Auto-Update: 2025-04-03T20:00:27.685749+00:00

This commit is contained in:
cad-safe-bot 2025-04-03 20:04:06 +00:00
parent a16584f8a7
commit 4ca368f310
91 changed files with 2603 additions and 531 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2009-1862",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-07-23T20:30:00.233",
"lastModified": "2025-02-10T19:15:29.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:53:02.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2010-4398",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-12-06T13:44:54.863",
"lastModified": "2025-02-10T19:15:30.553",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:53:38.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2012-1535",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-08-15T10:31:40.677",
"lastModified": "2025-02-07T15:15:12.317",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:53:43.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2012-4969",
"sourceIdentifier": "cve@mitre.org",
"published": "2012-09-18T10:39:14.147",
"lastModified": "2025-02-04T22:15:30.557",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:53:59.563",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",

View File

@ -2,8 +2,8 @@
"id": "CVE-2013-2551",
"sourceIdentifier": "cve@mitre.org",
"published": "2013-03-11T10:55:01.070",
"lastModified": "2025-02-07T15:15:12.657",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:42:00.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-0130",
"sourceIdentifier": "secalert@redhat.com",
"published": "2014-05-07T10:55:04.133",
"lastModified": "2025-02-07T14:15:35.553",
"vulnStatus": "Modified",
"lastModified": "2025-04-03T18:05:17.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-0160",
"sourceIdentifier": "secalert@redhat.com",
"published": "2014-04-07T22:55:03.893",
"lastModified": "2025-02-07T14:15:35.913",
"vulnStatus": "Modified",
"lastModified": "2025-04-03T18:02:46.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secalert@redhat.com",
"published": "2014-05-07T10:55:04.337",
"lastModified": "2025-02-07T14:15:36.983",
"vulnStatus": "Modified",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secalert@redhat.com",
"published": "2015-11-25T20:59:07.680",
"lastModified": "2025-02-07T14:15:39.783",
"vulnStatus": "Modified",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "secalert@redhat.com",
"published": "2016-06-07T14:06:13.247",
"lastModified": "2025-02-07T14:15:41.510",
"vulnStatus": "Modified",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-10561",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-05-04T03:29:00.227",
"lastModified": "2025-02-03T16:15:29.493",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:54:49.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -145,7 +145,8 @@
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
@ -171,7 +172,8 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-7445",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-03-19T21:29:01.083",
"lastModified": "2025-02-07T17:15:11.783",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:54:38.983",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-11510",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-05-08T17:29:00.630",
"lastModified": "2025-02-03T17:15:11.467",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:42:38.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-11539",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-04-26T02:29:00.300",
"lastModified": "2025-02-03T16:15:30.543",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:50:18.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -121,8 +121,128 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "202E4839-7CE4-49CE-BEE1-CB33A96770E7"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:-:*:*:*:*:*:*",
"matchCriteriaId": "CA1B64EC-AD68-4F55-9CA2-4A1841764CF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r1.0:*:*:*:*:*:*",
"matchCriteriaId": "9BF1434F-BC2F-4C63-B3CB-BBC14F95E0EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "5EF31B2A-7DEE-4C69-ADE5-FFBF176D8DCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r10.0:*:*:*:*:*:*",
"matchCriteriaId": "AFC39A4D-7738-4818-9866-A34C55216401"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r11.0:*:*:*:*:*:*",
"matchCriteriaId": "91B0F725-70CD-4CF4-AF35-4DEB24F7E3E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r11.1:*:*:*:*:*:*",
"matchCriteriaId": "E6FA7630-082B-4F48-BE53-981052FB7268"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r12.0:*:*:*:*:*:*",
"matchCriteriaId": "46F9CEBB-08AD-42DD-8CEE-6F1C555D1608"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r12.1:*:*:*:*:*:*",
"matchCriteriaId": "BF7844C4-7A48-49D1-A924-2C546E9C6BB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r13.0:*:*:*:*:*:*",
"matchCriteriaId": "91884BC5-280F-4E39-88E0-E7C4F6519D71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r14.0:*:*:*:*:*:*",
"matchCriteriaId": "3E3F03F7-A3CE-4E98-95A7-43906FFE7959"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r2.0:*:*:*:*:*:*",
"matchCriteriaId": "D56B8268-81D1-4CC0-A115-0CDFE8ACD59D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r2.1:*:*:*:*:*:*",
"matchCriteriaId": "B10E91CD-0FCC-4DEF-8043-38819C597934"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r3.0:*:*:*:*:*:*",
"matchCriteriaId": "90781AFB-D463-40F4-9A74-8F0256ACE64F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "9D3965E4-51E0-4F15-B03B-7342EA6BCA63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r3.2:*:*:*:*:*:*",
"matchCriteriaId": "2636BBD1-D46F-4EA2-A460-A343443F838A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r4.0:*:*:*:*:*:*",
"matchCriteriaId": "ECFA01A7-6AB6-4E6B-82E3-30CE8C776960"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "069B315B-FF97-4F3C-A1AB-831E6CD5F94C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r5.0:*:*:*:*:*:*",
"matchCriteriaId": "84418011-9D3F-4C72-B911-A6E4CEA171F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r6.0:*:*:*:*:*:*",
"matchCriteriaId": "A7D488D9-6AC7-4DE4-9D65-A8E2D287DCB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r7:*:*:*:*:*:*",
"matchCriteriaId": "EA6054EC-A05F-46B4-9056-5719B2DB7EFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r7.0:*:*:*:*:*:*",
"matchCriteriaId": "B3A09079-5587-4FB1-9EC2-F6E44D523CB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r8.0:*:*:*:*:*:*",
"matchCriteriaId": "8FB98CD3-E968-4336-81BD-0132DBD7462C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r9.0:*:*:*:*:*:*",
"matchCriteriaId": "C5465537-625D-4A9D-8787-FF4744681BA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r9.1:*:*:*:*:*:*",
"matchCriteriaId": "96A2E24D-5EE5-46CF-AAA0-8474C4F641F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.1:r9.2:*:*:*:*:*:*",
"matchCriteriaId": "1243FDDA-6D64-408E-8911-FA1D37A915ED"
},
{
"vulnerable": true,
@ -131,118 +251,233 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AB453513-AFEA-4E68-8441-3984E83FFB2F"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "5F134803-A479-4DBE-B3D4-3A5D121E185F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1r1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E2037BE1-408C-47E8-8A70-8440BF3A1ED6"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r1.0:*:*:*:*:*:*",
"matchCriteriaId": "48B04626-10A7-4A12-AF3D-61C8D980AA21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7369296-0C10-4B64-A0EC-2E7BFAC5BB40"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "183E1DD7-EE4B-47C4-99E2-CD06ED2E0D4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F13F586F-A5FA-424F-B172-14FC29402F59"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r10.0:*:*:*:*:*:*",
"matchCriteriaId": "00F4DF7B-ED7F-46FC-8B12-5527FB5A4305"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BE71A8-1C4A-4CE0-A78C-DCF72E6775BA"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r11.0:*:*:*:*:*:*",
"matchCriteriaId": "4A5AF6A0-6613-4B15-A1A3-AEAC0EF7E374"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51E0AC17-77DE-440F-8166-FD3A8D039EB7"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r12.0:*:*:*:*:*:*",
"matchCriteriaId": "970C2BEE-5798-4A5F-8D4E-7970BFCF0CD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7A8628-6636-485E-B888-A13D732D87C7"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r2.0:*:*:*:*:*:*",
"matchCriteriaId": "1D187DDB-96C8-4435-992E-CFEEE24BC7C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DB60BAE-D42E-4953-822D-C9B4CF83EA9D"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r3.0:*:*:*:*:*:*",
"matchCriteriaId": "1CA6CBE1-CF6C-4D8C-BAB3-0B78E56E85DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9A9BB556-DADF-49F0-BEF2-84629EC430FF"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "761102E8-04DB-465A-A592-98C5F5E0ADFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E9AB1607-3B0C-49A8-95E0-68FB8DF6432B"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r4.0:*:*:*:*:*:*",
"matchCriteriaId": "3F7455AD-E662-4817-A343-9ACCE763B78E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1ACA79EE-8F71-4805-B4D4-72B40EE7933D"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r4.1:*:*:*:*:*:*",
"matchCriteriaId": "A1F61A93-6E90-4063-BFCA-166DA0DDCE38"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "261B6197-161F-4141-B5D1-95160AFA3B45"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r5.0:*:*:*:*:*:*",
"matchCriteriaId": "B5BF94C4-0456-4CB1-9CC5-02A316C84E09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7FE79E96-37CA-46F5-B14C-9024E4D7CD25"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r5.1:*:*:*:*:*:*",
"matchCriteriaId": "35F94103-0DB3-4D3A-8247-59E1F86743B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2r7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A559BDBF-FEE2-4DC2-B4D8-597DD78332DB"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r6.0:*:*:*:*:*:*",
"matchCriteriaId": "784ADC67-57BF-4FFA-AC13-5F2F1208F39D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2rx:*:*:*:*:*:*:*",
"matchCriteriaId": "97B87335-3883-4B3F-863E-A1E3E7541049"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r7.0:*:*:*:*:*:*",
"matchCriteriaId": "E6D81535-5163-4DAD-8AAA-61F107E11EB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3rx:*:*:*:*:*:*:*",
"matchCriteriaId": "DD77C208-DD3E-46BD-930F-93BB39799D08"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r7.1:*:*:*:*:*:*",
"matchCriteriaId": "DCF535C6-97A2-4222-9BF4-A7D16E5598FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "47D68BA7-3626-4D54-B6B3-ED0C2F25ADC1"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r7.2:*:*:*:*:*:*",
"matchCriteriaId": "40209543-6A6C-4811-834F-1CBF0C13A7E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "190F575A-E9D4-403B-9AAC-D665D80B37D3"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r8.0:*:*:*:*:*:*",
"matchCriteriaId": "2B3806F4-53E6-47B2-9D16-69B566DAAD97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0r2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37B522EA-2724-4D88-89FE-8A3E1297313E"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r8.1:*:*:*:*:*:*",
"matchCriteriaId": "A37BEF28-D0D5-46BD-A460-32734D0D63B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "6444B34E-C3E3-4959-8C5D-ACF5FF65D2DE"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r8.2:*:*:*:*:*:*",
"matchCriteriaId": "363C9E09-EC06-4A34-8C25-97DCCAA992E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0r3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF9BB1A-07D4-4757-BC09-49CCC044CE92"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.2:r9.0:*:*:*:*:*:*",
"matchCriteriaId": "3AB170D9-42AF-417B-8EF8-2895F54D0AEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0r3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4694C1-667B-4BAC-ABF1-92AE4FD26893"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:-:*:*:*:*:*:*",
"matchCriteriaId": "26EF79B8-9D5D-4C00-B42A-B58BB6EDA452"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0rx:*:*:*:*:*:*:*",
"matchCriteriaId": "59FE2F01-1675-45FB-90ED-A7A8C3E79114"
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "2871AAD9-FC12-4E2D-B722-0F721D7FE101"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r1.1:*:*:*:*:*:*",
"matchCriteriaId": "C52DE60A-0B74-406C-B962-313E37806E89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "2A319BAB-F483-4926-9700-760D8025F747"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r2.1:*:*:*:*:*:*",
"matchCriteriaId": "AA6BD7FD-29A3-468C-8A85-63202EB1B625"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r3:*:*:*:*:*:*",
"matchCriteriaId": "00AA23DF-CA30-41FC-9563-C95BA7D31129"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r4:*:*:*:*:*:*",
"matchCriteriaId": "D85A6292-EE41-487C-A1DC-0E8E443A8075"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r5:*:*:*:*:*:*",
"matchCriteriaId": "2D829F28-4FFF-40C9-AF62-455BA5BB4E58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r5.1:*:*:*:*:*:*",
"matchCriteriaId": "8DC693D8-D12B-4A0B-808A-A0808BAA33DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r5.2:*:*:*:*:*:*",
"matchCriteriaId": "3837BB6E-5236-4B2D-9693-4DE85C7845C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r6:*:*:*:*:*:*",
"matchCriteriaId": "72430B2F-A311-4DF7-ABBB-1EE0BAF507FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r6.1:*:*:*:*:*:*",
"matchCriteriaId": "B7FCDCCF-8509-431A-B450-B18C110AAE19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:8.3:r7:*:*:*:*:*:*",
"matchCriteriaId": "718B6320-E7BE-4715-A446-541D1AADA027"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*",
"matchCriteriaId": "D47D09A8-4AC4-4CD9-B648-5F26453E2E1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*",
"matchCriteriaId": "59331DC5-FF5F-4BB3-905E-5A4A621F86ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*",
"matchCriteriaId": "6A708C3F-9050-4475-95B3-4785D3E2CB69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*",
"matchCriteriaId": "52851AAA-88FB-40BC-B41A-B821F6BA9F79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "F05DC11E-7C41-450B-A2BF-603E9252BB40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*",
"matchCriteriaId": "5DA976D9-A330-475E-B8C0-09EF3E08F18D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:connect_secure:9.0:r3.3:*:*:*:*:*:*",
"matchCriteriaId": "59F4A6F7-A6D4-4517-A316-7C7C002A9ED3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.0:r1:*:*:*:*:*:*",
"matchCriteriaId": "26B25B34-7BD0-471B-A396-45CE5420E963"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.0:r2:*:*:*:*:*:*",
"matchCriteriaId": "AA514C05-2834-4C7B-B022-02B41C9AAD6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.0:r2.1:*:*:*:*:*:*",
"matchCriteriaId": "0929C645-DACB-4341-9032-7C79FFC8BCF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.0:r3:*:*:*:*:*:*",
"matchCriteriaId": "0D36CB5A-8389-4F2F-882A-4E8F30028799"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:policy_secure:9.0:r3.1:*:*:*:*:*:*",
"matchCriteriaId": "517DA74B-9D69-45E1-A707-A08A305A507C"
},
{
"vulnerable": true,
@ -573,36 +808,6 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4rx:*:*:*:*:*:*:*",
"matchCriteriaId": "07A6F2EF-09AF-4DAA-A552-6111C51DD210"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "8C50D348-E894-4B8D-ACFF-DE04FB47A97B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "436C11B9-1A19-4751-877C-104370C769A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.0r2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "10F709A2-79F6-4912-9B81-6EBF9E0D438E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "B694A761-C3DC-41C9-8FFA-271950BEFE60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.0r3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE48A776-5899-47E8-8B1C-B046594E6084"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_policy_secure:9.0rx:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7BB3D9-7259-4DF3-B408-AE421CE206D4"
}
]
}
@ -631,7 +836,8 @@
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
@ -639,7 +845,8 @@
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
@ -702,7 +909,8 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{
@ -710,7 +918,8 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
"VDB Entry",
"Broken Link"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-16256",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-09-12T13:15:10.327",
"lastModified": "2025-02-04T20:15:32.740",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:51:06.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-16920",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-09-27T12:15:10.017",
"lastModified": "2025-02-04T20:15:32.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:51:22.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-19781",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-12-27T14:15:12.070",
"lastModified": "2025-02-04T20:15:33.733",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:51:47.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-20085",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-12-30T03:15:10.663",
"lastModified": "2025-02-04T21:15:18.877",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:52:00.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-10181",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-03-11T16:15:12.007",
"lastModified": "2025-02-04T20:15:33.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:52:13.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-11651",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-04-30T17:15:12.143",
"lastModified": "2025-02-07T14:15:47.163",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:44:09.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-11652",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-04-30T17:15:12.190",
"lastModified": "2025-02-04T20:15:35.043",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:52:25.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-12271",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-04-27T04:15:10.553",
"lastModified": "2025-02-04T20:15:35.810",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:43:49.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-15505",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-07-07T02:15:10.613",
"lastModified": "2025-02-04T20:15:36.467",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:52:34.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-29574",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-12-11T17:15:13.480",
"lastModified": "2025-02-07T02:00:02.403",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:45:42.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-29583",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-12-22T22:15:14.443",
"lastModified": "2025-02-04T21:15:19.770",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:46:18.343",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-36193",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-18T20:15:12.667",
"lastModified": "2025-02-04T21:15:20.297",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:44:16.763",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-7247",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-01-29T16:15:12.897",
"lastModified": "2025-02-04T21:15:20.550",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:43:07.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-27101",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-02-16T21:15:13.077",
"lastModified": "2025-02-03T17:15:11.897",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:14:16.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-28664",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-10T15:15:07.590",
"lastModified": "2025-02-03T15:15:13.273",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:15:16.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-31755",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-05-07T23:15:07.047",
"lastModified": "2025-02-04T20:15:42.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:15:01.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -147,7 +147,8 @@
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
},
{
@ -156,7 +157,8 @@
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
"Third Party Advisory",
"Broken Link"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3156",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-26T21:15:12.987",
"lastModified": "2025-02-03T17:15:12.143",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:47:48.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-35395",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-08-16T12:15:07.300",
"lastModified": "2025-02-04T20:15:43.577",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:15:22.037",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-37415",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-09-01T06:15:06.530",
"lastModified": "2025-02-03T16:15:31.193",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:48:08.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-40539",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-09-07T17:15:07.367",
"lastModified": "2025-02-03T16:15:31.417",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:48:33.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-40870",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-09-13T08:15:13.913",
"lastModified": "2025-02-04T20:15:44.023",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:15:43.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-4034",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-01-28T20:15:12.193",
"lastModified": "2024-11-21T06:36:45.880",
"vulnStatus": "Modified",
"lastModified": "2025-04-03T18:53:12.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -656,7 +656,11 @@
},
{
"url": "https://www.vicarius.io/vsociety/posts/pwnkit-pkexec-lpe-cve-2021-4034",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42237",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-11-05T10:15:08.240",
"lastModified": "2025-02-03T16:15:31.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:15:55.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45382",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-02-17T21:15:07.737",
"lastModified": "2025-01-29T21:15:11.770",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:48:43.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-24682",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-02-09T04:15:07.400",
"lastModified": "2025-02-27T02:00:01.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T18:54:00.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-24990",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-07T18:15:09.100",
"lastModified": "2025-02-03T15:15:13.737",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T18:54:58.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-26500",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-17T21:15:08.193",
"lastModified": "2025-02-03T16:15:32.213",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T18:54:21.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-29464",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-18T22:15:09.027",
"lastModified": "2025-01-29T21:15:14.070",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T18:54:31.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38181",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-25T19:15:11.487",
"lastModified": "2025-02-03T15:15:14.263",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T18:54:52.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41352",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-26T02:15:10.733",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T18:54:44.173",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41417",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-18T14:15:10.793",
"lastModified": "2024-11-21T07:23:11.400",
"lastModified": "2025-04-03T19:15:37.693",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46475",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-17T21:15:14.340",
"lastModified": "2024-11-21T07:30:36.987",
"lastModified": "2025-04-03T19:15:37.930",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46476",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-19T23:15:23.497",
"lastModified": "2024-11-21T07:30:37.130",
"lastModified": "2025-04-03T19:15:38.140",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46887",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-19T19:15:10.490",
"lastModified": "2024-11-21T07:31:14.860",
"lastModified": "2025-04-03T19:15:38.337",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46888",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-19T19:15:10.950",
"lastModified": "2024-11-21T07:31:15.020",
"lastModified": "2025-04-03T19:15:38.530",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48152",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-20T19:15:17.727",
"lastModified": "2024-11-21T07:32:54.300",
"lastModified": "2025-04-03T19:15:38.720",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48279",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-20T19:15:17.783",
"lastModified": "2024-11-21T07:33:04.490",
"lastModified": "2025-04-03T19:15:38.917",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-436"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-436"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5217",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-28T16:15:10.980",
"lastModified": "2025-02-03T14:15:37.370",
"vulnStatus": "Modified",
"lastModified": "2025-04-03T18:55:36.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -224,15 +224,15 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.0",
"versionEndExcluding": "17.0.3",
"matchCriteriaId": "DD22C5B0-7113-4F66-AF85-46F9DD0DC6B3"
"matchCriteriaId": "5383A8BF-7AD6-4D5A-9B57-DE1BC2C59E09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7DE4E0B0-9E6E-4735-8EFC-81D1F1724FCF"
"criteria": "cpe:2.3:o:apple:ipados:16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A377B7C9-A339-49A9-9C96-A6F5F738B40C"
},
{
"vulnerable": true,

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-10628",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-26T06:15:22.980",
"lastModified": "2025-04-03T17:15:30.353",
"lastModified": "2025-04-03T19:15:39.147",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -67,6 +67,10 @@
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9bd873e5-fd65-48c3-a71d-aaf6d8372606?source=cve",
"source": "security@wordfence.com"
},
{
"url": "https://abrahack.com/posts/quiz-maker-sqli/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12852",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-08T07:15:27.250",
"lastModified": "2025-01-08T07:15:27.250",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T19:01:48.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wedevs:happy_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.15.2",
"matchCriteriaId": "790D997F-6317-471C-A803-D7DE7A8F187A"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3212495/happy-elementor-addons/tags/3.15.2/assets/js/custom-mouse-cursor.js",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e60d4528-2ec5-4a4b-be77-0fc012c13720?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-22611",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T19:15:39.260",
"lastModified": "2025-04-03T19:15:39.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenEMR 7.0.2 is vulnerable to SQL Injection via \\openemr\\library\\classes\\Pharmacy.class.php, \\controllers\\C_Pharmacy.class.php and \\openemr\\controller.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/baolqinfosec/CVE-Reseach/blob/main/OpenERM_CVE-2024-22611.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-24456",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-03-31T21:15:44.513",
"lastModified": "2025-04-01T20:26:22.890",
"lastModified": "2025-04-03T18:15:44.493",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An E-RAB Release Command packet containing a malformed NAS PDU\u00a0will cause the Athonet MME to immediately crash, potentially due to a\u00a0buffer overflow."
},
{
"lang": "es",
"value": "Un paquete de comando de liberaci\u00f3n E-RAB que contiene una PDU NAS mal formada provocar\u00e1 que Athonet MME se bloquee inmediatamente, posiblemente debido a un desbordamiento del b\u00fafer."
}
],
"metrics": {
@ -35,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36401",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-07-01T16:15:04.120",
"lastModified": "2025-03-19T15:15:47.110",
"vulnStatus": "Modified",
"lastModified": "2025-04-03T19:57:04.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -95,8 +95,15 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.22.6",
"matchCriteriaId": "BE0EE582-FAE7-4528-9A5E-6E56EB1DE345"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.23.0",
"versionEndExcluding": "2.23.6",
"matchCriteriaId": "9C28BE03-93E6-4FC4-AA6E-00E41AF25CB0"
"matchCriteriaId": "0069EB0E-BF96-47F5-8A02-13F9FA6C15D8"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55198",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-13T15:15:49.460",
"lastModified": "2025-03-19T19:15:42.970",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-03T18:31:39.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:celk:celk_saude:3.1.252.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0F77EE-A79E-45C1-B6A7-8B7FC318225D"
}
]
}
]
}
],
"references": [
{
"url": "https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Technical Description"
]
},
{
"url": "https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/gabriel-bri/vulnerability-research/tree/main/CVE-2024-55198",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57487",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T17:15:17.160",
"lastModified": "2025-01-13T20:15:29.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-03T18:48:41.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:online_car_rental_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "751FE1F9-3D0E-447C-A750-C42F56A74903"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/online-car-rental-using-php-source-code/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/aaryan-11-x/CVE-2024-57487-and-CVE-2024-57488",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57488",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T17:15:17.263",
"lastModified": "2025-01-13T20:15:29.240",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-03T18:44:37.930",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:online_car_rental_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "751FE1F9-3D0E-447C-A750-C42F56A74903"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/online-car-rental-using-php-source-code/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/aaryan-11-x/CVE-2024-57487-and-CVE-2024-57488",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9612",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:49.560",
"lastModified": "2025-03-20T14:15:22.310",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T18:10:11.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -49,16 +71,51 @@
"value": "CWE-1100"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:onyx:onyx:0.3.94:*:*:*:*:*:*:*",
"matchCriteriaId": "27CB937B-3A49-4F61-9EA4-572AD261D653"
}
]
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/c1046fa0-a719-475e-ba62-2b97873fbac4",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://huntr.com/bounties/c1046fa0-a719-475e-ba62-2b97873fbac4",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9900",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:50.417",
"lastModified": "2025-03-20T14:15:22.403",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T18:04:59.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -49,20 +71,58 @@
"value": "CWE-115"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mudler:localai:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A584258D-3530-4396-B7C8-A3EC4E8CD1C3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mudler/localai/commit/a1634b219a4e52813e70ff07e6376a01449c4515",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/b39cd230-db66-471b-89b9-24afaa078e68",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://huntr.com/bounties/b39cd230-db66-471b-89b9-24afaa078e68",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9920",
"sourceIdentifier": "security@huntr.dev",
"published": "2025-03-20T10:15:50.787",
"lastModified": "2025-03-20T10:15:50.787",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-03T18:02:58.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -49,12 +71,43 @@
"value": "CWE-434"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lollms:lollms_web_ui:12:*:*:*:*:*:*:*",
"matchCriteriaId": "13C2AF1C-0ECA-4677-8686-A1F6F67A5E0B"
}
]
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/c70c6732-23b3-4ef8-aec6-0a47467d1ed5",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-1534",
"sourceIdentifier": "769c9ae7-73c3-4e47-ae19-903170fc3eb8",
"published": "2025-04-01T04:15:44.170",
"lastModified": "2025-04-01T20:26:11.547",
"lastModified": "2025-04-03T18:15:44.637",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CVE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Payara Platform Payara Server allows : Remote Code Inclusion.This issue affects Payara Server: from 4.1.2.1919.1 before 4.1.2.191.51, from 5.20.0 before 5.68.0, from 6.0.0 before 6.23.0, from 6.2022.1 before 6.2025.2."
},
{
"lang": "es",
"value": "CVE-79: Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Payara Platform Payara Server permite: Inclusi\u00f3n de c\u00f3digo remoto. Este problema afecta a Payara Server: desde 4.1.2.1919.1 antes de 4.1.2.191.51, desde 5.20.0 antes de 5.68.0, desde 6.0.0 antes de 6.23.0, desde 6.2022.1 antes de 6.2025.2."
}
],
"metrics": {
@ -57,6 +61,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://docs.payara.fish/community/docs/6.2025.3/Release%20Notes/Release%20Notes%206.2025.3.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2263",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2025-03-13T17:15:38.617",
"lastModified": "2025-03-14T14:15:19.660",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-03T18:20:38.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,16 +69,51 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:santesoft:sante_pacs_server:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "94D12F49-C02A-4B31-B215-387260205DB3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/research/tra-2025-08",
"source": "vulnreport@tenable.com"
"source": "vulnreport@tenable.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2025-08",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-2264",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2025-03-13T17:15:38.787",
"lastModified": "2025-03-14T14:15:19.937",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-03T18:19:34.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,16 +69,51 @@
"value": "CWE-22"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:santesoft:sante_pacs_server:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "94D12F49-C02A-4B31-B215-387260205DB3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/research/tra-2025-08",
"source": "vulnreport@tenable.com"
"source": "vulnreport@tenable.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2025-08",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23108",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-01-11T04:15:06.280",
"lastModified": "2025-01-13T18:15:22.680",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-03T18:58:00.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*",
"versionEndExcluding": "134.0",
"matchCriteriaId": "287CBA5C-D765-4028-A3EE-44AE2589E99E"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933172",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-06/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-23109",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-01-11T04:15:06.367",
"lastModified": "2025-01-13T18:15:22.903",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-03T18:52:57.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*",
"versionEndExcluding": "134.0",
"matchCriteriaId": "287CBA5C-D765-4028-A3EE-44AE2589E99E"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1419275",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-06/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-24213",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:19.300",
"lastModified": "2025-04-01T20:26:22.890",
"lastModified": "2025-04-03T18:15:44.770",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved handling of floats. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A type confusion issue could lead to memory corruption."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n de los flotantes. Este problema est\u00e1 corregido en tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, y macOS Sequoia 15.4. Un problema de confusi\u00f3n de tipos pod\u00eda provocar da\u00f1os en la memoria."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-25041",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-04-01T17:15:44.967",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-03T18:15:44.960",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the HPE Aruba Networking Virtual Intranet Access (VIA) client could allow malicious users to overwrite arbitrary files as NT AUTHORITY\\SYSTEM (root). A successful exploit could allow the creation of a Denial-of-Service (DoS) condition affecting the Microsoft Windows Operating System. This vulnerability does not affect Linux and Android based clients."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el cliente HPE Aruba Networking Virtual Intranet Access (VIA) podr\u00eda permitir a usuarios maliciosos sobrescribir archivos arbitrarios como NT AUTHORITY\\SYSTEM (root). Una explotaci\u00f3n exitosa podr\u00eda generar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) que afecte al sistema operativo Microsoft Windows. Esta vulnerabilidad no afecta a los clientes basados en Linux ni Android."
}
],
"metrics": {
@ -35,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04841en_us&docLocale=en_US",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25625",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-13T15:15:53.650",
"lastModified": "2025-03-19T19:15:45.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-03T18:26:47.920",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,47 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fs:s3150-8t2f_firmware:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FBB5EC9-4387-4197-B74A-40D29FB4B9AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fs:s3150-8t2f_firmware:s3150-8t2f-switch-fsos-220d_118101:*:*:*:*:*:*:*",
"matchCriteriaId": "B5D38FBB-4A72-4F6F-BD81-F651B2A1D1EF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:fs:s3150-8t2f:*:*:*:*:*:*:*:*",
"matchCriteriaId": "847DCAC8-DE1C-4821-80B7-BACBE898AC9E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/whitewhale-dmb/Vulnerability-Research/tree/main/CVE-2025-25625",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-25723",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-28T23:15:11.280",
"lastModified": "2025-03-05T16:15:39.960",
"lastModified": "2025-04-03T19:15:39.403",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/74e26b8dfeb0ab8c7317603b80a18306d0698473",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/gpac/gpac/issues/3089",
"source": "cve@mitre.org"

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-29647",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T19:15:39.580",
"lastModified": "2025-04-03T19:15:39.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SeaCMS v13.3 has a SQL injection vulnerability in the component admin_tempvideo.php."
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/B00W_NSD/poc/blob/master/seacms13.3-sql/poc.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29773",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-13T17:15:37.833",
"lastModified": "2025-03-13T19:15:52.257",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-03T18:25:43.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.6,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,24 +69,65 @@
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:froxlor:froxlor:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C84957-A9D2-404A-9A78-055653742C5E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/froxlor/Froxlor/commit/a43d53d54034805e3e404702a01312fa0c40b623",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/froxlor/Froxlor/security/advisories/GHSA-7j6w-p859-464f",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
},
{
"url": "https://mega.nz/file/h8oFHQrL#I4V02_BWee4CCx7OoBl_2Ufkd5Wc7fvs5aCatGApkoQ",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/froxlor/Froxlor/security/advisories/GHSA-7j6w-p859-464f",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-2945",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2025-04-03T13:15:43.240",
"lastModified": "2025-04-03T13:15:43.240",
"lastModified": "2025-04-03T18:15:45.093",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/pgadmin-org/pgadmin4/issues/8603",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-2946",
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
"published": "2025-04-03T13:15:43.377",
"lastModified": "2025-04-03T13:15:43.377",
"lastModified": "2025-04-03T18:15:45.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/pgadmin-org/pgadmin4/issues/8602",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-30449",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:26.553",
"lastModified": "2025-04-01T20:26:22.890",
"lastModified": "2025-04-03T18:15:45.357",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n obtenga privilegios de root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122373",

View File

@ -2,16 +2,55 @@
"id": "CVE-2025-30456",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-03-31T23:15:27.120",
"lastModified": "2025-04-01T20:26:11.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-03T18:15:45.543",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de an\u00e1lisis en la gesti\u00f3n de rutas de directorio mejorando la validaci\u00f3n de rutas. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n obtenga privilegios de root."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122371",

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-3070",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:38.283",
"lastModified": "2025-04-02T14:58:07.527",
"lastModified": "2025-04-03T18:15:48.053",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient validation of untrusted input in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)"
},
{
"lang": "es",
"value": "La validaci\u00f3n insuficiente de entradas no confiables en las extensiones de Google Chrome anteriores a la versi\u00f3n 135.0.7049.52 permiti\u00f3 que un atacante remoto escalara privilegios mediante una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Media)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -22,6 +49,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1287"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-31115",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-03T17:15:30.540",
"lastModified": "2025-04-03T17:15:30.540",
"lastModified": "2025-04-03T19:15:39.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -93,6 +93,14 @@
{
"url": "https://tukaani.org/xz/xz-cve-2025-31115.patch",
"source": "security-advisories@github.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/04/03/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/04/03/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-31486",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-03T19:15:39.890",
"lastModified": "2025-04-03T19:15:39.890",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vite is a frontend tooling framework for javascript. The contents of arbitrary files can be returned to the browser. By adding ?.svg with ?.wasm?init or with sec-fetch-dest: script header, the server.fs.deny restriction was able to bypass. This bypass is only possible if the file is smaller than build.assetsInlineLimit (default: 4kB) and when using Vite 6.0+. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 4.5.12, 5.4.17, 6.0.14, 6.1.4, and 6.2.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/vitejs/vite/blob/037f801075ec35bb6e52145d659f71a23813c48f/packages/vite/src/node/plugins/asset.ts#L285-L290",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vitejs/vite/commit/62d7e81ee189d65899bb65f3263ddbd85247b647",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vitejs/vite/security/advisories/GHSA-xcj6-pq6g-qj4x",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-31487",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-03T19:15:40.047",
"lastModified": "2025-04-03T19:15:40.047",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The XWiki JIRA extension provides various integration points between XWiki and JIRA (macros, UI, CKEditor plugin). If the JIRA macro is installed, any logged in XWiki user could edit his/her user profile wiki page and use that JIRA macro, specifying a fake JIRA URL that returns an XML specifying a DOCTYPE pointing to a local file on the XWiki server host and displaying that file's content in one of the returned JIRA fields (such as the summary or description for example). The vulnerability has been patched in the JIRA Extension v8.6.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://github.com/xwiki-contrib/jira/commit/5049e352d16f8356734de70daf1202301f170ee6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/xwiki-contrib/jira/commit/98a74c2a516b42689c73b13ecd94e9c1998fa9cb",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/xwiki-contrib/jira/security/advisories/GHSA-wc53-4255-gw3f",
"source": "security-advisories@github.com"
},
{
"url": "https://jira.xwiki.org/browse/JIRA-49",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-31674",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-03-31T22:15:19.893",
"lastModified": "2025-04-01T20:26:22.890",
"lastModified": "2025-04-03T18:15:47.417",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability in Drupal Drupal core allows Object Injection.This issue affects Drupal core: from 8.0.0 before 10.3.13, from 10.4.0 before 10.4.3, from 11.0.0 before 11.0.12, from 11.1.0 before 11.1.3."
},
{
"lang": "es",
"value": "Vulnerabilidad de modificaci\u00f3n incorrectamente controlada de atributos de objetos determinados din\u00e1micamente en Drupal Drupal core permite la inyecci\u00f3n de objetos. Este problema afecta al n\u00facleo de Drupal: desde 8.0.0 antes de 10.3.13, desde 10.4.0 antes de 10.4.3, desde 11.0.0 antes de 11.0.12, desde 11.1.0 antes de 11.1.3."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "mlhess@drupal.org",

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-31692",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-03-31T22:15:21.873",
"lastModified": "2025-04-01T20:26:22.890",
"lastModified": "2025-04-03T18:15:47.570",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Drupal AI (Artificial Intelligence) allows OS Command Injection.This issue affects AI (Artificial Intelligence): from 0.0.0 before 1.0.5."
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('Inyecci\u00f3n de comando del sistema operativo') en Drupal AI (Artificial Intelligence) permite la inyecci\u00f3n de comandos del sistema operativo. Este problema afecta a AI (Inteligencia Artificial): desde 0.0.0 antes de 1.0.5."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "mlhess@drupal.org",

View File

@ -2,16 +2,43 @@
"id": "CVE-2025-31693",
"sourceIdentifier": "mlhess@drupal.org",
"published": "2025-03-31T22:15:21.983",
"lastModified": "2025-04-01T20:26:22.890",
"lastModified": "2025-04-03T18:15:47.763",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Drupal AI (Artificial Intelligence) allows OS Command Injection.This issue affects AI (Artificial Intelligence): from 0.0.0 before 1.0.5."
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo ('Inyecci\u00f3n de comando del sistema operativo') en Drupal AI (Artificial Intelligence) permite la inyecci\u00f3n de comandos del sistema operativo. Este problema afecta a AI (Inteligencia Artificial): desde 0.0.0 antes de 1.0.5."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "mlhess@drupal.org",

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3171",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T18:15:48.540",
"lastModified": "2025-04-03T19:15:40.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Project Worlds Online Lawyer Management System 1.0. This vulnerability affects unknown code of the file /approve_lawyer.php. The manipulation of the argument unblock_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/5",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303130",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303130",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.543273",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/p1026/CVE/issues/5",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-3173",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T19:15:40.853",
"lastModified": "2025-04-03T19:15:40.853",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Project Worlds Online Lawyer Management System 1.0. Affected is an unknown function of the file /save_booking.php. The manipulation of the argument lawyer_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/7",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303132",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303132",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.543275",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-3174",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T19:15:41.060",
"lastModified": "2025-04-03T19:15:41.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Project Worlds Online Lawyer Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /searchLawyer.php. The manipulation of the argument experience leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/8",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303133",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303133",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.543276",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-3175",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T19:15:41.277",
"lastModified": "2025-04-03T19:15:41.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Project Worlds Online Lawyer Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /save_user_edit_profile.php. The manipulation of the argument first_Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/9",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303134",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303134",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.543277",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-03T18:00:20.482659+00:00
2025-04-03T20:00:27.685749+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-03T17:59:15.633000+00:00
2025-04-03T19:57:04.207000+00:00
```
### Last Data Feed Release
@ -33,57 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
288396
288404
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `8`
- [CVE-2023-47639](CVE-2023/CVE-2023-476xx/CVE-2023-47639.json) (`2025-04-03T17:15:30.137`)
- [CVE-2024-4877](CVE-2024/CVE-2024-48xx/CVE-2024-4877.json) (`2025-04-03T16:15:32.840`)
- [CVE-2025-22457](CVE-2025/CVE-2025-224xx/CVE-2025-22457.json) (`2025-04-03T16:15:35.370`)
- [CVE-2025-29987](CVE-2025/CVE-2025-299xx/CVE-2025-29987.json) (`2025-04-03T16:15:36.420`)
- [CVE-2025-31115](CVE-2025/CVE-2025-311xx/CVE-2025-31115.json) (`2025-04-03T17:15:30.540`)
- [CVE-2025-3163](CVE-2025/CVE-2025-31xx/CVE-2025-3163.json) (`2025-04-03T16:15:37.133`)
- [CVE-2025-3164](CVE-2025/CVE-2025-31xx/CVE-2025-3164.json) (`2025-04-03T16:15:37.337`)
- [CVE-2025-3165](CVE-2025/CVE-2025-31xx/CVE-2025-3165.json) (`2025-04-03T16:15:37.530`)
- [CVE-2025-3166](CVE-2025/CVE-2025-31xx/CVE-2025-3166.json) (`2025-04-03T17:15:31.150`)
- [CVE-2025-3167](CVE-2025/CVE-2025-31xx/CVE-2025-3167.json) (`2025-04-03T17:15:31.390`)
- [CVE-2025-3168](CVE-2025/CVE-2025-31xx/CVE-2025-3168.json) (`2025-04-03T17:15:31.823`)
- [CVE-2025-3169](CVE-2025/CVE-2025-31xx/CVE-2025-3169.json) (`2025-04-03T17:15:32.080`)
- [CVE-2025-32054](CVE-2025/CVE-2025-320xx/CVE-2025-32054.json) (`2025-04-03T17:15:30.947`)
- [CVE-2024-22611](CVE-2024/CVE-2024-226xx/CVE-2024-22611.json) (`2025-04-03T19:15:39.260`)
- [CVE-2025-29647](CVE-2025/CVE-2025-296xx/CVE-2025-29647.json) (`2025-04-03T19:15:39.580`)
- [CVE-2025-31486](CVE-2025/CVE-2025-314xx/CVE-2025-31486.json) (`2025-04-03T19:15:39.890`)
- [CVE-2025-31487](CVE-2025/CVE-2025-314xx/CVE-2025-31487.json) (`2025-04-03T19:15:40.047`)
- [CVE-2025-3171](CVE-2025/CVE-2025-31xx/CVE-2025-3171.json) (`2025-04-03T18:15:48.540`)
- [CVE-2025-3173](CVE-2025/CVE-2025-31xx/CVE-2025-3173.json) (`2025-04-03T19:15:40.853`)
- [CVE-2025-3174](CVE-2025/CVE-2025-31xx/CVE-2025-3174.json) (`2025-04-03T19:15:41.060`)
- [CVE-2025-3175](CVE-2025/CVE-2025-31xx/CVE-2025-3175.json) (`2025-04-03T19:15:41.277`)
### CVEs modified in the last Commit
Recently modified CVEs: `129`
Recently modified CVEs: `81`
- [CVE-2025-0237](CVE-2025/CVE-2025-02xx/CVE-2025-0237.json) (`2025-04-03T16:29:29.923`)
- [CVE-2025-0238](CVE-2025/CVE-2025-02xx/CVE-2025-0238.json) (`2025-04-03T16:29:37.030`)
- [CVE-2025-0239](CVE-2025/CVE-2025-02xx/CVE-2025-0239.json) (`2025-04-03T16:29:43.707`)
- [CVE-2025-0240](CVE-2025/CVE-2025-02xx/CVE-2025-0240.json) (`2025-04-03T16:29:54.230`)
- [CVE-2025-0241](CVE-2025/CVE-2025-02xx/CVE-2025-0241.json) (`2025-04-03T16:30:05.620`)
- [CVE-2025-0242](CVE-2025/CVE-2025-02xx/CVE-2025-0242.json) (`2025-04-03T16:30:11.350`)
- [CVE-2025-0243](CVE-2025/CVE-2025-02xx/CVE-2025-0243.json) (`2025-04-03T16:30:20.247`)
- [CVE-2025-0244](CVE-2025/CVE-2025-02xx/CVE-2025-0244.json) (`2025-04-03T16:30:42.620`)
- [CVE-2025-0245](CVE-2025/CVE-2025-02xx/CVE-2025-0245.json) (`2025-04-03T16:30:35.153`)
- [CVE-2025-0246](CVE-2025/CVE-2025-02xx/CVE-2025-0246.json) (`2025-04-03T16:30:27.703`)
- [CVE-2025-0247](CVE-2025/CVE-2025-02xx/CVE-2025-0247.json) (`2025-04-03T16:25:30.160`)
- [CVE-2025-0313](CVE-2025/CVE-2025-03xx/CVE-2025-0313.json) (`2025-04-03T17:44:31.803`)
- [CVE-2025-21999](CVE-2025/CVE-2025-219xx/CVE-2025-21999.json) (`2025-04-03T16:15:34.983`)
- [CVE-2025-22004](CVE-2025/CVE-2025-220xx/CVE-2025-22004.json) (`2025-04-03T16:15:35.177`)
- [CVE-2025-22923](CVE-2025/CVE-2025-229xx/CVE-2025-22923.json) (`2025-04-03T16:15:35.543`)
- [CVE-2025-22924](CVE-2025/CVE-2025-229xx/CVE-2025-22924.json) (`2025-04-03T16:15:35.720`)
- [CVE-2025-25363](CVE-2025/CVE-2025-253xx/CVE-2025-25363.json) (`2025-04-03T16:43:59.040`)
- [CVE-2025-25598](CVE-2025/CVE-2025-255xx/CVE-2025-25598.json) (`2025-04-03T16:36:30.420`)
- [CVE-2025-26163](CVE-2025/CVE-2025-261xx/CVE-2025-26163.json) (`2025-04-03T16:18:02.457`)
- [CVE-2025-28010](CVE-2025/CVE-2025-280xx/CVE-2025-28010.json) (`2025-04-03T16:42:46.520`)
- [CVE-2025-29062](CVE-2025/CVE-2025-290xx/CVE-2025-29062.json) (`2025-04-03T16:15:35.893`)
- [CVE-2025-29063](CVE-2025/CVE-2025-290xx/CVE-2025-29063.json) (`2025-04-03T16:15:36.067`)
- [CVE-2025-29085](CVE-2025/CVE-2025-290xx/CVE-2025-29085.json) (`2025-04-03T16:15:36.237`)
- [CVE-2025-29635](CVE-2025/CVE-2025-296xx/CVE-2025-29635.json) (`2025-04-03T17:35:51.163`)
- [CVE-2025-31084](CVE-2025/CVE-2025-310xx/CVE-2025-31084.json) (`2025-04-03T17:31:28.073`)
- [CVE-2024-55198](CVE-2024/CVE-2024-551xx/CVE-2024-55198.json) (`2025-04-03T18:31:39.317`)
- [CVE-2024-57487](CVE-2024/CVE-2024-574xx/CVE-2024-57487.json) (`2025-04-03T18:48:41.720`)
- [CVE-2024-57488](CVE-2024/CVE-2024-574xx/CVE-2024-57488.json) (`2025-04-03T18:44:37.930`)
- [CVE-2024-9612](CVE-2024/CVE-2024-96xx/CVE-2024-9612.json) (`2025-04-03T18:10:11.190`)
- [CVE-2024-9900](CVE-2024/CVE-2024-99xx/CVE-2024-9900.json) (`2025-04-03T18:04:59.250`)
- [CVE-2024-9920](CVE-2024/CVE-2024-99xx/CVE-2024-9920.json) (`2025-04-03T18:02:58.177`)
- [CVE-2025-1534](CVE-2025/CVE-2025-15xx/CVE-2025-1534.json) (`2025-04-03T18:15:44.637`)
- [CVE-2025-2263](CVE-2025/CVE-2025-22xx/CVE-2025-2263.json) (`2025-04-03T18:20:38.627`)
- [CVE-2025-2264](CVE-2025/CVE-2025-22xx/CVE-2025-2264.json) (`2025-04-03T18:19:34.337`)
- [CVE-2025-23108](CVE-2025/CVE-2025-231xx/CVE-2025-23108.json) (`2025-04-03T18:58:00.940`)
- [CVE-2025-23109](CVE-2025/CVE-2025-231xx/CVE-2025-23109.json) (`2025-04-03T18:52:57.410`)
- [CVE-2025-24213](CVE-2025/CVE-2025-242xx/CVE-2025-24213.json) (`2025-04-03T18:15:44.770`)
- [CVE-2025-25041](CVE-2025/CVE-2025-250xx/CVE-2025-25041.json) (`2025-04-03T18:15:44.960`)
- [CVE-2025-25625](CVE-2025/CVE-2025-256xx/CVE-2025-25625.json) (`2025-04-03T18:26:47.920`)
- [CVE-2025-25723](CVE-2025/CVE-2025-257xx/CVE-2025-25723.json) (`2025-04-03T19:15:39.403`)
- [CVE-2025-2945](CVE-2025/CVE-2025-29xx/CVE-2025-2945.json) (`2025-04-03T18:15:45.093`)
- [CVE-2025-2946](CVE-2025/CVE-2025-29xx/CVE-2025-2946.json) (`2025-04-03T18:15:45.220`)
- [CVE-2025-29773](CVE-2025/CVE-2025-297xx/CVE-2025-29773.json) (`2025-04-03T18:25:43.613`)
- [CVE-2025-30449](CVE-2025/CVE-2025-304xx/CVE-2025-30449.json) (`2025-04-03T18:15:45.357`)
- [CVE-2025-30456](CVE-2025/CVE-2025-304xx/CVE-2025-30456.json) (`2025-04-03T18:15:45.543`)
- [CVE-2025-3070](CVE-2025/CVE-2025-30xx/CVE-2025-3070.json) (`2025-04-03T18:15:48.053`)
- [CVE-2025-31115](CVE-2025/CVE-2025-311xx/CVE-2025-31115.json) (`2025-04-03T19:15:39.707`)
- [CVE-2025-31674](CVE-2025/CVE-2025-316xx/CVE-2025-31674.json) (`2025-04-03T18:15:47.417`)
- [CVE-2025-31692](CVE-2025/CVE-2025-316xx/CVE-2025-31692.json) (`2025-04-03T18:15:47.570`)
- [CVE-2025-31693](CVE-2025/CVE-2025-316xx/CVE-2025-31693.json) (`2025-04-03T18:15:47.763`)
## Download and Usage

File diff suppressed because it is too large Load Diff