diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45339.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45339.json index 76c18ef6554..d85a1bfa824 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45339.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45339.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45339", "sourceIdentifier": "security@golang.org", "published": "2025-01-28T02:15:28.927", - "lastModified": "2025-01-28T16:15:38.367", + "lastModified": "2025-02-17T11:15:08.753", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "https://pkg.go.dev/vuln/GO-2025-3372", "source": "security@golang.org" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00019.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50017.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50017.json index 3b39508a39d..6e9206acd69 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50017.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50017.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50017", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T19:15:05.043", - "lastModified": "2024-10-25T20:15:50.067", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-17T12:15:26.573", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -91,6 +91,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/d113f9723f2bfd9c6feeb899b8ddbee6b8a6e01f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/d80a99892f7a992d103138fa4636b2c33abd6740", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56549.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56549.json index defdd8ce75e..04bc12dea5a 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56549.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56549.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56549", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:34.747", - "lastModified": "2025-01-08T16:43:25.180", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-17T12:15:27.240", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -85,6 +85,10 @@ "Patch" ] }, + { + "url": "https://git.kernel.org/stable/c/785408bbafcfa24c9fc5b251f03fd0780ce182bd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/9582c7664103c9043e80a78f5c382aa6bdd67418", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0509.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0509.json index 851fd7f750a..b738fbdc121 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0509.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0509.json @@ -2,13 +2,13 @@ "id": "CVE-2025-0509", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2025-02-04T20:15:49.763", - "lastModified": "2025-02-04T20:15:49.763", + "lastModified": "2025-02-17T12:15:27.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A security issue was found in Sparkle before version 2.64. An attacker can replace an existing signed update with another payload, bypassing Sparkle\u2019s (Ed)DSA signing checks." + "value": "A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle\u2019s (Ed)DSA signing checks." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0714.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0714.json new file mode 100644 index 00000000000..a5120e305bc --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0714.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0714", + "sourceIdentifier": "a341c0d1-ebf7-493f-a84e-38cf86618674", + "published": "2025-02-17T12:15:27.570", + "lastModified": "2025-02-17T12:15:27.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The vulnerability existed in the password storage of Mobateks MobaXterm below 25.0.\nMobaXTerm uses an initialization vector (IV) that is generated by encrypting null bytes with a derivate of the users master key. As both the master key is static, and AES ECB produces the same output with the same input the IV for AES CFB is always the same.The static IV makes it easier to obtain sensitive information and decrypt data if the data is stored at rest." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "a341c0d1-ebf7-493f-a84e-38cf86618674", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "a341c0d1-ebf7-493f-a84e-38cf86618674", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1204" + } + ] + } + ], + "references": [ + { + "url": "https://www.cirosec.de/sa/sa-2024-012", + "source": "a341c0d1-ebf7-493f-a84e-38cf86618674" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21687.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21687.json index 87a4a47f098..2f30c4adb90 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21687.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21687.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21687", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-10T16:15:38.207", - "lastModified": "2025-02-10T16:15:38.207", + "lastModified": "2025-02-17T12:15:27.790", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,18 @@ ], "metrics": {}, "references": [ + { + "url": "https://git.kernel.org/stable/c/03844b1908114680ca35fa0a0aba3d906a6d78af", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/198090eb6f5f094cf3a268c3c30ef1e9c84a6dbe", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/61ba518195d61c38c6cb86f83135e51f93735442", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/665cfd1083866f87301bbd232cb8ba48dcf4acce", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23840.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23840.json new file mode 100644 index 00000000000..c613d8ca60d --- /dev/null +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23840.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23840", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-17T12:15:27.973", + "lastModified": "2025-02-17T12:15:27.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webjema WP-NOTCAPTCHA allows Reflected XSS. This issue affects WP-NOTCAPTCHA: from n/a through 1.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-notcaptcha/vulnerability/wordpress-wp-notcaptcha-plugin-1-3-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23845.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23845.json new file mode 100644 index 00000000000..438ce0121d5 --- /dev/null +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23845.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23845", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-17T12:15:28.127", + "lastModified": "2025-02-17T12:15:28.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ERA404 ImageMeta allows Reflected XSS. This issue affects ImageMeta: from n/a through 1.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/imagemeta/vulnerability/wordpress-imagemeta-plugin-1-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26754.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26754.json new file mode 100644 index 00000000000..09356ecbaa6 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26754.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26754", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-17T12:15:28.267", + "lastModified": "2025-02-17T12:15:28.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins Timeline Block allows Stored XSS. This issue affects Timeline Block: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/timeline-block-block/vulnerability/wordpress-timeline-block-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26758.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26758.json new file mode 100644 index 00000000000..68ae16cc9ea --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26758.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26758", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-17T12:15:28.407", + "lastModified": "2025-02-17T12:15:28.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RebelCode Spotlight Social Media Feeds allows Retrieve Embedded Sensitive Data. This issue affects Spotlight Social Media Feeds: from n/a through 1.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/spotlight-social-photo-feeds/vulnerability/wordpress-spotlight-social-feeds-plugin-1-7-1-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26769.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26769.json new file mode 100644 index 00000000000..aa5f9870082 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26769.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26769", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-17T12:15:28.550", + "lastModified": "2025-02-17T12:15:28.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webilia Inc. Vertex Addons for Elementor allows Stored XSS. This issue affects Vertex Addons for Elementor: from n/a through 1.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/addons-for-elementor-builder/vulnerability/wordpress-vertex-addons-for-elementor-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26770.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26770.json new file mode 100644 index 00000000000..d611c11037d --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26770.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26770", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-17T12:15:28.687", + "lastModified": "2025-02-17T12:15:28.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joe Waymark allows Stored XSS. This issue affects Waymark: from n/a through 1.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/waymark/vulnerability/wordpress-waymark-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26771.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26771.json new file mode 100644 index 00000000000..ba97e3758f0 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26771.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26771", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-17T12:15:28.833", + "lastModified": "2025-02-17T12:15:28.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sonalsinha21 SKT Blocks \u2013 Gutenberg based Page Builder allows Stored XSS. This issue affects SKT Blocks \u2013 Gutenberg based Page Builder: from n/a through 1.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/skt-blocks/vulnerability/wordpress-skt-blocks-plugin-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26772.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26772.json new file mode 100644 index 00000000000..74c0f5d01bb --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26772.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26772", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-17T12:15:28.980", + "lastModified": "2025-02-17T12:15:28.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Detheme DethemeKit For Elementor allows Stored XSS. This issue affects DethemeKit For Elementor: from n/a through 2.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/dethemekit-for-elementor/vulnerability/wordpress-dethemekit-for-elementor-plugin-2-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26773.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26773.json new file mode 100644 index 00000000000..e151abf509e --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26773.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26773", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-17T12:15:29.123", + "lastModified": "2025-02-17T12:15:29.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Adnan Analytify allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Analytify: from n/a through 5.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-analytify/vulnerability/wordpress-analytify-plugin-5-5-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26775.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26775.json new file mode 100644 index 00000000000..77b22879895 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26775.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26775", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-17T12:15:29.260", + "lastModified": "2025-02-17T12:15:29.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RealMag777 BEAR allows Stored XSS. This issue affects BEAR: from n/a through 1.1.4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woo-bulk-editor/vulnerability/wordpress-bear-plugin-1-1-4-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26778.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26778.json new file mode 100644 index 00000000000..e2235c8fb24 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26778.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26778", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-02-17T12:15:29.417", + "lastModified": "2025-02-17T12:15:29.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Gallery allows Stored XSS. This issue affects Gallery: from n/a through 2.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gallery/vulnerability/wordpress-gallery-custom-links-plugin-2-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 82bd3ab855e..f1fb7ea675a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-17T11:01:03.143011+00:00 +2025-02-17T13:01:03.936315+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-17T10:15:08.973000+00:00 +2025-02-17T12:15:29.417000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281540 +281552 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `12` -- [CVE-2025-0001](CVE-2025/CVE-2025-00xx/CVE-2025-0001.json) (`2025-02-17T10:15:08.550`) +- [CVE-2025-0714](CVE-2025/CVE-2025-07xx/CVE-2025-0714.json) (`2025-02-17T12:15:27.570`) +- [CVE-2025-23840](CVE-2025/CVE-2025-238xx/CVE-2025-23840.json) (`2025-02-17T12:15:27.973`) +- [CVE-2025-23845](CVE-2025/CVE-2025-238xx/CVE-2025-23845.json) (`2025-02-17T12:15:28.127`) +- [CVE-2025-26754](CVE-2025/CVE-2025-267xx/CVE-2025-26754.json) (`2025-02-17T12:15:28.267`) +- [CVE-2025-26758](CVE-2025/CVE-2025-267xx/CVE-2025-26758.json) (`2025-02-17T12:15:28.407`) +- [CVE-2025-26769](CVE-2025/CVE-2025-267xx/CVE-2025-26769.json) (`2025-02-17T12:15:28.550`) +- [CVE-2025-26770](CVE-2025/CVE-2025-267xx/CVE-2025-26770.json) (`2025-02-17T12:15:28.687`) +- [CVE-2025-26771](CVE-2025/CVE-2025-267xx/CVE-2025-26771.json) (`2025-02-17T12:15:28.833`) +- [CVE-2025-26772](CVE-2025/CVE-2025-267xx/CVE-2025-26772.json) (`2025-02-17T12:15:28.980`) +- [CVE-2025-26773](CVE-2025/CVE-2025-267xx/CVE-2025-26773.json) (`2025-02-17T12:15:29.123`) +- [CVE-2025-26775](CVE-2025/CVE-2025-267xx/CVE-2025-26775.json) (`2025-02-17T12:15:29.260`) +- [CVE-2025-26778](CVE-2025/CVE-2025-267xx/CVE-2025-26778.json) (`2025-02-17T12:15:29.417`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `5` -- [CVE-2025-0354](CVE-2025/CVE-2025-03xx/CVE-2025-0354.json) (`2025-02-17T10:15:08.767`) -- [CVE-2025-0356](CVE-2025/CVE-2025-03xx/CVE-2025-0356.json) (`2025-02-17T10:15:08.973`) +- [CVE-2024-45339](CVE-2024/CVE-2024-453xx/CVE-2024-45339.json) (`2025-02-17T11:15:08.753`) +- [CVE-2024-50017](CVE-2024/CVE-2024-500xx/CVE-2024-50017.json) (`2025-02-17T12:15:26.573`) +- [CVE-2024-56549](CVE-2024/CVE-2024-565xx/CVE-2024-56549.json) (`2025-02-17T12:15:27.240`) +- [CVE-2025-0509](CVE-2025/CVE-2025-05xx/CVE-2025-0509.json) (`2025-02-17T12:15:27.370`) +- [CVE-2025-21687](CVE-2025/CVE-2025-216xx/CVE-2025-21687.json) (`2025-02-17T12:15:27.790`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f923a75a030..b9a472991e4 100644 --- a/_state.csv +++ b/_state.csv @@ -266823,7 +266823,7 @@ CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae221 CVE-2024-45336,0,0,fe73a42ff3e2ab154f5274280efb95e7cafdf2051c26cad0bfba3d1769494881,2025-01-28T16:15:38.220000 CVE-2024-45337,0,0,b10ecb80938ca322ec0b6c2d9ece68cef853d2a12f1bb06dd315a28410e15bd7,2025-01-31T15:15:13.190000 CVE-2024-45338,0,0,4b2d696f8670e697ae1161a5584acef0120067536ac2182d79f6e6c35006631f,2024-12-31T20:16:06.603000 -CVE-2024-45339,0,0,c6371d1b3801fdb29fceadab560696c264296f862efc4c3d4cf122e433f266d5,2025-01-28T16:15:38.367000 +CVE-2024-45339,0,1,e6d397175d9bcb76fd8af378a16cb908a9d604092238dabef9c11d7f03953b3b,2025-02-17T11:15:08.753000 CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000 CVE-2024-45340,0,0,066a3008a8c83bd6293b47b22df614347947c4a76e770f61b0b4f0306520b0ce,2025-01-28T16:15:38.517000 CVE-2024-45341,0,0,4dd9aad0b4d057a4c057d74153e4003151702a7f08212eb9af53532c125a70fd,2025-01-28T16:15:38.650000 @@ -270066,7 +270066,7 @@ CVE-2024-50013,0,0,6ed41fb2b9c26cab9746dc35ed920e0024449440410a4f2cef87abdfa8962 CVE-2024-50014,0,0,d6671e81d1713c558e24425e1159de554ab1d2ab4ab3060ffd2493dc7cdd06ae,2025-02-02T11:15:10.603000 CVE-2024-50015,0,0,a4fcc788bb6305bd5fe177e54fb12329b828b0dd05e800b882e5c4136a65c97a,2024-10-28T17:13:53.143000 CVE-2024-50016,0,0,439658bdc968a38c6e5684d76504123890277c5fa089a596ed5b0d6c896a7bb0,2024-10-28T17:17:41.473000 -CVE-2024-50017,0,0,fcc9892bb128c51d41037faa4aa236a2c3326fd8a89382b009d3cd09d55c37c6,2024-10-25T20:15:50.067000 +CVE-2024-50017,0,1,dd0f4712357f1f6a95a42950bfbcc0b7b412d691f99f4a5a46093b21e4e9e7d7,2025-02-17T12:15:26.573000 CVE-2024-50018,0,0,bd77b1432e671f36de95cca367dc67208c70abb8195885c66fcd1d319256a37d,2024-12-12T16:15:16.653000 CVE-2024-50019,0,0,79bddeae7b21b94c2f4e65e248cde0cbd4516b92c651302e4c795f86dbce422e,2024-10-25T14:45:56.190000 CVE-2024-5002,0,0,c3763077dc687a55c9cb782df2127f900cd725d4f238c5314f9bc71b3f608da3,2024-11-21T09:46:45.443000 @@ -274172,7 +274172,7 @@ CVE-2024-56545,0,0,b19a2ba17d6965bf3b02f8b4675286f8fb225dc536b446fa97ec76fd3722b CVE-2024-56546,0,0,69a114fe693d135933b03c09be788b3440117b47c45a7792afcbcac9317d87c0,2024-12-27T14:15:34.383000 CVE-2024-56547,0,0,e8b50d10358462601d97aeca5191b7d8139764ee45376f21c8029ea1eac06a30,2024-12-27T14:15:34.497000 CVE-2024-56548,0,0,16645d1541312215a4bf3f6392eb289c3edcde3bcdb0f4b6f92d5230f284c240,2024-12-27T14:15:34.603000 -CVE-2024-56549,0,0,9ca11094a73d6c045ef338af0ec9ace139ce3e7651f95f997f30515a9e16b544,2025-01-08T16:43:25.180000 +CVE-2024-56549,0,1,b200f87b756cf787b210d42f5e26996299c43c0569406cb78295901f0f68d25f,2025-02-17T12:15:27.240000 CVE-2024-5655,0,0,0fa4e3b504ccc8e08941dc807198e5a29b07306b6e1d02090b484b1570bb08fd,2024-11-21T09:48:06.140000 CVE-2024-56550,0,0,04d74517c386c38c5a8c7b0e1144163e0e9e19fcfd004bb9db0bb6bb64a064cf,2024-12-27T15:15:13.737000 CVE-2024-56551,0,0,36f204fddaadc42f9861b127270dda6a10a23445438a767cc28684d21a76f523,2025-01-23T17:15:15.510000 @@ -278650,7 +278650,7 @@ CVE-2024-9996,0,0,188a485776485f9e8dc9179367e7d7a07cab50fec958b227455a8676b58582 CVE-2024-9997,0,0,c951d1dfad7abcf434414a546a4fccad53052e3fa40c16bd73a8c37c97d5eba8,2024-11-01T16:27:34.960000 CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000 CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5af,2024-11-13T17:01:58.603000 -CVE-2025-0001,1,1,5760e2d1c8a423ec1fce437052bab776887b78a7792a13401fa67b8fbdd14b3d,2025-02-17T10:15:08.550000 +CVE-2025-0001,0,0,5760e2d1c8a423ec1fce437052bab776887b78a7792a13401fa67b8fbdd14b3d,2025-02-17T10:15:08.550000 CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000 CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000 CVE-2025-0054,0,0,22a967176aaf42249dc9b67293cdaa2b5c3cbf9a9dce95abf2b5e51fe83ab402,2025-02-11T06:15:19.863000 @@ -278793,9 +278793,9 @@ CVE-2025-0348,0,0,caf29c7d10aa1d0bc868897d1f5fe71d1c997b913af05adf015858af50a208 CVE-2025-0349,0,0,5c5bde0373ec0c26c713a0d565cd6e4461e0dfe3c3d54fa435cc26640f811d63,2025-01-09T11:15:16.547000 CVE-2025-0350,0,0,568075e13fb305f34efa279da3968d622f1d523cffbec586aa7d1232c4534cda,2025-02-04T20:36:53.180000 CVE-2025-0353,0,0,fefe78eacfc73b3da0e296010fc7bc87595c20639bad926c14a54ed0a611d0ba,2025-01-29T12:15:29.477000 -CVE-2025-0354,0,1,55d23a0a87a8729e983746f1f043f903439316639d87df33d11e2f4253dd49f1,2025-02-17T10:15:08.767000 +CVE-2025-0354,0,0,55d23a0a87a8729e983746f1f043f903439316639d87df33d11e2f4253dd49f1,2025-02-17T10:15:08.767000 CVE-2025-0355,0,0,60139aab38184d5553deea3c96ee67451ff405f2b0f65acb32b8c01c91586866,2025-01-21T04:15:07.877000 -CVE-2025-0356,0,1,7e522859a3d0689ccb777c8fef64a1b2b2f878cb4a2c9cceba026470a39874f6,2025-02-17T10:15:08.973000 +CVE-2025-0356,0,0,7e522859a3d0689ccb777c8fef64a1b2b2f878cb4a2c9cceba026470a39874f6,2025-02-17T10:15:08.973000 CVE-2025-0357,0,0,0ae647dab29c7a227a1c7ef392ca808faddaedd9823b613fe8bd7952dd9efb7a,2025-01-25T02:15:26.990000 CVE-2025-0364,0,0,2423f698b570bf74da97e05ed992c1dc720ce0cd77b54afdd0e3b50ba4f8a276,2025-02-04T18:15:35.067000 CVE-2025-0365,0,0,68c9fa607d9af008f74f0910ed30a33940a0fb9c7f83018a7eca1ddc882dffeb,2025-02-01T06:15:31.213000 @@ -278897,7 +278897,7 @@ CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd CVE-2025-0503,0,0,1c28203001e43c279e03305b394a02204f5941f974df8145add898a6abc17980,2025-02-14T18:15:23.870000 CVE-2025-0506,0,0,d8bf3b78c733c50b3df0cd3f3a0a496f3fa631b02113fa5dfd90f4e97b958815,2025-02-12T15:15:15.613000 CVE-2025-0507,0,0,0741f2f025f4b48581d4d58f022e9dc19c48a922e6141a54aefd8981045d22c9,2025-01-31T05:15:10.280000 -CVE-2025-0509,0,0,a0073ec6d57214f2c4a11fc16247c3f01dd9524e1a7678c20945c0a176374afe,2025-02-04T20:15:49.763000 +CVE-2025-0509,0,1,913ed89216296740c4c407c24a56b36bddc347f56451a23b8f05b7d47d26ebb6,2025-02-17T12:15:27.370000 CVE-2025-0510,0,0,05652079849e71bfd50a60b32906a66a5fcd428ffe6c5caaa29432e1f6b204cf,2025-02-06T21:15:22.083000 CVE-2025-0511,0,0,70427fe57d14290a9393d17b066a31efedf5e9736021ed70160ea0cf3f988366,2025-02-12T12:15:29.210000 CVE-2025-0513,0,0,2c6d18638fe4b5977a94377d0acce3877b36fd4ccb075c7fc03b46347719c66e,2025-02-11T15:15:19.257000 @@ -279007,6 +279007,7 @@ CVE-2025-0707,0,0,5ea8e0d500b75ba8a0fc0cd19ceb093f4d4acd52cc281fb36710245d3d1c36 CVE-2025-0708,0,0,2c564dec190555666593be94185c7b92f00a312088bb857474e59f691fdbb07a,2025-01-24T20:15:34.200000 CVE-2025-0709,0,0,156b4593a93fa854ef60a86f01a55e00fa0c092a95e57a097f43efa6d6f6b8c5,2025-01-24T21:15:11.237000 CVE-2025-0710,0,0,d434afd262bceee38318c1978d6fd83eef213e4c7163f6e3a198919727021a6b,2025-01-24T21:15:11.420000 +CVE-2025-0714,1,1,0057831ca66e3db49b7940154242ccfd79d407347a06e6c8cd85f6d31ee92f18,2025-02-17T12:15:27.570000 CVE-2025-0720,0,0,602262593ab5841efad088d2b78c277a4b7966a622beefaf31478d2cb3826706,2025-01-26T23:15:21.547000 CVE-2025-0721,0,0,9b15b019b479c4479137e55c74f2da2652b1f56c2d67e45558507ea73a96e795,2025-01-27T00:15:26.317000 CVE-2025-0722,0,0,d286657780f2322cec5dfe4e8af4674bbdc5e8a8b778a753270cdbdd213a2c1d,2025-01-27T00:15:26.517000 @@ -279834,7 +279835,7 @@ CVE-2025-21683,0,0,eb90b34b8c26cfd5a6fc922b697d6b0c2dfe15c32e6ed59da1ae357c1a3f7 CVE-2025-21684,0,0,2f956d860130e6337d0fabc47d6eb0a3769264253b41d76d2b8bb060797c168a,2025-02-11T16:12:41.533000 CVE-2025-21685,0,0,ddcc9f74d2788921662827130d064ca08f136819e30b8929e36a7dc983d8aa08,2025-02-11T16:11:19.543000 CVE-2025-21686,0,0,75eca37a2a9f73fbbcf8475c4f690bd033d8354a0d1793366da443130059b4db,2025-02-10T16:15:38.100000 -CVE-2025-21687,0,0,731e06dc41eb1826a82f0b150e469653af4058d6fae9edcc298267a2b69d1f58,2025-02-10T16:15:38.207000 +CVE-2025-21687,0,1,2c2c627af4c6b661b7475ed3a3c45fd810de911af720cf67e0295da31022b70d,2025-02-17T12:15:27.790000 CVE-2025-21688,0,0,630d962152a5ef8c0af287b3cac9b1b0d8ac4e898b90cadc37f867db1dac2020,2025-02-10T16:15:38.323000 CVE-2025-21689,0,0,af95d512c25672f1182cbdc285afa556f5984fc59f0b9ac3275c3c40288f0d7b,2025-02-10T16:15:38.447000 CVE-2025-21690,0,0,af1632176e641a0691e2d0045bd50a0fd357491868cdeecd328ada4c2ffbcdee,2025-02-10T16:15:38.553000 @@ -280703,9 +280704,11 @@ CVE-2025-23836,0,0,5c76aa20fa64580f07d9530831e0cb5c7e88e1287b55c63d0300b02146b3c CVE-2025-23837,0,0,371373d70784fb5e2285584d435fa34d3363a28bafc09c0ab1690ff32190677d,2025-01-24T11:15:11.240000 CVE-2025-23838,0,0,4752ed20e3dc714416037d00b281cddc275d8df64a4c888dd8f3b3d43e89086b,2025-01-24T11:15:11.390000 CVE-2025-23839,0,0,c711cdfd3a6cd8df3981e46ebebb623db7f4f50ebcbba001c1ca48594578b44f,2025-01-24T11:15:11.523000 +CVE-2025-23840,1,1,e5b0984fb71be0968ed90480ec3d330f2c4aaa2509c5dd5bd67f34d8b556326b,2025-02-17T12:15:27.973000 CVE-2025-23841,0,0,c097c459c2277c131514a3ea078b91eba98a25a334eaa639de34719734a5222a,2025-01-16T21:15:24.793000 CVE-2025-23842,0,0,2b0139d7daa7e9dee90c237d483621e8535d39bd8efb9a3ce143d2d5a6b0d36f,2025-01-16T21:15:24.940000 CVE-2025-23844,0,0,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000 +CVE-2025-23845,1,1,fc17fee2a7781ea5c8ea3d18cf4d8167acd9c56f0f534b9dcf11a7aa5d345869,2025-02-17T12:15:28.127000 CVE-2025-23846,0,0,ea1add75e4166af75969247fd7072cf309971d9564e41b3b3aa5ab3aed42b97c,2025-01-22T15:15:24.570000 CVE-2025-23848,0,0,89a987df9d0bbdbc45b1ea1fdc383b4ea7fa77b656809c9e88d08eb1cb2905d0,2025-01-16T21:15:25.220000 CVE-2025-23849,0,0,7076f9fcf4e7216b0f5ca136c4ea4a88f8fc78bd3d3c6b722ad7847e399fd28f,2025-01-27T15:15:13.087000 @@ -281526,13 +281529,22 @@ CVE-2025-26578,0,0,1ba1d37a5d1af1d2f76239a6f2ed820c7ad94689f9ccc172f7eecaa56fe90 CVE-2025-26580,0,0,c808557e22a6d83e87ce5992c6ff2cdddda2d2aa66f5a321875aca0441d9569c,2025-02-13T14:16:24.250000 CVE-2025-26582,0,0,00823840b86fea4d98d4ba8da828de8ef859573fc8d1e89f9ae001b9d6f9a267,2025-02-13T14:16:24.407000 CVE-2025-26700,0,0,a62049a64dad278ca1213054f25f2aed479e1d05d98e9fdc2dc613607ff558b5,2025-02-17T03:15:09.750000 +CVE-2025-26754,1,1,402a2759dad93da9f23b2492c07100626d0693520f28e20423238f6ecd814d8a,2025-02-17T12:15:28.267000 CVE-2025-26755,0,0,ab55ada10e2471e3f3b6d39ba7098336ac0a1b0769fa3f43fd2c4de0b71599ce,2025-02-16T23:15:10.627000 +CVE-2025-26758,1,1,a26f515dcd360cc3ddbe170c3b554583598aed711ba91a215b8cd7112059dd35,2025-02-17T12:15:28.407000 CVE-2025-26759,0,0,aa971f4308d9dde025f5e1ad7daa8f065b0641c9cb32130c8a995de32816229c,2025-02-16T23:15:10.777000 CVE-2025-26761,0,0,130481f4b28cc5ac3e58302d2cdf3485b24296b75bca4ad9bb67ba26ddaffc38,2025-02-16T23:15:10.920000 CVE-2025-26765,0,0,febe7fb1865b08d6bbec6c81b3ab270dd96207bad5fe3685a198c3b4fb2b2101,2025-02-16T23:15:11.063000 CVE-2025-26766,0,0,053586fef9ce986be152eb9ae1e7b8892c9f075ba2f907277b1d4763cc12fe70,2025-02-16T23:15:11.207000 CVE-2025-26767,0,0,187ad69a9eed635c81080502232aaa7de1c87394e8edce49d9a9a4ea1e9e43c7,2025-02-16T23:15:11.350000 CVE-2025-26768,0,0,de05048edbcd420e1a560f4197db47cf4598333997e8f116de71226c95afb627,2025-02-16T23:15:11.487000 +CVE-2025-26769,1,1,0c72222b8a85af7a331e5bf8b764bac00a89d3c80a1a5dd966f9db3a9325c047,2025-02-17T12:15:28.550000 +CVE-2025-26770,1,1,b8458cb1a3e8b55edb12423478e672f2088dbbbcb505215466ec38c374218572,2025-02-17T12:15:28.687000 +CVE-2025-26771,1,1,1172594f01315a68b1db7af85146cea8365106bb718e61572460a2e4c4a81b19,2025-02-17T12:15:28.833000 +CVE-2025-26772,1,1,c07c6cc8f50d1e9a48d9bbe77ef3064c2299e1d25b700ebf62ce9cf490ea5fb9,2025-02-17T12:15:28.980000 +CVE-2025-26773,1,1,2e012b5456eae6488f8204215cfc7953086c04f4520b05ba5b5d35b16125c8f5,2025-02-17T12:15:29.123000 +CVE-2025-26775,1,1,04dff38e991d1b46c040974dfcb68e80377672de97a81d8017423e599debe554,2025-02-17T12:15:29.260000 +CVE-2025-26778,1,1,f4f3856714356e410e7f4f3388bedae25b32fbe8e18283316af64b40400930e7,2025-02-17T12:15:29.417000 CVE-2025-26779,0,0,78ae05acb92595d40239dc765a3fe7d78dcaaef138d093b03917a2ce182992b1,2025-02-16T23:15:11.630000 CVE-2025-26788,0,0,1ba864f8ac81a56163abfb386c84050b425d8eb039d7783af9b48ca3d178b538,2025-02-15T16:15:30.090000 CVE-2025-26789,0,0,b98c32efc76bff07b26dd009ea99782108b024ce84abc7d87c0e368d23f6c39a,2025-02-14T08:15:31.357000