Auto-Update: 2025-05-29T18:00:19.004780+00:00

This commit is contained in:
cad-safe-bot 2025-05-29 18:03:57 +00:00
parent e264fe7498
commit ed9f4cdfe1
95 changed files with 3717 additions and 502 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-28204",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-19T21:15:09.527",
"lastModified": "2024-11-21T06:56:57.070",
"lastModified": "2025-05-29T16:15:27.570",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-28321",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-19T22:15:10.913",
"lastModified": "2024-11-21T06:57:09.883",
"lastModified": "2025-05-29T16:15:27.793",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2995",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-09-19T20:15:12.493",
"lastModified": "2024-11-21T07:02:03.227",
"lastModified": "2025-05-29T16:15:28.027",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-35060",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-19T22:15:10.953",
"lastModified": "2024-11-21T07:10:41.223",
"lastModified": "2025-05-29T16:15:28.313",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38351",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-19T21:15:09.627",
"lastModified": "2024-11-21T07:16:18.777",
"lastModified": "2025-05-29T16:15:28.527",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-269"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38509",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-19T22:15:11.457",
"lastModified": "2024-11-21T07:16:36.063",
"lastModified": "2025-05-29T16:15:28.730",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-38527",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-19T22:15:11.497",
"lastModified": "2024-11-21T07:16:36.650",
"lastModified": "2025-05-29T16:15:28.970",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37226",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-10T14:15:11.927",
"lastModified": "2024-09-10T16:35:00.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T16:28:20.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,110 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:*:-:*:*:*:*:*:*",
"versionEndExcluding": "4.6",
"matchCriteriaId": "D6B6CB75-1A96-45C9-ACF3-ED6715EC03A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:-:*:*:*:*:*:*",
"matchCriteriaId": "2D7620E1-4410-4912-A6D5-F0CF22922D67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:feature_pack6:*:*:*:*:*:*",
"matchCriteriaId": "FDEAF52D-B7D3-4691-B97C-FA1E2386C192"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix1:*:*:*:*:*:*",
"matchCriteriaId": "EEEDAD0D-6251-481B-9311-1AD2201AF40D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix10:*:*:*:*:*:*",
"matchCriteriaId": "7794B833-23DF-4BE2-97C5-4E80CD55DDF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix12:*:*:*:*:*:*",
"matchCriteriaId": "5206143F-D8D4-4E14-8770-D3C51E79F5B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix13:*:*:*:*:*:*",
"matchCriteriaId": "73183D0A-EF18-4A9F-9282-F56735F2C810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix2:*:*:*:*:*:*",
"matchCriteriaId": "8A8C106A-1D8B-454F-A0D5-897AEAE03E91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix3:*:*:*:*:*:*",
"matchCriteriaId": "3F2BECF5-4856-4998-8EAC-277E9EFC9132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix4:*:*:*:*:*:*",
"matchCriteriaId": "75122B39-3A52-4C05-A8E8-8BC0E60E25BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix5:*:*:*:*:*:*",
"matchCriteriaId": "26E28120-AEC3-42B4-A54D-8A471353A4F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix7:*:*:*:*:*:*",
"matchCriteriaId": "6CB11D2C-A2AA-48DC-B7DB-8C42D01538D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix8:*:*:*:*:*:*",
"matchCriteriaId": "54E76CD0-C880-4A3F-A395-E99B27BD7ABE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix9:*:*:*:*:*:*",
"matchCriteriaId": "FF8522B5-3A64-46EF-B119-A9555A86F392"
}
]
}
]
}
],
"references": [
{
"url": "https://code-white.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://code-white.com/public-vulnerability-list/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://docs.loftware.com/spectrum-releasenotes/Content/Hotfix/4.6_HF14.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37227",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-10T14:15:12.063",
"lastModified": "2024-09-10T17:35:04.710",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T16:28:09.540",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,105 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:*:-:*:*:*:*:*:*",
"versionEndExcluding": "4.6",
"matchCriteriaId": "D6B6CB75-1A96-45C9-ACF3-ED6715EC03A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:-:*:*:*:*:*:*",
"matchCriteriaId": "2D7620E1-4410-4912-A6D5-F0CF22922D67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:feature_pack6:*:*:*:*:*:*",
"matchCriteriaId": "FDEAF52D-B7D3-4691-B97C-FA1E2386C192"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix1:*:*:*:*:*:*",
"matchCriteriaId": "EEEDAD0D-6251-481B-9311-1AD2201AF40D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix10:*:*:*:*:*:*",
"matchCriteriaId": "7794B833-23DF-4BE2-97C5-4E80CD55DDF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix12:*:*:*:*:*:*",
"matchCriteriaId": "5206143F-D8D4-4E14-8770-D3C51E79F5B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix2:*:*:*:*:*:*",
"matchCriteriaId": "8A8C106A-1D8B-454F-A0D5-897AEAE03E91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix3:*:*:*:*:*:*",
"matchCriteriaId": "3F2BECF5-4856-4998-8EAC-277E9EFC9132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix4:*:*:*:*:*:*",
"matchCriteriaId": "75122B39-3A52-4C05-A8E8-8BC0E60E25BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix5:*:*:*:*:*:*",
"matchCriteriaId": "26E28120-AEC3-42B4-A54D-8A471353A4F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix7:*:*:*:*:*:*",
"matchCriteriaId": "6CB11D2C-A2AA-48DC-B7DB-8C42D01538D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix8:*:*:*:*:*:*",
"matchCriteriaId": "54E76CD0-C880-4A3F-A395-E99B27BD7ABE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix9:*:*:*:*:*:*",
"matchCriteriaId": "FF8522B5-3A64-46EF-B119-A9555A86F392"
}
]
}
]
}
],
"references": [
{
"url": "https://code-white.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://code-white.com/public-vulnerability-list/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://docs.loftware.com/spectrum-releasenotes/Content/Hotfix/4.6_HF13.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37231",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-10T14:15:12.283",
"lastModified": "2024-09-10T17:35:07.017",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T16:27:55.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,110 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:*:-:*:*:*:*:*:*",
"versionEndExcluding": "4.6",
"matchCriteriaId": "D6B6CB75-1A96-45C9-ACF3-ED6715EC03A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:-:*:*:*:*:*:*",
"matchCriteriaId": "2D7620E1-4410-4912-A6D5-F0CF22922D67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:feature_pack6:*:*:*:*:*:*",
"matchCriteriaId": "FDEAF52D-B7D3-4691-B97C-FA1E2386C192"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix1:*:*:*:*:*:*",
"matchCriteriaId": "EEEDAD0D-6251-481B-9311-1AD2201AF40D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix10:*:*:*:*:*:*",
"matchCriteriaId": "7794B833-23DF-4BE2-97C5-4E80CD55DDF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix12:*:*:*:*:*:*",
"matchCriteriaId": "5206143F-D8D4-4E14-8770-D3C51E79F5B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix13:*:*:*:*:*:*",
"matchCriteriaId": "73183D0A-EF18-4A9F-9282-F56735F2C810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix2:*:*:*:*:*:*",
"matchCriteriaId": "8A8C106A-1D8B-454F-A0D5-897AEAE03E91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix3:*:*:*:*:*:*",
"matchCriteriaId": "3F2BECF5-4856-4998-8EAC-277E9EFC9132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix4:*:*:*:*:*:*",
"matchCriteriaId": "75122B39-3A52-4C05-A8E8-8BC0E60E25BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix5:*:*:*:*:*:*",
"matchCriteriaId": "26E28120-AEC3-42B4-A54D-8A471353A4F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix7:*:*:*:*:*:*",
"matchCriteriaId": "6CB11D2C-A2AA-48DC-B7DB-8C42D01538D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix8:*:*:*:*:*:*",
"matchCriteriaId": "54E76CD0-C880-4A3F-A395-E99B27BD7ABE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loftware:spectrum:4.6:hotfix9:*:*:*:*:*:*",
"matchCriteriaId": "FF8522B5-3A64-46EF-B119-A9555A86F392"
}
]
}
]
}
],
"references": [
{
"url": "https://code-white.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://code-white.com/public-vulnerability-list/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://docs.loftware.com/spectrum-releasenotes/Content/Hotfix/4.6_HF14.htm",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38323",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-26T05:15:12.130",
"lastModified": "2024-11-21T08:13:19.990",
"lastModified": "2025-05-29T16:15:29.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43953",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-03T21:15:10.573",
"lastModified": "2024-11-21T08:25:00.607",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:18:40.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -60,8 +60,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sscms_project:sscms:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B40414E7-A464-4533-B220-111EE7AFE830"
"criteria": "cpe:2.3:a:sscms:sscms:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6C3D5C08-5D84-4CBD-A52A-1273F509A86D"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47189",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T10:15:11.010",
"lastModified": "2024-11-21T08:29:55.420",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:33:51.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmudev:defender:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "4.2.1",
"matchCriteriaId": "BE70EB6A-13FB-4473-B8F7-6CF061D95216"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/defender-security/wordpress-defender-securit-plugin-4-2-0-masked-login-area-view-bypass-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/defender-security/wordpress-defender-securit-plugin-4-2-0-masked-login-area-view-bypass-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48126",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-26T07:15:56.110",
"lastModified": "2024-11-21T08:31:08.223",
"lastModified": "2025-05-29T16:15:29.693",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48128",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-26T07:15:57.120",
"lastModified": "2024-11-21T08:31:08.547",
"lastModified": "2025-05-29T16:15:29.880",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48201",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-27T06:15:47.880",
"lastModified": "2024-11-21T08:31:12.597",
"lastModified": "2025-05-29T16:15:30.060",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48202",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-27T06:15:47.967",
"lastModified": "2024-11-21T08:31:12.747",
"lastModified": "2025-05-29T16:15:30.247",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51833",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-25T22:15:07.737",
"lastModified": "2024-11-21T08:38:53.143",
"lastModified": "2025-05-29T16:15:30.437",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51840",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-29T20:15:15.100",
"lastModified": "2024-11-21T08:38:53.983",
"lastModified": "2025-05-29T16:15:30.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-798"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52389",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-27T03:15:07.883",
"lastModified": "2025-01-20T17:15:07.527",
"lastModified": "2025-05-29T16:15:30.857",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6391",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-29T15:15:09.520",
"lastModified": "2024-11-21T08:43:46.140",
"lastModified": "2025-05-29T16:15:31.077",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6530",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-29T15:15:09.637",
"lastModified": "2024-11-21T08:44:02.440",
"lastModified": "2025-05-29T16:15:31.280",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-7199",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-29T15:15:09.897",
"lastModified": "2024-11-21T08:45:29.460",
"lastModified": "2025-05-29T16:15:31.463",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0625",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-25T03:15:07.753",
"lastModified": "2024-11-21T08:47:01.680",
"lastModified": "2025-05-29T16:15:31.777",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0727",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2024-01-26T09:15:07.637",
"lastModified": "2024-11-21T08:47:13.723",
"lastModified": "2025-05-29T16:15:31.960",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -59,6 +79,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0824",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-27T05:15:08.767",
"lastModified": "2024-11-21T08:47:27.227",
"lastModified": "2025-05-29T16:15:32.217",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1747",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-01T06:15:01.980",
"lastModified": "2024-08-01T15:35:05.150",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T17:23:24.683",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vanquish:woocommerce_customers_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "30.2",
"matchCriteriaId": "F7FE51D0-8FDF-4B96-9E85-A341F8612D50"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/17e45d4d-0ee1-4863-a8a4-df8587f448ec/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20253",
"sourceIdentifier": "psirt@cisco.com",
"published": "2024-01-26T18:15:10.970",
"lastModified": "2024-11-21T08:52:06.980",
"lastModified": "2025-05-29T16:15:33.330",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "psirt@cisco.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -72,13 +72,23 @@
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21413",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-02-13T18:16:00.137",
"lastModified": "2025-05-29T14:15:33.913",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:32:14.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -123,11 +123,17 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2024-21413-critical-monikerlink-vulnerability-affecting-microsoft-outlook-detection-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2024-21413-critical-monikerlink-vulnerability-affecting-microsoft-outlook-mitigation-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22545",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-26T08:15:42.480",
"lastModified": "2024-11-21T08:56:25.843",
"lastModified": "2025-05-29T16:15:34.440",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22551",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-26T15:15:09.490",
"lastModified": "2024-11-21T08:56:26.960",
"lastModified": "2025-05-29T16:15:34.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22559",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-29T14:15:09.940",
"lastModified": "2024-11-21T08:56:27.107",
"lastModified": "2025-05-29T16:15:34.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22639",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-25T21:15:09.520",
"lastModified": "2024-11-21T08:56:31.303",
"lastModified": "2025-05-29T16:15:35.030",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22861",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-27T07:15:07.603",
"lastModified": "2024-11-21T08:56:43.550",
"lastModified": "2025-05-29T16:15:35.213",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23739",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-28T03:15:07.700",
"lastModified": "2024-11-21T08:58:17.270",
"lastModified": "2025-05-29T16:15:35.657",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24134",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-29T19:15:08.940",
"lastModified": "2024-11-21T08:58:57.503",
"lastModified": "2025-05-29T16:15:38.477",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24140",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-29T20:15:15.557",
"lastModified": "2024-11-21T08:58:58.173",
"lastModified": "2025-05-29T16:15:38.687",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2843",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-01T06:15:02.367",
"lastModified": "2024-08-07T20:35:16.833",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T17:23:03.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vanquish:woocommerce_customers_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "30.1",
"matchCriteriaId": "2D7FA155-E24B-458E-BC23-4E44C0B17216"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/fec4e077-4c4e-4618-bfe8-61fdba59b696/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32792",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T13:15:51.217",
"lastModified": "2024-11-21T09:15:43.910",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:32:55.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:incsub:hummingbird:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.7.4",
"matchCriteriaId": "2719280B-2FCF-4B76-B803-9CF15B4D226A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/hummingbird-performance/wordpress-hummingbird-plugin-3-7-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/hummingbird-performance/wordpress-hummingbird-plugin-3-7-3-broken-access-control-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36787",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-07T15:15:50.140",
"lastModified": "2025-03-13T17:15:32.177",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T16:12:33.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:wnr614_firmware:1.1.0.54_1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE1AF97-B6AE-477B-B37B-5A515A854A34"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:wnr614:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC8A668E-4A30-4364-AF7A-F3C814BBAACA"
}
]
}
]
}
],
"references": [
{
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36789",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-07T15:15:50.323",
"lastModified": "2024-11-21T09:22:38.570",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T16:12:26.160",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:wnr614_firmware:1.1.0.54_1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE1AF97-B6AE-477B-B37B-5A515A854A34"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:wnr614:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC8A668E-4A30-4364-AF7A-F3C814BBAACA"
}
]
}
]
}
],
"references": [
{
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36790",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-07T15:15:50.407",
"lastModified": "2024-11-21T09:22:38.807",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T16:12:17.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:wnr614_firmware:1.1.0.54_1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE1AF97-B6AE-477B-B37B-5A515A854A34"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:wnr614:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC8A668E-4A30-4364-AF7A-F3C814BBAACA"
}
]
}
]
}
],
"references": [
{
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36792",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-07T15:15:50.493",
"lastModified": "2024-11-21T09:22:39.037",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T16:12:10.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:wnr614_firmware:1.1.0.54_1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE1AF97-B6AE-477B-B37B-5A515A854A34"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:wnr614:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC8A668E-4A30-4364-AF7A-F3C814BBAACA"
}
]
}
]
}
],
"references": [
{
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36795",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-06T21:15:48.687",
"lastModified": "2024-11-21T09:22:39.263",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T16:14:02.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:wnr614_firmware:1.1.0.54_1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE1AF97-B6AE-477B-B37B-5A515A854A34"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:wnr614:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC8A668E-4A30-4364-AF7A-F3C814BBAACA"
}
]
}
]
}
],
"references": [
{
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37630",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-13T18:15:11.030",
"lastModified": "2024-11-21T09:24:08.467",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:12:04.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*",
"matchCriteriaId": "47A17995-9117-42E4-938E-D18F605DD0FE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD4E3AA2-EC1C-4219-8E13-B52D30A7FA06"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/D-link/DIR-605L/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/D-link/DIR-605L/README.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3983",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-01T06:15:02.517",
"lastModified": "2024-08-01T14:35:11.540",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T17:22:34.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vanquish:woocommerce_customers_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "30.1",
"matchCriteriaId": "2D7FA155-E24B-458E-BC23-4E44C0B17216"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/e4059d66-07b9-4f1a-a461-d6e8f0e98eec/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40392",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-16T19:15:12.773",
"lastModified": "2024-11-21T09:31:02.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T16:09:05.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fkgeo:pharmacy\\/medical_store_point_of_sale_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E89C6BB3-0027-4526-AF88-A069D4C7C216"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/CveSecLook/cve/issues/46",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/CveSecLook/cve/issues/46",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41602",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T17:15:03.570",
"lastModified": "2024-11-21T09:32:49.867",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:08:45.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:denkgroot:spina:2.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8830A65-B061-49E9-9EF1-64A64A443876"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41602",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41602",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41603",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-19T17:15:03.640",
"lastModified": "2024-11-21T09:32:50.083",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:08:32.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:denkgroot:spina:2.18.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8830A65-B061-49E9-9EF1-64A64A443876"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41603",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41603",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4483",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-29T06:15:02.357",
"lastModified": "2024-11-21T09:42:55.060",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T17:34:54.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-webhooks:email_encoder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.2",
"matchCriteriaId": "3D3BE586-8ABA-4FAB-B94C-9DAB22F84B0E"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/8f2ac76c-f3f8-41f9-a32a-f414825cf6f1/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/8f2ac76c-f3f8-41f9-a32a-f414825cf6f1/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46328",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T14:15:09.273",
"lastModified": "2024-09-30T12:46:20.237",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T17:21:47.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:vonets:vap11g-300_firmware:3.3.23.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB578CE-F4E2-4ABE-AFF5-D45B46DC4682"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:vonets:vap11g-300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B23375E-0E77-4423-AEDA-9A9F26052834"
}
]
}
]
}
],
"references": [
{
"url": "https://hawktesters.com/5519644d-246e-4924-b7c8-8fdf742117be/9461d352-c4f6-477f-a44e-b91ff71e6d84.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46329",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-26T14:15:09.360",
"lastModified": "2024-09-30T12:46:20.237",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T17:20:14.240",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:vonets:vap11g-300_firmware:3.3.23.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB578CE-F4E2-4ABE-AFF5-D45B46DC4682"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:vonets:vap11g-300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B23375E-0E77-4423-AEDA-9A9F26052834"
}
]
}
]
}
],
"references": [
{
"url": "https://hawktesters.com/5519644d-246e-4924-b7c8-8fdf742117be/1af23e51-20e4-4432-a66c-64345c1e4ed4.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4756",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-07T06:15:11.920",
"lastModified": "2024-11-21T09:43:32.107",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:13:55.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpbackpack:wp_backpack:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1",
"matchCriteriaId": "DE1275B3-E6D0-4CAD-AA2D-738201B0CFC6"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/ce4688b6-6713-43b5-aa63-8a3b036bd332/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/ce4688b6-6713-43b5-aa63-8a3b036bd332/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48702",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:22.910",
"lastModified": "2025-05-29T15:15:32.790",
"lastModified": "2025-05-29T16:15:38.883",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
@ -96,6 +106,14 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/HTML%20Injection%28pagedes%29.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50690",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-24T23:15:08.227",
"lastModified": "2025-02-06T22:15:38.033",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:02:33.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sungrowpower:winet-s_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "200.001.00.p027",
"matchCriteriaId": "7EC5C36C-0726-4C02-9C89-FC97EB06D144"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sungrowpower:winet-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30D17448-43BC-46D6-87E8-B67F5FBBDFB5"
}
]
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/5961",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50692",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-24T23:15:08.893",
"lastModified": "2025-02-06T17:15:19.313",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:02:26.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sungrowpower:winet-s_firmware:200.001.00.p027:*:*:*:*:*:*:*",
"matchCriteriaId": "63F88B4E-D11C-45DA-B951-A2198E22F316"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sungrowpower:winet-s_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "200.001.00.p027",
"matchCriteriaId": "7EC5C36C-0726-4C02-9C89-FC97EB06D144"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sungrowpower:winet-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30D17448-43BC-46D6-87E8-B67F5FBBDFB5"
}
]
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/5961",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://mqtt-pwn.readthedocs.io/en/latest/intro.html",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50694",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-24T23:15:09.000",
"lastModified": "2025-02-05T15:15:20.463",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:02:20.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sungrowpower:winet-s_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "200.001.00.p027",
"matchCriteriaId": "7EC5C36C-0726-4C02-9C89-FC97EB06D144"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sungrowpower:winet-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30D17448-43BC-46D6-87E8-B67F5FBBDFB5"
}
]
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/5961",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50695",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-24T23:15:09.130",
"lastModified": "2025-02-05T15:15:20.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:02:13.390",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sungrowpower:winet-s_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "200.001.00.p027",
"matchCriteriaId": "7EC5C36C-0726-4C02-9C89-FC97EB06D144"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sungrowpower:winet-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30D17448-43BC-46D6-87E8-B67F5FBBDFB5"
}
]
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/5961",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50697",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-24T23:15:09.253",
"lastModified": "2025-01-27T16:15:31.423",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:02:02.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sungrowpower:winet-s_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "200.001.00.p027",
"matchCriteriaId": "7EC5C36C-0726-4C02-9C89-FC97EB06D144"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sungrowpower:winet-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30D17448-43BC-46D6-87E8-B67F5FBBDFB5"
}
]
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/5961",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50698",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-24T23:15:09.380",
"lastModified": "2025-02-05T15:15:20.790",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:01:55.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:sungrowpower:winet-s_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "200.001.00.p027",
"matchCriteriaId": "7EC5C36C-0726-4C02-9C89-FC97EB06D144"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:sungrowpower:winet-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30D17448-43BC-46D6-87E8-B67F5FBBDFB5"
}
]
}
]
}
],
"references": [
{
"url": "https://en.sungrowpower.com/security-notice-detail-2/5961",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51099",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T16:15:24.527",
"lastModified": "2025-05-29T15:15:32.977",
"lastModified": "2025-05-29T16:15:39.070",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,10 +39,26 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Reflected%20Cross-Site%20Scripting%20%28XSS%29-medical%20card%20details%20search.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0xBhushan/Writeups/blob/main/CVE/phpGurukul/Medical%20Card%20Generation%20System/Reflected%20Cross-Site%20Scripting%20%28XSS%29-medical%20card%20details%20search.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51101",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.093",
"lastModified": "2025-05-29T15:15:33.150",
"lastModified": "2025-05-29T16:15:39.240",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51107",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.267",
"lastModified": "2025-05-29T15:15:33.313",
"lastModified": "2025-05-29T16:15:39.417",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51108",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.440",
"lastModified": "2025-05-29T15:15:33.480",
"lastModified": "2025-05-29T16:15:39.603",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51360",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-23T15:15:23.617",
"lastModified": "2025-05-29T15:15:33.740",
"lastModified": "2025-05-29T16:15:39.787",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-51392",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-29T17:15:21.130",
"lastModified": "2025-05-29T17:15:21.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in OpenKnowledgeMaps Headstart v7 allows a remote attacker to escalate privileges via the url parameter of the getPDF.php component"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/OpenKnowledgeMaps/Headstart",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/manisashank/CVE-Publish/blob/main/CVE-2024-51392.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51675",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-09T13:15:05.683",
"lastModified": "2024-11-12T13:56:24.513",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:01:31.810",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:athemes:athemes_addons_for_elementor:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "1.0.8",
"matchCriteriaId": "FA792439-9B73-44B3-9C8F-1E855EB5DF17"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/athemes-addons-for-elementor-lite/wordpress-athemes-addons-for-elementor-plugin-1-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57590",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-27T15:15:11.463",
"lastModified": "2025-01-28T20:15:55.973",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:01:22.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:trendnet:tew-632brp_firmware:1.010b31:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE35660-F5B3-4CB1-972A-0AFD5DB0D5C3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:trendnet:tew-632brp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6391EF43-A672-468C-8F0F-76C59AD71BC6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/IdaJea/IOT_vuln_1/blob/master/tew632/ntp_sync.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6223",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.517",
"lastModified": "2024-11-21T09:49:13.743",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T17:34:01.997",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yasirwazir:send_email_only_on_reply_to_my_comment:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.6",
"matchCriteriaId": "B98F472E-1E1B-4C28-AD82-5B0B56E8F55B"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/cf7d1cea-0bf4-4b9e-bab4-71d5719a7c30/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/cf7d1cea-0bf4-4b9e-bab4-71d5719a7c30/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6224",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.623",
"lastModified": "2024-11-21T09:49:13.917",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T17:33:35.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yasirwazir:send_email_only_on_reply_to_my_comment:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.6",
"matchCriteriaId": "B98F472E-1E1B-4C28-AD82-5B0B56E8F55B"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/54457f1b-6572-4de0-9100-3433c715c5ce/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/54457f1b-6572-4de0-9100-3433c715c5ce/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6226",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-30T06:15:03.720",
"lastModified": "2024-11-21T09:49:14.220",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T17:24:40.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpstickybar:wpstickybar:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.0",
"matchCriteriaId": "8A1E549D-DFF7-4E99-950B-DD3E7B510DAC"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/e42ce8dc-51d4-471d-b3bb-ad2a6b735d02/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/e42ce8dc-51d4-471d-b3bb-ad2a6b735d02/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6362",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-29T06:15:02.700",
"lastModified": "2024-11-21T09:49:29.343",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T17:34:19.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dotcamp:ultimate_blocks:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.2.0",
"matchCriteriaId": "D1A6D9D3-1747-4FCC-9266-05A0983D22D4"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/d2e2d06b-0f07-40b9-9b87-3373f62ae1a9/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/d2e2d06b-0f07-40b9-9b87-3373f62ae1a9/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6420",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-23T06:15:11.413",
"lastModified": "2024-11-21T09:49:37.387",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:08:13.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpplugins:hide_my_wp_ghost:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.2.02",
"matchCriteriaId": "03E38802-832E-4C02-A9E6-6018C235072F"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/dfda6577-81aa-4397-a2d6-1d736f9ebd44/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/dfda6577-81aa-4397-a2d6-1d736f9ebd44/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8436",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-25T01:15:46.310",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T16:02:54.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -81,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:plugingarden:wp_easy_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.8.5",
"matchCriteriaId": "8E65F41F-9B89-44FC-BE1B-1E4C8D9EC93C"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-easy-gallery/trunk/wp-easy-gallery.php#L730",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6eb094a-4f5a-418a-ba95-635765abfcff?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8437",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-25T01:15:46.500",
"lastModified": "2024-09-26T13:32:02.803",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-05-29T16:02:35.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:plugingarden:wp_easy_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.8.5",
"matchCriteriaId": "8E65F41F-9B89-44FC-BE1B-1E4C8D9EC93C"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-easy-gallery/trunk/wp-easy-gallery.php#L42",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8bd5021-4895-4b0e-b517-186959f76095?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22646",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-03-27T15:15:57.397",
"lastModified": "2025-03-27T16:45:12.210",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:01:17.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:athemes:athemes_addons_for_elementor:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "1.0.9",
"matchCriteriaId": "356417C7-96E7-4BA4-8F99-7B9AFB2D22E8"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/athemes-addons-for-elementor-lite/vulnerability/wordpress-athemes-addons-for-elementor-plugin-1-0-8-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24054",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-03-11T17:16:27.660",
"lastModified": "2025-05-29T14:15:34.693",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:32:06.563",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -257,11 +257,17 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-24054-spoofing-vulnerability-in-windows-ntlm-by-microsoft-detection-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-24054-spoofing-vulnerability-in-windows-ntlm-by-microsoft-mitigation-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24985",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-03-11T17:16:34.303",
"lastModified": "2025-05-29T14:15:34.910",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-05-29T16:31:56.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -213,11 +213,17 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-24985-integer-overflow-vulnerability-in-microsoft-windows-fast-fat-driver-detection-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-24985-integer-overflow-vulnerability-in-microsoft-windows-fast-fat-driver-mitigation-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-30397",
"sourceIdentifier": "secure@microsoft.com",
"published": "2025-05-13T17:16:02.370",
"lastModified": "2025-05-29T14:15:35.313",
"vulnStatus": "Modified",
"lastModified": "2025-05-29T16:29:54.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -181,11 +181,17 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-30397-type-confusion-vulnerability-in-microsoft-scripting-engine-detection-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-30397-type-confusion-vulnerability-in-microsoft-scripting-engine-mitigation-script",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-3913",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2025-05-29T16:15:39.973",
"lastModified": "2025-05-29T16:15:39.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 10.7.x <= 10.7.0, 10.6.x <= 10.6.2, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fail to properly validate permissions when changing team privacy settings, allowing team administrators without the 'invite user' permission to access and modify team invite IDs via the /api/v4/teams/:teamId/privacy endpoint."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-45474",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-29T16:15:40.143",
"lastModified": "2025-05-29T16:15:40.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "maccms10 v2025.1000.4047 is vulnerable to Server-side request forgery (SSRF) in Email Settings."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://www.yuque.com/morysummer/vx41bz/ptnnp4eema601rvz",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-46570",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-29T17:15:21.327",
"lastModified": "2025-05-29T17:15:21.327",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "vLLM is an inference and serving engine for large language models (LLMs). Prior to version 0.9.0, when a new prompt is processed, if the PageAttention mechanism finds a matching prefix chunk, the prefill process speeds up, which is reflected in the TTFT (Time to First Token). These timing differences caused by matching chunks are significant enough to be recognized and exploited. This issue has been patched in version 0.9.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 2.6,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-208"
}
]
}
],
"references": [
{
"url": "https://github.com/vllm-project/vllm/commit/77073c77bc2006eb80ea6d5128f076f5e6c6f54f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vllm-project/vllm/pull/17045",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-4qjh-9fv9-r85r",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-46722",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-29T17:15:21.523",
"lastModified": "2025-05-29T17:15:21.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "vLLM is an inference and serving engine for large language models (LLMs). In versions starting from 0.7.0 to before 0.9.0, in the file vllm/multimodal/hasher.py, the MultiModalHasher class has a security and data integrity issue in its image hashing method. Currently, it serializes PIL.Image.Image objects using only obj.tobytes(), which returns only the raw pixel data, without including metadata such as the image\u2019s shape (width, height, mode). As a result, two images of different sizes (e.g., 30x100 and 100x30) with the same pixel byte sequence could generate the same hash value. This may lead to hash collisions, incorrect cache hits, and even data leakage or security risks. This issue has been patched in version 0.9.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1023"
},
{
"lang": "en",
"value": "CWE-1288"
}
]
}
],
"references": [
{
"url": "https://github.com/vllm-project/vllm/commit/99404f53c72965b41558aceb1bc2380875f5d848",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vllm-project/vllm/pull/17378",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-c65p-x677-fgj6",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-48389",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-29T16:15:40.330",
"lastModified": "2025-05-29T16:15:40.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.178, FreeScout is vulnerable to deserialization of untrusted data due to insufficient validation. Through the set function, a string with a serialized object can be passed, and when getting an option through the get method, deserialization will occur, which will allow arbitrary code execution This issue has been patched in version 1.8.178."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-help-desk/freescout/commit/f7548a7076a0b6e109001069d6be223fbd96c61e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-jmpv-8q3h-2m8v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-48390",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-29T16:15:40.490",
"lastModified": "2025-05-29T16:15:40.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.178, FreeScout is vulnerable to code injection due to insufficient validation of user input in the php_path parameter. The backticks characters are not removed, as well as tabulation is not removed. When checking user input, the file_exists function is also called to check for the presence of such a file (folder) in the file system. A user with the administrator role can create a translation for the language, which will create a folder in the file system. Further in tools.php, the user can specify the path to this folder as php_path, which will lead to the execution of code in backticks. This issue has been patched in version 1.8.178."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-help-desk/freescout/commit/fb33d672a2d67f5a2b3cf69c80945267f17908b2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-5324-cw55-gwj5",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-48471",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-29T16:15:40.650",
"lastModified": "2025-05-29T16:15:40.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, the application does not check or performs insufficient checking of files uploaded to the application. This allows files to be uploaded with the phtml and phar extensions, which can lead to remote code execution if the Apache web server is used. This issue has been patched in version 1.8.179."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-help-desk/freescout/commit/e136660e8dbc220454b8d3f646dd1b144e49e9ed",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-h2f3-932h-v38j",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-h2f3-932h-v38j",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-48472",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-29T16:15:40.870",
"lastModified": "2025-05-29T16:15:40.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, there is no check to ensure that the user is disabling notifications for the mailbox to which they already have access. Moreover, the code explicitly implements functionality that if the user does not have access to the mailbox, then after disabling (enabling) notifications for this mailbox, the user will gain access to it. This issue has been patched in version 1.8.179."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-help-desk/freescout/commit/01c91d2086ddd56778698e557138a178b2f59916",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-f62r-8354-8pqg",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-f62r-8354-8pqg",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-48473",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-29T16:15:41.077",
"lastModified": "2025-05-29T16:15:41.077",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.179, when creating a conversation from a message in another conversation, there is no check to ensure that the user has the ability to view this message. Thus, the user can view arbitrary messages from other mailboxes or from other conversations to which they do not have access (access restriction to conversations is implemented by the show_only_assigned_conversations setting, which is also not checked). This issue has been patched in version 1.8.179."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-help-desk/freescout/commit/2552a2b84248824b73c35b2699aa86da644eea1a",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-3x75-7856-r794",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-48474",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-29T16:15:41.273",
"lastModified": "2025-05-29T16:15:41.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the application incorrectly checks user access rights for conversations. Users with show_only_assigned_conversations enabled can assign themselves to an arbitrary conversation from the mailbox to which they have access, thereby bypassing the restriction on viewing conversations. This issue has been patched in version 1.8.180."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-help-desk/freescout/commit/87cdb65d6b632b5292bcac2d7a209f6e36ae51d7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-9wc4-vchw-mr3m",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-48475",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-05-29T17:15:21.720",
"lastModified": "2025-05-29T17:15:21.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, the System does not provide a check on which \"clients\" of the System an authorized user can view and edit, and which ones they cannot. As a result, an authorized user who does not have access to any of the existing mailboxes, as well as to any of the existing conversations, has the ability to view and edit the System's clients. The limitation of client visibility can be implemented by the limit_user_customer_visibility setting, however, in the specified scenarios, there is no check for the presence of this setting. This issue has been patched in version 1.8.180."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/freescout-help-desk/freescout/commit/1f154ce039618ed5abd960c97619c23534c0717a",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-xvch-f75c-8w8q",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-48742",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-27T04:15:36.750",
"lastModified": "2025-05-28T15:01:30.720",
"lastModified": "2025-05-29T17:15:21.900",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The installer in SIGB PMB before 8.0.1.2 allows remote code execution."
"value": "The installer in SIGB PMB before and fixed in v.8.0.1.2 allows remote code execution."
},
{
"lang": "es",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-48748",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-05-29T15:15:34.137",
"lastModified": "2025-05-29T15:15:34.137",
"lastModified": "2025-05-29T16:15:41.483",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Netwrix Directory Manager (formerly Imanami GroupID) through v.10.0.7784.0 has a hard-coded password."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://community.netwrix.com/t/adv-2025-013-hard-coded-password-in-netwrix-directory-manager-formerly-imanami-groupid-v10-and-earlier/13945",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-5278",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-05-27T21:15:23.197",
"lastModified": "2025-05-29T13:15:26.473",
"lastModified": "2025-05-29T16:15:41.723",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -67,6 +67,18 @@
{
"url": "http://www.openwall.com/lists/oss-security/2025/05/29/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2025-5278",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-05-29T16:00:20.097088+00:00
2025-05-29T18:00:19.004780+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-05-29T15:59:05.460000+00:00
2025-05-29T17:34:54.147000+00:00
```
### Last Data Feed Release
@ -33,61 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
295923
295935
```
### CVEs added in the last Commit
Recently added CVEs: `17`
Recently added CVEs: `12`
- [CVE-2024-22653](CVE-2024/CVE-2024-226xx/CVE-2024-22653.json) (`2025-05-29T15:15:29.470`)
- [CVE-2024-22654](CVE-2024/CVE-2024-226xx/CVE-2024-22654.json) (`2025-05-29T15:15:29.693`)
- [CVE-2025-33043](CVE-2025/CVE-2025-330xx/CVE-2025-33043.json) (`2025-05-29T14:15:35.523`)
- [CVE-2025-37993](CVE-2025/CVE-2025-379xx/CVE-2025-37993.json) (`2025-05-29T14:15:35.767`)
- [CVE-2025-37994](CVE-2025/CVE-2025-379xx/CVE-2025-37994.json) (`2025-05-29T14:15:35.897`)
- [CVE-2025-37995](CVE-2025/CVE-2025-379xx/CVE-2025-37995.json) (`2025-05-29T14:15:36.043`)
- [CVE-2025-37996](CVE-2025/CVE-2025-379xx/CVE-2025-37996.json) (`2025-05-29T14:15:36.183`)
- [CVE-2025-37997](CVE-2025/CVE-2025-379xx/CVE-2025-37997.json) (`2025-05-29T14:15:36.317`)
- [CVE-2025-37998](CVE-2025/CVE-2025-379xx/CVE-2025-37998.json) (`2025-05-29T14:15:36.450`)
- [CVE-2025-37999](CVE-2025/CVE-2025-379xx/CVE-2025-37999.json) (`2025-05-29T14:15:36.597`)
- [CVE-2025-4081](CVE-2025/CVE-2025-40xx/CVE-2025-4081.json) (`2025-05-29T15:15:34.257`)
- [CVE-2025-46078](CVE-2025/CVE-2025-460xx/CVE-2025-46078.json) (`2025-05-29T14:15:37.007`)
- [CVE-2025-46080](CVE-2025/CVE-2025-460xx/CVE-2025-46080.json) (`2025-05-29T14:15:37.220`)
- [CVE-2025-48748](CVE-2025/CVE-2025-487xx/CVE-2025-48748.json) (`2025-05-29T15:15:34.137`)
- [CVE-2025-5320](CVE-2025/CVE-2025-53xx/CVE-2025-5320.json) (`2025-05-29T14:15:38.377`)
- [CVE-2025-5321](CVE-2025/CVE-2025-53xx/CVE-2025-5321.json) (`2025-05-29T15:15:34.417`)
- [CVE-2025-5334](CVE-2025/CVE-2025-53xx/CVE-2025-5334.json) (`2025-05-29T15:15:34.650`)
- [CVE-2024-51392](CVE-2024/CVE-2024-513xx/CVE-2024-51392.json) (`2025-05-29T17:15:21.130`)
- [CVE-2025-3913](CVE-2025/CVE-2025-39xx/CVE-2025-3913.json) (`2025-05-29T16:15:39.973`)
- [CVE-2025-45474](CVE-2025/CVE-2025-454xx/CVE-2025-45474.json) (`2025-05-29T16:15:40.143`)
- [CVE-2025-46570](CVE-2025/CVE-2025-465xx/CVE-2025-46570.json) (`2025-05-29T17:15:21.327`)
- [CVE-2025-46722](CVE-2025/CVE-2025-467xx/CVE-2025-46722.json) (`2025-05-29T17:15:21.523`)
- [CVE-2025-48389](CVE-2025/CVE-2025-483xx/CVE-2025-48389.json) (`2025-05-29T16:15:40.330`)
- [CVE-2025-48390](CVE-2025/CVE-2025-483xx/CVE-2025-48390.json) (`2025-05-29T16:15:40.490`)
- [CVE-2025-48471](CVE-2025/CVE-2025-484xx/CVE-2025-48471.json) (`2025-05-29T16:15:40.650`)
- [CVE-2025-48472](CVE-2025/CVE-2025-484xx/CVE-2025-48472.json) (`2025-05-29T16:15:40.870`)
- [CVE-2025-48473](CVE-2025/CVE-2025-484xx/CVE-2025-48473.json) (`2025-05-29T16:15:41.077`)
- [CVE-2025-48474](CVE-2025/CVE-2025-484xx/CVE-2025-48474.json) (`2025-05-29T16:15:41.273`)
- [CVE-2025-48475](CVE-2025/CVE-2025-484xx/CVE-2025-48475.json) (`2025-05-29T17:15:21.720`)
### CVEs modified in the last Commit
Recently modified CVEs: `166`
Recently modified CVEs: `81`
- [CVE-2025-48388](CVE-2025/CVE-2025-483xx/CVE-2025-48388.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-48746](CVE-2025/CVE-2025-487xx/CVE-2025-48746.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-48747](CVE-2025/CVE-2025-487xx/CVE-2025-48747.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-48749](CVE-2025/CVE-2025-487xx/CVE-2025-48749.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-48925](CVE-2025/CVE-2025-489xx/CVE-2025-48925.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-48926](CVE-2025/CVE-2025-489xx/CVE-2025-48926.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-48927](CVE-2025/CVE-2025-489xx/CVE-2025-48927.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-48928](CVE-2025/CVE-2025-489xx/CVE-2025-48928.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-48929](CVE-2025/CVE-2025-489xx/CVE-2025-48929.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-48930](CVE-2025/CVE-2025-489xx/CVE-2025-48930.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-48931](CVE-2025/CVE-2025-489xx/CVE-2025-48931.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-5063](CVE-2025/CVE-2025-50xx/CVE-2025-5063.json) (`2025-05-29T15:51:16.957`)
- [CVE-2025-5064](CVE-2025/CVE-2025-50xx/CVE-2025-5064.json) (`2025-05-29T15:51:09.800`)
- [CVE-2025-5065](CVE-2025/CVE-2025-50xx/CVE-2025-5065.json) (`2025-05-29T15:50:57.497`)
- [CVE-2025-5066](CVE-2025/CVE-2025-50xx/CVE-2025-5066.json) (`2025-05-29T15:50:51.310`)
- [CVE-2025-5067](CVE-2025/CVE-2025-50xx/CVE-2025-5067.json) (`2025-05-29T15:50:43.240`)
- [CVE-2025-5122](CVE-2025/CVE-2025-51xx/CVE-2025-5122.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-5256](CVE-2025/CVE-2025-52xx/CVE-2025-5256.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-5257](CVE-2025/CVE-2025-52xx/CVE-2025-5257.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-5273](CVE-2025/CVE-2025-52xx/CVE-2025-5273.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-5276](CVE-2025/CVE-2025-52xx/CVE-2025-5276.json) (`2025-05-29T14:29:50.247`)
- [CVE-2025-5280](CVE-2025/CVE-2025-52xx/CVE-2025-5280.json) (`2025-05-29T15:50:31.610`)
- [CVE-2025-5281](CVE-2025/CVE-2025-52xx/CVE-2025-5281.json) (`2025-05-29T15:50:25.993`)
- [CVE-2025-5283](CVE-2025/CVE-2025-52xx/CVE-2025-5283.json) (`2025-05-29T15:50:14.503`)
- [CVE-2025-5286](CVE-2025/CVE-2025-52xx/CVE-2025-5286.json) (`2025-05-29T14:29:50.247`)
- [CVE-2024-50694](CVE-2024/CVE-2024-506xx/CVE-2024-50694.json) (`2025-05-29T16:02:20.297`)
- [CVE-2024-50695](CVE-2024/CVE-2024-506xx/CVE-2024-50695.json) (`2025-05-29T16:02:13.390`)
- [CVE-2024-50697](CVE-2024/CVE-2024-506xx/CVE-2024-50697.json) (`2025-05-29T16:02:02.670`)
- [CVE-2024-50698](CVE-2024/CVE-2024-506xx/CVE-2024-50698.json) (`2025-05-29T16:01:55.367`)
- [CVE-2024-51099](CVE-2024/CVE-2024-510xx/CVE-2024-51099.json) (`2025-05-29T16:15:39.070`)
- [CVE-2024-51101](CVE-2024/CVE-2024-511xx/CVE-2024-51101.json) (`2025-05-29T16:15:39.240`)
- [CVE-2024-51107](CVE-2024/CVE-2024-511xx/CVE-2024-51107.json) (`2025-05-29T16:15:39.417`)
- [CVE-2024-51108](CVE-2024/CVE-2024-511xx/CVE-2024-51108.json) (`2025-05-29T16:15:39.603`)
- [CVE-2024-51360](CVE-2024/CVE-2024-513xx/CVE-2024-51360.json) (`2025-05-29T16:15:39.787`)
- [CVE-2024-51675](CVE-2024/CVE-2024-516xx/CVE-2024-51675.json) (`2025-05-29T16:01:31.810`)
- [CVE-2024-57590](CVE-2024/CVE-2024-575xx/CVE-2024-57590.json) (`2025-05-29T16:01:22.487`)
- [CVE-2024-6223](CVE-2024/CVE-2024-62xx/CVE-2024-6223.json) (`2025-05-29T17:34:01.997`)
- [CVE-2024-6224](CVE-2024/CVE-2024-62xx/CVE-2024-6224.json) (`2025-05-29T17:33:35.840`)
- [CVE-2024-6226](CVE-2024/CVE-2024-62xx/CVE-2024-6226.json) (`2025-05-29T17:24:40.207`)
- [CVE-2024-6362](CVE-2024/CVE-2024-63xx/CVE-2024-6362.json) (`2025-05-29T17:34:19.903`)
- [CVE-2024-6420](CVE-2024/CVE-2024-64xx/CVE-2024-6420.json) (`2025-05-29T16:08:13.210`)
- [CVE-2024-8436](CVE-2024/CVE-2024-84xx/CVE-2024-8436.json) (`2025-05-29T16:02:54.753`)
- [CVE-2024-8437](CVE-2024/CVE-2024-84xx/CVE-2024-8437.json) (`2025-05-29T16:02:35.680`)
- [CVE-2025-22646](CVE-2025/CVE-2025-226xx/CVE-2025-22646.json) (`2025-05-29T16:01:17.303`)
- [CVE-2025-24054](CVE-2025/CVE-2025-240xx/CVE-2025-24054.json) (`2025-05-29T16:32:06.563`)
- [CVE-2025-24985](CVE-2025/CVE-2025-249xx/CVE-2025-24985.json) (`2025-05-29T16:31:56.417`)
- [CVE-2025-30397](CVE-2025/CVE-2025-303xx/CVE-2025-30397.json) (`2025-05-29T16:29:54.643`)
- [CVE-2025-48742](CVE-2025/CVE-2025-487xx/CVE-2025-48742.json) (`2025-05-29T17:15:21.900`)
- [CVE-2025-48748](CVE-2025/CVE-2025-487xx/CVE-2025-48748.json) (`2025-05-29T16:15:41.483`)
- [CVE-2025-5278](CVE-2025/CVE-2025-52xx/CVE-2025-5278.json) (`2025-05-29T16:15:41.723`)
## Download and Usage

File diff suppressed because it is too large Load Diff