mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-10T14:00:19.863824+00:00
This commit is contained in:
parent
482513dc96
commit
cb78456ca5
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2298",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.173",
|
||||
"lastModified": "2024-11-21T07:58:20.190",
|
||||
"lastModified": "2025-06-10T12:45:23.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.2.10",
|
||||
"matchCriteriaId": "49D6D1DC-9F19-4BB2-84AC-59CE9952111D"
|
||||
"matchCriteriaId": "94EABBCE-A9C4-4AC5-BE90-C55E524F0D15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2299",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.267",
|
||||
"lastModified": "2024-11-21T07:58:20.323",
|
||||
"lastModified": "2025-06-10T12:45:23.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.2.10",
|
||||
"matchCriteriaId": "49D6D1DC-9F19-4BB2-84AC-59CE9952111D"
|
||||
"matchCriteriaId": "94EABBCE-A9C4-4AC5-BE90-C55E524F0D15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2415",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.843",
|
||||
"lastModified": "2024-11-21T07:58:34.373",
|
||||
"lastModified": "2025-06-10T12:45:23.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.2.10",
|
||||
"matchCriteriaId": "78676BA2-72C4-45F9-AA3A-F25FCF27BC6C"
|
||||
"matchCriteriaId": "94EABBCE-A9C4-4AC5-BE90-C55E524F0D15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2416",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.903",
|
||||
"lastModified": "2024-11-21T07:58:34.510",
|
||||
"lastModified": "2025-06-10T12:45:23.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.2.10",
|
||||
"matchCriteriaId": "78676BA2-72C4-45F9-AA3A-F25FCF27BC6C"
|
||||
"matchCriteriaId": "94EABBCE-A9C4-4AC5-BE90-C55E524F0D15"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-39992",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-09-04T11:15:41.030",
|
||||
"lastModified": "2024-11-21T08:16:12.073",
|
||||
"lastModified": "2025-06-10T12:45:23.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.3.3",
|
||||
"matchCriteriaId": "8BF8819C-9FBF-40E4-BC21-D552BE257E48"
|
||||
"matchCriteriaId": "F383456B-0C97-4EF9-8398-A64F2202D58E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12770",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:37.293",
|
||||
"lastModified": "2025-05-20T20:15:32.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T12:55:45.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.7.6",
|
||||
"matchCriteriaId": "D53E4E2A-164B-4711-8D4D-01BF24A8A2D5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/e21f6a4e-f385-411b-8d91-0f38f9e6cdd3/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/e21f6a4e-f385-411b-8d91-0f38f9e6cdd3/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12800",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:37.507",
|
||||
"lastModified": "2025-05-20T20:15:33.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T12:52:18.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brijeshk89:ip_based_login:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.4.1",
|
||||
"matchCriteriaId": "CC8582A6-DCFD-4B96-B5AB-30C9AC73C7F4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/8f1ceca5-3b7b-4cf0-bccd-03e204e5bfad/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/8f1ceca5-3b7b-4cf0-bccd-03e204e5bfad/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12808",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:37.640",
|
||||
"lastModified": "2025-05-20T20:15:33.160",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T12:29:25.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "1.13.4",
|
||||
"matchCriteriaId": "171DAE82-C0B9-4F44-B4AF-CEFFCCC93771"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/f1f823f5-d0f1-45a5-85c2-60208d76366e/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/f1f823f5-d0f1-45a5-85c2-60208d76366e/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12812",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:37.747",
|
||||
"lastModified": "2025-05-20T20:15:33.297",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T12:22:08.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "1.13.4",
|
||||
"matchCriteriaId": "171DAE82-C0B9-4F44-B4AF-CEFFCCC93771"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/757e76fd-830f-4d1c-8b89-dfad7c9c1f37/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/757e76fd-830f-4d1c-8b89-dfad7c9c1f37/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13313",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:38.980",
|
||||
"lastModified": "2025-05-20T20:15:34.017",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T12:01:55.290",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:aweber:aweber:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "7.3.21",
|
||||
"matchCriteriaId": "2AAE25EB-E9EE-4CBA-BC8A-0B9C5A4AFFEE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/cc35b2f4-f1f1-4ed3-91b2-025bd5848b29/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/cc35b2f4-f1f1-4ed3-91b2-025bd5848b29/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13357",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:39.067",
|
||||
"lastModified": "2025-05-20T20:15:34.153",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T13:31:40.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:metaphorcreations:ditty:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.1.52",
|
||||
"matchCriteriaId": "55E44700-63F2-4F71-ADC4-CB117651178F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d134bb34-6324-4bc8-943e-4e743d00fcb2/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d134bb34-6324-4bc8-943e-4e743d00fcb2/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13383",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:39.233",
|
||||
"lastModified": "2025-05-20T20:15:34.507",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T13:11:27.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:harmonicdesign:hd_quiz:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.0.0",
|
||||
"matchCriteriaId": "B864BAB9-9E74-4720-AB8F-13D8CE79AC7B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/85bc905d-c960-4399-a879-2d18a4b03007/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/85bc905d-c960-4399-a879-2d18a4b03007/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13616",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:39.570",
|
||||
"lastModified": "2025-05-20T20:15:35.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T13:10:20.170",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vikwp:vikbooking_hotel_booking_engine_\\&_pms:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.7.2",
|
||||
"matchCriteriaId": "2E3A5DAA-1CCC-44D8-9CA9-3C1E7FD137B3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/44b3a2d9-a2e1-43dd-b27a-1ad9d6015c9b/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/44b3a2d9-a2e1-43dd-b27a-1ad9d6015c9b/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13619",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:39.660",
|
||||
"lastModified": "2025-05-20T20:15:35.533",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T13:08:49.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:lifterlms:lifterlms:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "8.0.1",
|
||||
"matchCriteriaId": "B269B4D2-B135-45B1-8EFD-B83BC8F4CDC4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/97a7e1a6-0fb3-49e9-86fc-ebb1d426fcca/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/97a7e1a6-0fb3-49e9-86fc-ebb1d426fcca/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13621",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:39.743",
|
||||
"lastModified": "2025-05-20T20:15:35.743",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T13:06:41.540",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:data443:gdpr_framework:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.2.0",
|
||||
"matchCriteriaId": "2478250C-DA15-40C2-80BA-15935CAEF9EB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/5b48ecbb-c459-4c39-825d-61744d36f2fe/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/5b48ecbb-c459-4c39-825d-61744d36f2fe/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13727",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:39.827",
|
||||
"lastModified": "2025-05-20T20:15:35.927",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T13:05:39.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:memberspace:memberspace:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1.14",
|
||||
"matchCriteriaId": "1C230396-9778-49C3-9F5D-26DBBBCC3946"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/598d20f2-0f42-48f2-a941-0d6c5da5303e/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/598d20f2-0f42-48f2-a941-0d6c5da5303e/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13823",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:40.087",
|
||||
"lastModified": "2025-05-20T20:15:36.347",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T13:04:43.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yofla:360_product_rotation:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.5.8",
|
||||
"matchCriteriaId": "F6FBF1B1-7D29-47A5-9D9C-2A6F56D8FE99"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/dcfd8a03-0a04-4fd1-986d-1e816b1fad19/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/dcfd8a03-0a04-4fd1-986d-1e816b1fad19/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13828",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:40.167",
|
||||
"lastModified": "2025-05-20T20:15:36.503",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T13:02:39.683",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:danielpowney:badgearoo:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0.14",
|
||||
"matchCriteriaId": "40E0D1DF-5D2D-4B09-A5CB-5394DEA2E8F5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0f901807-9ef2-4cd3-969a-9fd23a8da371/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0f901807-9ef2-4cd3-969a-9fd23a8da371/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3062",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:53.747",
|
||||
"lastModified": "2025-05-19T15:15:22.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T13:57:42.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pdfcrowd:save_as_pdf:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.2.2",
|
||||
"matchCriteriaId": "AC5FA3FE-851E-4F21-8C7E-D9D24B51483E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/1526985d-2f8f-4b2a-97f3-633c51d024b8/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/1526985d-2f8f-4b2a-97f3-633c51d024b8/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-37262",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-07-22T09:15:06.623",
|
||||
"lastModified": "2024-11-21T09:23:29.650",
|
||||
"lastModified": "2025-06-10T12:45:23.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.4.3",
|
||||
"matchCriteriaId": "6D841E0E-5D9D-4B92-971B-553D8BA51178"
|
||||
"matchCriteriaId": "3F92F8DE-B8C4-4ACA-AC83-048EFD245485"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4004",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:54.300",
|
||||
"lastModified": "2025-05-16T16:15:28.143",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T13:42:33.290",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,10 +39,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bracketspace:advanced_cron_manager:*:*:*:*:-:wordpress:*:*",
|
||||
"versionEndExcluding": "2.5.7",
|
||||
"matchCriteriaId": "936A20FE-C8FA-4CA5-9AA9-A6904ABA9696"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/8e5e7040-b824-4af7-90a1-90801d12abb6/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5026",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:54.640",
|
||||
"lastModified": "2025-05-20T20:15:36.837",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T13:36:54.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cminds:cm_tooltip_glossary:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.3.4",
|
||||
"matchCriteriaId": "19DF65F6-64C7-4E7B-8F87-DC3567099F61"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a86584f6-119b-45c3-bc6e-dc18e3501db7/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a86584f6-119b-45c3-bc6e-dc18e3501db7/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5791",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-22T02:15:45.523",
|
||||
"lastModified": "2024-11-21T09:48:20.453",
|
||||
"lastModified": "2025-06-10T12:45:23.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.4.3",
|
||||
"matchCriteriaId": "6D841E0E-5D9D-4B92-971B-553D8BA51178"
|
||||
"matchCriteriaId": "3F92F8DE-B8C4-4ACA-AC83-048EFD245485"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-5859",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-21T09:15:09.657",
|
||||
"lastModified": "2024-11-21T09:48:29.377",
|
||||
"lastModified": "2025-06-10T12:45:23.150",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.2.3",
|
||||
"matchCriteriaId": "7026BCAB-2BBA-473C-8B89-3F2E8BCA3739"
|
||||
"matchCriteriaId": "1F76774B-9168-4EF6-B9BB-BA79541E0AF9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22122",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-16T15:16:06.363",
|
||||
"lastModified": "2025-04-17T20:22:16.240",
|
||||
"lastModified": "2025-06-10T12:15:23.090",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -17,6 +17,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0c60158ff14df04c92792dd9b1809372b095040f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/26064d3e2b4d9a14df1072980e558c636fb023ea",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-22123",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-04-16T15:16:06.450",
|
||||
"lastModified": "2025-04-17T20:22:16.240",
|
||||
"lastModified": "2025-06-10T12:15:23.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -24,6 +24,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/986c50f6bca109c6cf362b4e2babcb85aba958f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bf49527089ec1ba894c6e587affabbfb2329f52e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-29xx/CVE-2025-2918.json
Normal file
72
CVE-2025/CVE-2025-29xx/CVE-2025-2918.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-2918",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-06-10T12:15:23.867",
|
||||
"lastModified": "2025-06-10T12:15:23.867",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ultimate Blocks \u2013 WordPress Blocks Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 3.3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/tags/3.2.9/src/blocks/content-filter/block.php#L14",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/tags/3.2.9/src/blocks/content-toggle/block.php#L133",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/tags/3.2.9/src/blocks/how-to/block.php#L335",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/tags/3.2.9/src/blocks/tabbed-content/block.php#L136",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/41b2a4cc-fb23-41eb-b1a4-d793ae924d9a?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-31019",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-09T16:15:36.450",
|
||||
"lastModified": "2025-06-09T16:15:36.450",
|
||||
"lastModified": "2025-06-10T13:15:21.477",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in miniOrange Password Policy Manager allows Authentication Abuse. This issue affects Password Policy Manager: from n/a through 2.0.4."
|
||||
"value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in miniOrange Password Policy Manager password-policy-manager allows Authentication Abuse.This issue affects Password Policy Manager: from n/a through 2.0.4."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en miniOrange Password Policy Manager permite el abuso de autenticaci\u00f3n. Este problema afecta al Administrador de Pol\u00edticas de Contrase\u00f1as desde la versi\u00f3n n/d hasta la 2.0.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -38,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
33
CVE-2025/CVE-2025-436xx/CVE-2025-43697.json
Normal file
33
CVE-2025/CVE-2025-436xx/CVE-2025-43697.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-43697",
|
||||
"sourceIdentifier": "security@salesforce.com",
|
||||
"published": "2025-06-10T12:15:24.097",
|
||||
"lastModified": "2025-06-10T12:15:24.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (DataMapper) allows exposure of encrypted data.\nThis impacts OmniStudio: before Spring 2025"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@salesforce.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.salesforce.com/s/articleView?id=004980323&type=1",
|
||||
"source": "security@salesforce.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-436xx/CVE-2025-43698.json
Normal file
33
CVE-2025/CVE-2025-436xx/CVE-2025-43698.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-43698",
|
||||
"sourceIdentifier": "security@salesforce.com",
|
||||
"published": "2025-06-10T12:15:24.227",
|
||||
"lastModified": "2025-06-10T12:15:24.227",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field level security controls for Salesforce objects. \nThis impacts OmniStudio: before Spring 2025"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@salesforce.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.salesforce.com/s/articleView?id=004980323&type=1",
|
||||
"source": "security@salesforce.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-436xx/CVE-2025-43699.json
Normal file
33
CVE-2025/CVE-2025-436xx/CVE-2025-43699.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-43699",
|
||||
"sourceIdentifier": "security@salesforce.com",
|
||||
"published": "2025-06-10T12:15:24.357",
|
||||
"lastModified": "2025-06-10T12:15:24.357",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field level security controls for OmniUICard objects.\u00a0\n\nThis impacts OmniStudio: before Spring 2025"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@salesforce.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.salesforce.com/s/articleView?id=004980323&type=1",
|
||||
"source": "security@salesforce.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-437xx/CVE-2025-43700.json
Normal file
33
CVE-2025/CVE-2025-437xx/CVE-2025-43700.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-43700",
|
||||
"sourceIdentifier": "security@salesforce.com",
|
||||
"published": "2025-06-10T12:15:24.483",
|
||||
"lastModified": "2025-06-10T12:15:24.483",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of encrypted data.\u00a0\n\nThis impacts OmniStudio: before Spring 2025."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@salesforce.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.salesforce.com/s/articleView?id=004980323&type=1",
|
||||
"source": "security@salesforce.com"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-437xx/CVE-2025-43701.json
Normal file
33
CVE-2025/CVE-2025-437xx/CVE-2025-43701.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-43701",
|
||||
"sourceIdentifier": "security@salesforce.com",
|
||||
"published": "2025-06-10T12:15:24.607",
|
||||
"lastModified": "2025-06-10T12:15:24.607",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of Custom Settings data.\u00a0\n\nThis impacts OmniStudio: before version 254."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@salesforce.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://help.salesforce.com/s/articleView?id=004980323&type=1",
|
||||
"source": "security@salesforce.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-45xx/CVE-2025-4577.json
Normal file
64
CVE-2025/CVE-2025-45xx/CVE-2025-4577.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-4577",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-06-10T12:15:24.737",
|
||||
"lastModified": "2025-06-10T12:15:24.737",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Smash Balloon Social Post Feed \u2013 Simple Social Feeds for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the data-color attribute in all versions up to, and including, 4.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/custom-facebook-feed/tags/4.3.0/assets/js/cff-scripts.js#L245",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/custom-facebook-feed/tags/4.3.0/assets/js/cff-scripts.js#L254",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec3de7e2-4a29-401f-af2c-0ce78d768eae?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-47xx/CVE-2025-4774.json
Normal file
60
CVE-2025/CVE-2025-47xx/CVE-2025-4774.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-4774",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-06-10T12:15:24.917",
|
||||
"lastModified": "2025-06-10T12:15:24.917",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Premium Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the data-countdown attribute of Countdown widget in all versions up to, and including, 4.11.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/tags/4.11.6/assets/frontend/js/jquery-countdown.js#L97",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/024af9de-d4c7-43ec-a602-c45ded3ddad3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-494xx/CVE-2025-49454.json
Normal file
56
CVE-2025/CVE-2025-494xx/CVE-2025-49454.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49454",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-10T13:15:22.733",
|
||||
"lastModified": "2025-06-10T13:15:22.733",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in LoftOcean TinySalt allows PHP Local File Inclusion.This issue affects TinySalt: from n/a before 3.10.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-98"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/theme/tinysalt/vulnerability/wordpress-tinysalt-3-10-0-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-494xx/CVE-2025-49455.json
Normal file
56
CVE-2025/CVE-2025-494xx/CVE-2025-49455.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49455",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-10T13:15:23.107",
|
||||
"lastModified": "2025-06-10T13:15:23.107",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in LoftOcean TinySalt allows Object Injection.This issue affects TinySalt: from n/a before 3.10.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/theme/tinysalt/vulnerability/wordpress-tinysalt-3-10-0-php-object-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49507.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49507.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49507",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-10T13:15:23.283",
|
||||
"lastModified": "2025-06-10T13:15:23.283",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in LoftOcean CozyStay allows Object Injection.This issue affects CozyStay: from n/a before 1.7.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/theme/cozystay/vulnerability/wordpress-cozystay-1-7-1-php-object-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49509.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49509.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49509",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-10T13:15:23.427",
|
||||
"lastModified": "2025-06-10T13:15:23.427",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Roland Beaussant Audio Editor & Recorder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Audio Editor & Recorder: from n/a through 2.2.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/audio-editor-recorder/vulnerability/wordpress-audio-editor-recorder-plugin-2-2-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49510.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49510.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49510",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-10T13:15:23.583",
|
||||
"lastModified": "2025-06-10T13:15:23.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WPFactory Min Max Step Quantity Limits Manager for WooCommerce allows Cross Site Request Forgery.This issue affects Min Max Step Quantity Limits Manager for WooCommerce: from n/a through 5.1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/product-quantity-for-woocommerce/vulnerability/wordpress-min-max-step-quantity-limits-manager-for-woocommerce-plugin-5-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49511.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49511.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49511",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-10T13:15:23.747",
|
||||
"lastModified": "2025-06-10T13:15:23.747",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in uxper Civi Framework allows Cross Site Request Forgery.This issue affects Civi Framework: from n/a through 2.1.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/civi-framework/vulnerability/wordpress-civi-framework-plugin-2-1-6-cross-site-request-forgery-csrf-to-user-deactivation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-5912",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T04:15:49.300",
|
||||
"lastModified": "2025-06-10T04:15:49.300",
|
||||
"lastModified": "2025-06-10T13:15:24.117",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in D-Link DIR-632 FW103B08. It has been declared as critical. This vulnerability affects the function do_file of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en D-Link DIR-632 FW103B08. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n do_file del componente HTTP POST Request Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer en la pila. El ataque puede iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -66,7 +70,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -114,7 +118,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -151,6 +155,14 @@
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir632-dlink#poc",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-5913",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T04:15:54.063",
|
||||
"lastModified": "2025-06-10T04:15:54.063",
|
||||
"lastModified": "2025-06-10T13:15:24.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Vehicle Record Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/search-vehicle.php. The manipulation of the argument searchinputdata leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en PHPGurukul Vehicle Record Management System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /admin/search-vehicle.php. La manipulaci\u00f3n del argumento searchinputdata provoca una inyecci\u00f3n SQL. El ataque puede iniciarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592310",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kakalalaww/CVE/issues/3",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-5934",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-10T04:15:55.327",
|
||||
"lastModified": "2025-06-10T04:15:55.327",
|
||||
"lastModified": "2025-06-10T13:15:24.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Netgear EX3700 up to 1.0.0.88. It has been classified as critical. Affected is the function sub_41619C of the file /mtd. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.0.98 is able to address this issue. It is recommended to upgrade the affected component. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se detect\u00f3 una vulnerabilidad en Netgear EX3700 hasta la versi\u00f3n 1.0.0.88. Se ha clasificado como cr\u00edtica. La funci\u00f3n sub_41619C del archivo /mtd est\u00e1 afectada. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer en la pila. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 1.0.0.98 puede solucionar este problema. Se recomienda actualizar el componente afectado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -66,7 +70,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -114,7 +118,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -151,6 +155,14 @@
|
||||
{
|
||||
"url": "https://www.netgear.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex3700-netgear",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex3700-netgear#poc",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
73
README.md
73
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-10T12:00:22.759068+00:00
|
||||
2025-06-10T14:00:19.863824+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-10T11:56:01.460000+00:00
|
||||
2025-06-10T13:57:42.330000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,43 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
297255
|
||||
297269
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `14`
|
||||
|
||||
- [CVE-2024-13089](CVE-2024/CVE-2024-130xx/CVE-2024-13089.json) (`2025-06-10T11:15:52.113`)
|
||||
- [CVE-2024-13090](CVE-2024/CVE-2024-130xx/CVE-2024-13090.json) (`2025-06-10T11:15:52.477`)
|
||||
- [CVE-2025-40654](CVE-2025/CVE-2025-406xx/CVE-2025-40654.json) (`2025-06-10T10:15:26.990`)
|
||||
- [CVE-2025-40655](CVE-2025/CVE-2025-406xx/CVE-2025-40655.json) (`2025-06-10T10:15:27.620`)
|
||||
- [CVE-2025-40656](CVE-2025/CVE-2025-406xx/CVE-2025-40656.json) (`2025-06-10T10:15:27.843`)
|
||||
- [CVE-2025-40657](CVE-2025/CVE-2025-406xx/CVE-2025-40657.json) (`2025-06-10T10:15:28.043`)
|
||||
- [CVE-2025-40658](CVE-2025/CVE-2025-406xx/CVE-2025-40658.json) (`2025-06-10T10:15:28.237`)
|
||||
- [CVE-2025-40659](CVE-2025/CVE-2025-406xx/CVE-2025-40659.json) (`2025-06-10T10:15:28.430`)
|
||||
- [CVE-2025-40660](CVE-2025/CVE-2025-406xx/CVE-2025-40660.json) (`2025-06-10T10:15:28.627`)
|
||||
- [CVE-2025-40661](CVE-2025/CVE-2025-406xx/CVE-2025-40661.json) (`2025-06-10T10:15:28.827`)
|
||||
- [CVE-2025-40662](CVE-2025/CVE-2025-406xx/CVE-2025-40662.json) (`2025-06-10T10:15:29.103`)
|
||||
- [CVE-2025-41657](CVE-2025/CVE-2025-416xx/CVE-2025-41657.json) (`2025-06-10T11:15:53.150`)
|
||||
- [CVE-2025-2918](CVE-2025/CVE-2025-29xx/CVE-2025-2918.json) (`2025-06-10T12:15:23.867`)
|
||||
- [CVE-2025-43697](CVE-2025/CVE-2025-436xx/CVE-2025-43697.json) (`2025-06-10T12:15:24.097`)
|
||||
- [CVE-2025-43698](CVE-2025/CVE-2025-436xx/CVE-2025-43698.json) (`2025-06-10T12:15:24.227`)
|
||||
- [CVE-2025-43699](CVE-2025/CVE-2025-436xx/CVE-2025-43699.json) (`2025-06-10T12:15:24.357`)
|
||||
- [CVE-2025-43700](CVE-2025/CVE-2025-437xx/CVE-2025-43700.json) (`2025-06-10T12:15:24.483`)
|
||||
- [CVE-2025-43701](CVE-2025/CVE-2025-437xx/CVE-2025-43701.json) (`2025-06-10T12:15:24.607`)
|
||||
- [CVE-2025-4577](CVE-2025/CVE-2025-45xx/CVE-2025-4577.json) (`2025-06-10T12:15:24.737`)
|
||||
- [CVE-2025-4774](CVE-2025/CVE-2025-47xx/CVE-2025-4774.json) (`2025-06-10T12:15:24.917`)
|
||||
- [CVE-2025-49454](CVE-2025/CVE-2025-494xx/CVE-2025-49454.json) (`2025-06-10T13:15:22.733`)
|
||||
- [CVE-2025-49455](CVE-2025/CVE-2025-494xx/CVE-2025-49455.json) (`2025-06-10T13:15:23.107`)
|
||||
- [CVE-2025-49507](CVE-2025/CVE-2025-495xx/CVE-2025-49507.json) (`2025-06-10T13:15:23.283`)
|
||||
- [CVE-2025-49509](CVE-2025/CVE-2025-495xx/CVE-2025-49509.json) (`2025-06-10T13:15:23.427`)
|
||||
- [CVE-2025-49510](CVE-2025/CVE-2025-495xx/CVE-2025-49510.json) (`2025-06-10T13:15:23.583`)
|
||||
- [CVE-2025-49511](CVE-2025/CVE-2025-495xx/CVE-2025-49511.json) (`2025-06-10T13:15:23.747`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `12`
|
||||
Recently modified CVEs: `30`
|
||||
|
||||
- [CVE-2022-4653](CVE-2022/CVE-2022-46xx/CVE-2022-4653.json) (`2025-06-10T11:44:28.910`)
|
||||
- [CVE-2023-0378](CVE-2023/CVE-2023-03xx/CVE-2023-0378.json) (`2025-06-10T11:44:28.910`)
|
||||
- [CVE-2023-22707](CVE-2023/CVE-2023-227xx/CVE-2023-22707.json) (`2025-06-10T11:44:28.910`)
|
||||
- [CVE-2023-3345](CVE-2023/CVE-2023-33xx/CVE-2023-3345.json) (`2025-06-10T11:56:01.460`)
|
||||
- [CVE-2023-6636](CVE-2023/CVE-2023-66xx/CVE-2023-6636.json) (`2025-06-10T11:44:28.910`)
|
||||
- [CVE-2024-12397](CVE-2024/CVE-2024-123xx/CVE-2024-12397.json) (`2025-06-10T11:15:21.283`)
|
||||
- [CVE-2024-12743](CVE-2024/CVE-2024-127xx/CVE-2024-12743.json) (`2025-06-10T11:53:54.447`)
|
||||
- [CVE-2024-12767](CVE-2024/CVE-2024-127xx/CVE-2024-12767.json) (`2025-06-10T11:53:16.670`)
|
||||
- [CVE-2024-13916](CVE-2024/CVE-2024-139xx/CVE-2024-13916.json) (`2025-06-10T10:15:21.443`)
|
||||
- [CVE-2024-13917](CVE-2024/CVE-2024-139xx/CVE-2024-13917.json) (`2025-06-10T10:15:26.553`)
|
||||
- [CVE-2024-44005](CVE-2024/CVE-2024-440xx/CVE-2024-44005.json) (`2025-06-10T11:44:28.910`)
|
||||
- [CVE-2025-2703](CVE-2025/CVE-2025-27xx/CVE-2025-2703.json) (`2025-06-10T11:15:52.680`)
|
||||
- [CVE-2024-12770](CVE-2024/CVE-2024-127xx/CVE-2024-12770.json) (`2025-06-10T12:55:45.537`)
|
||||
- [CVE-2024-12800](CVE-2024/CVE-2024-128xx/CVE-2024-12800.json) (`2025-06-10T12:52:18.020`)
|
||||
- [CVE-2024-12808](CVE-2024/CVE-2024-128xx/CVE-2024-12808.json) (`2025-06-10T12:29:25.237`)
|
||||
- [CVE-2024-12812](CVE-2024/CVE-2024-128xx/CVE-2024-12812.json) (`2025-06-10T12:22:08.690`)
|
||||
- [CVE-2024-13313](CVE-2024/CVE-2024-133xx/CVE-2024-13313.json) (`2025-06-10T12:01:55.290`)
|
||||
- [CVE-2024-13357](CVE-2024/CVE-2024-133xx/CVE-2024-13357.json) (`2025-06-10T13:31:40.840`)
|
||||
- [CVE-2024-13383](CVE-2024/CVE-2024-133xx/CVE-2024-13383.json) (`2025-06-10T13:11:27.890`)
|
||||
- [CVE-2024-13616](CVE-2024/CVE-2024-136xx/CVE-2024-13616.json) (`2025-06-10T13:10:20.170`)
|
||||
- [CVE-2024-13619](CVE-2024/CVE-2024-136xx/CVE-2024-13619.json) (`2025-06-10T13:08:49.897`)
|
||||
- [CVE-2024-13621](CVE-2024/CVE-2024-136xx/CVE-2024-13621.json) (`2025-06-10T13:06:41.540`)
|
||||
- [CVE-2024-13727](CVE-2024/CVE-2024-137xx/CVE-2024-13727.json) (`2025-06-10T13:05:39.307`)
|
||||
- [CVE-2024-13823](CVE-2024/CVE-2024-138xx/CVE-2024-13823.json) (`2025-06-10T13:04:43.860`)
|
||||
- [CVE-2024-13828](CVE-2024/CVE-2024-138xx/CVE-2024-13828.json) (`2025-06-10T13:02:39.683`)
|
||||
- [CVE-2024-3062](CVE-2024/CVE-2024-30xx/CVE-2024-3062.json) (`2025-06-10T13:57:42.330`)
|
||||
- [CVE-2024-37262](CVE-2024/CVE-2024-372xx/CVE-2024-37262.json) (`2025-06-10T12:45:23.150`)
|
||||
- [CVE-2024-4004](CVE-2024/CVE-2024-40xx/CVE-2024-4004.json) (`2025-06-10T13:42:33.290`)
|
||||
- [CVE-2024-5026](CVE-2024/CVE-2024-50xx/CVE-2024-5026.json) (`2025-06-10T13:36:54.840`)
|
||||
- [CVE-2024-5791](CVE-2024/CVE-2024-57xx/CVE-2024-5791.json) (`2025-06-10T12:45:23.150`)
|
||||
- [CVE-2024-5859](CVE-2024/CVE-2024-58xx/CVE-2024-5859.json) (`2025-06-10T12:45:23.150`)
|
||||
- [CVE-2025-22122](CVE-2025/CVE-2025-221xx/CVE-2025-22122.json) (`2025-06-10T12:15:23.090`)
|
||||
- [CVE-2025-22123](CVE-2025/CVE-2025-221xx/CVE-2025-22123.json) (`2025-06-10T12:15:23.750`)
|
||||
- [CVE-2025-31019](CVE-2025/CVE-2025-310xx/CVE-2025-31019.json) (`2025-06-10T13:15:21.477`)
|
||||
- [CVE-2025-5912](CVE-2025/CVE-2025-59xx/CVE-2025-5912.json) (`2025-06-10T13:15:24.117`)
|
||||
- [CVE-2025-5913](CVE-2025/CVE-2025-59xx/CVE-2025-5913.json) (`2025-06-10T13:15:24.380`)
|
||||
- [CVE-2025-5934](CVE-2025/CVE-2025-59xx/CVE-2025-5934.json) (`2025-06-10T13:15:24.570`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
122
_state.csv
122
_state.csv
@ -211563,7 +211563,7 @@ CVE-2022-46505,0,0,556f68f80f426556fa441caaf3ece3247d1f844d1ca10adaa553eb4ec2d51
|
||||
CVE-2022-4651,0,0,e7cf4a70afca20f66b5af34080804c6864be6d29e3a2f96826c8a4a51fcc2990,2025-03-27T16:15:17.703000
|
||||
CVE-2022-4652,0,0,1095194f9f154259f49411f7dbb93d1a6c03863c10e1a5c3e3727f220f6e9465,2025-02-27T21:15:16.310000
|
||||
CVE-2022-46527,0,0,d02de0aae02127d126346be665f04f296ca7c58b711b92b26e017819accbd88f,2024-11-21T07:30:40.330000
|
||||
CVE-2022-4653,0,1,fdf82423452f9f1fb82a2b67a45692e54bb1a5e54d616807d8d22fd37f4fe533,2025-06-10T11:44:28.910000
|
||||
CVE-2022-4653,0,0,fdf82423452f9f1fb82a2b67a45692e54bb1a5e54d616807d8d22fd37f4fe533,2025-06-10T11:44:28.910000
|
||||
CVE-2022-46530,0,0,af2bb5ee46d936d244c92c467e760d00274999c52ba2494e2e4cdcdcdf8c1946,2025-04-16T18:15:59.500000
|
||||
CVE-2022-46531,0,0,2ac78f73b3153ff5c8e9907f04f29148da22e1ff69025d5820fd91be844de458,2025-04-16T16:15:25.327000
|
||||
CVE-2022-46532,0,0,432e2fb1ac9231e3900f9510862b24af15ae515bd54591843ed70bfaf195023c,2025-04-16T16:15:25.507000
|
||||
@ -214767,7 +214767,7 @@ CVE-2023-0374,0,0,ae4f5db6eb936a3b818c45a588550c93b15d5a51af99d7e2373040cf12eb9f
|
||||
CVE-2023-0375,0,0,8948a3962bbed5c7e344609d7d5077346684df9a4b1ebdbb684540f03777e60c,2025-03-12T21:15:40.340000
|
||||
CVE-2023-0376,0,0,a9f6de5e0668ec86ac889cde4b7f40c1edd842c95af7ba6f28a9a7a5f9cf4a27,2025-06-02T15:15:21.640000
|
||||
CVE-2023-0377,0,0,9985f7addb4b6395ecb8f44f70b75d5f0a14376de7e9bfa2d4adc8dd24e4447a,2024-11-21T07:37:04.600000
|
||||
CVE-2023-0378,0,1,7dc9c8b5c6c13deeff5b72af52f9f6595c5c49fc084d53f7ddaadbb20c2bfd1d,2025-06-10T11:44:28.910000
|
||||
CVE-2023-0378,0,0,7dc9c8b5c6c13deeff5b72af52f9f6595c5c49fc084d53f7ddaadbb20c2bfd1d,2025-06-10T11:44:28.910000
|
||||
CVE-2023-0379,0,0,45a21024b71eac3a3ff03943f6ddf52c72280bcd61f1cdeff5ae8ab462791d33,2025-03-21T15:15:39.677000
|
||||
CVE-2023-0380,0,0,e199a00c1e1579f86574b186fac08be1b5ee641379e96e857389051cc7026e5d,2025-03-14T19:15:40.897000
|
||||
CVE-2023-0381,0,0,fb963192539a86802660cecf1f4984bcbc8442d3688b92930e1e773c336353cb,2025-03-18T15:15:42.723000
|
||||
@ -218726,7 +218726,7 @@ CVE-2023-22703,0,0,b11cbe66777334b92d49ab1285216c2daf10bc1ade9e60e348ec608d69ec7
|
||||
CVE-2023-22704,0,0,3391b5e9fe8cfdb113a4335180cf222b3480dc9186971ddf99b9d7c23f514db4,2024-11-21T07:45:15.363000
|
||||
CVE-2023-22705,0,0,af778e225555747df5c233219acb78451206239cdbd1890f1bc52e0b4eff1577,2025-02-20T18:34:50.990000
|
||||
CVE-2023-22706,0,0,ebe261333ec94aa8d06d2c8f8fa51152653338e9e5613bd8d3569a6f53cb90e2,2024-11-21T07:45:15.623000
|
||||
CVE-2023-22707,0,1,0bb7c425aded4142ebbe2c9be8b3883425d1ae75e2be1d4c2d9e6d8ce6aee24b,2025-06-10T11:44:28.910000
|
||||
CVE-2023-22707,0,0,0bb7c425aded4142ebbe2c9be8b3883425d1ae75e2be1d4c2d9e6d8ce6aee24b,2025-06-10T11:44:28.910000
|
||||
CVE-2023-22708,0,0,0bda0fb09283863451e953094b448349ab539148689b6d150d6367fafec54d48,2024-12-09T13:15:20.260000
|
||||
CVE-2023-22709,0,0,b97092a949b7838108594a0e4a6775ddf43d90533b1340d5130b127236ed7e78,2024-11-21T07:45:15.890000
|
||||
CVE-2023-2271,0,0,82a1b193d56a689b6f14541ed8547a7aebaefaa1fa98350a6f5d11be1c01604a,2024-11-21T07:58:17.063000
|
||||
@ -218969,10 +218969,10 @@ CVE-2023-22972,0,0,f05d147ac8f549c33bf31d335750bdd6abea73c5816d27056d8bd89f0a743
|
||||
CVE-2023-22973,0,0,bccd4224a2674dd63e0124de23cc4e87a3108e0d057eac9cd1e127622ac2de6c,2024-11-21T07:45:44.790000
|
||||
CVE-2023-22974,0,0,85415b262be91cde3a112e04d995d9163e65d13b859bc6dfd72ba4fee38ce393,2024-11-21T07:45:44.937000
|
||||
CVE-2023-22975,0,0,eb8873b34352e4a3cc09ef54ad0d7ccdd681ae65fd1d5bde5e48e17ea477cee6,2024-11-21T07:45:45.080000
|
||||
CVE-2023-2298,0,0,989f644c1451c5a67e467bb23faffc2f4e6cbf5ba286ec24661d092839141574,2024-11-21T07:58:20.190000
|
||||
CVE-2023-2298,0,1,6b28b31419f1834cd068f4fc950be7991937e24c71506065f925cd0461af5a59,2025-06-10T12:45:23.150000
|
||||
CVE-2023-22984,0,0,5871116efec6ac4d9f92dbbbffd11ed2b4439b834a7278dcd05b96a53714146d,2024-11-21T07:45:45.220000
|
||||
CVE-2023-22985,0,0,3e31e1cbf1f1de5ce6cf3c2e1d6a0477b87802898892cf6b79b06c2051f07d7a,2025-02-13T21:15:12.317000
|
||||
CVE-2023-2299,0,0,824be6896313aecbc62521262d1f5fc045b92285be3005bb7b42b30619bee831,2024-11-21T07:58:20.323000
|
||||
CVE-2023-2299,0,1,dd788c2e66752404ea540e37b83a284a125ff3de5f00dcbe8f646ade59be6e39,2025-06-10T12:45:23.150000
|
||||
CVE-2023-22995,0,0,cf55f9c688d8b67971320ae996f28074061285e48a808803fa692301cea77089,2025-05-05T16:15:29.947000
|
||||
CVE-2023-22996,0,0,e25b38188607ad82adeaa3e5fc2927767f1b99c04c678932009b45c69faac575,2025-03-20T20:15:28.137000
|
||||
CVE-2023-22997,0,0,176dbba2a3eee885cb5145bce397d689cea3e2f666028a506b2a5274252c23b0,2025-03-20T20:15:28.333000
|
||||
@ -219876,7 +219876,7 @@ CVE-2023-24146,0,0,f408e8268f417d8f723a52d9ab25e857eaeacbce1b75fc7921ff0db95b4e3
|
||||
CVE-2023-24147,0,0,b92c8e9f3d88cd77b31f782f5baca627927919928373f5a4e85846846fb72538,2025-03-26T19:15:25.273000
|
||||
CVE-2023-24148,0,0,674fcc1ba994dcc53f4b1b2739b50f2a07dd6c1a6a960c9b2ad892fe2760138b,2025-03-26T15:15:46.813000
|
||||
CVE-2023-24149,0,0,66a85b28be069e7a828e596d9ee9e4eeb5c531dd78d2e0ad02bb4912ec7fa8ad,2025-03-26T16:15:17.513000
|
||||
CVE-2023-2415,0,0,9158d528c422e52dc579bb111359d9138c64face63f6ce0130f26f3114b23994,2024-11-21T07:58:34.373000
|
||||
CVE-2023-2415,0,1,39e81d39ac9a12ff81ce75656edd1c99433224cdb5f01c711c70a59e1d3c0a96,2025-06-10T12:45:23.150000
|
||||
CVE-2023-24150,0,0,1978898d6cf410b25d039428bb9737f50542bd2686ecbc60274b16a854707519,2025-03-26T16:15:17.793000
|
||||
CVE-2023-24151,0,0,46a02063b1cc678e5b41e6a9210a4878d97df355a6783b6ce7880e871dab2c99,2025-03-26T16:15:18.033000
|
||||
CVE-2023-24152,0,0,0b774f6418b33460f6bdefed5229af905060e1d2ef5ecff57c55e910dab13da3,2025-03-26T16:15:18.273000
|
||||
@ -219886,7 +219886,7 @@ CVE-2023-24155,0,0,64de41923a85e49241b8a1b4174c0b66f36a9b352d7968e7119bce55e950b
|
||||
CVE-2023-24156,0,0,fbfbacd0d95c7c78fe2944649f4e3da8ffd28603a028d8536389a6fc85d8bb5f,2025-03-26T15:15:47.047000
|
||||
CVE-2023-24157,0,0,603fbe9137c0740f9081f35b76cad146834fc9872cfe2eed2412a269598f9a06,2025-03-26T15:15:47.267000
|
||||
CVE-2023-24159,0,0,7760eaf985df74413d84fd1de8669f9eb5b9e5befb0b84de1f1b3892c8d7d513,2025-03-20T18:15:16.760000
|
||||
CVE-2023-2416,0,0,acdf5b4886c4297fef66ae568a61d37a4ec99430d66c160077e079aaabd2a5d8,2024-11-21T07:58:34.510000
|
||||
CVE-2023-2416,0,1,4a826227b459f9bc810291cd15e046c67fc13bdba7efb6a803291c2f901761a2,2025-06-10T12:45:23.150000
|
||||
CVE-2023-24160,0,0,65cc2c933fa4f55a423a0b03c6f5849c561d8a239b685c27ac6c141c47ef1803,2025-03-20T21:15:18.357000
|
||||
CVE-2023-24161,0,0,19907029bb78340b5658af7b04f0eca42537863c710b03f7f44f2a555d9f52e0,2025-03-20T21:15:18.530000
|
||||
CVE-2023-24162,0,0,11863c535687637ee2dbdfe25ccb72b7486dd57b5d0f5f801e123d162a733798,2025-03-27T15:15:45.360000
|
||||
@ -227388,7 +227388,7 @@ CVE-2023-33439,0,0,f3af0a0427500f94c6b3b138f4e3fa36fb9bfc88f5c6b1efc27138be8bba0
|
||||
CVE-2023-3344,0,0,be98701b195b53def24896f087665cc45329af9abedde7087f97191910e5fedc,2025-05-05T16:15:45.150000
|
||||
CVE-2023-33440,0,0,6eb23ef764cdc1e6f8c91c5365c2450f157a6eae9d074cfe3f802aeee1be7620,2025-01-14T21:15:08.377000
|
||||
CVE-2023-33443,0,0,6c4ad59b45035b5c88ac135965bacacb2dedc93413c60d04ce25fba05f45224c,2025-01-06T21:15:10.830000
|
||||
CVE-2023-3345,0,1,e53d94e79d9c9c1cb78413356db8a04c067360ae09c43cc3b085129675d26070,2025-06-10T11:56:01.460000
|
||||
CVE-2023-3345,0,0,e53d94e79d9c9c1cb78413356db8a04c067360ae09c43cc3b085129675d26070,2025-06-10T11:56:01.460000
|
||||
CVE-2023-33457,0,0,7eee79e2e603000fdc9c79d0c7f54a28226aded759ba1bc0cbce35446680feba,2025-01-08T16:15:29.587000
|
||||
CVE-2023-3346,0,0,09f68a6670d4a69cff8e11fa4ad9eea39d73cc8d7fe0a2dacd2a911bbd61aee1,2024-11-21T08:17:04.037000
|
||||
CVE-2023-33460,0,0,6e418258c1a2b91b79efff9c4f69791d5894d1876ad79ba0f82b40a9644edd3e,2025-01-08T17:15:12.020000
|
||||
@ -232387,7 +232387,7 @@ CVE-2023-39989,0,0,726f571ee9bcf5dc47f2c24a51abc27b099f3763e764b9376d48d987eb909
|
||||
CVE-2023-3999,0,0,e82adc70575076927945c28ec9abdcb884177ca58c4faef374d14bbf4ef780e1,2024-11-21T08:18:29.967000
|
||||
CVE-2023-39990,0,0,3d24dc67301ab8a4ce38cf028e16fae81661c2b569698bc948f7c9813a3501e7,2025-01-24T16:08:44.243000
|
||||
CVE-2023-39991,0,0,74a383be9c4ebbeb72cb131d996b41f84dd1c8560e8c672b2e4694a32709fa2f,2024-11-21T08:16:11.923000
|
||||
CVE-2023-39992,0,0,7ee9edbf56e39b17fe5662eaa21a6513fdaf7509e9723465071698fc41ff63a9,2024-11-21T08:16:12.073000
|
||||
CVE-2023-39992,0,1,629414a3127aa07d4c3f92dd6eb3b676e6c2a4c2575c5601eba846302ed3da11,2025-06-10T12:45:23.150000
|
||||
CVE-2023-39993,0,0,62534729c9f89409d47994443940c98799306b492c23b2930a522cb2cdd76001,2025-04-09T15:53:24.323000
|
||||
CVE-2023-39994,0,0,87a029e29660aeb8f1b2be7e27e623b955ac0289fc3112ecce957361865e016e,2025-01-02T15:15:19.093000
|
||||
CVE-2023-39995,0,0,fdf718e8170352e73d81bc89750099463548f40b6d848c31e93139491cdf59de,2024-12-13T15:15:20.463000
|
||||
@ -243531,7 +243531,7 @@ CVE-2023-6632,0,0,b1c54670c8f8c580830f651c478abdde4fbaf49444ee1158170f1e733bd098
|
||||
CVE-2023-6633,0,0,8de7c9ebad96e1b1e63f7ee0917437d9c45b07d67508fbd0e4ab2d9fea33ad99,2024-11-21T08:44:15.430000
|
||||
CVE-2023-6634,0,0,4af0f8971e0f53e2ae5ef41811e9e37b2a73aed3245e588807fa0f78f7b0d874,2025-06-03T14:15:38.520000
|
||||
CVE-2023-6635,0,0,b930d159660c5d2dffbcce188a715975fef9441e89d59344c487a6ad08f8bfaa,2025-05-15T20:15:29.143000
|
||||
CVE-2023-6636,0,1,0f338d074e17636e80ea5e1670bcee09c12c45a9dacacebb343d78dfc70dbbc9,2025-06-10T11:44:28.910000
|
||||
CVE-2023-6636,0,0,0f338d074e17636e80ea5e1670bcee09c12c45a9dacacebb343d78dfc70dbbc9,2025-06-10T11:44:28.910000
|
||||
CVE-2023-6637,0,0,7c52b1639bf05012c19eced66616ae6b856e66a997b8457370ac22577ad50c58,2025-06-03T14:15:38.693000
|
||||
CVE-2023-6638,0,0,8202a3e7efa91557985af40a6a0d3f94586e929450e1bc51f40a6c7f47210d9b,2025-06-03T14:15:39.293000
|
||||
CVE-2023-6640,0,0,4c1de3385a32f286c0b75b0b253dae7e11e4d89cf203bb099ad3f58f6c385c6a,2025-02-12T16:52:28.897000
|
||||
@ -247531,7 +247531,7 @@ CVE-2024-12392,0,0,a8156bd94e9672d4635a84a6a0bddbfa7b852dc1cc5b768dabdbd22341a78
|
||||
CVE-2024-12393,0,0,0bb58765d8feb8f28285c647b089ee899cbf94b23d666e28361039e2bb2522cf,2025-06-02T16:21:01.907000
|
||||
CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000
|
||||
CVE-2024-12395,0,0,75ff5ef98722c35fb11d383db877ddbb73a300c7cb334e918191d763e24090f0,2024-12-17T12:15:20.377000
|
||||
CVE-2024-12397,0,1,0f39153bc1d1ac0d13fae9e507b21fa619e36a6fa865060fa716d3d92d7c36e3,2025-06-10T11:15:21.283000
|
||||
CVE-2024-12397,0,0,0f39153bc1d1ac0d13fae9e507b21fa619e36a6fa865060fa716d3d92d7c36e3,2025-06-10T11:15:21.283000
|
||||
CVE-2024-12398,0,0,3ddf453ac35312a996d38b789ad3b4ef0601d638e0d2eee33b4135d2d780af47,2025-01-21T21:12:02.310000
|
||||
CVE-2024-12399,0,0,52bff9c41a163f77665f2da9fc0a8dd83c998cfb340cf3f1d77c6844e18524bb,2025-01-17T10:15:06.697000
|
||||
CVE-2024-1240,0,0,28733ede53b96385ee0de4a7c5187b3db0d925b1e4ab6e977522dc277dee75de,2024-11-19T19:04:53.913000
|
||||
@ -247880,7 +247880,7 @@ CVE-2024-1274,0,0,f1db1f9b98565ee12acd91ee04a48a5ea9d9022420902832299251e567dee9
|
||||
CVE-2024-12740,0,0,e6c4d03a8c2935c7f946e2ddf8fb2efb52eeb4b7b990af277f1511faff48b8c0,2025-01-27T18:15:36.743000
|
||||
CVE-2024-12741,0,0,8d4c06d6204bde3983a442ab297408366d3d8d84bd77eb948d96a8745c52828f,2024-12-18T20:15:22.390000
|
||||
CVE-2024-12742,0,0,d58ef6138e359837d0633f7d853b532ab5b996d40e60c1b8567bd5b194ec44e0,2025-03-06T17:15:17.740000
|
||||
CVE-2024-12743,0,1,d47e3f3c79c8d0a3041386d9c423398edff04065d61dbea54e5f1c9b09640b4b,2025-06-10T11:53:54.447000
|
||||
CVE-2024-12743,0,0,d47e3f3c79c8d0a3041386d9c423398edff04065d61dbea54e5f1c9b09640b4b,2025-06-10T11:53:54.447000
|
||||
CVE-2024-12744,0,0,d9bcd7b60c79640d4995955dca329cb96a3574a3f475005b85edf507783c7d57,2024-12-26T15:15:06.290000
|
||||
CVE-2024-12745,0,0,56f1c84b33bef267b3eb5e88e8c9c1273071ba9706fba6301263255413a17152,2024-12-26T15:15:06.527000
|
||||
CVE-2024-12746,0,0,3dc399827dbe6da7d4657aa1f300fc1452e75823ea53e19ad5a88d067d48a8c0,2024-12-26T15:15:06.650000
|
||||
@ -247903,11 +247903,11 @@ CVE-2024-12763,0,0,828b2bb544f2e61dd11f51daf4dde3c9326c6a38ab958bf084c901608bda1
|
||||
CVE-2024-12764,0,0,520ef7a415b759131cb40460656f8f00fedd52ee179d3018b43ad66d1c2ea33c,2025-02-11T02:15:33.817000
|
||||
CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f13711c,2025-02-11T02:15:33.873000
|
||||
CVE-2024-12766,0,0,9649c1c42978a503b019c31f940763a525ea514d4d13ceba23be095167719680,2025-03-20T14:15:18.387000
|
||||
CVE-2024-12767,0,1,6593b5f975dfd5395109e7e47c23143559826c2e726fd8f4f452ca566e9cbeac,2025-06-10T11:53:16.670000
|
||||
CVE-2024-12767,0,0,6593b5f975dfd5395109e7e47c23143559826c2e726fd8f4f452ca566e9cbeac,2025-06-10T11:53:16.670000
|
||||
CVE-2024-12768,0,0,cbf9ff20e80bb09942852fa2e956342eb17e9d4f27cf212ff4c0d8344126a292,2025-05-12T01:04:06.597000
|
||||
CVE-2024-12769,0,0,55524fcacc88be74a2aaad2cb01ce12a99e5536d12743064ed3841d6d460e936,2025-04-29T17:54:19.490000
|
||||
CVE-2024-1277,0,0,2a6d3c94fab76f050717b5ee760be8ca9b7ac565da514f487f74b0cc7aeb5545,2025-03-04T12:34:06.490000
|
||||
CVE-2024-12770,0,0,bc2ca1ddd4c6e3cea3bfd4ab8a88057f1e0625786fdea1f52ba0b35a35c11266,2025-05-20T20:15:32.887000
|
||||
CVE-2024-12770,0,1,7c294a16dec2ca96b0f943d13b7ba253be9231034f57bc16710f1103bc10f749,2025-06-10T12:55:45.537000
|
||||
CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000
|
||||
CVE-2024-12772,0,0,70f859d44122fb4ca5be07280e50277d8d4fcf200f73d5f17311f294bd9e06f4,2025-03-28T18:08:42.730000
|
||||
CVE-2024-12773,0,0,e4c359204f9fafa24c82030ab3b6680e9aaf23ac06487063dcc758fca506c446,2025-05-07T18:54:52.500000
|
||||
@ -247936,18 +247936,18 @@ CVE-2024-12794,0,0,6bb67958621fa403e9f361b5ad08b405e435c9a95ea0caa583a82467bdddc
|
||||
CVE-2024-12797,0,0,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000
|
||||
CVE-2024-12798,0,0,488a2c4e7527f89aadf88a0b958da900c0b1ca920e367bf77296a8bbc1acc4e9,2025-01-03T14:15:24.370000
|
||||
CVE-2024-12799,0,0,2976aea12fe9362d7bb71c750c2a0ebe37adb6e63168167418978285d30443c8,2025-03-05T15:15:13.127000
|
||||
CVE-2024-12800,0,0,88e7db987d05c7176b6f24501d50381df8d7ca9258841ca92fab83ec0ae42ff3,2025-05-20T20:15:33.027000
|
||||
CVE-2024-12800,0,1,52d7321dba0b059fffc06c0f8e721123c42614e9b957c99f62ba4166549289d9,2025-06-10T12:52:18.020000
|
||||
CVE-2024-12801,0,0,8847bb4162cad8847e95f5d549749935a98cd5eaeb3583ac43cc5f1acc6c369c,2025-01-03T14:15:24.500000
|
||||
CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000
|
||||
CVE-2024-12803,0,0,fa686f442d34c33906cbd5c392b50db73035372cd413cc4367e49ae08edbe6b6,2025-01-17T03:15:06.973000
|
||||
CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5dd3c,2025-01-17T03:15:07.167000
|
||||
CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000
|
||||
CVE-2024-12807,0,0,38bfdc769ff100a4db3a7e03118441bc3ec526327716b0b998fa92bc88a5e26b,2025-05-11T23:32:35.923000
|
||||
CVE-2024-12808,0,0,487fa0843071b105b1edb7fdf90bedaefb0bd871e31471f7b9274f1d7e7327a6,2025-05-20T20:15:33.160000
|
||||
CVE-2024-12808,0,1,c2bbaa9c21df8f37ad99655da6b944046c7039fd80bd61ad996f98d1a65117a0,2025-06-10T12:29:25.237000
|
||||
CVE-2024-12809,0,0,612259b2cda97c5061140929bc611da24ff06e8922b144348f21ead0b174d40b,2025-03-07T07:15:21.380000
|
||||
CVE-2024-12810,0,0,bc7dd94c64fdb6b3a597ed11abbe18e14edfa7b16233c983106a27c836dd0fee,2025-03-27T01:33:31.260000
|
||||
CVE-2024-12811,0,0,cbebe7e51738cd8bd29e461cde6a0001affb6783b830fde9fb7108c4a80fc1a2,2025-02-28T00:15:35.790000
|
||||
CVE-2024-12812,0,0,f76d179d97d3d8be0e3c3e45a0e8f164d6f1d9f7e27030b771c65b7efaeb497b,2025-05-20T20:15:33.297000
|
||||
CVE-2024-12812,0,1,daecb938e4f98947476ce265ac5bb33ddb666a154961b8642c0962448cd915cb,2025-06-10T12:22:08.690000
|
||||
CVE-2024-12813,0,0,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000
|
||||
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
|
||||
CVE-2024-12815,0,0,98810fcf8648fec64bca31a85741fc1bbd90e62f5f053a778963e64e02a51f3a,2025-03-05T10:15:13.563000
|
||||
@ -248227,9 +248227,9 @@ CVE-2024-13085,0,0,162bf1e91a247b7e6da6855dca3faf3ee63c65213e4a36036c19ad648c40f
|
||||
CVE-2024-13086,0,0,7ac42c524055e40fca53eb99442db6298fae490b3d2a5b9bd9dde151851588be,2025-03-07T17:15:18.430000
|
||||
CVE-2024-13087,0,0,de9220c2f3228338d6992a72f028e115aecfe3e99735d21a56e1a464c6d673c9,2025-06-09T12:15:47.880000
|
||||
CVE-2024-13088,0,0,f092e286d50e3d3e98d13de53109368260b6d1e8323f34fd9cce2a144359b3de,2025-06-09T12:15:47.880000
|
||||
CVE-2024-13089,1,1,f5454d17f3f57010b12e68642616d13cb796efaa305513504b071cad5533df66,2025-06-10T11:15:52.113000
|
||||
CVE-2024-13089,0,0,f5454d17f3f57010b12e68642616d13cb796efaa305513504b071cad5533df66,2025-06-10T11:15:52.113000
|
||||
CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000
|
||||
CVE-2024-13090,1,1,f59bcd6fcdd4929ff55844b6e1f081fff64cd2cd1ab56a6fb30361561be373be,2025-06-10T11:15:52.477000
|
||||
CVE-2024-13090,0,0,f59bcd6fcdd4929ff55844b6e1f081fff64cd2cd1ab56a6fb30361561be373be,2025-06-10T11:15:52.477000
|
||||
CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000
|
||||
CVE-2024-13092,0,0,a2750c0c790f467a547694b70414fe45b0b02ded27bb4d4c2a0fae1c1a0700ca,2025-04-03T14:45:17.077000
|
||||
CVE-2024-13093,0,0,cb18337e8ee0e8d57eaca2c3b85d5fad081ebf6db3df956f09ca020aa48a7de0,2025-04-03T14:43:53.770000
|
||||
@ -248465,7 +248465,7 @@ CVE-2024-1331,0,0,9d173e21c9dc37e78754849b6df46eb1d20847c006b8fdd8b08b4a7feac03d
|
||||
CVE-2024-13310,0,0,c7d7f61ed943995654d2d7f670a6eebe7c0fd61f9032347d9fa323e6d73361eb,2025-01-31T16:15:33.080000
|
||||
CVE-2024-13311,0,0,8f1f9a5d171f95a7ba0f9eaa7d2951798d439c8a220f4f2f7df62ba50bf29d83,2025-01-31T16:15:33.280000
|
||||
CVE-2024-13312,0,0,816e38c6c7477b967986b1dc1563e84c09b9a93286b16913543c3869e5b6d36c,2025-01-31T16:15:33.413000
|
||||
CVE-2024-13313,0,0,edad7973d874ee2239fd6d15559df50e1be783f384a229c15671c50ef32a5369,2025-05-20T20:15:34.017000
|
||||
CVE-2024-13313,0,1,079fd654c18a6cebb8d8d0d6a399f2d4969e982022fa570f48eac0c412ba26e4,2025-06-10T12:01:55.290000
|
||||
CVE-2024-13314,0,0,372cc18bdde9568e747e9e5be6901c6bb60d9908e4175478f94091087fbbca48,2025-05-07T17:54:43.590000
|
||||
CVE-2024-13315,0,0,4230d16584ac54504af61ee61aeb80a96b9eb3fae8091facc2f2a8a9c284a210,2025-02-21T15:44:49.533000
|
||||
CVE-2024-13316,0,0,cec4f855bc43e4856aaa5b46385f299eca1eb3b2bc1537232953f2705c25950a,2025-02-21T15:28:43.690000
|
||||
@ -248512,7 +248512,7 @@ CVE-2024-13353,0,0,81d2cc0d68c32fbd9c01652b235787fa907c22cf877db2ecf0577a18d5178
|
||||
CVE-2024-13354,0,0,70c8df8ffc765e671782c1c5275e6f7668ade0103b0f3f6fd1920147a9a818fb,2025-02-05T01:36:55.960000
|
||||
CVE-2024-13355,0,0,b14926ff025e929de229a84af4734d711f0473d16ba82bc6498a7b20173af029,2025-01-16T10:15:08.750000
|
||||
CVE-2024-13356,0,0,222db37e69d6bffbe0958d093aa878adcd6606bc1c04e8c193a83d53214c4890,2025-05-23T17:21:00.780000
|
||||
CVE-2024-13357,0,0,30d9a66e12b97b83e0efc58916c32e9085479123559078ad828399653d523695,2025-05-20T20:15:34.153000
|
||||
CVE-2024-13357,0,1,771f9dc4d9355d4789e50f59190d0576323480a67c9b7a290b12bfaa52772dc4,2025-06-10T13:31:40.840000
|
||||
CVE-2024-13358,0,0,325a3459d833e21ffea1778bf8000f6b383d5acd1ca06d76e78326d2ceba8c2e,2025-05-26T01:38:44.270000
|
||||
CVE-2024-13359,0,0,bf6b475e08141f78e88398d59a595da02605e3ff52fdb9b04f37415a17f66af3,2025-03-13T15:15:40.237000
|
||||
CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000
|
||||
@ -248540,7 +248540,7 @@ CVE-2024-1338,0,0,dc2761903a1c29795472be9ec50c80e554c7222ddc44792707b7eb37ea2462
|
||||
CVE-2024-13380,0,0,fedf57869c030ff4f3637f3803a39ecc31ada14291471686481185c2393e5fb5,2025-02-18T19:15:13.623000
|
||||
CVE-2024-13381,0,0,21f32b00e20a9ff4c60932bb7a0f4c78bfd66d210946c18787eab987546a4d37,2025-05-07T20:09:19.373000
|
||||
CVE-2024-13382,0,0,e5fb92b7994cf896ff2c80fe04a324c17851ebf2e57fd19d81fb00d48a02bccf,2025-05-23T18:51:39.150000
|
||||
CVE-2024-13383,0,0,47c5a45792b56ff8b3a87654ab39367a9f84b5654515ef32196a0c8a3ba37164,2025-05-20T20:15:34.507000
|
||||
CVE-2024-13383,0,1,aa4d541fdadc3555a8d8a03d1edf06eb5b5dafca4f4080ebe7c8ac768bc11cab,2025-06-10T13:11:27.890000
|
||||
CVE-2024-13384,0,0,c34ca1e73904819dc81eb56a50d929bdf2eae3fddfa57cb2b3d436fb77a648b0,2025-06-05T14:25:59.603000
|
||||
CVE-2024-13385,0,0,341bf9c15400cae53ddc0851921970fc70795f9f5473739da6d466eaaa0f96aa,2025-01-18T07:15:08.463000
|
||||
CVE-2024-13386,0,0,6ff136adf169af3d89231135a7ce4b15faa5760d31440cb4c68dca430369b948,2025-01-17T07:15:27.300000
|
||||
@ -248793,12 +248793,12 @@ CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce2
|
||||
CVE-2024-13613,0,0,76c50a61ea778d8b0fdc92dfa7bd753d24fe469b73d74853265b17aab9b6338e,2025-06-04T20:14:35.327000
|
||||
CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000
|
||||
CVE-2024-13615,0,0,9746659970ae7b6453af10041d79de6b54c63744ad607b0ae9659991c32bafa3,2025-05-06T16:08:14.600000
|
||||
CVE-2024-13616,0,0,fbc77b4740e67bab85861e165056e54066141c3145a64d23bd926b770da18543,2025-05-20T20:15:35.373000
|
||||
CVE-2024-13616,0,1,f8a0258e3ee12546fa2d7aaf7c7240747b469deeae2631884a74ca2766cdd91f,2025-06-10T13:10:20.170000
|
||||
CVE-2024-13617,0,0,eedac14ea6678606200bdc8caad10d687a435a479f513663e25ce802d6aabce2,2025-03-27T16:45:46.410000
|
||||
CVE-2024-13618,0,0,c24fcd6e7987a85a9bf82460747ca3cafa3c24879596b69df592922370d4e1b9,2025-03-27T16:45:46.410000
|
||||
CVE-2024-13619,0,0,e92aca597399784d3b8b962354145dac23980424ab0a3a6fc6b0f6ce107ed048,2025-05-20T20:15:35.533000
|
||||
CVE-2024-13619,0,1,228dd097ae834fa4157341812220ab33466207a66baf632c8fe318488c915fc9,2025-06-10T13:08:49.897000
|
||||
CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000
|
||||
CVE-2024-13621,0,0,e992555db291fa067c2055e94f81e0c1465f058c342fa59c0f6a21b56aeb869c,2025-05-20T20:15:35.743000
|
||||
CVE-2024-13621,0,1,41e79a4554aff842641457268cf2ac14befc9bb974cd2028b732d9f40b02d2de,2025-06-10T13:06:41.540000
|
||||
CVE-2024-13622,0,0,9eed0ba9ebfb0e518b42a2712cf92dae96162849ad9816e57eacc260ba8214a4,2025-03-17T14:11:30.240000
|
||||
CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000
|
||||
CVE-2024-13624,0,0,576164fc25ab192aae939d08abeb1d440de242329edf58adc5208a0aa5a99240,2025-05-15T20:53:23.813000
|
||||
@ -248914,7 +248914,7 @@ CVE-2024-13723,0,0,f977680e0d30dc0600d1d9cea9477509ddf62122fdeae5be3fea5ec8d4e5f
|
||||
CVE-2024-13724,0,0,34258747489035a04daa87bb04b1bc5e6e5e637f7e7b83271cb1adb05cf56adb,2025-03-04T20:50:01.793000
|
||||
CVE-2024-13725,0,0,3ae67647de598849d6499031064f2ab84aae12fe373705e9378e4edd2b924528,2025-02-21T15:56:24.220000
|
||||
CVE-2024-13726,0,0,880bc6c2fe8613f07af78120693f246cb058ccb785a555fa5e0708829e92edbd,2025-05-21T16:04:50.690000
|
||||
CVE-2024-13727,0,0,bc0af90eaa3ac27469a3c5ce1d7f12df903594a04e36c808d134dcaaf3dc0169,2025-05-20T20:15:35.927000
|
||||
CVE-2024-13727,0,1,299231c8d4ee4a2fed2c2248b33b4b9b92a70368aa28206e65648d0090c75ff4,2025-06-10T13:05:39.307000
|
||||
CVE-2024-13728,0,0,fc3600c0f61ce7085e8da7204bc76ef6f37fa32ad9251533dccbbb08ac5789f5,2025-02-23T06:15:08.710000
|
||||
CVE-2024-13729,0,0,43f455d9551e899d69ddf74a933692c26ac1a517409084ab5f20c0f1a53c6197,2025-05-23T18:46:33.653000
|
||||
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
|
||||
@ -249002,12 +249002,12 @@ CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a
|
||||
CVE-2024-13820,0,0,3f47e2346a0959c05c93a153ce340ec2fa8ffde91098f5b8973269a0c75cf098,2025-04-08T18:13:53.347000
|
||||
CVE-2024-13821,0,0,fa63e95562fe6d0f5424bef06c66fc83e2349c34bd54ad7786c2856fc307ac82,2025-02-25T19:37:29.223000
|
||||
CVE-2024-13822,0,0,82ccf0fd7722bab25c24e6416ed907e575f02c81b1df43a838280131bbe2a224,2025-05-07T17:26:08.580000
|
||||
CVE-2024-13823,0,0,5d2ca7c91d432a559f974647e3aa94614d02a1e0cfa4e1fe4e6f01e334641f58,2025-05-20T20:15:36.347000
|
||||
CVE-2024-13823,0,1,5eac694d58919decf6228c2e6601b3f2df5b97cae3d8db9a30e0cccd2367364e,2025-06-10T13:04:43.860000
|
||||
CVE-2024-13824,0,0,9a24e697ac549f7d4674f794b4484e44cf4c976711aeb4120a01b1e2df50cb0b,2025-03-21T14:55:08.103000
|
||||
CVE-2024-13825,0,0,c439e603890b8aabcb647bfe30ce08233b4b5913ceafec654aae98c44084238b,2025-05-06T16:17:38.650000
|
||||
CVE-2024-13826,0,0,5e6f0c7bd24b8c34be283a1fe05744be6d6d50773749f98d4b5fa4f53914f6d9,2025-05-06T16:16:19.067000
|
||||
CVE-2024-13827,0,0,5c4067cb862f24413fc68125bcc709e40867b80ad9cccc45000563f036236cec,2025-03-05T09:15:09.390000
|
||||
CVE-2024-13828,0,0,ddcc9f179bb1df1597445e580deaecf78f63628f476c9fb5c6a7f6ffea0b2475,2025-05-20T20:15:36.503000
|
||||
CVE-2024-13828,0,1,7358b1e4e39a9a2009775aa970c78fe81a767e1d2202043fc9189fa9622bb823,2025-06-10T13:02:39.683000
|
||||
CVE-2024-13829,0,0,0eb68c1cd51e57e24834aa430c28539b9740e4aeaf2e4bf4d57d2d018e612c3a,2025-02-05T06:15:31.257000
|
||||
CVE-2024-1383,0,0,831f4398bca1f1e598b6ff4c23b6b849c16ee98f247d954693e5349168e8ad80,2025-02-28T15:10:48.447000
|
||||
CVE-2024-13830,0,0,c6d7b41600cf06f096c92eda44ad4947ed0129124f061312ef644e59d67aa0f4,2025-02-13T17:09:11.660000
|
||||
@ -249101,8 +249101,8 @@ CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b
|
||||
CVE-2024-13913,0,0,97e9263ea64a11bf1d9dd911c989e4107d7a928b53ec2e2ca6bd3929a0fde8a1,2025-03-14T06:15:24.490000
|
||||
CVE-2024-13914,0,0,2af344b4b59c1a7104b4453c8c333847114f5fbef4676b0e1849066fad060e76,2025-05-16T14:43:26.160000
|
||||
CVE-2024-13915,0,0,6fe2f006afc76e62529cad238e1d7c5fa1e81ebbb017ddd7987d1601087231ea,2025-06-10T09:15:22.463000
|
||||
CVE-2024-13916,0,1,616a3a974a6f01de2c87e25818465d874537e8e70683ef59a680af8227940de2,2025-06-10T10:15:21.443000
|
||||
CVE-2024-13917,0,1,d7f074eb3bc2e28f3b38b1720523e72dbce348ba1de7ad8e965baa1b1f59ff10,2025-06-10T10:15:26.553000
|
||||
CVE-2024-13916,0,0,616a3a974a6f01de2c87e25818465d874537e8e70683ef59a680af8227940de2,2025-06-10T10:15:21.443000
|
||||
CVE-2024-13917,0,0,d7f074eb3bc2e28f3b38b1720523e72dbce348ba1de7ad8e965baa1b1f59ff10,2025-06-10T10:15:26.553000
|
||||
CVE-2024-13918,0,0,42b43ee8cd03c685390e4720249fe990efc04f95289c224e1def5175db4f83ef,2025-03-24T14:15:59
|
||||
CVE-2024-13919,0,0,e47cf885ddbb3552eadad29313f1bea2b10cd197fed90bc6c347d954f876d2b0,2025-03-24T14:14:53.337000
|
||||
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
||||
@ -258112,7 +258112,7 @@ CVE-2024-30616,0,0,f690cd9281b12c84866f69af289ad659f87a7bf5a21c0a047e9555ca2a6e1
|
||||
CVE-2024-30617,0,0,4e4fab9894739cd86b0fa43a3c5304a82b4f65fc3da8a9f40643b10883f8203d,2025-04-18T13:55:07.440000
|
||||
CVE-2024-30618,0,0,aa74e0bc9460fafdc195f142a91d754bf82056e989f3724a7675a82e5a3c7ef5,2025-04-18T13:54:12.313000
|
||||
CVE-2024-30619,0,0,aa15af9ede2760db72cc5dd099d038bba420b382cc365ab4a3fc268ddecec6f5,2025-04-18T13:52:46.940000
|
||||
CVE-2024-3062,0,0,235a5377d98b848a5c19ce39b1979ab030e25c0caf0feb28a8a478bb4d2a5c7e,2025-05-19T15:15:22.133000
|
||||
CVE-2024-3062,0,1,c4e871a4083e5222f18402b09159d962fa761d0b939797a1b677f2b78a18fe11,2025-06-10T13:57:42.330000
|
||||
CVE-2024-30620,0,0,1b3e51295647ffd13564c7714ebaea0b045e75f1b544faff2d143fb94e342877,2025-03-25T15:15:20.967000
|
||||
CVE-2024-30621,0,0,0dc11285619aa51aaccf5ba8a6dfa55feacfd678728e357f9c88d654c4236d9b,2024-11-21T09:12:19.600000
|
||||
CVE-2024-30622,0,0,c184a925147888a48a43c2ebde524eaabf19c129f37a11429143c92e8bcfca27,2025-03-13T21:23:14.273000
|
||||
@ -263203,7 +263203,7 @@ CVE-2024-37259,0,0,b111a5473f46b1bb41290b6efdd564593ab17a36d078c9670b5dbe3c86120
|
||||
CVE-2024-3726,0,0,9dbd42b932087fa2a65c5516bc71599cb9f7f46ce6c10aecc20bfa3f28ed9d2c,2024-11-21T09:30:15.237000
|
||||
CVE-2024-37260,0,0,5e9706c77eb49e146468bb0f09d58d0f11318eeda87c7a1ff0d1efbb33f5fb54,2024-11-21T09:23:29.377000
|
||||
CVE-2024-37261,0,0,7707a4ef346df834825f33497933b4b7045bbe979c2af643480a7b2e1b3fa9dc,2024-11-21T09:23:29.517000
|
||||
CVE-2024-37262,0,0,59421a4567abf98dbaf885157f34fcfb756b288839576fb187fc8bff99ccfcb9,2024-11-21T09:23:29.650000
|
||||
CVE-2024-37262,0,1,09385f5f7e0e03772e56b28e8a6293dce8825176f5948736af1694f23f000ee0,2025-06-10T12:45:23.150000
|
||||
CVE-2024-37263,0,0,4c0f9b0146e7eea4096ad389b48dc7041fb78e43d90694e2c8b0f0808a0bc3ba,2024-11-21T09:23:29.790000
|
||||
CVE-2024-37264,0,0,f1bebcc6a6a0f693ac1a2045228d795b947e81bf997e3c96a81d1dc7c6394ae6,2024-11-21T09:23:29.927000
|
||||
CVE-2024-37265,0,0,33ac5001e3ce913d6259b7e706c199e5216dbab4c34d5a1f92004146060dd2c2,2024-11-21T09:23:30.083000
|
||||
@ -265516,7 +265516,7 @@ CVE-2024-40036,0,0,7ada3b0848f443c38ddf205d8d8de522c0823c689aa06344378a06c3b86ab
|
||||
CVE-2024-40037,0,0,c9d7ad11595234c7fc00a96565c10bcc451b262271af0b09e15e7a97f1e5ab5d,2024-11-21T09:30:53.433000
|
||||
CVE-2024-40038,0,0,1e018dbdc79d7848d568a5bae781c1ebbdf6def4b78631d9d14756762dc294f2,2025-04-15T17:01:21.050000
|
||||
CVE-2024-40039,0,0,10bb82b9a485d9a30d97534c1565b71b69e7d2b8a8d12d3cebe34d27e8391f10,2025-03-13T18:15:42.207000
|
||||
CVE-2024-4004,0,0,c9fa24b0a4779125c8e00884562ad42c98d666a28ee7675bd2f581f91a8420d4,2025-05-16T16:15:28.143000
|
||||
CVE-2024-4004,0,1,fb6657f16cf3e3db6c5306af2c2d52123b155d11529b185e39b5426df66d88fb,2025-06-10T13:42:33.290000
|
||||
CVE-2024-4005,0,0,10ce0801262283a3acf259593f5122037af4b3f2afe41d97e0d5130b74a0b3ba,2025-03-13T22:15:14.523000
|
||||
CVE-2024-40051,0,0,96ab2490faf9bea7ad7fee897981a553b31642380963c6ce4281331d73ca69b1,2024-11-21T09:30:54.030000
|
||||
CVE-2024-4006,0,0,46335001e821792447cd234ad2269b9ef6e390364b1771cf570ddd60ee4264a5,2024-12-12T17:10:26.743000
|
||||
@ -268589,7 +268589,7 @@ CVE-2024-44001,0,0,175a5c76eaa0c47ffbee0289add49207844bb4c67d99ffcbaaa126343821b
|
||||
CVE-2024-44002,0,0,fb0f9d9f4deabfd4ae1435b962e7db8b5241e501eddbb5d325e8dc3232296abc,2024-09-25T20:06:13.100000
|
||||
CVE-2024-44003,0,0,23e0564b892dd423e7259e31c83d1277fbb7208f6d70fd5f18df7ac3fcafb2ea,2024-09-25T20:03:29.867000
|
||||
CVE-2024-44004,0,0,bbc19a7af2ebbf830c254cf451b28c5ea08ca0da1e15859da6b1d1952425238b,2024-09-24T19:22:14.760000
|
||||
CVE-2024-44005,0,1,96a48922146014b4096b0e3da854976801051d3d24069d441538abeeacd253ac,2025-06-10T11:44:28.910000
|
||||
CVE-2024-44005,0,0,96a48922146014b4096b0e3da854976801051d3d24069d441538abeeacd253ac,2025-06-10T11:44:28.910000
|
||||
CVE-2024-44006,0,0,07a7b2d93672ddd0e2d64af483cf570ba63f1e65d2ff5fdafe3c8385cb34625a,2024-11-08T21:08:38.960000
|
||||
CVE-2024-44007,0,0,eb31863e8cc5fd1d114916effb9a6848710b326ebc0b4750aa792a8d30574b0c,2024-09-24T22:08:52.857000
|
||||
CVE-2024-44008,0,0,f7af8bcf24d7662d22f83ecd74e944dec78b8e1307eefd0e495f38cb1e19aae0,2024-09-24T22:08:01.060000
|
||||
@ -273176,7 +273176,7 @@ CVE-2024-50256,0,0,da7409ea6f37017b9509db8e1d03cd79451c987d7cba2b77a28f3790c1801
|
||||
CVE-2024-50257,0,0,709c952c23f6f2c85756fa281ef4d4539da93958904cb8b8a9d399dd5e519f97,2024-12-11T15:15:13.913000
|
||||
CVE-2024-50258,0,0,fab4b733ec19089854abd2b485c2e0835c2194d06a6d8e3284c9718a9dec4d9d,2025-05-02T07:15:56.490000
|
||||
CVE-2024-50259,0,0,677e0e1bbe84ed4ab3644382c3f2533d28ae11f50a1fc23ec0092a6601ed2d49,2024-11-14T18:24:11.470000
|
||||
CVE-2024-5026,0,0,4427b41ba4a1ab32fffdc954200325ecacf644272ce2aad9c3cb2b82001ce650,2025-05-20T20:15:36.837000
|
||||
CVE-2024-5026,0,1,319631cb04e347abbc33aa984d631d9ee475096557f70387f0c314898438bfa4,2025-06-10T13:36:54.840000
|
||||
CVE-2024-50260,0,0,eebfa27953e35b054c12e5e328e8666a82e16db3076b6aad7980b056c6faa68b,2024-11-13T18:47:43.830000
|
||||
CVE-2024-50261,0,0,859333bc625e392047b9a3e1685efd1bbebb6888814fd4e4b6c9cb690add0bd4,2024-12-11T15:15:14.133000
|
||||
CVE-2024-50262,0,0,98db827853cb172853751d52de2f37b7074faf6606a02ce0073bf6eea45e8797,2024-12-11T16:15:12.513000
|
||||
@ -278214,7 +278214,7 @@ CVE-2024-57906,0,0,1c82c39362aa54ac7ded96d3affeb3f600b57be3199ebe50578c90e46414f
|
||||
CVE-2024-57907,0,0,14fc15d2d8a4886ac02d6a926289ee27d35ba482e0b2a7ef1a4ad5e89411d941,2025-02-18T13:40:05.290000
|
||||
CVE-2024-57908,0,0,f5a6cf31cde370a07311bca688e839555e8a2f6a361c59c9fbf062fe0a19faf6,2025-02-18T13:39:42.783000
|
||||
CVE-2024-57909,0,0,12e8190174f6a0552d498937d8f65055272a396a0ee2cbc25a50408a9d03019f,2025-02-18T13:39:06.190000
|
||||
CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000
|
||||
CVE-2024-5791,0,1,6aec4f8b08417a8c035d35f38de1d43216110222760f5106aca921f21a31bac0,2025-06-10T12:45:23.150000
|
||||
CVE-2024-57910,0,0,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000
|
||||
CVE-2024-57911,0,0,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000
|
||||
CVE-2024-57912,0,0,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000
|
||||
@ -278489,7 +278489,7 @@ CVE-2024-5855,0,0,e3b94dbd38c6c583563ce8d4a64fe4513b9c4930c0a9defeba9b12ad8934e6
|
||||
CVE-2024-5856,0,0,f409ca778bc3503ba0953dabe4d8c60a3ff3078514214d270804de662f27ffeb,2024-11-21T09:48:29.060000
|
||||
CVE-2024-5857,0,0,d2e8fdc28fe3c9c38fbaa264706e0b39e123de000f9b115383c398aef67773e9,2024-10-04T12:59:27.290000
|
||||
CVE-2024-5858,0,0,f11336185195d9a02c4221a561cac24b91c76fc2cf1b5733db9d2c5e08e67568,2024-11-21T09:48:29.270000
|
||||
CVE-2024-5859,0,0,29152b99e632ab0129b4a9a5392c31d2700fec464aea253a3a907443889af9a4,2024-11-21T09:48:29.377000
|
||||
CVE-2024-5859,0,1,5a1495b9b4816d523738499f778adb7eae3a8263c0133e1641efb1997e3513df,2025-06-10T12:45:23.150000
|
||||
CVE-2024-5860,0,0,095c77da0715fbf43c36d830a751eef0ac354ee45546507c445de80de5c7f86c,2024-11-21T09:48:29.490000
|
||||
CVE-2024-5861,0,0,79551c286ea0a60702a4e040a1d82751b2d9172a05b7fd4efa55d3a6a7ec9037,2024-11-21T09:48:29.607000
|
||||
CVE-2024-5862,0,0,5a2b1c4235948f0d50051344c640c2e071e5b5598bc997f246c1be662c3a9c8e,2024-11-21T09:48:29.733000
|
||||
@ -285470,8 +285470,8 @@ CVE-2025-22119,0,0,2f09d65d442eb8e910f07964987dcbbe390d5a22774502925136f0f5e2432
|
||||
CVE-2025-2212,0,0,347acd7cefc790885b47aec20e274251fda79a418815081e1cb51978df1bcde5,2025-03-11T23:15:38.253000
|
||||
CVE-2025-22120,0,0,56b604066f8d00919ad540ee4d7bb8d05d7f16e6e7e47b03157a55c7abcc60af,2025-05-02T07:15:59.640000
|
||||
CVE-2025-22121,0,0,0fb672ef784beaceffd7562b0d835f70da34c25516b143ecaaff12a8d6fe22c8,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22122,0,0,0c59a6fd110c2c79b78a10a96735fb481b59795e3867f8b63bfa018f56e4b421,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22123,0,0,61bfdc366c8e5a41eb6424d4cbbb75050b9631c4c26b66c3ae5aae59f022e017,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22122,0,1,58f26540291b22254e813ab1085c8cb38b9e0486f52ad4fd26ddb58def241157,2025-06-10T12:15:23.090000
|
||||
CVE-2025-22123,0,1,e7155b6b5bc9d26722a323043bf77467a8d9709d9f4036f7cf072a26365f974c,2025-06-10T12:15:23.750000
|
||||
CVE-2025-22124,0,0,09a256b2c17dbd18800ac7e1feaad9e930636f4d0b9fc0ef1d0f63fe3b204244,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22125,0,0,4e16b6bb1574e3a218f15739af16c15ef140ff8d253a467b4d70d5fb76ed7c28,2025-04-17T20:22:16.240000
|
||||
CVE-2025-22126,0,0,d69a5c7dd72e14d4efa2f34c1be80ca5e4fba4822f184eaebcbe35636daca26c,2025-04-25T11:15:45.880000
|
||||
@ -289113,7 +289113,7 @@ CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0b
|
||||
CVE-2025-27018,0,0,48d58c9e9c902b1eaa7722cd7e4f3337c69ebc3fec7269de4a4a5a702e3570f7,2025-06-03T21:11:28.860000
|
||||
CVE-2025-2702,0,0,7ef0bfa66e07c4fb7c181b57cab1217f373873ecf500d50de0d874610b07459c,2025-03-24T10:15:12.943000
|
||||
CVE-2025-27029,0,0,f19508e0628f7c772651f93e1b12fe9874fd4060cecec22f220c71602c00f8da,2025-06-04T14:54:33.783000
|
||||
CVE-2025-2703,0,1,d5ea40e178148932f49d90ec4c309716760c7d3b1ed975c047629950db3be6df,2025-06-10T11:15:52.680000
|
||||
CVE-2025-2703,0,0,d5ea40e178148932f49d90ec4c309716760c7d3b1ed975c047629950db3be6df,2025-06-10T11:15:52.680000
|
||||
CVE-2025-27031,0,0,9fa4d5238e55dfabc5a9becc0748532469d6008767dbc00fd4050a94f50be84d,2025-06-04T14:54:33.783000
|
||||
CVE-2025-27038,0,0,fe0578cb45b48dbd7571220d905a674d9df1e67d36609a2b08ca2656fb74b6b8,2025-06-04T17:23:58.387000
|
||||
CVE-2025-2704,0,0,2cd2fdcb7bf078b49adccb5ec3568934eab2cf5655946edca476f7cde559986a,2025-05-24T01:38:01.433000
|
||||
@ -290150,6 +290150,7 @@ CVE-2025-29153,0,0,d8eeeb715e26f12c35487b55680a3c0a724084732ee5fd50de67d20533f23
|
||||
CVE-2025-29154,0,0,7fdc59b1b8b3db49c174aefb6a6ba9c008546e8b1db8a06cac0366e7a5c5b909,2025-05-08T19:16:02.437000
|
||||
CVE-2025-2916,0,0,a9d32a009c2c479d4d99380c6f5c7dc74ee32d7bcd65aba7c50dbefe66cc315d,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2917,0,0,5e954b3dd80aa4a930dbaedde7b70b19fc8b0dc93229912d7b3d305f418d7302,2025-06-09T17:30:31.340000
|
||||
CVE-2025-2918,1,1,613909e2a51855b95045031b84bec6fc7a6aea8b022ee5876305ee5459590153,2025-06-10T12:15:23.867000
|
||||
CVE-2025-29180,0,0,ff32a6c0b8ae6bd7bd11047aabd317a8e135e12cfa97f8616621804c50d97fba,2025-04-23T18:44:06.733000
|
||||
CVE-2025-29181,0,0,8ae82d2203a155eaf3356642ff55a59d1f6c904778c798cb5b17b83f75821ff9,2025-04-23T18:21:15.327000
|
||||
CVE-2025-29189,0,0,acad0707e84ed6f6034c389318c16d4a284ae555c697c4e5480dcb98a0326eea,2025-04-22T17:11:10.127000
|
||||
@ -291324,7 +291325,7 @@ CVE-2025-31015,0,0,cc9d5bb58bd9acbdec8dd13e2813c11ba30f9d64e279f9a8cd7570dbb05b8
|
||||
CVE-2025-31016,0,0,9f9353b55280d52026be79b202ae8bc2b442e0024607fdee2a6c539bec9857cb,2025-04-01T20:26:30.593000
|
||||
CVE-2025-31017,0,0,4d15e426e44fc80241be23dec538166170b7e58fdf6f1e6ffe3f4a6bbdf70361,2025-04-09T20:02:41.860000
|
||||
CVE-2025-31018,0,0,9405833e484baccbf4a372ae14b5b3c897f0fd637b0228286c0af34a95c332bd,2025-04-17T20:21:05.203000
|
||||
CVE-2025-31019,0,0,cf0eb8d0fc3a4e395ce8cfd725e30645b941cdcc96fa70d4706eaa033a98182d,2025-06-09T16:15:36.450000
|
||||
CVE-2025-31019,0,1,3d4b8e548615b0c7592279712067028f00a3393e212453365cd3f5b4ebfdecaf,2025-06-10T13:15:21.477000
|
||||
CVE-2025-3102,0,0,9c4ff38556bcdb14ac2775e48a2e31e8e52dc53cbe7c5d18a0dcd91a18882777,2025-04-11T15:40:10.277000
|
||||
CVE-2025-31020,0,0,7e2e00eca59f243d0beec980806f16099342ab07866da05064b3c4742d7e81ef,2025-04-09T20:02:41.860000
|
||||
CVE-2025-31021,0,0,5e198c1f2cf0cbdc7790475dda4dcc0a1f65322a9e0fb3a2fc32c0ec4cdae5d7,2025-04-11T15:39:52.920000
|
||||
@ -294231,16 +294232,16 @@ CVE-2025-40650,0,0,b06bd04057578be69f52c26cfd738aa4aa83676839010f4d9f35ce7436a21
|
||||
CVE-2025-40651,0,0,1dd3c6768789fd8cb58af27a11d14826bfd53d1b5bf2d2d5309827d197f9e05c,2025-05-28T15:01:30.720000
|
||||
CVE-2025-40652,0,0,3ed1e73ca0af4a402b191efa99599865fb897bbf50a3feb00af29861487f2b95,2025-05-28T15:01:30.720000
|
||||
CVE-2025-40653,0,0,952d6149fd41bb3446d99ef1d9980a07fed39db01b9836f114bc421cd10405d3,2025-05-28T15:01:30.720000
|
||||
CVE-2025-40654,1,1,70021833c5d4fccb4cbab7f376b6dbbbb5eeb1659b7238abf2213972c41ec464,2025-06-10T10:15:26.990000
|
||||
CVE-2025-40655,1,1,13fc8c330d3ba042b4fb0ff74338f42d57b0e0f02cdf25fc26d82ac7a7f3d5c3,2025-06-10T10:15:27.620000
|
||||
CVE-2025-40656,1,1,445d56d9e8b8681815d2b427356cf93650e73d35491684b06c257d23b1914704,2025-06-10T10:15:27.843000
|
||||
CVE-2025-40657,1,1,1fdd7fa0fa4630dcad1d0ec16e781e4cf9a241d066312193320c856179404876,2025-06-10T10:15:28.043000
|
||||
CVE-2025-40658,1,1,9e0dd0bf5f4d48d3430e2ac214ac9f11499f92444af36de6b77d763cbd260454,2025-06-10T10:15:28.237000
|
||||
CVE-2025-40659,1,1,5ab65d9a1e9e8fe6f49a660ca7b98dbb76f21ef7918c07bd366a37006d8c05b2,2025-06-10T10:15:28.430000
|
||||
CVE-2025-40654,0,0,70021833c5d4fccb4cbab7f376b6dbbbb5eeb1659b7238abf2213972c41ec464,2025-06-10T10:15:26.990000
|
||||
CVE-2025-40655,0,0,13fc8c330d3ba042b4fb0ff74338f42d57b0e0f02cdf25fc26d82ac7a7f3d5c3,2025-06-10T10:15:27.620000
|
||||
CVE-2025-40656,0,0,445d56d9e8b8681815d2b427356cf93650e73d35491684b06c257d23b1914704,2025-06-10T10:15:27.843000
|
||||
CVE-2025-40657,0,0,1fdd7fa0fa4630dcad1d0ec16e781e4cf9a241d066312193320c856179404876,2025-06-10T10:15:28.043000
|
||||
CVE-2025-40658,0,0,9e0dd0bf5f4d48d3430e2ac214ac9f11499f92444af36de6b77d763cbd260454,2025-06-10T10:15:28.237000
|
||||
CVE-2025-40659,0,0,5ab65d9a1e9e8fe6f49a660ca7b98dbb76f21ef7918c07bd366a37006d8c05b2,2025-06-10T10:15:28.430000
|
||||
CVE-2025-4066,0,0,6b866ef67faa41ec2689ec4b83aa9ca62c69a8051911732f639e5179e5df1a9e,2025-05-12T19:35:25.097000
|
||||
CVE-2025-40660,1,1,29911c79c9521fcfb5c5e7a057e47c4234cb1dee864fe0c64a3a17305c4c417a,2025-06-10T10:15:28.627000
|
||||
CVE-2025-40661,1,1,0f28040d1797055ea2a2b8beac85a17e088e312b347c25778f9cefcc8d55c4cf,2025-06-10T10:15:28.827000
|
||||
CVE-2025-40662,1,1,2d08d93cd316b56d55652ae4d161fcc5bf4f67c333a3b98aa7ec6815f72b2464,2025-06-10T10:15:29.103000
|
||||
CVE-2025-40660,0,0,29911c79c9521fcfb5c5e7a057e47c4234cb1dee864fe0c64a3a17305c4c417a,2025-06-10T10:15:28.627000
|
||||
CVE-2025-40661,0,0,0f28040d1797055ea2a2b8beac85a17e088e312b347c25778f9cefcc8d55c4cf,2025-06-10T10:15:28.827000
|
||||
CVE-2025-40662,0,0,2d08d93cd316b56d55652ae4d161fcc5bf4f67c333a3b98aa7ec6815f72b2464,2025-06-10T10:15:29.103000
|
||||
CVE-2025-40663,0,0,4aa8c64bc18f7e33ebb6be208f9cd3156bb0660dc9a760545e0a74283cf88190,2025-05-28T15:01:30.720000
|
||||
CVE-2025-40664,0,0,e366ae4d0edc3020bccb4958e82dfc623d961bfd022fb180a3be2259f2bb55f6,2025-05-28T15:01:30.720000
|
||||
CVE-2025-40665,0,0,80c9d614a0e728f77e8ffb6c772411e08f1a3422b53c0225c9a2a3eda1f363a3,2025-05-28T15:01:30.720000
|
||||
@ -294400,7 +294401,7 @@ CVE-2025-41652,0,0,61b56e820debad0d6ed87e53925b75193550ab4911ec76df587d7530bd8f7
|
||||
CVE-2025-41653,0,0,450cb90166822151ca98533cba100a0f07716a6f9e2e385d8b8766038d4b0cb2,2025-05-28T15:01:30.720000
|
||||
CVE-2025-41654,0,0,c22856a515f49ccd204a32143b656fc257abf14e343863bdec0d026ca010bcd0,2025-05-28T15:01:30.720000
|
||||
CVE-2025-41655,0,0,d4e55c0bf8ee1b4fb7f9a5a70eabfb748935a97fe6cc917be3646a99349642c3,2025-05-28T15:01:30.720000
|
||||
CVE-2025-41657,1,1,fe785a8a271a8bfed9a8574477bebed4f54bcc892e6c96de3103c865106136b3,2025-06-10T11:15:53.150000
|
||||
CVE-2025-41657,0,0,fe785a8a271a8bfed9a8574477bebed4f54bcc892e6c96de3103c865106136b3,2025-06-10T11:15:53.150000
|
||||
CVE-2025-4166,0,0,5bfebbee34c2356ee039434bb4ac7a8705ff7fab6fe8d313f7df39c4661cee90,2025-05-05T20:54:45.973000
|
||||
CVE-2025-4168,0,0,a6468df4f7a2597ad76d3cb7aeb08566a4877cfddb2b3e40039e98441ddbce5f,2025-05-05T20:54:19.760000
|
||||
CVE-2025-4169,0,0,bfc728158ddf7f1a565291bbe3bc05c4816fdb9cc64adedded01a1b86d632adf,2025-05-16T14:42:18.700000
|
||||
@ -294634,6 +294635,11 @@ CVE-2025-4363,0,0,cfc7942feeb9a0f9f6312b42fa943d50981f3a9d84068f01e49e58a260df8f
|
||||
CVE-2025-4364,0,0,7abc96b4496bfef1269854d9d4450b426753c52eb291c976d683ed2fcf48245a,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4366,0,0,231ab1d570625e15497e22d5b442eb1495badc7a98e284eaa21b6f30c183c146,2025-05-23T15:55:02.040000
|
||||
CVE-2025-4368,0,0,5060346bbf213853af51c9b1f1ab82f240c6c047743a52b24483fa7453a5d04f,2025-05-13T20:19:54.440000
|
||||
CVE-2025-43697,1,1,e9ffc798fea053198fb17bed37bab0c158ecec381f08a3543087469e372613ed,2025-06-10T12:15:24.097000
|
||||
CVE-2025-43698,1,1,65fb003d23e6d635c0b01ee008fb0dd98fed725cdf56451a4ef99df38c52e29a,2025-06-10T12:15:24.227000
|
||||
CVE-2025-43699,1,1,1d39cab8eb945db8a47c3cddf7010f12f0acd959ee68a355398abdd3563ec5f6,2025-06-10T12:15:24.357000
|
||||
CVE-2025-43700,1,1,c2cc58f0e604eee544996cc7d907ffb95b0541f1f14e0033ad5f656f887ab519,2025-06-10T12:15:24.483000
|
||||
CVE-2025-43701,1,1,fe2e34423b7eb971d6d18dd04633ff9c2283f50df1b163605e07e8bc0d13083a,2025-06-10T12:15:24.607000
|
||||
CVE-2025-43703,0,0,d6625a868be77b8d7893d215165a3a98f3361eec5aed450c8d69ce3a9dfaf391,2025-04-17T20:21:48.243000
|
||||
CVE-2025-43704,0,0,e4a4f68c1c515be2555ad90b5dc0fde58f5ff1d76445660f48da718ee733becf,2025-04-17T20:21:48.243000
|
||||
CVE-2025-43708,0,0,d38c003beeae09584e47fb48659652128bc4a5d2c5ae13da147de319358e0588,2025-04-17T20:21:48.243000
|
||||
@ -295021,6 +295027,7 @@ CVE-2025-45752,0,0,bb720a75a25153c4b67014caa45a3f9b58d2b0bec0c849f14f25b8ea2041a
|
||||
CVE-2025-45753,0,0,214d28714b713bde0d2189fb494c4cf3b7e4c41bc036574809186d613ce4c8d3,2025-05-23T15:55:02.040000
|
||||
CVE-2025-45754,0,0,a302b00636684b408f789314fb369b31d357d4a411342b7876cf26fe121b9472,2025-05-21T20:24:58.133000
|
||||
CVE-2025-45755,0,0,caf4a0a5971f4cf5680b0cad2b710bbea10da89f97ba8578c52219a358cfcd66,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4577,1,1,4a91aca368e2246a8d948570e9d07d7ca1b03157298c3f0691b2680d7569c16e,2025-06-10T12:15:24.737000
|
||||
CVE-2025-45779,0,0,c093a7d91bfb997294cab32f2ebe8a712075ae66c80f7c18bdd9520e3509f542,2025-05-12T22:15:26.173000
|
||||
CVE-2025-4578,0,0,8451b1c03045c8ad3abf8c71774c6b63bc79023720225fdd15b30152793b6197,2025-06-04T20:07:45.857000
|
||||
CVE-2025-45787,0,0,839c7946d0f8e2e3f388e984cf0b3d259f804d96030c23335dfd861ac831e334,2025-05-16T15:38:25.723000
|
||||
@ -295871,6 +295878,7 @@ CVE-2025-47733,0,0,8ca49357b50ecb80722b97ab3f7e121e8dcb83e490a4a143991ae1fbc243a
|
||||
CVE-2025-47735,0,0,2f52e7c2d058d86629cac68f734c0774cf880fe4e8f98eedcaeede1d23aa6eff,2025-05-12T17:32:52.810000
|
||||
CVE-2025-47736,0,0,2f11e9b0a9d748da2f6ce9c62d30862cdd6596c7ac96ac5f1028db67479c00c6,2025-05-12T17:32:52.810000
|
||||
CVE-2025-47737,0,0,60cb12bc89ce6f2a8fe9e7af3463c6e9c2bcca5ef96322a90d7cccb126b389d1,2025-05-12T17:32:52.810000
|
||||
CVE-2025-4774,1,1,1e75afc071802c869ba75e3e2c7fee49a6dc26e98ae9abafaae710b45ad59a5a,2025-06-10T12:15:24.917000
|
||||
CVE-2025-47748,0,0,6d3db12d37c958bc3ed0c3a8085a815af32d574707d63e9cde8e957a0c1f87c1,2025-05-30T17:15:29.117000
|
||||
CVE-2025-47749,0,0,77136f5a200eae36103a9c78079b2abf4fa9dbee2a99746a355de3498002722c,2025-05-19T17:30:06.440000
|
||||
CVE-2025-47750,0,0,1a4ff5a2f7fb0cd15d257d686f97e3b073753ad3ba8037a1d7327a6c86b11820,2025-05-19T17:31:27.667000
|
||||
@ -296578,11 +296586,17 @@ CVE-2025-49449,0,0,cb55c78573e475586bf5898df8e2e4f1b569914e0d162e1db1433500aa43a
|
||||
CVE-2025-4945,0,0,7c1921d824c0ffc4efae3fdac0f07df6ef4c8b0fbdbb004d6249658d4756d858,2025-05-21T20:25:16.407000
|
||||
CVE-2025-49450,0,0,fb4f52dbcabe6d10a7029fe4e63b7637345c171e5ff856e151d99f1496446ba0,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49453,0,0,66b7e122d30d583eff84e0f9157cb5663586cb3b5d97be1749136fd19a39911b,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49454,1,1,2433f7f8de0001ca2d2da6c54dc979f31dcf2d414e8300db8b62359b19da3345,2025-06-10T13:15:22.733000
|
||||
CVE-2025-49455,1,1,9a47f583a263d3e3186cf1ae35041291e53c027322199aab4d219fcdcc74ab9a,2025-06-10T13:15:23.107000
|
||||
CVE-2025-49466,0,0,de46ae3d5a998ef3ced57f414f3a55cc0272bb310a4e787f30dd6b349d92f115,2025-06-05T20:12:23.777000
|
||||
CVE-2025-4947,0,0,5a2596b46f41daf47fb71d339aa3ece981233d1a2e1afb5f6d90d81a432acb92,2025-05-28T15:01:30.720000
|
||||
CVE-2025-4948,0,0,a5ca61c68a7139420f4ae3cf8d0c9e197c8ea856029d5208bdc5d22ad0659a67,2025-06-09T10:15:25.730000
|
||||
CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000
|
||||
CVE-2025-49507,1,1,24312343f4e2c01b89d0c4e095f704954733d42a1386c6354cb85aa7eb38383f,2025-06-10T13:15:23.283000
|
||||
CVE-2025-49509,1,1,1518f93f1ee224f1f100bcee71d6ba948043b73035e7eb346a997192f9c2edc4,2025-06-10T13:15:23.427000
|
||||
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
|
||||
CVE-2025-49510,1,1,380506e2ae8c03ebf1a0d58576260eadb6379c51baddcca2c48765ccd61fe5a4,2025-06-10T13:15:23.583000
|
||||
CVE-2025-49511,1,1,89f9e9e06a92ee36a7fcee42b322bef8df2556399087804f516e0b0f17a65447,2025-06-10T13:15:23.747000
|
||||
CVE-2025-4954,0,0,4f8b18e50e35fbfc0cb799c772c703df1c5ec3452b90f5bc7c961ccbbcb5c026,2025-06-10T06:15:22.403000
|
||||
CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000
|
||||
CVE-2025-49619,0,0,bf456b7c74aaa6eab01b4c779d57de166fafc9ff7198338c147fed153e2c86a7,2025-06-09T16:15:46.937000
|
||||
@ -297242,15 +297256,15 @@ CVE-2025-5908,0,0,37a781f179b1660861001bee4d6c7fb2b67dae046e6af7975b6ededfbac21b
|
||||
CVE-2025-5909,0,0,ab669f12f4fae3bd2f0735d7b1e7ccb7a4a13f9471f08d5428635b990107078e,2025-06-10T02:15:21.007000
|
||||
CVE-2025-5910,0,0,715eda73591903f377a983344c94f5b98f27bef425aa0c6a6a65f0932e6208e0,2025-06-10T03:15:38.583000
|
||||
CVE-2025-5911,0,0,d7e3dcb7d9bb0675f96fabf6f38549f2456bb2d26953b2e2b03a3110da86f3a8,2025-06-10T03:15:39.060000
|
||||
CVE-2025-5912,0,0,b4a379b730919f23bbfd564747bb9b00dbf90200eb93653aaa62f644e11ed9f6,2025-06-10T04:15:49.300000
|
||||
CVE-2025-5913,0,0,c61460384b72cb88f96178b08fff9f8b0ce36776535ad07f09e982e6f3eaba0a,2025-06-10T04:15:54.063000
|
||||
CVE-2025-5912,0,1,fc829098fb36c572f42bd3ad43b84104ffd43f9edbc3a07bb8f8f65b641b7584,2025-06-10T13:15:24.117000
|
||||
CVE-2025-5913,0,1,f23d22995ace860f4eedc70184b3f124f503628f51322e84608328c1fe143107,2025-06-10T13:15:24.380000
|
||||
CVE-2025-5914,0,0,ca2950efdb51e21bbb1b52a25d765df8575e0ffa29446d96c03c3ef2bb78c27f,2025-06-09T20:15:26.123000
|
||||
CVE-2025-5915,0,0,0e67ccac333c7a11c03869b01cbfabaf1cb283cb5a64338a4f2ca5aab164415e,2025-06-09T20:15:26.317000
|
||||
CVE-2025-5916,0,0,de33dac47619c4e1d912727e7eb0e9fccd9c7c67167013ac3aa335bd776c0a9e,2025-06-09T20:15:27.170000
|
||||
CVE-2025-5917,0,0,479e3dcc90af3e8467020be4388f622f5adbb9e240dc38ecb4cf9119d478c05a,2025-06-09T20:15:27.330000
|
||||
CVE-2025-5918,0,0,5fae4533f01b7c4f6585a87e7b2331625bf70aa585af023c3c09519081c4b2f9,2025-06-09T20:15:27.493000
|
||||
CVE-2025-5925,0,0,573daaf55ea018a58bf2bd7e92cad13cf577779f7064f5ad7d1f8de96931b737,2025-06-10T04:15:54.330000
|
||||
CVE-2025-5934,0,0,1ba42daaa63d058bbd118ea21d90f49dd5a949e0cf3049fe0f8f381cc6ec4483,2025-06-10T04:15:55.327000
|
||||
CVE-2025-5934,0,1,6e6b56247e88c88b3883e91849581fe9fb4286ffb99dfd632c90d49eafeb498f,2025-06-10T13:15:24.570000
|
||||
CVE-2025-5935,0,0,bca6b82aff793b09175597d3d76faef10a884937cddad66c78fab2ba223eb2cd,2025-06-10T05:15:22.780000
|
||||
CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000
|
||||
CVE-2025-5952,0,0,f3a4e649f505b0fd93baf65191971ffe21485a7c802124ab53f303aeb8bcf467,2025-06-10T05:15:23.023000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user