mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 10:42:17 +00:00
Auto-Update: 2025-01-31T11:00:32.200111+00:00
This commit is contained in:
parent
f7cbd83df6
commit
ab6e759dda
68
CVE-2024/CVE-2024-131xx/CVE-2024-13157.json
Normal file
68
CVE-2024/CVE-2024-131xx/CVE-2024-13157.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-13157",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-31T09:15:06.617",
|
||||
"lastModified": "2025-01-31T09:15:06.617",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MP3 Audio Player \u2013 Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Podcast RSS Feed in all versions up to, and including, 5.9.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/mp3-music-player-by-sonaar/trunk/includes/class-sonaar-music-widget.php#L1733",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3231414/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/mp3-music-player-by-sonaar/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/547325ad-0b01-42d5-b47c-362044587395?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-134xx/CVE-2024-13472.json
Normal file
68
CVE-2024/CVE-2024-134xx/CVE-2024-13472.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-13472",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-31T10:15:07.630",
|
||||
"lastModified": "2025-01-31T10:15:07.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The The WooCommerce Product Table Lite plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.9.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. The same 'sc_attrs' parameter is vulnerable to Reflected Cross-Site Scripting as well."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wc-product-table-lite/trunk/main.php#L1843",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3231930/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wc-product-table-lite/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4f1a1171-3d7b-46a4-982e-fe318e3017b7?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2024/CVE-2024-135xx/CVE-2024-13566.json
Normal file
68
CVE-2024/CVE-2024-135xx/CVE-2024-13566.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2024-13566",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-31T09:15:06.847",
|
||||
"lastModified": "2025-01-31T09:15:06.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP DataTable plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 parameter in all versions up to, and including, 0.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-datatable/trunk/shortcode.php#L42",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3231842",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wp-datatable/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ad96faa-cbc2-46c3-a8e6-afa6744ada86?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-440xx/CVE-2024-44055.json
Normal file
56
CVE-2024/CVE-2024-440xx/CVE-2024-44055.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-44055",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:07.010",
|
||||
"lastModified": "2025-01-31T09:15:07.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in NotFound Oshine Modules. This issue affects Oshine Modules: from n/a through n/a."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/oshine-modules/vulnerability/wordpress-oshine-modules-plugin-3-3-6-unauthenticated-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-222xx/CVE-2025-22265.json
Normal file
56
CVE-2025/CVE-2025-222xx/CVE-2025-22265.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-22265",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:07.167",
|
||||
"lastModified": "2025-01-31T09:15:07.167",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in mgplugin EMI Calculator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects EMI Calculator: from n/a through 1.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/emi-calculator/vulnerability/wordpress-emi-calculator-plugin-1-1-settings-change-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-223xx/CVE-2025-22332.json
Normal file
56
CVE-2025/CVE-2025-223xx/CVE-2025-22332.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-22332",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:07.317",
|
||||
"lastModified": "2025-01-31T09:15:07.317",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bryan Shanaver @ fiftyandfifty.org CloudFlare(R) Cache Purge allows Reflected XSS. This issue affects CloudFlare(R) Cache Purge: from n/a through 1.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/cloudflare-cache-purge/vulnerability/wordpress-cloudflare-r-cache-purge-plugin-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-223xx/CVE-2025-22341.json
Normal file
56
CVE-2025/CVE-2025-223xx/CVE-2025-22341.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-22341",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:07.470",
|
||||
"lastModified": "2025-01-31T09:15:07.470",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mohammad Hossein Aghanabi Hide Login+ allows Reflected XSS. This issue affects Hide Login+: from n/a through 3.5.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/hide-login/vulnerability/wordpress-hide-login-plugin-3-5-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-225xx/CVE-2025-22564.json
Normal file
56
CVE-2025/CVE-2025-225xx/CVE-2025-22564.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-22564",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:07.627",
|
||||
"lastModified": "2025-01-31T09:15:07.627",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Faaiq Pretty Url allows Reflected XSS. This issue affects Pretty Url: from n/a through 1.5.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/pretty-url/vulnerability/wordpress-pretty-url-plugin-1-5-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-227xx/CVE-2025-22720.json
Normal file
56
CVE-2025/CVE-2025-227xx/CVE-2025-22720.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-22720",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:07.770",
|
||||
"lastModified": "2025-01-31T09:15:07.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in MagePeople Team Booking and Rental Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Booking and Rental Manager: from n/a through 2.2.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/booking-and-rental-manager-for-woocommerce/vulnerability/wordpress-wprently-wordpress-plugin-plugin-2-2-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-227xx/CVE-2025-22757.json
Normal file
56
CVE-2025/CVE-2025-227xx/CVE-2025-22757.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-22757",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:07.913",
|
||||
"lastModified": "2025-01-31T09:15:07.913",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeBard CodeBard Help Desk allows Stored XSS. This issue affects CodeBard Help Desk: from n/a through 1.1.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/codebard-help-desk/vulnerability/wordpress-codebard-help-desk-plugin-1-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-235xx/CVE-2025-23596.json
Normal file
56
CVE-2025/CVE-2025-235xx/CVE-2025-23596.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23596",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:08.060",
|
||||
"lastModified": "2025-01-31T09:15:08.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Notifikacie.sk Notifik\u00e1cie.sk allows Reflected XSS. This issue affects Notifik\u00e1cie.sk: from n/a through 1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/notifikacie-sk/vulnerability/wordpress-notifikacie-sk-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-236xx/CVE-2025-23671.json
Normal file
56
CVE-2025/CVE-2025-236xx/CVE-2025-23671.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23671",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:08.210",
|
||||
"lastModified": "2025-01-31T09:15:08.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fabio Savina WP OpenSearch allows Stored XSS. This issue affects WP OpenSearch: from n/a through 1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/wp-opensearch/vulnerability/wordpress-wp-opensearch-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-237xx/CVE-2025-23759.json
Normal file
56
CVE-2025/CVE-2025-237xx/CVE-2025-23759.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23759",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:08.357",
|
||||
"lastModified": "2025-01-31T09:15:08.357",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in leduchuy89vn Affiliate Tools Vi\u1ec7t Nam allows Reflected XSS. This issue affects Affiliate Tools Vi\u1ec7t Nam: from n/a through 0.3.17."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/affiliate-tools-viet-nam/vulnerability/wordpress-affiliate-tools-viet-nam-plugin-0-3-17-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-239xx/CVE-2025-23976.json
Normal file
56
CVE-2025/CVE-2025-239xx/CVE-2025-23976.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23976",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:08.530",
|
||||
"lastModified": "2025-01-31T09:15:08.530",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Pedro Marcelo Issuu Panel allows Stored XSS. This issue affects Issuu Panel: from n/a through 2.1.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/issuu-panel/vulnerability/wordpress-issuu-panel-plugin-2-1-1-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-239xx/CVE-2025-23977.json
Normal file
56
CVE-2025/CVE-2025-239xx/CVE-2025-23977.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23977",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:08.687",
|
||||
"lastModified": "2025-01-31T09:15:08.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Bhaskar Dhote Post Carousel Slider allows Stored XSS. This issue affects Post Carousel Slider: from n/a through 2.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/post-carousel-slider/vulnerability/wordpress-post-carousel-slider-plugin-2-0-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-239xx/CVE-2025-23978.json
Normal file
56
CVE-2025/CVE-2025-239xx/CVE-2025-23978.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23978",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:08.830",
|
||||
"lastModified": "2025-01-31T09:15:08.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Ninos Ego FlashCounter allows Stored XSS. This issue affects FlashCounter: from n/a through 1.1.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/flashcounter/vulnerability/wordpress-flashcounter-plugin-1-1-8-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-239xx/CVE-2025-23980.json
Normal file
56
CVE-2025/CVE-2025-239xx/CVE-2025-23980.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23980",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:08.973",
|
||||
"lastModified": "2025-01-31T09:15:08.973",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in James Andrews Full Circle allows Stored XSS. This issue affects Full Circle: from n/a through 0.5.7.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/full-circle/vulnerability/wordpress-full-circle-plugin-0-5-7-8-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-239xx/CVE-2025-23985.json
Normal file
56
CVE-2025/CVE-2025-239xx/CVE-2025-23985.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23985",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:09.127",
|
||||
"lastModified": "2025-01-31T09:15:09.127",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Brainvireinfo Dynamic URL SEO allows Cross Site Request Forgery. This issue affects Dynamic URL SEO: from n/a through 1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/dynamic-url-seo/vulnerability/wordpress-dynamic-url-seo-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-239xx/CVE-2025-23987.json
Normal file
56
CVE-2025/CVE-2025-239xx/CVE-2025-23987.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23987",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:09.280",
|
||||
"lastModified": "2025-01-31T09:15:09.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodegearThemes Designer allows DOM-Based XSS. This issue affects Designer: from n/a through 1.6.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/designer/vulnerability/wordpress-designer-plugin-1-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-239xx/CVE-2025-23989.json
Normal file
56
CVE-2025/CVE-2025-239xx/CVE-2025-23989.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23989",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:09.427",
|
||||
"lastModified": "2025-01-31T09:15:09.427",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Alessandro Piconi - SabLab Internal Link Builder allows Cross Site Request Forgery. This issue affects Internal Link Builder: from n/a through 1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/internal-link-builder/vulnerability/wordpress-internal-link-builder-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-239xx/CVE-2025-23990.json
Normal file
56
CVE-2025/CVE-2025-239xx/CVE-2025-23990.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-23990",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:09.577",
|
||||
"lastModified": "2025-01-31T09:15:09.577",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in jablonczay Scroll Styler. This issue affects Scroll Styler: from n/a through 1.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/scroll-styler/vulnerability/wordpress-scroll-styler-plugin-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-245xx/CVE-2025-24534.json
Normal file
56
CVE-2025/CVE-2025-245xx/CVE-2025-24534.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24534",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:09.720",
|
||||
"lastModified": "2025-01-31T09:15:09.720",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Emili Castells DPortfolio allows Reflected XSS. This issue affects DPortfolio: from n/a through 2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/dportfolio/vulnerability/wordpress-dportfolio-plugin-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-245xx/CVE-2025-24535.json
Normal file
56
CVE-2025/CVE-2025-245xx/CVE-2025-24535.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24535",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:09.870",
|
||||
"lastModified": "2025-01-31T09:15:09.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SKT Themes SKT Donation allows Reflected XSS. This issue affects SKT Donation: from n/a through 1.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/skt-donation/vulnerability/wordpress-skt-donation-plugin-1-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-245xx/CVE-2025-24549.json
Normal file
56
CVE-2025/CVE-2025-245xx/CVE-2025-24549.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24549",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:10.027",
|
||||
"lastModified": "2025-01-31T09:15:10.027",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Mahbubur Rahman Post Meta allows Reflected XSS. This issue affects Post Meta: from n/a through 1.0.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/post-meta/vulnerability/wordpress-post-meta-plugin-1-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-245xx/CVE-2025-24551.json
Normal file
56
CVE-2025/CVE-2025-245xx/CVE-2025-24551.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24551",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:10.170",
|
||||
"lastModified": "2025-01-31T09:15:10.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OneTeamSoftware Radio Buttons and Swatches for WooCommerce allows Reflected XSS. This issue affects Radio Buttons and Swatches for WooCommerce: from n/a through 1.1.20."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/variations-radio-buttons-for-woocommerce/vulnerability/wordpress-radio-buttons-and-swatches-for-woocommerce-plugin-1-1-20-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-245xx/CVE-2025-24560.json
Normal file
56
CVE-2025/CVE-2025-245xx/CVE-2025-24560.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24560",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:10.323",
|
||||
"lastModified": "2025-01-31T09:15:10.323",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Awesome TOGI Awesome Event Booking allows Reflected XSS. This issue affects Awesome Event Booking: from n/a through 2.7.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/awesome-event-booking/vulnerability/wordpress-awesome-event-booking-plugin-2-7-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-245xx/CVE-2025-24563.json
Normal file
56
CVE-2025/CVE-2025-245xx/CVE-2025-24563.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24563",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:10.467",
|
||||
"lastModified": "2025-01-31T09:15:10.467",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGlow Cleanup \u2013 Directory Listing & Classifieds WordPress Plugin allows Reflected XSS. This issue affects Cleanup \u2013 Directory Listing & Classifieds WordPress Plugin: from n/a through 1.0.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/cleanup-light/vulnerability/wordpress-cleanup-directory-listing-classifieds-plugin-1-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-245xx/CVE-2025-24597.json
Normal file
56
CVE-2025/CVE-2025-245xx/CVE-2025-24597.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24597",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:10.607",
|
||||
"lastModified": "2025-01-31T09:15:10.607",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of Sensitive Information Into Sent Data vulnerability in UkrSolution Barcode Generator for WooCommerce allows Retrieve Embedded Sensitive Data. This issue affects Barcode Generator for WooCommerce: from n/a through 2.0.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-201"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/embedding-barcodes-into-product-pages-and-orders/vulnerability/wordpress-barcode-generator-for-woocommerce-plugin-2-0-2-sensitive-data-exposure-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-246xx/CVE-2025-24608.json
Normal file
56
CVE-2025/CVE-2025-246xx/CVE-2025-24608.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24608",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:10.767",
|
||||
"lastModified": "2025-01-31T09:15:10.767",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Milan Petrovic GD Mail Queue allows Reflected XSS. This issue affects GD Mail Queue: from n/a through 4.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/gd-mail-queue/vulnerability/wordpress-gd-mail-queue-plugin-4-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-246xx/CVE-2025-24609.json
Normal file
56
CVE-2025/CVE-2025-246xx/CVE-2025-24609.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24609",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:10.900",
|
||||
"lastModified": "2025-01-31T09:15:10.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PortOne PORTONE \uc6b0\ucee4\uba38\uc2a4 \uacb0\uc81c allows Reflected XSS. This issue affects PORTONE \uc6b0\ucee4\uba38\uc2a4 \uacb0\uc81c: from n/a through 3.2.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/iamport-for-woocommerce/vulnerability/wordpress-portone-plugin-3-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-246xx/CVE-2025-24632.json
Normal file
56
CVE-2025/CVE-2025-246xx/CVE-2025-24632.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24632",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:11.040",
|
||||
"lastModified": "2025-01-31T09:15:11.040",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AlgolPlus Advanced Dynamic Pricing for WooCommerce allows Reflected XSS. This issue affects Advanced Dynamic Pricing for WooCommerce: from n/a through 4.9.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/advanced-dynamic-pricing-for-woocommerce/vulnerability/wordpress-advanced-dynamic-pricing-for-woocommerce-plugin-4-9-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-246xx/CVE-2025-24635.json
Normal file
56
CVE-2025/CVE-2025-246xx/CVE-2025-24635.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24635",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:11.190",
|
||||
"lastModified": "2025-01-31T09:15:11.190",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paytm Paytm Payment Donation allows Reflected XSS. This issue affects Paytm Payment Donation: from n/a through 2.3.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/paytm-donation/vulnerability/wordpress-paytm-donation-plugin-plugin-2-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-246xx/CVE-2025-24686.json
Normal file
56
CVE-2025/CVE-2025-246xx/CVE-2025-24686.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24686",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:11.340",
|
||||
"lastModified": "2025-01-31T09:15:11.340",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metagauss User Registration Forms RegistrationMagic allows Reflected XSS. This issue affects RegistrationMagic: from n/a through 6.0.3.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/custom-registration-form-builder-with-submission-manager/vulnerability/wordpress-registrationmagic-plugin-6-0-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-247xx/CVE-2025-24710.json
Normal file
56
CVE-2025/CVE-2025-247xx/CVE-2025-24710.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24710",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:11.477",
|
||||
"lastModified": "2025-01-31T09:15:11.477",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Marcel Pol Gwolle Guestbook allows Reflected XSS. This issue affects Gwolle Guestbook: from n/a through 4.7.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/gwolle-gb/vulnerability/wordpress-gwolle-guestbook-plugin-4-7-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-247xx/CVE-2025-24718.json
Normal file
56
CVE-2025/CVE-2025-247xx/CVE-2025-24718.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24718",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:11.617",
|
||||
"lastModified": "2025-01-31T09:15:11.617",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SWIT WP Sessions Time Monitoring Full Automatic allows Reflected XSS. This issue affects WP Sessions Time Monitoring Full Automatic: from n/a through 1.1.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/activitytime/vulnerability/wordpress-wp-sessions-time-monitoring-full-automatic-plugin-1-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-247xx/CVE-2025-24749.json
Normal file
56
CVE-2025/CVE-2025-247xx/CVE-2025-24749.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-24749",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-01-31T09:15:11.760",
|
||||
"lastModified": "2025-01-31T09:15:11.760",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Overt Software Solutions LTD EZPZ SAML SP Single Sign On (SSO) allows Cross Site Request Forgery. This issue affects EZPZ SAML SP Single Sign On (SSO): from n/a through 1.2.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/ezpz-sp/vulnerability/wordpress-ezpz-saml-sp-single-sign-on-sso-plugin-1-2-5-csrf-to-stored-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
37
README.md
37
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-31T09:00:50.232418+00:00
|
||||
2025-01-31T11:00:32.200111+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-31T08:15:08.157000+00:00
|
||||
2025-01-31T10:15:07.630000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,17 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
279619
|
||||
279655
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `36`
|
||||
|
||||
- [CVE-2024-13530](CVE-2024/CVE-2024-135xx/CVE-2024-13530.json) (`2025-01-31T08:15:07.543`)
|
||||
- [CVE-2024-13623](CVE-2024/CVE-2024-136xx/CVE-2024-13623.json) (`2025-01-31T07:15:09.830`)
|
||||
- [CVE-2024-52875](CVE-2024/CVE-2024-528xx/CVE-2024-52875.json) (`2025-01-31T08:15:07.827`)
|
||||
- [CVE-2024-53007](CVE-2024/CVE-2024-530xx/CVE-2024-53007.json) (`2025-01-31T08:15:08.157`)
|
||||
- [CVE-2025-23671](CVE-2025/CVE-2025-236xx/CVE-2025-23671.json) (`2025-01-31T09:15:08.210`)
|
||||
- [CVE-2025-23759](CVE-2025/CVE-2025-237xx/CVE-2025-23759.json) (`2025-01-31T09:15:08.357`)
|
||||
- [CVE-2025-23976](CVE-2025/CVE-2025-239xx/CVE-2025-23976.json) (`2025-01-31T09:15:08.530`)
|
||||
- [CVE-2025-23977](CVE-2025/CVE-2025-239xx/CVE-2025-23977.json) (`2025-01-31T09:15:08.687`)
|
||||
- [CVE-2025-23978](CVE-2025/CVE-2025-239xx/CVE-2025-23978.json) (`2025-01-31T09:15:08.830`)
|
||||
- [CVE-2025-23980](CVE-2025/CVE-2025-239xx/CVE-2025-23980.json) (`2025-01-31T09:15:08.973`)
|
||||
- [CVE-2025-23985](CVE-2025/CVE-2025-239xx/CVE-2025-23985.json) (`2025-01-31T09:15:09.127`)
|
||||
- [CVE-2025-23987](CVE-2025/CVE-2025-239xx/CVE-2025-23987.json) (`2025-01-31T09:15:09.280`)
|
||||
- [CVE-2025-23989](CVE-2025/CVE-2025-239xx/CVE-2025-23989.json) (`2025-01-31T09:15:09.427`)
|
||||
- [CVE-2025-23990](CVE-2025/CVE-2025-239xx/CVE-2025-23990.json) (`2025-01-31T09:15:09.577`)
|
||||
- [CVE-2025-24534](CVE-2025/CVE-2025-245xx/CVE-2025-24534.json) (`2025-01-31T09:15:09.720`)
|
||||
- [CVE-2025-24535](CVE-2025/CVE-2025-245xx/CVE-2025-24535.json) (`2025-01-31T09:15:09.870`)
|
||||
- [CVE-2025-24549](CVE-2025/CVE-2025-245xx/CVE-2025-24549.json) (`2025-01-31T09:15:10.027`)
|
||||
- [CVE-2025-24551](CVE-2025/CVE-2025-245xx/CVE-2025-24551.json) (`2025-01-31T09:15:10.170`)
|
||||
- [CVE-2025-24560](CVE-2025/CVE-2025-245xx/CVE-2025-24560.json) (`2025-01-31T09:15:10.323`)
|
||||
- [CVE-2025-24563](CVE-2025/CVE-2025-245xx/CVE-2025-24563.json) (`2025-01-31T09:15:10.467`)
|
||||
- [CVE-2025-24597](CVE-2025/CVE-2025-245xx/CVE-2025-24597.json) (`2025-01-31T09:15:10.607`)
|
||||
- [CVE-2025-24608](CVE-2025/CVE-2025-246xx/CVE-2025-24608.json) (`2025-01-31T09:15:10.767`)
|
||||
- [CVE-2025-24609](CVE-2025/CVE-2025-246xx/CVE-2025-24609.json) (`2025-01-31T09:15:10.900`)
|
||||
- [CVE-2025-24632](CVE-2025/CVE-2025-246xx/CVE-2025-24632.json) (`2025-01-31T09:15:11.040`)
|
||||
- [CVE-2025-24635](CVE-2025/CVE-2025-246xx/CVE-2025-24635.json) (`2025-01-31T09:15:11.190`)
|
||||
- [CVE-2025-24686](CVE-2025/CVE-2025-246xx/CVE-2025-24686.json) (`2025-01-31T09:15:11.340`)
|
||||
- [CVE-2025-24710](CVE-2025/CVE-2025-247xx/CVE-2025-24710.json) (`2025-01-31T09:15:11.477`)
|
||||
- [CVE-2025-24718](CVE-2025/CVE-2025-247xx/CVE-2025-24718.json) (`2025-01-31T09:15:11.617`)
|
||||
- [CVE-2025-24749](CVE-2025/CVE-2025-247xx/CVE-2025-24749.json) (`2025-01-31T09:15:11.760`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
44
_state.csv
44
_state.csv
@ -246060,6 +246060,7 @@ CVE-2024-1315,0,0,8cb70de4b1449c82043b2652cd95d6eb6d48aeb35344f66e409dc981ea33e5
|
||||
CVE-2024-13153,0,0,e5372006a19c4f2229d5d82f2f00e097ecc1dd71c1df06bd0280614a58d1fbcf,2025-01-09T09:15:07.243000
|
||||
CVE-2024-13154,0,0,8b848cb4ffbbf3d5300b505058bccc136fae4b33341f37a24f40fb8ac9f235ba,2025-01-13T21:15:11.970000
|
||||
CVE-2024-13156,0,0,30f08a5146793529d2149bd8fe28d1d230f7d62ef9b057e2393b31a9d88e81a0,2025-01-14T09:15:20.910000
|
||||
CVE-2024-13157,1,1,568169b0ca5fce63c3ab23adc07f4be73288bc5d1cace5b787e6cbdb1a0296ed,2025-01-31T09:15:06.617000
|
||||
CVE-2024-13158,0,0,d921bcc53f0c4810cb7f77f962be3471977624bd876c8c3eed3db3c6a249539e,2025-01-14T18:15:26.020000
|
||||
CVE-2024-13159,0,0,c033202b4593bc2aeff54caa4015bf5ab23afa6f19b09f8e11d36c54b7b445e5,2025-01-14T18:15:26.243000
|
||||
CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000
|
||||
@ -246293,6 +246294,7 @@ CVE-2024-13466,0,0,653560f144409636354c1af48613afa8ec813df2848486a87387de21636b4
|
||||
CVE-2024-13467,0,0,bcd6474463b1a69c9a46d9b4d6f6f02b302b85f9777a4b31585c7467fbf3f38a,2025-01-25T08:15:09.520000
|
||||
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
|
||||
CVE-2024-13470,0,0,cd366f2d848ecaaaa8e2a5a38b4333677f61cb3a569faf0b3b65023a656393a3,2025-01-30T08:15:26.690000
|
||||
CVE-2024-13472,1,1,65e4a4a6619e82e57e5988495a0befee15f1589fedb83f6d4252dc99948d7f2a,2025-01-31T10:15:07.630000
|
||||
CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000
|
||||
CVE-2024-13484,0,0,712c057c7d39146a8afa657b40a8d67e5499db561a28666fb52dbcced8221de3,2025-01-28T19:15:13.753000
|
||||
CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000
|
||||
@ -246317,7 +246319,7 @@ CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70
|
||||
CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000
|
||||
CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000
|
||||
CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000
|
||||
CVE-2024-13530,1,1,a32dca6d75c33e81a9c9eaf2b59e70f20fcbfe169ec3d31442792a7d94733be9,2025-01-31T08:15:07.543000
|
||||
CVE-2024-13530,0,0,a32dca6d75c33e81a9c9eaf2b59e70f20fcbfe169ec3d31442792a7d94733be9,2025-01-31T08:15:07.543000
|
||||
CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000
|
||||
CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000
|
||||
CVE-2024-13542,0,0,c45a986aa867dcb8c5f485f5d0834964d3d14a785680faca172769f60f73e69e,2025-01-24T11:15:09.377000
|
||||
@ -246330,6 +246332,7 @@ CVE-2024-13551,0,0,c0f32b47678190b67b060d76bcd33ea48dd01585e717a7e931b6ea219ab11
|
||||
CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000
|
||||
CVE-2024-13561,0,0,321fb86513d3ff8255f225cc7373210080af406dea9669094350295c144d7ae9,2025-01-29T12:15:27.617000
|
||||
CVE-2024-13562,0,0,77e083f4cdf73b4ddbc324f348afd08346ceeabfc8f2f059cfdc83de8bce92a8,2025-01-25T12:15:26.570000
|
||||
CVE-2024-13566,1,1,dd455b5c6c79c50cc3a56ce23db0039a6651194309cff2d1529e0608cc927c54,2025-01-31T09:15:06.847000
|
||||
CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000
|
||||
CVE-2024-13572,0,0,810ff57abb3e74e570a0f4342646c85283702b45afe741301e2f9c7354adbef4,2025-01-24T11:15:09.520000
|
||||
CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000
|
||||
@ -246345,7 +246348,7 @@ CVE-2024-13599,0,0,8416ac4ba24e0470447a5d54bcb4a58d565d7b0165c1a9d0f1a855bfbf0c1
|
||||
CVE-2024-1360,0,0,a87675d91847a9b72ed5368695c7c67c099276d1667e5e94dc544f268946892c,2024-11-21T08:50:24.707000
|
||||
CVE-2024-1361,0,0,8a11a93152fbfa05be2934d541581f2e8e8c1350c348ceb554a6a47ec08e0e2f,2025-01-15T18:39:23.493000
|
||||
CVE-2024-1362,0,0,ebe61894e3dd1fecb8d4711188e9d8f7e6a2ff043508a2ee93131b033a0336dd,2025-01-15T18:40:30.490000
|
||||
CVE-2024-13623,1,1,2cada29a90e918414353741b6e3b8cf08dc12a83860192531fa76e51a17031e8,2025-01-31T07:15:09.830000
|
||||
CVE-2024-13623,0,0,2cada29a90e918414353741b6e3b8cf08dc12a83860192531fa76e51a17031e8,2025-01-31T07:15:09.830000
|
||||
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
|
||||
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
|
||||
CVE-2024-13642,0,0,305a541671cd97a16b24d4e91a357de627282533e6d955bf781fd96606eff81c,2025-01-30T07:15:08.700000
|
||||
@ -265515,6 +265518,7 @@ CVE-2024-44051,0,0,bb4d131f280c6064efcf52c2c30f5ec83dd01e176e2104cda60ad96bd5175
|
||||
CVE-2024-44052,0,0,8e8edee4d7aa020cbb77d66765bf7e0fb95955c7d29ac9bdee351d4808ebbb1a,2024-11-08T21:24:59.660000
|
||||
CVE-2024-44053,0,0,1696f8c4d673fc16f00ba39f4de0363282e5fa65b41555660d42b03b08acc401,2024-09-27T15:32:14.153000
|
||||
CVE-2024-44054,0,0,bbda69cd525c1452aab61418e0c2d92e823366d449e1e720bc9c980f6ca11fb6,2024-09-23T14:23:19.573000
|
||||
CVE-2024-44055,1,1,1065b2b946623cf2b8baa09aa0d29fd542c346f9a8ba223724cbd8752255637b,2025-01-31T09:15:07.010000
|
||||
CVE-2024-44056,0,0,481450d3310966d9bffbb9742f28927f3eb7120738f18a84e421e7503f87941d,2024-09-23T14:39:05.047000
|
||||
CVE-2024-44057,0,0,e3b5ad83a59cabcda381e4e82a8fe3776c370c591dd3d1286b2394043ae056c9,2024-09-23T14:33:50.830000
|
||||
CVE-2024-44058,0,0,5422e6d726ad626bea0b5d9141b6afe8af08d99805ad88c82875c1d67d89d797,2024-09-23T14:28:34.860000
|
||||
@ -271514,7 +271518,7 @@ CVE-2024-5287,0,0,ede9629ba14e7833d0e00ab367a4e2205145f22a5dce3f4d9b720c5001bdf2
|
||||
CVE-2024-52870,0,0,1a3a6d971d4bd90b76dc72d1f20af849443ecb143b46e583f633f2d3b372f550,2025-01-17T22:15:28.663000
|
||||
CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000
|
||||
CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a43927045f3,2024-11-18T18:35:09.270000
|
||||
CVE-2024-52875,1,1,54df66f2a8f2e3f18985bef97f8d7df0c7d20f7e3ac8cc01461b1012642ac097,2025-01-31T08:15:07.827000
|
||||
CVE-2024-52875,0,0,54df66f2a8f2e3f18985bef97f8d7df0c7d20f7e3ac8cc01461b1012642ac097,2025-01-31T08:15:07.827000
|
||||
CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212592,2024-11-18T17:35:08.900000
|
||||
CVE-2024-5288,0,0,35888db4a5e323e6a29faa7e47d2416858cbeb598a42c21aa0c323691cd3d86c,2024-08-28T12:57:39.090000
|
||||
CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e1b,2024-11-21T09:47:21.990000
|
||||
@ -271595,7 +271599,7 @@ CVE-2024-53003,0,0,34e88568f57539586a5fe970f0af192db295a737235b2a98a2fd76c104267
|
||||
CVE-2024-53004,0,0,b1eddd30e3bfa0e6702075b6e0dcfc9d848e1db73280a9217519c42273234bf1,2024-12-12T18:30:46.870000
|
||||
CVE-2024-53005,0,0,3dc6e47151847664b25c50b95732d760b83155ba3d3a6b0bd92fd6b07af512ff,2024-12-12T18:25:58.717000
|
||||
CVE-2024-53006,0,0,9319c5ef0bd10ec00679ded4a4ad11e13d0be340e712e774cbfbbe0a5382401c,2024-12-13T18:46:25.473000
|
||||
CVE-2024-53007,1,1,245e17914d55954fd4b9970bb8b479f26d37acd1ea6760f574d49cad5e9ff133,2025-01-31T08:15:08.157000
|
||||
CVE-2024-53007,0,0,245e17914d55954fd4b9970bb8b479f26d37acd1ea6760f574d49cad5e9ff133,2025-01-31T08:15:08.157000
|
||||
CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000
|
||||
CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000
|
||||
CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000
|
||||
@ -278566,6 +278570,7 @@ CVE-2025-22222,0,0,88427fbd6b71746a7cac38ab28182f0393978cf8d8f60352e5bba62689c94
|
||||
CVE-2025-22261,0,0,33a310cbc7efb685d95693f6e008875a8290fc5f9c6bce0cde03f1c0742bf7b7,2025-01-07T11:15:13.290000
|
||||
CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000
|
||||
CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000
|
||||
CVE-2025-22265,1,1,980ecef91eb5066a526a3d192ec59ee9bc96d808d70f5ce59990623a342cacc7,2025-01-31T09:15:07.167000
|
||||
CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000
|
||||
CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000
|
||||
CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000
|
||||
@ -278608,6 +278613,7 @@ CVE-2025-22328,0,0,bae5ea02b892a469897a505361fc54dac1bb5e3519ad609d0ce29be3676ad
|
||||
CVE-2025-22329,0,0,f5d56d1aa2c78408d4025f17e76f097f1bd68e404c811ca09dc38f2add757e56,2025-01-15T16:15:34.763000
|
||||
CVE-2025-22330,0,0,839502208eee95785526cf7c123f74018642e883627c07e6a080cad1506cc7ff,2025-01-09T16:16:25.840000
|
||||
CVE-2025-22331,0,0,a2f8402b66c9c90ee6c55cbe4004f833df5c3b164a1649adc2a5ef04d9b0d06a,2025-01-09T16:16:26.180000
|
||||
CVE-2025-22332,1,1,1a57746b7ba0aa2ebee2c307ffe9540a4951c7c28899766a006fd211c492a286,2025-01-31T09:15:07.317000
|
||||
CVE-2025-22333,0,0,e1ce540f097535337d77ac62982e232ef112548ec7d9205fe7d663038857be1a,2025-01-07T11:15:17.160000
|
||||
CVE-2025-22334,0,0,11b4f4e8db4b7785b74aad91051c2e8051c499de944f60aa9b4469a20e495399,2025-01-07T17:15:32.953000
|
||||
CVE-2025-22335,0,0,4a08b412add701f059cd149e45f878ef3b0f40f24de1ec01f34841e4d73759dc,2025-01-07T16:15:42.703000
|
||||
@ -278615,6 +278621,7 @@ CVE-2025-22336,0,0,e498264d94897dc70f78e05983d91aacc96a48160550b893d84ce97145124
|
||||
CVE-2025-22337,0,0,5d41c59b533e15a90ac0eb04123ef238c192c67fdf1a3a5a9bc7681f9252fc36,2025-01-13T14:15:10.440000
|
||||
CVE-2025-22338,0,0,7129ea122c6554e3c515c55738d8d6c2390b8b27bae9ff6ebda6d0b32cd44085,2025-01-07T16:15:44.117000
|
||||
CVE-2025-22339,0,0,e3b226b5bf5a3cbff8aebc6d88bcb4fc118cdad6ece13f47708a7ca8d8f13135,2025-01-07T11:15:17.463000
|
||||
CVE-2025-22341,1,1,7a252dfe94b5aebe5db0bf845ec16300a37e876c3203ea4e093e02a898233687,2025-01-31T09:15:07.470000
|
||||
CVE-2025-22342,0,0,541f867dbda194731b8a18481f8f88aab54d4c9b69e4847a11ff394e4e7ae36c,2025-01-07T11:15:17.610000
|
||||
CVE-2025-22343,0,0,5a249d51bc1bb83b765cbc47fc56c527973dc8aee76835d7267eeba7cb4b3587,2025-01-07T11:15:17.743000
|
||||
CVE-2025-22344,0,0,73b38550cc61c4d4fcec8a1a6c6ebfdcafdd6bf85ac16de00bbc41a01d5f4343,2025-01-13T14:15:10.613000
|
||||
@ -278713,6 +278720,7 @@ CVE-2025-22560,0,0,9ca1212fb17f4181c18e39c7de050eeeb10043eec792b100a6ff2194db9fd
|
||||
CVE-2025-22561,0,0,623f2eb2c761c9d3d25a004f777db613fa6e7b7a5c670c04365fe632627b5a6b,2025-01-09T16:16:28.827000
|
||||
CVE-2025-22562,0,0,5434b49fc7631b7fa2baab733e275c32c8bcafb45eb3bbd6810cf2008467fe71,2025-01-07T16:15:52.540000
|
||||
CVE-2025-22563,0,0,08641cc3ce798be612ccd7e4c4a75bb78413c6f046999167e72153c276a54042,2025-01-07T16:15:52.940000
|
||||
CVE-2025-22564,1,1,f1a324a9a4a7ed353781f19eb5de87b1e37be87ba686645966b797041e2c1f77,2025-01-31T09:15:07.627000
|
||||
CVE-2025-22567,0,0,7640327e90d13935406fda5e46326035dce8768c7ac08f762a301197dc23d3c0,2025-01-13T14:15:11.460000
|
||||
CVE-2025-22568,0,0,f3a337c9bc58a10967a71c972b3d36d20f02e69abf28f2da99dbae5c50742b4f,2025-01-13T14:15:11.610000
|
||||
CVE-2025-22569,0,0,71c2a126896a25500ec5a83e43acb4e704a716153f97fc1411303eae2fdb9009,2025-01-13T14:15:11.787000
|
||||
@ -278774,6 +278782,7 @@ CVE-2025-22716,0,0,574cf0b5875717b93863e982d1cab0b81ccdb8ad9a1ac52da300f5eb0abac
|
||||
CVE-2025-22717,0,0,045d0e1e5f3cb0fdeed8a39d1665e4e46f6270d91c24ab8506dee6964c28d59b,2025-01-21T14:15:11.527000
|
||||
CVE-2025-22718,0,0,af552db1d51fb8ce52426df5d2512b6494860cf9b2184f61079c95efecaa5cb1,2025-01-21T14:15:11.697000
|
||||
CVE-2025-22719,0,0,5bd88b64227ddb0806bbf4a03d00b50965d6e95ab3764f375fda0f14d5c5be5c,2025-01-21T14:15:11.860000
|
||||
CVE-2025-22720,1,1,e20188414886de62acc3f7692b7201770c4130a5da74aea38c8b4c2162c464fc,2025-01-31T09:15:07.770000
|
||||
CVE-2025-22721,0,0,b262a715cba54c17fe83d44892573aa8774855ca798bef491313a71f26432b7d,2025-01-21T18:15:15.880000
|
||||
CVE-2025-22722,0,0,46dfbd6849c3dd98d390fb319b428d78acaf82f7d9a5f48a36560b752e60ded8,2025-01-21T18:15:16.057000
|
||||
CVE-2025-22723,0,0,9840575079edde83aa306dc43108d401256a5ee1d470cd37a6e795011bb563cc,2025-01-21T14:15:12.017000
|
||||
@ -278802,6 +278811,7 @@ CVE-2025-22752,0,0,41bc182eb31d3ed08c47c2f1a14594b9475edefd40e6ac88496a43b932ffd
|
||||
CVE-2025-22753,0,0,1392ba1976b2f3737be53da9e82e2a71b66804802fe541ed64804556b77dc379,2025-01-15T16:15:38.090000
|
||||
CVE-2025-22754,0,0,c0a20ff0dc7d11a65b9241a7172e5329fe4a137b477ec9e87a12160d75b634c6,2025-01-15T16:15:38.260000
|
||||
CVE-2025-22755,0,0,8f6b0a04551af49856a2271381efe0b139629609cf6cdbb88a9b44d66b8939d8,2025-01-15T16:15:38.417000
|
||||
CVE-2025-22757,1,1,545c60ebe78f04709daa5d0cdafad9d8c42daedfa920bd2facae8e620e8e33d4,2025-01-31T09:15:07.913000
|
||||
CVE-2025-22758,0,0,75af2175b66bedd5905c80abd56322cb37a48c8bc3ca46887b18b8750dd877d0,2025-01-15T16:15:38.577000
|
||||
CVE-2025-22759,0,0,9fd34399fa1530c21c9cfdecd9f53c69ec53b7cabdae01a2ee26417453f72f17,2025-01-15T16:15:38.733000
|
||||
CVE-2025-22760,0,0,ceaff3b523ed1ab68ca9afc6e8dcc1721a356d85b9c6dbcc0d6dd64777fa93b0,2025-01-15T16:15:38.890000
|
||||
@ -279058,6 +279068,7 @@ CVE-2025-23580,0,0,59e55d87bb1152c0b33f0e647e86e7e0bf5bdb957c7b17144cb4b97c87ffc
|
||||
CVE-2025-23583,0,0,822a096c4bf103ecc85a757b154ff2676bab47254e439d8f1a0dc183e1069329,2025-01-22T15:15:17.820000
|
||||
CVE-2025-23589,0,0,ddf5471ae852dabea42c5158329ef70238607d70b85f56376e4ac0c4bb487ae4,2025-01-22T15:15:17.950000
|
||||
CVE-2025-23592,0,0,c6c26f6ac5e063b93a35489a4c79c8c99eaee0347d8804de080707e83378d4fd,2025-01-22T15:15:18.097000
|
||||
CVE-2025-23596,1,1,bfb0e90a6c5252afe61d41dfe71ccb2f6f594cb122772f3faebf445a764f58cc,2025-01-31T09:15:08.060000
|
||||
CVE-2025-23597,0,0,3871369d91ae00dd4869bc54339db422ba0880625256256884fee491f4563202,2025-01-22T15:15:18.230000
|
||||
CVE-2025-23601,0,0,8cf3c2f8696e7e005f222e1bdb76c123a3be382277805d94473298416d95984a,2025-01-22T15:15:18.363000
|
||||
CVE-2025-23602,0,0,4cd584065e9b9f106e16ebb05185970d67a3f28867f9738a25ae9c2e26b7393f,2025-01-22T15:15:18.503000
|
||||
@ -279101,6 +279112,7 @@ CVE-2025-23662,0,0,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1
|
||||
CVE-2025-23664,0,0,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9be7,2025-01-16T20:15:43.320000
|
||||
CVE-2025-23665,0,0,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000
|
||||
CVE-2025-23669,0,0,9d3b37ccadd2ee69ebcf7dda5f5c3274138874e1b048df0c9bf6fb374b103459,2025-01-27T15:15:12.423000
|
||||
CVE-2025-23671,1,1,46c84081401892868113e592ab4bbf541ce5b1e2bcfa1ff04198e153e0532705,2025-01-31T09:15:08.210000
|
||||
CVE-2025-23672,0,0,9b4e91d2a971d6e816e88b382cc31c2340c56e76479cf040d6e0c5290d97a21a,2025-01-22T15:15:20.287000
|
||||
CVE-2025-23673,0,0,29cefcd5e33b42efd9dd838456a4202e1ca110aefe8c270bd5abccdd213d0d3b,2025-01-16T20:15:43.620000
|
||||
CVE-2025-23674,0,0,82d0f47596aa91a27d7206050e2f23fe27e33f61b61152aa1cea9075ecc820e7,2025-01-22T15:15:20.420000
|
||||
@ -279158,6 +279170,7 @@ CVE-2025-23752,0,0,c4a79df1175fc8304cc7d0bc1439213a7f94dd9651e5758ccfd85de4caf11
|
||||
CVE-2025-23754,0,0,21c71491dc1049f80bc2b3d0ef81d089692e692ff20a4894b4b54787667340c8,2025-01-27T15:15:12.727000
|
||||
CVE-2025-23756,0,0,b189fbbb2b658c767f0f6a4b533dbbc808056809be370f040f7098f77febf47e,2025-01-27T15:15:12.877000
|
||||
CVE-2025-23758,0,0,8eed9a0b591b6f7c4da32f087513eca80ea069aba6fbd197956f1fc2df31f12b,2025-01-22T15:15:22.907000
|
||||
CVE-2025-23759,1,1,e246047aa026fdb44c1a4b2854950b65bcff3c4d45b64b864f69f88e0ae090b1,2025-01-31T09:15:08.357000
|
||||
CVE-2025-23760,0,0,c926328276013ba4c92054487020a2c00b6299d54746739ff21a4a2b0e4582aa,2025-01-16T21:15:18.257000
|
||||
CVE-2025-23761,0,0,54955953ddba7da6b8dc6db7af99134b4479d6ff349ea65bc12f9e3c7ac517a4,2025-01-16T21:15:18.410000
|
||||
CVE-2025-23764,0,0,7f32d20a1e65ecaa3e33bea3553398156868c7ff8731a49a86f2b21b51701ff3,2025-01-16T21:15:18.550000
|
||||
@ -279323,7 +279336,15 @@ CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96
|
||||
CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000
|
||||
CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000
|
||||
CVE-2025-23966,0,0,0e6c6a1caa3d328f215893bbd7894611dd4559bc9c207666f24bc83d16a65051,2025-01-22T15:15:26.950000
|
||||
CVE-2025-23976,1,1,e0eab9311af6f0866161d1152b41dd0b88221351a5485aef9432360dead5ad9b,2025-01-31T09:15:08.530000
|
||||
CVE-2025-23977,1,1,2b3becab0586b5f0b804d3093772319babfc687fc85a1f0a11f4034a398fdd3a,2025-01-31T09:15:08.687000
|
||||
CVE-2025-23978,1,1,e17deaffe1129da6e865971c3b079c57195bc303f97a89196906ea25ae51ec12,2025-01-31T09:15:08.830000
|
||||
CVE-2025-23980,1,1,2b413ddfc15217b02f4cdb5a9b4327d6257cc1036ee72dffadd611ebcf279fc3,2025-01-31T09:15:08.973000
|
||||
CVE-2025-23982,0,0,7dfe3e48e718999b3739cbfc59b600560c8c7feccf14557bc94cb8c8978377d9,2025-01-27T15:15:13.247000
|
||||
CVE-2025-23985,1,1,874d7a7c839515ccb8b8c14aba0a7e876e46f2c3bf639e81bfafdac6710b3504,2025-01-31T09:15:09.127000
|
||||
CVE-2025-23987,1,1,eaf59c635a24b658b7ebe922a33e4a9c6f6881fff544a96f2e210734d5009610,2025-01-31T09:15:09.280000
|
||||
CVE-2025-23989,1,1,533bcc23765221caa714b18f81f4abdbd9ff5199ed2f714fba0c159c05ff4f97,2025-01-31T09:15:09.427000
|
||||
CVE-2025-23990,1,1,1d4d447844ce4d6ae33a46a793b2bfe9f8732072919d84fc1711b79793282882,2025-01-31T09:15:09.577000
|
||||
CVE-2025-23991,0,0,09c292242e39739888eb9fe6d97bdb10055d45d713f6ffa829b0733e0b5456d2,2025-01-24T16:15:38.723000
|
||||
CVE-2025-23992,0,0,6d44f95ed9666a8a68923c67dcffd2f515365a6c1e7800071790e2d881846261,2025-01-22T16:15:32.120000
|
||||
CVE-2025-23994,0,0,db61266fc09611137499867f42a15cfdb3d24abf264ca83daab38bc4b3bec239,2025-01-21T18:15:17.313000
|
||||
@ -279461,6 +279482,8 @@ CVE-2025-24527,0,0,8f5d99489f05ec903e1b0ba411b4f26945dcb60c4d1c8d36f935f4c612211
|
||||
CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000
|
||||
CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000
|
||||
CVE-2025-24533,0,0,7b36821849ab798d81c60afcd620ba9ed617eb480eb18f61a881f0c2f7c8a39d,2025-01-27T14:15:28.653000
|
||||
CVE-2025-24534,1,1,101e1e434d2a29f62e13ecd7766e303d1328267bb3d87cc866eeed722961113d,2025-01-31T09:15:09.720000
|
||||
CVE-2025-24535,1,1,c5149e14293bf035c80f56e88caca17c0576f4162a158c6e05f663c0716406a0,2025-01-31T09:15:09.870000
|
||||
CVE-2025-24537,0,0,06c9da6fbc6f8c7d8022c609da167bba6221fe718dd9e4ef9e6a1c0e2d457262,2025-01-27T15:15:13.440000
|
||||
CVE-2025-24538,0,0,0f8d31f1296887dcb26ac5acc0a368526d03dde9efa05b94d9d3fe598ce981df,2025-01-27T15:15:13.607000
|
||||
CVE-2025-24540,0,0,cd6ea69ba28b1ebb10b70369bc57bb82429bc2558c0fbb08776f05fe155ad78b,2025-01-27T15:15:13.753000
|
||||
@ -279468,10 +279491,14 @@ CVE-2025-24542,0,0,06390c27c63870cfb207e6b1afc38cc2bd70c54f2ceb6de8405d7ce03a079
|
||||
CVE-2025-24543,0,0,a8808a4cea2b4649f0717c8217dced1494e1792562a41700280f034c2d3ba9ea,2025-01-24T18:15:32.703000
|
||||
CVE-2025-24546,0,0,685ea9d400c8b68f55f713daec1971d56383230bb2c0cc8dfdd7487103aa25d1,2025-01-24T18:15:32.893000
|
||||
CVE-2025-24547,0,0,c177583f7b4a7259791b6ebcff6a352143f7ed52e1ea2f3eabe18b6e76e995e9,2025-01-24T18:15:33.063000
|
||||
CVE-2025-24549,1,1,d197d4219524264836d83f7d0b4c62c1f60f5c6c08ca5a01968af8e6be12bddd,2025-01-31T09:15:10.027000
|
||||
CVE-2025-24551,1,1,89890fcb7fdc2cf0f469b52beec92a27eab339c8421ab40ceb9ef974fa54d86c,2025-01-31T09:15:10.170000
|
||||
CVE-2025-24552,0,0,5836fd4cff67061da1a022b37868b2f3c365d2f5d165ede2a999174e0f3c027d,2025-01-24T18:15:33.257000
|
||||
CVE-2025-24555,0,0,d47f17b8e2e295cf6139e94a64e84d237163885ad2ad17216990f34a21e900fe,2025-01-24T18:15:33.440000
|
||||
CVE-2025-24560,1,1,d4c1176f1866d7ec0387cfc21d73b48c7dc3b47ed71e35d50794b79b4bc9779b,2025-01-31T09:15:10.323000
|
||||
CVE-2025-24561,0,0,c698bd2c648564da7cb8a5ead03f00bdcfe0f5e2d45f91fef21ce218041ca538,2025-01-24T18:15:33.623000
|
||||
CVE-2025-24562,0,0,f5a2b27ad0b893f9e361ae02017813ce34418cc837106061d965034991fc502e,2025-01-24T18:15:33.810000
|
||||
CVE-2025-24563,1,1,e10943f5840e540dd8ca5639d051f2511e3f57ce5b74c871814018f1b701c4fc,2025-01-31T09:15:10.467000
|
||||
CVE-2025-24568,0,0,76160f57a35703cc1bc60dd8f4bddda882f344202b02d103baf733d8125cff67,2025-01-24T18:15:33.987000
|
||||
CVE-2025-24570,0,0,c28f0a95c222bf88ff7e9dd87509b02b35c9c870ecf7971f96c34cc8feb983a7,2025-01-24T18:15:34.147000
|
||||
CVE-2025-24571,0,0,12bfb570d5dbb7308e59de1fd0e176919ad5f022d4e611da786987fff50f0ad8,2025-01-24T18:15:34.320000
|
||||
@ -279493,11 +279520,14 @@ CVE-2025-24593,0,0,9c36266dcac20d200a08525d83ae20f675d64d14e2bb734ccd76bf4940d78
|
||||
CVE-2025-24594,0,0,1f51a1d2e76cef969f6771fdca9d4628f716965e3d22ebbbb8948ae8c6232723,2025-01-24T18:15:36.330000
|
||||
CVE-2025-24595,0,0,fbc09565a4f924c0a009b4638cc6ed5e9d14e449e9654f8ef695d4106c965b5a,2025-01-24T18:15:36.497000
|
||||
CVE-2025-24596,0,0,4a462b85d7c20eb1e51f14e1da141104983de82ee010f1f7b247f3fd81c9e8c1,2025-01-24T18:15:36.657000
|
||||
CVE-2025-24597,1,1,4f9595b5b3d6a1b18fa628038d17ebdb90040d7d0e2b83043a402812377ecc27,2025-01-31T09:15:10.607000
|
||||
CVE-2025-24600,0,0,dcdd8cdf482b8e22d2a48b0e2f348d3c7f88226c6331542bf0912f288b741729,2025-01-27T15:15:14.233000
|
||||
CVE-2025-24601,0,0,db505c493b963cd133491367007025a7a3eeb79293d5855e01deb30a1e81f5f1,2025-01-27T14:15:28.927000
|
||||
CVE-2025-24603,0,0,cc1c8cd1942a1d516a081ea3f5d2c128e09834a700f6e631e4df98b4ec31c06c,2025-01-27T15:15:14.437000
|
||||
CVE-2025-24604,0,0,62a39d9b09aae3795a1a5623a917bfa7211aaa213197284781446d74cdc483ea,2025-01-24T18:15:36.823000
|
||||
CVE-2025-24606,0,0,5a6e3000a389ad1fa9dbb9a960a9755d84ee1b04bf140fb25209a300fb4fcd1a,2025-01-27T15:15:14.587000
|
||||
CVE-2025-24608,1,1,1426d6306f52065c1181109032454fe40202afbf9c92acf2a056587aa0810c2c,2025-01-31T09:15:10.767000
|
||||
CVE-2025-24609,1,1,dabd57eb8178c8ab365b5e8b630c7ff7e563296c5bbdd16fc52bd403d7b2e050,2025-01-31T09:15:10.900000
|
||||
CVE-2025-24610,0,0,13a39d2f135170db910afda2a99191d77f2a29be1fdfb9d97efc58222978983e,2025-01-24T18:15:36.980000
|
||||
CVE-2025-24611,0,0,5715cfb8338e1d2a6890eac94e9d49d3d44cfa21d68c17c839c3a2944696055d,2025-01-24T18:15:37.133000
|
||||
CVE-2025-24612,0,0,2e20863c253051aaaea60ecd45f224a8c2678654eaa53b81ed896c6a14b65efa,2025-01-27T14:15:29.063000
|
||||
@ -279509,8 +279539,10 @@ CVE-2025-24625,0,0,c78d300f1f0ba711e3f863a83d368167a911692a6dfd48749e68c965f6f00
|
||||
CVE-2025-24626,0,0,a470e4da4e034c9f2ab445a591e418acc188dd505508f456d0941bc394263b92,2025-01-27T15:15:14.777000
|
||||
CVE-2025-24627,0,0,02ed717fe8cb73f0e136d781f500cc8f29934ec76495d5547688a475083bddd4,2025-01-24T18:15:38.050000
|
||||
CVE-2025-24628,0,0,921a9ab162d6fedf70ed90c3acec080864c3f2a85c667b57a58565282ba9c543,2025-01-27T15:15:14.923000
|
||||
CVE-2025-24632,1,1,556d6471474be19d6e9a79c89f124dfec2d5aa506de91713bc151ebf0bd1bc14,2025-01-31T09:15:11.040000
|
||||
CVE-2025-24633,0,0,b407bcbade3843581c653e2df1781329c3dc7476fcc6243a7b85dc7360c755e6,2025-01-24T18:15:38.200000
|
||||
CVE-2025-24634,0,0,2bd24fdaae28a006ea4038da848c5e593d0eecbe902bfc5110e8d66be395288f,2025-01-24T18:15:38.350000
|
||||
CVE-2025-24635,1,1,adee0e2e2c087cce5e8c9d2e888c88ec3d1427a2ea2418aa51d5531c795222ee,2025-01-31T09:15:11.190000
|
||||
CVE-2025-24636,0,0,66aa9f526ce1fd7f3d18159e839d4ebddd24821053620416273bd4a4e01bf4a1,2025-01-24T18:15:38.507000
|
||||
CVE-2025-24638,0,0,771d55a14f39075844370a6399a01b34d18de7f194d5cd5f84255753a3dd779b,2025-01-24T18:15:38.670000
|
||||
CVE-2025-24644,0,0,5a47ee9c1d078a6ab6544254498806ccdab795bbe804f919ad0351c4bf3bd942,2025-01-24T18:15:38.833000
|
||||
@ -279542,6 +279574,7 @@ CVE-2025-24681,0,0,605fdc2e36dc827462c36791192232d92dd296cecf5b41187efd4a46c704e
|
||||
CVE-2025-24682,0,0,ca5f8a1b03b0ffb82cb43100159f5b8a9d5c286a9ed1e11204650e11edcdf612,2025-01-24T18:15:41.947000
|
||||
CVE-2025-24683,0,0,bd281ec7d77c6dd8b1732719895ece773bf0791905499e1cf46a62b4feaf0c85,2025-01-24T18:15:42.133000
|
||||
CVE-2025-24685,0,0,3935ef96229daa1b4c692226c2accf1fba103f1acefb63d2634035e3247a2886,2025-01-27T14:15:29.333000
|
||||
CVE-2025-24686,1,1,f70de11c29db663e16f62dc00c94a534e549254878c7eacd82f90f3a962e5fec,2025-01-31T09:15:11.340000
|
||||
CVE-2025-24687,0,0,a97e3c851507d885e2534c8d23f0ef9f7027aca0eec7a3965703f56e53f67d20,2025-01-24T18:15:42.283000
|
||||
CVE-2025-24689,0,0,1de513e8e8f691d40e4b3e7d3658a5a290626246a247d5f74e6d4f1c5b396ca3,2025-01-27T15:15:16.073000
|
||||
CVE-2025-24691,0,0,8f9407c7a90579300dd1854e170d65459a01a3bff3d853f2b1c7f87668044003,2025-01-24T18:15:42.433000
|
||||
@ -279557,6 +279590,7 @@ CVE-2025-24705,0,0,0d29a10c3c131298ef8bd5a8cb9217ebb025888c7cb5d2d97a7633b27b032
|
||||
CVE-2025-24706,0,0,310d3f61486b57a678867c52af7a3873d74ff33456f7825d148f48af59ebe640,2025-01-24T18:15:44.003000
|
||||
CVE-2025-24708,0,0,92ede108f27ffdee04adb376065e31ecf2859fc8c1a57b0e6ab76efd11e64544,2025-01-27T15:15:16.230000
|
||||
CVE-2025-24709,0,0,6d23c7aa23f5f0132f167fb051a07c37a43447273edf0a534d427fd5c040c301,2025-01-24T18:15:44.170000
|
||||
CVE-2025-24710,1,1,566859838006945e87e24597a4a246871f0ba980ab62fd8f114894ec04b52203,2025-01-31T09:15:11.477000
|
||||
CVE-2025-24711,0,0,2b6393d74f40d976d8e5d885b625242518c74534f12353db2bfa977c486e6f90,2025-01-24T18:15:44.330000
|
||||
CVE-2025-24712,0,0,ad5ee3989300fa678ccc1aeeb2c1408d12155cb4b9c591212188ab9aa01bb7df,2025-01-24T18:15:44.480000
|
||||
CVE-2025-24713,0,0,8966c71c53790b1b9ead199719a98f45f6076ff08526301a47eed7a249ba7a5b,2025-01-24T18:15:44.630000
|
||||
@ -279564,6 +279598,7 @@ CVE-2025-24714,0,0,01c79f3d6975fa00ca9de87ee51395e5de6793c68e48bd2909badc648a193
|
||||
CVE-2025-24715,0,0,918d31ff258da35c7d5a3cb0c4c244eba5a3169754271f2070db9f98a76d2e96,2025-01-24T18:15:44.913000
|
||||
CVE-2025-24716,0,0,b60cda0ae81f3b0923fa7b26df1f0e620ddd729d40eb70ccadd9577c7ee769ce,2025-01-24T18:15:45.057000
|
||||
CVE-2025-24717,0,0,192c45824352b7ecf8a017aadf0ae5aeb9949e337e41e88029f7cee314070cf4,2025-01-24T18:15:45.210000
|
||||
CVE-2025-24718,1,1,076d393e46e41dfcb80184b7828cac787e866a2c39d69d016e00ed53df0884fd,2025-01-31T09:15:11.617000
|
||||
CVE-2025-24719,0,0,b6a5eaae7b6b9dac2df9124e88387d1f1ef87c3d0c79dd412c3d005280b66ed8,2025-01-24T18:15:45.360000
|
||||
CVE-2025-24720,0,0,9c714f59d0192e69fce2a5027c9e7738070e04ddd86e75e44b28cff60eb7786a,2025-01-24T18:15:45.523000
|
||||
CVE-2025-24721,0,0,87c237eedc92baee03d4c2c20cc1d540e9d333bd80081e1b8926ab4576af7541,2025-01-24T18:15:45.667000
|
||||
@ -279590,6 +279625,7 @@ CVE-2025-24743,0,0,41c0ba755259a09bb78d30034dfcceff3f65521049087232d94552c5b5203
|
||||
CVE-2025-24744,0,0,e89d8ff4eca838607435ef9e0329695df1c3d2f7f7da2a6a7138e174e3ce48dc,2025-01-27T15:15:17.117000
|
||||
CVE-2025-24746,0,0,76b6359f26bba7626bbf7027b062daab552b87a782fc60d7a7da64d1ce3753c9,2025-01-24T18:15:48.437000
|
||||
CVE-2025-24747,0,0,0ef68093fe47b6e703556413c3e771c9fd229228f186762cf3469f52d01e5aa5,2025-01-27T15:15:17.253000
|
||||
CVE-2025-24749,1,1,e117b0b7203e92297703008dde6e38898de1451f49b99f2af8811aae5a9a3098,2025-01-31T09:15:11.760000
|
||||
CVE-2025-24750,0,0,e2f4a9b31b86d06509f886277e82ff83239dd5a8a7c14cdf3ecc2568e5cf5c3e,2025-01-24T18:15:48.663000
|
||||
CVE-2025-24751,0,0,4aa19aa90aab45ec9714df6e468e19599d2a1949dc2de4e4c8d985f84e38f858,2025-01-24T18:15:48.810000
|
||||
CVE-2025-24753,0,0,87b78dd3e11c90af6930cbca7a5346ee214e24237caa8b3601406532dfdbc4de,2025-01-24T18:15:48.950000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user