mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2025-03-27T03:00:19.573269+00:00
This commit is contained in:
parent
a3e42bceb9
commit
d30a31a4b4
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-9874",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-05-31T21:29:06.123",
|
||||
"lastModified": "2025-03-26T19:15:14.580",
|
||||
"lastModified": "2025-03-27T01:00:02.327",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -86,6 +86,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-03-26",
|
||||
"cisaActionDue": "2025-04-16",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-9875",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-05-31T21:29:06.187",
|
||||
"lastModified": "2025-03-26T19:15:14.797",
|
||||
"lastModified": "2025-03-27T01:00:02.343",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -86,6 +86,10 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"cisaExploitAdd": "2025-03-26",
|
||||
"cisaActionDue": "2025-04-16",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
||||
"cisaVulnerabilityName": "Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-6572",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2021-01-14T21:15:13.693",
|
||||
"lastModified": "2025-02-05T14:34:59.820",
|
||||
"lastModified": "2025-03-27T01:00:02.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -87,7 +87,7 @@
|
||||
"cisaExploitAdd": "2022-01-10",
|
||||
"cisaActionDue": "2022-07-10",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Google Chrome Media Prior to 81.0.4044.92 Use-After-Free Vulnerability",
|
||||
"cisaVulnerabilityName": "Google Chrome Media Use-After-Free Vulnerability",
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12810",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T12:15:13.483",
|
||||
"lastModified": "2025-03-14T12:15:13.483",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-27T01:33:31.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,50 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:chimpgroup:jobcareer:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "7.1",
|
||||
"matchCriteriaId": "FBA58D67-D1AE-40A0-8419-F20AFBA49D13"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/jobcareer-job-board-responsive-wordpress-theme/14221636",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/24889552-0db6-44e6-9b12-f31b5e92a42e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,19 +2,43 @@
|
||||
"id": "CVE-2024-13737",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-22T03:15:11.817",
|
||||
"lastModified": "2025-03-22T03:15:11.817",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-03-27T00:56:46.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Motors \u2013 Car Dealer, Classifieds & Listing plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability checks on the motors_create_template and motors_delete_template functions in all versions up to, and including, 1.4.57. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts or create listing templates. This issue requires Elementor plugin to be installed, which is a required plugin for Motors Starter Theme."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Motors \u2013 Car Dealer, Classifieds & Listing para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de comprobaciones de capacidad en las funciones motors_create_template y motors_delete_template en todas las versiones hasta la 1.4.57 incluida. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, eliminen publicaciones arbitrarias o creen plantillas de listados. Este problema requiere la instalaci\u00f3n del complemento Elementor, un complemento obligatorio para el tema Motors Starter."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -45,24 +69,64 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:stylemixthemes:motors_-_car_dealer\\,_classifieds_\\&_listing:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.4.58",
|
||||
"matchCriteriaId": "3CF25D5D-01F6-408D-9333-387441003525"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/motors-car-dealership-classified-listings/tags/1.4.52/includes/class/Features/Elementor/Nuxy/TemplateManager.php#L149",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/motors-car-dealership-classified-listings/tags/1.4.52/includes/class/Features/Elementor/Nuxy/TemplateManager.php#L191",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3250931/motors-car-dealership-classified-listings/trunk/includes/class/Features/Elementor/Nuxy/TemplateManager.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/04fd2d7a-fa75-4b9d-9514-5c24ca5ebc22?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13771",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T12:15:13.693",
|
||||
"lastModified": "2025-03-14T12:15:13.693",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-27T01:27:47.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,50 @@
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yxper:civi:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.1.4",
|
||||
"matchCriteriaId": "19C5762D-DE48-4FCA-A5A0-117E5B29D7C2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://localhost:1337/wp-content/themes/civi/includes/class-ajax.php#L715",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5ab2c74d-b83b-40ea-951c-83aeb76a7515?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13772",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T12:15:13.907",
|
||||
"lastModified": "2025-03-14T12:15:13.907",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-27T01:22:24.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,20 +69,57 @@
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yxper:civi:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.1.4",
|
||||
"matchCriteriaId": "19C5762D-DE48-4FCA-A5A0-117E5B29D7C2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://localhost:1337/wp-content/themes/civi/includes/class-ajax.php#L567",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://localhost:1337/wp-content/themes/civi/includes/class-ajax.php#L739",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bf04f458-7900-4dd3-84fb-169b74db97ab?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13773",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T12:15:14.100",
|
||||
"lastModified": "2025-03-14T12:15:14.100",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-27T01:07:51.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,50 @@
|
||||
"value": "CWE-321"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:uxper:civi:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.1.4",
|
||||
"matchCriteriaId": "FF63574D-F8E6-4F90-8397-9E27E3E7239A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://localhost:1337/wp-content/themes/civi/includes/class-init.php#L36",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3499182-7501-4fec-a7c6-b66ae47533cd?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-453xx/CVE-2024-45352.json
Normal file
56
CVE-2024/CVE-2024-453xx/CVE-2024-45352.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45352",
|
||||
"sourceIdentifier": "security@xiaomi.com",
|
||||
"published": "2025-03-27T02:15:15.873",
|
||||
"lastModified": "2025-03-27T02:15:15.873",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An code execution vulnerability exists in the Xiaomi smarthome application product. The vulnerability is caused by improper input validation and can be exploited by attackers to execute malicious code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@xiaomi.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@xiaomi.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=550",
|
||||
"source": "security@xiaomi.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1507",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-14T09:15:14.477",
|
||||
"lastModified": "2025-03-14T09:15:14.477",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-27T01:35:44.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,50 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sharethis:dashboard_for_google_analytics:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.2.2",
|
||||
"matchCriteriaId": "1BCC768D-1A1A-4A70-9F14-BD37CCC5351F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3255511/googleanalytics/trunk/class/core/class-ga-controller-core.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/314b8638-15e7-461d-a705-3858fe6813e7?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-24xx/CVE-2025-2481.json
Normal file
64
CVE-2025/CVE-2025-24xx/CVE-2025-2481.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-2481",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-27T02:15:16.053",
|
||||
"lastModified": "2025-03-27T02:15:16.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MediaView plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018id' parameter in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/mediaview/tags/1.1.2/inc/forms/addMedia.inc.php#L48",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/mediaview/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca2d687f-0358-4642-849b-100bf40cbbf1?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-303xx/CVE-2025-30355.json
Normal file
64
CVE-2025/CVE-2025-303xx/CVE-2025-30355.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-30355",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-27T01:15:12.500",
|
||||
"lastModified": "2025-03-27T01:15:12.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Synapse is an open source Matrix homeserver implementation. A malicious server can craft events which, when received, prevent Synapse version up to 1.127.0 from federating with other servers. The vulnerability has been exploited in the wild and has been fixed in Synapse v1.127.1. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/element-hq/synapse/commit/2277df2a1eb685f85040ef98fa21d41aa4cdd389",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/element-hq/synapse/releases/tag/v1.127.1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/element-hq/synapse/security/advisories/GHSA-v56r-hwv5-mxg6",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-31160",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-26T21:15:23.323",
|
||||
"lastModified": "2025-03-26T21:15:23.323",
|
||||
"lastModified": "2025-03-27T02:15:16.217",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -63,6 +63,10 @@
|
||||
{
|
||||
"url": "https://rachelbythebay.com/w/2025/03/26/atop/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/03/26/3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
33
README.md
33
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-27T00:55:19.297249+00:00
|
||||
2025-03-27T03:00:19.573269+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-27T00:51:56.443000+00:00
|
||||
2025-03-27T02:15:16.217000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,33 +27,38 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2025-03-26T01:00:04.406672+00:00
|
||||
2025-03-27T01:00:04.481729+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
286738
|
||||
286741
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2025-20230](CVE-2025/CVE-2025-202xx/CVE-2025-20230.json) (`2025-03-26T23:15:18.140`)
|
||||
- [CVE-2025-2496](CVE-2025/CVE-2025-24xx/CVE-2025-2496.json) (`2025-03-26T23:15:18.717`)
|
||||
- [CVE-2024-45352](CVE-2024/CVE-2024-453xx/CVE-2024-45352.json) (`2025-03-27T02:15:15.873`)
|
||||
- [CVE-2025-2481](CVE-2025/CVE-2025-24xx/CVE-2025-2481.json) (`2025-03-27T02:15:16.053`)
|
||||
- [CVE-2025-30355](CVE-2025/CVE-2025-303xx/CVE-2025-30355.json) (`2025-03-27T01:15:12.500`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `6`
|
||||
Recently modified CVEs: `10`
|
||||
|
||||
- [CVE-2024-13739](CVE-2024/CVE-2024-137xx/CVE-2024-13739.json) (`2025-03-27T00:51:56.443`)
|
||||
- [CVE-2025-0723](CVE-2025/CVE-2025-07xx/CVE-2025-0723.json) (`2025-03-27T00:47:32.027`)
|
||||
- [CVE-2025-0724](CVE-2025/CVE-2025-07xx/CVE-2025-0724.json) (`2025-03-27T00:43:04.040`)
|
||||
- [CVE-2025-1408](CVE-2025/CVE-2025-14xx/CVE-2025-1408.json) (`2025-03-27T00:38:34.650`)
|
||||
- [CVE-2025-1488](CVE-2025/CVE-2025-14xx/CVE-2025-1488.json) (`2025-03-27T00:25:37.117`)
|
||||
- [CVE-2025-2625](CVE-2025/CVE-2025-26xx/CVE-2025-2625.json) (`2025-03-27T00:36:50.850`)
|
||||
- [CVE-2019-9874](CVE-2019/CVE-2019-98xx/CVE-2019-9874.json) (`2025-03-27T01:00:02.327`)
|
||||
- [CVE-2019-9875](CVE-2019/CVE-2019-98xx/CVE-2019-9875.json) (`2025-03-27T01:00:02.343`)
|
||||
- [CVE-2020-6572](CVE-2020/CVE-2020-65xx/CVE-2020-6572.json) (`2025-03-27T01:00:02.343`)
|
||||
- [CVE-2024-12810](CVE-2024/CVE-2024-128xx/CVE-2024-12810.json) (`2025-03-27T01:33:31.260`)
|
||||
- [CVE-2024-13737](CVE-2024/CVE-2024-137xx/CVE-2024-13737.json) (`2025-03-27T00:56:46.017`)
|
||||
- [CVE-2024-13771](CVE-2024/CVE-2024-137xx/CVE-2024-13771.json) (`2025-03-27T01:27:47.273`)
|
||||
- [CVE-2024-13772](CVE-2024/CVE-2024-137xx/CVE-2024-13772.json) (`2025-03-27T01:22:24.920`)
|
||||
- [CVE-2024-13773](CVE-2024/CVE-2024-137xx/CVE-2024-13773.json) (`2025-03-27T01:07:51.827`)
|
||||
- [CVE-2025-1507](CVE-2025/CVE-2025-15xx/CVE-2025-1507.json) (`2025-03-27T01:35:44.843`)
|
||||
- [CVE-2025-31160](CVE-2025/CVE-2025-311xx/CVE-2025-31160.json) (`2025-03-27T02:15:16.217`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
39
_state.csv
39
_state.csv
@ -144212,8 +144212,8 @@ CVE-2019-9870,0,0,062347afaead72fa94abc21c33a5861fb0027ef274aac86f640300ed7ac52d
|
||||
CVE-2019-9871,0,0,ecbf9a2a46bdc0f0799295372974f7e4fb138b086b11240520c5e86a9feb2c22,2024-11-21T04:52:28.770000
|
||||
CVE-2019-9872,0,0,69dc93bfc540144bf7909b63e971badc086b537b667706e81f569fb276514791,2024-11-21T04:52:28.907000
|
||||
CVE-2019-9873,0,0,af140e2a7d17703fab34c4880c5a574af4e50539c38e7eb27174aef7f9fc441b,2024-11-21T04:52:29.043000
|
||||
CVE-2019-9874,0,0,f278bcedcedcccb57db2324e838ffa7e131be184b40b44a56b62534e4545bc47,2025-03-26T19:15:14.580000
|
||||
CVE-2019-9875,0,0,976b69589d1e5e922503851d7625e7b13858a8f34261a8fa42591bf69500dec1,2025-03-26T19:15:14.797000
|
||||
CVE-2019-9874,0,1,c9569a020600d75a3c9f21065f165bcd3dce6b7e37d729741e058561c4415a6a,2025-03-27T01:00:02.327000
|
||||
CVE-2019-9875,0,1,8927a1962705d95aba3b9def0b99201f2116c11ed2d06509e1e0f9b1e97ed7f3,2025-03-27T01:00:02.343000
|
||||
CVE-2019-9877,0,0,d70a742f8560436a6bad08feb159e670d666fe63a3e521d5e75ac5bb80ac8ee7,2024-11-21T04:52:29.453000
|
||||
CVE-2019-9878,0,0,92bf0deac9abf1727596d30937bb1d1dae4e81d73f4d0b1a0f322a153d61e024,2024-11-21T04:52:29.583000
|
||||
CVE-2019-9879,0,0,3bacaf9b0b5d86c2556ab398cef4a166e3cd91d22d54e6a93d8cb3b250b49a89,2024-11-21T04:52:29.720000
|
||||
@ -162014,7 +162014,7 @@ CVE-2020-6568,0,0,0d06ac2d74579c9841c223e03809605179c185b1cd93859e050e309f31fee0
|
||||
CVE-2020-6569,0,0,dd7acd9fc556b7b252c05b52dfba75961e01f6fda7326f72f03c9cb506d91b0e,2024-11-21T05:35:58.860000
|
||||
CVE-2020-6570,0,0,40c1c23d973add53721be1be2de9a2c4c86cb53d72938de93810d8529c9d0198,2024-11-21T05:35:58.973000
|
||||
CVE-2020-6571,0,0,735d3a790133bdd740d6dd33af2c2857cf73a47d1fede83582c7291195240a26,2024-11-21T05:35:59.090000
|
||||
CVE-2020-6572,0,0,b8f6ee92dca0543e9e2f2840374652f93e1883f5781a266a7e131cf96813b154,2025-02-05T14:34:59.820000
|
||||
CVE-2020-6572,0,1,dd6eeaf3dfffd36594e2861bfe85ecfea53f4aa9c565ab6d306516ada3746fb4,2025-03-27T01:00:02.343000
|
||||
CVE-2020-6573,0,0,7047a584fd32b6b671bfff5b08be624a4e9187010bd11257c53f2886f046384b,2024-11-21T05:35:59.293000
|
||||
CVE-2020-6574,0,0,303ad55fcb736769f4cf9ea3ed4a390f8f37dd9323d86dff170695ea9dcaf2bf,2024-11-21T05:35:59.420000
|
||||
CVE-2020-6575,0,0,62024afcd971a1d42c6d1ce843a96019408fb91a7a5f300a21805d0cdf3b1172,2024-11-21T05:35:59.543000
|
||||
@ -247129,7 +247129,7 @@ CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5d
|
||||
CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000
|
||||
CVE-2024-12807,0,0,1d134b4e10fd5c2df6e8d1acfd31e14ba142e002cf7d83d94986fb0c56cb2884,2025-01-28T16:15:37.633000
|
||||
CVE-2024-12809,0,0,612259b2cda97c5061140929bc611da24ff06e8922b144348f21ead0b174d40b,2025-03-07T07:15:21.380000
|
||||
CVE-2024-12810,0,0,656319f0c1d950287dd9c2c0a962cf9d1926e3064823bc7d730d0540dd1ee5ed,2025-03-14T12:15:13.483000
|
||||
CVE-2024-12810,0,1,9bbffebac38110592c1786faed3007af91859a7eb270b29f500e0f7471999e10,2025-03-27T01:33:31.260000
|
||||
CVE-2024-12811,0,0,cbebe7e51738cd8bd29e461cde6a0001affb6783b830fde9fb7108c4a80fc1a2,2025-02-28T00:15:35.790000
|
||||
CVE-2024-12813,0,0,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000
|
||||
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
|
||||
@ -248054,8 +248054,8 @@ CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df0
|
||||
CVE-2024-13734,0,0,17fab3f74e78896a40ac1961915d61db429551aa26d55adeda206fce66c88861,2025-03-11T15:55:48.603000
|
||||
CVE-2024-13735,0,0,3547c31c6d72f19019bc47ce66440b94aad2dbe68a07077b91d9f59acae687cd,2025-02-25T03:45:15.060000
|
||||
CVE-2024-13736,0,0,3362a69c50f09f93ac1b8892771db3d9d5410b27ce15edc8013225c7425828fe,2025-03-06T15:08:38
|
||||
CVE-2024-13737,0,0,91ea646ae02a7e4936ac7cfebde601dcc3026e4694e4b1129db4d267dc39e06b,2025-03-22T03:15:11.817000
|
||||
CVE-2024-13739,0,1,bfdb9f2fe55c8ac00c8481b32b628ed6835cb3ca616f5bee1128858a8562c075,2025-03-27T00:51:56.443000
|
||||
CVE-2024-13737,0,1,3a0a6a4e9311e69c694504178165fb386a940d8fbd4d83c8600dd61fd4e2edef,2025-03-27T00:56:46.017000
|
||||
CVE-2024-13739,0,0,bfdb9f2fe55c8ac00c8481b32b628ed6835cb3ca616f5bee1128858a8562c075,2025-03-27T00:51:56.443000
|
||||
CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000
|
||||
CVE-2024-13740,0,0,7ff99f97d425424bdc9a3d1a435df988f74877e53c6e3d16169a71dec8c37f3b,2025-02-24T12:41:27.353000
|
||||
CVE-2024-13741,0,0,78f05de9655a03d53c2e8400793bb4a26c0069c47279ba1e219e404df9296757,2025-02-24T12:40:05.483000
|
||||
@ -248078,9 +248078,9 @@ CVE-2024-13768,0,0,65f9efb98da5492354189d6fbc823165fa39f9d576ed31c97572c09ab668b
|
||||
CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000
|
||||
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
|
||||
CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000
|
||||
CVE-2024-13771,0,0,cdaaea26999597a164e794f37f237495307c416fc6683b91a7d8e44a7dfd735e,2025-03-14T12:15:13.693000
|
||||
CVE-2024-13772,0,0,68c85172f5abc0595bafc29bd3adf761cbc19e24d352b2baff8f0418a2fb4f64,2025-03-14T12:15:13.907000
|
||||
CVE-2024-13773,0,0,98abde340802ac38cf7be385460f05a09da634a3392e472fd7fb5dc00b2af80d,2025-03-14T12:15:14.100000
|
||||
CVE-2024-13771,0,1,949738633d703300748648fb69f661517bd96978bb56c94eead1be99afb2462f,2025-03-27T01:27:47.273000
|
||||
CVE-2024-13772,0,1,e18724330a936d4d790bad539c0685998ca571e65ae4da14273706ffc70edac4,2025-03-27T01:22:24.920000
|
||||
CVE-2024-13773,0,1,acdd0a13ab662eb153e0e047745f468f0c691fa835346ca4efc9e7240c863343,2025-03-27T01:07:51.827000
|
||||
CVE-2024-13774,0,0,7926f46cbbe245fc4b69a913b305cdf8d086f57fe42cd5293333d393cb9ec93a,2025-03-12T17:01:06.413000
|
||||
CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
|
||||
CVE-2024-13777,0,0,e95e92048e929c187fcb10d876bc7666966c67f194b150a2f5d7dbd9a477d6cc,2025-03-05T10:15:15.367000
|
||||
@ -268424,6 +268424,7 @@ CVE-2024-45346,0,0,556b0325369db812da5d3ca351593663eeefcc15146e049af11d00d6b0f23
|
||||
CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000
|
||||
CVE-2024-4535,0,0,78f0543f36f54882e03e81f0faf12704615c89d5497f070efb8f0b2a49e7c790,2025-03-25T15:15:23.147000
|
||||
CVE-2024-45351,0,0,9798bc02eb0ba83db1ec479e2565390e6f6e7ab4d219551bf7245075b78bfee8,2025-03-26T14:15:31.457000
|
||||
CVE-2024-45352,1,1,de7c306e0645174ec78d434495a14130b165ebf334e095efc8cf412f3b8d78ad,2025-03-27T02:15:15.873000
|
||||
CVE-2024-4536,0,0,d554a9fba63153c422b87ae2d4b0219537ca1cbc00fd943074006c5d6a843426,2025-02-06T17:32:48.777000
|
||||
CVE-2024-45366,0,0,d13f4b03dcbe654ea752888fe69e44580333b063ff67391732408feaba64beb9,2024-11-05T22:35:10.920000
|
||||
CVE-2024-45367,0,0,64e84bc9ed60e849e1ae71705aae4a59b4ff0cb910f064adb8ff87e0d48d255e,2024-10-04T13:50:43.727000
|
||||
@ -281341,8 +281342,8 @@ CVE-2025-0719,0,0,44927ec8b6afaf34270843fd13dbd3ba0f3f99ce1ef23ab7a0954a7b4854cf
|
||||
CVE-2025-0720,0,0,bf163c74b4e9e0ae1d92684788b595f2199f607068d51d6135d379966c283462,2025-01-26T23:15:21.547000
|
||||
CVE-2025-0721,0,0,a17c1b763dfbd45aa4203f0e8b4c3b1bd0f0a61d080bea2c50ad8ff161e60eaa,2025-02-25T20:28:55.787000
|
||||
CVE-2025-0722,0,0,c9c24be950ff93b5151cdab68af4eb0f25cca0b4d685aeadd762fbc951dbdf6d,2025-02-25T20:12:27.810000
|
||||
CVE-2025-0723,0,1,fc347c0264458ce32ef778e91bbf5b267b6a011b8adff9a119fdfa39ff2d2f1a,2025-03-27T00:47:32.027000
|
||||
CVE-2025-0724,0,1,f2bb8a19f6ffdf91751bf1b82d06f67d543d99788cfccbc66204d45f84c783f6,2025-03-27T00:43:04.040000
|
||||
CVE-2025-0723,0,0,fc347c0264458ce32ef778e91bbf5b267b6a011b8adff9a119fdfa39ff2d2f1a,2025-03-27T00:47:32.027000
|
||||
CVE-2025-0724,0,0,f2bb8a19f6ffdf91751bf1b82d06f67d543d99788cfccbc66204d45f84c783f6,2025-03-27T00:43:04.040000
|
||||
CVE-2025-0725,0,0,ef1920cda444939d67fecb4a1c9b571c4d38e3bc4bcb5bd151f156910c1fc4af,2025-03-07T01:15:12.403000
|
||||
CVE-2025-0726,0,0,739ea1d1541d6b26153a964e4e4136a3057eaa8274a2f66ba7a27171ffa2b087,2025-02-21T08:15:28.417000
|
||||
CVE-2025-0727,0,0,89665f1801b7a5f4bd56958ba24239f6773c6fef24507ea8f637acdf839ad9ca,2025-02-21T09:15:09.010000
|
||||
@ -281806,7 +281807,7 @@ CVE-2025-1404,0,0,f39be30144b0a5fe80b4b94433169bbe79b568debe0e45a11fa0a8302ed0e6
|
||||
CVE-2025-1405,0,0,9d1939e7603fe8cd2a4a6b659e6149cd03308d08f69102d0905681145b4d879a,2025-03-06T17:57:54.597000
|
||||
CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408ec,2025-02-25T03:38:24.303000
|
||||
CVE-2025-1407,0,0,81ebc501504f4e0e97111e960151a7a649f1ecbd9d904ea14ecfe9745b475037,2025-02-25T03:37:32.347000
|
||||
CVE-2025-1408,0,1,33729df59b0d7d7394a477a15b75618faa0c0ce930ca4b1fe624ec562a8f8bb2,2025-03-27T00:38:34.650000
|
||||
CVE-2025-1408,0,0,33729df59b0d7d7394a477a15b75618faa0c0ce930ca4b1fe624ec562a8f8bb2,2025-03-27T00:38:34.650000
|
||||
CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3da0,2025-02-25T03:35:42.633000
|
||||
CVE-2025-1412,0,0,15006068dde5667dc534d1c6a1b910fc18a441695fc7fe8438811af885c4587d,2025-02-24T08:15:09.890000
|
||||
CVE-2025-1413,0,0,5c3f38d9cc7b7010909c2af97131be7654555b0227082bf07ca01df8093ffd5a,2025-03-26T16:15:20.833000
|
||||
@ -281852,7 +281853,7 @@ CVE-2025-1481,0,0,d10660ccfc75afffd9cc52715a6e9675c63c4f59ae92c95b59ff9bb03291f5
|
||||
CVE-2025-1483,0,0,eed3d83cb2da5908d92aa9dd620a120571071c04f49e7599dc48ec4179593bf0,2025-02-25T18:59:39.860000
|
||||
CVE-2025-1486,0,0,a85cea9be2475178530e87928bf3624b11a53f46d4074abad230f2e740ad42a2,2025-03-14T16:15:40.020000
|
||||
CVE-2025-1487,0,0,8f772af05106acb51f792dc9fd2468ed15c6e79faf910ab3115c5b2004861341,2025-03-14T16:15:40.263000
|
||||
CVE-2025-1488,0,1,41db8f13bdc7bcc4795270a365123a77f5c2866e92341d8e17a3cfe430cb556b,2025-03-27T00:25:37.117000
|
||||
CVE-2025-1488,0,0,41db8f13bdc7bcc4795270a365123a77f5c2866e92341d8e17a3cfe430cb556b,2025-03-27T00:25:37.117000
|
||||
CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
|
||||
CVE-2025-1490,0,0,7aff13ba0cf6167c4f44d1a93b4f6f09fdf518d04ba9c05a1bfda108f45e69c2,2025-03-26T03:15:12.257000
|
||||
CVE-2025-1491,0,0,2c68d92a6f55bf529fa37ef19f65078661a466e3bd99edb0dd7d2a7b0419f292,2025-03-01T13:15:10.750000
|
||||
@ -281864,7 +281865,7 @@ CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9
|
||||
CVE-2025-1504,0,0,63c59f8b26cf8b21f0390a21fa6fac2c1c23d38ed0b94a4990b2f1de80d8483e,2025-03-24T18:27:10.747000
|
||||
CVE-2025-1505,0,0,941d3b1ae0c992e2675a622234390037253a212a5d42d0d53217112bc5422121,2025-03-06T20:36:32.810000
|
||||
CVE-2025-1506,0,0,0f896eaadc8a073897781bc944e7b39e9f71c9b2af47691e38ab32de0cbb6c36,2025-03-06T18:54:45.667000
|
||||
CVE-2025-1507,0,0,872e5d0051c754ea1da921e998df796aaff631375a1c1188b3777eb8a7089f8b,2025-03-14T09:15:14.477000
|
||||
CVE-2025-1507,0,1,1d81dcd81d7714294007126db512dbf0cb7786fda01d7c32c2cb46eeed18f5a8,2025-03-27T01:35:44.843000
|
||||
CVE-2025-1508,0,0,ec65239dbe7ffdef1a707b5ab0a34ed1dc416b8a5207f584ccfbef8fe7fc9ef6,2025-03-20T13:57:41.123000
|
||||
CVE-2025-1509,0,0,dd42a33d90057770cc0fff8a787b9ce6f9b83b6dcef0adadc46d0dded06e7aa0,2025-03-06T15:12:33.540000
|
||||
CVE-2025-1510,0,0,908b98a8ee37341a28713a06694a08e53c25ab91ce664e9dcc93619135ea532a,2025-03-06T15:13:33.280000
|
||||
@ -282282,7 +282283,7 @@ CVE-2025-20227,0,0,d1b36269aa38bebe9ffa99eea71229438ae60f3825a078c1bc230c163671a
|
||||
CVE-2025-20228,0,0,4446133807a3ae7b2bb656ae3e0e08b6ee4043eae2ae61688d170c5183eb64fd,2025-03-26T22:15:14.783000
|
||||
CVE-2025-20229,0,0,4348d2eef38de5617eec01087ff06194c697dbf41d9d265656e32ffa8cd1224b,2025-03-26T22:15:14.933000
|
||||
CVE-2025-2023,0,0,9d8a0c8afba74bf520f5f7eb676dec70441b9e51aafb2c8702891c86f922f3db,2025-03-11T21:15:53.890000
|
||||
CVE-2025-20230,1,1,edc7ae2dc1da378489a4efa496562a72db2c63438ff4fb98aa91af7fde62669d,2025-03-26T23:15:18.140000
|
||||
CVE-2025-20230,0,0,edc7ae2dc1da378489a4efa496562a72db2c63438ff4fb98aa91af7fde62669d,2025-03-26T23:15:18.140000
|
||||
CVE-2025-20231,0,0,36b0bbd8a6f31d9e709cc4e7fcfee4b1e81809774f85d4fa0eb1ab0c6b370dbe,2025-03-26T22:15:15.083000
|
||||
CVE-2025-20232,0,0,c79ab64cfa2ee087bccad90da679c4f27434f59c3bbd1bb3fd6b3f78c9515053,2025-03-26T22:15:15.233000
|
||||
CVE-2025-20233,0,0,0ca5a93c39d1b1f07be6545c2008fa26fb56fc7d1dee101512d7754d74c0bb95,2025-03-26T22:15:15.390000
|
||||
@ -284936,6 +284937,7 @@ CVE-2025-24805,0,0,ec139300c8aba94d67e6328d56741782b279b0f8fae86fc167a59b6e24537
|
||||
CVE-2025-24806,0,0,09fa1e87d8fedd5d28ff5cb9bac6bc7267715c2451739d08475197db5a3aa60a,2025-02-19T18:15:24.467000
|
||||
CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2f91,2025-02-21T15:26:57.507000
|
||||
CVE-2025-24808,0,0,eb8c03a85e5a0b4334ba1721c4f793b5b4f69a07bcb40be207ceebe068e6f853,2025-03-26T15:16:07.630000
|
||||
CVE-2025-2481,1,1,c670ab5414c9b50b45c90dccf21b7f800c9d25c4c2c263f1f02a0d8e9b956377,2025-03-27T02:15:16.053000
|
||||
CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000
|
||||
CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000
|
||||
CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000
|
||||
@ -285012,7 +285014,7 @@ CVE-2025-24956,0,0,915adf46e5e8d613d503b5df374b84b9ffba9c57344980265efed54c45eaf
|
||||
CVE-2025-24957,0,0,caab3bc6d07aaaaaeb40190f59933fb518192f43d9ea569cde48752d4b2b9c97,2025-02-13T18:59:32.867000
|
||||
CVE-2025-24958,0,0,0ae446ece37f4692f130ad0dc256efa2fd5d1fe74929c7d4ebe10575dc57a55a,2025-02-13T18:58:56.320000
|
||||
CVE-2025-24959,0,0,2de44d419e6f6c532d54e8f44d0d8ab712680ae78e9e829a5355527c77017682,2025-02-03T21:15:15.853000
|
||||
CVE-2025-2496,1,1,5b83542cf3c2f846ac57f5cb4e35f704d4ec88e2e1ed6b53606010521ed951d4,2025-03-26T23:15:18.717000
|
||||
CVE-2025-2496,0,0,5b83542cf3c2f846ac57f5cb4e35f704d4ec88e2e1ed6b53606010521ed951d4,2025-03-26T23:15:18.717000
|
||||
CVE-2025-24960,0,0,46fee619b683ed92da669f75d14549891da252b8bb2536b9cd7c3ffa3067f9ea,2025-02-03T21:15:16.020000
|
||||
CVE-2025-24961,0,0,c8f086fb8a69609031ffd104e29501872f3023eb9cfa127c706186138b229012,2025-02-03T21:15:16.170000
|
||||
CVE-2025-24962,0,0,c27baa0e8517616ac646630795e96db72c123b8c6070825c2a5d465571841885,2025-02-03T21:15:16.317000
|
||||
@ -285559,7 +285561,7 @@ CVE-2025-26216,0,0,fa35563faa6505245c7f05bc4878e14310c206fdd07c5771663544280eaa7
|
||||
CVE-2025-2622,0,0,939dbf3f462db5138e7efc1c25b4df44dcefcad147219dc69a16d470f7cab4df,2025-03-26T18:38:53.113000
|
||||
CVE-2025-2623,0,0,3ab5fa7d579e15ca810445905623b237691afeb5371061b93ec95908d3457f2d,2025-03-26T18:29:45.483000
|
||||
CVE-2025-2624,0,0,46e23f80f2c9d13a382050fe05c6fffb0c05ca1c0b64f7abbda428c5ccf88ddf,2025-03-26T18:26:27.147000
|
||||
CVE-2025-2625,0,1,a69b2a16e33cc77b4a32fd1909039df09919db2fa3840e12d206a48632ea57ae,2025-03-27T00:36:50.850000
|
||||
CVE-2025-2625,0,0,a69b2a16e33cc77b4a32fd1909039df09919db2fa3840e12d206a48632ea57ae,2025-03-27T00:36:50.850000
|
||||
CVE-2025-2626,0,0,2ec672e2fe0c1e79dfa3082efb3637c788281bb0a435927822d89abd613cd4eb,2025-03-24T13:15:26.627000
|
||||
CVE-2025-26260,0,0,d87498df9911f6ec3fcf716c1acf728dc302a17a13c2bad4d77a68a80619f6a0,2025-03-19T19:15:46.987000
|
||||
CVE-2025-26263,0,0,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a1719258e,2025-03-19T14:15:39.293000
|
||||
@ -286648,6 +286650,7 @@ CVE-2025-30350,0,0,fc6dfae9ed53f849f2c80ec7c33acba2fc43fe016314dc3b9c7a9bafc6032
|
||||
CVE-2025-30351,0,0,8c298fbc24349bf30fef1820a52621a7ea9c7b126c442b6cffbd5514a19bab95,2025-03-26T18:15:26.873000
|
||||
CVE-2025-30352,0,0,acace4f88241090f81090668d9b6b1228cf47971d34911ceaf508195b90eb4ac,2025-03-26T18:15:27.080000
|
||||
CVE-2025-30353,0,0,91060a041c779605c7d571039c263e57e127e0d08447255d79e2cb97ee12286f,2025-03-26T18:15:27.327000
|
||||
CVE-2025-30355,1,1,e8f7797b12bcd17931ea1a0b1fb9cba7219c4ef9c5b7f178a647716bbe7d4e02,2025-03-27T01:15:12.500000
|
||||
CVE-2025-30407,0,0,d8f56632a4d90f52f0afd91ca90b001309e11d692546c6b5c62e4f5dff058d63,2025-03-26T22:15:15.943000
|
||||
CVE-2025-30472,0,0,2ebab4b860069e7704c45b0afdbc37111cef0ce9e224a566e03ddd40410e1a00,2025-03-25T16:15:27.337000
|
||||
CVE-2025-30474,0,0,1e288c28c7a9253d8007962ed83d55ed1c6a50132909d1d77f3fa1d8a9ee1e62,2025-03-23T19:15:14.973000
|
||||
@ -286736,4 +286739,4 @@ CVE-2025-30621,0,0,5d4cdbcdb4b4fcd90b5f2b2106f218b95148d82610e047fabd8c26e50f6e3
|
||||
CVE-2025-30623,0,0,1d1d541570cee9e8bd680cf66c388813ad97d6b9db28e22b406d83cc5fc8feed,2025-03-24T14:15:34.797000
|
||||
CVE-2025-30741,0,0,7e28be04c44c5eca306e67e9d56487026b2aeeec1bb89000fe389b1b3e3b5fba,2025-03-25T21:15:43.527000
|
||||
CVE-2025-30742,0,0,82bfc8ccfda2836c34319d2240fc7c5a7c72b6e004211ac7d9c3d7d639962089,2025-03-26T05:15:40.593000
|
||||
CVE-2025-31160,0,0,a158eb6bf71a42388674830b7f777ec91009ae63360e0ad5b9e97435a4c71b33,2025-03-26T21:15:23.323000
|
||||
CVE-2025-31160,0,1,94bb3277cdc98903949beacfdd67b1cdce014e635915caadf67c778dc186a2c5,2025-03-27T02:15:16.217000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user