mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-03T10:00:19.496425+00:00
This commit is contained in:
parent
081ac470e3
commit
662786889d
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-0579",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-01-16T17:15:08.280",
|
||||
"lastModified": "2025-06-03T06:15:23.010",
|
||||
"lastModified": "2025-06-03T09:15:21.340",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical was found in Totolink X2000R 1.0.0-B20221212.1452. Affected by this vulnerability is the function formMapDelDevice of the file /boafrm/formMapDelDevice. The manipulation of the argument macstr/devicemac1/bandstr leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
"value": "A vulnerability classified as critical was found in Totolink X2000R 1.0.0-B20221212.1452. Affected by this vulnerability is the function formMapDelDevice of the file /boafrm/formMapDelDevice. The manipulation of the argument macstr leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -131,7 +131,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
60
CVE-2025/CVE-2025-17xx/CVE-2025-1725.json
Normal file
60
CVE-2025/CVE-2025-17xx/CVE-2025-1725.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-1725",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-06-03T09:15:22.487",
|
||||
"lastModified": "2025-06-03T09:15:22.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Bit File Manager \u2013 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/file-manager/tags/6.6.3/backend/app/Http/Controllers/FileManagerController.php#L112",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/84ddb481-f989-4ba8-9925-e8327c30de38?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
104
CVE-2025/CVE-2025-414xx/CVE-2025-41428.json
Normal file
104
CVE-2025/CVE-2025-414xx/CVE-2025-41428.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2025-41428",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2025-06-03T08:15:19.467",
|
||||
"lastModified": "2025-06-03T08:15:19.467",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in TimeWorks 10.0 to 10.3. If exploited, arbitrary JSON files on the server may be viewed by a remote unauthenticated attacker."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN37075430/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.keiyo-system.co.jp/archives/11310",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-44xx/CVE-2025-4420.json
Normal file
68
CVE-2025/CVE-2025-44xx/CVE-2025-4420.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-4420",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-06-03T09:15:22.673",
|
||||
"lastModified": "2025-06-03T09:15:22.673",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Vayu Blocks \u2013 Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018containerWidth\u2019 parameter in all versions up to, and including, 1.3.1 due to a missing capability check on the vayu_blocks_option_panel_callback() function and insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/vayu-blocks/trunk/inc/admin-api.php#L6",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3303594/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/vayu-blocks/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db01bc0a-4508-4fb5-941d-3f1a52528e2b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
104
CVE-2025/CVE-2025-463xx/CVE-2025-46355.json
Normal file
104
CVE-2025/CVE-2025-463xx/CVE-2025-46355.json
Normal file
@ -0,0 +1,104 @@
|
||||
{
|
||||
"id": "CVE-2025-46355",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2025-06-03T08:15:19.813",
|
||||
"lastModified": "2025-06-03T08:15:19.813",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect default permissions issue in PC Time Tracer prior to 5.2. If exploited, arbitrary code may be executed with SYSTEM privilege on Windows system where the product is running by a local authenticated attacker."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN05562338/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.keiyo-system.co.jp/archives/11305",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-51xx/CVE-2025-5103.json
Normal file
68
CVE-2025/CVE-2025-51xx/CVE-2025-5103.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-5103",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-06-03T09:15:22.840",
|
||||
"lastModified": "2025-06-03T09:15:22.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ultimate Gift Cards for WooCommerce plugin for WordPress is vulnerable to boolean-based SQL Injection via the 'default_price' and 'product_id' parameters in all versions up to, and including, 3.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woo-gift-cards-lite/tags/3.1.4/admin/class-woocommerce-gift-cards-lite-admin.php#L571",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3303359/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/woo-gift-cards-lite/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e89383-a9c6-4300-970c-0b36e4d97e3d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-51xx/CVE-2025-5116.json
Normal file
72
CVE-2025/CVE-2025-51xx/CVE-2025-5116.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-5116",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-06-03T09:15:23.007",
|
||||
"lastModified": "2025-06-03T09:15:23.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Plugin Info Card plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018containerid\u2019 parameter in all versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This issue is due to an incomplete patch for CVE-2025-31835."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DLXPlugins/wp-plugin-info-card/blob/dev/php/Shortcodes.php#L893",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-plugin-info-card/trunk/php/Shortcodes.php#L929",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3303791",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wp-plugin-info-card/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e29ea7dd-14b8-45d3-a87e-3f58de88af4c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
43
README.md
43
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-03T08:00:21.997598+00:00
|
||||
2025-06-03T10:00:19.496425+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-03T07:15:21.380000+00:00
|
||||
2025-06-03T09:15:23.007000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,45 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
296291
|
||||
296297
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `24`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-53010](CVE-2024/CVE-2024-530xx/CVE-2024-53010.json) (`2025-06-03T06:15:23.887`)
|
||||
- [CVE-2024-53013](CVE-2024/CVE-2024-530xx/CVE-2024-53013.json) (`2025-06-03T06:15:24.160`)
|
||||
- [CVE-2024-53015](CVE-2024/CVE-2024-530xx/CVE-2024-53015.json) (`2025-06-03T06:15:24.350`)
|
||||
- [CVE-2024-53016](CVE-2024/CVE-2024-530xx/CVE-2024-53016.json) (`2025-06-03T06:15:24.580`)
|
||||
- [CVE-2024-53017](CVE-2024/CVE-2024-530xx/CVE-2024-53017.json) (`2025-06-03T06:15:24.793`)
|
||||
- [CVE-2024-53018](CVE-2024/CVE-2024-530xx/CVE-2024-53018.json) (`2025-06-03T06:15:24.963`)
|
||||
- [CVE-2024-53019](CVE-2024/CVE-2024-530xx/CVE-2024-53019.json) (`2025-06-03T06:15:25.147`)
|
||||
- [CVE-2024-53020](CVE-2024/CVE-2024-530xx/CVE-2024-53020.json) (`2025-06-03T06:15:25.347`)
|
||||
- [CVE-2024-53021](CVE-2024/CVE-2024-530xx/CVE-2024-53021.json) (`2025-06-03T06:15:25.560`)
|
||||
- [CVE-2024-53026](CVE-2024/CVE-2024-530xx/CVE-2024-53026.json) (`2025-06-03T06:15:25.780`)
|
||||
- [CVE-2025-21463](CVE-2025/CVE-2025-214xx/CVE-2025-21463.json) (`2025-06-03T06:15:25.983`)
|
||||
- [CVE-2025-21479](CVE-2025/CVE-2025-214xx/CVE-2025-21479.json) (`2025-06-03T07:15:20.933`)
|
||||
- [CVE-2025-21480](CVE-2025/CVE-2025-214xx/CVE-2025-21480.json) (`2025-06-03T06:15:26.190`)
|
||||
- [CVE-2025-21485](CVE-2025/CVE-2025-214xx/CVE-2025-21485.json) (`2025-06-03T06:15:26.423`)
|
||||
- [CVE-2025-21486](CVE-2025/CVE-2025-214xx/CVE-2025-21486.json) (`2025-06-03T06:15:26.590`)
|
||||
- [CVE-2025-27029](CVE-2025/CVE-2025-270xx/CVE-2025-27029.json) (`2025-06-03T06:15:26.777`)
|
||||
- [CVE-2025-27031](CVE-2025/CVE-2025-270xx/CVE-2025-27031.json) (`2025-06-03T06:15:26.960`)
|
||||
- [CVE-2025-27038](CVE-2025/CVE-2025-270xx/CVE-2025-27038.json) (`2025-06-03T06:15:27.133`)
|
||||
- [CVE-2025-31710](CVE-2025/CVE-2025-317xx/CVE-2025-31710.json) (`2025-06-03T06:15:27.310`)
|
||||
- [CVE-2025-31711](CVE-2025/CVE-2025-317xx/CVE-2025-31711.json) (`2025-06-03T06:15:27.480`)
|
||||
- [CVE-2025-31712](CVE-2025/CVE-2025-317xx/CVE-2025-31712.json) (`2025-06-03T06:15:27.613`)
|
||||
- [CVE-2025-3584](CVE-2025/CVE-2025-35xx/CVE-2025-3584.json) (`2025-06-03T06:15:27.757`)
|
||||
- [CVE-2025-3662](CVE-2025/CVE-2025-36xx/CVE-2025-3662.json) (`2025-06-03T06:15:27.873`)
|
||||
- [CVE-2025-4567](CVE-2025/CVE-2025-45xx/CVE-2025-4567.json) (`2025-06-03T06:15:27.983`)
|
||||
- [CVE-2025-1725](CVE-2025/CVE-2025-17xx/CVE-2025-1725.json) (`2025-06-03T09:15:22.487`)
|
||||
- [CVE-2025-41428](CVE-2025/CVE-2025-414xx/CVE-2025-41428.json) (`2025-06-03T08:15:19.467`)
|
||||
- [CVE-2025-4420](CVE-2025/CVE-2025-44xx/CVE-2025-4420.json) (`2025-06-03T09:15:22.673`)
|
||||
- [CVE-2025-46355](CVE-2025/CVE-2025-463xx/CVE-2025-46355.json) (`2025-06-03T08:15:19.813`)
|
||||
- [CVE-2025-5103](CVE-2025/CVE-2025-51xx/CVE-2025-5103.json) (`2025-06-03T09:15:22.840`)
|
||||
- [CVE-2025-5116](CVE-2025/CVE-2025-51xx/CVE-2025-5116.json) (`2025-06-03T09:15:23.007`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-0579](CVE-2024/CVE-2024-05xx/CVE-2024-0579.json) (`2025-06-03T06:15:23.010`)
|
||||
- [CVE-2025-5086](CVE-2025/CVE-2025-50xx/CVE-2025-5086.json) (`2025-06-03T07:15:21.380`)
|
||||
- [CVE-2024-0579](CVE-2024/CVE-2024-05xx/CVE-2024-0579.json) (`2025-06-03T09:15:21.340`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
58
_state.csv
58
_state.csv
@ -244660,7 +244660,7 @@ CVE-2024-0575,0,0,666db6d006ad62a3798810cdf677ce8703490110d9506ea423387c568d8644
|
||||
CVE-2024-0576,0,0,ad7a11f1101011fcccc639cc126df4bf996c2095ae6ccfc69cc179008012f4d5,2024-11-21T08:46:55.867000
|
||||
CVE-2024-0577,0,0,6da93877f20c21635a4796302f324842a4d17e9d36ff795581ac357d18c84502,2024-11-21T08:46:56
|
||||
CVE-2024-0578,0,0,ee96b899589e161f2fa6ec7b5e57230eca35c9f889dd1f0b522a3b67c1a43964,2024-11-21T08:46:56.177000
|
||||
CVE-2024-0579,0,1,677a49b7d30c7028b83fd9c36ee69752436f5bca212b4b6de64a0077657f5d02,2025-06-03T06:15:23.010000
|
||||
CVE-2024-0579,0,1,364c5be124a0fa43fcbd1d1c0c59ceb71fea47bc06c30562fd762ed415efb7a4,2025-06-03T09:15:21.340000
|
||||
CVE-2024-0580,0,0,4f03021d504adea5906d25054a7bdbbeee6b07de5251752c2f6620a9f1d606c3,2024-11-21T08:46:56.453000
|
||||
CVE-2024-0581,0,0,195cad63f48edfacf562edbfafcc549b51805ce4e6c8c685d59db42934309bf3,2024-11-21T08:46:56.580000
|
||||
CVE-2024-0582,0,0,a162ed06c8be1ace9eb09441c3e8b77ff26337827cb8ad9e2481a1cd8134a776,2024-11-21T08:46:56.703000
|
||||
@ -275139,24 +275139,24 @@ CVE-2024-53006,0,0,9319c5ef0bd10ec00679ded4a4ad11e13d0be340e712e774cbfbbe0a53824
|
||||
CVE-2024-53007,0,0,7ba22a6b4032cf25f35c1ef00a1f90b930f980bf5515302c33e7724c5430a878,2025-01-31T08:15:08.157000
|
||||
CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000
|
||||
CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000
|
||||
CVE-2024-53010,1,1,05e80b9336fdc1c50cb312accd7cc89807585d871683f92e9d927a217dbf7887,2025-06-03T06:15:23.887000
|
||||
CVE-2024-53010,0,0,05e80b9336fdc1c50cb312accd7cc89807585d871683f92e9d927a217dbf7887,2025-06-03T06:15:23.887000
|
||||
CVE-2024-53011,0,0,43652afa8ecc8ffd9ce037fbbd076ab2370cdb5bab16d27a9d0d522b14d90e39,2025-03-03T13:15:10.853000
|
||||
CVE-2024-53012,0,0,950d19974b52359043aeababc59a313e37e644d350cda3a38725dd1bbdedcdb2,2025-03-06T17:11:00.953000
|
||||
CVE-2024-53013,1,1,cd510110b1073150526050391a1cc6ee7cb7a8a91d59ddb26d9b242f4bc413ca,2025-06-03T06:15:24.160000
|
||||
CVE-2024-53013,0,0,cd510110b1073150526050391a1cc6ee7cb7a8a91d59ddb26d9b242f4bc413ca,2025-06-03T06:15:24.160000
|
||||
CVE-2024-53014,0,0,f46cf9621d7ec0ec27b269342393212a2ff98a2d1e4dee51da1f5926fb7a1566,2025-03-06T17:53:56.627000
|
||||
CVE-2024-53015,1,1,37cc064bd332577609694c254fb15fa20c85eb0fef21178639c35fcad4c55644,2025-06-03T06:15:24.350000
|
||||
CVE-2024-53016,1,1,2feac6d8cd6615ab27d3380cc5fc5d738cee42637c90303ac85dd67b8de5ef36,2025-06-03T06:15:24.580000
|
||||
CVE-2024-53017,1,1,ed87516bf5a529ee3e7953c21dddd393d04878934d335a3c0827381819c6deeb,2025-06-03T06:15:24.793000
|
||||
CVE-2024-53018,1,1,8f51d3340d23bfa24acf28d0d13a35ee07b440fdbff190fbf1470f3fa508a3ef,2025-06-03T06:15:24.963000
|
||||
CVE-2024-53019,1,1,cc65e156cbbcf29f48c46ceab6c45ab36aab7146cc34a053aba86a13d8329f2d,2025-06-03T06:15:25.147000
|
||||
CVE-2024-53015,0,0,37cc064bd332577609694c254fb15fa20c85eb0fef21178639c35fcad4c55644,2025-06-03T06:15:24.350000
|
||||
CVE-2024-53016,0,0,2feac6d8cd6615ab27d3380cc5fc5d738cee42637c90303ac85dd67b8de5ef36,2025-06-03T06:15:24.580000
|
||||
CVE-2024-53017,0,0,ed87516bf5a529ee3e7953c21dddd393d04878934d335a3c0827381819c6deeb,2025-06-03T06:15:24.793000
|
||||
CVE-2024-53018,0,0,8f51d3340d23bfa24acf28d0d13a35ee07b440fdbff190fbf1470f3fa508a3ef,2025-06-03T06:15:24.963000
|
||||
CVE-2024-53019,0,0,cc65e156cbbcf29f48c46ceab6c45ab36aab7146cc34a053aba86a13d8329f2d,2025-06-03T06:15:25.147000
|
||||
CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000
|
||||
CVE-2024-53020,1,1,166bcf321332a0ed6b181b60a93edc1c75bd5b1f7c754a3ac824113e243d69ef,2025-06-03T06:15:25.347000
|
||||
CVE-2024-53021,1,1,0a13d5ba31f8db766c3eff7346ea8b93a64f92c6e12010e2ebcf350536f60eb7,2025-06-03T06:15:25.560000
|
||||
CVE-2024-53020,0,0,166bcf321332a0ed6b181b60a93edc1c75bd5b1f7c754a3ac824113e243d69ef,2025-06-03T06:15:25.347000
|
||||
CVE-2024-53021,0,0,0a13d5ba31f8db766c3eff7346ea8b93a64f92c6e12010e2ebcf350536f60eb7,2025-06-03T06:15:25.560000
|
||||
CVE-2024-53022,0,0,1f7d4cb1a035457938447f797a131050573edd098327d13c971b963b504c0be0,2025-03-06T17:53:45.620000
|
||||
CVE-2024-53023,0,0,4991d64b52ee6b6149a8df2b655b67d0aa27e520b393b97673b088b92b6768f3,2025-03-07T11:52:53.973000
|
||||
CVE-2024-53024,0,0,b4367dee590361a0c69d79254e166f98a1f0e0486712b21d3bf0f5dc6c740df6,2025-03-06T17:53:27.780000
|
||||
CVE-2024-53025,0,0,91a23b9db5f048fda78eaf5cfaceeb7484de79586a4c749acf92fcdc70bf6090,2025-03-06T17:53:18.463000
|
||||
CVE-2024-53026,1,1,1dd3ae4644770caf83541bbc335acc5aa13d4ac2a6aa0c5e7184bf76cacf491d,2025-06-03T06:15:25.780000
|
||||
CVE-2024-53026,0,0,1dd3ae4644770caf83541bbc335acc5aa13d4ac2a6aa0c5e7184bf76cacf491d,2025-06-03T06:15:25.780000
|
||||
CVE-2024-53027,0,0,f2775659635233bf71c563784e7075e6cb34f960d73482bad948bc1afe444256,2025-03-06T17:53:06.633000
|
||||
CVE-2024-53028,0,0,47c1f6c6de706a1a88b64062b39ad64ff81060289fa9ea75185c681384a1860c,2025-03-06T21:16:30.650000
|
||||
CVE-2024-53029,0,0,9faad4c644d7cc6766182f984eb4dad5985edb2c7f1854e13bd05423a0e71bf3,2025-03-06T18:10:30.300000
|
||||
@ -283691,6 +283691,7 @@ CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d
|
||||
CVE-2025-1717,0,0,3d4f0d449e7852a9bab717d0d55b537c9dc57d522d200e81bab92be20a7c833d,2025-03-11T16:12:42.783000
|
||||
CVE-2025-1723,0,0,da7e603c0fdbcf8b17bcff90e3ff294dcf324014070d98aed22d913dc322d276,2025-03-03T08:15:15.717000
|
||||
CVE-2025-1724,0,0,b8e86d6fa70198b5cc9fe6224a04663cb9564b5f8c33fbf347cdad07f13847ed,2025-03-17T07:15:33.467000
|
||||
CVE-2025-1725,1,1,484f4f3b008cf8f410d412b639fcc32bd2e1e80b242bac0d03000edf1c5898a4,2025-06-03T09:15:22.487000
|
||||
CVE-2025-1726,0,0,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000
|
||||
CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000
|
||||
CVE-2025-1730,0,0,1995ccb1e144a2c7a6984fe76cde065e7b6f85edc7bf90ff89583ed751f146df,2025-03-01T07:15:11.380000
|
||||
@ -284705,18 +284706,18 @@ CVE-2025-21459,0,0,5c386ebea9ff578717babb7aa51aad849d73bca7cd137939105262b1d5b65
|
||||
CVE-2025-2146,0,0,9b4f4783eb3d5c38d2a6495db29ef3bd1558c0661d5a4cf523d11e6f32aeaf66,2025-05-28T15:01:30.720000
|
||||
CVE-2025-21460,0,0,389cc7be8fa099528db069375678ba8c4a64d44cb4ba042b2379ea417e3aa0f3,2025-05-09T19:09:33.447000
|
||||
CVE-2025-21462,0,0,472fd520000393ead0a178585c5420674292d66900bca0ccacb3268944c15d7e,2025-05-09T19:09:19.660000
|
||||
CVE-2025-21463,1,1,eea414ba69f1a4ee5ca75c5097c270c878111730470586c60280c9221d600948,2025-06-03T06:15:25.983000
|
||||
CVE-2025-21463,0,0,eea414ba69f1a4ee5ca75c5097c270c878111730470586c60280c9221d600948,2025-06-03T06:15:25.983000
|
||||
CVE-2025-21467,0,0,ee6894e4cbe2827de5e9551f2468fe4483ae3970632b17da0270579a63a0e452,2025-05-09T19:09:11.167000
|
||||
CVE-2025-21468,0,0,657db3e9e3b08d3a920f7b517225c72105a802e2c6d292c94318fca052f3a5a0,2025-05-09T19:09:01.703000
|
||||
CVE-2025-21469,0,0,44a98d2c7da1387889249fd5539f1241bba1748830f946c1d60c946e176d6446,2025-05-09T19:08:51.337000
|
||||
CVE-2025-2147,0,0,74883129637bc3238403c8977cb3f6a890ade1afe4467a882851a126f0eb8edc,2025-03-24T14:30:40.943000
|
||||
CVE-2025-21470,0,0,302140affced5624b7926ec75d432b3f98e7a2f5e5c1d9590233b858d4c47845,2025-05-09T19:08:42.713000
|
||||
CVE-2025-21475,0,0,f2f32195890d4a050cc8c69ec5f14e2e026ddc3e3e1c08b511c44a38ddd17bc2,2025-05-09T19:08:32.710000
|
||||
CVE-2025-21479,1,1,329822e0d479abb3de013ec719b36bba16b84e0a5c2b4e1558a8ede6d57e9970,2025-06-03T07:15:20.933000
|
||||
CVE-2025-21479,0,0,329822e0d479abb3de013ec719b36bba16b84e0a5c2b4e1558a8ede6d57e9970,2025-06-03T07:15:20.933000
|
||||
CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b9e,2025-03-10T14:15:26.130000
|
||||
CVE-2025-21480,1,1,2bc172d5c108adf01d1e3618c85fbd4950b8129dd6af06d0bf58a8093737dba7,2025-06-03T06:15:26.190000
|
||||
CVE-2025-21485,1,1,73010e18ec621a1a17167f907048fc66beee8b9c3599de3cddf72f09ee8387e1,2025-06-03T06:15:26.423000
|
||||
CVE-2025-21486,1,1,c5e16de3bcadc7d595ee20023571b8c6f4699e27d552dea8d1e8a4a8eed6c72d,2025-06-03T06:15:26.590000
|
||||
CVE-2025-21480,0,0,2bc172d5c108adf01d1e3618c85fbd4950b8129dd6af06d0bf58a8093737dba7,2025-06-03T06:15:26.190000
|
||||
CVE-2025-21485,0,0,73010e18ec621a1a17167f907048fc66beee8b9c3599de3cddf72f09ee8387e1,2025-06-03T06:15:26.423000
|
||||
CVE-2025-21486,0,0,c5e16de3bcadc7d595ee20023571b8c6f4699e27d552dea8d1e8a4a8eed6c72d,2025-06-03T06:15:26.590000
|
||||
CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000
|
||||
CVE-2025-2149,0,0,d7df4a69e494fa588a972d8a9b2091768f937c9cdd73a96cb132062cdf0f66aa,2025-03-10T14:15:26.267000
|
||||
CVE-2025-21490,0,0,b59bfaf73f4a7aac7f498efe2114db1737794c6dd1c56d41aa09f498e00d23bb,2025-04-09T16:06:52.400000
|
||||
@ -288991,10 +288992,10 @@ CVE-2025-27016,0,0,f2c7dbbbe198c036189ea7e0294285906759c96b4b4fc3925b1ca597f8d45
|
||||
CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0bce5,2025-03-12T17:15:50.327000
|
||||
CVE-2025-27018,0,0,6f3ff57da68756a01cdeb909bf195b378373dad1a9ba319e915b2b92c4fa99b0,2025-03-25T18:15:34.683000
|
||||
CVE-2025-2702,0,0,7ef0bfa66e07c4fb7c181b57cab1217f373873ecf500d50de0d874610b07459c,2025-03-24T10:15:12.943000
|
||||
CVE-2025-27029,1,1,52ac68a9cdf6220cc18c5e7cbb583d98e66fa0a9fab7cdc377fda1e06ea9860c,2025-06-03T06:15:26.777000
|
||||
CVE-2025-27029,0,0,52ac68a9cdf6220cc18c5e7cbb583d98e66fa0a9fab7cdc377fda1e06ea9860c,2025-06-03T06:15:26.777000
|
||||
CVE-2025-2703,0,0,1cd2ec1071e8a854a09aaa20f8e960bae5b0d0c1a938baebd649e294b60810d4,2025-04-23T14:08:13.383000
|
||||
CVE-2025-27031,1,1,f69e1e0dba9ba78d4c6190b5ed5e711fd3643a9a1a5a7fd6ecc0a1e4b91fc55c,2025-06-03T06:15:26.960000
|
||||
CVE-2025-27038,1,1,88d4feb7f16c77fd7c2e580cd25cd9480717c650a4769b561f8c00bbba264178,2025-06-03T06:15:27.133000
|
||||
CVE-2025-27031,0,0,f69e1e0dba9ba78d4c6190b5ed5e711fd3643a9a1a5a7fd6ecc0a1e4b91fc55c,2025-06-03T06:15:26.960000
|
||||
CVE-2025-27038,0,0,88d4feb7f16c77fd7c2e580cd25cd9480717c650a4769b561f8c00bbba264178,2025-06-03T06:15:27.133000
|
||||
CVE-2025-2704,0,0,2cd2fdcb7bf078b49adccb5ec3568934eab2cf5655946edca476f7cde559986a,2025-05-24T01:38:01.433000
|
||||
CVE-2025-2705,0,0,d7cf085971e80ff2f3017b9a76ca7e7c021414ba6b4da520921b330deccd7930,2025-03-27T16:45:46.410000
|
||||
CVE-2025-2706,0,0,b7301874e71862c2693f8002ec404483a315cca246767eff2f97ca78b31281f9,2025-03-27T16:45:46.410000
|
||||
@ -291629,9 +291630,9 @@ CVE-2025-31696,0,0,7181c70430e7f11f94551e571b933443a77c74627eab2d3af9d5a2722d8bb
|
||||
CVE-2025-31697,0,0,d2f6e5dae8beddd7adbc933b42660d8199d000a2c4970c75b74c3c6a7e4fd487,2025-04-29T16:15:34.633000
|
||||
CVE-2025-3170,0,0,afb2bda5dd4e3285c33c62d49a05a12fd30d05e815744685a436b70b7583067d,2025-04-08T20:52:02.413000
|
||||
CVE-2025-3171,0,0,facd85de14a5feadcffd67276b1dd3aaa07eb8c0a878fc188d12f11d57d8217c,2025-04-08T20:43:42.857000
|
||||
CVE-2025-31710,1,1,ecaad9481e1d57e9476d5b38acf524d11a505e34f2e33e4142c9fccd3098be3c,2025-06-03T06:15:27.310000
|
||||
CVE-2025-31711,1,1,a3fa30778e19165b85652b2f713ceade4f08eb94cab66e00be37306d99ae6972,2025-06-03T06:15:27.480000
|
||||
CVE-2025-31712,1,1,17def7a96244816b4bb76c349fdf1982790b6eed1591dfd29f74b5671fecdd0a,2025-06-03T06:15:27.613000
|
||||
CVE-2025-31710,0,0,ecaad9481e1d57e9476d5b38acf524d11a505e34f2e33e4142c9fccd3098be3c,2025-06-03T06:15:27.310000
|
||||
CVE-2025-31711,0,0,a3fa30778e19165b85652b2f713ceade4f08eb94cab66e00be37306d99ae6972,2025-06-03T06:15:27.480000
|
||||
CVE-2025-31712,0,0,17def7a96244816b4bb76c349fdf1982790b6eed1591dfd29f74b5671fecdd0a,2025-06-03T06:15:27.613000
|
||||
CVE-2025-3172,0,0,7ef3d20b4569576ecc044e7634dd1d1d020ed6e5c64b90d6184f578b093246a4,2025-05-15T20:07:38.310000
|
||||
CVE-2025-31720,0,0,ce62208919cdfa9fb252b714bb7365bb606e8689ef37f84aded5e8ad22c74887,2025-04-29T14:03:21.570000
|
||||
CVE-2025-31721,0,0,91995a06eddb99842482cec92b823782bf8b0af6c3c204a05bb9543bd15215b4,2025-04-29T13:56:43.860000
|
||||
@ -292945,7 +292946,7 @@ CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e182
|
||||
CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3580,0,0,fb5209c3cd7ebcd66c15bce657f3ddb23cbe27d0c5d33814deb9407bd651e1de,2025-05-23T15:54:42.643000
|
||||
CVE-2025-3583,0,0,5e828bc2ad696ee8fcb9f09a10e41d54b38effce4c0c5b61566233d5e9eb1a29,2025-05-07T16:36:47.020000
|
||||
CVE-2025-3584,1,1,8be41d09e78c501793318f42a2b4096d6ba7326c3510a3c833e1035c8e14dda0,2025-06-03T06:15:27.757000
|
||||
CVE-2025-3584,0,0,8be41d09e78c501793318f42a2b4096d6ba7326c3510a3c833e1035c8e14dda0,2025-06-03T06:15:27.757000
|
||||
CVE-2025-3585,0,0,793d014b8d4f8a0338ac5bc0543e903589c1e8b4dc1d9fc37efe0dfb6e2b3b88,2025-05-21T20:01:00.620000
|
||||
CVE-2025-3587,0,0,24a9d7f002b5d3dda78896e9b2347c9c9868aa706322ae2e0fbf5aeb34b2cb44,2025-04-15T18:39:27.967000
|
||||
CVE-2025-3588,0,0,da176b06433f826abfeb7533e116e8f1c0acf114fe10a330f45ab13cc6f35417,2025-04-15T18:39:27.967000
|
||||
@ -293013,7 +293014,7 @@ CVE-2025-36560,0,0,69f4a5989b5124f7f2b1a6e9227991ebf4cb4743ed3c1503408fd719a2cf7
|
||||
CVE-2025-36572,0,0,058b67de5ee82f1e6220c3754353a9e125a12fbf0176dd2f3a1d9ddfb79707a8,2025-05-29T14:29:50.247000
|
||||
CVE-2025-3659,0,0,039e45884228ee6931146a26d674c81218c137b52a98fba4b25ba26a78f9ee4c,2025-05-13T19:35:25.503000
|
||||
CVE-2025-3661,0,0,dd52ef0b5adcc429dab993fa8b0a07866db488604856f931ffdf953b111b0450,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3662,1,1,fa76f3967f29876fbaa404d18bcab772f4ff9a6149e57a40dd0566d7140ddbf7,2025-06-03T06:15:27.873000
|
||||
CVE-2025-3662,0,0,fa76f3967f29876fbaa404d18bcab772f4ff9a6149e57a40dd0566d7140ddbf7,2025-06-03T06:15:27.873000
|
||||
CVE-2025-36625,0,0,45de53deee0dce100ce8c109fcd29d898f18f9e0ae3fd1f38ff75bfff7ae47fe,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3663,0,0,8e1f6f32c25b3b8d1ec3b3a3f1e13e7a7d56fd1e7c8e37fb37a5c673e5d21e5b,2025-05-12T19:50:03.073000
|
||||
CVE-2025-3664,0,0,8622093c787fd6e9e1b160486bb91e2aaa36ebec298b1306944080b7ed6d8600,2025-04-22T16:53:30.190000
|
||||
@ -294016,6 +294017,7 @@ CVE-2025-41414,0,0,e15bca7d4059421d15d5cb35dc483cbefc52e8d9cd9f55b31b9d84f79a125
|
||||
CVE-2025-4142,0,0,78a1ea715ae46e4bda0a693a8542472224c3dca467cf3911b9ec4f409b46b000,2025-05-12T19:39:50.053000
|
||||
CVE-2025-41423,0,0,3ae1e637900a2dfc5b6bacaa494e26a0b5d8e1e48accef6073153be61f7a9347,2025-04-29T13:52:47.470000
|
||||
CVE-2025-41426,0,0,43242131e19ec18f330497e91493c38832fad38a58a843ab859c1d5a86371244,2025-05-21T20:24:58.133000
|
||||
CVE-2025-41428,1,1,05da2590e70d1e08d485e3c1627cbb1dfad00722d6df324d58ae8555e7344690,2025-06-03T08:15:19.467000
|
||||
CVE-2025-41429,0,0,785edbb9428ab75f9ce49605baef089838a4f7d9c3a250c30dec518c67c17fbc,2025-05-19T13:35:20.460000
|
||||
CVE-2025-4143,0,0,3a393d8ebe58f1f33890c3bd1fbf19f7d13ee6d06509ac73d2c28267c5f302ad,2025-05-12T19:39:43.820000
|
||||
CVE-2025-41431,0,0,457130baf4dd6b7cc1c6ae128560ec31a298f522cc0ef7f373b70c3f0729af10,2025-05-08T14:39:09.683000
|
||||
@ -294398,6 +294400,7 @@ CVE-2025-4419,0,0,280ab2097f0627a87fc9bc990e1fbeb501026297486a153453a713f412e7cb
|
||||
CVE-2025-44192,0,0,bbf878f3192590ae7f65b7dd525822e7ec5ccf80ca743afb76c106db312359e8,2025-05-12T19:42:18.530000
|
||||
CVE-2025-44193,0,0,7a2f77bbf3da9e372539ce2d9568faa612514d106c676666f4f9e9bb49dd4d4d,2025-05-12T19:42:08.603000
|
||||
CVE-2025-44194,0,0,16480af03700c5c401cb85fd0d61e2e08efda510d573cd95f20458628d42434d,2025-05-12T19:41:14.840000
|
||||
CVE-2025-4420,1,1,ce038fb29a6692be764c07fd478227cfce695047a961e4cb45ef9ab346d0ddd9,2025-06-03T09:15:22.673000
|
||||
CVE-2025-4427,0,0,a2f798eeedafecbd9cb912f610af162690a80cf4bdd1bef66f3124ee4670723f,2025-05-21T18:45:49.493000
|
||||
CVE-2025-4428,0,0,9005850fdd231a6f5e460fd5ca5842b016cbe5e1aed7fc3fa752cdd9cc20f3cb,2025-05-21T18:45:24.800000
|
||||
CVE-2025-4429,0,0,fe6071399e142802408b914c5bdedf40a11e5b9791557c888b05a6344723a056,2025-05-30T16:31:03.107000
|
||||
@ -294633,7 +294636,7 @@ CVE-2025-45617,0,0,45ec32c91fa8777f902c441e0ad6a5cbb4b231cb8d61355ddcbbf662a9985
|
||||
CVE-2025-45618,0,0,767ee00e764e7ef5bf5da280443f8f8ac155a067bd61e2227396cf4720a51137,2025-05-06T04:16:18.347000
|
||||
CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e0e,2025-05-22T23:15:19.620000
|
||||
CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4567,1,1,fde4bb0852da315db12e889813d654bd5d7ffd6e2041581467b11e73d6501452,2025-06-03T06:15:27.983000
|
||||
CVE-2025-4567,0,0,fde4bb0852da315db12e889813d654bd5d7ffd6e2041581467b11e73d6501452,2025-06-03T06:15:27.983000
|
||||
CVE-2025-4574,0,0,a936e70ea81d08570f1b370d85f904e33ed32b85014f55e350943da2afdfcfb5,2025-05-16T14:43:56.797000
|
||||
CVE-2025-45746,0,0,4f739c19260013516117a27de71915ddd8b481653d1fe15c253a574b15da0223,2025-05-21T14:15:31.553000
|
||||
CVE-2025-4575,0,0,0624d6300232d42a9f90f1e62069c560ca8ea8d361bea47508069c55d62ec0b1,2025-05-23T15:55:02.040000
|
||||
@ -294783,6 +294786,7 @@ CVE-2025-46349,0,0,1714a97271744ee922f4bd027ddde23d095fab400e525c7e78a72152293a3
|
||||
CVE-2025-4635,0,0,dbd97ddcf9f06e6a17bd98831167ca852ef57632eda54b68ef8eca53b0008e92,2025-05-30T16:31:03.107000
|
||||
CVE-2025-46350,0,0,e9c2d732d02d04db30379a06f4d06a3199d3f19fe29e090eebfdcec4aeb7f535,2025-05-09T13:57:36.823000
|
||||
CVE-2025-46352,0,0,618391598a4bc31a1d4677ab5a474da78aeac6261ac4ae8b26099a8c01185f09,2025-05-30T16:31:03.107000
|
||||
CVE-2025-46355,1,1,1807f41563bddcc346794c010d8d1d00e0f382923616bb8bb587edc58bb97041,2025-06-03T08:15:19.813000
|
||||
CVE-2025-4636,0,0,42769483161d9081ca44d7da54fb93931edabd656065d5921f77e2f9979ff65e,2025-05-30T16:31:03.107000
|
||||
CVE-2025-4637,0,0,6a6f5a6b16c4a5dc9c7dfdefe827d1876d1a6cd89fb863be894c5faba3f21b65,2025-05-16T14:43:56.797000
|
||||
CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000
|
||||
@ -296049,11 +296053,12 @@ CVE-2025-5079,0,0,b65b7a01086680e7c33bb20f87a251322b770baf6a9a37966a216093dc14b5
|
||||
CVE-2025-5080,0,0,0cab754d3cfde3d6b3a70ea302e2a63cd1cd3967167bff559ff2766fb5a65083,2025-05-23T15:55:02.040000
|
||||
CVE-2025-5081,0,0,56e144a5135781dc7a75ef9199aeb5fe24273a7eabc4acb8988f02e0c511fd61,2025-05-28T01:49:27.430000
|
||||
CVE-2025-5082,0,0,654b6f5ca85bdee04f191b4415361841f39b64a4d62ac7e373566ed9502c800a,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5086,0,1,576e692795eaa257c180462b85151d0da8d5282543ca9b4e80084cdea5a69ddd,2025-06-03T07:15:21.380000
|
||||
CVE-2025-5086,0,0,576e692795eaa257c180462b85151d0da8d5282543ca9b4e80084cdea5a69ddd,2025-06-03T07:15:21.380000
|
||||
CVE-2025-5096,0,0,42fe716f1efce968dc8e29663c380993b2461be601464bb005e7e57e1c939443,2025-05-23T15:54:42.643000
|
||||
CVE-2025-5098,0,0,e792975c992e79d3f869380d6027059665b6a277fad36b72dc800d8cb0d75190,2025-05-23T16:15:27.730000
|
||||
CVE-2025-5099,0,0,13cd227e8a1cb5199e136889be91b2b7e7b3359f206c3039fee4aeec3797db59,2025-05-23T16:15:27.873000
|
||||
CVE-2025-5100,0,0,a54df1e8b0bff17450a1f67dfee2545841c6f379cdcd252b360f4d2a6c61fdc9,2025-05-27T16:15:34.280000
|
||||
CVE-2025-5103,1,1,af4594b973fdd953cec06d0755700664db10b8fb67ea2802be047b4e3fd3bb5b,2025-06-03T09:15:22.840000
|
||||
CVE-2025-5105,0,0,7ec1994145b2106c72a5e3c1031b0347b4a7435fd8dfdb2d41bb64c0d8abcf2a,2025-05-23T15:54:42.643000
|
||||
CVE-2025-5106,0,0,8d60356cbd9079f6bf55b49bab02b8750a168dbc792ae017334e677c2dae68bb,2025-05-23T15:54:42.643000
|
||||
CVE-2025-5107,0,0,9bef18bc6435a934e04f34863d5f7ce6cdc3bf383eb4382c07acbfcfb93c088a,2025-05-27T15:15:35.577000
|
||||
@ -296064,6 +296069,7 @@ CVE-2025-5111,0,0,ab3c47416b65781d53c047fed78dbbb335dd4bed9307ae97643de9e73c2c42
|
||||
CVE-2025-5112,0,0,f0cd0b8c93be317d3a2c0e92912b455b4fb61ee919b7fe6bebacd87c921bdc33,2025-05-23T15:54:42.643000
|
||||
CVE-2025-5113,0,0,0bd61b4abacfc5745f349f466d36dc6433bff2c84afe9ce5402853e11bea600a,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5114,0,0,20a4205c8646981529f8abb6bcbb5fe0a32214254e6052ddc8802d6fd9b03d3c,2025-05-23T15:54:42.643000
|
||||
CVE-2025-5116,1,1,3a3248d5910bdfdea3cbcccc91a56e9fb901b18c52c8f2836052f1a9c085e6e7,2025-06-03T09:15:23.007000
|
||||
CVE-2025-5117,0,0,d8ff3473124b58dde3b831065aca2c1cf497de1bb078c68e491105627964201f,2025-05-28T15:01:30.720000
|
||||
CVE-2025-5119,0,0,bf969a61748b203da4a3f2f501a91ebb4932bff138f2ad55051f80ff5d8eb019,2025-05-28T14:58:52.920000
|
||||
CVE-2025-5122,0,0,f0e21910b241d49227076aad0272129f233644ba6bdfb930e332b9b2297be743,2025-05-29T14:29:50.247000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user