mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2025-04-05T04:00:19.639815+00:00
This commit is contained in:
parent
42c9f2e286
commit
ce6c5dd3eb
64
CVE-2024/CVE-2024-136xx/CVE-2024-13604.json
Normal file
64
CVE-2024/CVE-2024-136xx/CVE-2024-13604.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-13604",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-05T02:15:14.497",
|
||||
"lastModified": "2025-04-05T02:15:14.497",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The KB Support \u2013 Customer Support Ticket & Helpdesk Plugin, Knowledge Base Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.7.4 via the 'kbs' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/kbs directory which can contain file attachments included in support tickets. The vulnerability was partially patched in version 1.7.3.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/kb-support/trunk/includes/files.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3231596/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3a058d6-ca9e-4241-b6dd-307efa7689ab?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-08xx/CVE-2025-0810.json
Normal file
68
CVE-2025/CVE-2025-08xx/CVE-2025-0810.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-0810",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-05T02:15:15.140",
|
||||
"lastModified": "2025-04-05T02:15:15.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Read More & Accordion plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.4.5. This is due to missing or incorrect nonce validation on the addNewButtons() function. This makes it possible for unauthenticated attackers to include and execute arbitrary PHP files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMoreInit.php#L122",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMorePages.php#L59",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMorePages.php#L82",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a963cd9b-9f8f-4bd2-92cd-74c5e85e1d96?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-25xx/CVE-2025-2544.json
Normal file
72
CVE-2025/CVE-2025-25xx/CVE-2025-2544.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-2544",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-05T02:15:15.307",
|
||||
"lastModified": "2025-04-05T02:15:15.307",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The AI Content Pipelines plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ai-content-pipelines/tags/1.6/includes/generate-scheduled-content.php#L42",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ai-content-pipelines/tags/1.6/includes/generate-scheduled-content.php#L44",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ai-content-pipelines/tags/1.6/includes/generate-scheduled-content.php#L47",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/ai-content-pipelines/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b93214ec-5738-4f10-b48c-1d74aad52acb?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-29xx/CVE-2025-2933.json
Normal file
60
CVE-2025/CVE-2025-29xx/CVE-2025-2933.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-2933",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-04-05T02:15:15.477",
|
||||
"lastModified": "2025-04-05T02:15:15.477",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Email Notifications for Updates plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the awun_import_settings() function in all versions up to, and including, 1.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3265589%40wp-update-mail-notification&new=3265589%40wp-update-mail-notification",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d52e644b-a58f-4e09-9e53-e9cbef75e34f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-31161",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-03T20:15:25.373",
|
||||
"lastModified": "2025-04-03T20:15:25.373",
|
||||
"lastModified": "2025-04-05T01:15:42.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -63,6 +63,10 @@
|
||||
{
|
||||
"url": "https://projectdiscovery.io/blog/crushftp-authentication-bypass",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://www.darkreading.com/vulnerabilities-threats/disclosure-drama-clouds-crushftp-vulnerability-exploitation",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
27
README.md
27
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-05T02:00:30.682267+00:00
|
||||
2025-04-05T04:00:19.639815+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-05T01:15:42+00:00
|
||||
2025-04-05T02:15:15.477000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,31 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
288673
|
||||
288677
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2025-1500](CVE-2025/CVE-2025-15xx/CVE-2025-1500.json) (`2025-04-05T01:15:42.000`)
|
||||
- [CVE-2025-2889](CVE-2025/CVE-2025-28xx/CVE-2025-2889.json) (`2025-04-05T00:15:15.287`)
|
||||
- [CVE-2024-13604](CVE-2024/CVE-2024-136xx/CVE-2024-13604.json) (`2025-04-05T02:15:14.497`)
|
||||
- [CVE-2025-0810](CVE-2025/CVE-2025-08xx/CVE-2025-0810.json) (`2025-04-05T02:15:15.140`)
|
||||
- [CVE-2025-2544](CVE-2025/CVE-2025-25xx/CVE-2025-2544.json) (`2025-04-05T02:15:15.307`)
|
||||
- [CVE-2025-2933](CVE-2025/CVE-2025-29xx/CVE-2025-2933.json) (`2025-04-05T02:15:15.477`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `10`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-11088](CVE-2024/CVE-2024-110xx/CVE-2024-11088.json) (`2024-11-21T15:15:21.097`)
|
||||
- [CVE-2024-11701](CVE-2024/CVE-2024-117xx/CVE-2024-11701.json) (`2024-11-27T16:15:13.470`)
|
||||
- [CVE-2024-11702](CVE-2024/CVE-2024-117xx/CVE-2024-11702.json) (`2024-11-27T16:15:13.660`)
|
||||
- [CVE-2024-11703](CVE-2024/CVE-2024-117xx/CVE-2024-11703.json) (`2024-12-04T15:15:09.437`)
|
||||
- [CVE-2024-39090](CVE-2024/CVE-2024-390xx/CVE-2024-39090.json) (`2024-11-21T09:27:11.500`)
|
||||
- [CVE-2024-4455](CVE-2024/CVE-2024-44xx/CVE-2024-4455.json) (`2024-11-21T09:42:51.933`)
|
||||
- [CVE-2024-5276](CVE-2024/CVE-2024-52xx/CVE-2024-5276.json) (`2024-11-21T09:47:20.107`)
|
||||
- [CVE-2024-6497](CVE-2024/CVE-2024-64xx/CVE-2024-6497.json) (`2024-11-21T09:49:45.437`)
|
||||
- [CVE-2025-22457](CVE-2025/CVE-2025-224xx/CVE-2025-22457.json) (`2025-04-03T16:15:35.370`)
|
||||
- [CVE-2025-31161](CVE-2025/CVE-2025-311xx/CVE-2025-31161.json) (`2025-04-03T20:15:25.373`)
|
||||
- [CVE-2025-31161](CVE-2025/CVE-2025-311xx/CVE-2025-31161.json) (`2025-04-05T01:15:42.360`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
28
_state.csv
28
_state.csv
@ -245547,7 +245547,7 @@ CVE-2024-11083,0,0,8060d1be07c2085add29a68ce088e46bf1b117fbd5e8fe231b842cd4d2355
|
||||
CVE-2024-11085,0,0,997988ac78259b1ae8db8c6e9651c22f46fbbaea4f307171e6fff12e9b424710,2024-11-18T17:11:17.393000
|
||||
CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000
|
||||
CVE-2024-11087,0,0,e2fe7093d86622f551b217e3b2fb07f9de32adec7e3dcf2388d9405a65f8c4e6,2025-03-13T13:09:46.483000
|
||||
CVE-2024-11088,0,1,dead4289dbb25e5663328a93f5f34cd1a5c6083eba2a8eda97da7209d5a9c049,2024-11-21T15:15:21.097000
|
||||
CVE-2024-11088,0,0,dead4289dbb25e5663328a93f5f34cd1a5c6083eba2a8eda97da7209d5a9c049,2024-11-21T15:15:21.097000
|
||||
CVE-2024-11089,0,0,0f46a9a629be88f215b4a7ad0d79575a4e3b0caab898de683427fa2e5561e411,2024-11-21T15:15:21.500000
|
||||
CVE-2024-1109,0,0,a7b1e71489d6774ecfe851782646b725fb9b27ab957ae0f8b7f311d63d7950f6,2024-11-21T08:49:48.980000
|
||||
CVE-2024-11090,0,0,c176ccf3141a40259cf6c4995f025e29b8341ceb796ecba9c85f772827fb28cf,2025-02-04T20:03:08.833000
|
||||
@ -246163,9 +246163,9 @@ CVE-2024-11698,0,0,177bfd9d19615200c8e5399dceeed9e4f2df493f7a5fb371c3b3bff8ef5f7
|
||||
CVE-2024-11699,0,0,960307a2527490f1e604846ae0147273dc503f0996409a0d2dbd0756e25b75a8,2025-04-03T13:31:55.513000
|
||||
CVE-2024-1170,0,0,23da02961ee2e8cf225b35104ccb43e539fbf93446d052ae9645caf24d980dd5,2025-01-21T16:58:56.397000
|
||||
CVE-2024-11700,0,0,4ac05c714affba1de0567334034c6733d4fbd8855bca94dcfca8d8ce429594f4,2025-04-03T13:32:01.157000
|
||||
CVE-2024-11701,0,1,c6c4cb5168067a8056364ec1103bc35b79a53964f148274bee6be4bf3dfec175,2024-11-27T16:15:13.470000
|
||||
CVE-2024-11702,0,1,8e136c37f460e52a7289e1b2d82bbda84c6585b495c044e7bfe62cb935766236,2024-11-27T16:15:13.660000
|
||||
CVE-2024-11703,0,1,e395d8f8b5af225e21413aedc8819a3d7f24a8a283a17a7781c1cfd963575f93,2024-12-04T15:15:09.437000
|
||||
CVE-2024-11701,0,0,c6c4cb5168067a8056364ec1103bc35b79a53964f148274bee6be4bf3dfec175,2024-11-27T16:15:13.470000
|
||||
CVE-2024-11702,0,0,8e136c37f460e52a7289e1b2d82bbda84c6585b495c044e7bfe62cb935766236,2024-11-27T16:15:13.660000
|
||||
CVE-2024-11703,0,0,e395d8f8b5af225e21413aedc8819a3d7f24a8a283a17a7781c1cfd963575f93,2024-12-04T15:15:09.437000
|
||||
CVE-2024-11704,0,0,7c1cac98f692d41cdc5b96fd88b8dd9b5ffb5022fab2697a92f4d4b10ff729c0,2025-02-04T14:15:30.700000
|
||||
CVE-2024-11705,0,0,0e1596de8042e8e852c6e998c00c8b73e87ddca14f366899c4d0d5766c7acb40,2024-11-27T16:15:14
|
||||
CVE-2024-11706,0,0,d7aa48664fd3a99ff8ecdb1c5e606d3e6a16c2b68f26185023438aa20fdce0e6,2024-11-26T17:15:23.010000
|
||||
@ -248049,6 +248049,7 @@ CVE-2024-13600,0,0,484c9129acb282fae32ab7c653ddfde69cea1c6dd837845606bbf7ace7ea9
|
||||
CVE-2024-13601,0,0,ce9d6d51221b1f7bfe13b94be0c882b344de68bb5f35f70de286ecadc3834f44,2025-02-18T21:31:43.250000
|
||||
CVE-2024-13602,0,0,668a7c024e53e2fe8cff8603230bbbed795e1449bece0c1fdfb0cf7e8cc00f99,2025-03-17T16:15:20.623000
|
||||
CVE-2024-13603,0,0,fc202802068da8bc55cd46c39e4a97a0db9f2a327bd5fc1b7575fa3aa107cf47,2025-02-19T14:15:29.070000
|
||||
CVE-2024-13604,1,1,25598cfe5dd7a53965079415fbd2bc566acf4cd2f526dc3236c0c6852af09d18,2025-04-05T02:15:14.497000
|
||||
CVE-2024-13605,0,0,c1e9596b2279389a7bb72258053b1d4f5a9128f48e9acd3ebaabb715a0ba3f54,2025-02-24T12:15:11.047000
|
||||
CVE-2024-13606,0,0,3678a6b8c1379d0e1b01e3251fb76bf1b3c0d7e3ee42e4cf605940cc5ab858d5,2025-02-18T18:46:05.887000
|
||||
CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e5527f8,2025-02-04T07:15:12.973000
|
||||
@ -263908,7 +263909,7 @@ CVE-2024-39072,0,0,7c7576a6aaa8d080d42e8873fa54dabc8fa57d12eb24e8fb3b3b37f2c1e5a
|
||||
CVE-2024-3908,0,0,32cc26b53789ac42f9085c7424d4e7e5e1385983e1e04bf11b22f248840a758b,2025-01-17T21:16:07.327000
|
||||
CVE-2024-39081,0,0,1ea98431957362ab56a3af379eeef002d3bbd99853a222b010a3be68bd797b7b,2025-03-17T15:15:40.787000
|
||||
CVE-2024-3909,0,0,d5574f4925d57273c75b63e724e2aae982f973388b6e621ddd87893b5d997ccf,2025-02-07T01:57:01.643000
|
||||
CVE-2024-39090,0,1,b36aca9db8932ca77066889a2428544f89222d0d808274ca8552d97abe1d66d3,2024-11-21T09:27:11.500000
|
||||
CVE-2024-39090,0,0,b36aca9db8932ca77066889a2428544f89222d0d808274ca8552d97abe1d66d3,2024-11-21T09:27:11.500000
|
||||
CVE-2024-39091,0,0,c140294e78a78cd7474377e032af5887e358fd95402a58bcd7abb93d413219ea,2024-08-13T21:35:02.617000
|
||||
CVE-2024-39094,0,0,3489f753e4de88b28bdf0c4a0934830757dd9bc356968fa920ba404447b0e998,2025-03-13T16:15:20.363000
|
||||
CVE-2024-39097,0,0,2ffe2246b6dcf8095996d63654e4d34504f5907f265a5a3acdcc049adc39575e,2024-08-27T16:35:13.930000
|
||||
@ -268027,7 +268028,7 @@ CVE-2024-44541,0,0,360d36038a09153826fdb7f75c9d2e58a990ae541d7e417f9aef6615b41fd
|
||||
CVE-2024-44542,0,0,69649467d837964ae89a10ea879537e85831463615e76c2141ca248d248803a6,2024-09-20T12:30:17.483000
|
||||
CVE-2024-44546,0,0,e2c66d94fd13e792ad683596bcac74d7412b12faf579386ee0b995b81a04d1c6,2024-11-19T20:35:24.240000
|
||||
CVE-2024-44549,0,0,a5aaecd9ba75cc32cf841f25e868951de8e2b2b047d881486d13d5755c1993c4,2024-08-27T14:28:55.157000
|
||||
CVE-2024-4455,0,1,8b4be7246c38deed675b65400e7f461fcf195a587cb1f84c7464cdbdf62f60ac,2024-11-21T09:42:51.933000
|
||||
CVE-2024-4455,0,0,8b4be7246c38deed675b65400e7f461fcf195a587cb1f84c7464cdbdf62f60ac,2024-11-21T09:42:51.933000
|
||||
CVE-2024-44550,0,0,6e5e7c90073553915c6cbf84e10c6c9591a0626baa58af3865b7686a30be241b,2024-08-27T14:29:02.370000
|
||||
CVE-2024-44551,0,0,491acb9f04edacb91a77c381669fbbb0354d22a271035ec891cb7e6dae2aedd9,2025-03-26T21:15:22.887000
|
||||
CVE-2024-44552,0,0,a087d6467b3cb42f42c6e6b84dd6f027e5da09823e0cbf8267d22b995bc21428,2025-03-18T20:15:23.460000
|
||||
@ -273910,7 +273911,7 @@ CVE-2024-52754,0,0,48cc5ef43bab6bce1fa386028923c49e7c0923b15806ef09a5c3018ee7e7d
|
||||
CVE-2024-52755,0,0,de05a221f5f303a3571b07e9ee4904991bf517e05068473d4c58937000dd6d05,2024-11-22T17:15:09.970000
|
||||
CVE-2024-52757,0,0,7f8fc8be0915a027b31c09e256572b3c7a9077292f6f9e0c888cfd25a0470d57,2024-11-22T17:15:10.150000
|
||||
CVE-2024-52759,0,0,8e96e54d579bea017f42ee64add5580e7ddfbb0696f13a1d140017fedbef2f3c,2024-11-22T17:15:10.323000
|
||||
CVE-2024-5276,0,1,d654d8d8aec1737b61adbcdd3de94d3570927b4774326d8a1c8ba7e6d550d70f,2024-11-21T09:47:20.107000
|
||||
CVE-2024-5276,0,0,d654d8d8aec1737b61adbcdd3de94d3570927b4774326d8a1c8ba7e6d550d70f,2024-11-21T09:47:20.107000
|
||||
CVE-2024-52762,0,0,0ba93538cdcceffbc2ce711add8a68aa6535f792ec7a07bfa4c816b008d21953,2024-11-29T21:00:39.843000
|
||||
CVE-2024-52763,0,0,bf728b5a47dd0413d8210dc0bce8f5be7122657bdb084f64d14e2b08f6408d30,2024-11-29T21:00:47.937000
|
||||
CVE-2024-52765,0,0,476b03c829577e5243ce6135d79398720058b5846d4e6fe9a1bdd7ebaa31e9c4,2025-03-13T14:15:33.100000
|
||||
@ -277908,7 +277909,7 @@ CVE-2024-6493,0,0,4219f4b7c8428bff689274f5093f622cc568e20fe62d456fac3f7e44bff162
|
||||
CVE-2024-6494,0,0,64483ea7ffdda997831852a5abbd9b9d09bae88699ea984e8a030b6b1f227144,2024-08-07T15:17:46.717000
|
||||
CVE-2024-6495,0,0,552714992ade7df369704ec5a67abc29783969349a6aa7efbf61b2aacecb1af3,2025-01-15T17:37:12.707000
|
||||
CVE-2024-6496,0,0,8ee0438cf6f5aca09ea72030714574ba710a867e64257498ed88d82c0fbc800e,2024-08-07T14:35:07.403000
|
||||
CVE-2024-6497,0,1,77ee0cfa9483135ecf5ea6890d78b2b438383160a5fd660f286f7b2c79175e01,2024-11-21T09:49:45.437000
|
||||
CVE-2024-6497,0,0,77ee0cfa9483135ecf5ea6890d78b2b438383160a5fd660f286f7b2c79175e01,2024-11-21T09:49:45.437000
|
||||
CVE-2024-6498,0,0,d6615d703509a8a6bb0fec23352394e0db77972d8a99657bf636fa92bfdaa089,2024-09-06T17:35:19.293000
|
||||
CVE-2024-6499,0,0,35c38f947633fe6fdfe909156ebfa6cfdc8e69372314f896d5eab4274f10b227,2024-09-26T22:07:50.040000
|
||||
CVE-2024-6500,0,0,fd0ae55a5b49a6356709e92760fc530e49b2c4c056147200f16a6a1f57743bcc,2024-08-19T13:00:23.117000
|
||||
@ -281641,6 +281642,7 @@ CVE-2025-0806,0,0,63789275155e2cb6d61f78901228ddd7e3f84f850b2c23e9990e2498d31506
|
||||
CVE-2025-0807,0,0,b2b4a656f12e3489fcf4f75fde2be79c69ec60017aed129cff51589f1fe4b103,2025-03-22T07:15:24.260000
|
||||
CVE-2025-0808,0,0,34819144543e17250a94a4955db1783a3aae066b6eee10149bf1493d78d1e0ba,2025-02-25T03:55:57.003000
|
||||
CVE-2025-0809,0,0,886fb9b396d2aad5cff53c02349fc0fee570a4920d4c4e68da65e25a660a34b2,2025-01-31T06:15:29.933000
|
||||
CVE-2025-0810,1,1,f2f4d1e082015ea51ac9b54c4df8a63ee3baf576db1349ac0c5b5d0ec8d27098,2025-04-05T02:15:15.140000
|
||||
CVE-2025-0811,0,0,3759c7e52916198b124afd7e526b63fb0d2f310290219135bcf2e8fb2a87bc53,2025-03-27T16:45:12.210000
|
||||
CVE-2025-0813,0,0,2db4834d418da2e868d6f469a207de037cce3d1cf22a140eda0d89a2b4da14df,2025-03-12T16:15:20.183000
|
||||
CVE-2025-0814,0,0,275433a2e2c23056d581480e8763e8e9197d76ff67d734aa21e397b5cac2bf6a,2025-02-13T07:15:10.973000
|
||||
@ -282102,7 +282104,7 @@ CVE-2025-1491,0,0,2c68d92a6f55bf529fa37ef19f65078661a466e3bd99edb0dd7d2a7b0419f2
|
||||
CVE-2025-1492,0,0,b9223b4db500ae771be5ddc029bc738cd0c9e1261ad47ff66314ecd9bf92d1b3,2025-02-20T02:15:38.553000
|
||||
CVE-2025-1496,0,0,00b701fe7bc2e4f39ec7ac2812437dabb31dde7416d14a43308b75ca4d34e495,2025-03-20T14:15:22.920000
|
||||
CVE-2025-1497,0,0,7d02ef7499053e50d8ad89d76099a7d293753bcfe1045929e1a08d34bb3acdae,2025-03-24T18:46:13.367000
|
||||
CVE-2025-1500,1,1,dcd5011d60876332630bb48dff1042eb265608cd51b2d8c03e8e8bb9695b5a52,2025-04-05T01:15:42
|
||||
CVE-2025-1500,0,0,dcd5011d60876332630bb48dff1042eb265608cd51b2d8c03e8e8bb9695b5a52,2025-04-05T01:15:42
|
||||
CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000
|
||||
CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9d3,2025-03-13T05:15:24.917000
|
||||
CVE-2025-1504,0,0,63c59f8b26cf8b21f0390a21fa6fac2c1c23d38ed0b94a4990b2f1de80d8483e,2025-03-24T18:27:10.747000
|
||||
@ -283745,7 +283747,7 @@ CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3
|
||||
CVE-2025-2245,0,0,a9ff9699ae5a41975d2184fc91caaffa9dfd762f8ebe8ce30741f7eef46a88f6,2025-04-04T10:15:16.740000
|
||||
CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
|
||||
CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000
|
||||
CVE-2025-22457,0,1,43cc3b0988fd78cd00211e228df2e73a7b4a75544cecc0bddfcf8b3ddb9bdddf,2025-04-03T16:15:35.370000
|
||||
CVE-2025-22457,0,0,43cc3b0988fd78cd00211e228df2e73a7b4a75544cecc0bddfcf8b3ddb9bdddf,2025-04-03T16:15:35.370000
|
||||
CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
|
||||
CVE-2025-22472,0,0,da7c2c2731a1940c60b4ae6c1edcbbf175ca5a2d3964a03701282be7a86cbe41,2025-03-17T18:15:20.930000
|
||||
CVE-2025-22473,0,0,24aeaee52dbfb2b3f71ea7cd4512b20455b60139bbfda5acf051e65598986ddc,2025-03-17T18:15:21.077000
|
||||
@ -285896,6 +285898,7 @@ CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0ed
|
||||
CVE-2025-25429,0,0,a95bef6ecb2c9e9037f1ebf79f87a2b0c7101933c3f64e22cf3f921f022ed0ed,2025-02-28T23:15:10.903000
|
||||
CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000
|
||||
CVE-2025-25431,0,0,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000
|
||||
CVE-2025-2544,1,1,d8b534f6a9de64f11363eac4b250720e17ee9cf0a6782994020db6148051f5c9,2025-04-05T02:15:15.307000
|
||||
CVE-2025-25450,0,0,e3ddffa39d860b594bb74ab98ef16e7416f14ecc887f5721e7943e1b1d73ce80,2025-03-07T17:15:21.640000
|
||||
CVE-2025-25451,0,0,4c60686324e8dfbebc3bac09932f9dca9715cd901e8b055c1d7eb1acd46fa78d,2025-03-07T17:15:21.803000
|
||||
CVE-2025-25452,0,0,f8ac00e705c69600b7bd756ffd6640407ab44891503ee6108f0e991980324498,2025-03-07T17:15:21.947000
|
||||
@ -287157,7 +287160,7 @@ CVE-2025-28885,0,0,bcaf9c42e10ccff4d56f81fc7722ea247bf8a733f08f824c9662923ba239a
|
||||
CVE-2025-28886,0,0,8829096276344aa5296745d321667067925dd057c12550ef0a399cb1c9566caa,2025-03-11T21:15:46.113000
|
||||
CVE-2025-28887,0,0,57bd8f01d02ed8afd5599ea32c65ee4847f50f38cef546351412e6715f07165d,2025-03-11T21:15:46.270000
|
||||
CVE-2025-28889,0,0,732c22dbcd124786284c91a1d934fea11c90f1310342dd8b73b00ffff26c19da,2025-03-27T16:45:27.850000
|
||||
CVE-2025-2889,1,1,2b8634441a09b229c7a1d292815f332ea11180a684b0f330efc2fbed9fe63456,2025-04-05T00:15:15.287000
|
||||
CVE-2025-2889,0,0,2b8634441a09b229c7a1d292815f332ea11180a684b0f330efc2fbed9fe63456,2025-04-05T00:15:15.287000
|
||||
CVE-2025-28890,0,0,4a332fde3e2ea608ea5eb36fa4d3f0981ec81767d5f2cf4ce855cdc2b6daff5f,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28891,0,0,a1b5bb5f2f1783066a2dc188201e0fee55eed7b8b66d4a435f23c2884b26ac7b,2025-03-11T21:15:46.420000
|
||||
CVE-2025-28892,0,0,8aa9cbc46d03648f41dcf59189028804e3b767a8c273cd789a68b3e54bc7fd91,2025-03-11T21:15:46.570000
|
||||
@ -287275,6 +287278,7 @@ CVE-2025-29313,0,0,36b5dfbaccdc259f2b52ceac76431ece1292ff6ced8c88ea82c0057012874
|
||||
CVE-2025-29314,0,0,68cd136edb649d9eb6aec698b8b31c836ad747d7f35cb5e1d05f8aa177ad8f88,2025-03-27T16:45:46.410000
|
||||
CVE-2025-29315,0,0,f907f053863754eafc89ac11a469f54443f6b549eee8182288b1596f75ccbd29,2025-03-27T16:45:46.410000
|
||||
CVE-2025-29322,0,0,49a1d4b12734a52d0fc52efc2251e56869705778ed4bdca3f12b7fdef8a41f85,2025-03-27T16:45:27.850000
|
||||
CVE-2025-2933,1,1,800ebeae8689c0d094efe612a5bd9c532ad416735da85f7540537dee6c383426,2025-04-05T02:15:15.477000
|
||||
CVE-2025-29357,0,0,eb014a723aa009227f0255b17dfaab32ae69c018e0a2e5c6777057d80a0cac3f,2025-04-02T20:33:45.110000
|
||||
CVE-2025-29358,0,0,610f6132677edbf66dfcad4906cefbaf7edab86ba5e1c4ae5ea8eda11e0df66d,2025-04-02T20:33:25.387000
|
||||
CVE-2025-29359,0,0,bc55d7beb5c2520d4a35b3c9d88ad54b81653c8af5ca4e66e75dd78808d6a6dd,2025-04-02T20:33:36.983000
|
||||
@ -287989,7 +287993,7 @@ CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb
|
||||
CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000
|
||||
CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000
|
||||
CVE-2025-31160,0,0,c6ed6d0cefcf860ce239e0955556eee41726f134fd4b83b02d780bf30460df3c,2025-03-31T13:15:46.050000
|
||||
CVE-2025-31161,0,1,31ce1d1c0f1506c2c2dddc897b8bc45aea29e21aeae54f317466f0652eacf801,2025-04-03T20:15:25.373000
|
||||
CVE-2025-31161,0,1,7b55c3b1b2723a8e32f14165a4514c66bc148c5ca047222c08e6f157d1d4a6e4,2025-04-05T01:15:42.360000
|
||||
CVE-2025-31162,0,0,cfeafc9944d79e10529164231b0943be3a87194c4053baabeebe9b961989cbf3,2025-04-01T20:26:39.627000
|
||||
CVE-2025-31163,0,0,0d23fc46a79319324af9251b76f99e828668eada4156c0f4488a35318beebb85,2025-04-01T20:26:39.627000
|
||||
CVE-2025-31164,0,0,4b001c140896288467c92c772e2ebf8f58e53bdc0e31f0e36dc064cef4c67cc1,2025-04-01T20:26:39.627000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user