From 0e414d97f53f94f00e46621c799167cbdcf72969 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 28 Apr 2025 18:03:58 +0000 Subject: [PATCH] Auto-Update: 2025-04-28T18:00:20.026629+00:00 --- CVE-2015/CVE-2015-45xx/CVE-2015-4582.json | 56 ++++ CVE-2018/CVE-2018-148xx/CVE-2018-14847.json | 16 +- CVE-2022/CVE-2022-303xx/CVE-2022-30355.json | 27 +- CVE-2022/CVE-2022-38xx/CVE-2022-3824.json | 22 +- CVE-2022/CVE-2022-418xx/CVE-2022-41871.json | 60 ++++ CVE-2023/CVE-2023-358xx/CVE-2023-35814.json | 72 +++++ CVE-2023/CVE-2023-358xx/CVE-2023-35815.json | 68 +++++ CVE-2023/CVE-2023-358xx/CVE-2023-35816.json | 68 +++++ CVE-2023/CVE-2023-358xx/CVE-2023-35817.json | 72 +++++ CVE-2023/CVE-2023-424xx/CVE-2023-42404.json | 60 ++++ CVE-2024/CVE-2024-203xx/CVE-2024-20368.json | 143 ++++++++- CVE-2024/CVE-2024-204xx/CVE-2024-20487.json | 153 +++++++++- CVE-2024/CVE-2024-205xx/CVE-2024-20527.json | 153 +++++++++- CVE-2024/CVE-2024-205xx/CVE-2024-20528.json | 153 +++++++++- CVE-2024/CVE-2024-205xx/CVE-2024-20529.json | 153 +++++++++- CVE-2024/CVE-2024-205xx/CVE-2024-20532.json | 153 +++++++++- CVE-2024/CVE-2024-288xx/CVE-2024-28870.json | 69 ++++- CVE-2024/CVE-2024-295xx/CVE-2024-29507.json | 52 +++- CVE-2024/CVE-2024-295xx/CVE-2024-29510.json | 60 +++- CVE-2024/CVE-2024-295xx/CVE-2024-29511.json | 52 +++- CVE-2024/CVE-2024-324xx/CVE-2024-32499.json | 60 ++++ CVE-2024/CVE-2024-338xx/CVE-2024-33863.json | 54 +++- CVE-2024/CVE-2024-338xx/CVE-2024-33864.json | 54 +++- CVE-2024/CVE-2024-338xx/CVE-2024-33865.json | 54 +++- CVE-2024/CVE-2024-338xx/CVE-2024-33866.json | 54 +++- CVE-2024/CVE-2024-338xx/CVE-2024-33867.json | 54 +++- CVE-2024/CVE-2024-338xx/CVE-2024-33868.json | 54 +++- CVE-2024/CVE-2024-353xx/CVE-2024-35362.json | 35 ++- CVE-2024/CVE-2024-398xx/CVE-2024-39842.json | 31 +- CVE-2024/CVE-2024-398xx/CVE-2024-39843.json | 31 +- CVE-2024/CVE-2024-420xx/CVE-2024-42021.json | 60 +++- CVE-2024/CVE-2024-420xx/CVE-2024-42022.json | 60 +++- CVE-2024/CVE-2024-420xx/CVE-2024-42023.json | 50 +++- CVE-2024/CVE-2024-420xx/CVE-2024-42024.json | 50 +++- CVE-2024/CVE-2024-427xx/CVE-2024-42797.json | 37 ++- CVE-2024/CVE-2024-445xx/CVE-2024-44570.json | 45 ++- CVE-2024/CVE-2024-460xx/CVE-2024-46077.json | 31 +- CVE-2024/CVE-2024-460xx/CVE-2024-46079.json | 28 +- CVE-2024/CVE-2024-460xx/CVE-2024-46080.json | 28 +- CVE-2024/CVE-2024-460xx/CVE-2024-46081.json | 28 +- CVE-2024/CVE-2024-460xx/CVE-2024-46082.json | 34 ++- CVE-2024/CVE-2024-460xx/CVE-2024-46083.json | 28 +- CVE-2024/CVE-2024-460xx/CVE-2024-46084.json | 33 ++- CVE-2024/CVE-2024-461xx/CVE-2024-46101.json | 27 +- CVE-2024/CVE-2024-466xx/CVE-2024-46607.json | 48 +++- CVE-2024/CVE-2024-466xx/CVE-2024-46654.json | 28 +- CVE-2024/CVE-2024-472xx/CVE-2024-47218.json | 33 ++- CVE-2024/CVE-2024-472xx/CVE-2024-47219.json | 33 ++- CVE-2024/CVE-2024-481xx/CVE-2024-48180.json | 27 +- CVE-2024/CVE-2024-483xx/CVE-2024-48357.json | 29 +- CVE-2024/CVE-2024-485xx/CVE-2024-48579.json | 27 +- CVE-2024/CVE-2024-555xx/CVE-2024-55513.json | 119 +++++++- CVE-2024/CVE-2024-555xx/CVE-2024-55514.json | 119 +++++++- CVE-2024/CVE-2024-555xx/CVE-2024-55515.json | 119 +++++++- CVE-2024/CVE-2024-555xx/CVE-2024-55516.json | 119 +++++++- CVE-2024/CVE-2024-561xx/CVE-2024-56144.json | 48 +++- CVE-2024/CVE-2024-90xx/CVE-2024-9036.json | 51 +++- CVE-2024/CVE-2024-97xx/CVE-2024-9771.json | 31 +- CVE-2025/CVE-2025-06xx/CVE-2025-0627.json | 31 +- CVE-2025/CVE-2025-211xx/CVE-2025-21169.json | 37 ++- CVE-2025/CVE-2025-215xx/CVE-2025-21591.json | 8 +- CVE-2025/CVE-2025-231xx/CVE-2025-23198.json | 48 +++- CVE-2025/CVE-2025-244xx/CVE-2025-24431.json | 73 ++++- CVE-2025/CVE-2025-244xx/CVE-2025-24448.json | 52 +++- CVE-2025/CVE-2025-244xx/CVE-2025-24449.json | 52 +++- CVE-2025/CVE-2025-244xx/CVE-2025-24452.json | 51 +++- CVE-2025/CVE-2025-244xx/CVE-2025-24453.json | 61 +++- CVE-2025/CVE-2025-271xx/CVE-2025-27158.json | 79 ++++- CVE-2025/CVE-2025-271xx/CVE-2025-27159.json | 73 ++++- CVE-2025/CVE-2025-271xx/CVE-2025-27160.json | 73 ++++- CVE-2025/CVE-2025-271xx/CVE-2025-27161.json | 73 ++++- CVE-2025/CVE-2025-271xx/CVE-2025-27162.json | 73 ++++- CVE-2025/CVE-2025-271xx/CVE-2025-27163.json | 79 ++++- CVE-2025/CVE-2025-271xx/CVE-2025-27164.json | 79 ++++- CVE-2025/CVE-2025-271xx/CVE-2025-27166.json | 51 +++- CVE-2025/CVE-2025-271xx/CVE-2025-27169.json | 52 +++- CVE-2025/CVE-2025-271xx/CVE-2025-27171.json | 61 +++- CVE-2025/CVE-2025-271xx/CVE-2025-27172.json | 27 +- CVE-2025/CVE-2025-271xx/CVE-2025-27174.json | 73 ++++- CVE-2025/CVE-2025-271xx/CVE-2025-27175.json | 51 +++- CVE-2025/CVE-2025-280xx/CVE-2025-28072.json | 27 +- CVE-2025/CVE-2025-307xx/CVE-2025-30727.json | 28 +- CVE-2025/CVE-2025-324xx/CVE-2025-32432.json | 8 +- CVE-2025/CVE-2025-38xx/CVE-2025-3827.json | 82 +++++- CVE-2025/CVE-2025-38xx/CVE-2025-3828.json | 82 +++++- CVE-2025/CVE-2025-38xx/CVE-2025-3829.json | 82 +++++- CVE-2025/CVE-2025-39xx/CVE-2025-3959.json | 14 +- CVE-2025/CVE-2025-39xx/CVE-2025-3964.json | 14 +- CVE-2025/CVE-2025-39xx/CVE-2025-3965.json | 18 +- CVE-2025/CVE-2025-40xx/CVE-2025-4026.json | 149 ++++++++++ CVE-2025/CVE-2025-40xx/CVE-2025-4027.json | 145 ++++++++++ CVE-2025/CVE-2025-40xx/CVE-2025-4028.json | 145 ++++++++++ CVE-2025/CVE-2025-40xx/CVE-2025-4029.json | 145 ++++++++++ CVE-2025/CVE-2025-438xx/CVE-2025-43854.json | 82 ++++++ CVE-2025/CVE-2025-438xx/CVE-2025-43857.json | 110 +++++++ CVE-2025/CVE-2025-466xx/CVE-2025-46614.json | 56 ++++ CVE-2025/CVE-2025-466xx/CVE-2025-46657.json | 10 +- CVE-2025/CVE-2025-466xx/CVE-2025-46674.json | 10 +- CVE-2025/CVE-2025-466xx/CVE-2025-46675.json | 10 +- CVE-2025/CVE-2025-466xx/CVE-2025-46688.json | 10 +- CVE-2025/CVE-2025-466xx/CVE-2025-46689.json | 10 +- CVE-2025/CVE-2025-466xx/CVE-2025-46690.json | 10 +- README.md | 84 +++--- _state.csv | 303 ++++++++++---------- 104 files changed, 5904 insertions(+), 500 deletions(-) create mode 100644 CVE-2015/CVE-2015-45xx/CVE-2015-4582.json create mode 100644 CVE-2022/CVE-2022-418xx/CVE-2022-41871.json create mode 100644 CVE-2023/CVE-2023-358xx/CVE-2023-35814.json create mode 100644 CVE-2023/CVE-2023-358xx/CVE-2023-35815.json create mode 100644 CVE-2023/CVE-2023-358xx/CVE-2023-35816.json create mode 100644 CVE-2023/CVE-2023-358xx/CVE-2023-35817.json create mode 100644 CVE-2023/CVE-2023-424xx/CVE-2023-42404.json create mode 100644 CVE-2024/CVE-2024-324xx/CVE-2024-32499.json create mode 100644 CVE-2025/CVE-2025-40xx/CVE-2025-4026.json create mode 100644 CVE-2025/CVE-2025-40xx/CVE-2025-4027.json create mode 100644 CVE-2025/CVE-2025-40xx/CVE-2025-4028.json create mode 100644 CVE-2025/CVE-2025-40xx/CVE-2025-4029.json create mode 100644 CVE-2025/CVE-2025-438xx/CVE-2025-43854.json create mode 100644 CVE-2025/CVE-2025-438xx/CVE-2025-43857.json create mode 100644 CVE-2025/CVE-2025-466xx/CVE-2025-46614.json diff --git a/CVE-2015/CVE-2015-45xx/CVE-2015-4582.json b/CVE-2015/CVE-2015-45xx/CVE-2015-4582.json new file mode 100644 index 00000000000..26685fce384 --- /dev/null +++ b/CVE-2015/CVE-2015-45xx/CVE-2015-4582.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2015-4582", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-28T16:15:22.193", + "lastModified": "2025-04-28T16:15:22.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The TheCartPress boot-store (aka Boot Store) theme 1.6.4 for WordPress allows header.php tcp_register_error XSS. NOTE: CVE-2015-4582 is not assigned to any Oracle product." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://themes.trac.wordpress.org/browser/boot-store/1.6.4/header.php#L348", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-148xx/CVE-2018-14847.json b/CVE-2018/CVE-2018-148xx/CVE-2018-14847.json index 0c495ee0ce0..d61ec4a9a05 100644 --- a/CVE-2018/CVE-2018-148xx/CVE-2018-14847.json +++ b/CVE-2018/CVE-2018-148xx/CVE-2018-14847.json @@ -2,8 +2,8 @@ "id": "CVE-2018-14847", "sourceIdentifier": "cve@mitre.org", "published": "2018-08-02T07:29:00.280", - "lastModified": "2025-03-14T20:06:59.320", - "vulnStatus": "Analyzed", + "lastModified": "2025-04-28T17:15:45.983", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -151,9 +151,9 @@ "url": "https://github.com/tenable/routeros/blob/master/bug_hunting_in_routeros_derbycon_2018.pdf", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Exploit", - "Third Party Advisory", - "Broken Link" + "Third Party Advisory" ] }, { @@ -172,6 +172,10 @@ "Third Party Advisory" ] }, + { + "url": "https://mikrotik.com/supportsec/winbox-vulnerability", + "source": "cve@mitre.org" + }, { "url": "https://n0p.me/winbox-bug-dissection/", "source": "cve@mitre.org", @@ -211,9 +215,9 @@ "url": "https://github.com/tenable/routeros/blob/master/bug_hunting_in_routeros_derbycon_2018.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Broken Link", "Exploit", - "Third Party Advisory", - "Broken Link" + "Third Party Advisory" ] }, { diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json index fde958f4cad..70c461ca4b9 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30355", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T16:15:08.733", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:31:54.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.2.9", + "matchCriteriaId": "220D28BD-7014-40AA-98D5-BFE1372680F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30355", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3824.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3824.json index dc716ed712a..179018428c7 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3824.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3824.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3824", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-28T14:15:14.970", - "lastModified": "2024-11-21T07:20:18.610", + "lastModified": "2025-04-28T16:15:24.223", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-418xx/CVE-2022-41871.json b/CVE-2022/CVE-2022-418xx/CVE-2022-41871.json new file mode 100644 index 00000000000..08521756fa4 --- /dev/null +++ b/CVE-2022/CVE-2022-418xx/CVE-2022-41871.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2022-41871", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-28T16:15:24.853", + "lastModified": "2025-04-28T16:15:24.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SEPPmail through 12.1.17 allows command injection within the Admin Portal. An authenticated attacker is able to execute arbitrary code in the context of the user root." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.seppmail.com/products/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35814.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35814.json new file mode 100644 index 00000000000..2df2bbff99e --- /dev/null +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35814.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2023-35814", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-28T16:15:25.357", + "lastModified": "2025-04-28T16:15:25.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DevExpress before 23.1.3 does not properly protect XtraReport serialized data in ASP.NET web forms." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t1141158/missing-protection-of-xtrareport-serialized-data-in-asp-net-web-forms", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t1158413/the-allowpassingdatasourceconnectionparameterstoclient-method-may-allow-untrusted-access", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t1160535/web-reporting-well-formed-request-to-a-report-control-s-backend-can-use", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35815.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35815.json new file mode 100644 index 00000000000..f0d6c00d12d --- /dev/null +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35815.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2023-35815", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-28T16:15:25.903", + "lastModified": "2025-04-28T17:15:46.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DevExpress before 23.1.3 has a data-source protection mechanism bypass during deserialization on XML data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t1141947/data-source-protection-bypass-during-xml-deserialization", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t1159142/web-reporting-data-source-protection-bypassed-during-xml-deserialization", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35816.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35816.json new file mode 100644 index 00000000000..8b79d36d818 --- /dev/null +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35816.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2023-35816", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-28T16:15:26.300", + "lastModified": "2025-04-28T17:15:46.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DevExpress before 23.1.3 allows arbitrary TypeConverter conversion." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t1127422/insecure-arbitrary-typeconverter-conversion", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t1159641/net-desktop-and-web-controls-unsafe-data-type-deserialization", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35817.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35817.json new file mode 100644 index 00000000000..2977479d30a --- /dev/null +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35817.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2023-35817", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-28T16:15:26.753", + "lastModified": "2025-04-28T17:15:46.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DevExpress before 23.1.3 allows AsyncDownloader SSRF." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t1157209/server-side-request-forgery-via-asyncdownloader", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t1161404/report-and-dashboard-server-improper-default-configuration-can-lead-to-ssrf-attacks", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t1162045/reporting-bi-dashboard-office-file-api-web-app-configuration-to-help-prevent-ssrf-attacks", + "source": "cve@mitre.org" + }, + { + "url": "https://supportcenter.devexpress.com/ticket/details/t394936/devexpress-security-advisory-updated-on-april-27-2023", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42404.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42404.json new file mode 100644 index 00000000000..27600e3f2cc --- /dev/null +++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42404.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2023-42404", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-28T17:15:46.807", + "lastModified": "2025-04-28T17:15:46.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OneVision Workspace before WS23.1 SR1 (build w31.040) allows arbitrary Java EL execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.onevision.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20368.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20368.json index bbc9c46f9f7..caaeea2ad4d 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20368.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20368.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20368", "sourceIdentifier": "psirt@cisco.com", "published": "2024-04-03T17:15:50.107", - "lastModified": "2024-11-21T08:52:28.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:01:04.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,131 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.7.0", + "versionEndExcluding": "3.1.0", + "matchCriteriaId": "6B9441DB-727B-43F2-ACC9-3D44A27B13E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*", + "matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*", + "matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + } + ] + } + ] } ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-csrf-NfAKXrp5", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-csrf-NfAKXrp5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json index 046f7a6fdfe..6bdddee0cbf 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20487.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20487", "sourceIdentifier": "psirt@cisco.com", "published": "2024-11-06T17:15:15.833", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:52:06.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,137 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.1.0", + "matchCriteriaId": "639F5FD9-8217-49BE-8C8F-59478E646B09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*", + "matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*", + "matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*", + "matchCriteriaId": "654E946A-07C5-4036-BC54-85EF42B808DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vulns-AF544ED5", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json index 9c82fe39fc3..222cc405e03 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20527.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20527", "sourceIdentifier": "psirt@cisco.com", "published": "2024-11-06T17:15:17.147", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:54:04.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 } ] }, @@ -51,10 +71,137 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.1.0", + "matchCriteriaId": "639F5FD9-8217-49BE-8C8F-59478E646B09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*", + "matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*", + "matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*", + "matchCriteriaId": "654E946A-07C5-4036-BC54-85EF42B808DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json index 932d47c658d..a042b5ebbdd 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20528.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20528", "sourceIdentifier": "psirt@cisco.com", "published": "2024-11-06T17:15:17.373", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:54:17.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,10 +71,137 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.1.0", + "matchCriteriaId": "639F5FD9-8217-49BE-8C8F-59478E646B09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*", + "matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*", + "matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*", + "matchCriteriaId": "654E946A-07C5-4036-BC54-85EF42B808DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json index fe6b1289489..5229b7ebe99 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20529.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20529", "sourceIdentifier": "psirt@cisco.com", "published": "2024-11-06T17:15:17.593", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:54:35.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 } ] }, @@ -51,10 +71,137 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.1.0", + "matchCriteriaId": "639F5FD9-8217-49BE-8C8F-59478E646B09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*", + "matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*", + "matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*", + "matchCriteriaId": "654E946A-07C5-4036-BC54-85EF42B808DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json index 4268553d783..40398dfd42f 100644 --- a/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20532.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20532", "sourceIdentifier": "psirt@cisco.com", "published": "2024-11-06T17:15:18.270", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:54:40.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 } ] }, @@ -51,10 +71,137 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.1.0", + "matchCriteriaId": "639F5FD9-8217-49BE-8C8F-59478E646B09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*", + "matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*", + "matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*", + "matchCriteriaId": "654E946A-07C5-4036-BC54-85EF42B808DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vuln-DBQdWRy", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28870.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28870.json index f0991c01421..ecf13a88408 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28870.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28870.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28870", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-03T22:15:07.037", - "lastModified": "2024-11-21T09:07:05.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:43:27.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,57 @@ "value": "CWE-770" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.0.17", + "matchCriteriaId": "78014F90-5B41-44C9-88EF-A0006141AFA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.4", + "matchCriteriaId": "B9D7349D-BE12-4B37-AEB0-6977ABCEAFED" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/OISF/suricata/security/advisories/GHSA-mhhx-xw7r-r5c8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/OISF/suricata/security/advisories/GHSA-mhhx-xw7r-r5c8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29507.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29507.json index 8b1522d6235..29e1cde50ea 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29507.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29507.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29507", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T19:15:03.240", - "lastModified": "2024-12-03T16:15:21.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:12:33.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.03.0", + "matchCriteriaId": "C94A899E-28C1-4FC0-B645-B5BE7AB34082" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707510", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2024/07/03/7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707510", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=7745dbe24514", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2024/07/03/7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29510.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29510.json index 09c1b3fab2e..fb52cba0568 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29510.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29510.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29510", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T19:15:03.320", - "lastModified": "2024-11-21T09:08:06.683", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:12:24.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,34 +51,76 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.03.1", + "matchCriteriaId": "62DFF97A-B408-4992-940C-5AEAFCB69A99" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707662", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2024/07/03/7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707662", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://codeanlabs.com/blog/research/cve-2024-29510-ghostscript-format-string-exploitation/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2024/07/03/7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/critical-vulnerability-in-ghostscript-cve-2024-29510", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29511.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29511.json index 63e87041359..f208dbce2a6 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29511.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29511.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29511", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T19:15:03.430", - "lastModified": "2024-11-21T09:08:06.910", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:12:15.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.03.1", + "matchCriteriaId": "62DFF97A-B408-4992-940C-5AEAFCB69A99" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707510", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2024/07/03/7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707510", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=3d4cfdc1a44", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2024/07/03/7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32499.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32499.json new file mode 100644 index 00000000000..c711f53d33e --- /dev/null +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32499.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-32499", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-28T17:15:47.073", + "lastModified": "2025-04-28T17:15:47.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Newforma Project Center Server through 2023.3.0.32259 allows remote code execution because .NET Remoting is exposed." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.newforma.com/newforma-project-center/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33863.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33863.json index 59bea157e20..59f82852047 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33863.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33863.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33863", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:22.170", - "lastModified": "2024-11-21T09:17:37.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:33:47.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,64 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linqi:linqi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.0.1", + "matchCriteriaId": "E8494D72-B856-4467-A188-BC9FA503CC1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33864.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33864.json index 606efaa7595..2ca34a7d7ec 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33864.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33864.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33864", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:22.280", - "lastModified": "2024-11-21T09:17:37.217", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:34:24.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,64 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linqi:linqi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.0.1", + "matchCriteriaId": "E8494D72-B856-4467-A188-BC9FA503CC1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33865.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33865.json index 553d5e03ae7..95187c3b86a 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33865.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33865.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33865", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:22.387", - "lastModified": "2024-11-21T09:17:37.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:34:11.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,64 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linqi:linqi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.0.1", + "matchCriteriaId": "E8494D72-B856-4467-A188-BC9FA503CC1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33866.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33866.json index 124f191d930..69f49c910cd 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33866.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33866.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33866", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:22.527", - "lastModified": "2024-11-21T09:17:37.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:34:54.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,64 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linqi:linqi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.0.1", + "matchCriteriaId": "E8494D72-B856-4467-A188-BC9FA503CC1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33867.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33867.json index 1d4dab65c3f..1a21f6fb228 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33867.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33867", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:22.633", - "lastModified": "2024-11-21T09:17:37.767", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:35:00.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,64 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linqi:linqi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.0.1", + "matchCriteriaId": "E8494D72-B856-4467-A188-BC9FA503CC1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33868.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33868.json index 27f78ed60ad..b7d6aa7b70b 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33868.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33868.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33868", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:22.740", - "lastModified": "2024-11-21T09:17:37.953", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:35:05.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,64 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linqi:linqi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.0.1", + "matchCriteriaId": "E8494D72-B856-4467-A188-BC9FA503CC1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://linqi.help/Updates/en#/SecurityUpdates", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.linqi.de/de-DE/blog.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json index ce013a773fc..b1101dfb62a 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35362", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T16:15:10.687", - "lastModified": "2025-03-27T21:15:48.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:01:44.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shopex:ecshop:3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "A160B213-4875-49D5-A0AF-FFB3397820A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/shopex/ecshop/issues/6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/shopex/ecshop/issues/6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39842.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39842.json index ece1bc0553d..8c36f499c2c 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39842.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39842.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39842", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-23T19:15:13.437", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:12:16.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:centreon:centreon:24.04.2:-:*:*:*:*:*:*", + "matchCriteriaId": "FE047E16-D02E-4487-893C-99A4F1E5074E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/centreon/centreon/releases", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://thewatch.centreon.com/latest-security-bulletins-64/security-bulletin-for-centreon-web-3809", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39843.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39843.json index 9720d20ba25..54462c4a9f8 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39843.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39843.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39843", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-23T19:15:13.510", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:11:33.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:centreon:centreon:24.04.2:-:*:*:*:*:*:*", + "matchCriteriaId": "FE047E16-D02E-4487-893C-99A4F1E5074E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/centreon/centreon/releases", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://thewatch.centreon.com/latest-security-bulletins-64/security-bulletin-for-centreon-web-3809", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42021.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42021.json index 78e1fb088c0..7f289bd896f 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42021.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42021.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42021", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:14.277", - "lastModified": "2024-09-09T14:35:04.620", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:54:23.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +83,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0.2498", + "versionEndExcluding": "12.2.0.4093", + "matchCriteriaId": "C4311B3C-EDCD-4BA9-9664-4BEF670BAC33" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42022.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42022.json index 900f12ff4fd..28e7ba5ddaa 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42022.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42022.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42022", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:14.417", - "lastModified": "2024-09-09T15:35:09.917", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:51:48.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +83,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0.2498", + "versionEndExcluding": "12.2.0.4093", + "matchCriteriaId": "C4311B3C-EDCD-4BA9-9664-4BEF670BAC33" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42023.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42023.json index 430b0c0a572..ccdc2eb34c1 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42023.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42023.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42023", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:14.553", - "lastModified": "2024-09-09T14:35:05.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:49:06.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0.2498", + "versionEndExcluding": "12.2.0.4093", + "matchCriteriaId": "C4311B3C-EDCD-4BA9-9664-4BEF670BAC33" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42024.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42024.json index 76308f09944..5967bc8e067 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42024.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42024.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42024", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:14.700", - "lastModified": "2024-09-09T14:35:06.053", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:47:40.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -51,10 +73,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.0.2498", + "versionEndExcluding": "12.2.0.4093", + "matchCriteriaId": "C4311B3C-EDCD-4BA9-9664-4BEF670BAC33" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42797.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42797.json index e2bfee5977f..5f70e181ed5 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42797.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42797.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42797", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T01:15:42.830", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:10:19.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Delete%20Playlist.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44570.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44570.json index e80920dd585..306a8f227ae 100644 --- a/CVE-2024/CVE-2024-445xx/CVE-2024-44570.json +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44570", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-11T17:15:13.580", - "lastModified": "2024-09-12T12:35:54.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:36:59.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.2.1", + "versionEndIncluding": "23.1.0", + "matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81" + } + ] + } + ] + } + ], "references": [ { "url": "http://system-on-chip.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.relyum.com/web/support/vulnerability-report/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46077.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46077.json index b0c71dbd4fb..ec26f730b36 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46077.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46077.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46077", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-04T19:15:16.617", - "lastModified": "2024-10-07T19:37:26.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:58:01.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:online_tours_and_travels_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "665E522E-6AE1-4425-9A6C-03616F79C523" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/n00bS3cLe4rner/CVE-s/blob/main/CVE-2024-46077.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://packetstormsecurity.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46079.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46079.json index 30422167ef4..47b0598d3c7 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46079.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46079", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T19:15:08.373", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:16:42.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:scriptcase:scriptcase:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.10.023", + "matchCriteriaId": "C8CDCB25-A6AA-46ED-B8EC-64356BE7E190" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46080.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46080.json index a9bc39ed7da..fee15f6acf7 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46080.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46080.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46080", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T21:15:06.767", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:17:16.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:scriptcase:scriptcase:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.10.023", + "matchCriteriaId": "C8CDCB25-A6AA-46ED-B8EC-64356BE7E190" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46081.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46081.json index b298856910c..e51aeffe550 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46081.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46081.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46081", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T19:15:08.763", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:16:25.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:scriptcase:scriptcase:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.10.023", + "matchCriteriaId": "C8CDCB25-A6AA-46ED-B8EC-64356BE7E190" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46082.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46082.json index 947405c6a3f..170b636263a 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46082.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46082.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46082", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T21:15:06.857", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:17:29.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:scriptcase:scriptcase:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.10.023", + "matchCriteriaId": "C8CDCB25-A6AA-46ED-B8EC-64356BE7E190" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46083.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46083.json index 0a94b0126d3..a752f8a1ba6 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46083.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46083.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46083", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T19:15:09.013", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:16:59.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:scriptcase:scriptcase:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.10.023", + "matchCriteriaId": "C8CDCB25-A6AA-46ED-B8EC-64356BE7E190" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-xss/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46084.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46084.json index 821ccde01c9..fbfbf95dcb5 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46084.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46084.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46084", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T21:15:06.950", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:17:46.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:scriptcase:scriptcase:*:*:*:*:*:*:*:*", + "versionEndIncluding": "9.10.023", + "matchCriteriaId": "C8CDCB25-A6AA-46ED-B8EC-64356BE7E190" + } + ] + } + ] + } + ], "references": [ { "url": "http://scriptcase.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-461xx/CVE-2024-46101.json b/CVE-2024/CVE-2024-461xx/CVE-2024-46101.json index 7f9f3d65fd5..05c40b926de 100644 --- a/CVE-2024/CVE-2024-461xx/CVE-2024-46101.json +++ b/CVE-2024/CVE-2024-461xx/CVE-2024-46101.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46101", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-20T21:15:12.500", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:24:53.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gdidees:gdidees_cms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.9.1", + "matchCriteriaId": "09AAE6B4-0C69-4428-9B58-E8F6E3943A44" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/N0zoM1z0/MY-CVE/blob/main/CVE-2024-46101.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46607.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46607.json index 5b6ce5e1792..4300d5b1271 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46607.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46607.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46607", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T01:15:44.390", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:09:34.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +61,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thecosy:icecms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.7", + "matchCriteriaId": "AB1A5290-7D7C-4512-B880-39BFF56C2FB6" + } + ] + } + ] + } + ], "references": [ { "url": "http://icecms.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Lunax0/LogLunax/blob/main/icecms/CVE-2024-46607.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Thecosy/iceCMS?tab=readme-ov-file", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46654.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46654.json index e55c3f2c78b..f173093e94f 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46654.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46654", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-20T19:15:16.473", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:51:42.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:maccms:maccms:10.0:2024.1000.4040:*:*:*:*:*:*", + "matchCriteriaId": "987540D6-C813-4D85-80A8-1CF6ED571744" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/magicblack/maccms10/issues/1183", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47218.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47218.json index 36e2cd27c05..857ff667210 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47218.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47218", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-22T01:15:11.583", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:22:15.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vesoft:nebulagraph_database:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.8.0", + "matchCriteriaId": "A2B68E7B-C609-45C4-9234-71F24D045E41" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vesoft-inc/nebula/pull/5936", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Issue Tracking" + ] }, { "url": "https://github.com/vesoft-inc/nebula/pull/5936/commits/cd6c5976ccfe817b2e0a2d46227cd361bfefb45c", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47219.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47219.json index d1db511020a..df648598d53 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47219.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47219.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47219", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-22T01:15:11.890", - "lastModified": "2025-03-14T17:15:47.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:19:48.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vesoft:nebulagraph_database:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.8.0", + "matchCriteriaId": "A2B68E7B-C609-45C4-9234-71F24D045E41" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vesoft-inc/nebula/pull/5936", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Issue Tracking" + ] }, { "url": "https://github.com/vesoft-inc/nebula/pull/5936/commits/cd6c5976ccfe817b2e0a2d46227cd361bfefb45c", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48180.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48180.json index 10b63b7fce3..57124f790c3 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48180.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48180.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48180", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-16T21:15:13.457", - "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:34:22.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:classcms:classcms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.8", + "matchCriteriaId": "BF25D509-9EAC-4496-8200-C68833A2B48E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/J-0k3r/CVE-2024-48180", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json index 72fbdbee059..e745a746944 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48357", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:06.050", - "lastModified": "2024-10-30T17:35:13.203", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:37:34.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lylme:lylme_spage:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.0", + "versionEndIncluding": "1.6.0", + "matchCriteriaId": "04C61EA1-038E-46DA-8927-9A3D8332313D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Jingyi-u/LyLme_Spage_2/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48579.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48579.json index c032787a67e..8a3530ad501 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48579.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48579.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48579", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T16:15:09.940", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-28T17:39:16.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/baineoli/CVE/blob/main/2024/house%20rental%20management%20system%20-%20SQL%20Injection%20%28Admin%20Login%29.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55513.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55513.json index bacace5d723..2de970fa11b 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55513.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55513.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55513", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T20:15:22.623", - "lastModified": "2024-12-18T16:15:14.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:13:31.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,123 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "3694F82E-0BB6-478B-B172-ADFCC42065EE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33BE02D1-DA11-4667-BAE6-576845174487" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "2E07731B-950C-4A1C-88B6-14009D839D96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82FD4752-10DA-46CE-9EC4-C394AA1DABBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "7ADA8A53-1B6A-40C4-A5CB-3FF4817BDD93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E37A21A-A798-4C25-85DB-4E46FE02166A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "E67FFD88-D668-403E-8F09-5D82A4F962BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A1542B-B66C-44FC-8512-2365333B1A3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55514.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55514.json index c421fb8937b..bcbac32effe 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55514.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55514.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55514", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T20:15:22.757", - "lastModified": "2024-12-18T16:15:14.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:13:35.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,123 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "3694F82E-0BB6-478B-B172-ADFCC42065EE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33BE02D1-DA11-4667-BAE6-576845174487" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "2E07731B-950C-4A1C-88B6-14009D839D96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82FD4752-10DA-46CE-9EC4-C394AA1DABBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "7ADA8A53-1B6A-40C4-A5CB-3FF4817BDD93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E37A21A-A798-4C25-85DB-4E46FE02166A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "E67FFD88-D668-403E-8F09-5D82A4F962BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A1542B-B66C-44FC-8512-2365333B1A3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55515.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55515.json index 5cce717ee8a..a9fbe4a21de 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55515.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55515.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55515", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T20:15:22.887", - "lastModified": "2024-12-18T16:15:15.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:13:40.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,123 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "3694F82E-0BB6-478B-B172-ADFCC42065EE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33BE02D1-DA11-4667-BAE6-576845174487" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "2E07731B-950C-4A1C-88B6-14009D839D96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82FD4752-10DA-46CE-9EC4-C394AA1DABBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "7ADA8A53-1B6A-40C4-A5CB-3FF4817BDD93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E37A21A-A798-4C25-85DB-4E46FE02166A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "E67FFD88-D668-403E-8F09-5D82A4F962BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A1542B-B66C-44FC-8512-2365333B1A3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55516.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55516.json index e9d91a3bb1b..cf7a69e7812 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55516.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55516.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55516", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T20:15:23.020", - "lastModified": "2024-12-18T16:15:15.263", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:13:43.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,123 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2300_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "3694F82E-0BB6-478B-B172-ADFCC42065EE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33BE02D1-DA11-4667-BAE6-576845174487" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2100e_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "2E07731B-950C-4A1C-88B6-14009D839D96" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2100e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82FD4752-10DA-46CE-9EC4-C394AA1DABBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg2200_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "7ADA8A53-1B6A-40C4-A5CB-3FF4817BDD93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg2200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E37A21A-A798-4C25-85DB-4E46FE02166A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:raisecom:msg1200_firmware:3.90:*:*:*:*:*:*:*", + "matchCriteriaId": "E67FFD88-D668-403E-8F09-5D82A4F962BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:raisecom:msg1200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4A1542B-B66C-44FC-8512-2365333B1A3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56144.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56144.json index 4d9dd473d25..c393c556191 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56144.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56144.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56144", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T23:15:07.830", - "lastModified": "2025-01-16T23:15:07.830", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:44:52.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24.12.0", + "matchCriteriaId": "BF0DF156-6901-48D8-939E-EBB10AAA9FB5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/librenms/librenms/security/advisories/GHSA-2f4w-6mc7-4w78", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9036.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9036.json index 2399883c82a..f95816735e0 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9036.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9036.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9036", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-20T16:15:05.393", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:28:24.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -150,26 +150,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:online_book_store_project:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "35AF1C36-51EA-404C-A023-741CD3A6AD1D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Kinsomnia/cve/blob/main/upload/upload.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://itsourcecode.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.278207", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.278207", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.411220", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9771.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9771.json index 845cd099a55..537670cfbb8 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9771.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9771.json @@ -2,16 +2,43 @@ "id": "CVE-2024-9771", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-28T06:15:16.973", - "lastModified": "2025-04-28T06:15:16.973", + "lastModified": "2025-04-28T17:15:47.873", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP-Recall WordPress plugin before 16.26.12 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento WP-Recall para WordPress anterior a la versi\u00f3n 16.26.12 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados como el administrador realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/c33adc08-99c5-42e1-a2e3-e7c3412a6a3f/", diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0627.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0627.json index 9355f8f0661..4c6d7d26f8f 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0627.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0627.json @@ -2,16 +2,43 @@ "id": "CVE-2025-0627", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-28T06:15:17.093", - "lastModified": "2025-04-28T06:15:17.093", + "lastModified": "2025-04-28T17:15:48.050", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress Tag, Category, and Taxonomy Manager WordPress plugin before 3.30.0 does not sanitise and escape some of its Widgets settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento WordPress Tag, Category, and Taxonomy Manager WordPress anterior a la versi\u00f3n 3.30.0 no depura ni escapa de algunas de las configuraciones de sus widgets, lo que podr\u00eda permitir a usuarios con privilegios elevados como el administrador realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/30fbe3c5-f190-48e8-a6bb-e8d78e001e7f/", diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21169.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21169.json index 1c189141a2a..07d4294055d 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21169.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21169.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21169", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T17:16:18.423", - "lastModified": "2025-03-11T17:16:18.423", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:09:02.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,43 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:substance_3d_designer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.1.1", + "matchCriteriaId": "D7ED17B3-C5BF-40CE-A4AA-7D5E1BB888FE" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/substance3d_designer/apsb25-22.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21591.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21591.json index 78ae56e7e4f..62169c2290d 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21591.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21591.json @@ -2,13 +2,13 @@ "id": "CVE-2025-21591", "sourceIdentifier": "sirt@juniper.net", "published": "2025-04-09T20:15:25.363", - "lastModified": "2025-04-11T15:40:10.277", + "lastModified": "2025-04-28T17:15:48.227", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A Buffer Access with Incorrect Length Value vulnerability in the jdhcpd daemon of Juniper Networks Junos OS, when DHCP snooping is enabled, allows an unauthenticated, adjacent, attacker to send a DHCP packet with a malformed DHCP option to cause jdhcp to crash creating a Denial of Service (DoS) condition.\n\nContinuous receipt of these DHCP packets using the malformed DHCP Option will create a sustained Denial of Service (DoS) condition.\n\n\nThis issue affects Junos OS:\n\n\n\n * from 23.1R1 before 23.2R2-S3,\n * from 23.4 before 23.4R2-S3,\n * from 24.2 before 24.2R2.\n\n\nThis issue isn't applicable to any versions of Junos OS before 23.1R1. \n\n\n\nThis issue doesn't affect vSRX Series which doesn't support DHCP Snooping. \n\nThis issue doesn't affect Junos OS Evolved.\n\nThere are no indicators of compromise for this issue." + "value": "A Buffer Access with Incorrect Length Value vulnerability in the jdhcpd daemon of Juniper Networks Junos OS, when DHCP snooping is enabled, allows an unauthenticated, adjacent, attacker to send a DHCP packet with a malformed DHCP option to cause jdhcp to crash creating a Denial of Service (DoS) condition.\n\nContinuous receipt of these DHCP packets using the malformed DHCP Option will create a sustained Denial of Service (DoS) condition.\n\n\nThis issue affects Junos OS:\n\n\n\n * from 23.1 before 23.2R2-S3,\n * from 23.4 before 23.4R2-S3,\n * from 24.2 before 24.2R2.\n\n\nThis issue isn't applicable to any versions of Junos OS before 23.1R1. \n\n\n\nThis issue doesn't affect vSRX Series which doesn't support DHCP Snooping. \n\nThis issue doesn't affect Junos OS Evolved.\n\nThere are no indicators of compromise for this issue." }, { "lang": "es", @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "sirt@juniper.net", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23198.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23198.json index 57f8b3f49bb..b85c22dd9c4 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23198.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23198.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23198", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-16T23:15:08.410", - "lastModified": "2025-01-16T23:15:08.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:44:31.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24.11.0", + "matchCriteriaId": "2AEF7E05-D916-4B7C-ADCF-6BAFAD37551A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/librenms/librenms/security/advisories/GHSA-pm8j-3v64-92cq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24431.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24431.json index 991b48e0040..583091e187d 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24431.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24431.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24431", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:30.277", - "lastModified": "2025-03-11T18:15:30.277", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:48:12.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "4CE8886E-41A3-4051-9445-AA467F4785D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.001.30235", + "matchCriteriaId": "F2D7AB34-FCA3-4BA4-BA0F-CF1550587348" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "44FF55AD-AB58-4C0C-B360-548B2D56A1A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "3CDBE304-E9A0-41A4-AA38-015B14F90299" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "FD3D1C22-BAF2-4249-A295-C63DB076CE3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24448.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24448.json index 0219ae20227..bba90317efa 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24448.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24448.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24448", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:31.543", - "lastModified": "2025-03-11T18:15:31.543", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:49:28.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.7.5", + "matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "29.0", + "versionEndExcluding": "29.3", + "matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24449.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24449.json index 7571a572e95..02e89bcea15 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24449.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24449.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24449", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:31.700", - "lastModified": "2025-03-11T18:15:31.700", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:49:35.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.7.5", + "matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "29.0", + "versionEndExcluding": "29.3", + "matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24452.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24452.json index 4c0c3cb9772..3e2fbfb47e0 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24452.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24452.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24452", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:32.140", - "lastModified": "2025-03-11T18:15:32.140", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:05:00.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.5.3", + "matchCriteriaId": "FEA7F6BC-BB3B-45EE-B1FD-6F59999D06B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0", + "versionEndExcluding": "20.2", + "matchCriteriaId": "99847383-1F78-434C-B425-04DE40E36D99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24453.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24453.json index dfbdf4b0eb0..6b47c9a0ff7 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24453.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24453.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24453", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:32.297", - "lastModified": "2025-03-11T18:15:32.297", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:05:10.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,67 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.5.3", + "matchCriteriaId": "FEA7F6BC-BB3B-45EE-B1FD-6F59999D06B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0", + "versionEndExcluding": "20.2", + "matchCriteriaId": "99847383-1F78-434C-B425-04DE40E36D99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27158.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27158.json index 7a683d36138..07ad5878249 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27158.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27158.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27158", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:33.540", - "lastModified": "2025-03-12T14:15:16.323", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:48:57.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,85 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "4CE8886E-41A3-4051-9445-AA467F4785D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.001.30235", + "matchCriteriaId": "F2D7AB34-FCA3-4BA4-BA0F-CF1550587348" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "44FF55AD-AB58-4C0C-B360-548B2D56A1A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "3CDBE304-E9A0-41A4-AA38-015B14F90299" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "FD3D1C22-BAF2-4249-A295-C63DB076CE3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2135", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27159.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27159.json index fb9ecf6c192..0ce98b44ba8 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27159.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27159.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27159", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:33.687", - "lastModified": "2025-03-11T18:15:33.687", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:48:51.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "4CE8886E-41A3-4051-9445-AA467F4785D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.001.30235", + "matchCriteriaId": "F2D7AB34-FCA3-4BA4-BA0F-CF1550587348" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "44FF55AD-AB58-4C0C-B360-548B2D56A1A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "3CDBE304-E9A0-41A4-AA38-015B14F90299" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "FD3D1C22-BAF2-4249-A295-C63DB076CE3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27160.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27160.json index 48edb69ce33..23af5361e3c 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27160.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27160.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27160", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:33.840", - "lastModified": "2025-03-11T18:15:33.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:48:47.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "4CE8886E-41A3-4051-9445-AA467F4785D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.001.30235", + "matchCriteriaId": "F2D7AB34-FCA3-4BA4-BA0F-CF1550587348" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "44FF55AD-AB58-4C0C-B360-548B2D56A1A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "3CDBE304-E9A0-41A4-AA38-015B14F90299" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "FD3D1C22-BAF2-4249-A295-C63DB076CE3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27161.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27161.json index c5feb5ea5c4..e0d5961c453 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27161.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27161.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27161", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:33.993", - "lastModified": "2025-03-11T18:15:33.993", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:48:42.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "4CE8886E-41A3-4051-9445-AA467F4785D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.001.30235", + "matchCriteriaId": "F2D7AB34-FCA3-4BA4-BA0F-CF1550587348" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "44FF55AD-AB58-4C0C-B360-548B2D56A1A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "3CDBE304-E9A0-41A4-AA38-015B14F90299" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "FD3D1C22-BAF2-4249-A295-C63DB076CE3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27162.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27162.json index 27a5c0db468..a88976013a8 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27162.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27162.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27162", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:34.150", - "lastModified": "2025-03-11T18:15:34.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:48:39.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "4CE8886E-41A3-4051-9445-AA467F4785D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.001.30235", + "matchCriteriaId": "F2D7AB34-FCA3-4BA4-BA0F-CF1550587348" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "44FF55AD-AB58-4C0C-B360-548B2D56A1A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "3CDBE304-E9A0-41A4-AA38-015B14F90299" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "FD3D1C22-BAF2-4249-A295-C63DB076CE3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27163.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27163.json index 1e835fa7399..e98b8870579 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27163.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27163.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27163", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:34.293", - "lastModified": "2025-03-12T14:15:16.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:48:36.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,85 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "4CE8886E-41A3-4051-9445-AA467F4785D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.001.30235", + "matchCriteriaId": "F2D7AB34-FCA3-4BA4-BA0F-CF1550587348" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "44FF55AD-AB58-4C0C-B360-548B2D56A1A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "3CDBE304-E9A0-41A4-AA38-015B14F90299" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "FD3D1C22-BAF2-4249-A295-C63DB076CE3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2134", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27164.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27164.json index edb2184173f..9ae4bfd81ab 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27164.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27164.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27164", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:34.437", - "lastModified": "2025-03-12T14:15:16.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:48:33.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,85 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "4CE8886E-41A3-4051-9445-AA467F4785D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.001.30235", + "matchCriteriaId": "F2D7AB34-FCA3-4BA4-BA0F-CF1550587348" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "44FF55AD-AB58-4C0C-B360-548B2D56A1A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "3CDBE304-E9A0-41A4-AA38-015B14F90299" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "FD3D1C22-BAF2-4249-A295-C63DB076CE3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2136", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27166.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27166.json index cc5849b0143..33acb845af9 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27166.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27166.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27166", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:34.580", - "lastModified": "2025-03-11T18:15:34.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:05:20.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.5.3", + "matchCriteriaId": "FEA7F6BC-BB3B-45EE-B1FD-6F59999D06B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0", + "versionEndExcluding": "20.2", + "matchCriteriaId": "99847383-1F78-434C-B425-04DE40E36D99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27169.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27169.json index 5226d339792..925869b6e69 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27169.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27169.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27169", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:35.077", - "lastModified": "2025-03-11T18:15:35.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:49:39.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.7.5", + "matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "29.0", + "versionEndExcluding": "29.3", + "matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27171.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27171.json index 8b299c070b0..87582551309 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27171.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27171.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27171", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:35.377", - "lastModified": "2025-03-11T18:15:35.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:05:28.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,67 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.5.3", + "matchCriteriaId": "FEA7F6BC-BB3B-45EE-B1FD-6F59999D06B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0", + "versionEndExcluding": "20.2", + "matchCriteriaId": "99847383-1F78-434C-B425-04DE40E36D99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27172.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27172.json index ffd6f3e64af..17a1fc5c10d 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27172.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27172.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27172", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T17:16:44.420", - "lastModified": "2025-03-11T17:16:44.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:09:12.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:substance_3d_designer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.1.1", + "matchCriteriaId": "D7ED17B3-C5BF-40CE-A4AA-7D5E1BB888FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/substance3d_designer/apsb25-22.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27174.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27174.json index 3ff082fc347..483ebf75495 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27174.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27174.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27174", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:35.600", - "lastModified": "2025-03-11T18:15:35.600", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T16:48:26.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "4CE8886E-41A3-4051-9445-AA467F4785D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.001.30235", + "matchCriteriaId": "F2D7AB34-FCA3-4BA4-BA0F-CF1550587348" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "44FF55AD-AB58-4C0C-B360-548B2D56A1A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30763", + "matchCriteriaId": "3CDBE304-E9A0-41A4-AA38-015B14F90299" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.008.20082", + "versionEndExcluding": "25.001.20432", + "matchCriteriaId": "FD3D1C22-BAF2-4249-A295-C63DB076CE3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb25-14.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27175.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27175.json index 674ea94b666..b34bbf29129 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27175.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27175.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27175", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:35.743", - "lastModified": "2025-03-11T18:15:35.743", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:05:35.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.5.3", + "matchCriteriaId": "FEA7F6BC-BB3B-45EE-B1FD-6F59999D06B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "20.0", + "versionEndExcluding": "20.2", + "matchCriteriaId": "99847383-1F78-434C-B425-04DE40E36D99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb25-19.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28072.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28072.json index a22cda6cc6d..d0485019d0f 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28072.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28072.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28072", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-16T21:15:46.883", - "lastModified": "2025-04-17T20:21:48.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-28T17:38:00.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:pre-school_enrollment_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA2ED32-BA35-4D09-A99F-13998D3C19CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/baixiaobi/TST/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30727.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30727.json index 9ba115d7d39..88ee4bfde84 100644 --- a/CVE-2025/CVE-2025-307xx/CVE-2025-30727.json +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30727.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30727", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-04-15T21:16:02.457", - "lastModified": "2025-04-17T18:15:50.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-28T16:39:27.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.14", + "matchCriteriaId": "63FD7F81-3E53-4FB7-8862-0FF52001C7B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32432.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32432.json index b671e3e4d5b..07993496d7c 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32432.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32432.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32432", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-25T15:15:36.440", - "lastModified": "2025-04-25T20:15:39.380", - "vulnStatus": "Received", + "lastModified": "2025-04-28T17:54:19.573", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892." + }, + { + "lang": "es", + "value": "Craft es un CMS flexible e intuitivo para crear experiencias digitales personalizadas en la web y m\u00e1s all\u00e1. Desde la versi\u00f3n 3.0.0-RC1 hasta anteriores a la 3.9.15, desde la 4.0.0-RC1 hasta anteriores a la 4.14.15 y desde la 5.0.0-RC1 hasta anteriores a la 5.6.17, Craft es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo. Este es un vector de ataque de alto impacto y baja complejidad. Este problema se ha corregido en las versiones 3.9.15, 4.14.15 y 5.6.17, y constituye una correcci\u00f3n adicional para CVE-2023-41892." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3827.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3827.json index 06f3ecfa7f1..416122b620b 100644 --- a/CVE-2025/CVE-2025-38xx/CVE-2025-3827.json +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3827.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3827", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-20T15:15:44.993", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:38:47.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:men_salon_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "06009EBA-F4B6-4CC8-8366-72B4A1552FA3" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/NuoNuo-L/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.305734", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.305734", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.555928", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3828.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3828.json index e6867bc1039..c4ec4313a69 100644 --- a/CVE-2025/CVE-2025-38xx/CVE-2025-3828.json +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3828.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3828", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-20T16:15:14.057", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:38:37.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:men_salon_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "06009EBA-F4B6-4CC8-8366-72B4A1552FA3" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/NuoNuo-L/cve/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.305735", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.305735", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.555929", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-38xx/CVE-2025-3829.json b/CVE-2025/CVE-2025-38xx/CVE-2025-3829.json index 05ffe6a32b5..5fc7ffc6fbc 100644 --- a/CVE-2025/CVE-2025-38xx/CVE-2025-3829.json +++ b/CVE-2025/CVE-2025-38xx/CVE-2025-3829.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3829", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-20T16:15:14.230", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T17:38:28.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:men_salon_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "06009EBA-F4B6-4CC8-8366-72B4A1552FA3" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/NuoNuo-L/cve/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.305736", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.305736", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.555930", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3959.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3959.json index 94d18427715..234820452af 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3959.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3959.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3959", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T05:15:14.913", - "lastModified": "2025-04-27T05:15:14.913", + "lastModified": "2025-04-28T16:15:31.360", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in withstars Books-Management-System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /reader_delete.html. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en withstars Books-Management-System 1.0. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /reader_delete.html. La manipulaci\u00f3n provoca Cross-Site Request Forgery. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -143,6 +147,10 @@ { "url": "https://vuldb.com/?submit.557147", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/CSRF.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3964.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3964.json index bb0dc6d782f..6757945cb26 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3964.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3964.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3964", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T09:15:15.540", - "lastModified": "2025-04-27T09:15:15.540", + "lastModified": "2025-04-28T16:15:31.693", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in withstars Books-Management-System 1.0. Affected is an unknown function of the file /api/article/del of the component Article Handler. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en withstars Books-Management-System 1.0. La vulnerabilidad afecta a una funci\u00f3n desconocida del archivo /api/article/del del componente Article Handler. Esta manipulaci\u00f3n provoca Cross-site request forgery. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -143,6 +147,10 @@ { "url": "https://vuldb.com/?submit.557239", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/CSRF.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3965.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3965.json index 0d5a844f589..3ffa44572b6 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3965.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3965.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3965", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T10:15:14.627", - "lastModified": "2025-04-27T10:15:14.627", + "lastModified": "2025-04-28T16:15:32.013", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in itwanger paicoding 1.0.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /article/app/post. The manipulation of the argument content leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en itwanger paicing 1.0.3, clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /article/app/post. La manipulaci\u00f3n del contenido del argumento provoca ataques de cross site scripting. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,14 @@ { "url": "https://vuldb.com/?submit.557249", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/uglory-gll/javasec/blob/main/paicoding.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/uglory-gll/javasec/blob/main/paicoding.md#1stored-cross-site-scripting", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4026.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4026.json new file mode 100644 index 00000000000..47fd5e24b79 --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4026.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-4026", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-28T16:15:35.950", + "lastModified": "2025-04-28T16:15:35.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This issue affects some unknown processing of the file /profile.php. The manipulation of the argument adminname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/changan520374/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306389", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306389", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.558628", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/changan520374/cve/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4027.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4027.json new file mode 100644 index 00000000000..a47f158d6b4 --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4027.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4027", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-28T16:15:36.470", + "lastModified": "2025-04-28T16:15:36.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Old Age Home Management System 1.0. Affected is an unknown function of the file /admin/rules.php. The manipulation of the argument pagetitle leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Q3qc1n/myCVE/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306390", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306390", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.559159", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4028.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4028.json new file mode 100644 index 00000000000..b8a11637258 --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4028.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4028", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-28T17:15:50.833", + "lastModified": "2025-04-28T17:15:50.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in PHPGurukul COVID19 Testing Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /profile.php. The manipulation of the argument mobilenumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/JunZ-Leo/CVE/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306391", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306391", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.559193", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4029.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4029.json new file mode 100644 index 00000000000..07b5d86b66b --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4029.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4029", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-28T17:15:51.047", + "lastModified": "2025-04-28T17:15:51.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Personal Diary Management System 1.0 and classified as critical. Affected by this issue is the function addrecord of the component New Record Handler. The manipulation of the argument filename leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 4.3, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zzzxc643/cve/blob/main/Diary%20Management%20System%20Stack%20Buffer%20Overflow.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306392", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306392", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.559198", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-438xx/CVE-2025-43854.json b/CVE-2025/CVE-2025-438xx/CVE-2025-43854.json new file mode 100644 index 00000000000..c11e1d0676b --- /dev/null +++ b/CVE-2025/CVE-2025-438xx/CVE-2025-43854.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-43854", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-28T16:15:33.043", + "lastModified": "2025-04-28T16:15:33.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DIFY is an open-source LLM app development platform. Prior to version 1.3.0, a clickjacking vulnerability was found in the default setup of the DIFY application, allowing malicious actors to trick users into clicking on elements of the web page without their knowledge or consent. This can lead to unauthorized actions being performed, potentially compromising the security and privacy of users. This issue has been fixed in version 1.3.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/langgenius/dify/pull/18516", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/langgenius/dify/security/advisories/GHSA-jhgq-cx3f-vj5p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-438xx/CVE-2025-43857.json b/CVE-2025/CVE-2025-438xx/CVE-2025-43857.json new file mode 100644 index 00000000000..aadd1c8836f --- /dev/null +++ b/CVE-2025/CVE-2025-438xx/CVE-2025-43857.json @@ -0,0 +1,110 @@ +{ + "id": "CVE-2025-43857", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-28T16:15:33.440", + "lastModified": "2025-04-28T16:15:33.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Prior to versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5, there is a possibility for denial of service by memory exhaustion when net-imap reads server responses. At any time while the client is connected, a malicious server can send can send a \"literal\" byte count, which is automatically read by the client's receiver thread. The response reader immediately allocates memory for the number of bytes indicated by the server response. This should not be an issue when securely connecting to trusted IMAP servers that are well-behaved. It can affect insecure connections and buggy, untrusted, or compromised servers (for example, connecting to a user supplied hostname). This issue has been patched in versions 0.5.7, 0.4.20, 0.3.9, and 0.2.5." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-405" + }, + { + "lang": "en", + "value": "CWE-770" + }, + { + "lang": "en", + "value": "CWE-789" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ruby/net-imap/pull/442", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ruby/net-imap/pull/444/commits/0ae8576c1a90bcd9573f81bdad4b4b824642d105#diff-53721cb4d9c3fb86b95cc8476ca2df90968ad8c481645220c607034399151462", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ruby/net-imap/pull/445", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ruby/net-imap/pull/446", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ruby/net-imap/pull/447", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ruby/net-imap/security/advisories/GHSA-j3g3-5qv5-52mj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46614.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46614.json new file mode 100644 index 00000000000..b554effae8a --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46614.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-46614", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-28T16:15:35.083", + "lastModified": "2025-04-28T16:15:35.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Snowflake ODBC Driver before 3.7.0, in certain code paths, the Driver logged the whole SQL query at the INFO level, aka Insertion of Sensitive Information into a Log File." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://community.snowflake.com/s/article/Snowflake-Connector-for-ODBC-Security-Advisory-CVE-2025-46614", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46657.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46657.json index 45bb4c167d6..e3ccfe403dd 100644 --- a/CVE-2025/CVE-2025-466xx/CVE-2025-46657.json +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46657.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46657", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-27T16:15:15.613", - "lastModified": "2025-04-27T17:15:16.193", + "lastModified": "2025-04-28T17:15:49.390", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Karaz Karazal through 2025-04-14 allows reflected XSS via the lang parameter to the default URI." + }, + { + "lang": "es", + "value": "Karaz Karazal hasta el 14/04/2025 permite XSS reflejado a trav\u00e9s del par\u00e1metro lang a la URI predeterminada." } ], "metrics": { @@ -51,6 +55,10 @@ { "url": "https://github.com/nov-1337/CVE-2025-46657/blob/main/CVE-2025-46657.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/nov-1337/CVE-2025-46657/blob/main/CVE-2025-46657.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46674.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46674.json index a5add6744e1..3ee6fafecd3 100644 --- a/CVE-2025/CVE-2025-466xx/CVE-2025-46674.json +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46674.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46674", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-27T01:15:44.623", - "lastModified": "2025-04-27T01:15:44.623", + "lastModified": "2025-04-28T17:15:49.617", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NASA CryptoLib before 1.3.2 uses Extended Procedures that are a Work in Progress (not intended for use during flight), potentially leading to a keystream oracle." + }, + { + "lang": "es", + "value": "NASA CryptoLib anterior a 1.3.2 utiliza procedimientos extendidos que son un trabajo en progreso (no est\u00e1n pensados para usarse durante el vuelo), lo que potencialmente conduce a un or\u00e1culo de flujo de claves." } ], "metrics": { @@ -59,6 +63,10 @@ { "url": "https://securitybynature.fr/post/hacking-cryptolib/", "source": "cve@mitre.org" + }, + { + "url": "https://securitybynature.fr/post/hacking-cryptolib/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46675.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46675.json index ea11c8487a3..6229c87d587 100644 --- a/CVE-2025/CVE-2025-466xx/CVE-2025-46675.json +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46675.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46675", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-27T01:15:44.773", - "lastModified": "2025-04-27T01:15:44.773", + "lastModified": "2025-04-28T17:15:49.753", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In NASA CryptoLib before 1.3.2, the key state is not checked before use, potentially leading to spacecraft hijacking." + }, + { + "lang": "es", + "value": "En NASA CryptoLib anterior a 1.3.2, el estado de la clave no se verifica antes del uso, lo que potencialmente puede conducir al secuestro de spacecraft." } ], "metrics": { @@ -63,6 +67,10 @@ { "url": "https://securitybynature.fr/post/hacking-cryptolib/", "source": "cve@mitre.org" + }, + { + "url": "https://securitybynature.fr/post/hacking-cryptolib/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46688.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46688.json index 7de1b11d40e..26025681259 100644 --- a/CVE-2025/CVE-2025-466xx/CVE-2025-46688.json +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46688.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46688", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-27T20:15:15.877", - "lastModified": "2025-04-27T20:15:15.877", + "lastModified": "2025-04-28T17:15:50.027", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "quickjs-ng through 0.9.0 has an incorrect size calculation in JS_ReadBigInt for a BigInt, leading to a heap-based buffer overflow. QuickJS before 2025-04-26 is also affected." + }, + { + "lang": "es", + "value": "Las versiones quickjs-ng hasta la 0.9.0 tienen un c\u00e1lculo de tama\u00f1o incorrecto en JS_ReadBigInt para un BigInt, lo que provoca un desbordamiento de b\u00fafer basado en el mont\u00f3n. Las versiones QuickJS anteriores al 26/04/2025 tambi\u00e9n se ven afectadas." } ], "metrics": { @@ -71,6 +75,10 @@ { "url": "https://github.com/quickjs-ng/quickjs/pull/1020", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/quickjs-ng/quickjs/issues/1018", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46689.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46689.json index 2d7608320e7..a54776b668c 100644 --- a/CVE-2025/CVE-2025-466xx/CVE-2025-46689.json +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46689.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46689", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-27T22:15:15.217", - "lastModified": "2025-04-27T22:15:15.217", + "lastModified": "2025-04-28T17:15:50.193", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ververica Platform 2.14.0 contain an Reflected XSS vulnerability via a namespaces/default/formats URI." + }, + { + "lang": "es", + "value": "Ververica Platform 2.14.0 contiene una vulnerabilidad XSS reflejado a trav\u00e9s de un URI de espacios de nombres/formatos predeterminados." } ], "metrics": { @@ -59,6 +63,10 @@ { "url": "https://www.ververica.com/", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/gozan10/cve/issues/17", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46690.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46690.json index 869c76ee45b..f31130b95ef 100644 --- a/CVE-2025/CVE-2025-466xx/CVE-2025-46690.json +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46690.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46690", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-27T22:15:15.360", - "lastModified": "2025-04-27T22:15:15.360", + "lastModified": "2025-04-28T17:15:50.363", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ververica Platform 2.14.0 allows low-privileged users to access SQL connectors via a direct namespaces/default/formats request." + }, + { + "lang": "es", + "value": "Ververica Platform 2.14.0 permite que usuarios con bajos privilegios accedan a conectores SQL a trav\u00e9s de una solicitud directa de espacios de nombres/predeterminados/formatos." } ], "metrics": { @@ -59,6 +63,10 @@ { "url": "https://www.ververica.com", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/gozan10/cve/issues/18", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 11cf75a0875..56fed07d403 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-28T16:00:20.643077+00:00 +2025-04-28T18:00:20.026629+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-28T15:37:34.230000+00:00 +2025-04-28T17:58:01.843000+00:00 ``` ### Last Data Feed Release @@ -33,53 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -291596 +291611 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `15` -- [CVE-2015-2079](CVE-2015/CVE-2015-20xx/CVE-2015-2079.json) (`2025-04-28T15:15:44.007`) -- [CVE-2025-23375](CVE-2025/CVE-2025-233xx/CVE-2025-23375.json) (`2025-04-28T15:15:45.157`) -- [CVE-2025-23376](CVE-2025/CVE-2025-233xx/CVE-2025-23376.json) (`2025-04-28T15:15:45.303`) -- [CVE-2025-23377](CVE-2025/CVE-2025-233xx/CVE-2025-23377.json) (`2025-04-28T15:15:45.437`) -- [CVE-2025-25776](CVE-2025/CVE-2025-257xx/CVE-2025-25776.json) (`2025-04-28T15:15:45.587`) -- [CVE-2025-4022](CVE-2025/CVE-2025-40xx/CVE-2025-4022.json) (`2025-04-28T14:15:22.867`) -- [CVE-2025-4023](CVE-2025/CVE-2025-40xx/CVE-2025-4023.json) (`2025-04-28T14:15:23.043`) -- [CVE-2025-4024](CVE-2025/CVE-2025-40xx/CVE-2025-4024.json) (`2025-04-28T15:15:47.600`) -- [CVE-2025-4025](CVE-2025/CVE-2025-40xx/CVE-2025-4025.json) (`2025-04-28T15:15:47.767`) +- [CVE-2015-4582](CVE-2015/CVE-2015-45xx/CVE-2015-4582.json) (`2025-04-28T16:15:22.193`) +- [CVE-2022-41871](CVE-2022/CVE-2022-418xx/CVE-2022-41871.json) (`2025-04-28T16:15:24.853`) +- [CVE-2023-35814](CVE-2023/CVE-2023-358xx/CVE-2023-35814.json) (`2025-04-28T16:15:25.357`) +- [CVE-2023-35815](CVE-2023/CVE-2023-358xx/CVE-2023-35815.json) (`2025-04-28T16:15:25.903`) +- [CVE-2023-35816](CVE-2023/CVE-2023-358xx/CVE-2023-35816.json) (`2025-04-28T16:15:26.300`) +- [CVE-2023-35817](CVE-2023/CVE-2023-358xx/CVE-2023-35817.json) (`2025-04-28T16:15:26.753`) +- [CVE-2023-42404](CVE-2023/CVE-2023-424xx/CVE-2023-42404.json) (`2025-04-28T17:15:46.807`) +- [CVE-2024-32499](CVE-2024/CVE-2024-324xx/CVE-2024-32499.json) (`2025-04-28T17:15:47.073`) +- [CVE-2025-4026](CVE-2025/CVE-2025-40xx/CVE-2025-4026.json) (`2025-04-28T16:15:35.950`) +- [CVE-2025-4027](CVE-2025/CVE-2025-40xx/CVE-2025-4027.json) (`2025-04-28T16:15:36.470`) +- [CVE-2025-4028](CVE-2025/CVE-2025-40xx/CVE-2025-4028.json) (`2025-04-28T17:15:50.833`) +- [CVE-2025-4029](CVE-2025/CVE-2025-40xx/CVE-2025-4029.json) (`2025-04-28T17:15:51.047`) +- [CVE-2025-43854](CVE-2025/CVE-2025-438xx/CVE-2025-43854.json) (`2025-04-28T16:15:33.043`) +- [CVE-2025-43857](CVE-2025/CVE-2025-438xx/CVE-2025-43857.json) (`2025-04-28T16:15:33.440`) +- [CVE-2025-46614](CVE-2025/CVE-2025-466xx/CVE-2025-46614.json) (`2025-04-28T16:15:35.083`) ### CVEs modified in the last Commit -Recently modified CVEs: `48` +Recently modified CVEs: `87` -- [CVE-2024-44574](CVE-2024/CVE-2024-445xx/CVE-2024-44574.json) (`2025-04-28T15:16:15.657`) -- [CVE-2024-44575](CVE-2024/CVE-2024-445xx/CVE-2024-44575.json) (`2025-04-28T15:14:44.490`) -- [CVE-2024-44577](CVE-2024/CVE-2024-445xx/CVE-2024-44577.json) (`2025-04-28T15:13:42.720`) -- [CVE-2024-8372](CVE-2024/CVE-2024-83xx/CVE-2024-8372.json) (`2025-04-28T14:15:20.107`) -- [CVE-2025-3960](CVE-2025/CVE-2025-39xx/CVE-2025-3960.json) (`2025-04-28T15:15:45.817`) -- [CVE-2025-3961](CVE-2025/CVE-2025-39xx/CVE-2025-3961.json) (`2025-04-28T15:15:45.943`) -- [CVE-2025-3962](CVE-2025/CVE-2025-39xx/CVE-2025-3962.json) (`2025-04-28T15:15:46.060`) -- [CVE-2025-3963](CVE-2025/CVE-2025-39xx/CVE-2025-3963.json) (`2025-04-28T15:15:46.180`) -- [CVE-2025-3966](CVE-2025/CVE-2025-39xx/CVE-2025-3966.json) (`2025-04-28T15:15:46.290`) -- [CVE-2025-3967](CVE-2025/CVE-2025-39xx/CVE-2025-3967.json) (`2025-04-28T15:15:46.410`) -- [CVE-2025-3968](CVE-2025/CVE-2025-39xx/CVE-2025-3968.json) (`2025-04-28T15:15:46.527`) -- [CVE-2025-39735](CVE-2025/CVE-2025-397xx/CVE-2025-39735.json) (`2025-04-28T14:37:34.487`) -- [CVE-2025-3975](CVE-2025/CVE-2025-39xx/CVE-2025-3975.json) (`2025-04-28T15:15:46.760`) -- [CVE-2025-39755](CVE-2025/CVE-2025-397xx/CVE-2025-39755.json) (`2025-04-28T15:32:46.553`) -- [CVE-2025-3977](CVE-2025/CVE-2025-39xx/CVE-2025-3977.json) (`2025-04-28T14:15:21.520`) -- [CVE-2025-39778](CVE-2025/CVE-2025-397xx/CVE-2025-39778.json) (`2025-04-28T15:37:34.230`) -- [CVE-2025-3978](CVE-2025/CVE-2025-39xx/CVE-2025-3978.json) (`2025-04-28T14:15:21.640`) -- [CVE-2025-3979](CVE-2025/CVE-2025-39xx/CVE-2025-3979.json) (`2025-04-28T14:15:21.767`) -- [CVE-2025-3980](CVE-2025/CVE-2025-39xx/CVE-2025-3980.json) (`2025-04-28T14:15:21.890`) -- [CVE-2025-3981](CVE-2025/CVE-2025-39xx/CVE-2025-3981.json) (`2025-04-28T14:15:22.013`) -- [CVE-2025-43919](CVE-2025/CVE-2025-439xx/CVE-2025-43919.json) (`2025-04-28T14:15:22.137`) -- [CVE-2025-43920](CVE-2025/CVE-2025-439xx/CVE-2025-43920.json) (`2025-04-28T14:15:22.323`) -- [CVE-2025-43921](CVE-2025/CVE-2025-439xx/CVE-2025-43921.json) (`2025-04-28T14:15:22.477`) -- [CVE-2025-46333](CVE-2025/CVE-2025-463xx/CVE-2025-46333.json) (`2025-04-28T15:15:47.057`) -- [CVE-2025-46661](CVE-2025/CVE-2025-466xx/CVE-2025-46661.json) (`2025-04-28T14:15:22.637`) +- [CVE-2025-27161](CVE-2025/CVE-2025-271xx/CVE-2025-27161.json) (`2025-04-28T16:48:42.960`) +- [CVE-2025-27162](CVE-2025/CVE-2025-271xx/CVE-2025-27162.json) (`2025-04-28T16:48:39.727`) +- [CVE-2025-27163](CVE-2025/CVE-2025-271xx/CVE-2025-27163.json) (`2025-04-28T16:48:36.780`) +- [CVE-2025-27164](CVE-2025/CVE-2025-271xx/CVE-2025-27164.json) (`2025-04-28T16:48:33.017`) +- [CVE-2025-27166](CVE-2025/CVE-2025-271xx/CVE-2025-27166.json) (`2025-04-28T17:05:20.700`) +- [CVE-2025-27169](CVE-2025/CVE-2025-271xx/CVE-2025-27169.json) (`2025-04-28T16:49:39.847`) +- [CVE-2025-27171](CVE-2025/CVE-2025-271xx/CVE-2025-27171.json) (`2025-04-28T17:05:28.047`) +- [CVE-2025-27172](CVE-2025/CVE-2025-271xx/CVE-2025-27172.json) (`2025-04-28T17:09:12.360`) +- [CVE-2025-27174](CVE-2025/CVE-2025-271xx/CVE-2025-27174.json) (`2025-04-28T16:48:26.390`) +- [CVE-2025-27175](CVE-2025/CVE-2025-271xx/CVE-2025-27175.json) (`2025-04-28T17:05:35.883`) +- [CVE-2025-28072](CVE-2025/CVE-2025-280xx/CVE-2025-28072.json) (`2025-04-28T17:38:00.493`) +- [CVE-2025-30727](CVE-2025/CVE-2025-307xx/CVE-2025-30727.json) (`2025-04-28T16:39:27.290`) +- [CVE-2025-32432](CVE-2025/CVE-2025-324xx/CVE-2025-32432.json) (`2025-04-28T17:54:19.573`) +- [CVE-2025-3827](CVE-2025/CVE-2025-38xx/CVE-2025-3827.json) (`2025-04-28T17:38:47.400`) +- [CVE-2025-3828](CVE-2025/CVE-2025-38xx/CVE-2025-3828.json) (`2025-04-28T17:38:37.743`) +- [CVE-2025-3829](CVE-2025/CVE-2025-38xx/CVE-2025-3829.json) (`2025-04-28T17:38:28.507`) +- [CVE-2025-3959](CVE-2025/CVE-2025-39xx/CVE-2025-3959.json) (`2025-04-28T16:15:31.360`) +- [CVE-2025-3964](CVE-2025/CVE-2025-39xx/CVE-2025-3964.json) (`2025-04-28T16:15:31.693`) +- [CVE-2025-3965](CVE-2025/CVE-2025-39xx/CVE-2025-3965.json) (`2025-04-28T16:15:32.013`) +- [CVE-2025-46657](CVE-2025/CVE-2025-466xx/CVE-2025-46657.json) (`2025-04-28T17:15:49.390`) +- [CVE-2025-46674](CVE-2025/CVE-2025-466xx/CVE-2025-46674.json) (`2025-04-28T17:15:49.617`) +- [CVE-2025-46675](CVE-2025/CVE-2025-466xx/CVE-2025-46675.json) (`2025-04-28T17:15:49.753`) +- [CVE-2025-46688](CVE-2025/CVE-2025-466xx/CVE-2025-46688.json) (`2025-04-28T17:15:50.027`) +- [CVE-2025-46689](CVE-2025/CVE-2025-466xx/CVE-2025-46689.json) (`2025-04-28T17:15:50.193`) +- [CVE-2025-46690](CVE-2025/CVE-2025-466xx/CVE-2025-46690.json) (`2025-04-28T17:15:50.363`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 17d8ab0781b..21c95de7b78 100644 --- a/_state.csv +++ b/_state.csv @@ -75559,7 +75559,7 @@ CVE-2015-2075,0,0,e2b9cfdccf5716685cc1e4d8cc1bc3a54797e772b0a1447d55a8f318c3576a CVE-2015-2076,0,0,3d8b112a5706df5d84310bb9b8ed104e56569c2923fa69b716ed38a355a69b2a,2025-04-12T10:46:40.837000 CVE-2015-2077,0,0,4411d36c64e75264ae4b5cd885f8ca45fd6474dc1e2b6cd680bb1a19f78a7f18,2025-04-12T10:46:40.837000 CVE-2015-2078,0,0,2611ed6e45a1c171159eb27c59a79256a622d5f057d44ff7975c92201c58de46,2025-04-12T10:46:40.837000 -CVE-2015-2079,1,1,f2f765cafa57b5c53cfac166351fda648b78b5622810f6e5e02e217e7c1564e0,2025-04-28T15:15:44.007000 +CVE-2015-2079,0,0,f2f765cafa57b5c53cfac166351fda648b78b5622810f6e5e02e217e7c1564e0,2025-04-28T15:15:44.007000 CVE-2015-2080,0,0,1269de43ed4c4370565793a28753d3e81328a5b9b90e6133a8ceb967b3d23093,2025-04-12T10:46:40.837000 CVE-2015-2081,0,0,dbf23d9a94c6e7e32fefef8d65be0a4a8bd93470966a94df1e50b94d9db43619,2024-11-21T02:26:43.660000 CVE-2015-2082,0,0,7f5418dc360570b72eb84eefc32bc34eba854d22b1b5f25bc2ee784686888094,2025-04-12T10:46:40.837000 @@ -77628,6 +77628,7 @@ CVE-2015-4555,0,0,6c961893ad2fd79c6ce914a7fd8ed82d84c046ed63a3f2aef9a41bdd0fd965 CVE-2015-4556,0,0,b79e4292b2fbdb42c7bc033aa91ce8c9e823af1624a95e342d15df80af26d76c,2025-04-20T01:37:25.860000 CVE-2015-4557,0,0,4601f5a15eb68e78f43184de08c64170741d918d70a7b68ff68093a2e4b6d688,2024-11-21T02:31:20.430000 CVE-2015-4559,0,0,f3edc192ff9b8650eb0cf261a0f265de64ec6f5974825422938eb22fee3874b9,2025-04-12T10:46:40.837000 +CVE-2015-4582,1,1,ab6587aebeab366c4e37e031d0844bab0871a55e5e88cf8b8d2ef8372d84e882,2025-04-28T16:15:22.193000 CVE-2015-4586,0,0,079126cba1bba4192316d379440222ad99c1fef9938ba6fec667c6c503929688,2025-04-12T10:46:40.837000 CVE-2015-4587,0,0,a29b64bf253c2c1c30b97888840734ba2698ef915103005c82c68042ee255016,2025-04-12T10:46:40.837000 CVE-2015-4588,0,0,1407c6b9b3a97a935bdb8c859b4483e300c50110f6e823d2906e0193f280f842,2025-04-12T10:46:40.837000 @@ -115523,7 +115524,7 @@ CVE-2018-14839,0,0,95a9a4d71c2e369b2116f1a57b4093b0f5c22fdcdb11174fa8b2aaa586284 CVE-2018-1484,0,0,c765fd6dc0b84f8226c0d591b46daf84293bcf20030995b976a75292e1681650,2024-11-21T03:59:54.593000 CVE-2018-14840,0,0,dc7c002c43161593cc84e015fae338d80bcde28eb11780694796c8b149559be0,2024-11-21T03:49:54.433000 CVE-2018-14846,0,0,bd59f5da06a462d833c436b679f02146dbfca818a82a7d777ec428c3a2af8cb0,2024-11-21T03:49:54.577000 -CVE-2018-14847,0,0,2b1d8dc3638df5985fa12d1cbe584bb8d4da414c50027384b1cb7977e30a8ce4,2025-03-14T20:06:59.320000 +CVE-2018-14847,0,1,079eecad7e692f6fd1e3e8864de3f14de8ea30997930ab31d82ad78a31ace588,2025-04-28T17:15:45.983000 CVE-2018-14849,0,0,1e9740acfcc9049918502bf42641ec9cd378c0af3a5bef3927544d5f91a76a08,2024-11-21T03:49:54.933000 CVE-2018-1485,0,0,392b2e10a905618465cd90fbeaab40c9f160487dc79710b15b77216674d9d6ec,2024-11-21T03:59:54.713000 CVE-2018-14850,0,0,a561a9d513c85992a7e19a1750d957556158a439abf07164f47afc33d051b901,2024-11-21T03:49:55.087000 @@ -193428,7 +193429,7 @@ CVE-2022-23737,0,0,00bd5b8e77776c824d9367fe4e3bd6f356e3bcbf490141f8b74768cefd021 CVE-2022-23738,0,0,0eaa47d3d4006afa09ec7cb704b1f8468722477b8e76ecdafe6acdf69b5eb977,2024-11-21T06:49:12.737000 CVE-2022-23739,0,0,f6dd41fc9b18ff225249e63ed3de75d4f78a2a0eabee0e65e248c438d071d051,2025-04-08T21:15:44.423000 CVE-2022-2374,0,0,e8aea41fb4969ca1ce97b6b67b3414e0f25ada9e4b58edf35238b03b9dccf668,2024-11-21T07:00:51.853000 -CVE-2022-23740,0,1,3e1be9444a6173f399b977ddfb22aac75d5bb2d7c58fa44294560eefe333620e,2025-04-28T15:15:44.577000 +CVE-2022-23740,0,0,3e1be9444a6173f399b977ddfb22aac75d5bb2d7c58fa44294560eefe333620e,2025-04-28T15:15:44.577000 CVE-2022-23741,0,0,3a64d91448bd62035134cb767623d94872c48ddd1ec46258ed91d43ab47820cc,2025-04-22T16:15:21.053000 CVE-2022-23742,0,0,7dea878edb5ad2cbdb3abc4beeb51490a987e35f3a4f8363cd49f2a2e7c043a1,2024-11-21T06:49:13.227000 CVE-2022-23743,0,0,a7454e6467ca11378287d0671c5f75d14fde2b38947403f7a5ca829d4c6db62b,2024-11-21T06:49:13.347000 @@ -198902,7 +198903,7 @@ CVE-2022-30350,0,0,ed751e923b3a96b34458dd692170c32a2938b32156000ce1598a6632e8c93 CVE-2022-30351,0,0,5562f9d8bb5d06114ca89c7fc11c9afd5a6fcef419f83e04d24207243be119e0,2025-02-18T17:15:13.697000 CVE-2022-30352,0,0,055c949f41fd222c433fa54cc2ef07c2c9049caccea54f17b2936ea350d57e9c,2024-11-21T07:02:37.960000 CVE-2022-30354,0,0,ef8af1f2e6fa82371085c98a0bd2fa422d6d879a5a7bc493bf7cf9783a1fa28e,2025-04-23T00:42:41.640000 -CVE-2022-30355,0,0,4a5097540ab342bcfa34cda6383fc784f096294862ccdd3d9b4822d89b9d257f,2024-10-28T13:58:09.230000 +CVE-2022-30355,0,1,304b3f74c779949841da094d28d2de623a114a4bb4a1f8f54db4d2b430172f6b,2025-04-28T17:31:54.757000 CVE-2022-30356,0,0,f3cac2ccc78041050f2c4c6b12dc2f78e61bbdf31f04232b268c6b756d29a853,2024-10-31T16:31:46.453000 CVE-2022-30357,0,0,822895cbf7c9a76d477205c016cca820b2591ff3ab9c8e321d8e26dd5a92e8a6,2024-10-31T16:43:03.233000 CVE-2022-30358,0,0,bf15ffba67ec244b54746ae0721564f2c6ee6eb5534307547ead47e3a8d33300,2024-10-31T16:41:38.260000 @@ -205235,7 +205236,7 @@ CVE-2022-38235,0,0,8e0de8d1ff0f731c595504cbe5369e48f941976886886c832763469d55f14 CVE-2022-38236,0,0,3698a7c22d2431b34141e451cf6352439ef0b6be8de211e532078b81c095558f,2024-11-21T07:16:06.643000 CVE-2022-38237,0,0,a87878387b6fab2536e3c2ef8595b523d84fc35b292f346b9d48987b62f25d0e,2024-11-21T07:16:06.793000 CVE-2022-38238,0,0,b1267ebf509428973a4543681c3773ef57d8e9c0f7f226389a4c754c6c231adb,2024-11-21T07:16:06.947000 -CVE-2022-3824,0,0,7018fe4a8fedaf09442e0ba13eb5217468551a09bce3aee18e71688681523156,2024-11-21T07:20:18.610000 +CVE-2022-3824,0,1,687f7fa63cb7e2364401603dfffba18815521a5943f7cdb5233d04ab1f787911,2025-04-28T16:15:24.223000 CVE-2022-38247,0,0,45d6022d50bcd5c15b20983df68e47c169da74806e2d1dc839036dff61d79492,2024-11-21T07:16:07.100000 CVE-2022-38248,0,0,d41722f3ceb54334e2be91605c630b3a1e9754a185a743d91a0867e77250d7c0,2024-11-21T07:16:07.260000 CVE-2022-38249,0,0,3c2b56474e97a7f78bb157b3b36625e4dee0abc24fe958c80137ccc878ab8e7c,2024-11-21T07:16:07.410000 @@ -208018,6 +208019,7 @@ CVE-2022-41861,0,0,f26fc4345b5f2eef6289ad03013929482c71d438698ac65843ec30eeb52d8 CVE-2022-41862,0,0,633374c67de8091bcfa8e65804245b201c56a3afc976b6ddcd0d53ff35e31a6f,2025-03-07T16:15:36.247000 CVE-2022-4187,0,0,e07ff2c680264b39f8304a67b31ab85571a20d9802709eb78e554465cbbda2a0,2024-11-21T07:34:44.633000 CVE-2022-41870,0,0,0359af018803abae1e719ca40ce52fd39492de1cdf4c043253ee40f777e07cf6,2024-11-21T07:23:57.623000 +CVE-2022-41871,1,1,04e256d8f2abefd9e5bed1481822ff849164ccbc68f88f7a837febe5abfca1d9,2025-04-28T16:15:24.853000 CVE-2022-41873,0,0,1808ee17495cd610ebb46b0977d8f3ec7adc8a8e787e131a9c938fd3beb32bfb,2024-11-21T07:23:57.780000 CVE-2022-41874,0,0,57b9cd581fcdddf20e8a3d0488647b5d8cfb7c7cf80d4fb3cb87cd76de79c9cf,2024-11-21T07:23:57.910000 CVE-2022-41875,0,0,ebcf129a6cadf1522fa6bee87dd04e7a170c31325fa90fefb2ae1059b5cb9172,2024-11-21T07:23:58.033000 @@ -210608,7 +210610,7 @@ CVE-2022-45419,0,0,e5e80247049cf7154de037d9e58ef6fb0998b7ad2c529e1ca7b6c319fab16 CVE-2022-4542,0,0,1e8daab49fb467c0edc9286efcd4cbc9b024e0d6f613c2ff20ca5238d9ed329d,2025-04-03T20:15:18.443000 CVE-2022-45420,0,0,f1eff6696caa2e5ae623f262112221f1b06b603256e633ff4d1368d68d1794ee,2025-04-15T15:16:03.193000 CVE-2022-45421,0,0,5454303fe1616edea179c1a907dc0b9588624264b8c1c40f842ce8b70dbbd8e0,2025-04-15T15:16:03.357000 -CVE-2022-45422,0,1,cbaa4e97ba94b306f8ff8fba0c5d4711702ae46e5916b688dbd38829f7250a40,2025-04-28T15:15:44.910000 +CVE-2022-45422,0,0,cbaa4e97ba94b306f8ff8fba0c5d4711702ae46e5916b688dbd38829f7250a40,2025-04-28T15:15:44.910000 CVE-2022-45423,0,0,1f033df1fc4960b99357cb040b9af81355eeabbedd198749f65aa65f3ad0d51f,2025-04-14T13:15:15.970000 CVE-2022-45424,0,0,2c9d05b22d8c4b9c1e6d273139d88262e63599a434074936adacad9cb44fafe0,2025-04-14T14:15:20.313000 CVE-2022-45425,0,0,520990494cde392487585b2b2277647d9ae6ee50312a99a0315937862c6404ea,2025-04-14T14:15:20.493000 @@ -228615,6 +228617,10 @@ CVE-2023-35810,0,0,361239d5d2834bc152b6761c1f49264108b6522939633c81dc1d6c91d8978 CVE-2023-35811,0,0,e944dcc13ed917a8617d680da1b7f5cc9b5fe4f45e55050fe2f5a3dbdb435b4e,2024-11-21T08:08:45.200000 CVE-2023-35812,0,0,0cefd3d844d6f8f31cdd75959195e40146e70ccab237a1ef1f3c64552774f79e,2025-03-25T16:15:17.017000 CVE-2023-35813,0,0,f7362daf15b8072877b53eac0233dc399ed9f22d354601206ee6e86e1253f3e4,2024-12-17T17:15:08.117000 +CVE-2023-35814,1,1,860f99e01c48069fd92918ac162a7a8b5d576a28e95e2e9336627ed22f37a700,2025-04-28T16:15:25.357000 +CVE-2023-35815,1,1,5bbfe4252f6242756ecd83798086c71dcd7cf222a27184fcb08079ec35fb09af,2025-04-28T17:15:46.393000 +CVE-2023-35816,1,1,0f6f35966fe97ef8f9016fa5fc3af8c6ca5c312b627fd8c963dabbec711b30c1,2025-04-28T17:15:46.537000 +CVE-2023-35817,1,1,2bbe9353fd406bae98c77fd144f91807e1e8320d607af439f5c9e56a883e7b06,2025-04-28T17:15:46.657000 CVE-2023-35818,0,0,576f4e4392dd1349dc7766be8d6e9bc38b5c8973669abd788a04dfeedd8c7276,2024-11-21T08:08:45.653000 CVE-2023-3582,0,0,09c4e91654be2214ec3900e2b9be90215e326968cf6bff7797381659580cb42f,2024-11-21T08:17:36.067000 CVE-2023-35823,0,0,7eb808d4261156f9be2ebb9e6a40665763d3ba807fddcbcb3b8c530d00fa943f,2024-11-21T08:08:45.840000 @@ -233926,6 +233932,7 @@ CVE-2023-42387,0,0,a7eaacf0a8de6fc3b503e22dc7f356d9311b645806829b96bceee8a17a983 CVE-2023-4239,0,0,2b6dfe83a46d7ad7f2e4a2a1f80c3490df80dbfafce7df69a7e9e11e2c4be6ac,2024-11-21T08:34:41.600000 CVE-2023-42398,0,0,c0f1ef329f47937f6ac99259e1d989bb273f98f723724d4aad4ef1d7d794906a,2024-11-21T08:22:29.610000 CVE-2023-42399,0,0,848980ce9c029715fcbc884dcc5992b804f1fbf3be67b22be7982ed26ab2825f,2024-11-21T08:22:29.770000 +CVE-2023-42404,1,1,80d4c3cf7eac4fb2a04867fda85cca0c2d4e00263fca001c57fceac0ccd49f94,2025-04-28T17:15:46.807000 CVE-2023-42405,0,0,dd4da258f9c161f189d1d81c99f637dd07189c2cb85dd4767c2d4a49508b8189,2024-11-21T08:22:29.930000 CVE-2023-42406,0,0,c9f637dec55b0fde958c429abe68f0d30a4befd530732695b8fffe83035c0dba,2024-11-21T08:22:30.083000 CVE-2023-4241,0,0,95ae41f12b550306294ba4750aa169af75030f95a624f6415a4401c97a749e69,2024-11-21T08:34:41.727000 @@ -249326,7 +249333,7 @@ CVE-2024-20364,0,0,c5405000928525c64fadecc07a7fa1d517a3b2e6594a34d0cec6f4ddca10f CVE-2024-20365,0,0,f5776eeb755aa3513fa03e080cdea4b58f9f5b0833ee2e847af680ba6e6c96bd,2024-10-08T14:28:42.727000 CVE-2024-20366,0,0,29c821ce96bd24042aba8a1653122373f7aa5c01e49b5ce0faf906764e9c37a1,2025-03-25T17:49:13.957000 CVE-2024-20367,0,0,dda54d5395b9b3d9b126171fb23eb882ad41f934c6f0725cf3e1e4d73473a49b,2024-11-21T08:52:28.747000 -CVE-2024-20368,0,0,f505ca22050a7c3a07d60f5551aeab897e95eb156bb6861aca0100ddf1df0e38,2024-11-21T08:52:28.880000 +CVE-2024-20368,0,1,fc9e00a196ef28b379014ee845db2bb424d0a05fed9c5837a94f5d4d2a6c5f11,2025-04-28T17:01:04.910000 CVE-2024-20369,0,0,99a3313e16bd8476ee487648dcb7fefee1048f91bb86b11e9b7712b047338afd,2025-03-25T17:44:05.317000 CVE-2024-2037,0,0,af74203702cabfbd04d5eff64b426ce4a70d9c580b01b589ff6185a0d5f6fa60,2025-02-11T02:15:34.217000 CVE-2024-20370,0,0,12ca33b57906c89e9f04aab6c8dd3b6057b12d4f2e523599e9a3d04b119c32e7,2024-10-25T12:56:36.827000 @@ -249447,7 +249454,7 @@ CVE-2024-20483,0,0,dd75006a4b8378f9a9fb04ae844db2b682dee979eaed8461ca1ae896a3344 CVE-2024-20484,0,0,13ad9117c3d7c1ec1721de2acfb9420d4020c8bcfe181ff7139cdfa705d20bc6,2025-04-04T17:14:45.353000 CVE-2024-20485,0,0,4bad42c478a01f00d273ab8662a0d6beb1a29cef37718efc29530f0725b7110b,2024-11-01T19:50:11.107000 CVE-2024-20486,0,0,125fccffe06e3967c8f3666e5a0a779870a3e9c6cd485fa1df233aa67fbb99ea,2025-03-31T18:20:38.103000 -CVE-2024-20487,0,0,90a43a4226fc2a3a08656cd3b727e32adf773edd1ff69cf850e5d113d82153c1,2024-11-06T18:17:17.287000 +CVE-2024-20487,0,1,438616251d3000d53274f620abab9846fbec1e12cdfe41f9b57f8bc8d69130a7,2025-04-28T16:52:06.080000 CVE-2024-20488,0,0,3eba64ac5c64e3a05ab3229d3a319f5d11c1176e28d49e535d0362c8cf9be279,2024-09-06T17:18:11.813000 CVE-2024-20489,0,0,c515a7131b885c709ec34ee863eb206793a1025f593d2aba1eec899a42a269a8,2024-10-03T01:40:11.637000 CVE-2024-2049,0,0,8de89788bab62ebc4dffd6f344cdcebec568f905fda324bfef8674efa43b5d40,2024-11-21T09:08:55.663000 @@ -249491,13 +249498,13 @@ CVE-2024-20523,0,0,ead8420f4f0a6acff53701aef05b74a802c5ceadd60c9b911bf1d0172e10f CVE-2024-20524,0,0,027de93b7fbca22de0066fc80c107f805b01bcc349886a5288ee8b14f5cc8685,2024-10-08T13:48:58.273000 CVE-2024-20525,0,0,a952dd2f5be8f180233858b9c806fdcf542e183229081f53a72aecbc6e041c46,2024-11-20T16:54:28.817000 CVE-2024-20526,0,0,7517c9ae25f2ed0403d64d3a7e54d668b651e2debacfb8240f871264993f155e,2024-10-31T01:08:26.047000 -CVE-2024-20527,0,0,47c3a5da6736b0e4a04fdf78b7f161a0be9350217395cf9ab99245999c75c69c,2024-11-06T18:17:17.287000 -CVE-2024-20528,0,0,cf16f3d1c581fa6c420d9c72a21bc3296b8a4e19c295350631ac14f2f09742cf,2024-11-06T18:17:17.287000 -CVE-2024-20529,0,0,d8cc3251b89a5dc3ce5bdbc00fcdc8f44800e8d9adbf67a3068d6687a10ae7f8,2024-11-06T18:17:17.287000 +CVE-2024-20527,0,1,41d67b4d9f7335686e1f0c90f125814a72e812da4f51f733338257e60119d81e,2025-04-28T16:54:04.050000 +CVE-2024-20528,0,1,ee08564a639eb2ffe8083f1dde5dac6dc26002c0a6ca8c5f163532c25fa1a3cd,2025-04-28T16:54:17.767000 +CVE-2024-20529,0,1,449aaca13405a2300bff3c71a4bf477076672b57a91dc5b86499b4c65b07ce43,2025-04-28T16:54:35.190000 CVE-2024-2053,0,0,df172a8d48d8226dc4dcaf67f8c7b0fbd36c5876cb4ec65ff3f58bf3861cb1da,2025-02-13T18:17:51.650000 CVE-2024-20530,0,0,4b6fbf3cff3c88ea323fddebc6c0cb7ae788b03316d792f4072bca3f4bb0811a,2024-11-20T16:50:11.577000 CVE-2024-20531,0,0,146b432bce918b7fed6c81c3e05a5e8691f6946a09048d0bdbaeec668bebfdbd,2024-11-20T16:45:31.467000 -CVE-2024-20532,0,0,08d1131fd27c28457b84de7d2417806d1443128e53a178026f17939eeeee9aea,2024-11-06T18:17:17.287000 +CVE-2024-20532,0,1,a98adf38c41b4add687eca1d2d364554896ab5d585763cfdfa251477c400c149,2025-04-28T16:54:40.020000 CVE-2024-20533,0,0,ec44233533491472b9a544d68177c854a8f53ebbf4334bb41a7a3a883884d48f,2024-11-06T18:17:17.287000 CVE-2024-20534,0,0,1635c2cbe65aa70b7757a9f78ce3ad8f688ab095623444369639c987cfe8687b,2024-11-06T18:17:17.287000 CVE-2024-20536,0,0,0cf8e906b7364c76c10f292b3b2b51c7ae8671839fdcde7e5640903f053fbc6e,2024-11-06T18:17:17.287000 @@ -253550,7 +253557,7 @@ CVE-2024-25830,0,0,48f111b9df759d41453a93b4045c2ff567a72cf519523820b0bdb3651b119 CVE-2024-25831,0,0,bd8cc628942f0cfec3cd605617d2c1225f2d77c4bfbb5c43b8cabd63ea5984ac,2025-01-16T17:50:46.660000 CVE-2024-25832,0,0,0359e72eed9b587f1da939ee2b4f202d62bdd6b390e2936728c43fb3aef82845,2025-03-27T15:15:50.607000 CVE-2024-25833,0,0,50dde66bc691dda473a0e2525b2d4cb41dc2484c7572d20b63fa74d0870cf5ff,2025-01-16T17:50:18.237000 -CVE-2024-25837,0,1,7bbde50123e9dad85e59add4941e11a3c0f989fc362143f8cbc962577f00d521,2025-04-28T14:06:50.453000 +CVE-2024-25837,0,0,7bbde50123e9dad85e59add4941e11a3c0f989fc362143f8cbc962577f00d521,2025-04-28T14:06:50.453000 CVE-2024-25839,0,0,a6951a161c8400420691d40a579c87f91e6e0f1f8f29502c5d7b5cde306b0917,2024-11-21T09:01:24.383000 CVE-2024-2584,0,0,147866b6cc23dcf59e36f6b74e2eee47e7c2220f33f9e8fd97c35cfd9a0a049d,2025-04-11T14:47:05.300000 CVE-2024-25840,0,0,8953a162377158948ebf7583b7c44850336b1c32eb8d66824e9b6ea8a16712b3,2024-11-21T09:01:24.607000 @@ -255162,7 +255169,7 @@ CVE-2024-27712,0,0,39c268969bc18b1f885f38f09190df12ceb146b6e360b90342f96472616f2 CVE-2024-27713,0,0,b65152a8721dfc398af59bf6c393bf5fdd8d930eac7a2b15f4d417361b801ba6,2025-04-16T19:15:12.260000 CVE-2024-27715,0,0,588f0129d251c25a62c6758efd788f377fccf8c1d3855c585b3b6fa48c2014b3,2025-04-16T19:15:07.433000 CVE-2024-27716,0,0,4e33ff7b1a83f51fed4b80a3d94c6d3a9ee0c5bb94137c0b4ce8ff1d81d644a3,2024-11-21T09:04:56.483000 -CVE-2024-27717,0,1,7c5360378c1c098145273942daac7e3b2041c6891631d0b1d163bd0d3e72c1e7,2025-04-28T14:47:26.353000 +CVE-2024-27717,0,0,7c5360378c1c098145273942daac7e3b2041c6891631d0b1d163bd0d3e72c1e7,2025-04-28T14:47:26.353000 CVE-2024-27718,0,0,6fd0ecf52683c3600c47787d4abfe093befe302da46880121fb7e6cebae4c848,2024-11-21T09:04:56.920000 CVE-2024-27719,0,0,341c9c74660e8da6c3b635ee840b9ff7db619da44f18728b3cc02c5bde0fae9d,2024-11-21T09:04:57.123000 CVE-2024-2772,0,0,02f750b020a1c0ddcf10a0cbf86dad19edb566b57ce2911796231437ddd08a75,2025-02-06T18:38:03.913000 @@ -255974,7 +255981,7 @@ CVE-2024-28867,0,0,13de37d1251837764571928cd6979ba699a7aa83d7eae7fbaaf533c23265a CVE-2024-28868,0,0,eb611e363be714e3967489367b2768d2aad8d5b204059d84423a8d33f9241371,2025-02-12T15:23:09.683000 CVE-2024-28869,0,0,37b1b2db8728242f0e02311908952ceff63256ca368c823beb03f1803daff4a5,2024-11-21T09:07:04.857000 CVE-2024-2887,0,0,2151745dcd1daf556cb13d574e9eac547b9e2e36f2c3f34a1c838383696c4f69,2025-03-28T20:15:22.407000 -CVE-2024-28870,0,0,5166b26488bb1feaa66149bda933432b4715e73f8f764362d70c58e52474dd17,2024-11-21T09:07:05.013000 +CVE-2024-28870,0,1,fd666a29a4cdc30a1bbf0c2ca08eb94fda907da7241920daffa095d89f5c41fe,2025-04-28T16:43:27.213000 CVE-2024-28871,0,0,66beb860b668b240441f397870a5def3e52a27283cc1f106699d7ed5d3fb58ea,2024-11-21T09:07:05.180000 CVE-2024-28872,0,0,efd605e2b04b121c2231623009b4fa909abf78c19ec3893f1988cbfc577adb70,2025-03-26T15:15:49.380000 CVE-2024-28875,0,0,4dfb9c16f5bf82bf68888163d531fb859006c6398976e17b2766ff7841ca461a,2024-11-13T18:10:05.647000 @@ -256450,12 +256457,12 @@ CVE-2024-29500,0,0,ee5c5974c57a8bb4489deeb1dd961914889e0e061cb97cf014bd71805e7f1 CVE-2024-29502,0,0,ead201c41331134e1df3c67fe3b57b9c86955896ad5e35df283b80065a703813,2025-04-15T22:15:15.290000 CVE-2024-29504,0,0,53fc663b9e6d96ca964c735e36e903d675794b657641161dbc25730d9236f310,2024-11-21T09:08:05.703000 CVE-2024-29506,0,0,33bf7b54456a7e4cb2ab4766502f70f6f853d9cd67666f22c7f233033f9462b7,2024-11-21T09:08:05.937000 -CVE-2024-29507,0,0,520cc3a3dfa6edec16ca5754df978edd7e19e4538b835116d724b93f0205255e,2024-12-03T16:15:21.343000 +CVE-2024-29507,0,1,e052df81494a1c8fe72ead2ed1775f37c1d92c0b019354dfb352a9e2caf7dbfa,2025-04-28T17:12:33.127000 CVE-2024-29508,0,0,536c14ce04e18fa15e83ca5caa40460bc2de5ae8a8a60dacf4644cfd33c2babf,2025-03-17T14:15:17.610000 CVE-2024-29509,0,0,a40a88812b5e1bf1cab0d69ac540979ac1d8459d045e60795627cf2b63c8441f,2025-03-20T19:15:28.703000 CVE-2024-2951,0,0,ae761db605433bb52237ed7d7eef76c5c1798f9e2384face77883bcf5d79eaa1,2025-02-04T20:04:27.787000 -CVE-2024-29510,0,0,ed761efaa8462838792d3faf8e9e6862206691332e74c7b3899c6cdcb763c90f,2024-11-21T09:08:06.683000 -CVE-2024-29511,0,0,2476c114398da4fd087c12cbe447e40473d7035f6c61f1e9c3342d9002b6abd6,2024-11-21T09:08:06.910000 +CVE-2024-29510,0,1,4a1f9121aa922f06ab6126f3cc9f5b315cbfadb87b587f10f9694f7f9102ef10,2025-04-28T17:12:24.787000 +CVE-2024-29511,0,1,c5416a87e1a34d03eeceb3aa98c4db6bfec0edf430b973ed90429d8dc1b26646,2025-04-28T17:12:15.530000 CVE-2024-29513,0,0,951ffc5497bc61b7de10183412d657adafc0bf6785b03661c45ac71b0ad90748,2024-11-21T09:08:07.123000 CVE-2024-29514,0,0,2abb04904bf69d627f75f92674c6c5e3eceb6064ba40cae150959cf3d6e1130f,2024-11-21T09:08:07.330000 CVE-2024-29515,0,0,fec0c5abc9d0ad06be394e8ec2dd2fbf9901f5ec35c5b0556c71a1d00b1009d7,2024-11-21T09:08:07.547000 @@ -258690,6 +258697,7 @@ CVE-2024-32491,0,0,c9be22398b321ef29f28645b80b9d5d84c85ca95a4864acab1433154f218e CVE-2024-32492,0,0,e0edeb25f86e3be9edb0311bbcf54a349a36df6b8d42378e2739540732cf2274,2024-11-21T09:15:01.643000 CVE-2024-32493,0,0,7a27db8929a04b15104ae16e99f4098ad34573d33d641985ef34cc9df1907723,2024-11-21T09:15:01.890000 CVE-2024-32498,0,0,12014c3a46713798e5d0b7b8c3fe9fcee81b33dbeaf510a37c2294d20a280ae2,2024-11-21T09:15:02.123000 +CVE-2024-32499,1,1,f8af486ab534cb53c41342bca4d74b9f2aefa3b822ca17fceff4faa02d469ac1,2025-04-28T17:15:47.073000 CVE-2024-3250,0,0,c9339d1505c59e8cc3653c1960a4fe576fd7618988e4bda6570069f9c1164a26,2024-11-21T09:29:14.680000 CVE-2024-32501,0,0,4f31e61e3f7b09df6ac32577f33ab48054890a9b5f112b2e409f8cb1403a2c51,2024-08-27T15:35:15.213000 CVE-2024-32502,0,0,abc759992d854f89f618f3233c860a4ce829a7f1b91e337440ec7de27e0071b2,2024-11-21T09:15:02.640000 @@ -259758,12 +259766,12 @@ CVE-2024-33859,0,0,dc1e8eaf5708e6589a6ff7ec69373854dc9d7fd994b7079457161a5325571 CVE-2024-3386,0,0,a8c12d05fe38ea5271d49d6a9061440dfc3e3d5a3564de9e097b07b4653f5670,2025-01-24T15:58:52.233000 CVE-2024-33860,0,0,a4819c2b6fc7fd69d3faa06fee6ff542dcf52a57562171689b770a5122d1dcd9,2025-04-18T12:32:57.393000 CVE-2024-33862,0,0,bdf330956f292e5af5ddd4f626be2d578dc200b215e50ea65f571e34b29e7064,2024-11-21T09:17:36.807000 -CVE-2024-33863,0,0,cc2b64d7f4008c93eabf664bec3aac480fd18fc08307c5f6de746b7d5173b5cc,2024-11-21T09:17:37.030000 -CVE-2024-33864,0,0,59aced523302b24ea4fba901c225c797c39162d0d922b1b14680b2ac062d7c76,2024-11-21T09:17:37.217000 -CVE-2024-33865,0,0,45c561a91afc4da9ef9770be1c4f4f97e329dc88d6e1cd45a43bc2a1cf47b35b,2024-11-21T09:17:37.397000 -CVE-2024-33866,0,0,052caeef77cf280a05d5fe84333a9ab4349ae412a33d4289aa0c96aae782c9de,2024-11-21T09:17:37.587000 -CVE-2024-33867,0,0,8e60807053567643c3446ab3b44b81dc7a3b3d9ec90e421c30a2de7c54864274,2024-11-21T09:17:37.767000 -CVE-2024-33868,0,0,26805acdd65bcf98fae0757bbf43ec5fb6c285afd2c2d6e18fc6cd4034320937,2024-11-21T09:17:37.953000 +CVE-2024-33863,0,1,99be476a86b3d450d0407f106a76d276189dbae5c36abbf9b1326abff2235990,2025-04-28T17:33:47.813000 +CVE-2024-33864,0,1,7d36bb647202cc2762fe49eab93da03b42e057836984383a6b22362e2b41e4a5,2025-04-28T17:34:24.603000 +CVE-2024-33865,0,1,ee8138b4de88439378dc524837a88558df40c03e293c6e194560420405556f05,2025-04-28T17:34:11.700000 +CVE-2024-33866,0,1,214c0c2c6fb698be1361a5e718624c8dad08ea27a64796499caa6d0556bd2742,2025-04-28T17:34:54.373000 +CVE-2024-33867,0,1,12b0fd91ebdee106a3b06bed84773b457ef214ade626caa619e330d57db4e24d,2025-04-28T17:35:00.320000 +CVE-2024-33868,0,1,3ce1a8d8712afd6da4fc293947a2087b7cc12093451ca81ff360eb082ff4f7c0,2025-04-28T17:35:05.490000 CVE-2024-33869,0,0,c18b38579ef748ca81e5bbd945598b122b29242dac04da83f4b73acc33dece2e,2025-04-16T19:14:53.497000 CVE-2024-3387,0,0,76ed2f8fbaa4b2a2153e90f6a5145a2b83a5b834a03eddb2f7cdee6279ce86ca,2024-11-21T09:29:30.917000 CVE-2024-33870,0,0,67fa1f12a2655a6d1e0d20beeb49b1d4e9c9f0dc5702686d9b959e7a9a182688,2025-04-16T19:14:47.670000 @@ -260935,7 +260943,7 @@ CVE-2024-35358,0,0,0ec9dea2198846ef8acc2fc12a804a9973c759d0b4e72f06c2280c90633be CVE-2024-35359,0,0,ebd79174dfb7ac257fb41388eea21839910657d0184b40fdf6359090d4089700,2024-11-21T09:20:12.920000 CVE-2024-3536,0,0,7989c25e2375d082a5474974320e66a71227073e4e43c82e8bb2c43b72686d65,2025-02-27T20:01:21.167000 CVE-2024-35361,0,0,ba078c8fe5aa2f3cfaede9b86bade7ec878c218d84d169b517462fabd4369970,2024-11-21T09:20:13.143000 -CVE-2024-35362,0,0,e5cca5c62f3b2876eb646365cb2c6155074e27a062899a1d9434226410fe1467,2025-03-27T21:15:48.987000 +CVE-2024-35362,0,1,728132be2a91fd2cacdcdda6c20d85c6afbb5bf0dc030043a29d54ad21c09446,2025-04-28T17:01:44.953000 CVE-2024-35365,0,0,1c05bee1a7dabfe40acb221d1e4fd3b9c4ef93fda79ae1a0f764cfd1249a7a38,2025-01-03T21:15:12.940000 CVE-2024-35366,0,0,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000 CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000 @@ -261016,7 +261024,7 @@ CVE-2024-35527,0,0,d802d5954ff7f9b39a6b2dc0af26915bbf794a29707ccef9cebcfa3c1be1e CVE-2024-3553,0,0,685d6a9bec12f61a7106ff31505bbc229bf16d433649e9dec535a367c421d912,2025-01-15T18:36:47.993000 CVE-2024-35532,0,0,feed18e3e5768cea1f19bf7390d6eac06db80fa1667c8f051e007dd8daab0194,2025-01-08T15:15:17.793000 CVE-2024-35537,0,0,a64f8ae8ab86725040f9e1b6d109b67b42cd2d40678fcb31e32a5fa325e35c6c,2025-03-13T15:15:44.547000 -CVE-2024-35538,0,1,f53475906dfdb17612612ecb2abd6bf10186d205bd4d089601d9c5c2b22789cf,2025-04-28T14:00:34.500000 +CVE-2024-35538,0,0,f53475906dfdb17612612ecb2abd6bf10186d205bd4d089601d9c5c2b22789cf,2025-04-28T14:00:34.500000 CVE-2024-35539,0,0,97ada96f796dc4b3f1c0d706963a18d7205ef36dca04b0052b95398f16195ac9,2024-08-21T14:35:10.017000 CVE-2024-3554,0,0,b7f3e638ef3a822354fb7124a5277075531fad510bfdcd6faa19f3ac09434bf0,2024-11-21T09:29:51.930000 CVE-2024-35540,0,0,7617ec41b467bc5de8aa2d05744dbd4fc53e6d5d057c21556d6cac0d34e12490,2024-08-21T16:05:06.290000 @@ -263946,7 +263954,7 @@ CVE-2024-38897,0,0,b43024c8c4cd5005ae2c3ac6e382f0314f8925a2efba660eda76a12caae34 CVE-2024-3890,0,0,fce70548afac71463049803d99839c76f83c3f99644b737e71452f11bf39c15a,2025-01-07T18:13:29.557000 CVE-2024-38902,0,0,4f43d793db0c62321cf943185d9719a34e2b038e0d34991b7e0e1a885b3d56ec,2025-03-13T15:15:46.197000 CVE-2024-38903,0,0,5ac36a5d0829f2d9338553ce3926f23b23b26a430d990d436d81e63cebcf3b1a,2024-11-21T09:26:59.357000 -CVE-2024-38909,0,1,e855d3e4bcc6debe8825dcac1f84960c0ea9fdd610320e92597c28f7d4585441,2025-04-28T14:35:52.783000 +CVE-2024-38909,0,0,e855d3e4bcc6debe8825dcac1f84960c0ea9fdd610320e92597c28f7d4585441,2025-04-28T14:35:52.783000 CVE-2024-3891,0,0,4d72bc4ea7906c74fa96e7962b045759b217e44e525621a88b5a5a6135790d8b,2025-01-07T18:11:13.230000 CVE-2024-38910,0,0,d2dff3af8a966f6c22ba1ee4e9572a11e68c5f4930901faf724b461844929ff4,2024-12-06T20:15:26.337000 CVE-2024-3892,0,0,d29e438e1d0c06b67fbb683ee1ad1805f7ecf63a0185dbf87e1e3c4e7505b0f6,2025-01-28T16:39:55.417000 @@ -263987,7 +263995,7 @@ CVE-2024-38991,0,0,40100092f65cabc0a38a9cd2fc9407a2ace7ce781b9a81c291e5aad2037b1 CVE-2024-38992,0,0,3fe46fe53ebbd61cbcbeb026b882a36c55f7df74d80bd73da297882e8a29fda8,2024-11-21T09:27:03.730000 CVE-2024-38993,0,0,172de65e7240c6a5f6bf645e694b0d2e344b70f8de661fa2be14422eb43b5e24,2024-11-21T09:27:03.943000 CVE-2024-38994,0,0,2a61e436904a48b4ded58b92d6bc8b107cabc4ea861dff38f3dcd8ff23c78c3a,2024-11-21T09:27:04.170000 -CVE-2024-38996,0,1,3f9d786844732d7b8465ea56f6ffca091cbc25ebc4440147a358ddbf759f2b49,2025-04-28T14:37:52.810000 +CVE-2024-38996,0,0,3f9d786844732d7b8465ea56f6ffca091cbc25ebc4440147a358ddbf759f2b49,2025-04-28T14:37:52.810000 CVE-2024-38997,0,0,29421658f8acbee523241d363ca96c6a4d61054e874bc93ac98fb62157248214,2024-11-21T09:27:04.613000 CVE-2024-38998,0,0,1ddfa2c100a7af4725f52a46bac654024fff6a96a1ee34fbb54fd0ca70641bb2,2025-01-28T20:15:31.103000 CVE-2024-38999,0,0,7f217baaa25d7f40b740199108f4604ad2f09c6c0fdc981cabbaf727e9dace92,2024-11-21T09:27:05.063000 @@ -264675,8 +264683,8 @@ CVE-2024-39839,0,0,330f2306030dc6ab93dd8021c8732b311152c6ac9f1f96f2d9962ad882c01 CVE-2024-3984,0,0,8655b3145466f219f3ce276c8025153839440269c7db6c69886c27b8569ba106,2024-11-21T09:30:49.637000 CVE-2024-39840,0,0,94a6d6b203995fafefacb7ec8a66a42bd5988378c44ec5565cefb671ee4306d8,2024-11-21T09:28:25.043000 CVE-2024-39841,0,0,50486fce28fa3f4f284b69b9c8d9cd996c1dbb4aa396a1f80d3fa3fa96035709,2024-08-23T18:46:51.787000 -CVE-2024-39842,0,0,3d615a235a64f9ec74c076210bce063596f881807c1dae3503f5945544240170,2024-09-26T13:32:55.343000 -CVE-2024-39843,0,0,bc9a983413f252bde6a236c8c53859cfb84a40ab01ddfe91fb3c2c5aa022d67b,2024-09-26T13:32:55.343000 +CVE-2024-39842,0,1,accf76150482937cdd1dc3850d9f42b873a9e6aaff76d96be2314192e8d285e6,2025-04-28T17:12:16.417000 +CVE-2024-39843,0,1,6cdfbf30fb37cf1babe26b8ad1f98681531eb9e2b85753c07d4d8ff510b05544,2025-04-28T17:11:33.397000 CVE-2024-39844,0,0,85c3a846aa32629f6113f9a413e0e7dc227dbddf60f06f604db9d915b574da6c,2024-11-21T09:28:25.877000 CVE-2024-39846,0,0,80953257ce1c332cd15e530c3e3ca7ffad1fca5d0d35a29a56f52115354d0829,2024-11-25T21:15:15.117000 CVE-2024-39848,0,0,99f200c9110b9b0b02c88f225876f5dbd71c44d31f66cf410750136bfadecde4,2025-03-27T20:15:26.860000 @@ -264882,7 +264890,7 @@ CVE-2024-40417,0,0,52920b59587ee59d8965c4a5b0b101605d7bbbf1f449f954819cec48760aa CVE-2024-4042,0,0,cecab8b1687d6be49a591036e1f884eeaaaac74f662dec1e0d521caf21f5dd55,2024-11-21T09:42:05.310000 CVE-2024-40420,0,0,2cc64060c56a9cd8ae43221cc949a39e78df1f9a724e5e5fe2d1f288499041f6,2024-12-18T20:15:22.773000 CVE-2024-40422,0,0,6808f4638a336c49c8bee4ab2c82ba14479baa38f197ca7d031042a0e1bcff02,2025-01-29T22:15:29.260000 -CVE-2024-40425,0,1,81a735aa760a40f04f27a92364bcdd5799b5ae544ac617e40c579d873b6adcfa,2025-04-28T14:46:31.877000 +CVE-2024-40425,0,0,81a735aa760a40f04f27a92364bcdd5799b5ae544ac617e40c579d873b6adcfa,2025-04-28T14:46:31.877000 CVE-2024-40427,0,0,edb2ed6f04ab924988a6c43762419200f816f91f867e2f61b6ea78a526ec38ae,2025-01-08T19:15:31.043000 CVE-2024-4043,0,0,d4b5f95f306543d879cec12e990f7b6a12bdbc75a98caec12c24a6e719c63084,2024-11-21T09:42:05.460000 CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000 @@ -264897,8 +264905,8 @@ CVE-2024-40445,0,0,acf4cbc29ae92f9a56fdef6f118c1427fc2f07e0ad7c091d1b4352b9172a5 CVE-2024-40446,0,0,06e9b4334aa4360577a217b606b4c757a9efe0ad1ca34b90bc04789a404c59c4,2025-04-23T15:15:59.513000 CVE-2024-4045,0,0,f4ea98769850930c051ddc885b28524cc4af702b69cedf5723780c9f7bd76361,2024-11-21T09:42:05.710000 CVE-2024-40453,0,0,44028ded5df7ca69cdf493f195db9cc0d99fa7bb7b128c31936f66f8a0891140,2024-08-23T17:35:05.463000 -CVE-2024-40455,0,1,de7fbbe58f22122912bb4505b4fac34aed399683e93e39080dcf369a911444ce,2025-04-28T14:44:33.090000 -CVE-2024-40456,0,1,b282c3faed2b169890d7c393ead6de175fbbf60b11c5017118af2cac3eb0aed1,2025-04-28T14:43:04.063000 +CVE-2024-40455,0,0,de7fbbe58f22122912bb4505b4fac34aed399683e93e39080dcf369a911444ce,2025-04-28T14:44:33.090000 +CVE-2024-40456,0,0,b282c3faed2b169890d7c393ead6de175fbbf60b11c5017118af2cac3eb0aed1,2025-04-28T14:43:04.063000 CVE-2024-40457,0,0,390d8a58e2d154cd9c58a3e4748ba4c5a47c1d045aaef6fb95193c7f046d0256,2024-10-31T20:15:05.173000 CVE-2024-4046,0,0,138bf9d15d808a387f1842c46e6552085e59aca18c14e013e3ba3c3747ce3bc9,2024-12-09T19:01:57.977000 CVE-2024-40464,0,0,24a2b11fcc0b71c0371d2caf323eabbeaed9510a92bc85a0da1ff652186f468c,2024-08-15T13:02:33 @@ -264913,11 +264921,11 @@ CVE-2024-40478,0,0,18f9d2601b45b0155659911e0ae2c29ee23e133c8cb47ee86400e795a0ae6 CVE-2024-40479,0,0,ed772cf67a46ac3c7e9bc9693937a7eef7702ab77b807ded4bc39bba120db634,2024-08-13T01:13:47.860000 CVE-2024-40480,0,0,2e13e61f572f387adfee6973f14487ab73725a0b4fc14a2193599bd0e9b21708,2025-03-14T16:15:33.230000 CVE-2024-40481,0,0,d82f9452819eeadc6328f6b92c8888f503a8260a868e9cfae3c7009725c43c4b,2024-08-15T13:58:16.033000 -CVE-2024-40482,0,1,6a6efb225f2d1df9f4214be70a3ce35675a07dc191321a4d71af6b98e29aaf40,2025-04-28T14:32:00.203000 +CVE-2024-40482,0,0,6a6efb225f2d1df9f4214be70a3ce35675a07dc191321a4d71af6b98e29aaf40,2025-04-28T14:32:00.203000 CVE-2024-40484,0,0,1b66c3eaa0e6379cfa70f895317e11d73e311cd0bc5454c518db9b1e0b2cd179,2024-08-15T13:59:35.813000 -CVE-2024-40486,0,1,cde41397685b1b76952cb8ca4c533c5be95452075620945321445f9b77c4a148,2025-04-28T14:29:24.907000 -CVE-2024-40487,0,1,c1c444c493c45a57e2593b7c8ca9d88dc5ae2268819fae610a46ec7876ed6500,2025-04-28T14:28:51.710000 -CVE-2024-40488,0,1,ad22cf5d2ab3c9ffc78f1597bec32960e2b4fbdd5e0d003a7a7a0e08f406b162,2025-04-28T14:24:28.293000 +CVE-2024-40486,0,0,cde41397685b1b76952cb8ca4c533c5be95452075620945321445f9b77c4a148,2025-04-28T14:29:24.907000 +CVE-2024-40487,0,0,c1c444c493c45a57e2593b7c8ca9d88dc5ae2268819fae610a46ec7876ed6500,2025-04-28T14:28:51.710000 +CVE-2024-40488,0,0,ad22cf5d2ab3c9ffc78f1597bec32960e2b4fbdd5e0d003a7a7a0e08f406b162,2025-04-28T14:24:28.293000 CVE-2024-40490,0,0,dff45e8b937b0d43e514699f6678cc1eb9310868386eff11863fd2135561092a,2024-11-04T21:35:05.530000 CVE-2024-40492,0,0,15d7a965787ba65f0b0c3a9bed6ce34898e8762185902bff45ae0d0229ab4c68,2024-11-21T09:31:10.977000 CVE-2024-40493,0,0,d8cc68a495620dcb2d28bb34338d4bad4b040e899e98ffb2db4c475330153317,2024-10-25T17:01:22.433000 @@ -266106,10 +266114,10 @@ CVE-2024-42018,0,0,eb9a1a6ae48726fe6d8ca5270a76e202e200b6b8c357ecfcb36c7033e7e13 CVE-2024-42019,0,0,f56b7dabfa0a3aa6dd50c961825a0c75da61580b49dbccee32e2e0bfbe61c364,2024-09-09T17:35:05.247000 CVE-2024-4202,0,0,cd42359c1b21fc769f879c1384ee1c2c1322dbc238d0ef6567e7dbfbb051908d,2025-01-16T17:16:54.653000 CVE-2024-42020,0,0,3ae4a555964a5b7715d3199084fdcd6ec4c70c8fdce0e1a022fc653cd1290be8,2024-10-27T15:35:08.650000 -CVE-2024-42021,0,0,f1a2c74b8dd080f869abf24da936d0d02e46052897d2ff51a7de9dbb9e550419,2024-09-09T14:35:04.620000 -CVE-2024-42022,0,0,f439b3801dea2dea740dc66dccbe51328fc90eea8760262ef75b473601bfac9a,2024-09-09T15:35:09.917000 -CVE-2024-42023,0,0,cfb9f1c5d5166e93fdaecfa8e1963018d11ce1dfd26b106366ada1ee3c162733,2024-09-09T14:35:05.330000 -CVE-2024-42024,0,0,748501d0216aabb9ba534b1f56274381ce1cc48a4c6271bf9435e7a50ffe6c11,2024-09-09T14:35:06.053000 +CVE-2024-42021,0,1,5af29c237ca74a951592deaab3d6c96c427257e7460746e95221ac8ab6087461,2025-04-28T16:54:23.607000 +CVE-2024-42022,0,1,decc9c752aac37c92e389ac06b23a7ad1e76338d3887f972482da68801e991cf,2025-04-28T16:51:48.580000 +CVE-2024-42023,0,1,3a2c675ee3ee684e2d848b9c6e3894f51c582823d7497d25ed16071b3da25a59,2025-04-28T16:49:06.820000 +CVE-2024-42024,0,1,5ed16c22b9a388c5c3f145e087cc797dd6bda09eb1f6fb7c78b65fedffec8b40,2025-04-28T16:47:40.270000 CVE-2024-42025,0,0,d907e87667bcb1967fb111c3ad577747bdb87d9fd1dbb9786c4384a0b62a67c3,2024-09-28T18:35:02.277000 CVE-2024-42027,0,0,5638d7ec8811c9e8fbb2fefb870a279e420da027e505e80772449ff5a6a7d256,2024-10-07T19:37:18.967000 CVE-2024-42028,0,0,76962f5154259e05711dc364ad6590c7951c32228b9c6c9eee39eb61056f2b4a,2024-10-29T14:34:50.257000 @@ -266770,11 +266778,11 @@ CVE-2024-42790,0,0,539360a9beda973ab08fb912d592087f677c6fb9a6fff6589cd7f5b776b9b CVE-2024-42791,0,0,02ed9b68cf0104e47b6bfe6d7010a50b9ef1323336267bf9e897fa9cd2d940d2,2024-08-26T19:35:30.910000 CVE-2024-42792,0,0,d46d80558cda01ef420339b2588d51cdd59e10dffb1a2c4145461835bf0c2904,2024-09-05T18:35:24.220000 CVE-2024-42793,0,0,c32fe29f81a44e565c3a5216abb9d035104b36adb22a5629ff920d51df01d239,2024-08-30T15:56:51.510000 -CVE-2024-42794,0,1,1388760710e98e4dd9825c92a0c1b25ba5d76a571c56cd23ab0c01d9cfa0bd60,2025-04-28T15:09:59.570000 -CVE-2024-42795,0,1,4b1825186993e94584d1caa74cd7c10ecb55f2957c94abd67a0e8bfcfe5a76c2,2025-04-28T15:08:25.213000 -CVE-2024-42796,0,1,f3013659b81b414b232c6879971f4ee4e0d060103a8264ca54b3014f1fe3f548,2025-04-28T14:56:46.983000 -CVE-2024-42797,0,0,b0ffe521c0bda597641c9c63f096241cab44c6e592ff9c6671135d9a88355e07,2024-09-26T13:32:02.803000 -CVE-2024-42798,0,1,b6a15ed14ab901d8f830c1c2ca39552d9c52c3ccb25a03c7d550c70943dff7af,2025-04-28T14:56:09.830000 +CVE-2024-42794,0,0,1388760710e98e4dd9825c92a0c1b25ba5d76a571c56cd23ab0c01d9cfa0bd60,2025-04-28T15:09:59.570000 +CVE-2024-42795,0,0,4b1825186993e94584d1caa74cd7c10ecb55f2957c94abd67a0e8bfcfe5a76c2,2025-04-28T15:08:25.213000 +CVE-2024-42796,0,0,f3013659b81b414b232c6879971f4ee4e0d060103a8264ca54b3014f1fe3f548,2025-04-28T14:56:46.983000 +CVE-2024-42797,0,1,bedeb00cf10d9400874d86bda18221d72cb66e2b931d29d652ed4e0670796e6c,2025-04-28T17:10:19.240000 +CVE-2024-42798,0,0,b6a15ed14ab901d8f830c1c2ca39552d9c52c3ccb25a03c7d550c70943dff7af,2025-04-28T14:56:09.830000 CVE-2024-4280,0,0,b3797ff2151727941d9c366b289b5d3e0b88350afb872404e2bdcfe0d7122163,2024-11-21T09:42:32.167000 CVE-2024-4281,0,0,61e5371b0a3255e76472e43eacd6c1c0207d9397155487a12c704d61028dcc77,2025-02-03T18:53:40.487000 CVE-2024-42812,0,0,163e07a54ddac84e7821d0efc800bc7e7d10ae1d47903174af8c3b5ac8976f4b,2025-03-17T16:15:22.480000 @@ -266867,8 +266875,8 @@ CVE-2024-42988,0,0,5fef959cbc78ebe08189d85f59ac43355192595ed5bb119fd152c126c45c0 CVE-2024-4299,0,0,06ff6656c614a1eb297948d61726a31acef16b15b4f4cc0e0cfb9d02f54c7a70,2024-11-21T09:42:34.330000 CVE-2024-42991,0,0,8c4440572b8c1b15f9e28e1fd419725aea046bc3d3f09f5e12a0e76f85c0bdaf,2024-09-03T19:40:46.783000 CVE-2024-42992,0,0,922ec86108ffde155b16bab8bce05d736126b3c84831d9a4ac12e72887280de3,2024-08-26T15:15:08.593000 -CVE-2024-42994,0,1,9d999392425042623e15f7faa35559c12373567a5bd93ad11d5f5b767f6d9226,2025-04-28T14:10:13.853000 -CVE-2024-42995,0,1,68c4e42f2f1f42bc08e5e10ffbd4b4428bbbaf157c94fda70fbf4af56c25082e,2025-04-28T14:09:10.273000 +CVE-2024-42994,0,0,9d999392425042623e15f7faa35559c12373567a5bd93ad11d5f5b767f6d9226,2025-04-28T14:10:13.853000 +CVE-2024-42995,0,0,68c4e42f2f1f42bc08e5e10ffbd4b4428bbbaf157c94fda70fbf4af56c25082e,2025-04-28T14:09:10.273000 CVE-2024-4300,0,0,91c6796b7b00ac208d0ef970c233086a0adcf2f87abd1ccbd0345b3366886d09,2024-11-21T09:42:34.457000 CVE-2024-43005,0,0,90be3bacc36bee38568ac0616e5a259a15f0b18f629aac335dac5a60c517ea07,2025-04-21T14:59:47.323000 CVE-2024-43006,0,0,6f99e55991478cb76d4ae41fc977e7ae067e6c2daf2293b36eecaf1e69677bdf,2025-04-21T14:59:34.717000 @@ -268192,13 +268200,13 @@ CVE-2024-44558,0,0,b79e37e9647acabe01bef00ff6a29bbca979ac833bf493d7e30d15f53dab7 CVE-2024-4456,0,0,9e256113ce6b5f434b1029225d9b7c490634452bbac2479c1f026431fd87fe33,2024-12-06T18:15:25.450000 CVE-2024-44563,0,0,5199f8441754771b5dda361a721b2fbc485484332750808462a845349142050c,2024-08-27T13:43:26.300000 CVE-2024-44565,0,0,704a4a34e28ec3aed8b7d29891a7e7fd22dbe7a4261cd86983a70f86adbf6dad,2024-08-27T13:43:46.897000 -CVE-2024-44570,0,0,c3f413693b0a67d171f5237e75f3598ab991dbf250c04c0e42a3fd54e1bea849,2024-09-12T12:35:54.013000 -CVE-2024-44571,0,1,2c40131898ec7a9c56a91e7756c62636f116dc6e5677a39ddcbe54a5c651cbea,2025-04-28T15:22:14.460000 -CVE-2024-44572,0,1,4f4ead38e06948d091f8d1e12c653b9f93f098030647a6be11450d4901ec7d86,2025-04-28T15:20:25.193000 -CVE-2024-44573,0,1,cc255c259019816f3146a3ebd697d11943657aabe2dbb9f6bc11d051c40e07f3,2025-04-28T15:18:27.100000 -CVE-2024-44574,0,1,250840f6a5b68f0596aadb312c28af191e71501ff153313f8404b9b56d3dcb80,2025-04-28T15:16:15.657000 -CVE-2024-44575,0,1,2fdb4523fb93480e17a81cb2289c26fd5b8fb4bd885808938c0dc8387a7e0173,2025-04-28T15:14:44.490000 -CVE-2024-44577,0,1,012cd3687489f6b683572bfff38cebfa29461ab1df5e35223241e335c2144a6f,2025-04-28T15:13:42.720000 +CVE-2024-44570,0,1,5617afa8c030711ef7aad269770cb7dba5d5581cc4243485fcc96b46d4645178,2025-04-28T16:36:59 +CVE-2024-44571,0,0,2c40131898ec7a9c56a91e7756c62636f116dc6e5677a39ddcbe54a5c651cbea,2025-04-28T15:22:14.460000 +CVE-2024-44572,0,0,4f4ead38e06948d091f8d1e12c653b9f93f098030647a6be11450d4901ec7d86,2025-04-28T15:20:25.193000 +CVE-2024-44573,0,0,cc255c259019816f3146a3ebd697d11943657aabe2dbb9f6bc11d051c40e07f3,2025-04-28T15:18:27.100000 +CVE-2024-44574,0,0,250840f6a5b68f0596aadb312c28af191e71501ff153313f8404b9b56d3dcb80,2025-04-28T15:16:15.657000 +CVE-2024-44575,0,0,2fdb4523fb93480e17a81cb2289c26fd5b8fb4bd885808938c0dc8387a7e0173,2025-04-28T15:14:44.490000 +CVE-2024-44577,0,0,012cd3687489f6b683572bfff38cebfa29461ab1df5e35223241e335c2144a6f,2025-04-28T15:13:42.720000 CVE-2024-4458,0,0,d181cdfe1239b7370e0229e24ced49e59c93df8ded36a14106b44f2e538fe3b1,2024-11-21T09:42:52.170000 CVE-2024-44587,0,0,a5e1f3ebd4d6bf6589458feb9c709eaa46f4397db0fc7239eceb5c9b4e9301cb,2024-09-05T17:44:56.007000 CVE-2024-44589,0,0,efe6dd10612c3f4023c557d137bbb3d918a6e4892340cf75c11b9c76638fa63e,2024-09-20T12:30:17.483000 @@ -269233,15 +269241,15 @@ CVE-2024-4606,0,0,efb59025d4d9edff921c42e826e018a201d0090d0d6626c386da644be50bec CVE-2024-4607,0,0,3fbc86af3054a713c72304e558427371fb55d0a3c5b757e7fbd2ba69e3403989,2024-09-10T15:03:24.710000 CVE-2024-46073,0,0,22fdd5390d19b1333aba0b9bc82d9a2369f96da02619462b22f8fd1b876f2bdf,2025-01-06T20:15:34.307000 CVE-2024-46076,0,0,533f845bcff4e34eaa5948ad05e882b3c3e66cc8bf88fa3e81a53d103476adf5,2024-10-10T12:57:21.987000 -CVE-2024-46077,0,0,6c89106132e28e21a86571fcf264e07ce5fe87397f087d1a7edb061c6dd8d49b,2024-10-07T19:37:26.967000 +CVE-2024-46077,0,1,e8ab8f94502e5cdcb2ac40f7f03cd32a5f8a188eeb88db4304df3a6464410d97,2025-04-28T17:58:01.843000 CVE-2024-46078,0,0,053a691f99254b91033d7d94a794c51a05624c762cd8b1812d38c2d64aa77d9d,2025-04-23T01:02:31.630000 -CVE-2024-46079,0,0,4ba145a0d8969fa4e8642825adf6c4e3715ce0897b463043eb5670f3d8c2aa2c,2024-10-04T13:51:25.567000 +CVE-2024-46079,0,1,83a8eaeebb16775533add49928fb77ddf377c1fb78b8abf9f38e1600e8c452b9,2025-04-28T17:16:42.320000 CVE-2024-4608,0,0,fbd96b42098768106574c0e8384ecfdb6683367bcbfd9f6c46d35d79cd614b83,2024-11-21T09:43:12.500000 -CVE-2024-46080,0,0,2c4b8b3828c2786a14572fe678fab362fb212dcce437eb20e93e568a755f2058,2024-10-04T13:51:25.567000 -CVE-2024-46081,0,0,0e789a0ebbc00cdbf44e8b44ef0da56f8143626ff1e102d1f8d9c7318cb8a8b5,2024-10-04T13:51:25.567000 -CVE-2024-46082,0,0,7b46f2732412b5ac2b1d437c0fbccd9d56ed2f732e7f282dcdb036c6457e8280,2024-10-04T13:50:43.727000 -CVE-2024-46083,0,0,b99ab0368a7319624dd342310c40c012b87417b04b515b30504f11b4cfae6b65,2024-10-04T13:51:25.567000 -CVE-2024-46084,0,0,9c3390cde961827eb5cd133dcd8af34f1d1dffa8dec4d94509ad1e25f69b5aa3,2024-10-04T13:50:43.727000 +CVE-2024-46080,0,1,a2f2d6994bd93bd46824da8de681a6ba91d4f757a7d312c2b60c79733db5e663,2025-04-28T17:17:16.860000 +CVE-2024-46081,0,1,aed9bd158ff75781a364a250876d45056da597d67723e8ed283599bafbf5435d,2025-04-28T17:16:25.750000 +CVE-2024-46082,0,1,c682b8c547e6f84d7564019d42a2a4080d1adbf54d262400a11377d98ed4a72d,2025-04-28T17:17:29.560000 +CVE-2024-46083,0,1,a5770fcbbcfd46d03bf77ea989515b8c2712a7757884b5c796f36171e2df474f,2025-04-28T17:16:59.523000 +CVE-2024-46084,0,1,00504bbdb769893e4fb28d118d076b13b791f2e6fae490903cacbd2927047981,2025-04-28T17:17:46.353000 CVE-2024-46085,0,0,28dc54c20fe1ab4f6b464af7f35fce329a372ad2c671ed7a4a1e1a0633cf09a8,2024-09-20T12:30:51.220000 CVE-2024-46086,0,0,db65165feccd5cb075ac96f210c77557e2fa2e1d4ad8dc2351e61d2dfab7f1ef,2024-09-25T17:08:41.937000 CVE-2024-46088,0,0,cebef494058af71996a2bd2599de3e728bb9445ff54a8925f9eb5974360a8dfe,2024-10-15T12:58:51.050000 @@ -269249,7 +269257,7 @@ CVE-2024-46089,0,0,5eade46713a832b64c2a57024c14b59de1dbfc7f22765953d6833e37b3b6b CVE-2024-4609,0,0,055afe90c9a60dac55a2761dba0676220b76e2bc2c34a4db32d71cd1812cb3e0,2025-01-30T15:50:28.557000 CVE-2024-46097,0,0,81923f5d4d8e5055b162d76d680c8f22ce08e7aa6381b7cf7beec6a443dacf5f,2024-09-30T12:45:57.823000 CVE-2024-4610,0,0,f50600a6c6829b515e589c2ef59552849dc680c9e925131563e15658aa25578f,2024-11-27T19:29:04.697000 -CVE-2024-46101,0,0,cd973d6a93c35291962287007c41da9fad479b0d3c979dbf070b1ffa3294d18b,2024-09-26T13:32:55.343000 +CVE-2024-46101,0,1,7b110632dcf3cb103c864978794e634ff41c32fc3a5dd63fc621fa6da5420562,2025-04-28T17:24:53.350000 CVE-2024-46103,0,0,846577e342b8c2ce2b236435b45b09787163fef3cdc9c83f60399e2839cbabb0,2025-04-04T14:37:44.533000 CVE-2024-4611,0,0,ed636c8b0a8e01284c12219c46e475d447f79d5f869993df679ee9b132849ae4,2024-11-21T09:43:12.943000 CVE-2024-4612,0,0,b8a6aeb1f3cda3a22aeefe8d9a6a0f4dbf471fce15050f83fe5df63ac5f52cd2,2024-11-21T09:43:13.080000 @@ -269455,7 +269463,7 @@ CVE-2024-46602,0,0,12727c4ec9c47814e0ab91130a00d37572322939d99c90cba7bcb7677008f CVE-2024-46603,0,0,a37a7386ea473d074b6e6d787106b595720c9033779817e683868ba9b89fdf43,2025-04-16T15:14:11.300000 CVE-2024-46605,0,0,1055d0ef26a73f5e645f2fdb8709387122d75ec2801b9b56966b3a9b26aba333,2024-10-18T12:53:04.627000 CVE-2024-46606,0,0,28b5ab017aae3b940eef21410c789c635db9a13916d1c5cd18485d534534131f,2024-10-18T12:53:04.627000 -CVE-2024-46607,0,0,ec05db7c5cc943a4c5bf83a50709ef3215d2e7d0cbc12a79606fcd7a97a3bab7,2024-09-26T13:32:02.803000 +CVE-2024-46607,0,1,d16123953b78859acfc2dabf476ff2c3112bede76a5c3584ef8c356b401e9214,2025-04-28T17:09:34.257000 CVE-2024-46609,0,0,cb3f6742fca13ca85e1758024ae4e444c2210d05cca05ce3f1c3d77630f6e0c3,2024-09-27T16:35:03.627000 CVE-2024-4661,0,0,98e71fb13044fd144bd6bedf5480d58bf9ed0ebf9b6a29f127d5da04baa2a417,2024-11-21T09:43:19.547000 CVE-2024-46610,0,0,d9dd8e07efaf4137061a4cc329bf5a1f8a1df9d6dda6d0ee310e2fb6b1592757,2024-11-21T09:38:48.150000 @@ -269481,7 +269489,7 @@ CVE-2024-46647,0,0,ea434f18d0bbc447de3bba9cc326ee8aaf798c0d1cf9bfd003091aee0a314 CVE-2024-46648,0,0,c44a65af8f616cec6f644d8acacacd27cf542bebfe8f5f5402c4df9c459cfe29,2025-04-16T19:18:01.420000 CVE-2024-46649,0,0,d0532fba7934d3b69fa4a1380d79d69452951670e853fd003aea7f9da954625a,2025-04-16T19:17:33.750000 CVE-2024-46652,0,0,9d991062832040a51c98317f39646415912fd91ef88373c07e33763486519d6c,2025-03-17T15:00:28.117000 -CVE-2024-46654,0,0,c21f3600cd164a3dc6068ca1b33b3dcf9758ff3ae5faa600d796c489c2a9b3c9,2024-09-26T13:32:55.343000 +CVE-2024-46654,0,1,c74da1d3a3e2027fca87cd498f3ccd2a77f0ee0cd7043213e593ea7b1b755061,2025-04-28T17:51:42.197000 CVE-2024-46655,0,0,619756e28facd4dcca44a3c94ed931cf61b4408f1c51eeb5eca49c9e1ace2a15,2024-10-02T15:40:36.090000 CVE-2024-46657,0,0,a5ced2fc9af0ce563815dae98d1fb612587af65b11df31ab1959075bb6481834,2024-12-11T16:15:11.770000 CVE-2024-46658,0,0,8759efef114d9b796a08c43f5fa85fe56a819964b257a73be81a7a6eec47c6d5,2024-10-07T19:37:30.467000 @@ -270011,8 +270019,8 @@ CVE-2024-47213,0,0,d448ba2c325833d379e23a3bbae3df8d3898c3dd138b8fdef206da49d3880 CVE-2024-47214,0,0,fdf63583cb8c718454aba155a2144e7a411e8ffb79f3de417801c77469d8b72d,2025-04-10T13:51:22.130000 CVE-2024-47215,0,0,76d11831f7f33ce137b9f96ee9f5b8ea4bcc41fb0b181c93ba9e99e4bee377c9,2025-04-23T14:55:42.590000 CVE-2024-47217,0,0,959ea08e604f6076b0cfb3f0015c60a8376accca2a2e83fe707c21c8552b263c,2025-04-08T18:55:43.790000 -CVE-2024-47218,0,0,8f6e736bcbfdab7dfdd8bd8f564ed8613a8c8351ccd95d79ca364fad2decbeea,2024-09-26T13:32:55.343000 -CVE-2024-47219,0,0,8fc1130127bd8731d0aed1e911950fc407abd45b7d900ae4ed7f589d37c802c3,2025-03-14T17:15:47.760000 +CVE-2024-47218,0,1,306cbad0f47fe097cc2e31a46729f5be1a5a54db7e8229a4a5a6bc39dcd44475,2025-04-28T17:22:15.707000 +CVE-2024-47219,0,1,1ed21a60d6fccef5b73833e4229beafbf3428adecb67f7134d1b246008c0af0c,2025-04-28T17:19:48.890000 CVE-2024-4722,0,0,f8a01d5cda394f95062bd0899a5b0ee759de21860c871ac98f32f3a90f8128e0,2025-02-20T20:55:46.727000 CVE-2024-47220,0,0,f3ac3c597af9e4605453ec7e5003d51d9fc5b1c12997e286134131bb5771e3d4,2025-01-09T18:15:28.837000 CVE-2024-47221,0,0,ad5f394b892b60bbd00529ce857218f4587aca66ed7d172df87e3d22b51af0ed,2025-03-19T16:15:28.600000 @@ -270811,7 +270819,7 @@ CVE-2024-48176,0,0,13a8939b0c54d56e6308a56e624660e03800f4afcbac46e9738c8eb6a907a CVE-2024-48177,0,0,90649086193e291835bdef2f7e6fa80e829ddcc4d99dbc3822e4f44d6589f188,2025-04-18T01:23:30.553000 CVE-2024-48178,0,0,ee85880b14f6d7dc4a557e98498726e030c1ccf5636d6ad1b49925337896afae,2024-10-30T18:35:13.637000 CVE-2024-4818,0,0,7eb9f87453466a82567333ba5bc5e47b162cdd22e1273603be23f63fb83da218,2025-02-20T18:17:41.877000 -CVE-2024-48180,0,0,8a3c75ae92049ae13af75d5775ed404df804756a3432479a30c8b92f46882202,2024-10-18T12:53:04.627000 +CVE-2024-48180,0,1,fdcd0adbd6e000b70b86c96463685b3f8e06e9e3d993eb287a59410e3231c0c2,2025-04-28T17:34:22.620000 CVE-2024-4819,0,0,357db78a10d6a847667b9ca0f576e976c5fe2a876dcd6731bb57683aeb2a6700,2025-02-20T18:16:52.500000 CVE-2024-48191,0,0,56ec2e0a18b5e8325d7def2b6a594f02e85c60e9c19e3ae6cfc636a431a82a33,2024-10-29T14:34:50.257000 CVE-2024-48192,0,0,a310388b880b5c2a74a62b31f30e0e2c6d3433813b6a8227dba77259ee50173f,2024-10-18T12:52:33.507000 @@ -270894,7 +270902,7 @@ CVE-2024-4835,0,0,e5afebda31e3d00337280146c689aefe524c3c5fc6e420e48bcb5298cdef38 CVE-2024-48352,0,0,0630b5d0648f49e8f5e7ffc77997954c036846dfd8121959ae1ed5204e6959c4,2024-11-05T21:35:31.063000 CVE-2024-48353,0,0,34e9ff7673ed1bf12aecd5dc4105de10e84686e2a42ad35030b059ca0e7a87bf,2025-03-07T21:15:17.203000 CVE-2024-48356,0,0,ef2aef1550a0afc64a7022138c1ff4fd08adf4ccc7c1306118c8152e5bc66023,2025-04-22T20:24:36.477000 -CVE-2024-48357,0,0,1ae67bf0709d109d97133f3bb7869c66e444ed86567130769d64b7b8e4af6edb,2024-10-30T17:35:13.203000 +CVE-2024-48357,0,1,3284ff9b8d317d6daecf48b9beaa51f3d027b6c47d7a259b1ab886ff41e81af7,2025-04-28T17:37:34.927000 CVE-2024-48359,0,0,4472fa600139ff2a5cc83feda30936e4a1215195f020cdd7c52b43f6905e8f7b,2024-11-01T21:35:04.220000 CVE-2024-4836,0,0,b46eb66373ee9c7205dc4e47a376290cfcc14a21eeef8a54f2457394680abb16,2024-11-21T09:43:42.437000 CVE-2024-48360,0,0,c6fdaaecfb661522cf812d8a38973f560d2ff304005b9a728baea440c26b0bf3,2024-11-01T21:35:04.963000 @@ -270974,7 +270982,7 @@ CVE-2024-4857,0,0,1425fe617505078c95c036dd0caef66eaa5a7e090209dfa3eacdc5e6261846 CVE-2024-48570,0,0,3435b97fed6be571814415d23490ac0110cb83030a16079bb75dc360800ff593,2024-10-25T18:59:22.033000 CVE-2024-48572,0,0,0d68a2eb25452dc45666ea8d65bbb9f12ace14a92ec2498a71bb211b2984ecdd,2025-04-22T20:23:23.893000 CVE-2024-48573,0,0,3af9c13b56239290a2b5821681083571a4f7c4a72740948b70e5d400edaab425,2025-04-22T20:17:44.560000 -CVE-2024-48579,0,0,dee7c78d0702c64a8f39cc4036ed6080e70421fd088c94b956bf94e50f9f0a08,2024-10-28T13:58:09.230000 +CVE-2024-48579,0,1,d59035387bb2a136d91307f7106ef7d3ec053f6e9084f152baa3a2a36e6ca53d,2025-04-28T17:39:16.160000 CVE-2024-4858,0,0,1548d35291b51ac1157133f3a9dd324ad3bf46f6b71adfad39b5e88bc9095fb0,2025-04-04T16:55:05.810000 CVE-2024-48580,0,0,e540b5d156a186615d240d0f099de52f053b3a0dab4d95b774286d8b7357b132,2024-10-28T13:58:09.230000 CVE-2024-48581,0,0,d36eaf42a8c013f5398a1310ef6b2089c8383aae1cbd0f696279268a4ee67822,2024-10-28T13:58:09.230000 @@ -275848,10 +275856,10 @@ CVE-2024-55507,0,0,930e26c70929e91b1984b19dfa87f2ddb08aa3eb954af3c2a7afec13edb13 CVE-2024-55509,0,0,d509d3ca5bb22815e1ce9d88bb753af17faa80b562dc2247a6b3b8ec1b0748a7,2025-04-03T16:34:27.370000 CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000 CVE-2024-55511,0,0,c1a0f60c8cf30fa3a634ddf27d49c50ded703e5bc63890525ea4097f2e42cfad,2025-02-05T17:15:21.570000 -CVE-2024-55513,0,0,40c437476386b52d6529b2af876a7001f76873eba1b6188f942e41e85cdfe820,2024-12-18T16:15:14.720000 -CVE-2024-55514,0,0,1537605bf3f083763014ae28c59761ba42827954ea1767dcde733e957178248d,2024-12-18T16:15:14.900000 -CVE-2024-55515,0,0,e9dbe0236e67a2b73b42cac783675212cc2d1078d1ec8662dca3a6462aa718d1,2024-12-18T16:15:15.090000 -CVE-2024-55516,0,0,e7e0e08100c52db7aaa4babd93a4a20a15574d3ceb0d52addc8cfe29e6e12143,2024-12-18T16:15:15.263000 +CVE-2024-55513,0,1,98fa4094b9e891975c5a1ae389ae14fae6bf2f3bb5feef4113f90ec9c396071f,2025-04-28T17:13:31.887000 +CVE-2024-55514,0,1,4a0807ba2c0e75f82cebec1e510b2f1b169e413bd3b215a4f5feadbd34cd08cd,2025-04-28T17:13:35.633000 +CVE-2024-55515,0,1,706cb5995a02cd1e3a39673e82962b00297df53b3ac0b69042478d5109562572,2025-04-28T17:13:40.767000 +CVE-2024-55516,0,1,2259cb3f6bd9fec2682039f52366d5d7eb9f7f718c5660ab3ddcede84761c6ed,2025-04-28T17:13:43.887000 CVE-2024-55517,0,0,3c8c33e9f0396a101831f3e5ff6c0b4973f6bbd431af52c58783b2edaa611ea1,2025-01-08T20:15:28.810000 CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4be,2024-11-21T09:47:54.927000 CVE-2024-55529,0,0,1d23a6190ed20d6e071a25112ca50d5aa9ed1f469e0055848697711ea503dd18,2025-01-06T20:15:39.163000 @@ -276169,7 +276177,7 @@ CVE-2024-56139,0,0,3f3505cff9953c341cbc46a854057265986fc9c1927b9f237182fb5e17450 CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000 CVE-2024-56140,0,0,5e773e07d0eed57889259343301d38e685c0a1811e50189d4f1636233600aa01,2024-12-18T21:15:08.353000 CVE-2024-56142,0,0,d0863d2f76899d0c75d2dc51b8dc37ad0a79fde1963b9a5230e4e213f062dcd8,2024-12-18T16:15:15.433000 -CVE-2024-56144,0,0,841b97f9dd621b3a904707e190c030b6c378f0f01017b04615b98da4da201d0b,2025-01-16T23:15:07.830000 +CVE-2024-56144,0,1,5a8f246b3ee58fe0b6aa1f12215528f9f3e515638bc6c966a2d94ef6b9b54d81,2025-04-28T16:44:52.353000 CVE-2024-56145,0,0,1bf04321f372be6a391b26e37787c9310c18edadc786028f82c542bd3efa0f5b,2024-12-19T21:15:08.383000 CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000 CVE-2024-56156,0,0,1fcbb1f9b53613e827e8623c0fe2a4958382c85978e469be946fb7fe1f2af9cf,2025-04-25T16:15:25.597000 @@ -279888,7 +279896,7 @@ CVE-2024-8368,0,0,cbd58d02608421226ccc3e5ed1266e5c25af06684456963a09ab875beeb4b4 CVE-2024-8369,0,0,a6d05ac94fd162bcee8803884a010b60435524cf6e0d9e13d056a1897ad22b6c,2024-09-26T15:43:20.720000 CVE-2024-8370,0,0,6ff247f0498c9a9b7066f4ad89c0a9d54e8c78b0a7b7e46d47dc3aa51aeb81d2,2024-09-03T14:15:17.787000 CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000 -CVE-2024-8372,0,1,712ae3556095fe97ae3ecc479945a9ea4cf01b8730ea7b80d21ea609bf958a8e,2025-04-28T14:15:20.107000 +CVE-2024-8372,0,0,712ae3556095fe97ae3ecc479945a9ea4cf01b8730ea7b80d21ea609bf958a8e,2025-04-28T14:15:20.107000 CVE-2024-8373,0,0,11487d08657f4ba3b88ea7448ca7eeca5854e7d9e363edc87b0e7b98253dceda,2025-02-12T20:15:05.360000 CVE-2024-8374,0,0,ca02cb1d8f9493301326b3f2ebcbf769706c4933bc89729cb22baf7e425cf724,2024-09-16T16:44:42.403000 CVE-2024-8375,0,0,6d034a249584f3f3249aac9575cef27d1b8e645fd1ceb9646e6f860db02d62b5,2024-09-20T12:30:17.483000 @@ -280495,7 +280503,7 @@ CVE-2024-9032,0,0,db412b812677aca225760c66514c98f2114321ea2a955553fa39ac185e9795 CVE-2024-9033,0,0,c9ce8f3f22810e314a9b6a7070f369471d9e5df9eced517c322686d35f96ab02,2024-09-27T15:56:35.317000 CVE-2024-9034,0,0,83477657f4c478024a468b60c1ed591537bc193fa91e43c043d2fba1c530e091,2025-04-04T14:37:21.133000 CVE-2024-9035,0,0,6d89b07dc3c5458bc36ea5fec755f8ed722f72a166febd5b9799b30efe47c9e4,2025-04-04T14:37:30.683000 -CVE-2024-9036,0,0,87697dcc924236de492504b5d734ce31f8e3116cef599d74e85964e2b8a89e64,2024-09-26T13:32:55.343000 +CVE-2024-9036,0,1,c7834d445af045c0baf7819e57cc93f199f38742898e9bf2b7e1a91e6ed2dda6,2025-04-28T17:28:24.990000 CVE-2024-9037,0,0,61d7d575e9833b1f71caeb12a0ed3faa0ea60057248b15da1a13008ecf46898b,2025-03-31T18:55:16.680000 CVE-2024-9038,0,0,902b50c6d930b124e106a40fd3471c27a76d7b215b07dd7cda1cc7b7441c1dbd,2024-09-27T16:11:37.710000 CVE-2024-9039,0,0,c2deaade23da482813d66248554a49a9e73a2b63627babab6e443384d154782e,2024-09-27T15:58:22.493000 @@ -281156,7 +281164,7 @@ CVE-2024-9767,0,0,80d36f7190a9ee1712fc0bac7af287f8aeae0caf94e9c8386dc03bfd7eb71f CVE-2024-9768,0,0,904cffc60d5e826fadde1f9279bf1637d0038b817b76c6a013f678cc172cfc96,2024-11-26T17:14:14.327000 CVE-2024-9769,0,0,c2696bf31f1ba7076083554371447a32b4e26b069c06f2ff37292495919c4490,2024-12-06T04:15:05.200000 CVE-2024-9770,0,0,89c72cdf45a7c58ced9be76b5e65a6f0ff4e6639605a7a42b9fe4751cd3e5015,2025-03-27T16:45:46.410000 -CVE-2024-9771,0,0,cb01058b3788c2711a0724f376b0836bb8f18cf21cf46412bf23e8a977176f17,2025-04-28T06:15:16.973000 +CVE-2024-9771,0,1,c055bfa4711729437d5b8a4af5402523459c1c9e2134a3c961ae3d40cb95d1a3,2025-04-28T17:15:47.873000 CVE-2024-9772,0,0,00de6e2212e38deec5d85dcbb0fb26ecbb8065a78c6c2a56178e317ffc908e8d,2024-11-25T20:03:01.613000 CVE-2024-9773,0,0,9adcbeeba5a2fb018fb9bbbef2f03381fb99e41630ddc906f125617f02106933,2025-03-27T16:45:12.210000 CVE-2024-9774,0,0,79ae7e6aee3850be4eda1f2c948331524ef171c56960729cf4b84fb702baafa4,2025-02-07T05:15:12.470000 @@ -281795,7 +281803,7 @@ CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e4 CVE-2025-0624,0,0,5916fd2b455ef814c63d2135fe854de2abe5fc9acaea4cf3e7677b38221e3050,2025-04-17T13:15:40.933000 CVE-2025-0625,0,0,7c04d9cc9e6db59033b94aeccc3a86f517f7789f1f78caf25d9921a8f7736cad,2025-03-28T19:14:20.063000 CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000 -CVE-2025-0627,0,0,18ef81ec7f58bfd331be8145517ad3578d837afd784e1b5781a56177b263a3c1,2025-04-28T06:15:17.093000 +CVE-2025-0627,0,1,25c945362ecff7b9f8a59c3d6ba959bfeb0448d26d0dd81e6c97b540c10f9377,2025-04-28T17:15:48.050000 CVE-2025-0628,0,0,570695b374c4ed87e2ed44b4722d7e35e02627e97784a5b85708accd345030c2,2025-03-20T10:15:53.407000 CVE-2025-0629,0,0,8f521d45357a68fe1bd984513c58f6ea34cfc4b0f61fed4ffe8ed172f2ebf0d3,2025-03-11T14:15:24.090000 CVE-2025-0630,0,0,bb04cf8ef857d76c3a37bf8a5fa23865f63bacce52c7cbeba321e37955a961c9,2025-02-04T20:15:49.940000 @@ -283152,7 +283160,7 @@ CVE-2025-21160,0,0,6b334a84c69a9855c12112c928af4a4c4a440b166815806ff2e80c46e58c3 CVE-2025-21161,0,0,5000c6664e8559b4ee841730ccf5dbfb1e778e583a5b1ce1d480b9e4862bea7b,2025-03-03T15:23:28.213000 CVE-2025-21162,0,0,6d90726fc3556d421d764e82d05572f6298c459c0515652403080fdf9402e9b2,2025-02-11T18:15:28.567000 CVE-2025-21163,0,0,20b2c3143306a8345eb967634be1acfbad088c1be68181ebcf0b2c9944d91eda,2025-03-03T15:27:42.417000 -CVE-2025-21169,0,0,5a3bca32120073e5a1c495e3f019da8a1d88efc75cb769bc6bdae91428f74b23,2025-03-11T17:16:18.423000 +CVE-2025-21169,0,1,fd8996c3b78a40a44e64518a7009e0663a18d19ab6204206eb5335e690a3e759,2025-04-28T17:09:02.117000 CVE-2025-2117,0,0,1059047bb2180240c8be76ee1d3c7badf3b4027738ccdb1fd77f3462c3418c6a,2025-03-09T08:15:10.533000 CVE-2025-21170,0,0,3d95261ab68d7ca4b90895fa50ac07c7f00d9a9b51631435ed38025c386bd8f6,2025-04-14T15:10:23.137000 CVE-2025-21171,0,0,5039d30bbad3c7a9ef0d4706f8bc1f73414fca568f5dd18586207d2df517e5d5,2025-02-05T20:07:01.797000 @@ -283541,7 +283549,7 @@ CVE-2025-21587,0,0,aafaf99fd3282c569ee19a74cb69b80efbb9ed049df77c41bc5a714edd290 CVE-2025-21588,0,0,effa0c8fb2fb697da4a3d2669a0e631b55c43a5380f0c72fc59262c575d33496,2025-04-19T01:15:44.637000 CVE-2025-2159,0,0,c35f74dfe08a5e5a8f4d124ff145211eb32cd2a8c33fc42587e5543591991341,2025-04-07T14:18:15.560000 CVE-2025-21590,0,0,b36ae92dc904bf55dc4028b2cedf584a24120b0d6e0ef4bd06450d9ddd9f9379,2025-03-14T20:35:13.207000 -CVE-2025-21591,0,0,f32e5a3ff3f5737738865f7947fa4ff9466736186fcb9ebeaa4bded6546f54c4,2025-04-11T15:40:10.277000 +CVE-2025-21591,0,1,5ab5067c0cb484c9245ffc09d52f2a51963c6c92a83f473011e577cc927c8526,2025-04-28T17:15:48.227000 CVE-2025-21592,0,0,0a84f4727dd27f622e413c24aa51afb8f8c31954e309fc604ecc75437f628076,2025-01-09T17:15:18.203000 CVE-2025-21593,0,0,e4d522ec2585fd9f462af9cacf0614ec9db94ff7e8bb2d84aad64f6482447684,2025-01-09T17:15:18.380000 CVE-2025-21594,0,0,cbd0164e83b1ff3702e3375be934a22bbb4316ffc434fa755411e3e989fc375e,2025-04-11T15:40:10.277000 @@ -284899,7 +284907,7 @@ CVE-2025-23194,0,0,2abdaa039bd60248a2d82f5999a9ed81ae8b9d9f0da1d221293e79525f619 CVE-2025-23195,0,0,330ec078db97e6dc3fdb7cdbe57f6450c92255b88a9b52bc02ab0cb6754204fa,2025-01-22T15:15:15.237000 CVE-2025-23196,0,0,c86901772359f4512fdd147449b9ed6294fa0f580a5b9af77dfe2551cf2e530c,2025-01-22T15:15:15.390000 CVE-2025-23197,0,0,099217d7c50fa4e567446b5ed24de5a49493412d57096b7a33e5ff39354836a3,2025-01-27T18:15:41.037000 -CVE-2025-23198,0,0,cb7a5d11d31eb19b62e17084fecc295bc2441ea045d6d29032f75331dd24a5fd,2025-01-16T23:15:08.410000 +CVE-2025-23198,0,1,3cf38d53bcb86db60d0a510e98ef988ad397e5444ec65982c4e8cda6c4b1ff95,2025-04-28T16:44:31.910000 CVE-2025-23199,0,0,7153e244f8d44a69fd924672e7b401321c173985aa80bf61d90c87a5cf1f874a,2025-03-25T15:13:40.957000 CVE-2025-2320,0,0,54ae946db1d94a75f9dee3622c14a5b8a38a4658dc5f404d7fbaa5736fae5223,2025-03-14T22:15:11.747000 CVE-2025-23200,0,0,fcacc2d32c11a77659f45b1c51ab5a2465fad7ac9e692296dea6d4d1e65fa678,2025-03-25T15:12:30.793000 @@ -284960,9 +284968,9 @@ CVE-2025-23368,0,0,3fba7751170fbf245919938130180b8631c2c01153566e23c5e60aa4599df CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000 CVE-2025-2337,0,0,7d9e5607ad2b02dfc242a3305f849e66226e5392d822e3a7a605b0e9bacb542e,2025-03-17T15:15:44.983000 CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000 -CVE-2025-23375,1,1,60a30d666f924aa2a1fbd0b350cf2ba4f1fb00c61bf50d7a92b2da19469c598f,2025-04-28T15:15:45.157000 -CVE-2025-23376,1,1,99e3f948ddf7a678d5b136c1473e9784a345dad6cf941a73ebe22baa711ae193,2025-04-28T15:15:45.303000 -CVE-2025-23377,1,1,c7548c88f400297aaf76213175c31e191929777001aa7062816fa34d035e2829,2025-04-28T15:15:45.437000 +CVE-2025-23375,0,0,60a30d666f924aa2a1fbd0b350cf2ba4f1fb00c61bf50d7a92b2da19469c598f,2025-04-28T15:15:45.157000 +CVE-2025-23376,0,0,99e3f948ddf7a678d5b136c1473e9784a345dad6cf941a73ebe22baa711ae193,2025-04-28T15:15:45.303000 +CVE-2025-23377,0,0,c7548c88f400297aaf76213175c31e191929777001aa7062816fa34d035e2829,2025-04-28T15:15:45.437000 CVE-2025-23378,0,0,7d1f583ba2fbd4a87629a0c6e9b1a82753dab9032ddd798f8461f250af5dc576,2025-04-11T15:40:10.277000 CVE-2025-2338,0,0,d6a145ee9d99f0b331d4e327057f954207c4362f81df3d1dbf4d76a1b480aa57,2025-03-17T15:15:45.113000 CVE-2025-23382,0,0,22d0333b6ebd7b3c598a3add3cb34bf6adf53ccfd12bc4731614dfff20d58612,2025-03-19T16:15:30.787000 @@ -285919,7 +285927,7 @@ CVE-2025-24427,0,0,b8629d1fb7475a9dd2b96b196d37e16e6cee3c3707fe2da04f7187a220174 CVE-2025-24428,0,0,d362fd3d6b3216dc8e7bd86c697cdb90a903d9c76b342cb6299162b6ab48e211,2025-03-03T15:51:40.090000 CVE-2025-24429,0,0,3890fb9af95ea402a42f76d7522e17fb69a860e6735ccd8adf88141b140813e6,2025-04-16T14:27:27.770000 CVE-2025-24430,0,0,2d690f4c808e65333c8d6be4dc029f0fb527153402d8560e01c5c3848f8480f7,2025-04-16T14:25:10.510000 -CVE-2025-24431,0,0,c3cb69d459388144b798c5ea8d7506f3b4866058b96ea71bcbe1c6ae1118208e,2025-03-11T18:15:30.277000 +CVE-2025-24431,0,1,8ad11fb33b1a44d694d14c76e93589b4fd6ef23c40952fd9826e7a6c95da1022,2025-04-28T16:48:12.510000 CVE-2025-24432,0,0,2cd2bd48e51a6510f7b9b48d1d7758f38937969fb9e60d8b3d989c12250b3c10,2025-04-16T14:25:43.053000 CVE-2025-24434,0,0,9920d6fb3267001d64a4ef9122f274da945f412d258e8ff696af8a9032819c33,2025-04-16T14:22:46.843000 CVE-2025-24435,0,0,fbd4461ab584dc083848b332c94675aebd739d47ed1e4e1cbab7f6b1eca07214,2025-02-27T21:15:41.437000 @@ -285935,12 +285943,12 @@ CVE-2025-24444,0,0,647636ffe7ff72b15983b0abc2a3e4aab7b2deed062acf0eb294c895b2d1a CVE-2025-24445,0,0,642582fb1e4e4925eb11b91795bfa62bd7866c6426ae815f76e6742aab043e8a,2025-04-01T19:23:11.093000 CVE-2025-24446,0,0,8ea458277fc1e7e25b9d0aa08c82bc40bcad7fd97ededd768acf080a5620b90d,2025-04-21T18:40:25.117000 CVE-2025-24447,0,0,f0f7f9df0015fdc0c0aa497b98a0d2fc54cd5095fae4b879d2567be7ec6c1af3,2025-04-23T16:45:23.150000 -CVE-2025-24448,0,0,92fe73012e725b49bd396375c68a68d8b9ed29c7a5ac564ca7f989860080ec5e,2025-03-11T18:15:31.543000 -CVE-2025-24449,0,0,ec7bf425be00a5e3f888baa83e1ed5df8dbc232fae8233f3f93c333265e574e9,2025-03-11T18:15:31.700000 +CVE-2025-24448,0,1,96b7aa98342018c76306dce213abae2dc235999e5308613ca985ff2e529812dd,2025-04-28T16:49:28.407000 +CVE-2025-24449,0,1,aeb0aeb53043c5c130aabd0f5856f9580cf5396c1c47056ab7d68a44e0fe0e68,2025-04-28T16:49:35.060000 CVE-2025-24450,0,0,5b1b1327e79d552b1c3e074d0e7a479c30936e0b2ecca41c44335dc5b168c846,2025-04-18T14:52:45.263000 CVE-2025-24451,0,0,2101df5b4064a4d089949ee1b62361b56c6efd90c0110c114bf5aa5bf1ba29ea,2025-04-18T15:50:28.323000 -CVE-2025-24452,0,0,d04337215fd46e2552aeb46f8de70cebc9307ba152c6e8c3bf9802badf45edb6,2025-03-11T18:15:32.140000 -CVE-2025-24453,0,0,ea5ecdf639fa86511ad3263368759ff9ffa2685c9e14a55836c3a16600c97393,2025-03-11T18:15:32.297000 +CVE-2025-24452,0,1,3b3cc168ede6276d5b38ae00b969293f52d8ca3a9ed8366d8968b1c7f63e1f88,2025-04-28T17:05:00.350000 +CVE-2025-24453,0,1,0e4a54c7d670936d0b056840fda50ec552b9ccd95069b3187f9440d961631c19,2025-04-28T17:05:10.070000 CVE-2025-24456,0,0,d9c9319558b4dc57fc03dad7b8a246937d533b449f10c003d5f195a9361f5e8b,2025-01-30T21:28:52.003000 CVE-2025-24457,0,0,05da9f488d0dcdd3961130ee761713c1c134c5d7cd87b42c0364b434d3a85623,2025-01-30T21:31:24.150000 CVE-2025-24458,0,0,8fdab3bff09e0d5a6505ed060bcf7556a504946ddbff2902aa6888f1df89808e,2025-01-30T21:35:05.127000 @@ -286788,7 +286796,7 @@ CVE-2025-25770,0,0,97e9cbcf9f5eb368db8f03cd6097bc99f8f3fab4a945a4e034edb2a9ce72d CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000 CVE-2025-25774,0,0,217aaab1390f6b1eba60d1bc1ee5dcd1167d8b5507491fd4cc7d4a7ca3945256,2025-03-12T19:15:39.777000 CVE-2025-25775,0,0,5544670cc9a7add259c6e5cbf53cd850470977944146ac06f99bc3b124b05057,2025-04-25T18:15:25.937000 -CVE-2025-25776,1,1,569bad96221a4fb7f5d7ff11127e82bd4d257fb2f6a6b6e71240b92b84243bf0,2025-04-28T15:15:45.587000 +CVE-2025-25776,0,0,569bad96221a4fb7f5d7ff11127e82bd4d257fb2f6a6b6e71240b92b84243bf0,2025-04-28T15:15:45.587000 CVE-2025-25777,0,0,45f8b3c1c1f9d7109212dde9ce59be38e9992e6e24b2477c4857a0d7ca8e285e,2025-04-25T17:15:18.143000 CVE-2025-2578,0,0,d4dee3e12d3294c1c6910c7eef7307144aa2b73a2adfa63b47bbc637e9cbd042,2025-03-28T18:11:40.180000 CVE-2025-25783,0,0,6329df69fd0a54ba6d0f31849a17600b168da9709376108915818dc3764ea037,2025-04-07T19:11:53.150000 @@ -287551,25 +287559,25 @@ CVE-2025-27154,0,0,1e975d72bebdf47d7d7a2300b98253c7dc68fea542f552a8278b41ed85b5f CVE-2025-27155,0,0,fe50098f1c1a4fccdc1685634a60bb1b96134199c7cebbbfad4a6dd5f2e55f84,2025-03-04T17:15:18.833000 CVE-2025-27156,0,0,33b6d9723415e694fa28b1d8626d7c8b8845f954a5d4bd5c78c2f38f267b7027,2025-03-04T17:15:18.997000 CVE-2025-27157,0,0,82eb8d36063536d774ee636a24e368a87d8a8dd12b6203e709015057d075f7b0,2025-02-27T17:15:16.867000 -CVE-2025-27158,0,0,2daf76ea7143ce9001085757fd59198493288bb37595bf85a5e7bb6d4fe84b78,2025-03-12T14:15:16.323000 -CVE-2025-27159,0,0,3db0e4c3fea36d4fa0ef2ffb7fb2d91b899dcb7609c7b0f56f1a4ee8fd2a6c40,2025-03-11T18:15:33.687000 +CVE-2025-27158,0,1,a4342f283c95b2336796edb13f12480ae64f2aff386c41f7f6d4a9ff0084c40f,2025-04-28T16:48:57.070000 +CVE-2025-27159,0,1,2f9b24dfd027f02d1e6b8d6a62ae3d6a693e3eb8686197f20cc3a7089861a22d,2025-04-28T16:48:51.067000 CVE-2025-2716,0,0,f8c9f0ebbf6d0ac30b41eddd3d7a725be3cb0aececcdcaa7340ba42ad349a071,2025-03-27T16:45:46.410000 -CVE-2025-27160,0,0,84305a86164264fceb1038c928fafdc7bf8351a49af860596c035ecb81762dac,2025-03-11T18:15:33.840000 -CVE-2025-27161,0,0,f7505a760a062033744e7f91be1ba50a283b25fbb89db6d6c16686f31048c066,2025-03-11T18:15:33.993000 -CVE-2025-27162,0,0,245925fcef8c38dbd546669f6506b868b3103bc30d3a27ffc3a2bd056f3d731d,2025-03-11T18:15:34.150000 -CVE-2025-27163,0,0,24a38a21285cea3feef97a96713cf54c32008a9b547be2d90db38786bb09fe58,2025-03-12T14:15:16.447000 -CVE-2025-27164,0,0,d5ec5e5e42f16214b7d177452cf1f4f95272e66f2f639d769bcf9818b26d51c9,2025-03-12T14:15:16.557000 -CVE-2025-27166,0,0,a77d97ca83ff5b7652b04b662ebc500d798985bb571f2c2d1fd55240ade5a9ec,2025-03-11T18:15:34.580000 +CVE-2025-27160,0,1,a97b331d90ea87e8394d18c0ef34b433816984a7bc24fcef9085d6cd6416f31e,2025-04-28T16:48:47.240000 +CVE-2025-27161,0,1,e2daf6461b200bca09da7de40a88d9c467451fb23187bd82948c062f9b5be8c1,2025-04-28T16:48:42.960000 +CVE-2025-27162,0,1,b6d148bb543fa8cab2a2e14b6258dcc6bd02e7bfdcab4c409efcbc44ae504fb8,2025-04-28T16:48:39.727000 +CVE-2025-27163,0,1,d7b608e80ad9e3e5ff22a5370a25bb2f1f510a0500b9b9459f44d0d0d9d994f5,2025-04-28T16:48:36.780000 +CVE-2025-27164,0,1,f2e61b30bfe50722d30e1408917518e2a067a01043361c7c2d622deb5b8838d0,2025-04-28T16:48:33.017000 +CVE-2025-27166,0,1,5022e29cb2fc1ef4a7439717f59195861ec489ae1633e7bf61f51adda22ed1de,2025-04-28T17:05:20.700000 CVE-2025-27167,0,0,9fc03919f99441cc6e5924699f0b5c87cd969352015206acd2e76f4d0a20cd30,2025-03-31T20:06:44.963000 CVE-2025-27168,0,0,f99984308c3ede254daed21e56e764d668905b50bfa211ed61f2d84fac69bffd,2025-03-31T20:06:08.030000 -CVE-2025-27169,0,0,434a5f77144dfc1833eb8c9a6884bfbadc68cff15424ee166f5057c9c61a793e,2025-03-11T18:15:35.077000 +CVE-2025-27169,0,1,be9b9f78a7064ad30078aa4e626e4dd8b7de3a1e8ae19bedfc38b632ccf74d5e,2025-04-28T16:49:39.847000 CVE-2025-2717,0,0,a2a688c228e7eb03eb19b61a2532f80168264fd17e51134150518690e88bab28,2025-03-27T16:45:46.410000 CVE-2025-27170,0,0,4798b678d1edbc7dfece125d548cec25bb6248e6edea565df19aaaea350e970e,2025-03-31T20:02:08.903000 -CVE-2025-27171,0,0,c7cddc4600c8f7700a3b1290b96266106553920da50b623fc04dd64f8761bba1,2025-03-11T18:15:35.377000 -CVE-2025-27172,0,0,01bf953941621cac77f2041b0421fcceb11552687cbcf857082ae028a23af4aa,2025-03-11T17:16:44.420000 +CVE-2025-27171,0,1,c5335beb6d57e5752f80fb7665da22716afab9607b435ea3d0dd9e50d43e1305,2025-04-28T17:05:28.047000 +CVE-2025-27172,0,1,e1c53cb895e3ae3546d9c723aab6a572730584cfa6adb24ace9dfbbf4b100299,2025-04-28T17:09:12.360000 CVE-2025-27173,0,0,ed1886c4064a3181fbb6fd1c116d490e003b7a89f2d8fddd82adffa73f654996,2025-04-18T15:51:57.553000 -CVE-2025-27174,0,0,7ee5439b80bea2be02d60665a8a6f02e6182e2d8233d20944e112423989b3b1d,2025-03-11T18:15:35.600000 -CVE-2025-27175,0,0,2ed420f979005c7cd4792714feaee343d769a86fced5860fd76d1f42eeb6a18f,2025-03-11T18:15:35.743000 +CVE-2025-27174,0,1,f099f79be7d44f1998e9ebc64f5f9c0b6737f3c4f3e8c872aa132b1ecaca4d7e,2025-04-28T16:48:26.390000 +CVE-2025-27175,0,1,226cc5582ca11c1b3060bf385f7f474b24b2dcdfc397958ba0945ab39202cae1,2025-04-28T17:05:35.883000 CVE-2025-27176,0,0,bdc4506f305f9b3659fe00015e17df072b6852ab50cb498258b82edcf4083a64,2025-04-14T15:03:27.653000 CVE-2025-27177,0,0,4f91d448a89b9c1fac1467ab3dfd127b0557473731fe9e00499895f4d74c232c,2025-04-14T15:04:42.487000 CVE-2025-27178,0,0,d29f2db6dc1ac256c1e4a080de2aeb418fd675fa7ffe6763fc9e095c359dcf3c,2025-04-14T15:12:39.180000 @@ -288117,7 +288125,7 @@ CVE-2025-2804,0,0,05befb6a988325f06e55dd5b0c814f5549862889b3223abfcf82e08eebaa02 CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d084,2025-04-11T15:39:52.920000 CVE-2025-28059,0,0,0b528bcd391ca7d8898ab4bd4553bb61f607c8c85b3fa32f1b18963847081036,2025-04-22T15:16:10.627000 CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000 -CVE-2025-28072,0,0,cab87214a80f8749c06b5841c1db8f74f9d74fc422a41bb63feb6de8a80f6339,2025-04-17T20:21:48.243000 +CVE-2025-28072,0,1,9d11ce673db5bded08078d90348ac835537e426481654f68c0b7843b05bb341e,2025-04-28T17:38:00.493000 CVE-2025-28076,0,0,4b3ace752bd79aa40bed45b9f464f187bdbe196232dd42bfd5f98670192bb295,2025-04-25T17:15:18.327000 CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000 CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000 @@ -289121,7 +289129,7 @@ CVE-2025-30723,0,0,107e0efde3efcfbbc89ee1d8f0fb71ad136bb7dee254eee478ab3fa61fdeb CVE-2025-30724,0,0,afb8fa62d5d6fcfaed8904356fb8bb347da3bfd40a8a8cc928b9b3e4f12205db,2025-04-21T19:55:24.077000 CVE-2025-30725,0,0,4048cdf123bf3db89ba3c463e14fd40e123b4ebc18260655ef1ac1d11cd4dd77,2025-04-21T19:55:50 CVE-2025-30726,0,0,842cc13a9eea22e6496f732a2779fe14f2464d8c9f6b853dff05d5751706abd2,2025-04-21T19:56:07.200000 -CVE-2025-30727,0,0,2c4efc7fa314f185187ce4a91069dc8a5be25b29104153b39c7e35ccff73a588,2025-04-17T18:15:50.610000 +CVE-2025-30727,0,1,18f6c124d83d6def4fa6a27621a746908d90836b49db2485b68bf6236d4f002b,2025-04-28T16:39:27.290000 CVE-2025-30728,0,0,8c7012c8895e6c45b30ea392294a596344ede2e264e97db69868049ceee73b8a,2025-04-21T19:56:38.777000 CVE-2025-30729,0,0,b5e64c3629564fa8323c1ea024502fe8ad8dd53e300994621cf614c261050c67,2025-04-17T18:15:50.787000 CVE-2025-3073,0,0,f3681d43f6d5060e39b972d957f41d346f526327642a89482ea75106c90a3b34,2025-04-21T20:49:20.303000 @@ -290303,7 +290311,7 @@ CVE-2025-32427,0,0,57d3a7d2051dd0b51d8b12614834873286577350e593d5683068731d274c9 CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000 CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000 CVE-2025-32431,0,0,c841c5dc407677a5965f2a37065aa8f465f93e2d2ebac9e51959dc5b7aa3e0fc,2025-04-23T14:08:13.383000 -CVE-2025-32432,0,0,15580caf2c1aef66c0e7ee6408520126c8fc9b4f50cf3e8cd7feb6dfdf98b8e1,2025-04-25T20:15:39.380000 +CVE-2025-32432,0,1,fb667654062b639eba49f3cf2fc9e7e5212f83b6963b690fa57770a13727e1c6,2025-04-28T17:54:19.573000 CVE-2025-32433,0,0,eb03f4e830e2501a42be89d3762405d2579da6f00fe77868ee93e070f2059b4f,2025-04-25T23:15:16.993000 CVE-2025-32434,0,0,3d3061039e555845c648c2cd4ddde07ee66a966a450d5d2a63cf7163cec950d6,2025-04-21T14:23:45.950000 CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000 @@ -291073,9 +291081,9 @@ CVE-2025-3824,0,0,56ac75b3e0791de48608a5a0953aa87847d6feae89e7df934a8120c26b4cd0 CVE-2025-38240,0,0,117d76f4b128d7e0799c3952cf9e021270b3a89841576592d72d8a875350efe5,2025-04-21T14:23:45.950000 CVE-2025-3825,0,0,50eb08af52a75ca6289ab00f9e0a7dc8ebe66ac2ce41787241891ae1597136e4,2025-04-21T14:23:45.950000 CVE-2025-3826,0,0,58b5a85538e050320379bf73661a32e60a54a5e23d7d00e323f3b29d65e225bb,2025-04-21T14:23:45.950000 -CVE-2025-3827,0,0,ce998a80a89c10c948cff37c171bf4ad43e73f9589f60705d2944485b1a97b1c,2025-04-21T14:23:45.950000 -CVE-2025-3828,0,0,75ae8859cf5d2d046223c0ea3b49d80043eccc5e66f7ae119cd79833d3bb6c90,2025-04-21T14:23:45.950000 -CVE-2025-3829,0,0,c0d7e1e4c107236e619b8ae69b3f4b1813cc3d80005906b67c50fc84b5034d1c,2025-04-21T14:23:45.950000 +CVE-2025-3827,0,1,33bbba915b7b592866bfc3616cf9f0001aecfaf6e988592cd9c29413273dcae3,2025-04-28T17:38:47.400000 +CVE-2025-3828,0,1,3eb6d0b1a353f6b028229c911a6540176ee5d6c92be2c6f765dd3c51f26cdc06,2025-04-28T17:38:37.743000 +CVE-2025-3829,0,1,e1ca2d6d2777bda61e41d98906578fb71b99b717fead5680464fe3cb7ff1b258,2025-04-28T17:38:28.507000 CVE-2025-3830,0,0,6bf93d1ec199ff44ebeb61202499a9134a9dad0b72191e3e9575c4630eb48b35,2025-04-21T14:23:45.950000 CVE-2025-3832,0,0,0ced2438297a7076e8687c649669ac6c64082bd9b5207565fb3993cb9aefe11e,2025-04-24T09:15:32.250000 CVE-2025-3837,0,0,5a47b33afdb7e1907c95a70c26ce3ac05141d02d9782062528ed4ee5ab63acd5,2025-04-21T14:23:45.950000 @@ -291253,7 +291261,7 @@ CVE-2025-39586,0,0,52bb59767bbab516240eeb25d98c85fb9c17cc7c0a7291a452e44c2d2d8fd CVE-2025-39587,0,0,33b50d289bef4c6cf8e1d438372ef1b7294ade35fdd035c52b9205ffa75f7054,2025-04-17T20:21:05.203000 CVE-2025-39588,0,0,11c774fc5ce2f3ca664860ee721c9f2e869880e366a587e3ea483924c9217fef,2025-04-17T20:21:05.203000 CVE-2025-39589,0,0,b29715a124e04614d12bf3ec3760b977199c44ae1ab61b48901af87bf741aa31,2025-04-16T13:25:37.340000 -CVE-2025-3959,0,0,28c0f258cc0c12bce38df7670a8c07c3b0305490344aa8266596fffec0492b36,2025-04-27T05:15:14.913000 +CVE-2025-3959,0,1,84989fec81e4fdbc2959703d9b5671b6f84f9d2dfc74d84a36018eea62d0a2ea,2025-04-28T16:15:31.360000 CVE-2025-39590,0,0,cbdd893bfedbcc5d8fb6519f3f308a6d352d7fa479853807ae3480a0edfcba1b,2025-04-16T13:25:37.340000 CVE-2025-39591,0,0,e700c0dfaa8a5bae80ad0a0b7ed51d5cdc4aea4794301d82136f242a1a8957b1,2025-04-16T13:25:37.340000 CVE-2025-39592,0,0,e8ceb434cbf9e8e6650a1ba72155a574a58e7aa1902306fcf199521eadc1fdb4,2025-04-16T13:25:37.340000 @@ -291264,18 +291272,18 @@ CVE-2025-39596,0,0,e173976a1c0999b01b788ac1a4c5ae24f6505527b92ae9fe5f45ca8a72d79 CVE-2025-39597,0,0,b362997db93d9bfea0d7af44af4fd221eb0b25a2a82395ff55df61546df84055,2025-04-16T13:25:37.340000 CVE-2025-39598,0,0,73d622048aeed09278774e13f22cb598b1a5cb08b2f1dd7ec3313a376059ffea,2025-04-16T13:25:37.340000 CVE-2025-39599,0,0,091138247dcd1675bb93a1a469c4c7e89efe9b80c6a9739e4d163c5f536db88d,2025-04-16T13:25:37.340000 -CVE-2025-3960,0,1,9677322420fe33e07dfc504ad7254ea1d626cb41f3d5bf0542d2405976ebbf7a,2025-04-28T15:15:45.817000 +CVE-2025-3960,0,0,9677322420fe33e07dfc504ad7254ea1d626cb41f3d5bf0542d2405976ebbf7a,2025-04-28T15:15:45.817000 CVE-2025-39600,0,0,71f55bfcced2bb7d7f35d4ab207853635aec1cc4573a3ee9f10ef122db1f0de7,2025-04-16T13:25:37.340000 CVE-2025-39601,0,0,4f2eb6f0c2c624c12002346e13c479a2ea3b462ff0c42b3b14b9783c236c648a,2025-04-16T13:25:37.340000 CVE-2025-39602,0,0,372857ab0b3fa589d5d3849a523521babea3aee49aea0f2c09c05c2852655522,2025-04-16T13:25:37.340000 -CVE-2025-3961,0,1,4bac8fa6ffd06eead33e6e370e63a9d828b21c8d9f02a9990e5d2f449b575654,2025-04-28T15:15:45.943000 -CVE-2025-3962,0,1,509120d034512bf7590ee71a042f7320fc22247348ecd1057a0702893aabd58a,2025-04-28T15:15:46.060000 -CVE-2025-3963,0,1,71c436a30c3b10d07aaef3ba1920b96268b7af99010ea47f98671a9f77ec2757,2025-04-28T15:15:46.180000 -CVE-2025-3964,0,0,b21fb1af90e49351c094d0c93db5350a4a1ed4c9c3c93e6bf7307e295306726c,2025-04-27T09:15:15.540000 -CVE-2025-3965,0,0,a17d5bd0b47e8064ef7c9d5e1993630e1dc56ecc7264405e35a73c3f20bfee4c,2025-04-27T10:15:14.627000 -CVE-2025-3966,0,1,1d09051196710df394b8716799ff77adb1274f7749209046c5ec89183797b557,2025-04-28T15:15:46.290000 -CVE-2025-3967,0,1,375e3af67e01a929adfbae270af5ba8b0cc708d97363f459d8438dd196930c84,2025-04-28T15:15:46.410000 -CVE-2025-3968,0,1,9a203e8ad808a1fd51353ba4c2b2977bd9e3577749fb00ee64ccbcdb0f779556,2025-04-28T15:15:46.527000 +CVE-2025-3961,0,0,4bac8fa6ffd06eead33e6e370e63a9d828b21c8d9f02a9990e5d2f449b575654,2025-04-28T15:15:45.943000 +CVE-2025-3962,0,0,509120d034512bf7590ee71a042f7320fc22247348ecd1057a0702893aabd58a,2025-04-28T15:15:46.060000 +CVE-2025-3963,0,0,71c436a30c3b10d07aaef3ba1920b96268b7af99010ea47f98671a9f77ec2757,2025-04-28T15:15:46.180000 +CVE-2025-3964,0,1,d13121fc131ce8ddd81649682290a0eac5719b5c8396759ee15f9b54ed06be99,2025-04-28T16:15:31.693000 +CVE-2025-3965,0,1,5f82036adc9d902faf57bdaceffc3d2837ec07f75414258295f17dbcf7a0710a,2025-04-28T16:15:32.013000 +CVE-2025-3966,0,0,1d09051196710df394b8716799ff77adb1274f7749209046c5ec89183797b557,2025-04-28T15:15:46.290000 +CVE-2025-3967,0,0,375e3af67e01a929adfbae270af5ba8b0cc708d97363f459d8438dd196930c84,2025-04-28T15:15:46.410000 +CVE-2025-3968,0,0,9a203e8ad808a1fd51353ba4c2b2977bd9e3577749fb00ee64ccbcdb0f779556,2025-04-28T15:15:46.527000 CVE-2025-39688,0,0,98c7c61fe32c2ce6358a9d7ef0df54915bb47bee498593264d8ad933fcce6211,2025-04-21T14:23:45.950000 CVE-2025-3969,0,0,e13cfaa079ae5e2ea512c3bd056969d8efef50ef70aac260842aa3e5c549567b,2025-04-27T12:15:14.077000 CVE-2025-3970,0,0,7dfe31de7823dca76a8f72ec4f37c8d851a494db013815863a946195bede5d97,2025-04-27T13:15:14.550000 @@ -291283,17 +291291,17 @@ CVE-2025-3971,0,0,b6a0911b8d8d327777a5907887cb538046833daa6c5cee410dad7fc2d8c291 CVE-2025-3972,0,0,575245ec139ee05243662ecc4693f08b08894c5030048b9cb53fdb6e9c2ce858,2025-04-27T14:15:16.240000 CVE-2025-39728,0,0,1aabeb48c74961651a085e70675ac1fbb7850a26c8e3690479606fce3eed8d57,2025-04-21T14:23:45.950000 CVE-2025-3973,0,0,7185a71a7968bab05d8a7ab2de6648dc249e6a8df96171e643478fc72e2bd846,2025-04-27T15:15:15.577000 -CVE-2025-39735,0,1,96f9db3a9cd8ed512fd20eb50b496781a9c7b7582664dceb1a9693b9f654ce9e,2025-04-28T14:37:34.487000 +CVE-2025-39735,0,0,96f9db3a9cd8ed512fd20eb50b496781a9c7b7582664dceb1a9693b9f654ce9e,2025-04-28T14:37:34.487000 CVE-2025-3974,0,0,cc88a5551cfeb7a6ea2c180ac6862f1a69f07ceda7e1534a180ace6214ee67cb,2025-04-27T15:15:15.750000 -CVE-2025-3975,0,1,62bf110e98456b96adbb0e1d79c9b53117e1bf71d76b6104b5a677fa2f81ce42,2025-04-28T15:15:46.760000 -CVE-2025-39755,0,1,9592dfcb27feea4aabb5a7ba0dc0c6514650aa209fd5fe2f3ededbb735ed12fd,2025-04-28T15:32:46.553000 +CVE-2025-3975,0,0,62bf110e98456b96adbb0e1d79c9b53117e1bf71d76b6104b5a677fa2f81ce42,2025-04-28T15:15:46.760000 +CVE-2025-39755,0,0,9592dfcb27feea4aabb5a7ba0dc0c6514650aa209fd5fe2f3ededbb735ed12fd,2025-04-28T15:32:46.553000 CVE-2025-3976,0,0,13905d0f00709e6872151e7ad1b1a6c91b55e9419f2a701304870aa7e8e601fd,2025-04-27T16:15:15.433000 -CVE-2025-3977,0,1,c1e50e78d343274621129f20445321598604c72f47885898eb78406f21e52a8a,2025-04-28T14:15:21.520000 -CVE-2025-39778,0,1,fc2e9a1fb637bb73885f33b2d5ce93fc454f2a441f142db493ef48df409e1554,2025-04-28T15:37:34.230000 -CVE-2025-3978,0,1,bc92ce55af996f6b405f8d8b6d897abb53d44677d7371d599fe1529394f5a206,2025-04-28T14:15:21.640000 -CVE-2025-3979,0,1,3eed181a4a18815f5d24e2e7c49bc0dfd20618c1736a3e4c48366a678e45673f,2025-04-28T14:15:21.767000 -CVE-2025-3980,0,1,ba3e464d7879015ce3f1e955f56f48a0c9c49dc48a63db59cfbd3db7bbe9d790,2025-04-28T14:15:21.890000 -CVE-2025-3981,0,1,a9636669d8d4cb9261149c2b06c3c7be44e8490c89b8b9be4fb90813c912214f,2025-04-28T14:15:22.013000 +CVE-2025-3977,0,0,c1e50e78d343274621129f20445321598604c72f47885898eb78406f21e52a8a,2025-04-28T14:15:21.520000 +CVE-2025-39778,0,0,fc2e9a1fb637bb73885f33b2d5ce93fc454f2a441f142db493ef48df409e1554,2025-04-28T15:37:34.230000 +CVE-2025-3978,0,0,bc92ce55af996f6b405f8d8b6d897abb53d44677d7371d599fe1529394f5a206,2025-04-28T14:15:21.640000 +CVE-2025-3979,0,0,3eed181a4a18815f5d24e2e7c49bc0dfd20618c1736a3e4c48366a678e45673f,2025-04-28T14:15:21.767000 +CVE-2025-3980,0,0,ba3e464d7879015ce3f1e955f56f48a0c9c49dc48a63db59cfbd3db7bbe9d790,2025-04-28T14:15:21.890000 +CVE-2025-3981,0,0,a9636669d8d4cb9261149c2b06c3c7be44e8490c89b8b9be4fb90813c912214f,2025-04-28T14:15:22.013000 CVE-2025-3982,0,0,4f8f549d1d80deb736d2fa8a9bf8c95ff99706664721ec9ea5e797ffff0b5328,2025-04-27T19:15:15.923000 CVE-2025-3983,0,0,25cef30fdb4fe10ba7219695edb63044f6f8ab36f7472ef6a7410a1f5e2146f4,2025-04-27T20:15:15.350000 CVE-2025-3984,0,0,c91dac686fb472be23da0ee0c6a53588be8c31d73e3e88b2f873b4f69af09b70,2025-04-27T20:15:15.537000 @@ -291335,10 +291343,14 @@ CVE-2025-4018,0,0,b12b51cf30fc2db7d195c2c9ee830ba57f48502213630f4d9ad39d9d3bfacb CVE-2025-4019,0,0,026f93b3c776aee8c544c5f460bdd25f6379836f2a5d55dda570425a7ee6b846,2025-04-28T12:15:32.093000 CVE-2025-4020,0,0,511fd7ea80791808b10d31addcf8c936b71df14f2c24338c3857d1e24f7e838a,2025-04-28T13:15:24.603000 CVE-2025-4021,0,0,c6b32e73983711a929174c81d1269e862674efafae7a66852d16c04025876af8,2025-04-28T13:15:24.773000 -CVE-2025-4022,1,1,a011d38395c9e900e4bcada9858b098f8d7441fd9b3e763ec79c0a9945d82071,2025-04-28T14:15:22.867000 -CVE-2025-4023,1,1,85c9398c80f20a209b25f610ddf665ce3506d1e4fe920218361ca91662c22eb5,2025-04-28T14:15:23.043000 -CVE-2025-4024,1,1,0ac57cf9887f802b63cc7c5701c4d82c5287aedf4b9f1ab63ff42a695cbedb85,2025-04-28T15:15:47.600000 -CVE-2025-4025,1,1,1b1b49f00b16e2bf6d2e9a008bc6dc606c5611760e84fe2041b0af8493c82b9a,2025-04-28T15:15:47.767000 +CVE-2025-4022,0,0,a011d38395c9e900e4bcada9858b098f8d7441fd9b3e763ec79c0a9945d82071,2025-04-28T14:15:22.867000 +CVE-2025-4023,0,0,85c9398c80f20a209b25f610ddf665ce3506d1e4fe920218361ca91662c22eb5,2025-04-28T14:15:23.043000 +CVE-2025-4024,0,0,0ac57cf9887f802b63cc7c5701c4d82c5287aedf4b9f1ab63ff42a695cbedb85,2025-04-28T15:15:47.600000 +CVE-2025-4025,0,0,1b1b49f00b16e2bf6d2e9a008bc6dc606c5611760e84fe2041b0af8493c82b9a,2025-04-28T15:15:47.767000 +CVE-2025-4026,1,1,cce91bbee10df5f8c822ce76db6a87e8b7103d2c6375f1db1dd4e8cc7a8dd3cd,2025-04-28T16:15:35.950000 +CVE-2025-4027,1,1,b9606bdc1ba6adba471f06de72ef507952c2adc7cb6907ee3c0d3879718eb308,2025-04-28T16:15:36.470000 +CVE-2025-4028,1,1,e4ea8519b3b52a320cc7bbe978eeb954ef7cf293c2b3050d56b4bd526f5ae0b6,2025-04-28T17:15:50.833000 +CVE-2025-4029,1,1,c735ba9a7cb9d532e031cec8077fd7c43ac39f2ec982b638ec50931c3b1eb38a,2025-04-28T17:15:51.047000 CVE-2025-40325,0,0,21d661e5b65e79dd3cd00a7c9db2e14d6a6a65a1394969a7ad07f16fa08c79ce,2025-04-21T14:23:45.950000 CVE-2025-40364,0,0,e1468b00bb22572a62ec1b141065bed37efcb85f9368d87c29b0ce5bc57ec67c,2025-04-21T14:23:45.950000 CVE-2025-41395,0,0,c0d9bccd77abd47bebe5c3b7233aa41647dd331b6362659738a8c7fec7081455,2025-04-24T07:15:31.600000 @@ -291363,7 +291375,9 @@ CVE-2025-43708,0,0,d38c003beeae09584e47fb48659652128bc4a5d2c5ae13da147de319358e0 CVE-2025-43715,0,0,16cf4954d648fd87012f5a88d33c7f63ff2347a1f446f7ec65261364d5ff03d8,2025-04-17T20:21:48.243000 CVE-2025-43716,0,0,942d9da6d1d11b7e44e92183e29b2dcda16aacc979e7b61fcced7212d78b7efb,2025-04-23T14:15:29.447000 CVE-2025-43717,0,0,9a5c2cc8033daf666161adde3c155f3dbd039d2947998bab4e09970ac87bf337,2025-04-17T20:21:48.243000 +CVE-2025-43854,1,1,c904cd97f33a33006445f1a59ca2188c1e8e351bab5f800cb8ff290af0f96239,2025-04-28T16:15:33.043000 CVE-2025-43855,0,0,89c49bb48618f5eb2fcfbc9060120f9bc69bd44937ea09b2f96421366ab84cc2,2025-04-24T14:15:59.483000 +CVE-2025-43857,1,1,2a6fb54c759c78303c4e01604ba42896863cd0f01079b69fd098af2ba8be7298,2025-04-28T16:15:33.440000 CVE-2025-43858,0,0,6135fc3a2c70726bd0117147e4b5de08ca6b05e10e49e5b85bebdc485444e4e3,2025-04-24T19:15:46.947000 CVE-2025-43859,0,0,9c8f68f1885a17efde866e94f7eb1f796770f2f58d9c657b272a62f4513f80dc,2025-04-24T19:15:47.060000 CVE-2025-43861,0,0,0a9911ce62089da5ef22f7f52e7f71dbabdf5371d45baf19050a113e24d44792,2025-04-24T21:15:24.310000 @@ -291383,9 +291397,9 @@ CVE-2025-43903,0,0,00b37505e4bad1c011979aeeb7ac0f46d600f0a3a2ddd582ccd8bfed7356e CVE-2025-43916,0,0,681d8be38d92746749b1aa52bc81a99ae8dcb7d5c6c1be22a9ecf0d141bf9654,2025-04-21T14:23:45.950000 CVE-2025-43917,0,0,6cbc8a0cc4b5f4a260ea1bcaa2e61bc873dc43de357e9552c071e8ec2a49bca5,2025-04-21T14:23:45.950000 CVE-2025-43918,0,0,c6804f12f91fd2a33114034d2a7e21d55151c0cf36b011a784bd1cc327d47c14,2025-04-21T14:23:45.950000 -CVE-2025-43919,0,1,755abcb8d09616a195e9d6af1306163e6a8ac43b52edd282a6c37eaf3c4a6f2b,2025-04-28T14:15:22.137000 -CVE-2025-43920,0,1,a93ea085d5c9b285842c20a6cabb6e3bd669bd42c39c42462b7c06195a41f1d6,2025-04-28T14:15:22.323000 -CVE-2025-43921,0,1,4042bcd81d7e3864da5b8ba4d01fe494ca12b33f201fc6021c6725eb890091e8,2025-04-28T14:15:22.477000 +CVE-2025-43919,0,0,755abcb8d09616a195e9d6af1306163e6a8ac43b52edd282a6c37eaf3c4a6f2b,2025-04-28T14:15:22.137000 +CVE-2025-43920,0,0,a93ea085d5c9b285842c20a6cabb6e3bd669bd42c39c42462b7c06195a41f1d6,2025-04-28T14:15:22.323000 +CVE-2025-43921,0,0,4042bcd81d7e3864da5b8ba4d01fe494ca12b33f201fc6021c6725eb890091e8,2025-04-28T14:15:22.477000 CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000 CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000 CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000 @@ -291461,7 +291475,7 @@ CVE-2025-46272,0,0,6723f88845cee1e1cbb0cc8f1bfd044966d04b97767ef53e121be0034a68b CVE-2025-46273,0,0,d17f1c243c8f331f47f487cb9b89ff51d5b9a1113a60ac7af8fce23396651144,2025-04-24T23:15:15.673000 CVE-2025-46274,0,0,6278bbb431335706a41e3628a533ceb0ce48f92d57ea7b392bf579f553e8b8c6,2025-04-24T23:15:15.827000 CVE-2025-46275,0,0,a7109528e796df3e754eeba6ee8017193e4e96b7dbaf347dc967b55909d9e9a5,2025-04-24T23:15:15.977000 -CVE-2025-46333,0,1,3f604e4ec484052a98804d8813a23cfbac08509ef9dc35db23d61edbd2f31482,2025-04-28T15:15:47.057000 +CVE-2025-46333,0,0,3f604e4ec484052a98804d8813a23cfbac08509ef9dc35db23d61edbd2f31482,2025-04-28T15:15:47.057000 CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000 CVE-2025-46375,0,0,c7cadd24d0c0ef6263c2e4f0e993c1b14e1cbac838119ad2f4f42dcfb3b1b113,2025-04-24T03:15:15.867000 CVE-2025-46376,0,0,4a4eb88dda9426fffae031e9cc4c1cb39c01ffb8fef76394b4584f59d8624ab6,2025-04-24T03:15:15.917000 @@ -291576,6 +291590,7 @@ CVE-2025-46580,0,0,a9a217e464ecb8260bf9ae8b0d5d75ba3dcf10e015f0e9c0846d999bae0fb CVE-2025-46595,0,0,3d64797336ab3d29ebb48d9b6595869fa146266b8e3098cce58e2b6e11a6c3ac,2025-04-25T03:15:20.583000 CVE-2025-46599,0,0,507c3921a2341d2bbda9e73d2f3cef8c521c3ee588d0088efd73881d2da1db15,2025-04-25T05:15:33.330000 CVE-2025-46613,0,0,c48180eccd77c40df8c85716a27825c73f40f821a5c287102bad660993d5c122,2025-04-25T06:15:46.273000 +CVE-2025-46614,1,1,8fb1d2738a7f3b20cca6bcaae0da487cd1fba45b9558b52431284a06f08ea141,2025-04-28T16:15:35.083000 CVE-2025-46616,0,0,a899c01942322aaf4f0e54385dcbf304be6206e7d0a7cbc8da65f1136abf3660,2025-04-25T07:15:48.643000 CVE-2025-46617,0,0,0a7076cf7f3609fe9a571db7fa627ac3f8092649c6d5f22185fe55b885a04a63,2025-04-25T07:15:48.837000 CVE-2025-46618,0,0,4e5b2699bfdedc6ad58a2dd050f1132b14684461f25e6c5475feda78ee59e7e9,2025-04-25T15:15:40.957000 @@ -291585,13 +291600,13 @@ CVE-2025-46653,0,0,ef2c2588ef89c2be60dffff5cf2fbf7f6b584e234cba5660dbff8aaa5fdfd CVE-2025-46654,0,0,572c4d63fa2f8afca64ec12e1381813d160fa2c2ee84d4e0448e47cdcd412a94,2025-04-26T21:15:15.100000 CVE-2025-46655,0,0,a9f672e75f586721e3ec47d88a24167a5da40f45a10ccbe0303bfb6061c72944,2025-04-26T21:15:15.260000 CVE-2025-46656,0,0,696b18d293f3e47530d9a462ec4dcce6fe7c7473fa83e2a90e8336464b46aa30,2025-04-26T22:15:17.260000 -CVE-2025-46657,0,0,61b5714a3945d18f5b1028d9d01f06343b4f515928a414fd8f4acc9db2248fff,2025-04-27T17:15:16.193000 -CVE-2025-46661,0,1,2337e0af0721676a9a8551219ea6d6cbd8b1bdbec9e22e2c7f7acea8c59de4a9,2025-04-28T14:15:22.637000 +CVE-2025-46657,0,1,6cef0bcf1d0448e3b206356f0be72e2315698d283328929c8c83aaf093ed56df,2025-04-28T17:15:49.390000 +CVE-2025-46661,0,0,2337e0af0721676a9a8551219ea6d6cbd8b1bdbec9e22e2c7f7acea8c59de4a9,2025-04-28T14:15:22.637000 CVE-2025-46672,0,0,a515f04f2684525b908fbd5bf52c62317ae3f104cec7ce6d3fbe0f544f2f50f4,2025-04-27T01:15:44.327000 CVE-2025-46673,0,0,b4b185c7af04fb38cea193788026d34ee5cbd860f38177d871857854e4306632,2025-04-27T01:15:44.477000 -CVE-2025-46674,0,0,46444152edd713c1307e6ccc5d1033b322cbe1d07cb6f10dea38fc2301d3d28e,2025-04-27T01:15:44.623000 -CVE-2025-46675,0,0,b3c69f529ef42425a6977cddb596299cf9685586acba195a28c535b569b687f2,2025-04-27T01:15:44.773000 +CVE-2025-46674,0,1,9b4c47bcaa2d552a098eaaf9090048ff882c9e78eb9ef812ef70c78dc712e69a,2025-04-28T17:15:49.617000 +CVE-2025-46675,0,1,717a5d845a87c84db73ac3899d4442a6033b7fe43c9c0a7149df9f551c28608b,2025-04-28T17:15:49.753000 CVE-2025-46687,0,0,789cec1c054b7dade348dec5c2f11d4567b685dabe9a5263743b00e5f6421591,2025-04-27T20:15:15.720000 -CVE-2025-46688,0,0,f3d2ea119df6e35adcd93220be80edb4d0564ed70f8b95b8ee493efc04bb42de,2025-04-27T20:15:15.877000 -CVE-2025-46689,0,0,df61c7fa04f2295b97b44c9b4f62ae63006d7d17b1ad7ac0116b1444f3f3d9cb,2025-04-27T22:15:15.217000 -CVE-2025-46690,0,0,6bfe253c8cc88312c677faf61d3422e7114d27d86036aa18751c0651f1aa1225,2025-04-27T22:15:15.360000 +CVE-2025-46688,0,1,4dcaf459d1214c1fd112181be060e2fa86815eff236d04811b394f32d4fe2571,2025-04-28T17:15:50.027000 +CVE-2025-46689,0,1,f3c11f10028d7dd675c8f2978229f01a7f947a0f04ba5f7df704edd72d110412,2025-04-28T17:15:50.193000 +CVE-2025-46690,0,1,42fecef5d8939239454369c3c08b610359a85e154acaf4999d2e5ba7248e3acc,2025-04-28T17:15:50.363000