mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2025-01-27T13:00:41.830221+00:00
This commit is contained in:
parent
f3724199ac
commit
edd8c985f3
133
CVE-2024/CVE-2024-123xx/CVE-2024-12345.json
Normal file
133
CVE-2024/CVE-2024-123xx/CVE-2024-12345.json
Normal file
@ -0,0 +1,133 @@
|
||||
{
|
||||
"id": "CVE-2024-12345",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-27T11:15:09.270",
|
||||
"lastModified": "2025-01-27T11:15:09.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in INW Krbyyyzo 25.2002. Affected by this vulnerability is an unknown functionality of the file /gbo.aspx of the component Daily Huddle Site. The manipulation of the argument s leads to resource consumption. It is possible to launch the attack on the local host. Other endpoints might be affected as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:M/C:N/I:N/A:C",
|
||||
"baseScore": 4.3,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 6.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.293509",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.293509",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-55925",
|
||||
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
|
||||
"published": "2025-01-23T17:15:15.380",
|
||||
"lastModified": "2025-01-23T17:15:15.380",
|
||||
"lastModified": "2025-01-27T11:15:10.757",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "API Security bypass through header manipulation"
|
||||
"value": "In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-55926",
|
||||
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
|
||||
"published": "2025-01-23T18:15:31.780",
|
||||
"lastModified": "2025-01-23T18:15:31.780",
|
||||
"lastModified": "2025-01-27T11:15:10.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Arbitrary file upload, deletion and read through header manipulation"
|
||||
"value": "A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-55927",
|
||||
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
|
||||
"published": "2025-01-23T18:15:31.940",
|
||||
"lastModified": "2025-01-23T18:15:31.940",
|
||||
"lastModified": "2025-01-27T12:15:27.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Flawed token generation implementation & Hard-coded key implementation"
|
||||
"value": "A vulnerability in Xerox Workplace Suite arises from flawed token generation and the use of hard-coded keys. These weaknesses allow attackers to predict or forge tokens, leading to unauthorized access to sensitive functions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-55928",
|
||||
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
|
||||
"published": "2025-01-23T18:15:32.100",
|
||||
"lastModified": "2025-01-23T18:15:32.100",
|
||||
"lastModified": "2025-01-27T12:15:27.137",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Clear text secrets returned & Remote system secrets in clear text"
|
||||
"value": "Xerox Workplace Suite exposes sensitive secrets in clear text, both locally and remotely. This vulnerability allows attackers to intercept or access secrets without encryption"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-55929",
|
||||
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
|
||||
"published": "2025-01-23T18:15:32.277",
|
||||
"lastModified": "2025-01-23T18:15:32.277",
|
||||
"lastModified": "2025-01-27T12:15:27.233",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Mail spoofing"
|
||||
"value": "A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, making it appear as though messages are sent from trusted sources."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-55930",
|
||||
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
|
||||
"published": "2025-01-23T18:15:32.450",
|
||||
"lastModified": "2025-01-23T18:15:32.450",
|
||||
"lastModified": "2025-01-27T12:15:27.317",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Weak default folder permissions"
|
||||
"value": "Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, modify, or delete files"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
56
CVE-2024/CVE-2024-559xx/CVE-2024-55931.json
Normal file
56
CVE-2024/CVE-2024-559xx/CVE-2024-55931.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-55931",
|
||||
"sourceIdentifier": "10b61619-3869-496c-8a1e-f291b0e71e3f",
|
||||
"published": "2025-01-27T12:15:27.407",
|
||||
"lastModified": "2025-01-27T12:15:27.407",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Xerox Workplace Suite stores tokens in session storage, which may expose them to potential access if a user's session is compromised.\u00a0\n\nThe patch for this vulnerability will be included in a future release of Workplace Suite, and customers will be notified through an update to the security bulletin."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "10b61619-3869-496c-8a1e-f291b0e71e3f",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "10b61619-3869-496c-8a1e-f291b0e71e3f",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-922"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-Workplace-Suite%C2%AE.pdf",
|
||||
"source": "10b61619-3869-496c-8a1e-f291b0e71e3f"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-06xx/CVE-2025-0695.json
Normal file
56
CVE-2025/CVE-2025-06xx/CVE-2025-0695.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-0695",
|
||||
"sourceIdentifier": "prodsec@nozominetworks.com",
|
||||
"published": "2025-01-27T11:15:11.087",
|
||||
"lastModified": "2025-01-27T11:15:11.087",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Allocation of Resources Without Limits or\u00a0Throttling vulnerability in Cesanta Frozen versions less than 1.7 allows an attacker to induce a crash of the component embedding the library by supplying a maliciously crafted JSON as input."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-0695",
|
||||
"source": "prodsec@nozominetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-06xx/CVE-2025-0696.json
Normal file
60
CVE-2025/CVE-2025-06xx/CVE-2025-0696.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-0696",
|
||||
"sourceIdentifier": "prodsec@nozominetworks.com",
|
||||
"published": "2025-01-27T11:15:11.267",
|
||||
"lastModified": "2025-01-27T11:15:11.267",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A NULL Pointer Dereference\u00a0vulnerability in Cesanta Frozen versions less than 1.7 allows an attacker to induce a crash of the component embedding the library by supplying a maliciously crafted JSON as input."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de desreferencia de puntero nulo en versiones de Cesanta Frozen anteriores a 1.7 permite a un atacante inducir un bloqueo del componente que integra la librer\u00eda al suministrar un JSON manipulado maliciosamente como entrada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-0696",
|
||||
"source": "prodsec@nozominetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
23
README.md
23
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-27T11:00:37.734840+00:00
|
||||
2025-01-27T13:00:41.830221+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-27T10:15:09.193000+00:00
|
||||
2025-01-27T12:15:27.407000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,22 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
279022
|
||||
279026
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-52012](CVE-2024/CVE-2024-520xx/CVE-2024-52012.json) (`2025-01-27T09:15:14.693`)
|
||||
- [CVE-2025-24814](CVE-2025/CVE-2025-248xx/CVE-2025-24814.json) (`2025-01-27T09:15:14.947`)
|
||||
- [CVE-2024-12345](CVE-2024/CVE-2024-123xx/CVE-2024-12345.json) (`2025-01-27T11:15:09.270`)
|
||||
- [CVE-2024-55931](CVE-2024/CVE-2024-559xx/CVE-2024-55931.json) (`2025-01-27T12:15:27.407`)
|
||||
- [CVE-2025-0695](CVE-2025/CVE-2025-06xx/CVE-2025-0695.json) (`2025-01-27T11:15:11.087`)
|
||||
- [CVE-2025-0696](CVE-2025/CVE-2025-06xx/CVE-2025-0696.json) (`2025-01-27T11:15:11.267`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
- [CVE-2025-23935](CVE-2025/CVE-2025-239xx/CVE-2025-23935.json) (`2025-01-27T10:15:09.193`)
|
||||
- [CVE-2024-55925](CVE-2024/CVE-2024-559xx/CVE-2024-55925.json) (`2025-01-27T11:15:10.757`)
|
||||
- [CVE-2024-55926](CVE-2024/CVE-2024-559xx/CVE-2024-55926.json) (`2025-01-27T11:15:10.967`)
|
||||
- [CVE-2024-55927](CVE-2024/CVE-2024-559xx/CVE-2024-55927.json) (`2025-01-27T12:15:27.033`)
|
||||
- [CVE-2024-55928](CVE-2024/CVE-2024-559xx/CVE-2024-55928.json) (`2025-01-27T12:15:27.137`)
|
||||
- [CVE-2024-55929](CVE-2024/CVE-2024-559xx/CVE-2024-55929.json) (`2025-01-27T12:15:27.233`)
|
||||
- [CVE-2024-55930](CVE-2024/CVE-2024-559xx/CVE-2024-55930.json) (`2025-01-27T12:15:27.317`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
22
_state.csv
22
_state.csv
@ -245367,6 +245367,7 @@ CVE-2024-12341,0,0,73d0614d7c98b23e49242f0be40422e4e73b095a6a96061a926bb2fee6b56
|
||||
CVE-2024-12342,0,0,ca2d1ce741ee271c3f8bb6665fd58409882d87693c71ffc1173980d86241d998,2024-12-08T07:15:04.950000
|
||||
CVE-2024-12343,0,0,ac88dc9695a819696f313a26b68429a92402a92d44a44fae3dae004786557c5b,2024-12-10T23:26:52.047000
|
||||
CVE-2024-12344,0,0,a74c4de6f3ec8761526e235e0afb71aca4880eff4cfe7e19b9ce946c54f2c01c,2024-12-10T23:28:05.760000
|
||||
CVE-2024-12345,1,1,bf0c801292f64c5468ad9630459865737a5cca5b824ea71345add1f458c0c140,2025-01-27T11:15:09.270000
|
||||
CVE-2024-12346,0,0,eeb017e2a711c86f060f1d22154f5936de66ae14c739cd4d0ba0c0dd51d58db4,2024-12-09T00:15:04.207000
|
||||
CVE-2024-12347,0,0,7fc345a739cf28f38a58de4f904e2d671aa64729e859c9d6eddd583ca18c207d,2024-12-09T00:15:04.910000
|
||||
CVE-2024-12348,0,0,ebeba43704fd4649bce6c7793c8388a57e3bdee105c5aa3363a12d54ccca24db,2024-12-09T01:15:05.603000
|
||||
@ -270769,7 +270770,7 @@ CVE-2024-52008,0,0,7281563e51f3b39d532519e8a2681001e782e7c2a3e897881477e254e32f3
|
||||
CVE-2024-52009,0,0,c9066cf7155cd04eacfb31719dd1a8a72528bd2bf8524793c7b6ae503cedfb78,2024-11-12T13:56:54.483000
|
||||
CVE-2024-5201,0,0,70f2a62b026d2275481fc1646adce1cc60a8e3612df3f1a182e7d38251323855,2024-11-21T09:47:10.680000
|
||||
CVE-2024-52010,0,0,f693d8dc10fe381f1d93e5d9728758e9faa90c7556c1ec2062d04b5a4b414594,2024-11-21T17:15:23.350000
|
||||
CVE-2024-52012,1,1,e3be3401ea600458acd31f078245093bc2b07b60ac4df822a879cab8dacf28d1,2025-01-27T09:15:14.693000
|
||||
CVE-2024-52012,0,0,e3be3401ea600458acd31f078245093bc2b07b60ac4df822a879cab8dacf28d1,2025-01-27T09:15:14.693000
|
||||
CVE-2024-52013,0,0,8b6296da77cd7ff5ac33141091f42af5f9ad4a6b318bbf04ba5caf894b9dec57,2024-11-05T16:35:36.337000
|
||||
CVE-2024-52014,0,0,95c63fbe0d36cf5f1402099d30f68bd084b42e8fece77b8a43cf34d740aab22d,2024-11-05T16:35:37.113000
|
||||
CVE-2024-52015,0,0,84d00cdc9a202bb00e097769512e415450a582ad27ea697fe4aabe7efef8bade,2024-11-05T16:35:37.890000
|
||||
@ -272818,12 +272819,13 @@ CVE-2024-55921,0,0,5fa81d92601e70d676a1016b709a0f2741abaf55426856cddb4a06e34b9a7
|
||||
CVE-2024-55922,0,0,ab9ba749ee333e9f82aad55cb9be15ec2bea94f8fc77977baf33bef44d3cce51,2025-01-14T20:15:30.033000
|
||||
CVE-2024-55923,0,0,219ffcee25fb405d9a02cdc68a4fa5af829e860803373b590c58a214037e5d08,2025-01-14T20:15:30.197000
|
||||
CVE-2024-55924,0,0,51b538faaafc8081c0d91ed65951b4c0e863d37d4f9e21b793ae96fe9f20d0fe,2025-01-14T20:15:30.367000
|
||||
CVE-2024-55925,0,0,961913985d3386f6c86102111b163be1e0dec1cbc156cf09d6d78e0158a190d4,2025-01-23T17:15:15.380000
|
||||
CVE-2024-55926,0,0,8acda5d8d52cc50290b086c9f0359aa2ec2a57ac51fddabf5ffc20018c5d599a,2025-01-23T18:15:31.780000
|
||||
CVE-2024-55927,0,0,e9dc07f5eb5f9d28b02daa24fc00449ee0e818832b12e9965b64bc86560693ba,2025-01-23T18:15:31.940000
|
||||
CVE-2024-55928,0,0,26436780a4b8e6f989af2337cf5de2b76f8edb52b6911b1d544e8d7ea0325a88,2025-01-23T18:15:32.100000
|
||||
CVE-2024-55929,0,0,8c1cee5d60b08abc234564e76ef472a48008d96afccbcf76650e32b8ea7ab8b9,2025-01-23T18:15:32.277000
|
||||
CVE-2024-55930,0,0,5e3f6dbbc16ec6a457fb969cf3b7dce59a102175d84f10d68af4b8b250cbc52c,2025-01-23T18:15:32.450000
|
||||
CVE-2024-55925,0,1,757c698fb559bb8daf78ccbd0836ab7167b98763df558f53f9ec6d86f2c7b260,2025-01-27T11:15:10.757000
|
||||
CVE-2024-55926,0,1,74d73761a0816bdf814fbbd54935c61e71a37a367259fd2c9f1a7db1c7c911ba,2025-01-27T11:15:10.967000
|
||||
CVE-2024-55927,0,1,dd429e5a4162652bc9107e13f1065f7b7a195e0542ec5c53290787ed78bff613,2025-01-27T12:15:27.033000
|
||||
CVE-2024-55928,0,1,5a8f0f70232819af1361d7cae38e9fcc55e06eae0b9e1de4bca659c3f2b7cfed,2025-01-27T12:15:27.137000
|
||||
CVE-2024-55929,0,1,995b37c46bd9563beaf73a1ef018c8550751defa68201527c62100c1114488cf,2025-01-27T12:15:27.233000
|
||||
CVE-2024-55930,0,1,0c5c553d91ed96784e45012c33877bdd6eea94bf15fe9f12d5e0eb5ae37ec65c,2025-01-27T12:15:27.317000
|
||||
CVE-2024-55931,1,1,bea05fb62c37597b1c7f32799140a2fc9475467a995f12613802c75bb5678df3,2025-01-27T12:15:27.407000
|
||||
CVE-2024-5594,0,0,e7555e7b165259baf6d7812e78b67ccc956e8357ef83023a2dc849ba891436dd,2025-01-06T17:15:44.383000
|
||||
CVE-2024-55945,0,0,51c4c796163d23f85b889df289eaf5efe1a92af8ca1f7066684ce494ee386866,2025-01-14T20:15:30.527000
|
||||
CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000
|
||||
@ -277755,6 +277757,8 @@ CVE-2025-0650,0,0,663c6fb0447de5acea936c032379a880e4e49090359ea8a19f79bd3aea4faf
|
||||
CVE-2025-0651,0,0,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000
|
||||
CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000
|
||||
CVE-2025-0693,0,0,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000
|
||||
CVE-2025-0695,1,1,70836bbbf6325136c9e0a957ced44b18d2c2228a6b15d655a939dfb6142b3b68,2025-01-27T11:15:11.087000
|
||||
CVE-2025-0696,1,1,067c55df7ddd7d3450a8d9809198ef8633f7872bc632480e2c80e723c4cafb5b,2025-01-27T11:15:11.267000
|
||||
CVE-2025-0697,0,0,2b300d6fe20cc05389e1f1da76da10c584853d80e73da80ea6280f5fc93d0276,2025-01-24T15:15:12.130000
|
||||
CVE-2025-0698,0,0,41b2c00dd6b2e11497e6ad0d5935ff7e418c7e8ce23cb7590bf86289758b8bd6,2025-01-24T16:15:37.717000
|
||||
CVE-2025-0699,0,0,a52cce5fc729b9f7c244ab5c5dc069fe63ab6c6e0e5e97843aece40a8ddee923,2025-01-24T16:15:37.977000
|
||||
@ -278842,7 +278846,7 @@ CVE-2025-23931,0,0,72cf7343fea76bc74181624178c1dc4819038ac84963518c4505466290438
|
||||
CVE-2025-23932,0,0,616f51628cb4aae04d16943544a6df13ff57edc77ce5e41bc57b50e3443b82db,2025-01-22T15:15:25.827000
|
||||
CVE-2025-23933,0,0,5314812bb5bb73b3b9600ea0aa8e888771464c5c0299b578bc9a093b69f0f8ef,2025-01-16T21:15:35.210000
|
||||
CVE-2025-23934,0,0,a8cb5365e4d11290f220de8207cb9b17a94fa7b952841219eee098e5e9d7f9bb,2025-01-16T21:15:35.367000
|
||||
CVE-2025-23935,0,1,ca08ce402e61c79c9cce49de15d3ecbafe399b661fba20811ddb663494117ab8,2025-01-27T10:15:09.193000
|
||||
CVE-2025-23935,0,0,ca08ce402e61c79c9cce49de15d3ecbafe399b661fba20811ddb663494117ab8,2025-01-27T10:15:09.193000
|
||||
CVE-2025-23936,0,0,98ce9dfbd803e0feff46465ce5ff38cf3522df4082c1a68d72eabd4f11de5228,2025-01-16T21:15:35.677000
|
||||
CVE-2025-23938,0,0,d323577cfec870a5caebea388f099147280b12f4cce3f7b5c850e5a652397791,2025-01-22T15:15:25.967000
|
||||
CVE-2025-23939,0,0,b227fdb5ca72e62491a5d98a4ab01cce82bbd9f83860732763526745b1f362c4,2025-01-16T21:15:35.910000
|
||||
@ -279019,5 +279023,5 @@ CVE-2025-24751,0,0,4aa19aa90aab45ec9714df6e468e19599d2a1949dc2de4e4c8d985f84e38f
|
||||
CVE-2025-24753,0,0,87b78dd3e11c90af6930cbca7a5346ee214e24237caa8b3601406532dfdbc4de,2025-01-24T18:15:48.950000
|
||||
CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000
|
||||
CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000
|
||||
CVE-2025-24814,1,1,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000
|
||||
CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000
|
||||
CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user