Auto-Update: 2025-03-27T03:00:19.573269+00:00

This commit is contained in:
cad-safe-bot 2025-03-27 03:03:50 +00:00
parent a3e42bceb9
commit d30a31a4b4
15 changed files with 589 additions and 68 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-9874",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-31T21:29:06.123",
"lastModified": "2025-03-26T19:15:14.580",
"lastModified": "2025-03-27T01:00:02.327",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -86,6 +86,10 @@
}
]
},
"cisaExploitAdd": "2025-03-26",
"cisaActionDue": "2025-04-16",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-9875",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-31T21:29:06.187",
"lastModified": "2025-03-26T19:15:14.797",
"lastModified": "2025-03-27T01:00:02.343",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -86,6 +86,10 @@
}
]
},
"cisaExploitAdd": "2025-03-26",
"cisaActionDue": "2025-04-16",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-6572",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-01-14T21:15:13.693",
"lastModified": "2025-02-05T14:34:59.820",
"lastModified": "2025-03-27T01:00:02.343",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -87,7 +87,7 @@
"cisaExploitAdd": "2022-01-10",
"cisaActionDue": "2022-07-10",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Google Chrome Media Prior to 81.0.4044.92 Use-After-Free Vulnerability",
"cisaVulnerabilityName": "Google Chrome Media Use-After-Free Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12810",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-14T12:15:13.483",
"lastModified": "2025-03-14T12:15:13.483",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-27T01:33:31.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chimpgroup:jobcareer:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "7.1",
"matchCriteriaId": "FBA58D67-D1AE-40A0-8419-F20AFBA49D13"
}
]
}
]
}
],
"references": [
{
"url": "https://themeforest.net/item/jobcareer-job-board-responsive-wordpress-theme/14221636",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/24889552-0db6-44e6-9b12-f31b5e92a42e?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,43 @@
"id": "CVE-2024-13737",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-22T03:15:11.817",
"lastModified": "2025-03-22T03:15:11.817",
"vulnStatus": "Received",
"lastModified": "2025-03-27T00:56:46.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Motors \u2013 Car Dealer, Classifieds & Listing plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability checks on the motors_create_template and motors_delete_template functions in all versions up to, and including, 1.4.57. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts or create listing templates. This issue requires Elementor plugin to be installed, which is a required plugin for Motors Starter Theme."
},
{
"lang": "es",
"value": "El complemento Motors \u2013 Car Dealer, Classifieds & Listing para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de comprobaciones de capacidad en las funciones motors_create_template y motors_delete_template en todas las versiones hasta la 1.4.57 incluida. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, eliminen publicaciones arbitrarias o creen plantillas de listados. Este problema requiere la instalaci\u00f3n del complemento Elementor, un complemento obligatorio para el tema Motors Starter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -45,24 +69,64 @@
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stylemixthemes:motors_-_car_dealer\\,_classifieds_\\&_listing:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.58",
"matchCriteriaId": "3CF25D5D-01F6-408D-9333-387441003525"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/motors-car-dealership-classified-listings/tags/1.4.52/includes/class/Features/Elementor/Nuxy/TemplateManager.php#L149",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/motors-car-dealership-classified-listings/tags/1.4.52/includes/class/Features/Elementor/Nuxy/TemplateManager.php#L191",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3250931/motors-car-dealership-classified-listings/trunk/includes/class/Features/Elementor/Nuxy/TemplateManager.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/04fd2d7a-fa75-4b9d-9514-5c24ca5ebc22?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13771",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-14T12:15:13.693",
"lastModified": "2025-03-14T12:15:13.693",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-27T01:27:47.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-288"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yxper:civi:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.4",
"matchCriteriaId": "19C5762D-DE48-4FCA-A5A0-117E5B29D7C2"
}
]
}
]
}
],
"references": [
{
"url": "http://localhost:1337/wp-content/themes/civi/includes/class-ajax.php#L715",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5ab2c74d-b83b-40ea-951c-83aeb76a7515?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13772",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-14T12:15:13.907",
"lastModified": "2025-03-14T12:15:13.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-27T01:22:24.920",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
@ -49,20 +69,57 @@
"value": "CWE-288"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yxper:civi:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.4",
"matchCriteriaId": "19C5762D-DE48-4FCA-A5A0-117E5B29D7C2"
}
]
}
]
}
],
"references": [
{
"url": "http://localhost:1337/wp-content/themes/civi/includes/class-ajax.php#L567",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://localhost:1337/wp-content/themes/civi/includes/class-ajax.php#L739",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bf04f458-7900-4dd3-84fb-169b74db97ab?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13773",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-14T12:15:14.100",
"lastModified": "2025-03-14T12:15:14.100",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-27T01:07:51.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-321"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:uxper:civi:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.4",
"matchCriteriaId": "FF63574D-F8E6-4F90-8397-9E27E3E7239A"
}
]
}
]
}
],
"references": [
{
"url": "http://localhost:1337/wp-content/themes/civi/includes/class-init.php#L36",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3499182-7501-4fec-a7c6-b66ae47533cd?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45352",
"sourceIdentifier": "security@xiaomi.com",
"published": "2025-03-27T02:15:15.873",
"lastModified": "2025-03-27T02:15:15.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An code execution vulnerability exists in the Xiaomi smarthome application product. The vulnerability is caused by improper input validation and can be exploited by attackers to execute malicious code."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@xiaomi.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@xiaomi.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"references": [
{
"url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=550",
"source": "security@xiaomi.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1507",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-14T09:15:14.477",
"lastModified": "2025-03-14T09:15:14.477",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-27T01:35:44.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,50 @@
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sharethis:dashboard_for_google_analytics:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.2.2",
"matchCriteriaId": "1BCC768D-1A1A-4A70-9F14-BD37CCC5351F"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3255511/googleanalytics/trunk/class/core/class-ga-controller-core.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/314b8638-15e7-461d-a705-3858fe6813e7?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-2481",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-27T02:15:16.053",
"lastModified": "2025-03-27T02:15:16.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MediaView plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018id' parameter in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/mediaview/tags/1.1.2/inc/forms/addMedia.inc.php#L48",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/mediaview/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca2d687f-0358-4642-849b-100bf40cbbf1?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-30355",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-27T01:15:12.500",
"lastModified": "2025-03-27T01:15:12.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Synapse is an open source Matrix homeserver implementation. A malicious server can craft events which, when received, prevent Synapse version up to 1.127.0 from federating with other servers. The vulnerability has been exploited in the wild and has been fixed in Synapse v1.127.1. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/element-hq/synapse/commit/2277df2a1eb685f85040ef98fa21d41aa4cdd389",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/element-hq/synapse/releases/tag/v1.127.1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/element-hq/synapse/security/advisories/GHSA-v56r-hwv5-mxg6",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-31160",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-26T21:15:23.323",
"lastModified": "2025-03-26T21:15:23.323",
"lastModified": "2025-03-27T02:15:16.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -63,6 +63,10 @@
{
"url": "https://rachelbythebay.com/w/2025/03/26/atop/",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/03/26/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-27T00:55:19.297249+00:00
2025-03-27T03:00:19.573269+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-27T00:51:56.443000+00:00
2025-03-27T02:15:16.217000+00:00
```
### Last Data Feed Release
@ -27,33 +27,38 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-03-26T01:00:04.406672+00:00
2025-03-27T01:00:04.481729+00:00
```
### Total Number of included CVEs
```plain
286738
286741
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `3`
- [CVE-2025-20230](CVE-2025/CVE-2025-202xx/CVE-2025-20230.json) (`2025-03-26T23:15:18.140`)
- [CVE-2025-2496](CVE-2025/CVE-2025-24xx/CVE-2025-2496.json) (`2025-03-26T23:15:18.717`)
- [CVE-2024-45352](CVE-2024/CVE-2024-453xx/CVE-2024-45352.json) (`2025-03-27T02:15:15.873`)
- [CVE-2025-2481](CVE-2025/CVE-2025-24xx/CVE-2025-2481.json) (`2025-03-27T02:15:16.053`)
- [CVE-2025-30355](CVE-2025/CVE-2025-303xx/CVE-2025-30355.json) (`2025-03-27T01:15:12.500`)
### CVEs modified in the last Commit
Recently modified CVEs: `6`
Recently modified CVEs: `10`
- [CVE-2024-13739](CVE-2024/CVE-2024-137xx/CVE-2024-13739.json) (`2025-03-27T00:51:56.443`)
- [CVE-2025-0723](CVE-2025/CVE-2025-07xx/CVE-2025-0723.json) (`2025-03-27T00:47:32.027`)
- [CVE-2025-0724](CVE-2025/CVE-2025-07xx/CVE-2025-0724.json) (`2025-03-27T00:43:04.040`)
- [CVE-2025-1408](CVE-2025/CVE-2025-14xx/CVE-2025-1408.json) (`2025-03-27T00:38:34.650`)
- [CVE-2025-1488](CVE-2025/CVE-2025-14xx/CVE-2025-1488.json) (`2025-03-27T00:25:37.117`)
- [CVE-2025-2625](CVE-2025/CVE-2025-26xx/CVE-2025-2625.json) (`2025-03-27T00:36:50.850`)
- [CVE-2019-9874](CVE-2019/CVE-2019-98xx/CVE-2019-9874.json) (`2025-03-27T01:00:02.327`)
- [CVE-2019-9875](CVE-2019/CVE-2019-98xx/CVE-2019-9875.json) (`2025-03-27T01:00:02.343`)
- [CVE-2020-6572](CVE-2020/CVE-2020-65xx/CVE-2020-6572.json) (`2025-03-27T01:00:02.343`)
- [CVE-2024-12810](CVE-2024/CVE-2024-128xx/CVE-2024-12810.json) (`2025-03-27T01:33:31.260`)
- [CVE-2024-13737](CVE-2024/CVE-2024-137xx/CVE-2024-13737.json) (`2025-03-27T00:56:46.017`)
- [CVE-2024-13771](CVE-2024/CVE-2024-137xx/CVE-2024-13771.json) (`2025-03-27T01:27:47.273`)
- [CVE-2024-13772](CVE-2024/CVE-2024-137xx/CVE-2024-13772.json) (`2025-03-27T01:22:24.920`)
- [CVE-2024-13773](CVE-2024/CVE-2024-137xx/CVE-2024-13773.json) (`2025-03-27T01:07:51.827`)
- [CVE-2025-1507](CVE-2025/CVE-2025-15xx/CVE-2025-1507.json) (`2025-03-27T01:35:44.843`)
- [CVE-2025-31160](CVE-2025/CVE-2025-311xx/CVE-2025-31160.json) (`2025-03-27T02:15:16.217`)
## Download and Usage

View File

@ -144212,8 +144212,8 @@ CVE-2019-9870,0,0,062347afaead72fa94abc21c33a5861fb0027ef274aac86f640300ed7ac52d
CVE-2019-9871,0,0,ecbf9a2a46bdc0f0799295372974f7e4fb138b086b11240520c5e86a9feb2c22,2024-11-21T04:52:28.770000
CVE-2019-9872,0,0,69dc93bfc540144bf7909b63e971badc086b537b667706e81f569fb276514791,2024-11-21T04:52:28.907000
CVE-2019-9873,0,0,af140e2a7d17703fab34c4880c5a574af4e50539c38e7eb27174aef7f9fc441b,2024-11-21T04:52:29.043000
CVE-2019-9874,0,0,f278bcedcedcccb57db2324e838ffa7e131be184b40b44a56b62534e4545bc47,2025-03-26T19:15:14.580000
CVE-2019-9875,0,0,976b69589d1e5e922503851d7625e7b13858a8f34261a8fa42591bf69500dec1,2025-03-26T19:15:14.797000
CVE-2019-9874,0,1,c9569a020600d75a3c9f21065f165bcd3dce6b7e37d729741e058561c4415a6a,2025-03-27T01:00:02.327000
CVE-2019-9875,0,1,8927a1962705d95aba3b9def0b99201f2116c11ed2d06509e1e0f9b1e97ed7f3,2025-03-27T01:00:02.343000
CVE-2019-9877,0,0,d70a742f8560436a6bad08feb159e670d666fe63a3e521d5e75ac5bb80ac8ee7,2024-11-21T04:52:29.453000
CVE-2019-9878,0,0,92bf0deac9abf1727596d30937bb1d1dae4e81d73f4d0b1a0f322a153d61e024,2024-11-21T04:52:29.583000
CVE-2019-9879,0,0,3bacaf9b0b5d86c2556ab398cef4a166e3cd91d22d54e6a93d8cb3b250b49a89,2024-11-21T04:52:29.720000
@ -162014,7 +162014,7 @@ CVE-2020-6568,0,0,0d06ac2d74579c9841c223e03809605179c185b1cd93859e050e309f31fee0
CVE-2020-6569,0,0,dd7acd9fc556b7b252c05b52dfba75961e01f6fda7326f72f03c9cb506d91b0e,2024-11-21T05:35:58.860000
CVE-2020-6570,0,0,40c1c23d973add53721be1be2de9a2c4c86cb53d72938de93810d8529c9d0198,2024-11-21T05:35:58.973000
CVE-2020-6571,0,0,735d3a790133bdd740d6dd33af2c2857cf73a47d1fede83582c7291195240a26,2024-11-21T05:35:59.090000
CVE-2020-6572,0,0,b8f6ee92dca0543e9e2f2840374652f93e1883f5781a266a7e131cf96813b154,2025-02-05T14:34:59.820000
CVE-2020-6572,0,1,dd6eeaf3dfffd36594e2861bfe85ecfea53f4aa9c565ab6d306516ada3746fb4,2025-03-27T01:00:02.343000
CVE-2020-6573,0,0,7047a584fd32b6b671bfff5b08be624a4e9187010bd11257c53f2886f046384b,2024-11-21T05:35:59.293000
CVE-2020-6574,0,0,303ad55fcb736769f4cf9ea3ed4a390f8f37dd9323d86dff170695ea9dcaf2bf,2024-11-21T05:35:59.420000
CVE-2020-6575,0,0,62024afcd971a1d42c6d1ce843a96019408fb91a7a5f300a21805d0cdf3b1172,2024-11-21T05:35:59.543000
@ -247129,7 +247129,7 @@ CVE-2024-12805,0,0,e53ccf7e5ed7d4029905e02b94c08493035711f3a6fbf1927b3a1f3594c5d
CVE-2024-12806,0,0,d3ad8b949669d01946d03cf78ae2e87493233ba523f3d23e253ed03518cfb676,2025-01-17T03:15:07.337000
CVE-2024-12807,0,0,1d134b4e10fd5c2df6e8d1acfd31e14ba142e002cf7d83d94986fb0c56cb2884,2025-01-28T16:15:37.633000
CVE-2024-12809,0,0,612259b2cda97c5061140929bc611da24ff06e8922b144348f21ead0b174d40b,2025-03-07T07:15:21.380000
CVE-2024-12810,0,0,656319f0c1d950287dd9c2c0a962cf9d1926e3064823bc7d730d0540dd1ee5ed,2025-03-14T12:15:13.483000
CVE-2024-12810,0,1,9bbffebac38110592c1786faed3007af91859a7eb270b29f500e0f7471999e10,2025-03-27T01:33:31.260000
CVE-2024-12811,0,0,cbebe7e51738cd8bd29e461cde6a0001affb6783b830fde9fb7108c4a80fc1a2,2025-02-28T00:15:35.790000
CVE-2024-12813,0,0,3b639e8b48ce8f9359f78eb0fcbfb138e695095dcc7dc21b7df78520a10ef17d,2025-02-24T14:24:12.300000
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
@ -248054,8 +248054,8 @@ CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df0
CVE-2024-13734,0,0,17fab3f74e78896a40ac1961915d61db429551aa26d55adeda206fce66c88861,2025-03-11T15:55:48.603000
CVE-2024-13735,0,0,3547c31c6d72f19019bc47ce66440b94aad2dbe68a07077b91d9f59acae687cd,2025-02-25T03:45:15.060000
CVE-2024-13736,0,0,3362a69c50f09f93ac1b8892771db3d9d5410b27ce15edc8013225c7425828fe,2025-03-06T15:08:38
CVE-2024-13737,0,0,91ea646ae02a7e4936ac7cfebde601dcc3026e4694e4b1129db4d267dc39e06b,2025-03-22T03:15:11.817000
CVE-2024-13739,0,1,bfdb9f2fe55c8ac00c8481b32b628ed6835cb3ca616f5bee1128858a8562c075,2025-03-27T00:51:56.443000
CVE-2024-13737,0,1,3a0a6a4e9311e69c694504178165fb386a940d8fbd4d83c8600dd61fd4e2edef,2025-03-27T00:56:46.017000
CVE-2024-13739,0,0,bfdb9f2fe55c8ac00c8481b32b628ed6835cb3ca616f5bee1128858a8562c075,2025-03-27T00:51:56.443000
CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000
CVE-2024-13740,0,0,7ff99f97d425424bdc9a3d1a435df988f74877e53c6e3d16169a71dec8c37f3b,2025-02-24T12:41:27.353000
CVE-2024-13741,0,0,78f05de9655a03d53c2e8400793bb4a26c0069c47279ba1e219e404df9296757,2025-02-24T12:40:05.483000
@ -248078,9 +248078,9 @@ CVE-2024-13768,0,0,65f9efb98da5492354189d6fbc823165fa39f9d576ed31c97572c09ab668b
CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000
CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c33,2025-01-07T18:20:57.347000
CVE-2024-13770,0,0,eedd6cc35f686f8347a61efabc64272551833ee2e82bdd330567f722ff99ade8,2025-02-24T17:08:04.307000
CVE-2024-13771,0,0,cdaaea26999597a164e794f37f237495307c416fc6683b91a7d8e44a7dfd735e,2025-03-14T12:15:13.693000
CVE-2024-13772,0,0,68c85172f5abc0595bafc29bd3adf761cbc19e24d352b2baff8f0418a2fb4f64,2025-03-14T12:15:13.907000
CVE-2024-13773,0,0,98abde340802ac38cf7be385460f05a09da634a3392e472fd7fb5dc00b2af80d,2025-03-14T12:15:14.100000
CVE-2024-13771,0,1,949738633d703300748648fb69f661517bd96978bb56c94eead1be99afb2462f,2025-03-27T01:27:47.273000
CVE-2024-13772,0,1,e18724330a936d4d790bad539c0685998ca571e65ae4da14273706ffc70edac4,2025-03-27T01:22:24.920000
CVE-2024-13773,0,1,acdd0a13ab662eb153e0e047745f468f0c691fa835346ca4efc9e7240c863343,2025-03-27T01:07:51.827000
CVE-2024-13774,0,0,7926f46cbbe245fc4b69a913b305cdf8d086f57fe42cd5293333d393cb9ec93a,2025-03-12T17:01:06.413000
CVE-2024-13775,0,0,4f9074e732a3ab519a109b5697b6e141a486c1977d56f68019ad553f34df5449,2025-02-24T19:04:52.170000
CVE-2024-13777,0,0,e95e92048e929c187fcb10d876bc7666966c67f194b150a2f5d7dbd9a477d6cc,2025-03-05T10:15:15.367000
@ -268424,6 +268424,7 @@ CVE-2024-45346,0,0,556b0325369db812da5d3ca351593663eeefcc15146e049af11d00d6b0f23
CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000
CVE-2024-4535,0,0,78f0543f36f54882e03e81f0faf12704615c89d5497f070efb8f0b2a49e7c790,2025-03-25T15:15:23.147000
CVE-2024-45351,0,0,9798bc02eb0ba83db1ec479e2565390e6f6e7ab4d219551bf7245075b78bfee8,2025-03-26T14:15:31.457000
CVE-2024-45352,1,1,de7c306e0645174ec78d434495a14130b165ebf334e095efc8cf412f3b8d78ad,2025-03-27T02:15:15.873000
CVE-2024-4536,0,0,d554a9fba63153c422b87ae2d4b0219537ca1cbc00fd943074006c5d6a843426,2025-02-06T17:32:48.777000
CVE-2024-45366,0,0,d13f4b03dcbe654ea752888fe69e44580333b063ff67391732408feaba64beb9,2024-11-05T22:35:10.920000
CVE-2024-45367,0,0,64e84bc9ed60e849e1ae71705aae4a59b4ff0cb910f064adb8ff87e0d48d255e,2024-10-04T13:50:43.727000
@ -281341,8 +281342,8 @@ CVE-2025-0719,0,0,44927ec8b6afaf34270843fd13dbd3ba0f3f99ce1ef23ab7a0954a7b4854cf
CVE-2025-0720,0,0,bf163c74b4e9e0ae1d92684788b595f2199f607068d51d6135d379966c283462,2025-01-26T23:15:21.547000
CVE-2025-0721,0,0,a17c1b763dfbd45aa4203f0e8b4c3b1bd0f0a61d080bea2c50ad8ff161e60eaa,2025-02-25T20:28:55.787000
CVE-2025-0722,0,0,c9c24be950ff93b5151cdab68af4eb0f25cca0b4d685aeadd762fbc951dbdf6d,2025-02-25T20:12:27.810000
CVE-2025-0723,0,1,fc347c0264458ce32ef778e91bbf5b267b6a011b8adff9a119fdfa39ff2d2f1a,2025-03-27T00:47:32.027000
CVE-2025-0724,0,1,f2bb8a19f6ffdf91751bf1b82d06f67d543d99788cfccbc66204d45f84c783f6,2025-03-27T00:43:04.040000
CVE-2025-0723,0,0,fc347c0264458ce32ef778e91bbf5b267b6a011b8adff9a119fdfa39ff2d2f1a,2025-03-27T00:47:32.027000
CVE-2025-0724,0,0,f2bb8a19f6ffdf91751bf1b82d06f67d543d99788cfccbc66204d45f84c783f6,2025-03-27T00:43:04.040000
CVE-2025-0725,0,0,ef1920cda444939d67fecb4a1c9b571c4d38e3bc4bcb5bd151f156910c1fc4af,2025-03-07T01:15:12.403000
CVE-2025-0726,0,0,739ea1d1541d6b26153a964e4e4136a3057eaa8274a2f66ba7a27171ffa2b087,2025-02-21T08:15:28.417000
CVE-2025-0727,0,0,89665f1801b7a5f4bd56958ba24239f6773c6fef24507ea8f637acdf839ad9ca,2025-02-21T09:15:09.010000
@ -281806,7 +281807,7 @@ CVE-2025-1404,0,0,f39be30144b0a5fe80b4b94433169bbe79b568debe0e45a11fa0a8302ed0e6
CVE-2025-1405,0,0,9d1939e7603fe8cd2a4a6b659e6149cd03308d08f69102d0905681145b4d879a,2025-03-06T17:57:54.597000
CVE-2025-1406,0,0,6fbc92715581c083383884df65716e311e7920e9986e87816bf21c4af15408ec,2025-02-25T03:38:24.303000
CVE-2025-1407,0,0,81ebc501504f4e0e97111e960151a7a649f1ecbd9d904ea14ecfe9745b475037,2025-02-25T03:37:32.347000
CVE-2025-1408,0,1,33729df59b0d7d7394a477a15b75618faa0c0ce930ca4b1fe624ec562a8f8bb2,2025-03-27T00:38:34.650000
CVE-2025-1408,0,0,33729df59b0d7d7394a477a15b75618faa0c0ce930ca4b1fe624ec562a8f8bb2,2025-03-27T00:38:34.650000
CVE-2025-1410,0,0,1acd34ee1bf4de50c7bb7990bb2833820ce8a935ac6fe3383da13c0fe4fe3da0,2025-02-25T03:35:42.633000
CVE-2025-1412,0,0,15006068dde5667dc534d1c6a1b910fc18a441695fc7fe8438811af885c4587d,2025-02-24T08:15:09.890000
CVE-2025-1413,0,0,5c3f38d9cc7b7010909c2af97131be7654555b0227082bf07ca01df8093ffd5a,2025-03-26T16:15:20.833000
@ -281852,7 +281853,7 @@ CVE-2025-1481,0,0,d10660ccfc75afffd9cc52715a6e9675c63c4f59ae92c95b59ff9bb03291f5
CVE-2025-1483,0,0,eed3d83cb2da5908d92aa9dd620a120571071c04f49e7599dc48ec4179593bf0,2025-02-25T18:59:39.860000
CVE-2025-1486,0,0,a85cea9be2475178530e87928bf3624b11a53f46d4074abad230f2e740ad42a2,2025-03-14T16:15:40.020000
CVE-2025-1487,0,0,8f772af05106acb51f792dc9fd2468ed15c6e79faf910ab3115c5b2004861341,2025-03-14T16:15:40.263000
CVE-2025-1488,0,1,41db8f13bdc7bcc4795270a365123a77f5c2866e92341d8e17a3cfe430cb556b,2025-03-27T00:25:37.117000
CVE-2025-1488,0,0,41db8f13bdc7bcc4795270a365123a77f5c2866e92341d8e17a3cfe430cb556b,2025-03-27T00:25:37.117000
CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
CVE-2025-1490,0,0,7aff13ba0cf6167c4f44d1a93b4f6f09fdf518d04ba9c05a1bfda108f45e69c2,2025-03-26T03:15:12.257000
CVE-2025-1491,0,0,2c68d92a6f55bf529fa37ef19f65078661a466e3bd99edb0dd7d2a7b0419f292,2025-03-01T13:15:10.750000
@ -281864,7 +281865,7 @@ CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9
CVE-2025-1504,0,0,63c59f8b26cf8b21f0390a21fa6fac2c1c23d38ed0b94a4990b2f1de80d8483e,2025-03-24T18:27:10.747000
CVE-2025-1505,0,0,941d3b1ae0c992e2675a622234390037253a212a5d42d0d53217112bc5422121,2025-03-06T20:36:32.810000
CVE-2025-1506,0,0,0f896eaadc8a073897781bc944e7b39e9f71c9b2af47691e38ab32de0cbb6c36,2025-03-06T18:54:45.667000
CVE-2025-1507,0,0,872e5d0051c754ea1da921e998df796aaff631375a1c1188b3777eb8a7089f8b,2025-03-14T09:15:14.477000
CVE-2025-1507,0,1,1d81dcd81d7714294007126db512dbf0cb7786fda01d7c32c2cb46eeed18f5a8,2025-03-27T01:35:44.843000
CVE-2025-1508,0,0,ec65239dbe7ffdef1a707b5ab0a34ed1dc416b8a5207f584ccfbef8fe7fc9ef6,2025-03-20T13:57:41.123000
CVE-2025-1509,0,0,dd42a33d90057770cc0fff8a787b9ce6f9b83b6dcef0adadc46d0dded06e7aa0,2025-03-06T15:12:33.540000
CVE-2025-1510,0,0,908b98a8ee37341a28713a06694a08e53c25ab91ce664e9dcc93619135ea532a,2025-03-06T15:13:33.280000
@ -282282,7 +282283,7 @@ CVE-2025-20227,0,0,d1b36269aa38bebe9ffa99eea71229438ae60f3825a078c1bc230c163671a
CVE-2025-20228,0,0,4446133807a3ae7b2bb656ae3e0e08b6ee4043eae2ae61688d170c5183eb64fd,2025-03-26T22:15:14.783000
CVE-2025-20229,0,0,4348d2eef38de5617eec01087ff06194c697dbf41d9d265656e32ffa8cd1224b,2025-03-26T22:15:14.933000
CVE-2025-2023,0,0,9d8a0c8afba74bf520f5f7eb676dec70441b9e51aafb2c8702891c86f922f3db,2025-03-11T21:15:53.890000
CVE-2025-20230,1,1,edc7ae2dc1da378489a4efa496562a72db2c63438ff4fb98aa91af7fde62669d,2025-03-26T23:15:18.140000
CVE-2025-20230,0,0,edc7ae2dc1da378489a4efa496562a72db2c63438ff4fb98aa91af7fde62669d,2025-03-26T23:15:18.140000
CVE-2025-20231,0,0,36b0bbd8a6f31d9e709cc4e7fcfee4b1e81809774f85d4fa0eb1ab0c6b370dbe,2025-03-26T22:15:15.083000
CVE-2025-20232,0,0,c79ab64cfa2ee087bccad90da679c4f27434f59c3bbd1bb3fd6b3f78c9515053,2025-03-26T22:15:15.233000
CVE-2025-20233,0,0,0ca5a93c39d1b1f07be6545c2008fa26fb56fc7d1dee101512d7754d74c0bb95,2025-03-26T22:15:15.390000
@ -284936,6 +284937,7 @@ CVE-2025-24805,0,0,ec139300c8aba94d67e6328d56741782b279b0f8fae86fc167a59b6e24537
CVE-2025-24806,0,0,09fa1e87d8fedd5d28ff5cb9bac6bc7267715c2451739d08475197db5a3aa60a,2025-02-19T18:15:24.467000
CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2f91,2025-02-21T15:26:57.507000
CVE-2025-24808,0,0,eb8c03a85e5a0b4334ba1721c4f793b5b4f69a07bcb40be207ceebe068e6f853,2025-03-26T15:16:07.630000
CVE-2025-2481,1,1,c670ab5414c9b50b45c90dccf21b7f800c9d25c4c2c263f1f02a0d8e9b956377,2025-03-27T02:15:16.053000
CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000
CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000
CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000
@ -285012,7 +285014,7 @@ CVE-2025-24956,0,0,915adf46e5e8d613d503b5df374b84b9ffba9c57344980265efed54c45eaf
CVE-2025-24957,0,0,caab3bc6d07aaaaaeb40190f59933fb518192f43d9ea569cde48752d4b2b9c97,2025-02-13T18:59:32.867000
CVE-2025-24958,0,0,0ae446ece37f4692f130ad0dc256efa2fd5d1fe74929c7d4ebe10575dc57a55a,2025-02-13T18:58:56.320000
CVE-2025-24959,0,0,2de44d419e6f6c532d54e8f44d0d8ab712680ae78e9e829a5355527c77017682,2025-02-03T21:15:15.853000
CVE-2025-2496,1,1,5b83542cf3c2f846ac57f5cb4e35f704d4ec88e2e1ed6b53606010521ed951d4,2025-03-26T23:15:18.717000
CVE-2025-2496,0,0,5b83542cf3c2f846ac57f5cb4e35f704d4ec88e2e1ed6b53606010521ed951d4,2025-03-26T23:15:18.717000
CVE-2025-24960,0,0,46fee619b683ed92da669f75d14549891da252b8bb2536b9cd7c3ffa3067f9ea,2025-02-03T21:15:16.020000
CVE-2025-24961,0,0,c8f086fb8a69609031ffd104e29501872f3023eb9cfa127c706186138b229012,2025-02-03T21:15:16.170000
CVE-2025-24962,0,0,c27baa0e8517616ac646630795e96db72c123b8c6070825c2a5d465571841885,2025-02-03T21:15:16.317000
@ -285559,7 +285561,7 @@ CVE-2025-26216,0,0,fa35563faa6505245c7f05bc4878e14310c206fdd07c5771663544280eaa7
CVE-2025-2622,0,0,939dbf3f462db5138e7efc1c25b4df44dcefcad147219dc69a16d470f7cab4df,2025-03-26T18:38:53.113000
CVE-2025-2623,0,0,3ab5fa7d579e15ca810445905623b237691afeb5371061b93ec95908d3457f2d,2025-03-26T18:29:45.483000
CVE-2025-2624,0,0,46e23f80f2c9d13a382050fe05c6fffb0c05ca1c0b64f7abbda428c5ccf88ddf,2025-03-26T18:26:27.147000
CVE-2025-2625,0,1,a69b2a16e33cc77b4a32fd1909039df09919db2fa3840e12d206a48632ea57ae,2025-03-27T00:36:50.850000
CVE-2025-2625,0,0,a69b2a16e33cc77b4a32fd1909039df09919db2fa3840e12d206a48632ea57ae,2025-03-27T00:36:50.850000
CVE-2025-2626,0,0,2ec672e2fe0c1e79dfa3082efb3637c788281bb0a435927822d89abd613cd4eb,2025-03-24T13:15:26.627000
CVE-2025-26260,0,0,d87498df9911f6ec3fcf716c1acf728dc302a17a13c2bad4d77a68a80619f6a0,2025-03-19T19:15:46.987000
CVE-2025-26263,0,0,87852969ca209a829a551b3d11cffebf3ca020061fd4d362c34f3d6a1719258e,2025-03-19T14:15:39.293000
@ -286648,6 +286650,7 @@ CVE-2025-30350,0,0,fc6dfae9ed53f849f2c80ec7c33acba2fc43fe016314dc3b9c7a9bafc6032
CVE-2025-30351,0,0,8c298fbc24349bf30fef1820a52621a7ea9c7b126c442b6cffbd5514a19bab95,2025-03-26T18:15:26.873000
CVE-2025-30352,0,0,acace4f88241090f81090668d9b6b1228cf47971d34911ceaf508195b90eb4ac,2025-03-26T18:15:27.080000
CVE-2025-30353,0,0,91060a041c779605c7d571039c263e57e127e0d08447255d79e2cb97ee12286f,2025-03-26T18:15:27.327000
CVE-2025-30355,1,1,e8f7797b12bcd17931ea1a0b1fb9cba7219c4ef9c5b7f178a647716bbe7d4e02,2025-03-27T01:15:12.500000
CVE-2025-30407,0,0,d8f56632a4d90f52f0afd91ca90b001309e11d692546c6b5c62e4f5dff058d63,2025-03-26T22:15:15.943000
CVE-2025-30472,0,0,2ebab4b860069e7704c45b0afdbc37111cef0ce9e224a566e03ddd40410e1a00,2025-03-25T16:15:27.337000
CVE-2025-30474,0,0,1e288c28c7a9253d8007962ed83d55ed1c6a50132909d1d77f3fa1d8a9ee1e62,2025-03-23T19:15:14.973000
@ -286736,4 +286739,4 @@ CVE-2025-30621,0,0,5d4cdbcdb4b4fcd90b5f2b2106f218b95148d82610e047fabd8c26e50f6e3
CVE-2025-30623,0,0,1d1d541570cee9e8bd680cf66c388813ad97d6b9db28e22b406d83cc5fc8feed,2025-03-24T14:15:34.797000
CVE-2025-30741,0,0,7e28be04c44c5eca306e67e9d56487026b2aeeec1bb89000fe389b1b3e3b5fba,2025-03-25T21:15:43.527000
CVE-2025-30742,0,0,82bfc8ccfda2836c34319d2240fc7c5a7c72b6e004211ac7d9c3d7d639962089,2025-03-26T05:15:40.593000
CVE-2025-31160,0,0,a158eb6bf71a42388674830b7f777ec91009ae63360e0ad5b9e97435a4c71b33,2025-03-26T21:15:23.323000
CVE-2025-31160,0,1,94bb3277cdc98903949beacfdd67b1cdce014e635915caadf67c778dc186a2c5,2025-03-27T02:15:16.217000

Can't render this file because it is too large.