Auto-Update: 2025-01-09T11:00:22.223054+00:00

This commit is contained in:
cad-safe-bot 2025-01-09 11:03:47 +00:00
parent 08a1f0a615
commit eefe3b69d3
20 changed files with 873 additions and 127 deletions

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-12802",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2025-01-09T09:15:06.587",
"lastModified": "2025-01-09T09:15:06.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the separate handling of UPN (User Principal Name) and SAM (Security Account Manager) account names when integrated with Microsoft Active Directory, allowing MFA to be configured independently for each login method and potentially enabling attackers to bypass MFA by exploiting the alternative account name."
}
],
"metrics": {},
"weaknesses": [
{
"source": "PSIRT@sonicwall.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-305"
}
]
}
],
"references": [
{
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0001",
"source": "PSIRT@sonicwall.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-13153",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-09T09:15:07.243",
"lastModified": "2025-01-09T09:15:07.243",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Unlimited Elements For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 1.5.135 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: Since the widget code isn't part of the code, to apply the patch, the affected widgets: Image Tooltip, Notification, Simple Popup, Video Play Button, and Card Carousel, must be deleted and reinstalled manually."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://unlimited-elements.com/change-log/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/unlimited-elements-for-elementor/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/99625a3e-b8a4-42f8-8996-f7c5c0ff2d5f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-13205",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-09T03:15:24.800",
"lastModified": "2025-01-09T03:15:24.800",
"lastModified": "2025-01-09T09:15:07.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in kurniaramadhan E-Commerce-PHP 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/create_product.php of the component Create Product Page. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
"value": "A vulnerability was found in kurniaramadhan E-Commerce-PHP 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/create_product.php of the component Create Product Page. The manipulation of the argument Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
@ -18,7 +18,7 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
@ -26,9 +26,9 @@
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
@ -62,20 +62,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 2.4,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 3.4
"impactScore": 1.4
}
],
"cvssMetricV2": [
@ -84,18 +84,18 @@
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"baseScore": 5.8,
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"baseScore": 3.3,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
@ -111,11 +111,11 @@
"description": [
{
"lang": "en",
"value": "CWE-74"
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-89"
"value": "CWE-94"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45496",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-17T00:15:52.433",
"lastModified": "2024-09-20T12:31:20.110",
"lastModified": "2025-01-09T09:15:07.600",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:3718",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6685",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6508",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-08-21T06:15:08.120",
"lastModified": "2024-12-12T04:15:08.007",
"lastModified": "2025-01-09T09:15:07.767",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -72,6 +72,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:9620",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:0014",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-6508",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7387",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-17T00:15:52.757",
"lastModified": "2024-10-03T21:15:08.593",
"lastModified": "2025-01-09T09:15:07.903",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:3718",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6685",
"source": "secalert@redhat.com"

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-0237",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-01-07T16:15:38.323",
"lastModified": "2025-01-08T16:15:37.330",
"vulnStatus": "Received",
"lastModified": "2025-01-09T09:15:08.027",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6."
"value": "The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6."
},
{
"lang": "es",
@ -63,6 +63,14 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-02/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-04/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-05/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-0238",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-01-07T16:15:38.470",
"lastModified": "2025-01-08T17:15:16.070",
"vulnStatus": "Received",
"lastModified": "2025-01-09T09:15:08.197",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, and Firefox ESR < 115.19."
"value": "Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird ESR < 128.6."
},
{
"lang": "es",
@ -67,6 +67,14 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-03/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-04/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-05/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-0239",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-01-07T16:15:38.563",
"lastModified": "2025-01-08T17:15:16.240",
"vulnStatus": "Received",
"lastModified": "2025-01-09T09:15:08.357",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6."
"value": "When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6."
},
{
"lang": "es",
@ -63,6 +63,14 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-02/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-04/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-05/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-0240",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-01-07T16:15:38.663",
"lastModified": "2025-01-08T17:15:16.403",
"vulnStatus": "Received",
"lastModified": "2025-01-09T09:15:08.513",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6."
"value": "Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6."
},
{
"lang": "es",
@ -63,6 +63,14 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-02/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-04/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-05/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-0241",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-01-07T16:15:38.767",
"lastModified": "2025-01-07T16:15:38.767",
"vulnStatus": "Received",
"lastModified": "2025-01-09T09:15:08.667",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6."
"value": "When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6."
},
{
"lang": "es",
"value": "Al segmentar texto especialmente manipulado, la segmentaci\u00f3n corromp\u00eda la memoria y provocaba un bloqueo que pod\u00eda explotarse. Esta vulnerabilidad afecta a Firefox &lt; 134 y Firefox ESR &lt; 128.6."
}
],
"metrics": {},
@ -24,6 +28,14 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-02/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-04/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-05/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-0242",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-01-07T16:15:38.860",
"lastModified": "2025-01-08T17:15:16.563",
"vulnStatus": "Received",
"lastModified": "2025-01-09T09:15:08.763",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, and Firefox ESR < 115.19."
"value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird ESR < 128.6."
},
{
"lang": "es",
@ -67,6 +67,14 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-03/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-04/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-05/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-0243",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-01-07T16:15:38.973",
"lastModified": "2025-01-08T17:15:16.723",
"vulnStatus": "Received",
"lastModified": "2025-01-09T09:15:08.917",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6."
"value": "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6."
},
{
"lang": "es",
@ -51,6 +51,14 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-02/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-04/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-05/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-0247",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-01-07T16:15:39.357",
"lastModified": "2025-01-08T15:15:21.033",
"vulnStatus": "Received",
"lastModified": "2025-01-09T09:15:09.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 133 and Thunderbird 133. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134."
"value": "Memory safety bugs present in Firefox 133 and Thunderbird 133. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134 and Thunderbird < 134."
},
{
"lang": "es",
@ -47,6 +47,10 @@
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-01/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-04/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-0345",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-09T09:15:09.220",
"lastModified": "2025-01-09T09:15:09.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this issue is the function listData of the file /sys/menu/listData. The manipulation of the argument order leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli4.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290858",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290858",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.475748",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0346",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-09T09:15:09.393",
"lastModified": "2025-01-09T09:15:09.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Content Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/publishnews.php of the component Publish News Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"baseScore": 5.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/Lytes/266e5fa6eb4506fe2c7e35166664249a",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290859",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290859",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.476728",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0347",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-09T10:15:07.170",
"lastModified": "2025-01-09T10:15:07.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Admission Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php of the component Login. The manipulation of the argument u_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Curious-L/-/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290860",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290860",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.476898",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0348",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-09T10:15:07.700",
"lastModified": "2025-01-09T10:15:07.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in CampCodes DepEd Equipment Inventory System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /data/add_employee.php. The manipulation of the argument data leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20DepEd%20Equipment%20Inventory%20System.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290861",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290861",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.476908",
"source": "cna@vuldb.com"
},
{
"url": "https://www.campcodes.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-09T09:00:22.531137+00:00
2025-01-09T11:00:22.223054+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-09T08:15:30.517000+00:00
2025-01-09T10:15:07.700000+00:00
```
### Last Data Feed Release
@ -33,46 +33,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
276421
276427
```
### CVEs added in the last Commit
Recently added CVEs: `35`
Recently added CVEs: `6`
- [CVE-2024-43651](CVE-2024/CVE-2024-436xx/CVE-2024-43651.json) (`2025-01-09T08:15:27.590`)
- [CVE-2024-43652](CVE-2024/CVE-2024-436xx/CVE-2024-43652.json) (`2025-01-09T08:15:27.757`)
- [CVE-2024-43653](CVE-2024/CVE-2024-436xx/CVE-2024-43653.json) (`2025-01-09T08:15:27.950`)
- [CVE-2024-43654](CVE-2024/CVE-2024-436xx/CVE-2024-43654.json) (`2025-01-09T08:15:28.127`)
- [CVE-2024-43655](CVE-2024/CVE-2024-436xx/CVE-2024-43655.json) (`2025-01-09T08:15:28.300`)
- [CVE-2024-43656](CVE-2024/CVE-2024-436xx/CVE-2024-43656.json) (`2025-01-09T08:15:28.487`)
- [CVE-2024-43657](CVE-2024/CVE-2024-436xx/CVE-2024-43657.json) (`2025-01-09T08:15:28.680`)
- [CVE-2024-43658](CVE-2024/CVE-2024-436xx/CVE-2024-43658.json) (`2025-01-09T08:15:28.867`)
- [CVE-2024-43659](CVE-2024/CVE-2024-436xx/CVE-2024-43659.json) (`2025-01-09T08:15:29.060`)
- [CVE-2024-43660](CVE-2024/CVE-2024-436xx/CVE-2024-43660.json) (`2025-01-09T08:15:29.267`)
- [CVE-2024-43661](CVE-2024/CVE-2024-436xx/CVE-2024-43661.json) (`2025-01-09T08:15:29.450`)
- [CVE-2024-43662](CVE-2024/CVE-2024-436xx/CVE-2024-43662.json) (`2025-01-09T08:15:29.637`)
- [CVE-2024-43663](CVE-2024/CVE-2024-436xx/CVE-2024-43663.json) (`2025-01-09T08:15:29.810`)
- [CVE-2024-53704](CVE-2024/CVE-2024-537xx/CVE-2024-53704.json) (`2025-01-09T07:15:27.203`)
- [CVE-2024-53705](CVE-2024/CVE-2024-537xx/CVE-2024-53705.json) (`2025-01-09T07:15:27.363`)
- [CVE-2024-53706](CVE-2024/CVE-2024-537xx/CVE-2024-53706.json) (`2025-01-09T07:15:27.520`)
- [CVE-2025-0336](CVE-2025/CVE-2025-03xx/CVE-2025-0336.json) (`2025-01-09T07:15:27.860`)
- [CVE-2025-0339](CVE-2025/CVE-2025-03xx/CVE-2025-0339.json) (`2025-01-09T07:15:28.080`)
- [CVE-2025-0340](CVE-2025/CVE-2025-03xx/CVE-2025-0340.json) (`2025-01-09T07:15:28.260`)
- [CVE-2025-0341](CVE-2025/CVE-2025-03xx/CVE-2025-0341.json) (`2025-01-09T08:15:30.060`)
- [CVE-2025-0342](CVE-2025/CVE-2025-03xx/CVE-2025-0342.json) (`2025-01-09T08:15:30.310`)
- [CVE-2025-0344](CVE-2025/CVE-2025-03xx/CVE-2025-0344.json) (`2025-01-09T08:15:30.517`)
- [CVE-2025-20033](CVE-2025/CVE-2025-200xx/CVE-2025-20033.json) (`2025-01-09T07:15:28.450`)
- [CVE-2025-22445](CVE-2025/CVE-2025-224xx/CVE-2025-22445.json) (`2025-01-09T07:15:28.617`)
- [CVE-2025-22449](CVE-2025/CVE-2025-224xx/CVE-2025-22449.json) (`2025-01-09T07:15:28.777`)
- [CVE-2024-12802](CVE-2024/CVE-2024-128xx/CVE-2024-12802.json) (`2025-01-09T09:15:06.587`)
- [CVE-2024-13153](CVE-2024/CVE-2024-131xx/CVE-2024-13153.json) (`2025-01-09T09:15:07.243`)
- [CVE-2025-0345](CVE-2025/CVE-2025-03xx/CVE-2025-0345.json) (`2025-01-09T09:15:09.220`)
- [CVE-2025-0346](CVE-2025/CVE-2025-03xx/CVE-2025-0346.json) (`2025-01-09T09:15:09.393`)
- [CVE-2025-0347](CVE-2025/CVE-2025-03xx/CVE-2025-0347.json) (`2025-01-09T10:15:07.170`)
- [CVE-2025-0348](CVE-2025/CVE-2025-03xx/CVE-2025-0348.json) (`2025-01-09T10:15:07.700`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `12`
- [CVE-2024-50312](CVE-2024/CVE-2024-503xx/CVE-2024-50312.json) (`2025-01-09T07:15:26.893`)
- [CVE-2025-0194](CVE-2025/CVE-2025-01xx/CVE-2025-0194.json) (`2025-01-09T07:15:27.667`)
- [CVE-2024-13205](CVE-2024/CVE-2024-132xx/CVE-2024-13205.json) (`2025-01-09T09:15:07.417`)
- [CVE-2024-45496](CVE-2024/CVE-2024-454xx/CVE-2024-45496.json) (`2025-01-09T09:15:07.600`)
- [CVE-2024-6508](CVE-2024/CVE-2024-65xx/CVE-2024-6508.json) (`2025-01-09T09:15:07.767`)
- [CVE-2024-7387](CVE-2024/CVE-2024-73xx/CVE-2024-7387.json) (`2025-01-09T09:15:07.903`)
- [CVE-2025-0237](CVE-2025/CVE-2025-02xx/CVE-2025-0237.json) (`2025-01-09T09:15:08.027`)
- [CVE-2025-0238](CVE-2025/CVE-2025-02xx/CVE-2025-0238.json) (`2025-01-09T09:15:08.197`)
- [CVE-2025-0239](CVE-2025/CVE-2025-02xx/CVE-2025-0239.json) (`2025-01-09T09:15:08.357`)
- [CVE-2025-0240](CVE-2025/CVE-2025-02xx/CVE-2025-0240.json) (`2025-01-09T09:15:08.513`)
- [CVE-2025-0241](CVE-2025/CVE-2025-02xx/CVE-2025-0241.json) (`2025-01-09T09:15:08.667`)
- [CVE-2025-0242](CVE-2025/CVE-2025-02xx/CVE-2025-0242.json) (`2025-01-09T09:15:08.763`)
- [CVE-2025-0243](CVE-2025/CVE-2025-02xx/CVE-2025-0243.json) (`2025-01-09T09:15:08.917`)
- [CVE-2025-0247](CVE-2025/CVE-2025-02xx/CVE-2025-0247.json) (`2025-01-09T09:15:09.067`)
## Download and Usage

View File

@ -214936,7 +214936,7 @@ CVE-2023-1903,0,0,efc0da96e9efec639f57af0da1386824a9dd54cff194afba825592fcb11607
CVE-2023-1904,0,0,ffbb7dc031b91f22a73be42c7f56c7040dc466cc7cc9e04b2035e3635dd9de4c,2024-11-21T07:40:06.983000
CVE-2023-1905,0,0,1c8e69e154302dafb57f6191602005d1fb9f553d13ff7fd58cbba47c267631e4,2024-11-21T07:40:07.103000
CVE-2023-1906,0,0,2474c3121c418f8f1b9c7898365edb5f0f5ff817f30d9fbbb045c48845873f42,2024-11-21T07:40:07.200000
CVE-2023-1907,1,1,1461563d5ed7ef4393202a489273cc6851e080eaa8c7088b7a3a013e6476b08a,2025-01-09T08:15:24.477000
CVE-2023-1907,0,0,1461563d5ed7ef4393202a489273cc6851e080eaa8c7088b7a3a013e6476b08a,2025-01-09T08:15:24.477000
CVE-2023-1908,0,0,a7f3750c6e61e1597fb00574a671512440b074bfd7d382966345f4da285e0184,2024-11-21T07:40:07.320000
CVE-2023-1909,0,0,e49817fc9d0a21e868f8dcf99cb6ba1f1e8637a8a1ac71c8aea4dcba2d56a97b,2024-11-21T07:40:07.440000
CVE-2023-1910,0,0,37c041e704ac5ae2514337a89fa66ad555ee848903b68628fbb411ed56a08fa9,2024-11-25T16:47:33.943000
@ -245400,9 +245400,10 @@ CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72
CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000
CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000
CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000
CVE-2024-12803,1,1,39b13515bd90582cf33d0ed4f88d02f6b7dfc604d3edbbab329fd26f0ea79caa,2025-01-09T08:15:26.007000
CVE-2024-12805,1,1,88244c73e27c67bc8006e84c4e0b60b1c6b6d146df3eb2fafe424e792ef9edfa,2025-01-09T08:15:26.247000
CVE-2024-12806,1,1,9ca03f14d28b1eb09c39d6105bff209df4089157e217b8603b11751d7e40ad7a,2025-01-09T08:15:26.417000
CVE-2024-12802,1,1,02e0d4499664dae94f894abf5b14a3696a760858576f720ade3983b2933a550f,2025-01-09T09:15:06.587000
CVE-2024-12803,0,0,39b13515bd90582cf33d0ed4f88d02f6b7dfc604d3edbbab329fd26f0ea79caa,2025-01-09T08:15:26.007000
CVE-2024-12805,0,0,88244c73e27c67bc8006e84c4e0b60b1c6b6d146df3eb2fafe424e792ef9edfa,2025-01-09T08:15:26.247000
CVE-2024-12806,0,0,9ca03f14d28b1eb09c39d6105bff209df4089157e217b8603b11751d7e40ad7a,2025-01-09T08:15:26.417000
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000
CVE-2024-12828,0,0,a29f7d175d08af9e9a3e3b2d9a239843d4c47c7b84f9529c7b9ddf19ae5c7fea,2024-12-30T17:15:07.717000
@ -245577,7 +245578,7 @@ CVE-2024-13038,0,0,07021c3f3e4e5ad8d59084daa2472f76a36a62f583200e4e988b2985299ac
CVE-2024-13039,0,0,2ff048e2898a94c89e2fe46d15a6b69b7d24fd911b280e248c70b61bbb5acce0,2024-12-30T17:15:08.597000
CVE-2024-1304,0,0,7f3d377d10786bd7b29e3437adfa1f791151a43db698785def3901d685804d14,2024-11-21T08:50:16.717000
CVE-2024-13040,0,0,48eac60daed7d09b05d10239614a9afabab092e37582ba3e02178f3736c64fc0,2024-12-31T02:15:06.303000
CVE-2024-13041,1,1,49054a6a33743c1e6ab55e3ca334f47a3844e5906bbaad1d3a49a9cb1e9a2e09,2025-01-09T07:15:26.497000
CVE-2024-13041,0,0,49054a6a33743c1e6ab55e3ca334f47a3844e5906bbaad1d3a49a9cb1e9a2e09,2025-01-09T07:15:26.497000
CVE-2024-13042,0,0,1f81fc2eec05a9223456735091886113e5fb919c6582ca39f0497333c1ba2b59,2025-01-04T13:15:06.483000
CVE-2024-13043,0,0,d417b605205dbe84f83258ea316ba45f837391250bcff3253069ffacb1fd1864,2025-01-03T20:56:34.317000
CVE-2024-13044,0,0,2a60dae76075d731a7a10d4f5dd3f064d1a9a7527f55b8c35dfff24662fef8aa,2025-01-03T17:38:23.907000
@ -245646,6 +245647,7 @@ CVE-2024-13143,0,0,c2afc4876e46cd380fd1d10a980312da4d2e603db0d42920d20cd1d81d1bf
CVE-2024-13144,0,0,bc673dcb37833b727fc98157fce26807cef4c158cb3987428cbd5bd61bbe52b2,2025-01-06T00:15:05.633000
CVE-2024-13145,0,0,5293851792dc3cb6491b0cda78aca9c898b2b603a3534d53245e0430e746e1ed,2025-01-06T01:15:06.253000
CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000
CVE-2024-13153,1,1,de78f1f4efaeeb4981941c568d7dd7c0ad017670abfea047339f3d3542b071c5,2025-01-09T09:15:07.243000
CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000
CVE-2024-1317,0,0,a1d296c91e245cb27c998bff4f84250fb1101a61ebac429b7ce35a2ceb239c73,2024-12-31T16:57:11.080000
CVE-2024-13173,0,0,f1a33d2e3c9b2cf91c9a53b07743d77111624711ca1e4fa83f21d1b344cad8f0,2025-01-08T15:15:16.577000
@ -245672,7 +245674,7 @@ CVE-2024-13201,0,0,98f9e9029ecdad1b3085258c9d21a620f38d90ac00edbfea61330f3072ab2
CVE-2024-13202,0,0,fcc0d41315cbf872ad3f8ed3c4bf434e97528b65abb99250267aa9cd85514824,2025-01-09T03:15:24.220000
CVE-2024-13203,0,0,819c261d60fcd7e19a6b1cc262670172b97a373b3e5bcd2e58b29355523bf351,2025-01-09T03:15:24.410000
CVE-2024-13204,0,0,29b356ed8e68b4bf4c454a187403ce827799c9b4a8c71e1fb3c28ca6727e9acb,2025-01-09T03:15:24.603000
CVE-2024-13205,0,0,d739c71f3d86131a746eaa4249d12b3ae719885126fa157fb0f7f8b183987902,2025-01-09T03:15:24.800000
CVE-2024-13205,0,1,eab2280f118cc878917b605ffe82a4e3281effe9ad63660bef82b0a134012d58,2025-01-09T09:15:07.417000
CVE-2024-13206,0,0,3592680ac4f9d21850041d74074be88a605be70d439b1229b27538d812be260a,2025-01-09T04:15:10.990000
CVE-2024-13209,0,0,ba59362766f93c6d18b5a8987b5e8a847432c789f656b7315b541fc0de12a958,2025-01-09T04:15:11.683000
CVE-2024-1321,0,0,64c53fddfcf700442bf3bc09eea0aa8fb2f1c68b08bca44e74ca22c8291fb906,2024-11-21T08:50:19.770000
@ -261989,10 +261991,10 @@ CVE-2024-40750,0,0,c491090d917045d507fa28976c97558943f972457181ebb36c0ba9aa25c97
CVE-2024-40754,0,0,bd9d6903684af54e3d4f528bdae88b70db33043ddc74f4404f7d893dbc9cb397,2024-09-10T14:35:04.833000
CVE-2024-4076,0,0,6f41301410bb850ac724eb349beb08670550e5e1ae7ac3c04b8cf5e2d874d5bd,2024-11-21T09:42:08.807000
CVE-2024-40761,0,0,98df27f9ab08289b73f70adffa16577ee132bdfd9b5e346e5d494328018c9b31,2024-11-21T09:31:34.510000
CVE-2024-40762,1,1,a7fbc3ec51883c7c1bf42de1c756299288a6532ae6ffd10d35fcdcaa53ac6fd3,2025-01-09T07:15:26.730000
CVE-2024-40762,0,0,a7fbc3ec51883c7c1bf42de1c756299288a6532ae6ffd10d35fcdcaa53ac6fd3,2025-01-09T07:15:26.730000
CVE-2024-40763,0,0,03a98910bacc7a91881ba5927386bf799784ceed39e50818d2356358d82576a8,2024-12-05T17:15:11.720000
CVE-2024-40764,0,0,716c9029e61b77a0d9603bd5e4ce9d607d5f6a696fe7c8edc6ff51f3b795b731,2024-11-21T09:31:34.703000
CVE-2024-40765,1,1,dcc858012082642755bee9045aabed3fc3e42f650b0a9b38d01bed6c6e1fa250,2025-01-09T08:15:26.797000
CVE-2024-40765,0,0,dcc858012082642755bee9045aabed3fc3e42f650b0a9b38d01bed6c6e1fa250,2025-01-09T08:15:26.797000
CVE-2024-40766,0,0,245a65896d5e59cbc106ef8982774d28e0903e2f3e66c1e0224a1b4643d1a16a,2024-09-16T19:48:30.827000
CVE-2024-40767,0,0,d8daa36a05263c3ffe16e1b113badcb7ade4182a8a1be061cbdf839ea5fdacae,2024-11-21T09:31:35.113000
CVE-2024-4077,0,0,8de588b7fa8bc539a1390a30d26ffec16c49968012710ff1d0939c2fbeb8f325,2024-11-21T09:42:08.940000
@ -264214,24 +264216,24 @@ CVE-2024-43644,0,0,d7ae81dc39a8d80999b28a10bf2b9f4f3ec0b06b97a543b1aa4024a754a61
CVE-2024-43645,0,0,3483c2f4a4e8d8673a85c08c57279dcaf2dcabe54994c554778de6585015f0e0,2024-11-18T22:17:01.340000
CVE-2024-43646,0,0,e44ad8cceba821cb635623bea36106bdbc329e7b38ada87c67235302b176e252,2024-11-18T22:17:53.577000
CVE-2024-43647,0,0,8afbf70ad2cef6fb4b1caf7e1a2477d89764414a1ebb1b6c70d7bf7b3d2442bb,2024-09-10T12:09:50.377000
CVE-2024-43648,1,1,db6ea04d0fc888e720c30e379a5edb0c8ba3ee21c7a578727f855e026e9bf487,2025-01-09T08:15:26.980000
CVE-2024-43649,1,1,47885ac52d06aa5d504a6dd1164814193364eba437843e14afe4f6408eff7e6a,2025-01-09T08:15:27.233000
CVE-2024-43648,0,0,db6ea04d0fc888e720c30e379a5edb0c8ba3ee21c7a578727f855e026e9bf487,2025-01-09T08:15:26.980000
CVE-2024-43649,0,0,47885ac52d06aa5d504a6dd1164814193364eba437843e14afe4f6408eff7e6a,2025-01-09T08:15:27.233000
CVE-2024-4365,0,0,8395a37d6a53a1070a3da8569444b421529dea178299a0f784e109ce6848c89d,2024-11-21T09:42:42.317000
CVE-2024-43650,1,1,f57c4c703d40cb1b16da32a6f9b05bb372c49445a1b082beac328b32d9fb70c1,2025-01-09T08:15:27.417000
CVE-2024-43651,1,1,ae6190c0fb2ef2abff378edd3f5ffc36d80bfaea3861050b603b76d43f4960d1,2025-01-09T08:15:27.590000
CVE-2024-43652,1,1,064bc45896f52884bfb57b8ac4a528d861f3663215ed752804908387abe214eb,2025-01-09T08:15:27.757000
CVE-2024-43653,1,1,5029101dfeb3ba5aa623a600afd5003286f2ac5d03819c2b95d2abedf0fa9156,2025-01-09T08:15:27.950000
CVE-2024-43654,1,1,b1ee7e11f8ffe5f22642934b4d66cee8a85a5924f3fed8d612532ca1852d2eeb,2025-01-09T08:15:28.127000
CVE-2024-43655,1,1,84a84cb9f2f0c9c81851b45f6751858fb461708f35ee0b7196880e2f47bce0d5,2025-01-09T08:15:28.300000
CVE-2024-43656,1,1,38891d24c044c865af89153898249b840abf21f3098f2a8fd86ddeaf115986c1,2025-01-09T08:15:28.487000
CVE-2024-43657,1,1,3295db8b0dee8c35f5bd2387c8725a66b364d28143f9cc9f0d93b969dca07d3b,2025-01-09T08:15:28.680000
CVE-2024-43658,1,1,03812cbdc33c23bf8bd0a3a9e1d82b30062ca72f54383da1609f5ac33cd77109,2025-01-09T08:15:28.867000
CVE-2024-43659,1,1,bea7bb2d7749d4469735f64b9092872757069300cf7bc686047ed1827782bd88,2025-01-09T08:15:29.060000
CVE-2024-43650,0,0,f57c4c703d40cb1b16da32a6f9b05bb372c49445a1b082beac328b32d9fb70c1,2025-01-09T08:15:27.417000
CVE-2024-43651,0,0,ae6190c0fb2ef2abff378edd3f5ffc36d80bfaea3861050b603b76d43f4960d1,2025-01-09T08:15:27.590000
CVE-2024-43652,0,0,064bc45896f52884bfb57b8ac4a528d861f3663215ed752804908387abe214eb,2025-01-09T08:15:27.757000
CVE-2024-43653,0,0,5029101dfeb3ba5aa623a600afd5003286f2ac5d03819c2b95d2abedf0fa9156,2025-01-09T08:15:27.950000
CVE-2024-43654,0,0,b1ee7e11f8ffe5f22642934b4d66cee8a85a5924f3fed8d612532ca1852d2eeb,2025-01-09T08:15:28.127000
CVE-2024-43655,0,0,84a84cb9f2f0c9c81851b45f6751858fb461708f35ee0b7196880e2f47bce0d5,2025-01-09T08:15:28.300000
CVE-2024-43656,0,0,38891d24c044c865af89153898249b840abf21f3098f2a8fd86ddeaf115986c1,2025-01-09T08:15:28.487000
CVE-2024-43657,0,0,3295db8b0dee8c35f5bd2387c8725a66b364d28143f9cc9f0d93b969dca07d3b,2025-01-09T08:15:28.680000
CVE-2024-43658,0,0,03812cbdc33c23bf8bd0a3a9e1d82b30062ca72f54383da1609f5ac33cd77109,2025-01-09T08:15:28.867000
CVE-2024-43659,0,0,bea7bb2d7749d4469735f64b9092872757069300cf7bc686047ed1827782bd88,2025-01-09T08:15:29.060000
CVE-2024-4366,0,0,3c382e606a72e58f20f6afa38987a3fb436df349cdb6108f029876febf16f59e,2024-11-21T09:42:42.433000
CVE-2024-43660,1,1,bae475130e762711eec58c15c2ac20517cbf8adec68dfd49174933e0fa6931d6,2025-01-09T08:15:29.267000
CVE-2024-43661,1,1,7ca027929fc4dbab8ab4a545e9d872677d38cc79fa5c607e55919cb4f1e09ac8,2025-01-09T08:15:29.450000
CVE-2024-43662,1,1,8b0996f37d4d356a300c8703334b6df6e707291e0e0de56d34e4f561f2e110de,2025-01-09T08:15:29.637000
CVE-2024-43663,1,1,31b94a23f14faadaefc29b121a7d7589a03cd0af3a6f5d3b2eff56c034d6370f,2025-01-09T08:15:29.810000
CVE-2024-43660,0,0,bae475130e762711eec58c15c2ac20517cbf8adec68dfd49174933e0fa6931d6,2025-01-09T08:15:29.267000
CVE-2024-43661,0,0,7ca027929fc4dbab8ab4a545e9d872677d38cc79fa5c607e55919cb4f1e09ac8,2025-01-09T08:15:29.450000
CVE-2024-43662,0,0,8b0996f37d4d356a300c8703334b6df6e707291e0e0de56d34e4f561f2e110de,2025-01-09T08:15:29.637000
CVE-2024-43663,0,0,31b94a23f14faadaefc29b121a7d7589a03cd0af3a6f5d3b2eff56c034d6370f,2025-01-09T08:15:29.810000
CVE-2024-4367,0,0,06d0056dd66ff219c5446225478001d7ace4cdfa0f0e8d7454a5c61b93b71c50,2024-11-21T09:42:42.537000
CVE-2024-4368,0,0,3d10c8e78c29700111196d36c50b5f085edebb06975b60275c2b591108b23a7b,2024-12-20T17:23:03.420000
CVE-2024-43683,0,0,df9b098d0d10bbc57333de3cddd48795135c3c7c667cdc231a2f356001c571ba,2024-11-01T16:15:08.930000
@ -265534,7 +265536,7 @@ CVE-2024-45492,0,0,6ab18bae2a19d3274e46d846526a2c9caf05018be54190e57425083d757a6
CVE-2024-45493,0,0,63ded12e1cce66753793ae82bef6c61efd91f10fe98a5bd1c054c3ddfbe0becc,2024-12-17T19:15:06.287000
CVE-2024-45494,0,0,e62b8176d74731dfdb1c9ebc3d4575fcabd14aac12deeb9776633eac1b50aecb,2024-12-17T19:15:06.497000
CVE-2024-45495,0,0,052cbd46ff58a2733b006c164c39180c42ff3c9c0f05edf173b6ee70b661cd18,2024-12-04T17:15:14.537000
CVE-2024-45496,0,0,0a17ce5abed3bb6e6bd1207267280384036ed1f3c38b934c9b15f23fd0a10899,2024-09-20T12:31:20.110000
CVE-2024-45496,0,1,f647c5447ed213c353caf91ddf707bc78331ddddcd98c233146cc0a0d9ee301a,2025-01-09T09:15:07.600000
CVE-2024-45497,0,0,8f10e5d1340565ce5f36ecaf4b2e6fa88136b7550ee676f0b4149fba415b5f50,2024-12-31T03:15:05.543000
CVE-2024-45498,0,0,ca7ab14623fe44aa59d843f355963b5b1f5525ef3bebc4a2486921426a009155,2024-11-21T09:37:51.613000
CVE-2024-4550,0,0,d020c2baa57a4c8c78c6437cdbbe1c555a0bddf99dab5627801ef1d8b20c6e80,2024-09-14T11:47:14.677000
@ -268780,7 +268782,7 @@ CVE-2024-50307,0,0,effd6ec5b86bf22e86b034cf0d56aa80ef1054d58eddf4f4569fd5216a211
CVE-2024-5031,0,0,c308606af56c2c63972fb5c4124ab9d975213c17c216c9acc47e4e56bb8f8d42,2024-11-21T09:46:48.853000
CVE-2024-50310,0,0,0aa8bf92cb0c2ce72d2591b8a623d6ab248b2abe4cf7e33609877fe3cb7813d1,2024-11-13T23:15:38.657000
CVE-2024-50311,0,0,b0292ba610dd96aa55991ae2b3d8d9a3245ae7b245c406d2ccd4b978c4c63f18,2024-12-04T08:15:06.993000
CVE-2024-50312,0,1,a7c4b05d3d3f339ecdf585e78123d67608338d22201a07dc1ab4fe90abd45688,2025-01-09T07:15:26.893000
CVE-2024-50312,0,0,a7c4b05d3d3f339ecdf585e78123d67608338d22201a07dc1ab4fe90abd45688,2025-01-09T07:15:26.893000
CVE-2024-50313,0,0,64114bcba17ddbbd52304f776f5dd6f39dd07ae575272b42861ff4f8f52981bf,2024-11-15T17:12:44.410000
CVE-2024-50315,0,0,4cc2faf3d8c489bc195ea9b1b71e3db71fb7f18259f91c4f6bf82e911f7ad06a,2024-11-06T18:15:06.173000
CVE-2024-50317,0,0,bb18489d7989fbe06416c7902779e422cf61fac95f0d13f7e09c0b8e1bc37193,2024-11-18T15:06:49.627000
@ -270858,9 +270860,9 @@ CVE-2024-5370,0,0,118bbc3bfc68a5a364fa8038fafc7682a10bb0308a5e5da229e35dbd880721
CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000
CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000
CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000
CVE-2024-53704,1,1,a49d2f395c1a812543e55d6b39c0cc790fff1e2ba3cf7523efd6de51559acf7d,2025-01-09T07:15:27.203000
CVE-2024-53705,1,1,3608df41c0b7eb34cc7682868591dc9a56ad97248d5876e65327a002d017398a,2025-01-09T07:15:27.363000
CVE-2024-53706,1,1,258819dd0728d0f7679c29154005673ce3e612d4f8dde60dda77acce9370823c,2025-01-09T07:15:27.520000
CVE-2024-53704,0,0,a49d2f395c1a812543e55d6b39c0cc790fff1e2ba3cf7523efd6de51559acf7d,2025-01-09T07:15:27.203000
CVE-2024-53705,0,0,3608df41c0b7eb34cc7682868591dc9a56ad97248d5876e65327a002d017398a,2025-01-09T07:15:27.363000
CVE-2024-53706,0,0,258819dd0728d0f7679c29154005673ce3e612d4f8dde60dda77acce9370823c,2025-01-09T07:15:27.520000
CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000
CVE-2024-53708,0,0,cda0eccc0f844686702a234754606286df02f2b8e9c9d9d81e8fb2842526d6e1,2024-12-02T14:15:13.457000
CVE-2024-53709,0,0,74fcfcd96364eb63a20fac2c34c511b47044ab19669bd7332461d3387afde300,2024-12-02T14:15:13.600000
@ -273253,7 +273255,7 @@ CVE-2024-6504,0,0,fad0ade8c88ad6e8496cfe0d237856169f53f8a93210eadd259fe3abd75e2e
CVE-2024-6505,0,0,21aa9ddf3ebc6b3515263ded9b2cee589115bfdb04b0eceea7d24129ed687c73,2024-11-21T09:49:46.400000
CVE-2024-6506,0,0,1a9cee5d897bff8909e0a3bb27604c626e57ed4bbd4bb54c8f2bd8e2e572b480,2024-11-21T09:49:46.537000
CVE-2024-6507,0,0,687ddf6520b599b09dc3a1d8aab83ca78b8392e14671ddde76f4a9814b88169c,2024-11-25T13:15:07.517000
CVE-2024-6508,0,0,2b37d6ee7d49eb93da987149131aaf4c1acc126a1821ebcebf00349b3e483bcd,2024-12-12T04:15:08.007000
CVE-2024-6508,0,1,52de2f9db1bae89555ac7f7a0971e5d71f1b68c7d83dedf5c4b0916b92a29272,2025-01-09T09:15:07.767000
CVE-2024-6509,0,0,90d894af5048ed3f0f64d638b676864ae566d58ef707a1e4890279c66c4ecf68,2024-11-29T06:15:07.640000
CVE-2024-6510,0,0,b5f4271053f188471e3e35f9aca13c4993fc4e8f43ff33784781597a6cac8f1f,2024-10-02T17:17:46.450000
CVE-2024-6511,0,0,d521b24465eff12b0c8151a58c6c8010152bbabe6c86ea5dd1a924fa2f64baf8,2024-11-21T09:49:47.060000
@ -274017,7 +274019,7 @@ CVE-2024-7383,0,0,7beeface4302f9b7cabdff180768add34a64cc9c1a8e549a14d10aa1dc8f69
CVE-2024-7384,0,0,72665cefc9bc5e7a4bb167b33f41e91e76bc71ffdb470737af7a5454b0f8a7ba,2024-09-27T13:15:28.443000
CVE-2024-7385,0,0,101c941ce4234279ac93469f4d75a71718ff61f7f4f159a8cf136648a29532f0,2024-10-02T19:35:26.523000
CVE-2024-7386,0,0,623f13cd2bc79eb32d7c88560297357b78b3ef2e7abbbf45c8d9ab2e2aff0739,2024-09-26T13:32:02.803000
CVE-2024-7387,0,0,d1f7bb15961ef674c8d1115014753264a86815b31c3c301159f4c35e8ee3a4b1,2024-10-03T21:15:08.593000
CVE-2024-7387,0,1,c2f7dcf02cdd17901d7de24823d83c3c0d3eb2f86ae88f5e8ad91fb71d3849b1,2025-01-09T09:15:07.903000
CVE-2024-7388,0,0,832d23d5406547c0193a4b31c0fd589fd6f309473f42f5bd0b1b9a8f787e7450,2024-08-13T12:58:25.437000
CVE-2024-7389,0,0,cab381fcf4b9b71264f141b348bf1292afa8da6fe747dc8fe0784ecf6d792fc5,2024-11-21T09:51:25.673000
CVE-2024-7390,0,0,62257d50cfac87a87bf72bf184895cbf9edf65dcbcd5b500828f71bf6dd1b693,2024-09-27T17:45:05.590000
@ -276186,7 +276188,7 @@ CVE-2025-0173,0,0,c1f252ca4cbbf65084a89ab024bca7f0b17a90985239dec13e360a268ca336
CVE-2025-0174,0,0,a58f6ba631c2a0feb58527b8303d7d4a31c3e3872c8ddd8918aacd475478a78f,2025-01-03T02:15:07.480000
CVE-2025-0175,0,0,d9a687479ae4dd84b5b46d302a16ec57021ad84e1ebe3621ace137eeaefcef9b,2025-01-03T02:15:07.680000
CVE-2025-0176,0,0,25b97cf7942e2d65b84cd3d69b2f6ce4b0c39c12b63a98b8f04cd8b606eafaef,2025-01-03T15:15:11.360000
CVE-2025-0194,0,1,40ef7c79a60c06ceae761bdb13cd6a0f064d915b3409b67bcbee098c5513eee9,2025-01-09T07:15:27.667000
CVE-2025-0194,0,0,40ef7c79a60c06ceae761bdb13cd6a0f064d915b3409b67bcbee098c5513eee9,2025-01-09T07:15:27.667000
CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8d0,2025-01-03T18:15:17.317000
CVE-2025-0196,0,0,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000
CVE-2025-0197,0,0,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000
@ -276222,17 +276224,17 @@ CVE-2025-0230,0,0,da56c380fbd78e0c1f33c2e3a59c91c27f8ad01a46dc235a12db28093892ee
CVE-2025-0231,0,0,73ba5b334ad5db7bd7f18e0277fa8cbe48a99916bc557dd1170e5fb52d78d868,2025-01-05T22:15:05.540000
CVE-2025-0232,0,0,bbb1f8dd03cca1cfde501a9cda5da15f541da213c05bfee0e291ed634d921d4c,2025-01-05T22:15:05.767000
CVE-2025-0233,0,0,5ed4a33582b9d256ec10fa7176aad6ab5c25b941c467fc43ba8899ab1d384b8a,2025-01-05T23:15:07.320000
CVE-2025-0237,0,0,1becb30a5153a9f87c8dcd95591b69c5bf659833bca9d5c3abd04888a3e6e760,2025-01-08T16:15:37.330000
CVE-2025-0238,0,0,50894038de77fb1ebf563c119d1e1fdce0d46105147c4aa7d615e648cd7db1d9,2025-01-08T17:15:16.070000
CVE-2025-0239,0,0,dd98627a0fe231acbc4f67019979adafca5d0e8310c70ed72dddf97631304169,2025-01-08T17:15:16.240000
CVE-2025-0240,0,0,3f146513e767102a40a759d24479305835c1d0f3abffd18a5a4fd7d8c408f270,2025-01-08T17:15:16.403000
CVE-2025-0241,0,0,de4460d398e9a978698b951541d871507b0033d391ba8312f623449de07c64a9,2025-01-07T16:15:38.767000
CVE-2025-0242,0,0,436b4010a0353e73e425adf71340fd210221fcb70ce54fa0e4ed498b8e2738c6,2025-01-08T17:15:16.563000
CVE-2025-0243,0,0,3385f5f4417e520856a6aa95edf9231cc97628ab73cc02078d726b2e70d59e2e,2025-01-08T17:15:16.723000
CVE-2025-0237,0,1,0b751bd6b34602b7f4016b4315ae89eb52ba9b85f7e29c77deaa4b8d978ed818,2025-01-09T09:15:08.027000
CVE-2025-0238,0,1,d61e0c1ab93e15f75affeb2cd81f13435188b17e117fb24770ef3eba2003f283,2025-01-09T09:15:08.197000
CVE-2025-0239,0,1,0f263f44b2da53877b60ef1934370203b8addac1a331dc64a04a2eff62174b0b,2025-01-09T09:15:08.357000
CVE-2025-0240,0,1,c69bbfd2c6326ce3090e62e372d341b68729615a4388aff2a4b92f2c232fb7c1,2025-01-09T09:15:08.513000
CVE-2025-0241,0,1,4c166f86574c263a185a4c3fecf418950105464db70810e33e44575c571c3963,2025-01-09T09:15:08.667000
CVE-2025-0242,0,1,6e3ffe62eab5a260ad145f0774aa93a7590007f7e30a1b6b7fd39c7d565b3e01,2025-01-09T09:15:08.763000
CVE-2025-0243,0,1,117a57037c84082e44064bbeb1055284d87eb96171b291191011e49dd59c7343,2025-01-09T09:15:08.917000
CVE-2025-0244,0,0,4dc39d4eb7e9626e46633620b63b126f4ca8c432d219058ffa0df86e8e17d0ee,2025-01-08T16:15:37.520000
CVE-2025-0245,0,0,17124b2bb78bf9f026108e77a44161cf6b567d6714acd6476cda81e3148b7689,2025-01-08T16:15:37.693000
CVE-2025-0246,0,0,f212da1e386aff9790e671db2401da03b9d2ebbeea4ee1b40e830ef0d58e3da6,2025-01-08T16:15:37.880000
CVE-2025-0247,0,0,19788955cc9b607e55d300602d56942e119086cfe1c51c09f21df249cc649c46,2025-01-08T15:15:21.033000
CVE-2025-0247,0,1,a4d940faacbcfb08843111a764fa700e1f1d7273a90fabf2269ce1d35477b80f,2025-01-09T09:15:09.067000
CVE-2025-0282,0,0,d61ebd3c832aef5272fa20364c759f17a80fd9cb0737dd97040687ac5893e46b,2025-01-09T02:00:01.633000
CVE-2025-0283,0,0,573fcb41d2dcbb5f422c0804f1f8b289f75a27c245f0e6d9cb198c03e2e8d415,2025-01-08T23:15:09.920000
CVE-2025-0291,0,0,e64e166dc7ec231b6921ab6e7b688950a3c44d4ac259882cc427bcb73fed1fd1,2025-01-08T20:15:29.353000
@ -276250,13 +276252,17 @@ CVE-2025-0331,0,0,9958f914d08798c9884ab9acadc5485c8bf3fa51831a1e1c33c7f651b24075
CVE-2025-0333,0,0,a8ab0819172da3f9274aae888663ae5efdae6b85957b7e6ef6d1d8934c8d1070,2025-01-09T05:15:08.453000
CVE-2025-0334,0,0,d7673bbf36f717e1769977669c1cac432662eda5ad40e6c872bcf27cf1dda6d8,2025-01-09T06:15:15.610000
CVE-2025-0335,0,0,d042e6fe1c6117fe3f290f44401326a621378ac168f8b7424ff902d7e887bcca,2025-01-09T06:15:15.850000
CVE-2025-0336,1,1,04ee389408992b67dce77194d9c70ae97feea3babbe755fc187c92619ca0ff05,2025-01-09T07:15:27.860000
CVE-2025-0339,1,1,448e19bb7bc365a2bf292fe61f3c734706db43a29b1ebde295ceec420afcd48b,2025-01-09T07:15:28.080000
CVE-2025-0340,1,1,4f2990fc81137574b4912409b11904dee7e92cbd62c572bffa83a92d2b3d6728,2025-01-09T07:15:28.260000
CVE-2025-0341,1,1,90d8993fb7474a58be910ed5ed3a12242101d69a099db0025c917dff8fc0565c,2025-01-09T08:15:30.060000
CVE-2025-0342,1,1,6d3bd167a05490c5aa5dbc9a6d3538c596245238d57a65fa83ecac443971921f,2025-01-09T08:15:30.310000
CVE-2025-0344,1,1,1715f04fd5095fb83a5a82a19a8fdfb8ee1ceb83adeb19a18037c35e0449a30c,2025-01-09T08:15:30.517000
CVE-2025-20033,1,1,6018e09e60bc36da724018ac20bc63bc1922bb37746fdb9e10624cea7c137ebf,2025-01-09T07:15:28.450000
CVE-2025-0336,0,0,04ee389408992b67dce77194d9c70ae97feea3babbe755fc187c92619ca0ff05,2025-01-09T07:15:27.860000
CVE-2025-0339,0,0,448e19bb7bc365a2bf292fe61f3c734706db43a29b1ebde295ceec420afcd48b,2025-01-09T07:15:28.080000
CVE-2025-0340,0,0,4f2990fc81137574b4912409b11904dee7e92cbd62c572bffa83a92d2b3d6728,2025-01-09T07:15:28.260000
CVE-2025-0341,0,0,90d8993fb7474a58be910ed5ed3a12242101d69a099db0025c917dff8fc0565c,2025-01-09T08:15:30.060000
CVE-2025-0342,0,0,6d3bd167a05490c5aa5dbc9a6d3538c596245238d57a65fa83ecac443971921f,2025-01-09T08:15:30.310000
CVE-2025-0344,0,0,1715f04fd5095fb83a5a82a19a8fdfb8ee1ceb83adeb19a18037c35e0449a30c,2025-01-09T08:15:30.517000
CVE-2025-0345,1,1,3f56e569c8daf7b06b0796fdfa20438b20d7fd91be6d3db3cb0cfe5e1b99fe14,2025-01-09T09:15:09.220000
CVE-2025-0346,1,1,5ef713c51f5d66e23ba323fef83a836926d709bf8afa5794ad9246d5b98392a7,2025-01-09T09:15:09.393000
CVE-2025-0347,1,1,6deecfeab5129f64e2a00007dc87253c44d21860263f71f54e4dc7b1cdd350f5,2025-01-09T10:15:07.170000
CVE-2025-0348,1,1,331eb1ff4b382b4fa4cded2d4eff33d4e1224a2775f1380fa27191f50e86e003,2025-01-09T10:15:07.700000
CVE-2025-20033,0,0,6018e09e60bc36da724018ac20bc63bc1922bb37746fdb9e10624cea7c137ebf,2025-01-09T07:15:28.450000
CVE-2025-20123,0,0,7f3b728d3f9cbfa875df0a45e50a08c953f805f15b1141475f4e31dfbed0e1d1,2025-01-08T16:15:38.150000
CVE-2025-20126,0,0,1585188395ef0aa5a894bbea6d526bdf238d58865dbcb187ac89434fb8c590b9,2025-01-08T19:15:38.553000
CVE-2025-20166,0,0,b11a57811b63f7d2208067ccc65af65bb9e1761d9a36811f745adce498b4e21f,2025-01-08T17:15:16.990000
@ -276356,8 +276362,8 @@ CVE-2025-22388,0,0,7b76724cf59a9c67f325da6bd673f3f15746ba083c4bc35be8117d11c0a0d
CVE-2025-22389,0,0,50d6eaab20c8259cde700c821ce2570def076c6cb2eb277d3379fa3f59f6550e,2025-01-04T03:15:07.580000
CVE-2025-22390,0,0,36805a833480d9f50dee34ab32e5ed9b2707017fd5287eb5a8abd68b1059bfbf,2025-01-06T17:15:48.170000
CVE-2025-22395,0,0,ac5db0ebc696fbb0c57e43b4ad48f0832ef7eb798546a738d8afe72cc61eda1e,2025-01-07T03:15:06.047000
CVE-2025-22445,1,1,892a817c9171cfb6ff1f1eb222a873d1fada74594dfce5a6314b9a0b173fbc06,2025-01-09T07:15:28.617000
CVE-2025-22449,1,1,94a3675582914b0870c0eee39028c6e7cffbb606301205022783a128835fd0ee,2025-01-09T07:15:28.777000
CVE-2025-22445,0,0,892a817c9171cfb6ff1f1eb222a873d1fada74594dfce5a6314b9a0b173fbc06,2025-01-09T07:15:28.617000
CVE-2025-22449,0,0,94a3675582914b0870c0eee39028c6e7cffbb606301205022783a128835fd0ee,2025-01-09T07:15:28.777000
CVE-2025-22500,0,0,8aa8d02f24b4f8f19adb445be3e34cd476c909361320155120249ca356361cc0,2025-01-07T17:15:33.657000
CVE-2025-22502,0,0,e47e75d81258d25ae0eee9a569a8a8d8f361d17aa85c464ced2971eda4004a93,2025-01-07T16:15:45.717000
CVE-2025-22503,0,0,402bf3ce290423b600660d8b85d86d2013a2c04e54ea441b78372503a408f2f7,2025-01-07T16:15:45.877000

Can't render this file because it is too large.