Auto-Update: 2025-02-17T13:01:03.936315+00:00

This commit is contained in:
cad-safe-bot 2025-02-17 13:04:29 +00:00
parent 686b31c339
commit f89fbe60e6
19 changed files with 746 additions and 24 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45339",
"sourceIdentifier": "security@golang.org",
"published": "2025-01-28T02:15:28.927",
"lastModified": "2025-01-28T16:15:38.367",
"lastModified": "2025-02-17T11:15:08.753",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,6 +59,10 @@
{
"url": "https://pkg.go.dev/vuln/GO-2025-3372",
"source": "security@golang.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00019.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50017",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T19:15:05.043",
"lastModified": "2024-10-25T20:15:50.067",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-17T12:15:26.573",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -91,6 +91,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d113f9723f2bfd9c6feeb899b8ddbee6b8a6e01f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d80a99892f7a992d103138fa4636b2c33abd6740",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56549",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T14:15:34.747",
"lastModified": "2025-01-08T16:43:25.180",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-17T12:15:27.240",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -85,6 +85,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/785408bbafcfa24c9fc5b251f03fd0780ce182bd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9582c7664103c9043e80a78f5c382aa6bdd67418",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-0509",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2025-02-04T20:15:49.763",
"lastModified": "2025-02-04T20:15:49.763",
"lastModified": "2025-02-17T12:15:27.370",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A security issue was found in Sparkle before version 2.64. An attacker can replace an existing signed update with another payload, bypassing Sparkle\u2019s (Ed)DSA signing checks."
"value": "A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle\u2019s (Ed)DSA signing checks."
},
{
"lang": "es",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0714",
"sourceIdentifier": "a341c0d1-ebf7-493f-a84e-38cf86618674",
"published": "2025-02-17T12:15:27.570",
"lastModified": "2025-02-17T12:15:27.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The vulnerability existed in the password storage of Mobateks MobaXterm below 25.0.\nMobaXTerm uses an initialization vector (IV) that is generated by encrypting null bytes with a derivate of the users master key. As both the master key is static, and AES ECB produces the same output with the same input the IV for AES CFB is always the same.The static IV makes it easier to obtain sensitive information and decrypt data if the data is stored at rest."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1204"
}
]
}
],
"references": [
{
"url": "https://www.cirosec.de/sa/sa-2024-012",
"source": "a341c0d1-ebf7-493f-a84e-38cf86618674"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-21687",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-10T16:15:38.207",
"lastModified": "2025-02-10T16:15:38.207",
"lastModified": "2025-02-17T12:15:27.790",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -17,6 +17,18 @@
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/03844b1908114680ca35fa0a0aba3d906a6d78af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/198090eb6f5f094cf3a268c3c30ef1e9c84a6dbe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/61ba518195d61c38c6cb86f83135e51f93735442",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/665cfd1083866f87301bbd232cb8ba48dcf4acce",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23840",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-17T12:15:27.973",
"lastModified": "2025-02-17T12:15:27.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webjema WP-NOTCAPTCHA allows Reflected XSS. This issue affects WP-NOTCAPTCHA: from n/a through 1.3.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-notcaptcha/vulnerability/wordpress-wp-notcaptcha-plugin-1-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23845",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-17T12:15:28.127",
"lastModified": "2025-02-17T12:15:28.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ERA404 ImageMeta allows Reflected XSS. This issue affects ImageMeta: from n/a through 1.1.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/imagemeta/vulnerability/wordpress-imagemeta-plugin-1-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26754",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-17T12:15:28.267",
"lastModified": "2025-02-17T12:15:28.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins Timeline Block allows Stored XSS. This issue affects Timeline Block: from n/a through 1.1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/timeline-block-block/vulnerability/wordpress-timeline-block-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26758",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-17T12:15:28.407",
"lastModified": "2025-02-17T12:15:28.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RebelCode Spotlight Social Media Feeds allows Retrieve Embedded Sensitive Data. This issue affects Spotlight Social Media Feeds: from n/a through 1.7.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/spotlight-social-photo-feeds/vulnerability/wordpress-spotlight-social-feeds-plugin-1-7-1-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26769",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-17T12:15:28.550",
"lastModified": "2025-02-17T12:15:28.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webilia Inc. Vertex Addons for Elementor allows Stored XSS. This issue affects Vertex Addons for Elementor: from n/a through 1.2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/addons-for-elementor-builder/vulnerability/wordpress-vertex-addons-for-elementor-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26770",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-17T12:15:28.687",
"lastModified": "2025-02-17T12:15:28.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joe Waymark allows Stored XSS. This issue affects Waymark: from n/a through 1.5.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/waymark/vulnerability/wordpress-waymark-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26771",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-17T12:15:28.833",
"lastModified": "2025-02-17T12:15:28.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sonalsinha21 SKT Blocks \u2013 Gutenberg based Page Builder allows Stored XSS. This issue affects SKT Blocks \u2013 Gutenberg based Page Builder: from n/a through 1.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/skt-blocks/vulnerability/wordpress-skt-blocks-plugin-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26772",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-17T12:15:28.980",
"lastModified": "2025-02-17T12:15:28.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Detheme DethemeKit For Elementor allows Stored XSS. This issue affects DethemeKit For Elementor: from n/a through 2.1.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/dethemekit-for-elementor/vulnerability/wordpress-dethemekit-for-elementor-plugin-2-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26773",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-17T12:15:29.123",
"lastModified": "2025-02-17T12:15:29.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Adnan Analytify allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Analytify: from n/a through 5.5.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-analytify/vulnerability/wordpress-analytify-plugin-5-5-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26775",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-17T12:15:29.260",
"lastModified": "2025-02-17T12:15:29.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RealMag777 BEAR allows Stored XSS. This issue affects BEAR: from n/a through 1.1.4.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/woo-bulk-editor/vulnerability/wordpress-bear-plugin-1-1-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26778",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-02-17T12:15:29.417",
"lastModified": "2025-02-17T12:15:29.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Gallery allows Stored XSS. This issue affects Gallery: from n/a through 2.2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/gallery/vulnerability/wordpress-gallery-custom-links-plugin-2-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-17T11:01:03.143011+00:00
2025-02-17T13:01:03.936315+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-17T10:15:08.973000+00:00
2025-02-17T12:15:29.417000+00:00
```
### Last Data Feed Release
@ -33,22 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
281540
281552
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `12`
- [CVE-2025-0001](CVE-2025/CVE-2025-00xx/CVE-2025-0001.json) (`2025-02-17T10:15:08.550`)
- [CVE-2025-0714](CVE-2025/CVE-2025-07xx/CVE-2025-0714.json) (`2025-02-17T12:15:27.570`)
- [CVE-2025-23840](CVE-2025/CVE-2025-238xx/CVE-2025-23840.json) (`2025-02-17T12:15:27.973`)
- [CVE-2025-23845](CVE-2025/CVE-2025-238xx/CVE-2025-23845.json) (`2025-02-17T12:15:28.127`)
- [CVE-2025-26754](CVE-2025/CVE-2025-267xx/CVE-2025-26754.json) (`2025-02-17T12:15:28.267`)
- [CVE-2025-26758](CVE-2025/CVE-2025-267xx/CVE-2025-26758.json) (`2025-02-17T12:15:28.407`)
- [CVE-2025-26769](CVE-2025/CVE-2025-267xx/CVE-2025-26769.json) (`2025-02-17T12:15:28.550`)
- [CVE-2025-26770](CVE-2025/CVE-2025-267xx/CVE-2025-26770.json) (`2025-02-17T12:15:28.687`)
- [CVE-2025-26771](CVE-2025/CVE-2025-267xx/CVE-2025-26771.json) (`2025-02-17T12:15:28.833`)
- [CVE-2025-26772](CVE-2025/CVE-2025-267xx/CVE-2025-26772.json) (`2025-02-17T12:15:28.980`)
- [CVE-2025-26773](CVE-2025/CVE-2025-267xx/CVE-2025-26773.json) (`2025-02-17T12:15:29.123`)
- [CVE-2025-26775](CVE-2025/CVE-2025-267xx/CVE-2025-26775.json) (`2025-02-17T12:15:29.260`)
- [CVE-2025-26778](CVE-2025/CVE-2025-267xx/CVE-2025-26778.json) (`2025-02-17T12:15:29.417`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `5`
- [CVE-2025-0354](CVE-2025/CVE-2025-03xx/CVE-2025-0354.json) (`2025-02-17T10:15:08.767`)
- [CVE-2025-0356](CVE-2025/CVE-2025-03xx/CVE-2025-0356.json) (`2025-02-17T10:15:08.973`)
- [CVE-2024-45339](CVE-2024/CVE-2024-453xx/CVE-2024-45339.json) (`2025-02-17T11:15:08.753`)
- [CVE-2024-50017](CVE-2024/CVE-2024-500xx/CVE-2024-50017.json) (`2025-02-17T12:15:26.573`)
- [CVE-2024-56549](CVE-2024/CVE-2024-565xx/CVE-2024-56549.json) (`2025-02-17T12:15:27.240`)
- [CVE-2025-0509](CVE-2025/CVE-2025-05xx/CVE-2025-0509.json) (`2025-02-17T12:15:27.370`)
- [CVE-2025-21687](CVE-2025/CVE-2025-216xx/CVE-2025-21687.json) (`2025-02-17T12:15:27.790`)
## Download and Usage

View File

@ -266823,7 +266823,7 @@ CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae221
CVE-2024-45336,0,0,fe73a42ff3e2ab154f5274280efb95e7cafdf2051c26cad0bfba3d1769494881,2025-01-28T16:15:38.220000
CVE-2024-45337,0,0,b10ecb80938ca322ec0b6c2d9ece68cef853d2a12f1bb06dd315a28410e15bd7,2025-01-31T15:15:13.190000
CVE-2024-45338,0,0,4b2d696f8670e697ae1161a5584acef0120067536ac2182d79f6e6c35006631f,2024-12-31T20:16:06.603000
CVE-2024-45339,0,0,c6371d1b3801fdb29fceadab560696c264296f862efc4c3d4cf122e433f266d5,2025-01-28T16:15:38.367000
CVE-2024-45339,0,1,e6d397175d9bcb76fd8af378a16cb908a9d604092238dabef9c11d7f03953b3b,2025-02-17T11:15:08.753000
CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000
CVE-2024-45340,0,0,066a3008a8c83bd6293b47b22df614347947c4a76e770f61b0b4f0306520b0ce,2025-01-28T16:15:38.517000
CVE-2024-45341,0,0,4dd9aad0b4d057a4c057d74153e4003151702a7f08212eb9af53532c125a70fd,2025-01-28T16:15:38.650000
@ -270066,7 +270066,7 @@ CVE-2024-50013,0,0,6ed41fb2b9c26cab9746dc35ed920e0024449440410a4f2cef87abdfa8962
CVE-2024-50014,0,0,d6671e81d1713c558e24425e1159de554ab1d2ab4ab3060ffd2493dc7cdd06ae,2025-02-02T11:15:10.603000
CVE-2024-50015,0,0,a4fcc788bb6305bd5fe177e54fb12329b828b0dd05e800b882e5c4136a65c97a,2024-10-28T17:13:53.143000
CVE-2024-50016,0,0,439658bdc968a38c6e5684d76504123890277c5fa089a596ed5b0d6c896a7bb0,2024-10-28T17:17:41.473000
CVE-2024-50017,0,0,fcc9892bb128c51d41037faa4aa236a2c3326fd8a89382b009d3cd09d55c37c6,2024-10-25T20:15:50.067000
CVE-2024-50017,0,1,dd0f4712357f1f6a95a42950bfbcc0b7b412d691f99f4a5a46093b21e4e9e7d7,2025-02-17T12:15:26.573000
CVE-2024-50018,0,0,bd77b1432e671f36de95cca367dc67208c70abb8195885c66fcd1d319256a37d,2024-12-12T16:15:16.653000
CVE-2024-50019,0,0,79bddeae7b21b94c2f4e65e248cde0cbd4516b92c651302e4c795f86dbce422e,2024-10-25T14:45:56.190000
CVE-2024-5002,0,0,c3763077dc687a55c9cb782df2127f900cd725d4f238c5314f9bc71b3f608da3,2024-11-21T09:46:45.443000
@ -274172,7 +274172,7 @@ CVE-2024-56545,0,0,b19a2ba17d6965bf3b02f8b4675286f8fb225dc536b446fa97ec76fd3722b
CVE-2024-56546,0,0,69a114fe693d135933b03c09be788b3440117b47c45a7792afcbcac9317d87c0,2024-12-27T14:15:34.383000
CVE-2024-56547,0,0,e8b50d10358462601d97aeca5191b7d8139764ee45376f21c8029ea1eac06a30,2024-12-27T14:15:34.497000
CVE-2024-56548,0,0,16645d1541312215a4bf3f6392eb289c3edcde3bcdb0f4b6f92d5230f284c240,2024-12-27T14:15:34.603000
CVE-2024-56549,0,0,9ca11094a73d6c045ef338af0ec9ace139ce3e7651f95f997f30515a9e16b544,2025-01-08T16:43:25.180000
CVE-2024-56549,0,1,b200f87b756cf787b210d42f5e26996299c43c0569406cb78295901f0f68d25f,2025-02-17T12:15:27.240000
CVE-2024-5655,0,0,0fa4e3b504ccc8e08941dc807198e5a29b07306b6e1d02090b484b1570bb08fd,2024-11-21T09:48:06.140000
CVE-2024-56550,0,0,04d74517c386c38c5a8c7b0e1144163e0e9e19fcfd004bb9db0bb6bb64a064cf,2024-12-27T15:15:13.737000
CVE-2024-56551,0,0,36f204fddaadc42f9861b127270dda6a10a23445438a767cc28684d21a76f523,2025-01-23T17:15:15.510000
@ -278650,7 +278650,7 @@ CVE-2024-9996,0,0,188a485776485f9e8dc9179367e7d7a07cab50fec958b227455a8676b58582
CVE-2024-9997,0,0,c951d1dfad7abcf434414a546a4fccad53052e3fa40c16bd73a8c37c97d5eba8,2024-11-01T16:27:34.960000
CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000
CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5af,2024-11-13T17:01:58.603000
CVE-2025-0001,1,1,5760e2d1c8a423ec1fce437052bab776887b78a7792a13401fa67b8fbdd14b3d,2025-02-17T10:15:08.550000
CVE-2025-0001,0,0,5760e2d1c8a423ec1fce437052bab776887b78a7792a13401fa67b8fbdd14b3d,2025-02-17T10:15:08.550000
CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000
CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000
CVE-2025-0054,0,0,22a967176aaf42249dc9b67293cdaa2b5c3cbf9a9dce95abf2b5e51fe83ab402,2025-02-11T06:15:19.863000
@ -278793,9 +278793,9 @@ CVE-2025-0348,0,0,caf29c7d10aa1d0bc868897d1f5fe71d1c997b913af05adf015858af50a208
CVE-2025-0349,0,0,5c5bde0373ec0c26c713a0d565cd6e4461e0dfe3c3d54fa435cc26640f811d63,2025-01-09T11:15:16.547000
CVE-2025-0350,0,0,568075e13fb305f34efa279da3968d622f1d523cffbec586aa7d1232c4534cda,2025-02-04T20:36:53.180000
CVE-2025-0353,0,0,fefe78eacfc73b3da0e296010fc7bc87595c20639bad926c14a54ed0a611d0ba,2025-01-29T12:15:29.477000
CVE-2025-0354,0,1,55d23a0a87a8729e983746f1f043f903439316639d87df33d11e2f4253dd49f1,2025-02-17T10:15:08.767000
CVE-2025-0354,0,0,55d23a0a87a8729e983746f1f043f903439316639d87df33d11e2f4253dd49f1,2025-02-17T10:15:08.767000
CVE-2025-0355,0,0,60139aab38184d5553deea3c96ee67451ff405f2b0f65acb32b8c01c91586866,2025-01-21T04:15:07.877000
CVE-2025-0356,0,1,7e522859a3d0689ccb777c8fef64a1b2b2f878cb4a2c9cceba026470a39874f6,2025-02-17T10:15:08.973000
CVE-2025-0356,0,0,7e522859a3d0689ccb777c8fef64a1b2b2f878cb4a2c9cceba026470a39874f6,2025-02-17T10:15:08.973000
CVE-2025-0357,0,0,0ae647dab29c7a227a1c7ef392ca808faddaedd9823b613fe8bd7952dd9efb7a,2025-01-25T02:15:26.990000
CVE-2025-0364,0,0,2423f698b570bf74da97e05ed992c1dc720ce0cd77b54afdd0e3b50ba4f8a276,2025-02-04T18:15:35.067000
CVE-2025-0365,0,0,68c9fa607d9af008f74f0910ed30a33940a0fb9c7f83018a7eca1ddc882dffeb,2025-02-01T06:15:31.213000
@ -278897,7 +278897,7 @@ CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd
CVE-2025-0503,0,0,1c28203001e43c279e03305b394a02204f5941f974df8145add898a6abc17980,2025-02-14T18:15:23.870000
CVE-2025-0506,0,0,d8bf3b78c733c50b3df0cd3f3a0a496f3fa631b02113fa5dfd90f4e97b958815,2025-02-12T15:15:15.613000
CVE-2025-0507,0,0,0741f2f025f4b48581d4d58f022e9dc19c48a922e6141a54aefd8981045d22c9,2025-01-31T05:15:10.280000
CVE-2025-0509,0,0,a0073ec6d57214f2c4a11fc16247c3f01dd9524e1a7678c20945c0a176374afe,2025-02-04T20:15:49.763000
CVE-2025-0509,0,1,913ed89216296740c4c407c24a56b36bddc347f56451a23b8f05b7d47d26ebb6,2025-02-17T12:15:27.370000
CVE-2025-0510,0,0,05652079849e71bfd50a60b32906a66a5fcd428ffe6c5caaa29432e1f6b204cf,2025-02-06T21:15:22.083000
CVE-2025-0511,0,0,70427fe57d14290a9393d17b066a31efedf5e9736021ed70160ea0cf3f988366,2025-02-12T12:15:29.210000
CVE-2025-0513,0,0,2c6d18638fe4b5977a94377d0acce3877b36fd4ccb075c7fc03b46347719c66e,2025-02-11T15:15:19.257000
@ -279007,6 +279007,7 @@ CVE-2025-0707,0,0,5ea8e0d500b75ba8a0fc0cd19ceb093f4d4acd52cc281fb36710245d3d1c36
CVE-2025-0708,0,0,2c564dec190555666593be94185c7b92f00a312088bb857474e59f691fdbb07a,2025-01-24T20:15:34.200000
CVE-2025-0709,0,0,156b4593a93fa854ef60a86f01a55e00fa0c092a95e57a097f43efa6d6f6b8c5,2025-01-24T21:15:11.237000
CVE-2025-0710,0,0,d434afd262bceee38318c1978d6fd83eef213e4c7163f6e3a198919727021a6b,2025-01-24T21:15:11.420000
CVE-2025-0714,1,1,0057831ca66e3db49b7940154242ccfd79d407347a06e6c8cd85f6d31ee92f18,2025-02-17T12:15:27.570000
CVE-2025-0720,0,0,602262593ab5841efad088d2b78c277a4b7966a622beefaf31478d2cb3826706,2025-01-26T23:15:21.547000
CVE-2025-0721,0,0,9b15b019b479c4479137e55c74f2da2652b1f56c2d67e45558507ea73a96e795,2025-01-27T00:15:26.317000
CVE-2025-0722,0,0,d286657780f2322cec5dfe4e8af4674bbdc5e8a8b778a753270cdbdd213a2c1d,2025-01-27T00:15:26.517000
@ -279834,7 +279835,7 @@ CVE-2025-21683,0,0,eb90b34b8c26cfd5a6fc922b697d6b0c2dfe15c32e6ed59da1ae357c1a3f7
CVE-2025-21684,0,0,2f956d860130e6337d0fabc47d6eb0a3769264253b41d76d2b8bb060797c168a,2025-02-11T16:12:41.533000
CVE-2025-21685,0,0,ddcc9f74d2788921662827130d064ca08f136819e30b8929e36a7dc983d8aa08,2025-02-11T16:11:19.543000
CVE-2025-21686,0,0,75eca37a2a9f73fbbcf8475c4f690bd033d8354a0d1793366da443130059b4db,2025-02-10T16:15:38.100000
CVE-2025-21687,0,0,731e06dc41eb1826a82f0b150e469653af4058d6fae9edcc298267a2b69d1f58,2025-02-10T16:15:38.207000
CVE-2025-21687,0,1,2c2c627af4c6b661b7475ed3a3c45fd810de911af720cf67e0295da31022b70d,2025-02-17T12:15:27.790000
CVE-2025-21688,0,0,630d962152a5ef8c0af287b3cac9b1b0d8ac4e898b90cadc37f867db1dac2020,2025-02-10T16:15:38.323000
CVE-2025-21689,0,0,af95d512c25672f1182cbdc285afa556f5984fc59f0b9ac3275c3c40288f0d7b,2025-02-10T16:15:38.447000
CVE-2025-21690,0,0,af1632176e641a0691e2d0045bd50a0fd357491868cdeecd328ada4c2ffbcdee,2025-02-10T16:15:38.553000
@ -280703,9 +280704,11 @@ CVE-2025-23836,0,0,5c76aa20fa64580f07d9530831e0cb5c7e88e1287b55c63d0300b02146b3c
CVE-2025-23837,0,0,371373d70784fb5e2285584d435fa34d3363a28bafc09c0ab1690ff32190677d,2025-01-24T11:15:11.240000
CVE-2025-23838,0,0,4752ed20e3dc714416037d00b281cddc275d8df64a4c888dd8f3b3d43e89086b,2025-01-24T11:15:11.390000
CVE-2025-23839,0,0,c711cdfd3a6cd8df3981e46ebebb623db7f4f50ebcbba001c1ca48594578b44f,2025-01-24T11:15:11.523000
CVE-2025-23840,1,1,e5b0984fb71be0968ed90480ec3d330f2c4aaa2509c5dd5bd67f34d8b556326b,2025-02-17T12:15:27.973000
CVE-2025-23841,0,0,c097c459c2277c131514a3ea078b91eba98a25a334eaa639de34719734a5222a,2025-01-16T21:15:24.793000
CVE-2025-23842,0,0,2b0139d7daa7e9dee90c237d483621e8535d39bd8efb9a3ce143d2d5a6b0d36f,2025-01-16T21:15:24.940000
CVE-2025-23844,0,0,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000
CVE-2025-23845,1,1,fc17fee2a7781ea5c8ea3d18cf4d8167acd9c56f0f534b9dcf11a7aa5d345869,2025-02-17T12:15:28.127000
CVE-2025-23846,0,0,ea1add75e4166af75969247fd7072cf309971d9564e41b3b3aa5ab3aed42b97c,2025-01-22T15:15:24.570000
CVE-2025-23848,0,0,89a987df9d0bbdbc45b1ea1fdc383b4ea7fa77b656809c9e88d08eb1cb2905d0,2025-01-16T21:15:25.220000
CVE-2025-23849,0,0,7076f9fcf4e7216b0f5ca136c4ea4a88f8fc78bd3d3c6b722ad7847e399fd28f,2025-01-27T15:15:13.087000
@ -281526,13 +281529,22 @@ CVE-2025-26578,0,0,1ba1d37a5d1af1d2f76239a6f2ed820c7ad94689f9ccc172f7eecaa56fe90
CVE-2025-26580,0,0,c808557e22a6d83e87ce5992c6ff2cdddda2d2aa66f5a321875aca0441d9569c,2025-02-13T14:16:24.250000
CVE-2025-26582,0,0,00823840b86fea4d98d4ba8da828de8ef859573fc8d1e89f9ae001b9d6f9a267,2025-02-13T14:16:24.407000
CVE-2025-26700,0,0,a62049a64dad278ca1213054f25f2aed479e1d05d98e9fdc2dc613607ff558b5,2025-02-17T03:15:09.750000
CVE-2025-26754,1,1,402a2759dad93da9f23b2492c07100626d0693520f28e20423238f6ecd814d8a,2025-02-17T12:15:28.267000
CVE-2025-26755,0,0,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000
CVE-2025-26758,1,1,a26f515dcd360cc3ddbe170c3b554583598aed711ba91a215b8cd7112059dd35,2025-02-17T12:15:28.407000
CVE-2025-26759,0,0,aa971f4308d9dde025f5e1ad7daa8f065b0641c9cb32130c8a995de32816229c,2025-02-16T23:15:10.777000
CVE-2025-26761,0,0,130481f4b28cc5ac3e58302d2cdf3485b24296b75bca4ad9bb67ba26ddaffc38,2025-02-16T23:15:10.920000
CVE-2025-26765,0,0,febe7fb1865b08d6bbec6c81b3ab270dd96207bad5fe3685a198c3b4fb2b2101,2025-02-16T23:15:11.063000
CVE-2025-26766,0,0,053586fef9ce986be152eb9ae1e7b8892c9f075ba2f907277b1d4763cc12fe70,2025-02-16T23:15:11.207000
CVE-2025-26767,0,0,187ad69a9eed635c81080502232aaa7de1c87394e8edce49d9a9a4ea1e9e43c7,2025-02-16T23:15:11.350000
CVE-2025-26768,0,0,de05048edbcd420e1a560f4197db47cf4598333997e8f116de71226c95afb627,2025-02-16T23:15:11.487000
CVE-2025-26769,1,1,0c72222b8a85af7a331e5bf8b764bac00a89d3c80a1a5dd966f9db3a9325c047,2025-02-17T12:15:28.550000
CVE-2025-26770,1,1,b8458cb1a3e8b55edb12423478e672f2088dbbbcb505215466ec38c374218572,2025-02-17T12:15:28.687000
CVE-2025-26771,1,1,1172594f01315a68b1db7af85146cea8365106bb718e61572460a2e4c4a81b19,2025-02-17T12:15:28.833000
CVE-2025-26772,1,1,c07c6cc8f50d1e9a48d9bbe77ef3064c2299e1d25b700ebf62ce9cf490ea5fb9,2025-02-17T12:15:28.980000
CVE-2025-26773,1,1,2e012b5456eae6488f8204215cfc7953086c04f4520b05ba5b5d35b16125c8f5,2025-02-17T12:15:29.123000
CVE-2025-26775,1,1,04dff38e991d1b46c040974dfcb68e80377672de97a81d8017423e599debe554,2025-02-17T12:15:29.260000
CVE-2025-26778,1,1,f4f3856714356e410e7f4f3388bedae25b32fbe8e18283316af64b40400930e7,2025-02-17T12:15:29.417000
CVE-2025-26779,0,0,78ae05acb92595d40239dc765a3fe7d78dcaaef138d093b03917a2ce182992b1,2025-02-16T23:15:11.630000
CVE-2025-26788,0,0,1ba864f8ac81a56163abfb386c84050b425d8eb039d7783af9b48ca3d178b538,2025-02-15T16:15:30.090000
CVE-2025-26789,0,0,b98c32efc76bff07b26dd009ea99782108b024ce84abc7d87c0e368d23f6c39a,2025-02-14T08:15:31.357000

Can't render this file because it is too large.