mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-02-18T11:00:49.267082+00:00
This commit is contained in:
parent
9b160ed85c
commit
cfbbc72db5
60
CVE-2024/CVE-2024-128xx/CVE-2024-12860.json
Normal file
60
CVE-2024/CVE-2024-128xx/CVE-2024-12860.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-12860",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-18T09:15:08.660",
|
||||
"lastModified": "2025-02-18T09:15:08.660",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The CarSpot \u2013 Dealership Wordpress Classified Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.4.3. This is due to the plugin not properly validating a token prior to updating a user's password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-620"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/carspot-automotive-car-dealer-wordpress-classified-theme/20195539",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d1043dce-628f-485b-bc1c-b78938c2a6f5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-133xx/CVE-2024-13316.json
Normal file
68
CVE-2024/CVE-2024-133xx/CVE-2024-13316.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-13316",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-18T09:15:09.400",
|
||||
"lastModified": "2025-02-18T09:15:09.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Scratch & Win \u2013 Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the apmswn_create_discount() function in all versions up to, and including, 2.8.0. This makes it possible for unauthenticated attackers to create coupons."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/scratch-win-giveaways-for-website-facebook/tags/2.7.0/socialscratchwin.php#L492",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3212730%40scratch-win-giveaways-for-website-facebook&new=3212730%40scratch-win-giveaways-for-website-facebook&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3239997%40scratch-win-giveaways-for-website-facebook&new=3239997%40scratch-win-giveaways-for-website-facebook&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/95103830-9009-48df-ab15-476402b59e3f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-133xx/CVE-2024-13369.json
Normal file
64
CVE-2024/CVE-2024-133xx/CVE-2024-13369.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-13369",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-18T10:15:10.143",
|
||||
"lastModified": "2025-02-18T10:15:10.143",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Tour Master - Tour Booking, Travel, Hotel plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018review_id\u2019 parameter in all versions up to, and including, 5.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codecanyon.net/item/tour-master-tour-booking-travel-wordpress-plugin/20539780",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.goodlayers.com/document/changelog-tour-master-plugin/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d7f2cb6-5c19-4126-9f39-439cf6057c5b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-133xx/CVE-2024-13395.json
Normal file
64
CVE-2024/CVE-2024-133xx/CVE-2024-13395.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-13395",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-18T09:15:09.560",
|
||||
"lastModified": "2025-02-18T09:15:09.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Threepress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'threepress' shortcode in all versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/threepress/tags/1.7.1/threepress.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/threepress/tags/1.7.2/threepress.php#L263",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7021881-2ce9-4c8b-bcfa-6886cce649d9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-137xx/CVE-2024-13718.json
Normal file
60
CVE-2024/CVE-2024-137xx/CVE-2024-13718.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13718",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-18T09:15:09.723",
|
||||
"lastModified": "2025-02-18T09:15:09.723",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Flexible Wishlist for WooCommerce \u2013 Ecommerce Wishlist & Save for later plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.26. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to modify/update/create other user's wishlists via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?old_path=flexible-wishlist/tags/1.2.26&new_path=/flexible-wishlist/tags/1.2.27&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1f2b4030-92b1-4795-b72e-761632dd523d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-09xx/CVE-2025-0981.json
Normal file
78
CVE-2025/CVE-2025-09xx/CVE-2025-0981.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-0981",
|
||||
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"published": "2025-02-18T10:15:10.333",
|
||||
"lastModified": "2025-02-18T10:15:10.333",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in ChurchCRM\u00a05.13.0 and prior that allows an attacker to hijack a user's session by exploiting a Stored Cross Site Scripting (XSS) vulnerability in the Group Editor page. This allows admin users to inject malicious JavaScript, which captures the session cookie of authenticated users. The cookie can then be sent to an external server, enabling session hijacking. It can also lead to information disclosure, as exposed session cookies can be used to impersonate users and gain unauthorised access to sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:L/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:Amber",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "YES",
|
||||
"recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "LOW",
|
||||
"providerUrgency": "AMBER"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/7245",
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-10xx/CVE-2025-1023.json
Normal file
78
CVE-2025/CVE-2025-10xx/CVE-2025-1023.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-1023",
|
||||
"sourceIdentifier": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"published": "2025-02-18T10:15:10.500",
|
||||
"lastModified": "2025-02-18T10:15:10.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in ChurchCRM\u00a05.13.0 and prior\u00a0that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection\u00a0vulnerability in the EditEventTypes\u00a0functionality. The newCountName\u00a0parameter is directly concatenated into an SQL query without proper sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:H/U:Red",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "YES",
|
||||
"recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "HIGH",
|
||||
"providerUrgency": "RED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ChurchCRM/CRM/issues/7246",
|
||||
"source": "b7efe717-a805-47cf-8e9a-921fca0ce0ce"
|
||||
}
|
||||
]
|
||||
}
|
29
README.md
29
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-18T09:00:58.525029+00:00
|
||||
2025-02-18T11:00:49.267082+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-18T08:15:10.723000+00:00
|
||||
2025-02-18T10:15:10.500000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,27 +33,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
281618
|
||||
281625
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `7`
|
||||
|
||||
- [CVE-2024-11376](CVE-2024/CVE-2024-113xx/CVE-2024-11376.json) (`2025-02-18T08:15:08.153`)
|
||||
- [CVE-2024-11895](CVE-2024/CVE-2024-118xx/CVE-2024-11895.json) (`2025-02-18T08:15:09.313`)
|
||||
- [CVE-2024-13465](CVE-2024/CVE-2024-134xx/CVE-2024-13465.json) (`2025-02-18T08:15:09.490`)
|
||||
- [CVE-2024-13523](CVE-2024/CVE-2024-135xx/CVE-2024-13523.json) (`2025-02-18T07:15:08.303`)
|
||||
- [CVE-2024-13575](CVE-2024/CVE-2024-135xx/CVE-2024-13575.json) (`2025-02-18T08:15:09.653`)
|
||||
- [CVE-2024-13704](CVE-2024/CVE-2024-137xx/CVE-2024-13704.json) (`2025-02-18T08:15:09.820`)
|
||||
- [CVE-2024-13795](CVE-2024/CVE-2024-137xx/CVE-2024-13795.json) (`2025-02-18T08:15:09.980`)
|
||||
- [CVE-2024-57963](CVE-2024/CVE-2024-579xx/CVE-2024-57963.json) (`2025-02-18T07:15:08.713`)
|
||||
- [CVE-2024-57964](CVE-2024/CVE-2024-579xx/CVE-2024-57964.json) (`2025-02-18T07:15:08.920`)
|
||||
- [CVE-2025-0422](CVE-2025/CVE-2025-04xx/CVE-2025-0422.json) (`2025-02-18T08:15:10.147`)
|
||||
- [CVE-2025-0423](CVE-2025/CVE-2025-04xx/CVE-2025-0423.json) (`2025-02-18T08:15:10.360`)
|
||||
- [CVE-2025-0424](CVE-2025/CVE-2025-04xx/CVE-2025-0424.json) (`2025-02-18T08:15:10.490`)
|
||||
- [CVE-2025-0425](CVE-2025/CVE-2025-04xx/CVE-2025-0425.json) (`2025-02-18T08:15:10.597`)
|
||||
- [CVE-2025-0864](CVE-2025/CVE-2025-08xx/CVE-2025-0864.json) (`2025-02-18T08:15:10.723`)
|
||||
- [CVE-2024-12860](CVE-2024/CVE-2024-128xx/CVE-2024-12860.json) (`2025-02-18T09:15:08.660`)
|
||||
- [CVE-2024-13316](CVE-2024/CVE-2024-133xx/CVE-2024-13316.json) (`2025-02-18T09:15:09.400`)
|
||||
- [CVE-2024-13369](CVE-2024/CVE-2024-133xx/CVE-2024-13369.json) (`2025-02-18T10:15:10.143`)
|
||||
- [CVE-2024-13395](CVE-2024/CVE-2024-133xx/CVE-2024-13395.json) (`2025-02-18T09:15:09.560`)
|
||||
- [CVE-2024-13718](CVE-2024/CVE-2024-137xx/CVE-2024-13718.json) (`2025-02-18T09:15:09.723`)
|
||||
- [CVE-2025-0981](CVE-2025/CVE-2025-09xx/CVE-2025-0981.json) (`2025-02-18T10:15:10.333`)
|
||||
- [CVE-2025-1023](CVE-2025/CVE-2025-10xx/CVE-2025-1023.json) (`2025-02-18T10:15:10.500`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
35
_state.csv
35
_state.csv
@ -244690,7 +244690,7 @@ CVE-2024-11370,0,0,dd87b64b129f6809c8edd7b234994b231659964606722e4f84f6ae489936a
|
||||
CVE-2024-11371,0,0,940d4acb1660319dcaf9e79be7b51b02d713b6710d41c4a41d256d4b90485073,2024-12-16T15:53:39.657000
|
||||
CVE-2024-11374,0,0,a5a1e58c0241313798d5870304d6ab4fd613b7c8d39f72ddd8edd6b514e2a94b,2024-12-07T10:15:05.643000
|
||||
CVE-2024-11375,0,0,09113c9c4c16e936568b412fc506dc02ef629e8e628c654e3f6f629cd5e5088f,2025-01-07T05:15:11.907000
|
||||
CVE-2024-11376,1,1,45917b214ca5f15f67d5330d816dc29f69e2e80a0293c4110070cf3104a3cbe0,2025-02-18T08:15:08.153000
|
||||
CVE-2024-11376,0,0,45917b214ca5f15f67d5330d816dc29f69e2e80a0293c4110070cf3104a3cbe0,2025-02-18T08:15:08.153000
|
||||
CVE-2024-11377,0,0,7c2553183c73f79520591c880309a16f7b34fb51c625dbcc41841afeb50b2cc9,2025-01-07T05:15:12.083000
|
||||
CVE-2024-11378,0,0,b38085a589e7c1c3c829e70c4c335030fed608a8aaf3232abbfcaba2499cd265,2025-01-07T05:15:12.270000
|
||||
CVE-2024-11379,0,0,9fd00eb3fec3062cfc458a7971d09425d25dcca0c806b20326864d85b70adea6,2024-12-06T05:15:05.813000
|
||||
@ -245205,7 +245205,7 @@ CVE-2024-11891,0,0,f8a38032fa61b45ae7f4fd61d15412795ca770178ff882a3a6fac619a51ce
|
||||
CVE-2024-11892,0,0,d5c6270385b92d8aef9bbc883d47c18aabd1b1a329cb2704b1f0105fbc287876,2025-01-11T08:15:24.463000
|
||||
CVE-2024-11893,0,0,ab78f78c6e435c83f3f5f09a281780ac0636482d65ec96c7c75ce803df2c5017,2024-12-20T07:15:11.747000
|
||||
CVE-2024-11894,0,0,9e31b28fa56a41e12b82fdf98576d9a13777f5eed7b6c3fc1f71a85af109ef81,2024-12-14T05:15:10.227000
|
||||
CVE-2024-11895,1,1,7eda2af854879f2186b2649c5004ae2b8ef5a0461e69212879c04067c083c531,2025-02-18T08:15:09.313000
|
||||
CVE-2024-11895,0,0,7eda2af854879f2186b2649c5004ae2b8ef5a0461e69212879c04067c083c531,2025-02-18T08:15:09.313000
|
||||
CVE-2024-11896,0,0,34f349ccc91bcf6d6c27bb81a454efc17924954cfa878d33ee370546a785a3f4,2024-12-24T09:15:05.663000
|
||||
CVE-2024-11897,0,0,63c2369fafd5da048dd57864988be95602290ce10df0f51d423ab54c866c15e0,2024-12-04T03:15:05.380000
|
||||
CVE-2024-11898,0,0,e843212abf00805a20f8b4b65b36c01f75cc2096cf65f2d0e7899f11eb517a82,2024-12-03T08:15:06.857000
|
||||
@ -246031,6 +246031,7 @@ CVE-2024-12856,0,0,9babd12091bd3794c40f556b84241a138bc1e45b107552b0272431ce40e98
|
||||
CVE-2024-12857,0,0,ef7076837ea8a02d79d9d26c8f73cc7fa350cecedb358a5c02f6632362e827cc,2025-01-24T19:18:01.417000
|
||||
CVE-2024-12859,0,0,522b6f7d54bc3f8885b1a7396ac68fe43464c4991625c739aac1411423caa7fa,2025-02-03T20:15:32.940000
|
||||
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
|
||||
CVE-2024-12860,1,1,0d7a1f5c3aa3f6888de59ab67bb7334ae6445367aa5ef6e09ddcb4e89f8ca536,2025-02-18T09:15:08.660000
|
||||
CVE-2024-12861,0,0,2e6551729d4e6153dcb30ad0ddedc7b2053441c7fdf06c9991efe154d5e21335,2025-01-31T19:01:20.827000
|
||||
CVE-2024-12867,0,0,732c7583e9efa2618fe2f4098930414e7eb5e8b8eea2432950087191a298a004,2024-12-20T20:15:22.740000
|
||||
CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000
|
||||
@ -246442,6 +246443,7 @@ CVE-2024-13310,0,0,c7d7f61ed943995654d2d7f670a6eebe7c0fd61f9032347d9fa323e6d7336
|
||||
CVE-2024-13311,0,0,8f1f9a5d171f95a7ba0f9eaa7d2951798d439c8a220f4f2f7df62ba50bf29d83,2025-01-31T16:15:33.280000
|
||||
CVE-2024-13312,0,0,816e38c6c7477b967986b1dc1563e84c09b9a93286b16913543c3869e5b6d36c,2025-01-31T16:15:33.413000
|
||||
CVE-2024-13315,0,0,7d561707348c1d83e16868d78f576052a99fa3248701028b7d3303356e834cd1,2025-02-18T06:15:11.540000
|
||||
CVE-2024-13316,1,1,3d92ed81deae1a12b4342aeceed386487bce0bdc9f736cdafb58d2444db86e9c,2025-02-18T09:15:09.400000
|
||||
CVE-2024-13317,0,0,bf6e98353834aadd569c32731a32e07929f7d2ec68ca0c813c445806410cf741,2025-01-18T07:15:08.290000
|
||||
CVE-2024-13318,0,0,e578de8b4719417613441e3d599820c7f899466a7f87935725f122dcda9b3d95,2025-01-10T12:15:24.257000
|
||||
CVE-2024-13319,0,0,7991c2dfb6aefea7f96696a61d541e78c477eeff53b34652065a2f9dce798e51,2025-01-24T21:06:34.310000
|
||||
@ -246482,6 +246484,7 @@ CVE-2024-13365,0,0,b2637bdd89ea551a910692a25748d06b3664b9f07ef48e088d15324cf8639
|
||||
CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000
|
||||
CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000
|
||||
CVE-2024-13368,0,0,dbbfa255c3d339e91eb07214cc7014e309e9bdb61391ed3e68917c31e101db69,2025-02-04T19:39:27.553000
|
||||
CVE-2024-13369,1,1,4480f67f5a4c9d833826a8491b39835c466988b8403effd7cb454bc7f0380ab8,2025-02-18T10:15:10.143000
|
||||
CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0fa,2024-11-21T08:50:21.857000
|
||||
CVE-2024-13370,0,0,6c3d5d3b19e588eca43d0624f2d920a1fb872d4b883b63a2898ed54009994a1b,2025-02-04T19:38:23.390000
|
||||
CVE-2024-13371,0,0,b33252fa1aed7179836637ba006b2c21a7f2a8eddb64462e7f01328a3a0fc612,2025-02-05T16:16:22.397000
|
||||
@ -246501,6 +246504,7 @@ CVE-2024-13391,0,0,4ddc50634aa74744390d79b0906c8f88dd9a00cc29aaa55a9724acf7a1d06
|
||||
CVE-2024-13392,0,0,a78e961d1cefdda1764b180676e0657379c1e1a7ef9b8f0223e522e6fb2917ca,2025-01-18T08:15:24.327000
|
||||
CVE-2024-13393,0,0,6c538726beb67e787d4cc0c97ae28498348fafb8453c26bd442a25ec75fb47c0,2025-01-18T07:15:08.810000
|
||||
CVE-2024-13394,0,0,2f438b906efb781207eeefa07105a693bc0286f21e9f9257684cfec9ce3d8d32,2025-01-15T06:15:16.150000
|
||||
CVE-2024-13395,1,1,93f7ae02f9587c4958859576fb52d76013c93294231462f89d4a792de09e9d85,2025-02-18T09:15:09.560000
|
||||
CVE-2024-13396,0,0,d40dddb5bbef2ceb0d99779812d043b82b74e26f4354d1873d73eeffa86295bc,2025-01-31T03:15:09.993000
|
||||
CVE-2024-13397,0,0,02f1ca5e9655c42bfc977bed181f9baeb574d1f47ee120196f480f736b1319fc,2025-01-31T03:15:10.240000
|
||||
CVE-2024-13398,0,0,1cf1394b81ba2d9f5d04722bdb6d4c350d6d6a7eb8c0a059d873a1872c1d84e5,2025-01-17T05:15:08.613000
|
||||
@ -246552,7 +246556,7 @@ CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc2
|
||||
CVE-2024-13460,0,0,9c101ce4e9a0b77c24ea9727b59b3a3bfa4cbf94a343064a0ab69a083a2820cf,2025-01-31T18:07:24.277000
|
||||
CVE-2024-13463,0,0,a74bd740de3fc458ef5c03de3331d5acaeffdc8e1dd114982c1f405dca936e7c,2025-01-31T04:15:07.497000
|
||||
CVE-2024-13464,0,0,c7ce95854847c11fde5a1ddc21e150442b9e815758c964241dcc7c0eae02ec39,2025-02-18T05:15:11.673000
|
||||
CVE-2024-13465,1,1,302d64000d9a85e10d940c0dfda219f6bc435a7608c762c13e680b4ba83050b8,2025-02-18T08:15:09.490000
|
||||
CVE-2024-13465,0,0,302d64000d9a85e10d940c0dfda219f6bc435a7608c762c13e680b4ba83050b8,2025-02-18T08:15:09.490000
|
||||
CVE-2024-13466,0,0,2cbafb86d6f68fe0c2186e724ab662f025c2b1cb3226dee696694b166c55fb4c,2025-01-30T14:15:34.217000
|
||||
CVE-2024-13467,0,0,923a38005e4f33b4b00ab497e7b9124480dbc307e6f66ebdda4f5013f61f8d36,2025-02-04T19:33:01.617000
|
||||
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
|
||||
@ -246595,7 +246599,7 @@ CVE-2024-13519,0,0,dc09c545fe78d4520b3958b8cc7f812509309ee95d98546daffd0145d2c45
|
||||
CVE-2024-1352,0,0,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f667,2025-01-17T17:23:55.973000
|
||||
CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70b11,2025-01-30T17:41:52.897000
|
||||
CVE-2024-13522,0,0,1ec5bbee168af71e2c569fc16b8aceb6b0c6360701cfbb6feabd58c3768384f3,2025-02-18T05:15:12.463000
|
||||
CVE-2024-13523,1,1,a01422a75b98041b28e49f24f2d7440e366f8a9a4929907951037686a612b3c8,2025-02-18T07:15:08.303000
|
||||
CVE-2024-13523,0,0,a01422a75b98041b28e49f24f2d7440e366f8a9a4929907951037686a612b3c8,2025-02-18T07:15:08.303000
|
||||
CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000
|
||||
CVE-2024-13525,0,0,974cc77357d10bdeddefe2341db48f6fd4cfe789b2cdee428681d1b46764d32d,2025-02-15T09:15:08.833000
|
||||
CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000
|
||||
@ -246635,7 +246639,7 @@ CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996
|
||||
CVE-2024-13570,0,0,bd29cdd9a7035d220844b35d0e7ba2f79edf50e314a280da902fd81fc517776e,2025-02-11T16:15:39.090000
|
||||
CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000
|
||||
CVE-2024-13573,0,0,4c15c78a9615e8ce64f7592c831c2a81f25bc5a0e24ca1c3a58f764690185d7a,2025-02-18T05:15:14.007000
|
||||
CVE-2024-13575,1,1,17926a8a3c44e671cffd1d8c13b88294d3fea4b6a59023fa8be054801e0a5de0,2025-02-18T08:15:09.653000
|
||||
CVE-2024-13575,0,0,17926a8a3c44e671cffd1d8c13b88294d3fea4b6a59023fa8be054801e0a5de0,2025-02-18T08:15:09.653000
|
||||
CVE-2024-13576,0,0,d35998f4d69291c9bf0c6a64cbfb55e2da2868a469ebe7a1cc5d71e6b9258231,2025-02-18T05:15:14.157000
|
||||
CVE-2024-13577,0,0,a40dbddd747a29435bc9cd61b63bc4b95a8a8703143f38d72b41d587221a2be2,2025-02-18T05:15:14.487000
|
||||
CVE-2024-13578,0,0,ce304e79d496c1935a636594ed7d0ce3622b36585f28fc55bec0149ceaa84b2b,2025-02-18T05:15:14.913000
|
||||
@ -246711,7 +246715,7 @@ CVE-2024-13699,0,0,6c179d99e1e68d225e4cf32bfc134108fb7e1de353e5a047f158d68ed9ec8
|
||||
CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000
|
||||
CVE-2024-13700,0,0,9ce20ac3b11103f5abdc5f2758b97ef5dcc76de719f13fdbcb103d53e58691eb,2025-01-31T16:49:24.477000
|
||||
CVE-2024-13701,0,0,f834def27c90b870381ae372b4e05326550a31cd496de38386bfaad9d9f3cc5e,2025-02-12T04:15:09.647000
|
||||
CVE-2024-13704,1,1,5d025f249049217a682825fa38cf36a8b48d6c8857075fa19cc8fdc62297f9d0,2025-02-18T08:15:09.820000
|
||||
CVE-2024-13704,0,0,5d025f249049217a682825fa38cf36a8b48d6c8857075fa19cc8fdc62297f9d0,2025-02-18T08:15:09.820000
|
||||
CVE-2024-13705,0,0,5ec6ac499cda9ee218cf1587251a6725974948adf52db55dc1b1fdc60e1d5cc2,2025-01-31T18:17:10.220000
|
||||
CVE-2024-13706,0,0,92bfb58090ec2cfc6ac0f1405cc2482324ffba82002ca538da8b57da6032c8b7,2025-01-30T14:15:36.180000
|
||||
CVE-2024-13707,0,0,032e2a9cb1b090228bf905c1e52e11efae679d2f0165154d533e21d339074c69,2025-01-31T18:12:42.913000
|
||||
@ -246720,6 +246724,7 @@ CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8
|
||||
CVE-2024-13714,0,0,b97d32dee0692688a979a37af59123f65e30a687518c4b6566287e3189fcc055,2025-02-12T06:15:19.987000
|
||||
CVE-2024-13715,0,0,f17d510da8f1903ed11deb0997b2f7b6b7c66954d157d92b6358d4c629959cde,2025-01-30T18:53:45.883000
|
||||
CVE-2024-13717,0,0,4177d6f2dff693b69b1517de82a3632e741bac0287c1343530f73c4d6d1ed41b,2025-01-31T06:15:29.770000
|
||||
CVE-2024-13718,1,1,4d64ea92ba0808da8cfb81955fc62477b7fae6a3deb6523f8005881040f88340,2025-02-18T09:15:09.723000
|
||||
CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000
|
||||
CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd2f2,2025-01-30T18:44:43.053000
|
||||
CVE-2024-13721,0,0,7853af92862fbd0b23333c3c99089ce31ef5cb7b10d0753f382c5079c3e0f6ec,2025-01-25T06:15:27.860000
|
||||
@ -246749,7 +246754,7 @@ CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b8
|
||||
CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000
|
||||
CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba37212823df,2025-02-14T11:15:09.320000
|
||||
CVE-2024-13794,0,0,6f5cfea229e5d029358c5daefcebc44ce458400ca82e6dd1a7b59d94adccdac4,2025-02-12T15:15:14.040000
|
||||
CVE-2024-13795,1,1,5ff186d2b18ebdd910aed1b17c910f62f178a43b9b5396d894a01eab3d2cf2bf,2025-02-18T08:15:09.980000
|
||||
CVE-2024-13795,0,0,5ff186d2b18ebdd910aed1b17c910f62f178a43b9b5396d894a01eab3d2cf2bf,2025-02-18T08:15:09.980000
|
||||
CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000
|
||||
CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000
|
||||
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
|
||||
@ -275028,8 +275033,8 @@ CVE-2024-5796,0,0,10c3848976491ca5eeb295d89b1679f80388276c56109509ef1777f493022a
|
||||
CVE-2024-57960,0,0,773b522c706cbc49414ca08e8ce62c9b452c14ceb463659dc8cf301c1c68526d,2025-02-06T13:15:40.270000
|
||||
CVE-2024-57961,0,0,70e7b1214aba97db422e1a3b3f233758ab9ca724b4d145bac1ebcb3fd7fbccf1,2025-02-06T13:15:40.417000
|
||||
CVE-2024-57962,0,0,54a498ba952c380e086f823bc80eb1c13badd26229709ca796a347944d7ffac6,2025-02-06T13:15:40.600000
|
||||
CVE-2024-57963,1,1,f3292c7bb0a42acc5163ed15b47d421c57318fc3cc3b463bd3fc84d9df19e300,2025-02-18T07:15:08.713000
|
||||
CVE-2024-57964,1,1,637613af4d74c60604771ff7eb969de4e439548306825583031fb9f32f69d7a4,2025-02-18T07:15:08.920000
|
||||
CVE-2024-57963,0,0,f3292c7bb0a42acc5163ed15b47d421c57318fc3cc3b463bd3fc84d9df19e300,2025-02-18T07:15:08.713000
|
||||
CVE-2024-57964,0,0,637613af4d74c60604771ff7eb969de4e439548306825583031fb9f32f69d7a4,2025-02-18T07:15:08.920000
|
||||
CVE-2024-57965,0,0,1ec783f88325ed02c1810413dbff411d8a59c49db780f7d0fa48c580055559d5,2025-01-29T10:15:08.113000
|
||||
CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e1c9,2025-02-09T05:15:32.883000
|
||||
CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000
|
||||
@ -278881,10 +278886,10 @@ CVE-2025-0410,0,0,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc7136
|
||||
CVE-2025-0411,0,0,963fb93dc9f22be5b01fb4ee24ffe0ff364fead29af110d8c8255d7fa3a39b9c,2025-02-12T18:14:13.143000
|
||||
CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000
|
||||
CVE-2025-0413,0,0,5baedddf5946af9550556770de7dca6787e2b2456cc377371a820cf1ed6c2bef,2025-02-05T00:15:28.173000
|
||||
CVE-2025-0422,1,1,e3c5a06c0c96e5b0131758ea8d9f32a2ee2c48b0c3e97a36b47be9b84aecd05b,2025-02-18T08:15:10.147000
|
||||
CVE-2025-0423,1,1,c05e49f8bc53a5bcbcc1c2ecd8ffe5916ceff7106cf7d8443073a918e1f8cb6b,2025-02-18T08:15:10.360000
|
||||
CVE-2025-0424,1,1,d05eb660349a1243a1bbacf43923c5dac99d9efb16a2f8cb5d47ed724d5e60f2,2025-02-18T08:15:10.490000
|
||||
CVE-2025-0425,1,1,0197be9b9b61d28cf57a84b48764c854a48a9c5583689fbdfa0627c74d94c9a5,2025-02-18T08:15:10.597000
|
||||
CVE-2025-0422,0,0,e3c5a06c0c96e5b0131758ea8d9f32a2ee2c48b0c3e97a36b47be9b84aecd05b,2025-02-18T08:15:10.147000
|
||||
CVE-2025-0423,0,0,c05e49f8bc53a5bcbcc1c2ecd8ffe5916ceff7106cf7d8443073a918e1f8cb6b,2025-02-18T08:15:10.360000
|
||||
CVE-2025-0424,0,0,d05eb660349a1243a1bbacf43923c5dac99d9efb16a2f8cb5d47ed724d5e60f2,2025-02-18T08:15:10.490000
|
||||
CVE-2025-0425,0,0,0197be9b9b61d28cf57a84b48764c854a48a9c5583689fbdfa0627c74d94c9a5,2025-02-18T08:15:10.597000
|
||||
CVE-2025-0426,0,0,3066c25cbdc0db466cbcd8d2b93cf410724b054db8536dfcb0c3e103d2688218,2025-02-13T17:17:19.863000
|
||||
CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000
|
||||
CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000
|
||||
@ -279135,7 +279140,7 @@ CVE-2025-0859,0,0,aa1ef6a1093a15ab4491e05a4c630743ada11578233ef06a5ca4a6f0316692
|
||||
CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e97,2025-01-31T20:42:08.143000
|
||||
CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000
|
||||
CVE-2025-0862,0,0,dee81cd1ce38cab472cf28eb1ce5e1d9037dd3bdafbd545dddc7d172ac5b30e6,2025-02-11T11:15:16.043000
|
||||
CVE-2025-0864,1,1,e56e1de16064acc329a5a32cc0ae2f68a867a09df61e368d37eca098dd9d89f8,2025-02-18T08:15:10.723000
|
||||
CVE-2025-0864,0,0,e56e1de16064acc329a5a32cc0ae2f68a867a09df61e368d37eca098dd9d89f8,2025-02-18T08:15:10.723000
|
||||
CVE-2025-0867,0,0,00bdec3c0865b5f1af866315340e7f0b0b67377723af000ff55ae7ae60c91aed,2025-02-14T13:15:42.620000
|
||||
CVE-2025-0869,0,0,c00b46e6ec082bb5acc28b4863ecc13d05083b8391495aa8cb5415a092650002,2025-02-07T17:15:31.307000
|
||||
CVE-2025-0870,0,0,1d396f929e817f7895a91994ddee9c76172e4af1ca8cb701d53be58252025809,2025-01-30T13:15:10.483000
|
||||
@ -279186,6 +279191,7 @@ CVE-2025-0971,0,0,633a244c07788fdbfdfdcc8863df0b7c407fe050fbfbd58b149dfe7ef4b5bb
|
||||
CVE-2025-0972,0,0,5f696e03d949e1a49551d14d8f8b313b3e334794f668dc156f7f61acec16e7d4,2025-02-03T00:15:28.007000
|
||||
CVE-2025-0973,0,0,43196315f17909695c2c467d44bd1754687d87efefe1c24665042841ac303abc,2025-02-03T01:15:07.263000
|
||||
CVE-2025-0974,0,0,ed110dbaf1b5b967bb38884e7ebb961da1c8692b7e1576cd2f418134ffba9e99,2025-02-03T02:15:26.433000
|
||||
CVE-2025-0981,1,1,391f0270940545eeab79a2413ce96d042a150190fc332923a976cf357e240945,2025-02-18T10:15:10.333000
|
||||
CVE-2025-0982,0,0,743f39b6fc5d357ba3083d9f8f3d69f42ae53e58d798d8fd1e36d71ec2810d37,2025-02-06T12:15:27.267000
|
||||
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
|
||||
CVE-2025-0994,0,0,b317a7cd26062958ea654021aa4ef82b6a50be87030a20bb16c21acb6e3b9a13,2025-02-12T19:29:30.383000
|
||||
@ -279210,6 +279216,7 @@ CVE-2025-1018,0,0,2c63b770ee1eb8404a9ddd357bafe82e637b324657da1135e622c93e59b669
|
||||
CVE-2025-1019,0,0,97756c2ae277aabeaedab68cc3d112cc358adac0f1529efc7a271f2ce7df17b0,2025-02-06T19:40:29.267000
|
||||
CVE-2025-1020,0,0,cf2c558f0a30d0c315344260ca52b6874799bcd8941b5300ae30cd6ec90d92d0,2025-02-06T21:15:22.943000
|
||||
CVE-2025-1022,0,0,6e0bbfd94dedae55deabfe77a158c108c89075d5003cd8db6b7f154724b291e0,2025-02-05T20:15:45.470000
|
||||
CVE-2025-1023,1,1,39df3b4906147b7a327b7abf854deb2df3fce38458ba003b8ff0de0bf894760f,2025-02-18T10:15:10.500000
|
||||
CVE-2025-1025,0,0,88de3d5b0a73f8ebb31a09c003423921c8f28cb5c5fcc232fde8c177bdee9679,2025-02-05T20:15:45.593000
|
||||
CVE-2025-1026,0,0,035fc1dc2474697a852e52233cc9d299f677e1a0207511b21278e18a7e117de5,2025-02-05T05:15:10.687000
|
||||
CVE-2025-1028,0,0,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user