From 449b33ff4a13a6f03c32d13892b6daac146c10a3 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 7 Apr 2025 14:04:12 +0000 Subject: [PATCH] Auto-Update: 2025-04-07T14:00:27.941453+00:00 --- CVE-2023/CVE-2023-200xx/CVE-2023-20025.json | 2 +- CVE-2023/CVE-2023-372xx/CVE-2023-37265.json | 2 +- CVE-2024/CVE-2024-54xx/CVE-2024-5463.json | 2 +- CVE-2025/CVE-2025-00xx/CVE-2025-0050.json | 33 +++ CVE-2025/CVE-2025-241xx/CVE-2025-24192.json | 6 +- CVE-2025/CVE-2025-241xx/CVE-2025-24193.json | 6 +- CVE-2025/CVE-2025-241xx/CVE-2025-24194.json | 2 +- CVE-2025/CVE-2025-241xx/CVE-2025-24195.json | 6 +- CVE-2025/CVE-2025-241xx/CVE-2025-24196.json | 6 +- CVE-2025/CVE-2025-241xx/CVE-2025-24198.json | 6 +- CVE-2025/CVE-2025-241xx/CVE-2025-24199.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24202.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24203.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24205.json | 2 +- CVE-2025/CVE-2025-242xx/CVE-2025-24207.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24208.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24209.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24210.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24211.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24212.json | 2 +- CVE-2025/CVE-2025-242xx/CVE-2025-24213.json | 2 +- CVE-2025/CVE-2025-242xx/CVE-2025-24214.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24215.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24216.json | 2 +- CVE-2025/CVE-2025-242xx/CVE-2025-24217.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24218.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24221.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24228.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24229.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24235.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24244.json | 2 +- CVE-2025/CVE-2025-242xx/CVE-2025-24246.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24247.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24249.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24250.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24253.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24254.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24255.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24256.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24257.json | 2 +- CVE-2025/CVE-2025-242xx/CVE-2025-24259.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24260.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24261.json | 2 +- CVE-2025/CVE-2025-242xx/CVE-2025-24272.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24273.json | 6 +- CVE-2025/CVE-2025-242xx/CVE-2025-24276.json | 2 +- CVE-2025/CVE-2025-304xx/CVE-2025-30438.json | 2 +- CVE-2025/CVE-2025-304xx/CVE-2025-30439.json | 6 +- CVE-2025/CVE-2025-304xx/CVE-2025-30443.json | 6 +- CVE-2025/CVE-2025-304xx/CVE-2025-30444.json | 6 +- CVE-2025/CVE-2025-304xx/CVE-2025-30446.json | 6 +- CVE-2025/CVE-2025-304xx/CVE-2025-30447.json | 6 +- CVE-2025/CVE-2025-304xx/CVE-2025-30449.json | 2 +- CVE-2025/CVE-2025-304xx/CVE-2025-30450.json | 6 +- CVE-2025/CVE-2025-304xx/CVE-2025-30452.json | 6 +- CVE-2025/CVE-2025-304xx/CVE-2025-30454.json | 6 +- CVE-2025/CVE-2025-304xx/CVE-2025-30455.json | 6 +- CVE-2025/CVE-2025-30xx/CVE-2025-3028.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3029.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3030.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3031.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3032.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3033.json | 4 + CVE-2025/CVE-2025-30xx/CVE-2025-3066.json | 6 +- CVE-2025/CVE-2025-30xx/CVE-2025-3068.json | 2 +- CVE-2025/CVE-2025-30xx/CVE-2025-3069.json | 2 +- CVE-2025/CVE-2025-30xx/CVE-2025-3070.json | 2 +- CVE-2025/CVE-2025-311xx/CVE-2025-31192.json | 2 +- CVE-2025/CVE-2025-33xx/CVE-2025-3350.json | 145 +++++++++++++ CVE-2025/CVE-2025-33xx/CVE-2025-3351.json | 145 +++++++++++++ CVE-2025/CVE-2025-33xx/CVE-2025-3352.json | 145 +++++++++++++ CVE-2025/CVE-2025-33xx/CVE-2025-3353.json | 145 +++++++++++++ CVE-2025/CVE-2025-33xx/CVE-2025-3359.json | 60 ++++++ CVE-2025/CVE-2025-33xx/CVE-2025-3360.json | 60 ++++++ README.md | 67 +++--- _state.csv | 217 ++++++++++---------- 76 files changed, 1139 insertions(+), 196 deletions(-) create mode 100644 CVE-2025/CVE-2025-00xx/CVE-2025-0050.json create mode 100644 CVE-2025/CVE-2025-33xx/CVE-2025-3350.json create mode 100644 CVE-2025/CVE-2025-33xx/CVE-2025-3351.json create mode 100644 CVE-2025/CVE-2025-33xx/CVE-2025-3352.json create mode 100644 CVE-2025/CVE-2025-33xx/CVE-2025-3353.json create mode 100644 CVE-2025/CVE-2025-33xx/CVE-2025-3359.json create mode 100644 CVE-2025/CVE-2025-33xx/CVE-2025-3360.json diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json index 6a09f6536ab..0fec1749bca 100644 --- a/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20025.json @@ -3,7 +3,7 @@ "sourceIdentifier": "psirt@cisco.com", "published": "2023-01-20T07:15:14.490", "lastModified": "2025-03-12T17:15:38.057", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37265.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37265.json index d8062630e02..be805787dc2 100644 --- a/CVE-2023/CVE-2023-372xx/CVE-2023-37265.json +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37265.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security-advisories@github.com", "published": "2023-07-17T21:15:09.653", "lastModified": "2024-12-12T21:15:07.420", - "vulnStatus": "Modified", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5463.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5463.json index b0afd1a5edf..dc3e724f914 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5463.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5463.json @@ -3,7 +3,7 @@ "sourceIdentifier": "security@synology.com", "published": "2024-06-04T10:15:12.747", "lastModified": "2025-03-04T18:43:31.607", - "vulnStatus": "Analyzed", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0050.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0050.json new file mode 100644 index 00000000000..f03c2a0f25e --- /dev/null +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0050.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-0050", + "sourceIdentifier": "arm-security@arm.com", + "published": "2025-04-07T12:15:15.360", + "lastModified": "2025-04-07T12:15:15.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to make valid GPU processing operations, including via WebGL or WebGPU, to access a limited amount outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r0p0 through r49p2, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r19p0 through r49p2, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p2, from r50p0 through r53p0." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "arm-security@arm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://developer.arm.com/documentation/110435/latest/", + "source": "arm-security@arm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24192.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24192.json index fa39e76abe4..dcf68f16c62 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24192.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24192.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:17.567", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A script imports issue was addressed with improved isolation. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Visiting a website may leak sensitive data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema con la importaci\u00f3n de scripts mejorando el aislamiento. Este problema est\u00e1 corregido en Safari 18.4, visionOS 2.4, iOS 18.4, iPadOS 18.4 y macOS Sequoia 15.4. Visitar un sitio web puede filtrar datos confidenciales." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24193.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24193.json index e2ff479b721..0332712f7f9 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24193.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24193.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:17.703", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved authentication. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker with a USB-C connection to an unlocked device may be able to programmatically access photos." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la autenticaci\u00f3n. Este problema se solucion\u00f3 en iOS 18.4 y iPadOS 18.4. Un atacante con una conexi\u00f3n USB-C a un dispositivo desbloqueado podr\u00eda acceder a las fotos mediante programaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24194.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24194.json index c64148a1b51..ec5b52ae73b 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24194.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24194.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:17.807", "lastModified": "2025-04-02T16:17:41.203", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24195.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24195.json index d391fd05812..29bc82d08cf 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24195.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24195.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:17.903", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A user may be able to elevate privileges." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un desbordamiento de enteros mejorando la validaci\u00f3n de entrada. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que un usuario pueda elevar privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24196.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24196.json index d0059feae65..ef18d6683a3 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24196.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24196.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:18.007", "lastModified": "2025-04-01T21:15:42.420", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A type confusion issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with user privileges may be able to read kernel memory." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de confusi\u00f3n de tipos mejorando la gesti\u00f3n de memoria. Este problema se solucion\u00f3 en macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante con privilegios de usuario podr\u00eda leer la memoria del kernel." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24198.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24198.json index 632a9eea5ee..d81041b9372 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24198.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24198.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:18.103", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker with physical access may be able to use Siri to access sensitive user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 restringiendo las opciones disponibles en un dispositivo bloqueado. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, iOS 18.4 y iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante con acceso f\u00edsico podr\u00eda usar Siri para acceder a datos confidenciales del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24199.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24199.json index 222b7602902..b11fb71ef36 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24199.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24199.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:18.193", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An uncontrolled format string issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause a denial-of-service." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de formato no controlado con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda causar una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24202.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24202.json index 3df457c7bf8..16531a18f81 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24202.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24202.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:18.293", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de registro mejorando la redacci\u00f3n de datos. Este problema se solucion\u00f3 en iOS 18.4, iPadOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24203.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24203.json index f311f1b6353..74fd85e2f80 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24203.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24203.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:18.383", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda modificar partes protegidas del sistema de archivos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24205.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24205.json index 480b1883c88..497f79676b6 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24205.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24205.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:18.580", "lastModified": "2025-04-02T16:17:41.380", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24207.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24207.json index 4aabb2547e9..8c651645a3e 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24207.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24207.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:18.680", "lastModified": "2025-04-01T21:15:42.580", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to enable iCloud storage features without user consent." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda habilitar funciones de almacenamiento de iCloud sin el consentimiento del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24208.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24208.json index 1e8e041dbef..2767ee1ded8 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24208.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24208.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:18.773", "lastModified": "2025-04-01T21:15:42.757", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4. Loading a malicious iframe may lead to a cross-site scripting attack." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema est\u00e1 corregido en Safari 18.4, iOS 18.4 y iPadOS 18.4. Cargar un iframe malicioso puede provocar un ataque de cross-site scripting." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24209.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24209.json index d605207e5f2..4ee99f32cc6 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24209.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24209.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:18.870", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Processing maliciously crafted web content may lead to an unexpected process crash." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de desbordamiento de b\u00fafer mejorando la gesti\u00f3n de memoria. Este problema se solucion\u00f3 en tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, y macOS Sequoia 15.4. El procesamiento de contenido web malintencionado puede provocar un bloqueo inesperado del proceso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24210.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24210.json index e9b2a8f2237..884428cc2d6 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24210.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24210.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:18.963", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logic error was addressed with improved error handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Parsing an image may lead to disclosure of user information." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un error l\u00f3gico mejorando la gesti\u00f3n de errores. Este problema se solucion\u00f3 en visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. El an\u00e1lisis de una imagen puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24211.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24211.json index ddb5a70c8c9..e0d2f6b2248 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24211.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24211.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:19.087", "lastModified": "2025-04-01T21:15:42.897", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted video file may lead to unexpected app termination or corrupt process memory." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Procesar un archivo de v\u00eddeo manipulado con fines maliciosos puede provocar el cierre inesperado de la aplicaci\u00f3n o la corrupci\u00f3n de la memoria del proceso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24212.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24212.json index efe11ce16ef..5a88f20b61a 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24212.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24212.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:19.203", "lastModified": "2025-04-02T14:16:04.270", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24213.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24213.json index fed440821fc..28f1a510d54 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24213.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24213.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:19.300", "lastModified": "2025-04-03T18:15:44.770", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24214.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24214.json index 92157d611f9..3019a30bbab 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24214.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24214.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:19.400", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privacy issue was addressed by not logging contents of text fields. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de privacidad al no registrar el contenido de los campos de texto. Este problema se solucion\u00f3 en visionOS 2.4, iOS 18.4, iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24215.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24215.json index f8ff3fb6eb1..0de25a123d5 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24215.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24215.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:19.490", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a informaci\u00f3n privada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24216.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24216.json index d1e4878f500..5dcaa1c80cb 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24216.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24216.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:19.593", "lastModified": "2025-04-03T21:15:39.373", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24217.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24217.json index 98bec9db90d..15b5acea085 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24217.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24217.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:19.697", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la redacci\u00f3n de informaci\u00f3n confidencial. Este problema est\u00e1 corregido en iOS 18.4, iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24218.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24218.json index d30086fafc0..0a42d337b08 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24218.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24218.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:19.793", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.4. An app may be able to access information about a user's contacts." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas del registro. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a la informaci\u00f3n de los contactos de un usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24221.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24221.json index c5f7cab78e4..98e5c222190 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24221.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24221.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:19.893", "lastModified": "2025-04-02T14:16:04.507", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved data access restriction. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6. Sensitive keychain data may be accessible from an iOS backup." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la restricci\u00f3n de acceso a datos. Este problema se solucion\u00f3 en visionOS 2.4, iOS 18.4, iPadOS 18.4 y iPadOS 17.7.6. Es posible acceder a datos confidenciales del llavero desde una copia de seguridad de iOS." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24228.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24228.json index dd281bdfad7..8adaf2c5a20 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24228.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24228.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:20.080", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to execute arbitrary code with kernel privileges." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de desbordamiento de b\u00fafer mejorando la gesti\u00f3n de memoria. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda ejecutar c\u00f3digo arbitrario con privilegios de kernel." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24229.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24229.json index 08f5411f36a..5b345bb6ae8 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24229.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24229.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:20.180", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A sandboxed app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema l\u00f3gico mejorando las comprobaciones. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n en un entorno aislado podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24235.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24235.json index 667639fed50..2eb46c122c2 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24235.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24235.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:20.770", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A remote attacker may be able to cause unexpected app termination or heap corruption." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de inicializaci\u00f3n de memoria mejorando su gesti\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante remoto podr\u00eda provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n o la corrupci\u00f3n del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24244.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24244.json index 6d974841cb7..03541f52a23 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24244.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24244.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:21.620", "lastModified": "2025-04-02T16:17:41.717", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24246.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24246.json index 52bf028f4ff..046e5303819 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24246.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24246.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:21.820", "lastModified": "2025-04-01T21:15:43.040", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An injection issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de inyecci\u00f3n mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24247.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24247.json index 09ceb885069..62419f17ff7 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24247.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24247.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:21.917", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A type confusion issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker may be able to cause unexpected app termination." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de confusi\u00f3n de tipos mejorando las comprobaciones. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante podr\u00eda provocar el cierre inesperado de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24249.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24249.json index c99197a0e77..7fee9fc581d 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24249.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24249.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:22.090", "lastModified": "2025-04-01T21:15:43.183", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to check the existence of an arbitrary path on the file system." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones de la sandbox adicionales.. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda comprobar la existencia de una ruta arbitraria en el sistema de archivos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24250.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24250.json index 4d1ad805cc1..535516631ad 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24250.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24250.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:22.187", "lastModified": "2025-04-01T21:15:43.330", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved access restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app acting as a HTTPS proxy could get access to sensitive user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando las restricciones de acceso. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa que act\u00fae como proxy HTTPS podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24253.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24253.json index 83ed85e3c70..c5c13097467 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24253.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24253.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:22.283", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos protegidos del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24254.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24254.json index 09bdc07bb50..25ed1e672d7 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24254.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24254.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:22.380", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A user may be able to elevate privileges." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la validaci\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que un usuario pueda elevar privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24255.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24255.json index dffaf1a1fd2..b9e04527148 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24255.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24255.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:22.477", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A file access issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de acceso a archivos mejorando la validaci\u00f3n de entrada. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24256.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24256.json index c4156046e9e..eac152f17b2 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24256.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24256.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:22.570", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to disclose kernel memory." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando las comprobaciones de los l\u00edmites. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda revelar memoria del kernel." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24257.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24257.json index f1f96b73d2f..db5574ba22b 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24257.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24257.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:22.673", "lastModified": "2025-04-03T14:15:31.043", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24259.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24259.json index 9184f50f092..67accdd4d4a 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24259.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24259.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:22.820", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with additional entitlement checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to retrieve Safari bookmarks without an entitlement check." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 con comprobaciones de derechos adicionales. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda recuperar marcadores de Safari sin una comprobaci\u00f3n de derechos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24260.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24260.json index ccf925805b3..92569389129 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24260.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24260.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:22.960", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An attacker in a privileged position may be able to perform a denial-of-service." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un atacante con privilegios podr\u00eda realizar una denegaci\u00f3n de servicio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24261.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24261.json index fdf349eba03..941a766c7ee 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24261.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24261.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:23.060", "lastModified": "2025-04-02T16:17:41.877", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24272.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24272.json index 85a77e622f7..922d413146d 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24272.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24272.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:23.807", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda modificar partes protegidas del sistema de archivos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24273.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24273.json index 21c864919ef..a04ed1d0244 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24273.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24273.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:23.910", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination or corrupt kernel memory." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de escritura fuera de los l\u00edmites mejorando la comprobaci\u00f3n de los l\u00edmites. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda provocar la finalizaci\u00f3n inesperada del sistema o da\u00f1ar la memoria del kernel." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24276.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24276.json index 052892f5ab9..1e9ff069120 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24276.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24276.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:24.003", "lastModified": "2025-04-02T16:17:42.060", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30438.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30438.json index 1ee13ddb5ae..5912e6b9288 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30438.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30438.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:25.887", "lastModified": "2025-04-02T16:17:42.927", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30439.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30439.json index 3eba3108907..10ba2c0af20 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30439.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30439.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:25.987", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An attacker with physical access to a locked device may be able to view sensitive user information." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema se solucion\u00f3 en visionOS 2.4, iOS 18.4 y iPadOS 18.4, y macOS Sequoia 15.4. Un atacante con acceso f\u00edsico a un dispositivo bloqueado podr\u00eda acceder a informaci\u00f3n confidencial del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30443.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30443.json index b0976581054..16498226aa6 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30443.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30443.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:26.173", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privacy issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de privacidad eliminando el c\u00f3digo vulnerable. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30444.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30444.json index 9573b7a6742..1fadeee5d01 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30444.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30444.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:26.260", "lastModified": "2025-04-02T14:16:13.203", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A race condition was addressed with improved locking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Mounting a maliciously crafted SMB network share may lead to system termination." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 una condici\u00f3n de ejecuci\u00f3n mejorando el bloqueo. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Montar un recurso compartido de red SMB manipulado con fines maliciosos puede provocar la interrupci\u00f3n del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30446.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30446.json index fe539e1e669..da3992a2a48 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30446.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30446.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:26.360", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app with root privileges may be able to modify the contents of system files." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa con privilegios de root podr\u00eda modificar el contenido de los archivos del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30447.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30447.json index 1a004122447..d9b4a4899c7 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30447.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30447.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:26.450", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was resolved by sanitizing logging This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "El problema se resolvi\u00f3 depurando el registro. Este problema est\u00e1 corregido en visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30449.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30449.json index 934ec3bfbd6..7b4cff77104 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30449.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30449.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:26.553", "lastModified": "2025-04-03T18:15:45.357", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30450.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30450.json index f992c86ce54..d0b3ecb5e73 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30450.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30450.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:26.643", "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la validaci\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30452.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30452.json index 05c317e2c3e..5d71a8dbc60 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30452.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30452.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:26.830", "lastModified": "2025-04-02T14:16:13.400", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An input validation issue was addressed." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Se solucion\u00f3 un problema de validaci\u00f3n de entrada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30454.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30454.json index 8250d76460c..1a5a096f640 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30454.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30454.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:26.930", "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. A malicious app may be able to access private information." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de gesti\u00f3n de rutas mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Sonoma 14.7.5, iOS 18.4 y iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a informaci\u00f3n privada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30455.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30455.json index 469acc8d584..c1fe7ef045e 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30455.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30455.json @@ -3,12 +3,16 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:27.033", "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a informaci\u00f3n privada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3028.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3028.json index 831158fb341..51f6459a0ed 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3028.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3028.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability affects Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9." + }, + { + "lang": "es", + "value": "La ejecuci\u00f3n de c\u00f3digo JavaScript al transformar un documento con XSLTProcessor podr\u00eda provocar un use-after-free. Esta vulnerabilidad afecta a Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137 y Thunderbird < 128.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3029.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3029.json index 7c7cf9fe325..b3b0968b02f 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3029.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3029.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9." + }, + { + "lang": "es", + "value": "Una URL manipulada que contiene caracteres Unicode espec\u00edficos podr\u00eda haber ocultado el verdadero origen de la p\u00e1gina, lo que podr\u00eda dar lugar a un ataque de suplantaci\u00f3n de identidad. Esta vulnerabilidad afecta a Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137 y Thunderbird < 128.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3030.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3030.json index bb32c6ab7ef..529815f7519 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3030.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3030.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9." + }, + { + "lang": "es", + "value": "Errores de seguridad de memoria presentes en Firefox 136, Thunderbird 136, Firefox ESR 128.8 y Thunderbird 128.8. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de memoria y presumimos que, con suficiente esfuerzo, algunos de ellos podr\u00edan haberse explotado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137 y Thunderbird < 128.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3031.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3031.json index 7cc94c09600..9532ab2b1e4 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3031.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3031.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "An attacker could read 32 bits of values spilled onto the stack in a JIT compiled function. This vulnerability affects Firefox < 137 and Thunderbird < 137." + }, + { + "lang": "es", + "value": "Un atacante podr\u00eda leer 32 bits de valores vertidos en la pila en una funci\u00f3n compilada JIT. Esta vulnerabilidad afecta a Firefox (versi\u00f3n anterior a la 137) y Thunderbird (versi\u00f3n anterior a la 137)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3032.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3032.json index ee605253d66..42d16ff22f9 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3032.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3032.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "Leaking of file descriptors from the fork server to web content processes could allow for privilege escalation attacks. This vulnerability affects Firefox < 137 and Thunderbird < 137." + }, + { + "lang": "es", + "value": "La filtraci\u00f3n de descriptores de archivos del servidor de bifurcaci\u00f3n a los procesos de contenido web podr\u00eda permitir ataques de escalada de privilegios. Esta vulnerabilidad afecta a Firefox (versi\u00f3n anterior a la 137) y Thunderbird (versi\u00f3n anterior a la 137)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3033.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3033.json index a6f9b683fa7..93b3386de53 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3033.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3033.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "After selecting a malicious Windows `.url` shortcut from the local filesystem, an unexpected file could be uploaded. \n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 137 and Thunderbird < 137." + }, + { + "lang": "es", + "value": "Tras seleccionar un acceso directo malicioso de Windows `.url` desde el sistema de archivos local, podr\u00eda cargarse un archivo inesperado. *Este error solo afecta a Firefox en Windows. Otros sistemas operativos no se ven afectados.* Esta vulnerabilidad afecta a Firefox (versi\u00f3n anterior a la 137) y Thunderbird (versi\u00f3n anterior a la 137)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3066.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3066.json index f1877c06b03..58d5be93a30 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3066.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3066.json @@ -3,12 +3,16 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-04-02T01:15:37.873", "lastModified": "2025-04-02T14:58:07.527", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Navigations in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "El use-after-free en las navegaciones de Google Chrome anteriores a la versi\u00f3n 135.0.7049.52 permit\u00eda a un atacante remoto explotar la corrupci\u00f3n del mont\u00f3n mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3068.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3068.json index da878c616db..dc23a64b9f0 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3068.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3068.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-04-02T01:15:38.093", "lastModified": "2025-04-03T14:15:44.400", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3069.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3069.json index 0bc9e196b3e..deae6b3b056 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3069.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3069.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-04-02T01:15:38.187", "lastModified": "2025-04-03T14:15:44.560", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3070.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3070.json index d6a1ed8424e..7777db410f9 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3070.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3070.json @@ -3,7 +3,7 @@ "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-04-02T01:15:38.283", "lastModified": "2025-04-03T18:15:48.053", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31192.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31192.json index 4d4aabb65ae..2fbb90eca92 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31192.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31192.json @@ -3,7 +3,7 @@ "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:29.230", "lastModified": "2025-04-03T21:15:40.627", - "vulnStatus": "Awaiting Analysis", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3350.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3350.json new file mode 100644 index 00000000000..ed915c6c5d0 --- /dev/null +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3350.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3350", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-07T12:15:16.100", + "lastModified": "2025-04-07T12:15:16.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Old Age Home Management System 1.0. Affected is an unknown function of the file /admin/view-enquiry.php. The manipulation of the argument viewid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/n0name-yang/myCVE/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303564", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303564", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.552051", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3351.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3351.json new file mode 100644 index 00000000000..70537154fdd --- /dev/null +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3351.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3351", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-07T12:15:16.380", + "lastModified": "2025-04-07T12:15:16.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/n0name-yang/myCVE/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303565", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303565", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.552130", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3352.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3352.json new file mode 100644 index 00000000000..21cb5fc06f0 --- /dev/null +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3352.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3352", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-07T13:15:42.643", + "lastModified": "2025-04-07T13:15:42.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Old Age Home Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit-scdetails.php. The manipulation of the argument contnum leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/n0name-yang/myCVE/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303566", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303566", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.552171", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3353.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3353.json new file mode 100644 index 00000000000..94ecf936b0e --- /dev/null +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3353.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3353", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-07T13:15:43.313", + "lastModified": "2025-04-07T13:15:43.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Men Salon Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument cost leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/LaneyYu/cve/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303567", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303567", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.552239", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3359.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3359.json new file mode 100644 index 00000000000..04b81f2f773 --- /dev/null +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3359.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3359", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-04-07T13:15:43.510", + "lastModified": "2025-04-07T13:15:43.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in GNUPlot. A segmentation fault via IO_str_init_static_internal may jeopardize the environment." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3359", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357749", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3360.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3360.json new file mode 100644 index 00000000000..262c5d162ec --- /dev/null +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3360.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3360", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-04-07T13:15:43.687", + "lastModified": "2025-04-07T13:15:43.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3360", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357754", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 849a0c564bf..2770532e599 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-07T12:00:26.598863+00:00 +2025-04-07T14:00:27.941453+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-07T11:15:53.807000+00:00 +2025-04-07T13:15:43.687000+00:00 ``` ### Last Data Feed Release @@ -33,44 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -288831 +288838 ``` ### CVEs added in the last Commit -Recently added CVEs: `38` +Recently added CVEs: `7` -- [CVE-2024-45557](CVE-2024/CVE-2024-455xx/CVE-2024-45557.json) (`2025-04-07T11:15:50.020`) -- [CVE-2024-49848](CVE-2024/CVE-2024-498xx/CVE-2024-49848.json) (`2025-04-07T11:15:50.183`) -- [CVE-2025-21421](CVE-2025/CVE-2025-214xx/CVE-2025-21421.json) (`2025-04-07T11:15:50.360`) -- [CVE-2025-21423](CVE-2025/CVE-2025-214xx/CVE-2025-21423.json) (`2025-04-07T11:15:50.533`) -- [CVE-2025-21425](CVE-2025/CVE-2025-214xx/CVE-2025-21425.json) (`2025-04-07T11:15:50.697`) -- [CVE-2025-21428](CVE-2025/CVE-2025-214xx/CVE-2025-21428.json) (`2025-04-07T11:15:50.870`) -- [CVE-2025-21429](CVE-2025/CVE-2025-214xx/CVE-2025-21429.json) (`2025-04-07T11:15:51.047`) -- [CVE-2025-21430](CVE-2025/CVE-2025-214xx/CVE-2025-21430.json) (`2025-04-07T11:15:51.220`) -- [CVE-2025-21431](CVE-2025/CVE-2025-214xx/CVE-2025-21431.json) (`2025-04-07T11:15:51.440`) -- [CVE-2025-21434](CVE-2025/CVE-2025-214xx/CVE-2025-21434.json) (`2025-04-07T11:15:51.600`) -- [CVE-2025-21435](CVE-2025/CVE-2025-214xx/CVE-2025-21435.json) (`2025-04-07T11:15:51.783`) -- [CVE-2025-21436](CVE-2025/CVE-2025-214xx/CVE-2025-21436.json) (`2025-04-07T11:15:51.970`) -- [CVE-2025-21437](CVE-2025/CVE-2025-214xx/CVE-2025-21437.json) (`2025-04-07T11:15:52.123`) -- [CVE-2025-21438](CVE-2025/CVE-2025-214xx/CVE-2025-21438.json) (`2025-04-07T11:15:52.290`) -- [CVE-2025-21439](CVE-2025/CVE-2025-214xx/CVE-2025-21439.json) (`2025-04-07T11:15:52.457`) -- [CVE-2025-21440](CVE-2025/CVE-2025-214xx/CVE-2025-21440.json) (`2025-04-07T11:15:52.613`) -- [CVE-2025-21441](CVE-2025/CVE-2025-214xx/CVE-2025-21441.json) (`2025-04-07T11:15:52.777`) -- [CVE-2025-21442](CVE-2025/CVE-2025-214xx/CVE-2025-21442.json) (`2025-04-07T11:15:52.933`) -- [CVE-2025-21443](CVE-2025/CVE-2025-214xx/CVE-2025-21443.json) (`2025-04-07T11:15:53.087`) -- [CVE-2025-21447](CVE-2025/CVE-2025-214xx/CVE-2025-21447.json) (`2025-04-07T11:15:53.243`) -- [CVE-2025-21448](CVE-2025/CVE-2025-214xx/CVE-2025-21448.json) (`2025-04-07T11:15:53.397`) -- [CVE-2025-3346](CVE-2025/CVE-2025-33xx/CVE-2025-3346.json) (`2025-04-07T10:15:15.153`) -- [CVE-2025-3347](CVE-2025/CVE-2025-33xx/CVE-2025-3347.json) (`2025-04-07T10:15:16.700`) -- [CVE-2025-3348](CVE-2025/CVE-2025-33xx/CVE-2025-3348.json) (`2025-04-07T11:15:53.607`) -- [CVE-2025-3349](CVE-2025/CVE-2025-33xx/CVE-2025-3349.json) (`2025-04-07T11:15:53.807`) +- [CVE-2025-0050](CVE-2025/CVE-2025-00xx/CVE-2025-0050.json) (`2025-04-07T12:15:15.360`) +- [CVE-2025-3350](CVE-2025/CVE-2025-33xx/CVE-2025-3350.json) (`2025-04-07T12:15:16.100`) +- [CVE-2025-3351](CVE-2025/CVE-2025-33xx/CVE-2025-3351.json) (`2025-04-07T12:15:16.380`) +- [CVE-2025-3352](CVE-2025/CVE-2025-33xx/CVE-2025-3352.json) (`2025-04-07T13:15:42.643`) +- [CVE-2025-3353](CVE-2025/CVE-2025-33xx/CVE-2025-3353.json) (`2025-04-07T13:15:43.313`) +- [CVE-2025-3359](CVE-2025/CVE-2025-33xx/CVE-2025-3359.json) (`2025-04-07T13:15:43.510`) +- [CVE-2025-3360](CVE-2025/CVE-2025-33xx/CVE-2025-3360.json) (`2025-04-07T13:15:43.687`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `67` +- [CVE-2025-24272](CVE-2025/CVE-2025-242xx/CVE-2025-24272.json) (`2025-04-01T20:26:22.890`) +- [CVE-2025-24273](CVE-2025/CVE-2025-242xx/CVE-2025-24273.json) (`2025-04-01T20:26:22.890`) +- [CVE-2025-24276](CVE-2025/CVE-2025-242xx/CVE-2025-24276.json) (`2025-04-02T16:17:42.060`) +- [CVE-2025-3028](CVE-2025/CVE-2025-30xx/CVE-2025-3028.json) (`2025-04-02T07:15:42.047`) +- [CVE-2025-3029](CVE-2025/CVE-2025-30xx/CVE-2025-3029.json) (`2025-04-02T07:15:42.240`) +- [CVE-2025-3030](CVE-2025/CVE-2025-30xx/CVE-2025-3030.json) (`2025-04-02T07:15:42.400`) +- [CVE-2025-3031](CVE-2025/CVE-2025-30xx/CVE-2025-3031.json) (`2025-04-01T20:26:11.547`) +- [CVE-2025-3032](CVE-2025/CVE-2025-30xx/CVE-2025-3032.json) (`2025-04-01T20:26:11.547`) +- [CVE-2025-3033](CVE-2025/CVE-2025-30xx/CVE-2025-3033.json) (`2025-04-01T20:26:11.547`) +- [CVE-2025-30438](CVE-2025/CVE-2025-304xx/CVE-2025-30438.json) (`2025-04-02T16:17:42.927`) +- [CVE-2025-30439](CVE-2025/CVE-2025-304xx/CVE-2025-30439.json) (`2025-04-01T20:26:22.890`) +- [CVE-2025-30443](CVE-2025/CVE-2025-304xx/CVE-2025-30443.json) (`2025-04-01T20:26:22.890`) +- [CVE-2025-30444](CVE-2025/CVE-2025-304xx/CVE-2025-30444.json) (`2025-04-02T14:16:13.203`) +- [CVE-2025-30446](CVE-2025/CVE-2025-304xx/CVE-2025-30446.json) (`2025-04-01T20:26:22.890`) +- [CVE-2025-30447](CVE-2025/CVE-2025-304xx/CVE-2025-30447.json) (`2025-04-01T20:26:22.890`) +- [CVE-2025-30449](CVE-2025/CVE-2025-304xx/CVE-2025-30449.json) (`2025-04-03T18:15:45.357`) +- [CVE-2025-30450](CVE-2025/CVE-2025-304xx/CVE-2025-30450.json) (`2025-04-01T20:26:22.890`) +- [CVE-2025-30452](CVE-2025/CVE-2025-304xx/CVE-2025-30452.json) (`2025-04-02T14:16:13.400`) +- [CVE-2025-30454](CVE-2025/CVE-2025-304xx/CVE-2025-30454.json) (`2025-04-01T20:26:11.547`) +- [CVE-2025-30455](CVE-2025/CVE-2025-304xx/CVE-2025-30455.json) (`2025-04-01T20:26:11.547`) +- [CVE-2025-3066](CVE-2025/CVE-2025-30xx/CVE-2025-3066.json) (`2025-04-02T14:58:07.527`) +- [CVE-2025-3068](CVE-2025/CVE-2025-30xx/CVE-2025-3068.json) (`2025-04-03T14:15:44.400`) +- [CVE-2025-3069](CVE-2025/CVE-2025-30xx/CVE-2025-3069.json) (`2025-04-03T14:15:44.560`) +- [CVE-2025-3070](CVE-2025/CVE-2025-30xx/CVE-2025-3070.json) (`2025-04-03T18:15:48.053`) +- [CVE-2025-31192](CVE-2025/CVE-2025-311xx/CVE-2025-31192.json) (`2025-04-03T21:15:40.627`) ## Download and Usage diff --git a/_state.csv b/_state.csv index dc338d6f4c9..14c935cacbc 100644 --- a/_state.csv +++ b/_state.csv @@ -215958,7 +215958,7 @@ CVE-2023-20021,0,0,6a2ead76fe3b5fece57fab974d3dca57ab9246b1314eab0aca14a39bca71f CVE-2023-20022,0,0,d267e0083fa8403d8442c1bf3ac09340316446610d4d9e217c496ffce4b54016,2024-11-21T07:40:22.303000 CVE-2023-20023,0,0,95a83439fbba19b6c21fbdc0ee9b15f3bc03f36ffb8301951be300882be1433a,2024-11-21T07:40:22.423000 CVE-2023-20024,0,0,aa588e3440809485fc0865169fec554102a73a44873c6d779aa0ba291a537e5a,2024-11-21T07:40:22.540000 -CVE-2023-20025,0,0,7b708217288967d1f049583a0ad1765fc1005217df4064d5a16a8ec9b6f695b3,2025-03-12T17:15:38.057000 +CVE-2023-20025,0,1,4104603099ef1c5aedbec6932919518c007b1230bf8b0c2eac697a6975ce6a23,2025-03-12T17:15:38.057000 CVE-2023-20026,0,0,272df819d8802e4491b01fa5debaff60c45bbda833969382da3ea7ac9da6879a,2025-03-12T17:15:38.390000 CVE-2023-20027,0,0,643e4bd75b063b0079399886a3cd15f103694e59618950e3fd9d839bb6b1e293,2024-11-21T07:40:23.213000 CVE-2023-20028,0,0,8e75e4e2dea98ed8067b7183e305b57df6b136b6188b420e71399619665060df,2024-11-21T07:40:23.390000 @@ -229724,7 +229724,7 @@ CVE-2023-37261,0,0,0239f7b5360086a6d5bc0e4bbc33e050f686758daf9d69a5a7063701324cc CVE-2023-37262,0,0,6d3b52f2eb1b40d52ae791a848feb328ff228ebb60f1fc4a76188e241b5b927c,2024-11-21T08:11:20.197000 CVE-2023-37263,0,0,c815ae44858c527a06287982052d6180bed851f52d34cfd67a6498874f228f57,2024-11-21T08:11:20.737000 CVE-2023-37264,0,0,aaa6fff09681995d412b88925e6417eb3bab56465dfce9dc5a493e556c4c596d,2024-11-21T08:11:20.890000 -CVE-2023-37265,0,0,1d3cf2dc629f4d59c7a9fc5db58856dbc5bc762c8a713a96e3c97543e695785f,2024-12-12T21:15:07.420000 +CVE-2023-37265,0,1,f9b476d8ebbccff55574c5079322c589fb6466a8f3b2522e58ce544fc738da59,2024-12-12T21:15:07.420000 CVE-2023-37266,0,0,60e1eb97fa2dab45ec4d14f6b5a8d8aa62950dcc6baed85afc6d096e93e94d2f,2024-12-12T21:15:07.550000 CVE-2023-37267,0,0,e8b2b8f21ed54d8265017da786122811bfa578be8da741f117061f9ac2c0c3f6,2024-11-21T08:11:21.350000 CVE-2023-37268,0,0,8251e774de8aa0dd28ebf2412c57bee6323818051c9af992b22ef6110dfa4739,2024-11-21T08:11:21.493000 @@ -259155,7 +259155,7 @@ CVE-2024-33054,0,0,eb35959fe5046cee87f0e8375744b9b7bc2ba82e7db4c375d7ced8537946b CVE-2024-33055,0,0,7c9e78356ea47dcbc89353ee30ccd5e6cfb6bfa32a09ff7878bb6085bcfa6ee7,2025-01-10T17:01:45.937000 CVE-2024-33056,0,0,0b7f547ee3c89f47ebb165988f3996dbfd5d0b368f985cca939e232e93a6befa,2024-12-12T15:25:15.440000 CVE-2024-33057,0,0,1c92c61ecb7a8765b124d1e703614674040ea44a90e7d048beb7b1c44c6de717,2024-09-04T17:06:24.843000 -CVE-2024-33058,1,1,71119cf68c85528a945accff14afb3102a2a739e3f9dfc46b23d1bcb9e44a841,2025-04-07T11:15:47.723000 +CVE-2024-33058,0,0,71119cf68c85528a945accff14afb3102a2a739e3f9dfc46b23d1bcb9e44a841,2025-04-07T11:15:47.723000 CVE-2024-33059,0,0,b9157366e9b41bb8006e58246e65f5bdeba75ea2269f83b299649471535ea483,2025-01-10T16:53:02.590000 CVE-2024-3306,0,0,b1314b7809f51d374a0b9fae0657d8eb066c2cd2b31a15a930e406526126c0e9,2024-09-19T14:43:51.830000 CVE-2024-33060,0,0,d63fb9907aa3cb0bc7501efbfaa4a069641c9b88fabbf41becf835cca562c14e,2024-09-04T17:06:08.407000 @@ -266747,7 +266747,7 @@ CVE-2024-43040,0,0,24c7fc00bcabba765361dc058df000d90f1495a06d1cc7d23caabc1efe8ac CVE-2024-43042,0,0,7a4652f9042c3f41111ed646c3bc80b0acd0b77a5c21df60dcb23d137df071e0,2025-03-19T21:15:36.690000 CVE-2024-43044,0,0,c4209c28206f9930924ad89b590b0214e2b8c592601a3113522972c0c3512431,2025-03-14T20:15:13.470000 CVE-2024-43045,0,0,e1d9d7cac2404f2fa69e6a0d5951f7e836ae37782e145990d14492651417b2da,2025-03-25T17:16:05.413000 -CVE-2024-43046,1,1,59b30c6c64f67b276c4a2380c7f308ef28e8710bde99a9f0bd16d8bc31c6b77c,2025-04-07T11:15:47.930000 +CVE-2024-43046,0,0,59b30c6c64f67b276c4a2380c7f308ef28e8710bde99a9f0bd16d8bc31c6b77c,2025-04-07T11:15:47.930000 CVE-2024-43047,0,0,2c5673a0391a31abbf47c1d000c3d121e6564230b66ed0524b815e5850f22723,2024-10-09T14:39:06.540000 CVE-2024-43048,0,0,aa462510e6501f1c68792d4463cb05868dde51c2c7f830d9a1911363c50be659,2024-12-12T15:27:48.080000 CVE-2024-43049,0,0,396d2f1d473f42654eb07e32ffbaf51737e64004525269d29bf446d276b04cfd,2024-12-12T15:28:13.420000 @@ -266759,7 +266759,7 @@ CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a CVE-2024-43055,0,0,7e68211c963d2ff760c24658730a611fc46626d88b11ffcade7ed8bb42df2da0,2025-03-06T21:10:26.277000 CVE-2024-43056,0,0,c709d99a9c57195719219014d58cf5e642c2b7965166d3a5f70846b24eb1e019,2025-03-06T17:45:19.570000 CVE-2024-43057,0,0,5538ac0e54d78c3c5f43cc7d8d3e67e9f64cfefd871834bfb39f91c51faf6afc,2025-03-06T17:45:06.040000 -CVE-2024-43058,1,1,735ec971d35e89f052ab970fc6b9410dd77f15f69ff7e74154d75377c7d41085,2025-04-07T11:15:48.127000 +CVE-2024-43058,0,0,735ec971d35e89f052ab970fc6b9410dd77f15f69ff7e74154d75377c7d41085,2025-04-07T11:15:48.127000 CVE-2024-43059,0,0,d22b29979bbbb30378d68440ca3150b1ca88ccf70d8d61f49a1a1b7c0bcabc6c,2025-03-06T17:44:58.433000 CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000 CVE-2024-43060,0,0,e41eb30c9c993454ca734a3f293648983ebcd9ebaa7031f549a74814e1ef3eef,2025-03-06T17:44:50.600000 @@ -266767,9 +266767,9 @@ CVE-2024-43061,0,0,fb182e78e0995c70b127000883dbbc7ed4ab09a8eb85c1eb852bc4e1d3c9a CVE-2024-43062,0,0,36f03b47d147510dd25f7b8f8bf05b284295e8006754a49f54a555f3c2ad2fa0,2025-03-06T17:44:32.433000 CVE-2024-43063,0,0,8753ed6cced2789acaf67947f81e20495a0bebb4d20a1a7648ba9c44702bfc30,2025-01-10T15:37:33.340000 CVE-2024-43064,0,0,3bca3804c5d22727d53d3aebc24210f9425875c9c0a366159e62b07b6f538d51,2025-01-13T21:50:35.483000 -CVE-2024-43065,1,1,8a8e9a6f5aed60bb35bd1b4708dcbddc60300b20e976adf7717d20edbc33bf5e,2025-04-07T11:15:48.287000 -CVE-2024-43066,1,1,5ab52e69593d91b751dde043cd6e5a03f5a70b514c1b17f24fba0a1cc3eda39f,2025-04-07T11:15:48.460000 -CVE-2024-43067,1,1,b51e194079dd7f17fb75e6e0c5219b5959b4264ff60415b573e57b69f234f8d6,2025-04-07T11:15:48.637000 +CVE-2024-43065,0,0,8a8e9a6f5aed60bb35bd1b4708dcbddc60300b20e976adf7717d20edbc33bf5e,2025-04-07T11:15:48.287000 +CVE-2024-43066,0,0,5ab52e69593d91b751dde043cd6e5a03f5a70b514c1b17f24fba0a1cc3eda39f,2025-04-07T11:15:48.460000 +CVE-2024-43067,0,0,b51e194079dd7f17fb75e6e0c5219b5959b4264ff60415b573e57b69f234f8d6,2025-04-07T11:15:48.637000 CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000 CVE-2024-43077,0,0,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000 CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000 @@ -268748,23 +268748,23 @@ CVE-2024-45528,0,0,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0c CVE-2024-4553,0,0,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000 CVE-2024-45537,0,0,e4991fccb3abdc03f0d41abc273d14fb886e4c1626430be204dd2dbbe1a63e8d,2025-03-14T15:15:42.430000 CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000 -CVE-2024-45540,1,1,3b439f2cae01051944a5f696ba0864d4b974ea9419a29927960f84dc28dac98f,2025-04-07T11:15:48.793000 +CVE-2024-45540,0,0,3b439f2cae01051944a5f696ba0864d4b974ea9419a29927960f84dc28dac98f,2025-04-07T11:15:48.793000 CVE-2024-45541,0,0,7bc24c44f4f9bd7697d862f7d910f24b6bebcc62d1e5328093c22ff5b5ee1516,2025-01-13T21:50:41.947000 CVE-2024-45542,0,0,544927305ba1aba828ea865286fa34c1bb838eb7cbfd7cf386021b4578f770cc,2025-01-13T21:50:54.197000 -CVE-2024-45543,1,1,c29c7521755eac6af60510beeb533ba6a2036a2da32296b0560ae29df7bcd769,2025-04-07T11:15:48.967000 -CVE-2024-45544,1,1,7b53fc2454d632c88af471d3574c34886813f32f6c5d7fbb04c218143e5c64f7,2025-04-07T11:15:49.127000 +CVE-2024-45543,0,0,c29c7521755eac6af60510beeb533ba6a2036a2da32296b0560ae29df7bcd769,2025-04-07T11:15:48.967000 +CVE-2024-45544,0,0,7b53fc2454d632c88af471d3574c34886813f32f6c5d7fbb04c218143e5c64f7,2025-04-07T11:15:49.127000 CVE-2024-45546,0,0,45d0e78965279e2527d9fac31d804a2ad5a6404ea1571336157308334b299190,2025-01-13T21:50:47.413000 CVE-2024-45547,0,0,5d512f519ac50af5c2d2303fdbfb1d0aab0102e735aa75e851d06b0043ee4734,2025-01-13T21:51:01.123000 CVE-2024-45548,0,0,1ab6b9cb5f94b9efb2c033a1ed336c76093923588ef73962d79be6376d1d64da,2025-01-13T21:51:07.337000 -CVE-2024-45549,1,1,9543b5d3c84677b26e6fb03ce6d4bfd3aa3981c087c588eb5469b3575d86f837,2025-04-07T11:15:49.290000 +CVE-2024-45549,0,0,9543b5d3c84677b26e6fb03ce6d4bfd3aa3981c087c588eb5469b3575d86f837,2025-04-07T11:15:49.290000 CVE-2024-4555,0,0,42addb69d2a25e76680bd75ca9680f4458507a72790c92c0c02ea27cb2860a95,2024-09-12T15:13:25.520000 CVE-2024-45550,0,0,a4972bc0de06d20bcb20a737d9e8c081db8380caa2905028e2db10cf8468771f,2025-01-13T21:51:13.887000 -CVE-2024-45551,1,1,489aee46175586f4c3c953ec980854a62174a10c0dfeafd975924b9b6e655877,2025-04-07T11:15:49.477000 -CVE-2024-45552,1,1,ab21c33debc8771ecc50f95617730e4c42273119d7248351f4a415d045eed3bc,2025-04-07T11:15:49.667000 +CVE-2024-45551,0,0,489aee46175586f4c3c953ec980854a62174a10c0dfeafd975924b9b6e655877,2025-04-07T11:15:49.477000 +CVE-2024-45552,0,0,ab21c33debc8771ecc50f95617730e4c42273119d7248351f4a415d045eed3bc,2025-04-07T11:15:49.667000 CVE-2024-45553,0,0,7fc1115fcc4cbae9ef381abdf5e17528d41d4f9e9e105e72ca41b105ea39f881,2025-01-13T21:51:19.557000 CVE-2024-45555,0,0,37d9964aa5a5598b86f51c3b20f7264cb39cb234f7fce44f158d3bfa241e58c9,2025-01-13T21:51:26.350000 -CVE-2024-45556,1,1,159ebb5ae7d033cfedf9c37f95e869e48a0ebaa761a6000559109fa6fd1dcde0,2025-04-07T11:15:49.850000 -CVE-2024-45557,1,1,660ba3f7864485f44611fa0c53c94be6fa35313fdb3bfa34922044ec2431fb96,2025-04-07T11:15:50.020000 +CVE-2024-45556,0,0,159ebb5ae7d033cfedf9c37f95e869e48a0ebaa761a6000559109fa6fd1dcde0,2025-04-07T11:15:49.850000 +CVE-2024-45557,0,0,660ba3f7864485f44611fa0c53c94be6fa35313fdb3bfa34922044ec2431fb96,2025-04-07T11:15:50.020000 CVE-2024-45558,0,0,b9999ea78a1f11bf4fc1fe70871249484c10ee1e56b900705f3a520779ba736c,2025-01-13T21:26:05.320000 CVE-2024-45559,0,0,cc245f066c5b0f42456e436b7037643fb918a30c87be08fac8ad402ca0ee763c,2025-01-13T21:26:24.027000 CVE-2024-4556,0,0,d3c0d9c7da9d7922d293ea55522a02a915493dd034ff9fc52c8d9c8976cd2d90,2024-09-12T15:09:55.107000 @@ -271741,7 +271741,7 @@ CVE-2024-49839,0,0,e4adae2e6a6fd99d4a1ef07f5bb8c358f7fb67c7e6ba84888990afb4dab67 CVE-2024-4984,0,0,40ebe34593a184b2b9329b2374e9578e3a0bebaa278e1231c45c34e446e4dc36,2024-11-21T09:44:00.193000 CVE-2024-49840,0,0,052415f7244c1013f825344c4809807def2c067feeabb1b1cf5faec319fcef68,2025-02-05T16:02:18.927000 CVE-2024-49843,0,0,9b68fa5c3475ce67325f4140b70e30137faf7f9305d06abaad2366991e2a645e,2025-02-05T16:02:11.837000 -CVE-2024-49848,1,1,c8ad58059fa2b91169cc99a0c4b77bbe3e2b3d4ddf4fc7c0525d59410b443ea4,2025-04-07T11:15:50.183000 +CVE-2024-49848,0,0,c8ad58059fa2b91169cc99a0c4b77bbe3e2b3d4ddf4fc7c0525d59410b443ea4,2025-04-07T11:15:50.183000 CVE-2024-49849,0,0,4c197046e42110980b5301c4c35d8eb0ed58e6313d8c00bfbed7bed4a77a071a,2024-12-10T14:30:44.780000 CVE-2024-4985,0,0,fc8c0365ee2b64c353c64b1a67bd27d7de7a0e1e77bbc681619c3fe31e9edf60,2024-11-21T09:44:00.330000 CVE-2024-49850,0,0,b081475e1ca3af47ff915ab2d360bfee7d39229960d37f8c28496a17f22b8519,2024-10-22T16:12:14.193000 @@ -275376,7 +275376,7 @@ CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d73 CVE-2024-5460,0,0,d1df8428a10a618dacc511f1783e341e208a5618919dfcb93f031b38621f5972,2025-02-04T15:24:36.480000 CVE-2024-5461,0,0,0e5c35015ef9c17a01014ad8587e8a058a39ac46cc767abd7817343a80dc0b2e,2025-02-15T00:15:13.513000 CVE-2024-5462,0,0,d4f147823b82222903b9d9bf51249493cafff25daa3597a42629662406d9f68b,2025-02-15T00:15:13.650000 -CVE-2024-5463,0,0,113aff91033cb1cb7c353ce7e22b0cbd622856846d0128375c498a441530fd0a,2025-03-04T18:43:31.607000 +CVE-2024-5463,0,1,b24b8d78523e42c0a180af4d8a43e8593c6b5e1f71c3c301d74d6192884c071f,2025-03-04T18:43:31.607000 CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000 CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000 CVE-2024-54658,0,0,2ae5e1e473d9853fb3d9a8ce3b95078d5f42520f037bb2207ff10526f7c0240a,2025-03-19T18:15:23.533000 @@ -281153,6 +281153,7 @@ CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5 CVE-2025-0001,0,0,0b53097bff1778de9231713dab9a655e96b466d52a15df3f132fe8a8a77a7f52,2025-02-17T10:15:08.550000 CVE-2025-0014,0,0,5c97a8ddbb8633a344f6dd9b44735740d1415560a2ebca2945d027989fbee2c7,2025-04-02T17:15:41.183000 CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000 +CVE-2025-0050,1,1,7f6626770e0950243a41e91e8473e458a114045f56ef7e8dd8b2d6082147a644,2025-04-07T12:15:15.360000 CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000 CVE-2025-0054,0,0,b8bc9804913976424582a72964eb068b4365d1e22607e5b0c46a2e77e3b25525,2025-02-18T18:15:28.260000 CVE-2025-0055,0,0,0e89795bc87c51adbc679d78b37bf974fd01b97679ad0635934ee83322d4b078,2025-01-14T01:15:15.570000 @@ -283073,26 +283074,26 @@ CVE-2025-21417,0,0,2747c56c84381d3763059eec5080d6fa07a433b2e87fb1f1180b0a0554555 CVE-2025-21418,0,0,286c461de95fba525ffd95fe19188a97b0613df56bf1afe14ca9be4aa494d718,2025-02-12T18:14:34.870000 CVE-2025-21419,0,0,acdb4d37a32faa1cb0f65f0fbb7358475e2deb811438263e59eb8f6bcbeca8e1,2025-02-14T17:32:53.087000 CVE-2025-21420,0,0,32a7e46f27d290c0e9a5b92e079c0424752a30e3cfa9e5d424062d7af6a66d41,2025-02-14T17:36:09.683000 -CVE-2025-21421,1,1,1a46ed7cf07f9de4724f071bb37dbb4e1550f91a3632631fd962b71f25d16ffe,2025-04-07T11:15:50.360000 -CVE-2025-21423,1,1,dedf91ac6986422add6113c12c7e5a4d806b88a2a00cca492dcfa56cca368ae2,2025-04-07T11:15:50.533000 +CVE-2025-21421,0,0,1a46ed7cf07f9de4724f071bb37dbb4e1550f91a3632631fd962b71f25d16ffe,2025-04-07T11:15:50.360000 +CVE-2025-21423,0,0,dedf91ac6986422add6113c12c7e5a4d806b88a2a00cca492dcfa56cca368ae2,2025-04-07T11:15:50.533000 CVE-2025-21424,0,0,3a83225b8d2edd7b934464a21b7f49bd35353b067d8247c64049e806cfc35f96,2025-03-07T14:12:17.933000 -CVE-2025-21425,1,1,6f0d5fb1c50cd307365da059dba6aca3d875166dd617d5e7bbb17fd1532dc336,2025-04-07T11:15:50.697000 -CVE-2025-21428,1,1,8c26d198e24ea5b609d7bdbc3e4d45b736836578fec0a01cdda276546e5dc31b,2025-04-07T11:15:50.870000 -CVE-2025-21429,1,1,8573dff694ea2a4f98448779e43dac41635fbc7720e245dab3282b51d0939754,2025-04-07T11:15:51.047000 -CVE-2025-21430,1,1,6a8a047f38812c42d770761b756fafdbe98abe1bf7ecdf71558385df444ed029,2025-04-07T11:15:51.220000 -CVE-2025-21431,1,1,648e005d741d450e848b9310483c0ebe1250f9bd8b1fa41de87bbebfbd110c42,2025-04-07T11:15:51.440000 -CVE-2025-21434,1,1,635174305db6afcee37cef7fcc7af374cdfb03a0db0e353b457ad392ff531ab9,2025-04-07T11:15:51.600000 -CVE-2025-21435,1,1,0ceaaa23e2ab6fc99ed59c3651ea0bd3af26d4472f6e464da9891f1ecde20258,2025-04-07T11:15:51.783000 -CVE-2025-21436,1,1,79d419af1611043f95fbcb5adb4ee5127098dd02d8ce40f9ac775d3a9a2d8fb1,2025-04-07T11:15:51.970000 -CVE-2025-21437,1,1,b855710238f265a838c007c4e5fb426d6f3579d501d0a7ec413f577ab097922c,2025-04-07T11:15:52.123000 -CVE-2025-21438,1,1,9b420b8ad14340f0c0819330dacb4d92d2c77c319bc0ceafff9878463ccf4cbc,2025-04-07T11:15:52.290000 -CVE-2025-21439,1,1,6e6203aea263f99523af1c4fcf2019a42bfbabb92f3dced4725180734a958293,2025-04-07T11:15:52.457000 -CVE-2025-21440,1,1,bcaaacbf58306a490c300ae3e9c65f4dbcd0505db259126c0f0f42af75a62e20,2025-04-07T11:15:52.613000 -CVE-2025-21441,1,1,24004244400868cf299ed4860573968dd367a12d79eaad13ec9dee6c4f9a05be,2025-04-07T11:15:52.777000 -CVE-2025-21442,1,1,4035b9edc609f89c255c31e809ab5b219913d53114b2012078d979018db00a68,2025-04-07T11:15:52.933000 -CVE-2025-21443,1,1,722d70108e38beaa2973edd82097cd0c9da8ed023d32a9c269a043cee455dd62,2025-04-07T11:15:53.087000 -CVE-2025-21447,1,1,5a8882d174d3df5b74061e596133503ed451acb5ad60dc1a3367bf81f45766c3,2025-04-07T11:15:53.243000 -CVE-2025-21448,1,1,06c61c0ee17a661d1b5ffb46efd93f30314c79757cc37fc82e2e965a2c203658,2025-04-07T11:15:53.397000 +CVE-2025-21425,0,0,6f0d5fb1c50cd307365da059dba6aca3d875166dd617d5e7bbb17fd1532dc336,2025-04-07T11:15:50.697000 +CVE-2025-21428,0,0,8c26d198e24ea5b609d7bdbc3e4d45b736836578fec0a01cdda276546e5dc31b,2025-04-07T11:15:50.870000 +CVE-2025-21429,0,0,8573dff694ea2a4f98448779e43dac41635fbc7720e245dab3282b51d0939754,2025-04-07T11:15:51.047000 +CVE-2025-21430,0,0,6a8a047f38812c42d770761b756fafdbe98abe1bf7ecdf71558385df444ed029,2025-04-07T11:15:51.220000 +CVE-2025-21431,0,0,648e005d741d450e848b9310483c0ebe1250f9bd8b1fa41de87bbebfbd110c42,2025-04-07T11:15:51.440000 +CVE-2025-21434,0,0,635174305db6afcee37cef7fcc7af374cdfb03a0db0e353b457ad392ff531ab9,2025-04-07T11:15:51.600000 +CVE-2025-21435,0,0,0ceaaa23e2ab6fc99ed59c3651ea0bd3af26d4472f6e464da9891f1ecde20258,2025-04-07T11:15:51.783000 +CVE-2025-21436,0,0,79d419af1611043f95fbcb5adb4ee5127098dd02d8ce40f9ac775d3a9a2d8fb1,2025-04-07T11:15:51.970000 +CVE-2025-21437,0,0,b855710238f265a838c007c4e5fb426d6f3579d501d0a7ec413f577ab097922c,2025-04-07T11:15:52.123000 +CVE-2025-21438,0,0,9b420b8ad14340f0c0819330dacb4d92d2c77c319bc0ceafff9878463ccf4cbc,2025-04-07T11:15:52.290000 +CVE-2025-21439,0,0,6e6203aea263f99523af1c4fcf2019a42bfbabb92f3dced4725180734a958293,2025-04-07T11:15:52.457000 +CVE-2025-21440,0,0,bcaaacbf58306a490c300ae3e9c65f4dbcd0505db259126c0f0f42af75a62e20,2025-04-07T11:15:52.613000 +CVE-2025-21441,0,0,24004244400868cf299ed4860573968dd367a12d79eaad13ec9dee6c4f9a05be,2025-04-07T11:15:52.777000 +CVE-2025-21442,0,0,4035b9edc609f89c255c31e809ab5b219913d53114b2012078d979018db00a68,2025-04-07T11:15:52.933000 +CVE-2025-21443,0,0,722d70108e38beaa2973edd82097cd0c9da8ed023d32a9c269a043cee455dd62,2025-04-07T11:15:53.087000 +CVE-2025-21447,0,0,5a8882d174d3df5b74061e596133503ed451acb5ad60dc1a3367bf81f45766c3,2025-04-07T11:15:53.243000 +CVE-2025-21448,0,0,06c61c0ee17a661d1b5ffb46efd93f30314c79757cc37fc82e2e965a2c203658,2025-04-07T11:15:53.397000 CVE-2025-2147,0,0,8d64955bcd54c9e90fd3d983c30c955ed78fbb149aa1e8a8da2ca80431331131,2025-03-24T14:30:40.943000 CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b9e,2025-03-10T14:15:26.130000 CVE-2025-21489,0,0,5d30c3b0acc3ddba1057df1a4f29e61d74be0ae611271efb1a2a3c05a60a8cda,2025-01-23T20:15:31.630000 @@ -285172,42 +285173,42 @@ CVE-2025-24185,0,0,4871c0df3d7d219e1401394d7ec6a4eaa7d737d02980f30e101a34eb820fd CVE-2025-2419,0,0,153707543e9bc32e5fdb338510a7c29ac05b7b4717e1a9871d5ed8414730714f,2025-03-18T14:15:45.067000 CVE-2025-24190,0,0,909fc3fcab3f56a4a6e43129ca56781207bfb76ef21dcaa28ac91490f6b231a6,2025-04-01T20:26:22.890000 CVE-2025-24191,0,0,70b077b59fb6872846684df55d5bb8024ad6bab473a53621155ca2da3a09c8f5,2025-04-04T18:24:52.147000 -CVE-2025-24192,0,0,a58f0bd0dcc29dcea121e843f6744c606af12c56b92420490b4424c02e8f81ce,2025-04-01T20:26:22.890000 -CVE-2025-24193,0,0,85d86826046c74a3a92df4109acf5fd80a776edd0c5c6152fb7ab85f1ff5ffcc,2025-04-01T20:26:22.890000 -CVE-2025-24194,0,0,3d9037f6c65de8bb0f966f71cedc343022bb007d10b1fdc2bf7d155439482ea0,2025-04-02T16:17:41.203000 -CVE-2025-24195,0,0,de39b9444b85c0c8de39f44ef1e56980eb68aa475d664a2cefc4170992452043,2025-04-01T20:26:22.890000 -CVE-2025-24196,0,0,dd8bfac1a128d80c0de5d6835408224affa1112c8a7ccdb5e2803b6062998d2d,2025-04-01T21:15:42.420000 -CVE-2025-24198,0,0,9a8e2c8e559db7901f4b442db0db49d42bc559027854a720df732a16c592ed0b,2025-04-01T20:26:22.890000 -CVE-2025-24199,0,0,b7b1539130c664dd05fc859f7b9f82f8e4b4c249803ce983db5205b76b388908,2025-04-01T20:26:22.890000 +CVE-2025-24192,0,1,ee1f07d2cba952304df25437faae60feabf9716560146378b8f5618aee1073ec,2025-04-01T20:26:22.890000 +CVE-2025-24193,0,1,ba576c453996d0b4d5fde71404eef4705c98b870947ba1c05c65f42287193054,2025-04-01T20:26:22.890000 +CVE-2025-24194,0,1,a0b361883e351a53ee4c04c87f642b54d27a5a7a1c2018dc1527e9c80cab1f22,2025-04-02T16:17:41.203000 +CVE-2025-24195,0,1,81583b5bf12388481e86c8fd25067312015d41ae1703d6e8bba5d756dfbbd036,2025-04-01T20:26:22.890000 +CVE-2025-24196,0,1,34c463723f4a052669a1ac9b40ad43efbfe4fd4e1f6c21db1dd10d588fa6da91,2025-04-01T21:15:42.420000 +CVE-2025-24198,0,1,4227721e88630e21162e18a11e5282e19ce032cd386f5ada78c23201dc850161,2025-04-01T20:26:22.890000 +CVE-2025-24199,0,1,3f7bb3dd70f62322776c640125327f5e42f891f077dc1d5c3f758b62bef5bcff,2025-04-01T20:26:22.890000 CVE-2025-2420,0,0,759a643dd7e1d79c15a36f7d4a45610b663ab71ad52795fbc850f2e2b83fa384,2025-03-18T13:15:37.770000 CVE-2025-24200,0,0,749aa357d1c7f24174764de48a9dbb69fce15ac4bc539d3a8708e99314c3972a,2025-04-02T20:33:13.233000 CVE-2025-24201,0,0,1cb6d0eda651a05a5a43d80c0ce591daf0b58117cc08a1188cab7f3b5f75f28d,2025-04-02T20:33:42.653000 -CVE-2025-24202,0,0,2b7cb2221cdb2ba8dece8d61f82f6424a5b42c3021ee727b637bcd14cdeb7863,2025-04-01T20:26:22.890000 -CVE-2025-24203,0,0,da3868a701feefefd8c7741ed5d8fc5d414a41762accf68d3589a32766abfc6b,2025-04-01T20:26:22.890000 +CVE-2025-24202,0,1,eb647c5434609802c9e978ec9af9da9889a5d2230d53ebe85671424826242c28,2025-04-01T20:26:22.890000 +CVE-2025-24203,0,1,a3f9a09baf0eac88681fdc4a67973b3c8bfd4f9d7ff9ab90f66f1b9dfb2bd4ac,2025-04-01T20:26:22.890000 CVE-2025-24204,0,0,5dcbcc8f0f20f44f386df15e8a1c1dce75589cb456c483a8817eed9932ff4f6e,2025-04-04T18:20:38.460000 -CVE-2025-24205,0,0,6fadd3e3676e6553f6aeed265ad38233d9709b8725a61efd3c17bd53e0c0923a,2025-04-02T16:17:41.380000 -CVE-2025-24207,0,0,e9d1c8f85e36821a0fb77d6184054c419339063ef36079af9ab74844c3476cd2,2025-04-01T21:15:42.580000 -CVE-2025-24208,0,0,3480dece639c840210d6cbb8eb531059de4983c5b4ebef5bbcd8a491c8144454,2025-04-01T21:15:42.757000 -CVE-2025-24209,0,0,67b8a01b4412124d49959fe7bb9b12a30ed4c7ba4bb0968a2edd523005eb59cb,2025-04-01T20:26:22.890000 -CVE-2025-24210,0,0,04833cd1d2dcdd85f6f46f3728e6c1582ef1098dc19c3a292b137e43fc0bb0c2,2025-04-01T20:26:22.890000 -CVE-2025-24211,0,0,0771157bcb8b39267a175858c8148b45b4b1085d576b2f3f713ae339231075a0,2025-04-01T21:15:42.897000 -CVE-2025-24212,0,0,26157d0780f0499b511892c79aa4643a37ae73b832a4f3b5c499fa3b3aab941b,2025-04-02T14:16:04.270000 -CVE-2025-24213,0,0,1ead9077438f3f1867df4a01fae0cd260fd37df069a38051957fc95e0d1cb6ea,2025-04-03T18:15:44.770000 -CVE-2025-24214,0,0,0f1fcc3f4a137f76a1dc58373cfaaedd9071618d2c0daed70f15d43a0f6d1e45,2025-04-01T20:26:22.890000 -CVE-2025-24215,0,0,07fb76ffc84035e69bcf83a4df22ac8203df7845a1d736d7e6b232124f0f86e8,2025-04-01T20:26:22.890000 -CVE-2025-24216,0,0,44b71cf285f8648b2dd5f9805be94e6eb5bb137559fefdfc87774c1520c0ebb3,2025-04-03T21:15:39.373000 -CVE-2025-24217,0,0,5b60946ff61cf2080385fa0b1989e613a251700fbe8f7d875adc4c496ccbe901,2025-04-01T20:26:22.890000 -CVE-2025-24218,0,0,1eae9e32ce19500bc6747aae15178826c25f975aae907cf59eb7c346c329b7bd,2025-04-01T20:26:22.890000 -CVE-2025-24221,0,0,fe2a7be171b044a18b7aad5da0148fcd4e1fa54fba59f6221bb4404a606c1279,2025-04-02T14:16:04.507000 +CVE-2025-24205,0,1,d98bf4fae997b11cb871b381746d059aeb2efd160d26a3cad925c91161b031c5,2025-04-02T16:17:41.380000 +CVE-2025-24207,0,1,c7bfaef550d4996315704a0633d0f495d6bd0e0f46b1a1c9a0a393cb650bcadb,2025-04-01T21:15:42.580000 +CVE-2025-24208,0,1,7b896dfa2c976de0ffbc003c67f622881a7a33edddbdd68d88aed0f66cc63453,2025-04-01T21:15:42.757000 +CVE-2025-24209,0,1,0d590fd9cb7d930fcd886de1ab46db778151cfcfc74035a94b7ed1d030113052,2025-04-01T20:26:22.890000 +CVE-2025-24210,0,1,7355814d761e2e75a569b3b8148f037b4e2ff3934e2ee5322b3debee0d554ed2,2025-04-01T20:26:22.890000 +CVE-2025-24211,0,1,1299e3955e08a53d45c216c23b8e10e03c0bdc5943eae5fdbd3b4e8404306e46,2025-04-01T21:15:42.897000 +CVE-2025-24212,0,1,e1be1010f74290c2f2c6df69604b037971a5976bedbcdfad4f484982883d36e8,2025-04-02T14:16:04.270000 +CVE-2025-24213,0,1,886ccb4f1523610698ada21bc020a8ee6b81aedca4511434b560aee099cfe004,2025-04-03T18:15:44.770000 +CVE-2025-24214,0,1,c086cc19c98c32370055c38c5134d8f3080e9df5b0418ae88a31783911fb0ab3,2025-04-01T20:26:22.890000 +CVE-2025-24215,0,1,65428943713be8a005337b33e5c1309d72acd2346a337b0b42541fcfc77792cf,2025-04-01T20:26:22.890000 +CVE-2025-24216,0,1,bd2834e73891ab74bfa09311800e8ebaaa54e1e04e0126eb6a4dd1b019ece5dd,2025-04-03T21:15:39.373000 +CVE-2025-24217,0,1,8a0924d07d1f86250963e5000cee22db0390a13bd36a0e6c4a49a06fc26e7f63,2025-04-01T20:26:22.890000 +CVE-2025-24218,0,1,9f5704f2f444444c03a7337084f0a271d4c4faf757d7a9254cbfb3d990dcd0ad,2025-04-01T20:26:22.890000 +CVE-2025-24221,0,1,a24e74d49d5681e81a91f0aedbb72c222b04d20454153e341951a42ea59e8df8,2025-04-02T14:16:04.507000 CVE-2025-24226,0,0,b30ef21852bbf23b107ad0db09b90bb3e97ca9a52198eebb15d52a72752f0f26,2025-04-04T18:21:46.567000 -CVE-2025-24228,0,0,0682ea9cc8d158874891386ed6f236a448b44a58a7432ca800fb49bba4f8ae66,2025-04-01T20:26:22.890000 -CVE-2025-24229,0,0,e80f8313d932b2359cc47d30731c55191722d487b8bc17c5824ac86e7e1af040,2025-04-01T20:26:22.890000 +CVE-2025-24228,0,1,4b7d66061e7715a52ec6e22041d149d69dfad757964e97ff7a76bc247673181b,2025-04-01T20:26:22.890000 +CVE-2025-24229,0,1,4095c1a5305e2509985724ab171d929dc46d25d8e1a858263974f12daddd4ece,2025-04-01T20:26:22.890000 CVE-2025-24230,0,0,c6f238a0a3b7d00915209ed792ddeafea71970bf3b666bc266a73753e585b00c,2025-04-02T14:16:04.680000 CVE-2025-24231,0,0,e812ae93ea0802283d6f151efcce81026a85e391ca5cb344078f9d404ac5936f,2025-04-01T20:26:22.890000 CVE-2025-24232,0,0,c930ff70002faf4f8d8359df165f92ec18b3c6c1c258e6463c792b9bb9b34325,2025-04-01T20:26:22.890000 CVE-2025-24233,0,0,c49a8d10414fb99c6f94c7c63aee6102f698e2c458dcdfe8a93be4bb7447a0ef,2025-04-01T20:26:22.890000 CVE-2025-24234,0,0,00319238de00a6841774394cdb4e95500b63f71cb14160650f343f81875ecbec,2025-04-01T20:26:22.890000 -CVE-2025-24235,0,0,6b09348a77477dd81f798405383da8e5e4a0cf914e73d5de207d45c86653a813,2025-04-01T20:26:22.890000 +CVE-2025-24235,0,1,5eabd07812f933eef8a1453948e29bf15c3eecaba86449598f61f5b9fa100278,2025-04-01T20:26:22.890000 CVE-2025-24236,0,0,6f35aae8e5b2275b2c69183ab7776a716442e803a5454ae85f2994d6ce98630e,2025-04-04T17:11:53.263000 CVE-2025-24237,0,0,27bd8aec1cacbdda457d4c54321da7772780a885b84dc379b0850dfb4a03a57f,2025-04-04T17:11:50.760000 CVE-2025-24238,0,0,eb385efe8cda4bf9f1c35756a77fb4af48f89427c693cc6ce5f1501ae0be4d28,2025-04-04T17:12:14.453000 @@ -285216,21 +285217,21 @@ CVE-2025-24240,0,0,31e1fbc4a9906522b59d5426cc41c13b0cc9baa11bbcd68e50f13950436aa CVE-2025-24241,0,0,a279cf4c641bb9c3ca243836a9cfff64caa6f150180c868bc752ebe35d2580ea,2025-04-04T17:12:47.040000 CVE-2025-24242,0,0,7198a4ff47a69ba0a9fd45b2c507b49c3ac18f25e906b0f7d0919752e8bf374f,2025-04-04T17:13:00.923000 CVE-2025-24243,0,0,5bf36f24ae0ea02424f9ce04bcb14c5dbe8f60f4ca7ebf1e755395b0487a5c5e,2025-04-04T17:13:15.023000 -CVE-2025-24244,0,0,aa8216b7c526d909646287a678f19eb0a4c74f63dbedb6e3f9816bce9375d8e0,2025-04-02T16:17:41.717000 +CVE-2025-24244,0,1,35fdd1fc29044bec0e234744d0b34f378e5fa7ec39165412d9a4e2e05b72bbbd,2025-04-02T16:17:41.717000 CVE-2025-24245,0,0,726bb616fd36c53c5e8e1d9a6405098822a15a2e9f18cf06a92a2b835cd77581,2025-04-04T18:24:35.563000 -CVE-2025-24246,0,0,4c1c877540723e60e5944458a5aa9e39161e712e8a3a8067e2a1e5e25957ec64,2025-04-01T21:15:43.040000 -CVE-2025-24247,0,0,59555ba19abf57fce5ae14db87534c22e381c032a8ea5b1a4f5b2e84c6d6b721,2025-04-01T20:26:22.890000 +CVE-2025-24246,0,1,843a424cd1888295fe208cbd1ad01be127a6ba8f27dfab2f9a1af5142677e146,2025-04-01T21:15:43.040000 +CVE-2025-24247,0,1,cd43def14d19ddb3c6d3c9d05bc5cbfdc51f8131002a95fdc01db942bd421e6f,2025-04-01T20:26:22.890000 CVE-2025-24248,0,0,2888532025229541b660a3aeb97018da3b2d5f4bd38a2cee849343873235a5dc,2025-04-04T18:24:20.717000 -CVE-2025-24249,0,0,ef5a9945cb5f5987170c3c49a5b54d37f318974a0224d422b7f0b9154ecd3027,2025-04-01T21:15:43.183000 -CVE-2025-24250,0,0,c28f0f56c48215e5b6b839bd92835127561679d27bd6236d3986a54a4fd03d0e,2025-04-01T21:15:43.330000 -CVE-2025-24253,0,0,78470b1727e3850c13a71f527dcdf5a48a8655399b205341b702ac31f4ac8e9c,2025-04-01T20:26:22.890000 -CVE-2025-24254,0,0,1c4f96c6f6d7d4db098d580e58b9ac31a68428ff32af6a8b3c66753efb7f7dfd,2025-04-01T20:26:22.890000 -CVE-2025-24255,0,0,1d1807c301eb4918f313c995b93c1e89af4b7f820beff779c931323107b52d99,2025-04-01T20:26:22.890000 -CVE-2025-24256,0,0,0696ca57a40bd0a1f0928e4113c998421f4baa2c2e5bb33f2b58b0c9d96decd9,2025-04-01T20:26:22.890000 -CVE-2025-24257,0,0,822a2912608e4be54fc31d8140f141172378fcf97c0b590e45b75ba4cf4c850b,2025-04-03T14:15:31.043000 -CVE-2025-24259,0,0,e9e8ae34c0f6727f275f333ca2e4d4790f4b758b0b79515495a7bd7071b86a0b,2025-04-01T20:26:22.890000 -CVE-2025-24260,0,0,fc9cd5cbfdc0102679c8bb8134a8ae9e4c7e485c0efafc726e6182386e7de118,2025-04-01T20:26:22.890000 -CVE-2025-24261,0,0,afa9c10ebbdee1cca43489bd0f5b742d2cf9b184fd96737bc0185a2d69682a16,2025-04-02T16:17:41.877000 +CVE-2025-24249,0,1,3dd1f2c2d36235f90a5b011ad0ed2127e4a4b2555eabaa586d558edfc966694e,2025-04-01T21:15:43.183000 +CVE-2025-24250,0,1,d7efbec8af4c0ad0a81bc8e24058ec435454a01ad4909974edffa1197a9199dd,2025-04-01T21:15:43.330000 +CVE-2025-24253,0,1,1687cffcaca9e116d2e250affba56fb788a0cc6108b0cd333405c621460018df,2025-04-01T20:26:22.890000 +CVE-2025-24254,0,1,3e956fa57fc33eee1b8249561afff1a505c12d0fb65e680ad09e9ce18b950642,2025-04-01T20:26:22.890000 +CVE-2025-24255,0,1,c769c760b71db36aa4a16720f8a976775c8a1e54d16149d69d38bafbf1249861,2025-04-01T20:26:22.890000 +CVE-2025-24256,0,1,6f4ca649299f5569759801053203dd6e1a2c0f53e6774df6fbda137455042e43,2025-04-01T20:26:22.890000 +CVE-2025-24257,0,1,be67cdf99ec630632db172354940607fd65cdda4926bb5432c1c771b5eab02b6,2025-04-03T14:15:31.043000 +CVE-2025-24259,0,1,cc006e3941dfe709a11fc1faebf6ece5087f0389ccf9801cc14c4eea2aa96d4a,2025-04-01T20:26:22.890000 +CVE-2025-24260,0,1,934a7a9b01ba2e0ac8a59aa2ba9aecd5c2ff58057ea62198a81bba5c4ef18ef1,2025-04-01T20:26:22.890000 +CVE-2025-24261,0,1,51d607cc95611ecfba003ac720c144da943978caa3ae3b2f71763652cfa3aa5d,2025-04-02T16:17:41.877000 CVE-2025-24262,0,0,3d76917582097604a5e634bf4f71c6df69377b602f1a36e0845ed48fc225e030,2025-04-04T18:24:08.693000 CVE-2025-24263,0,0,b22d00ad9123f8055683c07743d9bd481ce65ffc5d5b226b870bbaf0cb77b38d,2025-04-04T18:23:52.100000 CVE-2025-24264,0,0,48a4bb0d460b0ba3e4c4820397b4c8b4813fe0b28dd3f3b1daa4c999448c1e0d,2025-04-04T19:00:46.457000 @@ -285238,9 +285239,9 @@ CVE-2025-24265,0,0,69e5233604d5626850611ee64abbaaf7e43306a91789780d2aab9e6168a4a CVE-2025-24266,0,0,d850a68869d3e8c7d48709e8220153768350f47108844d206efa6027d68e51c9,2025-04-04T18:55:25.553000 CVE-2025-24267,0,0,f3504fb660b96f886533b6b2e39b198d92d097550e50f76d44bfd982b4c91cd8,2025-04-04T18:53:03.830000 CVE-2025-24269,0,0,8938854dd4ab200eefc4b8f05d044fb8e4cd629a1cddad03c13bb26be51b09ca,2025-04-04T18:23:37.283000 -CVE-2025-24272,0,0,6e7e1dd0d722c49b12d24c4853bcf8efc9355e71ae39e60c1ddb1f46d2df215d,2025-04-01T20:26:22.890000 -CVE-2025-24273,0,0,099ac16a257666b591c09313cf9602fd4bfbc2418df4164aeda80445197c05d9,2025-04-01T20:26:22.890000 -CVE-2025-24276,0,0,a6ab3f5ffdac6bf043bc3904fce8c7221c117d06f2a4b22ec361b6029ce1190e,2025-04-02T16:17:42.060000 +CVE-2025-24272,0,1,99c4e0b6977542546981b29d4b215aa567e1b559e40b70534e81a738969733ce,2025-04-01T20:26:22.890000 +CVE-2025-24273,0,1,8c725f6a9b36d4445a267be45be33c2d56efeb22a0aa54cfc6635d79e5e674d7,2025-04-01T20:26:22.890000 +CVE-2025-24276,0,1,70f5e8b091e809ba0b19011470f784595d949b4947979d2823a1ebc36fac3ffa,2025-04-02T16:17:42.060000 CVE-2025-24277,0,0,7689e916ab1daf1bd3b71f7ef5284681f9c9f49bd75eaa1a34b5098f93a9668a,2025-04-04T19:49:08.933000 CVE-2025-24278,0,0,6e2eacf3052e7cbc2055495d37c9c6d7068989be97cae8da3a79685df107e734,2025-04-04T19:47:33.687000 CVE-2025-24279,0,0,cad0432a42d451ad48511ef95f7a14eb3e143fa7dc7f59c67bedf18885f1ce98,2025-04-01T20:26:22.890000 @@ -287623,12 +287624,12 @@ CVE-2025-30258,0,0,cc431d0d4fe6a8b6881434ff2ad3ef316269606a3845b529c54a958324c9a CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3bed9,2025-03-20T00:15:13.780000 CVE-2025-3026,0,0,1ccfc3db3fa998e9ff1cdb0d3328ce5e8b50ad41edf4870aec75e9db46dbd3f7,2025-04-01T20:26:30.593000 CVE-2025-3027,0,0,9355f1632bf438848aed82af6cf484da7a1ad46dac5db96331cc9a677136537c,2025-04-01T20:26:30.593000 -CVE-2025-3028,0,0,2836ef929d4821633b0ea2bb7d61c3adc81a27d4c1f1d06ba6fb1f8ba0c8b2ad,2025-04-02T07:15:42.047000 -CVE-2025-3029,0,0,6a8bed066885dbede7cebe7b38c5f85e4b07028eb69f4d86e67d8073a57fe4dd,2025-04-02T07:15:42.240000 -CVE-2025-3030,0,0,99eaef6196b742210bdb375cd8045db0258b795aa60511a40f19649c201270d5,2025-04-02T07:15:42.400000 -CVE-2025-3031,0,0,913d2091a71730e7191c7b914490dbb44547e01007c2aa0204514225f9840ca6,2025-04-01T20:26:11.547000 -CVE-2025-3032,0,0,45018c0e8539d05ecbf4f536c0883c5aa5339f46f07ebf0a4e6b283b2be56925,2025-04-01T20:26:11.547000 -CVE-2025-3033,0,0,f974a5cb11a299558b6f070e0d59ac1bbdced04ddcb4e0bd404cb65a1dfbacd9,2025-04-01T20:26:11.547000 +CVE-2025-3028,0,1,4fa719e2ecab3ec0a17d5dab7733cc44842b5a90a53bb60beaa490223042a9fb,2025-04-02T07:15:42.047000 +CVE-2025-3029,0,1,18abc968db62f00f40022bf813ceca55e3dc01aee6e85385d247612be2fb51b5,2025-04-02T07:15:42.240000 +CVE-2025-3030,0,1,11cb8886f3602275f86bba62db4e84a08fa34829bc5640ac507014c78b38df68,2025-04-02T07:15:42.400000 +CVE-2025-3031,0,1,e031b00d61b98a574554177de72dbe5455ec4cca96a2b5c9ce56307fe9205938,2025-04-01T20:26:11.547000 +CVE-2025-3032,0,1,a5506c914af4be63643a889c84f960832c1c89a3a908aad1c72be0345666d7e2,2025-04-01T20:26:11.547000 +CVE-2025-3033,0,1,3c01d2b3c979e86b4f438d6a9f2fbeef7453125a07046469079cd3c15c5e1201,2025-04-01T20:26:11.547000 CVE-2025-30334,0,0,caf534fd1627734422d4cc985cab7fc3cb378766099fee597920edabdedb5eb9,2025-03-20T22:15:14.453000 CVE-2025-3034,0,0,164cc1c1ef87ef60f97d94cfd24d9b02daad52a01dfca2eb60d64c35646670eb,2025-04-02T15:16:00.490000 CVE-2025-30342,0,0,a82c09d47a90d84f34fb1e813a5c0fac2da3bb3c52e4eebc7be6b04000e23625,2025-03-27T13:35:33.940000 @@ -287683,20 +287684,20 @@ CVE-2025-30433,0,0,6f71c17f77a95a33ebb1e94d3dfef9c6f08286c2d2c9237283ca7fab79b9e CVE-2025-30434,0,0,ebc68e7f01445dc8310b399489dc90a6f8fac5463d58eec28218ed8f44833277,2025-04-01T20:26:22.890000 CVE-2025-30435,0,0,a819fd3bc536b06d31e66f2dba46f170a8a82060c4083d1602e4468ee70f613f,2025-04-04T19:28:07.327000 CVE-2025-30437,0,0,0c24503326977574ab0f815363d5d51518a36fd46250ca4580863efffe2ff229,2025-04-04T19:33:46.400000 -CVE-2025-30438,0,0,5e37b091eda5acd779838ef05fdda74196e7142c912dcdf0eb307fc4f5de6b74,2025-04-02T16:17:42.927000 -CVE-2025-30439,0,0,73a82254afce220f4c6d9661a5990bcbdde677704ab0cf77b47fd1c6511d584c,2025-04-01T20:26:22.890000 +CVE-2025-30438,0,1,81b2609c87d7967d6e60e6f5472d1d0fc467392bdf52a7b3d8413a194c75226f,2025-04-02T16:17:42.927000 +CVE-2025-30439,0,1,fcdb88b54a0cf3f64699998998ea8cf5cf2ccaefc5de2c6c4f34db6617ff682c,2025-04-01T20:26:22.890000 CVE-2025-30441,0,0,0c04a93a6f174bf42d94b9b28150654c6cdebea87baad1c1bed2a17317c45cac,2025-04-04T19:40:24.640000 -CVE-2025-30443,0,0,932b3b18ec745c2b2a792c286f1e8af256bc23e89d29fbb215bd590e88ff171d,2025-04-01T20:26:22.890000 -CVE-2025-30444,0,0,d34d2c46b7cc42bfd15ee553b3d0a274cd034241b6bbc862e4e516372cd13022,2025-04-02T14:16:13.203000 -CVE-2025-30446,0,0,8790b6eb4e57b8db9f3d86b2b6b7d83a1a5104f925a43c9ec939c8c6995882a4,2025-04-01T20:26:22.890000 -CVE-2025-30447,0,0,237dbe9402f62a7486f16b1d09b7e4786ec6fdf28414a466fde6c687314bb0e5,2025-04-01T20:26:22.890000 -CVE-2025-30449,0,0,9508fcfb3134f072500474d4eb13734d9ef2b119129d96bcac9b8fac5ebf5a05,2025-04-03T18:15:45.357000 +CVE-2025-30443,0,1,b83ff3b6d97b7b26e8e596dd682b1363434bb839dbce2f4738ba273bcf3c8e50,2025-04-01T20:26:22.890000 +CVE-2025-30444,0,1,5fb147016e236cabb48b47cbbfd70a9e8b05c504934db59775ee819b48949b5d,2025-04-02T14:16:13.203000 +CVE-2025-30446,0,1,fad4d26b5d4ae94812fd466886b763c48fd7e22c60b658669925c241ad6d69a5,2025-04-01T20:26:22.890000 +CVE-2025-30447,0,1,224c249cbee75db0bac000ce6316b7cbc430caf4f96b51dbc25b7e0331e9d8ab,2025-04-01T20:26:22.890000 +CVE-2025-30449,0,1,210ffa9dedb9127f4cf06550241e08b952ffb40a1ffaccfd71d274287b32fd7e,2025-04-03T18:15:45.357000 CVE-2025-3045,0,0,d1bb69c29a142292c5068648f022094677578a135ca579006924bfb19a4ea68a,2025-04-01T20:26:11.547000 -CVE-2025-30450,0,0,eb6ccf232b67c24883a0d3a839bee58ad5ab048c533d6cb6cd99c6f9851e4aca,2025-04-01T20:26:22.890000 +CVE-2025-30450,0,1,a82e950626eebfd524755275e586bbd396e85abae8fbd3bec837ff9127bfcfb8,2025-04-01T20:26:22.890000 CVE-2025-30451,0,0,a58165541c3f501bbc882a86fac75fc8ba8f191c9a6326ff9e9bcbfeb1b29f2f,2025-04-04T19:41:29.893000 -CVE-2025-30452,0,0,1efd239c821d515f19f352abde330ebff233606e55b12bb9ebf573ccfdc85938,2025-04-02T14:16:13.400000 -CVE-2025-30454,0,0,47c09e5bc46b9edf4e1f5c1c4e1e4a1d9da94a40ad41215b663ab07539d05720,2025-04-01T20:26:11.547000 -CVE-2025-30455,0,0,c047560985dc14264d844d7220e69242357f952dfe9c411f36f032f55b9ad4be,2025-04-01T20:26:11.547000 +CVE-2025-30452,0,1,77fbe4ced45b46f4111689abf8ae3fb93c1d49a0898dc167a84391fd4453a149,2025-04-02T14:16:13.400000 +CVE-2025-30454,0,1,08b3e2921685bedea4ac7b893176a1b5006b2e346683c09cd6faaacf38a4ac51,2025-04-01T20:26:11.547000 +CVE-2025-30455,0,1,5ac415298edc3bac9e768212f8345cfefeebbf0333fc9470055a8cc811912842,2025-04-01T20:26:11.547000 CVE-2025-30456,0,0,a4adbf3fb3bfda6c1ff7ac3e59f722d6890d88837b4dfbbcb9888cc15a9a477a,2025-04-04T18:13:02.067000 CVE-2025-30457,0,0,9931b57801603e5171d9b9131e7fbe4120bea818d45e3d4b53b5782cd0d5fd9e,2025-04-04T18:12:47.103000 CVE-2025-30458,0,0,d44cd0a8f35468ff3b2dcecdff85e9434b31c8f37fa6b8dfb1a82259a2d7a917,2025-04-04T18:12:42.757000 @@ -287824,14 +287825,14 @@ CVE-2025-30621,0,0,8c6a6eedc9f943375208fa96aeb0d151078d5fa54598208cfb233511cfe9b CVE-2025-30622,0,0,797c397d49f77f00a276d4088c4e3466e59efa0b6ce4fa17d94546d3a32ca074,2025-04-01T20:26:11.547000 CVE-2025-30623,0,0,a8e0620fa0eff69e53f34c91bac6562d90d04f91188fb9d1c9bfa47d4c96dabd,2025-03-27T16:44:44.143000 CVE-2025-3063,0,0,2e45f7e85b76c34e4c90c66b657feb85dadfe8fb2002194cf56059b20b804015,2025-04-02T14:58:07.527000 -CVE-2025-3066,0,0,fd31618ea0039bc1c76fc5f0ad8ea6fffdb369063d756e38fca0aff4a40ff1d6,2025-04-02T14:58:07.527000 +CVE-2025-3066,0,1,03f9a1bb2c29153c0948aa39cce060627d444aaf0a825fca34c07c32a4c6319c,2025-04-02T14:58:07.527000 CVE-2025-3067,0,0,137654232245c02adb3b6bc4a9fe4453e793714623555640c944c49ca758c0bb,2025-04-02T14:58:07.527000 CVE-2025-30672,0,0,3ded266990ba9009f55577f3f5d04302a5c6b8450014b92c80b83398ad23d15e,2025-04-01T20:26:11.547000 CVE-2025-30673,0,0,1cf76211fcfa10ad4c1393e8c6dafbf3bed92def83ca793b34e5eea95c528365,2025-04-01T20:26:11.547000 CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc884a,2025-04-02T22:15:20.260000 -CVE-2025-3068,0,0,f9a39222b61453a29b2f1a4069016bca54bcc8b63aad375ae49396e14d902dd4,2025-04-03T14:15:44.400000 -CVE-2025-3069,0,0,4e389991d0ef74c06433469fc9e023b9359cbeab2c1e7d5be193ba6024cb2402,2025-04-03T14:15:44.560000 -CVE-2025-3070,0,0,a4ab7f6eaf5d1ec4cd8c416cae299fae525aeec5fa932d5ba990523b9e8fa991,2025-04-03T18:15:48.053000 +CVE-2025-3068,0,1,4267c1d7610ab6ed7b6514ce611c17809d366e0f57c5db370b8001fd5d0cc4bd,2025-04-03T14:15:44.400000 +CVE-2025-3069,0,1,f0cdb34667db22fe3443f98ac92e43d019c02ffd04c5a9caf026e3efa3db1654,2025-04-03T14:15:44.560000 +CVE-2025-3070,0,1,e9fb90d1e66be86869705d3447aa52711dbdd16a7f9894abe14e212149c50d01,2025-04-03T18:15:48.053000 CVE-2025-3071,0,0,0a9205c6ee6066c46b5ec0edfa27f1d3973a7cf68687532cc9e9610b04e77b91,2025-04-02T14:58:07.527000 CVE-2025-3072,0,0,ddcbaf040f317e06ba30451dfe0d6f628f558eec148a6cd6a3694b67994c1b8f,2025-04-02T14:58:07.527000 CVE-2025-3073,0,0,5b3691858a5f3f8c9fda3b40e4cc2efc5d5a3f5c797da0dcb3d227256f0347ec,2025-04-02T14:58:07.527000 @@ -288105,7 +288106,7 @@ CVE-2025-31187,0,0,a6105b8146b15b371ec11e675e56d0f333e59f34cafc14af70a8938c57646 CVE-2025-31188,0,0,2fb0e110c15582ab5d864f4ce86dbfdd024f43772415d4f0943e5f687dee52d2,2025-04-01T20:26:11.547000 CVE-2025-3119,0,0,c1a8882c407babd47aa6ac07c5d341bee78441b1227c61448a35af71afb68fda,2025-04-03T14:15:44.840000 CVE-2025-31191,0,0,5c887fe6f1a981b5941578aba17f50355dc847fd896dda368980895a9fb92d49,2025-04-04T18:14:34.590000 -CVE-2025-31192,0,0,3e73dd7a26b33015ce76fd174b2a3346c3d188eb35507b4e68c2ae4f7c78b869,2025-04-03T21:15:40.627000 +CVE-2025-31192,0,1,b1f1b9e68e803aec075d3f9471c96040f99aa3ea79cd4218735ae19baeff3193,2025-04-03T21:15:40.627000 CVE-2025-31194,0,0,03f4d110302543c66a4fd7a7b9480fc20da220403b3309cb642a2155d37d36c6,2025-04-04T18:14:27.780000 CVE-2025-3120,0,0,e50a4b8e9f4394c1a251e1a65f13e688519ceb35f1a621650ebad35571a5f10d,2025-04-02T22:15:21.047000 CVE-2025-3121,0,0,94fccc916e2dadc05e6605b448acb94c41bf58e0b31c3affc5840a6a10c4cb07,2025-04-02T22:15:21.220000 @@ -288826,7 +288827,13 @@ CVE-2025-3342,0,0,deace936bd60dab082139939254e85c98ae9e697787a0f1baa37e9158485a6 CVE-2025-3343,0,0,eec621cc7fe6a834a2f443ec38ca943ffb9f3e3f01ffec434c2062a598b3969b,2025-04-07T08:15:14.120000 CVE-2025-3344,0,0,a58b3ce2e11b8f4240a7e00280e9001b2c4df020b273799feb5c2d07e9000bd9,2025-04-07T09:15:16.850000 CVE-2025-3345,0,0,41b232ef3d896e76634b3ffd0199594e52e88bc75d9bb547cb22c6d0c760ff8c,2025-04-07T09:15:17.047000 -CVE-2025-3346,1,1,91b87c156c3acc53e3d2e97a2510549b5bdcb338bcff8ae02b0d33c710dbacfe,2025-04-07T10:15:15.153000 -CVE-2025-3347,1,1,362ac1f703b7d41342bb62308cd1097739438db98e2245f8c9a1492ed28b769b,2025-04-07T10:15:16.700000 -CVE-2025-3348,1,1,b3a2aa9a4be182400caa9dc164d393014997f1a700768c39263c961ccfc43328,2025-04-07T11:15:53.607000 -CVE-2025-3349,1,1,f8424661986fedd880e8b841d16614e03a25147f7bd69d554f7ac4698ce6d44b,2025-04-07T11:15:53.807000 +CVE-2025-3346,0,0,91b87c156c3acc53e3d2e97a2510549b5bdcb338bcff8ae02b0d33c710dbacfe,2025-04-07T10:15:15.153000 +CVE-2025-3347,0,0,362ac1f703b7d41342bb62308cd1097739438db98e2245f8c9a1492ed28b769b,2025-04-07T10:15:16.700000 +CVE-2025-3348,0,0,b3a2aa9a4be182400caa9dc164d393014997f1a700768c39263c961ccfc43328,2025-04-07T11:15:53.607000 +CVE-2025-3349,0,0,f8424661986fedd880e8b841d16614e03a25147f7bd69d554f7ac4698ce6d44b,2025-04-07T11:15:53.807000 +CVE-2025-3350,1,1,af2523ec11c224fe7346105c887be7c9fa5c7ae52c770622f8bdfc3aed10d7d3,2025-04-07T12:15:16.100000 +CVE-2025-3351,1,1,51f855cf0c07ae294f7361db699fe786559140b507918edea926b7204ea6cc22,2025-04-07T12:15:16.380000 +CVE-2025-3352,1,1,ab19b1179b0591a0016ba0efd218ec53fb3572f4b619b32135d67b25a30c507c,2025-04-07T13:15:42.643000 +CVE-2025-3353,1,1,4ace4eeb1ef063d06d60a9773d3100c62384c517ba90d14208bb351f0ea1ff5d,2025-04-07T13:15:43.313000 +CVE-2025-3359,1,1,b3521ddf5292c867465e30bfbc36644565520aebd912672a9af17753cb6fe59b,2025-04-07T13:15:43.510000 +CVE-2025-3360,1,1,5cc0539618dcb78f13c0ebba8f54f038b422ef247232ef2be9eaa6c12b8ea0d7,2025-04-07T13:15:43.687000