mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 10:10:41 +00:00
Auto-Update: 2025-04-25T14:00:19.709220+00:00
This commit is contained in:
parent
1964e086ee
commit
b6c7adad22
64
CVE-2024/CVE-2024-119xx/CVE-2024-11917.json
Normal file
64
CVE-2024/CVE-2024-119xx/CVE-2024-11917.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-11917",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-25T12:15:16.013",
|
||||
"lastModified": "2025-04-25T12:15:16.013",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The JobSearch WP Job Board plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.8.8. This is due to improper configurations in the 'jobsearch_xing_response_data_callback', 'set_access_tokes', and 'google_callback' functions. This makes it possible for unauthenticated attackers to log in as the first connected Xing user, or any connected Xing user if the Xing id is known. It is also possible for unauthenticated attackers to log in as the first connected Google user if the user has logged in, without subsequently logging out, in thirty days. The vulnerability was partially patched in version 2.8.4."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento JobSearch WP Job Board para WordPress es vulnerable a la omisi\u00f3n de la autenticaci\u00f3n en todas las versiones hasta la 2.8.8 incluida. Esto se debe a configuraciones incorrectas en las funciones \u00abjobsearch_xing_response_data_callback\u00bb, \u00abset_access_tokes\u00bb y \u00abgoogle_callback\u00bb. Esto permite que atacantes no autenticados inicien sesi\u00f3n como el primer usuario de Xing conectado, o como cualquier otro usuario de Xing conectado si se conoce su ID. Tambi\u00e9n es posible que atacantes no autenticados inicien sesi\u00f3n como el primer usuario de Google conectado si este ha iniciado sesi\u00f3n, sin cerrarla posteriormente, en treinta d\u00edas. La vulnerabilidad se corrigi\u00f3 parcialmente en la versi\u00f3n 2.8.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codecanyon.net/item/jobsearch-wp-job-board-wordpress-plugin/21066856",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6de8a608-8715-4f9c-9f2f-df60dd1cc579?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3227",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-03T03:15:11.457",
|
||||
"lastModified": "2024-11-21T09:29:11.463",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-25T13:52:04.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,40 +94,100 @@
|
||||
"value": "CWE-24"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:weaver:e-office_oa:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "9.5",
|
||||
"matchCriteriaId": "5BC57384-9952-4FD7-9E44-66307841C357"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/garboa/cve_3/blob/main/upload.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259072",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259072",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.308750",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/garboa/cve_3/blob/main/upload.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259072",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259072",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.308750",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-61xx/CVE-2024-6198.json
Normal file
78
CVE-2024/CVE-2024-61xx/CVE-2024-6198.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-6198",
|
||||
"sourceIdentifier": "research@onekey.com",
|
||||
"published": "2025-04-25T13:15:42.370",
|
||||
"lastModified": "2025-04-25T13:15:42.370",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the\u00a0\u201cSNORE\u201d interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker\nwith access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the\u00a0modem."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "research@onekey.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:C/RE:M/U:Red",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NEGLIGIBLE",
|
||||
"Automatable": "YES",
|
||||
"Recovery": "USER",
|
||||
"valueDensity": "CONCENTRATED",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "RED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "research@onekey.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.onekey.com/resource/security-advisory-rce-on-viasat-modems-cve-2024-6198",
|
||||
"source": "research@onekey.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2024/CVE-2024-61xx/CVE-2024-6199.json
Normal file
78
CVE-2024/CVE-2024-61xx/CVE-2024-6199.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2024-6199",
|
||||
"sourceIdentifier": "research@onekey.com",
|
||||
"published": "2025-04-25T13:15:43.510",
|
||||
"lastModified": "2025-04-25T13:15:43.510",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthenticated attacker on the WAN interface, with the ability to intercept Dynamic DNS (DDNS) traffic between DDNS\u00a0services and the modem, could manipulate specific responses to include code that forces a buffer overflow on the modem.\n\nCustomers that have not enabled Dynamic DNS on their modem are not vulnerable."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "research@onekey.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:M/U:Red",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NEGLIGIBLE",
|
||||
"Automatable": "NO",
|
||||
"Recovery": "USER",
|
||||
"valueDensity": "DIFFUSE",
|
||||
"vulnerabilityResponseEffort": "MODERATE",
|
||||
"providerUrgency": "RED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "research@onekey.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.onekey.com/resource/security-advisory-rce-on-viasat-modems-cve-2024-6199",
|
||||
"source": "research@onekey.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-24xx/CVE-2025-2470.json
Normal file
64
CVE-2025/CVE-2025-24xx/CVE-2025-2470.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-2470",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-25T12:15:16.903",
|
||||
"lastModified": "2025-04-25T12:15:16.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Service Finder Bookings plugin for WordPress, used by the Service Finder - Directory and Job Board WordPress Theme, is vulnerable to privilege escalation in all versions up to, and including, 5.1. This is due to a lack of restriction on user role in the 'nsl_registration_store_extra_input' function. This makes it possible for unauthenticated attackers to register an account on the site with an arbitrary role, including Administrator, when registering via a social login. The Nextend Social Login plugin must be installed and configured to exploit the vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Service Finder Bookings plugin for WordPress, used by the Service Finder - Directory and Job Board WordPress Theme, es vulnerable a la escalada de privilegios en todas las versiones hasta la 5.1 incluida. Esto se debe a la falta de restricci\u00f3n del rol de usuario en la funci\u00f3n 'nsl_registration_store_extra_input'. Esto permite que atacantes no autenticados registren una cuenta en el sitio con un rol arbitrario, incluido el de Administrador, al registrarse mediante inicio de sesi\u00f3n con redes sociales. El complemento Nextend Social Login debe estar instalado y configurado para explotar esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/service-finder-service-and-business-listing-wordpress-theme/15208793",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a1f62cda-262b-46d9-a839-0a573813cfa1?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-29xx/CVE-2025-2986.json
Normal file
60
CVE-2025/CVE-2025-29xx/CVE-2025-2986.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-2986",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-04-25T12:15:17.083",
|
||||
"lastModified": "2025-04-25T12:15:17.083",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Maximo Asset Management 7.6.1.3 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Maximo Asset Management 7.6.1.3 es vulnerable a cross-site scripting almacenado. Esta vulnerabilidad permite a un usuario privilegiado incrustar c\u00f3digo JavaScript arbitrario en la interfaz web, alterando as\u00ed la funcionalidad prevista y pudiendo provocar la divulgaci\u00f3n de credenciales en una sesi\u00f3n de confianza."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7231785",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-39xx/CVE-2025-3912.json
Normal file
80
CVE-2025/CVE-2025-39xx/CVE-2025-3912.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-3912",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-25T12:15:17.243",
|
||||
"lastModified": "2025-04-25T12:15:17.243",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WS Form LITE \u2013 Drag & Drop Contact Form Builder for WordPress plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_config' function in all versions up to, and including, 1.10.35. This makes it possible for unauthenticated attackers to read the value of the plugin's settings, including API keys for integrated services."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WS Form LITE \u2013 Drag & Drop Contact Form Builder for WordPress para WordPress es vulnerable al acceso no autorizado a los datos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n 'get_config' en todas las versiones hasta la 1.10.35 incluida. Esto permite que atacantes no autenticados lean la configuraci\u00f3n del complemento, incluidas las claves API para los servicios integrados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ws-form/trunk/api/class-ws-form-api.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ws-form/trunk/includes/class-ws-form-common.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ws-form/trunk/includes/class-ws-form-config.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ws-form/trunk/ws-form.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3280355/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f6058e2-a5ec-43b2-9cb7-9efcf0853ffc?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
32
README.md
32
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-25T12:00:23.836593+00:00
|
||||
2025-04-25T14:00:19.709220+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-25T11:15:46.147000+00:00
|
||||
2025-04-25T13:52:04.237000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,34 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
291415
|
||||
291421
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2025-1565](CVE-2025/CVE-2025-15xx/CVE-2025-1565.json) (`2025-04-25T10:15:15.557`)
|
||||
- [CVE-2024-11917](CVE-2024/CVE-2024-119xx/CVE-2024-11917.json) (`2025-04-25T12:15:16.013`)
|
||||
- [CVE-2024-6198](CVE-2024/CVE-2024-61xx/CVE-2024-6198.json) (`2025-04-25T13:15:42.370`)
|
||||
- [CVE-2024-6199](CVE-2024/CVE-2024-61xx/CVE-2024-6199.json) (`2025-04-25T13:15:43.510`)
|
||||
- [CVE-2025-2470](CVE-2025/CVE-2025-24xx/CVE-2025-2470.json) (`2025-04-25T12:15:16.903`)
|
||||
- [CVE-2025-2986](CVE-2025/CVE-2025-29xx/CVE-2025-2986.json) (`2025-04-25T12:15:17.083`)
|
||||
- [CVE-2025-3912](CVE-2025/CVE-2025-39xx/CVE-2025-3912.json) (`2025-04-25T12:15:17.243`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `14`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-36908](CVE-2024/CVE-2024-369xx/CVE-2024-36908.json) (`2025-04-25T11:15:44.417`)
|
||||
- [CVE-2024-46733](CVE-2024/CVE-2024-467xx/CVE-2024-46733.json) (`2025-04-25T11:15:44.663`)
|
||||
- [CVE-2024-46742](CVE-2024/CVE-2024-467xx/CVE-2024-46742.json) (`2025-04-25T11:15:44.777`)
|
||||
- [CVE-2024-46774](CVE-2024/CVE-2024-467xx/CVE-2024-46774.json) (`2025-04-25T11:15:44.910`)
|
||||
- [CVE-2024-46816](CVE-2024/CVE-2024-468xx/CVE-2024-46816.json) (`2025-04-25T11:15:45.030`)
|
||||
- [CVE-2024-49569](CVE-2024/CVE-2024-495xx/CVE-2024-49569.json) (`2025-04-25T11:15:45.147`)
|
||||
- [CVE-2024-50063](CVE-2024/CVE-2024-500xx/CVE-2024-50063.json) (`2025-04-25T11:15:45.253`)
|
||||
- [CVE-2024-53203](CVE-2024/CVE-2024-532xx/CVE-2024-53203.json) (`2025-04-25T11:15:45.400`)
|
||||
- [CVE-2025-21853](CVE-2025/CVE-2025-218xx/CVE-2025-21853.json) (`2025-04-25T11:15:45.520`)
|
||||
- [CVE-2025-22013](CVE-2025/CVE-2025-220xx/CVE-2025-22013.json) (`2025-04-25T11:15:45.647`)
|
||||
- [CVE-2025-22077](CVE-2025/CVE-2025-220xx/CVE-2025-22077.json) (`2025-04-25T11:15:45.767`)
|
||||
- [CVE-2025-22126](CVE-2025/CVE-2025-221xx/CVE-2025-22126.json) (`2025-04-25T11:15:45.880`)
|
||||
- [CVE-2025-37838](CVE-2025/CVE-2025-378xx/CVE-2025-37838.json) (`2025-04-25T11:15:45.993`)
|
||||
- [CVE-2025-37893](CVE-2025/CVE-2025-378xx/CVE-2025-37893.json) (`2025-04-25T11:15:46.147`)
|
||||
- [CVE-2024-3227](CVE-2024/CVE-2024-32xx/CVE-2024-3227.json) (`2025-04-25T13:52:04.237`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
38
_state.csv
38
_state.csv
@ -246458,6 +246458,7 @@ CVE-2024-11913,0,0,dd7d1aef6bd9b33c5cbc226bd6c46c9362be3e1f9ee0d5457fc9f3944230b
|
||||
CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000
|
||||
CVE-2024-11915,0,0,28ea0a161b7eefe74ada087940b67270e2ec51b6fcf1def4945f57e6c8ae681f,2025-01-11T08:15:24.680000
|
||||
CVE-2024-11916,0,0,772212fec6b655643f1c957d90058c2fa42ec3e452d3898107b79ded42b35191,2025-04-14T12:27:30.293000
|
||||
CVE-2024-11917,1,1,031167b73343774ee40ea835a42c4eab1f9c685cc3097d68bcac659311c4c55d,2025-04-25T12:15:16.013000
|
||||
CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000
|
||||
CVE-2024-1192,0,0,5063d16699b3db058d0f99170ded601d82fcfc6f39ec66d01e8a7cebfd42903d,2025-01-08T14:35:22.633000
|
||||
CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000
|
||||
@ -258529,7 +258530,7 @@ CVE-2024-32258,0,0,6307eaacd8410373f8e4971a56af08ef21a11ce548d7dc244e05c1cbd8242
|
||||
CVE-2024-3226,0,0,d62a9b3627d473bf4da79a5994599afd5c9f26e2657570b8d6caf53a5569c149,2025-02-27T18:07:16.257000
|
||||
CVE-2024-32268,0,0,4220b068189651923e7c03eaebbdaa1016b5566433d5df81372417a7a35be918,2025-02-10T23:15:13.667000
|
||||
CVE-2024-32269,0,0,946bbdfbb629e9015a5d3fff72eb7016b39f3bb020c4b6fcea1e2b24974b3684,2024-11-21T09:14:38.380000
|
||||
CVE-2024-3227,0,0,5e35ccb7a18c8f050486b123c0a41fc84140b2686da07023d7bd03192c5cc2b5,2024-11-21T09:29:11.463000
|
||||
CVE-2024-3227,0,1,9e1d1fdbd4e1a4c34f6443452404f929d05306c6519fd21de6a244492ebf2163,2025-04-25T13:52:04.237000
|
||||
CVE-2024-3228,0,0,08ccf2d9f01838c2ec15add697673a4972e6918a8d27a226bfa96edaba6deef9,2024-11-21T09:29:11.610000
|
||||
CVE-2024-32281,0,0,7a66376ebdecf29b4444f8dc1c8f2ff04e98ba785ec70376a9c15ff0e2aacc79,2025-03-17T14:35:04.940000
|
||||
CVE-2024-32282,0,0,46f9031bc243af75396d20ca183c4cf0747f94988e54cae7dc9de7135eba9c12,2025-04-09T14:20:58.563000
|
||||
@ -262119,7 +262120,7 @@ CVE-2024-36904,0,0,98d6f735fc0e69f80deb2775ee6d5ef9e6471c0cc466f9251fa33735b25ec
|
||||
CVE-2024-36905,0,0,d5655420c4e3e449e82b6c63b4afb80b0339e2202099a683554894c8b046d2c6,2025-01-14T17:15:17.077000
|
||||
CVE-2024-36906,0,0,0aa76302720abb83a6a595e3140035dda654871b13cfc1eb2d8e0c500a12eaea,2024-11-21T09:22:47.157000
|
||||
CVE-2024-36907,0,0,ffcc8ba9c8087981a33e390f5bfe4cc5a8c9c80b5d73e0c2a7a0f0128b189a0b,2025-03-01T02:46:34.373000
|
||||
CVE-2024-36908,0,1,268e26cf1d3b4b6412affafdc478cc5f8c0c91962fbc5a3cb638de525fd46e75,2025-04-25T11:15:44.417000
|
||||
CVE-2024-36908,0,0,268e26cf1d3b4b6412affafdc478cc5f8c0c91962fbc5a3cb638de525fd46e75,2025-04-25T11:15:44.417000
|
||||
CVE-2024-36909,0,0,ce8ab62abeb377bee1d2bcd01da69db2cab04518b9e69f70cc2e82cdc2c9b18a,2024-11-21T09:22:47.580000
|
||||
CVE-2024-3691,0,0,d0d5563495d9075b90bfaa6d2ab5bbf6dcf82c228d110efa49a20a6893129bd8,2025-02-18T19:04:33.587000
|
||||
CVE-2024-36910,0,0,965398f938ac02c33ab743ca0d6997217b03f61a61087a6612c1b060ebce2068,2025-04-01T18:35:10.140000
|
||||
@ -269557,7 +269558,7 @@ CVE-2024-4673,0,0,f9b8ec8d09cbbc1fe6ff8d3280c9d1c6c9821644bece84737cd22cabad037e
|
||||
CVE-2024-46730,0,0,bbc0b138e2a127b2c6313e4e35e80e439f6fb3f79cf66854f3c83b93cd82ccd3,2024-09-30T12:49:00.333000
|
||||
CVE-2024-46731,0,0,0bd7fa544e7b9ced432ca27de4e82ff1274f4f99e19ad791df993119a3c218c7,2024-09-26T13:29:19.877000
|
||||
CVE-2024-46732,0,0,27f344a9c6c15a241e945bff7e9beb916eaa511582226dbb9cbc1bd0ddc0a6b4,2024-09-26T13:28:07.157000
|
||||
CVE-2024-46733,0,1,1eadd3c68884f37342e4c618590c919532c25dfd4f771123aabb5222a77b99e3,2025-04-25T11:15:44.663000
|
||||
CVE-2024-46733,0,0,1eadd3c68884f37342e4c618590c919532c25dfd4f771123aabb5222a77b99e3,2025-04-25T11:15:44.663000
|
||||
CVE-2024-46734,0,0,54144e8397a8d8508d8b9ddc79011d1a73acd2236e76feed8ed79d1cd04c3452,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46735,0,0,7ffe4e26154503e86c91237b2c052c7f699d83a84a3ccaab2d3bbbd436c8823a,2024-09-20T18:35:53.967000
|
||||
CVE-2024-46736,0,0,3c1ef12c24cce0f8bcbd38405e5151195e4b1250b39e7384abcf96ac2ee7ee60,2024-09-20T12:30:51.220000
|
||||
@ -269567,7 +269568,7 @@ CVE-2024-46739,0,0,d205af77e24ab1326a75221d3af9b7b3b23426f178d16d2d86739cbf44af5
|
||||
CVE-2024-4674,0,0,6e651da8702364f3ba8e5d536b29f090de9919ba02f02656062eb022212d5998,2025-02-19T18:07:22
|
||||
CVE-2024-46740,0,0,f3cf7a1cb956f7a2c7d7e6990fc54e0386248e09abb927170aa60b8743f7fc32,2025-02-18T16:15:17.540000
|
||||
CVE-2024-46741,0,0,09ed688b4e4a53d400e039f005d8e90ff80aabd957af947df6953f4926024947,2024-09-20T18:33:27.960000
|
||||
CVE-2024-46742,0,1,d7d48f5b92030aab8c7493bc41d9c10a6cef82a61e47898bf1c54c830c60a61e,2025-04-25T11:15:44.777000
|
||||
CVE-2024-46742,0,0,d7d48f5b92030aab8c7493bc41d9c10a6cef82a61e47898bf1c54c830c60a61e,2025-04-25T11:15:44.777000
|
||||
CVE-2024-46743,0,0,b288832ee6d9c1844cb85119e621151e5809ad63298328c3c8489107631c2c24,2024-09-20T18:32:11.827000
|
||||
CVE-2024-46744,0,0,c5fdb13f5a39a9642ab64854ebe3762ca44ce32d6586ba3c3edcf41ded86bc1a,2024-09-30T13:36:19.557000
|
||||
CVE-2024-46745,0,0,1810fdd8cfd3dd07004fc4f09934af972754cc295d1890751708649bd77ab182,2024-09-20T12:30:51.220000
|
||||
@ -269602,7 +269603,7 @@ CVE-2024-46770,0,0,3f28505d665ed7d2a19c63b8d28261802b71417515044c3bbe4e51a66d261
|
||||
CVE-2024-46771,0,0,edd9de48a6966046e6e9b6c2d3d272bef734ff444f550b1023dacf571ecaa1d8,2024-11-20T18:20:03.130000
|
||||
CVE-2024-46772,0,0,b2c6ed5053aa341269ac29fedbae440b943ba220fcede06edf01c3cddaf3d726,2025-04-07T09:15:15.800000
|
||||
CVE-2024-46773,0,0,9cb44fe5397f6f84da684c8a0d3f69b229955bd83404f07dea2f1ec57ef48521,2024-09-23T16:51:59.983000
|
||||
CVE-2024-46774,0,1,4168e5ce888bfeb50941ebaddef62bd83f7891732567f9e76c73fc0314db12fc,2025-04-25T11:15:44.910000
|
||||
CVE-2024-46774,0,0,4168e5ce888bfeb50941ebaddef62bd83f7891732567f9e76c73fc0314db12fc,2025-04-25T11:15:44.910000
|
||||
CVE-2024-46775,0,0,dfe5d776fd445a63c4996e3d7df7495f59178368d527e55e62a9c064e9c37ae2,2024-11-20T18:17:13.750000
|
||||
CVE-2024-46776,0,0,ec71ec4690ef1f88bad3a62d9534132ced4b0bc07181c73bcd14a33c6e5a6f29,2024-11-20T17:56:57.290000
|
||||
CVE-2024-46777,0,0,21ad3223e2428dfb57f4e57cfa918d664e2242c1748d72724a3159e943e581ac,2024-11-20T17:56:02.287000
|
||||
@ -269648,7 +269649,7 @@ CVE-2024-46812,0,0,27f6c4dd25aa09a7e159856242be9f35fcc3122270f1ffd285e46652bc96a
|
||||
CVE-2024-46813,0,0,ea4d886f1e469214530c3dc96328c5a7e7a8e2952f8545005f2a3901833e8bad,2025-04-10T13:15:45.303000
|
||||
CVE-2024-46814,0,0,2d733e7cbdb19a14fbb31b604fcdeab772c427714b4e97ba0aea10c564457763,2024-10-04T17:27:47.450000
|
||||
CVE-2024-46815,0,0,0d1eb43c74ba7bba5cc3b81322d15c43ea9fab0c4d58caf610783efac6ba13ce,2024-11-20T18:22:12.017000
|
||||
CVE-2024-46816,0,1,18fd749effccc4eabc15a7febc128b4aa5d1503fa50b3b1753b126dfd8416644,2025-04-25T11:15:45.030000
|
||||
CVE-2024-46816,0,0,18fd749effccc4eabc15a7febc128b4aa5d1503fa50b3b1753b126dfd8416644,2025-04-25T11:15:45.030000
|
||||
CVE-2024-46817,0,0,f3ef23bb7390f2003e5dca267765a9b740d485c9c14e2cde1118f1e713765186,2024-11-20T17:45:43.893000
|
||||
CVE-2024-46818,0,0,3c0ad7e9cb76891d8ac9b71df08567941cf062277ff4b72f5c15f729dfb8c7d8,2024-10-04T17:18:36.613000
|
||||
CVE-2024-46819,0,0,fdca475d6dbaa09ef703a9cbcb418bdd925bbb20ca810eb936548c9b0d16f32a,2024-10-04T17:11:00.570000
|
||||
@ -271664,7 +271665,7 @@ CVE-2024-49563,0,0,827ccbaea80bb5467dfc7289ca91a4d25f83cf30606ab4fec461139f2338b
|
||||
CVE-2024-49564,0,0,8fb79c39b275f39082453aaf778c650f840e21c30d5bf7f5f4c7b0874de8c9d6,2025-03-28T18:11:40.180000
|
||||
CVE-2024-49565,0,0,86e9989132e287d257bb63a69e2b6ee4b796cbb5c943261cdbbee1512f302599,2025-03-28T18:11:40.180000
|
||||
CVE-2024-49568,0,0,2424937b6c632a3bb8bbe23f1d59070173b0b27451c699774823ff5adcd561d7,2025-01-11T13:15:23.637000
|
||||
CVE-2024-49569,0,1,c656afc1e37b05a2772fd3607af20e8af9829dc5345d9176667b64dff5c0bf85,2025-04-25T11:15:45.147000
|
||||
CVE-2024-49569,0,0,c656afc1e37b05a2772fd3607af20e8af9829dc5345d9176667b64dff5c0bf85,2025-04-25T11:15:45.147000
|
||||
CVE-2024-4957,0,0,faf1bb90e1dc631958a9f6c5494539e38e22b9c3203a1f9393f289eefc9d7e39,2024-11-21T09:43:56.650000
|
||||
CVE-2024-49570,0,0,6c0963f2b3310752a9fe1fd9ff9254cc20b94f75ba1819af3eccbe69179a39b0,2025-03-24T18:56:21.257000
|
||||
CVE-2024-49571,0,0,48d41a1ed34da6a8d207508416dbadcc69c521f2274992ee3d4ce336a0c1087e,2025-01-11T13:15:24.027000
|
||||
@ -272129,7 +272130,7 @@ CVE-2024-5006,0,0,5837c31bef582ca5d4638814ad63e32eeef8a5f2602838bc11a08790f4dd08
|
||||
CVE-2024-50060,0,0,01dcad8cd7e5f8d2f3beeaf93497ab292892b951e329958f62a92464cf3d2176,2024-11-20T20:25:37.210000
|
||||
CVE-2024-50061,0,0,7bf2c4f77a17eac93db10fdc03c0ad62be89d829ad4c533fe6b9e7cd9f3cf7f4,2025-02-21T14:15:49.370000
|
||||
CVE-2024-50062,0,0,d50f044e8938707dae39384ec96cd77ececb8faa96071400b106a3c62189fac5,2024-10-23T21:48:57.737000
|
||||
CVE-2024-50063,0,1,1d819a0d9c52f884fb82ae905e6716faebbfad22105f6ba7bd372ac48572b212,2025-04-25T11:15:45.253000
|
||||
CVE-2024-50063,0,0,1d819a0d9c52f884fb82ae905e6716faebbfad22105f6ba7bd372ac48572b212,2025-04-25T11:15:45.253000
|
||||
CVE-2024-50064,0,0,292ba67048c70b5eca902a8914b6e46b5ff25ff4177582fed7a5e55d850d7e8e,2025-04-16T19:15:52.623000
|
||||
CVE-2024-50065,0,0,84caec01af79e694589460b1fd2d22181973d74a594b1014f17ab14d35b8559b,2024-11-20T20:07:01.320000
|
||||
CVE-2024-50066,0,0,f8cbeb952d27740648470cb34786d680aee0eb2b11c0988fbc6b4e4ca35c50e9,2025-03-07T17:15:18.990000
|
||||
@ -274490,7 +274491,7 @@ CVE-2024-53199,0,0,b7d164e48aa05e3c01fb8207aa331e220207154288cf87cf44ac3ccbb8685
|
||||
CVE-2024-53200,0,0,382e2ed7c91ff816c9972e95788547d617ab94e25d45361504cd38a28e7c4e1f,2025-01-08T21:29:35.877000
|
||||
CVE-2024-53201,0,0,c711eb722b8f180d53de7616fe5e83ef81c9c735e27696929f70cbb31bb1797d,2025-01-08T21:26:58.670000
|
||||
CVE-2024-53202,0,0,6dbe997bc5638474adb0491890778fbeedc8cad0594dca99d0aa34c6acab69cf,2025-01-14T16:23:54.130000
|
||||
CVE-2024-53203,0,1,bc7464a41527670661c503e9ac7d02c0a1dbf7fcbd194b81ecda2ddfe2204ae1,2025-04-25T11:15:45.400000
|
||||
CVE-2024-53203,0,0,bc7464a41527670661c503e9ac7d02c0a1dbf7fcbd194b81ecda2ddfe2204ae1,2025-04-25T11:15:45.400000
|
||||
CVE-2024-53204,0,0,2c897609f21b073f2aedfbae9db3f6afa71168ae92f23356b369b32f12df3275,2025-04-18T14:15:20.860000
|
||||
CVE-2024-53205,0,0,f32da2740c9268726c877ede297f0d5488feab408e6344c210626a8b8000caed,2025-04-18T14:15:20.987000
|
||||
CVE-2024-53206,0,0,2f6a2fc7adb42267dc8ee97a338aa8c24c6fa9462fbe1480b8392e4aae94186c,2025-02-11T16:15:41.840000
|
||||
@ -277866,6 +277867,8 @@ CVE-2024-6194,0,0,edbd6241b7f987aa3a81863460dff0ff43067716b0eb6760c0d7999432f960
|
||||
CVE-2024-6195,0,0,b4caf70d1edba8ea49e05884b1f80490b69a86c6f542eb35b84fa4578f274f1c,2024-11-21T09:49:10.187000
|
||||
CVE-2024-6196,0,0,b1f39cc423aa2f573c963bfda2e2954c189faa3c6a65007de94824a0fe67c7b5,2024-11-21T09:49:10.340000
|
||||
CVE-2024-6197,0,0,341d9f6df4ae3e4e99279c2cfac2e321c8271a012cdb7cb8f491cac94878c7fc,2024-11-29T12:15:08.430000
|
||||
CVE-2024-6198,1,1,e2cdff1cf80ababece59ab0490c507d33c33b635c59ba8e50b012afe62fe25be,2025-04-25T13:15:42.370000
|
||||
CVE-2024-6199,1,1,15389f1e61eaf87a77f28615f893dcedcf409e67ecf18f2698fddddd6250ddba,2025-04-25T13:15:43.510000
|
||||
CVE-2024-6200,0,0,9ea80a7e2b2604a341d4266c7e6316677c4c7b3562bbab6c326247f642929732,2024-08-29T17:53:40.483000
|
||||
CVE-2024-6201,0,0,d7508e5c68d1c9f58af9fd9a0f0c496f8219bfb780e580739e4f5ce4075f9531,2024-08-29T17:52:07.493000
|
||||
CVE-2024-6202,0,0,6ede66ad5d88af3e4e7acd719dab516e45d0d130ab973638092e6c9d7ab6930d,2024-08-29T17:48:43.723000
|
||||
@ -282452,7 +282455,7 @@ CVE-2025-1559,0,0,709a243835f3c6ce0779a28711cc25be41f0a8c4f301b124730fe9903567f9
|
||||
CVE-2025-1560,0,0,5806fdd5d9f8e8a09704d33fd8caadc121e4fbb048f372fad8d43065a1e4a103,2025-03-06T16:15:42.753000
|
||||
CVE-2025-1561,0,0,c0dd475a880b302ad58d5da65215c03a4b2329b9f43fd50459164bc801594e00,2025-03-13T05:15:27.890000
|
||||
CVE-2025-1564,0,0,9d62e5431da133f133499b29bcb96aa13e41c1b673396891299a0b15aab9c828,2025-03-01T08:15:34.007000
|
||||
CVE-2025-1565,1,1,6a57515da5c4230495c0789870c12c6576677843afc19ebfd9c8b119f2d4704f,2025-04-25T10:15:15.557000
|
||||
CVE-2025-1565,0,0,6a57515da5c4230495c0789870c12c6576677843afc19ebfd9c8b119f2d4704f,2025-04-25T10:15:15.557000
|
||||
CVE-2025-1566,0,0,0d1842651ca918db30bbbf585031a9882a06885240b960efc255c27959e9c4bf,2025-04-17T20:21:48.243000
|
||||
CVE-2025-1568,0,0,82a20d4ff7b9cf0c7b45c5657d4a44e92b8acae0c9a7f165ae8fd2f575e43934,2025-04-17T20:21:48.243000
|
||||
CVE-2025-1570,0,0,e2c8a697fd328cfac1cb14bcdda0501641702037da6bc6d3e9d43d7d6e474d73,2025-03-06T15:35:59.507000
|
||||
@ -283794,7 +283797,7 @@ CVE-2025-2185,0,0,91b412b1d296ace687d40a6783e92d40fc865c9d24522642b0a45c94519a33
|
||||
CVE-2025-21850,0,0,5a64ab06a2b6f581200ce1660927997cede0a2eabc44b30e9f55d39dacccfe4f,2025-03-13T16:29:12.770000
|
||||
CVE-2025-21851,0,0,7bdca895fa921f203a0d87c612234a5ad7017395a8665ed600f55d38ca809496,2025-03-13T16:29:50.380000
|
||||
CVE-2025-21852,0,0,c4adf7ded1a0df944edbc23a29fae37f72674fd1d9b49cefe98286acd387c332,2025-03-13T16:30:07.307000
|
||||
CVE-2025-21853,0,1,f8d6f3489d97a0a2ae851b25b85ca4505d50e6d8cb626c12c21d9ea965be501c,2025-04-25T11:15:45.520000
|
||||
CVE-2025-21853,0,0,f8d6f3489d97a0a2ae851b25b85ca4505d50e6d8cb626c12c21d9ea965be501c,2025-04-25T11:15:45.520000
|
||||
CVE-2025-21854,0,0,9c78450b8715b387e8b26947750bb1e0ffed5820b15e3f2e0a35a80d6d8f2f8c,2025-03-13T21:18:24.623000
|
||||
CVE-2025-21855,0,0,b60684fe956750d19be1267ce72b8af8344e6c62db29457ed70e99353d1b5be9,2025-03-28T16:15:28.047000
|
||||
CVE-2025-21856,0,0,b09c68ce23969b8e4c4ebe578130af0c7fcaa476814ad748e7bff8a78b6b4332,2025-03-13T21:18:08.423000
|
||||
@ -283969,7 +283972,7 @@ CVE-2025-2201,0,0,2371e9549039387486019592f5bf6cd7cee4f08ab86a19044d07c960855c7b
|
||||
CVE-2025-22010,0,0,bdac999142019e0464835ba2c58bc0993611c3b3716f57cce8448da038080674,2025-04-10T13:15:50.687000
|
||||
CVE-2025-22011,0,0,d6f0b86ea4fcae9c437f3df761e6c6f1254719a130d7c775b001ee5d7ce8ebed,2025-04-10T13:10:41.140000
|
||||
CVE-2025-22012,0,0,2a1ef2918aee65275f9f773f0505976a03f119761b851bcaee2754c36f3fb91c,2025-04-10T13:10:36.613000
|
||||
CVE-2025-22013,0,1,e8d7eac0691bf4cbc9e5abeade565aec25f8bc10d25f6483a2e9965a7c6af5e3,2025-04-25T11:15:45.647000
|
||||
CVE-2025-22013,0,0,e8d7eac0691bf4cbc9e5abeade565aec25f8bc10d25f6483a2e9965a7c6af5e3,2025-04-25T11:15:45.647000
|
||||
CVE-2025-22014,0,0,d0677bce9b40bf2440f1e3f05d26248d0f1a8e04e3af5766ae8663607da1e5dd,2025-04-10T13:15:50.823000
|
||||
CVE-2025-22015,0,0,76ef40b09e4f1cb899d4a2ab31f22c4f6d8c6e60d75140b0b3e5777f401c7fbf,2025-04-08T18:13:53.347000
|
||||
CVE-2025-22016,0,0,147b90da5e7863ebd9aa554a0d14ec0b4cb2770bdef3a66630422d63719c334c,2025-04-08T18:13:53.347000
|
||||
@ -284037,7 +284040,7 @@ CVE-2025-22073,0,0,1011b1983c78355d02123f7c88dfc6182e9722c50b1fa6a835a8fbaf3084f
|
||||
CVE-2025-22074,0,0,c93b26d255a98622f3c64207f2f2068cdbbb7943477ed1bda9847c2aed7aca12,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22075,0,0,261a98e89208109572cff4ef6745cb89aaeaf045a6efabf16dc812a41d8ddf6b,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22076,0,0,d420dac94d6fe51cc4ff1a0eb9628b40a00756768d7df0795a7580a2fb35e174,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22077,0,1,e4c836444f60fbb6831fded739bc536c15e2a4eafc62baa6c6353c3ffaefbe08,2025-04-25T11:15:45.767000
|
||||
CVE-2025-22077,0,0,e4c836444f60fbb6831fded739bc536c15e2a4eafc62baa6c6353c3ffaefbe08,2025-04-25T11:15:45.767000
|
||||
CVE-2025-22078,0,0,26f7b68d0cdad5a890aa75dadfa17672e8c28f9f0bf4ecb4fdd0f808542f5350,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22079,0,0,364458579769c3e0f2ccd2c4af19c4b4e0f96f4d7196e9e43e8a4f54c705c689,2025-04-17T20:22:16.240000
|
||||
CVE-2025-2208,0,0,99b9d91a36ada917eec10dfce1128ade8f30ac7ffcb2e43a5105e2922f45ad1f,2025-03-11T21:15:54.117000
|
||||
@ -284091,7 +284094,7 @@ CVE-2025-22122,0,0,26e482aa45f505c68da92af2963c9fb39c7d8be8e64626761306f6c9b438e
|
||||
CVE-2025-22123,0,0,a22bc16ff55af1fbdd1763364944a06f5c48ab9a4828301000c285323ef8c595,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22124,0,0,7752cd210f8b2ed08482c6c58db66be96f05fdb19aaf501c80318fd986dc557c,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22125,0,0,d9d0d0be3e2ebc61c6d38c65cfcd45551569612dd89c48d601633ab28d2d34a8,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22126,0,1,d69a5c7dd72e14d4efa2f34c1be80ca5e4fba4822f184eaebcbe35636daca26c,2025-04-25T11:15:45.880000
|
||||
CVE-2025-22126,0,0,d69a5c7dd72e14d4efa2f34c1be80ca5e4fba4822f184eaebcbe35636daca26c,2025-04-25T11:15:45.880000
|
||||
CVE-2025-22127,0,0,f9fcfb39b6cb065d69a4e7639d1cd69417958e922b4049b689ebb96ace44c8a0,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22128,0,0,3706fdd79c3eacd04ed61d0b9c3b1b0449d18067b311dc6b7e2f28d4c5657ff7,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
|
||||
@ -286121,6 +286124,7 @@ CVE-2025-24696,0,0,3f05e52259d3b900a80613c5b1e8b568819cf706464f6128c6614eb8c2149
|
||||
CVE-2025-24697,0,0,524ece83a68382cbbf9bfb8b326769c1433565110882c970ecb2d390f56fd66b,2025-02-03T15:15:30.090000
|
||||
CVE-2025-24698,0,0,ee9ed28bb6a4d45cbe5d6914ce763041875739a745cdfb0d75cc00a562396221,2025-01-24T18:15:43.050000
|
||||
CVE-2025-24699,0,0,393e254dc7ad1cd4683fc4d4519da575204d2336c4593392a7c99d9a332989ca,2025-02-14T13:15:50.193000
|
||||
CVE-2025-2470,1,1,4488c07429fb0f638a2bcf5f18f1c8dcca11fa0873f3deecc47a9e2553b57a37,2025-04-25T12:15:16.903000
|
||||
CVE-2025-24700,0,0,751d45a0c372daf25447afad51791e39d3a984cf49ee5476e94da07a79832cbd,2025-02-14T13:15:50.330000
|
||||
CVE-2025-24701,0,0,3286a9d08a955762787b23c92470d2629e626a4bb3688501e99db53a7da2cb4d,2025-01-24T18:15:43.207000
|
||||
CVE-2025-24702,0,0,7c38f7de4d5427e8c69c77b42285f55828f36aa11705bf9605c2b3dfb09c1912,2025-01-24T18:15:43.360000
|
||||
@ -288573,6 +288577,7 @@ CVE-2025-2983,0,0,d31f69cd4a503a465c90bfed858cd3831ad229c0ecb657ddc75c62172e5f91
|
||||
CVE-2025-29834,0,0,4578a3b9050d36f7b5d401ef2cff9bd2a539c6ae9a0546aae8bc67b2af1fdb40,2025-04-15T18:39:43.697000
|
||||
CVE-2025-2984,0,0,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2985,0,0,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2986,1,1,971cb370a2208d6ff8e7ca861d70c22c3f320da3a2730619b33177fbeacbd69c,2025-04-25T12:15:17.083000
|
||||
CVE-2025-29868,0,0,3cdd5d5bc9e5c1cb38e652f74faead4f53d8e8683a37455baaae14fba635a1fa,2025-04-15T13:07:54.393000
|
||||
CVE-2025-2987,0,0,c5ae0e320f83eaa0b28afb3c153f6c745fec2a59a31f1b5ca52889e16590e49b,2025-04-23T14:08:13.383000
|
||||
CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000
|
||||
@ -290955,14 +290960,14 @@ CVE-2025-3775,0,0,16e8478151448d32ea3ecef550364f3909606c3573641ec825932b7de0e1fc
|
||||
CVE-2025-3776,0,0,cf81d0de1f8bc345c4abdbda2fd10df58ffa252c89f7ba1ddea13cef90f5d4da,2025-04-24T09:15:31.890000
|
||||
CVE-2025-37785,0,0,d1c64bd1cadcc5f51780313b6aae97c63b6e0722d1c5a54d61cc46c9690e399a,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3783,0,0,08564e7625cce7923d54746f30fbc8f13bf12d9607faa6a7346084b96420b3f3,2025-04-23T18:03:35.193000
|
||||
CVE-2025-37838,0,1,34b866110a481f88ddb643755af79280103467b2b106118ed6c8b965b4af27fd,2025-04-25T11:15:45.993000
|
||||
CVE-2025-37838,0,0,34b866110a481f88ddb643755af79280103467b2b106118ed6c8b965b4af27fd,2025-04-25T11:15:45.993000
|
||||
CVE-2025-3785,0,0,bff9ab0e8b6a6a32cd5139ba0f7e4bd4305d4e6ab42c05e8cc90a3044ee64a2a,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3786,0,0,ef1623c50d812a740179b99f61135828f9278cbc4c5320b64de7a7e4bc416e8d,2025-04-22T16:35:33.920000
|
||||
CVE-2025-37860,0,0,0c77e81593ef5482779e31740051c4064947edf1b07804581ac12225df1491b3,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3787,0,0,3beed123857a653da372b7c8a1c42164041d5977b1dd91112f1404522a8170e5,2025-04-23T17:52:33.120000
|
||||
CVE-2025-3788,0,0,cdf311291578b63efe8f95343add07fd97c2f4779c659c598fcec26571babece,2025-04-23T17:34:33.343000
|
||||
CVE-2025-3789,0,0,28ab61c6372862568fce1ec9243f66e532b73550891c86833c4ef7464ff888b9,2025-04-21T14:23:45.950000
|
||||
CVE-2025-37893,0,1,35f579b7463913981e9fb2e00bbe850fbdc5a97f02dc87f739a7a8fd54cfceb1,2025-04-25T11:15:46.147000
|
||||
CVE-2025-37893,0,0,35f579b7463913981e9fb2e00bbe850fbdc5a97f02dc87f739a7a8fd54cfceb1,2025-04-25T11:15:46.147000
|
||||
CVE-2025-3790,0,0,dc490dedfd3bb31d7338c71c9fcad5c80abd89749a2e60e6c362365fde12516a,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3791,0,0,291bfa74dbfa6e6e6c9947564765be440c26b137eac96eb1712e4de3014fe092,2025-04-21T14:23:45.950000
|
||||
CVE-2025-3792,0,0,626f142eb589b39cf00a55b3a0accb178a0101c9e56a4bac9f54695372acad2c,2025-04-21T14:23:45.950000
|
||||
@ -291034,6 +291039,7 @@ CVE-2025-3902,0,0,676970333097082de40f6f58233872070947df9bef43bb3df9e412f6058936
|
||||
CVE-2025-3903,0,0,c819a464552e9e27e8ed2bfdd866426360d2fc34658c9fc1c82fb0c8ffcfc0a1,2025-04-23T19:16:25.843000
|
||||
CVE-2025-3904,0,0,0d6553172301a91027b8c3c2558169e5d5696a7e7eb460e09b39ca21f58cb939,2025-04-23T19:16:25.977000
|
||||
CVE-2025-3907,0,0,f81e129f5f652610151f5866cb425f616cfd83cdc084a2f30c48e0083539d88e,2025-04-23T18:16:03.620000
|
||||
CVE-2025-3912,1,1,901e67c14b99b1df95fb427fedf0205e55435551b230eb40d3ab7b801534a4de,2025-04-25T12:15:17.243000
|
||||
CVE-2025-3923,0,0,182118b3a4f54e107b68d12918f8a2e69019afc473ce8aee5e35db6077d81a3b,2025-04-25T06:15:46.117000
|
||||
CVE-2025-39359,0,0,fe1620cebe6a3577f2510d166c3a64f56c7e8a35f76d5fc351e9b3c2125fe136,2025-04-24T16:15:30.737000
|
||||
CVE-2025-39360,0,0,415da8a72d7f8b017363e845eb01588faa06aeb0917d4cea44c42e1c474de6f5,2025-04-24T16:15:30.877000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user