mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-12-15 19:34:16 +00:00
Auto-Update: 2025-03-19T13:00:19.786508+00:00
This commit is contained in:
parent
6d2818943d
commit
977dcd9644
60
CVE-2024/CVE-2024-129xx/CVE-2024-12920.json
Normal file
60
CVE-2024/CVE-2024-129xx/CVE-2024-12920.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-12920",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-19T12:15:12.797",
|
||||
"lastModified": "2025-03-19T12:15:12.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all functions in all versions up to, and including, 4.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files, update theme options, export widget options, import widget options, generate backups, restore backups, and reset theme options."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/food-bakery-restaurant-bakery-responsive-wordpress-theme/18970331",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9af8267f-48b1-4537-8985-6af1245ceed5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
60
CVE-2024/CVE-2024-134xx/CVE-2024-13442.json
Normal file
60
CVE-2024/CVE-2024-134xx/CVE-2024-13442.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13442",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-19T12:15:13.857",
|
||||
"lastModified": "2025-03-19T12:15:13.857",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.0. This is due to the plugin not properly validating a user's identity prior to (1) performing a post-booking auto-login or (2) updating their profile details (e.g. password). This makes it possible for unauthenticated attackers to (1) login as an arbitrary user if their email address is known or (2) change an arbitrary user's password, including administrators, and leverage that to gain access to their account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/service-finder-service-and-business-listing-wordpress-theme/15208793",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/827b5482-cb42-4aaa-80b5-3d0143fcead8?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
60
CVE-2024/CVE-2024-139xx/CVE-2024-13933.json
Normal file
60
CVE-2024/CVE-2024-139xx/CVE-2024-13933.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13933",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-19T12:15:14.003",
|
||||
"lastModified": "2025-03-19T12:15:14.003",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7. This is due to missing or incorrect nonce validation on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all functions. This makes it possible for unauthenticated attackers to delete arbitrary files, update theme options, export widget options, import widget options, generate backups, restore backups, and reset theme options via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/food-bakery-restaurant-bakery-responsive-wordpress-theme/18970331",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45eda79d-f999-413e-88ce-b7d06f09f191?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26795",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:08.740",
|
||||
"lastModified": "2024-11-21T09:03:05.433",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-19T11:42:41.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,59 +15,225 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: riscv: Sparse-Memory/vmemmap fuera de los l\u00edmites corrige Offset vmemmap para que la primera p\u00e1gina de vmemmap se asigne a la primera p\u00e1gina de la memoria f\u00edsica para garantizar que vmemmap Los l\u00edmites se respetar\u00e1n durante las operaciones pfn_to_page()/page_to_pfn(). Las macros de conversi\u00f3n producir\u00e1n direcciones SV39/48/57 correctas para cada DRAM_BASE posible/v\u00e1lida dentro de los l\u00edmites de la memoria f\u00edsica. v2: Abordar los comentarios de Alex"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4",
|
||||
"versionEndExcluding": "5.10.212",
|
||||
"matchCriteriaId": "BEAE9FEA-B6FA-4969-92DF-2BA82E59C0AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.151",
|
||||
"matchCriteriaId": "EEAFD33E-C22F-4FB1-A417-9C96AB3E0358"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.81",
|
||||
"matchCriteriaId": "EC825B0E-DFCA-4034-9B92-F111A4E2A732"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.21",
|
||||
"matchCriteriaId": "B19074A2-9FE5-4E7D-9E2D-020F95013ADA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.9",
|
||||
"matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
56
CVE-2024/CVE-2024-456xx/CVE-2024-45644.json
Normal file
56
CVE-2024/CVE-2024-456xx/CVE-2024-45644.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45644",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-03-19T12:15:14.153",
|
||||
"lastModified": "2025-03-19T12:15:14.153",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security ReaQta 3.12 allows a privileged user to upload or transfer files of dangerous types that can be automatically processed within the product's environment."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7186613",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
60
CVE-2025/CVE-2025-25xx/CVE-2025-2511.json
Normal file
60
CVE-2025/CVE-2025-25xx/CVE-2025-2511.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-2511",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-19T12:15:14.313",
|
||||
"lastModified": "2025-03-19T12:15:14.313",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The AHAthat Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' parameter in all versions up to, and including, 1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/ahathat/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cde440a2-55f8-406a-b81b-919028f0e887?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
64
CVE-2025/CVE-2025-25xx/CVE-2025-2512.json
Normal file
64
CVE-2025/CVE-2025-25xx/CVE-2025-2512.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-2512",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-19T12:15:14.463",
|
||||
"lastModified": "2025-03-19T12:15:14.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The File Away plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check and missing file type validation in the upload() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/file-away/trunk/lib/cls/class.fileaway_management.php#L1094",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/file-away/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9a93313d-a5d7-4109-93c5-b2da26e7a486?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
||||
26
README.md
26
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-19T11:00:20.471466+00:00
|
||||
2025-03-19T13:00:19.786508+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-19T10:49:05.493000+00:00
|
||||
2025-03-19T12:15:14.463000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,28 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
285661
|
||||
285667
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-12136](CVE-2024/CVE-2024-121xx/CVE-2024-12136.json) (`2025-03-19T09:15:12.710`)
|
||||
- [CVE-2024-12137](CVE-2024/CVE-2024-121xx/CVE-2024-12137.json) (`2025-03-19T09:15:14.090`)
|
||||
- [CVE-2024-13790](CVE-2024/CVE-2024-137xx/CVE-2024-13790.json) (`2025-03-19T09:15:14.250`)
|
||||
- [CVE-2025-27018](CVE-2025/CVE-2025-270xx/CVE-2025-27018.json) (`2025-03-19T09:15:14.457`)
|
||||
- [CVE-2024-12920](CVE-2024/CVE-2024-129xx/CVE-2024-12920.json) (`2025-03-19T12:15:12.797`)
|
||||
- [CVE-2024-13442](CVE-2024/CVE-2024-134xx/CVE-2024-13442.json) (`2025-03-19T12:15:13.857`)
|
||||
- [CVE-2024-13933](CVE-2024/CVE-2024-139xx/CVE-2024-13933.json) (`2025-03-19T12:15:14.003`)
|
||||
- [CVE-2024-45644](CVE-2024/CVE-2024-456xx/CVE-2024-45644.json) (`2025-03-19T12:15:14.153`)
|
||||
- [CVE-2025-2511](CVE-2025/CVE-2025-25xx/CVE-2025-2511.json) (`2025-03-19T12:15:14.313`)
|
||||
- [CVE-2025-2512](CVE-2025/CVE-2025-25xx/CVE-2025-2512.json) (`2025-03-19T12:15:14.463`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2020-36780](CVE-2020/CVE-2020-367xx/CVE-2020-36780.json) (`2025-03-19T10:38:49.887`)
|
||||
- [CVE-2021-47006](CVE-2021/CVE-2021-470xx/CVE-2021-47006.json) (`2025-03-19T10:49:05.493`)
|
||||
- [CVE-2022-44595](CVE-2022/CVE-2022-445xx/CVE-2022-44595.json) (`2025-03-19T10:16:58.517`)
|
||||
- [CVE-2025-26473](CVE-2025/CVE-2025-264xx/CVE-2025-26473.json) (`2025-03-19T10:34:55.550`)
|
||||
- [CVE-2025-30236](CVE-2025/CVE-2025-302xx/CVE-2025-30236.json) (`2025-03-19T07:15:34.313`)
|
||||
- [CVE-2024-26795](CVE-2024/CVE-2024-267xx/CVE-2024-26795.json) (`2025-03-19T11:42:41.993`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
||||
26
_state.csv
26
_state.csv
@ -159569,7 +159569,7 @@ CVE-2020-36777,0,0,3e77b01802dc8c702924469ec2c343d257a461f9541fff65f5353927271f9
|
||||
CVE-2020-36778,0,0,14964463b56c3f46cf0d7e1681e081ed056ba6255f767b3c58eee346e18635d2,2024-12-06T17:56:05.877000
|
||||
CVE-2020-36779,0,0,b340ce85ed5e7b477f5fb274c0fd8555d5b7508db3f0bf7a88d4f3d3c6028939,2024-12-06T16:14:26.157000
|
||||
CVE-2020-3678,0,0,f190c04766926ca91c70904eb559acd3c59e7fe8642b7bee0d398ac215f41720,2024-11-21T05:31:33.650000
|
||||
CVE-2020-36780,0,1,2b6beff0e1ba039223eda294a7df717d0d4761917e922d1dc63968ca25fb1064,2025-03-19T10:38:49.887000
|
||||
CVE-2020-36780,0,0,2b6beff0e1ba039223eda294a7df717d0d4761917e922d1dc63968ca25fb1064,2025-03-19T10:38:49.887000
|
||||
CVE-2020-36781,0,0,002d82cc7803a268ecca16f3d91e0bf2d619360efb63b1688924453870cba627,2024-12-06T16:19:35.777000
|
||||
CVE-2020-36782,0,0,7cfa043aa5ddbfe9fc75b67a2d014bf83a9b10b337589bf1682cc032ffbd860c,2024-12-06T18:02:53.493000
|
||||
CVE-2020-36783,0,0,e286124c61448f7fd51b57f763b347528856a4a1ca56c75478cf046c0bba56c6,2024-12-06T17:37:43.990000
|
||||
@ -187296,7 +187296,7 @@ CVE-2021-47002,0,0,8e2e69dd823954645422556b82a8f561e637a960eb547819ec3f275f452f3
|
||||
CVE-2021-47003,0,0,d04fc40119c75046b1674e0b1232d9883e95a4b2b8d484d76d0bd053931c6730,2024-12-09T18:25:35.537000
|
||||
CVE-2021-47004,0,0,18a085cc6c26085c72758be28fd43705328b7a300fb84b0333d9916289e05638,2025-01-08T17:43:50.870000
|
||||
CVE-2021-47005,0,0,3fbd5c5ade061cd7cb91f258c837f64317568fee512c60e0acf3a8e8df4b123d,2024-12-09T18:23:57.377000
|
||||
CVE-2021-47006,0,1,8b7923e8bfbeebc4a8acffb359bf14711b8cdd28c2b363546d9328b954c8a1a8,2025-03-19T10:49:05.493000
|
||||
CVE-2021-47006,0,0,8b7923e8bfbeebc4a8acffb359bf14711b8cdd28c2b363546d9328b954c8a1a8,2025-03-19T10:49:05.493000
|
||||
CVE-2021-47007,0,0,49fb8d6dc96a504a0d60085eaad9189d435cf6c6248575e653fa2c523ed518c4,2025-01-08T17:58:51.337000
|
||||
CVE-2021-47008,0,0,424b2b46b9ee1112b21b12d194f2ab759ab5ded3180361e3ca8f70ab9520ff7b,2024-12-09T18:24:06.900000
|
||||
CVE-2021-47009,0,0,5d51ef0833cdc3833bbaef02872b579b5eeb6431b56ac636d07b9c088ca5b5ca,2024-12-09T18:24:16.137000
|
||||
@ -210037,7 +210037,7 @@ CVE-2022-44590,0,0,8419b28e3a0fb49ed6ee057d9814f15968322a8d49125a15e7831fc76db33
|
||||
CVE-2022-44591,0,0,c847c79694e4ea0add459ff62a58817005ae0ba77ef3c55979619aef08bd2f9a,2024-11-21T07:28:11
|
||||
CVE-2022-44593,0,0,90f8ad45672b1e43741913eaec2f22fe4107cda8646e72a10d74cce24b42f4d1,2024-11-21T07:28:11.120000
|
||||
CVE-2022-44594,0,0,3797627f5d9a7951679266893bd3b9e56dfea89d1537aef29a76d6259b20dd89,2024-11-21T07:28:11.253000
|
||||
CVE-2022-44595,0,1,f6edec7b746eadd6b80ddc08b85bd3174a58e64c71edc46fa6aa704293243982,2025-03-19T10:16:58.517000
|
||||
CVE-2022-44595,0,0,f6edec7b746eadd6b80ddc08b85bd3174a58e64c71edc46fa6aa704293243982,2025-03-19T10:16:58.517000
|
||||
CVE-2022-4460,0,0,5d416431f18d1983565581f213317edee4176c1705777f42be098b34a9819d28,2024-11-21T07:35:18.607000
|
||||
CVE-2022-44606,0,0,2ccd26fd5b50f4804b17f1c50f3dc9bbf076fa560859eebce0d574433978d320,2024-11-21T07:28:11.490000
|
||||
CVE-2022-44608,0,0,ad65aee2635b2f9ff93e46fb7d8cb8cacaf9b74447958429b04124cd4700ade4,2024-11-21T07:28:11.590000
|
||||
@ -246341,8 +246341,8 @@ CVE-2024-12130,0,0,f13cb67c00f6dcc27d0c31ba4dea31c8dabc6f66eb953b7214a560c5a851f
|
||||
CVE-2024-12131,0,0,dbf0aa17931777a7d2a18f8d74d983fb90b7cc72d860577b6997f11baa1caf8d,2025-02-05T19:34:09.820000
|
||||
CVE-2024-12132,0,0,b06e93c25499732ca815413e2d46627c97d1199e136eda86bfe61d37a4878c0b,2025-02-05T19:37:43.237000
|
||||
CVE-2024-12133,0,0,6bf377b889cff4de6171d2a9027b1a17bce7f2dd91b7456e427087f02e89773b,2025-02-21T13:15:10.430000
|
||||
CVE-2024-12136,1,1,1af49f9e3f90e9a8c9c087c1b3f62a2482bb6ae8bfc2d32c91441524251d5782,2025-03-19T09:15:12.710000
|
||||
CVE-2024-12137,1,1,5eaf2bfba6f7164186bceacf974a7436d1572763ae1b2a7de8f61242544a1846,2025-03-19T09:15:14.090000
|
||||
CVE-2024-12136,0,0,1af49f9e3f90e9a8c9c087c1b3f62a2482bb6ae8bfc2d32c91441524251d5782,2025-03-19T09:15:12.710000
|
||||
CVE-2024-12137,0,0,5eaf2bfba6f7164186bceacf974a7436d1572763ae1b2a7de8f61242544a1846,2025-03-19T09:15:14.090000
|
||||
CVE-2024-12138,0,0,da6ee7fbee0e9075f414529b46a16ebad54f1168ad899da7c1771d5519a5d924,2024-12-04T14:15:19.413000
|
||||
CVE-2024-1214,0,0,de1b224b633b4f15934a6c113718a0fee219da295a9b4587f21a72c198d9d833,2025-01-29T16:26:04.440000
|
||||
CVE-2024-12140,0,0,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000
|
||||
@ -247045,6 +247045,7 @@ CVE-2024-12917,0,0,d8b07f4bcfb7f08bc2f227c861fa1e6577e90bb6cc2a5373042cad71096d6
|
||||
CVE-2024-12918,0,0,1035e9b27a2101293cfa4dc6b919699346b5a15e701cb7622e7b4fe97d2a43ff,2025-02-24T15:15:12.537000
|
||||
CVE-2024-12919,0,0,267cd9cf604b008de2f506d778d176d8d6c4286f989194d3cfe533433123b414,2025-01-22T17:29:01.883000
|
||||
CVE-2024-1292,0,0,38d9bc6a557167174bf37c6662c68d5de6a783380fb5a30941c923054e3f2f16,2024-11-21T08:50:14.983000
|
||||
CVE-2024-12920,1,1,d6f114f30dddb8026f9b48238182ca4b26050e33db17a50e2255eac2718edb6a,2025-03-19T12:15:12.797000
|
||||
CVE-2024-12921,0,0,66514a714672aa9f260463c855267bb42fb72ace141e13c7370829c4ab97853e,2025-01-30T06:15:29.653000
|
||||
CVE-2024-12922,0,0,3c37006850d140c98149834c97117e5d90bae2ea48a41001d4db464e7915c4fd,2025-03-19T06:15:15.120000
|
||||
CVE-2024-12926,0,0,34efd8bf14c03e0212df6da35930928f45cf16a2638f05d82d7eb2cf46388400,2024-12-27T15:15:10.360000
|
||||
@ -247560,6 +247561,7 @@ CVE-2024-13439,0,0,2f059501bc7533dd49b97287e80dce5e31332841fdcf6ed4dd7d300b721f1
|
||||
CVE-2024-1344,0,0,3c7e3680ada5d2af6c947ff7713f6316fa39154980892782020553f5d0042cd7,2024-11-21T08:50:22.543000
|
||||
CVE-2024-13440,0,0,5766e7a438a8e4269354aacca2cf4360d814b2b0ba936161bc318042a1e4abc8,2025-02-13T17:17:19.413000
|
||||
CVE-2024-13441,0,0,c4feb7fa45e58abcf7c01d5df380ea3f267be46791773adc8606a649a8a16fa9,2025-02-04T19:37:08.100000
|
||||
CVE-2024-13442,1,1,07100fbb2c07d587b77e0245f7176c7fe6e4992c54326ed9b3e9e185dd254356,2025-03-19T12:15:13.857000
|
||||
CVE-2024-13443,0,0,45895be01f051ac07538c729bc325487d84fe178af27003bb0a84004bc553820,2025-02-19T04:15:10.360000
|
||||
CVE-2024-13444,0,0,f559be4a09d3b0d4718253e232ed1d6b01b700beffd4896c1d6f62eac4116d3c,2025-01-21T11:15:09.450000
|
||||
CVE-2024-13445,0,0,e320e7547c6eda6e85243dd50e1b8e91047011502ea9fdec246dbbf1d042f305,2025-02-25T20:22:07.157000
|
||||
@ -247884,7 +247886,7 @@ CVE-2024-13783,0,0,4d1adc087edd34d52079e199658ef345cbd94c9c74350c99493fda1d34bf2
|
||||
CVE-2024-13787,0,0,0eff21fc23493e01651531789dedbb01e9f9791c6b2318877412ee79834420bc,2025-03-05T10:15:16.810000
|
||||
CVE-2024-13789,0,0,2b0af9ac1cf71402f1bdf617ac72ff1dc3e5b91a3734626a9c4e88889f4b7dad,2025-02-25T20:56:25.757000
|
||||
CVE-2024-1379,0,0,80ef94f14b81af8686333ad09c1ad2f5017c23d1adeba6105930342040ebce86,2024-11-21T08:50:27.157000
|
||||
CVE-2024-13790,1,1,cd675d4c0ca7b04b91c02c99109a1d8f6e0c7940419d662d1d919c9461a478e2,2025-03-19T09:15:14.250000
|
||||
CVE-2024-13790,0,0,cd675d4c0ca7b04b91c02c99109a1d8f6e0c7940419d662d1d919c9461a478e2,2025-03-19T09:15:14.250000
|
||||
CVE-2024-13791,0,0,87d34d666cc6abe64fd811a08f4df25c9dcd54e5f0bd075f781061adfbd26e98,2025-02-25T04:01:52.803000
|
||||
CVE-2024-13792,0,0,95c136c58ffd0d86dab2da9aa86fa75170f9d7e438d0612c3363162ba0d1c0ed,2025-02-25T20:56:55.553000
|
||||
CVE-2024-13794,0,0,deb22703f68657fb6f9904f289dd9bf5c49f5d408fc334842a7f50a56248c381,2025-02-25T19:38:05.950000
|
||||
@ -247992,6 +247994,7 @@ CVE-2024-13919,0,0,7c5ab092a55439dc8c02bc97bab1d29d32b755887059a3b61b9ad224908cb
|
||||
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
||||
CVE-2024-13924,0,0,e36e603c0c6b6f9989e25340b54970575d329cf8a84edf152fc0708bf80f6812,2025-03-12T16:23:39.567000
|
||||
CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000
|
||||
CVE-2024-13933,1,1,5443dbf12b39bfc2acfe1adbc39c04300f987a9bcfb56ac22130681b41f5e2db,2025-03-19T12:15:14.003000
|
||||
CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000
|
||||
CVE-2024-1395,0,0,aa14344d5f3c417e75370dfad240218276bccf85a1cff8add87ecef1ce7213df,2024-11-21T08:50:29.483000
|
||||
CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000
|
||||
@ -253878,7 +253881,7 @@ CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f
|
||||
CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
|
||||
CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
|
||||
CVE-2024-26794,0,0,23d739d3565f17af447122df5e00eeef05a8ec54d56457d32b6380cc23d7ee66,2024-11-21T09:03:05.240000
|
||||
CVE-2024-26795,0,0,5d4eabef0c456f46f9992c03723452a3a8d635aa76f96f4b5da9c93ac3ba4967,2024-11-21T09:03:05.433000
|
||||
CVE-2024-26795,0,1,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000
|
||||
CVE-2024-26796,0,0,740b63b874106b1735e661fa59a152bb86da8899659de0c6c2baad5e3560a4e5,2025-02-27T14:42:59.307000
|
||||
CVE-2024-26797,0,0,d555849e5fdf34e0c546a7c8e0d877b819832c74438f586ca3128c8a5874d4a2,2024-11-21T09:03:05.660000
|
||||
CVE-2024-26798,0,0,0a31e852f2f7b601301225ce2a65456a90e397455c97cc5be42b040cfac0e775,2024-11-21T09:03:05.853000
|
||||
@ -268404,6 +268407,7 @@ CVE-2024-4564,0,0,ee8f47044242c05a630f54d8d399a7051500b8cbd4c8fa39ec50216846d2f2
|
||||
CVE-2024-45640,0,0,923abe7b70ac2297df80331720303a7ee55474d7dd4031afdf0c5f6c2b1c1e0c,2025-01-07T13:15:07.690000
|
||||
CVE-2024-45642,0,0,cfb188922d2de3d0a2e624109932e190c43782f5c9c1e7fb30a5b975a8a432ea,2024-11-16T00:13:06.017000
|
||||
CVE-2024-45643,0,0,50fab40ddb7c4d5d733822515e92d29c9d1df8bc52244fdea80f3613919e43c1,2025-03-14T15:15:42.820000
|
||||
CVE-2024-45644,1,1,b89fec9e44b59ed56ea1614d3b241e14e3bc17ed2f6376deb1749ef91d55dd06,2025-03-19T12:15:14.153000
|
||||
CVE-2024-45647,0,0,99690f8ec38bd0cb79a3ca6e5d0b11de3bd4c9f2564c73834cc738f80a3b4cff,2025-01-29T21:11:50.207000
|
||||
CVE-2024-4565,0,0,7eafc37f7621bbcecc9df42111f1503d84607d3815c6d13bfc741bedf44b3a75,2024-11-21T09:43:07.187000
|
||||
CVE-2024-45650,0,0,4e5537e03b2a804010ec65f14134e876717537795080f933ff3b04a2def30a14,2025-01-31T15:15:13.350000
|
||||
@ -284512,6 +284516,7 @@ CVE-2025-25106,0,0,5adf6027f92cb35d0099585e7a65f3fb0596ff1c0a8b0759d2eee782d9073
|
||||
CVE-2025-25107,0,0,e2af2faa3c90d7cdee713a48892bd288f889534c19b4e3defad819e99fdaf327,2025-02-07T10:15:16.570000
|
||||
CVE-2025-25108,0,0,4216f31163792796c6d7a76b0dff1cbbb671cc5df74f5753efeaa4b4e5746e06,2025-03-03T14:15:50.767000
|
||||
CVE-2025-25109,0,0,6d682a3d6df717c26d33e232bce785fcc26b0d6fbdfb125423df3b58afab6248,2025-03-03T14:15:50.907000
|
||||
CVE-2025-2511,1,1,7ebf0f149ba9d30fea37aadf5b0642b4c17d468dddde4eb7642ff1405e2ac138,2025-03-19T12:15:14.313000
|
||||
CVE-2025-25110,0,0,4041c70c5aea0a8415f9f6d363010815ba5afaf620d0b4cbccab698ef7bc642a,2025-02-07T10:15:16.747000
|
||||
CVE-2025-25111,0,0,94fd198f7a55281e7e3f3a1093ff63f49472757f065ea1d6a6e9b48f0d5e39ef,2025-02-07T10:15:16.910000
|
||||
CVE-2025-25112,0,0,6606855c1cd27f20e8867aa9a0e41193608500ababbffad4e75be64d9d182194,2025-03-03T14:15:51.050000
|
||||
@ -284522,6 +284527,7 @@ CVE-2025-25116,0,0,bcf37afc318f5e9ac3f628960ea4fa413ee951eab0cc5618b798180318935
|
||||
CVE-2025-25117,0,0,315c56cbaf5ff1e3498f8b9cf6b2965e180d3e2a738da99a953fe4b2580fbd4a,2025-02-07T10:15:17.267000
|
||||
CVE-2025-25118,0,0,367270eb5aa7e76ca009abbeed8d68dc0bd7338562d262954a33f7fa4cf2772a,2025-03-03T14:15:51.610000
|
||||
CVE-2025-25119,0,0,f12a4fb304e58f7685a75296c77c9d95278051f76c1b47108438f8d261173f37,2025-03-03T14:15:51.750000
|
||||
CVE-2025-2512,1,1,04dc0e32b86bba275816258b77d4ca6c96e821bcde40da19d3d57e7407c1771f,2025-03-19T12:15:14.463000
|
||||
CVE-2025-25120,0,0,37d7efddee9451cb8bdde13d5063d3355ce365b4be1738cfe09d05a928d650ba,2025-02-07T10:15:17.453000
|
||||
CVE-2025-25121,0,0,affb830fba7b58ecca3c4dde16bde250272ea421c2c05bb933f1730e460c4449,2025-03-03T14:15:51.887000
|
||||
CVE-2025-25122,0,0,c7933c3b08bb5046faca8cf2e06c3abb9ff38205e55e352fa2bc9dd4eb25abca,2025-03-03T14:15:52.033000
|
||||
@ -284950,7 +284956,7 @@ CVE-2025-26410,0,0,e0a8c1ecc38adad5db47008cfe5d8287500ec3cbba2c1f9a4a60a8e1051c5
|
||||
CVE-2025-26411,0,0,3c8f066d5451ad6ef36a27d64d17719d6f654697fa56337f49dfc83e42e73333,2025-03-14T18:15:31.947000
|
||||
CVE-2025-26465,0,0,305122a43f3140c85a4b4c03468e2fae692c04863ed3f0f25da2f320b5defd84,2025-03-06T17:20:00.520000
|
||||
CVE-2025-26466,0,0,8c14c9c0652d2827f2d6411d6d80e391b9271119d08a75423892f7601f9b2e74,2025-03-06T16:53:50.833000
|
||||
CVE-2025-26473,0,1,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000
|
||||
CVE-2025-26473,0,0,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000
|
||||
CVE-2025-26490,0,0,b8bc76b2be7d18c514587d66cef4d0bee94c01d7b29c32dae10138139a41dc50,2025-02-14T20:15:37.847000
|
||||
CVE-2025-26491,0,0,7c0d222179eba4a77c32c46173122e282947b63a6de5118491e2b730e6dd9271,2025-02-14T20:15:37.930000
|
||||
CVE-2025-26492,0,0,10f610a7afe531efeeb1575e93a64c84a3a6f9453498a7cd0479c1add3e10654,2025-02-11T14:15:31.260000
|
||||
@ -285199,7 +285205,7 @@ CVE-2025-27012,0,0,3a1893682864e642f849034c4092180dc7a4b18b7a6ad2f7375bac0e9841b
|
||||
CVE-2025-27013,0,0,9b9378b18f13319340e1f24d5072a99db201f1036e2a63d2b47d9e89c2a36e2e,2025-02-18T20:15:33.880000
|
||||
CVE-2025-27016,0,0,f2c7dbbbe198c036189ea7e0294285906759c96b4b4fc3925b1ca597f8d458ee,2025-02-18T20:15:34.013000
|
||||
CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0bce5,2025-03-12T17:15:50.327000
|
||||
CVE-2025-27018,1,1,d7627439ac8580cafcc1645cd89dec4f1a559b653f534e48b600c01afeaf0c77,2025-03-19T09:15:14.457000
|
||||
CVE-2025-27018,0,0,d7627439ac8580cafcc1645cd89dec4f1a559b653f534e48b600c01afeaf0c77,2025-03-19T09:15:14.457000
|
||||
CVE-2025-27080,0,0,dcd914ae09375ce77795feef8ad95fb4f30b82b0d28355bee32f7c0de8eb15be,2025-03-18T20:15:26.300000
|
||||
CVE-2025-27088,0,0,fbdc36eed3cad3a0ad2022cbe7aca458560a9c5f707fbc00203d874cefc235d6,2025-02-21T22:15:13.673000
|
||||
CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000
|
||||
@ -285659,4 +285665,4 @@ CVE-2025-30142,0,0,1246264bea9c6b49f2b8a8ead65c653d20fb9d371284f26fdb2f1b190b75f
|
||||
CVE-2025-30143,0,0,dfaeb3eef5e72894446a00bc252dd02d40d218e0a77cd9256d63da4e0a89e02b,2025-03-17T16:15:28.643000
|
||||
CVE-2025-30234,0,0,2b5c58b261698db3654a8d87fafd123300be7c95ea66a06456456707d9ebfedd,2025-03-19T05:15:41.353000
|
||||
CVE-2025-30235,0,0,67c8acffd5b66a75e16bf136f5ec71938e7a203b09767896d1c5918e4b7c4166,2025-03-19T06:15:16.043000
|
||||
CVE-2025-30236,0,1,f7e2d88c169654d0773448256afe181965f2a68264511db7f8bbd914eb958bf0,2025-03-19T07:15:34.313000
|
||||
CVE-2025-30236,0,0,f7e2d88c169654d0773448256afe181965f2a68264511db7f8bbd914eb958bf0,2025-03-19T07:15:34.313000
|
||||
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user