mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2025-03-15T07:00:21.825115+00:00
This commit is contained in:
parent
8614161325
commit
f99c11703f
64
CVE-2024/CVE-2024-134xx/CVE-2024-13497.json
Normal file
64
CVE-2024/CVE-2024-134xx/CVE-2024-13497.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-13497",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-15T05:15:45.713",
|
||||
"lastModified": "2025-03-15T05:15:45.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WordPress form builder plugin for contact forms, surveys and quizzes \u2013 Tripetto plugin for WordPress is vulnerable to Stored Cross-Site Scripting via attachment uploads in all versions up to, and including, 8.0.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the uploaded file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/tripetto/trunk/lib/attachments.php#L46",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3251202%40tripetto%2Ftrunk&old=3231968%40tripetto%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fbbe006c-1afc-4c8b-a9f3-ffb21cdabb54?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-17xx/CVE-2025-1771.json
Normal file
60
CVE-2025/CVE-2025-17xx/CVE-2025-1771.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-1771",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-15T05:15:47.253",
|
||||
"lastModified": "2025-03-15T05:15:47.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Traveler theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.1.8 via the 'hotel_alone_load_more_post' function 'style' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-98"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://travelerwp.com/traveler-changelog/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/da3e3d6c-7643-4f22-aa88-2c4ce80aed1f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-17xx/CVE-2025-1773.json
Normal file
60
CVE-2025/CVE-2025-17xx/CVE-2025-1773.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-1773",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-03-15T05:15:47.403",
|
||||
"lastModified": "2025-03-15T05:15:47.403",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Traveler theme for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in all versions up to, and including, 3.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://travelerwp.com/traveler-changelog/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/46c9dae7-d811-4b59-94c1-71a83652a14d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-300xx/CVE-2025-30066.json
Normal file
72
CVE-2025/CVE-2025-300xx/CVE-2025-30066.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-30066",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-15T06:15:12.193",
|
||||
"lastModified": "2025-03-15T06:15:12.193",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "tj-actions changed-files through 45.0.7 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were not originally affected, but were modified by a threat actor to point at commit 0e58ed8, which contains the malicious updateFeatures code.)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-506"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/github/docs/blob/962a1c8dccb8c0f66548b324e5b921b5e4fbc3d6/content/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions.md?plain=1#L191-L193",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tj-actions/changed-files/issues/2463",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://news.ycombinator.com/item?id=43368870",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://semgrep.dev/blog/2025/popular-github-action-tj-actionschanged-files-is-compromised/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
23
README.md
23
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-15T05:00:20.124475+00:00
|
||||
2025-03-15T07:00:21.825115+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-15T04:15:22.443000+00:00
|
||||
2025-03-15T06:15:12.193000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,24 +33,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
285293
|
||||
285297
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-12336](CVE-2024/CVE-2024-123xx/CVE-2024-12336.json) (`2025-03-15T04:15:20.263`)
|
||||
- [CVE-2024-13847](CVE-2024/CVE-2024-138xx/CVE-2024-13847.json) (`2025-03-15T04:15:20.473`)
|
||||
- [CVE-2025-1653](CVE-2025/CVE-2025-16xx/CVE-2025-1653.json) (`2025-03-15T03:15:34.457`)
|
||||
- [CVE-2025-1657](CVE-2025/CVE-2025-16xx/CVE-2025-1657.json) (`2025-03-15T03:15:34.600`)
|
||||
- [CVE-2025-1667](CVE-2025/CVE-2025-16xx/CVE-2025-1667.json) (`2025-03-15T04:15:21.273`)
|
||||
- [CVE-2025-1668](CVE-2025/CVE-2025-16xx/CVE-2025-1668.json) (`2025-03-15T04:15:21.457`)
|
||||
- [CVE-2025-1669](CVE-2025/CVE-2025-16xx/CVE-2025-1669.json) (`2025-03-15T04:15:21.630`)
|
||||
- [CVE-2025-1670](CVE-2025/CVE-2025-16xx/CVE-2025-1670.json) (`2025-03-15T04:15:21.810`)
|
||||
- [CVE-2025-2163](CVE-2025/CVE-2025-21xx/CVE-2025-2163.json) (`2025-03-15T04:15:22.073`)
|
||||
- [CVE-2025-2164](CVE-2025/CVE-2025-21xx/CVE-2025-2164.json) (`2025-03-15T04:15:22.260`)
|
||||
- [CVE-2025-2267](CVE-2025/CVE-2025-22xx/CVE-2025-2267.json) (`2025-03-15T04:15:22.443`)
|
||||
- [CVE-2024-13497](CVE-2024/CVE-2024-134xx/CVE-2024-13497.json) (`2025-03-15T05:15:45.713`)
|
||||
- [CVE-2025-1771](CVE-2025/CVE-2025-17xx/CVE-2025-1771.json) (`2025-03-15T05:15:47.253`)
|
||||
- [CVE-2025-1773](CVE-2025/CVE-2025-17xx/CVE-2025-1773.json) (`2025-03-15T05:15:47.403`)
|
||||
- [CVE-2025-30066](CVE-2025/CVE-2025-300xx/CVE-2025-30066.json) (`2025-03-15T06:15:12.193`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
26
_state.csv
26
_state.csv
@ -246456,7 +246456,7 @@ CVE-2024-12332,0,0,f0bf328e81e8dc6e6391061dc5bf4110c5e0a30cef25e410954b9a99df4db
|
||||
CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000
|
||||
CVE-2024-12334,0,0,c80372a41d2c6dabd9e527eb47f4ae66d07465d732e862625492ebe86b1e9b0e,2025-02-04T19:32:48.487000
|
||||
CVE-2024-12335,0,0,811e1f31fde162cfb07e19f2dc625fd9888bd35150e2bacee10a476425d11394,2024-12-25T07:15:11.980000
|
||||
CVE-2024-12336,1,1,46e17d0d78a75501f93f4f743314eb767b92feca199c3707eba11e7a8fd13341,2025-03-15T04:15:20.263000
|
||||
CVE-2024-12336,0,0,46e17d0d78a75501f93f4f743314eb767b92feca199c3707eba11e7a8fd13341,2025-03-15T04:15:20.263000
|
||||
CVE-2024-12337,0,0,0ac824defe049d65b98a787c3f5b6e8a7c26d83f20e6b104dc20776aaa16a0de,2025-01-08T11:15:06.613000
|
||||
CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000
|
||||
CVE-2024-12339,0,0,3eb83436990555e2815b093662c73c0abac18956e62294ddc11370b3651631b5,2025-02-19T08:15:13.907000
|
||||
@ -247530,6 +247530,7 @@ CVE-2024-13493,0,0,42ff21ae6aacbec92978e0ea28bdc61ddb564d9f2d81f25e9d1e5dfa73ff8
|
||||
CVE-2024-13494,0,0,df89de1c8df07248517af2290bff81bf7153aa4d140a9b389da9d1731435daec,2025-02-28T01:30:32.830000
|
||||
CVE-2024-13495,0,0,7a8bc062291cac2ab3dfb8a0fb7feeecd31abf131df44b7d6a18b1140227b207,2025-01-24T20:46:53.307000
|
||||
CVE-2024-13496,0,0,192a8533534e044b339576d96e9cea7e19a2bbd248a7b183889cec35656a4f79,2025-01-24T20:45:57.463000
|
||||
CVE-2024-13497,1,1,ca5e47ae7c2dc1ee03040b1f35f13791be034da2df8526c0c9339f0e6b63b540,2025-03-15T05:15:45.713000
|
||||
CVE-2024-13498,0,0,77e6a8cf4d81104f905c38f77c45b2cd90487f916b046fcb4e6b362664e5c3fc,2025-03-12T06:15:21.360000
|
||||
CVE-2024-13499,0,0,6d635dc5b8c51f2804fa43df8b3beb018f4524a3b4ba54f25865b62cf92ed7dc,2025-01-24T20:37:12.533000
|
||||
CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000
|
||||
@ -247846,7 +247847,7 @@ CVE-2024-13842,0,0,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567
|
||||
CVE-2024-13843,0,0,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000
|
||||
CVE-2024-13844,0,0,21babc28af34bffd8f0537917ad38459406b7aaf2f450970a8d59edea0578844,2025-03-13T13:10:31.303000
|
||||
CVE-2024-13846,0,0,bc15bbce097a905951a0b88c5b6aded5de0269f145c99c529b730210812bf05d,2025-02-25T03:27:13.767000
|
||||
CVE-2024-13847,1,1,ce5194c892c78c442012e97a585416f94767416fb584e850750344867b6b862d,2025-03-15T04:15:20.473000
|
||||
CVE-2024-13847,0,0,ce5194c892c78c442012e97a585416f94767416fb584e850750344867b6b862d,2025-03-15T04:15:20.473000
|
||||
CVE-2024-13848,0,0,5623c6bf6e4d11fedf071f2d8a6a41f683ea08f022ec414f86d8eab78ceadbd1,2025-02-21T15:51:59.213000
|
||||
CVE-2024-13849,0,0,ff236b733a56083f87d9fda1374c64bc737bce2f85ab541b6c51d8f632de7db5,2025-02-25T20:58:18.983000
|
||||
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
|
||||
@ -281309,16 +281310,16 @@ CVE-2025-1649,0,0,1ffcc93b10733473310edb55f4ccb478277702c492671815dff673be3d4e7b
|
||||
CVE-2025-1650,0,0,6daa20c936f4a185948f81e7395975d3ab5bc58dd68fa473315f8cd90dd452bf,2025-03-13T17:15:35.990000
|
||||
CVE-2025-1651,0,0,165f5756d56c5f7a9d6bba52873af622a4570974623eb94b225836f17dc57587,2025-03-13T17:15:36.153000
|
||||
CVE-2025-1652,0,0,0a38b83f9b1aee4cb268fe596290d96456fcc7e19888ecb6f72520e1924a318c,2025-03-13T17:15:36.297000
|
||||
CVE-2025-1653,1,1,76ca55c599eca136fb151ca7aece6eb51650f0a58e9305931234e54cad201f50,2025-03-15T03:15:34.457000
|
||||
CVE-2025-1657,1,1,7d79f8b791c0f2257e6d09bfa912263a9045eb980bab54893052c9506209266c,2025-03-15T03:15:34.600000
|
||||
CVE-2025-1653,0,0,76ca55c599eca136fb151ca7aece6eb51650f0a58e9305931234e54cad201f50,2025-03-15T03:15:34.457000
|
||||
CVE-2025-1657,0,0,7d79f8b791c0f2257e6d09bfa912263a9045eb980bab54893052c9506209266c,2025-03-15T03:15:34.600000
|
||||
CVE-2025-1661,0,0,c718692b127abf2ab2405bf627be21dedb77423dc857bce07380a6187cbd6651,2025-03-11T04:15:24.803000
|
||||
CVE-2025-1662,0,0,f747ba4edfe81f2cc6bd228a54a69ac8ef31e80bbf16aa2517aaed153638e887,2025-03-06T15:00:16.447000
|
||||
CVE-2025-1664,0,0,19bf990dd5c89c9cde04289487f1cebce350ee23136c2d614a3c8b0434b455bc,2025-03-11T21:25:56.700000
|
||||
CVE-2025-1666,0,0,129a5300a49835d516d7b95bc1f11c6cf7012490eda8d6a20d90a510d721111b,2025-03-06T12:15:36.117000
|
||||
CVE-2025-1667,1,1,7a0f52309f32a65d7c7606cec0dbbff211a6694341b0aafc0053a30df74908f5,2025-03-15T04:15:21.273000
|
||||
CVE-2025-1668,1,1,b3bf322ff8e11569f18c7dfc2687bcf6e7138b477aae21fed59f7e2bb652a33e,2025-03-15T04:15:21.457000
|
||||
CVE-2025-1669,1,1,5fa2864acc137ecde1c4a3e5d8c9b87ad778cb1be0806829fc4e280eb725b2fc,2025-03-15T04:15:21.630000
|
||||
CVE-2025-1670,1,1,a78fb384b24ffa352f2a3093a4767a80271c9ab04e7dd06c25df28fff7dc712b,2025-03-15T04:15:21.810000
|
||||
CVE-2025-1667,0,0,7a0f52309f32a65d7c7606cec0dbbff211a6694341b0aafc0053a30df74908f5,2025-03-15T04:15:21.273000
|
||||
CVE-2025-1668,0,0,b3bf322ff8e11569f18c7dfc2687bcf6e7138b477aae21fed59f7e2bb652a33e,2025-03-15T04:15:21.457000
|
||||
CVE-2025-1669,0,0,5fa2864acc137ecde1c4a3e5d8c9b87ad778cb1be0806829fc4e280eb725b2fc,2025-03-15T04:15:21.630000
|
||||
CVE-2025-1670,0,0,a78fb384b24ffa352f2a3093a4767a80271c9ab04e7dd06c25df28fff7dc712b,2025-03-15T04:15:21.810000
|
||||
CVE-2025-1671,0,0,3e864abf2317ed0da2e5ce5c715f77427678e759b1b0b7661615571210565dd9,2025-03-01T08:15:34.320000
|
||||
CVE-2025-1672,0,0,acaf01950ea049a2828558b06c1cada5a4018322c579aca0f91cd8d8cfdde40a,2025-03-06T10:15:11.897000
|
||||
CVE-2025-1673,0,0,43512569ec0b0b4646ee8d2f3e7a6a4bcb909a60652f0dbc32a6d2623d178b1f,2025-02-28T01:30:32.830000
|
||||
@ -281364,6 +281365,8 @@ CVE-2025-1757,0,0,dc2ff923c8c3145193c6561db00b356fb8535b7d409d9e1ae9c89572d47684
|
||||
CVE-2025-1764,0,0,a0772d13ae7c80ed5a68a77c5e9e29582c4c3cb8221fdf31ef9438995646ffb7,2025-03-14T06:15:24.860000
|
||||
CVE-2025-1767,0,0,2d7a67a49e2d8224d71f3f81db0cee88468897d8d69262d33481730c6124ca91,2025-03-13T21:15:43.127000
|
||||
CVE-2025-1768,0,0,c05b89cadd612720776009e6e0d5cd82f5ad65495c19a7bd41a71ec158195a94,2025-03-07T11:15:15.653000
|
||||
CVE-2025-1771,1,1,c171ed55fed0a4a64976e6e8eeb1698997415eae3c2cf608015436b6fb242c77,2025-03-15T05:15:47.253000
|
||||
CVE-2025-1773,1,1,795daaa3f258262b445a3a99a79426a4cfa2d8aa55ca3c162cbe1a93dbd5c998,2025-03-15T05:15:47.403000
|
||||
CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000
|
||||
CVE-2025-1780,0,0,3f45bedc6155c2b8b2fa77d1259dea132c1de7996dc227477ece460ea93a3593,2025-03-01T04:15:09.713000
|
||||
CVE-2025-1783,0,0,7fcaf339289a48edd534e2424306b8cd911988b21bbe826dd21f100c86d4c9de,2025-03-08T10:15:11.647000
|
||||
@ -282166,7 +282169,7 @@ CVE-2025-21626,0,0,e56409ce0f9770c9f60f64484e01c5dc141e09c125b689fb402783ce7def5
|
||||
CVE-2025-21627,0,0,a64cbac625de75abb2fb97405740e09eb3c0493dfb277a167ddabd4e32a452ec,2025-03-04T13:49:18.880000
|
||||
CVE-2025-21628,0,0,0075ad45f4e081e6b1d4b87e45ccf38954b3b032c76d5db5fcb797ed5fc6213f,2025-01-09T18:15:30.070000
|
||||
CVE-2025-21629,0,0,5bd27bb9a82cb5a5f09a5986e4163e86befaea4298f9b54578a62350a29978a7,2025-01-15T13:15:15.220000
|
||||
CVE-2025-2163,1,1,4a9d6aac4358029c948a47087bf532e1033b5a3e30fdb615325902d9e53b3016,2025-03-15T04:15:22.073000
|
||||
CVE-2025-2163,0,0,4a9d6aac4358029c948a47087bf532e1033b5a3e30fdb615325902d9e53b3016,2025-03-15T04:15:22.073000
|
||||
CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51e41,2025-01-17T09:15:08
|
||||
CVE-2025-21631,0,0,827a424e63f48b072bb6688d1a9f41839aec5c2b224610b12dcbe56fe5cf9787,2025-02-10T18:15:34.650000
|
||||
CVE-2025-21632,0,0,319c971763f332a963bcaca50f66216a12a2c5a0d07d26ccb015f5aed2bdc246,2025-01-19T11:15:08.650000
|
||||
@ -282177,7 +282180,7 @@ CVE-2025-21636,0,0,21fd9cc7f26f271ab5cd0fe582a163645a34a1079a2be4784c7a4aba67244
|
||||
CVE-2025-21637,0,0,657e877ec28dcedd068435e08af2dd385588279b3e68a343aca425eae0f9a55e,2025-02-27T21:59:09.400000
|
||||
CVE-2025-21638,0,0,180b030ddda4ba1b9607789561653da9e417628eb2292d5c362c612aca71d529,2025-02-27T21:59:09.400000
|
||||
CVE-2025-21639,0,0,2fa2ab44b53c6f6dcecff992c7981a9352c7ccbbefd8b3bb4f17c75062fa6bf3,2025-02-27T21:59:09.400000
|
||||
CVE-2025-2164,1,1,a3076a1fd91d692186e911269ec7d6ba66f3d8981292bfc17d52dd0bd961beee,2025-03-15T04:15:22.260000
|
||||
CVE-2025-2164,0,0,a3076a1fd91d692186e911269ec7d6ba66f3d8981292bfc17d52dd0bd961beee,2025-03-15T04:15:22.260000
|
||||
CVE-2025-21640,0,0,caa1db16362fae2e77dfc06fd70401adb6c3f4faec923627abf4ea8c2f850fc9,2025-02-27T21:59:09.400000
|
||||
CVE-2025-21641,0,0,4fc03e9469f7c201dbd174a17fd8507a8756267c4a4d265b597cb2190f0c8db2,2025-01-19T11:15:09.643000
|
||||
CVE-2025-21642,0,0,e2452b15d9c3269e0a0a06a4c18f073a05c04d5db66343d7978bfd86387dcd30,2025-01-19T11:15:09.757000
|
||||
@ -282751,7 +282754,7 @@ CVE-2025-22661,0,0,5209e5b0f9c7939e902aaa866620e423d90372564b55d2924e42e42f27d6a
|
||||
CVE-2025-22662,0,0,962ab222d5a96ff811aa7aa96d0d9f516c663f85299dc1f3c1080c9811010ad9,2025-02-18T19:15:25.753000
|
||||
CVE-2025-22663,0,0,1613aa583a23b982f2905c79aa7dfe29b73a11cccfd0ebc15923bf3c61bfea52,2025-02-18T20:15:27.343000
|
||||
CVE-2025-22664,0,0,f7d6e496e62415f46b76c8ef55e71f4304d572ade17c6569a88c324811b52af0,2025-02-18T19:15:25.890000
|
||||
CVE-2025-2267,1,1,e4c2704c47c5dbf840dd2f0ee275722d282b44e1395a561c82643918804f2e91,2025-03-15T04:15:22.443000
|
||||
CVE-2025-2267,0,0,e4c2704c47c5dbf840dd2f0ee275722d282b44e1395a561c82643918804f2e91,2025-03-15T04:15:22.443000
|
||||
CVE-2025-22674,0,0,4c62711247e33f87026272b579a8a4aeb1faa8374abc3fdf8f1eb2eaf5535454,2025-02-18T19:15:26.027000
|
||||
CVE-2025-22675,0,0,976876d8bada85ddb7f9b01306108b5dc8490f124ee847cc17386ccf664141b7,2025-02-18T19:15:26.160000
|
||||
CVE-2025-22676,0,0,f4c77d445e330cc96300170b283a943375cafd2a56102f55d30d95490870d22d,2025-02-16T23:15:10.037000
|
||||
@ -285292,3 +285295,4 @@ CVE-2025-29996,0,0,04d5b171307dc2b30ea5eb5f28181e2f5299e6abd99f684b2064e258a3b5d
|
||||
CVE-2025-29997,0,0,3e1c88fa2147bd225e112b8448984cfa69ba6bc439375d110bf8e47fa9f5f226,2025-03-13T12:15:14.127000
|
||||
CVE-2025-29998,0,0,5dddfef1e1ef55af54ca138ece8d3523cffbfaa8a6942b2f0faa38d3ba4d474f,2025-03-13T12:15:14.277000
|
||||
CVE-2025-30022,0,0,18459892879519497629792b4e249dfce13486f819d766c4e46ea46420ba454e,2025-03-14T03:15:45.257000
|
||||
CVE-2025-30066,1,1,3262b27a19e1009341116d03848f2987c8add299a187f932bae911f0dc8ddaf6,2025-03-15T06:15:12.193000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user