Auto-Update: 2025-01-27T13:00:41.830221+00:00

This commit is contained in:
cad-safe-bot 2025-01-27 13:04:07 +00:00
parent f3724199ac
commit edd8c985f3
12 changed files with 345 additions and 29 deletions

View File

@ -0,0 +1,133 @@
{
"id": "CVE-2024-12345",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-27T11:15:09.270",
"lastModified": "2025-01-27T11:15:09.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in INW Krbyyyzo 25.2002. Affected by this vulnerability is an unknown functionality of the file /gbo.aspx of the component Daily Huddle Site. The manipulation of the argument s leads to resource consumption. It is possible to launch the attack on the local host. Other endpoints might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:M/C:N/I:N/A:C",
"baseScore": 4.3,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 2.5,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
},
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.293509",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.293509",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-55925",
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T17:15:15.380",
"lastModified": "2025-01-23T17:15:15.380",
"lastModified": "2025-01-27T11:15:10.757",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "API Security bypass through header manipulation"
"value": "In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-55926",
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T18:15:31.780",
"lastModified": "2025-01-23T18:15:31.780",
"lastModified": "2025-01-27T11:15:10.967",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arbitrary file upload, deletion and read through header manipulation"
"value": "A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data"
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-55927",
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T18:15:31.940",
"lastModified": "2025-01-23T18:15:31.940",
"lastModified": "2025-01-27T12:15:27.033",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Flawed token generation implementation & Hard-coded key implementation"
"value": "A vulnerability in Xerox Workplace Suite arises from flawed token generation and the use of hard-coded keys. These weaknesses allow attackers to predict or forge tokens, leading to unauthorized access to sensitive functions."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-55928",
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T18:15:32.100",
"lastModified": "2025-01-23T18:15:32.100",
"lastModified": "2025-01-27T12:15:27.137",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Clear text secrets returned & Remote system secrets in clear text"
"value": "Xerox Workplace Suite exposes sensitive secrets in clear text, both locally and remotely. This vulnerability allows attackers to intercept or access secrets without encryption"
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-55929",
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T18:15:32.277",
"lastModified": "2025-01-23T18:15:32.277",
"lastModified": "2025-01-27T12:15:27.233",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mail spoofing"
"value": "A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, making it appear as though messages are sent from trusted sources."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-55930",
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-23T18:15:32.450",
"lastModified": "2025-01-23T18:15:32.450",
"lastModified": "2025-01-27T12:15:27.317",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Weak default folder permissions"
"value": "Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, modify, or delete files"
},
{
"lang": "es",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-55931",
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"published": "2025-01-27T12:15:27.407",
"lastModified": "2025-01-27T12:15:27.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Xerox Workplace Suite stores tokens in session storage, which may expose them to potential access if a user's session is compromised.\u00a0\n\nThe patch for this vulnerability will be included in a future release of Workplace Suite, and customers will be notified through an update to the security bulletin."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "10b61619-3869-496c-8a1e-f291b0e71e3f",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-Workplace-Suite%C2%AE.pdf",
"source": "10b61619-3869-496c-8a1e-f291b0e71e3f"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0695",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2025-01-27T11:15:11.087",
"lastModified": "2025-01-27T11:15:11.087",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Allocation of Resources Without Limits or\u00a0Throttling vulnerability in Cesanta Frozen versions less than 1.7 allows an attacker to induce a crash of the component embedding the library by supplying a maliciously crafted JSON as input."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "prodsec@nozominetworks.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-0695",
"source": "prodsec@nozominetworks.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-0696",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2025-01-27T11:15:11.267",
"lastModified": "2025-01-27T11:15:11.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A NULL Pointer Dereference\u00a0vulnerability in Cesanta Frozen versions less than 1.7 allows an attacker to induce a crash of the component embedding the library by supplying a maliciously crafted JSON as input."
},
{
"lang": "es",
"value": "Una vulnerabilidad de desreferencia de puntero nulo en versiones de Cesanta Frozen anteriores a 1.7 permite a un atacante inducir un bloqueo del componente que integra la librer\u00eda al suministrar un JSON manipulado maliciosamente como entrada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "prodsec@nozominetworks.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-0696",
"source": "prodsec@nozominetworks.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-27T11:00:37.734840+00:00
2025-01-27T13:00:41.830221+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-27T10:15:09.193000+00:00
2025-01-27T12:15:27.407000+00:00
```
### Last Data Feed Release
@ -33,22 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
279022
279026
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `4`
- [CVE-2024-52012](CVE-2024/CVE-2024-520xx/CVE-2024-52012.json) (`2025-01-27T09:15:14.693`)
- [CVE-2025-24814](CVE-2025/CVE-2025-248xx/CVE-2025-24814.json) (`2025-01-27T09:15:14.947`)
- [CVE-2024-12345](CVE-2024/CVE-2024-123xx/CVE-2024-12345.json) (`2025-01-27T11:15:09.270`)
- [CVE-2024-55931](CVE-2024/CVE-2024-559xx/CVE-2024-55931.json) (`2025-01-27T12:15:27.407`)
- [CVE-2025-0695](CVE-2025/CVE-2025-06xx/CVE-2025-0695.json) (`2025-01-27T11:15:11.087`)
- [CVE-2025-0696](CVE-2025/CVE-2025-06xx/CVE-2025-0696.json) (`2025-01-27T11:15:11.267`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `6`
- [CVE-2025-23935](CVE-2025/CVE-2025-239xx/CVE-2025-23935.json) (`2025-01-27T10:15:09.193`)
- [CVE-2024-55925](CVE-2024/CVE-2024-559xx/CVE-2024-55925.json) (`2025-01-27T11:15:10.757`)
- [CVE-2024-55926](CVE-2024/CVE-2024-559xx/CVE-2024-55926.json) (`2025-01-27T11:15:10.967`)
- [CVE-2024-55927](CVE-2024/CVE-2024-559xx/CVE-2024-55927.json) (`2025-01-27T12:15:27.033`)
- [CVE-2024-55928](CVE-2024/CVE-2024-559xx/CVE-2024-55928.json) (`2025-01-27T12:15:27.137`)
- [CVE-2024-55929](CVE-2024/CVE-2024-559xx/CVE-2024-55929.json) (`2025-01-27T12:15:27.233`)
- [CVE-2024-55930](CVE-2024/CVE-2024-559xx/CVE-2024-55930.json) (`2025-01-27T12:15:27.317`)
## Download and Usage

View File

@ -245367,6 +245367,7 @@ CVE-2024-12341,0,0,73d0614d7c98b23e49242f0be40422e4e73b095a6a96061a926bb2fee6b56
CVE-2024-12342,0,0,ca2d1ce741ee271c3f8bb6665fd58409882d87693c71ffc1173980d86241d998,2024-12-08T07:15:04.950000
CVE-2024-12343,0,0,ac88dc9695a819696f313a26b68429a92402a92d44a44fae3dae004786557c5b,2024-12-10T23:26:52.047000
CVE-2024-12344,0,0,a74c4de6f3ec8761526e235e0afb71aca4880eff4cfe7e19b9ce946c54f2c01c,2024-12-10T23:28:05.760000
CVE-2024-12345,1,1,bf0c801292f64c5468ad9630459865737a5cca5b824ea71345add1f458c0c140,2025-01-27T11:15:09.270000
CVE-2024-12346,0,0,eeb017e2a711c86f060f1d22154f5936de66ae14c739cd4d0ba0c0dd51d58db4,2024-12-09T00:15:04.207000
CVE-2024-12347,0,0,7fc345a739cf28f38a58de4f904e2d671aa64729e859c9d6eddd583ca18c207d,2024-12-09T00:15:04.910000
CVE-2024-12348,0,0,ebeba43704fd4649bce6c7793c8388a57e3bdee105c5aa3363a12d54ccca24db,2024-12-09T01:15:05.603000
@ -270769,7 +270770,7 @@ CVE-2024-52008,0,0,7281563e51f3b39d532519e8a2681001e782e7c2a3e897881477e254e32f3
CVE-2024-52009,0,0,c9066cf7155cd04eacfb31719dd1a8a72528bd2bf8524793c7b6ae503cedfb78,2024-11-12T13:56:54.483000
CVE-2024-5201,0,0,70f2a62b026d2275481fc1646adce1cc60a8e3612df3f1a182e7d38251323855,2024-11-21T09:47:10.680000
CVE-2024-52010,0,0,f693d8dc10fe381f1d93e5d9728758e9faa90c7556c1ec2062d04b5a4b414594,2024-11-21T17:15:23.350000
CVE-2024-52012,1,1,e3be3401ea600458acd31f078245093bc2b07b60ac4df822a879cab8dacf28d1,2025-01-27T09:15:14.693000
CVE-2024-52012,0,0,e3be3401ea600458acd31f078245093bc2b07b60ac4df822a879cab8dacf28d1,2025-01-27T09:15:14.693000
CVE-2024-52013,0,0,8b6296da77cd7ff5ac33141091f42af5f9ad4a6b318bbf04ba5caf894b9dec57,2024-11-05T16:35:36.337000
CVE-2024-52014,0,0,95c63fbe0d36cf5f1402099d30f68bd084b42e8fece77b8a43cf34d740aab22d,2024-11-05T16:35:37.113000
CVE-2024-52015,0,0,84d00cdc9a202bb00e097769512e415450a582ad27ea697fe4aabe7efef8bade,2024-11-05T16:35:37.890000
@ -272818,12 +272819,13 @@ CVE-2024-55921,0,0,5fa81d92601e70d676a1016b709a0f2741abaf55426856cddb4a06e34b9a7
CVE-2024-55922,0,0,ab9ba749ee333e9f82aad55cb9be15ec2bea94f8fc77977baf33bef44d3cce51,2025-01-14T20:15:30.033000
CVE-2024-55923,0,0,219ffcee25fb405d9a02cdc68a4fa5af829e860803373b590c58a214037e5d08,2025-01-14T20:15:30.197000
CVE-2024-55924,0,0,51b538faaafc8081c0d91ed65951b4c0e863d37d4f9e21b793ae96fe9f20d0fe,2025-01-14T20:15:30.367000
CVE-2024-55925,0,0,961913985d3386f6c86102111b163be1e0dec1cbc156cf09d6d78e0158a190d4,2025-01-23T17:15:15.380000
CVE-2024-55926,0,0,8acda5d8d52cc50290b086c9f0359aa2ec2a57ac51fddabf5ffc20018c5d599a,2025-01-23T18:15:31.780000
CVE-2024-55927,0,0,e9dc07f5eb5f9d28b02daa24fc00449ee0e818832b12e9965b64bc86560693ba,2025-01-23T18:15:31.940000
CVE-2024-55928,0,0,26436780a4b8e6f989af2337cf5de2b76f8edb52b6911b1d544e8d7ea0325a88,2025-01-23T18:15:32.100000
CVE-2024-55929,0,0,8c1cee5d60b08abc234564e76ef472a48008d96afccbcf76650e32b8ea7ab8b9,2025-01-23T18:15:32.277000
CVE-2024-55930,0,0,5e3f6dbbc16ec6a457fb969cf3b7dce59a102175d84f10d68af4b8b250cbc52c,2025-01-23T18:15:32.450000
CVE-2024-55925,0,1,757c698fb559bb8daf78ccbd0836ab7167b98763df558f53f9ec6d86f2c7b260,2025-01-27T11:15:10.757000
CVE-2024-55926,0,1,74d73761a0816bdf814fbbd54935c61e71a37a367259fd2c9f1a7db1c7c911ba,2025-01-27T11:15:10.967000
CVE-2024-55927,0,1,dd429e5a4162652bc9107e13f1065f7b7a195e0542ec5c53290787ed78bff613,2025-01-27T12:15:27.033000
CVE-2024-55928,0,1,5a8f0f70232819af1361d7cae38e9fcc55e06eae0b9e1de4bca659c3f2b7cfed,2025-01-27T12:15:27.137000
CVE-2024-55929,0,1,995b37c46bd9563beaf73a1ef018c8550751defa68201527c62100c1114488cf,2025-01-27T12:15:27.233000
CVE-2024-55930,0,1,0c5c553d91ed96784e45012c33877bdd6eea94bf15fe9f12d5e0eb5ae37ec65c,2025-01-27T12:15:27.317000
CVE-2024-55931,1,1,bea05fb62c37597b1c7f32799140a2fc9475467a995f12613802c75bb5678df3,2025-01-27T12:15:27.407000
CVE-2024-5594,0,0,e7555e7b165259baf6d7812e78b67ccc956e8357ef83023a2dc849ba891436dd,2025-01-06T17:15:44.383000
CVE-2024-55945,0,0,51c4c796163d23f85b889df289eaf5efe1a92af8ca1f7066684ce494ee386866,2025-01-14T20:15:30.527000
CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000
@ -277755,6 +277757,8 @@ CVE-2025-0650,0,0,663c6fb0447de5acea936c032379a880e4e49090359ea8a19f79bd3aea4faf
CVE-2025-0651,0,0,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000
CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000
CVE-2025-0693,0,0,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000
CVE-2025-0695,1,1,70836bbbf6325136c9e0a957ced44b18d2c2228a6b15d655a939dfb6142b3b68,2025-01-27T11:15:11.087000
CVE-2025-0696,1,1,067c55df7ddd7d3450a8d9809198ef8633f7872bc632480e2c80e723c4cafb5b,2025-01-27T11:15:11.267000
CVE-2025-0697,0,0,2b300d6fe20cc05389e1f1da76da10c584853d80e73da80ea6280f5fc93d0276,2025-01-24T15:15:12.130000
CVE-2025-0698,0,0,41b2c00dd6b2e11497e6ad0d5935ff7e418c7e8ce23cb7590bf86289758b8bd6,2025-01-24T16:15:37.717000
CVE-2025-0699,0,0,a52cce5fc729b9f7c244ab5c5dc069fe63ab6c6e0e5e97843aece40a8ddee923,2025-01-24T16:15:37.977000
@ -278842,7 +278846,7 @@ CVE-2025-23931,0,0,72cf7343fea76bc74181624178c1dc4819038ac84963518c4505466290438
CVE-2025-23932,0,0,616f51628cb4aae04d16943544a6df13ff57edc77ce5e41bc57b50e3443b82db,2025-01-22T15:15:25.827000
CVE-2025-23933,0,0,5314812bb5bb73b3b9600ea0aa8e888771464c5c0299b578bc9a093b69f0f8ef,2025-01-16T21:15:35.210000
CVE-2025-23934,0,0,a8cb5365e4d11290f220de8207cb9b17a94fa7b952841219eee098e5e9d7f9bb,2025-01-16T21:15:35.367000
CVE-2025-23935,0,1,ca08ce402e61c79c9cce49de15d3ecbafe399b661fba20811ddb663494117ab8,2025-01-27T10:15:09.193000
CVE-2025-23935,0,0,ca08ce402e61c79c9cce49de15d3ecbafe399b661fba20811ddb663494117ab8,2025-01-27T10:15:09.193000
CVE-2025-23936,0,0,98ce9dfbd803e0feff46465ce5ff38cf3522df4082c1a68d72eabd4f11de5228,2025-01-16T21:15:35.677000
CVE-2025-23938,0,0,d323577cfec870a5caebea388f099147280b12f4cce3f7b5c850e5a652397791,2025-01-22T15:15:25.967000
CVE-2025-23939,0,0,b227fdb5ca72e62491a5d98a4ab01cce82bbd9f83860732763526745b1f362c4,2025-01-16T21:15:35.910000
@ -279019,5 +279023,5 @@ CVE-2025-24751,0,0,4aa19aa90aab45ec9714df6e468e19599d2a1949dc2de4e4c8d985f84e38f
CVE-2025-24753,0,0,87b78dd3e11c90af6930cbca7a5346ee214e24237caa8b3601406532dfdbc4de,2025-01-24T18:15:48.950000
CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000
CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000
CVE-2025-24814,1,1,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000
CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000
CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000

Can't render this file because it is too large.