diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12820.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12820.json new file mode 100644 index 00000000000..89a68398657 --- /dev/null +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12820.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-12820", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-28T06:15:24.903", + "lastModified": "2025-02-28T06:15:24.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The MK Google Directions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'MKGD' shortcode in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3246361/google-distance-calculator/tags/3.1.1/mk-google-directions.php?old=3046209&old_path=google-distance-calculator%2Ftags%2F3.1%2Fmk-google-directions.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/23b3570c-cd8e-4dec-bbad-6374c44530bd?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13796.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13796.json new file mode 100644 index 00000000000..1f10907de87 --- /dev/null +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13796.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-13796", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-28T05:15:32.950", + "lastModified": "2025-02-28T05:15:32.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Post Grid and Gutenberg Blocks \u2013 ComboBlocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.6 via the /wp-json/post-grid/v2/get_users REST API This makes it possible for unauthenticated attackers to extract sensitive data including including emails and other user data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/post-grid/trunk/includes/blocks/functions-rest.php?rev=3242718#L2055", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3245187%40post-grid&new=3245187%40post-grid&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0407223a-cd41-43d1-87b0-d6b83b57d4b3?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0801.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0801.json new file mode 100644 index 00000000000..22eca0d611d --- /dev/null +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0801.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-0801", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-28T05:15:33.683", + "lastModified": "2025-02-28T05:15:33.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The RateMyAgent Official plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.0. This is due to missing or incorrect nonce validation on the 'rma-settings-wizard'. This makes it possible for unauthenticated attackers to update the plugin's API key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3244718%40ratemyagent-official&new=3244718%40ratemyagent-official&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/ratemyagent-official/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b559017c-f1d2-4f18-bfb6-e52f05910e34?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1505.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1505.json new file mode 100644 index 00000000000..c2b574a23ec --- /dev/null +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1505.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-1505", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-28T05:15:33.923", + "lastModified": "2025-02-28T05:15:33.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Advanced AJAX Product Filters plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'nonce' parameter in all versions up to, and including, 1.6.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3245830/woocommerce-ajax-filters/trunk/includes/wizard.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94b289bf-0ef1-47d1-98bd-8f7bb753c2bc?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1506.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1506.json new file mode 100644 index 00000000000..ebcfaf2ca1c --- /dev/null +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1506.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-1506", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-28T06:15:25.557", + "lastModified": "2025-02-28T06:15:25.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Wp Social Login and Register Social Counter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.0. This is due to missing or incorrect nonce validation on the counter_access_key_setup() function. This makes it possible for unauthenticated attackers to update social login provider settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wp-social/tags/3.0.9/inc/counter.php#L189", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3246155/wp-social/trunk/inc/counter.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/669833b3-1689-4051-8990-c6eddae4858f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1511.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1511.json new file mode 100644 index 00000000000..47ae27cd8ca --- /dev/null +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1511.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-1511", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-28T06:15:25.750", + "lastModified": "2025-02-28T06:15:25.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The User Registration & Membership \u2013 Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 4.0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/user-registration/tags/4.0.2/modules/membership/includes/Admin/Membership/ListTable.php#L246", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3246826/user-registration/tags/4.1.0/modules/membership/includes/Admin/Membership/ListTable.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e0bee7c-8dce-421c-af16-7e5152797e6c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1513.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1513.json new file mode 100644 index 00000000000..c5824775ac4 --- /dev/null +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1513.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-1513", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-28T06:15:25.937", + "lastModified": "2025-02-28T06:15:25.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery \u2013 Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Name and Comment field when commenting on photo gallery entries in all versions up to, and including, 26.0.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3245199%40contest-gallery&new=3245199%40contest-gallery&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1b5cf360-0163-4a7c-8979-ec89ec80ad62?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1757.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1757.json new file mode 100644 index 00000000000..859a018d5e4 --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1757.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-1757", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-28T05:15:34.097", + "lastModified": "2025-02-28T05:15:34.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WordPress Portfolio Builder \u2013 Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pfhub_portfolio' and 'pfhub_portfolio_portfolio' shortcodes in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/uber-grid/trunk/src/Frontend.php#L39", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/uber-grid/trunk/src/Frontend.php#L542", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/36dcf1c4-1e0a-4ab6-a1b3-a9fe3aaddd0b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0892defb73c..1fce6bdf9d4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-28T05:00:19.773940+00:00 +2025-02-28T07:00:19.842222+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-28T04:15:09.603000+00:00 +2025-02-28T06:15:25.937000+00:00 ``` ### Last Data Feed Release @@ -33,19 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -283472 +283480 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `8` -- [CVE-2024-54173](CVE-2024/CVE-2024-541xx/CVE-2024-54173.json) (`2025-02-28T03:15:09.357`) -- [CVE-2024-56340](CVE-2024/CVE-2024-563xx/CVE-2024-56340.json) (`2025-02-28T03:15:10.363`) -- [CVE-2025-0823](CVE-2025/CVE-2025-08xx/CVE-2025-0823.json) (`2025-02-28T03:15:10.510`) -- [CVE-2025-0975](CVE-2025/CVE-2025-09xx/CVE-2025-0975.json) (`2025-02-28T03:15:10.653`) -- [CVE-2025-1744](CVE-2025/CVE-2025-17xx/CVE-2025-1744.json) (`2025-02-28T04:15:09.603`) -- [CVE-2025-23225](CVE-2025/CVE-2025-232xx/CVE-2025-23225.json) (`2025-02-28T03:15:10.807`) +- [CVE-2024-12820](CVE-2024/CVE-2024-128xx/CVE-2024-12820.json) (`2025-02-28T06:15:24.903`) +- [CVE-2024-13796](CVE-2024/CVE-2024-137xx/CVE-2024-13796.json) (`2025-02-28T05:15:32.950`) +- [CVE-2025-0801](CVE-2025/CVE-2025-08xx/CVE-2025-0801.json) (`2025-02-28T05:15:33.683`) +- [CVE-2025-1505](CVE-2025/CVE-2025-15xx/CVE-2025-1505.json) (`2025-02-28T05:15:33.923`) +- [CVE-2025-1506](CVE-2025/CVE-2025-15xx/CVE-2025-1506.json) (`2025-02-28T06:15:25.557`) +- [CVE-2025-1511](CVE-2025/CVE-2025-15xx/CVE-2025-1511.json) (`2025-02-28T06:15:25.750`) +- [CVE-2025-1513](CVE-2025/CVE-2025-15xx/CVE-2025-1513.json) (`2025-02-28T06:15:25.937`) +- [CVE-2025-1757](CVE-2025/CVE-2025-17xx/CVE-2025-1757.json) (`2025-02-28T05:15:34.097`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 61ad39226e0..b999edf44b3 100644 --- a/_state.csv +++ b/_state.csv @@ -246800,6 +246800,7 @@ CVE-2024-12817,0,0,177c0c1ee17fbeb45fd7a30a85d211f5e3e78b0121812fcf822599a3e7e7f CVE-2024-12818,0,0,84584f689c6c77a45a4884a21e812302b20927c35cf898200120c33746d2aaa2,2025-01-15T10:15:07.803000 CVE-2024-12819,0,0,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b06d,2025-01-09T11:15:15.657000 CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000 +CVE-2024-12820,1,1,e360640a03322169bd3f6f06c3ba39e6c3f29a8f90c8d81b8f4979e1e5e53133,2025-02-28T06:15:24.903000 CVE-2024-12821,0,0,7372c2b0dab41e9efab53321f64857db82fe2b13cccde335b3d3062f730a0707,2025-01-30T14:15:32.843000 CVE-2024-12822,0,0,1237e8d30b34608b9228bf4eac8a25382e97ffcf3e8959f1fd3fc8d0a61375ef,2025-01-30T14:15:33.017000 CVE-2024-12825,0,0,e5a4d7f38d6d259b5737402affdabce23860527403323be321069fe15e333462,2025-02-21T15:34:58.803000 @@ -247652,6 +247653,7 @@ CVE-2024-13791,0,0,87d34d666cc6abe64fd811a08f4df25c9dcd54e5f0bd075f781061adfbd26 CVE-2024-13792,0,0,95c136c58ffd0d86dab2da9aa86fa75170f9d7e438d0612c3363162ba0d1c0ed,2025-02-25T20:56:55.553000 CVE-2024-13794,0,0,7d022241f9cbf94ac9ed1b3f72ace036ea4f25f4241c06ac4a29fc609bc50719,2025-02-25T19:38:05.950000 CVE-2024-13795,0,0,5c01555cf2ad62d519339aa7fca734aa9775ae1bd36f752424bbf014d4c482c0,2025-02-21T15:33:49.100000 +CVE-2024-13796,1,1,087b9ce07eec49c2f22f938b8e7bf977a4fb1b62eb4416dd03b68c4248b79ae2,2025-02-28T05:15:32.950000 CVE-2024-13797,0,0,784cf91e048f4958bdad15f96921115cca7505f76e057d124aec3331890c0072,2025-02-21T12:17:17.200000 CVE-2024-13798,0,0,b7519f3897d26f2d9d8f21bc61cafa9077a8c17dfa0e7a4b29a801ec94d2e592,2025-02-22T05:15:12.590000 CVE-2024-13799,0,0,e8bf3eec61ee5004ffe816bc3d1e1d3f4c7c5fc01f5e38b638ff3d46b6679801,2025-02-19T06:15:21.283000 @@ -274064,7 +274066,7 @@ CVE-2024-54169,0,0,8f8e39f28e7aaab08ffb70d2fa53ac338f4a1cb17764b38d9fedae190adae CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000 CVE-2024-54170,0,0,115fcfa389ae6bda1f9341d4e101093ad6d8b81f4dcb7bc6cae920d01c10de34,2025-02-27T15:15:39.240000 CVE-2024-54171,0,0,76fdd9d793c7b352d23e0d64a823cd883e5b81bbb06d5f2cffeb90d9ca7786b4,2025-02-06T21:15:21.453000 -CVE-2024-54173,1,1,00cfedbefa545cfb7f51fc181eaeb6b327672deee2effac2489357215df8fd22,2025-02-28T03:15:09.357000 +CVE-2024-54173,0,0,00cfedbefa545cfb7f51fc181eaeb6b327672deee2effac2489357215df8fd22,2025-02-28T03:15:09.357000 CVE-2024-54176,0,0,5463f590e796ae65427debb4e96d6df8b03f447d67021c1f3c7471918becbe24,2025-02-08T17:15:21.643000 CVE-2024-5418,0,0,c3b6dacc234cf8a9c6de6913d07caa1810e24ada600d2b1f8edeb26c6b62184b,2024-11-21T09:47:36.970000 CVE-2024-54181,0,0,45bad33d373e7dca4c705e8d7f190d9cc110f08937ef6a2be63d00cdd251ea54,2024-12-30T14:15:05.867000 @@ -275151,7 +275153,7 @@ CVE-2024-56334,0,0,dd145a89bec8d5c627af1aa8e241a3a3cc8f1f4441c2e387ed54258794c2f CVE-2024-56335,0,0,68042c7d7012ee80feaa30ed25472b1a3afe996d5346e3cfc0fb43c7dcee7c7c,2024-12-20T21:15:10.277000 CVE-2024-56337,0,0,53003cbffc45df9623db82452361ba8a0a459ad2bf417245b4c8041b16113fd7,2025-01-03T12:15:26.787000 CVE-2024-5634,0,0,fe363b0a66fb6b5b9d2d7dec7e16e67a66de21f18ca94ef9da54634c5755ab66,2024-11-21T09:48:03.610000 -CVE-2024-56340,1,1,4e6c15ca79e36e58b0c53eec0eb67f5474f4a8d00d54fe682d9d2126ea8b1ef7,2025-02-28T03:15:10.363000 +CVE-2024-56340,0,0,4e6c15ca79e36e58b0c53eec0eb67f5474f4a8d00d54fe682d9d2126ea8b1ef7,2025-02-28T03:15:10.363000 CVE-2024-56348,0,0,8aaa2ba55d8fe9db8a92a2d0ab499d623c381253cc0adc64426705df2faaf22a,2025-01-02T18:51:41.037000 CVE-2024-56349,0,0,22da00bebf6ac64c6a8cff1b863000f36f191d4d1414cab4c6d24fb796c53539,2025-01-02T18:51:21.857000 CVE-2024-5635,0,0,0a6341b938bdc4dcacbc69dffaf28fad5ae004ccda44b69838f8259b734db74e,2024-11-21T09:48:03.733000 @@ -280283,6 +280285,7 @@ CVE-2025-0797,0,0,6473915a793ff9884aafab236f62e144affe799470e5962b8e5351b78ec1cb CVE-2025-0798,0,0,f979c1c8f68dd351170669e51288efee24790cc09665b119a10fc6d4d02457d2,2025-01-29T02:15:27.190000 CVE-2025-0799,0,0,24d7e10897e858e097e83298564d3196763b9824077dbf2b4283317ae2c0fd13,2025-02-06T01:15:09.580000 CVE-2025-0800,0,0,9e70c7ae7b67598c33ec1be994b15b025cffe8ea4961b83f2cb2dbf2f54224bc,2025-02-10T14:11:58.423000 +CVE-2025-0801,1,1,e2bc3bb5a984a8abcd451e3de8f434f19668d21b83a5b66f1573755941e16889,2025-02-28T05:15:33.683000 CVE-2025-0802,0,0,058667df6e6f167c26958b65b8647dee5b306173c5334271f5f14ad30de88b99,2025-02-10T14:06:03.410000 CVE-2025-0803,0,0,a9f14556ef67fd49c2c0c4e57733c9351d270dba138685c5a84cb2509244be40,2025-02-11T19:48:06.860000 CVE-2025-0804,0,0,53f7fab3a5e8ab11732155ff3e17826c7a6f61d1fcafd348f26f842f26491509,2025-01-29T04:15:07.193000 @@ -280296,7 +280299,7 @@ CVE-2025-0816,0,0,d15c54cfa7b84645defa8a62e6e50a00e104c593cdfd6c16c28c49b600c342 CVE-2025-0817,0,0,11343ed20662b8da62be45ff4c13d864ae4d9a05be3d231b0a3e4a5cb280e5dc,2025-02-21T12:15:11.963000 CVE-2025-0821,0,0,276d38f36e1718392d91943f87a21d4117bd30970ca15dadffff44ef97d51e0f,2025-02-25T03:42:52.263000 CVE-2025-0822,0,0,4c844a6713ce2631895193eac241699c6c3839eb1c8dbea359488af5de55887f,2025-02-24T12:36:46.670000 -CVE-2025-0823,1,1,489bc052750695544d585739b7e55771102b6fbe5b2f90bedc63d7b39bccf2d4,2025-02-28T03:15:10.510000 +CVE-2025-0823,0,0,489bc052750695544d585739b7e55771102b6fbe5b2f90bedc63d7b39bccf2d4,2025-02-28T03:15:10.510000 CVE-2025-0825,0,0,7f81ca19fb96d77c0731181ff23092e49d4e8a157f0a8fa4a0ca13f53bda7923,2025-02-04T15:15:19.420000 CVE-2025-0834,0,0,239a6f08c2db88ce57ab64c699932d200eff33712703b8a8f00d02b01207348f,2025-01-30T09:15:09.703000 CVE-2025-0837,0,0,edb903a525c34e5db3f70de24ac0ad9bb2158867f6a7f92ca61239987715eef7,2025-02-24T17:08:29.033000 @@ -280380,7 +280383,7 @@ CVE-2025-0971,0,0,633a244c07788fdbfdfdcc8863df0b7c407fe050fbfbd58b149dfe7ef4b5bb CVE-2025-0972,0,0,5f696e03d949e1a49551d14d8f8b313b3e334794f668dc156f7f61acec16e7d4,2025-02-03T00:15:28.007000 CVE-2025-0973,0,0,43196315f17909695c2c467d44bd1754687d87efefe1c24665042841ac303abc,2025-02-03T01:15:07.263000 CVE-2025-0974,0,0,ed110dbaf1b5b967bb38884e7ebb961da1c8692b7e1576cd2f418134ffba9e99,2025-02-03T02:15:26.433000 -CVE-2025-0975,1,1,6b2c1ef329ad89d7b985fa632122902422fa8daa84b058609488b018d9051b6b,2025-02-28T03:15:10.653000 +CVE-2025-0975,0,0,6b2c1ef329ad89d7b985fa632122902422fa8daa84b058609488b018d9051b6b,2025-02-28T03:15:10.653000 CVE-2025-0981,0,0,77670fbd06993c72f858090d230bbbd76961e50ba2a7e6b7437ae6f3246e33de,2025-02-21T15:23:43.717000 CVE-2025-0982,0,0,743f39b6fc5d357ba3083d9f8f3d69f42ae53e58d798d8fd1e36d71ec2810d37,2025-02-06T12:15:27.267000 CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000 @@ -280634,8 +280637,12 @@ CVE-2025-1483,0,0,eed3d83cb2da5908d92aa9dd620a120571071c04f49e7599dc48ec4179593b CVE-2025-1488,0,0,43cfa98a915bcf0660c9d6b45b3151f7578e9794c9b93f44777c487cb0fa081f,2025-02-24T11:15:10.193000 CVE-2025-1489,0,0,3008549e3d2861f78796256b763f59eec371226dd4b84353f864c64443cf0ecb,2025-02-24T19:45:21.653000 CVE-2025-1492,0,0,a12c05d7276816932001573681340e79b217d21be6e278e421f34f68972737e1,2025-02-20T02:15:38.553000 +CVE-2025-1505,1,1,f07d028c0b1afb5f694ef937c5c5c28e5a39031e094947035ed6a198be466653,2025-02-28T05:15:33.923000 +CVE-2025-1506,1,1,3f7cdcccb4278d311606b0b4c7fc8dc6a6db82f7eaadf4061c1d5cb0a4181211,2025-02-28T06:15:25.557000 CVE-2025-1509,0,0,23e6d59505826ac4948dc80673c03ff2b0aed485111f57186985eb2e5cb2ebc3,2025-02-22T04:15:09.883000 CVE-2025-1510,0,0,9b376c589154983b1ec02250f9735f4521be8d5584c35e34e9235c478622092f,2025-02-22T04:15:10.040000 +CVE-2025-1511,1,1,92d16ec9cdb5f4e3f37d1ead50a4ecde4e869b1ac9e9b474b39bd9ef65a37b75,2025-02-28T06:15:25.750000 +CVE-2025-1513,1,1,49686153eb93c741adb1d6d7e23372a0773d0f92ceeb66d85a64053bd21ac0c5,2025-02-28T06:15:25.937000 CVE-2025-1517,0,0,3a8527d396408e64988324446816f3f2a736d3d929503a44ae66c5cadda29ddc,2025-02-26T13:15:41.193000 CVE-2025-1535,0,0,c8067c833343598442009f0c070dbd08eddedc896cdd41576fc32acd051fac52,2025-02-21T12:15:30.877000 CVE-2025-1536,0,0,10f03af38479b02a7f4a530d7c1cc2f1541bce31ead11e490c0a23f9eb3125a3,2025-02-21T15:15:12.270000 @@ -280721,11 +280728,12 @@ CVE-2025-1739,0,0,474bd41a40b4d7e6fdfff026df5b08f6be7f300b56e56bcc0fdd145be43728 CVE-2025-1741,0,0,344f7bc016a7178d5c4314a2e4d09672c42edf31aa2ee8b574916c55f2eebd7d,2025-02-27T16:15:38.930000 CVE-2025-1742,0,0,739398478edc9ddece71d3399efb7eaab9bd1f42fe6e327305583b23ec5e53bd,2025-02-27T17:15:16.460000 CVE-2025-1743,0,0,f420185c057195d1e0f14c6168b6487602fc3aa63e73bf5c979d7d5fa960e55c,2025-02-27T18:15:27.650000 -CVE-2025-1744,1,1,5a87ca10a34bf3a6ed6260577bc3c3361cf00a88203a3dbaf734b36322e0f166,2025-02-28T04:15:09.603000 +CVE-2025-1744,0,0,5a87ca10a34bf3a6ed6260577bc3c3361cf00a88203a3dbaf734b36322e0f166,2025-02-28T04:15:09.603000 CVE-2025-1745,0,0,9e47846683e7157da502ac5a77516ebab38eebca4e7114c00a2b8bf268b0ef4b,2025-02-27T18:15:27.923000 CVE-2025-1751,0,0,e01d857b710fac9b7b6217b59ced116e365117c6a164f06207b3b6874d6bb32a,2025-02-27T12:15:35.030000 CVE-2025-1755,0,0,022c1cdfb96f9a1d1782ea7a255dc456cf2cd5b57b21fa0b4b69f69925763fae,2025-02-27T16:15:39.137000 CVE-2025-1756,0,0,20464066b464a87a383feb7ebdf7bcca2a5e74a3cb642d459cada04b2b771e8c,2025-02-27T16:15:39.287000 +CVE-2025-1757,1,1,2561a8f5c53734c028e83a6bda94ef29e169c9eb7376cb65d67bea6c6b2880de,2025-02-28T05:15:34.097000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 @@ -281963,7 +281971,7 @@ CVE-2025-23219,0,0,ff8351d887bc29166dab82a4b68af000abcef0e83b233919e05ba508d1ac3 CVE-2025-23220,0,0,5b564633412cece7af52329de23c0e8a76b7a6808360135afd457619c6bf08e8,2025-02-18T21:15:28.320000 CVE-2025-23221,0,0,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc294,2025-01-20T17:15:07.987000 CVE-2025-23222,0,0,18aa2a1e2bf6061bb8eb2028cc63aa7a30f3ae667c4d6d42b09c703374489ff5,2025-01-24T17:15:15.730000 -CVE-2025-23225,1,1,b99e53df48ff7dbc8278465c04d7942c23b33f567d4baaf05829539899047092,2025-02-28T03:15:10.807000 +CVE-2025-23225,0,0,b99e53df48ff7dbc8278465c04d7942c23b33f567d4baaf05829539899047092,2025-02-28T03:15:10.807000 CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe29c,2025-01-23T18:15:33.440000 CVE-2025-23236,0,0,190a8ddc8688f8aa0a88d8a027b6b33a7ce91edfda9c184dc87404da93cc5156,2025-02-06T08:15:30.170000 CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000