba5c332ff2d127c02fbeac9934efd2fc6ba8e017d75c36c5cef181610,2025-01-14T16:15:31.747000
|
||||
CVE-2024-39605,0,0,3d15565b47da01f09220518de7967c2695d8eac811d4af1b8240b665e7ca3c87,2025-01-30T14:34:40.630000
|
||||
CVE-2024-39606,0,0,6e7a7045b70162a36f6e9de467afb3add68b13cba13169cfb6520e33b35ca5e5,2025-02-12T22:15:36.960000
|
||||
CVE-2024-39607,0,1,b5a60f2e5495d003db8119577265911fa618564a52d6f0ac27416a33bb56c3df,2025-02-17T06:15:12.527000
|
||||
CVE-2024-39607,0,0,b5a60f2e5495d003db8119577265911fa618564a52d6f0ac27416a33bb56c3df,2025-02-17T06:15:12.527000
|
||||
CVE-2024-39608,0,0,9ffd9e93083b666f0e42c9a03d32cf85ab205f595971f01f7b69deb9e34455e8,2025-01-14T16:15:31.853000
|
||||
CVE-2024-39609,0,0,2a17afe0616a352707ec6d7a4b1c89eb322f40e85f4e6ff34b51561aff3d09f0,2024-11-19T19:58:29.653000
|
||||
CVE-2024-3961,0,0,9adcc99617b8264560a448864cfa925b25ac1a522a680cd7491d3775365a24ba,2024-11-21T09:30:46.797000
|
||||
@ -268700,7 +268700,7 @@ CVE-2024-47925,0,0,e85657cf2064d6c6e6af79febd3acfb5604d99d861da18ed64400f723839f
|
||||
CVE-2024-47926,0,0,484379ebe866d5f80b8df90be76850be47d4ff1695103f0fb6b101347d861dde,2024-12-30T10:15:07.380000
|
||||
CVE-2024-4793,0,0,a6ca6dc2e5c47daa16d59954e19a82bf00c36bb6db82d6b1c1e23c1f1df319c1,2024-11-21T09:43:37.463000
|
||||
CVE-2024-47934,0,0,c5ee21e51979d89f537acbabceb77f32a9e51b9036a475c6fa323918ce911a01,2025-01-08T03:15:08.550000
|
||||
CVE-2024-47935,1,1,dda26a62a7bdc994f9b4a9d9391e631773aed6ff22c30899552af9731fa1f71a,2025-02-17T06:15:13.053000
|
||||
CVE-2024-47935,0,0,dda26a62a7bdc994f9b4a9d9391e631773aed6ff22c30899552af9731fa1f71a,2025-02-17T06:15:13.053000
|
||||
CVE-2024-47939,0,0,56807ff489784cf4fadb2e00da7b797597c1ced2e2c98f8bd3c06e8fe447a672,2024-11-01T12:57:03.417000
|
||||
CVE-2024-4794,0,0,c8bbe767ad72c9235212e11271c46c761e04d6a9b46861dabd15f61ddf88f000,2024-11-21T09:43:37.600000
|
||||
CVE-2024-47940,0,0,13d7c32b7f73c4e4fb7631fb34c565a5b9a53b3818e0802f4a7c760b1b5809b8,2024-11-13T23:14:54.567000
|
||||
@ -279103,7 +279103,7 @@ CVE-2025-0909,0,0,1ff7d78519026d4b0df5324b5b84f781600c6266238b96b6e6fda4fafcd94e
|
||||
CVE-2025-0910,0,0,5441c161f7257bb6355c09b7b0bb2df312d9b6c6d59e58e837649ec8c68777c9,2025-02-12T18:59:18.447000
|
||||
CVE-2025-0911,0,0,b9aa939093c00e0782e255aa47e49c2cf1d4559eb848b6a9c47f1e00b8bd8fad,2025-02-12T19:00:17
|
||||
CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000
|
||||
CVE-2025-0924,1,1,aee87ee741a81d5e3594f3d82c18001c32a0f8c18175f96bf3ced22a7e7ace42,2025-02-17T05:15:09.410000
|
||||
CVE-2025-0924,0,0,aee87ee741a81d5e3594f3d82c18001c32a0f8c18175f96bf3ced22a7e7ace42,2025-02-17T05:15:09.410000
|
||||
CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000
|
||||
CVE-2025-0929,0,0,bcacb82faee52c17b22479d26474b4df04f76f99e634ac515f50cccea0dc9587,2025-01-31T14:15:34.130000
|
||||
CVE-2025-0930,0,0,e48470a5aeaab134703b9f1449e9c6f114cca0e6b49cd331dee21f5acc590fd8,2025-01-31T14:15:34.293000
|
||||
@ -279311,12 +279311,15 @@ CVE-2025-1371,0,0,d42203759b5fdf525ab79fe4c4dc94235c0953e2185668820f0542fa96cd9a
|
||||
CVE-2025-1372,0,0,7bd9cbee44da9690280c00d51a6bae4a791d035cefb44fae5dfec5b23c1c2f2e,2025-02-17T03:15:09.573000
|
||||
CVE-2025-1373,0,0,b51154a9a004f1fd27d3158858d9a3700c61f60084062e4248400a4ec2256f83,2025-02-17T04:15:08.447000
|
||||
CVE-2025-1374,0,0,b7fa05f0c4c2d66fd4f270cc4250c2b3257c8dc0e6f850c49a3e1698d2a969f5,2025-02-17T04:15:08.643000
|
||||
CVE-2025-1376,1,1,9cb77eaa81162f231e769e62670da692672bd5970c49c962e7dfd1fdd0bc00ba,2025-02-17T05:15:09.807000
|
||||
CVE-2025-1377,1,1,84dbd56dc863bede5cc83182ed6a5edcda6cbf59030317e1e5400d3b48957f28,2025-02-17T05:15:10.090000
|
||||
CVE-2025-1378,1,1,7b9abfd951882c59db8337f9925f5cb5ff8b160c284ba7a02d59e3bbbeb92335,2025-02-17T06:15:13.277000
|
||||
CVE-2025-1376,0,0,9cb77eaa81162f231e769e62670da692672bd5970c49c962e7dfd1fdd0bc00ba,2025-02-17T05:15:09.807000
|
||||
CVE-2025-1377,0,0,84dbd56dc863bede5cc83182ed6a5edcda6cbf59030317e1e5400d3b48957f28,2025-02-17T05:15:10.090000
|
||||
CVE-2025-1378,0,0,7b9abfd951882c59db8337f9925f5cb5ff8b160c284ba7a02d59e3bbbeb92335,2025-02-17T06:15:13.277000
|
||||
CVE-2025-1379,1,1,f06cc7a550feac8469cc71237ab20b6df0f3252ba0fd8ff6d20187a309fc5ba0,2025-02-17T07:15:08.503000
|
||||
CVE-2025-1380,1,1,97acbcf19503911aa92ecfe9e3db3a7b50e5444b606fa09cc94f0673917599e7,2025-02-17T07:15:08.953000
|
||||
CVE-2025-1381,1,1,8a9685f5e5b8ebad8a0ac5f23a89b6b3ba45fc062151114d3deac1372ed1f0ae,2025-02-17T08:15:08.540000
|
||||
CVE-2025-1387,0,0,3471c5e221fd26cc82d790d0348e17ce666394a812c51ab6ee55856ad41c6d05,2025-02-17T04:15:08.807000
|
||||
CVE-2025-1388,0,0,6166d0831a99cbb271e76281dd624232fbaf9903152209f7151545224b25416d,2025-02-17T04:15:08.960000
|
||||
CVE-2025-1389,1,1,b6f1b0c672dbbad3874206b7be5adc417f88010255a18af2ae0024e0bb3a7bd5,2025-02-17T05:15:10.317000
|
||||
CVE-2025-1389,0,0,b6f1b0c672dbbad3874206b7be5adc417f88010255a18af2ae0024e0bb3a7bd5,2025-02-17T05:15:10.317000
|
||||
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user