Auto-Update: 2025-03-28T09:00:20.020052+00:00

This commit is contained in:
cad-safe-bot 2025-03-28 09:03:55 +00:00
parent 95288bc59b
commit 8b0cc44e42
11 changed files with 350 additions and 70 deletions

View File

@ -2,24 +2,15 @@
"id": "CVE-2023-53027", "id": "CVE-2023-53027",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-03-27T17:15:52.387", "published": "2025-03-27T17:15:52.387",
"lastModified": "2025-03-27T17:15:52.387", "lastModified": "2025-03-28T07:15:37.860",
"vulnStatus": "Received", "vulnStatus": "Rejected",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: fix kvcalloc() misuse with __GFP_NOFAIL\n\nAs reported by syzbot [1], kvcalloc() cannot work with __GFP_NOFAIL.\nLet's use kcalloc() instead.\n\n[1] https://lore.kernel.org/r/0000000000007796bd05f1852ec2@google.com" "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
} }
], ],
"metrics": {}, "metrics": {},
"references": [ "references": []
{
"url": "https://git.kernel.org/stable/c/12724ba38992bd045e92a9a88a868a530f89d13e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7b28a8920844042ca9f44934d8f15d210ef42c75",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21865", "id": "CVE-2024-21865",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-25T05:15:50.863", "published": "2024-03-25T05:15:50.863",
"lastModified": "2024-11-21T08:55:08.667", "lastModified": "2025-03-28T08:15:13.337",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -40,9 +40,19 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1391"
}
]
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -57,7 +67,7 @@
"source": "vultures@jpcert.or.jp" "source": "vultures@jpcert.or.jp"
}, },
{ {
"url": "https://www.au.com/support/service/internet/guide/modem/bl1500hm/firmware/", "url": "https://kddi-tech.com/contents/appendix_L2_06.html#20304f4c-af1b-49fd-c3b5-8d1f55fd8b4f",
"source": "vultures@jpcert.or.jp" "source": "vultures@jpcert.or.jp"
}, },
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28041", "id": "CVE-2024-28041",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-25T04:15:08.880", "published": "2024-03-25T04:15:08.880",
"lastModified": "2024-11-21T09:05:41.223", "lastModified": "2025-03-28T08:15:14.160",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -57,7 +57,7 @@
"source": "vultures@jpcert.or.jp" "source": "vultures@jpcert.or.jp"
}, },
{ {
"url": "https://www.au.com/support/service/internet/guide/modem/bl1500hm/firmware/", "url": "https://kddi-tech.com/contents/appendix_L2_06.html#20304f4c-af1b-49fd-c3b5-8d1f55fd8b4f",
"source": "vultures@jpcert.or.jp" "source": "vultures@jpcert.or.jp"
}, },
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29071", "id": "CVE-2024-29071",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-25T04:15:09.017", "published": "2024-03-25T04:15:09.017",
"lastModified": "2024-11-21T09:07:29.693", "lastModified": "2025-03-28T08:15:14.327",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -40,9 +40,19 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1391"
}
]
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -57,7 +67,7 @@
"source": "vultures@jpcert.or.jp" "source": "vultures@jpcert.or.jp"
}, },
{ {
"url": "https://www.au.com/support/service/internet/guide/modem/bl1500hm/firmware/", "url": "https://kddi-tech.com/contents/appendix_L2_06.html#20304f4c-af1b-49fd-c3b5-8d1f55fd8b4f",
"source": "vultures@jpcert.or.jp" "source": "vultures@jpcert.or.jp"
}, },
{ {

View File

@ -2,36 +2,15 @@
"id": "CVE-2024-57894", "id": "CVE-2024-57894",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-15T13:15:13.943", "published": "2025-01-15T13:15:13.943",
"lastModified": "2025-01-15T13:15:13.943", "lastModified": "2025-03-28T07:15:38.510",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Rejected",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: Fix sleeping function called from invalid context\n\nThis reworks hci_cb_list to not use mutex hci_cb_list_lock to avoid bugs\nlike the bellow:\n\nBUG: sleeping function called from invalid context at kernel/locking/mutex.c:585\nin_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 5070, name: kworker/u9:2\npreempt_count: 0, expected: 0\nRCU nest depth: 1, expected: 0\n4 locks held by kworker/u9:2/5070:\n #0: ffff888015be3948 ((wq_completion)hci0#2){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3229 [inline]\n #0: ffff888015be3948 ((wq_completion)hci0#2){+.+.}-{0:0}, at: process_scheduled_works+0x8e0/0x1770 kernel/workqueue.c:3335\n #1: ffffc90003b6fd00 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3230 [inline]\n #1: ffffc90003b6fd00 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0x91b/0x1770 kernel/workqueue.c:3335\n #2: ffff8880665d0078 (&hdev->lock){+.+.}-{3:3}, at: hci_le_create_big_complete_evt+0xcf/0xae0 net/bluetooth/hci_event.c:6914\n #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]\n #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]\n #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: hci_le_create_big_complete_evt+0xdb/0xae0 net/bluetooth/hci_event.c:6915\nCPU: 0 PID: 5070 Comm: kworker/u9:2 Not tainted 6.8.0-syzkaller-08073-g480e035fc4c7 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nWorkqueue: hci0 hci_rx_work\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n __might_resched+0x5d4/0x780 kernel/sched/core.c:10187\n __mutex_lock_common kernel/locking/mutex.c:585 [inline]\n __mutex_lock+0xc1/0xd70 kernel/locking/mutex.c:752\n hci_connect_cfm include/net/bluetooth/hci_core.h:2004 [inline]\n hci_le_create_big_complete_evt+0x3d9/0xae0 net/bluetooth/hci_event.c:6939\n hci_event_func net/bluetooth/hci_event.c:7514 [inline]\n hci_event_packet+0xa53/0x1540 net/bluetooth/hci_event.c:7569\n hci_rx_work+0x3e8/0xca0 net/bluetooth/hci_core.c:4171\n process_one_work kernel/workqueue.c:3254 [inline]\n process_scheduled_works+0xa00/0x1770 kernel/workqueue.c:3335\n worker_thread+0x86d/0xd70 kernel/workqueue.c:3416\n kthread+0x2f0/0x390 kernel/kthread.c:388\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243\n </TASK>" "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: hci_core: Se corrige la funci\u00f3n inactiva llamada desde un contexto no v\u00e1lido. Esto modifica hci_cb_list para que no use mutex hci_cb_list_lock para evitar errores como el siguiente: ERROR: funci\u00f3n inactiva llamada desde un contexto no v\u00e1lido en kernel/locking/mutex.c:585 in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 5070, name: kworker/u9:2 preempt_count: 0, expected: 0 RCU nest depth: 1, expected: 0 4 locks held by kworker/u9:2/5070: #0: ffff888015be3948 ((wq_completion)hci0#2){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3229 [inline] #0: ffff888015be3948 ((wq_completion)hci0#2){+.+.}-{0:0}, at: process_scheduled_works+0x8e0/0x1770 kernel/workqueue.c:3335 #1: ffffc90003b6fd00 ((work_completion)(&amp;hdev-&gt;rx_work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3230 [inline] #1: ffffc90003b6fd00 ((work_completion)(&amp;hdev-&gt;rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0x91b/0x1770 kernel/workqueue.c:3335 #2: ffff8880665d0078 (&amp;hdev-&gt;lock){+.+.}-{3:3}, at: hci_le_create_big_complete_evt+0xcf/0xae0 net/bluetooth/hci_event.c:6914 #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline] #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline] #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: hci_le_create_big_complete_evt+0xdb/0xae0 net/bluetooth/hci_event.c:6915 CPU: 0 PID: 5070 Comm: kworker/u9:2 Not tainted 6.8.0-syzkaller-08073-g480e035fc4c7 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Workqueue: hci0 hci_rx_work Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114 __might_resched+0x5d4/0x780 kernel/sched/core.c:10187 __mutex_lock_common kernel/locking/mutex.c:585 [inline] __mutex_lock+0xc1/0xd70 kernel/locking/mutex.c:752 hci_connect_cfm include/net/bluetooth/hci_core.h:2004 [inline] hci_le_create_big_complete_evt+0x3d9/0xae0 net/bluetooth/hci_event.c:6939 hci_event_func net/bluetooth/hci_event.c:7514 [inline] hci_event_packet+0xa53/0x1540 net/bluetooth/hci_event.c:7569 hci_rx_work+0x3e8/0xca0 net/bluetooth/hci_core.c:4171 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0xa00/0x1770 kernel/workqueue.c:3335 worker_thread+0x86d/0xd70 kernel/workqueue.c:3416 kthread+0x2f0/0x390 kernel/kthread.c:388 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 "
} }
], ],
"metrics": {}, "metrics": {},
"references": [ "references": []
{
"url": "https://git.kernel.org/stable/c/028a68886ead0764f4b26adfcaebf9f1955e76ea",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4a31c018bfe4de84c0741aadd2c913a2490b186d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4d94f05558271654670d18c26c912da0c1c15549",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bef333418368c58690b501894324c09124e4614f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
} }

View File

@ -0,0 +1,84 @@
{
"id": "CVE-2025-2074",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-28T08:15:15.430",
"lastModified": "2025-03-28T08:15:15.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Advanced Google reCAPTCHA plugin for WordPress is vulnerable to generic SQL Injection via the \u2018sSearch\u2019 parameter in all versions up to, and including, 1.29 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries, particularly when the plugin\u2019s settings page hasn\u2019t been visited and its welcome message has not been dismissed. This issue can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/advanced-google-recaptcha/trunk/libs/admin.php?rev=3248228#L106",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/advanced-google-recaptcha/trunk/libs/ajax.php?rev=3248228#L20",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/advanced-google-recaptcha/trunk/libs/ajax.php?rev=3248228#L277",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/advanced-google-recaptcha/trunk/libs/ajax.php?rev=3248228#L401",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/advanced-google-recaptcha/trunk/libs/setup.php?rev=3248228#L636",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3262396/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/advanced-google-recaptcha/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/963a9b30-9194-4abc-aa69-eb333cbddef3?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-2328",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-28T07:15:39.243",
"lastModified": "2025-03-28T07:15:39.243",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'dnd_remove_uploaded_files' function in all versions up to, and including, 1.3.8.7. This makes it possible for unauthenticated attackers to add arbitrary file paths (such as ../../../../wp-config.php) to uploaded files on the server, which can easily lead to remote code execution when an Administrator deletes the message. Exploiting this vulnerability requires the Flamingo plugin to be installed and activated."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/trunk/inc/dnd-upload-cf7.php#L153",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3261964/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f6cca7a-b8ff-4ca5-b813-e611eac07695?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-2485",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-28T07:15:39.450",
"lastModified": "2025-03-28T07:15:39.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.8.7 via deserialization of untrusted input from the 'dnd_upload_cf7_upload'\r\n function. This makes it possible for attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. This vulnerability may be exploited by unauthenticated attackers when a form is present on the site with the file upload action. The Flamingo plugin must be installed and activated in order to exploit the vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/trunk/inc/dnd-upload-cf7.php#L25",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/trunk/inc/dnd-upload-cf7.php#L844",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3261964/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/79ffe548-0005-4f5e-873f-a1afec64a251?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-2578",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-28T08:15:15.603",
"lastModified": "2025-03-28T08:15:15.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Booking for Appointments and Events Calendar &#8211; Amelia plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.2.19 via the 'wpAmeliaApiCall' function. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ameliabooking/trunk/ameliabooking.php#L172",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ameliabooking/trunk/src/Application/Commands/Entities/GetEntitiesCommandHandler.php#L127",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3261318/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6806e07b-96bf-43ad-a3ac-2105e7449e3c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-03-28T07:00:20.162918+00:00 2025-03-28T09:00:20.020052+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-03-28T06:15:34.723000+00:00 2025-03-28T08:15:15.603000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,26 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
287153 287157
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `5` Recently added CVEs: `4`
- [CVE-2025-1762](CVE-2025/CVE-2025-17xx/CVE-2025-1762.json) (`2025-03-28T06:15:32.770`) - [CVE-2025-2074](CVE-2025/CVE-2025-20xx/CVE-2025-2074.json) (`2025-03-28T08:15:15.430`)
- [CVE-2025-2027](CVE-2025/CVE-2025-20xx/CVE-2025-2027.json) (`2025-03-28T06:15:33.403`) - [CVE-2025-2328](CVE-2025/CVE-2025-23xx/CVE-2025-2328.json) (`2025-03-28T07:15:39.243`)
- [CVE-2025-2294](CVE-2025/CVE-2025-22xx/CVE-2025-2294.json) (`2025-03-28T05:15:41.507`) - [CVE-2025-2485](CVE-2025/CVE-2025-24xx/CVE-2025-2485.json) (`2025-03-28T07:15:39.450`)
- [CVE-2025-2804](CVE-2025/CVE-2025-28xx/CVE-2025-2804.json) (`2025-03-28T06:15:34.157`) - [CVE-2025-2578](CVE-2025/CVE-2025-25xx/CVE-2025-2578.json) (`2025-03-28T08:15:15.603`)
- [CVE-2025-31335](CVE-2025/CVE-2025-313xx/CVE-2025-31335.json) (`2025-03-28T06:15:34.723`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `2` Recently modified CVEs: `5`
- [CVE-2022-4064](CVE-2022/CVE-2022-40xx/CVE-2022-4064.json) (`2025-03-28T06:15:27.053`) - [CVE-2023-53027](CVE-2023/CVE-2023-530xx/CVE-2023-53027.json) (`2025-03-28T07:15:37.860`)
- [CVE-2024-4367](CVE-2024/CVE-2024-43xx/CVE-2024-4367.json) (`2025-03-28T05:15:40.777`) - [CVE-2024-21865](CVE-2024/CVE-2024-218xx/CVE-2024-21865.json) (`2025-03-28T08:15:13.337`)
- [CVE-2024-28041](CVE-2024/CVE-2024-280xx/CVE-2024-28041.json) (`2025-03-28T08:15:14.160`)
- [CVE-2024-29071](CVE-2024/CVE-2024-290xx/CVE-2024-29071.json) (`2025-03-28T08:15:14.327`)
- [CVE-2024-57894](CVE-2024/CVE-2024-578xx/CVE-2024-57894.json) (`2025-03-28T07:15:38.510`)
## Download and Usage ## Download and Usage

View File

@ -206927,7 +206927,7 @@ CVE-2022-40636,0,0,669a0366b9b0cf27d6e87ea4373e444b8994970975e188a2d8e62d9fd5b1c
CVE-2022-40637,0,0,57239816cf6ce40ee0806745565807c3a4132b0e4b98efa9246ada6b65c48049,2024-11-21T07:21:45.623000 CVE-2022-40637,0,0,57239816cf6ce40ee0806745565807c3a4132b0e4b98efa9246ada6b65c48049,2024-11-21T07:21:45.623000
CVE-2022-40638,0,0,f443d2dc163d484737c2ac08a3067b1e859249f31d20b3b124ff4090e233c601,2024-11-21T07:21:45.740000 CVE-2022-40638,0,0,f443d2dc163d484737c2ac08a3067b1e859249f31d20b3b124ff4090e233c601,2024-11-21T07:21:45.740000
CVE-2022-40639,0,0,0beec25c92ab93784240fadbca1b20786e25001a9ab576b7e1cc32819a9185c3,2024-11-21T07:21:45.860000 CVE-2022-40639,0,0,0beec25c92ab93784240fadbca1b20786e25001a9ab576b7e1cc32819a9185c3,2024-11-21T07:21:45.860000
CVE-2022-4064,0,1,639d83cebd0777a3f314b061e6bf218424efdba9b1c7703ff40b52b129148ac9,2025-03-28T06:15:27.053000 CVE-2022-4064,0,0,639d83cebd0777a3f314b061e6bf218424efdba9b1c7703ff40b52b129148ac9,2025-03-28T06:15:27.053000
CVE-2022-40640,0,0,5fe05dfcb86b979ffc8937be948f34891adf6488726e644a747cb523f8e78e4c,2024-11-21T07:21:45.980000 CVE-2022-40640,0,0,5fe05dfcb86b979ffc8937be948f34891adf6488726e644a747cb523f8e78e4c,2024-11-21T07:21:45.980000
CVE-2022-40641,0,0,cbe9effc427a54f53fe6f19360cbab8a68bc398421c091e80fe8a0d1ecd93346,2024-11-21T07:21:46.110000 CVE-2022-40641,0,0,cbe9effc427a54f53fe6f19360cbab8a68bc398421c091e80fe8a0d1ecd93346,2024-11-21T07:21:46.110000
CVE-2022-40642,0,0,98f6de3eb346184f68e613a92505d38494020d493791089d357c4a8d3e287515,2024-11-21T07:21:46.233000 CVE-2022-40642,0,0,98f6de3eb346184f68e613a92505d38494020d493791089d357c4a8d3e287515,2024-11-21T07:21:46.233000
@ -241712,7 +241712,7 @@ CVE-2023-53023,0,0,4d59b0667ba596c8042de09725cd074cecf2dd3bd106505fada32725e37e2
CVE-2023-53024,0,0,4e891b11de56a88b0fed04ae5780277e924121dda06bf67cfb28de95bc39f324,2025-03-27T17:15:51.980000 CVE-2023-53024,0,0,4e891b11de56a88b0fed04ae5780277e924121dda06bf67cfb28de95bc39f324,2025-03-27T17:15:51.980000
CVE-2023-53025,0,0,7670798d7f703a63e18ba8a3be8f433ad3d3bfc09b8a4f9f65ac6dea3921d9ab,2025-03-27T18:17:34.243000 CVE-2023-53025,0,0,7670798d7f703a63e18ba8a3be8f433ad3d3bfc09b8a4f9f65ac6dea3921d9ab,2025-03-27T18:17:34.243000
CVE-2023-53026,0,0,b6be25ec293572d60084282218ed0f9a6ac3c620f7008f9ef43a5900812f6d23,2025-03-27T17:15:52.250000 CVE-2023-53026,0,0,b6be25ec293572d60084282218ed0f9a6ac3c620f7008f9ef43a5900812f6d23,2025-03-27T17:15:52.250000
CVE-2023-53027,0,0,51989cb065a72d9455bc6a827579a933b58091c00f54f1d7206bcefb6df19e09,2025-03-27T17:15:52.387000 CVE-2023-53027,0,1,abe52dfb43bbd686e3fe35e91f50766f811247cd5855fb2a0edd84ee7dec5768,2025-03-28T07:15:37.860000
CVE-2023-53028,0,0,5fcd3ec87fa2674114cc5925b046fcfde50e33617feedea07a880f1b7cc83302,2025-03-27T17:15:52.507000 CVE-2023-53028,0,0,5fcd3ec87fa2674114cc5925b046fcfde50e33617feedea07a880f1b7cc83302,2025-03-27T17:15:52.507000
CVE-2023-53029,0,0,01c480a58c32253b7c7fa3113e6aa854d378ce7591aad7b61903d69c4bae8cb1,2025-03-27T17:15:52.627000 CVE-2023-53029,0,0,01c480a58c32253b7c7fa3113e6aa854d378ce7591aad7b61903d69c4bae8cb1,2025-03-27T17:15:52.627000
CVE-2023-5303,0,0,1fd7805db54c4356f03291c90e402ea807b85aec18298fa337830f7108304fe4,2024-11-21T08:41:29.423000 CVE-2023-5303,0,0,1fd7805db54c4356f03291c90e402ea807b85aec18298fa337830f7108304fe4,2024-11-21T08:41:29.423000
@ -250594,7 +250594,7 @@ CVE-2024-21861,0,0,3a7f9befc113ffb23875efbe3d70cf01c22adb8b0631739aca4be1bb65b60
CVE-2024-21862,0,0,d1a916702185a96c58d5a48bea3eb8288c4be744e585ef9068b323222010f8e8,2025-01-28T17:38:46.637000 CVE-2024-21862,0,0,d1a916702185a96c58d5a48bea3eb8288c4be744e585ef9068b323222010f8e8,2025-01-28T17:38:46.637000
CVE-2024-21863,0,0,55f366380fbe866d6e020d9802a7829de46bf002961a873cc4fea65ba7605dda,2024-11-21T08:55:08.337000 CVE-2024-21863,0,0,55f366380fbe866d6e020d9802a7829de46bf002961a873cc4fea65ba7605dda,2024-11-21T08:55:08.337000
CVE-2024-21864,0,0,1ad6c5ce84b48a780ceb370fb663156ccd2e7fcace23a3692a69ffb642270962,2024-11-21T08:55:08.513000 CVE-2024-21864,0,0,1ad6c5ce84b48a780ceb370fb663156ccd2e7fcace23a3692a69ffb642270962,2024-11-21T08:55:08.513000
CVE-2024-21865,0,0,583fd7dd0aa12097e737a2985a06d8c2e10647eb7bd05007cef306e8670a0ed2,2024-11-21T08:55:08.667000 CVE-2024-21865,0,1,f727402985b7b39f06de892d124eb04c9b25ba8f2a21ca4a6fc3efd5c7470078,2025-03-28T08:15:13.337000
CVE-2024-21866,0,0,877a22cac4a3ed4e6886e06de6323d143f73ef29c73f7754337e7d90afe1e6da,2024-11-21T08:55:08.893000 CVE-2024-21866,0,0,877a22cac4a3ed4e6886e06de6323d143f73ef29c73f7754337e7d90afe1e6da,2024-11-21T08:55:08.893000
CVE-2024-21869,0,0,e37c8a4889f9eaef99aadb2f6512dc2821c59f5e354397dfc83a1050590fa73d,2024-11-21T08:55:09.050000 CVE-2024-21869,0,0,e37c8a4889f9eaef99aadb2f6512dc2821c59f5e354397dfc83a1050590fa73d,2024-11-21T08:55:09.050000
CVE-2024-2187,0,0,1103ee7372c5ea9ac3f366f5b222f200117c18c2fbd61f44534e2c7446ae9f16,2025-01-09T17:06:43.647000 CVE-2024-2187,0,0,1103ee7372c5ea9ac3f366f5b222f200117c18c2fbd61f44534e2c7446ae9f16,2025-01-09T17:06:43.647000
@ -255317,7 +255317,7 @@ CVE-2024-28038,0,0,8768cefba90398b448778b075f725a3899e2632ffe57311f83a39e788009a
CVE-2024-28039,0,0,912e2fff1df4bd0ef022958ba166bcf68f36535a86ebbb68adc8c1f474705819,2024-11-21T09:05:40.897000 CVE-2024-28039,0,0,912e2fff1df4bd0ef022958ba166bcf68f36535a86ebbb68adc8c1f474705819,2024-11-21T09:05:40.897000
CVE-2024-2804,0,0,57915a109e591d8c90c9b05656438fd856c82a6c13765732a75b491bd53d1ec8,2024-11-21T09:10:33.680000 CVE-2024-2804,0,0,57915a109e591d8c90c9b05656438fd856c82a6c13765732a75b491bd53d1ec8,2024-11-21T09:10:33.680000
CVE-2024-28040,0,0,b1cff596a39896c27ba0d07b453ff37627f01f1b0fbc09479e1315b02c0495ed,2024-11-21T09:05:41.093000 CVE-2024-28040,0,0,b1cff596a39896c27ba0d07b453ff37627f01f1b0fbc09479e1315b02c0495ed,2024-11-21T09:05:41.093000
CVE-2024-28041,0,0,17d7a4245d3ae77ae3c3fb94a5842d9ae1f23e4d3ad1f26e3b490cfbd4226398,2024-11-21T09:05:41.223000 CVE-2024-28041,0,1,957993c2ab877e6021c77a287df6888da641261051792bcc93aab9978bcb5845,2025-03-28T08:15:14.160000
CVE-2024-28042,0,0,cc35caa1934027be4460152d18b50598c65de29291faae1c5c8bb4476e6396db,2024-11-21T09:05:41.433000 CVE-2024-28042,0,0,cc35caa1934027be4460152d18b50598c65de29291faae1c5c8bb4476e6396db,2024-11-21T09:05:41.433000
CVE-2024-28044,0,0,4321e66e9abad9bc2815f064d2409efc5b717b87741f240009dbca664117840a,2024-09-04T17:12:54.973000 CVE-2024-28044,0,0,4321e66e9abad9bc2815f064d2409efc5b717b87741f240009dbca664117840a,2024-09-04T17:12:54.973000
CVE-2024-28045,0,0,3250b5241cb3eb30591229d8a728ec2919682fc73063bc0b93558e23a7537d7d,2024-11-21T09:05:41.680000 CVE-2024-28045,0,0,3250b5241cb3eb30591229d8a728ec2919682fc73063bc0b93558e23a7537d7d,2024-11-21T09:05:41.680000
@ -256029,7 +256029,7 @@ CVE-2024-29068,0,0,4ca16ab4f3100ce464ed61ba1b4d96efe5791a7c4dabbd87db88d42639a78
CVE-2024-29069,0,0,4e2e8f90811126be2345b98ed47ab42149083ecf4f708fcaf6870de0665ab7a3,2024-11-21T09:07:29.377000 CVE-2024-29069,0,0,4e2e8f90811126be2345b98ed47ab42149083ecf4f708fcaf6870de0665ab7a3,2024-11-21T09:07:29.377000
CVE-2024-2907,0,0,afcf7b0dd1ad120eb5edd4bb53db0ef2b60221906dcb3f6ebc628e09a063a180,2024-11-21T09:10:48.460000 CVE-2024-2907,0,0,afcf7b0dd1ad120eb5edd4bb53db0ef2b60221906dcb3f6ebc628e09a063a180,2024-11-21T09:10:48.460000
CVE-2024-29070,0,0,21ffac6570edd10ecd5fff3a43896c471f489fa590118d73cfc78a627475d09a,2024-11-21T09:07:29.507000 CVE-2024-29070,0,0,21ffac6570edd10ecd5fff3a43896c471f489fa590118d73cfc78a627475d09a,2024-11-21T09:07:29.507000
CVE-2024-29071,0,0,372c1c08eb5f1afdaa85b2ef8f1cb678c9eee2b9ac1ab8bac2f503acd32a6021,2024-11-21T09:07:29.693000 CVE-2024-29071,0,1,3ef49d390c6f5168aa83a3911e374700797ea322a3d27cf3485d832744bd5b0c,2025-03-28T08:15:14.327000
CVE-2024-29072,0,0,57f80ce7c236f332a7f5c114423b69d762766a5c42687b949a1667cb5c018eb1,2024-11-21T09:07:29.887000 CVE-2024-29072,0,0,57f80ce7c236f332a7f5c114423b69d762766a5c42687b949a1667cb5c018eb1,2024-11-21T09:07:29.887000
CVE-2024-29073,0,0,a97c1130a7ff47c79178263365495d696944009337b55c711a86468fd2e28d23,2024-11-21T09:07:30.007000 CVE-2024-29073,0,0,a97c1130a7ff47c79178263365495d696944009337b55c711a86468fd2e28d23,2024-11-21T09:07:30.007000
CVE-2024-29074,0,0,37fef7b70252074605b40dcd9b7a5a1b496283b8ab455c06a52e22d00ddd7f49,2025-01-02T19:12:32.683000 CVE-2024-29074,0,0,37fef7b70252074605b40dcd9b7a5a1b496283b8ab455c06a52e22d00ddd7f49,2025-01-02T19:12:32.683000
@ -267287,7 +267287,7 @@ CVE-2024-43660,0,0,1dc83515bc7eda08ad1a0a1026113c7a5161779ef9edfb934d9d2a4d61e1d
CVE-2024-43661,0,0,015abc64d6786f1b30b1a3ea941a97b1b0d755773998b3250abd38042855c09b,2025-01-09T15:15:17.937000 CVE-2024-43661,0,0,015abc64d6786f1b30b1a3ea941a97b1b0d755773998b3250abd38042855c09b,2025-01-09T15:15:17.937000
CVE-2024-43662,0,0,ebccc73d7680304a85104a6931a9045211211ac6a1d4b040f75195362d8ecad2,2025-01-09T08:15:29.637000 CVE-2024-43662,0,0,ebccc73d7680304a85104a6931a9045211211ac6a1d4b040f75195362d8ecad2,2025-01-09T08:15:29.637000
CVE-2024-43663,0,0,241a1ff57536167d594b47ac2b685efe574676f29c6fadd622deb3b336920af7,2025-01-09T15:15:18.173000 CVE-2024-43663,0,0,241a1ff57536167d594b47ac2b685efe574676f29c6fadd622deb3b336920af7,2025-01-09T15:15:18.173000
CVE-2024-4367,0,1,c9aa813b56159479445d505ad3001931e1b0824b5b5f9a0fe1b3dc1debe5c746,2025-03-28T05:15:40.777000 CVE-2024-4367,0,0,c9aa813b56159479445d505ad3001931e1b0824b5b5f9a0fe1b3dc1debe5c746,2025-03-28T05:15:40.777000
CVE-2024-4368,0,0,817a09abda4a6c1dc6203fe5e1d271562b21e0a1a41cffdadd0bcc130bb5c2c5,2025-03-13T20:15:23.683000 CVE-2024-4368,0,0,817a09abda4a6c1dc6203fe5e1d271562b21e0a1a41cffdadd0bcc130bb5c2c5,2025-03-13T20:15:23.683000
CVE-2024-43683,0,0,eaf87ecdd1484317d24eb3ad1010b7b5e6e4b47e9a68a80d2a141aa188b02f2a,2024-11-01T16:15:08.930000 CVE-2024-43683,0,0,eaf87ecdd1484317d24eb3ad1010b7b5e6e4b47e9a68a80d2a141aa188b02f2a,2024-11-01T16:15:08.930000
CVE-2024-43684,0,0,dd623d71d4067816a2c5038539e7602036563822931327d0a0d346837c8c2fc2,2024-11-01T17:15:17.127000 CVE-2024-43684,0,0,dd623d71d4067816a2c5038539e7602036563822931327d0a0d346837c8c2fc2,2024-11-01T17:15:17.127000
@ -276964,7 +276964,7 @@ CVE-2024-57890,0,0,876228291e28ce2dbcf91efd1283214e54d4069730fa474ebc3b3b0d9a534
CVE-2024-57891,0,0,cd33e3a4e8d37a5f36fd34bd5a361c07ff62e7972f171735ba5dd223fe03e6f1,2025-01-15T13:15:13.590000 CVE-2024-57891,0,0,cd33e3a4e8d37a5f36fd34bd5a361c07ff62e7972f171735ba5dd223fe03e6f1,2025-01-15T13:15:13.590000
CVE-2024-57892,0,0,14736616310e4e8ee489220b3fa985deb190abfc580a60b1a99e9cb0181d3dfe,2025-02-13T14:16:17.800000 CVE-2024-57892,0,0,14736616310e4e8ee489220b3fa985deb190abfc580a60b1a99e9cb0181d3dfe,2025-02-13T14:16:17.800000
CVE-2024-57893,0,0,de1df3ef6db19acaf3c7c48dd5c62fb10118eacffbfad185b7dbbf80a82129c6,2025-01-15T13:15:13.820000 CVE-2024-57893,0,0,de1df3ef6db19acaf3c7c48dd5c62fb10118eacffbfad185b7dbbf80a82129c6,2025-01-15T13:15:13.820000
CVE-2024-57894,0,0,d7d6f6140de35b010b1b5beb6457a2e35be159e74f947f8b4b5cce28e627637c,2025-01-15T13:15:13.943000 CVE-2024-57894,0,1,024b8193ba03ea5fa8d1c61a7de60c721e41ed0015e59fea3e48a68d54e30550,2025-03-28T07:15:38.510000
CVE-2024-57895,0,0,9ad2e608235ea6296b191cd61921ed3a449403f186ff27dacefb37686d68c65d,2025-01-21T17:47:20.323000 CVE-2024-57895,0,0,9ad2e608235ea6296b191cd61921ed3a449403f186ff27dacefb37686d68c65d,2025-01-21T17:47:20.323000
CVE-2024-57896,0,0,b4cf92b31099574638c678d1da9fe631de93ee5f7ca16ae4933efbe750b33d2f,2025-02-11T16:15:49.050000 CVE-2024-57896,0,0,b4cf92b31099574638c678d1da9fe631de93ee5f7ca16ae4933efbe750b33d2f,2025-02-11T16:15:49.050000
CVE-2024-57897,0,0,3d8c470fae69b589d24f1b293420d7a6a2c10fa45e69bbcc2f2a6813cfb371e3,2025-01-15T13:15:14.317000 CVE-2024-57897,0,0,3d8c470fae69b589d24f1b293420d7a6a2c10fa45e69bbcc2f2a6813cfb371e3,2025-01-15T13:15:14.317000
@ -282145,7 +282145,7 @@ CVE-2025-1755,0,0,09476b6d542bfcc927e067fe8e3ce0d3ca1fbe0a9d5ffac658df7f448d43f3
CVE-2025-1756,0,0,787bba2bf34abbaae222d1a9edb902cd4b5b03484def1773bc6176dae0327cd2,2025-02-27T16:15:39.287000 CVE-2025-1756,0,0,787bba2bf34abbaae222d1a9edb902cd4b5b03484def1773bc6176dae0327cd2,2025-02-27T16:15:39.287000
CVE-2025-1757,0,0,c25e39602a825b6394df945ad4b24df4019eaaa8085cc7f11e82831fb6895cb4,2025-03-10T16:48:47.823000 CVE-2025-1757,0,0,c25e39602a825b6394df945ad4b24df4019eaaa8085cc7f11e82831fb6895cb4,2025-03-10T16:48:47.823000
CVE-2025-1758,0,0,0373ea84effa2e885cc20b107f682d5ddfeea043aa22d13e9c170486f7fa1885,2025-03-19T16:15:30.527000 CVE-2025-1758,0,0,0373ea84effa2e885cc20b107f682d5ddfeea043aa22d13e9c170486f7fa1885,2025-03-19T16:15:30.527000
CVE-2025-1762,1,1,ce5f230370b79f7bc53052e2ff511d886eca4bd8b9760a3e1a224e01388ab45e,2025-03-28T06:15:32.770000 CVE-2025-1762,0,0,ce5f230370b79f7bc53052e2ff511d886eca4bd8b9760a3e1a224e01388ab45e,2025-03-28T06:15:32.770000
CVE-2025-1764,0,0,13706f4025eae225fc3793a7e7a1fa321df281c8253d66f7993d98f6aa09100c,2025-03-14T06:15:24.860000 CVE-2025-1764,0,0,13706f4025eae225fc3793a7e7a1fa321df281c8253d66f7993d98f6aa09100c,2025-03-14T06:15:24.860000
CVE-2025-1766,0,0,598707d3f8b19c5a3ff0b336e9bc39a76f8ffb8a9d939d0b001d5b5f979e7c65,2025-03-20T06:15:22.740000 CVE-2025-1766,0,0,598707d3f8b19c5a3ff0b336e9bc39a76f8ffb8a9d939d0b001d5b5f979e7c65,2025-03-20T06:15:22.740000
CVE-2025-1767,0,0,db4a25182003b3801d09638d93655c86fe8651aa60672fd3a6309c07b55e200e,2025-03-13T21:15:43.127000 CVE-2025-1767,0,0,db4a25182003b3801d09638d93655c86fe8651aa60672fd3a6309c07b55e200e,2025-03-13T21:15:43.127000
@ -282417,7 +282417,7 @@ CVE-2025-20232,0,0,0d5d053026f8c32cba542b805870a42fc42882344ea0c79ae85ae165075eb
CVE-2025-20233,0,0,827e4cb515e7d3bbb9223a377b0054261580f1cd7e2f972f151a15685ae6593c,2025-03-27T16:45:27.850000 CVE-2025-20233,0,0,827e4cb515e7d3bbb9223a377b0054261580f1cd7e2f972f151a15685ae6593c,2025-03-27T16:45:27.850000
CVE-2025-2024,0,0,1ebba8845ef88303f0909fcf3cb590cfef8154204f03ba1b4e83e42241658ece,2025-03-07T20:15:39.023000 CVE-2025-2024,0,0,1ebba8845ef88303f0909fcf3cb590cfef8154204f03ba1b4e83e42241658ece,2025-03-07T20:15:39.023000
CVE-2025-2025,0,0,8bf05e4c9932aa58da11a2b15541e516431650b70642c5a505f451f40d61fe35,2025-03-25T19:48:15.730000 CVE-2025-2025,0,0,8bf05e4c9932aa58da11a2b15541e516431650b70642c5a505f451f40d61fe35,2025-03-25T19:48:15.730000
CVE-2025-2027,1,1,9c025c7ce03dd1417baef4d7a07a2426f29fa04e7628aec491c0c66705567d36,2025-03-28T06:15:33.403000 CVE-2025-2027,0,0,9c025c7ce03dd1417baef4d7a07a2426f29fa04e7628aec491c0c66705567d36,2025-03-28T06:15:33.403000
CVE-2025-2029,0,0,d542afcc372a129fd7977f37fa3c5e3e2b220f9ceca1025a42b23e0691f5c316,2025-03-06T15:15:17.943000 CVE-2025-2029,0,0,d542afcc372a129fd7977f37fa3c5e3e2b220f9ceca1025a42b23e0691f5c316,2025-03-06T15:15:17.943000
CVE-2025-2030,0,0,0e82bd47c24dfd47a0763661b2667fde4902819acb4b011b12553acdfd131e3f,2025-03-10T07:15:36.400000 CVE-2025-2030,0,0,0e82bd47c24dfd47a0763661b2667fde4902819acb4b011b12553acdfd131e3f,2025-03-10T07:15:36.400000
CVE-2025-2031,0,0,5b762fc7e74e43ed51009a6fc81cd4ad661cf88635712ad2ea503f672c7ad652,2025-03-06T17:15:24.153000 CVE-2025-2031,0,0,5b762fc7e74e43ed51009a6fc81cd4ad661cf88635712ad2ea503f672c7ad652,2025-03-06T17:15:24.153000
@ -282484,6 +282484,7 @@ CVE-2025-20652,0,0,9485bc5abd99cf5824b119c49fe5e9158c152f14429264c67d56a50ce2458
CVE-2025-20653,0,0,50d853eb215922ff4e0114da3bc24d2a38f72d15c38383615dd0616a498c1d6f,2025-03-20T19:15:37.333000 CVE-2025-20653,0,0,50d853eb215922ff4e0114da3bc24d2a38f72d15c38383615dd0616a498c1d6f,2025-03-20T19:15:37.333000
CVE-2025-2066,0,0,91ff735ed7e88e4436bc7b6b6f477b59d5c22b6987e7f0098d0b58198b0d10ea,2025-03-07T05:15:17.293000 CVE-2025-2066,0,0,91ff735ed7e88e4436bc7b6b6f477b59d5c22b6987e7f0098d0b58198b0d10ea,2025-03-07T05:15:17.293000
CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000 CVE-2025-2067,0,0,e336b7e791e3fd3cb322ecbc1c5f69ca2b6e5c18fb1ce058eaa6d863ecf3dcd2,2025-03-07T05:15:17.527000
CVE-2025-2074,1,1,635184731cdb0768caff9b93253bc7cc7b0ae263a8fa04ad42076da9a21fd811,2025-03-28T08:15:15.430000
CVE-2025-2076,0,0,4b17faacef13c37de95a24fc1d0a696f48b3a96cded3d3b37bf400752a7db1ce,2025-03-12T04:15:18.800000 CVE-2025-2076,0,0,4b17faacef13c37de95a24fc1d0a696f48b3a96cded3d3b37bf400752a7db1ce,2025-03-12T04:15:18.800000
CVE-2025-2077,0,0,542014bf1c951910ecf1a12c2d80a016c7b30ee77de8c04037976c31a7e5da5b,2025-03-12T04:15:19 CVE-2025-2077,0,0,542014bf1c951910ecf1a12c2d80a016c7b30ee77de8c04037976c31a7e5da5b,2025-03-12T04:15:19
CVE-2025-2078,0,0,a56b0ea482de0b321a2677b0cdea82d60abcbfe24a12528635911474c7f1e3fe,2025-03-12T04:15:19.210000 CVE-2025-2078,0,0,a56b0ea482de0b321a2677b0cdea82d60abcbfe24a12528635911474c7f1e3fe,2025-03-12T04:15:19.210000
@ -283828,7 +283829,7 @@ CVE-2025-22919,0,0,329e8b26e961cfd3a5f94c152403744377d574dcba7ab4dca039db01cbe65
CVE-2025-22920,0,0,90e7ff21ce793067aa456b5ccb84cf38ff13a7ab9f13a9d4f7138f20eaa66180,2025-02-19T22:15:23.810000 CVE-2025-22920,0,0,90e7ff21ce793067aa456b5ccb84cf38ff13a7ab9f13a9d4f7138f20eaa66180,2025-02-19T22:15:23.810000
CVE-2025-22921,0,0,fc4d8d5f4bc002d31a8eab55216be4cd1b637344934aafdd7df2486b9762015c,2025-02-19T15:15:17.497000 CVE-2025-22921,0,0,fc4d8d5f4bc002d31a8eab55216be4cd1b637344934aafdd7df2486b9762015c,2025-02-19T15:15:17.497000
CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000 CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000
CVE-2025-2294,1,1,1a31d54bf878d84c64d85b33385ea1f5709b41f2552c84c4044d574f003452a3,2025-03-28T05:15:41.507000 CVE-2025-2294,0,0,1a31d54bf878d84c64d85b33385ea1f5709b41f2552c84c4044d574f003452a3,2025-03-28T05:15:41.507000
CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000
CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000
CVE-2025-2295,0,0,5afd41ba1c620aa8b1c09ed9d5c8905d7597b06ca6637c246ba28374bca35eb0,2025-03-14T22:15:11.600000 CVE-2025-2295,0,0,5afd41ba1c620aa8b1c09ed9d5c8905d7597b06ca6637c246ba28374bca35eb0,2025-03-14T22:15:11.600000
@ -283998,6 +283999,7 @@ CVE-2025-23242,0,0,9b20bedcf14352ca9df0a5ecc34f6004c4e1503c511865ff1afa1d3c82eca
CVE-2025-23243,0,0,d341dee54207e76092fa73545c292abf7fbfda4eb6567d84dd5238ba2f02d191,2025-03-11T20:15:16.463000 CVE-2025-23243,0,0,d341dee54207e76092fa73545c292abf7fbfda4eb6567d84dd5238ba2f02d191,2025-03-11T20:15:16.463000
CVE-2025-2325,0,0,13c6f3c24dd300d81977cebacc098db98e57b148c37ef530d50f5e2edd70e656,2025-03-25T20:07:03.383000 CVE-2025-2325,0,0,13c6f3c24dd300d81977cebacc098db98e57b148c37ef530d50f5e2edd70e656,2025-03-25T20:07:03.383000
CVE-2025-2326,0,0,0ec0c28e6b995dc182a44a080592df606d562ca954869d7753960c79a6ff321c,2025-03-24T15:15:16.830000 CVE-2025-2326,0,0,0ec0c28e6b995dc182a44a080592df606d562ca954869d7753960c79a6ff321c,2025-03-24T15:15:16.830000
CVE-2025-2328,1,1,5115e45695da2493c44ae7ef68ec04d1df5e80a99f07c64ce37e8b0405e6e91e,2025-03-28T07:15:39.243000
CVE-2025-2331,0,0,b072726b3afe477229f13ce6fa12da5840fde8f6531f821787ad2abd1eb769a5,2025-03-22T12:15:26.833000 CVE-2025-2331,0,0,b072726b3afe477229f13ce6fa12da5840fde8f6531f821787ad2abd1eb769a5,2025-03-22T12:15:26.833000
CVE-2025-2332,0,0,046a67a9cf7f433a88b7d72805ea1318db1beb7a584083c71cb5548df758625f,2025-03-27T16:45:27.850000 CVE-2025-2332,0,0,046a67a9cf7f433a88b7d72805ea1318db1beb7a584083c71cb5548df758625f,2025-03-27T16:45:27.850000
CVE-2025-2333,0,0,600470717f73ae989a4e33407be9c331e6223c6ec027e4a7c73886df7950cb72,2025-03-15T12:15:12.610000 CVE-2025-2333,0,0,600470717f73ae989a4e33407be9c331e6223c6ec027e4a7c73886df7950cb72,2025-03-15T12:15:12.610000
@ -285159,6 +285161,7 @@ CVE-2025-24843,0,0,fb4d0afee0c2783ca1631e4031059d2c08004431e384816d6d85a2fa124d2
CVE-2025-24845,0,0,b01e6a569b8cc3a4584487bdfb3da2fbed952ffc0174ca89c61a3e20ee1bf86f,2025-02-06T08:15:30.673000 CVE-2025-24845,0,0,b01e6a569b8cc3a4584487bdfb3da2fbed952ffc0174ca89c61a3e20ee1bf86f,2025-02-06T08:15:30.673000
CVE-2025-24846,0,0,395a1c47127c2c7ef37d1800a5094c8ea72456277181e4a623939a06fd6c82a4,2025-03-03T09:15:39.817000 CVE-2025-24846,0,0,395a1c47127c2c7ef37d1800a5094c8ea72456277181e4a623939a06fd6c82a4,2025-03-03T09:15:39.817000
CVE-2025-24849,0,0,8e5985d51102085b2b29506fc161cb28ee1a0b2a33328ea438367fccd6fa114a,2025-02-28T17:15:17.253000 CVE-2025-24849,0,0,8e5985d51102085b2b29506fc161cb28ee1a0b2a33328ea438367fccd6fa114a,2025-02-28T17:15:17.253000
CVE-2025-2485,1,1,ce8777b4de39fbe982a57affd8c2f051aabb31fceb6a5bf99f1c6ca14ea719aa,2025-03-28T07:15:39.450000
CVE-2025-24855,0,0,3b83ed2e42d12574419e7a5d93b58d3d4fa5393073d22ec518ba075ff8bdfcf5,2025-03-14T02:15:15.717000 CVE-2025-24855,0,0,3b83ed2e42d12574419e7a5d93b58d3d4fa5393073d22ec518ba075ff8bdfcf5,2025-03-14T02:15:15.717000
CVE-2025-24856,0,0,de81d5fa3871c8fea36d9f92d65c776b1ac74e3aaeeb12190f8f5c33a73c1a6a,2025-03-16T04:15:14.517000 CVE-2025-24856,0,0,de81d5fa3871c8fea36d9f92d65c776b1ac74e3aaeeb12190f8f5c33a73c1a6a,2025-03-16T04:15:14.517000
CVE-2025-24858,0,0,80a2e3e27ced5551413d1f52e03f6696ce40853726c2f8318cd2bd73891576ca,2025-01-26T07:15:09.237000 CVE-2025-24858,0,0,80a2e3e27ced5551413d1f52e03f6696ce40853726c2f8318cd2bd73891576ca,2025-01-26T07:15:09.237000
@ -285622,6 +285625,7 @@ CVE-2025-2577,0,0,929de73a39a3543c29173f273a3d41f338242898e72fad38fbcc81d8274db1
CVE-2025-25770,0,0,083dca9bf78425b081932176ffd5590f62d2e6b52d7243e21c6da305bd5b4229,2025-02-24T18:15:20.280000 CVE-2025-25770,0,0,083dca9bf78425b081932176ffd5590f62d2e6b52d7243e21c6da305bd5b4229,2025-02-24T18:15:20.280000
CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000 CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000
CVE-2025-25774,0,0,69d43747c15f87af0da05215cab928648fd3e1ba63812309aa7f5e031fa6f50d,2025-03-12T19:15:39.777000 CVE-2025-25774,0,0,69d43747c15f87af0da05215cab928648fd3e1ba63812309aa7f5e031fa6f50d,2025-03-12T19:15:39.777000
CVE-2025-2578,1,1,305da95c0e840ae7646b20190d56fea585c13c9903d6a9062c87913d93d56a70,2025-03-28T08:15:15.603000
CVE-2025-25783,0,0,7667c9a81f530a99609c56eb13bc325e3e204504dcfbc3fb6341518f78f741e8,2025-03-04T22:15:40.787000 CVE-2025-25783,0,0,7667c9a81f530a99609c56eb13bc325e3e204504dcfbc3fb6341518f78f741e8,2025-03-04T22:15:40.787000
CVE-2025-25784,0,0,3e43aebf6f03069ac210115a03220d81a261d055bf117d06bf3215e14e26226d,2025-03-05T15:15:17.730000 CVE-2025-25784,0,0,3e43aebf6f03069ac210115a03220d81a261d055bf117d06bf3215e14e26226d,2025-03-05T15:15:17.730000
CVE-2025-25785,0,0,12399114d1e01798a9cb8e44ff529be3a97f5d175baa693f6af5ee4fed7d3d07,2025-03-05T15:15:17.930000 CVE-2025-25785,0,0,12399114d1e01798a9cb8e44ff529be3a97f5d175baa693f6af5ee4fed7d3d07,2025-03-05T15:15:17.930000
@ -286608,7 +286612,7 @@ CVE-2025-27933,0,0,93368137a33aa362057a4035ec036f1aedaefb3c8486745a8d93918e46a37
CVE-2025-28010,0,0,6260ea576a8c0d7bd0a38d2f3c79cf58da9a7c5443332c696e69e06a75d63ce4,2025-03-19T15:15:54.430000 CVE-2025-28010,0,0,6260ea576a8c0d7bd0a38d2f3c79cf58da9a7c5443332c696e69e06a75d63ce4,2025-03-19T15:15:54.430000
CVE-2025-28011,0,0,904ac06066433043222ace0eb3e8530f1f0d607436509b286714603b0a427d36,2025-03-19T19:15:47.517000 CVE-2025-28011,0,0,904ac06066433043222ace0eb3e8530f1f0d607436509b286714603b0a427d36,2025-03-19T19:15:47.517000
CVE-2025-28015,0,0,648b242f524f2d1e65282c0d2ade8d5979df5a4c9cf086b42e2449484b2f9631,2025-03-19T19:15:47.650000 CVE-2025-28015,0,0,648b242f524f2d1e65282c0d2ade8d5979df5a4c9cf086b42e2449484b2f9631,2025-03-19T19:15:47.650000
CVE-2025-2804,1,1,84020102f277b538ffb8ab51ba7022798f05e2dde9899675eb282f2dc201e37b,2025-03-28T06:15:34.157000 CVE-2025-2804,0,0,84020102f277b538ffb8ab51ba7022798f05e2dde9899675eb282f2dc201e37b,2025-03-28T06:15:34.157000
CVE-2025-28135,0,0,67520c1f57ea15ce6a3fbebf8fb1a036612a258dbeeaf68f8167eb1360c1936d,2025-03-27T16:45:12.210000 CVE-2025-28135,0,0,67520c1f57ea15ce6a3fbebf8fb1a036612a258dbeeaf68f8167eb1360c1936d,2025-03-27T16:45:12.210000
CVE-2025-28138,0,0,8c0673577a1929357533e79b7892ab1b2319abdda1d9f5bd31a1a742b947848b,2025-03-27T16:45:12.210000 CVE-2025-28138,0,0,8c0673577a1929357533e79b7892ab1b2319abdda1d9f5bd31a1a742b947848b,2025-03-27T16:45:12.210000
CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000 CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000
@ -287151,4 +287155,4 @@ CVE-2025-31178,0,0,0159271cafd90a7c68cb6b42d742565e913c95d142c34439b76c4b7fbcd3a
CVE-2025-31179,0,0,cda1c9467c3475201d82575e129fca6c85eec975e0bfb5c626efdafa30a80311,2025-03-27T16:45:12.210000 CVE-2025-31179,0,0,cda1c9467c3475201d82575e129fca6c85eec975e0bfb5c626efdafa30a80311,2025-03-27T16:45:12.210000
CVE-2025-31180,0,0,96a8b1c900905723c52b2ac8ec7d74d27ca8fc06e172a796b6c77948919bf976,2025-03-27T16:45:12.210000 CVE-2025-31180,0,0,96a8b1c900905723c52b2ac8ec7d74d27ca8fc06e172a796b6c77948919bf976,2025-03-27T16:45:12.210000
CVE-2025-31181,0,0,adf787fa7be98612076fa1d074f2dd202915c081eba78290d23e687b246de36d,2025-03-27T16:45:12.210000 CVE-2025-31181,0,0,adf787fa7be98612076fa1d074f2dd202915c081eba78290d23e687b246de36d,2025-03-27T16:45:12.210000
CVE-2025-31335,1,1,10ae6e3d427bfe13348b2d10ee12f129bdeadfbd4a1839e0c92366307e617223,2025-03-28T06:15:34.723000 CVE-2025-31335,0,0,10ae6e3d427bfe13348b2d10ee12f129bdeadfbd4a1839e0c92366307e617223,2025-03-28T06:15:34.723000

Can't render this file because it is too large.