Auto-Update: 2025-02-28T07:00:19.842222+00:00

This commit is contained in:
cad-safe-bot 2025-02-28 07:03:49 +00:00
parent fd24172320
commit ebcb0352e8
10 changed files with 526 additions and 16 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12820",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-28T06:15:24.903",
"lastModified": "2025-02-28T06:15:24.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MK Google Directions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'MKGD' shortcode in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3246361/google-distance-calculator/tags/3.1.1/mk-google-directions.php?old=3046209&old_path=google-distance-calculator%2Ftags%2F3.1%2Fmk-google-directions.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/23b3570c-cd8e-4dec-bbad-6374c44530bd?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-13796",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-28T05:15:32.950",
"lastModified": "2025-02-28T05:15:32.950",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Post Grid and Gutenberg Blocks \u2013 ComboBlocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.6 via the /wp-json/post-grid/v2/get_users REST API This makes it possible for unauthenticated attackers to extract sensitive data including including emails and other user data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/post-grid/trunk/includes/blocks/functions-rest.php?rev=3242718#L2055",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3245187%40post-grid&new=3245187%40post-grid&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0407223a-cd41-43d1-87b0-d6b83b57d4b3?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-0801",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-28T05:15:33.683",
"lastModified": "2025-02-28T05:15:33.683",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The RateMyAgent Official plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.0. This is due to missing or incorrect nonce validation on the 'rma-settings-wizard'. This makes it possible for unauthenticated attackers to update the plugin's API key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3244718%40ratemyagent-official&new=3244718%40ratemyagent-official&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/ratemyagent-official/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b559017c-f1d2-4f18-bfb6-e52f05910e34?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-1505",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-28T05:15:33.923",
"lastModified": "2025-02-28T05:15:33.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Advanced AJAX Product Filters plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'nonce' parameter in all versions up to, and including, 1.6.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3245830/woocommerce-ajax-filters/trunk/includes/wizard.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94b289bf-0ef1-47d1-98bd-8f7bb753c2bc?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-1506",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-28T06:15:25.557",
"lastModified": "2025-02-28T06:15:25.557",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Wp Social Login and Register Social Counter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.0. This is due to missing or incorrect nonce validation on the counter_access_key_setup() function. This makes it possible for unauthenticated attackers to update social login provider settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-social/tags/3.0.9/inc/counter.php#L189",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3246155/wp-social/trunk/inc/counter.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/669833b3-1689-4051-8990-c6eddae4858f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-1511",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-28T06:15:25.750",
"lastModified": "2025-02-28T06:15:25.750",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The User Registration & Membership \u2013 Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 4.0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/user-registration/tags/4.0.2/modules/membership/includes/Admin/Membership/ListTable.php#L246",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3246826/user-registration/tags/4.1.0/modules/membership/includes/Admin/Membership/ListTable.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e0bee7c-8dce-421c-af16-7e5152797e6c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-1513",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-28T06:15:25.937",
"lastModified": "2025-02-28T06:15:25.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery \u2013 Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Name and Comment field when commenting on photo gallery entries in all versions up to, and including, 26.0.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3245199%40contest-gallery&new=3245199%40contest-gallery&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1b5cf360-0163-4a7c-8979-ec89ec80ad62?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-1757",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-28T05:15:34.097",
"lastModified": "2025-02-28T05:15:34.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WordPress Portfolio Builder \u2013 Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pfhub_portfolio' and 'pfhub_portfolio_portfolio' shortcodes in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/trunk/src/Frontend.php#L39",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/uber-grid/trunk/src/Frontend.php#L542",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/36dcf1c4-1e0a-4ab6-a1b3-a9fe3aaddd0b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-28T05:00:19.773940+00:00
2025-02-28T07:00:19.842222+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-28T04:15:09.603000+00:00
2025-02-28T06:15:25.937000+00:00
```
### Last Data Feed Release
@ -33,19 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
283472
283480
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `8`
- [CVE-2024-54173](CVE-2024/CVE-2024-541xx/CVE-2024-54173.json) (`2025-02-28T03:15:09.357`)
- [CVE-2024-56340](CVE-2024/CVE-2024-563xx/CVE-2024-56340.json) (`2025-02-28T03:15:10.363`)
- [CVE-2025-0823](CVE-2025/CVE-2025-08xx/CVE-2025-0823.json) (`2025-02-28T03:15:10.510`)
- [CVE-2025-0975](CVE-2025/CVE-2025-09xx/CVE-2025-0975.json) (`2025-02-28T03:15:10.653`)
- [CVE-2025-1744](CVE-2025/CVE-2025-17xx/CVE-2025-1744.json) (`2025-02-28T04:15:09.603`)
- [CVE-2025-23225](CVE-2025/CVE-2025-232xx/CVE-2025-23225.json) (`2025-02-28T03:15:10.807`)
- [CVE-2024-12820](CVE-2024/CVE-2024-128xx/CVE-2024-12820.json) (`2025-02-28T06:15:24.903`)
- [CVE-2024-13796](CVE-2024/CVE-2024-137xx/CVE-2024-13796.json) (`2025-02-28T05:15:32.950`)
- [CVE-2025-0801](CVE-2025/CVE-2025-08xx/CVE-2025-0801.json) (`2025-02-28T05:15:33.683`)
- [CVE-2025-1505](CVE-2025/CVE-2025-15xx/CVE-2025-1505.json) (`2025-02-28T05:15:33.923`)
- [CVE-2025-1506](CVE-2025/CVE-2025-15xx/CVE-2025-1506.json) (`2025-02-28T06:15:25.557`)
- [CVE-2025-1511](CVE-2025/CVE-2025-15xx/CVE-2025-1511.json) (`2025-02-28T06:15:25.750`)
- [CVE-2025-1513](CVE-2025/CVE-2025-15xx/CVE-2025-1513.json) (`2025-02-28T06:15:25.937`)
- [CVE-2025-1757](CVE-2025/CVE-2025-17xx/CVE-2025-1757.json) (`2025-02-28T05:15:34.097`)
### CVEs modified in the last Commit

View File

@ -246800,6 +246800,7 @@ CVE-2024-12817,0,0,177c0c1ee17fbeb45fd7a30a85d211f5e3e78b0121812fcf822599a3e7e7f
CVE-2024-12818,0,0,84584f689c6c77a45a4884a21e812302b20927c35cf898200120c33746d2aaa2,2025-01-15T10:15:07.803000
CVE-2024-12819,0,0,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b06d,2025-01-09T11:15:15.657000
CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000
CVE-2024-12820,1,1,e360640a03322169bd3f6f06c3ba39e6c3f29a8f90c8d81b8f4979e1e5e53133,2025-02-28T06:15:24.903000
CVE-2024-12821,0,0,7372c2b0dab41e9efab53321f64857db82fe2b13cccde335b3d3062f730a0707,2025-01-30T14:15:32.843000
CVE-2024-12822,0,0,1237e8d30b34608b9228bf4eac8a25382e97ffcf3e8959f1fd3fc8d0a61375ef,2025-01-30T14:15:33.017000
CVE-2024-12825,0,0,e5a4d7f38d6d259b5737402affdabce23860527403323be321069fe15e333462,2025-02-21T15:34:58.803000
@ -247652,6 +247653,7 @@ CVE-2024-13791,0,0,87d34d666cc6abe64fd811a08f4df25c9dcd54e5f0bd075f781061adfbd26
CVE-2024-13792,0,0,95c136c58ffd0d86dab2da9aa86fa75170f9d7e438d0612c3363162ba0d1c0ed,2025-02-25T20:56:55.553000
CVE-2024-13794,0,0,7d022241f9cbf94ac9ed1b3f72ace036ea4f25f4241c06ac4a29fc609bc50719,2025-02-25T19:38:05.950000
CVE-2024-13795,0,0,5c01555cf2ad62d519339aa7fca734aa9775ae1bd36f752424bbf014d4c482c0,2025-02-21T15:33:49.100000
CVE-2024-13796,1,1,087b9ce07eec49c2f22f938b8e7bf977a4fb1b62eb4416dd03b68c4248b79ae2,2025-02-28T05:15:32.950000
CVE-2024-13797,0,0,784cf91e048f4958bdad15f96921115cca7505f76e057d124aec3331890c0072,2025-02-21T12:17:17.200000
CVE-2024-13798,0,0,b7519f3897d26f2d9d8f21bc61cafa9077a8c17dfa0e7a4b29a801ec94d2e592,2025-02-22T05:15:12.590000
CVE-2024-13799,0,0,e8bf3eec61ee5004ffe816bc3d1e1d3f4c7c5fc01f5e38b638ff3d46b6679801,2025-02-19T06:15:21.283000
@ -274064,7 +274066,7 @@ CVE-2024-54169,0,0,8f8e39f28e7aaab08ffb70d2fa53ac338f4a1cb17764b38d9fedae190adae
CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000
CVE-2024-54170,0,0,115fcfa389ae6bda1f9341d4e101093ad6d8b81f4dcb7bc6cae920d01c10de34,2025-02-27T15:15:39.240000
CVE-2024-54171,0,0,76fdd9d793c7b352d23e0d64a823cd883e5b81bbb06d5f2cffeb90d9ca7786b4,2025-02-06T21:15:21.453000
CVE-2024-54173,1,1,00cfedbefa545cfb7f51fc181eaeb6b327672deee2effac2489357215df8fd22,2025-02-28T03:15:09.357000
CVE-2024-54173,0,0,00cfedbefa545cfb7f51fc181eaeb6b327672deee2effac2489357215df8fd22,2025-02-28T03:15:09.357000
CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000
CVE-2024-5418,0,0,c3b6dacc234cf8a9c6de6913d07caa1810e24ada600d2b1f8edeb26c6b62184b,2024-11-21T09:47:36.970000
CVE-2024-54181,0,0,45bad33d373e7dca4c705e8d7f190d9cc110f08937ef6a2be63d00cdd251ea54,2024-12-30T14:15:05.867000
@ -275151,7 +275153,7 @@ CVE-2024-56334,0,0,dd145a89bec8d5c627af1aa8e241a3a3cc8f1f4441c2e387ed54258794c2f
CVE-2024-56335,0,0,68042c7d7012ee80feaa30ed25472b1a3afe996d5346e3cfc0fb43c7dcee7c7c,2024-12-20T21:15:10.277000
CVE-2024-56337,0,0,53003cbffc45df9623db82452361ba8a0a459ad2bf417245b4c8041b16113fd7,2025-01-03T12:15:26.787000
CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000
CVE-2024-56340,1,1,4e6c15ca79e36e58b0c53eec0eb67f5474f4a8d00d54fe682d9d2126ea8b1ef7,2025-02-28T03:15:10.363000
CVE-2024-56340,0,0,4e6c15ca79e36e58b0c53eec0eb67f5474f4a8d00d54fe682d9d2126ea8b1ef7,2025-02-28T03:15:10.363000
CVE-2024-56348,0,0,8aaa2ba55d8fe9db8a92a2d0ab499d623c381253cc0adc64426705df2faaf22a,2025-01-02T18:51:41.037000
CVE-2024-56349,0,0,22da00bebf6ac64c6a8cff1b863000f36f191d4d1414cab4c6d24fb796c53539,2025-01-02T18:51:21.857000
CVE-2024-5635,0,0,0a6341b938bdc4dcacbc69dffaf28fad5ae004ccda44b69838f8259b734db74e,2024-11-21T09:48:03.733000
@ -280283,6 +280285,7 @@ CVE-2025-0797,0,0,6473915a793ff9884aafab236f62e144affe799470e5962b8e5351b78ec1cb
CVE-2025-0798,0,0,f979c1c8f68dd351170669e51288efee24790cc09665b119a10fc6d4d02457d2,2025-01-29T02:15:27.190000
CVE-2025-0799,0,0,24d7e10897e858e097e83298564d3196763b9824077dbf2b4283317ae2c0fd13,2025-02-06T01:15:09.580000
CVE-2025-0800,0,0,9e70c7ae7b67598c33ec1be994b15b025cffe8ea4961b83f2cb2dbf2f54224bc,2025-02-10T14:11:58.423000
CVE-2025-0801,1,1,e2bc3bb5a984a8abcd451e3de8f434f19668d21b83a5b66f1573755941e16889,2025-02-28T05:15:33.683000
CVE-2025-0802,0,0,058667df6e6f167c26958b65b8647dee5b306173c5334271f5f14ad30de88b99,2025-02-10T14:06:03.410000
CVE-2025-0803,0,0,a9f14556ef67fd49c2c0c4e57733c9351d270dba138685c5a84cb2509244be40,2025-02-11T19:48:06.860000
CVE-2025-0804,0,0,53f7fab3a5e8ab11732155ff3e17826c7a6f61d1fcafd348f26f842f26491509,2025-01-29T04:15:07.193000
@ -280296,7 +280299,7 @@ CVE-2025-0816,0,0,d15c54cfa7b84645defa8a62e6e50a00e104c593cdfd6c16c28c49b600c342
CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000
CVE-2025-0821,0,0,276d38f36e1718392d91943f87a21d4117bd30970ca15dadffff44ef97d51e0f,2025-02-25T03:42:52.263000
CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000
CVE-2025-0823,1,1,489bc052750695544d585739b7e55771102b6fbe5b2f90bedc63d7b39bccf2d4,2025-02-28T03:15:10.510000
CVE-2025-0823,0,0,489bc052750695544d585739b7e55771102b6fbe5b2f90bedc63d7b39bccf2d4,2025-02-28T03:15:10.510000
CVE-2025-0825,0,0,7f81ca19fb96d77c0731181ff23092e49d4e8a157f0a8fa4a0ca13f53bda7923,2025-02-04T15:15:19.420000
CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000
CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000
@ -280380,7 +280383,7 @@ CVE-2025-0971,0,0,633a244c07788fdbfdfdcc8863df0b7c407fe050fbfbd58b149dfe7ef4b5bb
CVE-2025-0972,0,0,5f696e03d949e1a49551d14d8f8b313b3e334794f668dc156f7f61acec16e7d4,2025-02-03T00:15:28.007000
CVE-2025-0973,0,0,43196315f17909695c2c467d44bd1754687d87efefe1c24665042841ac303abc,2025-02-03T01:15:07.263000
CVE-2025-0974,0,0,ed110dbaf1b5b967bb38884e7ebb961da1c8692b7e1576cd2f418134ffba9e99,2025-02-03T02:15:26.433000
CVE-2025-0975,1,1,6b2c1ef329ad89d7b985fa632122902422fa8daa84b058609488b018d9051b6b,2025-02-28T03:15:10.653000
CVE-2025-0975,0,0,6b2c1ef329ad89d7b985fa632122902422fa8daa84b058609488b018d9051b6b,2025-02-28T03:15:10.653000
CVE-2025-0981,0,0,77670fbd06993c72f858090d230bbbd76961e50ba2a7e6b7437ae6f3246e33de,2025-02-21T15:23:43.717000
CVE-2025-0982,0,0,743f39b6fc5d357ba3083d9f8f3d69f42ae53e58d798d8fd1e36d71ec2810d37,2025-02-06T12:15:27.267000
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
@ -280634,8 +280637,12 @@ CVE-2025-1483,0,0,eed3d83cb2da5908d92aa9dd620a120571071c04f49e7599dc48ec4179593b
CVE-2025-1488,0,0,43cfa98a915bcf0660c9d6b45b3151f7578e9794c9b93f44777c487cb0fa081f,2025-02-24T11:15:10.193000
CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000
CVE-2025-1492,0,0,a12c05d7276816932001573681340e79b217d21be6e278e421f34f68972737e1,2025-02-20T02:15:38.553000
CVE-2025-1505,1,1,f07d028c0b1afb5f694ef937c5c5c28e5a39031e094947035ed6a198be466653,2025-02-28T05:15:33.923000
CVE-2025-1506,1,1,3f7cdcccb4278d311606b0b4c7fc8dc6a6db82f7eaadf4061c1d5cb0a4181211,2025-02-28T06:15:25.557000
CVE-2025-1509,0,0,23e6d59505826ac4948dc80673c03ff2b0aed485111f57186985eb2e5cb2ebc3,2025-02-22T04:15:09.883000
CVE-2025-1510,0,0,9b376c589154983b1ec02250f9735f4521be8d5584c35e34e9235c478622092f,2025-02-22T04:15:10.040000
CVE-2025-1511,1,1,92d16ec9cdb5f4e3f37d1ead50a4ecde4e869b1ac9e9b474b39bd9ef65a37b75,2025-02-28T06:15:25.750000
CVE-2025-1513,1,1,49686153eb93c741adb1d6d7e23372a0773d0f92ceeb66d85a64053bd21ac0c5,2025-02-28T06:15:25.937000
CVE-2025-1517,0,0,3a8527d396408e64988324446816f3f2a736d3d929503a44ae66c5cadda29ddc,2025-02-26T13:15:41.193000
CVE-2025-1535,0,0,c8067c833343598442009f0c070dbd08eddedc896cdd41576fc32acd051fac52,2025-02-21T12:15:30.877000
CVE-2025-1536,0,0,10f03af38479b02a7f4a530d7c1cc2f1541bce31ead11e490c0a23f9eb3125a3,2025-02-21T15:15:12.270000
@ -280721,11 +280728,12 @@ CVE-2025-1739,0,0,474bd41a40b4d7e6fdfff026df5b08f6be7f300b56e56bcc0fdd145be43728
CVE-2025-1741,0,0,344f7bc016a7178d5c4314a2e4d09672c42edf31aa2ee8b574916c55f2eebd7d,2025-02-27T16:15:38.930000
CVE-2025-1742,0,0,739398478edc9ddece71d3399efb7eaab9bd1f42fe6e327305583b23ec5e53bd,2025-02-27T17:15:16.460000
CVE-2025-1743,0,0,f420185c057195d1e0f14c6168b6487602fc3aa63e73bf5c979d7d5fa960e55c,2025-02-27T18:15:27.650000
CVE-2025-1744,1,1,5a87ca10a34bf3a6ed6260577bc3c3361cf00a88203a3dbaf734b36322e0f166,2025-02-28T04:15:09.603000
CVE-2025-1744,0,0,5a87ca10a34bf3a6ed6260577bc3c3361cf00a88203a3dbaf734b36322e0f166,2025-02-28T04:15:09.603000
CVE-2025-1745,0,0,9e47846683e7157da502ac5a77516ebab38eebca4e7114c00a2b8bf268b0ef4b,2025-02-27T18:15:27.923000
CVE-2025-1751,0,0,e01d857b710fac9b7b6217b59ced116e365117c6a164f06207b3b6874d6bb32a,2025-02-27T12:15:35.030000
CVE-2025-1755,0,0,022c1cdfb96f9a1d1782ea7a255dc456cf2cd5b57b21fa0b4b69f69925763fae,2025-02-27T16:15:39.137000
CVE-2025-1756,0,0,20464066b464a87a383feb7ebdf7bcca2a5e74a3cb642d459cada04b2b771e8c,2025-02-27T16:15:39.287000
CVE-2025-1757,1,1,2561a8f5c53734c028e83a6bda94ef29e169c9eb7376cb65d67bea6c6b2880de,2025-02-28T05:15:34.097000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
@ -281963,7 +281971,7 @@ CVE-2025-23219,0,0,ff8351d887bc29166dab82a4b68af000abcef0e83b233919e05ba508d1ac3
CVE-2025-23220,0,0,5b564633412cece7af52329de23c0e8a76b7a6808360135afd457619c6bf08e8,2025-02-18T21:15:28.320000
CVE-2025-23221,0,0,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc294,2025-01-20T17:15:07.987000
CVE-2025-23222,0,0,18aa2a1e2bf6061bb8eb2028cc63aa7a30f3ae667c4d6d42b09c703374489ff5,2025-01-24T17:15:15.730000
CVE-2025-23225,1,1,b99e53df48ff7dbc8278465c04d7942c23b33f567d4baaf05829539899047092,2025-02-28T03:15:10.807000
CVE-2025-23225,0,0,b99e53df48ff7dbc8278465c04d7942c23b33f567d4baaf05829539899047092,2025-02-28T03:15:10.807000
CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe29c,2025-01-23T18:15:33.440000
CVE-2025-23236,0,0,190a8ddc8688f8aa0a88d8a027b6b33a7ce91edfda9c184dc87404da93cc5156,2025-02-06T08:15:30.170000
CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000

Can't render this file because it is too large.