Auto-Update: 2025-01-09T03:00:23.081592+00:00

This commit is contained in:
cad-safe-bot 2025-01-09 03:03:47 +00:00
parent 5899dfa088
commit e66b2b6614
14 changed files with 664 additions and 32 deletions

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2023-23913",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-09T01:15:07.257",
"lastModified": "2025-01-09T01:15:07.257",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or data-disable-with attribute."
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033263",
"source": "support@hackerone.com"
},
{
"url": "https://discuss.rubyonrails.org/t/cve-2023-23913-dom-based-cross-site-scripting-in-rails-ujs-for-contenteditable-html-elements/82468",
"source": "support@hackerone.com"
},
{
"url": "https://github.com/rails/rails/commit/5037a13614d71727af8a175063bcf6ba1a74bdbd",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240605-0007/",
"source": "support@hackerone.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5389",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2023-27531",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-09T01:15:07.380",
"lastModified": "2025-01-09T01:15:07.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a deserialization of untrusted data vulnerability in the Kredis JSON deserialization code"
}
],
"metrics": {},
"references": [
{
"url": "https://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2023-27539",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-09T01:15:07.483",
"lastModified": "2025-01-09T01:15:07.483",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a denial of service vulnerability in the header parsing component of Rack."
}
],
"metrics": {},
"references": [
{
"url": "https://discuss.rubyonrails.org/t/cve-2023-27539-possible-denial-of-service-vulnerability-in-racks-header-parsing/82466",
"source": "support@hackerone.com"
},
{
"url": "https://github.com/advisories/GHSA-c6qg-cjj8-47qp",
"source": "support@hackerone.com"
},
{
"url": "https://github.com/rack/rack/commit/231ef369ad0b542575fb36c74fcfcfabcf6c530c",
"source": "support@hackerone.com"
},
{
"url": "https://github.com/rack/rack/commit/ee7919ea04303717858be1c3f16b406adc6d8cff",
"source": "support@hackerone.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00017.html",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231208-0016/",
"source": "support@hackerone.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5530",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,41 @@
{
"id": "CVE-2023-28120",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-09T01:15:07.637",
"lastModified": "2025-01-09T01:15:07.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input."
}
],
"metrics": {},
"references": [
{
"url": "https://discuss.rubyonrails.org/t/cve-2023-28120-possible-xss-security-vulnerability-in-safebuffer-bytesplice/82469",
"source": "support@hackerone.com"
},
{
"url": "https://github.com/rails/rails/commit/3cf23c3f891e2e81c977ea4ab83b62bc2a444b70",
"source": "support@hackerone.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPV6PVCX4VDJHLFFT42EXBBSGAWZICOW/",
"source": "support@hackerone.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZE5W4MH6IE4DV7GELDK6ISCSTFLHKSYO/",
"source": "support@hackerone.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240202-0006/",
"source": "support@hackerone.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5389",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2023-28362",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-09T01:15:07.750",
"lastModified": "2025-01-09T01:15:07.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header."
}
],
"metrics": {},
"references": [
{
"url": "https://discuss.rubyonrails.org/t/cve-2023-28362-possible-xss-via-user-supplied-values-to-redirect-to/83132",
"source": "support@hackerone.com"
},
{
"url": "https://github.com/advisories/GHSA-4g8v-vg43-wpgf",
"source": "support@hackerone.com"
},
{
"url": "https://github.com/rails/rails/commit/1c3f93d1e90a3475f9ae2377ead25ccf11f71441",
"source": "support@hackerone.com"
},
{
"url": "https://github.com/rails/rails/commit/69e37c84e3f77d75566424c7d0015172d6a6fac5",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2023-38037",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-09T01:15:07.853",
"lastModified": "2025-01-09T01:15:07.853",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ActiveSupport::EncryptedFile writes contents that will be encrypted to a\r\ntemporary file. The temporary file's permissions are defaulted to the user's\r\ncurrent `umask` settings, meaning that it's possible for other users on the\r\nsame system to read the contents of the temporary file.\r\n\r\nAttackers that have access to the file system could possibly read the contents\r\nof this temporary file while a user is editing it.\r\n\r\nAll users running an affected release should either upgrade or use one of the\r\nworkarounds immediately."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.8,
"impactScore": 4.7
}
]
},
"references": [
{
"url": "https://discuss.rubyonrails.org/t/cve-2023-38037-possible-file-disclosure-of-locally-encrypted-files/83544",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-13198",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-09T01:15:07.970",
"lastModified": "2025-01-09T01:15:07.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in langhsu Mblog Blog System 3.5.0. Affected is an unknown function of the file /login. The manipulation leads to observable response discrepancy. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"baseScore": 2.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
},
{
"lang": "en",
"value": "CWE-204"
}
]
}
],
"references": [
{
"url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/mblog/ObservableDiscrepancy-UserLogin.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290790",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290790",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.470429",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-13199",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-09T01:15:08.170",
"lastModified": "2025-01-09T01:15:08.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in langhsu Mblog Blog System 3.5.0. Affected by this vulnerability is an unknown functionality of the file /search of the component Search Bar. The manipulation of the argument kw leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/mblog/ReflectedXSS-Search.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290791",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290791",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.470430",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-27980",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-09T01:15:08.367",
"lastModified": "2025-01-09T01:15:08.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/10/15",
"source": "support@hackerone.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/6",
"source": "support@hackerone.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/3",
"source": "support@hackerone.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MZN6PFXHTCCUENAKZXTGWPKUAHI6E2W/",
"source": "support@hackerone.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUWBYDVCUSCX7YWTBX75LADMCVYFBGKU/",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-37372",
"sourceIdentifier": "support@hackerone.com",
"published": "2025-01-09T01:15:08.500",
"lastModified": "2025-01-09T01:15:08.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Permission Model assumes that any path starting with two backslashes \\ has a four-character prefix that can be ignored, which is not always true. This subtle bug leads to vulnerable edge cases."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 3.6,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/6",
"source": "support@hackerone.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/19/3",
"source": "support@hackerone.com"
}
]
}

View File

@ -2,13 +2,20 @@
"id": "CVE-2024-53564",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T18:15:11.353",
"lastModified": "2025-01-09T00:15:26.167",
"lastModified": "2025-01-09T01:15:08.627",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A serious vulnerability was discovered in FreePBX 17.0.19.17. FreePBX does not verify the type of uploaded files and does not restrict user access paths, allowing attackers to remotely control the FreePBX server by uploading malicious files with malicious content and accessing the default directory where the files are uploaded. This will result in particularly serious consequences."
"value": "A vulnerability was discovered in FreePBX 17.0.19.17. It does not verify the type of uploaded (valid FreePBX module) files, allowing high-privilege administrators to insert unwanted files. NOTE: the Supplier's position is that there is no risk beyond what high-privilege administrators are intentionally allowed to do."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0282",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-01-08T23:15:09.763",
"lastModified": "2025-01-08T23:15:09.763",
"lastModified": "2025-01-09T02:00:01.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,10 @@
}
]
},
"cisaExploitAdd": "2025-01-08",
"cisaActionDue": "2025-01-15",
"cisaRequiredAction": "Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service.",
"cisaVulnerabilityName": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability",
"weaknesses": [
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-09T00:55:24.339888+00:00
2025-01-09T03:00:23.081592+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-09T00:15:26.167000+00:00
2025-01-09T02:00:01.633000+00:00
```
### Last Data Feed Release
@ -27,37 +27,37 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-01-08T01:00:04.349317+00:00
2025-01-09T01:00:04.362306+00:00
```
### Total Number of included CVEs
```plain
276349
276359
```
### CVEs added in the last Commit
Recently added CVEs: `10`
- [CVE-2024-13191](CVE-2024/CVE-2024-131xx/CVE-2024-13191.json) (`2025-01-08T23:15:08.807`)
- [CVE-2024-13192](CVE-2024/CVE-2024-131xx/CVE-2024-13192.json) (`2025-01-08T23:15:09.017`)
- [CVE-2024-13193](CVE-2024/CVE-2024-131xx/CVE-2024-13193.json) (`2025-01-08T23:15:09.220`)
- [CVE-2024-13194](CVE-2024/CVE-2024-131xx/CVE-2024-13194.json) (`2025-01-09T00:15:25.357`)
- [CVE-2024-13195](CVE-2024/CVE-2024-131xx/CVE-2024-13195.json) (`2025-01-09T00:15:25.570`)
- [CVE-2024-13196](CVE-2024/CVE-2024-131xx/CVE-2024-13196.json) (`2025-01-09T00:15:25.760`)
- [CVE-2024-13197](CVE-2024/CVE-2024-131xx/CVE-2024-13197.json) (`2025-01-09T00:15:25.973`)
- [CVE-2024-5610](CVE-2024/CVE-2024-56xx/CVE-2024-5610.json) (`2025-01-08T23:15:09.653`)
- [CVE-2025-0282](CVE-2025/CVE-2025-02xx/CVE-2025-0282.json) (`2025-01-08T23:15:09.763`)
- [CVE-2025-0283](CVE-2025/CVE-2025-02xx/CVE-2025-0283.json) (`2025-01-08T23:15:09.920`)
- [CVE-2023-23913](CVE-2023/CVE-2023-239xx/CVE-2023-23913.json) (`2025-01-09T01:15:07.257`)
- [CVE-2023-27531](CVE-2023/CVE-2023-275xx/CVE-2023-27531.json) (`2025-01-09T01:15:07.380`)
- [CVE-2023-27539](CVE-2023/CVE-2023-275xx/CVE-2023-27539.json) (`2025-01-09T01:15:07.483`)
- [CVE-2023-28120](CVE-2023/CVE-2023-281xx/CVE-2023-28120.json) (`2025-01-09T01:15:07.637`)
- [CVE-2023-28362](CVE-2023/CVE-2023-283xx/CVE-2023-28362.json) (`2025-01-09T01:15:07.750`)
- [CVE-2023-38037](CVE-2023/CVE-2023-380xx/CVE-2023-38037.json) (`2025-01-09T01:15:07.853`)
- [CVE-2024-13198](CVE-2024/CVE-2024-131xx/CVE-2024-13198.json) (`2025-01-09T01:15:07.970`)
- [CVE-2024-13199](CVE-2024/CVE-2024-131xx/CVE-2024-13199.json) (`2025-01-09T01:15:08.170`)
- [CVE-2024-27980](CVE-2024/CVE-2024-279xx/CVE-2024-27980.json) (`2025-01-09T01:15:08.367`)
- [CVE-2024-37372](CVE-2024/CVE-2024-373xx/CVE-2024-37372.json) (`2025-01-09T01:15:08.500`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2025-01-09T00:15:26.167`)
- [CVE-2024-55459](CVE-2024/CVE-2024-554xx/CVE-2024-55459.json) (`2025-01-08T23:15:09.440`)
- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2025-01-09T01:15:08.627`)
- [CVE-2025-0282](CVE-2025/CVE-2025-02xx/CVE-2025-0282.json) (`2025-01-09T02:00:01.633`)
## Download and Usage

View File

@ -218376,6 +218376,7 @@ CVE-2023-2391,0,0,842b5ed1e83f3843cc8ff569595999d59ab60a89d681911295b32b17482d8a
CVE-2023-23910,0,0,63dd2cbd6ea1319bd3dfbe7034480d2df6c3610536e09ad75b890a6424f8445c,2024-11-21T07:47:04.990000
CVE-2023-23911,0,0,21f6240ed9aeb3ac846a763b503b5b3c1d795b32a63b3bf506eaaf00a1bef61d,2024-11-21T07:47:05.107000
CVE-2023-23912,0,0,161d529023d5efa110c9e01ceedff90a5c8e1f1dbacb3f558d319d2d5b757b61,2024-11-21T07:47:05.220000
CVE-2023-23913,1,1,2e8c907a237617f09d2af6fe3eb12ddd30440fae4607e415ab1a121092147ab5,2025-01-09T01:15:07.257000
CVE-2023-23914,0,0,121f340e4a39b81a4db03b348db17224f75a3193a520311b64556a5e4bc44031,2024-11-21T07:47:05.357000
CVE-2023-23915,0,0,dcd22de65c54681cbaaa36e8c3304723129cf00bf12179d0d4f5df436b3c2155,2024-11-21T07:47:05.507000
CVE-2023-23916,0,0,50b3eac92c83746250383e0d0c2541bdf9456b5720cc86fdbbe8c6ebf0f59647,2024-11-21T07:47:05.653000
@ -221256,6 +221257,7 @@ CVE-2023-27527,0,0,ef895853842493f6d6e428aef03b5f2da5176173f94982e6fa7ef668485ee
CVE-2023-27529,0,0,742fe919ca459273a4aea573b60b776ff584255cb3cb0584166ca44156cf4224,2024-11-21T07:53:06.277000
CVE-2023-2753,0,0,07c6e809a42ad3b510370047ca6a9af0cbf43d74dbab18486dd49105dce46294,2024-11-21T07:59:13.583000
CVE-2023-27530,0,0,b38d60292378b01f02071b1a709b01b4844b4ce61f4f988722b92fc121e4966a,2024-11-21T07:53:06.430000
CVE-2023-27531,1,1,28c36afac6281dee95d3d0f0c40a0a519d7a7ce52f3dfc7949808ddf3fa14c9e,2025-01-09T01:15:07.380000
CVE-2023-27532,0,0,e3663dce5d0ed9e697881b0b0fb6ed82ce0fa73f270203c1c47b2cc37854ca94,2024-11-21T07:53:06.657000
CVE-2023-27533,0,0,4454110a1b2f4b69eb0494f7d72ff64548b9621981ce044c5c229000994a20ec,2024-11-21T07:53:06.787000
CVE-2023-27534,0,0,89bb3378a6d88f9b6e7db9854c050ad3fe776e1519d432e0012c35b7535689e5,2024-11-21T07:53:06.953000
@ -221263,6 +221265,7 @@ CVE-2023-27535,0,0,c2b4abc030cb6f06518e4e055ad1676e5925ae5eca610f01961ce82bf7c34
CVE-2023-27536,0,0,b10dfe16758c3908f32d3f68323ce92c363c8910b2934bf81b45b45349f6537e,2024-11-21T07:53:07.250000
CVE-2023-27537,0,0,26116245d5d8e954b6679b002b6cf07b10f8de81bf04eccd9a74edc79eae29ab,2024-11-21T07:53:07.407000
CVE-2023-27538,0,0,ea16ad7cd9b8585d2cdc0b52344854924f577fe779142b677c99cf89474d171b,2024-11-21T07:53:07.540000
CVE-2023-27539,1,1,2aad5095bbafc6ab0f1f88ee0ed7e5756ca35f16d521e64df5b6c9cfd1dde87f,2025-01-09T01:15:07.483000
CVE-2023-2754,0,0,d5f6eb5ab236b3e3f181c76459d82ae29b6dfb8e4cabb74d93353265b6c24b94,2024-11-21T07:59:13.700000
CVE-2023-27540,0,0,e4f5a1b7cec8ef2d7fa729e4f9d99a9b9a12336eae9d656bd8d408965b9762f1,2024-11-21T07:53:07.683000
CVE-2023-27545,0,0,b2e7b47fc90259bf8fa905eaab6313d354638d5c3596602c89dbf7a17d90f60f,2024-11-21T07:53:07.830000
@ -221755,6 +221758,7 @@ CVE-2023-28117,0,0,1c4b87e6ffdac2461e6f67e5d4a60b1df82d2291b34817c12ec807a0e1a77
CVE-2023-28118,0,0,3c4e31868a5835a82fc3f7399d5ec399e19eacb503ecafc6816367f80ed133f1,2024-11-21T07:54:26.560000
CVE-2023-28119,0,0,177e497f643703ca71425d1fd44f8f0691bf1adeafa102f689da7214fb97326d,2024-11-21T07:54:26.683000
CVE-2023-2812,0,0,8ca2b5941b57d889e8050dd01df5d6332faab3b7c9be173cb34b6d5df0649316,2024-11-21T07:59:20.210000
CVE-2023-28120,1,1,61de28f9b8e96e3a555f17ad557ddc3c3f123af301e65b22b7492a50e1f762db,2025-01-09T01:15:07.637000
CVE-2023-28121,0,0,ec8fff6d6e41724f8544797a24801e52673d8d932749cae73931ca46b253f482,2024-11-21T07:54:26.807000
CVE-2023-28122,0,0,2bc21c696415be5bb15ee8705cc555d3392196074dceafbd506b758ce250de18,2024-11-21T07:54:26.937000
CVE-2023-28123,0,0,6aeaec24addbc5446d4b9dfcebba426183a2c5b7ba1d5c92eba28e82a2e7be5f,2024-11-21T07:54:27.050000
@ -221984,6 +221988,7 @@ CVE-2023-28359,0,0,cd55c22312372fb6f15a04d4134b33870fb2934978c373a7db0c340ac2a08
CVE-2023-2836,0,0,e304035203056a4f4a3afb3be38115d5014b45bcaf46fcbecbc18c914bc80cef,2024-11-21T07:59:23.180000
CVE-2023-28360,0,0,5ceb5d0d6176a83870db92b27e5fb686afcf6195e7abefc91242e0e5f5fa8572,2024-11-21T07:54:55.440000
CVE-2023-28361,0,0,06fd1bf43032dd9213305815ba759914cce3eec23910c1687ab4d395be68b16d,2024-11-21T07:54:55.543000
CVE-2023-28362,1,1,6ad542f09fb07f9a8bdec8cdaea2ad3f8c43a4aed7bb534ac259a02f2d33ccee,2025-01-09T01:15:07.750000
CVE-2023-28364,0,0,b8e69a33d67631d2c3d239f1c01280f5576d4f6621054c060df4f07489827dbc,2024-11-21T07:54:55.643000
CVE-2023-28365,0,0,4859f30e6a1c91c44b3748aad21832f67bb60327910ad2139bb1ab931e722eee,2024-12-12T18:54:11.327000
CVE-2023-28366,0,0,960802829fc443cdad65c26e57c943b97bd525d1c3e69a293aaac3644999e79b,2024-11-21T07:54:55.887000
@ -229350,6 +229355,7 @@ CVE-2023-38032,0,0,aa2f8b2079aab5d644970a30e48ac48eb85abbd522684fe17754100401e0e
CVE-2023-38033,0,0,4be9698fa9dd0cacdb62bf1057bd9da305a437591f9194cf06d595e16802d334,2024-11-21T08:12:42.970000
CVE-2023-38034,0,0,081598c8b55d3aa43e7d310ebcf31b7ec47c08b5aae01d60a9f9e55b7cdb47cc,2024-11-21T08:12:43.107000
CVE-2023-38035,0,0,92640fff4395ac24e8d5c20e07c44ab0e97351ee018b5491f08a52b994403d7f,2024-12-20T17:50:25.653000
CVE-2023-38037,1,1,ec4911682e67d242a6823b9f7fc4fe8a2685db963caf9a6014d11542619bbb15,2025-01-09T01:15:07.853000
CVE-2023-38039,0,0,aa7b561d4c683a5cad232ce980133262e25984154771669a007453da54145604,2024-11-21T08:12:43.457000
CVE-2023-3804,0,0,f82e32f2db1263f9331724638e062f3a20087ab485797bbd9380b32670e68adc,2024-11-21T08:18:06.293000
CVE-2023-38040,0,0,50ded9b2062da33f47fa19ba0f8f6125ce0832d2b933587cab7df27c962ee968,2024-11-21T08:12:43.633000
@ -245640,13 +245646,15 @@ CVE-2024-13188,0,0,cc95bf1d824c3b6096fc692ac535848a10cbc0f564544683f2277bd18e0fa
CVE-2024-13189,0,0,03a8ad20b4285eaac39004c7eb28ba111ec68af46d0e0b846ef6e6119fec9713,2025-01-08T21:15:12.157000
CVE-2024-1319,0,0,e6fca38f8817c3f0a93cd5d73a5a9417a178ac65495356d684dc26f204fa5765,2024-11-21T08:50:19.530000
CVE-2024-13190,0,0,b6c3d265062c184bd417077d9b801b1b02f71d26f94736dd2a2e2e78d84e35b3,2025-01-08T21:15:12.303000
CVE-2024-13191,1,1,a61879c5c77d0ec26445e0fe493dea3f65b6134f3d70df5e8f7ad8ab74189109,2025-01-08T23:15:08.807000
CVE-2024-13192,1,1,0943b246ac765267ce645935c73543fba2fcd76abf8765332a5eabde47876f4b,2025-01-08T23:15:09.017000
CVE-2024-13193,1,1,877580d9e6aa9359fcd90e9d795228d41ec726c255969d0321b31c619e987334,2025-01-08T23:15:09.220000
CVE-2024-13194,1,1,2a7c6431ba7750707b490e0e8411f67ee26bccfd5cf0a2cbbd7c5b0abb3975ff,2025-01-09T00:15:25.357000
CVE-2024-13195,1,1,5639a83d0501cc605465f7b64f0801b5442c153e6f6a4f96ce5d46cba8fbd274,2025-01-09T00:15:25.570000
CVE-2024-13196,1,1,76108c70179f729ed3fdffba7e6e0647713f92c1e300a80b4d66476a546ce611,2025-01-09T00:15:25.760000
CVE-2024-13197,1,1,9d5153b5ece20b4134fcd83d45bfb87bfa57926a52f471a54f4b78f71b505855,2025-01-09T00:15:25.973000
CVE-2024-13191,0,0,a61879c5c77d0ec26445e0fe493dea3f65b6134f3d70df5e8f7ad8ab74189109,2025-01-08T23:15:08.807000
CVE-2024-13192,0,0,0943b246ac765267ce645935c73543fba2fcd76abf8765332a5eabde47876f4b,2025-01-08T23:15:09.017000
CVE-2024-13193,0,0,877580d9e6aa9359fcd90e9d795228d41ec726c255969d0321b31c619e987334,2025-01-08T23:15:09.220000
CVE-2024-13194,0,0,2a7c6431ba7750707b490e0e8411f67ee26bccfd5cf0a2cbbd7c5b0abb3975ff,2025-01-09T00:15:25.357000
CVE-2024-13195,0,0,5639a83d0501cc605465f7b64f0801b5442c153e6f6a4f96ce5d46cba8fbd274,2025-01-09T00:15:25.570000
CVE-2024-13196,0,0,76108c70179f729ed3fdffba7e6e0647713f92c1e300a80b4d66476a546ce611,2025-01-09T00:15:25.760000
CVE-2024-13197,0,0,9d5153b5ece20b4134fcd83d45bfb87bfa57926a52f471a54f4b78f71b505855,2025-01-09T00:15:25.973000
CVE-2024-13198,1,1,fb551fc384ea0792648d5bb66449568fc33fc94e148fe1e77af2f5295ee93a0d,2025-01-09T01:15:07.970000
CVE-2024-13199,1,1,74cca34a7d6812099d39c24587e1ca3fb7095e9d4c634b9fd2572aab9ae8a82e,2025-01-09T01:15:08.170000
CVE-2024-1320,0,0,80370b3cf95d31a327dfcead0766151687bef5425baa11f9a4606b327981e1e5,2024-11-21T08:50:19.647000
CVE-2024-1321,0,0,64c53fddfcf700442bf3bc09eea0aa8fb2f1c68b08bca44e74ca22c8291fb906,2024-11-21T08:50:19.770000
CVE-2024-1322,0,0,a87df03aa9d8a817a942ae8ebad8afc3111ac175155d7ee73a384181ec986bff,2024-11-21T08:50:19.883000
@ -252547,6 +252555,7 @@ CVE-2024-27976,0,0,822a5af21c1e2c8fd675938b70649904f7b60e8d1b30e50919271624e829e
CVE-2024-27977,0,0,32c3ab10b4aaf757c630e2f8e271f8b8b7bdb65e5c29242ffffe4966a9401d4d,2024-11-21T09:05:33.017000
CVE-2024-27978,0,0,fcf4a7e5ff185d237258fd9843b63a3870e8188564ad41e6f5398b29b01f25a9,2024-11-21T09:05:33.160000
CVE-2024-2798,0,0,02bbbbc174936596cacb64e969c47fdaf9ea9d5d50ce2fb4c6278f77750d1239,2024-11-21T09:10:32.713000
CVE-2024-27980,1,1,02c4f95c9008c2a1314141ff05547c3191a48e82bdffb71184cb7fa2f7aa2ec0,2025-01-09T01:15:08.367000
CVE-2024-27981,0,0,5ad287609e78a5c57ad9f50892c9f3767ac8a9a55b04be511b8a794f3a0d6265,2024-11-21T09:05:33.330000
CVE-2024-27982,0,0,3b4edd38916d4b70e6bd265fb1fcaa37369c9af685bd7f99d27c1bbef3d48182,2024-11-21T09:05:33.463000
CVE-2024-27983,0,0,b2589cbbb580d16047bd9ecbfda79c782676d32c5fdcf965b61589244d8bb50d,2024-11-21T09:05:33.613000
@ -259582,6 +259591,7 @@ CVE-2024-37369,0,0,1e88eb5f5adf1276637dbaba0a7c52eb8dc9f408ec525268bf434428ef890
CVE-2024-3737,0,0,1e7e08e04e47caa48d640f74851eafaab438e97c9be949f434d488cc0d98f3aa,2024-11-21T09:30:16.790000
CVE-2024-37370,0,0,adda354b76b8fa58bd9731c96d1e30a3ccd5dbce3e4544cb7fb32e40dfeb9a83,2024-11-21T09:23:43.537000
CVE-2024-37371,0,0,d5bd17b13bbf8a5c0a4f444cac6792f0b0ada0b42f4cbb75fb993722f35ef31e,2024-11-21T09:23:43.740000
CVE-2024-37372,1,1,6fc519408d8926ed94b1fa842b26c843dc5f3325fcbf1a55d0b5757cb1c05021,2025-01-09T01:15:08.500000
CVE-2024-37373,0,0,2847e99c027e210636b1d596d67704fa58348616cd3faf9bd4b3793a4d930cde,2024-08-15T17:31:32.407000
CVE-2024-37376,0,0,bc526bae202cd53fd7d437324fb7b06b20355a99aa96acae85cbee93a0566dd9,2024-11-13T17:01:16.850000
CVE-2024-37377,0,0,caef14ff514966e0f1ee38c7ff4edbc7bd09ca12f789eaaa3ae9e03a1f92295a,2024-12-12T15:15:13.500000
@ -270766,7 +270776,7 @@ CVE-2024-53554,0,0,21a54d7bc341c058102c672add5c6a39faba0998e6b5d3050bab27868ab59
CVE-2024-53555,0,0,98c9cd71300d5c5a0ee8cfe56c2efb641372e5ee4508b44193ca67680ed7c7bd,2024-11-26T21:15:08.560000
CVE-2024-53556,0,0,197a1e9e5d0cdfa43597989d9978403511315370ea045225b596c7a587a5fd41,2024-11-27T17:15:14.917000
CVE-2024-5356,0,0,8f1946b6e2ffce8dd75d8f13404335223fd7f289a256fdd41018e919f0c821b6,2024-11-21T09:47:29.267000
CVE-2024-53564,0,1,b1df75bd1f1d996171e2a1e519fb2b3b58eafa2bdf66411e53fce392bba5ea8f,2025-01-09T00:15:26.167000
CVE-2024-53564,0,1,088356e947b4dc3fae4f93133474dcecee5055d22bb16791bf202333b2575126,2025-01-09T01:15:08.627000
CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000
CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000
CVE-2024-5358,0,0,ba9d3d6f584bd09e4f2a4dbb07d0235a0771fbffd077ecd2b7b801a3c6466c2b,2024-11-21T09:47:29.543000
@ -271649,7 +271659,7 @@ CVE-2024-5544,0,0,9d691e1e8372bdc434d572825f303cd1b0a2983a0161dea14c330331f38ec0
CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4f5,2024-11-21T09:47:53.940000
CVE-2024-55451,0,0,4eb1042aa51ba5a2799fe7ce59f7c5e8943825e1ba0ec7639498dab2444e41a0,2024-12-17T17:15:09.687000
CVE-2024-55452,0,0,681d222c3a1792768b7aa7a338d01a7a3eab54a804f9924046fdaec1682302e7,2024-12-17T15:15:16.287000
CVE-2024-55459,0,1,7321baaa34581af386278bfa3ba12d94d8e04b8856bd19ebf03b8975dabe5f3f,2025-01-08T23:15:09.440000
CVE-2024-55459,0,0,7321baaa34581af386278bfa3ba12d94d8e04b8856bd19ebf03b8975dabe5f3f,2025-01-08T23:15:09.440000
CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000
CVE-2024-55461,0,0,8a5762fd3b90cc63ffd9ce1bb9331b80ec6ee2b8f4f1ecbac3350d77382b6dcf,2024-12-31T20:16:07.727000
CVE-2024-5547,0,0,c70f2b15fdfae1a20148a4f5dddd13a94d9e6eb1c9039906b5e94118b8ba53d4,2024-11-21T09:47:54.260000
@ -271912,7 +271922,7 @@ CVE-2024-56085,0,0,7848f40aec07f93e208a7c7a09cd4f70e8f638200ed35d993b1ef358eb39e
CVE-2024-56086,0,0,3f20b8dee933a49f8c115ad1e5c021ec38fc1b178307186ae15ac1f8b670606c,2024-12-16T16:15:09.980000
CVE-2024-56087,0,0,05dc1ed5074a537273e80994b3567c3e6a1b61e2cf65010e706da64508e1570e,2024-12-16T16:15:10.147000
CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000
CVE-2024-5610,1,1,c876fccd541dbbe5edac90b3257f7d2b3efde4d5bff83326921f06d03b7a383e,2025-01-08T23:15:09.653000
CVE-2024-5610,0,0,c876fccd541dbbe5edac90b3257f7d2b3efde4d5bff83326921f06d03b7a383e,2025-01-08T23:15:09.653000
CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000
CVE-2024-56112,0,0,9c37554a9e3e8121be632deb2b2e9ed13eeb0233b63a1c1f431c838fba55a392,2024-12-16T16:15:10.313000
CVE-2024-56115,0,0,ccfdd8ee6f18e71a09e80e77c239dd784626f96d64ab8285164962abb0ea0b53,2024-12-31T20:16:07.903000
@ -276176,8 +276186,8 @@ CVE-2025-0244,0,0,4dc39d4eb7e9626e46633620b63b126f4ca8c432d219058ffa0df86e8e17d0
CVE-2025-0245,0,0,17124b2bb78bf9f026108e77a44161cf6b567d6714acd6476cda81e3148b7689,2025-01-08T16:15:37.693000
CVE-2025-0246,0,0,f212da1e386aff9790e671db2401da03b9d2ebbeea4ee1b40e830ef0d58e3da6,2025-01-08T16:15:37.880000
CVE-2025-0247,0,0,19788955cc9b607e55d300602d56942e119086cfe1c51c09f21df249cc649c46,2025-01-08T15:15:21.033000
CVE-2025-0282,1,1,45264c0ed7e9a9f6170cf023339c1344be7f034e470adc42489abac7618ffb34,2025-01-08T23:15:09.763000
CVE-2025-0283,1,1,573fcb41d2dcbb5f422c0804f1f8b289f75a27c245f0e6d9cb198c03e2e8d415,2025-01-08T23:15:09.920000
CVE-2025-0282,0,1,d61ebd3c832aef5272fa20364c759f17a80fd9cb0737dd97040687ac5893e46b,2025-01-09T02:00:01.633000
CVE-2025-0283,0,0,573fcb41d2dcbb5f422c0804f1f8b289f75a27c245f0e6d9cb198c03e2e8d415,2025-01-08T23:15:09.920000
CVE-2025-0291,0,0,e64e166dc7ec231b6921ab6e7b688950a3c44d4ac259882cc427bcb73fed1fd1,2025-01-08T20:15:29.353000
CVE-2025-0294,0,0,e5d86f9b17bdfc744e2441f17af376b91232f83a0091836e1403d549321b0bdf,2025-01-07T15:15:12.113000
CVE-2025-0295,0,0,52a16028421d06d344a294c38baeb65e7eade91eddca5850ff08cb460a814ef0,2025-01-07T16:15:39.460000

Can't render this file because it is too large.