Auto-Update: 2025-02-13T15:00:33.937314+00:00

This commit is contained in:
cad-safe-bot 2025-02-13 15:04:01 +00:00
parent 9955613728
commit 6bee899239
46 changed files with 2027 additions and 80 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-7192",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2019-12-05T17:15:12.950",
"lastModified": "2025-02-06T21:15:13.510",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-13T14:18:25.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-7193",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2019-12-05T17:15:13.027",
"lastModified": "2025-02-06T21:15:13.767",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-13T14:16:18.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -95,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "NVD-CWE-noinfo"
}
]
},
@ -119,48 +119,48 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0895:*:*:*:*:*:*:*",
"matchCriteriaId": "A1AB2488-4D3D-494B-9C93-1AA3C7964644"
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0895:-:*:*:*:*:*:*",
"matchCriteriaId": "B52AEDE0-990A-4186-8F24-8CF4068E5AF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0907:*:*:*:*:*:*:*",
"matchCriteriaId": "6C24D008-D055-4A2C-88D4-85FB6DC45EFE"
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0907:-:*:*:*:*:*:*",
"matchCriteriaId": "C6EFB589-B6E1-410C-9AA5-86DD2CF7FFCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0923:*:*:*:*:*:*:*",
"matchCriteriaId": "B64D1A6D-D306-46B8-B345-3D9C38544761"
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0923:-:*:*:*:*:*:*",
"matchCriteriaId": "09573613-AD98-4A49-A960-B9E45B612710"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0944:*:*:*:*:*:*:*",
"matchCriteriaId": "067C0A13-525C-4376-A6CC-0B86F7F92670"
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0944:-:*:*:*:*:*:*",
"matchCriteriaId": "561532B6-0678-410B-8211-76103EBAA9D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0959:*:*:*:*:*:*:*",
"matchCriteriaId": "4BAE62E0-5FA0-4B9F-ACCA-9C8C70AC1F2C"
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0959:-:*:*:*:*:*:*",
"matchCriteriaId": "C58608A2-7705-4DE7-8979-DE33A35DDA88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0979:*:*:*:*:*:*:*",
"matchCriteriaId": "B6023A8C-77A8-4B79-ACC6-872E98CA0D29"
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0979:-:*:*:*:*:*:*",
"matchCriteriaId": "90E2874F-BD7C-48AF-ABCE-D96F51947A70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0993:*:*:*:*:*:*:*",
"matchCriteriaId": "CAA72D06-4FE1-4DC3-A96B-2975A4A9AF84"
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0993:-:*:*:*:*:*:*",
"matchCriteriaId": "D4347075-F444-4271-A717-FDABF8C19D7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.1013:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD59BCF-E119-4910-90CE-DCA212D146F5"
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.1013:-:*:*:*:*:*:*",
"matchCriteriaId": "6F8FB702-0BB9-419E-A847-AC9CC31F823F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.1033:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F01168-A599-480D-BEB1-FA0195B696E6"
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.1033:-:*:*:*:*:*:*",
"matchCriteriaId": "2514D352-5007-4669-A526-F179BABB0587"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-7194",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2019-12-05T17:15:13.107",
"lastModified": "2025-02-06T21:15:13.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-13T14:15:31.933",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-7195",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2019-12-05T17:15:13.183",
"lastModified": "2025-02-06T21:15:14.220",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-13T14:13:03.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-2509",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2021-04-17T04:15:11.327",
"lastModified": "2025-02-06T21:15:15.153",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-13T14:22:58.803",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-8468",
"sourceIdentifier": "security@trendmicro.com",
"published": "2020-03-18T01:15:12.003",
"lastModified": "2025-02-06T20:15:34.587",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-13T14:28:17.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-36742",
"sourceIdentifier": "security@trendmicro.com",
"published": "2021-07-29T20:15:07.650",
"lastModified": "2025-02-06T20:15:37.530",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-13T14:26:24.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -95,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "NVD-CWE-noinfo"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37920",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T21:15:10.827",
"lastModified": "2025-02-12T19:55:47.327",
"vulnStatus": "Modified",
"lastModified": "2025-02-13T13:50:15.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -87,9 +87,69 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:certifi:certifi:*:*:*:*:*:python:*:*",
"versionStartIncluding": "2015.04.28",
"versionEndExcluding": "2023.07.22",
"matchCriteriaId": "4392638D-2F29-46D8-8E47-1A102A34BA57"
"versionStartIncluding": "2015.4.28",
"versionEndExcluding": "2023.7.22",
"matchCriteriaId": "2FF2392F-9661-448D-BE25-4AD98BD5D808"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
"matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4455CF3A-CC91-4BE4-A7AB-929AC82E34F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_mediator:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19DD87DA-6999-4B38-B953-BEC49760F2BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:solidfire_\\&_hci_storage_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D452B464-1200-4B72-9A89-42DC58486191"
}
]
}
@ -121,7 +181,10 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909",
@ -147,11 +210,17 @@
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240912-0002/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12582",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-12-24T04:15:05.137",
"lastModified": "2024-12-24T04:15:05.137",
"lastModified": "2025-02-13T14:15:28.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:1413",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-12582",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13182",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-13T13:15:08.290",
"lastModified": "2025-02-13T13:15:08.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Directorybox Manager plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.5. This is due to incorrect authentication in the 'wp_dp_parse_request' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "http://localhost:1337/wp-content/plugins/wp-directorybox-manager/elements/login/cs-social-login/cs-social-login.php#L43",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea9e5e5d-a7fc-4159-a2ae-610bee76f818?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56765",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-06T17:15:42.800",
"lastModified": "2025-01-07T23:00:53.973",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-13T14:16:17.130",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57795",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-15T13:15:11.563",
"lastModified": "2025-01-15T13:15:11.563",
"lastModified": "2025-02-13T14:16:17.430",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: RDMA/rxe: eliminar el enlace directo a net_device El parche similar en siw se encuentra en el enlace: https://git.kernel.org/rdma/rdma/c/16b87037b48889 Este problema tambi\u00e9n se produjo en RXE. A continuaci\u00f3n se analiza este problema. En los siguientes seguimientos de llamadas: \"ERROR: KASAN: slab-use-after-free en dev_get_flags+0x188/0x1d0 net/core/dev.c:8782 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff8880554640b0 por la tarea kworker/1:4/5295 CPU: 1 UID: 0 PID: 5295 Comm: kworker/1:4 No contaminado 6.12.0-rc3-syzkaller-00399-g9197b73fd7bb #0 Nombre del hardware: Google Compute Engine/Google Compute Engine, BIOS Google 13/09/2024 Cola de trabajo: infiniband ib_cache_event_task Seguimiento de llamadas: __dump_stack lib/dump_stack.c:94 [en l\u00ednea] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 imprimir_direcci\u00f3n_descripci\u00f3n mm/kasan/report.c:377 [en l\u00ednea] imprimir_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 dev_get_flags+0x188/0x1d0 net/core/dev.c:8782 rxe_query_port+0x12d/0x260 drivers/infiniband/sw/rxe/rxe_verbs.c:60 __ib_query_port drivers/infiniband/core/device.c:2111 [en l\u00ednea] ib_query_port+0x168/0x7d0 drivers/infiniband/core/device.c:2143 ib_cache_update+0x1a9/0xb80 drivers/infiniband/core/cache.c:1494 ib_cache_event_task+0xf3/0x1e0 drivers/infiniband/core/cache.c:1568 process_one_work kernel/workqueue.c:3229 [en l\u00ednea] process_scheduled_works+0xa65/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 \" 1). En el enlace [1], \" infiniband syz2: set down \" Esto significa que en 839.350575, se envi\u00f3 el evento ib_cache_event_task y se puso en cola en ib_wq. 2). En el enlace [1], \" team0 (unregistering): Port device team_slave_0 removed \" Esto indica que antes de 843.251853, se debe liberar el dispositivo de red. 3). En el enlace [1], \" BUG: KASAN: slab-use-after-free en dev_get_flags+0x188/0x1d0 \" Esto significa que en 850.559070, ocurri\u00f3 este problema de slab-use-after-free. En total, el 839.350575, se envi\u00f3 el evento ib_cache_event_task y se puso en cola en ib_wq, antes del 843.251853, se liber\u00f3 el dispositivo de red veth. El 850.559070, se ejecut\u00f3 este evento y se llam\u00f3 al dispositivo de red liberado mencionado. Por lo tanto, se produjo el seguimiento de la llamada anterior. [1] https://syzkaller.appspot.com/x/log.txt?x=12e7025f980000"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2ac5415022d16d63d912a39a06f32f1f51140261",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57857",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-15T13:15:12.403",
"lastModified": "2025-01-15T13:15:12.403",
"lastModified": "2025-02-13T14:16:17.620",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/siw: eliminar el enlace directo a net_device No administrar un enlace directo por dispositivo a net_device. Conf\u00ede en la administraci\u00f3n de net_device de ib_devices asociada, sin duplicar el esfuerzo localmente. Un enlace local mal administrado a net_device estaba causando una excepci\u00f3n 'KASAN: slab-use-after-free' durante la llamada siw_query_port()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/16b87037b48889d21854c8e97aec8a1baf2642b3",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57892",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-15T13:15:13.710",
"lastModified": "2025-02-02T11:15:12.450",
"lastModified": "2025-02-13T14:16:17.800",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57900",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-15T13:15:14.633",
"lastModified": "2025-01-21T17:45:42.657",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-13T14:16:18.027",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1094",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2025-02-13T13:15:09.130",
"lastModified": "2025-02-13T13:15:09.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns. Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal. Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL. Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-149"
}
]
}
],
"references": [
{
"url": "https://www.postgresql.org/support/security/CVE-2025-1094/",
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-1247",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-13T14:16:18.400",
"lastModified": "2025-02-13T14:16:18.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Quarkus REST that allows request parameters to leak between concurrent requests if endpoints use field injection without a CDI scope. This vulnerability allows attackers to manipulate request data, impersonate users, or access sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-488"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-1247",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345172",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1270",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-02-13T13:15:09.273",
"lastModified": "2025-02-13T13:15:09.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure direct object reference (IDOR) vulnerability in Anapi Group's h6web, allows an authenticated attacker to access other users' information by making a POST request and modifying the \u201cpkrelated\u201d parameter in the \u201c/h6web/ha_datos_hermano.php\u201d endpoint to refer to another user. In addition, the first request could also allow the attacker to impersonate other users. As a result, all requests made after exploitation of the IDOR vulnerability will be executed with the privileges of the impersonated user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.1,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-anapi-group-h6web",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1271",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-02-13T13:15:09.433",
"lastModified": "2025-02-13T13:15:09.433",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Reflected Cross-Site Scripting (XSS) in Anapi Group's h6web. This security flaw could allow an attacker to inject malicious JavaScript code into a URL. When a user accesses that URL, the injected code is executed in their browser, which can result in the theft of sensitive information, identity theft or the execution of unauthorised actions on behalf of the affected user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-anapi-group-h6web",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-21633",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:08.773",
"lastModified": "2025-01-19T11:15:08.773",
"lastModified": "2025-02-13T14:16:18.597",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En kernel de linux, se ha resuelto la siguiente vulnerabilidad: io_uring/sqpoll: cero errores sqd->thread en tctx Syzkeller informa: BUG: KASAN: slab-use-after-free in thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341 Read of size 8 at addr ffff88803578c510 by task syz.2.3223/27552 Call Trace: ... kasan_report+0x143/0x180 mm/kasan/report.c:602 thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341 thread_group_cputime_adjusted+0xa6/0x340 kernel/sched/cputime.c:639 getrusage+0x1000/0x1340 kernel/sys.c:1863 io_uring_show_fdinfo+0xdfe/0x1770 io_uring/fdinfo.c:197 seq_show+0x608/0x770 fs/proc/fd.c:68... Esto se debe a que sqd->task no se borra correctamente en los casos en que falla la configuraci\u00f3n de tctx de la tarea SQPOLL, lo que esencialmente solo puede ocurrir con errores de inyecci\u00f3n de errores en la asignaci\u00f3n de insertos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4b7cfa8b6c28a9fa22b86894166a1a34f6d630ba",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-21700",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-13T12:15:27.837",
"lastModified": "2025-02-13T12:15:27.837",
"lastModified": "2025-02-13T14:16:18.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: Disallow replacing of child qdisc from one parent to another\n\nLion Ackermann was able to create a UAF which can be abused for privilege\nescalation with the following script\n\nStep 1. create root qdisc\ntc qdisc add dev lo root handle 1:0 drr\n\nstep2. a class for packet aggregation do demonstrate uaf\ntc class add dev lo classid 1:1 drr\n\nstep3. a class for nesting\ntc class add dev lo classid 1:2 drr\n\nstep4. a class to graft qdisc to\ntc class add dev lo classid 1:3 drr\n\nstep5.\ntc qdisc add dev lo parent 1:1 handle 2:0 plug limit 1024\n\nstep6.\ntc qdisc add dev lo parent 1:2 handle 3:0 drr\n\nstep7.\ntc class add dev lo classid 3:1 drr\n\nstep 8.\ntc qdisc add dev lo parent 3:1 handle 4:0 pfifo\n\nstep 9. Display the class/qdisc layout\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nstep10. trigger the bug <=== prevented by this patch\ntc qdisc replace dev lo parent 1:3 handle 4:0\n\nstep 11. Redisplay again the qdiscs/classes\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 1:3 root leaf 4: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 refcnt 2 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nObserve that a) parent for 4:0 does not change despite the replace request.\nThere can only be one parent. b) refcount has gone up by two for 4:0 and\nc) both class 1:3 and 3:1 are pointing to it.\n\nStep 12. send one packet to plug\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10001))\nstep13. send one packet to the grafted fifo\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10003))\n\nstep14. lets trigger the uaf\ntc class delete dev lo classid 1:3\ntc class delete dev lo classid 1:1\n\nThe semantics of \"replace\" is for a del/add _on the same node_ and not\na delete from one node(3:1) and add to another node (1:3) as in step10.\nWhile we could \"fix\" with a more complex approach there could be\nconsequences to expectations so the patch takes the preventive approach of\n\"disallow such config\".\n\nJoint work with Lion Ackermann <nnamrec@gmail.com>"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/46c59ec33ec98aba20c15117630cae43a01404cc",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26538",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:19.100",
"lastModified": "2025-02-13T14:16:19.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dan Rossiter Prezi Embedder allows Stored XSS. This issue affects Prezi Embedder: from n/a through 2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/prezi-embedder/vulnerability/wordpress-prezi-embedder-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26539",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:19.383",
"lastModified": "2025-02-13T14:16:19.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in petkivim Embed Google Map allows Stored XSS. This issue affects Embed Google Map: from n/a through 3.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/embed-google-map/vulnerability/wordpress-embed-google-map-plugin-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26543",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:19.707",
"lastModified": "2025-02-13T14:16:19.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Pukhraj Suthar Simple Responsive Menu allows Stored XSS. This issue affects Simple Responsive Menu: from n/a through 2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/simple-responsive-menu/vulnerability/wordpress-simple-responsive-menu-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26545",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:20.043",
"lastModified": "2025-02-13T14:16:20.043",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in shisuh Related Posts Line-up-Exactly by Milliard allows Stored XSS. This issue affects Related Posts Line-up-Exactly by Milliard: from n/a through 0.0.22."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/related-posts-line-up-exactry-by-milliard/vulnerability/wordpress-related-posts-line-up-exactly-by-milliard-plugin-0-0-22-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26547",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:20.347",
"lastModified": "2025-02-13T14:16:20.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in nagarjunsonti My Login Logout Plugin allows Stored XSS. This issue affects My Login Logout Plugin: from n/a through 2.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/my-loginlogout/vulnerability/wordpress-my-login-logout-plugin-plugin-2-4-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26549",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:20.663",
"lastModified": "2025-02-13T14:16:20.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in pa1 WP Html Page Sitemap allows Stored XSS. This issue affects WP Html Page Sitemap: from n/a through 2.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-html-page-sitemap/vulnerability/wordpress-wp-html-page-sitemap-plugin-2-2-csrf-to-stored-cross-site-scripting?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26550",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:20.993",
"lastModified": "2025-02-13T14:16:20.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Kunal Shivale Global Meta Keyword & Description allows Stored XSS. This issue affects Global Meta Keyword & Description: from n/a through 2.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/global-meta-keyword-and-description/vulnerability/wordpress-global-meta-keyword-description-plugin-2-3-csrf-to-cross-site-scripting-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26551",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:21.450",
"lastModified": "2025-02-13T14:16:21.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sureshdsk Bootstrap collapse allows Stored XSS. This issue affects Bootstrap collapse: from n/a through 1.0.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/bootstrap-collapse/vulnerability/wordpress-bootstrap-collapse-plugin-1-0-4-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26552",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:21.787",
"lastModified": "2025-02-13T14:16:21.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in badrHan Naver Syndication V2 allows Stored XSS. This issue affects Naver Syndication V2: from n/a through 0.8.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/badr-naver-syndication/vulnerability/wordpress-naver-syndication-v2-plugin-0-8-3-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26558",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:22.130",
"lastModified": "2025-02-13T14:16:22.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mkkmail Aparat Responsive allows DOM-Based XSS. This issue affects Aparat Responsive: from n/a through 1.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/aparat-responsive/vulnerability/wordpress-aparat-responsive-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26561",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:22.450",
"lastModified": "2025-02-13T14:16:22.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in elfsight Elfsight Yottie Lite allows Stored XSS. This issue affects Elfsight Yottie Lite: from n/a through 1.3.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/yottie-lite/vulnerability/wordpress-elfsight-yottie-lite-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26562",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:22.607",
"lastModified": "2025-02-13T14:16:22.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Shambhu Patnaik RSS Filter allows Stored XSS. This issue affects RSS Filter: from n/a through 1.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/rss-filter/vulnerability/wordpress-rss-filter-plugin-1-2-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26567",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:22.763",
"lastModified": "2025-02-13T14:16:22.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in farjana55 Font Awesome WP allows DOM-Based XSS. This issue affects Font Awesome WP: from n/a through 1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/font-awesome-wp/vulnerability/wordpress-font-awesome-wp-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26568",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:22.910",
"lastModified": "2025-02-13T14:16:22.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in jensmueller Easy Amazon Product Information allows Stored XSS. This issue affects Easy Amazon Product Information: from n/a through 4.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/easy-amazon-product-information/vulnerability/wordpress-easy-amazon-product-information-plugin-4-0-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26569",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.070",
"lastModified": "2025-02-13T14:16:23.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in callmeforsox Post Thumbs allows Stored XSS. This issue affects Post Thumbs: from n/a through 1.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/post-thumbs/vulnerability/wordpress-post-thumbs-plugin-1-5-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26570",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.223",
"lastModified": "2025-02-13T14:16:23.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in uamv Glance That allows Cross Site Request Forgery. This issue affects Glance That: from n/a through 4.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/glance-that/vulnerability/wordpress-glance-that-plugin-4-9-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26571",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.360",
"lastModified": "2025-02-13T14:16:23.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in wibiya Wibiya Toolbar allows Cross Site Request Forgery. This issue affects Wibiya Toolbar: from n/a through 2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wibiya/vulnerability/wordpress-wibiya-toolbar-plugin-2-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26572",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.507",
"lastModified": "2025-02-13T14:16:23.507",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in jesseheap WP PHPList allows Cross Site Request Forgery. This issue affects WP PHPList: from n/a through 1.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/phplist-form-integration/vulnerability/wordpress-wp-phplist-plugin-1-7-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26574",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.653",
"lastModified": "2025-02-13T14:16:23.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moch Amir Google Drive WP Media allows Stored XSS. This issue affects Google Drive WP Media: from n/a through 2.4.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/google-drive-wp-media/vulnerability/wordpress-google-drive-wp-media-plugin-2-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26577",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.797",
"lastModified": "2025-02-13T14:16:23.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in daxiawp DX-auto-publish allows Stored XSS. This issue affects DX-auto-publish: from n/a through 1.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/dx-auto-publish/vulnerability/wordpress-dx-auto-publish-plugin-1-2-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26578",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.990",
"lastModified": "2025-02-13T14:16:23.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in mathieuhays Simple Documentation allows Stored XSS. This issue affects Simple Documentation: from n/a through 1.2.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/client-documentation/vulnerability/wordpress-simple-documentation-plugin-1-2-8-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26580",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:24.250",
"lastModified": "2025-02-13T14:16:24.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in CompleteWebResources Page/Post Specific Social Share Buttons allows Stored XSS. This issue affects Page/Post Specific Social Share Buttons: from n/a through 2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/pagepost-specific-social-share-buttons/vulnerability/wordpress-page-post-specific-social-share-buttons-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26582",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:24.407",
"lastModified": "2025-02-13T14:16:24.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Blackbam TinyMCE Advanced qTranslate fix editor problems allows Stored XSS. This issue affects TinyMCE Advanced qTranslate fix editor problems: from n/a through 1.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/tinymce-advanced-qtranslate-fix-editor-problems/vulnerability/wordpress-tinymce-advanced-qtranslate-fix-editor-problems-plugin-1-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-13T13:00:37.983503+00:00
2025-02-13T15:00:33.937314+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-13T12:15:27.837000+00:00
2025-02-13T14:28:17.323000+00:00
```
### Last Data Feed Release
@ -33,20 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
281220
281248
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `28`
- [CVE-2025-21700](CVE-2025/CVE-2025-217xx/CVE-2025-21700.json) (`2025-02-13T12:15:27.837`)
- [CVE-2025-1270](CVE-2025/CVE-2025-12xx/CVE-2025-1270.json) (`2025-02-13T13:15:09.273`)
- [CVE-2025-1271](CVE-2025/CVE-2025-12xx/CVE-2025-1271.json) (`2025-02-13T13:15:09.433`)
- [CVE-2025-26538](CVE-2025/CVE-2025-265xx/CVE-2025-26538.json) (`2025-02-13T14:16:19.100`)
- [CVE-2025-26539](CVE-2025/CVE-2025-265xx/CVE-2025-26539.json) (`2025-02-13T14:16:19.383`)
- [CVE-2025-26543](CVE-2025/CVE-2025-265xx/CVE-2025-26543.json) (`2025-02-13T14:16:19.707`)
- [CVE-2025-26545](CVE-2025/CVE-2025-265xx/CVE-2025-26545.json) (`2025-02-13T14:16:20.043`)
- [CVE-2025-26547](CVE-2025/CVE-2025-265xx/CVE-2025-26547.json) (`2025-02-13T14:16:20.347`)
- [CVE-2025-26549](CVE-2025/CVE-2025-265xx/CVE-2025-26549.json) (`2025-02-13T14:16:20.663`)
- [CVE-2025-26550](CVE-2025/CVE-2025-265xx/CVE-2025-26550.json) (`2025-02-13T14:16:20.993`)
- [CVE-2025-26551](CVE-2025/CVE-2025-265xx/CVE-2025-26551.json) (`2025-02-13T14:16:21.450`)
- [CVE-2025-26552](CVE-2025/CVE-2025-265xx/CVE-2025-26552.json) (`2025-02-13T14:16:21.787`)
- [CVE-2025-26558](CVE-2025/CVE-2025-265xx/CVE-2025-26558.json) (`2025-02-13T14:16:22.130`)
- [CVE-2025-26561](CVE-2025/CVE-2025-265xx/CVE-2025-26561.json) (`2025-02-13T14:16:22.450`)
- [CVE-2025-26562](CVE-2025/CVE-2025-265xx/CVE-2025-26562.json) (`2025-02-13T14:16:22.607`)
- [CVE-2025-26567](CVE-2025/CVE-2025-265xx/CVE-2025-26567.json) (`2025-02-13T14:16:22.763`)
- [CVE-2025-26568](CVE-2025/CVE-2025-265xx/CVE-2025-26568.json) (`2025-02-13T14:16:22.910`)
- [CVE-2025-26569](CVE-2025/CVE-2025-265xx/CVE-2025-26569.json) (`2025-02-13T14:16:23.070`)
- [CVE-2025-26570](CVE-2025/CVE-2025-265xx/CVE-2025-26570.json) (`2025-02-13T14:16:23.223`)
- [CVE-2025-26571](CVE-2025/CVE-2025-265xx/CVE-2025-26571.json) (`2025-02-13T14:16:23.360`)
- [CVE-2025-26572](CVE-2025/CVE-2025-265xx/CVE-2025-26572.json) (`2025-02-13T14:16:23.507`)
- [CVE-2025-26574](CVE-2025/CVE-2025-265xx/CVE-2025-26574.json) (`2025-02-13T14:16:23.653`)
- [CVE-2025-26577](CVE-2025/CVE-2025-265xx/CVE-2025-26577.json) (`2025-02-13T14:16:23.797`)
- [CVE-2025-26578](CVE-2025/CVE-2025-265xx/CVE-2025-26578.json) (`2025-02-13T14:16:23.990`)
- [CVE-2025-26580](CVE-2025/CVE-2025-265xx/CVE-2025-26580.json) (`2025-02-13T14:16:24.250`)
- [CVE-2025-26582](CVE-2025/CVE-2025-265xx/CVE-2025-26582.json) (`2025-02-13T14:16:24.407`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `16`
- [CVE-2019-7192](CVE-2019/CVE-2019-71xx/CVE-2019-7192.json) (`2025-02-13T14:18:25.263`)
- [CVE-2019-7193](CVE-2019/CVE-2019-71xx/CVE-2019-7193.json) (`2025-02-13T14:16:18.827`)
- [CVE-2019-7194](CVE-2019/CVE-2019-71xx/CVE-2019-7194.json) (`2025-02-13T14:15:31.933`)
- [CVE-2019-7195](CVE-2019/CVE-2019-71xx/CVE-2019-7195.json) (`2025-02-13T14:13:03.560`)
- [CVE-2020-2509](CVE-2020/CVE-2020-25xx/CVE-2020-2509.json) (`2025-02-13T14:22:58.803`)
- [CVE-2020-8468](CVE-2020/CVE-2020-84xx/CVE-2020-8468.json) (`2025-02-13T14:28:17.323`)
- [CVE-2021-36742](CVE-2021/CVE-2021-367xx/CVE-2021-36742.json) (`2025-02-13T14:26:24.660`)
- [CVE-2023-37920](CVE-2023/CVE-2023-379xx/CVE-2023-37920.json) (`2025-02-13T13:50:15.813`)
- [CVE-2024-12582](CVE-2024/CVE-2024-125xx/CVE-2024-12582.json) (`2025-02-13T14:15:28.700`)
- [CVE-2024-56765](CVE-2024/CVE-2024-567xx/CVE-2024-56765.json) (`2025-02-13T14:16:17.130`)
- [CVE-2024-57795](CVE-2024/CVE-2024-577xx/CVE-2024-57795.json) (`2025-02-13T14:16:17.430`)
- [CVE-2024-57857](CVE-2024/CVE-2024-578xx/CVE-2024-57857.json) (`2025-02-13T14:16:17.620`)
- [CVE-2024-57892](CVE-2024/CVE-2024-578xx/CVE-2024-57892.json) (`2025-02-13T14:16:17.800`)
- [CVE-2024-57900](CVE-2024/CVE-2024-579xx/CVE-2024-57900.json) (`2025-02-13T14:16:18.027`)
- [CVE-2025-21633](CVE-2025/CVE-2025-216xx/CVE-2025-21633.json) (`2025-02-13T14:16:18.597`)
- [CVE-2025-21700](CVE-2025/CVE-2025-217xx/CVE-2025-21700.json) (`2025-02-13T14:16:18.803`)
## Download and Usage

View File

@ -141984,10 +141984,10 @@ CVE-2019-7181,0,0,c9ef1610f232f8ad3af4bc7af8d77d7d8d5fa61986869be34826f7c90304f4
CVE-2019-7183,0,0,37217b9c80e4d3d92cfadafc02dccddb3f2aac11b4e740ab67d148b357e01ab3,2024-11-21T04:47:44.140000
CVE-2019-7184,0,0,9c893b465dac642769eae6def5be2469c211cd0eb0f9e9a311924aeae68c4455,2024-11-21T04:47:44.253000
CVE-2019-7185,0,0,835b8e1d9d28366a9aa06cde1038caf9ad3cb7941b1394e2fe9daa0ecda925f1,2024-11-21T04:47:44.363000
CVE-2019-7192,0,0,5f86bd786f18d88295ad0097a53fbd7c3afe632c68d799c370e57997f8c2d9ac,2025-02-06T21:15:13.510000
CVE-2019-7193,0,0,5f47103e8f9cf1ae9304748e783c799adaa0b13fcead554a680d38dff2b2abcc,2025-02-06T21:15:13.767000
CVE-2019-7194,0,0,553fdf1d76a3de339a698965acde383735fd352017fe831190dcd17d2ebed875,2025-02-06T21:15:13.990000
CVE-2019-7195,0,0,4ac545e53cb09ffaaa23e6c3f6afa1a6254c74d32b9044822c8ec6646a3a58d8,2025-02-06T21:15:14.220000
CVE-2019-7192,0,1,6b33121e1fcb9aa3ae848a3cef8c00890d1b66ee55c7b261324f5b19f2345d85,2025-02-13T14:18:25.263000
CVE-2019-7193,0,1,6d206349e72ef1bc7d39a429528ff326287e5e1052f23aac7aabde73cbe7d6f0,2025-02-13T14:16:18.827000
CVE-2019-7194,0,1,a43350f74c67d3a599f0b781b4dbc1cd88feefe265d4dc38f34f958cf98b64a7,2025-02-13T14:15:31.933000
CVE-2019-7195,0,1,943a97eb8b9ef29c551e66149cd8c8f13be7d2dcec393acf7d6e2d7ad26c0d60,2025-02-13T14:13:03.560000
CVE-2019-7197,0,0,d5f937acfde0c9086aa0bfe59af502bce0e9860fef4f0e726928abce1a665740,2024-11-21T04:47:44.987000
CVE-2019-7198,0,0,b25fed3c68cf30094538eed1380862b90470522189d1fdc2727fac5de0b8fe44,2024-11-21T04:47:45.103000
CVE-2019-7201,0,0,aa884f1aeb73ad412cb8d9962cd20003116139550d408f0059cbfbfeef7b95e9,2024-11-21T04:47:45.237000
@ -154673,7 +154673,7 @@ CVE-2020-25086,0,0,406084c58b22bda8f13f3b9d8a02d35e42f1f9c5c9d6980736368bcc90254
CVE-2020-25087,0,0,42bcd614840fd96e5185322268ded6756e513fb4247e189d048207a71104933f,2024-11-21T05:17:14.903000
CVE-2020-25088,0,0,4efc5ef43c5d509698dad0e471c922e40baa3a62a29b95b47c4e4d0ee2cd72aa,2024-11-21T05:17:15.660000
CVE-2020-25089,0,0,ce03dec9de84337ca2b76e9dc2b43f752c171dd99f63389d3e8ed1a77ead189b,2024-11-21T05:17:15.970000
CVE-2020-2509,0,0,88bb381866e79d1131bc9fb2b156378c8ceddcf88353e3d1a78cdee3af853643,2025-02-06T21:15:15.153000
CVE-2020-2509,0,1,d0240186499c9fcf7c26560370e489b2e01369fbe89587b9ef494e53a444a54e,2025-02-13T14:22:58.803000
CVE-2020-25090,0,0,f97f4f0b8403aeaec3fabdb608175369035d212a6ce7f915813e6dc8ad19ad60,2024-11-21T05:17:16.310000
CVE-2020-25091,0,0,a2571d21533f526f643273f2ccf5c565f91d6f4280f190cead3a96d03978584b,2024-11-21T05:17:16.470000
CVE-2020-25092,0,0,48803469f0915f6aae5a2de00a978db0ffe872cf9d3d4aa80bd52005831576ea,2024-11-21T05:17:17.103000
@ -163567,7 +163567,7 @@ CVE-2020-8464,0,0,cde99c1fc97741bce52d94c4feb16ffb048b50869383304390b8d92336435a
CVE-2020-8465,0,0,7351106c577b021182fcdae4cbf8c32cd85778c733278671a297b620666e24d8,2024-11-21T05:38:53.570000
CVE-2020-8466,0,0,dc48662204f51e4360e95b33604e7a509ba98c62100571ad4c466fc4aeed4c92,2024-11-21T05:38:53.680000
CVE-2020-8467,0,0,42d2011bbd52d2f7e9a8a1ccda8c43bb6d33e60838fa016c725c79d8ed78a0ad,2025-02-07T15:01:20.733000
CVE-2020-8468,0,0,84f5b0c079e08b3d4ce975ac3f0cd70594eeb1d20751bfd338ca7b056a5473d1,2025-02-06T20:15:34.587000
CVE-2020-8468,0,1,df2cb2fdfcd1642ec9eee4f2eabd2d3bf13797690c7fbc202bb142151d274e4f,2025-02-13T14:28:17.323000
CVE-2020-8469,0,0,4c711e420af63f972cd1320af857c808855086c533d1abb91a0f9112be4def0c,2024-11-21T05:38:54.027000
CVE-2020-8470,0,0,fe2bf0b46476cf81b036789ceca34e3737e912bc6ee74038979e38be2662ebbe,2024-11-21T05:38:54.130000
CVE-2020-8471,0,0,3e4e8c6a62e3cfd24c8790f0420125da6e9f2589aa476edd5d8301e245f73830,2024-11-21T05:38:54.237000
@ -179575,7 +179575,7 @@ CVE-2021-36739,0,0,f26d0be0a721fbe6be03df43ffbc9b3042175c6173cfb23d10478df22eda2
CVE-2021-3674,0,0,a6ebe839edba8d8408e2ebc11b394ca63ccd563a6d74c07ce22a05a02c5340d4,2024-11-21T06:22:08.007000
CVE-2021-36740,0,0,54bc6cdf23940c08f7f28324a9e8120c825654c24d2b52459fcb9fe03320bbf6,2024-11-21T06:13:59.623000
CVE-2021-36741,0,0,d280b45653300f468a60e6fac9bd749827b184c0e1831b0373fcedbae7e2d3c9,2025-02-12T19:23:38.797000
CVE-2021-36742,0,0,dcba81fe88dc54b97cf90c1f2c6387ebd72106975a6c3eada24afe9024c87bc4,2025-02-06T20:15:37.530000
CVE-2021-36742,0,1,2e41644e342db51beeadf18bf8dc0c4d7f3c0355ab530a8109799a1fcf7f4b10,2025-02-13T14:26:24.660000
CVE-2021-36744,0,0,d45285bc3db76c0d6dab50f059ca546f427f4488393c91f33c651825cfcee74a,2024-11-21T06:14:00.137000
CVE-2021-36745,0,0,1cce952eb8dd2370e5aefef31e1a86c4ba7f1e524f793d1e889818873e30880d,2024-11-21T06:14:00.293000
CVE-2021-36746,0,0,21132e96a64571a11d67dee583d5cbe254c9677a98c9b6f236f1ceaa252d79a2,2024-11-21T06:14:00.443000
@ -229399,7 +229399,7 @@ CVE-2023-37917,0,0,51c759821fc20c5b2c69e11c0e017e5ffebe80f98cd2eae5673deec44edee
CVE-2023-37918,0,0,6f0880e032fa0d82b5e0d452ab365518bdbe0117ecd986fa899a39dc18be7c61,2024-11-21T08:12:28.140000
CVE-2023-37919,0,0,4fbb86481c3cfb031e8a503bb71b218ec50f136c41aa7a3d29b77cd8590c2348,2024-11-21T08:12:28.270000
CVE-2023-3792,0,0,3afa82c6f554a716ffba2d2f86a382a3375d5636ac47c6f5be56ea62511da55f,2024-11-21T08:18:04.510000
CVE-2023-37920,0,0,02565647290fb951dfcfb3cc6454dc756bcd060fd6195ec5b58407c09db2841d,2025-02-12T19:55:47.327000
CVE-2023-37920,0,1,2869cc89393c8bc07220f5f38629c4ad5603db1a9f36f9b7301ad84944ec5e97,2025-02-13T13:50:15.813000
CVE-2023-37921,0,0,2e13620c16e9e4a10da39a426c7aeb74e8b6ac6fdaa368d98e3a9b0d340c9455,2024-11-21T08:12:28.557000
CVE-2023-37922,0,0,b017b26be93e63740acf4bbe8bb2bc33108e05f42ab3096fa52f2660c269d37d,2024-11-21T08:12:28.683000
CVE-2023-37923,0,0,7668498e9eacdeda89a99b6447aa39342c9b7ac764bc7c290e69466faa436f38,2024-11-21T08:12:28.813000
@ -245784,7 +245784,7 @@ CVE-2024-12578,0,0,9683da78c95f4de0afe4f169763bacae0c8e4e48d594e85dbc7c32bda1c6e
CVE-2024-12579,0,0,6b066a632ed42755872bfe12897131044e41b00627589546ab36be31d813b6f2,2024-12-13T05:15:07.473000
CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6caa,2024-11-21T08:50:10.573000
CVE-2024-12581,0,0,17d18fc726b97760d30d61750a12c405333a5f53d81d848944da12ea8bb424ae,2025-02-06T15:36:33.913000
CVE-2024-12582,0,0,bbfe1aae814f308a85392c13709691d46da248e6458c80cb519b63fa483aa592,2024-12-24T04:15:05.137000
CVE-2024-12582,0,1,a0b0d559e35257fefd40696360a672947ea87b7d7c68f9748c838d1ee2cd3e66,2025-02-13T14:15:28.700000
CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000
CVE-2024-12584,0,0,adcd511bb3f4eac61fabd0c77513e0f49514ba8fec705794080ba1b5bd973bc5,2025-01-08T07:15:26.833000
CVE-2024-12585,0,0,5da3be9bc678e425dc481c70b7523d18c5d89e9715457ba9168db2468bb42cc7,2025-01-08T16:15:34.130000
@ -246274,6 +246274,7 @@ CVE-2024-13179,0,0,9d2a982b824c67bbacd2e3f4856194d80faa53a9ffb503fdbd054d373079f
CVE-2024-1318,0,0,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bbca,2024-12-31T16:56:50.763000
CVE-2024-13180,0,0,d8eed302f18bf4ce52a1f3c3aecacb18daed8ee47876692255a4c4adf22e5203,2025-01-16T21:01:52.650000
CVE-2024-13181,0,0,619fe755e63fe3e9187685691ca64b6896c0b1403e0d4ede0609b0d7248d7a86,2025-01-16T21:02:04.910000
CVE-2024-13182,1,1,ef7cb61dda1d7aecd86c8e3d6e4d0d893d86c62c523bc2141825c453e531fb02,2025-02-13T13:15:08.290000
CVE-2024-13183,0,0,2ce47bc0097832a6bd22ec2d12492d2b5c4ebe6c470cd8cfcebfa2e924cfdeb4,2025-01-16T21:28:47.330000
CVE-2024-13184,0,0,8b81821152591ad1436a78438bc699d56dfdd30ea4e4d2ad15a148f2202c8566,2025-01-18T09:15:06.937000
CVE-2024-13185,0,0,f40f11cf6008f79d177ff077a9dcbe69bd3026b99163ebcfc01129828e4cdf96,2025-01-08T15:15:17.163000
@ -274334,7 +274335,7 @@ CVE-2024-56761,0,0,50cdec2eb0ac44f5b4bf3ee27d9bf4283f3aa1e5e4a6c8551c767a8281df1
CVE-2024-56762,0,0,60cbcc45f06c16ba0161fce9430eab44b47458e705e9b29759993ec95842a560,2025-01-07T09:15:16.973000
CVE-2024-56763,0,0,b39292b686e9471eec590980b78b2a363be23c62abe7afa434eea1401b525135,2025-01-09T16:16:23.780000
CVE-2024-56764,0,0,f430899c2c816887efc211dab16ece7317597b0f1b1c0be2d0f1e9d9577e3ea5,2025-02-11T16:15:47.927000
CVE-2024-56765,0,0,71917408c8c13ef040ede0707bb147f5bfdf9a3d2f43d54208cbfff7de842620,2025-01-07T23:00:53.973000
CVE-2024-56765,0,1,f052ce7db4ab37b715e4de64fd073c2145ff41f900220475c37118f454133be1,2025-02-13T14:16:17.130000
CVE-2024-56766,0,0,bce49344e22f2bb3806268a0257273103e66d2578fa423683880a7c80182d04d,2025-01-09T16:16:23.913000
CVE-2024-56767,0,0,ec44d992537d8dabb3d619cb50ee92ccb66f80ed282e5005cbd7f3c03d352a0f,2025-01-09T16:16:24.063000
CVE-2024-56768,0,0,d8373e0dbf214f4feec34d3f904be6536bfb761175850928b1ed7e4f24a9c3b7,2025-01-07T22:50:43.207000
@ -274775,7 +274776,7 @@ CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46f
CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10e86,2025-01-11T13:15:29.253000
CVE-2024-57792,0,0,e53647b80dd687b9a2a0064a755fece6d3e4e026a6a0cb58d2d0e7aa75150018,2025-01-11T13:15:29.420000
CVE-2024-57793,0,0,e9b7a7fae892be6eee516cf000e8b375a33c60ab507666266d3a6f69d2535658,2025-01-11T13:15:29.593000
CVE-2024-57795,0,0,c27fd0f8d7d3c2986e45448963a7c33f5baa1cb6168473b82dcd9b787e8c4fce,2025-01-15T13:15:11.563000
CVE-2024-57795,0,1,a90e6dceb6d89c11c345a39f2051d8bc39b5648c7c13b1bd9f1bedb75e802a60,2025-02-13T14:16:17.430000
CVE-2024-57798,0,0,16d3561f254b9a67268e3fd1903675f3c6069d3999c68a99ddddb4bf962c6bef,2025-02-03T14:53:23.433000
CVE-2024-57799,0,0,629fd8bffc1c970081661553b3588a57b03911cce9c0036c62f31188e3006930,2025-01-16T15:19:18.117000
CVE-2024-5780,0,0,8f257920278f73ebde8da2f9da9c11fb9d019685aae47ae6d2026dc053194989,2024-06-12T08:15:51.300000
@ -274802,7 +274803,7 @@ CVE-2024-57844,0,0,ba7a9af927cdccfb32d77efd3b08b23135ba420a4b94376a9ac04ef40ed20
CVE-2024-57849,0,0,6c1a4f1831f5a2a9c9af19f1c5a93dad2a70d3fd672b039b5a9c54549819e120,2025-01-11T15:15:07.290000
CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000
CVE-2024-57850,0,0,47b5473b2f10d731d0387dd9768f510a3a9dbe99cecf1312c304ff971055ab13,2025-01-11T15:15:07.423000
CVE-2024-57857,0,0,42661a463d36aadb20f3e64c41126783ca9e0b1df58ab33691cea597d9ac1a2b,2025-01-15T13:15:12.403000
CVE-2024-57857,0,1,3f0cabf5d6ee223bacca9cfe8ea4c67c059ddcf7e3b9854317117b67ecec7803,2025-02-13T14:16:17.620000
CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000
CVE-2024-5787,0,0,1d58b2484cfc2497ce3be8bc315153e4937b24852bc87d95aee088e2aedc7438,2024-11-21T09:48:20.010000
CVE-2024-57872,0,0,c3ffa0e155e2ac44fac8a82673746753e090198753fbd02da0ed8386c1ecfa6e,2025-01-16T15:19:51.637000
@ -274826,7 +274827,7 @@ CVE-2024-57889,0,0,62e396df070c9aec292eb26521734ece0a76444ded3816447a98dba23df3e
CVE-2024-5789,0,0,9dcfcd4111ea0e9e739e91d8fd580d0fefd90ab28ec12c3acba80730fef979ee,2024-09-26T20:28:29.237000
CVE-2024-57890,0,0,876228291e28ce2dbcf91efd1283214e54d4069730fa474ebc3b3b0d9a53418a,2025-01-21T17:41:24.450000
CVE-2024-57891,0,0,cd33e3a4e8d37a5f36fd34bd5a361c07ff62e7972f171735ba5dd223fe03e6f1,2025-01-15T13:15:13.590000
CVE-2024-57892,0,0,7be971d420452d3ea5d6fb729983c6d690c1c6ee356e903e2c8eaa7f55c571ed,2025-02-02T11:15:12.450000
CVE-2024-57892,0,1,14736616310e4e8ee489220b3fa985deb190abfc580a60b1a99e9cb0181d3dfe,2025-02-13T14:16:17.800000
CVE-2024-57893,0,0,de1df3ef6db19acaf3c7c48dd5c62fb10118eacffbfad185b7dbbf80a82129c6,2025-01-15T13:15:13.820000
CVE-2024-57894,0,0,d7d6f6140de35b010b1b5beb6457a2e35be159e74f947f8b4b5cce28e627637c,2025-01-15T13:15:13.943000
CVE-2024-57895,0,0,9ad2e608235ea6296b191cd61921ed3a449403f186ff27dacefb37686d68c65d,2025-01-21T17:47:20.323000
@ -274835,7 +274836,7 @@ CVE-2024-57897,0,0,3d8c470fae69b589d24f1b293420d7a6a2c10fa45e69bbcc2f2a6813cfb37
CVE-2024-57898,0,0,33919a8729fc5ee32309d9f13ff00813ffa8f03e2482ac875a9d69e5d0b52206,2025-01-15T13:15:14.427000
CVE-2024-57899,0,0,83468965f33ada40980399571d777b372c41a2b30b4775120a1f2be8fe69b89f,2025-01-15T13:15:14.540000
CVE-2024-5790,0,0,eec668ee9d3641cb0f3de89f3c2f9fc313b8158d0b4258bc8dbb969f253eecba,2024-11-21T09:48:20.323000
CVE-2024-57900,0,0,bb875dc978ec5a0d124f3d2e0c1034ecda0323dbff33fefa2dd00b0441f9c049,2025-01-21T17:45:42.657000
CVE-2024-57900,0,1,47c59939a517ef6e55e93927c3b37d9d833e39af74439b35b5240b02f60aed6c,2025-02-13T14:16:18.027000
CVE-2024-57901,0,0,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d6855e3,2025-01-15T13:15:14.747000
CVE-2024-57902,0,0,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000
CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000
@ -279074,6 +279075,7 @@ CVE-2025-1083,0,0,4afa513b3fc8f95cd8d4d20b3ed0046d9430183e58afbd31ad82dd599bd8fd
CVE-2025-1084,0,0,b0d508f1ab3a1d3dc65fb5a374e03ada5ac495226151bdcc4d5b2ac7850ddb9c,2025-02-07T00:15:28.180000
CVE-2025-1085,0,0,f584db130967758b77431e11a5f469d25699b86ea49d2e400bcb605050e5a113,2025-02-07T01:15:07.930000
CVE-2025-1086,0,0,939f922cf83473192b0b258783d5ca641c4443176d820dcd2d3b84e692405303,2025-02-07T02:15:30.523000
CVE-2025-1094,1,1,e5e055d514f617b2b0dd68bfd421d255613f2d2ce30f5da292f691fa4aaf7a96,2025-02-13T13:15:09.130000
CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000
CVE-2025-1099,0,0,bf17eec112b497da534e01d8cb5eb20bbffb3f16a9e8841ea572781479eb3e5f,2025-02-10T11:15:21.147000
CVE-2025-1100,0,0,caabd467f14edf71ead8d61afba156fa4f48c60c81aecb9cb29d5d2ddb691e7f,2025-02-12T14:15:31.647000
@ -279171,6 +279173,9 @@ CVE-2025-1231,0,0,649e1b02ffb9b2bdea0c0d5302a32991e98ee2dd95c7154e6cc11a5ff00876
CVE-2025-1240,0,0,9246fa8e04ff02b401e811c0a0ea877726af12834c8315ffa6c43657c8f2f12a,2025-02-11T22:15:29.800000
CVE-2025-1243,0,0,ce5d6de4aa6c9e357b98e042ebbfccf5742c455f48067e48b6f93d2620d3c5f5,2025-02-12T01:15:09.073000
CVE-2025-1244,0,0,3a7066df433eb03dbb1a5156667b9922c9a48d520391bb584a7af3176d35b733,2025-02-12T15:15:18.430000
CVE-2025-1247,1,1,c04092dcf345103badb80fdd95e22fac8a6844256bbf5405f306402957fc9ebb,2025-02-13T14:16:18.400000
CVE-2025-1270,1,1,236281c7e2f02c32874e4e3709dfb4e8e9ebb69fe161a8786e8aa1222fe115b8,2025-02-13T13:15:09.273000
CVE-2025-1271,1,1,5d817e390688ef07b23033305a3d61b54ec7909b543740a3f3f14f0970450461,2025-02-13T13:15:09.433000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000
@ -279628,7 +279633,7 @@ CVE-2025-21629,0,0,5bd27bb9a82cb5a5f09a5986e4163e86befaea4298f9b54578a62350a2997
CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51e41,2025-01-17T09:15:08
CVE-2025-21631,0,0,827a424e63f48b072bb6688d1a9f41839aec5c2b224610b12dcbe56fe5cf9787,2025-02-10T18:15:34.650000
CVE-2025-21632,0,0,319c971763f332a963bcaca50f66216a12a2c5a0d07d26ccb015f5aed2bdc246,2025-01-19T11:15:08.650000
CVE-2025-21633,0,0,5feddd6b17cfde18f8f70d5415e3d187d491e0f9f4fddbbb10eb6daf6c6066de,2025-01-19T11:15:08.773000
CVE-2025-21633,0,1,660796f9c53850c1727326b3761ca207d3e35c4459b8907d5ec4f3129a38f3e9,2025-02-13T14:16:18.597000
CVE-2025-21634,0,0,c8b95aca08c2b45c9dba95d6155aefb765f07edea9819768e8b59b392e1eaba1,2025-02-03T14:42:29.407000
CVE-2025-21635,0,0,f68693db8da33a37c51f7f5f67c2bc3befefae2a56081d367cd2c2267ce553f1,2025-01-19T11:15:09
CVE-2025-21636,0,0,6097ea20b833d9169f54205d90a302acd27d436dea66efcd6b9cee92a1babbe7,2025-01-23T17:15:24.790000
@ -279695,7 +279700,7 @@ CVE-2025-21696,0,0,b50db3425e3c5ae8f9bcd952321a8faca5176a354e7da76e7a95c5c44fb3f
CVE-2025-21697,0,0,21dbc5e8ca09f0db10d8b851c55a1218ced4547bd60419817adfbeb41bc40c98,2025-02-12T14:15:32.787000
CVE-2025-21698,0,0,d7e293d79ce2d1c259f49fc2afa96a937082b9e40b1bdd42a351c66f25f809e0,2025-02-12T14:15:32.900000
CVE-2025-21699,0,0,0738ffc847a7a2829b592d8dc197a21782e195ddce9370e0b4f4c6413dc7be27,2025-02-12T14:15:33.020000
CVE-2025-21700,1,1,e2f15dfaadc300d644829d12fb084d8c8235c7ecb6012b8f087c15156459125c,2025-02-13T12:15:27.837000
CVE-2025-21700,0,1,16c660ef83be8e3692860c63459d5cb91dde6789514ef1272a7fe490e5043738,2025-02-13T14:16:18.803000
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000
CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000
@ -281219,3 +281224,26 @@ CVE-2025-26493,0,0,1099023a6dd0784f561a6e33a794f1b6b69f51c22042510a0826814d283df
CVE-2025-26494,0,0,fbc26c80357160dc793881bb81bca8973032cb78045f64dc3903e7fb3d3f359e,2025-02-11T18:15:47.060000
CVE-2025-26495,0,0,0731ad2cc6d733334de4696008327b6e5ee6279ed8bc678e0a689b6be160a2fa,2025-02-11T18:15:47.237000
CVE-2025-26520,0,0,b83a456ccd02c927137ed430a7b7666fceb0cc753b6c14f6ee5654a1a893266c,2025-02-12T07:15:08.617000
CVE-2025-26538,1,1,9ea4ca612e90cce9189b8bae07fa04997f24224417b26ca364e9d1ce2abc0564,2025-02-13T14:16:19.100000
CVE-2025-26539,1,1,9e24ab5af3835adb18f91dd2d1f793e969f13bc3aa31bd06f752764eeee8db3e,2025-02-13T14:16:19.383000
CVE-2025-26543,1,1,62cfcbc6cba7195cf72b9bcad3caeeb3f7235faae114608907f61610e078b963,2025-02-13T14:16:19.707000
CVE-2025-26545,1,1,86e6d73b316c567f92fafe24354abc1f6e5e58627f6331bfd9ac32870ef96d2e,2025-02-13T14:16:20.043000
CVE-2025-26547,1,1,32512de25d98c31a3fb7d8dc154a7a890308ccf1c434f822a8fe2d1eff9a6a66,2025-02-13T14:16:20.347000
CVE-2025-26549,1,1,c83d206011787aa939d7304c8834cb18339ef2b98da1d146dbbf9a541a444205,2025-02-13T14:16:20.663000
CVE-2025-26550,1,1,883cb288bc4eea99ad912aba30c7fea818b98e6f73b285242c10d13a2acb06fd,2025-02-13T14:16:20.993000
CVE-2025-26551,1,1,a029083bd25de057d4266e7a9ad85862168c3f408f38b9563e3ef7ec6ded376a,2025-02-13T14:16:21.450000
CVE-2025-26552,1,1,8b7ec2369e4b0d92ec83bba01cf2fbfb75c6453ef7cb949f856810a061cc31f5,2025-02-13T14:16:21.787000
CVE-2025-26558,1,1,efb5f704c336f3bcfd0d4d5ddc23ef57815fe3581c8f780dfc299ec13d06ee4f,2025-02-13T14:16:22.130000
CVE-2025-26561,1,1,fa5fcfc1b5af387d2ba8d298e09268fe2f60a955e0f2a3d62ec520035eeddefb,2025-02-13T14:16:22.450000
CVE-2025-26562,1,1,37af47f6874a6ee725f87bd58d1efb60fdaceff3bf562bc1f6f0cb5fdd5a4af0,2025-02-13T14:16:22.607000
CVE-2025-26567,1,1,ad7353cdfa1615256245880358dfd51f302bf6cfa87401a28368c4850c9a5ab3,2025-02-13T14:16:22.763000
CVE-2025-26568,1,1,396b9e537988f1e8ccb15cd4c2387cb39dc59312282cc0daae1e64b2f4b2c915,2025-02-13T14:16:22.910000
CVE-2025-26569,1,1,b9d6e8fd04d3efb22666efdf216ef1ba6d52f11fde384e4b05ebc0501e2efb5b,2025-02-13T14:16:23.070000
CVE-2025-26570,1,1,6d0c7fab6c543070ec379f24d33a7fed4cbf7dbb9af7209df28b890fa0e09c89,2025-02-13T14:16:23.223000
CVE-2025-26571,1,1,a9e05e769efc9ed5cc1337a3f80b138ce504de11ef88d35e4441956c5f36d51d,2025-02-13T14:16:23.360000
CVE-2025-26572,1,1,920a554f5bc2f7d587796ed0f8965fb97e1d50be8ae5583dafe7d4258ecfd010,2025-02-13T14:16:23.507000
CVE-2025-26574,1,1,04b267df093c1e4aa7dbd35454f1702610f59fd7182a705455dea6367852d58b,2025-02-13T14:16:23.653000
CVE-2025-26577,1,1,cc2f8c1ac7aa0d1b35a1f7b5d360e0b2d07e13834785542e837aebe416cbfae1,2025-02-13T14:16:23.797000
CVE-2025-26578,1,1,cd72ae9257326f25b0cb5e50eefc8b87bc4caefa625d6784329a0c22f9290202,2025-02-13T14:16:23.990000
CVE-2025-26580,1,1,916e7b90eb27b1f7f000689c1c2c0d448ca25a3cef16eef15cec717bb455efdc,2025-02-13T14:16:24.250000
CVE-2025-26582,1,1,6e8fe3f3ea1ebd2d8730cc1aef1506305d1a9b31eb701ca7bcc9103287dcd909,2025-02-13T14:16:24.407000

Can't render this file because it is too large.