mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2025-03-14T07:00:22.567467+00:00
This commit is contained in:
parent
f2b061e015
commit
aa0a97f993
60
CVE-2024/CVE-2024-112xx/CVE-2024-11283.json
Normal file
60
CVE-2024/CVE-2024-112xx/CVE-2024-11283.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11283",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T05:15:37.577",
|
||||
"lastModified": "2025-03-14T05:15:37.577",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP JobHunt plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.1. This is due to wp_ajax_google_api_login_callback function not properly verifying a user's identity prior to authenticating them. This makes it possible for unauthenticated attackers to access arbitrary candidate accounts."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-289"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/jobcareer-job-board-responsive-wordpress-theme/14221636",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cfa487fb-c014-47f1-9537-73881ede30b4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-112xx/CVE-2024-11284.json
Normal file
60
CVE-2024/CVE-2024-112xx/CVE-2024-11284.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11284",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T05:15:40.463",
|
||||
"lastModified": "2025-03-14T05:15:40.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP JobHunt plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.9. This is due to the plugin not properly validating a user's identity prior to updating their password through the account_settings_save_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/jobcareer-job-board-responsive-wordpress-theme/14221636",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8afe386e-1e4f-4668-8309-6d47dedb008a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-112xx/CVE-2024-11285.json
Normal file
60
CVE-2024/CVE-2024-112xx/CVE-2024-11285.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11285",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T05:15:40.693",
|
||||
"lastModified": "2025-03-14T05:15:40.693",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP JobHunt plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 7.1. This is due to the plugin not properly validating a user's identity prior to updating their details like email via the account_settings_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/jobcareer-job-board-responsive-wordpress-theme/14221636",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e61c98d-a6f4-4ac0-b9f9-2b936c030413?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-112xx/CVE-2024-11286.json
Normal file
60
CVE-2024/CVE-2024-112xx/CVE-2024-11286.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-11286",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T05:15:40.917",
|
||||
"lastModified": "2025-03-14T05:15:40.917",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP JobHunt plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.1. This is due to the plugin not properly verifying a user's identity prior to authenticating them through the cs_parse_request() function. This makes it possible for unauthenticated attackers to to log in to any user's account, including administrators."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/jobcareer-job-board-responsive-wordpress-theme/14221636",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/91754c4d-a0d0-4d35-a70a-446d2bdf6c73?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-133xx/CVE-2024-13376.json
Normal file
60
CVE-2024/CVE-2024-133xx/CVE-2024-13376.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-13376",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T06:15:22.860",
|
||||
"lastModified": "2025-03-14T06:15:22.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Industrial theme for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the _ajax_get_total_content_import_items() function in all versions up to, and including, 1.7.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/industrial-manufacturing-wordpress-theme/15776179",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e25ca990-eee1-4f72-b543-7a65bc4855a8?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-139xx/CVE-2024-13913.json
Normal file
68
CVE-2024/CVE-2024-139xx/CVE-2024-13913.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-13913",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T06:15:24.490",
|
||||
"lastModified": "2025-03-14T06:15:24.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The InstaWP Connect \u2013 1-click WP Staging & Migration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.1.0.83. This is due to missing or incorrect nonce validation in the '/migrate/templates/main.php' file. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/instawp-connect/trunk/admin/class-instawp-admin.php#L159",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/instawp-connect/trunk/migrate/templates/main.php#L27",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3254817/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea6c7b63-00da-4476-a024-97fe99af643d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-09xx/CVE-2025-0952.json
Normal file
60
CVE-2025/CVE-2025-09xx/CVE-2025-0952.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-0952",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T06:15:24.683",
|
||||
"lastModified": "2025-03-14T06:15:24.683",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Eco Nature - Environment & Ecology WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' AJAX action in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/eco-nature-environment-ecology-wordpress-theme/8497776",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba708a4f-d987-4d63-a218-2ed1c6daa010?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-09xx/CVE-2025-0955.json
Normal file
60
CVE-2025/CVE-2025-09xx/CVE-2025-0955.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-0955",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T05:15:41.760",
|
||||
"lastModified": "2025-03-14T05:15:41.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The VidoRev Extensions plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'vidorev_import_single_video' AJAX action in all versions up to, and including, 2.9.9.9.9.9.5. This makes it possible for unauthenticated attackers to import arbitrary youtube videos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/vidorev-video-wordpress-theme/21798615",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e8c15662-e4df-4a74-bb01-266eeb4879c5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-12xx/CVE-2025-1285.json
Normal file
60
CVE-2025/CVE-2025-12xx/CVE-2025-1285.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-1285",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T05:15:41.977",
|
||||
"lastModified": "2025-03-14T05:15:41.977",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Resido - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the delete_api_key and save_api_key AJAX actions in all versions up to, and including, 3.6. This makes it possible for unauthenticated attackers to issue requests to internal services and update API key details."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/resido-real-estate-wordpress-theme/31804443",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3512ce8f-b7a6-4a6f-a141-bca08c183882?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-15xx/CVE-2025-1528.json
Normal file
60
CVE-2025/CVE-2025-15xx/CVE-2025-1528.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-1528",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T05:15:42.170",
|
||||
"lastModified": "2025-03-14T05:15:42.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Search & Filter Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_meta_values' function in all versions up to, and including, 2.5.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the values of arbitrary post meta."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://searchandfilter.com/search-filter-2-5-20-security-release/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/47adb5fe-534f-48a9-81a3-883e1d2cda7f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-17xx/CVE-2025-1764.json
Normal file
68
CVE-2025/CVE-2025-17xx/CVE-2025-1764.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-1764",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T06:15:24.860",
|
||||
"lastModified": "2025-03-14T06:15:24.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LoginPress | wp-login Custom Login Page Customizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.1. This is due to missing or incorrect nonce validation on the 'custom_plugin_set_option' function. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. The 'WPBRIGADE_SDK__DEV_MODE' constant must be set to 'true' to exploit the vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.svn.wordpress.org/loginpress/trunk/lib/wpb-sdk/views/wpb-debug.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3253283/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://pt.wordpress.org/plugins/loginpress/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9df6a2b4-2dc4-43dd-8282-5c05b0fa13f6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-20xx/CVE-2025-2056.json
Normal file
60
CVE-2025/CVE-2025-20xx/CVE-2025-2056.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-2056",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T05:15:42.523",
|
||||
"lastModified": "2025-03-14T05:15:42.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Ghost (Hide My WP Ghost) \u2013 Security & Firewall plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 5.4.01 via the showFile function. This makes it possible for unauthenticated attackers to read the contents of specific file types on the server, which can contain sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-23"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/hide-my-wp/tags/5.4.02/models/Files.php#L336",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f43db496-80ea-442c-9417-7aa03ec95f02?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-21xx/CVE-2025-2103.json
Normal file
60
CVE-2025/CVE-2025-21xx/CVE-2025-2103.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-2103",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T06:15:25.057",
|
||||
"lastModified": "2025-03-14T06:15:25.057",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SoundRise Music plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on theironMusic_ajax() function in all versions up to, and including, 1.6.11. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/soundrise-artists-producers-and-record-labels-wordpress-theme/19764337",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e8c0f9d8-c5cf-4e31-bc0b-289ad7c1d197?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-21xx/CVE-2025-2166.json
Normal file
68
CVE-2025/CVE-2025-21xx/CVE-2025-2166.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-2166",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T05:15:42.723",
|
||||
"lastModified": "2025-03-14T05:15:42.723",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The CM FAQ \u2013 Simplify support with an intuitive FAQ management tool plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cm-faq/tags/1.2.4/package/cminds-free.php#L2662",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cm-faq/tags/1.2.5/package/cminds-free.php#L2662",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/cm-faq/tags/1.2.6/package/cminds-free.php#L2662",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8b8d21cb-fe87-4947-a44b-7d670cf2123e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-22xx/CVE-2025-2289.json
Normal file
60
CVE-2025/CVE-2025-22xx/CVE-2025-2289.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-2289",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T06:15:25.230",
|
||||
"lastModified": "2025-03-14T06:15:25.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Zegen - Church WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX endpoints in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import, export, and update theme options."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/zegen-church-wordpress-theme/25116823",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a04db024-5198-490f-bf5f-d5bad1b21ce4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-27363",
|
||||
"sourceIdentifier": "cve-assign@fb.com",
|
||||
"published": "2025-03-11T14:15:25.427",
|
||||
"lastModified": "2025-03-14T01:15:40.240",
|
||||
"lastModified": "2025-03-14T05:15:42.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -79,6 +79,10 @@
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/13/8",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/14/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
28
README.md
28
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-14T05:00:19.854053+00:00
|
||||
2025-03-14T07:00:22.567467+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-14T03:15:45.257000+00:00
|
||||
2025-03-14T06:15:25.230000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,21 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
285198
|
||||
285213
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `15`
|
||||
|
||||
- [CVE-2025-26163](CVE-2025/CVE-2025-261xx/CVE-2025-26163.json) (`2025-03-14T03:15:44.333`)
|
||||
- [CVE-2025-30022](CVE-2025/CVE-2025-300xx/CVE-2025-30022.json) (`2025-03-14T03:15:45.257`)
|
||||
- [CVE-2024-11283](CVE-2024/CVE-2024-112xx/CVE-2024-11283.json) (`2025-03-14T05:15:37.577`)
|
||||
- [CVE-2024-11284](CVE-2024/CVE-2024-112xx/CVE-2024-11284.json) (`2025-03-14T05:15:40.463`)
|
||||
- [CVE-2024-11285](CVE-2024/CVE-2024-112xx/CVE-2024-11285.json) (`2025-03-14T05:15:40.693`)
|
||||
- [CVE-2024-11286](CVE-2024/CVE-2024-112xx/CVE-2024-11286.json) (`2025-03-14T05:15:40.917`)
|
||||
- [CVE-2024-13376](CVE-2024/CVE-2024-133xx/CVE-2024-13376.json) (`2025-03-14T06:15:22.860`)
|
||||
- [CVE-2024-13913](CVE-2024/CVE-2024-139xx/CVE-2024-13913.json) (`2025-03-14T06:15:24.490`)
|
||||
- [CVE-2025-0952](CVE-2025/CVE-2025-09xx/CVE-2025-0952.json) (`2025-03-14T06:15:24.683`)
|
||||
- [CVE-2025-0955](CVE-2025/CVE-2025-09xx/CVE-2025-0955.json) (`2025-03-14T05:15:41.760`)
|
||||
- [CVE-2025-1285](CVE-2025/CVE-2025-12xx/CVE-2025-1285.json) (`2025-03-14T05:15:41.977`)
|
||||
- [CVE-2025-1528](CVE-2025/CVE-2025-15xx/CVE-2025-1528.json) (`2025-03-14T05:15:42.170`)
|
||||
- [CVE-2025-1764](CVE-2025/CVE-2025-17xx/CVE-2025-1764.json) (`2025-03-14T06:15:24.860`)
|
||||
- [CVE-2025-2056](CVE-2025/CVE-2025-20xx/CVE-2025-2056.json) (`2025-03-14T05:15:42.523`)
|
||||
- [CVE-2025-2103](CVE-2025/CVE-2025-21xx/CVE-2025-2103.json) (`2025-03-14T06:15:25.057`)
|
||||
- [CVE-2025-2166](CVE-2025/CVE-2025-21xx/CVE-2025-2166.json) (`2025-03-14T05:15:42.723`)
|
||||
- [CVE-2025-2289](CVE-2025/CVE-2025-22xx/CVE-2025-2289.json) (`2025-03-14T06:15:25.230`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2025-27363](CVE-2025/CVE-2025-273xx/CVE-2025-27363.json) (`2025-03-14T05:15:42.377`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
21
_state.csv
21
_state.csv
@ -245425,6 +245425,10 @@ CVE-2024-1128,0,0,54a69d705f12085e9815f97438893085defbeff56c788628eb3154f79b1c48
|
||||
CVE-2024-11280,0,0,55a96727b2485e04cc5b6b8add864215b2cd1aa8bc4bdf75a3cee41a9da85d1e,2024-12-17T12:15:19.343000
|
||||
CVE-2024-11281,0,0,90e2bd5c8205361ece3136c81be65d202c124421a44b94b51cee816a97580eff,2024-12-25T07:15:11.777000
|
||||
CVE-2024-11282,0,0,d7544003139ef4914de1b710d30955127d71a03465256a078e5049afe1c984af,2025-01-07T07:15:25.293000
|
||||
CVE-2024-11283,1,1,7361b5961afb6717cd1f613bfc1536324a1dbd5f870472a9e6a185b6fe4d321c,2025-03-14T05:15:37.577000
|
||||
CVE-2024-11284,1,1,6d118d07dfa9d62e096a4ee0e802fceb271bda56f186b4f7ae13c28ca881d8fe,2025-03-14T05:15:40.463000
|
||||
CVE-2024-11285,1,1,ed0565e1a3c87ec26347b946da6d4fac7493cd79c52491fd48aa7b251b101940,2025-03-14T05:15:40.693000
|
||||
CVE-2024-11286,1,1,61a8018cdd03e2c3ffc561e827052580a0556eeb23cbb9decdd4f385bc7c54c1,2025-03-14T05:15:40.917000
|
||||
CVE-2024-11287,0,0,34325f8b73601eba04369df077cf259142375500fa57730b8919568f65568e95,2025-02-24T19:01:49.687000
|
||||
CVE-2024-11288,0,0,dd8a3651b65598db1e821ae128b6008d07487cb5109df54c50f8ebe2ba545930,2025-02-11T02:15:33.440000
|
||||
CVE-2024-11289,0,0,1d2443a1a9242c04e29818ad13875ac1c58e80e7866f1501dec4b2d1a8559f61,2024-12-06T10:15:05.450000
|
||||
@ -247399,6 +247403,7 @@ CVE-2024-13372,0,0,015d2d808909d66f440a14d43df20bdac81e725da4ef18a7b74b1dc0c8861
|
||||
CVE-2024-13373,0,0,9d44977237f116718720d9d00cfafd61d5daa8953cb39a9e131699dc8586025a,2025-03-01T07:15:10.770000
|
||||
CVE-2024-13374,0,0,3fc707056196afc6ff18dfb5640666c2f82725f50c06780da5f362e975810d58,2025-02-24T15:55:44.733000
|
||||
CVE-2024-13375,0,0,509bfd3a7c3f76e008f9bf54ba53750a8708a5d8eaf24ea17a33be3c80dc44d0,2025-01-18T09:15:07.120000
|
||||
CVE-2024-13376,1,1,13447b8c554d47dc67998eac21b2fe43626f0c6a3379b52a306bd5295a9bf534,2025-03-14T06:15:22.860000
|
||||
CVE-2024-13377,0,0,a25050bd2bbff023d447f5d602b24decf0d9fe3f99412e4f96b0e55aac73332f,2025-01-17T10:15:07.240000
|
||||
CVE-2024-13378,0,0,7ea1d4cbb0f87859cae348c2da93d49f3902e773337fd492c684caf29392972d,2025-01-17T10:15:07.457000
|
||||
CVE-2024-13379,0,0,ebe77b8be5bdd70ba192f2850f9b10f6648b43e1ba162a550ae4527fcdc56169,2025-02-25T17:40:45.270000
|
||||
@ -247876,6 +247881,7 @@ CVE-2024-13908,0,0,1c73e211b4b58a00a46dae8694d4200f0e6f3fc60c1daa97b090d322baf4e
|
||||
CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
|
||||
CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000
|
||||
CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000
|
||||
CVE-2024-13913,1,1,982203190546063692eb2fde623ca80fd2479893721e008958e2b6b1acdf8c1a,2025-03-14T06:15:24.490000
|
||||
CVE-2024-13918,0,0,dd3246088d0020e60eea2c9a743f405ac80e445444e7d8b0b4c1330698a621f4,2025-03-10T17:15:34.383000
|
||||
CVE-2024-13919,0,0,a449fd88163dd2c8f4cc42377a274723f7166a46202a509ead9b299715d86a4e,2025-03-10T17:15:34.540000
|
||||
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
||||
@ -280848,8 +280854,10 @@ CVE-2025-0947,0,0,54992aef26727e095f19651dace58e0751a58da1d32b3005bb44e21372f29d
|
||||
CVE-2025-0948,0,0,3906e65d2be079846a7fc328fa3e08005b25ee0a1547c5d7622270f9efb6c849,2025-02-03T18:15:41.580000
|
||||
CVE-2025-0949,0,0,0738bb2b66672fae5fd020ba0f9a70fb106ebc19e1971dce25f2e18c30dd0c12,2025-02-03T18:15:41.727000
|
||||
CVE-2025-0950,0,0,7903835c96a972c16989f2cc1ccaf15a7fc2f203d2ad321ca6bcf09943e4f0e2,2025-02-03T18:15:41.847000
|
||||
CVE-2025-0952,1,1,6c3228c9c9f9f122e4a6382a097401f4b233c482b4603d9863e65505c235d857,2025-03-14T06:15:24.683000
|
||||
CVE-2025-0953,0,0,13d291258e4c30c78d80b709e158097d095b4eb5e4d1fb760e2f7e371f933aaf,2025-03-05T21:28:15.293000
|
||||
CVE-2025-0954,0,0,81ac52e2c35d2d0384ad093852f1aae6a07415f826817f32adad7fbd23a98566,2025-03-05T10:15:19.130000
|
||||
CVE-2025-0955,1,1,a8ce44388d3533d0aac55865f4f1b883c05c46ecc4c0cbb210430e9f66a48ad7,2025-03-14T05:15:41.760000
|
||||
CVE-2025-0956,0,0,f70f22dd7aad885845100de1c08ba9be5fe6fcac9e909ba285c16ccd3c4dc18d,2025-03-05T10:15:19.480000
|
||||
CVE-2025-0957,0,0,495f2d5b6e1d536933c2ca0f5f42b3b064381124c6d04bc27597b46752e07780,2025-02-22T14:15:29.710000
|
||||
CVE-2025-0958,0,0,6a8abacfef7e74902962072738d5b34e6ea938b59880ac4107bc2c79fd800440,2025-03-05T16:39:32.083000
|
||||
@ -281061,6 +281069,7 @@ CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc4
|
||||
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
|
||||
CVE-2025-1282,0,0,124879e93e6bb778f215176375d975ac746201c3f19a3ffa344b76a1a781600c,2025-03-11T16:08:00.790000
|
||||
CVE-2025-1283,0,0,4175667403ef8488e39c5e8c2dd94a274e533a8ac41a5d588031878a218b6b1e,2025-03-04T20:59:05.417000
|
||||
CVE-2025-1285,1,1,978a0efe88885b4cbd8d81a3802fbeec4ea7a149d66abbaabde90aa3d535eacf,2025-03-14T05:15:41.977000
|
||||
CVE-2025-1287,0,0,37b8d6e5bb02fec4db4fe6ebb7f78e649494f82b2a965d784db2bbf955be9dfb,2025-03-08T09:15:31.590000
|
||||
CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000
|
||||
CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000
|
||||
@ -281186,6 +281195,7 @@ CVE-2025-1513,0,0,3e83881e26d14d0e87001b4c3ba5dc79f7552c69b46afe7ea910cd8458998d
|
||||
CVE-2025-1515,0,0,6745568ce7f500454ddf7cbbbf3fe5b80633db8da56aea69750d807282006f92,2025-03-05T10:15:19.850000
|
||||
CVE-2025-1517,0,0,2fa9cdc1e0143bd8e9da49275eaa45f04a63792c53ac8ebc4aa9796acfc194c9,2025-02-26T13:15:41.193000
|
||||
CVE-2025-1527,0,0,8a93ae9d546da00b62910a2f9d137a31ff943086ede2e40a6b788d063ddbf81c,2025-03-12T12:15:14.473000
|
||||
CVE-2025-1528,1,1,2e67df38b65f44722b54fac5c2d2ae415bc3662a344dd77ad0e461c4327f6eb1,2025-03-14T05:15:42.170000
|
||||
CVE-2025-1535,0,0,6080c0c0968f3ab3c5259d9031c93f6d6c93dcaef1c71aa8b7e3b62645a6a84e,2025-02-21T12:15:30.877000
|
||||
CVE-2025-1536,0,0,13d2bb79966b022c194b53190d029539a3b9db0220df5fb889249e7f79d2fadc,2025-02-21T15:15:12.270000
|
||||
CVE-2025-1537,0,0,861630e1b0372f1f37852ff12813e7a5ac2fa6d179d082cf3113227aa130bf0c,2025-02-21T15:15:12.460000
|
||||
@ -281311,6 +281321,7 @@ CVE-2025-1751,0,0,abfc84328e2199f31a54a26b50388e665ca54aab7fd0cce8bda2194b6d8236
|
||||
CVE-2025-1755,0,0,09476b6d542bfcc927e067fe8e3ce0d3ca1fbe0a9d5ffac658df7f448d43f354,2025-02-27T16:15:39.137000
|
||||
CVE-2025-1756,0,0,787bba2bf34abbaae222d1a9edb902cd4b5b03484def1773bc6176dae0327cd2,2025-02-27T16:15:39.287000
|
||||
CVE-2025-1757,0,0,dc2ff923c8c3145193c6561db00b356fb8535b7d409d9e1ae9c89572d47684fe,2025-03-06T20:21:36.547000
|
||||
CVE-2025-1764,1,1,a0772d13ae7c80ed5a68a77c5e9e29582c4c3cb8221fdf31ef9438995646ffb7,2025-03-14T06:15:24.860000
|
||||
CVE-2025-1767,0,0,2d7a67a49e2d8224d71f3f81db0cee88468897d8d69262d33481730c6124ca91,2025-03-13T21:15:43.127000
|
||||
CVE-2025-1768,0,0,c05b89cadd612720776009e6e0d5cd82f5ad65495c19a7bd41a71ec158195a94,2025-03-07T11:15:15.653000
|
||||
CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000
|
||||
@ -281573,6 +281584,7 @@ CVE-2025-2051,0,0,20b55bb39ea3b7aa97a8d3fb6e3ceb82d4c28a82e34b83316b328be5641117
|
||||
CVE-2025-2052,0,0,566c8b891ad98044cf1ebec9ad90f909f9dc50c34eba6b99806cf450bf0c0077,2025-03-07T01:15:13.173000
|
||||
CVE-2025-2053,0,0,907740e769a477f285f8f478f320bf99234fb5fa0ab7900774540384eedc6bb4,2025-03-07T01:15:13.373000
|
||||
CVE-2025-2054,0,0,ab2a594941b94086fffcf5b37cb53c9b330e51d0f114b5825d0c1aa68d4f0782,2025-03-07T02:15:38.060000
|
||||
CVE-2025-2056,1,1,a45cb5faec73ceb0907788d6601d60a42a6b796dbef4e0f9f0f371e41d843599,2025-03-14T05:15:42.523000
|
||||
CVE-2025-2057,0,0,d7d92d6c13bb3b056a662c7a1158142789edd7c088582f23e801cdd24b69629a,2025-03-07T02:15:38.237000
|
||||
CVE-2025-2058,0,0,b8c0ed4c6c9a30dd784843b19947dfc086e37f9bd6154d2b78254e871b32183f,2025-03-07T02:15:38.413000
|
||||
CVE-2025-2059,0,0,5b6795d03e7b228aaf929737773f90cae866266639b998d7652a8491cad7d1dc,2025-03-07T02:15:38.600000
|
||||
@ -281684,6 +281696,7 @@ CVE-2025-2094,0,0,dd3722c7d873584c1bcf5ee76e4241bd89a98d004b5cffc0e9c748e218c083
|
||||
CVE-2025-2095,0,0,a3dfeac2273a29e9d569952f61ac273a484328c8ec1f4d0ba33ca66ad911ad03,2025-03-07T23:15:16.010000
|
||||
CVE-2025-2096,0,0,096c4c8099150287c2f34ad390aeed2c4059a697160d0641900caf1a5bf991ce,2025-03-07T23:15:16.137000
|
||||
CVE-2025-2097,0,0,3811d560cd910c2df494c5d4404118f3eb75c9be64144887386fb0328a407e37,2025-03-10T18:15:30.680000
|
||||
CVE-2025-2103,1,1,3b023b812e0f92fc53b3ecfe0dcea0ad9a688d279085c6883b1c9379ad226ff1,2025-03-14T06:15:25.057000
|
||||
CVE-2025-2104,0,0,c9c6df034f61bd4a99ed7e78e660c734daac9721b7b6a8eaf9c4465eecd8b823,2025-03-13T05:15:28.303000
|
||||
CVE-2025-2106,0,0,143e4c5dbe02a3747cf463a093e6e5a5cf905ac42e2ced475942abac66b0049e,2025-03-13T02:15:13.097000
|
||||
CVE-2025-2107,0,0,6d7a52b701e101c90bda727cc98862452375f64ee7eb80539bc204426a2ec437,2025-03-13T02:15:13.250000
|
||||
@ -282141,6 +282154,7 @@ CVE-2025-21656,0,0,a701e9e2df732a25c44be693e4bcc732f0353202bde61b2316a6229f867fa
|
||||
CVE-2025-21657,0,0,1965d9c3d1118ed3d2f0e817295e796ed532b053adb84b7658e4c043ba09b4dd,2025-01-21T13:15:09.340000
|
||||
CVE-2025-21658,0,0,49f4fb1da0e36dec3735688e008c1d1b6e11cd524605dedd795d9dba62770702,2025-01-22T23:02:59.383000
|
||||
CVE-2025-21659,0,0,c34fae85ac5791c6acdfb8c055236ca0db3c10e1f998433ca0b29112c1552ff1,2025-01-21T13:15:09.540000
|
||||
CVE-2025-2166,1,1,6e45545000e1b6b04b294b0ae4f0ab313379a10e458b4c0663c9f560b02e0321,2025-03-14T05:15:42.723000
|
||||
CVE-2025-21660,0,0,62f40623237245457c3e1282812660b56ee49a4868b504432c0ca95a3b8af3bc,2025-01-21T13:15:09.643000
|
||||
CVE-2025-21661,0,0,35570a826135021930919d68ecfb81fa996d5609fcae3470eeb02a50f2465a44,2025-02-28T18:59:45.207000
|
||||
CVE-2025-21662,0,0,a5b1a0271d3432d1de3ee1bda0755a5b6602cc0585dec57fd031d28aaec3d7e4,2025-01-21T13:15:09.847000
|
||||
@ -282840,6 +282854,7 @@ CVE-2025-22870,0,0,d29b93c9805eca35e2b06772d602aab8a0115de9a56383949d29f6eb50d0a
|
||||
CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000
|
||||
CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000
|
||||
CVE-2025-22888,0,0,83c67ff923e9645ec5fafd719e12957b03331dea9b9bd08e509c66897fdc51d1,2025-02-19T06:15:21.687000
|
||||
CVE-2025-2289,1,1,a0d3f1c0e099ef96760fa262cff57e9d850b41d51a6ea308e92b7da1739f1b91,2025-03-14T06:15:25.230000
|
||||
CVE-2025-22890,0,0,8dd6ffe45f0151dcb8b41a48dac74b1e668a5294c2f1614982860358b9b03cd6,2025-02-06T07:15:17.113000
|
||||
CVE-2025-22891,0,0,5058a67448259ac9abdaa428b056ef85a9f11123cf1683cf0699d5426be467a6,2025-02-05T18:15:31.190000
|
||||
CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29a1c,2025-02-06T08:15:30.027000
|
||||
@ -284513,7 +284528,7 @@ CVE-2025-26136,0,0,cc9be51dd4a6fa53d78893d7c6c4eaa6e7ab050c825b80ec7f0340f9116ec
|
||||
CVE-2025-26156,0,0,3c070f48ae01803cf4deab6e20453c0715f07513428e1a7ccf93241deeb274fe,2025-02-14T19:15:15.033000
|
||||
CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000
|
||||
CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000
|
||||
CVE-2025-26163,1,1,52ef30d27972b09d443189618d0bf36a87f03f415f0abc52051e26ad93b76a5d,2025-03-14T03:15:44.333000
|
||||
CVE-2025-26163,0,0,52ef30d27972b09d443189618d0bf36a87f03f415f0abc52051e26ad93b76a5d,2025-03-14T03:15:44.333000
|
||||
CVE-2025-26167,0,0,8fedf8cb5c038d3d545bade04bcee73b94c86214b4a2f6644c4b4e2c9cd0dc44,2025-03-07T20:15:38.347000
|
||||
CVE-2025-26182,0,0,0ffb3bea03992b9174a29a5d31a319557b17fde19454fc28292cbf9e09cbcf6e,2025-03-05T19:15:39.023000
|
||||
CVE-2025-26200,0,0,07971a3db98f9cfae341b32901f42b0af32b82b7b85e8efc840488c86eda257e,2025-02-24T17:15:14.273000
|
||||
@ -284952,7 +284967,7 @@ CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165de
|
||||
CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000
|
||||
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
|
||||
CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000
|
||||
CVE-2025-27363,0,0,64c14e8ae14617f40208d37ac883d16dcfb3a8412b4d683729fe0c291bbcad07,2025-03-14T01:15:40.240000
|
||||
CVE-2025-27363,0,1,5d7226be659cf0a5d75c9183710cee7e9d31f4aae92e2da6b82d7565ed062834,2025-03-14T05:15:42.377000
|
||||
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
|
||||
CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000
|
||||
CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000
|
||||
@ -285196,4 +285211,4 @@ CVE-2025-29995,0,0,7b26234c7f33fb9de67d2e4826385c1fa148f4db2069314ae06347b922d6a
|
||||
CVE-2025-29996,0,0,04d5b171307dc2b30ea5eb5f28181e2f5299e6abd99f684b2064e258a3b5d58d,2025-03-13T12:15:13.980000
|
||||
CVE-2025-29997,0,0,3e1c88fa2147bd225e112b8448984cfa69ba6bc439375d110bf8e47fa9f5f226,2025-03-13T12:15:14.127000
|
||||
CVE-2025-29998,0,0,5dddfef1e1ef55af54ca138ece8d3523cffbfaa8a6942b2f0faa38d3ba4d474f,2025-03-13T12:15:14.277000
|
||||
CVE-2025-30022,1,1,18459892879519497629792b4e249dfce13486f819d766c4e46ea46420ba454e,2025-03-14T03:15:45.257000
|
||||
CVE-2025-30022,0,0,18459892879519497629792b4e249dfce13486f819d766c4e46ea46420ba454e,2025-03-14T03:15:45.257000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user