Auto-Update: 2025-01-30T13:00:25.493276+00:00

This commit is contained in:
cad-safe-bot 2025-01-30 13:03:53 +00:00
parent 65267e8477
commit 96a1a4bef7
17 changed files with 864 additions and 28 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-43916",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-01-30T12:15:26.867",
"lastModified": "2025-01-30T12:15:26.867",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM App Connect Enterprise Certified Container 7.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, and 12.7 Pods do not restrict network egress for Pods that are used for internal infrastructure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-923"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7181916",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-12409",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-30T11:15:09.590",
"lastModified": "2025-01-30T11:15:09.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simple:Press Forum plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 6.10.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/simplepress/trunk/admin/panel-plugins/forms/spa-plugins-list-form.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3230289%40simplepress&new=3230289%40simplepress&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b9ebeb96-2f39-488e-aef6-d5af0a37c24a?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-12524",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-30T11:15:10.840",
"lastModified": "2025-01-30T11:15:10.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Clinked Client Portal plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'clinked-login-button' shortcode in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/clinked-client-portal/trunk/clinked-wordpress-plugin.php#L87",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3229331%40clinked-client-portal&new=3229331%40clinked-client-portal&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/417b9dfe-2571-4816-af55-c7cb7dfa62c6?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-13453",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-30T11:15:10.993",
"lastModified": "2025-01-30T11:15:10.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Contact Form & SMTP Plugin for WordPress by PirateForms plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.6.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/pirate-forms/tags/2.6.0/gutenberg/class-pirateforms-gutenberg.php#L145",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3225666%40pirate-forms&old=3219203%40pirate-forms&sfp_email=&sfph_mail=#file163",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/98859214-7acf-4d40-9291-b5669b9614b7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-13706",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-30T11:15:11.143",
"lastModified": "2025-01-30T11:15:11.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Image Uploader plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'file' parameter in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-image-uploader/trunk/index.php#L85",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fea1546c-1d8f-4478-81b7-20a9096e0217?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-25995",
"sourceIdentifier": "info@cert.vde.com",
"published": "2024-03-12T09:15:07.343",
"lastModified": "2025-01-23T18:43:09.417",
"vulnStatus": "Analyzed",
"lastModified": "2025-01-30T11:15:11.290",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated remote attacker can modify configurations to perform a remote code execution due to a missing authentication for a critical function."
"value": "An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation."
},
{
"lang": "es",
@ -42,11 +42,11 @@
"weaknesses": [
{
"source": "info@cert.vde.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
"value": "CWE-20"
}
]
}
@ -173,6 +173,10 @@
"Third Party Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-856/",
"source": "info@cert.vde.com"
},
{
"url": "https://cert.vde.com/en/advisories/VDE-2024-011",
"source": "af854a3a-2127-422b-91ae-364da2661108",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0739",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-30T11:15:11.607",
"lastModified": "2025-01-30T11:15:11.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to show subscription's information of others users by changing the \"SUSCBRIPTION_ID\" param of the endpoint \"/demos/embedai/subscriptions/show/<SUSCBRIPTION_ID>\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0740",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-30T11:15:11.763",
"lastModified": "2025-01-30T11:15:11.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Access Control vulnerability has been found in EmbedAI\n\n 2.1 and below. This vulnerability allows an authenticated attacker to obtain chat messages belonging to other users by changing the \u201cCHAT_ID\u201d of the endpoint \"/embedai/chats/load_messages?chat_id=<CHAT_ID>\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0741",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-30T11:15:11.910",
"lastModified": "2025-01-30T11:15:11.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Access Control vulnerability has been found in EmbedAI\n\n 2.1 and below. This vulnerability allows an authenticated attacker to write messages into other users chat by changing the parameter \"chat_id\" of the POST request \"/embedai/chats/send_message\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0742",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-30T12:15:27.560",
"lastModified": "2025-01-30T12:15:27.560",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to obtain files stored by others users by changing the \"FILE_ID\" of the endpoint \"/embedai/files/show/<FILE_ID>\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0743",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-30T12:15:27.707",
"lastModified": "2025-01-30T12:15:27.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to leverage the endpoint \"/embedai/visits/show/<VISIT_ID>\" to obtain information about the visits made by other users. The information provided by this endpoint includes IP address, userAgent and location of the user that visited the web page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0744",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-30T12:15:27.843",
"lastModified": "2025-01-30T12:15:27.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "an Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker change his subscription plan without paying by making a POST request changing the parameters of the \"/demos/embedai/pmt_cash_on_delivery/pay\" endpoint."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0745",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-30T12:15:27.973",
"lastModified": "2025-01-30T12:15:27.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to obtain the backups of the database by requesting the \"/embedai/app/uploads/database/<SQL_FILE>\" endpoint."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0746",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-30T12:15:28.113",
"lastModified": "2025-01-30T12:15:28.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Reflected Cross-Site Scripting vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to craft a malicious URL leveraging the\"/embedai/users/show/<SCRIPT>\" endpoint to inject the malicious JavaScript code. This JavaScript code will be executed when a user opens the malicious URL."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0747",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2025-01-30T12:15:28.253",
"lastModified": "2025-01-30T12:15:28.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Stored Cross-Site Scripting vulnerability has been found in EmbedAI. This vulnerability allows an authenticated attacker to inject a malicious JavaScript code into a message that will be executed when a user opens the chat."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-30T11:00:23.694407+00:00
2025-01-30T13:00:25.493276+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-30T10:15:09.283000+00:00
2025-01-30T12:15:28.253000+00:00
```
### Last Data Feed Release
@ -33,28 +33,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
279440
279454
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `14`
- [CVE-2024-13694](CVE-2024/CVE-2024-136xx/CVE-2024-13694.json) (`2025-01-30T09:15:08.180`)
- [CVE-2024-13732](CVE-2024/CVE-2024-137xx/CVE-2024-13732.json) (`2025-01-30T09:15:08.363`)
- [CVE-2024-13758](CVE-2024/CVE-2024-137xx/CVE-2024-13758.json) (`2025-01-30T09:15:08.547`)
- [CVE-2025-0834](CVE-2025/CVE-2025-08xx/CVE-2025-0834.json) (`2025-01-30T09:15:09.703`)
- [CVE-2025-0860](CVE-2025/CVE-2025-08xx/CVE-2025-0860.json) (`2025-01-30T10:15:08.723`)
- [CVE-2025-0861](CVE-2025/CVE-2025-08xx/CVE-2025-0861.json) (`2025-01-30T10:15:08.907`)
- [CVE-2025-21107](CVE-2025/CVE-2025-211xx/CVE-2025-21107.json) (`2025-01-30T10:15:09.100`)
- [CVE-2025-23007](CVE-2025/CVE-2025-230xx/CVE-2025-23007.json) (`2025-01-30T10:15:09.283`)
- [CVE-2022-43916](CVE-2022/CVE-2022-439xx/CVE-2022-43916.json) (`2025-01-30T12:15:26.867`)
- [CVE-2024-12409](CVE-2024/CVE-2024-124xx/CVE-2024-12409.json) (`2025-01-30T11:15:09.590`)
- [CVE-2024-12524](CVE-2024/CVE-2024-125xx/CVE-2024-12524.json) (`2025-01-30T11:15:10.840`)
- [CVE-2024-13453](CVE-2024/CVE-2024-134xx/CVE-2024-13453.json) (`2025-01-30T11:15:10.993`)
- [CVE-2024-13706](CVE-2024/CVE-2024-137xx/CVE-2024-13706.json) (`2025-01-30T11:15:11.143`)
- [CVE-2025-0739](CVE-2025/CVE-2025-07xx/CVE-2025-0739.json) (`2025-01-30T11:15:11.607`)
- [CVE-2025-0740](CVE-2025/CVE-2025-07xx/CVE-2025-0740.json) (`2025-01-30T11:15:11.763`)
- [CVE-2025-0741](CVE-2025/CVE-2025-07xx/CVE-2025-0741.json) (`2025-01-30T11:15:11.910`)
- [CVE-2025-0742](CVE-2025/CVE-2025-07xx/CVE-2025-0742.json) (`2025-01-30T12:15:27.560`)
- [CVE-2025-0743](CVE-2025/CVE-2025-07xx/CVE-2025-0743.json) (`2025-01-30T12:15:27.707`)
- [CVE-2025-0744](CVE-2025/CVE-2025-07xx/CVE-2025-0744.json) (`2025-01-30T12:15:27.843`)
- [CVE-2025-0745](CVE-2025/CVE-2025-07xx/CVE-2025-0745.json) (`2025-01-30T12:15:27.973`)
- [CVE-2025-0746](CVE-2025/CVE-2025-07xx/CVE-2025-0746.json) (`2025-01-30T12:15:28.113`)
- [CVE-2025-0747](CVE-2025/CVE-2025-07xx/CVE-2025-0747.json) (`2025-01-30T12:15:28.253`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
- [CVE-2024-12236](CVE-2024/CVE-2024-122xx/CVE-2024-12236.json) (`2025-01-30T09:15:07.970`)
- [CVE-2024-25995](CVE-2024/CVE-2024-259xx/CVE-2024-25995.json) (`2025-01-30T11:15:11.290`)
## Download and Usage

View File

@ -209488,6 +209488,7 @@ CVE-2022-4391,0,0,0ff9a05d52d3aa3de06124191e66973bdd39e57b666a47479eb2bcc2b7872e
CVE-2022-43910,0,0,bc61d2b42779fea1fe4b3cf12606acd50183ddcf8c042f7fc0da0e38609033ae,2024-11-21T07:27:21.313000
CVE-2022-43914,0,0,3c548d12690cec58c529bd0607f14f1f9e549fb5350d977603a219363d149ed7,2024-11-21T07:27:21.437000
CVE-2022-43915,0,0,95003edebc2e438c54ea7d643af0a18ec88ff2cda62b4abb538e153c9051149a,2024-09-21T10:15:04.170000
CVE-2022-43916,1,1,edc30601fa538e9f71f687258dc00f8e6eb54cda28c4f819842d66827d497df5,2025-01-30T12:15:26.867000
CVE-2022-43917,0,0,816f682456b6e66e0347743e10013b668c623790e5f5ce86f6345eda01d980aa,2024-11-21T07:27:21.630000
CVE-2022-43919,0,0,0180961785dd7055e92f4af184de1616827bbeafac8a7aafaa021d7e8928d765,2024-11-21T07:27:21.753000
CVE-2022-4392,0,0,edca1725f3b5a668165560e598881401f25d1f63ae808c1a347f81e7a14b86d1,2024-11-21T07:35:11.077000
@ -245313,7 +245314,7 @@ CVE-2024-12232,0,0,77e6bcdf869c1b2c2ff00e17ec72efc5854b4ce8067c2c9fccf0d3cc1c2d3
CVE-2024-12233,0,0,d89c9263a4f22f201b1dce8be51578aec307181a11a72f57d5d6a093a558942d,2024-12-10T23:24:57.237000
CVE-2024-12234,0,0,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000
CVE-2024-12235,0,0,92689efaa37165c78224efb1efe409523be7fb3f3558d4576511504eb96aac91,2024-12-05T18:15:21.660000
CVE-2024-12236,0,1,f78ff3b6e1937e0a0b8855ba0165cfb50cc78b4d879a8a6174545df90419a7d2,2025-01-30T09:15:07.970000
CVE-2024-12236,0,0,f78ff3b6e1937e0a0b8855ba0165cfb50cc78b4d879a8a6174545df90419a7d2,2025-01-30T09:15:07.970000
CVE-2024-12237,0,0,bc9c0d4c537bace6ba73f5084a4978adc8d5b928619c3c4d0e52cb7bef9d5351,2025-01-03T23:15:06.473000
CVE-2024-12238,0,0,0b2506120279c72470fe6ced119aba981e066d08bdac68bd9b96e39e9d942dde,2024-12-29T06:15:05.487000
CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d141,2024-12-17T03:15:06.710000
@ -245450,6 +245451,7 @@ CVE-2024-12405,0,0,631a04fc890c6ac2fbe1fd822df1e67f289f1ef7b029b11f0950a96d4993c
CVE-2024-12406,0,0,3a24bd925fcaee835bc0ee30f7ad38b16626ae1e5c8470fedd28227d3dd60123,2024-12-12T05:15:12.210000
CVE-2024-12407,0,0,90207e0ed6e0318c2d7902b5431b42ac4002510e342567216f54a8133c6105ee,2025-01-11T08:15:25.093000
CVE-2024-12408,0,0,c9a97800ebdc971055fe039c0934b7c899913355f0545cc6cb71b6253bd484f6,2024-12-21T10:15:08.067000
CVE-2024-12409,1,1,472d63a2d7712e989f10bec4c1c315ad6af0160d4c6a20e646766143bfd8924c,2025-01-30T11:15:09.590000
CVE-2024-1241,0,0,ba82bb77c28ed45b324839e72710669d8c2af006c45eeed23dee90a28ff67ea8,2024-11-21T08:50:08.490000
CVE-2024-12411,0,0,fca8eab422ceda64b215d958b150a7f03625a9aa9df8afa22fe2b27e73430e47,2024-12-14T05:15:10.437000
CVE-2024-12412,0,0,73803094a00fe18ec7862bec4f3d5df80208f9d752aff4dcb1f7ac4bf52a33cb,2025-01-11T08:15:25.320000
@ -245554,6 +245556,7 @@ CVE-2024-1252,0,0,d03beb126367df5b21be601ec7e2ecf5f48cece91d0754af14f589827736f3
CVE-2024-12520,0,0,886c4e74a7980fda960a92b5a62600949c9fea0564fe68f7b22e9e1786c04bac,2025-01-11T08:15:25.720000
CVE-2024-12521,0,0,5ef3982f9bbd97c224cda76723fce3c98e248e5aec737e88bf0802be4e43c585,2025-01-08T04:15:06.827000
CVE-2024-12523,0,0,185a41d328f0e130d8ed17ada12f64a855433449910369cbbb025fff8ce0f4d8,2024-12-14T05:15:11.640000
CVE-2024-12524,1,1,a7e4a9b3311a8a0073b9e147a51f1de76e2891ff6a8d4f05e3cc4a998c73e852,2025-01-30T11:15:10.840000
CVE-2024-12526,0,0,b192d6e45212a3c6d09a8a6cd2198d071bb3ba4da94a4e2bf151be7ad2c18324,2024-12-12T05:15:13.577000
CVE-2024-12527,0,0,a734fa6fae374e1f78bf0ed5836acb2d88c39ac4a4907ac1228b4122e65ad067,2025-01-11T08:15:25.913000
CVE-2024-12528,0,0,f4af9cf65ffcc6bdde0559258762f791c056b91239412bbfffbf03d13aedbfde,2025-01-07T04:15:08.543000
@ -246224,6 +246227,7 @@ CVE-2024-13448,0,0,d06b5093c3b878141c9c6b7291c254e64929eea876294371f5adcd8b69fe2
CVE-2024-13449,0,0,b603466190e6e620bd51a093bef2226b1aa9a640893cd2b54c10f03577e6ca0b,2025-01-25T09:15:07.557000
CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649da,2024-11-21T08:50:22.667000
CVE-2024-13450,0,0,6d0c6e9ad465925bb0f00b48f72e6f84db20d9e217507e863ef423d4f9e1193a,2025-01-25T09:15:07.733000
CVE-2024-13453,1,1,473c29ba7653e9a4561fc924dae0d70ce15e0669c91c3d536d12763bed8ad1f6,2025-01-30T11:15:10.993000
CVE-2024-13454,0,0,14313d18c59abf0795f9e65c924b2232675b3f5fcf8c69fe1d32af5f5cac5a65,2025-01-21T20:15:30.793000
CVE-2024-13457,0,0,ee21f13468edd90777973ef610f3f5c579a070972ee0693035f0f1c680be9101,2025-01-30T07:15:07.067000
CVE-2024-13458,0,0,a0d55037d220aaf8fdb1343c6a981e032ff9c796368506b8230ae875396a583f,2025-01-25T08:15:09.337000
@ -246289,19 +246293,20 @@ CVE-2024-1368,0,0,e78cd290aff3eda879ea71814281e9fb9dbaef60630fac7d18ff14dae3d223
CVE-2024-13680,0,0,f3164c1a021ffb39e27590d49b20eab131951c6817a6dc8655e0dfc9f53950e4,2025-01-24T07:15:06.930000
CVE-2024-13683,0,0,afca8ca5733f1981ab92ff6f92163a36f62ba84bc4cae91c9eb4b4db6612f745,2025-01-24T07:15:08.523000
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
CVE-2024-13694,1,1,ebe38224e859cd407ff4de74de6e70b014035e321c635173f5352f302ebed11f,2025-01-30T09:15:08.180000
CVE-2024-13694,0,0,ebe38224e859cd407ff4de74de6e70b014035e321c635173f5352f302ebed11f,2025-01-30T09:15:08.180000
CVE-2024-13696,0,0,1705bcf2f6a6958e20414c0c17b533dd95f6dfcba36bb76e0b9f7d75e553f199,2025-01-29T08:15:19.677000
CVE-2024-13698,0,0,dc17e4312525981bb14f68ea913383417af07334780551d0e9684f2f5489da45,2025-01-24T16:15:34.597000
CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000
CVE-2024-13706,1,1,976da1233572e573fe3f2516def8bf6487738dc1c53cde5cfe4815b946802565,2025-01-30T11:15:11.143000
CVE-2024-13709,0,0,7d11e0e002d231ab97d4c4838853b33e61be12c236e56c435ef75a396b4f88ea,2025-01-25T04:15:07.670000
CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000
CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000
CVE-2024-13721,0,0,1ec94cb9c62b02c9472486b901c3addbef65df476872a8f8db6b902dfdcff790,2025-01-25T06:15:27.860000
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
CVE-2024-13732,1,1,b775a3a52bd8c32b27fbee5637d183d86ad28923005f664ac49c2fca8b421b84,2025-01-30T09:15:08.363000
CVE-2024-13732,0,0,b775a3a52bd8c32b27fbee5637d183d86ad28923005f664ac49c2fca8b421b84,2025-01-30T09:15:08.363000
CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000
CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000
CVE-2024-13758,1,1,a097fd11965a28b272757c9dfc06c78d140777aeb26eb25ec8fe43c25c2e8873,2025-01-30T09:15:08.547000
CVE-2024-13758,0,0,a097fd11965a28b272757c9dfc06c78d140777aeb26eb25ec8fe43c25c2e8873,2025-01-30T09:15:08.547000
CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
@ -251499,7 +251504,7 @@ CVE-2024-25991,0,0,bdaff74cc860fabd9fea722818c8994d3cd8818997d8278a23eb0063a9c89
CVE-2024-25992,0,0,840e46a05b6940bfb1db546201bd43418c17bffa3b756f10bdfcd373865bb822,2024-11-21T09:01:43.743000
CVE-2024-25993,0,0,5b2f5945913ce3c3566ab4fe77880caa269bd5b4dd62fdc2a7aa83b7078f8879,2024-11-21T09:01:43.930000
CVE-2024-25994,0,0,670065430607292775a7474d976ea7d198212c4682b62df1154867dae2bd2ab0,2025-01-24T07:15:08.697000
CVE-2024-25995,0,0,7552299c1dfc3c97b1182cc66dfde5945aeb024331a017e1db18f4d194757dc2,2025-01-23T18:43:09.417000
CVE-2024-25995,0,1,c0494aab7aaed2da7ca25df326904fe5524b5dc5acac21d2e0c7fe2787a93e46,2025-01-30T11:15:11.290000
CVE-2024-25996,0,0,16b8380c30ed5f6b81a7f5a46529e1e7dec5cde09e2781957b3a8fde65e443ca,2025-01-23T18:44:35.577000
CVE-2024-25997,0,0,2054c6e45ee06908cc541c3f2efce9f95fc1b24a08ed054ed285d56b0320eb76,2025-01-23T18:45:15.403000
CVE-2024-25998,0,0,b28e09d11459c221a914b27ba58b9d7219c4ee3c0b56121118df5d2645bf87b6,2025-01-24T07:15:09.093000
@ -277988,6 +277993,15 @@ CVE-2025-0732,0,0,26a5f94ce02cc96eea758a704667aea8c69a327e5d298e23b9658a1917d5ba
CVE-2025-0733,0,0,c170d90349bafcc8945875f4b3d3674bb49d9022b735f6bc487d0020af50e491,2025-01-27T18:15:40.760000
CVE-2025-0734,0,0,2b0fbea7bc08e89f2b572e3c6521a570d94025a1015e33909cf99289b073792e,2025-01-27T19:15:19.130000
CVE-2025-0736,0,0,2fbf9a82d2eb84a70c138a527dc373077f185d1a8eb3dfa65a9134c893f72229,2025-01-28T09:15:09.543000
CVE-2025-0739,1,1,06db79985b3ffc9ce679a6b1532d26dde689388e80d0abf5747f95fe2433e285,2025-01-30T11:15:11.607000
CVE-2025-0740,1,1,6070ddeff96009c0ce06c222e5a51193e82b3688197e9979a0b1546db6a4a197,2025-01-30T11:15:11.763000
CVE-2025-0741,1,1,348e3643789d47ce91cd6ec4138fef1e47dd136e35e0dae721231e89cfbc4d56,2025-01-30T11:15:11.910000
CVE-2025-0742,1,1,793d1e08b76774d68947cd7ec35156047493c8eb39f1bd7636cac8f7b8a6ad63,2025-01-30T12:15:27.560000
CVE-2025-0743,1,1,3d5e1cec719e24b9daf9d6c2ff831dc25a7afe2c8a7e2b00ffbf6a37aa58519b,2025-01-30T12:15:27.707000
CVE-2025-0744,1,1,07fff016d9f54a962cba61f79a7a5864f2056ff9ec4b74696e8f068de5c2ac0a,2025-01-30T12:15:27.843000
CVE-2025-0745,1,1,6bb2c2e797ac952dcef8016e0ec337cab5855b2b9fb40b6c7e36120f6e8df265,2025-01-30T12:15:27.973000
CVE-2025-0746,1,1,82f05cf4ac1b3bbdc81944686720f25863230e2cd080d0ac3a95fb013a5f8b26,2025-01-30T12:15:28.113000
CVE-2025-0747,1,1,ad830f5dbbc9626af6268f62439b9a48dc2e424f268194edc6adccc62e95bfbc,2025-01-30T12:15:28.253000
CVE-2025-0750,0,0,f0dcf8db3f28c907442c44817e918052a296a00a1a12376f3cb7890aea55adf6,2025-01-28T10:15:09.317000
CVE-2025-0751,0,0,9f427bf6982d8d00073ea612bcd95872a42bd7d0903214c0ac2165ec846c062b,2025-01-27T20:15:34.587000
CVE-2025-0752,0,0,1b42777fbab8f210bb46e72869b6d162494a92c3430459e509f1ea2dbae1520b,2025-01-28T10:15:09.493000
@ -278015,7 +278029,7 @@ CVE-2025-0802,0,0,25d4724a5f59ec41d081db9fe30f350340de9808525e7ebdb2de0977ada211
CVE-2025-0803,0,0,3f62b1106b9b241043cd75bd2f1af692daaa38b2e387b0f59bc1dafe03d8bba2,2025-01-29T02:15:27.723000
CVE-2025-0804,0,0,92d829297868e08fc58c84215de89a1b6c3e7063565ee446f2d16b4211c5e258,2025-01-29T04:15:07.193000
CVE-2025-0806,0,0,457ccc849d51cf01d8a6f731c86ad5d9c7b0b2b236df12a7bec76c069f344e74,2025-01-29T03:15:06.900000
CVE-2025-0834,1,1,69d4601cb385a5207b3f60f39c37ba05447d3080f10cb05b9f81bad71cc46120,2025-01-30T09:15:09.703000
CVE-2025-0834,0,0,69d4601cb385a5207b3f60f39c37ba05447d3080f10cb05b9f81bad71cc46120,2025-01-30T09:15:09.703000
CVE-2025-0840,0,0,a7c58fa4e0ce69af30f8715823f12410e36099cec55a9762135e8f1b574089a6,2025-01-29T20:15:35.007000
CVE-2025-0841,0,0,5bffa2ec7965608d2e54d39bbd52de0c242469924a21cfc1ceec4dd7102b7d58,2025-01-29T21:15:20.973000
CVE-2025-0842,0,0,38cc4a8025ec24c462922fa371791c66c4862e27e0e666a0e81248517d26bffc,2025-01-29T22:15:30.283000
@ -278026,8 +278040,8 @@ CVE-2025-0847,0,0,0a7600abd9c4c4a8ba48a01fbe3301dceafaf8bc59cdeac7b4d5032a63057f
CVE-2025-0848,0,0,29b23e58777e7d4680c64590420c76142330bc9428b559d8eda7ca20b5e2d7bb,2025-01-30T02:15:25.597000
CVE-2025-0849,0,0,2080b1314603620cb3f8746fb1f255655b1b7caaf0a70104b6b1966e3468cbf3,2025-01-30T02:15:25.783000
CVE-2025-0851,0,0,49552e625992bdb3a412aeacb5ef8fcb2bb7c90acfd6cc180846494a5bc52610,2025-01-29T22:15:30.463000
CVE-2025-0860,1,1,57eb159251c47f86690502a6468f7bb73145fb297d274d97d9f0ac6ac7ddded6,2025-01-30T10:15:08.723000
CVE-2025-0861,1,1,62f8d40ca04d4b5490a690c9c53c17fca5090134b2a22ca70beef3bfaf8e9ef0,2025-01-30T10:15:08.907000
CVE-2025-0860,0,0,57eb159251c47f86690502a6468f7bb73145fb297d274d97d9f0ac6ac7ddded6,2025-01-30T10:15:08.723000
CVE-2025-0861,0,0,62f8d40ca04d4b5490a690c9c53c17fca5090134b2a22ca70beef3bfaf8e9ef0,2025-01-30T10:15:08.907000
CVE-2025-20014,0,0,708b5660539e4ab2830a732991daead462d3c8df88b4205953edf58b017cb8b0,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
@ -278053,7 +278067,7 @@ CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a16501
CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000
CVE-2025-21101,0,0,1ef0167ef283dbabcdd7bd0e2debfd81378d1bf596b30170903b5a150ed83abb,2025-01-15T05:15:09.097000
CVE-2025-21102,0,0,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000
CVE-2025-21107,1,1,f6a3cd48c035c96b02630639e70765c960bf1a51a6020aecdb61017fadef6d98,2025-01-30T10:15:09.100000
CVE-2025-21107,0,0,f6a3cd48c035c96b02630639e70765c960bf1a51a6020aecdb61017fadef6d98,2025-01-30T10:15:09.100000
CVE-2025-21111,0,0,36449c466fabe660f3fc2f10d8992e6a7d9c5e3d2cf72d3dce2cc840c6da552b,2025-01-24T19:11:42.417000
CVE-2025-21122,0,0,ea413e582ae453fe56a0d16448a41ab087511f8fc84dce169b1dd1e0cebc7d9c,2025-01-14T19:15:33.070000
CVE-2025-21127,0,0,f4bc482a58e381a20321cbbdeaa050ed9cde9073a4c43797f44f5c980d42dfdf,2025-01-14T19:15:33.230000
@ -278720,7 +278734,7 @@ CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c597
CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000
CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000
CVE-2025-23006,0,0,b3740c3859b8a4699d7be6a4cb26c3615e83be583cc4689a6f760ded3dcd5dec,2025-01-27T18:41:17.650000
CVE-2025-23007,1,1,701c6b7319256781b35f2ac3ce69cecd8bf921f3065b0394fe019c623e4f41ae,2025-01-30T10:15:09.283000
CVE-2025-23007,0,0,701c6b7319256781b35f2ac3ce69cecd8bf921f3065b0394fe019c623e4f41ae,2025-01-30T10:15:09.283000
CVE-2025-23011,0,0,6ddf557c800a2528d5545b3d7911f3e609af1e4dccfa1a674d933303fd996813,2025-01-23T21:15:15.010000
CVE-2025-23012,0,0,6b2b3bdfc203a9a9abe46f57ea7f825047d32c413c20c9ae87597afaa81bd3df,2025-01-23T21:15:15.173000
CVE-2025-23013,0,0,1fb74d6ea76ff5844d786cdd2a74f412fea41ae3954a5796fa59991a0a874edb,2025-01-16T22:15:40.520000

Can't render this file because it is too large.