Auto-Update: 2025-02-20T17:00:56.445324+00:00

This commit is contained in:
cad-safe-bot 2025-02-20 17:04:25 +00:00
parent e7377c0ee4
commit 16c1480685
93 changed files with 4439 additions and 302 deletions

View File

@ -2,16 +2,55 @@
"id": "CVE-2020-10095",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T18:15:21.953",
"lastModified": "2025-02-19T18:15:21.953",
"lastModified": "2025-02-20T16:15:32.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Various Lexmark devices have CSRF that allows an attacker to modify the configuration of the device."
},
{
"lang": "es",
"value": "Varios dispositivos Lexmark tienen CSRF que permite a un atacante modificar la configuraci\u00f3n del dispositivo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://support.lexmark.com/alerts/",

View File

@ -2,16 +2,55 @@
"id": "CVE-2020-13481",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T19:15:10.630",
"lastModified": "2025-02-19T19:15:10.630",
"lastModified": "2025-02-20T16:15:32.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Lexmark products through 2020-05-25 allow XSS which allows an attacker to obtain session credentials and other sensitive information."
},
{
"lang": "es",
"value": "Ciertos productos Lexmark hasta 2020-05-25 permiten XSS que permite a un atacante obtener credenciales de sesi\u00f3n y otra informaci\u00f3n confidencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://support.lexmark.com/alerts/",

View File

@ -2,16 +2,55 @@
"id": "CVE-2020-35546",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T19:15:10.753",
"lastModified": "2025-02-19T19:15:10.753",
"lastModified": "2025-02-20T16:15:32.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Lexmark MX6500 LW75.JD.P296 and previous devices have Incorrect Access Control via the access control settings."
},
{
"lang": "es",
"value": "Lexmark MX6500 LW75.JD.P296 y los dispositivos anteriores tienen un control de acceso incorrecto a trav\u00e9s de la configuraci\u00f3n de control de acceso."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://support.lexmark.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-44583",
"sourceIdentifier": "audit@patchstack.com",
"published": "2022-11-18T23:15:28.680",
"lastModified": "2024-11-21T07:28:10.040",
"lastModified": "2025-02-20T15:15:10.123",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-552"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-21061",
"sourceIdentifier": "security@android.com",
"published": "2023-03-24T20:15:14.700",
"lastModified": "2024-11-21T07:42:05.357",
"lastModified": "2025-02-20T16:15:33.217",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-21067",
"sourceIdentifier": "security@android.com",
"published": "2023-03-24T20:15:14.873",
"lastModified": "2024-11-21T07:42:06.067",
"lastModified": "2025-02-20T16:15:33.510",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-21068",
"sourceIdentifier": "security@android.com",
"published": "2023-03-24T20:15:14.907",
"lastModified": "2024-11-21T07:42:06.187",
"lastModified": "2025-02-20T16:15:33.613",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22311",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-14T14:15:38.517",
"lastModified": "2024-11-21T07:44:30.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:02:08.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,87 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "01.00.00.3547",
"matchCriteriaId": "2B89B9F7-B599-4A97-9938-64D37065370C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd128gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EA3959A-A077-420F-9CF0-FCF926F78A1B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd128gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C49C3C48-9452-417D-91A3-6282A5DF564E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd256gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF7A9E1-9610-42F8-BE3C-50B6C70EC2CE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd256gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E29B5FFA-FD00-490D-9E33-2ADC23369773"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd512gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77357E64-833C-46E7-B84F-29F7ED3D0F31"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd512gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E373F80-B81E-4B7F-9407-DD918E39DA90"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27517",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-14T14:15:47.313",
"lastModified": "2024-11-21T07:53:04.653",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:10:10.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.3,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,181 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "01.00.00.3072",
"versionEndExcluding": "01.00.00.3547",
"matchCriteriaId": "EC0ABBD3-228C-4F02-8BC9-2545FC57E49A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd128gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EA3959A-A077-420F-9CF0-FCF926F78A1B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd128gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C49C3C48-9452-417D-91A3-6282A5DF564E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd256gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF7A9E1-9610-42F8-BE3C-50B6C70EC2CE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd256gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E29B5FFA-FD00-490D-9E33-2ADC23369773"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd512gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77357E64-833C-46E7-B84F-29F7ED3D0F31"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nma1xxd512gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E373F80-B81E-4B7F-9407-DD918E39DA90"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "02.00.00.3423",
"versionEndExcluding": "02.00.00.3915",
"matchCriteriaId": "3CA941AF-27A6-47B7-B2BC-1D9A88444664"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nmb1xxd128gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBED201B-A64E-441E-A952-B3C8C56F87C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nmb1xxd128gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29CD8FF9-DA6B-4293-8F4B-8B4A02C4C1E8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nmb1xxd256gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "905C0399-6E5D-4D42-AA3D-D0ECC9117D9A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nmb1xxd256gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E7380A6-CB51-4205-AAD7-AB75AB2638B5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nmb1xxd512gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A86746AA-047D-4F7F-BD7F-0D18BF47F5EE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nmb1xxd512gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A3BC795-DAA0-48C5-BEBC-4A96B4FD3D0F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "03.00.00.0302",
"versionEndExcluding": "03.00.00.0483",
"matchCriteriaId": "C5AB913F-BA30-4911-BC6F-083DFF14F9E6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nmc2xxd128gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D76D5AB-0CF5-40E5-8DA5-31E27F58F236"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nmc2xxd256gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "541DF110-3539-4F20-BAE9-039A969B1763"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:nmc2xxd512gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F1535ED-13DC-4C08-BA2D-E8BE50C4A6CD"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-46271",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T19:15:13.797",
"lastModified": "2025-02-19T19:15:13.797",
"lastModified": "2025-02-20T16:15:34.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Extreme Networks IQ Engine before 10.6r1a, and through 10.6r4 before 10.6r5, has a buffer overflow. This issue arises from the ah_webui service, which listens on TCP port 3009 by default."
},
{
"lang": "es",
"value": "Extreme Networks IQ Engine antes de 10.6R1A, y hasta 10.6R4 antes de 10.6R5, tiene un desbordamiento de b\u00fafer. Este problema surge del servicio Ah_Webui, que escucha en el puerto TCP 3009 de forma predeterminada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000115354&q=CVE-2023-46271",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51293",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T19:15:14.027",
"lastModified": "2025-02-19T19:15:14.027",
"lastModified": "2025-02-20T16:15:34.460",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Event Booking Calendar v4.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
},
{
"lang": "es",
"value": "La falta de limitaci\u00f3n de velocidad en las funciones 'Forgot Password', 'Email Settings' de PHPJabbers Event Booking Calendar v4.0 permite a los atacantes enviar una cantidad excesiva de correo electr\u00f3nico a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://packetstormsecurity.com/files/176495/PHPJabbers-Event-Booking-Calendar-4.0-Missing-Rate-Limiting.html",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51296",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T19:15:14.150",
"lastModified": "2025-02-19T19:15:14.150",
"lastModified": "2025-02-20T15:15:10.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Event Booking Calendar v4.0 is vulnerable to Cross-Site Scripting (XSS) in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" parameters which allows attackers to execute arbitrary code"
},
{
"lang": "es",
"value": "PHPJabbers Event Booking Calendar v4.0 es vulnerable a Cross-Site Scripting (XSS) en los par\u00e1metros \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" que permite a los atacantes ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176485",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51298",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T20:15:34.937",
"lastModified": "2025-02-19T20:15:34.937",
"lastModified": "2025-02-20T15:15:10.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Event Booking Calendar v4.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file."
},
{
"lang": "es",
"value": "PHPJabbers Event Booking Calendar v4.0 es afectado por una la vulnerabilidad de inyecci\u00f3n CSV que permite a un atacante ejecutar c\u00f3digo remoto. La vulnerabilidad existe debido a una validaci\u00f3n de entrada insuficiente en la secci\u00f3n Idiomas. Etiqueta cualquier campo de par\u00e1metros en Opciones del sistema que se utiliza para construir el archivo CSV."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1236"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://packetstormsecurity.com/files/176487/PHPJabbers-Event-Booking-Calendar-4.0-CSV-Injection.html",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51299",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T20:15:35.040",
"lastModified": "2025-02-19T20:15:35.040",
"lastModified": "2025-02-20T15:15:10.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Hotel Booking System v4.0 is vulnerable to HTML Injection in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\" parameters."
},
{
"lang": "es",
"value": "PHPJabbers Hotel Booking System v4.0 es vulnerable a la inyecci\u00f3n de HTML en los par\u00e1metros \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176488",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51300",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T21:15:14.727",
"lastModified": "2025-02-19T21:15:14.727",
"lastModified": "2025-02-20T15:15:10.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Hotel Booking System v4.0 is vulnerable to Cross-Site Scripting (XSS) vulnerabilities in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" parameters."
},
{
"lang": "es",
"value": "PHPJabbers Hotel Booking System v4.0 es afectado por una vulnerabilidades de Cross-Site Scripting (XSS) en los par\u00e1metros \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176488",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51301",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T21:15:14.867",
"lastModified": "2025-02-19T21:15:14.867",
"lastModified": "2025-02-20T15:15:10.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the \"Login Section, Forgot Email\" feature of PHPJabbers Hotel Booking System v4.0 allows attackers to send an excessive amount of reset requests for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
},
{
"lang": "es",
"value": "La falta de limitaci\u00f3n de velocidad en la funci\u00f3n \"Login Section, Forgot Email\" de HPJabbers Hotel Booking System v4.0 permite a los atacantes enviar una cantidad excesiva de solicitudes de restablecimiento para un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176486",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51302",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T21:15:14.980",
"lastModified": "2025-02-19T21:15:14.980",
"lastModified": "2025-02-20T15:15:11.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Hotel Booking System v4.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file."
},
{
"lang": "es",
"value": "PHPJabbers Hotel Booking System v4.0 es afectado por una la vulnerabilidad de inyecci\u00f3n de CSV, lo que permite a un atacante ejecutar c\u00f3digo remoto. La vulnerabilidad existe debido a una validaci\u00f3n de entrada insuficiente en la secci\u00f3n Idiomas. Etiqueta cualquier campo de par\u00e1metros en System Options que se utiliza para construir el archivo CSV."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1236"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://packetstormsecurity.com/files/176489/PHPJabbers-Hotel-Booking-System-4.0-CSV-Injection.html",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51303",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T21:15:15.097",
"lastModified": "2025-02-19T21:15:15.097",
"lastModified": "2025-02-20T15:15:11.333",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Event Ticketing System v1.0 is vulnerable to Multiple HTML Injection in the \"lid, name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\" parameters."
},
{
"lang": "es",
"value": "PHPJabbers Event Ticketing System v1.0 es vulnerable a m\u00faltiples inyecci\u00f3n HTML en los par\u00e1metros \"lid, name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176516",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-51305",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T23:15:09.567",
"lastModified": "2025-02-19T23:15:09.567",
"lastModified": "2025-02-20T15:15:11.507",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Car Park Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" parameters."
},
{
"lang": "es",
"value": "PHPJabbers Car Park Booking System v3.0 es vulnerable a m\u00faltiples Cross-Site Scripting (XSS) Almacenado en los par\u00e1metros \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176491",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51306",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:11.673",
"lastModified": "2025-02-20T15:15:11.673",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Event Ticketing System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"name, title\" parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176516",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/event-ticketing-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51308",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:11.793",
"lastModified": "2025-02-20T15:15:11.793",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Car Park Booking System v3.0 is vulnerable to Multiple HTML Injection in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\" parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176491",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51309",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:11.920",
"lastModified": "2025-02-20T15:15:11.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176492",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51310",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:12.050",
"lastModified": "2025-02-20T15:15:12.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176492",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51311",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:12.170",
"lastModified": "2025-02-20T15:15:12.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Car Park Booking System v3.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176494",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51312",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:12.293",
"lastModified": "2025-02-20T15:15:12.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Reservations menu, Schedule section date parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176493",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51313",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:12.437",
"lastModified": "2025-02-20T15:15:12.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file."
}
],
"metrics": {},
"references": [
{
"url": "http://packetstormsecurity.com/files/176498/PHPJabbers-Restaurant-Booking-System-3.0-CSV-Injection.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51314",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:12.563",
"lastModified": "2025-02-20T15:15:12.563",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Restaurant Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176496",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51315",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:12.680",
"lastModified": "2025-02-20T15:15:12.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"seat_name, plugin_sms_api_key, plugin_sms_country_code, title, name\" parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176493",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51316",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:12.810",
"lastModified": "2025-02-20T15:15:12.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Bus Reservation System v1.1 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176497",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/bus-reservation-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51317",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:34.600",
"lastModified": "2025-02-20T16:15:34.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Multiple HTML Injection in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\" parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176493",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51318",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:34.703",
"lastModified": "2025-02-20T16:15:34.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Bus Reservation System v1.1 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176499",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/bus-reservation-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51319",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:34.803",
"lastModified": "2025-02-20T16:15:34.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Bus Reservation System v1.1 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176500",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/bus-reservation-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51320",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:34.903",
"lastModified": "2025-02-20T16:15:34.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Night Club Booking Software v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176501",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/night-club-booking-software/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51321",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:35.007",
"lastModified": "2025-02-20T16:15:35.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Night Club Booking Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176502",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/night-club-booking-software/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51323",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:35.110",
"lastModified": "2025-02-20T16:15:35.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Shared Asset Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176503",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/shared-asset-booking-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51324",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:35.210",
"lastModified": "2025-02-20T16:15:35.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Shared Asset Booking System v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176504",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/shared-asset-booking-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51325",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:35.330",
"lastModified": "2025-02-20T16:15:35.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Shared Asset Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176505",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/shared-asset-booking-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51326",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:35.437",
"lastModified": "2025-02-20T16:15:35.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cleaning Business Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176506",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/cleaning-business-software/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51327",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:35.543",
"lastModified": "2025-02-20T16:15:35.543",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cleaning Business Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176506",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/cleaning-business-software/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51330",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:35.647",
"lastModified": "2025-02-20T16:15:35.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Cinema Booking System v1.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Now Showing menu \"date\" parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176508",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/cinema-booking-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51331",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:35.750",
"lastModified": "2025-02-20T16:15:35.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPJabbers Cleaning Business Software v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176509",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/cleaning-business-software/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-51332",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T16:15:35.850",
"lastModified": "2025-02-20T16:15:35.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Meeting Room Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstorm.news/files/id/176510",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpjabbers.com/meeting-room-booking-system/#sectionDemo",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10960",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T12:15:28.027",
"lastModified": "2025-02-12T12:15:28.027",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:26:54.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brizy:brizy:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.5",
"matchCriteriaId": "318CE83C-F93C-4B84-AACF-541CDB997487"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3222672/brizy/tags/2.6.5/editor/zip/archiver.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2f0c85f4-07ae-4a2b-bd82-93467e7d9325?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10977",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2024-11-14T13:15:04.023",
"lastModified": "2024-11-15T13:58:08.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:38:01.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
@ -49,12 +69,97 @@
"value": "CWE-348"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.21",
"matchCriteriaId": "433D59A0-8811-4DDB-A9F7-D85C62F905CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.17",
"matchCriteriaId": "380F8048-FBE5-4606-93A3-915CFD229317"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.14",
"matchCriteriaId": "FACF31C7-3B20-4BAE-A596-9C59D67406D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.9",
"matchCriteriaId": "DF12F1A2-3179-4DAC-B728-038B94954DC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0",
"versionEndExcluding": "16.5",
"matchCriteriaId": "353CBD91-FC28-4DA3-B79A-F4F4DC80FA93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:17.0:-:*:*:*:*:*:*",
"matchCriteriaId": "554F297F-6688-4242-9618-40A3A017D246"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "2012E2E6-9A7A-4EA8-AE7C-5CB3486CE9DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "354785D4-62F8-49C6-BFE6-D7AFEF7BE28F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "EB5B99AA-AEDF-4730-824E-3A09D47B19DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:17.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9C88EECA-C66E-4FCF-BA4A-7581516B2471"
}
]
}
]
}
],
"references": [
{
"url": "https://www.postgresql.org/support/security/CVE-2024-10977/",
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007"
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10978",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2024-11-14T13:15:04.217",
"lastModified": "2024-11-21T22:15:07.033",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:41:14.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
]
},
@ -49,20 +69,126 @@
"value": "CWE-266"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.21",
"matchCriteriaId": "433D59A0-8811-4DDB-A9F7-D85C62F905CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.17",
"matchCriteriaId": "380F8048-FBE5-4606-93A3-915CFD229317"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.14",
"matchCriteriaId": "FACF31C7-3B20-4BAE-A596-9C59D67406D8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.9",
"matchCriteriaId": "DF12F1A2-3179-4DAC-B728-038B94954DC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.0",
"versionEndExcluding": "16.5",
"matchCriteriaId": "353CBD91-FC28-4DA3-B79A-F4F4DC80FA93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:17.0:-:*:*:*:*:*:*",
"matchCriteriaId": "554F297F-6688-4242-9618-40A3A017D246"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "2012E2E6-9A7A-4EA8-AE7C-5CB3486CE9DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "354785D4-62F8-49C6-BFE6-D7AFEF7BE28F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "EB5B99AA-AEDF-4730-824E-3A09D47B19DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:postgresql:postgresql:17.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9C88EECA-C66E-4FCF-BA4A-7581516B2471"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
]
}
]
}
],
"references": [
{
"url": "https://www.postgresql.org/support/security/CVE-2024-10978/",
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007"
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00018.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.postgresql.org/message-id/173171334532.1547978.1518068370217143844%40wrigleys.postgresql.org",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12213",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:08.737",
"lastModified": "2025-02-12T10:15:08.737",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:08:26.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apusthemes:superio:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.2.76",
"matchCriteriaId": "A4A0A3BE-CD17-439E-8D5E-BB09F2FB6393"
}
]
}
]
}
],
"references": [
{
"url": "https://themeforest.net/item/superio-job-board-wordpress-theme/32180231",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7cdfce88-b6c2-4820-9d6f-446f61b9b596?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12296",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:10.230",
"lastModified": "2025-02-12T10:15:10.230",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:09:14.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apusthemes:superio:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.3",
"matchCriteriaId": "CE1F8192-5CDF-4141-84BE-843F20F4FB41"
}
]
}
]
}
],
"references": [
{
"url": "https://themeforest.net/item/superio-job-board-wordpress-theme/32180231",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dda2c437-8f41-480a-8816-2c07ab0eafa7?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12386",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T12:15:28.470",
"lastModified": "2025-02-12T12:15:28.470",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:29:39.023",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
@ -51,18 +71,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kevonadonis:wp_abstracts:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.7.4",
"matchCriteriaId": "3374C421-D69B-452C-B5B2-A2E6923D5108"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3238664/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/wp-abstracts-manuscripts-manager/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/efd27466-f68e-4d8a-a1ec-90dbb6ff126b?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12550",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-02-11T20:15:33.800",
"lastModified": "2025-02-11T20:15:33.800",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:05:43.313",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,10 +73,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1.1.2",
"matchCriteriaId": "D76CD6D0-3E8B-41E9-8517-0EA4A97B546A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1678/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13475",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:11.777",
"lastModified": "2025-02-12T10:15:11.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:10:58.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enituretechnology:small_package_quotes:*:*:*:*:ups:wordpress:*:*",
"versionEndExcluding": "4.5.17",
"matchCriteriaId": "44F7F55A-509C-4A87-82F2-687963772590"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3237693/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c62680b5-e9e0-497f-b957-9b223a623917?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13477",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T12:15:28.660",
"lastModified": "2025-02-12T12:15:28.660",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:30:34.457",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -51,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enituretechnology:ltl_freight_quotes:*:*:*:*:unishippers:wordpress:*:*",
"versionEndExcluding": "2.5.9",
"matchCriteriaId": "906F6C5E-C28C-4D74-8075-B1A68ADB7587"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ltl-freight-quotes-unishippers-edition/trunk/shipping-rules/shipping-rules-save.php#L84",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3237773/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7df452c9-4e73-40d7-88a3-d38ae1309d8f?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13480",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T12:15:28.840",
"lastModified": "2025-02-12T12:15:28.840",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:31:52.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enituretechnology:ltl_freight_quotes:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.4.2",
"matchCriteriaId": "5BD5C40E-CE22-4B19-B3E9-F339AF329837"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3238359%40ltl-freight-quotes-fedex-freight-edition&new=3238359%40ltl-freight-quotes-fedex-freight-edition&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9b6f7a3-83eb-4352-9db6-ab4b03241702?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13490",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:11.973",
"lastModified": "2025-02-12T10:15:11.973",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:14:27.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enituretechnology:ltl_freight_quotes:*:*:*:*:xpo:wordpress:*:*",
"versionEndExcluding": "4.3.8",
"matchCriteriaId": "764495F1-C5FC-4509-B77A-10FC58EA274A"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3235163",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8bcfbc26-9b5d-4df8-9f16-293734bd2805?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13531",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T10:15:12.317",
"lastModified": "2025-02-12T10:15:12.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:23:02.090",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enituretechnology:shipengine_shipping_quotes:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.8",
"matchCriteriaId": "4B0A0928-3B54-4E11-8610-4FD5A0F95917"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/shipengine-shipping-quotes/trunk/admin/tab/shipping-rules/shipping-rules-save.php#L77",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cbb7bdcf-9f93-4c86-a4b3-ad5aaf7521b0?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13532",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-12T12:15:29.023",
"lastModified": "2025-02-12T12:15:29.023",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:46:25.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -51,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enituretechnology:small_package_quotes:*:*:*:*:purolator:wordpress:*:*",
"versionEndExcluding": "3.6.5",
"matchCriteriaId": "54F4E712-F24B-4EB8-9434-4E4D4D14AC7D"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/small-package-quotes-purolator-edition/trunk/warehouse-dropship/wild/includes/wild-delivery-save.php#L237",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/small-package-quotes-purolator-edition/trunk/warehouse-dropship/wild/includes/wild-delivery-save.php#L346",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/813fe9d2-913c-4e04-bcb7-443eef95c62e?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13543",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-02-11T06:15:19.373",
"lastModified": "2025-02-11T15:15:16.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:09:08.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,10 +59,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amini7:zarinpal_paid_download:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.3",
"matchCriteriaId": "CD1F1B65-28B6-4ECB-B626-D35750D718B4"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/04a545c4-75d3-4672-8530-00bb879991ca/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13544",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-02-11T06:15:19.650",
"lastModified": "2025-02-11T16:15:38.953",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:11:08.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,10 +59,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amini7:zarinpal_paid_download:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.3",
"matchCriteriaId": "CD1F1B65-28B6-4ECB-B626-D35750D718B4"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/91884263-62a7-436e-b19f-682b1aeb37d6/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13570",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-02-11T06:15:19.757",
"lastModified": "2025-02-11T16:15:39.090",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:12:22.823",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,14 +59,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unalignedcode:stray_random_quotes:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.9.9",
"matchCriteriaId": "A79DB7A8-270F-45E5-89C6-0A88CEDBB4E5"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/26019036-f7e4-4ef5-85d4-7d5fda18823e/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/26019036-f7e4-4ef5-85d4-7d5fda18823e/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13612",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-01T13:15:21.320",
"lastModified": "2025-02-01T13:15:21.320",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:51:45.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,26 +71,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordplus:better_messages:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "8A9095B1-8B7F-4903-AC23-8F0EEDBD312B"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/bp-better-messages/trunk/inc/shortcodes.php#L125",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/bp-better-messages/trunk/inc/shortcodes.php#L127",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/bp-better-messages/trunk/inc/shortcodes.php#L84",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3228965/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/169a857f-1ae0-40f6-8a34-10c573af59c5?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13813",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-02-11T16:15:39.220",
"lastModified": "2025-02-11T16:15:39.220",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:56:04.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:secure_access_client:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.8",
"matchCriteriaId": "8EAE3670-4566-437C-80BF-2F116C93F06F"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13842",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-02-11T16:15:39.513",
"lastModified": "2025-02-11T16:15:39.513",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:55:29.770",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.5,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
@ -51,10 +71,97 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*",
"versionEndIncluding": "22.7",
"matchCriteriaId": "82432B1B-F50E-4D85-B4B5-6C91923F1BF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
"matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
"matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
"matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
"matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
"matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*",
"versionEndIncluding": "22.7",
"matchCriteriaId": "DA65DC97-7E46-4C59-B8D4-E4EB4EDCD735"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "8D24A8DB-D697-4C60-935D-B08EE36861CB"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13843",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-02-11T16:15:39.667",
"lastModified": "2025-02-11T16:15:39.667",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:55:03.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.5,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
@ -51,10 +71,112 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*",
"versionEndIncluding": "22.7",
"matchCriteriaId": "82432B1B-F50E-4D85-B4B5-6C91923F1BF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
"matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
"matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
"matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
"matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
"matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
"matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*",
"matchCriteriaId": "A08BAF98-7F05-4596-8BFC-91F1A79D3BD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.5:*:*:*:*:*:*",
"matchCriteriaId": "40717D97-A062-49C4-B105-C22AAC3A206A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*",
"versionEndIncluding": "22.7",
"matchCriteriaId": "DA65DC97-7E46-4C59-B8D4-E4EB4EDCD735"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "8D24A8DB-D697-4C60-935D-B08EE36861CB"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21687",
"sourceIdentifier": "security@atlassian.com",
"published": "2024-07-16T21:15:10.257",
"lastModified": "2024-11-21T08:54:51.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:20:02.967",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV30": [
{
"source": "security@atlassian.com",
@ -39,22 +61,107 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.0.4",
"matchCriteriaId": "69A262E8-0C7E-4587-80DB-AEB806FDBB36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1.0",
"versionEndIncluding": "9.1.3",
"matchCriteriaId": "B2E98284-0236-4BBE-9156-42BF39807DC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.2.0",
"versionEndExcluding": "9.2.16",
"matchCriteriaId": "858999DA-5F02-4F34-9776-C17BC35394AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.3.0",
"versionEndIncluding": "9.3.6",
"matchCriteriaId": "0323B84C-7B7B-4FD2-A69B-8B0476543E32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.4.0",
"versionEndIncluding": "9.4.3",
"matchCriteriaId": "F7848670-8093-4AD5-940F-33CCA7B085D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.5.0",
"versionEndIncluding": "9.5.4",
"matchCriteriaId": "F092DC7A-32B5-4B7C-819B-A7C05D25174C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.6.0",
"versionEndExcluding": "9.6.4",
"matchCriteriaId": "44EB1487-771C-479E-B986-7F1B582B1FB1"
}
]
}
]
}
],
"references": [
{
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917",
"source": "security@atlassian.com"
"source": "security@atlassian.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jira.atlassian.com/browse/BAM-25822",
"source": "security@atlassian.com"
"source": "security@atlassian.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jira.atlassian.com/browse/BAM-25822",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21689",
"sourceIdentifier": "security@atlassian.com",
"published": "2024-08-20T10:15:04.103",
"lastModified": "2024-08-20T15:44:20.567",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:23:21.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@atlassian.com",
@ -39,14 +61,60 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1.0",
"versionEndExcluding": "9.2.17",
"matchCriteriaId": "B5EC3F5F-AFF0-4FAD-AFC9-4BE967319F82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.3.0",
"versionEndExcluding": "9.6.5",
"matchCriteriaId": "52F810C2-8E16-4B1A-B426-54CE82067349"
}
]
}
]
}
],
"references": [
{
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1431535667",
"source": "security@atlassian.com"
"source": "security@atlassian.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://jira.atlassian.com/browse/BAM-25858",
"source": "security@atlassian.com"
"source": "security@atlassian.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2472",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-14T10:15:09.403",
"lastModified": "2024-11-21T09:09:49.730",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:28:10.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,30 +39,80 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:latepoint:latepoint:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.9.91",
"matchCriteriaId": "75F8EEAD-23DD-4963-AD95-5FAE483DD933"
}
]
}
]
}
],
"references": [
{
"url": "https://aramhairchitects.nl/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Not Applicable"
]
},
{
"url": "https://wpdocs.latepoint.com/changelog/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6215fa9f-06bc-4dc8-b1f5-a3bb75749f1d?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://aramhairchitects.nl/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
},
{
"url": "https://wpdocs.latepoint.com/changelog/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6215fa9f-06bc-4dc8-b1f5-a3bb75749f1d?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-37361",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2025-02-20T00:15:19.507",
"lastModified": "2025-02-20T00:15:19.507",
"lastModified": "2025-02-20T15:15:13.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)\n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.\n\n\n\n\u00a0\n\n\n\nWhen developers place no restrictions on \"gadget chains,\" or series of instances and method invocations that can self-execute during the deserialization process (i.e., before the object is returned to the caller), it is sometimes possible for attackers to leverage them to perform unauthorized actions."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n deserializa datos no confiables sin verificar suficientemente que los datos resultantes sean v\u00e1lidos. (CWE-502) Las versiones de Hitachi Vantara Pentaho Business Analytics Server anteriores a 10.2.0.0 y 9.3.0.9, incluida la 8.3.x, deserializan datos JSON no confiables sin restringir el analizador a clases y m\u00e9todos aprobados. Cuando los desarrolladores no imponen restricciones a las \"gadget chains\", o series de instancias e invocaciones de m\u00e9todos que pueden autoejecutarse durante el proceso de deserializaci\u00f3n (es decir, antes de que el objeto se devuelva al autor de la llamada), a veces es posible que los atacantes las aprovechen para realizar acciones no autorizadas."
}
],
"metrics": {
@ -49,7 +53,7 @@
],
"references": [
{
"url": "https://support.pentaho.com/hc/en-us/articles/34298351866893--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-37360",
"url": "https://support.pentaho.com/hc/en-us/articles/34299135441805--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Deserialization-of-Untrusted-Data-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-37361",
"source": "security.vulnerabilities@hitachivantara.com"
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47073",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-07T18:15:17.417",
"lastModified": "2024-11-21T17:15:16.160",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:20:40.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
@ -73,10 +95,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.10.2",
"matchCriteriaId": "20187B9D-2856-4B83-A276-B880611ACA6E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dataease/dataease/security/advisories/GHSA-5jr4-wrm2-xj36",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47908",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-02-11T16:15:40.247",
"lastModified": "2025-02-11T16:15:40.247",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:57:06.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:cloud_services_appliance:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.5",
"matchCriteriaId": "7E3F8B56-228C-4AE0-9521-16EA5FC3463E"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-47908-CVE-2024-11771",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52295",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-13T16:15:19.550",
"lastModified": "2024-11-21T15:15:32.900",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:21:26.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -73,14 +95,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.10.2",
"matchCriteriaId": "20187B9D-2856-4B83-A276-B880611ACA6E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dataease/dataease/commit/e755248d59543bcd668ace495f293ff735fa82e9",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/dataease/dataease/security/advisories/GHSA-45v9-gfcv-xcq6",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55952",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-18T19:15:11.933",
"lastModified": "2024-12-18T19:15:11.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:22:50.240",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,28 +59,85 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.18.27",
"matchCriteriaId": "C3CA3161-CA4A-4C07-9074-2D321FE954EA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dataease/dataease/commit/0db4872a52eccf6e83dd9359aa05db52dd580ec1",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/dataease/dataease/security/advisories/GHSA-w8qm-xw38-93qw",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55953",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-18T19:15:12.067",
"lastModified": "2024-12-18T19:15:12.067",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:25:07.667",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
@ -73,14 +95,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.18.27",
"matchCriteriaId": "C3CA3161-CA4A-4C07-9074-2D321FE954EA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dataease/dataease/commit/0db4872a52eccf6e83dd9359aa05db52dd580ec1",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/dataease/dataease/security/advisories/GHSA-mrf3-9q84-rcmf",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56511",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-10T16:15:29.510",
"lastModified": "2025-01-10T16:15:29.510",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:26:58.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,24 +59,78 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-289"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.10.4",
"matchCriteriaId": "7335184A-8414-470A-98CB-6500DC6EE35E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dataease/dataease/security/advisories/GHSA-9f69-p73j-m73x",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-57401",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T15:15:13.347",
"lastModified": "2025-02-20T15:15:13.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Uniclare Student portal v.2 and before allows a remote attacker to execute arbitrary code via the Forgot Password function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/aksingh82/CVE-2024-57401",
"source": "cve@mitre.org"
},
{
"url": "https://studentportal.universitysolutions.in/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8911",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-08T09:15:19.077",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:30:18.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:latepoint:latepoint:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.0.12",
"matchCriteriaId": "243AB190-F020-4345-9D31-3480C00B1A2D"
}
]
}
]
}
],
"references": [
{
"url": "https://wpdocs.latepoint.com/changelog/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c9a23a3-5eb5-4f5b-bf32-c9d163426f29?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8943",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-08T09:15:19.343",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:30:59.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,50 @@
"value": "CWE-288"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:latepoint:latepoint:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.0.13",
"matchCriteriaId": "5B0BF9AF-25F7-4448-90C3-66CB9870A1D0"
}
]
}
]
}
],
"references": [
{
"url": "https://wpdocs.latepoint.com/changelog/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bac8c35b-2afa-4347-b86e-2f16db19a4d3?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0161",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-02-20T16:15:36.333",
"lastModified": "2025-02-20T16:15:36.333",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Access Appliance 10.0.0.0 through 10.0.0.9 and 11.0.0.0 could allow a local user to execute arbitrary code due to improper restrictions on code generation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7183788",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1176",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-11T06:15:22.433",
"lastModified": "2025-02-11T06:15:22.433",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:40:56.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,6 +63,26 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -124,34 +144,77 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
"matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04"
}
]
}
]
}
],
"references": [
{
"url": "https://sourceware.org/bugzilla/attachment.cgi?id=15913",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32636",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
},
{
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.295079",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.295079",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.495329",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.gnu.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1177",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-11T06:15:22.623",
"lastModified": "2025-02-11T06:15:22.623",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:58:50.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -111,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -122,24 +142,65 @@
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xunruicms:xunruicms:4.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "17063A98-8DAA-4F84-AD21-FE9C70F158A3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/stevenchen0x01/CVE2/blob/main/cve2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link",
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.295080",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.295080",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.495366",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1189",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-02-12T10:15:14.540",
"lastModified": "2025-02-12T10:15:14.540",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-20T16:24:17.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -111,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -122,28 +142,72 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4"
}
]
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/takakie/CVE/blob/main/cve_2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.295095",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.295095",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.496452",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,110 @@
{
"id": "CVE-2025-20059",
"sourceIdentifier": "responsible-disclosure@pingidentity.com",
"published": "2025-02-20T15:15:13.957",
"lastModified": "2025-02-20T15:15:13.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Relative Path Traversal vulnerability in Ping Identity PingAM Java Policy Agent allows Parameter Injection.This issue affects PingAM Java Policy Agent: through 5.10.3, through 2023.11.1, through 2024.9."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "responsible-disclosure@pingidentity.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.2,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "responsible-disclosure@pingidentity.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
}
],
"references": [
{
"url": "https://backstage.forgerock.com/knowledge/advisories/article/a61848355",
"source": "responsible-disclosure@pingidentity.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22467",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-02-11T16:15:50.840",
"lastModified": "2025-02-11T16:15:50.840",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:53:06.133",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,91 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*",
"versionEndIncluding": "22.7",
"matchCriteriaId": "82432B1B-F50E-4D85-B4B5-6C91923F1BF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
"matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
"matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
"matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
"matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
"matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
"matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
"matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
"matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
"matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*",
"matchCriteriaId": "A08BAF98-7F05-4596-8BFC-91F1A79D3BD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.5:*:*:*:*:*:*",
"matchCriteriaId": "40717D97-A062-49C4-B105-C22AAC3A206A"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24011",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-21T16:15:14.760",
"lastModified": "2025-01-21T16:15:14.760",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:44:29.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,98 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0.0",
"versionEndExcluding": "14.3.2",
"matchCriteriaId": "1D80F7E9-B08B-4634-87DB-72C6772B3458"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0.0",
"versionEndExcluding": "15.1.2",
"matchCriteriaId": "98EFFDE3-BE84-4F6C-B28B-42EE448FA462"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/559c6c9f312df1d6eb1bde82c4b81c0896da6382",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/839b6816f2ae3e5f54459a0f09dad6b17e2d1e07",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-hmg4-wwm5-p999",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24012",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-21T16:15:14.923",
"lastModified": "2025-01-21T16:15:14.923",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T16:45:15.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0.0",
"versionEndExcluding": "14.3.2",
"matchCriteriaId": "1D80F7E9-B08B-4634-87DB-72C6772B3458"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0.0",
"versionEndExcluding": "15.1.2",
"matchCriteriaId": "98EFFDE3-BE84-4F6C-B28B-42EE448FA462"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/d4f8754f933895b3a329296e25ddea6f84a0aea2",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-wv8v-rmw2-25wc",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24896",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-11T16:15:51.477",
"lastModified": "2025-02-11T16:15:51.477",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-20T15:48:37.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -51,14 +71,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:misskey:misskey:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.109.0",
"versionEndIncluding": "2025.1.0",
"matchCriteriaId": "1CD22A7E-7810-47A9-8B23-6783D9863694"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/misskey-dev/misskey/commit/ba9f295ef2bf31cc90fa587e20b9a7655b7a1824",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/misskey-dev/misskey/security/advisories/GHSA-w98m-j6hq-cwjm",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25901",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-13T16:16:50.180",
"lastModified": "2025-02-18T14:57:24.510",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-20T15:15:14.380",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
@ -88,6 +118,14 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_5.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25942",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T23:15:15.310",
"lastModified": "2025-02-19T23:15:15.310",
"lastModified": "2025-02-20T15:15:14.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the mp4fragment tool when processing invalid files. Specifically, memory allocated in SampleArray::SampleArray in Mp4Fragment.cpp is not properly released."
},
{
"lang": "es",
"value": "Un problema en Bento4 V1.6.0-641 permite a un atacante obtener informaci\u00f3n confidencial a trav\u00e9s de la herramienta MP4Fragment al procesar archivos no v\u00e1lidos. Espec\u00edficamente, la memoria asignada en SamplearRay :: SamplearRay en MP4Fragment.cpp no ??se libera correctamente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/axiomatic-systems/Bento4/issues/993",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25943",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T23:15:15.417",
"lastModified": "2025-02-19T23:15:15.417",
"lastModified": "2025-02-20T15:15:14.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the AP4_Stz2Atom::AP4_Stz2Atom component located in Ap4Stz2Atom.cpp."
},
{
"lang": "es",
"value": "La vulnerabilidad del desbordamiento del b\u00fafer en Bento4 v.1.6.0-641 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente AP4_STZ2ATOM :: AP4_STZ2ATOM ubicado en AP4STZ2ATOM.CPP."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/axiomatic-systems/Bento4/issues/993",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25944",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T23:15:15.530",
"lastModified": "2025-02-19T23:15:15.530",
"lastModified": "2025-02-20T15:15:14.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the Ap4RtpAtom.cpp, specifically in AP4_RtpAtom::AP4_RtpAtom, during the execution of mp4fragment with a crafted MP4 input file."
},
{
"lang": "es",
"value": "La vulnerabilidad de desbordamiento de b\u00fafer en Bento4 v.1.6.0-641 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de Ap4RtpAtom.cpp, espec\u00edficamente en AP4_RtpAtom::AP4_RtpAtom, durante la ejecuci\u00f3n de mp4fragment con un archivo de entrada MP4 manipulado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/axiomatic-systems/Bento4/issues/993",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25945",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T23:15:15.630",
"lastModified": "2025-02-19T23:15:15.630",
"lastModified": "2025-02-20T15:15:15.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the Mp4Fragment.cpp and in AP4_DescriptorFactory::CreateDescriptorFromStream at Ap4DescriptorFactory.cpp."
},
{
"lang": "es",
"value": "Un problema en Bento4 V1.6.0-641 permite que un atacante obtenga informaci\u00f3n confidencial a trav\u00e9s del mp4fragment.cpp y en ap4_descriptorFactory :: createscriptorFromStream en ap4descriptorFactory.cpp."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/axiomatic-systems/Bento4/issues/993",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25946",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T23:15:15.743",
"lastModified": "2025-02-19T23:15:15.743",
"lastModified": "2025-02-20T15:15:15.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Bento4 v1.6.0-641 allows an attacker to cause a memory leak via Ap4Marlin.cpp and Ap4Processor.cpp, specifically in AP4_MarlinIpmpEncryptingProcessor::Initialize and AP4_Processor::Process, during the execution of mp4encrypt with a specially crafted MP4 input file."
},
{
"lang": "es",
"value": "Un problema en Bento4 v1.6.0-641 permite a un atacante provocar una p\u00e9rdida de memoria a trav\u00e9s de Ap4Marlin.cpp y Ap4Processor.cpp, espec\u00edficamente en AP4_MarlinIpmpEncryptingProcessor::Initialize y AP4_Processor::Process, durante la ejecuci\u00f3n de mp4encrypt con un archivo de entrada MP4 especialmente manipulado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/axiomatic-systems/Bento4/issues/994",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-25947",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-19T23:15:15.850",
"lastModified": "2025-02-19T23:15:15.850",
"lastModified": "2025-02-20T15:15:15.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Bento4 v1.6.0-641 allows an attacker to trigger a segmentation fault via Ap4Atom.cpp, specifically in AP4_AtomParent::RemoveChild, during the execution of mp4encrypt with a specially crafted MP4 input file."
},
{
"lang": "es",
"value": "Un problema en Bento4 v1.6.0-641 permite que un atacante active una falla de segmentaci\u00f3n a trav\u00e9s de ap4atom.cpp, espec\u00edficamente en ap4_atomparent :: removechild, durante la ejecuci\u00f3n de mp4Encrypt con un archivo de entrada especialmente manipulado MP4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-665"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/axiomatic-systems/Bento4/issues/994",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-20T15:01:53.624408+00:00
2025-02-20T17:00:56.445324+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-20T14:15:33.627000+00:00
2025-02-20T16:51:45.987000+00:00
```
### Last Data Feed Release
@ -33,20 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
281894
281920
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `26`
- [CVE-2025-1039](CVE-2025/CVE-2025-10xx/CVE-2025-1039.json) (`2025-02-20T13:15:08.387`)
- [CVE-2023-51308](CVE-2023/CVE-2023-513xx/CVE-2023-51308.json) (`2025-02-20T15:15:11.793`)
- [CVE-2023-51309](CVE-2023/CVE-2023-513xx/CVE-2023-51309.json) (`2025-02-20T15:15:11.920`)
- [CVE-2023-51310](CVE-2023/CVE-2023-513xx/CVE-2023-51310.json) (`2025-02-20T15:15:12.050`)
- [CVE-2023-51311](CVE-2023/CVE-2023-513xx/CVE-2023-51311.json) (`2025-02-20T15:15:12.170`)
- [CVE-2023-51312](CVE-2023/CVE-2023-513xx/CVE-2023-51312.json) (`2025-02-20T15:15:12.293`)
- [CVE-2023-51313](CVE-2023/CVE-2023-513xx/CVE-2023-51313.json) (`2025-02-20T15:15:12.437`)
- [CVE-2023-51314](CVE-2023/CVE-2023-513xx/CVE-2023-51314.json) (`2025-02-20T15:15:12.563`)
- [CVE-2023-51315](CVE-2023/CVE-2023-513xx/CVE-2023-51315.json) (`2025-02-20T15:15:12.680`)
- [CVE-2023-51316](CVE-2023/CVE-2023-513xx/CVE-2023-51316.json) (`2025-02-20T15:15:12.810`)
- [CVE-2023-51317](CVE-2023/CVE-2023-513xx/CVE-2023-51317.json) (`2025-02-20T16:15:34.600`)
- [CVE-2023-51318](CVE-2023/CVE-2023-513xx/CVE-2023-51318.json) (`2025-02-20T16:15:34.703`)
- [CVE-2023-51319](CVE-2023/CVE-2023-513xx/CVE-2023-51319.json) (`2025-02-20T16:15:34.803`)
- [CVE-2023-51320](CVE-2023/CVE-2023-513xx/CVE-2023-51320.json) (`2025-02-20T16:15:34.903`)
- [CVE-2023-51321](CVE-2023/CVE-2023-513xx/CVE-2023-51321.json) (`2025-02-20T16:15:35.007`)
- [CVE-2023-51323](CVE-2023/CVE-2023-513xx/CVE-2023-51323.json) (`2025-02-20T16:15:35.110`)
- [CVE-2023-51324](CVE-2023/CVE-2023-513xx/CVE-2023-51324.json) (`2025-02-20T16:15:35.210`)
- [CVE-2023-51325](CVE-2023/CVE-2023-513xx/CVE-2023-51325.json) (`2025-02-20T16:15:35.330`)
- [CVE-2023-51326](CVE-2023/CVE-2023-513xx/CVE-2023-51326.json) (`2025-02-20T16:15:35.437`)
- [CVE-2023-51327](CVE-2023/CVE-2023-513xx/CVE-2023-51327.json) (`2025-02-20T16:15:35.543`)
- [CVE-2023-51330](CVE-2023/CVE-2023-513xx/CVE-2023-51330.json) (`2025-02-20T16:15:35.647`)
- [CVE-2023-51331](CVE-2023/CVE-2023-513xx/CVE-2023-51331.json) (`2025-02-20T16:15:35.750`)
- [CVE-2023-51332](CVE-2023/CVE-2023-513xx/CVE-2023-51332.json) (`2025-02-20T16:15:35.850`)
- [CVE-2024-57401](CVE-2024/CVE-2024-574xx/CVE-2024-57401.json) (`2025-02-20T15:15:13.347`)
- [CVE-2025-0161](CVE-2025/CVE-2025-01xx/CVE-2025-0161.json) (`2025-02-20T16:15:36.333`)
- [CVE-2025-20059](CVE-2025/CVE-2025-200xx/CVE-2025-20059.json) (`2025-02-20T15:15:13.957`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `65`
- [CVE-2024-21689](CVE-2024/CVE-2024-216xx/CVE-2024-21689.json) (`2025-02-20T15:23:21.377`)
- [CVE-2024-2472](CVE-2024/CVE-2024-24xx/CVE-2024-2472.json) (`2025-02-20T15:28:10.360`)
- [CVE-2024-37361](CVE-2024/CVE-2024-373xx/CVE-2024-37361.json) (`2025-02-20T15:15:13.190`)
- [CVE-2024-47073](CVE-2024/CVE-2024-470xx/CVE-2024-47073.json) (`2025-02-20T16:20:40.547`)
- [CVE-2024-47908](CVE-2024/CVE-2024-479xx/CVE-2024-47908.json) (`2025-02-20T15:57:06.850`)
- [CVE-2024-52295](CVE-2024/CVE-2024-522xx/CVE-2024-52295.json) (`2025-02-20T16:21:26.323`)
- [CVE-2024-55952](CVE-2024/CVE-2024-559xx/CVE-2024-55952.json) (`2025-02-20T16:22:50.240`)
- [CVE-2024-55953](CVE-2024/CVE-2024-559xx/CVE-2024-55953.json) (`2025-02-20T16:25:07.667`)
- [CVE-2024-56511](CVE-2024/CVE-2024-565xx/CVE-2024-56511.json) (`2025-02-20T16:26:58.487`)
- [CVE-2024-8911](CVE-2024/CVE-2024-89xx/CVE-2024-8911.json) (`2025-02-20T15:30:18.643`)
- [CVE-2024-8943](CVE-2024/CVE-2024-89xx/CVE-2024-8943.json) (`2025-02-20T15:30:59.567`)
- [CVE-2025-1176](CVE-2025/CVE-2025-11xx/CVE-2025-1176.json) (`2025-02-20T16:40:56.790`)
- [CVE-2025-1177](CVE-2025/CVE-2025-11xx/CVE-2025-1177.json) (`2025-02-20T15:58:50.097`)
- [CVE-2025-1189](CVE-2025/CVE-2025-11xx/CVE-2025-1189.json) (`2025-02-20T16:24:17.783`)
- [CVE-2025-22467](CVE-2025/CVE-2025-224xx/CVE-2025-22467.json) (`2025-02-20T15:53:06.133`)
- [CVE-2025-24011](CVE-2025/CVE-2025-240xx/CVE-2025-24011.json) (`2025-02-20T16:44:29.017`)
- [CVE-2025-24012](CVE-2025/CVE-2025-240xx/CVE-2025-24012.json) (`2025-02-20T16:45:15.377`)
- [CVE-2025-24896](CVE-2025/CVE-2025-248xx/CVE-2025-24896.json) (`2025-02-20T15:48:37.877`)
- [CVE-2025-25901](CVE-2025/CVE-2025-259xx/CVE-2025-25901.json) (`2025-02-20T15:15:14.380`)
- [CVE-2025-25942](CVE-2025/CVE-2025-259xx/CVE-2025-25942.json) (`2025-02-20T15:15:14.587`)
- [CVE-2025-25943](CVE-2025/CVE-2025-259xx/CVE-2025-25943.json) (`2025-02-20T15:15:14.743`)
- [CVE-2025-25944](CVE-2025/CVE-2025-259xx/CVE-2025-25944.json) (`2025-02-20T15:15:14.900`)
- [CVE-2025-25945](CVE-2025/CVE-2025-259xx/CVE-2025-25945.json) (`2025-02-20T15:15:15.073`)
- [CVE-2025-25946](CVE-2025/CVE-2025-259xx/CVE-2025-25946.json) (`2025-02-20T15:15:15.227`)
- [CVE-2025-25947](CVE-2025/CVE-2025-259xx/CVE-2025-25947.json) (`2025-02-20T15:15:15.530`)
## Download and Usage

View File

@ -145359,7 +145359,7 @@ CVE-2020-10091,0,0,0023df9918fdadf5afde7a589c871143ff25422b0de5b843dd37446810a20
CVE-2020-10092,0,0,bed5d552f5b0bb036c3eba1f155fae926f11ff2232ff3d62a715ff4a0ef59ea4,2024-11-21T04:54:47.620000
CVE-2020-10093,0,0,8d0aacd8361af89ed8fce3d23dd783fc6ebd0d8701df0b06ae901731b7ad72e2,2024-11-21T04:54:47.750000
CVE-2020-10094,0,0,6beba78c56501a731d17d4bafa1b7bfd29c7992446387d70f96b80c08094f2cd,2024-11-21T04:54:47.943000
CVE-2020-10095,0,0,08f5a92f213899508322e9e450a4a375c976f643d6148c73e535e6041d18ea74,2025-02-19T18:15:21.953000
CVE-2020-10095,0,1,6e2cb772a320574510998ddad9ce8e0be81b33039e5cca2cfff813da71474a90,2025-02-20T16:15:32.050000
CVE-2020-10096,0,0,83bee2203a7f767077f6e40b91b5e7f86c8349ada403a759a945e38e30f5b09d,2024-11-21T04:54:48.140000
CVE-2020-10097,0,0,b53a137dcc84c6f9a450665caecc8824e07d3b31ad927277cb99bd9e9b8f13c6,2024-11-21T04:54:48.277000
CVE-2020-10098,0,0,f339d753f3504f60ee2bba806202c760ab227ba9d95ed2b4ebdd071aab6eee53,2024-11-21T04:54:48.413000
@ -148500,7 +148500,7 @@ CVE-2020-13474,0,0,74c4914a43840fa6e12dd2b53c69ece53ee5a95a7a94ae3930fd8e8a2420f
CVE-2020-13476,0,0,cf0a65f58de6a051d6c0e19448011654ef686aa415974f52eecd957162dfb0bb,2024-11-21T05:01:21.103000
CVE-2020-1348,0,0,a9b6f338f457c1b2fb5fb90f4dd043111447cbd66f8ac00dfb2af910a3226e23,2024-11-21T05:10:17.980000
CVE-2020-13480,0,0,5b25db3b1580aa288920d42b9b54622f48b7bf339d5a2131430bb02df62f2c06,2024-11-21T05:01:21.253000
CVE-2020-13481,0,0,6de53c6fade997b4104b77543a0260f7f7b7c46a5c8971e19c7194d44ace8af4,2025-02-19T19:15:10.630000
CVE-2020-13481,0,1,0f519cd7a7f26e98c6f0bb00022a093ebb9314726065b47afe6705bf77f67a6f,2025-02-20T16:15:32.720000
CVE-2020-13482,0,0,c3adf851d39e5a118e124354d5ac6f55d29bdc276513f621b483678ff1a7566e,2024-11-21T05:01:21.413000
CVE-2020-13483,0,0,ee2229aa912f53fce6524ec444822b1c650cad80395874d5fb423ba8ff8fa71f,2024-11-21T05:01:21.573000
CVE-2020-13484,0,0,53f1e472880fa0d80a8ad749380a006e55911a59405653282e32e67c54cafd0e,2024-11-21T05:01:21.727000
@ -158513,7 +158513,7 @@ CVE-2020-35540,0,0,6bd64b059b520580fc1288131d694e2faf21edb8f793d207b450f97b8fdf5
CVE-2020-35541,0,0,8d5365eb0cabd9fb3bbef386a7a8573f0770d7f02e50738d63f9bc34f5836ae4,2023-11-07T03:21:58.650000
CVE-2020-35542,0,0,cf77cdeac798a3a257ffcb234660d4518d214cb4498ec8c17e86fd96ebfc678f,2024-11-21T05:27:31.673000
CVE-2020-35545,0,0,90718e2ddefe9ba5082932c97e23e972baa70313d1d4fdf00f695b1d71c6cc9b,2024-11-21T05:27:31.870000
CVE-2020-35546,0,0,9baa0fb9dbdaf5787e3f4fb43280cac2788c9bb47d9c80aba4c3cc9a70be1c42,2025-02-19T19:15:10.753000
CVE-2020-35546,0,1,4f26a22c783b92492a92818000739c3d9dd7ddb2602ff336a588a06ece9b3108,2025-02-20T16:15:32.870000
CVE-2020-35547,0,0,0b56fd34bbcf6f73360d1254a0790470258ba9dfdd070f322adb5be0ea6a8538,2024-11-21T05:27:32.053000
CVE-2020-35548,0,0,d7355cb5b84b5b614d93237f5cbb2796f3a81213009605c0528bcf58e0d77ec2,2024-11-21T05:27:32.280000
CVE-2020-35549,0,0,6a5d8eef45e56534ec7da225d0cd05db4848ea6f60c0898ba9512b7ec9f90052,2024-11-21T05:27:32.460000
@ -209941,7 +209941,7 @@ CVE-2022-4458,0,0,192c505acac2dca8dc3917e8ce2ad50b37e61fd6b24832a0220a2cc7916316
CVE-2022-44580,0,0,1853f516861af1bdf42c74118d4da1d78e165ffb9737892b9636796df575431d,2024-11-21T07:28:09.657000
CVE-2022-44581,0,0,c3574e38c9269af9fd19b1ebf323c712e1313fd8428037a97f7166891237fcde,2024-11-21T07:28:09.773000
CVE-2022-44582,0,0,ab7c8aa0b744df343c2efa6f49df3e2120ade672dfebaf27bbaf41972c94de55,2024-11-21T07:28:09.910000
CVE-2022-44583,0,0,923ee40a48b405150fc6d7bda076e5bb306ea4bd23993a934fff3a391e40d90d,2024-11-21T07:28:10.040000
CVE-2022-44583,0,1,00802e3fe5e8d5c79d75d2a8c442637c00e06e65cc5d081ffb96246c39bf0601,2025-02-20T15:15:10.123000
CVE-2022-44584,0,0,6a47cb16261f5a8edd1470398f86011a9af92c9f9186fcc59739e048dd1f030e,2024-11-21T07:28:10.153000
CVE-2022-44585,0,0,2444819fca6202dd5f513ba043d6869c7cd739cb13c9f4a195bafc9d86534f3b,2024-11-21T07:28:10.263000
CVE-2022-44586,0,0,2c3de69e1a21c0631cf5f1736061582b06bb6865f225acefb4d279b67beddab4,2024-11-21T07:28:10.380000
@ -215956,14 +215956,14 @@ CVE-2023-21058,0,0,64330bb9c4249333ce6f10ddaa280396ef4bb32482959b6db5e7e9f6f3b63
CVE-2023-21059,0,0,70972c21ff5031e5a8812f2b89330f3bb3733e080c457204297376dcabb2f5e1,2024-11-21T07:42:05.127000
CVE-2023-2106,0,0,54915b7d25a40346ce2e235b5fe9b0fa20a7ab6d3baae2189ffdb54ce7556511,2025-02-06T16:15:36.850000
CVE-2023-21060,0,0,ed6a1ed343bc5908d4275aafe515b039b63037861daff961d4fd11deac6d0845,2024-11-21T07:42:05.240000
CVE-2023-21061,0,0,e0606e33da15ce1130782a6e53259d5a1f547ffea17378748f6734fc784e307d,2024-11-21T07:42:05.357000
CVE-2023-21061,0,1,7273ed70ff85a6169baa589c710a5851fd1d66a885a49beca70b97880fae7748,2025-02-20T16:15:33.217000
CVE-2023-21062,0,0,5e5b5d7600fd0d3dd7a9942040f4966711abc6b36e9bb29aa93767415087a9fc,2024-11-21T07:42:05.473000
CVE-2023-21063,0,0,20a4c3f6408a88e1c28159889207c238ab338761b1694db207a9f40672d7a4ac,2024-11-21T07:42:05.580000
CVE-2023-21064,0,0,f66e6a7ec4713e6a44090694f45ba9d60b4264c55e2ed80bc5bd402cbd8005c3,2024-11-21T07:42:05.693000
CVE-2023-21065,0,0,94d2bbc43c1b96f9732745485dc5f1641c6bc254138879f3df272c7166e2db6e,2024-11-21T07:42:05.817000
CVE-2023-21066,0,0,f3310930fd44b4ceafd1bc0f3a1442d00659ef92bf9c822f23789082b5e2acbd,2024-11-21T07:42:05.940000
CVE-2023-21067,0,0,0af98db8af61a37cad16be3f46303f3f5b346c6da74aa6ecb40ab8ae48364424,2024-11-21T07:42:06.067000
CVE-2023-21068,0,0,9e389570051155eb7d03b853be815442ffc225a5869ba74acae0f72dc74cbae9,2024-11-21T07:42:06.187000
CVE-2023-21067,0,1,01050eb75f93c090bcbbf1a3d087f86ead1cb3cb954a6522f1f6adcb54243523,2025-02-20T16:15:33.510000
CVE-2023-21068,0,1,261483c08947a78e25d50bbff26846bb2a8245ddf198c445bf54ba8027c9ff31,2025-02-20T16:15:33.613000
CVE-2023-21069,0,0,7997a769d0fc1eb29768d5d5204d9a0da76475cb9cf6af165e778132a8be14a4,2024-11-21T07:42:06.303000
CVE-2023-2107,0,0,b37e87d1922ae828ac557e5cc8f42c5406432b2bbc0f1d675673e3290327b00a,2024-11-21T07:57:57.197000
CVE-2023-21070,0,0,2b115936a5d121763e30e349ca2d0580b34609ea9a496b2fbfe446f7bf106484,2024-11-21T07:42:06.423000
@ -217160,7 +217160,7 @@ CVE-2023-22308,0,0,906012441499d1c849365e5400b5357dda9cc467b769670e76ddebf0ea235
CVE-2023-22309,0,0,a7231f19d4cb4ea22c4d4790a3de2cc23a6aa0b434c7b7b587091619c74b99b1,2024-11-21T07:44:30.073000
CVE-2023-2231,0,0,7a123ab9506421883b22a81ab048ba2bb77ff795874a80b8d72ffaa1959d6e3b,2024-11-21T07:58:12.077000
CVE-2023-22310,0,0,e89d325885a14d654c2cee0362e627ca7ab351551936d19e0a6836ce159a1e18,2024-11-21T07:44:30.180000
CVE-2023-22311,0,0,3668f195b27e18c55d05f4d2d2db1d99116a034536e0844f15c9f5e44c4093a4,2024-11-21T07:44:30.300000
CVE-2023-22311,0,1,7848a1fdc7b6efc3edbc4ee7ab45d31e7d98e0d770963db7959cb8df01de9539,2025-02-20T15:02:08.147000
CVE-2023-22312,0,0,8f16bf32172036bbf9d1043ae97ca6b0cb5e5a789a3dbfc9b22e7ce5eaaa7503,2024-11-21T07:44:30.403000
CVE-2023-22313,0,0,13cb67bb3f4d7e26a2fe173a2a963218db5dc4219566bf32470782958642ea07,2024-11-21T07:44:30.573000
CVE-2023-22314,0,0,bee80a2df35df35d1b61930267b541e9f11caf7a46751f021047134245f44a3d,2024-11-21T07:44:30.700000
@ -221334,7 +221334,7 @@ CVE-2023-27513,0,0,c9fbd584e51c51b70e2e0cc07b756cefd3914b4ced409ad8d42a8da7c34f7
CVE-2023-27514,0,0,fa8070be4b10f5741aae673be622be3e7d98ffcb2a84bdd30ae540dbca14459c,2025-01-16T20:15:31.333000
CVE-2023-27515,0,0,8dfc9617f583bdd1babe238c49e7e58612036e70ee685520461ed821ca4854ca,2024-11-21T07:53:04.393000
CVE-2023-27516,0,0,63cc8b4dfa2de06886c95f604edc887930374b8e766f7347b609a4a1d828c6aa,2024-11-21T07:53:04.520000
CVE-2023-27517,0,0,7a85bd8631558a4f1c51f4ef9ecd17db6da99592c83a599fc24a29f9268f289f,2024-11-21T07:53:04.653000
CVE-2023-27517,0,1,3502cc4dc0ec46d859d221be870ca61288e9f76a4a8f082e0d50af84a00a11b2,2025-02-20T15:10:10.427000
CVE-2023-27518,0,0,9baf0d487aa874353bba8cde2f44da2f0c67dd17f3eb5b570347204d068fdfbe,2025-01-31T15:15:08.247000
CVE-2023-27519,0,0,717790a336c8f9e5a77a95e0bd0274d8d47193d1a8993a7207854ff0bd8ab7ac,2024-11-21T07:53:04.963000
CVE-2023-2752,0,0,6d790d550f8804fc5c5478d21ae5ee8d7bd1da5991dfa9817023711eac8596b0,2024-11-21T07:59:13.467000
@ -235734,7 +235734,7 @@ CVE-2023-46266,0,0,81806eaa6162d2628009ed70de1b2798f644cbf4406448d48f1535898504c
CVE-2023-46267,0,0,56d82f2136293ec805643b7aa2c34e057834346a4d6f8a282f29d606a8893e13,2023-11-07T04:21:53.713000
CVE-2023-4627,0,0,44c2ecd7362aa4de1a961a6fa4371a3240ed6fa84366e6d7bf5b1fbfa11dd3d2,2025-01-15T16:37:02.837000
CVE-2023-46270,0,0,0789f887abfd7ae93c1dbe57cd351d8a2da80170c7bc99a18d2256a683596402,2024-11-21T08:28:12.507000
CVE-2023-46271,0,0,7d4b1b3d8143858fd802f269081937bd4f22b37fb9ff2feb9ca1d7a3c1c43555,2025-02-19T19:15:13.797000
CVE-2023-46271,0,1,0cb5cef1216ae4571fac17acc07f7ec094b33e801dd2864185b007cd417ef1d6,2025-02-20T16:15:34.310000
CVE-2023-46272,0,0,6a5674c01f30ce0183e1dce1cb0349944e1e60fbf99477dd2701847f7d87dbc8,2025-02-19T19:15:13.917000
CVE-2023-46277,0,0,e192ca50b4060017d85c73fc1706fd083f6c682d8478108f323ab6790e52648a,2024-11-21T08:28:12.653000
CVE-2023-46278,0,0,46ac4ffdac079997c9016c6dbfffc7ffe6e42561a011802cecf40b1219ef36f9,2024-11-21T08:28:12.860000
@ -239298,20 +239298,43 @@ CVE-2023-5128,0,0,bfe204edd11054b27893926793a261843cc5aafcba80836f465a9cbe06b587
CVE-2023-51281,0,0,13c5d72ef411be7896310c619236218fa85e3239b473c76db8a7fc7598f5af7d,2024-11-21T08:37:56.467000
CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8c15,2024-11-21T08:37:56.710000
CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000
CVE-2023-51293,0,0,01e3d2f15d08f98b38f70fbc2a682481ccbb5a4411748304f63a82deea4b9aa9,2025-02-19T19:15:14.027000
CVE-2023-51296,0,0,6471918cecd5ab553bcfd16f032d80c097b645c065f3a63da77145c2a7ca9431,2025-02-19T19:15:14.150000
CVE-2023-51293,0,1,4aaa159936ab6219fd7a1260471f42dacea51e0b8e538ea4dee8e49279158602,2025-02-20T16:15:34.460000
CVE-2023-51296,0,1,4b46fa0e4c1f1e238758695b9394f441f53e8e496cb7faa1fb33aebab119eb49,2025-02-20T15:15:10.293000
CVE-2023-51297,0,0,82a03c125c89e9c5feb7167bc5c79f32a86cc86d30fa01646e6efbdc926b03eb,2025-02-19T20:15:34.770000
CVE-2023-51298,0,0,5b29efe8fa3be42fec8f93d58d7025c30b8b467232cc09005c13ecd16519daaf,2025-02-19T20:15:34.937000
CVE-2023-51299,0,0,386fa09ecfd51bb1ed7e8527bee18b5050c9dd131f37acc63ee8363622cac197,2025-02-19T20:15:35.040000
CVE-2023-51298,0,1,0a73ff740f43c08713be0b01a0d2a61be5909ee990fdffa87eb931b4bba3af99,2025-02-20T15:15:10.473000
CVE-2023-51299,0,1,ee204374983c91e4a81c4f0c807a9717ee9d9eee0f2c2b9150adc78f344a34ae,2025-02-20T15:15:10.633000
CVE-2023-5130,0,0,7764b4080ce182f2cbfb3f51ce85fb48c8388daca3eeaf39f36bf8b5ff048d08,2024-11-21T08:41:07.267000
CVE-2023-51300,0,0,0d8eb0a2ada5b29cf997f4edc56774f82e817a3e7fa7536bd0b60c5bb9f951d2,2025-02-19T21:15:14.727000
CVE-2023-51301,0,0,fbf1518094006f654be2952d6fdbc79caf53bdeba69064abe7315e607a6dc1c8,2025-02-19T21:15:14.867000
CVE-2023-51302,0,0,d86d4ca1537c2143750aa7c81c7cd20a1e63c704506b7a9e9d8895bb2b3bd012,2025-02-19T21:15:14.980000
CVE-2023-51303,0,0,b9596b4c0ec592fba4cdce7a52d69ac3826078585868ba9c2f6b68fe2492afb3,2025-02-19T21:15:15.097000
CVE-2023-51305,0,0,d29e376213b19bb7b3852ecc3889dd5ceb35fd56ab6798932ca128a1fe291599,2025-02-19T23:15:09.567000
CVE-2023-51300,0,1,0f055d95d81302eadc0934757a8907bcd0169b38480cc25eff225963fecdfeb8,2025-02-20T15:15:10.820000
CVE-2023-51301,0,1,9c4e76ef1784f81ef03c13aff5ece5f0c4000a3ddee7980bf3127f38a6a48934,2025-02-20T15:15:10.993000
CVE-2023-51302,0,1,2a2a629e028fadf85676a9ec90e701230400ff0e14da25614e070b1b12c7a323,2025-02-20T15:15:11.173000
CVE-2023-51303,0,1,5607bb153ecb6857b5c285c2d78c60ac93b1768ce62baab40912356cb664f295,2025-02-20T15:15:11.333000
CVE-2023-51305,0,1,94c9859147775854f4fe017d88d7dc2aa4c058076353100b1d5ee8642d3a3620,2025-02-20T15:15:11.507000
CVE-2023-51306,1,1,9abb5db728e8fe46856cf7f999df226ea525572318f83566b985a5915b4d98dc,2025-02-20T15:15:11.673000
CVE-2023-51308,1,1,8a5cce85965c497d99411e14d7ddb84a3485b88a66065edf5dd36026ad89ef52,2025-02-20T15:15:11.793000
CVE-2023-51309,1,1,d5a34397b2d3712a4de0493249687b8ab829c9c913c53ab0eb208f0231b7e47f,2025-02-20T15:15:11.920000
CVE-2023-5131,0,0,ea7fb93c4dbd8bd2f769e40008c92349338343ffec9aef4cd684c52a4f03daea,2024-11-21T08:41:07.410000
CVE-2023-51310,1,1,04555726acd1d4321ddba39dd114106b5d6b5d634e69030505aa3132d2e331bf,2025-02-20T15:15:12.050000
CVE-2023-51311,1,1,6575096cf9588af68549263dd8fe4fd9ac6ca19f8c16fd21ce87579eec4885a8,2025-02-20T15:15:12.170000
CVE-2023-51312,1,1,24df8ac219fd57ec3572cef764abdf460dd12ed44613d62f818ae74ace712664,2025-02-20T15:15:12.293000
CVE-2023-51313,1,1,ecb7283cecdf3851dcd9f3dac756939e43c63a6abab5a2801b24b0ce64cd7004,2025-02-20T15:15:12.437000
CVE-2023-51314,1,1,8e6485d513acdb9b63f3ce03417ddc6a6d52c1f9a2853c47e64af6c834ab1777,2025-02-20T15:15:12.563000
CVE-2023-51315,1,1,132e3dd91521663a35e221b7a999ef09c182eb57c48d8ad573a4dc220cc18f59,2025-02-20T15:15:12.680000
CVE-2023-51316,1,1,24f90e52eb9f2ee3efdd4303af4204fb2b2db48dc9ee4e66c7e4c2ca06dae737,2025-02-20T15:15:12.810000
CVE-2023-51317,1,1,7f9f5b550e35dd8e634965b30be68534535138097cec95e49eb38256e5f53431,2025-02-20T16:15:34.600000
CVE-2023-51318,1,1,f5ce695c6eca3c365541aa97f79aa692177cb4b44d64fd10b094343c8e2b8506,2025-02-20T16:15:34.703000
CVE-2023-51319,1,1,ac4116ffaf596da9295f0f7d8f0f0b2f7ec444b699d93d2c1af5af10ebdd757e,2025-02-20T16:15:34.803000
CVE-2023-5132,0,0,3a50c79f3182856bf1a8f272b84346a7ecfc5aa8bca0e713ce49774805195cc4,2024-11-21T08:41:07.540000
CVE-2023-51320,1,1,79a114082655d7bb64f646c844b066a60f0c5c8b7f89a39965390c6c7a485520,2025-02-20T16:15:34.903000
CVE-2023-51321,1,1,fe1356f30cb97f0bf1f3b6c26e1c05f062bd4486059c682dca2bbddcbaa5cab6,2025-02-20T16:15:35.007000
CVE-2023-51323,1,1,ed280025906fb157f30101c4ec2af5dcb4e8049994300268f8d4e929415eb7c8,2025-02-20T16:15:35.110000
CVE-2023-51324,1,1,1297f43ed3f254c5bd52ca69a1313b239e55faa9ae9f2875d64bc52c1b4ef217,2025-02-20T16:15:35.210000
CVE-2023-51325,1,1,d9bce55484426b97e5206f92ca8131481536ba82ebadc469adf7d081660cea41,2025-02-20T16:15:35.330000
CVE-2023-51326,1,1,46eb96dbf29c4b2241b5562c5d43fb74ee2dcd0e7c1ee8a4d8d840d472ea0aa2,2025-02-20T16:15:35.437000
CVE-2023-51327,1,1,5a20d74bdf0b1ea0bcb9e4e68927ac775377adad269ecd68bf8aba7a80ca8283,2025-02-20T16:15:35.543000
CVE-2023-5133,0,0,0018a6a351ee401af2daab5bec3a8b6563a0922f375ff71fcd99140986e7d09f,2024-11-21T08:41:07.690000
CVE-2023-51330,1,1,f6ddadd04f6bc79dd4ed033e5a2c587bce52b3f4671127e98010c92709f4a14b,2025-02-20T16:15:35.647000
CVE-2023-51331,1,1,211968e4b68bfaa16cc15ac1ca70eaad44c69bc6fd42b28475e85551c06c8918,2025-02-20T16:15:35.750000
CVE-2023-51332,1,1,1f0734dc885312d91e40d1b3167395e307e144bd8e608075edd4dd7c3f53282f,2025-02-20T16:15:35.850000
CVE-2023-5134,0,0,4883dceb94c3f0cc4b1b00f2283b580de20b785803ef8febb697d90c06bd591d,2024-11-21T08:41:07.850000
CVE-2023-5135,0,0,877454aba62f703a281ed8cbe6f67c849efb5f5f63261252e74d9df5c2c3773f,2024-11-21T08:41:07.980000
CVE-2023-51350,0,0,3e6b1a93404e3494b28f6f9c928c88f04bb91fa7582d839166c6383b89c1b64d,2024-11-21T08:37:56.867000
@ -244337,7 +244360,7 @@ CVE-2024-10957,0,0,d1cb42f5761d863482eb30829593415e9d53941312c7ff44dbe5eee56f45c
CVE-2024-10958,0,0,ef36e0bbdfdc2ca66f68ef0f42219502fb71c2dbb5344b8f90bed966330b4e84,2024-11-14T14:57:23.103000
CVE-2024-10959,0,0,fa8e8dfd4e8771ae8c76641a0e2a5e25525492fab6efcc641940a89152f76196,2024-12-10T11:15:05.913000
CVE-2024-1096,0,0,361a397f658718594f88eb8768eb59d67142285dd6bbccd93ad2ca45f5461047,2024-11-21T08:49:47.217000
CVE-2024-10960,0,0,d6fb983e120feec96a65fdddc45b3a1d64427c9905644918906bb7d08d47354d,2025-02-12T12:15:28.027000
CVE-2024-10960,0,1,7c77074df08ec3f9a2d2c00313216fdcbd907f993207a145e679e9aaa87132fa,2025-02-20T16:26:54.527000
CVE-2024-10961,0,0,4a5dff05569e8c840a1fbc59c3367b15e681c98f036051571da83eeda89d3631,2024-12-06T01:15:16.933000
CVE-2024-10962,0,0,01c3565bb569e73f17c44eff56e212818b4d6f0ce2501db43a4a28cdf597d31c,2024-11-15T13:58:08.913000
CVE-2024-10963,0,0,88ee5c2fdd930e041e628fd88533cc2aa09098433a7f71485a3c3209ceea91c4,2025-02-06T06:15:29.240000
@ -244354,8 +244377,8 @@ CVE-2024-10972,0,0,94ad4fe97792a860dbbbaf6ed1055424200bc83bc27354926dcdaef27787b
CVE-2024-10973,0,0,cbeb6f65a45bfdf6ca686d53bee20b1187ff9c0a45640545d25c45f64f615a94,2024-12-17T23:15:05.423000
CVE-2024-10975,0,0,87dd438a371aa254e8d367f54246f88f9b61e035fde8423a2dec0ee6b83d81a4,2024-11-08T19:01:03.880000
CVE-2024-10976,0,0,add1dc642ca0b3839b02b45025e0871bcc2dc4571c371fa1948c8c2b0fc1c9e1,2025-02-11T17:46:21.280000
CVE-2024-10977,0,0,7e77acbad52c6027c704b593926f8450e38a8ef011adc268448e2f06c6758e02,2024-11-15T13:58:08.913000
CVE-2024-10978,0,0,2ad1fe4e28705cc365a72d5a36fdf3bacf7244c37418175735413c023fdc2b3b,2024-11-21T22:15:07.033000
CVE-2024-10977,0,1,6d2fa74e2441271cd530850635b1ae5a3c8833ecad983f63c3544b6ca14fa848,2025-02-20T15:38:01.697000
CVE-2024-10978,0,1,72fb3d471cb26f3efc482353d870432bf7129ae06ff689d70016902d4b1e6d26,2025-02-20T15:41:14.847000
CVE-2024-10979,0,0,c563f753316fdbc35fc0c4266561157efcd47ba87314ae829bfbd5ca249cb75d,2025-02-11T21:27:49.273000
CVE-2024-1098,0,0,975a882834838eb3bf48c2f536f6d321931f066d182e2d3421deafc25dfc3b5d,2024-11-21T08:49:47.500000
CVE-2024-10980,0,0,21985ec12d369d83f43992fef14c6cbc6da6c1d5ef9577ac04d2bad895eff395,2024-11-29T15:15:15.903000
@ -245509,7 +245532,7 @@ CVE-2024-1221,0,0,992589062229663edb93b0d8ce0f2928fe9cc25fcf6d182d572f9549d84b72
CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000
CVE-2024-12211,0,0,deb11f537ecb2479a2bce6b180557d850bc7e81da75598fcd5b04e01b9150472,2025-01-13T18:15:15.157000
CVE-2024-12212,0,0,4068a90166bc858f8bfa4c7fe1dbc180f7e4e033930f31a1b74471c9abd7763b,2024-12-13T01:15:05.810000
CVE-2024-12213,0,0,77dd0769fcd1ec64c147536ecec19775a8e1cab6ffc264bc896be8253cf11377,2025-02-12T10:15:08.737000
CVE-2024-12213,0,1,98df6fdb82f8dcce9cdcc7c0bf263347f16e89097035ec4ee4346e7d756115f4,2025-02-20T16:08:26.203000
CVE-2024-12214,0,0,145b7db175966477886a9ffd7c811efe626794ad8e1d70413662bfa5c01eb691,2025-01-07T05:15:16.470000
CVE-2024-12218,0,0,c54e0970e9fa3f5da91494a744c33c1884c0ee1f4d82830e251b56e753e1af4a,2025-01-09T11:15:12.280000
CVE-2024-12219,0,0,30a275e193bbba91aa16bdcd2e01caf0ae8c253910825d417094094009d7c6a9,2024-12-17T08:15:05.010000
@ -245584,7 +245607,7 @@ CVE-2024-12291,0,0,92bd6430c2e668a17bac8eff58d5c2110f868302e763b561cafc443091528
CVE-2024-12292,0,0,9c2e3f4715c47523d2f1e1d813aca821c280ab211aff2eeed6650ad59c376aa9,2024-12-12T12:15:22.470000
CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192ecb7,2024-12-17T09:15:05.347000
CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000
CVE-2024-12296,0,0,cece6230a00a6654d5de87f2517ca2b8fe46b44a0e3e2076c03724581a429faa,2025-02-12T10:15:10.230000
CVE-2024-12296,0,1,2e1864fa6072ab80c406429c59d508ec6233147fe965c5fb3773394e06f5d391,2025-02-20T16:09:14.287000
CVE-2024-12297,0,0,fd281d2af15f3a460c7c72b16a57d9adb41153bf01efdd2829811ff4b89362f7,2025-01-15T10:15:07.237000
CVE-2024-12298,0,0,cc5fe609045dfd20e01ee8b5a4a2dfa91435af5a3c75ddd1927f875f5047d786,2025-01-14T01:15:09.423000
CVE-2024-12299,0,0,6bf8e5e626459eb3d35ab60bd9555f090eb208e414339f648c4215470dc975d2,2025-01-31T18:22:07.800000
@ -245665,7 +245688,7 @@ CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2
CVE-2024-12383,0,0,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff201,2025-01-07T06:15:15.790000
CVE-2024-12384,0,0,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000
CVE-2024-12385,0,0,9021d1d140cebb7e5a9313d82a4b746bc2441f3dad59f522fa0786a000238683,2025-01-18T07:15:06.667000
CVE-2024-12386,0,0,e653ba6addd0b76a37cea5332e53d1936d52b392d8f071196bf6a21de1e07dc5,2025-02-12T12:15:28.470000
CVE-2024-12386,0,1,5fc1e01f5e9fd108b16f7e2ffa29cb9e004d42ac5dc30102bf32ad04864ac122,2025-02-20T16:29:39.023000
CVE-2024-1239,0,0,e372911200db947b5d23f4c5c4ab976b80519731ada570ba51a10f8cbec0919a,2025-01-17T18:34:30.327000
CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b718f2,2024-12-11T17:15:14.657000
CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000
@ -245815,7 +245838,7 @@ CVE-2024-12547,0,0,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a553
CVE-2024-12548,0,0,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000
CVE-2024-12549,0,0,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000
CVE-2024-1255,0,0,5935182eb4eb024c7cf7e3cda464e0c74472c4e58bc0030bb090a2a8f708b72f,2024-11-21T08:50:10.150000
CVE-2024-12550,0,0,ce35987631aeae68370296bb98f0ac6cdc9ccf871b6be5fcf0b50bad33472e95,2025-02-11T20:15:33.800000
CVE-2024-12550,0,1,599ddfe20f39f119f4e94a38d83730af776facfe248d409cfc564431c6297483,2025-02-20T16:05:43.313000
CVE-2024-12551,0,0,d5c261bbe6b94af8441d06fcc618acf8580b5206376f9fb5b385dc9aa6b753cc,2025-02-18T21:41:17.900000
CVE-2024-12552,0,0,8443c6d0851e2c1de6fc0e2780c54c711d712f43dce29b5a9fc2e07cff55adf4,2024-12-13T23:15:05.553000
CVE-2024-12553,0,0,cd61f311646d40093b2eea8b09f233e945a3d877e60c1a1abbe43e2cfcd9ea6a,2024-12-13T23:15:06.310000
@ -246603,13 +246626,13 @@ CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626
CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000
CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000
CVE-2024-13473,0,0,9f1cf3419ff4cec497cc77086acc28179e477b7bcff14ca4047a6f9eefd9483f,2025-02-18T18:15:18.990000
CVE-2024-13475,0,0,5092e9173eadac632d984f8d6b080371e4a16d09f059f921441142bd53ed3c18,2025-02-12T10:15:11.777000
CVE-2024-13475,0,1,2d4908141327829ba705ddda18014501694bda29df9ff8e97ff8fd75581f147d,2025-02-20T16:10:58.387000
CVE-2024-13476,0,0,e536d7c12b219bc57ecc07fef47f72334a7428667d6be5f52a983e55580fccce,2025-02-20T10:15:09.990000
CVE-2024-13477,0,0,994d41dcdca8ea2949161c6a3039cf39facb69cdf429b9bbd695e457cde87ed6,2025-02-12T12:15:28.660000
CVE-2024-13477,0,1,a10f6bfa8b4dbe093935988668d3d033816e04272de56afa6d2fc4005b71a58d,2025-02-20T16:30:34.457000
CVE-2024-13478,0,0,3d283885de2ff5694d473a7458eb6a9fee1962d7b2f3d84adb8d26453f66b0b0,2025-02-19T12:15:29.777000
CVE-2024-13479,0,0,265f3fc391e53c595bed244b3e7c3502077a0bb4298bb2e92ab4714dd5430254,2025-02-19T12:15:30.610000
CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000
CVE-2024-13480,0,0,321567d1345fefc0890e4d3a03a4c0335890e5df8d4b67eb97bbb9ba1c937e06,2025-02-12T12:15:28.840000
CVE-2024-13480,0,1,3428580d93454953fae6c3b4142b76858120218f0add18e922992ee88cb52af5,2025-02-20T16:31:52.163000
CVE-2024-13481,0,0,18f6163dfd9d1440b7c7726ceaa029ecf7615c66174a2f06ab95e8be286bcd48,2025-02-19T12:15:30.753000
CVE-2024-13483,0,0,36b609d73c634ce761bc3a61cf94037aa579c6e7fb89e544a11515a27c0ee3f1,2025-02-19T12:15:30.900000
CVE-2024-13484,0,0,4fd55912c77d8dadbebe472ff2c71e4e3fb03970b04450aedc08c21b110060a9,2025-02-12T17:15:23.177000
@ -246618,7 +246641,7 @@ CVE-2024-13487,0,0,8a4e4265754362ec1c9263cf9e3081850883bf6400106e8f9bffb81274d80
CVE-2024-13488,0,0,4b8066bce6198329d93f932502dadbbf2e639dfefb1f2df4c60df4f085c6e1e4,2025-02-15T12:15:30.457000
CVE-2024-13489,0,0,d540270a20044e19f885eb9c1b6edeac3dc59f7c6064bf65855c9960dc59957b,2025-02-19T10:15:08.870000
CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000
CVE-2024-13490,0,0,261a201adcbc7bc2dbe4303b4c424a3f72ae3e81ef333b356e5b443e47516d97,2025-02-12T10:15:11.973000
CVE-2024-13490,0,1,778d9fa72dbdad7c6f858cf2d129bef7c755c267cfff033efd2ee0f0281250f5,2025-02-20T16:14:27.897000
CVE-2024-13491,0,0,3901e563b54ff00b6149844edb6c3aec1c2bb14d137786d8368044d8dc0748a8,2025-02-19T12:15:31.187000
CVE-2024-13492,0,0,e986e613e4183bc9c7afb601a232e5681edf1984e4b97b5e25f6a769df2e2a60,2025-02-07T16:15:36.123000
CVE-2024-13493,0,0,7eded31e5b5002f824861b02e021048420482345b3c4a7249f8ceb434a843767,2025-02-14T17:15:15.230000
@ -246657,8 +246680,8 @@ CVE-2024-13528,0,0,122b895828098f2015afce9673bbbf513eb3f4c3f5ac9acd2733bf0b49a30
CVE-2024-13529,0,0,200d7b0e051dd0616db8204a0f4feb61aaed03439a2d376a4ab184bb8a3a6125,2025-02-04T10:15:08.333000
CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000
CVE-2024-13530,0,0,79b95d03a65d37f6bd7247a320ee91efecfa7853e8fca4111e89d02aab16e68f,2025-01-31T08:15:07.543000
CVE-2024-13531,0,0,d0896acc17735e856b06d8e0c3a5b2f52d9e0cbd22880e913d28c402f6195055,2025-02-12T10:15:12.317000
CVE-2024-13532,0,0,afd84c2f186b0b681f34e67a86ddb00ec0310f61d9e69cd64ac60428b6884a22,2025-02-12T12:15:29.023000
CVE-2024-13531,0,1,7b21b6087dc09e5243c8446026ea2766597c7d8ebd45487cbb44d57448365755,2025-02-20T16:23:02.090000
CVE-2024-13532,0,1,277704b2d9eb0c92befe05022d60a0db9ec5b21719af0eafdeb96198d3e899d6,2025-02-20T16:46:25.600000
CVE-2024-13533,0,0,dca093e418f506c56c7b721bf19c66fbd6fc8408ab62d8e654c432036b784a95,2025-02-19T12:15:31.333000
CVE-2024-13534,0,0,24e878dd73461d45240baee5013d359ea0437394343be594e0594e5922b1d61d,2025-02-19T12:15:31.480000
CVE-2024-13535,0,0,dec80695a517d3768819588f0daa6dc70d633cccd453511cce85b18d61e52a4d,2025-02-18T05:15:12.773000
@ -246669,8 +246692,8 @@ CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f0166
CVE-2024-13540,0,0,b68ecde40b732145c347461191cbcc1ffd4b9ba81b4500231d1f6c3e44c75163,2025-02-18T05:15:13.427000
CVE-2024-13541,0,0,4e9d1f97a299ff6127f5d36e7cb13e30abee458413408a9b4f57ec8d00d54529,2025-02-12T04:15:09.347000
CVE-2024-13542,0,0,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000
CVE-2024-13543,0,0,e978bc49ff488db2b344d5d8ed3663103952e081a7e5e2e0d652ffcd5a679db1,2025-02-11T15:15:16.633000
CVE-2024-13544,0,0,ab4ac6cabc7b36f3edfcf2efc7c25d339765c5d6b37adf1ffeb2e251cad13a5b,2025-02-11T16:15:38.953000
CVE-2024-13543,0,1,313912351d5c53f4223a6d5b805b81f4ef85173ca4b09805270d61361b904099,2025-02-20T16:09:08.567000
CVE-2024-13544,0,1,40fd8d3043f2111bdb8eb0b8c5ce28fe2ce983b5b6a5fd7fe7c1666b74685deb,2025-02-20T16:11:08.567000
CVE-2024-13545,0,0,87a0f57604fe27d4ee9df650772826f7d7900467d357a9ad3aa561d00273e2a6,2025-02-05T17:12:11.700000
CVE-2024-13547,0,0,b1bf985e28e62dd9ee8a2daea2848b4acba32b136937b02955ac8251827bc741,2025-02-01T04:15:30.857000
CVE-2024-13548,0,0,ce678384d6879b1518296d0bd59d7e5e9b3276f2861356166fcc86ea2354903e,2025-02-04T19:27:08.967000
@ -246688,7 +246711,7 @@ CVE-2024-13563,0,0,a22d7bca0cd120477dc1fa3e57922c805548e0065756a928efb634339816e
CVE-2024-13565,0,0,09484b11000b3ae55a8d4aa1c14df152d867ff650645b8d7539db7f4a1952ba8,2025-02-18T05:15:13.803000
CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000
CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000
CVE-2024-13570,0,0,bd29cdd9a7035d220844b35d0e7ba2f79edf50e314a280da902fd81fc517776e,2025-02-11T16:15:39.090000
CVE-2024-13570,0,1,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000
CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000
CVE-2024-13573,0,0,4c15c78a9615e8ce64f7592c831c2a81f25bc5a0e24ca1c3a58f764690185d7a,2025-02-18T05:15:14.007000
CVE-2024-13575,0,0,17926a8a3c44e671cffd1d8c13b88294d3fea4b6a59023fa8be054801e0a5de0,2025-02-18T08:15:09.653000
@ -246723,7 +246746,7 @@ CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e552
CVE-2024-13608,0,0,b8b173401de3e1097c36a401f8928ae8cd5257912fc8cac1e3eea9f3234c491d,2025-02-19T19:15:14.260000
CVE-2024-13609,0,0,f6b426da9160449350ccd1dc2595915af601bdc725430ae991e1018a5193a1be,2025-02-18T05:15:17.160000
CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000
CVE-2024-13612,0,0,552127c2046be21ad3d3bc25df0920820f31b497c8eb5b9bb46c66cbfd8336ca,2025-02-01T13:15:21.320000
CVE-2024-13612,0,1,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000
CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000
CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000
CVE-2024-13622,0,0,2a60756e3c1f8e2c67b3815a15c7e2ffcb84513035babc6bcdd160486b03b340,2025-02-18T05:15:17.557000
@ -246837,7 +246860,7 @@ CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae8
CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000
CVE-2024-13802,0,0,fd81c83638437a642a8e1df7595c3a3a89a54e0438783fe338ef7efb14df6f36,2025-02-20T10:15:11.100000
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
CVE-2024-13813,0,0,a0414a00a2a30561fb3007f9bc2cc4b58102a245d589b97ea6ee429ccb8e907a,2025-02-11T16:15:39.220000
CVE-2024-13813,0,1,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000
CVE-2024-13814,0,0,1eaa34671c59ff347de019eb0f7db92c91d554728619786a007d058e64ccd6e0,2025-02-18T21:30:00.523000
CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000
CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000
@ -246849,8 +246872,8 @@ CVE-2024-13834,0,0,b3a753413a4c1c1c8fb1941598bdc1cadfaac89f934ae66577e6a8bb7cdc2
CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000
CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000
CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede14a2,2025-02-07T07:15:14.573000
CVE-2024-13842,0,0,955b2791810b1a10a02616a1134c790dde9472870ffb2ecef1b260eb338bf89c,2025-02-11T16:15:39.513000
CVE-2024-13843,0,0,510b2676ce058323607c3a8a5ac880be2eb8da89d56b6ba23759e15b6c5d2ded,2025-02-11T16:15:39.667000
CVE-2024-13842,0,1,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567fcd,2025-02-20T15:55:29.770000
CVE-2024-13843,0,1,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000
CVE-2024-13848,0,0,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2cfbe,2025-02-18T05:15:19.157000
CVE-2024-13849,0,0,d98f7937784c29e9abe71d6667822b62b2ca578c3586a491787af9ba63c49a21,2025-02-20T10:15:11.330000
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
@ -248966,9 +248989,9 @@ CVE-2024-21683,0,0,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fb
CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000
CVE-2024-21685,0,0,3c4c971d45d65495f5592903972ee9cd75db6eb0dc168987da35ab904c4102e3,2025-02-19T16:00:53.703000
CVE-2024-21686,0,0,0d4af5eeb52a1b56cf89baffd989a415c4ed1853dde7091d90226451bf24db64,2025-02-13T17:09:31.977000
CVE-2024-21687,0,0,61dd115c9b058b7191477ed6f478ab4abf9d9c1c2c09f46ba6956bd27091cc8b,2024-11-21T08:54:51.880000
CVE-2024-21687,0,1,e73c6bcb8f1514456c4ba9176c664a14addfbdb548c45aae992434166dda0dd4,2025-02-20T15:20:02.967000
CVE-2024-21688,0,0,5b8415c8724c6d841bc6d9d4e0c517ae2ecd0ff5c1fbdac85271979721c9c3d9,2025-01-01T00:15:36.373000
CVE-2024-21689,0,0,a01a1bca13f2c42e57e070cc6d909423aa132c1df6ed296e0ae2b6c0052407b9,2024-08-20T15:44:20.567000
CVE-2024-21689,0,1,46892f81d466ffededaa54f4f25d900071c01a1d5bfac907f444793fc2ee1b68,2025-02-20T15:23:21.377000
CVE-2024-2169,0,0,20f842630ee9719988f642b8fdd4eece4307ca504a94d22a1bb05345971c6393,2024-11-21T09:09:10.397000
CVE-2024-21690,0,0,3415a4c120235aa54d0dba86283afdeaa6d4147fd2fc657a4e07d3a39ee56f61,2024-11-06T19:35:13.787000
CVE-2024-21691,0,0,fe5e849ee55ece29d4fddce98b1adddbd2b988d0e042cc6a0fcdd846d5a267bd,2025-01-01T00:15:36.447000
@ -251134,7 +251157,7 @@ CVE-2024-24716,0,0,2a1681202601d9e99709e6831ac4b63ea8c43e8b87405bb1f57ab626394c1
CVE-2024-24717,0,0,75805cbf14610b8ac5098a39951fb1a53c50c5d54fe991e08ae0e81f017efa6f,2024-11-21T08:59:34.317000
CVE-2024-24718,0,0,0bd4850cb3528e2664d36327d098a9e4583ca04b2f7a9e91e5fad6d001286c79,2025-01-31T18:23:45.550000
CVE-2024-24719,0,0,80dd1c9548ebeae5158782803ec3348dd95a3e7ac18027462986588f41af4eaf,2024-11-21T08:59:34.593000
CVE-2024-2472,0,0,1b52ea4958b068d45766ffc212459cbf6a4302f92eb304d3cdb6ece10b845ad4,2024-11-21T09:09:49.730000
CVE-2024-2472,0,1,78def4d4a990956640bdb077e14c5a7dcb1847a727dfd6649f6164a8bc5f6947,2025-02-20T15:28:10.360000
CVE-2024-24720,0,0,8628ac8d7758cf71f494cd53411e3db2365b79617d5b84f61a2eb40133f852e2,2024-11-21T08:59:34.710000
CVE-2024-24721,0,0,de3870c41ecf7e97c4a338a6370e359e038b4867c4358ac9aa4190cfd6f83e78,2024-11-21T08:59:34.940000
CVE-2024-24722,0,0,529073a94c0afc8e4c2b275941e85310bdd004590c069c0bb6a7f444192f5366,2024-11-21T08:59:35.147000
@ -260936,7 +260959,7 @@ CVE-2024-37358,0,0,d63f36f666a30bc5a531bdee61d9493741ce80a82a2db30dba675779712c5
CVE-2024-37359,0,0,0164b4be005f853818bcdcce258948ef3b9e1daade18f9e2f8fca5b602fd2996,2025-02-19T23:15:10.330000
CVE-2024-3736,0,0,6e4a1ef94c0273eebc8e9e6b2b5445ce88780aebebada592671bcb41b0d8c2d8,2024-11-21T09:30:16.647000
CVE-2024-37360,0,0,a4091fe21f26d9058b42d48095351e79c48d46ff5ddb54aa2e6a91e3943ae007,2025-02-19T23:15:10.537000
CVE-2024-37361,0,0,49bbba64aa5c5f7a658f3636f8ca2e294c069f968ed4e978b2889a4f20f21b0c,2025-02-20T00:15:19.507000
CVE-2024-37361,0,1,b797737a930223717c8fd1f79a748b570a5c9575cecff473e8a7aab7d7365aab,2025-02-20T15:15:13.190000
CVE-2024-37362,0,0,bb8cf118a60dd5876d1853971fb911924b6e1d70593c134cd474c796067a2140,2025-02-20T00:15:19.630000
CVE-2024-37363,0,0,82ca42c41eab0f0de2c367f2c6182f5bcfc400fd0a5fa6cd33611ca15fd803e3,2025-02-20T00:15:19.750000
CVE-2024-37364,0,0,c4ba2eb3ad001e136c90a8138bde00d47fa986718a2e611803c5ba1d95d0615c,2024-11-21T09:23:42.810000
@ -268083,7 +268106,7 @@ CVE-2024-4707,0,0,e65b188ea06841988570af59fea3d47c9f9ac747dd0bff4b49dca436b75799
CVE-2024-47070,0,0,f44cb16339f89c133e15084d069c0fb846144ea38144e388a800586a53fe0e83,2024-09-30T12:45:57.823000
CVE-2024-47071,0,0,ba349c35770c0b38461f4a8cd0cb017eb80bd299da2b0136e08a2f2a4f3af1d6,2024-10-04T13:51:25.567000
CVE-2024-47072,0,0,5396eeb2e43ea0b6080e1687e9e26b1d765ba3b900cbaf26034407d05f09195a,2024-11-08T19:01:03.880000
CVE-2024-47073,0,0,3d093396fb3f062c2b9f4c4828481f73c2760c30da62b1bc38b8b8ddb3a2d9a0,2024-11-21T17:15:16.160000
CVE-2024-47073,0,1,c54d6f2f172da9b4086ba207e2a3af6a5ae26482e1c467e6988f73b19a51c862,2025-02-20T16:20:40.547000
CVE-2024-47074,0,0,5945c0ec22658edf552da4d4d0e2c77a971cac91f2ef7f591a767b9f728bed9b,2024-11-12T19:52:38.023000
CVE-2024-47075,0,0,a2d6efb1d41afa02c7ea509cf6e92889c9a139c99ce90d9a00872aa72d65ae14,2024-09-30T12:46:20.237000
CVE-2024-47076,0,0,66607a2d6fa007363ac6549c2a23f1ab8af8f0bcb4165cd6338f82d994cf0c10,2024-11-21T09:39:23.823000
@ -268832,7 +268855,7 @@ CVE-2024-47904,0,0,32023a46094ac777f1807113f7df9a61b152507a55799c58b4c461b6386d4
CVE-2024-47905,0,0,608432e588c6d3242c468fe1003ea181f1c11435c6c8fb7e2cb7ff5f4bf50c01,2024-11-18T15:08:47.280000
CVE-2024-47906,0,0,91f204b1a48521d2fbe0aed5282a0ab552e9411b89b1217b86f237b75201256d,2025-01-17T20:27:14.100000
CVE-2024-47907,0,0,04c7fba075b24cd5202b6bdbbe3d222a18b28463e62afd4edeb1c843310f652e,2024-11-18T15:09:30.573000
CVE-2024-47908,0,0,e7271cdf8a9626532e80846e60acf4fa03f1b58c03117b023ce1ae3ef0c92d11,2025-02-11T16:15:40.247000
CVE-2024-47908,0,1,b8a01f67ef29d1d76d6b0a947bada6666fc9b15d6e0aef7780ff896b88de7611,2025-02-20T15:57:06.850000
CVE-2024-47909,0,0,114aa268672736b24d218b508c70839e7abe1697ede83610908b9c3a6775a40c,2024-11-18T15:09:45.750000
CVE-2024-4791,0,0,d44a7b4ec125d63941043e195495f910a4d2a5e0ccb20e58ca1a3450532482bd,2024-11-21T09:43:37.137000
CVE-2024-47910,0,0,2b512b73d2b6b5c66fe1cf4c33853e3228b1071f06eada4fd9fbf32862f1d5d5,2024-10-07T19:37:43.677000
@ -271817,7 +271840,7 @@ CVE-2024-52291,0,0,67366554fa12fc5f80ea7a37ab4efbcf755b65176915cc467a885e5d178f4
CVE-2024-52292,0,0,98ff7782d74c8a880b21aa3925ef392e3d7f9afb5fb086d700b2918ea0d38572,2024-11-19T18:27:21.567000
CVE-2024-52293,0,0,48995c1833d437873320d2a00d4716843128fee61b180655a95bba4546c3a839,2024-11-19T17:51:39.460000
CVE-2024-52294,0,0,6292d16468fc827dd6fc5e9bde5041230ca83aa97d2fa7a45b6fdf7131f4357f,2024-12-30T17:15:09.467000
CVE-2024-52295,0,0,e1efe4101b45f07177f061e2ac83f686fb357430fe974441f146b398fc7fd083,2024-11-21T15:15:32.900000
CVE-2024-52295,0,1,acf2270c494b9d0a06ede4aec3f02a8feb72be5c0ba92ae2a0788122d05c2dd9,2025-02-20T16:21:26.323000
CVE-2024-52296,0,0,b562f18595b8ca53024157f705b18f7c73f8b643fe6d08b20dc5b815792285b0,2024-11-13T17:01:58.603000
CVE-2024-52297,0,0,5528a19c9c06652e4abd378b7e62659078889b6d0c1cac57d71cfe9d52fe1e73,2024-11-13T17:01:58.603000
CVE-2024-52298,0,0,0e82a2c04d492598179d5deb8d7d99c3d515ec084ea8200a762f2512cbb5ddcf,2024-11-18T17:29:27.170000
@ -273910,8 +273933,8 @@ CVE-2024-55949,0,0,730f7b9444cd8d481c090272c978e37b84fbd5b51226a21ecf1c6c64d8e22
CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b505d,2024-08-02T17:35:43.927000
CVE-2024-55950,0,0,452ca7158ead07675fe20f22ab4fa2cbef70b0c04825b5afe33473c735fabe96,2024-12-27T17:15:08.480000
CVE-2024-55951,0,0,a51355b6ae0f3b8ff81aa1c7eb7d8610a8ed0d99cdcd6fefacc2c260861ccc4a,2024-12-16T20:15:13.823000
CVE-2024-55952,0,0,c5c9e3ddc2dde0fdaafe60e16029d6acd7a5c8b9fe490f67edd3c62939aa431b,2024-12-18T19:15:11.933000
CVE-2024-55953,0,0,db9cd8f82466bee8b44b5fcb7d2ef52f7e161949a8e96e2914214fd35e1b6b39,2024-12-18T19:15:12.067000
CVE-2024-55952,0,1,684761dbbacb6f645db365e7e0599f9e3370b7e14b8eb486a81092d66a1bf19a,2025-02-20T16:22:50.240000
CVE-2024-55953,0,1,90fcdea482c120744930d556fbdd18847db93825072c3df028dd92a54d371f9d,2025-02-20T16:25:07.667000
CVE-2024-55954,0,0,809e5572e293545af4228663dbdea98405c00ed8174fc27cfd28075595b51642,2025-01-16T20:15:32.890000
CVE-2024-55955,0,0,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f10a,2024-12-31T17:15:09.270000
CVE-2024-55956,0,0,afd479d00c2e9cbfbfc115bd207b298f6ba3f13c2d0edad18c92136a816df61d,2025-02-05T19:15:44.450000
@ -274310,7 +274333,7 @@ CVE-2024-56508,0,0,62a7f3a0dfedbfdc727f7144b117b7a6dd3c469bd925b864f6c6e3be9baa3
CVE-2024-56509,0,0,9fdcd292e86fd0e8d6251a00e018f2adcb8bb6eae15c539496a66732d314837e,2024-12-27T21:15:08.483000
CVE-2024-5651,0,0,32bbfd3237660b59f36b0fed977113a2851ca445319041dc9e59d5754bb27734,2024-08-30T14:15:16.820000
CVE-2024-56510,0,0,4f41482ea166ed5c7202c0301fb2df4e26c47402a9de7a28e23eace289425385,2024-12-26T21:15:06.743000
CVE-2024-56511,0,0,00b81ec3fa7f59774b13c1a985c50c77979e7bf8e4540f7395f2c60a588f7023,2025-01-10T16:15:29.510000
CVE-2024-56511,0,1,5366dbb656a4a7481616000b94cc615953e9cccaf1bda7d00415cef2308d3dc5,2025-02-20T16:26:58.487000
CVE-2024-56512,0,0,599da64766ce0e1c2bd7cfcf30544268a9ad3bb7673ddbfdef2855ca9f183344,2025-02-11T16:10:28.690000
CVE-2024-56513,0,0,9b984981824a0c6f095fb5665637efc179ff6f540261d1adf328a60bce18b5fd,2025-01-03T17:15:08.840000
CVE-2024-56514,0,0,e058d052cba75c8abceb7466be1ca70fd5102e5e0d800171ed2174e12e737c27,2025-01-03T17:15:09.017000
@ -274827,6 +274850,7 @@ CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b
CVE-2024-5739,0,0,c5c2a01c52729f34b70d0ba17b3b2c0fc6065fac9c4acf57edb649a485cbd474,2025-02-20T11:15:09.400000
CVE-2024-57392,0,0,7b9989fcc73c1df35c96288876a5368c643f8db4e87836a57a99cbb5dea65395,2025-02-11T15:15:18.900000
CVE-2024-57395,0,0,2c6b9838d8d0a9b17c18c2b5c319e27ac8a0ab4c8fbbb39ded3167ef6bff33f1,2025-01-31T21:15:11.383000
CVE-2024-57401,1,1,2859063cdfe20a40f5a31b63fc9e0efa3eb2097c3ed482aa578fc1d041897bac,2025-02-20T15:15:13.347000
CVE-2024-57407,0,0,45e1a10510320897f48f1620e894947df2f73cd6e1f003632125a8e02b442b2e,2025-02-19T21:15:15.393000
CVE-2024-57408,0,0,175db0428293ce57c99d60d486d8cbd43e580b93d14f299c67a8f76d88381cb5,2025-02-11T00:15:28.707000
CVE-2024-57409,0,0,0b05f5863a283decb12d24250619815c0ec7b2696059e21578dc2420bbab0e60,2025-02-11T00:15:28.863000
@ -277933,7 +277957,7 @@ CVE-2024-8907,0,0,51c2686e57db6be1a13996b2715ca4c00712b0dfaff67ec4c63726bf925972
CVE-2024-8908,0,0,5817f53ddb99ab4a81fefd746445a2c702eaf4a55d3e4f8367bc04682257df1a,2024-09-23T17:59:14.137000
CVE-2024-8909,0,0,fb8c7cc103ad0a4020bec1abca775241831a1e52b8f464def3241421ff1aa23a,2024-09-23T17:51:11.790000
CVE-2024-8910,0,0,b23db5016d915783bf9156097d73048cfcbe9132f4af76d9048ab9b65d0f274b,2024-10-03T17:34:27.913000
CVE-2024-8911,0,0,1c055f3e09829fb21c04c14ae3a8152042ba8c9ae34aa262827c4d7c5665eb14,2024-10-10T12:56:30.817000
CVE-2024-8911,0,1,246797851c97ea5b7f755ea5f1c4d1b908435f8aae081e002abae966ffcba0c0,2025-02-20T15:30:18.643000
CVE-2024-8912,0,0,5f812240ef35b303f18482e3ad02a90a92625a71cec90a4ad938301fb183a5a6,2024-10-15T12:57:46.880000
CVE-2024-8913,0,0,4b045cbaddd3ff3542b8aaebc92f6b2957acddca8518ca9571f8352022bee390,2025-02-05T17:18:08.830000
CVE-2024-8914,0,0,ce4fb597594217313bfdde28ad4b8137ce4048a1c3742ef10b91b3c3978b838a,2025-01-27T18:15:40.230000
@ -277962,7 +277986,7 @@ CVE-2024-8939,0,0,c25a02094c7c1751d20525b12c6e0eb5406cee4bacfaf03c2adb4b584bb9a3
CVE-2024-8940,0,0,9a3c4329418a0e3104a91f652312bd7ae60a157cfba240489e078a14636eee06,2024-10-01T17:21:01.550000
CVE-2024-8941,0,0,8e9c3f4e719097ce642538ebd62ea55c93311c5fe6daf8b2d296986fc9c234e5,2024-09-30T19:45:43.223000
CVE-2024-8942,0,0,c4ece599c1d45ba712aee1c379ddee7479ad369e987935d035985aa672bd599d,2024-09-30T17:39:28.417000
CVE-2024-8943,0,0,e3f9879d74432198676a63296f791a6faa12885ac8bf7bd31eea59cb73160181,2024-10-10T12:56:30.817000
CVE-2024-8943,0,1,5e19655e35ac3d84c57759b3e5c18b3e8838fbb8ed2c65606c5291003392b119,2025-02-20T15:30:59.567000
CVE-2024-8944,0,0,4d54f1a0baaf503429d63b0c7baf27b829b5af54b4fe40f08a44318e73509207,2024-09-23T16:56:34.637000
CVE-2024-8945,0,0,49fe08fa5001a52fcc4b693eea0010b97a8789b0d8d21b7f4e3e0328bdefe156,2024-09-25T19:24:25.167000
CVE-2024-8946,0,0,bcb0cae889a0e634e570c2499f9be0b5c400d66b6bfab9c51dd0c42de347d94a,2024-09-24T13:11:17.417000
@ -278883,6 +278907,7 @@ CVE-2025-0146,0,0,5b6cbf7778d150dc0f764d560e6920d84643598a762755ba92a93cdb6447e0
CVE-2025-0147,0,0,a6050aa713d7ae074010769aeb6cd57025126d14dd2a5867c45c4d515d5bfa43,2025-01-30T20:15:35.253000
CVE-2025-0148,0,0,b7337835a1848c842fc2b56ea72e1a0898aa28c40787a276d8091bbd669c236a,2025-02-03T23:15:08.217000
CVE-2025-0158,0,0,f3073b33a682c6c4fcb1bbe908bc9fc861912bdae73f97919c33833b929dfa0a,2025-02-06T21:15:21.923000
CVE-2025-0161,1,1,6a5cec8bbd7fe4ae87879953341dc15816450e6791f75fba2567a9ddc4b48b23,2025-02-20T16:15:36.333000
CVE-2025-0167,0,0,d4663f95972209d56dcdcbcde80e33737ce4bcc3e802817579e13c9b67abdfd2,2025-02-06T15:15:16.967000
CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000
CVE-2025-0169,0,0,a5d0b3b918a183dd75efd99915b694a33b31e217f0fac0641a3f178803662807,2025-02-11T18:15:24.260000
@ -279380,7 +279405,7 @@ CVE-2025-1025,0,0,88de3d5b0a73f8ebb31a09c003423921c8f28cb5c5fcc232fde8c177bdee96
CVE-2025-1026,0,0,035fc1dc2474697a852e52233cc9d299f677e1a0207511b21278e18a7e117de5,2025-02-05T05:15:10.687000
CVE-2025-1028,0,0,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000
CVE-2025-1035,0,0,d903f294151be8a3e62456157037514ca824f897e40f9739bb45f708f03b9002,2025-02-18T12:15:16.087000
CVE-2025-1039,1,1,dc35f96e066d0f1c0e4583992324060e73a8fefc79481a755adf446f58a96b39,2025-02-20T14:15:33.627000
CVE-2025-1039,0,0,dc35f96e066d0f1c0e4583992324060e73a8fefc79481a755adf446f58a96b39,2025-02-20T14:15:33.627000
CVE-2025-1042,0,0,e4600eb751c0559414826534607894ec791f03e01157094495f2034b236d6aad,2025-02-12T15:15:16.230000
CVE-2025-1043,0,0,c607b275d7254bbcb4ccac200e10fd3b263d060b985922e80bbb9468afeab30b,2025-02-20T12:15:11.030000
CVE-2025-1044,0,0,9f8be6c10874ff2755d0454f22f2307f6446f5aad49de046e6d1d7bccf9d96f4,2025-02-18T21:34:01.863000
@ -279463,8 +279488,8 @@ CVE-2025-1172,0,0,cf08703b66582ec9de3e473fcab67a2dbafe69d53a075dc9b8254b1bcc7063
CVE-2025-1173,0,0,3256d2a06a1e205d73caa7c7b35a941bd06320937c6ee57d5e3a1dfb4b5dac94,2025-02-18T18:15:32.097000
CVE-2025-1174,0,0,b277eefc10bbea1c65bde415abd8b710cfabaaf26b49d8adc747498793fad326,2025-02-11T05:15:13.810000
CVE-2025-1175,0,0,e4e505608345f018f25d9a8f47aadfc991d7592689b77a43eab3f49ae131ee56,2025-02-10T13:15:26.593000
CVE-2025-1176,0,0,3ce63005f2d6955454d119dc789ba0c338f09f10e1ca69523a11a4e76ebec2d2,2025-02-11T06:15:22.433000
CVE-2025-1177,0,0,5d479a05ee98fce9bd1df94de6d3bb9d103629ca41a0e69997601547f088af7c,2025-02-11T06:15:22.623000
CVE-2025-1176,0,1,8cf8a70dcc94a89a62919366b7487a3dfdce95e8c69cdb3cf8f5341719553f93,2025-02-20T16:40:56.790000
CVE-2025-1177,0,1,2750688ea305a99d2156eb5379d393b0bc9b7de2dab06fab402b7d10b18283f9,2025-02-20T15:58:50.097000
CVE-2025-1178,0,0,6e9bc15abee46095fa45b59249884a86b08db54b5b6bfb3dfcc9175f57316032,2025-02-11T16:15:50.410000
CVE-2025-1179,0,0,b0d6771b78105fabc5cb05959af91d00a6aa6f0f241f8fe7fdd0d3377e4112f5,2025-02-11T07:15:30.230000
CVE-2025-1180,0,0,e33150e1627a57b9cd6fa38d34bee2af60b28a8fa910407013e14bac501bc1ce,2025-02-11T15:15:20.260000
@ -279476,7 +279501,7 @@ CVE-2025-1185,0,0,cc25ee2f77a3103fcd68a3f1611fd1f716189b46d9cae5c522939b670d5fe6
CVE-2025-1186,0,0,8086a12ea65738a60ab99220576d2e18e33f078a2bf72100e8b879a5e3eef2f8,2025-02-18T18:15:32.870000
CVE-2025-1187,0,0,4d377fdf42828c943e4e7e7e9bc0ee6d4b95eda485220a10fe3d04dafc88feff,2025-02-18T21:28:37.800000
CVE-2025-1188,0,0,705852bbbd5f869ccd9a3fec289796fb3a53a8119c986f44aa0b13a8e84aa3bc,2025-02-18T18:15:33.103000
CVE-2025-1189,0,0,9d048b706e0c633092d2636c584e408a87b9bacdb8dd7e3545dee61fb5f96c9c,2025-02-12T10:15:14.540000
CVE-2025-1189,0,1,3b6e41cbcc65254efe4e87c6b632c90e93a50ee5dc1bb04dd5b747e87cec7253,2025-02-20T16:24:17.783000
CVE-2025-1190,0,0,bdc8e5317e46e46a9ca4a9bb55f67f9139555824a181f8bdaf33c4b7f757c764,2025-02-18T18:47:00.127000
CVE-2025-1191,0,0,1c6bbb235a5b5708d13f9a9dc19f35d51e2568dd188a3fd7f6e46662095fe78f,2025-02-18T17:51:51.260000
CVE-2025-1192,0,0,88623588fdc59389c24d2321b3658ac92ffbf7f63f6d3e4f84f69d25664fc37a,2025-02-18T17:52:35.107000
@ -279580,6 +279605,7 @@ CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19
CVE-2025-20045,0,0,ba0ef320c9e613957cdfe0d3749dda7745ee780500cd8bc568a221eb62e504a9,2025-02-05T18:15:29.760000
CVE-2025-20055,0,0,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f84d,2025-01-14T10:15:07.710000
CVE-2025-20058,0,0,af25661117d7a8f1ae52c2135ac2ae15c5889bbaee5a55db180a54f06b9f9e1f,2025-02-05T18:15:29.943000
CVE-2025-20059,1,1,f562912b659dee303ce52787c7776cf1978b99a8e34b3ae810a23469ead25e2a,2025-02-20T15:15:13.957000
CVE-2025-20061,0,0,e62e8a8fd4ab6d97299876ba25c6f346e45990a2a45061ca766da62571a8af24,2025-01-29T20:15:35.363000
CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000
CVE-2025-20075,0,0,b30b32e2f08da502fea0698f2946161a425eb310144fa5e17bbcbe0fe4f71804,2025-02-18T00:15:21.107000
@ -280248,7 +280274,7 @@ CVE-2025-22402,0,0,3d05349369555f44f15217004f13f07d59bb4bf46759f4c867640d0bca502
CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000
CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000
CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
CVE-2025-22467,0,0,79f72ccd5b3a974b689712a969e184ac73efee9466b0950e634b839d4d74346a,2025-02-11T16:15:50.840000
CVE-2025-22467,0,1,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000
CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000
CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000
@ -281107,8 +281133,8 @@ CVE-2025-23997,0,0,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb
CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000
CVE-2025-24001,0,0,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000
CVE-2025-24010,0,0,755be8be1475b71408bd0286ec94084c98023c6a02427820a8766e3be39154b8,2025-01-20T16:15:28.730000
CVE-2025-24011,0,0,f293290e6460b1cd8914f5613f3369d3446787903b23580aebaaaa42416d5ed4,2025-01-21T16:15:14.760000
CVE-2025-24012,0,0,9d2250800d70ae062590b777d53f5900dbc9b4bfdd2d45d866c2ca6c753985af,2025-01-21T16:15:14.923000
CVE-2025-24011,0,1,4997002c63d87a94e8865776add6314e721049c559bd5f674a539776486b7a16,2025-02-20T16:44:29.017000
CVE-2025-24012,0,1,d7756088832c18500532400fd59d99bc70c3afd7fc4835be1603f2f4ad48aacf,2025-02-20T16:45:15.377000
CVE-2025-24013,0,0,7b40cfb2c3b6c4eade342d9fc55e4330f563cbcf759855be6657139e406290d2,2025-01-20T16:15:28.877000
CVE-2025-24014,0,0,c01e1782ee7131bc5ad5aeeb3c598dd08e570d6bc857e837f2feba5725cf242d,2025-01-21T03:15:06.393000
CVE-2025-24016,0,0,c090754f26d92875e7dde6ca613307138b21fce6005c542e3bd734afb516a0ac,2025-02-10T20:15:42.540000
@ -281546,7 +281572,7 @@ CVE-2025-24891,0,0,fa354bb024eafc83868e45bcfabfb6da90613ba074888a78bff8f3e35d34b
CVE-2025-24892,0,0,51c367e6866b01e462dd4aa6239e7b847dd4ef3a2e44ef848d7f38e79a738768,2025-02-10T16:15:39.310000
CVE-2025-24894,0,0,719537e2b65db00c391760a0cd638c15406668ed57b32d2a279ec49cb0e3adaa,2025-02-18T19:15:28.090000
CVE-2025-24895,0,0,b00a9ba498d0a292ef1f9fa7a927fff9b8cfa424cc9586cb281d28faa6ce8d74,2025-02-18T19:15:28.240000
CVE-2025-24896,0,0,aec136f16d507a4ff319c0cbf4875cbc3a2af117b9ba5311873360f82c290541,2025-02-11T16:15:51.477000
CVE-2025-24896,0,1,990844e95cf5f001626311cb46be899bcd7e5e93cef08984ed7570a5b8885bfe,2025-02-20T15:48:37.877000
CVE-2025-24897,0,0,b4a9ca153078c9451982223cb67d9a48c46e9b9480f45d60a768c29a811f5d8a,2025-02-11T16:15:51.610000
CVE-2025-24898,0,0,8b656476c3e6384183d80bdf8cadd585c7688e8bfb1105b9b189df49539552e9,2025-02-11T08:15:32.003000
CVE-2025-24899,0,0,b464e96610aff8658de3c88cb6a2e44c2520453b604cb150cf8f488249a2b344,2025-02-03T21:15:15.703000
@ -281742,13 +281768,13 @@ CVE-2025-25897,0,0,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30ca
CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08670,2025-02-18T18:15:35.503000
CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000
CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000
CVE-2025-25901,0,0,3d0f8edd50682ae64d3cb2fe331b3f075e5218ba4cab3ff5c4ac461a68bbd907,2025-02-18T14:57:24.510000
CVE-2025-25942,0,0,85ab4062eb43878f0fdb1e9875b98a7e10521685ddf48033df109e4b98271d9e,2025-02-19T23:15:15.310000
CVE-2025-25943,0,0,d8f46691dc91eee9e4a20a2f1b3cb0f319f6b0cceb5f86c13d7f054eee11d83f,2025-02-19T23:15:15.417000
CVE-2025-25944,0,0,92e5875cc75dd022b4c4515b2b71e73c344be84ce672451cb2474c3087b576f2,2025-02-19T23:15:15.530000
CVE-2025-25945,0,0,cdd982f3067d9f331d55d648a036c2ff012b6b52b47fbaa5476ef9b27e1463c9,2025-02-19T23:15:15.630000
CVE-2025-25946,0,0,7337752975888d8ec631a94282133e81248aa33cbd1be6b828382b2886ad9d96,2025-02-19T23:15:15.743000
CVE-2025-25947,0,0,ab800ba5d018949119fcd4ce2569459b29e4005fcc6eea426b0205535350332d,2025-02-19T23:15:15.850000
CVE-2025-25901,0,1,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000
CVE-2025-25942,0,1,aaefa1472b5a3a4ffd45a7b82843a4fba08935bb07eb639c11b55e6ffce6e19f,2025-02-20T15:15:14.587000
CVE-2025-25943,0,1,3d5d9a9e07fdb25bf040079f5fee5cc6a8e0580e939f6bf77bd76c374978b2a7,2025-02-20T15:15:14.743000
CVE-2025-25944,0,1,be3957e03ef6cc753272acb47a0146e6f3e330f45af5947134f7dfc1abcce0e4,2025-02-20T15:15:14.900000
CVE-2025-25945,0,1,11a45dbb9f85298a4f5f5f1ffa2ff82703bd23ae19884ad1bb8a03ee40102cde,2025-02-20T15:15:15.073000
CVE-2025-25946,0,1,b9c23bf08cd92d7c9cca31f0d0d39dfabaeeb4f8fda065f73ab8d2322e4edf92,2025-02-20T15:15:15.227000
CVE-2025-25947,0,1,bf5a589bf21a858d30ce3f9e75804530a939c4b2ce95d48bea111bb37f0f00d5,2025-02-20T15:15:15.530000
CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000
CVE-2025-25990,0,0,3799d4ee2eafd94f9f260dbe11fd1f5d7b5884f5756bc3f8070105dd11697e10,2025-02-18T15:15:18.790000
CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000

Can't render this file because it is too large.