Auto-Update: 2025-02-13T15:00:33.937314+00:00

This commit is contained in:
cad-safe-bot 2025-02-13 15:04:01 +00:00
parent 9955613728
commit 6bee899239
46 changed files with 2027 additions and 80 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-7192", "id": "CVE-2019-7192",
"sourceIdentifier": "security@qnapsecurity.com.tw", "sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2019-12-05T17:15:12.950", "published": "2019-12-05T17:15:12.950",
"lastModified": "2025-02-06T21:15:13.510", "lastModified": "2025-02-13T14:18:25.263",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-7193", "id": "CVE-2019-7193",
"sourceIdentifier": "security@qnapsecurity.com.tw", "sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2019-12-05T17:15:13.027", "published": "2019-12-05T17:15:13.027",
"lastModified": "2025-02-06T21:15:13.767", "lastModified": "2025-02-13T14:16:18.827",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -95,7 +95,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-20" "value": "NVD-CWE-noinfo"
} }
] ]
}, },
@ -119,48 +119,48 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0895:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:qnap:qts:4.3.6.0895:-:*:*:*:*:*:*",
"matchCriteriaId": "A1AB2488-4D3D-494B-9C93-1AA3C7964644" "matchCriteriaId": "B52AEDE0-990A-4186-8F24-8CF4068E5AF1"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0907:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:qnap:qts:4.3.6.0907:-:*:*:*:*:*:*",
"matchCriteriaId": "6C24D008-D055-4A2C-88D4-85FB6DC45EFE" "matchCriteriaId": "C6EFB589-B6E1-410C-9AA5-86DD2CF7FFCD"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0923:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:qnap:qts:4.3.6.0923:-:*:*:*:*:*:*",
"matchCriteriaId": "B64D1A6D-D306-46B8-B345-3D9C38544761" "matchCriteriaId": "09573613-AD98-4A49-A960-B9E45B612710"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0944:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:qnap:qts:4.3.6.0944:-:*:*:*:*:*:*",
"matchCriteriaId": "067C0A13-525C-4376-A6CC-0B86F7F92670" "matchCriteriaId": "561532B6-0678-410B-8211-76103EBAA9D9"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0959:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:qnap:qts:4.3.6.0959:-:*:*:*:*:*:*",
"matchCriteriaId": "4BAE62E0-5FA0-4B9F-ACCA-9C8C70AC1F2C" "matchCriteriaId": "C58608A2-7705-4DE7-8979-DE33A35DDA88"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0979:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:qnap:qts:4.3.6.0979:-:*:*:*:*:*:*",
"matchCriteriaId": "B6023A8C-77A8-4B79-ACC6-872E98CA0D29" "matchCriteriaId": "90E2874F-BD7C-48AF-ABCE-D96F51947A70"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.0993:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:qnap:qts:4.3.6.0993:-:*:*:*:*:*:*",
"matchCriteriaId": "CAA72D06-4FE1-4DC3-A96B-2975A4A9AF84" "matchCriteriaId": "D4347075-F444-4271-A717-FDABF8C19D7C"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.1013:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:qnap:qts:4.3.6.1013:-:*:*:*:*:*:*",
"matchCriteriaId": "0CD59BCF-E119-4910-90CE-DCA212D146F5" "matchCriteriaId": "6F8FB702-0BB9-419E-A847-AC9CC31F823F"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:4.3.6.1033:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:qnap:qts:4.3.6.1033:-:*:*:*:*:*:*",
"matchCriteriaId": "E8F01168-A599-480D-BEB1-FA0195B696E6" "matchCriteriaId": "2514D352-5007-4669-A526-F179BABB0587"
}, },
{ {
"vulnerable": true, "vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-7194", "id": "CVE-2019-7194",
"sourceIdentifier": "security@qnapsecurity.com.tw", "sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2019-12-05T17:15:13.107", "published": "2019-12-05T17:15:13.107",
"lastModified": "2025-02-06T21:15:13.990", "lastModified": "2025-02-13T14:15:31.933",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-7195", "id": "CVE-2019-7195",
"sourceIdentifier": "security@qnapsecurity.com.tw", "sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2019-12-05T17:15:13.183", "published": "2019-12-05T17:15:13.183",
"lastModified": "2025-02-06T21:15:14.220", "lastModified": "2025-02-13T14:13:03.560",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-2509", "id": "CVE-2020-2509",
"sourceIdentifier": "security@qnapsecurity.com.tw", "sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2021-04-17T04:15:11.327", "published": "2021-04-17T04:15:11.327",
"lastModified": "2025-02-06T21:15:15.153", "lastModified": "2025-02-13T14:22:58.803",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-8468", "id": "CVE-2020-8468",
"sourceIdentifier": "security@trendmicro.com", "sourceIdentifier": "security@trendmicro.com",
"published": "2020-03-18T01:15:12.003", "published": "2020-03-18T01:15:12.003",
"lastModified": "2025-02-06T20:15:34.587", "lastModified": "2025-02-13T14:28:17.323",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-36742", "id": "CVE-2021-36742",
"sourceIdentifier": "security@trendmicro.com", "sourceIdentifier": "security@trendmicro.com",
"published": "2021-07-29T20:15:07.650", "published": "2021-07-29T20:15:07.650",
"lastModified": "2025-02-06T20:15:37.530", "lastModified": "2025-02-13T14:26:24.660",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -95,7 +95,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-20" "value": "NVD-CWE-noinfo"
} }
] ]
}, },

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37920", "id": "CVE-2023-37920",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-25T21:15:10.827", "published": "2023-07-25T21:15:10.827",
"lastModified": "2025-02-12T19:55:47.327", "lastModified": "2025-02-13T13:50:15.813",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -87,9 +87,69 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:certifi:certifi:*:*:*:*:*:python:*:*", "criteria": "cpe:2.3:a:certifi:certifi:*:*:*:*:*:python:*:*",
"versionStartIncluding": "2015.04.28", "versionStartIncluding": "2015.4.28",
"versionEndExcluding": "2023.07.22", "versionEndExcluding": "2023.7.22",
"matchCriteriaId": "4392638D-2F29-46D8-8E47-1A102A34BA57" "matchCriteriaId": "2FF2392F-9661-448D-BE25-4AD98BD5D808"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
"matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4455CF3A-CC91-4BE4-A7AB-929AC82E34F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_mediator:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19DD87DA-6999-4B38-B953-BEC49760F2BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:solidfire_\\&_hci_storage_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D452B464-1200-4B72-9A89-42DC58486191"
} }
] ]
} }
@ -121,7 +181,10 @@
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Mailing List"
]
}, },
{ {
"url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909", "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909",
@ -147,11 +210,17 @@
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20240912-0002/", "url": "https://security.netapp.com/advisory/ntap-20240912-0002/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12582", "id": "CVE-2024-12582",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2024-12-24T04:15:05.137", "published": "2024-12-24T04:15:05.137",
"lastModified": "2024-12-24T04:15:05.137", "lastModified": "2025-02-13T14:15:28.700",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -19,7 +19,7 @@
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "secalert@redhat.com", "source": "secalert@redhat.com",
"type": "Primary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
@ -42,7 +42,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "secalert@redhat.com", "source": "secalert@redhat.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -52,6 +52,10 @@
} }
], ],
"references": [ "references": [
{
"url": "https://access.redhat.com/errata/RHSA-2025:1413",
"source": "secalert@redhat.com"
},
{ {
"url": "https://access.redhat.com/security/cve/CVE-2024-12582", "url": "https://access.redhat.com/security/cve/CVE-2024-12582",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13182",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-13T13:15:08.290",
"lastModified": "2025-02-13T13:15:08.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Directorybox Manager plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.5. This is due to incorrect authentication in the 'wp_dp_parse_request' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "http://localhost:1337/wp-content/plugins/wp-directorybox-manager/elements/login/cs-social-login/cs-social-login.php#L43",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea9e5e5d-a7fc-4159-a2ae-610bee76f818?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56765", "id": "CVE-2024-56765",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-06T17:15:42.800", "published": "2025-01-06T17:15:42.800",
"lastModified": "2025-01-07T23:00:53.973", "lastModified": "2025-02-13T14:16:17.130",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-416" "value": "CWE-416"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57795", "id": "CVE-2024-57795",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-15T13:15:11.563", "published": "2025-01-15T13:15:11.563",
"lastModified": "2025-01-15T13:15:11.563", "lastModified": "2025-02-13T14:16:17.430",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: RDMA/rxe: eliminar el enlace directo a net_device El parche similar en siw se encuentra en el enlace: https://git.kernel.org/rdma/rdma/c/16b87037b48889 Este problema tambi\u00e9n se produjo en RXE. A continuaci\u00f3n se analiza este problema. En los siguientes seguimientos de llamadas: \"ERROR: KASAN: slab-use-after-free en dev_get_flags+0x188/0x1d0 net/core/dev.c:8782 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff8880554640b0 por la tarea kworker/1:4/5295 CPU: 1 UID: 0 PID: 5295 Comm: kworker/1:4 No contaminado 6.12.0-rc3-syzkaller-00399-g9197b73fd7bb #0 Nombre del hardware: Google Compute Engine/Google Compute Engine, BIOS Google 13/09/2024 Cola de trabajo: infiniband ib_cache_event_task Seguimiento de llamadas: __dump_stack lib/dump_stack.c:94 [en l\u00ednea] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 imprimir_direcci\u00f3n_descripci\u00f3n mm/kasan/report.c:377 [en l\u00ednea] imprimir_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 dev_get_flags+0x188/0x1d0 net/core/dev.c:8782 rxe_query_port+0x12d/0x260 drivers/infiniband/sw/rxe/rxe_verbs.c:60 __ib_query_port drivers/infiniband/core/device.c:2111 [en l\u00ednea] ib_query_port+0x168/0x7d0 drivers/infiniband/core/device.c:2143 ib_cache_update+0x1a9/0xb80 drivers/infiniband/core/cache.c:1494 ib_cache_event_task+0xf3/0x1e0 drivers/infiniband/core/cache.c:1568 process_one_work kernel/workqueue.c:3229 [en l\u00ednea] process_scheduled_works+0xa65/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 \" 1). En el enlace [1], \" infiniband syz2: set down \" Esto significa que en 839.350575, se envi\u00f3 el evento ib_cache_event_task y se puso en cola en ib_wq. 2). En el enlace [1], \" team0 (unregistering): Port device team_slave_0 removed \" Esto indica que antes de 843.251853, se debe liberar el dispositivo de red. 3). En el enlace [1], \" BUG: KASAN: slab-use-after-free en dev_get_flags+0x188/0x1d0 \" Esto significa que en 850.559070, ocurri\u00f3 este problema de slab-use-after-free. En total, el 839.350575, se envi\u00f3 el evento ib_cache_event_task y se puso en cola en ib_wq, antes del 843.251853, se liber\u00f3 el dispositivo de red veth. El 850.559070, se ejecut\u00f3 este evento y se llam\u00f3 al dispositivo de red liberado mencionado. Por lo tanto, se produjo el seguimiento de la llamada anterior. [1] https://syzkaller.appspot.com/x/log.txt?x=12e7025f980000" "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: RDMA/rxe: eliminar el enlace directo a net_device El parche similar en siw se encuentra en el enlace: https://git.kernel.org/rdma/rdma/c/16b87037b48889 Este problema tambi\u00e9n se produjo en RXE. A continuaci\u00f3n se analiza este problema. En los siguientes seguimientos de llamadas: \"ERROR: KASAN: slab-use-after-free en dev_get_flags+0x188/0x1d0 net/core/dev.c:8782 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff8880554640b0 por la tarea kworker/1:4/5295 CPU: 1 UID: 0 PID: 5295 Comm: kworker/1:4 No contaminado 6.12.0-rc3-syzkaller-00399-g9197b73fd7bb #0 Nombre del hardware: Google Compute Engine/Google Compute Engine, BIOS Google 13/09/2024 Cola de trabajo: infiniband ib_cache_event_task Seguimiento de llamadas: __dump_stack lib/dump_stack.c:94 [en l\u00ednea] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 imprimir_direcci\u00f3n_descripci\u00f3n mm/kasan/report.c:377 [en l\u00ednea] imprimir_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 dev_get_flags+0x188/0x1d0 net/core/dev.c:8782 rxe_query_port+0x12d/0x260 drivers/infiniband/sw/rxe/rxe_verbs.c:60 __ib_query_port drivers/infiniband/core/device.c:2111 [en l\u00ednea] ib_query_port+0x168/0x7d0 drivers/infiniband/core/device.c:2143 ib_cache_update+0x1a9/0xb80 drivers/infiniband/core/cache.c:1494 ib_cache_event_task+0xf3/0x1e0 drivers/infiniband/core/cache.c:1568 process_one_work kernel/workqueue.c:3229 [en l\u00ednea] process_scheduled_works+0xa65/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 \" 1). En el enlace [1], \" infiniband syz2: set down \" Esto significa que en 839.350575, se envi\u00f3 el evento ib_cache_event_task y se puso en cola en ib_wq. 2). En el enlace [1], \" team0 (unregistering): Port device team_slave_0 removed \" Esto indica que antes de 843.251853, se debe liberar el dispositivo de red. 3). En el enlace [1], \" BUG: KASAN: slab-use-after-free en dev_get_flags+0x188/0x1d0 \" Esto significa que en 850.559070, ocurri\u00f3 este problema de slab-use-after-free. En total, el 839.350575, se envi\u00f3 el evento ib_cache_event_task y se puso en cola en ib_wq, antes del 843.251853, se liber\u00f3 el dispositivo de red veth. El 850.559070, se ejecut\u00f3 este evento y se llam\u00f3 al dispositivo de red liberado mencionado. Por lo tanto, se produjo el seguimiento de la llamada anterior. [1] https://syzkaller.appspot.com/x/log.txt?x=12e7025f980000"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/2ac5415022d16d63d912a39a06f32f1f51140261", "url": "https://git.kernel.org/stable/c/2ac5415022d16d63d912a39a06f32f1f51140261",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57857", "id": "CVE-2024-57857",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-15T13:15:12.403", "published": "2025-01-15T13:15:12.403",
"lastModified": "2025-01-15T13:15:12.403", "lastModified": "2025-02-13T14:16:17.620",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/siw: eliminar el enlace directo a net_device No administrar un enlace directo por dispositivo a net_device. Conf\u00ede en la administraci\u00f3n de net_device de ib_devices asociada, sin duplicar el esfuerzo localmente. Un enlace local mal administrado a net_device estaba causando una excepci\u00f3n 'KASAN: slab-use-after-free' durante la llamada siw_query_port()." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/siw: eliminar el enlace directo a net_device No administrar un enlace directo por dispositivo a net_device. Conf\u00ede en la administraci\u00f3n de net_device de ib_devices asociada, sin duplicar el esfuerzo localmente. Un enlace local mal administrado a net_device estaba causando una excepci\u00f3n 'KASAN: slab-use-after-free' durante la llamada siw_query_port()."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/16b87037b48889d21854c8e97aec8a1baf2642b3", "url": "https://git.kernel.org/stable/c/16b87037b48889d21854c8e97aec8a1baf2642b3",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57892", "id": "CVE-2024-57892",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-15T13:15:13.710", "published": "2025-01-15T13:15:13.710",
"lastModified": "2025-02-02T11:15:12.450", "lastModified": "2025-02-13T14:16:17.800",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-416" "value": "CWE-416"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57900", "id": "CVE-2024-57900",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-15T13:15:14.633", "published": "2025-01-15T13:15:14.633",
"lastModified": "2025-01-21T17:45:42.657", "lastModified": "2025-02-13T14:16:18.027",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-416" "value": "CWE-416"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1094",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2025-02-13T13:15:09.130",
"lastModified": "2025-02-13T13:15:09.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns. Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal. Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL. Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-149"
}
]
}
],
"references": [
{
"url": "https://www.postgresql.org/support/security/CVE-2025-1094/",
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-1247",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-13T14:16:18.400",
"lastModified": "2025-02-13T14:16:18.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Quarkus REST that allows request parameters to leak between concurrent requests if endpoints use field injection without a CDI scope. This vulnerability allows attackers to manipulate request data, impersonate users, or access sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-488"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-1247",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345172",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1270",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-02-13T13:15:09.273",
"lastModified": "2025-02-13T13:15:09.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure direct object reference (IDOR) vulnerability in Anapi Group's h6web, allows an authenticated attacker to access other users' information by making a POST request and modifying the \u201cpkrelated\u201d parameter in the \u201c/h6web/ha_datos_hermano.php\u201d endpoint to refer to another user. In addition, the first request could also allow the attacker to impersonate other users. As a result, all requests made after exploitation of the IDOR vulnerability will be executed with the privileges of the impersonated user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.1,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-anapi-group-h6web",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1271",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-02-13T13:15:09.433",
"lastModified": "2025-02-13T13:15:09.433",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Reflected Cross-Site Scripting (XSS) in Anapi Group's h6web. This security flaw could allow an attacker to inject malicious JavaScript code into a URL. When a user accesses that URL, the injected code is executed in their browser, which can result in the theft of sensitive information, identity theft or the execution of unauthorised actions on behalf of the affected user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-anapi-group-h6web",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-21633", "id": "CVE-2025-21633",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:08.773", "published": "2025-01-19T11:15:08.773",
"lastModified": "2025-01-19T11:15:08.773", "lastModified": "2025-02-13T14:16:18.597",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En kernel de linux, se ha resuelto la siguiente vulnerabilidad: io_uring/sqpoll: cero errores sqd->thread en tctx Syzkeller informa: BUG: KASAN: slab-use-after-free in thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341 Read of size 8 at addr ffff88803578c510 by task syz.2.3223/27552 Call Trace: ... kasan_report+0x143/0x180 mm/kasan/report.c:602 thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341 thread_group_cputime_adjusted+0xa6/0x340 kernel/sched/cputime.c:639 getrusage+0x1000/0x1340 kernel/sys.c:1863 io_uring_show_fdinfo+0xdfe/0x1770 io_uring/fdinfo.c:197 seq_show+0x608/0x770 fs/proc/fd.c:68... Esto se debe a que sqd->task no se borra correctamente en los casos en que falla la configuraci\u00f3n de tctx de la tarea SQPOLL, lo que esencialmente solo puede ocurrir con errores de inyecci\u00f3n de errores en la asignaci\u00f3n de insertos." "value": "En kernel de linux, se ha resuelto la siguiente vulnerabilidad: io_uring/sqpoll: cero errores sqd->thread en tctx Syzkeller informa: BUG: KASAN: slab-use-after-free in thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341 Read of size 8 at addr ffff88803578c510 by task syz.2.3223/27552 Call Trace: ... kasan_report+0x143/0x180 mm/kasan/report.c:602 thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341 thread_group_cputime_adjusted+0xa6/0x340 kernel/sched/cputime.c:639 getrusage+0x1000/0x1340 kernel/sys.c:1863 io_uring_show_fdinfo+0xdfe/0x1770 io_uring/fdinfo.c:197 seq_show+0x608/0x770 fs/proc/fd.c:68... Esto se debe a que sqd->task no se borra correctamente en los casos en que falla la configuraci\u00f3n de tctx de la tarea SQPOLL, lo que esencialmente solo puede ocurrir con errores de inyecci\u00f3n de errores en la asignaci\u00f3n de insertos."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/4b7cfa8b6c28a9fa22b86894166a1a34f6d630ba", "url": "https://git.kernel.org/stable/c/4b7cfa8b6c28a9fa22b86894166a1a34f6d630ba",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-21700", "id": "CVE-2025-21700",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-13T12:15:27.837", "published": "2025-02-13T12:15:27.837",
"lastModified": "2025-02-13T12:15:27.837", "lastModified": "2025-02-13T14:16:18.803",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -11,7 +11,42 @@
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: Disallow replacing of child qdisc from one parent to another\n\nLion Ackermann was able to create a UAF which can be abused for privilege\nescalation with the following script\n\nStep 1. create root qdisc\ntc qdisc add dev lo root handle 1:0 drr\n\nstep2. a class for packet aggregation do demonstrate uaf\ntc class add dev lo classid 1:1 drr\n\nstep3. a class for nesting\ntc class add dev lo classid 1:2 drr\n\nstep4. a class to graft qdisc to\ntc class add dev lo classid 1:3 drr\n\nstep5.\ntc qdisc add dev lo parent 1:1 handle 2:0 plug limit 1024\n\nstep6.\ntc qdisc add dev lo parent 1:2 handle 3:0 drr\n\nstep7.\ntc class add dev lo classid 3:1 drr\n\nstep 8.\ntc qdisc add dev lo parent 3:1 handle 4:0 pfifo\n\nstep 9. Display the class/qdisc layout\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nstep10. trigger the bug <=== prevented by this patch\ntc qdisc replace dev lo parent 1:3 handle 4:0\n\nstep 11. Redisplay again the qdiscs/classes\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 1:3 root leaf 4: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 refcnt 2 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nObserve that a) parent for 4:0 does not change despite the replace request.\nThere can only be one parent. b) refcount has gone up by two for 4:0 and\nc) both class 1:3 and 3:1 are pointing to it.\n\nStep 12. send one packet to plug\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10001))\nstep13. send one packet to the grafted fifo\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10003))\n\nstep14. lets trigger the uaf\ntc class delete dev lo classid 1:3\ntc class delete dev lo classid 1:1\n\nThe semantics of \"replace\" is for a del/add _on the same node_ and not\na delete from one node(3:1) and add to another node (1:3) as in step10.\nWhile we could \"fix\" with a more complex approach there could be\nconsequences to expectations so the patch takes the preventive approach of\n\"disallow such config\".\n\nJoint work with Lion Ackermann <nnamrec@gmail.com>" "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sched: Disallow replacing of child qdisc from one parent to another\n\nLion Ackermann was able to create a UAF which can be abused for privilege\nescalation with the following script\n\nStep 1. create root qdisc\ntc qdisc add dev lo root handle 1:0 drr\n\nstep2. a class for packet aggregation do demonstrate uaf\ntc class add dev lo classid 1:1 drr\n\nstep3. a class for nesting\ntc class add dev lo classid 1:2 drr\n\nstep4. a class to graft qdisc to\ntc class add dev lo classid 1:3 drr\n\nstep5.\ntc qdisc add dev lo parent 1:1 handle 2:0 plug limit 1024\n\nstep6.\ntc qdisc add dev lo parent 1:2 handle 3:0 drr\n\nstep7.\ntc class add dev lo classid 3:1 drr\n\nstep 8.\ntc qdisc add dev lo parent 3:1 handle 4:0 pfifo\n\nstep 9. Display the class/qdisc layout\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nstep10. trigger the bug <=== prevented by this patch\ntc qdisc replace dev lo parent 1:3 handle 4:0\n\nstep 11. Redisplay again the qdiscs/classes\n\ntc class ls dev lo\n class drr 1:1 root leaf 2: quantum 64Kb\n class drr 1:2 root leaf 3: quantum 64Kb\n class drr 1:3 root leaf 4: quantum 64Kb\n class drr 3:1 root leaf 4: quantum 64Kb\n\ntc qdisc ls\n qdisc drr 1: dev lo root refcnt 2\n qdisc plug 2: dev lo parent 1:1\n qdisc pfifo 4: dev lo parent 3:1 refcnt 2 limit 1000p\n qdisc drr 3: dev lo parent 1:2\n\nObserve that a) parent for 4:0 does not change despite the replace request.\nThere can only be one parent. b) refcount has gone up by two for 4:0 and\nc) both class 1:3 and 3:1 are pointing to it.\n\nStep 12. send one packet to plug\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10001))\nstep13. send one packet to the grafted fifo\necho \"\" | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888,priority=$((0x10003))\n\nstep14. lets trigger the uaf\ntc class delete dev lo classid 1:3\ntc class delete dev lo classid 1:1\n\nThe semantics of \"replace\" is for a del/add _on the same node_ and not\na delete from one node(3:1) and add to another node (1:3) as in step10.\nWhile we could \"fix\" with a more complex approach there could be\nconsequences to expectations so the patch takes the preventive approach of\n\"disallow such config\".\n\nJoint work with Lion Ackermann <nnamrec@gmail.com>"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/46c59ec33ec98aba20c15117630cae43a01404cc", "url": "https://git.kernel.org/stable/c/46c59ec33ec98aba20c15117630cae43a01404cc",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26538",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:19.100",
"lastModified": "2025-02-13T14:16:19.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dan Rossiter Prezi Embedder allows Stored XSS. This issue affects Prezi Embedder: from n/a through 2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/prezi-embedder/vulnerability/wordpress-prezi-embedder-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26539",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:19.383",
"lastModified": "2025-02-13T14:16:19.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in petkivim Embed Google Map allows Stored XSS. This issue affects Embed Google Map: from n/a through 3.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/embed-google-map/vulnerability/wordpress-embed-google-map-plugin-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26543",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:19.707",
"lastModified": "2025-02-13T14:16:19.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Pukhraj Suthar Simple Responsive Menu allows Stored XSS. This issue affects Simple Responsive Menu: from n/a through 2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/simple-responsive-menu/vulnerability/wordpress-simple-responsive-menu-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26545",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:20.043",
"lastModified": "2025-02-13T14:16:20.043",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in shisuh Related Posts Line-up-Exactly by Milliard allows Stored XSS. This issue affects Related Posts Line-up-Exactly by Milliard: from n/a through 0.0.22."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/related-posts-line-up-exactry-by-milliard/vulnerability/wordpress-related-posts-line-up-exactly-by-milliard-plugin-0-0-22-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26547",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:20.347",
"lastModified": "2025-02-13T14:16:20.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in nagarjunsonti My Login Logout Plugin allows Stored XSS. This issue affects My Login Logout Plugin: from n/a through 2.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/my-loginlogout/vulnerability/wordpress-my-login-logout-plugin-plugin-2-4-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26549",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:20.663",
"lastModified": "2025-02-13T14:16:20.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in pa1 WP Html Page Sitemap allows Stored XSS. This issue affects WP Html Page Sitemap: from n/a through 2.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-html-page-sitemap/vulnerability/wordpress-wp-html-page-sitemap-plugin-2-2-csrf-to-stored-cross-site-scripting?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26550",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:20.993",
"lastModified": "2025-02-13T14:16:20.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Kunal Shivale Global Meta Keyword & Description allows Stored XSS. This issue affects Global Meta Keyword & Description: from n/a through 2.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/global-meta-keyword-and-description/vulnerability/wordpress-global-meta-keyword-description-plugin-2-3-csrf-to-cross-site-scripting-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26551",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:21.450",
"lastModified": "2025-02-13T14:16:21.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sureshdsk Bootstrap collapse allows Stored XSS. This issue affects Bootstrap collapse: from n/a through 1.0.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/bootstrap-collapse/vulnerability/wordpress-bootstrap-collapse-plugin-1-0-4-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26552",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:21.787",
"lastModified": "2025-02-13T14:16:21.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in badrHan Naver Syndication V2 allows Stored XSS. This issue affects Naver Syndication V2: from n/a through 0.8.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/badr-naver-syndication/vulnerability/wordpress-naver-syndication-v2-plugin-0-8-3-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26558",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:22.130",
"lastModified": "2025-02-13T14:16:22.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mkkmail Aparat Responsive allows DOM-Based XSS. This issue affects Aparat Responsive: from n/a through 1.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/aparat-responsive/vulnerability/wordpress-aparat-responsive-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26561",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:22.450",
"lastModified": "2025-02-13T14:16:22.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in elfsight Elfsight Yottie Lite allows Stored XSS. This issue affects Elfsight Yottie Lite: from n/a through 1.3.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/yottie-lite/vulnerability/wordpress-elfsight-yottie-lite-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26562",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:22.607",
"lastModified": "2025-02-13T14:16:22.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Shambhu Patnaik RSS Filter allows Stored XSS. This issue affects RSS Filter: from n/a through 1.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/rss-filter/vulnerability/wordpress-rss-filter-plugin-1-2-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26567",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:22.763",
"lastModified": "2025-02-13T14:16:22.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in farjana55 Font Awesome WP allows DOM-Based XSS. This issue affects Font Awesome WP: from n/a through 1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/font-awesome-wp/vulnerability/wordpress-font-awesome-wp-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26568",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:22.910",
"lastModified": "2025-02-13T14:16:22.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in jensmueller Easy Amazon Product Information allows Stored XSS. This issue affects Easy Amazon Product Information: from n/a through 4.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/easy-amazon-product-information/vulnerability/wordpress-easy-amazon-product-information-plugin-4-0-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26569",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.070",
"lastModified": "2025-02-13T14:16:23.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in callmeforsox Post Thumbs allows Stored XSS. This issue affects Post Thumbs: from n/a through 1.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/post-thumbs/vulnerability/wordpress-post-thumbs-plugin-1-5-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26570",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.223",
"lastModified": "2025-02-13T14:16:23.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in uamv Glance That allows Cross Site Request Forgery. This issue affects Glance That: from n/a through 4.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/glance-that/vulnerability/wordpress-glance-that-plugin-4-9-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26571",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.360",
"lastModified": "2025-02-13T14:16:23.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in wibiya Wibiya Toolbar allows Cross Site Request Forgery. This issue affects Wibiya Toolbar: from n/a through 2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wibiya/vulnerability/wordpress-wibiya-toolbar-plugin-2-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26572",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.507",
"lastModified": "2025-02-13T14:16:23.507",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in jesseheap WP PHPList allows Cross Site Request Forgery. This issue affects WP PHPList: from n/a through 1.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/phplist-form-integration/vulnerability/wordpress-wp-phplist-plugin-1-7-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26574",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.653",
"lastModified": "2025-02-13T14:16:23.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moch Amir Google Drive WP Media allows Stored XSS. This issue affects Google Drive WP Media: from n/a through 2.4.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/google-drive-wp-media/vulnerability/wordpress-google-drive-wp-media-plugin-2-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26577",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.797",
"lastModified": "2025-02-13T14:16:23.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in daxiawp DX-auto-publish allows Stored XSS. This issue affects DX-auto-publish: from n/a through 1.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/dx-auto-publish/vulnerability/wordpress-dx-auto-publish-plugin-1-2-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26578",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:23.990",
"lastModified": "2025-02-13T14:16:23.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in mathieuhays Simple Documentation allows Stored XSS. This issue affects Simple Documentation: from n/a through 1.2.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/client-documentation/vulnerability/wordpress-simple-documentation-plugin-1-2-8-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26580",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:24.250",
"lastModified": "2025-02-13T14:16:24.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in CompleteWebResources Page/Post Specific Social Share Buttons allows Stored XSS. This issue affects Page/Post Specific Social Share Buttons: from n/a through 2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/pagepost-specific-social-share-buttons/vulnerability/wordpress-page-post-specific-social-share-buttons-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26582",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-13T14:16:24.407",
"lastModified": "2025-02-13T14:16:24.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Blackbam TinyMCE Advanced qTranslate fix editor problems allows Stored XSS. This issue affects TinyMCE Advanced qTranslate fix editor problems: from n/a through 1.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/tinymce-advanced-qtranslate-fix-editor-problems/vulnerability/wordpress-tinymce-advanced-qtranslate-fix-editor-problems-plugin-1-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-02-13T13:00:37.983503+00:00 2025-02-13T15:00:33.937314+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-02-13T12:15:27.837000+00:00 2025-02-13T14:28:17.323000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,20 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
281220 281248
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `1` Recently added CVEs: `28`
- [CVE-2025-21700](CVE-2025/CVE-2025-217xx/CVE-2025-21700.json) (`2025-02-13T12:15:27.837`) - [CVE-2025-1270](CVE-2025/CVE-2025-12xx/CVE-2025-1270.json) (`2025-02-13T13:15:09.273`)
- [CVE-2025-1271](CVE-2025/CVE-2025-12xx/CVE-2025-1271.json) (`2025-02-13T13:15:09.433`)
- [CVE-2025-26538](CVE-2025/CVE-2025-265xx/CVE-2025-26538.json) (`2025-02-13T14:16:19.100`)
- [CVE-2025-26539](CVE-2025/CVE-2025-265xx/CVE-2025-26539.json) (`2025-02-13T14:16:19.383`)
- [CVE-2025-26543](CVE-2025/CVE-2025-265xx/CVE-2025-26543.json) (`2025-02-13T14:16:19.707`)
- [CVE-2025-26545](CVE-2025/CVE-2025-265xx/CVE-2025-26545.json) (`2025-02-13T14:16:20.043`)
- [CVE-2025-26547](CVE-2025/CVE-2025-265xx/CVE-2025-26547.json) (`2025-02-13T14:16:20.347`)
- [CVE-2025-26549](CVE-2025/CVE-2025-265xx/CVE-2025-26549.json) (`2025-02-13T14:16:20.663`)
- [CVE-2025-26550](CVE-2025/CVE-2025-265xx/CVE-2025-26550.json) (`2025-02-13T14:16:20.993`)
- [CVE-2025-26551](CVE-2025/CVE-2025-265xx/CVE-2025-26551.json) (`2025-02-13T14:16:21.450`)
- [CVE-2025-26552](CVE-2025/CVE-2025-265xx/CVE-2025-26552.json) (`2025-02-13T14:16:21.787`)
- [CVE-2025-26558](CVE-2025/CVE-2025-265xx/CVE-2025-26558.json) (`2025-02-13T14:16:22.130`)
- [CVE-2025-26561](CVE-2025/CVE-2025-265xx/CVE-2025-26561.json) (`2025-02-13T14:16:22.450`)
- [CVE-2025-26562](CVE-2025/CVE-2025-265xx/CVE-2025-26562.json) (`2025-02-13T14:16:22.607`)
- [CVE-2025-26567](CVE-2025/CVE-2025-265xx/CVE-2025-26567.json) (`2025-02-13T14:16:22.763`)
- [CVE-2025-26568](CVE-2025/CVE-2025-265xx/CVE-2025-26568.json) (`2025-02-13T14:16:22.910`)
- [CVE-2025-26569](CVE-2025/CVE-2025-265xx/CVE-2025-26569.json) (`2025-02-13T14:16:23.070`)
- [CVE-2025-26570](CVE-2025/CVE-2025-265xx/CVE-2025-26570.json) (`2025-02-13T14:16:23.223`)
- [CVE-2025-26571](CVE-2025/CVE-2025-265xx/CVE-2025-26571.json) (`2025-02-13T14:16:23.360`)
- [CVE-2025-26572](CVE-2025/CVE-2025-265xx/CVE-2025-26572.json) (`2025-02-13T14:16:23.507`)
- [CVE-2025-26574](CVE-2025/CVE-2025-265xx/CVE-2025-26574.json) (`2025-02-13T14:16:23.653`)
- [CVE-2025-26577](CVE-2025/CVE-2025-265xx/CVE-2025-26577.json) (`2025-02-13T14:16:23.797`)
- [CVE-2025-26578](CVE-2025/CVE-2025-265xx/CVE-2025-26578.json) (`2025-02-13T14:16:23.990`)
- [CVE-2025-26580](CVE-2025/CVE-2025-265xx/CVE-2025-26580.json) (`2025-02-13T14:16:24.250`)
- [CVE-2025-26582](CVE-2025/CVE-2025-265xx/CVE-2025-26582.json) (`2025-02-13T14:16:24.407`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `16`
- [CVE-2019-7192](CVE-2019/CVE-2019-71xx/CVE-2019-7192.json) (`2025-02-13T14:18:25.263`)
- [CVE-2019-7193](CVE-2019/CVE-2019-71xx/CVE-2019-7193.json) (`2025-02-13T14:16:18.827`)
- [CVE-2019-7194](CVE-2019/CVE-2019-71xx/CVE-2019-7194.json) (`2025-02-13T14:15:31.933`)
- [CVE-2019-7195](CVE-2019/CVE-2019-71xx/CVE-2019-7195.json) (`2025-02-13T14:13:03.560`)
- [CVE-2020-2509](CVE-2020/CVE-2020-25xx/CVE-2020-2509.json) (`2025-02-13T14:22:58.803`)
- [CVE-2020-8468](CVE-2020/CVE-2020-84xx/CVE-2020-8468.json) (`2025-02-13T14:28:17.323`)
- [CVE-2021-36742](CVE-2021/CVE-2021-367xx/CVE-2021-36742.json) (`2025-02-13T14:26:24.660`)
- [CVE-2023-37920](CVE-2023/CVE-2023-379xx/CVE-2023-37920.json) (`2025-02-13T13:50:15.813`)
- [CVE-2024-12582](CVE-2024/CVE-2024-125xx/CVE-2024-12582.json) (`2025-02-13T14:15:28.700`)
- [CVE-2024-56765](CVE-2024/CVE-2024-567xx/CVE-2024-56765.json) (`2025-02-13T14:16:17.130`)
- [CVE-2024-57795](CVE-2024/CVE-2024-577xx/CVE-2024-57795.json) (`2025-02-13T14:16:17.430`)
- [CVE-2024-57857](CVE-2024/CVE-2024-578xx/CVE-2024-57857.json) (`2025-02-13T14:16:17.620`)
- [CVE-2024-57892](CVE-2024/CVE-2024-578xx/CVE-2024-57892.json) (`2025-02-13T14:16:17.800`)
- [CVE-2024-57900](CVE-2024/CVE-2024-579xx/CVE-2024-57900.json) (`2025-02-13T14:16:18.027`)
- [CVE-2025-21633](CVE-2025/CVE-2025-216xx/CVE-2025-21633.json) (`2025-02-13T14:16:18.597`)
- [CVE-2025-21700](CVE-2025/CVE-2025-217xx/CVE-2025-21700.json) (`2025-02-13T14:16:18.803`)
## Download and Usage ## Download and Usage

View File

@ -141984,10 +141984,10 @@ CVE-2019-7181,0,0,c9ef1610f232f8ad3af4bc7af8d77d7d8d5fa61986869be34826f7c90304f4
CVE-2019-7183,0,0,37217b9c80e4d3d92cfadafc02dccddb3f2aac11b4e740ab67d148b357e01ab3,2024-11-21T04:47:44.140000 CVE-2019-7183,0,0,37217b9c80e4d3d92cfadafc02dccddb3f2aac11b4e740ab67d148b357e01ab3,2024-11-21T04:47:44.140000
CVE-2019-7184,0,0,9c893b465dac642769eae6def5be2469c211cd0eb0f9e9a311924aeae68c4455,2024-11-21T04:47:44.253000 CVE-2019-7184,0,0,9c893b465dac642769eae6def5be2469c211cd0eb0f9e9a311924aeae68c4455,2024-11-21T04:47:44.253000
CVE-2019-7185,0,0,835b8e1d9d28366a9aa06cde1038caf9ad3cb7941b1394e2fe9daa0ecda925f1,2024-11-21T04:47:44.363000 CVE-2019-7185,0,0,835b8e1d9d28366a9aa06cde1038caf9ad3cb7941b1394e2fe9daa0ecda925f1,2024-11-21T04:47:44.363000
CVE-2019-7192,0,0,5f86bd786f18d88295ad0097a53fbd7c3afe632c68d799c370e57997f8c2d9ac,2025-02-06T21:15:13.510000 CVE-2019-7192,0,1,6b33121e1fcb9aa3ae848a3cef8c00890d1b66ee55c7b261324f5b19f2345d85,2025-02-13T14:18:25.263000
CVE-2019-7193,0,0,5f47103e8f9cf1ae9304748e783c799adaa0b13fcead554a680d38dff2b2abcc,2025-02-06T21:15:13.767000 CVE-2019-7193,0,1,6d206349e72ef1bc7d39a429528ff326287e5e1052f23aac7aabde73cbe7d6f0,2025-02-13T14:16:18.827000
CVE-2019-7194,0,0,553fdf1d76a3de339a698965acde383735fd352017fe831190dcd17d2ebed875,2025-02-06T21:15:13.990000 CVE-2019-7194,0,1,a43350f74c67d3a599f0b781b4dbc1cd88feefe265d4dc38f34f958cf98b64a7,2025-02-13T14:15:31.933000
CVE-2019-7195,0,0,4ac545e53cb09ffaaa23e6c3f6afa1a6254c74d32b9044822c8ec6646a3a58d8,2025-02-06T21:15:14.220000 CVE-2019-7195,0,1,943a97eb8b9ef29c551e66149cd8c8f13be7d2dcec393acf7d6e2d7ad26c0d60,2025-02-13T14:13:03.560000
CVE-2019-7197,0,0,d5f937acfde0c9086aa0bfe59af502bce0e9860fef4f0e726928abce1a665740,2024-11-21T04:47:44.987000 CVE-2019-7197,0,0,d5f937acfde0c9086aa0bfe59af502bce0e9860fef4f0e726928abce1a665740,2024-11-21T04:47:44.987000
CVE-2019-7198,0,0,b25fed3c68cf30094538eed1380862b90470522189d1fdc2727fac5de0b8fe44,2024-11-21T04:47:45.103000 CVE-2019-7198,0,0,b25fed3c68cf30094538eed1380862b90470522189d1fdc2727fac5de0b8fe44,2024-11-21T04:47:45.103000
CVE-2019-7201,0,0,aa884f1aeb73ad412cb8d9962cd20003116139550d408f0059cbfbfeef7b95e9,2024-11-21T04:47:45.237000 CVE-2019-7201,0,0,aa884f1aeb73ad412cb8d9962cd20003116139550d408f0059cbfbfeef7b95e9,2024-11-21T04:47:45.237000
@ -154673,7 +154673,7 @@ CVE-2020-25086,0,0,406084c58b22bda8f13f3b9d8a02d35e42f1f9c5c9d6980736368bcc90254
CVE-2020-25087,0,0,42bcd614840fd96e5185322268ded6756e513fb4247e189d048207a71104933f,2024-11-21T05:17:14.903000 CVE-2020-25087,0,0,42bcd614840fd96e5185322268ded6756e513fb4247e189d048207a71104933f,2024-11-21T05:17:14.903000
CVE-2020-25088,0,0,4efc5ef43c5d509698dad0e471c922e40baa3a62a29b95b47c4e4d0ee2cd72aa,2024-11-21T05:17:15.660000 CVE-2020-25088,0,0,4efc5ef43c5d509698dad0e471c922e40baa3a62a29b95b47c4e4d0ee2cd72aa,2024-11-21T05:17:15.660000
CVE-2020-25089,0,0,ce03dec9de84337ca2b76e9dc2b43f752c171dd99f63389d3e8ed1a77ead189b,2024-11-21T05:17:15.970000 CVE-2020-25089,0,0,ce03dec9de84337ca2b76e9dc2b43f752c171dd99f63389d3e8ed1a77ead189b,2024-11-21T05:17:15.970000
CVE-2020-2509,0,0,88bb381866e79d1131bc9fb2b156378c8ceddcf88353e3d1a78cdee3af853643,2025-02-06T21:15:15.153000 CVE-2020-2509,0,1,d0240186499c9fcf7c26560370e489b2e01369fbe89587b9ef494e53a444a54e,2025-02-13T14:22:58.803000
CVE-2020-25090,0,0,f97f4f0b8403aeaec3fabdb608175369035d212a6ce7f915813e6dc8ad19ad60,2024-11-21T05:17:16.310000 CVE-2020-25090,0,0,f97f4f0b8403aeaec3fabdb608175369035d212a6ce7f915813e6dc8ad19ad60,2024-11-21T05:17:16.310000
CVE-2020-25091,0,0,a2571d21533f526f643273f2ccf5c565f91d6f4280f190cead3a96d03978584b,2024-11-21T05:17:16.470000 CVE-2020-25091,0,0,a2571d21533f526f643273f2ccf5c565f91d6f4280f190cead3a96d03978584b,2024-11-21T05:17:16.470000
CVE-2020-25092,0,0,48803469f0915f6aae5a2de00a978db0ffe872cf9d3d4aa80bd52005831576ea,2024-11-21T05:17:17.103000 CVE-2020-25092,0,0,48803469f0915f6aae5a2de00a978db0ffe872cf9d3d4aa80bd52005831576ea,2024-11-21T05:17:17.103000
@ -163567,7 +163567,7 @@ CVE-2020-8464,0,0,cde99c1fc97741bce52d94c4feb16ffb048b50869383304390b8d92336435a
CVE-2020-8465,0,0,7351106c577b021182fcdae4cbf8c32cd85778c733278671a297b620666e24d8,2024-11-21T05:38:53.570000 CVE-2020-8465,0,0,7351106c577b021182fcdae4cbf8c32cd85778c733278671a297b620666e24d8,2024-11-21T05:38:53.570000
CVE-2020-8466,0,0,dc48662204f51e4360e95b33604e7a509ba98c62100571ad4c466fc4aeed4c92,2024-11-21T05:38:53.680000 CVE-2020-8466,0,0,dc48662204f51e4360e95b33604e7a509ba98c62100571ad4c466fc4aeed4c92,2024-11-21T05:38:53.680000
CVE-2020-8467,0,0,42d2011bbd52d2f7e9a8a1ccda8c43bb6d33e60838fa016c725c79d8ed78a0ad,2025-02-07T15:01:20.733000 CVE-2020-8467,0,0,42d2011bbd52d2f7e9a8a1ccda8c43bb6d33e60838fa016c725c79d8ed78a0ad,2025-02-07T15:01:20.733000
CVE-2020-8468,0,0,84f5b0c079e08b3d4ce975ac3f0cd70594eeb1d20751bfd338ca7b056a5473d1,2025-02-06T20:15:34.587000 CVE-2020-8468,0,1,df2cb2fdfcd1642ec9eee4f2eabd2d3bf13797690c7fbc202bb142151d274e4f,2025-02-13T14:28:17.323000
CVE-2020-8469,0,0,4c711e420af63f972cd1320af857c808855086c533d1abb91a0f9112be4def0c,2024-11-21T05:38:54.027000 CVE-2020-8469,0,0,4c711e420af63f972cd1320af857c808855086c533d1abb91a0f9112be4def0c,2024-11-21T05:38:54.027000
CVE-2020-8470,0,0,fe2bf0b46476cf81b036789ceca34e3737e912bc6ee74038979e38be2662ebbe,2024-11-21T05:38:54.130000 CVE-2020-8470,0,0,fe2bf0b46476cf81b036789ceca34e3737e912bc6ee74038979e38be2662ebbe,2024-11-21T05:38:54.130000
CVE-2020-8471,0,0,3e4e8c6a62e3cfd24c8790f0420125da6e9f2589aa476edd5d8301e245f73830,2024-11-21T05:38:54.237000 CVE-2020-8471,0,0,3e4e8c6a62e3cfd24c8790f0420125da6e9f2589aa476edd5d8301e245f73830,2024-11-21T05:38:54.237000
@ -179575,7 +179575,7 @@ CVE-2021-36739,0,0,f26d0be0a721fbe6be03df43ffbc9b3042175c6173cfb23d10478df22eda2
CVE-2021-3674,0,0,a6ebe839edba8d8408e2ebc11b394ca63ccd563a6d74c07ce22a05a02c5340d4,2024-11-21T06:22:08.007000 CVE-2021-3674,0,0,a6ebe839edba8d8408e2ebc11b394ca63ccd563a6d74c07ce22a05a02c5340d4,2024-11-21T06:22:08.007000
CVE-2021-36740,0,0,54bc6cdf23940c08f7f28324a9e8120c825654c24d2b52459fcb9fe03320bbf6,2024-11-21T06:13:59.623000 CVE-2021-36740,0,0,54bc6cdf23940c08f7f28324a9e8120c825654c24d2b52459fcb9fe03320bbf6,2024-11-21T06:13:59.623000
CVE-2021-36741,0,0,d280b45653300f468a60e6fac9bd749827b184c0e1831b0373fcedbae7e2d3c9,2025-02-12T19:23:38.797000 CVE-2021-36741,0,0,d280b45653300f468a60e6fac9bd749827b184c0e1831b0373fcedbae7e2d3c9,2025-02-12T19:23:38.797000
CVE-2021-36742,0,0,dcba81fe88dc54b97cf90c1f2c6387ebd72106975a6c3eada24afe9024c87bc4,2025-02-06T20:15:37.530000 CVE-2021-36742,0,1,2e41644e342db51beeadf18bf8dc0c4d7f3c0355ab530a8109799a1fcf7f4b10,2025-02-13T14:26:24.660000
CVE-2021-36744,0,0,d45285bc3db76c0d6dab50f059ca546f427f4488393c91f33c651825cfcee74a,2024-11-21T06:14:00.137000 CVE-2021-36744,0,0,d45285bc3db76c0d6dab50f059ca546f427f4488393c91f33c651825cfcee74a,2024-11-21T06:14:00.137000
CVE-2021-36745,0,0,1cce952eb8dd2370e5aefef31e1a86c4ba7f1e524f793d1e889818873e30880d,2024-11-21T06:14:00.293000 CVE-2021-36745,0,0,1cce952eb8dd2370e5aefef31e1a86c4ba7f1e524f793d1e889818873e30880d,2024-11-21T06:14:00.293000
CVE-2021-36746,0,0,21132e96a64571a11d67dee583d5cbe254c9677a98c9b6f236f1ceaa252d79a2,2024-11-21T06:14:00.443000 CVE-2021-36746,0,0,21132e96a64571a11d67dee583d5cbe254c9677a98c9b6f236f1ceaa252d79a2,2024-11-21T06:14:00.443000
@ -229399,7 +229399,7 @@ CVE-2023-37917,0,0,51c759821fc20c5b2c69e11c0e017e5ffebe80f98cd2eae5673deec44edee
CVE-2023-37918,0,0,6f0880e032fa0d82b5e0d452ab365518bdbe0117ecd986fa899a39dc18be7c61,2024-11-21T08:12:28.140000 CVE-2023-37918,0,0,6f0880e032fa0d82b5e0d452ab365518bdbe0117ecd986fa899a39dc18be7c61,2024-11-21T08:12:28.140000
CVE-2023-37919,0,0,4fbb86481c3cfb031e8a503bb71b218ec50f136c41aa7a3d29b77cd8590c2348,2024-11-21T08:12:28.270000 CVE-2023-37919,0,0,4fbb86481c3cfb031e8a503bb71b218ec50f136c41aa7a3d29b77cd8590c2348,2024-11-21T08:12:28.270000
CVE-2023-3792,0,0,3afa82c6f554a716ffba2d2f86a382a3375d5636ac47c6f5be56ea62511da55f,2024-11-21T08:18:04.510000 CVE-2023-3792,0,0,3afa82c6f554a716ffba2d2f86a382a3375d5636ac47c6f5be56ea62511da55f,2024-11-21T08:18:04.510000
CVE-2023-37920,0,0,02565647290fb951dfcfb3cc6454dc756bcd060fd6195ec5b58407c09db2841d,2025-02-12T19:55:47.327000 CVE-2023-37920,0,1,2869cc89393c8bc07220f5f38629c4ad5603db1a9f36f9b7301ad84944ec5e97,2025-02-13T13:50:15.813000
CVE-2023-37921,0,0,2e13620c16e9e4a10da39a426c7aeb74e8b6ac6fdaa368d98e3a9b0d340c9455,2024-11-21T08:12:28.557000 CVE-2023-37921,0,0,2e13620c16e9e4a10da39a426c7aeb74e8b6ac6fdaa368d98e3a9b0d340c9455,2024-11-21T08:12:28.557000
CVE-2023-37922,0,0,b017b26be93e63740acf4bbe8bb2bc33108e05f42ab3096fa52f2660c269d37d,2024-11-21T08:12:28.683000 CVE-2023-37922,0,0,b017b26be93e63740acf4bbe8bb2bc33108e05f42ab3096fa52f2660c269d37d,2024-11-21T08:12:28.683000
CVE-2023-37923,0,0,7668498e9eacdeda89a99b6447aa39342c9b7ac764bc7c290e69466faa436f38,2024-11-21T08:12:28.813000 CVE-2023-37923,0,0,7668498e9eacdeda89a99b6447aa39342c9b7ac764bc7c290e69466faa436f38,2024-11-21T08:12:28.813000
@ -245784,7 +245784,7 @@ CVE-2024-12578,0,0,9683da78c95f4de0afe4f169763bacae0c8e4e48d594e85dbc7c32bda1c6e
CVE-2024-12579,0,0,6b066a632ed42755872bfe12897131044e41b00627589546ab36be31d813b6f2,2024-12-13T05:15:07.473000 CVE-2024-12579,0,0,6b066a632ed42755872bfe12897131044e41b00627589546ab36be31d813b6f2,2024-12-13T05:15:07.473000
CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6caa,2024-11-21T08:50:10.573000 CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6caa,2024-11-21T08:50:10.573000
CVE-2024-12581,0,0,17d18fc726b97760d30d61750a12c405333a5f53d81d848944da12ea8bb424ae,2025-02-06T15:36:33.913000 CVE-2024-12581,0,0,17d18fc726b97760d30d61750a12c405333a5f53d81d848944da12ea8bb424ae,2025-02-06T15:36:33.913000
CVE-2024-12582,0,0,bbfe1aae814f308a85392c13709691d46da248e6458c80cb519b63fa483aa592,2024-12-24T04:15:05.137000 CVE-2024-12582,0,1,a0b0d559e35257fefd40696360a672947ea87b7d7c68f9748c838d1ee2cd3e66,2025-02-13T14:15:28.700000
CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000 CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000
CVE-2024-12584,0,0,adcd511bb3f4eac61fabd0c77513e0f49514ba8fec705794080ba1b5bd973bc5,2025-01-08T07:15:26.833000 CVE-2024-12584,0,0,adcd511bb3f4eac61fabd0c77513e0f49514ba8fec705794080ba1b5bd973bc5,2025-01-08T07:15:26.833000
CVE-2024-12585,0,0,5da3be9bc678e425dc481c70b7523d18c5d89e9715457ba9168db2468bb42cc7,2025-01-08T16:15:34.130000 CVE-2024-12585,0,0,5da3be9bc678e425dc481c70b7523d18c5d89e9715457ba9168db2468bb42cc7,2025-01-08T16:15:34.130000
@ -246274,6 +246274,7 @@ CVE-2024-13179,0,0,9d2a982b824c67bbacd2e3f4856194d80faa53a9ffb503fdbd054d373079f
CVE-2024-1318,0,0,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bbca,2024-12-31T16:56:50.763000 CVE-2024-1318,0,0,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bbca,2024-12-31T16:56:50.763000
CVE-2024-13180,0,0,d8eed302f18bf4ce52a1f3c3aecacb18daed8ee47876692255a4c4adf22e5203,2025-01-16T21:01:52.650000 CVE-2024-13180,0,0,d8eed302f18bf4ce52a1f3c3aecacb18daed8ee47876692255a4c4adf22e5203,2025-01-16T21:01:52.650000
CVE-2024-13181,0,0,619fe755e63fe3e9187685691ca64b6896c0b1403e0d4ede0609b0d7248d7a86,2025-01-16T21:02:04.910000 CVE-2024-13181,0,0,619fe755e63fe3e9187685691ca64b6896c0b1403e0d4ede0609b0d7248d7a86,2025-01-16T21:02:04.910000
CVE-2024-13182,1,1,ef7cb61dda1d7aecd86c8e3d6e4d0d893d86c62c523bc2141825c453e531fb02,2025-02-13T13:15:08.290000
CVE-2024-13183,0,0,2ce47bc0097832a6bd22ec2d12492d2b5c4ebe6c470cd8cfcebfa2e924cfdeb4,2025-01-16T21:28:47.330000 CVE-2024-13183,0,0,2ce47bc0097832a6bd22ec2d12492d2b5c4ebe6c470cd8cfcebfa2e924cfdeb4,2025-01-16T21:28:47.330000
CVE-2024-13184,0,0,8b81821152591ad1436a78438bc699d56dfdd30ea4e4d2ad15a148f2202c8566,2025-01-18T09:15:06.937000 CVE-2024-13184,0,0,8b81821152591ad1436a78438bc699d56dfdd30ea4e4d2ad15a148f2202c8566,2025-01-18T09:15:06.937000
CVE-2024-13185,0,0,f40f11cf6008f79d177ff077a9dcbe69bd3026b99163ebcfc01129828e4cdf96,2025-01-08T15:15:17.163000 CVE-2024-13185,0,0,f40f11cf6008f79d177ff077a9dcbe69bd3026b99163ebcfc01129828e4cdf96,2025-01-08T15:15:17.163000
@ -274334,7 +274335,7 @@ CVE-2024-56761,0,0,50cdec2eb0ac44f5b4bf3ee27d9bf4283f3aa1e5e4a6c8551c767a8281df1
CVE-2024-56762,0,0,60cbcc45f06c16ba0161fce9430eab44b47458e705e9b29759993ec95842a560,2025-01-07T09:15:16.973000 CVE-2024-56762,0,0,60cbcc45f06c16ba0161fce9430eab44b47458e705e9b29759993ec95842a560,2025-01-07T09:15:16.973000
CVE-2024-56763,0,0,b39292b686e9471eec590980b78b2a363be23c62abe7afa434eea1401b525135,2025-01-09T16:16:23.780000 CVE-2024-56763,0,0,b39292b686e9471eec590980b78b2a363be23c62abe7afa434eea1401b525135,2025-01-09T16:16:23.780000
CVE-2024-56764,0,0,f430899c2c816887efc211dab16ece7317597b0f1b1c0be2d0f1e9d9577e3ea5,2025-02-11T16:15:47.927000 CVE-2024-56764,0,0,f430899c2c816887efc211dab16ece7317597b0f1b1c0be2d0f1e9d9577e3ea5,2025-02-11T16:15:47.927000
CVE-2024-56765,0,0,71917408c8c13ef040ede0707bb147f5bfdf9a3d2f43d54208cbfff7de842620,2025-01-07T23:00:53.973000 CVE-2024-56765,0,1,f052ce7db4ab37b715e4de64fd073c2145ff41f900220475c37118f454133be1,2025-02-13T14:16:17.130000
CVE-2024-56766,0,0,bce49344e22f2bb3806268a0257273103e66d2578fa423683880a7c80182d04d,2025-01-09T16:16:23.913000 CVE-2024-56766,0,0,bce49344e22f2bb3806268a0257273103e66d2578fa423683880a7c80182d04d,2025-01-09T16:16:23.913000
CVE-2024-56767,0,0,ec44d992537d8dabb3d619cb50ee92ccb66f80ed282e5005cbd7f3c03d352a0f,2025-01-09T16:16:24.063000 CVE-2024-56767,0,0,ec44d992537d8dabb3d619cb50ee92ccb66f80ed282e5005cbd7f3c03d352a0f,2025-01-09T16:16:24.063000
CVE-2024-56768,0,0,d8373e0dbf214f4feec34d3f904be6536bfb761175850928b1ed7e4f24a9c3b7,2025-01-07T22:50:43.207000 CVE-2024-56768,0,0,d8373e0dbf214f4feec34d3f904be6536bfb761175850928b1ed7e4f24a9c3b7,2025-01-07T22:50:43.207000
@ -274775,7 +274776,7 @@ CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46f
CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10e86,2025-01-11T13:15:29.253000 CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10e86,2025-01-11T13:15:29.253000
CVE-2024-57792,0,0,e53647b80dd687b9a2a0064a755fece6d3e4e026a6a0cb58d2d0e7aa75150018,2025-01-11T13:15:29.420000 CVE-2024-57792,0,0,e53647b80dd687b9a2a0064a755fece6d3e4e026a6a0cb58d2d0e7aa75150018,2025-01-11T13:15:29.420000
CVE-2024-57793,0,0,e9b7a7fae892be6eee516cf000e8b375a33c60ab507666266d3a6f69d2535658,2025-01-11T13:15:29.593000 CVE-2024-57793,0,0,e9b7a7fae892be6eee516cf000e8b375a33c60ab507666266d3a6f69d2535658,2025-01-11T13:15:29.593000
CVE-2024-57795,0,0,c27fd0f8d7d3c2986e45448963a7c33f5baa1cb6168473b82dcd9b787e8c4fce,2025-01-15T13:15:11.563000 CVE-2024-57795,0,1,a90e6dceb6d89c11c345a39f2051d8bc39b5648c7c13b1bd9f1bedb75e802a60,2025-02-13T14:16:17.430000
CVE-2024-57798,0,0,16d3561f254b9a67268e3fd1903675f3c6069d3999c68a99ddddb4bf962c6bef,2025-02-03T14:53:23.433000 CVE-2024-57798,0,0,16d3561f254b9a67268e3fd1903675f3c6069d3999c68a99ddddb4bf962c6bef,2025-02-03T14:53:23.433000
CVE-2024-57799,0,0,629fd8bffc1c970081661553b3588a57b03911cce9c0036c62f31188e3006930,2025-01-16T15:19:18.117000 CVE-2024-57799,0,0,629fd8bffc1c970081661553b3588a57b03911cce9c0036c62f31188e3006930,2025-01-16T15:19:18.117000
CVE-2024-5780,0,0,8f257920278f73ebde8da2f9da9c11fb9d019685aae47ae6d2026dc053194989,2024-06-12T08:15:51.300000 CVE-2024-5780,0,0,8f257920278f73ebde8da2f9da9c11fb9d019685aae47ae6d2026dc053194989,2024-06-12T08:15:51.300000
@ -274802,7 +274803,7 @@ CVE-2024-57844,0,0,ba7a9af927cdccfb32d77efd3b08b23135ba420a4b94376a9ac04ef40ed20
CVE-2024-57849,0,0,6c1a4f1831f5a2a9c9af19f1c5a93dad2a70d3fd672b039b5a9c54549819e120,2025-01-11T15:15:07.290000 CVE-2024-57849,0,0,6c1a4f1831f5a2a9c9af19f1c5a93dad2a70d3fd672b039b5a9c54549819e120,2025-01-11T15:15:07.290000
CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000 CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000
CVE-2024-57850,0,0,47b5473b2f10d731d0387dd9768f510a3a9dbe99cecf1312c304ff971055ab13,2025-01-11T15:15:07.423000 CVE-2024-57850,0,0,47b5473b2f10d731d0387dd9768f510a3a9dbe99cecf1312c304ff971055ab13,2025-01-11T15:15:07.423000
CVE-2024-57857,0,0,42661a463d36aadb20f3e64c41126783ca9e0b1df58ab33691cea597d9ac1a2b,2025-01-15T13:15:12.403000 CVE-2024-57857,0,1,3f0cabf5d6ee223bacca9cfe8ea4c67c059ddcf7e3b9854317117b67ecec7803,2025-02-13T14:16:17.620000
CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000 CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000
CVE-2024-5787,0,0,1d58b2484cfc2497ce3be8bc315153e4937b24852bc87d95aee088e2aedc7438,2024-11-21T09:48:20.010000 CVE-2024-5787,0,0,1d58b2484cfc2497ce3be8bc315153e4937b24852bc87d95aee088e2aedc7438,2024-11-21T09:48:20.010000
CVE-2024-57872,0,0,c3ffa0e155e2ac44fac8a82673746753e090198753fbd02da0ed8386c1ecfa6e,2025-01-16T15:19:51.637000 CVE-2024-57872,0,0,c3ffa0e155e2ac44fac8a82673746753e090198753fbd02da0ed8386c1ecfa6e,2025-01-16T15:19:51.637000
@ -274826,7 +274827,7 @@ CVE-2024-57889,0,0,62e396df070c9aec292eb26521734ece0a76444ded3816447a98dba23df3e
CVE-2024-5789,0,0,9dcfcd4111ea0e9e739e91d8fd580d0fefd90ab28ec12c3acba80730fef979ee,2024-09-26T20:28:29.237000 CVE-2024-5789,0,0,9dcfcd4111ea0e9e739e91d8fd580d0fefd90ab28ec12c3acba80730fef979ee,2024-09-26T20:28:29.237000
CVE-2024-57890,0,0,876228291e28ce2dbcf91efd1283214e54d4069730fa474ebc3b3b0d9a53418a,2025-01-21T17:41:24.450000 CVE-2024-57890,0,0,876228291e28ce2dbcf91efd1283214e54d4069730fa474ebc3b3b0d9a53418a,2025-01-21T17:41:24.450000
CVE-2024-57891,0,0,cd33e3a4e8d37a5f36fd34bd5a361c07ff62e7972f171735ba5dd223fe03e6f1,2025-01-15T13:15:13.590000 CVE-2024-57891,0,0,cd33e3a4e8d37a5f36fd34bd5a361c07ff62e7972f171735ba5dd223fe03e6f1,2025-01-15T13:15:13.590000
CVE-2024-57892,0,0,7be971d420452d3ea5d6fb729983c6d690c1c6ee356e903e2c8eaa7f55c571ed,2025-02-02T11:15:12.450000 CVE-2024-57892,0,1,14736616310e4e8ee489220b3fa985deb190abfc580a60b1a99e9cb0181d3dfe,2025-02-13T14:16:17.800000
CVE-2024-57893,0,0,de1df3ef6db19acaf3c7c48dd5c62fb10118eacffbfad185b7dbbf80a82129c6,2025-01-15T13:15:13.820000 CVE-2024-57893,0,0,de1df3ef6db19acaf3c7c48dd5c62fb10118eacffbfad185b7dbbf80a82129c6,2025-01-15T13:15:13.820000
CVE-2024-57894,0,0,d7d6f6140de35b010b1b5beb6457a2e35be159e74f947f8b4b5cce28e627637c,2025-01-15T13:15:13.943000 CVE-2024-57894,0,0,d7d6f6140de35b010b1b5beb6457a2e35be159e74f947f8b4b5cce28e627637c,2025-01-15T13:15:13.943000
CVE-2024-57895,0,0,9ad2e608235ea6296b191cd61921ed3a449403f186ff27dacefb37686d68c65d,2025-01-21T17:47:20.323000 CVE-2024-57895,0,0,9ad2e608235ea6296b191cd61921ed3a449403f186ff27dacefb37686d68c65d,2025-01-21T17:47:20.323000
@ -274835,7 +274836,7 @@ CVE-2024-57897,0,0,3d8c470fae69b589d24f1b293420d7a6a2c10fa45e69bbcc2f2a6813cfb37
CVE-2024-57898,0,0,33919a8729fc5ee32309d9f13ff00813ffa8f03e2482ac875a9d69e5d0b52206,2025-01-15T13:15:14.427000 CVE-2024-57898,0,0,33919a8729fc5ee32309d9f13ff00813ffa8f03e2482ac875a9d69e5d0b52206,2025-01-15T13:15:14.427000
CVE-2024-57899,0,0,83468965f33ada40980399571d777b372c41a2b30b4775120a1f2be8fe69b89f,2025-01-15T13:15:14.540000 CVE-2024-57899,0,0,83468965f33ada40980399571d777b372c41a2b30b4775120a1f2be8fe69b89f,2025-01-15T13:15:14.540000
CVE-2024-5790,0,0,eec668ee9d3641cb0f3de89f3c2f9fc313b8158d0b4258bc8dbb969f253eecba,2024-11-21T09:48:20.323000 CVE-2024-5790,0,0,eec668ee9d3641cb0f3de89f3c2f9fc313b8158d0b4258bc8dbb969f253eecba,2024-11-21T09:48:20.323000
CVE-2024-57900,0,0,bb875dc978ec5a0d124f3d2e0c1034ecda0323dbff33fefa2dd00b0441f9c049,2025-01-21T17:45:42.657000 CVE-2024-57900,0,1,47c59939a517ef6e55e93927c3b37d9d833e39af74439b35b5240b02f60aed6c,2025-02-13T14:16:18.027000
CVE-2024-57901,0,0,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d6855e3,2025-01-15T13:15:14.747000 CVE-2024-57901,0,0,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d6855e3,2025-01-15T13:15:14.747000
CVE-2024-57902,0,0,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000 CVE-2024-57902,0,0,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000
CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000 CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000
@ -279074,6 +279075,7 @@ CVE-2025-1083,0,0,4afa513b3fc8f95cd8d4d20b3ed0046d9430183e58afbd31ad82dd599bd8fd
CVE-2025-1084,0,0,b0d508f1ab3a1d3dc65fb5a374e03ada5ac495226151bdcc4d5b2ac7850ddb9c,2025-02-07T00:15:28.180000 CVE-2025-1084,0,0,b0d508f1ab3a1d3dc65fb5a374e03ada5ac495226151bdcc4d5b2ac7850ddb9c,2025-02-07T00:15:28.180000
CVE-2025-1085,0,0,f584db130967758b77431e11a5f469d25699b86ea49d2e400bcb605050e5a113,2025-02-07T01:15:07.930000 CVE-2025-1085,0,0,f584db130967758b77431e11a5f469d25699b86ea49d2e400bcb605050e5a113,2025-02-07T01:15:07.930000
CVE-2025-1086,0,0,939f922cf83473192b0b258783d5ca641c4443176d820dcd2d3b84e692405303,2025-02-07T02:15:30.523000 CVE-2025-1086,0,0,939f922cf83473192b0b258783d5ca641c4443176d820dcd2d3b84e692405303,2025-02-07T02:15:30.523000
CVE-2025-1094,1,1,e5e055d514f617b2b0dd68bfd421d255613f2d2ce30f5da292f691fa4aaf7a96,2025-02-13T13:15:09.130000
CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000 CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000
CVE-2025-1099,0,0,bf17eec112b497da534e01d8cb5eb20bbffb3f16a9e8841ea572781479eb3e5f,2025-02-10T11:15:21.147000 CVE-2025-1099,0,0,bf17eec112b497da534e01d8cb5eb20bbffb3f16a9e8841ea572781479eb3e5f,2025-02-10T11:15:21.147000
CVE-2025-1100,0,0,caabd467f14edf71ead8d61afba156fa4f48c60c81aecb9cb29d5d2ddb691e7f,2025-02-12T14:15:31.647000 CVE-2025-1100,0,0,caabd467f14edf71ead8d61afba156fa4f48c60c81aecb9cb29d5d2ddb691e7f,2025-02-12T14:15:31.647000
@ -279171,6 +279173,9 @@ CVE-2025-1231,0,0,649e1b02ffb9b2bdea0c0d5302a32991e98ee2dd95c7154e6cc11a5ff00876
CVE-2025-1240,0,0,9246fa8e04ff02b401e811c0a0ea877726af12834c8315ffa6c43657c8f2f12a,2025-02-11T22:15:29.800000 CVE-2025-1240,0,0,9246fa8e04ff02b401e811c0a0ea877726af12834c8315ffa6c43657c8f2f12a,2025-02-11T22:15:29.800000
CVE-2025-1243,0,0,ce5d6de4aa6c9e357b98e042ebbfccf5742c455f48067e48b6f93d2620d3c5f5,2025-02-12T01:15:09.073000 CVE-2025-1243,0,0,ce5d6de4aa6c9e357b98e042ebbfccf5742c455f48067e48b6f93d2620d3c5f5,2025-02-12T01:15:09.073000
CVE-2025-1244,0,0,3a7066df433eb03dbb1a5156667b9922c9a48d520391bb584a7af3176d35b733,2025-02-12T15:15:18.430000 CVE-2025-1244,0,0,3a7066df433eb03dbb1a5156667b9922c9a48d520391bb584a7af3176d35b733,2025-02-12T15:15:18.430000
CVE-2025-1247,1,1,c04092dcf345103badb80fdd95e22fac8a6844256bbf5405f306402957fc9ebb,2025-02-13T14:16:18.400000
CVE-2025-1270,1,1,236281c7e2f02c32874e4e3709dfb4e8e9ebb69fe161a8786e8aa1222fe115b8,2025-02-13T13:15:09.273000
CVE-2025-1271,1,1,5d817e390688ef07b23033305a3d61b54ec7909b543740a3f3f14f0970450461,2025-02-13T13:15:09.433000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000 CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000
@ -279628,7 +279633,7 @@ CVE-2025-21629,0,0,5bd27bb9a82cb5a5f09a5986e4163e86befaea4298f9b54578a62350a2997
CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51e41,2025-01-17T09:15:08 CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51e41,2025-01-17T09:15:08
CVE-2025-21631,0,0,827a424e63f48b072bb6688d1a9f41839aec5c2b224610b12dcbe56fe5cf9787,2025-02-10T18:15:34.650000 CVE-2025-21631,0,0,827a424e63f48b072bb6688d1a9f41839aec5c2b224610b12dcbe56fe5cf9787,2025-02-10T18:15:34.650000
CVE-2025-21632,0,0,319c971763f332a963bcaca50f66216a12a2c5a0d07d26ccb015f5aed2bdc246,2025-01-19T11:15:08.650000 CVE-2025-21632,0,0,319c971763f332a963bcaca50f66216a12a2c5a0d07d26ccb015f5aed2bdc246,2025-01-19T11:15:08.650000
CVE-2025-21633,0,0,5feddd6b17cfde18f8f70d5415e3d187d491e0f9f4fddbbb10eb6daf6c6066de,2025-01-19T11:15:08.773000 CVE-2025-21633,0,1,660796f9c53850c1727326b3761ca207d3e35c4459b8907d5ec4f3129a38f3e9,2025-02-13T14:16:18.597000
CVE-2025-21634,0,0,c8b95aca08c2b45c9dba95d6155aefb765f07edea9819768e8b59b392e1eaba1,2025-02-03T14:42:29.407000 CVE-2025-21634,0,0,c8b95aca08c2b45c9dba95d6155aefb765f07edea9819768e8b59b392e1eaba1,2025-02-03T14:42:29.407000
CVE-2025-21635,0,0,f68693db8da33a37c51f7f5f67c2bc3befefae2a56081d367cd2c2267ce553f1,2025-01-19T11:15:09 CVE-2025-21635,0,0,f68693db8da33a37c51f7f5f67c2bc3befefae2a56081d367cd2c2267ce553f1,2025-01-19T11:15:09
CVE-2025-21636,0,0,6097ea20b833d9169f54205d90a302acd27d436dea66efcd6b9cee92a1babbe7,2025-01-23T17:15:24.790000 CVE-2025-21636,0,0,6097ea20b833d9169f54205d90a302acd27d436dea66efcd6b9cee92a1babbe7,2025-01-23T17:15:24.790000
@ -279695,7 +279700,7 @@ CVE-2025-21696,0,0,b50db3425e3c5ae8f9bcd952321a8faca5176a354e7da76e7a95c5c44fb3f
CVE-2025-21697,0,0,21dbc5e8ca09f0db10d8b851c55a1218ced4547bd60419817adfbeb41bc40c98,2025-02-12T14:15:32.787000 CVE-2025-21697,0,0,21dbc5e8ca09f0db10d8b851c55a1218ced4547bd60419817adfbeb41bc40c98,2025-02-12T14:15:32.787000
CVE-2025-21698,0,0,d7e293d79ce2d1c259f49fc2afa96a937082b9e40b1bdd42a351c66f25f809e0,2025-02-12T14:15:32.900000 CVE-2025-21698,0,0,d7e293d79ce2d1c259f49fc2afa96a937082b9e40b1bdd42a351c66f25f809e0,2025-02-12T14:15:32.900000
CVE-2025-21699,0,0,0738ffc847a7a2829b592d8dc197a21782e195ddce9370e0b4f4c6413dc7be27,2025-02-12T14:15:33.020000 CVE-2025-21699,0,0,0738ffc847a7a2829b592d8dc197a21782e195ddce9370e0b4f4c6413dc7be27,2025-02-12T14:15:33.020000
CVE-2025-21700,1,1,e2f15dfaadc300d644829d12fb084d8c8235c7ecb6012b8f087c15156459125c,2025-02-13T12:15:27.837000 CVE-2025-21700,0,1,16c660ef83be8e3692860c63459d5cb91dde6789514ef1272a7fe490e5043738,2025-02-13T14:16:18.803000
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000 CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000
CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000 CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000
@ -281219,3 +281224,26 @@ CVE-2025-26493,0,0,1099023a6dd0784f561a6e33a794f1b6b69f51c22042510a0826814d283df
CVE-2025-26494,0,0,fbc26c80357160dc793881bb81bca8973032cb78045f64dc3903e7fb3d3f359e,2025-02-11T18:15:47.060000 CVE-2025-26494,0,0,fbc26c80357160dc793881bb81bca8973032cb78045f64dc3903e7fb3d3f359e,2025-02-11T18:15:47.060000
CVE-2025-26495,0,0,0731ad2cc6d733334de4696008327b6e5ee6279ed8bc678e0a689b6be160a2fa,2025-02-11T18:15:47.237000 CVE-2025-26495,0,0,0731ad2cc6d733334de4696008327b6e5ee6279ed8bc678e0a689b6be160a2fa,2025-02-11T18:15:47.237000
CVE-2025-26520,0,0,b83a456ccd02c927137ed430a7b7666fceb0cc753b6c14f6ee5654a1a893266c,2025-02-12T07:15:08.617000 CVE-2025-26520,0,0,b83a456ccd02c927137ed430a7b7666fceb0cc753b6c14f6ee5654a1a893266c,2025-02-12T07:15:08.617000
CVE-2025-26538,1,1,9ea4ca612e90cce9189b8bae07fa04997f24224417b26ca364e9d1ce2abc0564,2025-02-13T14:16:19.100000
CVE-2025-26539,1,1,9e24ab5af3835adb18f91dd2d1f793e969f13bc3aa31bd06f752764eeee8db3e,2025-02-13T14:16:19.383000
CVE-2025-26543,1,1,62cfcbc6cba7195cf72b9bcad3caeeb3f7235faae114608907f61610e078b963,2025-02-13T14:16:19.707000
CVE-2025-26545,1,1,86e6d73b316c567f92fafe24354abc1f6e5e58627f6331bfd9ac32870ef96d2e,2025-02-13T14:16:20.043000
CVE-2025-26547,1,1,32512de25d98c31a3fb7d8dc154a7a890308ccf1c434f822a8fe2d1eff9a6a66,2025-02-13T14:16:20.347000
CVE-2025-26549,1,1,c83d206011787aa939d7304c8834cb18339ef2b98da1d146dbbf9a541a444205,2025-02-13T14:16:20.663000
CVE-2025-26550,1,1,883cb288bc4eea99ad912aba30c7fea818b98e6f73b285242c10d13a2acb06fd,2025-02-13T14:16:20.993000
CVE-2025-26551,1,1,a029083bd25de057d4266e7a9ad85862168c3f408f38b9563e3ef7ec6ded376a,2025-02-13T14:16:21.450000
CVE-2025-26552,1,1,8b7ec2369e4b0d92ec83bba01cf2fbfb75c6453ef7cb949f856810a061cc31f5,2025-02-13T14:16:21.787000
CVE-2025-26558,1,1,efb5f704c336f3bcfd0d4d5ddc23ef57815fe3581c8f780dfc299ec13d06ee4f,2025-02-13T14:16:22.130000
CVE-2025-26561,1,1,fa5fcfc1b5af387d2ba8d298e09268fe2f60a955e0f2a3d62ec520035eeddefb,2025-02-13T14:16:22.450000
CVE-2025-26562,1,1,37af47f6874a6ee725f87bd58d1efb60fdaceff3bf562bc1f6f0cb5fdd5a4af0,2025-02-13T14:16:22.607000
CVE-2025-26567,1,1,ad7353cdfa1615256245880358dfd51f302bf6cfa87401a28368c4850c9a5ab3,2025-02-13T14:16:22.763000
CVE-2025-26568,1,1,396b9e537988f1e8ccb15cd4c2387cb39dc59312282cc0daae1e64b2f4b2c915,2025-02-13T14:16:22.910000
CVE-2025-26569,1,1,b9d6e8fd04d3efb22666efdf216ef1ba6d52f11fde384e4b05ebc0501e2efb5b,2025-02-13T14:16:23.070000
CVE-2025-26570,1,1,6d0c7fab6c543070ec379f24d33a7fed4cbf7dbb9af7209df28b890fa0e09c89,2025-02-13T14:16:23.223000
CVE-2025-26571,1,1,a9e05e769efc9ed5cc1337a3f80b138ce504de11ef88d35e4441956c5f36d51d,2025-02-13T14:16:23.360000
CVE-2025-26572,1,1,920a554f5bc2f7d587796ed0f8965fb97e1d50be8ae5583dafe7d4258ecfd010,2025-02-13T14:16:23.507000
CVE-2025-26574,1,1,04b267df093c1e4aa7dbd35454f1702610f59fd7182a705455dea6367852d58b,2025-02-13T14:16:23.653000
CVE-2025-26577,1,1,cc2f8c1ac7aa0d1b35a1f7b5d360e0b2d07e13834785542e837aebe416cbfae1,2025-02-13T14:16:23.797000
CVE-2025-26578,1,1,cd72ae9257326f25b0cb5e50eefc8b87bc4caefa625d6784329a0c22f9290202,2025-02-13T14:16:23.990000
CVE-2025-26580,1,1,916e7b90eb27b1f7f000689c1c2c0d448ca25a3cef16eef15cec717bb455efdc,2025-02-13T14:16:24.250000
CVE-2025-26582,1,1,6e8fe3f3ea1ebd2d8730cc1aef1506305d1a9b31eb701ca7bcc9103287dcd909,2025-02-13T14:16:24.407000

Can't render this file because it is too large.