Auto-Update: 2025-02-22T17:00:20.157115+00:00

This commit is contained in:
cad-safe-bot 2025-02-22 17:03:47 +00:00
parent 3d34cef4cc
commit 92fbb0de8d
22 changed files with 881 additions and 34 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-8900",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-02-21T22:15:10.393",
"lastModified": "2025-02-21T22:15:10.393",
"lastModified": "2025-02-22T16:15:30.333",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A vulnerability in the SecureROM of some Apple devices can be exploited by an unauthenticated local attacker to execute arbitrary code upon booting those devices. This vulnerability allows arbitrary code to be executed on the device. Exploiting the vulnerability requires physical access to the device: the device must be plugged in to a computer upon booting, and it must be put into Device Firmware Update (DFU) mode. The exploit is not persistent; rebooting the device overrides any changes to the device's software that were made during an exploited session on the device. Additionally, unless an attacker has access to the device's unlock PIN or fingerprint, an attacker cannot gain access to information protected by Apple's Secure Enclave or Touch ID features."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://www.kb.cert.org/vuls/id/941987",

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-12577",
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"published": "2025-02-22T15:15:10.227",
"lastModified": "2025-02-22T15:15:10.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory."
}
],
"metrics": {},
"weaknesses": [
{
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-823"
}
]
}
],
"references": [
{
"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-46975",
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"published": "2025-02-22T15:15:10.377",
"lastModified": "2025-02-22T15:15:10.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data into another Guest's virtualised GPU memory."
}
],
"metrics": {},
"weaknesses": [
{
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-270"
}
]
}
],
"references": [
{
"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-47896",
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"published": "2025-02-22T15:15:10.503",
"lastModified": "2025-02-22T15:15:10.503",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory."
}
],
"metrics": {},
"weaknesses": [
{
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-823"
}
]
}
],
"references": [
{
"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-52939",
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"published": "2025-02-22T15:15:10.633",
"lastModified": "2025-02-22T15:15:10.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kernel software installed and running inside a Guest VM may post improper commands to the GPU Firmware to trigger a write data outside the Guest's virtualised GPU memory."
}
],
"metrics": {},
"weaknesses": [
{
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-823"
}
]
}
],
"references": [
{
"url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7695",
"sourceIdentifier": "psirt@moxa.com",
"published": "2025-01-29T08:15:19.933",
"lastModified": "2025-02-07T07:15:15.317",
"lastModified": "2025-02-22T15:15:10.770",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -103,6 +103,10 @@
{
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240163-cve-2024-7695-out-of-bounds-write-vulnerability-in-multiple-eds,-ics,-iks,-and-sds-switches",
"source": "psirt@moxa.com"
},
{
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240164-cve-2024-7695-out-of-bounds-write-vulnerability-identified-in-en-50155-switches",
"source": "psirt@moxa.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-26622",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-21T22:15:13.447",
"lastModified": "2025-02-21T22:15:13.447",
"lastModified": "2025-02-22T16:15:31.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,12 +55,34 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26750",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-22T16:15:31.210",
"lastModified": "2025-02-22T16:15:31.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in appsbd Vitepos allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Vitepos: from n/a through 3.1.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/vitepos-lite/vulnerability/wordpress-vitepos-plugin-3-1-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26756",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-22T16:15:31.350",
"lastModified": "2025-02-22T16:15:31.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in grimdonkey Magic the Gathering Card Tooltips allows Stored XSS. This issue affects Magic the Gathering Card Tooltips: from n/a through 3.5.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/magic-the-gathering-card-tooltips/vulnerability/wordpress-magic-the-gathering-card-tooltips-plugin-3-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26757",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-22T16:15:31.493",
"lastModified": "2025-02-22T16:15:31.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FULL SERVICES FULL Customer allows PHP Local File Inclusion. This issue affects FULL Customer: from n/a through 3.1.26."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/full-customer/vulnerability/wordpress-full-cliente-plugin-3-1-26-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26760",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-22T16:15:31.633",
"lastModified": "2025-02-22T16:15:31.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Wow-Company Calculator Builder allows PHP Local File Inclusion. This issue affects Calculator Builder: from n/a through 1.6.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/calculator-builder/vulnerability/wordpress-calculator-builder-plugin-1-6-2-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26763",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-22T16:15:31.773",
"lastModified": "2025-02-22T16:15:31.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in MetaSlider Responsive Slider by MetaSlider allows Object Injection. This issue affects Responsive Slider by MetaSlider: from n/a through 3.94.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ml-slider/vulnerability/wordpress-slider-gallery-and-carousel-by-metaslider-image-slider-video-slider-plugin-3-94-0-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26764",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-22T16:15:31.910",
"lastModified": "2025-02-22T16:15:31.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in enituretechnology Distance Based Shipping Calculator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Distance Based Shipping Calculator: from n/a through 2.0.22."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/distance-based-shipping-calculator/vulnerability/wordpress-distance-based-shipping-calculator-plugin-2-0-22-settings-change-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26774",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-22T16:15:32.060",
"lastModified": "2025-02-22T16:15:32.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rock Solid Responsive Modal Builder for High Conversion \u2013 Easy Popups allows Reflected XSS. This issue affects Responsive Modal Builder for High Conversion \u2013 Easy Popups: from n/a through 1.5.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/easy-popups/vulnerability/wordpress-responsive-modal-builder-for-high-conversion-easy-popups-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26776",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-22T16:15:32.203",
"lastModified": "2025-02-22T16:15:32.203",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Chaty Pro allows Upload a Web Shell to a Web Server. This issue affects Chaty Pro: from n/a through 3.3.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/chaty-pro/vulnerability/wordpress-chaty-pro-plugin-3-3-3-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26973",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-22T16:15:32.347",
"lastModified": "2025-02-22T16:15:32.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WarfarePlugins Social Warfare allows DOM-Based XSS. This issue affects Social Warfare: from n/a through 4.5.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/social-warfare/vulnerability/wordpress-social-warfare-plugin-4-5-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27012",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-22T16:15:32.497",
"lastModified": "2025-02-22T16:15:32.497",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in a1post A1POST.BG Shipping for Woo allows Privilege Escalation. This issue affects A1POST.BG Shipping for Woo: from n/a through 1.5.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/a1post-bg-shipping-for-woocommerce/vulnerability/wordpress-a1post-bg-shipping-for-woo-plugin-1-5-1-csrf-to-privilege-escalation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27104",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-21T22:15:13.773",
"lastModified": "2025-02-21T22:15:13.773",
"lastModified": "2025-02-22T16:15:32.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,12 +55,34 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27105",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-21T22:15:13.910",
"lastModified": "2025-02-21T22:15:13.910",
"lastModified": "2025-02-22T16:15:32.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,12 +55,34 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27106",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-21T22:15:14.033",
"lastModified": "2025-02-21T22:15:14.033",
"lastModified": "2025-02-22T16:15:33.003",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,12 +55,34 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-22T15:00:21.190758+00:00
2025-02-22T17:00:20.157115+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-22T14:15:29.710000+00:00
2025-02-22T16:15:33.003000+00:00
```
### Last Data Feed Release
@ -33,25 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
282073
282087
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `14`
- [CVE-2024-13869](CVE-2024/CVE-2024-138xx/CVE-2024-13869.json) (`2025-02-22T13:15:10.920`)
- [CVE-2025-0918](CVE-2025/CVE-2025-09xx/CVE-2025-0918.json) (`2025-02-22T13:15:11.687`)
- [CVE-2025-0953](CVE-2025/CVE-2025-09xx/CVE-2025-0953.json) (`2025-02-22T13:15:11.850`)
- [CVE-2025-0957](CVE-2025/CVE-2025-09xx/CVE-2025-0957.json) (`2025-02-22T14:15:29.710`)
- [CVE-2025-1556](CVE-2025/CVE-2025-15xx/CVE-2025-1556.json) (`2025-02-22T13:15:12.010`)
- [CVE-2025-1557](CVE-2025/CVE-2025-15xx/CVE-2025-1557.json) (`2025-02-22T13:15:12.247`)
- [CVE-2024-12577](CVE-2024/CVE-2024-125xx/CVE-2024-12577.json) (`2025-02-22T15:15:10.227`)
- [CVE-2024-46975](CVE-2024/CVE-2024-469xx/CVE-2024-46975.json) (`2025-02-22T15:15:10.377`)
- [CVE-2024-47896](CVE-2024/CVE-2024-478xx/CVE-2024-47896.json) (`2025-02-22T15:15:10.503`)
- [CVE-2024-52939](CVE-2024/CVE-2024-529xx/CVE-2024-52939.json) (`2025-02-22T15:15:10.633`)
- [CVE-2025-26750](CVE-2025/CVE-2025-267xx/CVE-2025-26750.json) (`2025-02-22T16:15:31.210`)
- [CVE-2025-26756](CVE-2025/CVE-2025-267xx/CVE-2025-26756.json) (`2025-02-22T16:15:31.350`)
- [CVE-2025-26757](CVE-2025/CVE-2025-267xx/CVE-2025-26757.json) (`2025-02-22T16:15:31.493`)
- [CVE-2025-26760](CVE-2025/CVE-2025-267xx/CVE-2025-26760.json) (`2025-02-22T16:15:31.633`)
- [CVE-2025-26763](CVE-2025/CVE-2025-267xx/CVE-2025-26763.json) (`2025-02-22T16:15:31.773`)
- [CVE-2025-26764](CVE-2025/CVE-2025-267xx/CVE-2025-26764.json) (`2025-02-22T16:15:31.910`)
- [CVE-2025-26774](CVE-2025/CVE-2025-267xx/CVE-2025-26774.json) (`2025-02-22T16:15:32.060`)
- [CVE-2025-26776](CVE-2025/CVE-2025-267xx/CVE-2025-26776.json) (`2025-02-22T16:15:32.203`)
- [CVE-2025-26973](CVE-2025/CVE-2025-269xx/CVE-2025-26973.json) (`2025-02-22T16:15:32.347`)
- [CVE-2025-27012](CVE-2025/CVE-2025-270xx/CVE-2025-27012.json) (`2025-02-22T16:15:32.497`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `6`
- [CVE-2019-8900](CVE-2019/CVE-2019-89xx/CVE-2019-8900.json) (`2025-02-22T16:15:30.333`)
- [CVE-2024-7695](CVE-2024/CVE-2024-76xx/CVE-2024-7695.json) (`2025-02-22T15:15:10.770`)
- [CVE-2025-26622](CVE-2025/CVE-2025-266xx/CVE-2025-26622.json) (`2025-02-22T16:15:31.033`)
- [CVE-2025-27104](CVE-2025/CVE-2025-271xx/CVE-2025-27104.json) (`2025-02-22T16:15:32.640`)
- [CVE-2025-27105](CVE-2025/CVE-2025-271xx/CVE-2025-27105.json) (`2025-02-22T16:15:32.827`)
- [CVE-2025-27106](CVE-2025/CVE-2025-271xx/CVE-2025-27106.json) (`2025-02-22T16:15:33.003`)
## Download and Usage

View File

@ -143347,7 +143347,7 @@ CVE-2019-8896,0,0,0aa9f842d33b9654dca889f38decb1175af9e672aff0de6031f4293693edf6
CVE-2019-8897,0,0,3a223b38a5e7116d2df782d1b5e1ba7ab87c296ada6b209ce5ca6d5edff411fa,2023-11-07T03:13:34.413000
CVE-2019-8898,0,0,813b02bbfc4312cb306a094d98b5f0ac09c3f6363393f87aa8b3daaa16fed4bd,2024-11-21T04:50:37.380000
CVE-2019-8899,0,0,adf1901d7d55b77103a59c4f9ec8380c05cd97ee805925ad10db4d2ed3234af5,2023-11-07T03:13:34.457000
CVE-2019-8900,0,0,1235aa2494f8a5312ff00cb6a0bb6dca1f76b306c676ecd6ce0076f37169ffae,2025-02-21T22:15:10.393000
CVE-2019-8900,0,1,e4e312bbd11851ef36112cafd58dc7a32763c873d4d9e13b8f99469799d30700,2025-02-22T16:15:30.333000
CVE-2019-8901,0,0,43232e83bf8db4ecdfe2bc0ccfa5289d05fdd242ffbb871121e8cabe69591986,2024-11-21T04:50:37.507000
CVE-2019-8902,0,0,1ae49e00242bce279d5f897c9e5597933981a7d3a204202a57299ddd8069fd2d,2024-11-21T04:50:37.610000
CVE-2019-8903,0,0,27a56ed767f19aeb566cd9b0ebd8b7ebfdd6ff5db988a0d0511852cd09fe5d47,2024-11-21T04:50:37.747000
@ -245877,6 +245877,7 @@ CVE-2024-12570,0,0,be94920192af405ec932f38181a462713be2ef7292a21e90f93bf4238cc63
CVE-2024-12571,0,0,4f61ab2b24612e0b1a75d43cf9d9be2b77f4416d126de6e970d9338abb76a3be,2024-12-20T07:15:12.380000
CVE-2024-12572,0,0,b5830ae1a3c6182c738f484a7555b2d49502aecd75946e90268f33cb1f4e6fca,2024-12-13T04:15:05.233000
CVE-2024-12574,0,0,22d90c2cfc66a6e55649293fae24817d92e89a03bfa8e0d56af714629ad6f2a8,2024-12-13T05:15:07.310000
CVE-2024-12577,1,1,6ee87bba10aa1e065a77ecfeab673b0150252e4b2f520b57bd8fa010c92f6508,2025-02-22T15:15:10.227000
CVE-2024-12578,0,0,9683da78c95f4de0afe4f169763bacae0c8e4e48d594e85dbc7c32bda1c6eab5,2024-12-14T05:15:12
CVE-2024-12579,0,0,6b066a632ed42755872bfe12897131044e41b00627589546ab36be31d813b6f2,2024-12-13T05:15:07.473000
CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6caa,2024-11-21T08:50:10.573000
@ -246918,7 +246919,7 @@ CVE-2024-13854,0,0,da76605e45e5cccb1e4ac357ef915fd87a7797a2aa194293a861365173d04
CVE-2024-13855,0,0,87ff80a4a4bcadf924c0b68cea8cd371d8a19ee5f045d490959e15e51f021d88,2025-02-20T10:15:11.530000
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
CVE-2024-13869,1,1,6cf76ca30972bb4e146a69d16f09015336f9457aca89967f7112327623dcc3eb,2025-02-22T13:15:10.920000
CVE-2024-13869,0,0,6cf76ca30972bb4e146a69d16f09015336f9457aca89967f7112327623dcc3eb,2025-02-22T13:15:10.920000
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
CVE-2024-13873,0,0,ddf058f4c75682e8cf7335d38f43094b08f172b8fcc2d656f2cc5238777fc340,2025-02-22T04:15:09.567000
CVE-2024-13879,0,0,9feaa77a4a107496b778129b23b28c9a020cd8ce5e3b7bb155fa8c6898d38c2d,2025-02-17T16:15:15.950000
@ -268059,6 +268060,7 @@ CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d258
CVE-2024-46972,0,0,95b9b829ac40a71aa8b72076be82f629ce22983a71f926ad95be3c5975b4b190,2025-02-18T22:15:11.490000
CVE-2024-46973,0,0,0437a0b4f343551c70c990e4fd559a1c21cac753a3df1f8e90ebfba823ecbaf4,2024-12-28T17:15:07.420000
CVE-2024-46974,0,0,dfb76a0433767383a52519f3e13a26b3bbbc934082dde21f8b8c392f6cc03115,2025-02-18T19:15:16.563000
CVE-2024-46975,1,1,51212e6537fae775c84eeaaef90c69bc00dfdb4ee429555487d625bebff99c3d,2025-02-22T15:15:10.377000
CVE-2024-46976,0,0,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000
CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000
CVE-2024-46978,0,0,6b4b273c251da2584d7ee17daf2abe4b18d0c96b507318935ca3196d6f3415b7,2025-02-07T15:48:36.660000
@ -268888,6 +268890,7 @@ CVE-2024-47891,0,0,589f151bfbb431a12dbbe664c389c02417f09703d0aa2898a70b48482ecdd
CVE-2024-47892,0,0,e300db381f4cf7705266e90cba53b1a4b7a7defd036013afcd4a8d8ee5ca06f1,2024-12-16T19:15:08.393000
CVE-2024-47894,0,0,90877e14f180160e2f32b8f7e31918f3a5d81d9927bb9299954c6f367495fa91,2025-01-13T18:15:18.693000
CVE-2024-47895,0,0,3f8324ce2dbaf96facf113693c7520ff3a56a3e4203f9d7908ed4fe8545f1692,2025-01-13T18:15:18.933000
CVE-2024-47896,1,1,871fd2d0f269201a8e07c6453c192307ab508c012a0013b74a9ec8e55e94186f,2025-02-22T15:15:10.503000
CVE-2024-47897,0,0,43de61f3d9732c029298f61d67d2b56903f91c6fc88a72bdb868652d4446e1a4,2025-01-13T18:15:19.310000
CVE-2024-47898,0,0,cce74231486c3ab80f60eacc0cea75369d5a573cb99e87ef432e0f8d422293db,2025-02-18T19:15:16.970000
CVE-2024-47899,0,0,f9f806d8192d8d0f2624a3e2583fa5ff6207a910765e6fd3f29aa741332463b7,2025-02-18T19:15:17.117000
@ -272375,6 +272378,7 @@ CVE-2024-52935,0,0,da218bbcf32aa8ee196d0cc84ac3289085c87dcfe3a543f2e97a81e0e8e7c
CVE-2024-52936,0,0,fc5419fb37a8a058b0ac6dbc1882fd48de1fcccd6ca5038c660a45c78f704b96,2025-01-31T17:15:15.567000
CVE-2024-52937,0,0,4e2e200c911871605d656a523330fd8515bef881c87955645314df4efb4a35e8,2025-01-13T16:15:18.093000
CVE-2024-52938,0,0,25ccbcee31d517a9492c1820a88aa96739f339ebff7e4c4e42b2b7d66f53baa0,2025-01-13T15:15:09.300000
CVE-2024-52939,1,1,2612192fe55e224d850f3f85b19b41bb402c0d44131b3e68472a22f17abc4348,2025-02-22T15:15:10.633000
CVE-2024-5294,0,0,5f7ae00e9a959f94251bcb983ddc17250c36ab864c5296be765aa222fa5fa253,2024-11-21T09:47:22.597000
CVE-2024-52940,0,0,dada389fd604fabcf8cad162ee7439c1b0f0631b96a74ff2b430a8633c0d2fd5,2024-11-18T17:11:17.393000
CVE-2024-52941,0,0,54a69191187ab640d350b9c58a59b08396ee95fad6d8092cf6c6613e7f3eba21,2024-11-18T17:11:17.393000
@ -276983,7 +276987,7 @@ CVE-2024-7691,0,0,6dad0c769fb572b88a068528267f61949164dc392b80af6f168258a6b2c7f6
CVE-2024-7692,0,0,4b38ff30e017e91d8a002928077306fde8ee04d0be5e9045460020d6ccc3af22,2024-10-04T17:14:50.990000
CVE-2024-7693,0,0,dd3e43863a4776bf6aa9cee54c3310fd08dfe98f5bd8663ebc12432cb7153f16,2024-09-06T16:51:35.647000
CVE-2024-7694,0,0,3a2582a984429d8c89c3dd71bc863aef01ff80b7baff4f3e3f71f54998d90a46,2024-09-06T17:24:42.573000
CVE-2024-7695,0,0,d66e4052522e37dd3d70b1b0ccdc13ab04126c332bcc3bdf4c747e8c62819761,2025-02-07T07:15:15.317000
CVE-2024-7695,0,1,8ed03f85e899961b16a928bb1a6bcd0d9f749610e6437211ce1f0e00d868b60f,2025-02-22T15:15:10.770000
CVE-2024-7696,0,0,f0052f9d5e178b3ea159f04ebcfd4751f930fb606630e5cab2ff7b8b63a94d0f,2025-01-07T06:15:17.827000
CVE-2024-7697,0,0,122b8f72aeda3c5b2d61460f1dce24bd382a6f877b1c3f9efb3e322459b58ee0,2024-09-06T18:04:28.030000
CVE-2024-7698,0,0,28382cbcfd0fa7ea6a7d15c9ccdd01abba2e948df9ed5ab95948fe232327814d,2024-09-27T19:39:43.350000
@ -279407,7 +279411,7 @@ CVE-2025-0909,0,0,1ff7d78519026d4b0df5324b5b84f781600c6266238b96b6e6fda4fafcd94e
CVE-2025-0910,0,0,5441c161f7257bb6355c09b7b0bb2df312d9b6c6d59e58e837649ec8c68777c9,2025-02-12T18:59:18.447000
CVE-2025-0911,0,0,b9aa939093c00e0782e255aa47e49c2cf1d4559eb848b6a9c47f1e00b8bd8fad,2025-02-12T19:00:17
CVE-2025-0916,0,0,9f634049c98a708569d7f2be6c0fdaeeb2a62cd7e2136bc12c84981688ac3796,2025-02-19T12:15:31.630000
CVE-2025-0918,1,1,3a735425a74a1c0bbfdbd7a0fbcbdab0443a6b145783519e1d180e6751979379,2025-02-22T13:15:11.687000
CVE-2025-0918,0,0,3a735425a74a1c0bbfdbd7a0fbcbdab0443a6b145783519e1d180e6751979379,2025-02-22T13:15:11.687000
CVE-2025-0919,0,0,f3c40a8c3e9859b98dc4dbb233022019405b6bb3a32be39636bc5e978bd23a1b,2025-02-12T17:15:23.357000
CVE-2025-0924,0,0,aee87ee741a81d5e3594f3d82c18001c32a0f8c18175f96bf3ced22a7e7ace42,2025-02-17T05:15:09.410000
CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000
@ -279426,8 +279430,8 @@ CVE-2025-0947,0,0,d86087faf15d7e6a63109e47bfca07163762fc534d74ac472b8031d14a77e7
CVE-2025-0948,0,0,8aa6a50c200d1920de9f20b6b39e518a0d142377f946f24ca23afa086a6a6c5e,2025-02-03T18:15:41.580000
CVE-2025-0949,0,0,039d871602cd9428128821cc37027e6e8dee60ecee8ac64dcd53b31ffe11da3d,2025-02-03T18:15:41.727000
CVE-2025-0950,0,0,b7bfb032b40dfc48cfc3ea52c5e6e62b743bd5cc010ad44bc8604664ed295438,2025-02-03T18:15:41.847000
CVE-2025-0953,1,1,048cc197ca970de5fde847ecab581986b58675b3dc4db0983287b715bf967350,2025-02-22T13:15:11.850000
CVE-2025-0957,1,1,ce96b57dc5a1d7911b2973eca447d8c2a84bd9409019560a93b413d929c8b35e,2025-02-22T14:15:29.710000
CVE-2025-0953,0,0,048cc197ca970de5fde847ecab581986b58675b3dc4db0983287b715bf967350,2025-02-22T13:15:11.850000
CVE-2025-0957,0,0,ce96b57dc5a1d7911b2973eca447d8c2a84bd9409019560a93b413d929c8b35e,2025-02-22T14:15:29.710000
CVE-2025-0960,0,0,7d99f6e3510e94dddcebd5fc3388664132c2f2132e2b612ed8279ce23b89027f,2025-02-04T20:15:50.103000
CVE-2025-0961,0,0,51398360322c1646c196e54ab1a92e1f37267b5b266c9b18c4da19ec7b68c1a4,2025-02-10T13:15:26.413000
CVE-2025-0967,0,0,48a999283e5df37f2ad381f76667fdb4991732db2f436607d24ac0a470ce1d15,2025-02-02T16:15:27.693000
@ -279688,8 +279692,8 @@ CVE-2025-1546,0,0,7a27654d265dd0e0c87a112414ca356bea46a4aa4326e4b6c538ca7fa17cdb
CVE-2025-1548,0,0,dc77eed63b703112b11128556adaac7473d7e2c58e805a91497e7bcaa94271fc,2025-02-21T17:15:13.897000
CVE-2025-1553,0,0,b76c346b19ed32adbb90097d30125f53b18d6b15a685f1353673e4fcdc636324,2025-02-22T10:15:09.853000
CVE-2025-1555,0,0,1c7a4c27ed9d1502d0e15c0e5a57e371d72228c620058c2537224f8b85248601,2025-02-21T21:15:13.703000
CVE-2025-1556,1,1,724b13759326d4daa23c48d02c1ce795525d880ae020ac09a68b1de9594640a5,2025-02-22T13:15:12.010000
CVE-2025-1557,1,1,49607b48e972d9fd5d215f054ea7353b084df75dff065ecc488af6c52d9e37af,2025-02-22T13:15:12.247000
CVE-2025-1556,0,0,724b13759326d4daa23c48d02c1ce795525d880ae020ac09a68b1de9594640a5,2025-02-22T13:15:12.010000
CVE-2025-1557,0,0,49607b48e972d9fd5d215f054ea7353b084df75dff065ecc488af6c52d9e37af,2025-02-22T13:15:12.247000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
@ -282026,15 +282030,21 @@ CVE-2025-26616,0,0,adfc76ec40903a204c1832e3daed3f0e44bf0c652172addd04989d3ff972b
CVE-2025-26617,0,0,1b0fc09fd0258e134911cacd2ad1e559b3734d07d890bba395627bae512ac0ad,2025-02-18T21:15:30.137000
CVE-2025-26618,0,0,f8dd04a088e9c1ef15892f10db1e49060d6c91ccfb0e2ca83ac304f0769b1d61,2025-02-20T21:15:26.073000
CVE-2025-26620,0,0,b52554701527e486a669272c32db538b4af2be9f7d05b83de248aad0441a11da,2025-02-18T18:15:36.767000
CVE-2025-26622,0,0,10fa8e85badd27077b77602e62b207dcb865c86def2eb3a55216ba95053df31e,2025-02-21T22:15:13.447000
CVE-2025-26622,0,1,0bafa51d37f905d32266f99250febec707833a89fe716aea0a37fd117490a259,2025-02-22T16:15:31.033000
CVE-2025-26623,0,0,8058a54e26172919c4073d93d1e5d8c8b4196bc60cec9ced7fa5cc190a1b8657,2025-02-18T20:15:33.153000
CVE-2025-26624,0,0,b1ee6d12b9f4cff5337865530f2b95198c23875bf3e99102a3d462bb47eeba02,2025-02-18T23:15:10.810000
CVE-2025-26700,0,0,a62049a64dad278ca1213054f25f2aed479e1d05d98e9fdc2dc613607ff558b5,2025-02-17T03:15:09.750000
CVE-2025-26750,1,1,2a3b9db13d9cd9c23552d1acf8bba46a50acb1724584ded2752728f67ebbd57a,2025-02-22T16:15:31.210000
CVE-2025-26754,0,0,402a2759dad93da9f23b2492c07100626d0693520f28e20423238f6ecd814d8a,2025-02-17T12:15:28.267000
CVE-2025-26755,0,0,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000
CVE-2025-26756,1,1,42d04b5d3d066a5165b76b4a05636a3c0666943b80a7eece51bcf45901a52bd7,2025-02-22T16:15:31.350000
CVE-2025-26757,1,1,9d984c4bf0ab9c149dbbadf2c5bcf69972bb1dae33868ecbce1e57e2cc64642c,2025-02-22T16:15:31.493000
CVE-2025-26758,0,0,a26f515dcd360cc3ddbe170c3b554583598aed711ba91a215b8cd7112059dd35,2025-02-17T12:15:28.407000
CVE-2025-26759,0,0,aa971f4308d9dde025f5e1ad7daa8f065b0641c9cb32130c8a995de32816229c,2025-02-16T23:15:10.777000
CVE-2025-26760,1,1,6919f9acb07b01de194066d8c4e7e1e484a5db7bb553969b1a854be951f5b945,2025-02-22T16:15:31.633000
CVE-2025-26761,0,0,130481f4b28cc5ac3e58302d2cdf3485b24296b75bca4ad9bb67ba26ddaffc38,2025-02-16T23:15:10.920000
CVE-2025-26763,1,1,835f6aa5c53311e67700f12536c4097703646350e62d41b3ab02781e700771af,2025-02-22T16:15:31.773000
CVE-2025-26764,1,1,f829f1e71e376c08611e3e8d7b71345b7be3ee4dd3ad058017645a5c43219fe6,2025-02-22T16:15:31.910000
CVE-2025-26765,0,0,febe7fb1865b08d6bbec6c81b3ab270dd96207bad5fe3685a198c3b4fb2b2101,2025-02-16T23:15:11.063000
CVE-2025-26766,0,0,053586fef9ce986be152eb9ae1e7b8892c9f075ba2f907277b1d4763cc12fe70,2025-02-16T23:15:11.207000
CVE-2025-26767,0,0,187ad69a9eed635c81080502232aaa7de1c87394e8edce49d9a9a4ea1e9e43c7,2025-02-16T23:15:11.350000
@ -282044,7 +282054,9 @@ CVE-2025-26770,0,0,b8458cb1a3e8b55edb12423478e672f2088dbbbcb505215466ec38c374218
CVE-2025-26771,0,0,1172594f01315a68b1db7af85146cea8365106bb718e61572460a2e4c4a81b19,2025-02-17T12:15:28.833000
CVE-2025-26772,0,0,c07c6cc8f50d1e9a48d9bbe77ef3064c2299e1d25b700ebf62ce9cf490ea5fb9,2025-02-17T12:15:28.980000
CVE-2025-26773,0,0,2e012b5456eae6488f8204215cfc7953086c04f4520b05ba5b5d35b16125c8f5,2025-02-17T12:15:29.123000
CVE-2025-26774,1,1,c82979ba8301822d7b27e62dd6fe18c9258cb4d0e5f477952295cd2d0dcc9a0c,2025-02-22T16:15:32.060000
CVE-2025-26775,0,0,04dff38e991d1b46c040974dfcb68e80377672de97a81d8017423e599debe554,2025-02-17T12:15:29.260000
CVE-2025-26776,1,1,d6756beb38c049d281a6d0a03e475b1f412bcd9d7c8e36a75fb74880a3fd777a,2025-02-22T16:15:32.203000
CVE-2025-26778,0,0,f4f3856714356e410e7f4f3388bedae25b32fbe8e18283316af64b40400930e7,2025-02-17T12:15:29.417000
CVE-2025-26779,0,0,78ae05acb92595d40239dc765a3fe7d78dcaaef138d093b03917a2ce182992b1,2025-02-16T23:15:11.630000
CVE-2025-26788,0,0,1ba864f8ac81a56163abfb386c84050b425d8eb039d7783af9b48ca3d178b538,2025-02-15T16:15:30.090000
@ -282054,6 +282066,8 @@ CVE-2025-26793,0,0,23a8e0213a0ca1b8120177cee0a8b3703ebe8289aad842eda98d1b97dcb6b
CVE-2025-26794,0,0,fe65001567301b62f9f70becffce46b16ab4f6e8292d604a049482502e1fc499,2025-02-22T01:15:10.670000
CVE-2025-26819,0,0,7afd4e7cb03752c52e5526c11c2ec114770ff5f83e4468a7bb7571814f4cc158,2025-02-15T00:15:28.510000
CVE-2025-26856,0,0,97d830a9ee806f0ef850d5b5eea5c095e7e2e4dee4401ad5b7fd9fb34c2341f7,2025-02-20T06:15:21.673000
CVE-2025-26973,1,1,610ca521f6df23787468cbd6d7246985670b9cbd38aeda403a910446401c6120,2025-02-22T16:15:32.347000
CVE-2025-27012,1,1,7363d114ae429e53b3d9610c9cb193ed78cd11421be4a33a19fcf6bd0f11da65,2025-02-22T16:15:32.497000
CVE-2025-27013,0,0,f948cc3f5edcc63c02fbe1aa3ab5587f3b1659a21b1a5f943b19bb040cbb2d15,2025-02-18T20:15:33.880000
CVE-2025-27016,0,0,04fa07ed62d9b49f3b31ebda2ac8455c38c6351226a3cae9904a3c1abe91e83f,2025-02-18T20:15:34.013000
CVE-2025-27088,0,0,09d6e70f976103888a70528f06cfe4d5e2532860157df7adae24247eee34e541,2025-02-21T22:15:13.673000
@ -282065,9 +282079,9 @@ CVE-2025-27096,0,0,32224f1c51b54efe47a565f7e551ac8c6822a2af21d493c489fef5b8bd7d4
CVE-2025-27097,0,0,5b9fc582a5c5e9bf93a07d4ec3deca2e89df01f5ebbf3bb4a854ac4e8c549a46,2025-02-20T21:15:26.227000
CVE-2025-27098,0,0,766aa0528b8030648a329da18fe8e03c04c956bcb8a3fc39487da75af24bc862,2025-02-20T21:15:26.370000
CVE-2025-27100,0,0,c241d778cc69afadd153119784c98cb751150e20e8824ef0500e107bbd54eb0d,2025-02-21T00:15:09.250000
CVE-2025-27104,0,0,40ecb8458c0f422c4d17b89997bd21480392269b442a2b63c90701e5d610e1af,2025-02-21T22:15:13.773000
CVE-2025-27105,0,0,1a4265143ce795251c3264e6a9d90ecd10dd01652b6699a31976001d67d47d89,2025-02-21T22:15:13.910000
CVE-2025-27106,0,0,939fa3534ddbf4f51b416a9d012f675603de51232faf931d2ce4703a465566d3,2025-02-21T22:15:14.033000
CVE-2025-27104,0,1,15aaaf6917676f5eff2f89fbd0c3a21c0c13a6b224565fcd05537a337b8876ab,2025-02-22T16:15:32.640000
CVE-2025-27105,0,1,2bcb6c340eab97672213237573c8f6ca4eeeb614b47978107b021b4da927b7cb,2025-02-22T16:15:32.827000
CVE-2025-27106,0,1,2aea6dfc75b6de975e9d792b22b24672e89a28876099e5c80ae756f94e64cf9c,2025-02-22T16:15:33.003000
CVE-2025-27108,0,0,7cd07cb1baebc7581e6189da86b0f89ab8f66cca7350d7768234c5e33b5a7c6f,2025-02-21T22:15:14.170000
CVE-2025-27109,0,0,2aad45f7ceaec8c99923923cc63daf5c71560a762e95714d9599cb9bc274547c,2025-02-21T22:15:14.303000
CVE-2025-27113,0,0,5361e7323e42f3b09824985b5c3b788849d795bb02cd5dec29aec9ac11d6b7a1,2025-02-18T23:15:10.960000

Can't render this file because it is too large.