Auto-Update: 2025-01-31T11:00:32.200111+00:00

This commit is contained in:
cad-safe-bot 2025-01-31 11:03:58 +00:00
parent f7cbd83df6
commit ab6e759dda
38 changed files with 2121 additions and 12 deletions

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-13157",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T09:15:06.617",
"lastModified": "2025-01-31T09:15:06.617",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MP3 Audio Player \u2013 Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Podcast RSS Feed in all versions up to, and including, 5.9.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/mp3-music-player-by-sonaar/trunk/includes/class-sonaar-music-widget.php#L1733",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3231414/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/mp3-music-player-by-sonaar/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/547325ad-0b01-42d5-b47c-362044587395?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-13472",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T10:15:07.630",
"lastModified": "2025-01-31T10:15:07.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The WooCommerce Product Table Lite plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.9.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. The same 'sc_attrs' parameter is vulnerable to Reflected Cross-Site Scripting as well."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wc-product-table-lite/trunk/main.php#L1843",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3231930/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/wc-product-table-lite/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4f1a1171-3d7b-46a4-982e-fe318e3017b7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-13566",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-31T09:15:06.847",
"lastModified": "2025-01-31T09:15:06.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP DataTable plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 parameter in all versions up to, and including, 0.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-datatable/trunk/shortcode.php#L42",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3231842",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/wp-datatable/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ad96faa-cbc2-46c3-a8e6-afa6744ada86?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-44055",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:07.010",
"lastModified": "2025-01-31T09:15:07.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in NotFound Oshine Modules. This issue affects Oshine Modules: from n/a through n/a."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/oshine-modules/vulnerability/wordpress-oshine-modules-plugin-3-3-6-unauthenticated-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-22265",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:07.167",
"lastModified": "2025-01-31T09:15:07.167",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in mgplugin EMI Calculator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects EMI Calculator: from n/a through 1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/emi-calculator/vulnerability/wordpress-emi-calculator-plugin-1-1-settings-change-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-22332",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:07.317",
"lastModified": "2025-01-31T09:15:07.317",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bryan Shanaver @ fiftyandfifty.org CloudFlare(R) Cache Purge allows Reflected XSS. This issue affects CloudFlare(R) Cache Purge: from n/a through 1.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/cloudflare-cache-purge/vulnerability/wordpress-cloudflare-r-cache-purge-plugin-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-22341",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:07.470",
"lastModified": "2025-01-31T09:15:07.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mohammad Hossein Aghanabi Hide Login+ allows Reflected XSS. This issue affects Hide Login+: from n/a through 3.5.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/hide-login/vulnerability/wordpress-hide-login-plugin-3-5-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-22564",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:07.627",
"lastModified": "2025-01-31T09:15:07.627",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Faaiq Pretty Url allows Reflected XSS. This issue affects Pretty Url: from n/a through 1.5.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/pretty-url/vulnerability/wordpress-pretty-url-plugin-1-5-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-22720",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:07.770",
"lastModified": "2025-01-31T09:15:07.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in MagePeople Team Booking and Rental Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Booking and Rental Manager: from n/a through 2.2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/booking-and-rental-manager-for-woocommerce/vulnerability/wordpress-wprently-wordpress-plugin-plugin-2-2-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-22757",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:07.913",
"lastModified": "2025-01-31T09:15:07.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeBard CodeBard Help Desk allows Stored XSS. This issue affects CodeBard Help Desk: from n/a through 1.1.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/codebard-help-desk/vulnerability/wordpress-codebard-help-desk-plugin-1-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23596",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:08.060",
"lastModified": "2025-01-31T09:15:08.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Notifikacie.sk Notifik\u00e1cie.sk allows Reflected XSS. This issue affects Notifik\u00e1cie.sk: from n/a through 1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/notifikacie-sk/vulnerability/wordpress-notifikacie-sk-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23671",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:08.210",
"lastModified": "2025-01-31T09:15:08.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fabio Savina WP OpenSearch allows Stored XSS. This issue affects WP OpenSearch: from n/a through 1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-opensearch/vulnerability/wordpress-wp-opensearch-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23759",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:08.357",
"lastModified": "2025-01-31T09:15:08.357",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in leduchuy89vn Affiliate Tools Vi\u1ec7t Nam allows Reflected XSS. This issue affects Affiliate Tools Vi\u1ec7t Nam: from n/a through 0.3.17."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/affiliate-tools-viet-nam/vulnerability/wordpress-affiliate-tools-viet-nam-plugin-0-3-17-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23976",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:08.530",
"lastModified": "2025-01-31T09:15:08.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Pedro Marcelo Issuu Panel allows Stored XSS. This issue affects Issuu Panel: from n/a through 2.1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/issuu-panel/vulnerability/wordpress-issuu-panel-plugin-2-1-1-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23977",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:08.687",
"lastModified": "2025-01-31T09:15:08.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Bhaskar Dhote Post Carousel Slider allows Stored XSS. This issue affects Post Carousel Slider: from n/a through 2.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/post-carousel-slider/vulnerability/wordpress-post-carousel-slider-plugin-2-0-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23978",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:08.830",
"lastModified": "2025-01-31T09:15:08.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Ninos Ego FlashCounter allows Stored XSS. This issue affects FlashCounter: from n/a through 1.1.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/flashcounter/vulnerability/wordpress-flashcounter-plugin-1-1-8-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23980",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:08.973",
"lastModified": "2025-01-31T09:15:08.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in James Andrews Full Circle allows Stored XSS. This issue affects Full Circle: from n/a through 0.5.7.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/full-circle/vulnerability/wordpress-full-circle-plugin-0-5-7-8-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23985",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:09.127",
"lastModified": "2025-01-31T09:15:09.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Brainvireinfo Dynamic URL SEO allows Cross Site Request Forgery. This issue affects Dynamic URL SEO: from n/a through 1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/dynamic-url-seo/vulnerability/wordpress-dynamic-url-seo-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23987",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:09.280",
"lastModified": "2025-01-31T09:15:09.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodegearThemes Designer allows DOM-Based XSS. This issue affects Designer: from n/a through 1.6.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/designer/vulnerability/wordpress-designer-plugin-1-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23989",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:09.427",
"lastModified": "2025-01-31T09:15:09.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Alessandro Piconi - SabLab Internal Link Builder allows Cross Site Request Forgery. This issue affects Internal Link Builder: from n/a through 1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/internal-link-builder/vulnerability/wordpress-internal-link-builder-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23990",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:09.577",
"lastModified": "2025-01-31T09:15:09.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in jablonczay Scroll Styler. This issue affects Scroll Styler: from n/a through 1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/scroll-styler/vulnerability/wordpress-scroll-styler-plugin-1-1-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24534",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:09.720",
"lastModified": "2025-01-31T09:15:09.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Emili Castells DPortfolio allows Reflected XSS. This issue affects DPortfolio: from n/a through 2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/dportfolio/vulnerability/wordpress-dportfolio-plugin-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24535",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:09.870",
"lastModified": "2025-01-31T09:15:09.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SKT Themes SKT Donation allows Reflected XSS. This issue affects SKT Donation: from n/a through 1.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/skt-donation/vulnerability/wordpress-skt-donation-plugin-1-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24549",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:10.027",
"lastModified": "2025-01-31T09:15:10.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Mahbubur Rahman Post Meta allows Reflected XSS. This issue affects Post Meta: from n/a through 1.0.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/post-meta/vulnerability/wordpress-post-meta-plugin-1-0-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24551",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:10.170",
"lastModified": "2025-01-31T09:15:10.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OneTeamSoftware Radio Buttons and Swatches for WooCommerce allows Reflected XSS. This issue affects Radio Buttons and Swatches for WooCommerce: from n/a through 1.1.20."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/variations-radio-buttons-for-woocommerce/vulnerability/wordpress-radio-buttons-and-swatches-for-woocommerce-plugin-1-1-20-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24560",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:10.323",
"lastModified": "2025-01-31T09:15:10.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Awesome TOGI Awesome Event Booking allows Reflected XSS. This issue affects Awesome Event Booking: from n/a through 2.7.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/awesome-event-booking/vulnerability/wordpress-awesome-event-booking-plugin-2-7-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24563",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:10.467",
"lastModified": "2025-01-31T09:15:10.467",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGlow Cleanup \u2013 Directory Listing & Classifieds WordPress Plugin allows Reflected XSS. This issue affects Cleanup \u2013 Directory Listing & Classifieds WordPress Plugin: from n/a through 1.0.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/cleanup-light/vulnerability/wordpress-cleanup-directory-listing-classifieds-plugin-1-0-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24597",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:10.607",
"lastModified": "2025-01-31T09:15:10.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information Into Sent Data vulnerability in UkrSolution Barcode Generator for WooCommerce allows Retrieve Embedded Sensitive Data. This issue affects Barcode Generator for WooCommerce: from n/a through 2.0.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-201"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/embedding-barcodes-into-product-pages-and-orders/vulnerability/wordpress-barcode-generator-for-woocommerce-plugin-2-0-2-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24608",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:10.767",
"lastModified": "2025-01-31T09:15:10.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Milan Petrovic GD Mail Queue allows Reflected XSS. This issue affects GD Mail Queue: from n/a through 4.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/gd-mail-queue/vulnerability/wordpress-gd-mail-queue-plugin-4-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24609",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:10.900",
"lastModified": "2025-01-31T09:15:10.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PortOne PORTONE \uc6b0\ucee4\uba38\uc2a4 \uacb0\uc81c allows Reflected XSS. This issue affects PORTONE \uc6b0\ucee4\uba38\uc2a4 \uacb0\uc81c: from n/a through 3.2.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/iamport-for-woocommerce/vulnerability/wordpress-portone-plugin-3-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24632",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:11.040",
"lastModified": "2025-01-31T09:15:11.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AlgolPlus Advanced Dynamic Pricing for WooCommerce allows Reflected XSS. This issue affects Advanced Dynamic Pricing for WooCommerce: from n/a through 4.9.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/advanced-dynamic-pricing-for-woocommerce/vulnerability/wordpress-advanced-dynamic-pricing-for-woocommerce-plugin-4-9-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24635",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:11.190",
"lastModified": "2025-01-31T09:15:11.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Paytm Paytm Payment Donation allows Reflected XSS. This issue affects Paytm Payment Donation: from n/a through 2.3.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/paytm-donation/vulnerability/wordpress-paytm-donation-plugin-plugin-2-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24686",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:11.340",
"lastModified": "2025-01-31T09:15:11.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metagauss User Registration Forms RegistrationMagic allows Reflected XSS. This issue affects RegistrationMagic: from n/a through 6.0.3.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/custom-registration-form-builder-with-submission-manager/vulnerability/wordpress-registrationmagic-plugin-6-0-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24710",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:11.477",
"lastModified": "2025-01-31T09:15:11.477",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Marcel Pol Gwolle Guestbook allows Reflected XSS. This issue affects Gwolle Guestbook: from n/a through 4.7.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/gwolle-gb/vulnerability/wordpress-gwolle-guestbook-plugin-4-7-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24718",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:11.617",
"lastModified": "2025-01-31T09:15:11.617",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SWIT WP Sessions Time Monitoring Full Automatic allows Reflected XSS. This issue affects WP Sessions Time Monitoring Full Automatic: from n/a through 1.1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/activitytime/vulnerability/wordpress-wp-sessions-time-monitoring-full-automatic-plugin-1-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24749",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-01-31T09:15:11.760",
"lastModified": "2025-01-31T09:15:11.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Overt Software Solutions LTD EZPZ SAML SP Single Sign On (SSO) allows Cross Site Request Forgery. This issue affects EZPZ SAML SP Single Sign On (SSO): from n/a through 1.2.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/ezpz-sp/vulnerability/wordpress-ezpz-saml-sp-single-sign-on-sso-plugin-1-2-5-csrf-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-31T09:00:50.232418+00:00
2025-01-31T11:00:32.200111+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-31T08:15:08.157000+00:00
2025-01-31T10:15:07.630000+00:00
```
### Last Data Feed Release
@ -33,17 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
279619
279655
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `36`
- [CVE-2024-13530](CVE-2024/CVE-2024-135xx/CVE-2024-13530.json) (`2025-01-31T08:15:07.543`)
- [CVE-2024-13623](CVE-2024/CVE-2024-136xx/CVE-2024-13623.json) (`2025-01-31T07:15:09.830`)
- [CVE-2024-52875](CVE-2024/CVE-2024-528xx/CVE-2024-52875.json) (`2025-01-31T08:15:07.827`)
- [CVE-2024-53007](CVE-2024/CVE-2024-530xx/CVE-2024-53007.json) (`2025-01-31T08:15:08.157`)
- [CVE-2025-23671](CVE-2025/CVE-2025-236xx/CVE-2025-23671.json) (`2025-01-31T09:15:08.210`)
- [CVE-2025-23759](CVE-2025/CVE-2025-237xx/CVE-2025-23759.json) (`2025-01-31T09:15:08.357`)
- [CVE-2025-23976](CVE-2025/CVE-2025-239xx/CVE-2025-23976.json) (`2025-01-31T09:15:08.530`)
- [CVE-2025-23977](CVE-2025/CVE-2025-239xx/CVE-2025-23977.json) (`2025-01-31T09:15:08.687`)
- [CVE-2025-23978](CVE-2025/CVE-2025-239xx/CVE-2025-23978.json) (`2025-01-31T09:15:08.830`)
- [CVE-2025-23980](CVE-2025/CVE-2025-239xx/CVE-2025-23980.json) (`2025-01-31T09:15:08.973`)
- [CVE-2025-23985](CVE-2025/CVE-2025-239xx/CVE-2025-23985.json) (`2025-01-31T09:15:09.127`)
- [CVE-2025-23987](CVE-2025/CVE-2025-239xx/CVE-2025-23987.json) (`2025-01-31T09:15:09.280`)
- [CVE-2025-23989](CVE-2025/CVE-2025-239xx/CVE-2025-23989.json) (`2025-01-31T09:15:09.427`)
- [CVE-2025-23990](CVE-2025/CVE-2025-239xx/CVE-2025-23990.json) (`2025-01-31T09:15:09.577`)
- [CVE-2025-24534](CVE-2025/CVE-2025-245xx/CVE-2025-24534.json) (`2025-01-31T09:15:09.720`)
- [CVE-2025-24535](CVE-2025/CVE-2025-245xx/CVE-2025-24535.json) (`2025-01-31T09:15:09.870`)
- [CVE-2025-24549](CVE-2025/CVE-2025-245xx/CVE-2025-24549.json) (`2025-01-31T09:15:10.027`)
- [CVE-2025-24551](CVE-2025/CVE-2025-245xx/CVE-2025-24551.json) (`2025-01-31T09:15:10.170`)
- [CVE-2025-24560](CVE-2025/CVE-2025-245xx/CVE-2025-24560.json) (`2025-01-31T09:15:10.323`)
- [CVE-2025-24563](CVE-2025/CVE-2025-245xx/CVE-2025-24563.json) (`2025-01-31T09:15:10.467`)
- [CVE-2025-24597](CVE-2025/CVE-2025-245xx/CVE-2025-24597.json) (`2025-01-31T09:15:10.607`)
- [CVE-2025-24608](CVE-2025/CVE-2025-246xx/CVE-2025-24608.json) (`2025-01-31T09:15:10.767`)
- [CVE-2025-24609](CVE-2025/CVE-2025-246xx/CVE-2025-24609.json) (`2025-01-31T09:15:10.900`)
- [CVE-2025-24632](CVE-2025/CVE-2025-246xx/CVE-2025-24632.json) (`2025-01-31T09:15:11.040`)
- [CVE-2025-24635](CVE-2025/CVE-2025-246xx/CVE-2025-24635.json) (`2025-01-31T09:15:11.190`)
- [CVE-2025-24686](CVE-2025/CVE-2025-246xx/CVE-2025-24686.json) (`2025-01-31T09:15:11.340`)
- [CVE-2025-24710](CVE-2025/CVE-2025-247xx/CVE-2025-24710.json) (`2025-01-31T09:15:11.477`)
- [CVE-2025-24718](CVE-2025/CVE-2025-247xx/CVE-2025-24718.json) (`2025-01-31T09:15:11.617`)
- [CVE-2025-24749](CVE-2025/CVE-2025-247xx/CVE-2025-24749.json) (`2025-01-31T09:15:11.760`)
### CVEs modified in the last Commit

View File

@ -246060,6 +246060,7 @@ CVE-2024-1315,0,0,8cb70de4b1449c82043b2652cd95d6eb6d48aeb35344f66e409dc981ea33e5
CVE-2024-13153,0,0,e5372006a19c4f2229d5d82f2f00e097ecc1dd71c1df06bd0280614a58d1fbcf,2025-01-09T09:15:07.243000
CVE-2024-13154,0,0,8b848cb4ffbbf3d5300b505058bccc136fae4b33341f37a24f40fb8ac9f235ba,2025-01-13T21:15:11.970000
CVE-2024-13156,0,0,30f08a5146793529d2149bd8fe28d1d230f7d62ef9b057e2393b31a9d88e81a0,2025-01-14T09:15:20.910000
CVE-2024-13157,1,1,568169b0ca5fce63c3ab23adc07f4be73288bc5d1cace5b787e6cbdb1a0296ed,2025-01-31T09:15:06.617000
CVE-2024-13158,0,0,d921bcc53f0c4810cb7f77f962be3471977624bd876c8c3eed3db3c6a249539e,2025-01-14T18:15:26.020000
CVE-2024-13159,0,0,c033202b4593bc2aeff54caa4015bf5ab23afa6f19b09f8e11d36c54b7b445e5,2025-01-14T18:15:26.243000
CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000
@ -246293,6 +246294,7 @@ CVE-2024-13466,0,0,653560f144409636354c1af48613afa8ec813df2848486a87387de21636b4
CVE-2024-13467,0,0,bcd6474463b1a69c9a46d9b4d6f6f02b302b85f9777a4b31585c7467fbf3f38a,2025-01-25T08:15:09.520000
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
CVE-2024-13470,0,0,cd366f2d848ecaaaa8e2a5a38b4333677f61cb3a569faf0b3b65023a656393a3,2025-01-30T08:15:26.690000
CVE-2024-13472,1,1,65e4a4a6619e82e57e5988495a0befee15f1589fedb83f6d4252dc99948d7f2a,2025-01-31T10:15:07.630000
CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000
CVE-2024-13484,0,0,712c057c7d39146a8afa657b40a8d67e5499db561a28666fb52dbcced8221de3,2025-01-28T19:15:13.753000
CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000
@ -246317,7 +246319,7 @@ CVE-2024-13521,0,0,56cff5e8dab3e4a84fd4fc6c17bcf2fe279d9bc71acdce76cf6f6b7cd5e70
CVE-2024-13524,0,0,d6f31820e091340f802e51a50f0c20aa637866da429d40add1f3ba31e9a88956,2025-01-20T03:15:08.033000
CVE-2024-13527,0,0,9559936fb9111fdf63ba50e27f0bf0289ed1434a5f0f4378e70bf27d52c81211,2025-01-30T17:18:29.943000
CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000
CVE-2024-13530,1,1,a32dca6d75c33e81a9c9eaf2b59e70f20fcbfe169ec3d31442792a7d94733be9,2025-01-31T08:15:07.543000
CVE-2024-13530,0,0,a32dca6d75c33e81a9c9eaf2b59e70f20fcbfe169ec3d31442792a7d94733be9,2025-01-31T08:15:07.543000
CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000
CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000
CVE-2024-13542,0,0,c45a986aa867dcb8c5f485f5d0834964d3d14a785680faca172769f60f73e69e,2025-01-24T11:15:09.377000
@ -246330,6 +246332,7 @@ CVE-2024-13551,0,0,c0f32b47678190b67b060d76bcd33ea48dd01585e717a7e931b6ea219ab11
CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000
CVE-2024-13561,0,0,321fb86513d3ff8255f225cc7373210080af406dea9669094350295c144d7ae9,2025-01-29T12:15:27.617000
CVE-2024-13562,0,0,77e083f4cdf73b4ddbc324f348afd08346ceeabfc8f2f059cfdc83de8bce92a8,2025-01-25T12:15:26.570000
CVE-2024-13566,1,1,dd455b5c6c79c50cc3a56ce23db0039a6651194309cff2d1529e0608cc927c54,2025-01-31T09:15:06.847000
CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000
CVE-2024-13572,0,0,810ff57abb3e74e570a0f4342646c85283702b45afe741301e2f9c7354adbef4,2025-01-24T11:15:09.520000
CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000
@ -246345,7 +246348,7 @@ CVE-2024-13599,0,0,8416ac4ba24e0470447a5d54bcb4a58d565d7b0165c1a9d0f1a855bfbf0c1
CVE-2024-1360,0,0,a87675d91847a9b72ed5368695c7c67c099276d1667e5e94dc544f268946892c,2024-11-21T08:50:24.707000
CVE-2024-1361,0,0,8a11a93152fbfa05be2934d541581f2e8e8c1350c348ceb554a6a47ec08e0e2f,2025-01-15T18:39:23.493000
CVE-2024-1362,0,0,ebe61894e3dd1fecb8d4711188e9d8f7e6a2ff043508a2ee93131b033a0336dd,2025-01-15T18:40:30.490000
CVE-2024-13623,1,1,2cada29a90e918414353741b6e3b8cf08dc12a83860192531fa76e51a17031e8,2025-01-31T07:15:09.830000
CVE-2024-13623,0,0,2cada29a90e918414353741b6e3b8cf08dc12a83860192531fa76e51a17031e8,2025-01-31T07:15:09.830000
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
CVE-2024-13642,0,0,305a541671cd97a16b24d4e91a357de627282533e6d955bf781fd96606eff81c,2025-01-30T07:15:08.700000
@ -265515,6 +265518,7 @@ CVE-2024-44051,0,0,bb4d131f280c6064efcf52c2c30f5ec83dd01e176e2104cda60ad96bd5175
CVE-2024-44052,0,0,8e8edee4d7aa020cbb77d66765bf7e0fb95955c7d29ac9bdee351d4808ebbb1a,2024-11-08T21:24:59.660000
CVE-2024-44053,0,0,1696f8c4d673fc16f00ba39f4de0363282e5fa65b41555660d42b03b08acc401,2024-09-27T15:32:14.153000
CVE-2024-44054,0,0,bbda69cd525c1452aab61418e0c2d92e823366d449e1e720bc9c980f6ca11fb6,2024-09-23T14:23:19.573000
CVE-2024-44055,1,1,1065b2b946623cf2b8baa09aa0d29fd542c346f9a8ba223724cbd8752255637b,2025-01-31T09:15:07.010000
CVE-2024-44056,0,0,481450d3310966d9bffbb9742f28927f3eb7120738f18a84e421e7503f87941d,2024-09-23T14:39:05.047000
CVE-2024-44057,0,0,e3b5ad83a59cabcda381e4e82a8fe3776c370c591dd3d1286b2394043ae056c9,2024-09-23T14:33:50.830000
CVE-2024-44058,0,0,5422e6d726ad626bea0b5d9141b6afe8af08d99805ad88c82875c1d67d89d797,2024-09-23T14:28:34.860000
@ -271514,7 +271518,7 @@ CVE-2024-5287,0,0,ede9629ba14e7833d0e00ab367a4e2205145f22a5dce3f4d9b720c5001bdf2
CVE-2024-52870,0,0,1a3a6d971d4bd90b76dc72d1f20af849443ecb143b46e583f633f2d3b372f550,2025-01-17T22:15:28.663000
CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000
CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a43927045f3,2024-11-18T18:35:09.270000
CVE-2024-52875,1,1,54df66f2a8f2e3f18985bef97f8d7df0c7d20f7e3ac8cc01461b1012642ac097,2025-01-31T08:15:07.827000
CVE-2024-52875,0,0,54df66f2a8f2e3f18985bef97f8d7df0c7d20f7e3ac8cc01461b1012642ac097,2025-01-31T08:15:07.827000
CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212592,2024-11-18T17:35:08.900000
CVE-2024-5288,0,0,35888db4a5e323e6a29faa7e47d2416858cbeb598a42c21aa0c323691cd3d86c,2024-08-28T12:57:39.090000
CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e1b,2024-11-21T09:47:21.990000
@ -271595,7 +271599,7 @@ CVE-2024-53003,0,0,34e88568f57539586a5fe970f0af192db295a737235b2a98a2fd76c104267
CVE-2024-53004,0,0,b1eddd30e3bfa0e6702075b6e0dcfc9d848e1db73280a9217519c42273234bf1,2024-12-12T18:30:46.870000
CVE-2024-53005,0,0,3dc6e47151847664b25c50b95732d760b83155ba3d3a6b0bd92fd6b07af512ff,2024-12-12T18:25:58.717000
CVE-2024-53006,0,0,9319c5ef0bd10ec00679ded4a4ad11e13d0be340e712e774cbfbbe0a5382401c,2024-12-13T18:46:25.473000
CVE-2024-53007,1,1,245e17914d55954fd4b9970bb8b479f26d37acd1ea6760f574d49cad5e9ff133,2025-01-31T08:15:08.157000
CVE-2024-53007,0,0,245e17914d55954fd4b9970bb8b479f26d37acd1ea6760f574d49cad5e9ff133,2025-01-31T08:15:08.157000
CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000
CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000
CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000
@ -278566,6 +278570,7 @@ CVE-2025-22222,0,0,88427fbd6b71746a7cac38ab28182f0393978cf8d8f60352e5bba62689c94
CVE-2025-22261,0,0,33a310cbc7efb685d95693f6e008875a8290fc5f9c6bce0cde03f1c0742bf7b7,2025-01-07T11:15:13.290000
CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000
CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000
CVE-2025-22265,1,1,980ecef91eb5066a526a3d192ec59ee9bc96d808d70f5ce59990623a342cacc7,2025-01-31T09:15:07.167000
CVE-2025-22267,0,0,f20afa71bc4d80e805bd92045ab58754dc4544d5a2500dd19c3f675f1704780a,2025-01-21T18:15:15.100000
CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000
CVE-2025-22276,0,0,5a96987c782440e555f7f8980bf83cb51411fc2fe9b353a8ca4c203659e7b960,2025-01-21T18:15:15.303000
@ -278608,6 +278613,7 @@ CVE-2025-22328,0,0,bae5ea02b892a469897a505361fc54dac1bb5e3519ad609d0ce29be3676ad
CVE-2025-22329,0,0,f5d56d1aa2c78408d4025f17e76f097f1bd68e404c811ca09dc38f2add757e56,2025-01-15T16:15:34.763000
CVE-2025-22330,0,0,839502208eee95785526cf7c123f74018642e883627c07e6a080cad1506cc7ff,2025-01-09T16:16:25.840000
CVE-2025-22331,0,0,a2f8402b66c9c90ee6c55cbe4004f833df5c3b164a1649adc2a5ef04d9b0d06a,2025-01-09T16:16:26.180000
CVE-2025-22332,1,1,1a57746b7ba0aa2ebee2c307ffe9540a4951c7c28899766a006fd211c492a286,2025-01-31T09:15:07.317000
CVE-2025-22333,0,0,e1ce540f097535337d77ac62982e232ef112548ec7d9205fe7d663038857be1a,2025-01-07T11:15:17.160000
CVE-2025-22334,0,0,11b4f4e8db4b7785b74aad91051c2e8051c499de944f60aa9b4469a20e495399,2025-01-07T17:15:32.953000
CVE-2025-22335,0,0,4a08b412add701f059cd149e45f878ef3b0f40f24de1ec01f34841e4d73759dc,2025-01-07T16:15:42.703000
@ -278615,6 +278621,7 @@ CVE-2025-22336,0,0,e498264d94897dc70f78e05983d91aacc96a48160550b893d84ce97145124
CVE-2025-22337,0,0,5d41c59b533e15a90ac0eb04123ef238c192c67fdf1a3a5a9bc7681f9252fc36,2025-01-13T14:15:10.440000
CVE-2025-22338,0,0,7129ea122c6554e3c515c55738d8d6c2390b8b27bae9ff6ebda6d0b32cd44085,2025-01-07T16:15:44.117000
CVE-2025-22339,0,0,e3b226b5bf5a3cbff8aebc6d88bcb4fc118cdad6ece13f47708a7ca8d8f13135,2025-01-07T11:15:17.463000
CVE-2025-22341,1,1,7a252dfe94b5aebe5db0bf845ec16300a37e876c3203ea4e093e02a898233687,2025-01-31T09:15:07.470000
CVE-2025-22342,0,0,541f867dbda194731b8a18481f8f88aab54d4c9b69e4847a11ff394e4e7ae36c,2025-01-07T11:15:17.610000
CVE-2025-22343,0,0,5a249d51bc1bb83b765cbc47fc56c527973dc8aee76835d7267eeba7cb4b3587,2025-01-07T11:15:17.743000
CVE-2025-22344,0,0,73b38550cc61c4d4fcec8a1a6c6ebfdcafdd6bf85ac16de00bbc41a01d5f4343,2025-01-13T14:15:10.613000
@ -278713,6 +278720,7 @@ CVE-2025-22560,0,0,9ca1212fb17f4181c18e39c7de050eeeb10043eec792b100a6ff2194db9fd
CVE-2025-22561,0,0,623f2eb2c761c9d3d25a004f777db613fa6e7b7a5c670c04365fe632627b5a6b,2025-01-09T16:16:28.827000
CVE-2025-22562,0,0,5434b49fc7631b7fa2baab733e275c32c8bcafb45eb3bbd6810cf2008467fe71,2025-01-07T16:15:52.540000
CVE-2025-22563,0,0,08641cc3ce798be612ccd7e4c4a75bb78413c6f046999167e72153c276a54042,2025-01-07T16:15:52.940000
CVE-2025-22564,1,1,f1a324a9a4a7ed353781f19eb5de87b1e37be87ba686645966b797041e2c1f77,2025-01-31T09:15:07.627000
CVE-2025-22567,0,0,7640327e90d13935406fda5e46326035dce8768c7ac08f762a301197dc23d3c0,2025-01-13T14:15:11.460000
CVE-2025-22568,0,0,f3a337c9bc58a10967a71c972b3d36d20f02e69abf28f2da99dbae5c50742b4f,2025-01-13T14:15:11.610000
CVE-2025-22569,0,0,71c2a126896a25500ec5a83e43acb4e704a716153f97fc1411303eae2fdb9009,2025-01-13T14:15:11.787000
@ -278774,6 +278782,7 @@ CVE-2025-22716,0,0,574cf0b5875717b93863e982d1cab0b81ccdb8ad9a1ac52da300f5eb0abac
CVE-2025-22717,0,0,045d0e1e5f3cb0fdeed8a39d1665e4e46f6270d91c24ab8506dee6964c28d59b,2025-01-21T14:15:11.527000
CVE-2025-22718,0,0,af552db1d51fb8ce52426df5d2512b6494860cf9b2184f61079c95efecaa5cb1,2025-01-21T14:15:11.697000
CVE-2025-22719,0,0,5bd88b64227ddb0806bbf4a03d00b50965d6e95ab3764f375fda0f14d5c5be5c,2025-01-21T14:15:11.860000
CVE-2025-22720,1,1,e20188414886de62acc3f7692b7201770c4130a5da74aea38c8b4c2162c464fc,2025-01-31T09:15:07.770000
CVE-2025-22721,0,0,b262a715cba54c17fe83d44892573aa8774855ca798bef491313a71f26432b7d,2025-01-21T18:15:15.880000
CVE-2025-22722,0,0,46dfbd6849c3dd98d390fb319b428d78acaf82f7d9a5f48a36560b752e60ded8,2025-01-21T18:15:16.057000
CVE-2025-22723,0,0,9840575079edde83aa306dc43108d401256a5ee1d470cd37a6e795011bb563cc,2025-01-21T14:15:12.017000
@ -278802,6 +278811,7 @@ CVE-2025-22752,0,0,41bc182eb31d3ed08c47c2f1a14594b9475edefd40e6ac88496a43b932ffd
CVE-2025-22753,0,0,1392ba1976b2f3737be53da9e82e2a71b66804802fe541ed64804556b77dc379,2025-01-15T16:15:38.090000
CVE-2025-22754,0,0,c0a20ff0dc7d11a65b9241a7172e5329fe4a137b477ec9e87a12160d75b634c6,2025-01-15T16:15:38.260000
CVE-2025-22755,0,0,8f6b0a04551af49856a2271381efe0b139629609cf6cdbb88a9b44d66b8939d8,2025-01-15T16:15:38.417000
CVE-2025-22757,1,1,545c60ebe78f04709daa5d0cdafad9d8c42daedfa920bd2facae8e620e8e33d4,2025-01-31T09:15:07.913000
CVE-2025-22758,0,0,75af2175b66bedd5905c80abd56322cb37a48c8bc3ca46887b18b8750dd877d0,2025-01-15T16:15:38.577000
CVE-2025-22759,0,0,9fd34399fa1530c21c9cfdecd9f53c69ec53b7cabdae01a2ee26417453f72f17,2025-01-15T16:15:38.733000
CVE-2025-22760,0,0,ceaff3b523ed1ab68ca9afc6e8dcc1721a356d85b9c6dbcc0d6dd64777fa93b0,2025-01-15T16:15:38.890000
@ -279058,6 +279068,7 @@ CVE-2025-23580,0,0,59e55d87bb1152c0b33f0e647e86e7e0bf5bdb957c7b17144cb4b97c87ffc
CVE-2025-23583,0,0,822a096c4bf103ecc85a757b154ff2676bab47254e439d8f1a0dc183e1069329,2025-01-22T15:15:17.820000
CVE-2025-23589,0,0,ddf5471ae852dabea42c5158329ef70238607d70b85f56376e4ac0c4bb487ae4,2025-01-22T15:15:17.950000
CVE-2025-23592,0,0,c6c26f6ac5e063b93a35489a4c79c8c99eaee0347d8804de080707e83378d4fd,2025-01-22T15:15:18.097000
CVE-2025-23596,1,1,bfb0e90a6c5252afe61d41dfe71ccb2f6f594cb122772f3faebf445a764f58cc,2025-01-31T09:15:08.060000
CVE-2025-23597,0,0,3871369d91ae00dd4869bc54339db422ba0880625256256884fee491f4563202,2025-01-22T15:15:18.230000
CVE-2025-23601,0,0,8cf3c2f8696e7e005f222e1bdb76c123a3be382277805d94473298416d95984a,2025-01-22T15:15:18.363000
CVE-2025-23602,0,0,4cd584065e9b9f106e16ebb05185970d67a3f28867f9738a25ae9c2e26b7393f,2025-01-22T15:15:18.503000
@ -279101,6 +279112,7 @@ CVE-2025-23662,0,0,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1
CVE-2025-23664,0,0,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9be7,2025-01-16T20:15:43.320000
CVE-2025-23665,0,0,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000
CVE-2025-23669,0,0,9d3b37ccadd2ee69ebcf7dda5f5c3274138874e1b048df0c9bf6fb374b103459,2025-01-27T15:15:12.423000
CVE-2025-23671,1,1,46c84081401892868113e592ab4bbf541ce5b1e2bcfa1ff04198e153e0532705,2025-01-31T09:15:08.210000
CVE-2025-23672,0,0,9b4e91d2a971d6e816e88b382cc31c2340c56e76479cf040d6e0c5290d97a21a,2025-01-22T15:15:20.287000
CVE-2025-23673,0,0,29cefcd5e33b42efd9dd838456a4202e1ca110aefe8c270bd5abccdd213d0d3b,2025-01-16T20:15:43.620000
CVE-2025-23674,0,0,82d0f47596aa91a27d7206050e2f23fe27e33f61b61152aa1cea9075ecc820e7,2025-01-22T15:15:20.420000
@ -279158,6 +279170,7 @@ CVE-2025-23752,0,0,c4a79df1175fc8304cc7d0bc1439213a7f94dd9651e5758ccfd85de4caf11
CVE-2025-23754,0,0,21c71491dc1049f80bc2b3d0ef81d089692e692ff20a4894b4b54787667340c8,2025-01-27T15:15:12.727000
CVE-2025-23756,0,0,b189fbbb2b658c767f0f6a4b533dbbc808056809be370f040f7098f77febf47e,2025-01-27T15:15:12.877000
CVE-2025-23758,0,0,8eed9a0b591b6f7c4da32f087513eca80ea069aba6fbd197956f1fc2df31f12b,2025-01-22T15:15:22.907000
CVE-2025-23759,1,1,e246047aa026fdb44c1a4b2854950b65bcff3c4d45b64b864f69f88e0ae090b1,2025-01-31T09:15:08.357000
CVE-2025-23760,0,0,c926328276013ba4c92054487020a2c00b6299d54746739ff21a4a2b0e4582aa,2025-01-16T21:15:18.257000
CVE-2025-23761,0,0,54955953ddba7da6b8dc6db7af99134b4479d6ff349ea65bc12f9e3c7ac517a4,2025-01-16T21:15:18.410000
CVE-2025-23764,0,0,7f32d20a1e65ecaa3e33bea3553398156868c7ff8731a49a86f2b21b51701ff3,2025-01-16T21:15:18.550000
@ -279323,7 +279336,15 @@ CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96
CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000
CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000
CVE-2025-23966,0,0,0e6c6a1caa3d328f215893bbd7894611dd4559bc9c207666f24bc83d16a65051,2025-01-22T15:15:26.950000
CVE-2025-23976,1,1,e0eab9311af6f0866161d1152b41dd0b88221351a5485aef9432360dead5ad9b,2025-01-31T09:15:08.530000
CVE-2025-23977,1,1,2b3becab0586b5f0b804d3093772319babfc687fc85a1f0a11f4034a398fdd3a,2025-01-31T09:15:08.687000
CVE-2025-23978,1,1,e17deaffe1129da6e865971c3b079c57195bc303f97a89196906ea25ae51ec12,2025-01-31T09:15:08.830000
CVE-2025-23980,1,1,2b413ddfc15217b02f4cdb5a9b4327d6257cc1036ee72dffadd611ebcf279fc3,2025-01-31T09:15:08.973000
CVE-2025-23982,0,0,7dfe3e48e718999b3739cbfc59b600560c8c7feccf14557bc94cb8c8978377d9,2025-01-27T15:15:13.247000
CVE-2025-23985,1,1,874d7a7c839515ccb8b8c14aba0a7e876e46f2c3bf639e81bfafdac6710b3504,2025-01-31T09:15:09.127000
CVE-2025-23987,1,1,eaf59c635a24b658b7ebe922a33e4a9c6f6881fff544a96f2e210734d5009610,2025-01-31T09:15:09.280000
CVE-2025-23989,1,1,533bcc23765221caa714b18f81f4abdbd9ff5199ed2f714fba0c159c05ff4f97,2025-01-31T09:15:09.427000
CVE-2025-23990,1,1,1d4d447844ce4d6ae33a46a793b2bfe9f8732072919d84fc1711b79793282882,2025-01-31T09:15:09.577000
CVE-2025-23991,0,0,09c292242e39739888eb9fe6d97bdb10055d45d713f6ffa829b0733e0b5456d2,2025-01-24T16:15:38.723000
CVE-2025-23992,0,0,6d44f95ed9666a8a68923c67dcffd2f515365a6c1e7800071790e2d881846261,2025-01-22T16:15:32.120000
CVE-2025-23994,0,0,db61266fc09611137499867f42a15cfdb3d24abf264ca83daab38bc4b3bec239,2025-01-21T18:15:17.313000
@ -279461,6 +279482,8 @@ CVE-2025-24527,0,0,8f5d99489f05ec903e1b0ba411b4f26945dcb60c4d1c8d36f935f4c612211
CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000
CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000
CVE-2025-24533,0,0,7b36821849ab798d81c60afcd620ba9ed617eb480eb18f61a881f0c2f7c8a39d,2025-01-27T14:15:28.653000
CVE-2025-24534,1,1,101e1e434d2a29f62e13ecd7766e303d1328267bb3d87cc866eeed722961113d,2025-01-31T09:15:09.720000
CVE-2025-24535,1,1,c5149e14293bf035c80f56e88caca17c0576f4162a158c6e05f663c0716406a0,2025-01-31T09:15:09.870000
CVE-2025-24537,0,0,06c9da6fbc6f8c7d8022c609da167bba6221fe718dd9e4ef9e6a1c0e2d457262,2025-01-27T15:15:13.440000
CVE-2025-24538,0,0,0f8d31f1296887dcb26ac5acc0a368526d03dde9efa05b94d9d3fe598ce981df,2025-01-27T15:15:13.607000
CVE-2025-24540,0,0,cd6ea69ba28b1ebb10b70369bc57bb82429bc2558c0fbb08776f05fe155ad78b,2025-01-27T15:15:13.753000
@ -279468,10 +279491,14 @@ CVE-2025-24542,0,0,06390c27c63870cfb207e6b1afc38cc2bd70c54f2ceb6de8405d7ce03a079
CVE-2025-24543,0,0,a8808a4cea2b4649f0717c8217dced1494e1792562a41700280f034c2d3ba9ea,2025-01-24T18:15:32.703000
CVE-2025-24546,0,0,685ea9d400c8b68f55f713daec1971d56383230bb2c0cc8dfdd7487103aa25d1,2025-01-24T18:15:32.893000
CVE-2025-24547,0,0,c177583f7b4a7259791b6ebcff6a352143f7ed52e1ea2f3eabe18b6e76e995e9,2025-01-24T18:15:33.063000
CVE-2025-24549,1,1,d197d4219524264836d83f7d0b4c62c1f60f5c6c08ca5a01968af8e6be12bddd,2025-01-31T09:15:10.027000
CVE-2025-24551,1,1,89890fcb7fdc2cf0f469b52beec92a27eab339c8421ab40ceb9ef974fa54d86c,2025-01-31T09:15:10.170000
CVE-2025-24552,0,0,5836fd4cff67061da1a022b37868b2f3c365d2f5d165ede2a999174e0f3c027d,2025-01-24T18:15:33.257000
CVE-2025-24555,0,0,d47f17b8e2e295cf6139e94a64e84d237163885ad2ad17216990f34a21e900fe,2025-01-24T18:15:33.440000
CVE-2025-24560,1,1,d4c1176f1866d7ec0387cfc21d73b48c7dc3b47ed71e35d50794b79b4bc9779b,2025-01-31T09:15:10.323000
CVE-2025-24561,0,0,c698bd2c648564da7cb8a5ead03f00bdcfe0f5e2d45f91fef21ce218041ca538,2025-01-24T18:15:33.623000
CVE-2025-24562,0,0,f5a2b27ad0b893f9e361ae02017813ce34418cc837106061d965034991fc502e,2025-01-24T18:15:33.810000
CVE-2025-24563,1,1,e10943f5840e540dd8ca5639d051f2511e3f57ce5b74c871814018f1b701c4fc,2025-01-31T09:15:10.467000
CVE-2025-24568,0,0,76160f57a35703cc1bc60dd8f4bddda882f344202b02d103baf733d8125cff67,2025-01-24T18:15:33.987000
CVE-2025-24570,0,0,c28f0a95c222bf88ff7e9dd87509b02b35c9c870ecf7971f96c34cc8feb983a7,2025-01-24T18:15:34.147000
CVE-2025-24571,0,0,12bfb570d5dbb7308e59de1fd0e176919ad5f022d4e611da786987fff50f0ad8,2025-01-24T18:15:34.320000
@ -279493,11 +279520,14 @@ CVE-2025-24593,0,0,9c36266dcac20d200a08525d83ae20f675d64d14e2bb734ccd76bf4940d78
CVE-2025-24594,0,0,1f51a1d2e76cef969f6771fdca9d4628f716965e3d22ebbbb8948ae8c6232723,2025-01-24T18:15:36.330000
CVE-2025-24595,0,0,fbc09565a4f924c0a009b4638cc6ed5e9d14e449e9654f8ef695d4106c965b5a,2025-01-24T18:15:36.497000
CVE-2025-24596,0,0,4a462b85d7c20eb1e51f14e1da141104983de82ee010f1f7b247f3fd81c9e8c1,2025-01-24T18:15:36.657000
CVE-2025-24597,1,1,4f9595b5b3d6a1b18fa628038d17ebdb90040d7d0e2b83043a402812377ecc27,2025-01-31T09:15:10.607000
CVE-2025-24600,0,0,dcdd8cdf482b8e22d2a48b0e2f348d3c7f88226c6331542bf0912f288b741729,2025-01-27T15:15:14.233000
CVE-2025-24601,0,0,db505c493b963cd133491367007025a7a3eeb79293d5855e01deb30a1e81f5f1,2025-01-27T14:15:28.927000
CVE-2025-24603,0,0,cc1c8cd1942a1d516a081ea3f5d2c128e09834a700f6e631e4df98b4ec31c06c,2025-01-27T15:15:14.437000
CVE-2025-24604,0,0,62a39d9b09aae3795a1a5623a917bfa7211aaa213197284781446d74cdc483ea,2025-01-24T18:15:36.823000
CVE-2025-24606,0,0,5a6e3000a389ad1fa9dbb9a960a9755d84ee1b04bf140fb25209a300fb4fcd1a,2025-01-27T15:15:14.587000
CVE-2025-24608,1,1,1426d6306f52065c1181109032454fe40202afbf9c92acf2a056587aa0810c2c,2025-01-31T09:15:10.767000
CVE-2025-24609,1,1,dabd57eb8178c8ab365b5e8b630c7ff7e563296c5bbdd16fc52bd403d7b2e050,2025-01-31T09:15:10.900000
CVE-2025-24610,0,0,13a39d2f135170db910afda2a99191d77f2a29be1fdfb9d97efc58222978983e,2025-01-24T18:15:36.980000
CVE-2025-24611,0,0,5715cfb8338e1d2a6890eac94e9d49d3d44cfa21d68c17c839c3a2944696055d,2025-01-24T18:15:37.133000
CVE-2025-24612,0,0,2e20863c253051aaaea60ecd45f224a8c2678654eaa53b81ed896c6a14b65efa,2025-01-27T14:15:29.063000
@ -279509,8 +279539,10 @@ CVE-2025-24625,0,0,c78d300f1f0ba711e3f863a83d368167a911692a6dfd48749e68c965f6f00
CVE-2025-24626,0,0,a470e4da4e034c9f2ab445a591e418acc188dd505508f456d0941bc394263b92,2025-01-27T15:15:14.777000
CVE-2025-24627,0,0,02ed717fe8cb73f0e136d781f500cc8f29934ec76495d5547688a475083bddd4,2025-01-24T18:15:38.050000
CVE-2025-24628,0,0,921a9ab162d6fedf70ed90c3acec080864c3f2a85c667b57a58565282ba9c543,2025-01-27T15:15:14.923000
CVE-2025-24632,1,1,556d6471474be19d6e9a79c89f124dfec2d5aa506de91713bc151ebf0bd1bc14,2025-01-31T09:15:11.040000
CVE-2025-24633,0,0,b407bcbade3843581c653e2df1781329c3dc7476fcc6243a7b85dc7360c755e6,2025-01-24T18:15:38.200000
CVE-2025-24634,0,0,2bd24fdaae28a006ea4038da848c5e593d0eecbe902bfc5110e8d66be395288f,2025-01-24T18:15:38.350000
CVE-2025-24635,1,1,adee0e2e2c087cce5e8c9d2e888c88ec3d1427a2ea2418aa51d5531c795222ee,2025-01-31T09:15:11.190000
CVE-2025-24636,0,0,66aa9f526ce1fd7f3d18159e839d4ebddd24821053620416273bd4a4e01bf4a1,2025-01-24T18:15:38.507000
CVE-2025-24638,0,0,771d55a14f39075844370a6399a01b34d18de7f194d5cd5f84255753a3dd779b,2025-01-24T18:15:38.670000
CVE-2025-24644,0,0,5a47ee9c1d078a6ab6544254498806ccdab795bbe804f919ad0351c4bf3bd942,2025-01-24T18:15:38.833000
@ -279542,6 +279574,7 @@ CVE-2025-24681,0,0,605fdc2e36dc827462c36791192232d92dd296cecf5b41187efd4a46c704e
CVE-2025-24682,0,0,ca5f8a1b03b0ffb82cb43100159f5b8a9d5c286a9ed1e11204650e11edcdf612,2025-01-24T18:15:41.947000
CVE-2025-24683,0,0,bd281ec7d77c6dd8b1732719895ece773bf0791905499e1cf46a62b4feaf0c85,2025-01-24T18:15:42.133000
CVE-2025-24685,0,0,3935ef96229daa1b4c692226c2accf1fba103f1acefb63d2634035e3247a2886,2025-01-27T14:15:29.333000
CVE-2025-24686,1,1,f70de11c29db663e16f62dc00c94a534e549254878c7eacd82f90f3a962e5fec,2025-01-31T09:15:11.340000
CVE-2025-24687,0,0,a97e3c851507d885e2534c8d23f0ef9f7027aca0eec7a3965703f56e53f67d20,2025-01-24T18:15:42.283000
CVE-2025-24689,0,0,1de513e8e8f691d40e4b3e7d3658a5a290626246a247d5f74e6d4f1c5b396ca3,2025-01-27T15:15:16.073000
CVE-2025-24691,0,0,8f9407c7a90579300dd1854e170d65459a01a3bff3d853f2b1c7f87668044003,2025-01-24T18:15:42.433000
@ -279557,6 +279590,7 @@ CVE-2025-24705,0,0,0d29a10c3c131298ef8bd5a8cb9217ebb025888c7cb5d2d97a7633b27b032
CVE-2025-24706,0,0,310d3f61486b57a678867c52af7a3873d74ff33456f7825d148f48af59ebe640,2025-01-24T18:15:44.003000
CVE-2025-24708,0,0,92ede108f27ffdee04adb376065e31ecf2859fc8c1a57b0e6ab76efd11e64544,2025-01-27T15:15:16.230000
CVE-2025-24709,0,0,6d23c7aa23f5f0132f167fb051a07c37a43447273edf0a534d427fd5c040c301,2025-01-24T18:15:44.170000
CVE-2025-24710,1,1,566859838006945e87e24597a4a246871f0ba980ab62fd8f114894ec04b52203,2025-01-31T09:15:11.477000
CVE-2025-24711,0,0,2b6393d74f40d976d8e5d885b625242518c74534f12353db2bfa977c486e6f90,2025-01-24T18:15:44.330000
CVE-2025-24712,0,0,ad5ee3989300fa678ccc1aeeb2c1408d12155cb4b9c591212188ab9aa01bb7df,2025-01-24T18:15:44.480000
CVE-2025-24713,0,0,8966c71c53790b1b9ead199719a98f45f6076ff08526301a47eed7a249ba7a5b,2025-01-24T18:15:44.630000
@ -279564,6 +279598,7 @@ CVE-2025-24714,0,0,01c79f3d6975fa00ca9de87ee51395e5de6793c68e48bd2909badc648a193
CVE-2025-24715,0,0,918d31ff258da35c7d5a3cb0c4c244eba5a3169754271f2070db9f98a76d2e96,2025-01-24T18:15:44.913000
CVE-2025-24716,0,0,b60cda0ae81f3b0923fa7b26df1f0e620ddd729d40eb70ccadd9577c7ee769ce,2025-01-24T18:15:45.057000
CVE-2025-24717,0,0,192c45824352b7ecf8a017aadf0ae5aeb9949e337e41e88029f7cee314070cf4,2025-01-24T18:15:45.210000
CVE-2025-24718,1,1,076d393e46e41dfcb80184b7828cac787e866a2c39d69d016e00ed53df0884fd,2025-01-31T09:15:11.617000
CVE-2025-24719,0,0,b6a5eaae7b6b9dac2df9124e88387d1f1ef87c3d0c79dd412c3d005280b66ed8,2025-01-24T18:15:45.360000
CVE-2025-24720,0,0,9c714f59d0192e69fce2a5027c9e7738070e04ddd86e75e44b28cff60eb7786a,2025-01-24T18:15:45.523000
CVE-2025-24721,0,0,87c237eedc92baee03d4c2c20cc1d540e9d333bd80081e1b8926ab4576af7541,2025-01-24T18:15:45.667000
@ -279590,6 +279625,7 @@ CVE-2025-24743,0,0,41c0ba755259a09bb78d30034dfcceff3f65521049087232d94552c5b5203
CVE-2025-24744,0,0,e89d8ff4eca838607435ef9e0329695df1c3d2f7f7da2a6a7138e174e3ce48dc,2025-01-27T15:15:17.117000
CVE-2025-24746,0,0,76b6359f26bba7626bbf7027b062daab552b87a782fc60d7a7da64d1ce3753c9,2025-01-24T18:15:48.437000
CVE-2025-24747,0,0,0ef68093fe47b6e703556413c3e771c9fd229228f186762cf3469f52d01e5aa5,2025-01-27T15:15:17.253000
CVE-2025-24749,1,1,e117b0b7203e92297703008dde6e38898de1451f49b99f2af8811aae5a9a3098,2025-01-31T09:15:11.760000
CVE-2025-24750,0,0,e2f4a9b31b86d06509f886277e82ff83239dd5a8a7c14cdf3ecc2568e5cf5c3e,2025-01-24T18:15:48.663000
CVE-2025-24751,0,0,4aa19aa90aab45ec9714df6e468e19599d2a1949dc2de4e4c8d985f84e38f858,2025-01-24T18:15:48.810000
CVE-2025-24753,0,0,87b78dd3e11c90af6930cbca7a5346ee214e24237caa8b3601406532dfdbc4de,2025-01-24T18:15:48.950000

Can't render this file because it is too large.