diff --git a/CVE-2016/CVE-2016-51xx/CVE-2016-5195.json b/CVE-2016/CVE-2016-51xx/CVE-2016-5195.json index 0aae48f73ec..ac2fa2dedc0 100644 --- a/CVE-2016/CVE-2016-51xx/CVE-2016-5195.json +++ b/CVE-2016/CVE-2016-51xx/CVE-2016-5195.json @@ -2,8 +2,8 @@ "id": "CVE-2016-5195", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2016-11-10T21:59:00.197", - "lastModified": "2025-01-29T18:15:28.220", - "vulnStatus": "Modified", + "lastModified": "2025-04-08T18:12:18.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-252xx/CVE-2019-25223.json b/CVE-2019/CVE-2019-252xx/CVE-2019-25223.json index a4177ca662b..0415cf8d546 100644 --- a/CVE-2019/CVE-2019-252xx/CVE-2019-25223.json +++ b/CVE-2019/CVE-2019-252xx/CVE-2019-25223.json @@ -2,13 +2,17 @@ "id": "CVE-2019-25223", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T07:15:42.290", - "lastModified": "2025-04-08T07:15:42.290", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Team Circle Image Slider With Lightbox plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Team Circle Image Slider With Lightbox para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 1.0.4 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes autenticados, con acceso de administrador o superior, a\u00f1adir consultas SQL adicionales a las consultas existentes, que pueden utilizarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2022/CVE-2022-08xx/CVE-2022-0847.json b/CVE-2022/CVE-2022-08xx/CVE-2022-0847.json index e3e10156d6c..2dae58ea72d 100644 --- a/CVE-2022/CVE-2022-08xx/CVE-2022-0847.json +++ b/CVE-2022/CVE-2022-08xx/CVE-2022-0847.json @@ -2,8 +2,8 @@ "id": "CVE-2022-0847", "sourceIdentifier": "secalert@redhat.com", "published": "2022-03-10T17:44:57.283", - "lastModified": "2025-02-04T19:15:25.130", - "vulnStatus": "Modified", + "lastModified": "2025-04-08T18:12:53.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-22xx/CVE-2022-2251.json b/CVE-2022/CVE-2022-22xx/CVE-2022-2251.json index 520c5427ee6..f039f4f75f2 100644 --- a/CVE-2022/CVE-2022-22xx/CVE-2022-2251.json +++ b/CVE-2022/CVE-2022-22xx/CVE-2022-2251.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2251", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-17T21:15:12.343", - "lastModified": "2024-11-21T07:00:37.180", + "lastModified": "2025-04-08T19:15:45.583", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-249xx/CVE-2022-24913.json b/CVE-2022/CVE-2022-249xx/CVE-2022-24913.json index 201e84d6450..6184ff6bb46 100644 --- a/CVE-2022/CVE-2022-249xx/CVE-2022-24913.json +++ b/CVE-2022/CVE-2022-249xx/CVE-2022-24913.json @@ -2,7 +2,7 @@ "id": "CVE-2022-24913", "sourceIdentifier": "report@snyk.io", "published": "2023-01-12T05:15:11.477", - "lastModified": "2024-11-21T06:51:22.703", + "lastModified": "2025-04-08T18:15:43.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,6 +79,16 @@ "value": "CWE-668" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3977.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3977.json index 012034e5356..6537294088d 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3977.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3977.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3977", "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-12T19:15:24.327", - "lastModified": "2024-11-21T07:20:39.660", + "lastModified": "2025-04-08T18:15:44.317", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4379.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4379.json index 00ca4f6821f..df7ee635fae 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4379.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4379.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4379", "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-10T22:15:14.097", - "lastModified": "2024-11-21T07:35:10.030", + "lastModified": "2025-04-08T19:15:46.243", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48669.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48669.json index 7b5a9aaeaf1..7435efc93a4 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48669.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48669.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48669", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:48.220", - "lastModified": "2024-11-21T07:33:44.447", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:42:41.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,46 +39,128 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "7DDD3244-82E6-464D-8D15-55D659D71076" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1699fb915b9f61794d559b55114c09a390aaf234", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f7d39fe3d80d6143404940b2413010cf6527029", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a3f22feb2220a945d1c3282e34199e8bcdc5afc4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cda9c0d556283e2d4adaa9960b2dc19b16156bae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0647c3e81eff62b66d46fd4e475318cb8cb3610", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1699fb915b9f61794d559b55114c09a390aaf234", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f7d39fe3d80d6143404940b2413010cf6527029", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a3f22feb2220a945d1c3282e34199e8bcdc5afc4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cda9c0d556283e2d4adaa9960b2dc19b16156bae", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0647c3e81eff62b66d46fd4e475318cb8cb3610", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-362xx/CVE-2023-36272.json b/CVE-2023/CVE-2023-362xx/CVE-2023-36272.json index 8a9bc728d7a..6ca866ecced 100644 --- a/CVE-2023/CVE-2023-362xx/CVE-2023-36272.json +++ b/CVE-2023/CVE-2023-362xx/CVE-2023-36272.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36272", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-23T15:15:10.103", - "lastModified": "2025-03-14T18:26:28.453", - "vulnStatus": "Analyzed", + "lastModified": "2025-04-08T19:15:46.610", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37930.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37930.json index 0523e67e093..0dd959b3616 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37930.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37930.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37930", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-04-08T14:15:30.653", - "lastModified": "2025-04-08T14:15:30.653", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49856.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49856.json index b6c65df5cae..4f37ca8fe91 100644 --- a/CVE-2023/CVE-2023-498xx/CVE-2023-49856.json +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49856.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49856", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:37.557", - "lastModified": "2024-12-09T13:15:37.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:07:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rednao:smart_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.85", + "matchCriteriaId": "1393E932-7CDE-49EF-B8C2-70E27E8835F4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/smart-forms/vulnerability/wordpress-smart-forms-plugin-2-6-84-authenticated-arbitrary-options-change-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-511xx/CVE-2023-51146.json b/CVE-2023/CVE-2023-511xx/CVE-2023-51146.json index 3954449ada3..3e1f222b7c0 100644 --- a/CVE-2023/CVE-2023-511xx/CVE-2023-51146.json +++ b/CVE-2023/CVE-2023-511xx/CVE-2023-51146.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51146", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-26T22:15:07.677", - "lastModified": "2024-11-21T08:37:53.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:09:38.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:trendnet:tew-821dap_firmware:3.00b06:*:*:*:*:*:*:*", + "matchCriteriaId": "29817C42-E40F-4D7E-A09E-00EB91A4A4A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:trendnet:tew-821dap:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDB0D6FC-7561-45DD-88B1-293DF4A2C3F3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51146.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51146.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52629.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52629.json index 6669c481813..dc9e372b786 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52629.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52629.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52629", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-29T10:15:09.327", - "lastModified": "2024-11-21T08:40:14.360", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:28:53.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.20", + "versionEndExcluding": "6.5.4", + "matchCriteriaId": "5A8752DF-35F4-4DE7-AC4E-3F753EDE78B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/246f80a0b17f8f582b2c0996db02998239057c65", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/610dbd8ac271aa36080aac50b928d700ee3fe4de", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/246f80a0b17f8f582b2c0996db02998239057c65", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/610dbd8ac271aa36080aac50b928d700ee3fe4de", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52631.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52631.json index 4a9a63a45d8..10e3fc13433 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52631.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52631.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52631", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:40.900", - "lastModified": "2024-11-21T08:40:14.577", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:28:36.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,131 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "5DAC8D7B-7B93-476C-86C0-E4A247061C4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.78", + "matchCriteriaId": "26190115-BC0C-4106-9408-E7928FE5DA62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.17", + "matchCriteriaId": "73F8C6ED-5A0B-4B25-8FA9-AF916A9C8F0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.5", + "matchCriteriaId": "01925741-2C95-47C1-A7EA-3DC2BB0012D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/686820fe141ea0220fc6fdfc7e5694f915cf64b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae4acad41b0f93f1c26cc0fc9135bb79d8282d0b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b2dd7b953c25ffd5912dda17e980e7168bebcf6c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec1bedd797588fe38fc11cba26d77bb1d9b194c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fb7bcd1722bc9bc55160378f5f99c01198fd14a7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/686820fe141ea0220fc6fdfc7e5694f915cf64b2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae4acad41b0f93f1c26cc0fc9135bb79d8282d0b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b2dd7b953c25ffd5912dda17e980e7168bebcf6c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec1bedd797588fe38fc11cba26d77bb1d9b194c6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fb7bcd1722bc9bc55160378f5f99c01198fd14a7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52653.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52653.json index 31500826099..1d52e15513c 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52653.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52653.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52653", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:48.470", - "lastModified": "2024-11-21T08:40:17.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:42:28.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,107 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.35", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "1F8D96F4-196B-4871-9DD2-A7179DCCD865" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/99044c01ed5329e73651c054d8a4baacdbb1a27c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d111e30d9cd846bb368faf3637dc0f71fcbcf822", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e67b652d8e8591d3b1e569dbcdfcee15993e91fa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/99044c01ed5329e73651c054d8a4baacdbb1a27c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d111e30d9cd846bb368faf3637dc0f71fcbcf822", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e67b652d8e8591d3b1e569dbcdfcee15993e91fa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7203.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7203.json index 86bfec7dba1..038bc521bf7 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7203.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7203.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7203", "sourceIdentifier": "contact@wpscan.com", "published": "2024-02-27T09:15:37.450", - "lastModified": "2024-11-21T08:45:30.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:43:37.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rednao:smart_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.87", + "matchCriteriaId": "1A3AAB05-4B07-4621-94A0-4CEF7A0C7ADF" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/b514b631-c3e3-4793-ab5d-35ed0c38b011/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/b514b631-c3e3-4793-ab5d-35ed0c38b011/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13820.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13820.json index 279b6c0b5df..c9b757492c4 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13820.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13820.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13820", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T05:15:37.070", - "lastModified": "2025-04-08T05:15:37.070", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Melhor Envio plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.15.9 via the 'run' function, which uses a hardcoded hash. This makes it possible for unauthenticated attackers to extract sensitive data including environment information, plugin tokens, shipping configurations, and limited vendor information." + }, + { + "lang": "es", + "value": "El complemento Melhor Envio para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 2.15.9 incluida, a trav\u00e9s de la funci\u00f3n \"run\", que utiliza un hash codificado. Esto permite a atacantes no autenticados extraer datos confidenciales, como informaci\u00f3n del entorno, tokens del complemento, configuraciones de env\u00edo e informaci\u00f3n limitada del proveedor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1306.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1306.json index fd80e5f55e3..347bc9dd649 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1306.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1306.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1306", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:14.767", - "lastModified": "2024-11-21T08:50:17.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:43:28.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rednao:smart_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.94", + "matchCriteriaId": "7236CC90-F8E6-4ED0-98F8-D4719F2D0D03" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/c7ce2649-b2b0-43f4-994d-07b1023405e9/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/c7ce2649-b2b0-43f4-994d-07b1023405e9/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1307.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1307.json index 1facac4b0d2..f9436cb7424 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1307.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1307.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1307", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:14.813", - "lastModified": "2024-11-21T08:50:17.233", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:43:21.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rednao:smart_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.94", + "matchCriteriaId": "7236CC90-F8E6-4ED0-98F8-D4719F2D0D03" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/bbc6cebd-e9bf-4b08-a474-f9312b3c0947/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/bbc6cebd-e9bf-4b08-a474-f9312b3c0947/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1905.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1905.json index ecb3d739441..865b3b16094 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1905.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1905.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1905", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-29T06:15:07.650", - "lastModified": "2025-03-26T21:15:21.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:43:10.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rednao:smart_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.96", + "matchCriteriaId": "1CB7DEA5-904F-479D-922D-86561BA36023" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/b9a448d2-4bc2-4933-8743-58c8768a619f/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/b9a448d2-4bc2-4933-8743-58c8768a619f/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20332.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20332.json index 260566442bc..b261d0e8f07 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20332.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20332", "sourceIdentifier": "psirt@cisco.com", "published": "2024-04-03T17:15:48.713", - "lastModified": "2024-11-21T08:52:23.593", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T19:44:31.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -81,14 +81,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-ssrf-FtSTh5Oz", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-ssrf-FtSTh5Oz", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26013.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26013.json index b902d40caa2..2eabb4513c3 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26013.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26013", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-04-08T14:15:30.863", - "lastModified": "2025-04-08T14:15:30.863", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26648.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26648.json index 72f2d03897f..d40e6ffd4b3 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26648.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26648.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26648", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-26T18:15:10.220", - "lastModified": "2024-11-21T09:02:45.723", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:29:14.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,85 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.15", + "matchCriteriaId": "142FB4DC-E1A5-4DD2-8150-C5741C441196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.3", + "matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7073934f5d73f8b53308963cee36f0d389ea857c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c02d257c654191ecda1dc1af6875d527e85310e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7073934f5d73f8b53308963cee36f0d389ea857c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c02d257c654191ecda1dc1af6875d527e85310e7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26652.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26652.json index b6ca1fde13c..25a436aa531 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26652.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26652.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26652", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-27T14:15:10.297", - "lastModified": "2024-11-21T09:02:46.153", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:29:03.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,116 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.6.22", + "matchCriteriaId": "34C8CDAD-9D85-4B19-BFCE-719E51A78401" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.10", + "matchCriteriaId": "FB4549F9-0160-455F-8CDC-98D38AEF6D66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/995f802abff209514ac2ee03b96224237646cec3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba18deddd6d502da71fd6b6143c53042271b82bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ffda0e962f270b3ec937660afd15b685263232d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/995f802abff209514ac2ee03b96224237646cec3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba18deddd6d502da71fd6b6143c53042271b82bd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ffda0e962f270b3ec937660afd15b685263232d3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26661.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26661.json index 16c0c6be0e8..6395c79ce5d 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26661.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26661.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26661", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:43.137", - "lastModified": "2024-11-21T09:02:47.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:25:13.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,89 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9", + "versionEndExcluding": "6.6.17", + "matchCriteriaId": "DA9DA479-68B3-4FE7-A825-49223425CA46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.5", + "matchCriteriaId": "01925741-2C95-47C1-A7EA-3DC2BB0012D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/39f24c08363af1cd945abad84e3c87fd3e3c845a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3f3c237a706580326d3b7a1b97697e5031ca4667", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/66951d98d9bf45ba25acf37fe0747253fafdf298", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/39f24c08363af1cd945abad84e3c87fd3e3c845a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3f3c237a706580326d3b7a1b97697e5031ca4667", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/66951d98d9bf45ba25acf37fe0747253fafdf298", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26662.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26662.json index d07861ee5b5..cd6ecbb864a 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26662.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26662.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26662", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:43.213", - "lastModified": "2024-11-21T09:02:47.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:25:02.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,101 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9", + "versionEndExcluding": "6.6.17", + "matchCriteriaId": "DA9DA479-68B3-4FE7-A825-49223425CA46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.5", + "matchCriteriaId": "01925741-2C95-47C1-A7EA-3DC2BB0012D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0c863cab0e9173f8b6c7bc328bee3b8625f131b5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2e150ccea13129eb048679114808eb9770443e4d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e96fddb32931d007db12b1fce9b5e8e4c080401b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0c863cab0e9173f8b6c7bc328bee3b8625f131b5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2e150ccea13129eb048679114808eb9770443e4d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e96fddb32931d007db12b1fce9b5e8e4c080401b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26666.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26666.json index 1206af00eb2..14f35220a33 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26666.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26666.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26666", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:43.500", - "lastModified": "2024-11-21T09:02:48.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:24:39.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,101 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", + "versionEndExcluding": "6.6.17", + "matchCriteriaId": "9A5D5BE4-2D95-4BD6-999E-19600822F2E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.5", + "matchCriteriaId": "01925741-2C95-47C1-A7EA-3DC2BB0012D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/9480adfe4e0f0319b9da04b44e4eebd5ad07e0cd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c255c3b653c6e8b52ac658c305e2fece2825f7ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc3432ae8232ff4025e7c55012dd88db0e3d18eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9480adfe4e0f0319b9da04b44e4eebd5ad07e0cd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c255c3b653c6e8b52ac658c305e2fece2825f7ad", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc3432ae8232ff4025e7c55012dd88db0e3d18eb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26672.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26672.json index b2f96c12909..367714c4653 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26672.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26672.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26672", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:43.900", - "lastModified": "2024-11-21T09:02:48.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:24:08.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.7.4", + "matchCriteriaId": "700BC119-5E42-40C5-98D6-59BFBDFAB9A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4f32504a2f85a7b40fe149436881381f48e9c0c0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7b5d58c07024516c0e81b95e98f37710cf402c53", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4f32504a2f85a7b40fe149436881381f48e9c0c0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7b5d58c07024516c0e81b95e98f37710cf402c53", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26810.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26810.json index bb6ff130770..19062f6d579 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26810.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26810.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26810", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-05T09:15:09.230", - "lastModified": "2024-11-21T09:03:07.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:20:46.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,74 +39,199 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.6", + "versionEndExcluding": "5.4.274", + "matchCriteriaId": "15E5B742-169D-449A-9FB2-F8860AFF6A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.215", + "matchCriteriaId": "9CD5894E-58E9-4B4A-B0F4-3E6BC134B8F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.154", + "matchCriteriaId": "577E212E-7E95-4A71-9B5C-F1D1A3AFFF46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.84", + "matchCriteriaId": "834D9BD5-42A6-4D74-979E-4D6D93F630FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03505e3344b0576fd619416793a31eae9c5b73bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/04a4a017b9ffd7b0f427b8c376688d14cb614651", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e71b6449d55179170efc8dee8664510bb813b42", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3dd9be6cb55e0f47544e7cdda486413f7134e3b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3fe0ac10bd117df847c93408a9d428a453cd60e5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6fe478d855b20ac1eb5da724afe16af5a2aaaa40", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/810cd4bb53456d0503cc4e7934e063835152c1b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec73e079729258a05452356cf6d098bf1504d5a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/03505e3344b0576fd619416793a31eae9c5b73bf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/04a4a017b9ffd7b0f427b8c376688d14cb614651", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e71b6449d55179170efc8dee8664510bb813b42", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3dd9be6cb55e0f47544e7cdda486413f7134e3b3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3fe0ac10bd117df847c93408a9d428a453cd60e5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6fe478d855b20ac1eb5da724afe16af5a2aaaa40", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/810cd4bb53456d0503cc4e7934e063835152c1b7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec73e079729258a05452356cf6d098bf1504d5a6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26828.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26828.json index 5d627239cdb..4d5f4886fa9 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26828.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26828.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26828", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:09.300", - "lastModified": "2024-11-21T09:03:09.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:16:26.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,127 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.18", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "93A31488-A7BB-4D16-B4B7-141095C7A9A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "BD961E49-FEDA-47CF-BF23-4D2BD942B4E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7190353835b4a219abb70f90b06cdcae97f11512", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cffe487026be13eaf37ea28b783d9638ab147204", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/df2af9fdbc4ddde18a3371c4ca1a86596e8be301", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f7ff1c89fb6e9610d2b01c1821727729e6609308", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7190353835b4a219abb70f90b06cdcae97f11512", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cffe487026be13eaf37ea28b783d9638ab147204", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/df2af9fdbc4ddde18a3371c4ca1a86596e8be301", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f7ff1c89fb6e9610d2b01c1821727729e6609308", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26915.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26915.json index fc581ebde0e..00f8548fde7 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26915.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26915.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26915", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T16:15:08.143", - "lastModified": "2024-11-21T09:03:22.360", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:56:18.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,46 +39,137 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.152", + "matchCriteriaId": "386F201C-2D62-40D9-8976-BEA8810678A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.82", + "matchCriteriaId": "933AC628-7DAD-4B2D-82E3-3B7B331B1C09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "BD961E49-FEDA-47CF-BF23-4D2BD942B4E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2827633c9dab6304ec4cdbf369363219832e605d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7330256268664ea0a7dd5b07a3fed363093477dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8983397951b4b0bd51bb4b4ba9749424e1ccbb70", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a9d00c23d170d4ef5a1b28e6b69f5c85dd12bc1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a28f4d1e0bed85943d309ac243fd1c200f8af9a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2827633c9dab6304ec4cdbf369363219832e605d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7330256268664ea0a7dd5b07a3fed363093477dd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8983397951b4b0bd51bb4b4ba9749424e1ccbb70", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a9d00c23d170d4ef5a1b28e6b69f5c85dd12bc1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a28f4d1e0bed85943d309ac243fd1c200f8af9a2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26939.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26939.json index b961f11bdb6..5366c442f9e 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26939.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26939.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26939", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:09.193", - "lastModified": "2024-11-21T09:03:26.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:55:49.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/i915/vma: Correcci\u00f3n de UAF al destruir contra ejecuci\u00f3n de retirada. Las herramientas de depuraci\u00f3n de objetos informaban espor\u00e1dicamente intentos ilegales de liberar un objeto i915 VMA a\u00fan activo al estacionar un GT que se cre\u00eda que estaba inactivo. [161.359441] ODEBUG: objeto activo libre (estado activo 0): ffff88811643b958 tipo de objeto: i915_active sugerencia: __i915_vma_active+0x0/0x50 [i915] [161.360082] ADVERTENCIA: CPU: 5 PID: 276 en lib/debugobjects.c:514 _imprimir_objeto+ 0x80/0xb0 ... [161.360304] CPU: 5 PID: 276 Comm: kworker/5:2 No contaminado 6.5.0-rc1-CI_DRM_13375-g003f860e5577+ #1 [161.360314] Nombre de hardware: Intel Corporation Rocket Lake Client Platform/RocketLake S UDIMM 6L RVP, BIOS RKLSFWI1.R00.3173.A03.2204210138 21/04/2022 [161.360322] Cola de trabajo: i915 desordenado __intel_wakeref_put_work [i915] [161.360592] RIP 0010:debug_print_object+0x 80/0xb0... [161.361347] debug_object_free +0xeb/0x110 [161.361362] i915_active_fini+0x14/0x130 [i915] [161.361866] referencias de versi\u00f3n+0xfe/0x1f0 [i915] [161.362543] i915_vma_parked+0x1db/0x380 [i915] .363129] __gt_park+0x121/0x230 [i915] [161.363515 ] ____intel_wakeref_put_last+0x1f/0x70 [i915] Se ha rastreado que eso sucede cuando otro subproceso desactiva el VMA dentro del asistente __active_retire(), despu\u00e9s de que el contador activo del VMA ya se haya reducido a 0, pero antes de que se desactive la desactivaci\u00f3n del objeto del VMA. reportado a la herramienta de depuraci\u00f3n de objetos. Podr\u00edamos evitar esa ejecuci\u00f3n serializando i915_active_fini() con __active_retire() a trav\u00e9s de ref->tree_lock, pero eso no impedir\u00eda que se use VMA, por ejemplo, desde __i915_vma_retire() llamado al final de __active_retire(), despu\u00e9s de ese VMA ya ha sido liberado por un i915_vma_destroy() concurrente al regresar de i915_active_fini(). Entonces, deber\u00edamos solucionar el problema a nivel de VMA, no en i915_active. Dado que __i915_vma_parked() se llama desde __gt_park() en la \u00faltima colocaci\u00f3n del wakeref del GT, el problema podr\u00eda solucionarse manteniendo el wakeref del GT el tiempo suficiente para que __active_retire() se complete antes de que se libere el wakeref y se estacione el GT. Creo que el problema fue introducido por el commit d93939730347 (\"drm/i915: Eliminar el recuento de vma\") que movi\u00f3 una llamada a i915_active_fini() desde un i915_vma_release() eliminado, llamado en la \u00faltima colocaci\u00f3n del kref de VMA eliminado, a i915_vma_parked() ruta de procesamiento llamada en la \u00faltima colocaci\u00f3n de un wakeref GT. Sin embargo, su visibilidad para la herramienta de depuraci\u00f3n de objetos fue suprimida por un error en i915_active que se solucion\u00f3 dos semanas despu\u00e9s con el commit e92eb246feb9 (\"drm/i915/active: Reparar la activaci\u00f3n del objeto de depuraci\u00f3n que falta\"). Un VMA asociado con una solicitud no adquiere un wakeref GT por s\u00ed solo. En cambio, depende de un wakeref mantenido directamente por el intel_context activo de la solicitud para un GT asociado con su VM, e indirectamente del wakeref del motor de ese intel_context si el motor pertenece al mismo GT que la VM del VMA. Esos wakerefs se liberan de forma asincr\u00f3nica con la desactivaci\u00f3n de VMA. Solucione el problema obteniendo un wakeref para el GT del VMA al activarlo y colocando ese wakeref solo despu\u00e9s de que se desactive el VMA. Sin embargo, excluya el GTT global de esa ruta de procesamiento; de lo contrario, la GPU nunca quedar\u00e1 inactiva. Dado que se puede llamar a __i915_vma_retire() desde contextos at\u00f3micos, utilice la variante as\u00edncrona de wakeref put. Adem\u00e1s, para evitar la dependencia del bloqueo circular, tenga cuidado de adquirir el wakeref antes del mutex de VM cuando ambos sean necesarios. v7: agregue comentarios en l\u00ednea con justificaciones para: - usar variantes sin seguimiento de intel_gt_pm_get/put() (Nirmoy), - usar la variante as\u00edncrona de _put(), - no obtener el wakeref en caso de un GTT global, - obtener siempre el primer wakeref fuera de vm->mutex. ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", @@ -28,38 +51,100 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", + "versionEndExcluding": "6.1.88", + "matchCriteriaId": "2E86F509-0920-42A8-921C-0085C2CF31F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.29", + "matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "7CDB842C-5767-4A09-AB0A-06214CD2A2E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e45882ca829b26b915162e8e86dbb1095768e9e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/59b2626dd8c8a2e13f18054b3530e0c00073d79f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e3eb862df9f972ab677fb19e0d4b9b1be8db7b5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/704edc9252f4988ae1ad7dafa23d0db8d90d7190", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0e45882ca829b26b915162e8e86dbb1095768e9e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/59b2626dd8c8a2e13f18054b3530e0c00073d79f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e3eb862df9f972ab677fb19e0d4b9b1be8db7b5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/704edc9252f4988ae1ad7dafa23d0db8d90d7190", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json index 230dcbb767e..8eb54ed411b 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26976", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:14.667", - "lastModified": "2024-11-21T09:03:31.953", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:53:44.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,86 +51,231 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.38", + "versionEndExcluding": "4.19.312", + "matchCriteriaId": "1D7CB946-0FE3-48B8-BBB0-A43E0D055492" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.274", + "matchCriteriaId": "F45A0F3C-C16D-49C4-86D6-D021C3D4B834" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.215", + "matchCriteriaId": "9CD5894E-58E9-4B4A-B0F4-3E6BC134B8F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.154", + "matchCriteriaId": "577E212E-7E95-4A71-9B5C-F1D1A3AFFF46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.84", + "matchCriteriaId": "834D9BD5-42A6-4D74-979E-4D6D93F630FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3d75b8aa5c29058a512db29da7cbee8052724157", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4f3a3bce428fb439c66a578adc447afce7b4a750", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/82e25cc1c2e93c3023da98be282322fc08b61ffb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/83d3c5e309611ef593e2fcb78444fc8ceedf9bac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a75afe480d4349c524d9c659b1a5a544dbc39a98", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab2c2f5d9576112ad22cfd3798071cb74693b1f5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b54478d20375874aeee257744dedfd3e413432ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/caa9af2e27c275e089d702cfbaaece3b42bca31b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f8730d6335e5f43d09151fca1f0f41922209a264", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d75b8aa5c29058a512db29da7cbee8052724157", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4f3a3bce428fb439c66a578adc447afce7b4a750", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/82e25cc1c2e93c3023da98be282322fc08b61ffb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/83d3c5e309611ef593e2fcb78444fc8ceedf9bac", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a75afe480d4349c524d9c659b1a5a544dbc39a98", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab2c2f5d9576112ad22cfd3798071cb74693b1f5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b54478d20375874aeee257744dedfd3e413432ff", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/caa9af2e27c275e089d702cfbaaece3b42bca31b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f8730d6335e5f43d09151fca1f0f41922209a264", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26980.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26980.json index c31faa17198..e74ed72e55f 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26980.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26980.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26980", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:15.423", - "lastModified": "2024-11-21T09:03:32.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:45:21.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,46 +39,153 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.159", + "matchCriteriaId": "EB1D9107-3ACB-45AC-ABE5-DB4A71661453" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.88", + "matchCriteriaId": "B665F958-644E-434D-A78D-CCD1628D1774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.29", + "matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.8", + "matchCriteriaId": "673B3328-389D-41A4-9617-669298635262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*", + "matchCriteriaId": "F850DCEC-E08B-4317-A33B-D2DCF39F601B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0977f89722eceba165700ea384f075143f012085", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3160d9734453a40db248487f8204830879c207f1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b80ba648714e6d790d69610cf14656be222d0248", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c119f4ede3fa90a9463f50831761c28f989bfb20", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da21401372607c49972ea87a6edaafb36a17c325", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0977f89722eceba165700ea384f075143f012085", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3160d9734453a40db248487f8204830879c207f1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b80ba648714e6d790d69610cf14656be222d0248", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c119f4ede3fa90a9463f50831761c28f989bfb20", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da21401372607c49972ea87a6edaafb36a17c325", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json index adeef2bf07d..681aa429f5e 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26984", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:15.880", - "lastModified": "2024-11-21T09:03:33.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:45:02.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,78 +51,230 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.313", + "matchCriteriaId": "8D4FFC89-E286-44C8-8573-E5F6DA45FCB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.275", + "matchCriteriaId": "5FF6D8DE-C559-4586-86C8-2C6B4420A2C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.216", + "matchCriteriaId": "A44ABF89-F1BD-4C9A-895D-7596650DCD27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.157", + "matchCriteriaId": "C67E2ABA-9F30-4CE6-A840-B1051D07E0CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.88", + "matchCriteriaId": "B665F958-644E-434D-A78D-CCD1628D1774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.29", + "matchCriteriaId": "0999E154-1E68-41FA-8DE3-9A735E382224" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.8", + "matchCriteriaId": "673B3328-389D-41A4-9617-669298635262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/13d76b2f443dc371842916dd8768009ff1594716", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1bc4825d4c3ec6abe43cf06c3c39d664d044cbf7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/21ca9539f09360fd83654f78f2c361f2f5ddcb52", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ab056814cd8ab84744c9a19ef51360b2271c572", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a019b44b1bc6ed224c46fb5f88a8a10dd116e525", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ad74d208f213c06d860916ad40f609ade8c13039", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bba8ec5e9b16649d85bc9e9086bf7ae5b5716ff9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fff1386cc889d8fb4089d285f883f8cba62d82ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/13d76b2f443dc371842916dd8768009ff1594716", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1bc4825d4c3ec6abe43cf06c3c39d664d044cbf7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/21ca9539f09360fd83654f78f2c361f2f5ddcb52", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ab056814cd8ab84744c9a19ef51360b2271c572", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a019b44b1bc6ed224c46fb5f88a8a10dd116e525", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ad74d208f213c06d860916ad40f609ade8c13039", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bba8ec5e9b16649d85bc9e9086bf7ae5b5716ff9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fff1386cc889d8fb4089d285f883f8cba62d82ce", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26991.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26991.json index 45211b760f2..d9eb5e1a7b4 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26991.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26991.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26991", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:16.820", - "lastModified": "2024-11-21T09:03:34.190", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:44:44.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,85 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.8", + "matchCriteriaId": "A6B3F478-AAC3-4675-897F-870080589B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/048cc4a028e635d339687ed968985d2d1669494c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/992b54bd083c5bee24ff7cc35991388ab08598c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/048cc4a028e635d339687ed968985d2d1669494c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/992b54bd083c5bee24ff7cc35991388ab08598c4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27005.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27005.json index 0f2726d3b15..bb67e4004dc 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27005.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27005.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27005", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:18.883", - "lastModified": "2024-11-21T09:03:36.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:43:15.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,124 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.133", + "versionEndExcluding": "5.16", + "matchCriteriaId": "6D0A76D9-EE74-4B8A-92A4-1C7A0FDFC283" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.55", + "versionEndExcluding": "6.2", + "matchCriteriaId": "05A2D702-83B6-45D3-8690-6E4FF01F5E75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5.5", + "versionEndExcluding": "6.6.29", + "matchCriteriaId": "68E16AD4-0EF2-4134-8518-29A29136A800" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.8", + "matchCriteriaId": "673B3328-389D-41A4-9617-669298635262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4c65507121ea8e0b47fae6d2049c8688390d46b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0d04efa2e367921654b5106cc5c05e3757c2b42", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de1bf25b6d771abdb52d43546cf57ad775fb68a1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4c65507121ea8e0b47fae6d2049c8688390d46b6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0d04efa2e367921654b5106cc5c05e3757c2b42", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de1bf25b6d771abdb52d43546cf57ad775fb68a1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27028.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27028.json index f835abb02c0..c8a0cbb8e2c 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27028.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27028.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27028", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:49.030", - "lastModified": "2024-11-21T09:03:41.770", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:42:15.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,86 +51,231 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.11", + "versionEndExcluding": "4.19.311", + "matchCriteriaId": "80A7A638-4836-4A4E-BBE4-B8FB4B4FFBB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.273", + "matchCriteriaId": "620FD8B7-BF03-43E0-951A-0A58461D4C55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.214", + "matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1784053cf10a14c4ebd8a890bad5cfe1bee51713", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2342b05ec5342a519e00524a507f7a6ea6791a38", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/55f8ea6731aa64871ee6aef7dba53ee9f9f3b2f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/62b1f837b15cf3ec2835724bdf8577e47d14c753", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/766ec94cc57492eab97cbbf1595bd516ab0cb0e4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a20ad45008a7c82f1184dc6dee280096009ece55", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bcfcdf19698024565eff427706ebbd8df65abd11", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bea82355df9e1c299625405b1947fc9b26b4c6d4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c10fed329c1c104f375a75ed97ea3abef0786d62", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1784053cf10a14c4ebd8a890bad5cfe1bee51713", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2342b05ec5342a519e00524a507f7a6ea6791a38", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/55f8ea6731aa64871ee6aef7dba53ee9f9f3b2f6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/62b1f837b15cf3ec2835724bdf8577e47d14c753", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/766ec94cc57492eab97cbbf1595bd516ab0cb0e4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a20ad45008a7c82f1184dc6dee280096009ece55", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bcfcdf19698024565eff427706ebbd8df65abd11", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bea82355df9e1c299625405b1947fc9b26b4c6d4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c10fed329c1c104f375a75ed97ea3abef0786d62", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27032.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27032.json index f0b391568dc..fe435bd6b94 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27032.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27032.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27032", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:49.230", - "lastModified": "2024-11-21T09:03:42.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:41:55.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,46 +39,156 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.307", + "versionEndExcluding": "4.20", + "matchCriteriaId": "3CB2AA1D-5185-48E6-B23F-5143D8FFA151" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.269", + "versionEndExcluding": "5.5", + "matchCriteriaId": "281DF6F1-190B-460C-A081-C034D898FE00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.210", + "versionEndExcluding": "5.11", + "matchCriteriaId": "DC4651AD-5339-45DA-A5EC-D639C20FEA8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.149", + "versionEndExcluding": "5.16", + "matchCriteriaId": "D9B8AD64-1736-4C16-A29D-8623F482E1A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.77", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "4086DAEC-DD39-4AEA-A8C1-3A8B0F8088EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.16", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "12B69ED0-8238-4DE8-8F12-420579AA3756" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7.4", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "4EE1588F-367A-438D-B89E-0533B3123351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/21ec68234826b1b54ab980a8df6e33c74cfbee58", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8844b2f8a3f0c428b74672f9726f9950b1a7764c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d034810d02a5af8eb74debe29877dcaf5f00fdd1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f26091a981318b5b7451d61f99bc073a6af8db67", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe4de493572a4263554903bf9c3afc5c196e15f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/21ec68234826b1b54ab980a8df6e33c74cfbee58", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8844b2f8a3f0c428b74672f9726f9950b1a7764c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d034810d02a5af8eb74debe29877dcaf5f00fdd1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f26091a981318b5b7451d61f99bc073a6af8db67", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe4de493572a4263554903bf9c3afc5c196e15f0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27037.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27037.json index f21a5e6d321..ebab633181e 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27037.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27037.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27037", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:49.450", - "lastModified": "2024-11-21T09:03:43.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:39:41.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,54 +51,137 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "757768E7-5C7A-422C-A1E7-E6D15EDB107E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/01511ac7be8e45f80e637f6bf61af2d3d2dee9db", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0801c893fd48cdba66a3c8f44c3fe43cc67d3b85", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/58a946ab43501f2eba058d24d96af0ad1122475b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7938e9ce39d6779d2f85d822cc930f73420e54a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c4889a9ea861d7be37463c10846eb75e1b49c9d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca976c6a592f789700200069ef9052493c0b73d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/01511ac7be8e45f80e637f6bf61af2d3d2dee9db", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0801c893fd48cdba66a3c8f44c3fe43cc67d3b85", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/58a946ab43501f2eba058d24d96af0ad1122475b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7938e9ce39d6779d2f85d822cc930f73420e54a6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c4889a9ea861d7be37463c10846eb75e1b49c9d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca976c6a592f789700200069ef9052493c0b73d8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27040.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27040.json index 7cab66fded1..06abed4db17 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27040.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27040", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:49.600", - "lastModified": "2024-11-21T09:03:43.543", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:39:21.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,107 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "5B28A88F-F85F-4008-8F7C-44FC9152916E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/d0e94f4807ff0df66cf447d6b4bbb8ac830e99c3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7cadd5d3a8ffe334d0229ba9eda4290138d56e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f610c46771ef1047e46d61807aa7c69cd29e63d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6aed043ee5d75b3d1bfc452b1a9584b63c8f76b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0e94f4807ff0df66cf447d6b4bbb8ac830e99c3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7cadd5d3a8ffe334d0229ba9eda4290138d56e7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f610c46771ef1047e46d61807aa7c69cd29e63d8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6aed043ee5d75b3d1bfc452b1a9584b63c8f76b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27041.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27041.json index 1ab6e1c61f1..2327ee738aa 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27041.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27041", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:49.647", - "lastModified": "2024-11-21T09:03:43.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:38:51.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,95 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "6538B443-73C0-4087-B408-88C71088DA0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1c62697e4086de988b31124fb8c79c244ea05f2b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a3cfb9a24a28da9cc13d2c525a76548865e182c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca2eb375db76fd50f31afdd67d6ca4f833254957", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e040f1fbe9abae91b12b074cfc3bbb5367b79811", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1c62697e4086de988b31124fb8c79c244ea05f2b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a3cfb9a24a28da9cc13d2c525a76548865e182c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca2eb375db76fd50f31afdd67d6ca4f833254957", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e040f1fbe9abae91b12b074cfc3bbb5367b79811", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27050.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27050.json index bb209767739..520563c4ded 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27050.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27050.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27050", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.070", - "lastModified": "2024-11-21T09:03:44.947", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:38:39.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,95 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "5B28A88F-F85F-4008-8F7C-44FC9152916E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/682ddd62abd4bdcee7584246903e7a2df005fe0d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/92a871ab9fa59a74d013bc04f321026a057618e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cd3be9843247edb8fc6fcd8d8237cbce2bc19f5e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa5bef5e80c6a3321b2b1a7070436f3bc5daf07c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/682ddd62abd4bdcee7584246903e7a2df005fe0d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/92a871ab9fa59a74d013bc04f321026a057618e7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cd3be9843247edb8fc6fcd8d8237cbce2bc19f5e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa5bef5e80c6a3321b2b1a7070436f3bc5daf07c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27052.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27052.json index 88ea47d2ba8..4c6afebc6ff 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27052.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27052.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27052", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.170", - "lastModified": "2024-11-21T09:03:45.253", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:43:24.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,66 +51,181 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.214", + "matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1213acb478a7181cd73eeaf00db430f1e45b1361", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/156012667b85ca7305cb363790d3ae8519a6f41e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3518cea837de4d106efa84ddac18a07b6de1384e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/58fe3bbddfec10c6b216096d8c0e517cd8463e3a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7059cdb69f8e1a2707dd1e2f363348b507ed7707", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac512507ac89c01ed6cd4ca53032f52cdb23ea59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dddedfa3b29a63c2ca4336663806a6128b8545b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1213acb478a7181cd73eeaf00db430f1e45b1361", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/156012667b85ca7305cb363790d3ae8519a6f41e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3518cea837de4d106efa84ddac18a07b6de1384e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/58fe3bbddfec10c6b216096d8c0e517cd8463e3a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7059cdb69f8e1a2707dd1e2f363348b507ed7707", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac512507ac89c01ed6cd4ca53032f52cdb23ea59", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dddedfa3b29a63c2ca4336663806a6128b8545b4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27053.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27053.json index d59d6b0b07d..f2e076cd966 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27053.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27053", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.223", - "lastModified": "2024-11-21T09:03:45.457", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:43:15.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,74 +51,202 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.273", + "matchCriteriaId": "BDE41967-4FDC-4FCF-B49A-14790AA86C64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.214", + "matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/205c50306acf58a335eb19fa84e40140f4fe814f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4bfd20d5f5c62b5495d6c0016ee6933bd3add7ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5800ec78775c0cd646f71eb9bf8402fb794807de", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/745003b5917b610352f52fe0d11ef658d6471ec2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4bbf38c350acb6500cbe667b1e2e68f896e4b38", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d80fc436751cfa6b02a8eda74eb6cce7dadfe5a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd50d3ead6e3707bb0a5df7cc832730c93ace3a7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e556006de4ea93abe2b46cba202a2556c544b8b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/205c50306acf58a335eb19fa84e40140f4fe814f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4bfd20d5f5c62b5495d6c0016ee6933bd3add7ce", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5800ec78775c0cd646f71eb9bf8402fb794807de", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/745003b5917b610352f52fe0d11ef658d6471ec2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4bbf38c350acb6500cbe667b1e2e68f896e4b38", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d80fc436751cfa6b02a8eda74eb6cce7dadfe5a2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd50d3ead6e3707bb0a5df7cc832730c93ace3a7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e556006de4ea93abe2b46cba202a2556c544b8b2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27054.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27054.json index 5aa2644ba94..66b02e4c8e7 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27054.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27054.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27054", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.270", - "lastModified": "2024-11-21T09:03:45.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:43:08.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,54 +39,149 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "87053F0F-673E-4CE8-9F5D-976A9DAF6EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/ad999aa18103fa038787b6a8a55020abcf34df1a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c3116e62ddeff79cae342147753ce596f01fcf06", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ebc5a3bd79e54f98c885c26f0862a27a02c487c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec09bcab32fc4765e0cc97e1b72cdd067135f37e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/edbdb0d94143db46edd373cc93e433832d29fe19", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa18aa507ea71d8914b6acb2c94db311c757c650", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ad999aa18103fa038787b6a8a55020abcf34df1a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c3116e62ddeff79cae342147753ce596f01fcf06", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ebc5a3bd79e54f98c885c26f0862a27a02c487c5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec09bcab32fc4765e0cc97e1b72cdd067135f37e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/edbdb0d94143db46edd373cc93e433832d29fe19", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa18aa507ea71d8914b6acb2c94db311c757c650", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27058.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27058.json index 46c2f92b797..a5127c3c9ad 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27058.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27058.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27058", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.450", - "lastModified": "2024-11-21T09:03:46.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:42:55.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,112 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "0A32A237-A8EE-4654-9BB7-94C95ED898F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0a69b6b3a026543bc215ccc866d0aea5579e6ce2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/617d55b90e73c7b4aa2733ca6cc3f9b72d1124bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7077f43f30d817d10a9f8245e51576ac114b2f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f82f184874d2761ebaa60dccf577921a0dbb3810", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0a69b6b3a026543bc215ccc866d0aea5579e6ce2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/617d55b90e73c7b4aa2733ca6cc3f9b72d1124bb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7077f43f30d817d10a9f8245e51576ac114b2f0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f82f184874d2761ebaa60dccf577921a0dbb3810", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27062.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27062.json index e46dab95920..6a89715a252 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27062.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27062", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.660", - "lastModified": "2024-11-21T09:03:46.793", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:42:41.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,115 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "B6EDF98F-EEBC-45A5-B968-B78881A5BE83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6887314f5356389fc219b8152e951ac084a10ef7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96c8751844171af4b3898fee3857ee180586f589", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7cc4ff787a572edf2c55caeffaa88cd801eb135", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6887314f5356389fc219b8152e951ac084a10ef7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96c8751844171af4b3898fee3857ee180586f589", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7cc4ff787a572edf2c55caeffaa88cd801eb135", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27072.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27072.json index 1c6e92d28a1..0608208b9e8 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27072.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27072.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27072", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:51.127", - "lastModified": "2024-11-21T09:03:48.090", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:42:22.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,121 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "B72C3A38-70DC-4660-8C94-BB0172CE7892" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "AA508429-EA16-4F33-91A1-584829E91F52" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3e7d82ebb86e94643bdb30b0b5b077ed27dce1c2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4ec4641df57cbdfdc51bb4959afcdbcf5003ddb9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/65e6a2773d655172143cc0b927cdc89549842895", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bdd82c47b22a8befd617b723098b2a41b77373c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d5ed208d04acf06781d63d30f9fa991e8d609ebd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dea46e246ef0f98d89d59a4229157cd9ffb636bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e7d82ebb86e94643bdb30b0b5b077ed27dce1c2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/65e6a2773d655172143cc0b927cdc89549842895", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27073.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27073.json index 5d54781330b..1e225026dda 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27073.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27073.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27073", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:51.167", - "lastModified": "2024-11-21T09:03:48.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:54:36.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,74 +39,214 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.12", + "versionEndExcluding": "5.4.273", + "matchCriteriaId": "E16F82B5-B0FD-40AF-B205-D2ECD3EB6CC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.214", + "matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1597cd1a88cfcdc4bf8b1b44cd458fed9a5a5d63", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/24e51d6eb578b82ff292927f14b9f5ec05a46beb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/55ca0c7eae8499bb96f4e5d9b26af95e89c4e6a0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/656b8cc123d7635dd399d9f02594f27aa797ac3c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7393c681f9aa05ffe2385e8716989565eed2fe06", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/910363473e4bf97da3c350e08d915546dd6cc30b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af37aed04997e644f7e1b52b696b62dcae3cc016", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0b07f712bf61e1a3cf23c87c663791c42e50837", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1597cd1a88cfcdc4bf8b1b44cd458fed9a5a5d63", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/24e51d6eb578b82ff292927f14b9f5ec05a46beb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/55ca0c7eae8499bb96f4e5d9b26af95e89c4e6a0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/656b8cc123d7635dd399d9f02594f27aa797ac3c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7393c681f9aa05ffe2385e8716989565eed2fe06", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/910363473e4bf97da3c350e08d915546dd6cc30b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af37aed04997e644f7e1b52b696b62dcae3cc016", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0b07f712bf61e1a3cf23c87c663791c42e50837", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27393.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27393.json index 9af41d5eba7..5c8d1e44eea 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27393.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27393.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27393", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:26.993", - "lastModified": "2024-11-21T09:04:31.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:42:11.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,54 +39,153 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9", + "versionEndExcluding": "5.15.154", + "matchCriteriaId": "15E220AB-9386-4168-BA23-71607F895ECA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.85", + "matchCriteriaId": "325665BF-2409-49D9-B391-39AD4566FDBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.26", + "matchCriteriaId": "C520696A-A594-4FFC-A32D-12DA535CE911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.5", + "matchCriteriaId": "DBD6C99E-4250-4DFE-8447-FF2075939D10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/037965402a010898d34f4e35327d22c0a95cd51f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/27aa3e4b3088426b7e34584274ad45b5afaf7629", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4143b9479caa29bb2380f3620dcbe16ea84eb3b1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c1250796b6c262b505a46192f4716b8c6a6a8c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c8b7b2f158d9d4fb89cd2f68244af154f7549bb4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/08/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://xenbits.xen.org/xsa/advisory-457.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://git.kernel.org/stable/c/037965402a010898d34f4e35327d22c0a95cd51f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/27aa3e4b3088426b7e34584274ad45b5afaf7629", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4143b9479caa29bb2380f3620dcbe16ea84eb3b1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c1250796b6c262b505a46192f4716b8c6a6a8c6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c8b7b2f158d9d4fb89cd2f68244af154f7549bb4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json index 3d8910cdec9..43c118ef68c 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27394.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27394", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:27.363", - "lastModified": "2024-11-21T09:04:31.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:41:12.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.9", + "matchCriteriaId": "5F9041E5-8358-4EF7-8F98-B812EDE49612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*", + "matchCriteriaId": "F850DCEC-E08B-4317-A33B-D2DCF39F601B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/80e679b352c3ce5158f3f778cfb77eb767e586fb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca4fb6c6764b3f75b4f5aa81db1536291897ff7f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/80e679b352c3ce5158f3f778cfb77eb767e586fb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca4fb6c6764b3f75b4f5aa81db1536291897ff7f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32122.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32122.json index fdb2e8eaabd..22773fe571e 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32122.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32122", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-04-08T14:15:31.040", - "lastModified": "2025-04-08T14:15:31.040", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33593.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33593.json index 367d29515c8..4e1b059244a 100644 --- a/CVE-2024/CVE-2024-335xx/CVE-2024-33593.json +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33593.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33593", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-29T10:15:08.083", - "lastModified": "2024-11-21T09:17:13.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:40:51.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rednao:smart_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.92", + "matchCriteriaId": "1827DE18-24DC-4DBA-B4A1-3158ED0DCE1E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/smart-forms/wordpress-smart-forms-plugin-2-6-91-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/smart-forms/wordpress-smart-forms-plugin-2-6-91-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38797.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38797.json index d19eda9a606..0f00b4d2d05 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38797.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38797.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38797", "sourceIdentifier": "infosec@edk2.groups.io", "published": "2025-04-07T18:15:45.337", - "lastModified": "2025-04-07T18:15:45.337", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "EDK2 contains a vulnerability in the HashPeImageByType(). A user may cause a read out of bounds when a corrupted data pointer and length are sent via an adjecent network. A successful exploit of this vulnerability may lead to a loss of Integrity and/or Availability." + }, + { + "lang": "es", + "value": "EDK2 contiene una vulnerabilidad en HashPeImageByType(). Un usuario puede provocar una lectura fuera de los l\u00edmites al enviar un puntero de datos y una longitud da\u00f1ados a trav\u00e9s de una red adyacente. Explotar esta vulnerabilidad puede provocar la p\u00e9rdida de integridad o disponibilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41788.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41788.json index f8a42141118..e73644f6007 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41788.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41788.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41788", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:17.820", - "lastModified": "2025-04-08T09:15:17.820", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41789.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41789.json index 794d8b88994..cd786106c9f 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41789.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41789.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41789", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:18.150", - "lastModified": "2025-04-08T09:15:18.150", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the language parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SENTRON 7KT PAC1260 Data Manager (todas las versiones). La interfaz web de los dispositivos afectados no depura el par\u00e1metro de idioma en solicitudes POST espec\u00edficas. Esto podr\u00eda permitir que un atacante remoto autenticado ejecute c\u00f3digo arbitrario con privilegios de root." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41790.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41790.json index db4d55a59b7..8b9bc58fa08 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41790.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41790.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41790", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:18.590", - "lastModified": "2025-04-08T09:15:18.590", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the region parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SENTRON 7KT PAC1260 Data Manager (todas las versiones). La interfaz web de los dispositivos afectados no depura el par\u00e1metro de regi\u00f3n en solicitudes POST espec\u00edficas. Esto podr\u00eda permitir que un atacante remoto autenticado ejecute c\u00f3digo arbitrario con privilegios de root." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41791.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41791.json index 65d89b856e9..6f22460ead9 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41791.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41791.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41791", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:18.790", - "lastModified": "2025-04-08T09:15:18.790", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not authenticate report creation requests. This could allow an unauthenticated remote attacker to read or clear the log files on the device, reset the device or set the date and time." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SENTRON 7KT PAC1260 Data Manager (todas las versiones). La interfaz web de los dispositivos afectados no autentica las solicitudes de creaci\u00f3n de informes. Esto podr\u00eda permitir que un atacante remoto no autenticado lea o borre los archivos de registro del dispositivo, lo restablezca o configure la fecha y la hora. " } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41792.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41792.json index 32c75c8e242..924bdc6f526 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41792.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41792.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41792", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:19.257", - "lastModified": "2025-04-08T09:15:19.257", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices contains a path traversal vulnerability. This could allow an unauthenticated attacker it to access arbitrary files on the device with root privileges." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SENTRON 7KT PAC1260 Data Manager (todas las versiones). La interfaz web de los dispositivos afectados contiene una vulnerabilidad de path traversal. Esto podr\u00eda permitir que un atacante no autenticado acceda a archivos arbitrarios del dispositivo con privilegios de root." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41793.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41793.json index aa4dfef209f..6ae5416fcb2 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41793.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41793.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41793", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:19.563", - "lastModified": "2025-04-08T09:15:19.563", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices provides an endpoint that allows to enable the ssh service without authentication. This could allow an unauthenticated remote attacker to enable remote access to the device via ssh." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SENTRON 7KT PAC1260 Data Manager (todas las versiones). La interfaz web de los dispositivos afectados proporciona un endpoint que permite habilitar el servicio SSH sin autenticaci\u00f3n. Esto podr\u00eda permitir que un atacante remoto no autenticado acceda al dispositivo mediante SSH." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41794.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41794.json index e6875dcab35..cc5578c452e 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41794.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41794.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41794", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:20.010", - "lastModified": "2025-04-08T09:15:20.010", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793)." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SENTRON 7KT PAC1260 Data Manager (todas las versiones). Los dispositivos afectados contienen credenciales codificadas para el acceso remoto al sistema operativo del dispositivo con privilegios de root. Esto podr\u00eda permitir que atacantes remotos no autenticados obtengan acceso completo a un dispositivo si poseen estas credenciales y el servicio SSH est\u00e1 habilitado (por ejemplo, mediante la explotaci\u00f3n de CVE-2024-41793)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41795.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41795.json index 12df559e5a7..f90b7930ac6 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41795.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41795.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41795", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:20.350", - "lastModified": "2025-04-08T09:15:20.350", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices is vulnerable to Cross-Site Request Forgery (CSRF) attacks. This could allow an unauthenticated attacker to change arbitrary device settings by tricking a legitimate device administrator to click on a malicious link." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SENTRON 7KT PAC1260 Data Manager (todas las versiones). La interfaz web de los dispositivos afectados es vulnerable a ataques de Cross-Site Request Forgery (CSRF). Esto podr\u00eda permitir que un atacante no autenticado modifique la configuraci\u00f3n arbitraria del dispositivo enga\u00f1ando a un administrador leg\u00edtimo para que haga clic en un enlace malicioso." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41796.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41796.json index 039ead7646f..cdf67691a88 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41796.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41796.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41796", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:20.813", - "lastModified": "2025-04-08T09:15:20.813", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices allows to change the login password without knowing the current password. In combination with a prepared CSRF attack (CVE-2024-41795) an unauthenticated attacker could be able to set the password to an attacker-controlled value." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en SENTRON 7KT PAC1260 Data Manager (todas las versiones). La interfaz web de los dispositivos afectados permite cambiar la contrase\u00f1a de inicio de sesi\u00f3n sin conocer la contrase\u00f1a actual. En combinaci\u00f3n con un ataque CSRF preparado (CVE-2024-41795), un atacante no autenticado podr\u00eda configurar la contrase\u00f1a con un valor controlado por el atacante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46494.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46494.json index 9aa1bdde69b..09996e39d62 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46494.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46494.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46494", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T20:15:19.950", - "lastModified": "2025-04-07T20:15:19.950", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in Typecho v1.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into Name parameter under a comment for an Article." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en Typecho v1.2.1 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Nombre debajo de un comentario de un art\u00edculo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46671.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46671.json index 4c0e021b3a8..fd943252048 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46671.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46671.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46671", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-04-08T14:15:31.740", - "lastModified": "2025-04-08T14:15:31.740", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47217.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47217.json index 6af830498b7..105994820c9 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47217.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47217.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47217", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T21:15:38.983", - "lastModified": "2025-04-07T19:15:53.447", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:55:43.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:snowplow:iglu_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.13.1", + "matchCriteriaId": "17F959D6-182B-4438-9EC1-490A0758533F" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47261.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47261.json index 1066718ab04..c3f70a7d501 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47261.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47261.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47261", "sourceIdentifier": "product-security@axis.com", "published": "2025-04-08T06:15:43.053", - "lastModified": "2025-04-08T06:15:43.053", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device." + }, + { + "lang": "es", + "value": "51l3nc3, miembro del programa de recompensas por errores de AXIS OS, descubri\u00f3 que la API de VAPIX uploadoverlayimage.cgi no ten\u00eda suficiente validaci\u00f3n de entrada para permitir que un atacante cargara archivos para bloquear el acceso para crear superposiciones de im\u00e1genes en la interfaz web del dispositivo Axis." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48887.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48887.json index c32e80877f0..8baf9f80422 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48887.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48887.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48887", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-04-08T17:15:34.440", - "lastModified": "2025-04-08T17:15:34.440", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50565.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50565.json index 7854d058348..0e86628711e 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50565.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50565.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50565", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-04-08T14:15:31.920", - "lastModified": "2025-04-08T14:15:31.920", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52962.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52962.json index 197445bb73d..f3ef487bde4 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52962.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52962.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52962", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-04-08T14:15:32.097", - "lastModified": "2025-04-08T14:15:32.097", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52974.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52974.json index ceb9b1204ad..b3162c4e3eb 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52974.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52974.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52974", "sourceIdentifier": "bressers@elastic.co", "published": "2025-04-08T17:15:34.653", - "lastModified": "2025-04-08T17:15:34.653", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52980.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52980.json index 3c3115bac56..84fb3dd0171 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52980.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52980.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52980", "sourceIdentifier": "bressers@elastic.co", "published": "2025-04-08T17:15:34.880", - "lastModified": "2025-04-08T17:15:34.880", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52981.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52981.json index 3c4d1046122..d0430d7f469 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52981.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52981.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52981", "sourceIdentifier": "bressers@elastic.co", "published": "2025-04-08T17:15:35.187", - "lastModified": "2025-04-08T17:15:35.187", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54024.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54024.json index 2b63d8c318a..316f304d9b7 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54024.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54024.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54024", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-04-08T14:15:32.303", - "lastModified": "2025-04-08T14:15:32.303", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54025.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54025.json index e0216688dfe..efbc1d8f4fe 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54025.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54025.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54025", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-04-08T14:15:32.463", - "lastModified": "2025-04-08T14:15:32.463", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54092.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54092.json index 9202c2694d8..a3268912b24 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54092.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54092.json @@ -2,13 +2,17 @@ "id": "CVE-2024-54092", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:23.320", - "lastModified": "2025-04-08T09:15:23.320", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Industrial Edge Device Kit - arm64 V1.17 (All versions), Industrial Edge Device Kit - arm64 V1.18 (All versions), Industrial Edge Device Kit - arm64 V1.19 (All versions), Industrial Edge Device Kit - arm64 V1.20 (All versions < V1.20.2-1), Industrial Edge Device Kit - arm64 V1.21 (All versions < V1.21.1-1), Industrial Edge Device Kit - x86-64 V1.17 (All versions), Industrial Edge Device Kit - x86-64 V1.18 (All versions), Industrial Edge Device Kit - x86-64 V1.19 (All versions), Industrial Edge Device Kit - x86-64 V1.20 (All versions < V1.20.2-1), Industrial Edge Device Kit - x86-64 V1.21 (All versions < V1.21.1-1), Industrial Edge Own Device (IEOD) (All versions < V1.21.1-1-a), Industrial Edge Virtual Device (All versions < V1.21.1-1-a), SCALANCE LPE9413 (6GK5998-3GS01-2AC2) (All versions), SIMATIC IPC BX-39A Industrial Edge Device (All versions < V3.0), SIMATIC IPC BX-59A Industrial Edge Device (All versions < V3.0), SIMATIC IPC127E Industrial Edge Device (All versions < V3.0), SIMATIC IPC227E Industrial Edge Device (All versions < V3.0), SIMATIC IPC427E Industrial Edge Device (All versions < V3.0), SIMATIC IPC847E Industrial Edge Device (All versions < V3.0). Affected devices do not properly enforce user authentication on specific API endpoints when identity federation is used. This could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user. Successful exploitation requires that identity federation is currently or has previously been used and the attacker has learned the identity of a legitimate user." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Industrial Edge Device Kit - arm64 V1.17 (Todas las versiones), Industrial Edge Device Kit - arm64 V1.18 (Todas las versiones), Industrial Edge Device Kit - arm64 V1.19 (Todas las versiones), Industrial Edge Device Kit - arm64 V1.20 (Todas las versiones < V1.20.2-1), Industrial Edge Device Kit - arm64 V1.21 (Todas las versiones < V1.21.1-1), Industrial Edge Device Kit - x86-64 V1.17 (Todas las versiones), Industrial Edge Device Kit - x86-64 V1.18 (Todas las versiones), Industrial Edge Device Kit - x86-64 V1.19 (Todas las versiones), Industrial Edge Device Kit - x86-64 V1.20 (Todas las versiones < V1.20.2-1), Industrial Edge Device Kit - x86-64 V1.21 (Todas las versiones < V1.21.1-1), Industrial Edge Own Device (IEOD) (Todas las versiones < V1.21.1-1-a), Industrial Edge Device Kit (todas las versiones < V1.21.1-1-a), SCALANCE LPE9413 (6GK5998-3GS01-2AC2) (todas las versiones), SIMATIC IPC BX-39A Industrial Edge Device (todas las versiones < V3.0), SIMATIC IPC BX-59A Industrial Edge Device (todas las versiones < V3.0), SIMATIC IPC127E Industrial Edge Device (todas las versiones < V3.0), SIMATIC IPC227E Industrial Edge Device (todas las versiones < V3.0), SIMATIC IPC427E Industrial Edge Device (todas las versiones < V3.0), SIMATIC IPC847E Industrial Edge Device (todas las versiones < V3.0). Los dispositivos afectados no aplican correctamente la autenticaci\u00f3n de usuario en endpoints de API espec\u00edficos cuando se utiliza la federaci\u00f3n de identidades. Esto podr\u00eda facilitar que un atacante remoto no autenticado eluda la autenticaci\u00f3n y se haga pasar por un usuario leg\u00edtimo. Para una explotaci\u00f3n exitosa es necesario que la federaci\u00f3n de identidad est\u00e9 actualmente en uso o se haya utilizado anteriormente y que el atacante haya conocido la identidad de un usuario leg\u00edtimo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-00xx/CVE-2025-0050.json b/CVE-2025/CVE-2025-00xx/CVE-2025-0050.json index e4e8c0b2772..a28b050949d 100644 --- a/CVE-2025/CVE-2025-00xx/CVE-2025-0050.json +++ b/CVE-2025/CVE-2025-00xx/CVE-2025-0050.json @@ -2,16 +2,43 @@ "id": "CVE-2025-0050", "sourceIdentifier": "arm-security@arm.com", "published": "2025-04-07T12:15:15.360", - "lastModified": "2025-04-07T14:17:50.220", + "lastModified": "2025-04-08T19:15:46.877", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to make valid GPU processing operations, including via WebGL or WebGPU, to access a limited amount outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r0p0 through r49p2, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r19p0 through r49p2, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p2, from r50p0 through r53p0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver permite que un proceso de usuario sin privilegios realice operaciones de procesamiento de GPU v\u00e1lidas, incluso mediante WebGL o WebGPU, para acceder a una cantidad limitada fuera de los l\u00edmites del b\u00fafer. Este problema afecta al controlador de espacio de usuario de GPU Bifrost: de r0p0 a r49p2 y de r50p0 a r51p0; al controlador de espacio de usuario de GPU Valhall: de r19p0 a r49p2, de r50p0 a r53p0; y al controlador de espacio de usuario de arquitectura de GPU de Arm 5.\u00aa generaci\u00f3n: de r41p0 a r49p2 y de r50p0 a r53p0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "arm-security@arm.com", diff --git a/CVE-2025/CVE-2025-03xx/CVE-2025-0361.json b/CVE-2025/CVE-2025-03xx/CVE-2025-0361.json index 90a74ddb9b7..ce62e25a563 100644 --- a/CVE-2025/CVE-2025-03xx/CVE-2025-0361.json +++ b/CVE-2025/CVE-2025-03xx/CVE-2025-0361.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0361", "sourceIdentifier": "product-security@axis.com", "published": "2025-04-08T06:15:44.540", - "lastModified": "2025-04-08T06:15:44.540", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username enumeration through the VAPIX Device Configuration SSH Management API." + }, + { + "lang": "es", + "value": "Durante una prueba de penetraci\u00f3n anual realizada en nombre de Axis Communications, Truesec descubri\u00f3 una falla en el marco de configuraci\u00f3n del dispositivo VAPIX que permit\u00eda la enumeraci\u00f3n de nombres de usuario no autenticados a trav\u00e9s de la API de administraci\u00f3n SSH de configuraci\u00f3n del dispositivo VAPIX." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0942.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0942.json index 9e519c08b2c..0e053af769b 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0942.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0942.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0942", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-04-07T22:15:16.020", - "lastModified": "2025-04-07T22:15:16.020", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DB chooser functionality in\u00a0Jalios JPlatform 10 SP6 before 10.0.6 improperly neutralizes special elements used in an SQL command allows for authenticated administrative users to trigger SQL Injection.\n\nThis issue affects JPlatform before 10.0.6 and a PatchPlugin release 10.0.6 was issued 2023-02-06." + }, + { + "lang": "es", + "value": "La funci\u00f3n de selecci\u00f3n de base de datos en Jalios JPlatform 10 SP6 anterior a la versi\u00f3n 10.0.6 neutraliza incorrectamente los elementos especiales utilizados en un comando SQL, lo que permite que usuarios administrativos autenticados activen la inyecci\u00f3n SQL. Este problema afecta a JPlatform anterior a la versi\u00f3n 10.0.6 y se public\u00f3 un PatchPlugin 10.0.6 el 6 de febrero de 2023." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1095.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1095.json index 8bae2c4c82d..0051cc9540f 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1095.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1095.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1095", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-04-08T16:15:24.910", - "lastModified": "2025-04-08T16:15:24.910", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20934.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20934.json index 97fe689bcb1..a903a5b92dd 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20934.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20934.json @@ -2,8 +2,8 @@ "id": "CVE-2025-20934", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:37.790", - "lastModified": "2025-04-08T15:15:48.457", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20935.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20935.json index 52abe99c58c..a046efac148 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20935.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20935.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20935", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:37.923", - "lastModified": "2025-04-08T05:15:37.923", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper handling of insufficient permission or privileges in ClipboardService prior to SMR Apr-2025 Release 1 allows local attackers to access files with system privilege. User interaction is required for triggering this vulnerability." + }, + { + "lang": "es", + "value": "La gesti\u00f3n incorrecta de permisos o privilegios insuficientes en ClipboardService antes de la versi\u00f3n 1 de SMR (abril de 2025) permite a atacantes locales acceder a archivos con privilegios del sistema. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20936.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20936.json index e20c2a728ef..c19532cb653 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20936.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20936.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20936", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:38.043", - "lastModified": "2025-04-08T05:15:38.043", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in HDCP trustlet prior to SMR Apr-2025 Release 1 allows local attackers with shell privilege to escalate their privileges to root." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en el trustlet HDCP anterior a SMR Apr-2025 Release 1 permite que atacantes locales con privilegios de shell escalen sus privilegios a root." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20938.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20938.json index b714bfcbd68..6f485b35a4f 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20938.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20938.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20938", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:38.170", - "lastModified": "2025-04-08T05:15:38.170", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in SamsungContacts prior to SMR Apr-2025 Release 1 allows local attackers to access protected data in SamsungContacts." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en SamsungContacts antes de SMR Apr-2025 Release 1 permite que atacantes locales accedan a datos protegidos en SamsungContacts." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20939.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20939.json index edfa914d4c1..f1c7b38bc1d 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20939.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20939.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20939", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:38.293", - "lastModified": "2025-04-08T05:15:38.293", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authorization in wireless download protocol in Galaxy Watch prior to SMR Apr-2025 Release 1 allows physical attackers to update device unique identifier of Watch devices." + }, + { + "lang": "es", + "value": "La autorizaci\u00f3n incorrecta en el protocolo de descarga inal\u00e1mbrica en Galaxy Watch anterior a la versi\u00f3n 1 de SMR de abril de 2025 permite que atacantes f\u00edsicos actualicen el identificador \u00fanico del dispositivo Watch." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20940.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20940.json index 7646bbbafdf..58c5d3b845d 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20940.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20940.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20940", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:38.413", - "lastModified": "2025-04-08T05:15:38.413", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper handling of insufficient permission in Samsung Device Health Manager Service prior to SMR Apr-2025 Release 1 allows local attackers to access provider in SDMHS." + }, + { + "lang": "es", + "value": "La gesti\u00f3n inadecuada de permisos insuficientes en el servicio Samsung Device Health Manager anterior a SMR Apr-2025 Release 1 permite que atacantes locales accedan al proveedor en SDMHS." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20941.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20941.json index 6ab177b4d10..96029e2a31d 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20941.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20941.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20941", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:38.550", - "lastModified": "2025-04-08T05:15:38.550", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in InputManager to SMR Apr-2025 Release 1 allows local attackers to access the scancode of specific input device." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en InputManager para SMR Apr-2025 Release 1 permite que atacantes locales accedan al c\u00f3digo de escaneo de un dispositivo de entrada espec\u00edfico." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20942.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20942.json index b15e92b53e9..9be965aebad 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20942.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20942.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20942", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:38.670", - "lastModified": "2025-04-08T05:15:38.670", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Verification of Intent by Broadcast Receiver in DeviceIdService prior to SMR Apr-2025 Release 1 allows local attackers to reset OAID." + }, + { + "lang": "es", + "value": "La verificaci\u00f3n incorrecta de la intenci\u00f3n por parte del receptor de transmisi\u00f3n en DeviceIdService antes de la versi\u00f3n 1 de SMR de abril de 2025 permite que los atacantes locales restablezcan OAID." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20943.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20943.json index 6402b33aae2..f581cf11216 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20943.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20943.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20943", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:38.787", - "lastModified": "2025-04-08T05:15:38.787", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in secfr trustlet prior to SMR Apr-2025 Release 1 allows local privileged attackers to cause memory corruption." + }, + { + "lang": "es", + "value": "La escritura fuera de los l\u00edmites en el trustlet secfr anterior a la versi\u00f3n 1 de SMR de abril de 2025 permite que atacantes privilegiados locales provoquen corrupci\u00f3n en la memoria." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20944.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20944.json index a11a914e849..9042e6e24b2 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20944.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20944.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20944", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:38.913", - "lastModified": "2025-04-08T05:15:38.913", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in parsing audio data in libsavsac.so prior to SMR Apr-2025 Release 1 allows local attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites al analizar datos de audio en libsavsac.so antes de SMR Apr-2025 Release 1 permite que atacantes locales lean memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20945.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20945.json index 0dc6ffe763a..e1a252efd70 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20945.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20945.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20945", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:39.037", - "lastModified": "2025-04-08T05:15:39.037", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Galaxy Watch prior to SMR Apr-2025 Release 1 allows local attackers to access sensitive information of Galaxy watch." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en Galaxy Watch antes de SMR Apr-2025 Release 1 permite que atacantes locales accedan a informaci\u00f3n confidencial del Galaxy Watch." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20946.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20946.json index ed80a99d473..f2610b41bfa 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20946.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20946.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20946", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:39.160", - "lastModified": "2025-04-08T05:15:39.160", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper handling of exceptional conditions in pairing specific bluetooth devices in Galaxy Watch Bluetooth pairing prior to SMR Apr-2025 Release 1 allows local attackers to pair with specific bluetooth devices without user interaction." + }, + { + "lang": "es", + "value": "La gesti\u00f3n inadecuada de condiciones excepcionales al emparejar dispositivos Bluetooth espec\u00edficos en Galaxy Watch el emparejamiento de Bluetooth anterior a SMR Apr-2025 Release 1 permite que atacantes locales se emparejen con dispositivos Bluetooth espec\u00edficos sin interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20947.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20947.json index 82ca061882e..8b2f3e10f3c 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20947.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20947.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20947", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:39.283", - "lastModified": "2025-04-08T05:15:39.283", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper handling of insufficient permission or privileges in ClipboardService prior to SMR Apr-2025 Release 1 allows local attackers to access image files across multiple users. User interaction is required for triggering this vulnerability." + }, + { + "lang": "es", + "value": "La gesti\u00f3n incorrecta de permisos o privilegios insuficientes en ClipboardService antes de la versi\u00f3n 1 de SMR (abril de 2025) permite a atacantes locales acceder a archivos de imagen de varios usuarios. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20948.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20948.json index 9861830566c..9c9ced36ca2 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20948.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20948.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20948", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:39.400", - "lastModified": "2025-04-08T05:15:39.400", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in enrollment with cdsp frame secfr trustlet prior to SMR Apr-2025 Release 1 allows local privileged attackers to read out-of-bounds memory." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en la inscripci\u00f3n con el trustlet secfr de frame CDSP anterior a la versi\u00f3n 1 de SMR de abril de 2025 permite que atacantes privilegiados locales lean memoria fuera de los l\u00edmites." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20950.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20950.json index 56a68771983..0fe1b36e822 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20950.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20950.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20950", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:39.527", - "lastModified": "2025-04-08T05:15:39.527", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of implicit intent for sensitive communication in SamsungNotes prior to version 4.4.26.45 allows local attackers to access sensitive information." + }, + { + "lang": "es", + "value": "El uso de intenci\u00f3n impl\u00edcita para comunicaciones confidenciales en SamsungNotes anteriores a la versi\u00f3n 4.4.26.45 permite a atacantes locales acceder a informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20951.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20951.json index cc12a560ff3..f79c75cf3b9 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20951.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20951.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20951", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-08T05:15:39.647", - "lastModified": "2025-04-08T05:15:39.647", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper verification of intent by broadcast receiver vulnerability in Galaxy Store prior to version 4.5.90.7 allows local attackers to write arbitrary files with the privilege of Galaxy Store." + }, + { + "lang": "es", + "value": "La vulnerabilidad de verificaci\u00f3n incorrecta de la intenci\u00f3n por parte del receptor de transmisi\u00f3n en Galaxy Store anterior a la versi\u00f3n 4.5.90.7 permite a atacantes locales escribir archivos arbitrarios con el privilegio de Galaxy Store." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2004.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2004.json index 014f46fe435..8c99b436dc4 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2004.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2004.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2004", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T05:15:39.767", - "lastModified": "2025-04-08T05:15:39.767", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Simple WP Events plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wpe_delete_file AJAX action in all versions up to, and including, 1.8.17. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)." + }, + { + "lang": "es", + "value": "El complemento Simple WP Events para WordPress es vulnerable a la eliminaci\u00f3n arbitraria de archivos debido a una validaci\u00f3n insuficiente de la ruta de archivo en la acci\u00f3n AJAX wpe_delete_file en todas las versiones hasta la 1.8.17 incluida. Esto permite que atacantes no autenticados eliminen archivos arbitrarios en el servidor, lo que puede provocar f\u00e1cilmente la ejecuci\u00f3n remota de c\u00f3digo al eliminar el archivo correcto (como wp-config.php)." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json new file mode 100644 index 00000000000..3dcd2b0cc7f --- /dev/null +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21174", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:44.667", + "lastModified": "2025-04-08T18:15:44.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21174", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21191.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21191.json new file mode 100644 index 00000000000..2636edc3cd8 --- /dev/null +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21191.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21191", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:44.857", + "lastModified": "2025-04-08T18:15:44.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21191", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21197.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21197.json new file mode 100644 index 00000000000..9c2c68027f5 --- /dev/null +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21197.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21197", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:45.020", + "lastModified": "2025-04-08T18:15:45.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21197", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21203.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21203.json new file mode 100644 index 00000000000..7daf1a70737 --- /dev/null +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21203.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21203", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:45.190", + "lastModified": "2025-04-08T18:15:45.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21203", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21204.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21204.json new file mode 100644 index 00000000000..5015176283e --- /dev/null +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21204.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21204", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:45.343", + "lastModified": "2025-04-08T18:15:45.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21204", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21205.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21205.json new file mode 100644 index 00000000000..c874a035d55 --- /dev/null +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21205.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21205", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:45.513", + "lastModified": "2025-04-08T18:15:45.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21205", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21221.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21221.json new file mode 100644 index 00000000000..9779bd09451 --- /dev/null +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21221.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21221", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:45.673", + "lastModified": "2025-04-08T18:15:45.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21221", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21222.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21222.json new file mode 100644 index 00000000000..ed9c1e69a47 --- /dev/null +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21222.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-21222", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:45.850", + "lastModified": "2025-04-08T18:15:45.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21222", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22008.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22008.json index 3a97dd6b9cf..d91c2cf97ce 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22008.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22008.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22008", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-08T09:15:24.157", - "lastModified": "2025-04-08T09:15:24.157", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: check that dummy regulator has been probed before using it\n\nDue to asynchronous driver probing there is a chance that the dummy\nregulator hasn't already been probed when first accessing it." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: regulador: comprobar que el regulador ficticio haya sido probado antes de usarlo Debido al sondeo asincr\u00f3nico del controlador existe la posibilidad de que el regulador ficticio no haya sido probado ya cuando se accede a \u00e9l por primera vez." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22009.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22009.json index 123c421dd0d..c023e0d40a6 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22009.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22009.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22009", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-08T09:15:24.460", - "lastModified": "2025-04-08T09:15:24.460", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nregulator: dummy: force synchronous probing\n\nSometimes I get a NULL pointer dereference at boot time in kobject_get()\nwith the following call stack:\n\nanatop_regulator_probe()\n devm_regulator_register()\n regulator_register()\n regulator_resolve_supply()\n kobject_get()\n\nBy placing some extra BUG_ON() statements I could verify that this is\nraised because probing of the 'dummy' regulator driver is not completed\n('dummy_regulator_rdev' is still NULL).\n\nIn the JTAG debugger I can see that dummy_regulator_probe() and\nanatop_regulator_probe() can be run by different kernel threads\n(kworker/u4:*). I haven't further investigated whether this can be\nchanged or if there are other possibilities to force synchronization\nbetween these two probe routines. On the other hand I don't expect much\nboot time penalty by probing the 'dummy' regulator synchronously." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: regulator: dummy: force synchronous sondeo a veces obtengo una desreferencia de puntero NULL en el momento del arranque en kobject_get() con la siguiente pila de llamadas: anatop_regulator_probe() devm_regulator_register() regulator_register() regulator_resolve_supply() kobject_get() Colocando algunas sentencias BUG_ON() adicionales pude verificar que esto se genera porque el sondeo del controlador del regulador 'dummy' no se completa ('dummy_regulator_rdev' sigue siendo NULL). En el depurador JTAG puedo ver que dummy_regulator_probe() y anatop_regulator_probe() pueden ser ejecutados por diferentes subprocesos del kernel (kworker/u4:*). No he investigado m\u00e1s si esto se puede cambiar o si hay otras posibilidades de forzar la sincronizaci\u00f3n entre estas dos rutinas de sondeo. Por otro lado, no espero mucha penalizaci\u00f3n en el tiempo de arranque al sondear el regulador 'dummy' sincr\u00f3nicamente." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22010.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22010.json index 859781220c2..013b5c7d15f 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22010.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22010.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22010", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-08T09:15:24.777", - "lastModified": "2025-04-08T09:15:24.777", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix soft lockup during bt pages loop\n\nDriver runs a for-loop when allocating bt pages and mapping them with\nbuffer pages. When a large buffer (e.g. MR over 100GB) is being allocated,\nit may require a considerable loop count. This will lead to soft lockup:\n\n watchdog: BUG: soft lockup - CPU#27 stuck for 22s!\n ...\n Call trace:\n hem_list_alloc_mid_bt+0x124/0x394 [hns_roce_hw_v2]\n hns_roce_hem_list_request+0xf8/0x160 [hns_roce_hw_v2]\n hns_roce_mtr_create+0x2e4/0x360 [hns_roce_hw_v2]\n alloc_mr_pbl+0xd4/0x17c [hns_roce_hw_v2]\n hns_roce_reg_user_mr+0xf8/0x190 [hns_roce_hw_v2]\n ib_uverbs_reg_mr+0x118/0x290\n\n watchdog: BUG: soft lockup - CPU#35 stuck for 23s!\n ...\n Call trace:\n hns_roce_hem_list_find_mtt+0x7c/0xb0 [hns_roce_hw_v2]\n mtr_map_bufs+0xc4/0x204 [hns_roce_hw_v2]\n hns_roce_mtr_create+0x31c/0x3c4 [hns_roce_hw_v2]\n alloc_mr_pbl+0xb0/0x160 [hns_roce_hw_v2]\n hns_roce_reg_user_mr+0x108/0x1c0 [hns_roce_hw_v2]\n ib_uverbs_reg_mr+0x120/0x2bc\n\nAdd a cond_resched() to fix soft lockup during these loops. In order not\nto affect the allocation performance of normal-size buffer, set the loop\ncount of a 100GB MR as the threshold to call cond_resched()." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hns: Se corrige el bloqueo suave durante el bucle de p\u00e1ginas bt. El controlador ejecuta un bucle for al asignar p\u00e1ginas bt y mapearlas con p\u00e1ginas de b\u00fafer. Al asignar un b\u00fafer grande (por ejemplo, un MR de m\u00e1s de 100 GB), puede requerirse un n\u00famero considerable de bucles. Esto provocar\u00e1 un bloqueo suave: watchdog: BUG: bloqueo suave - \u00a1CPU n.\u00ba 27 bloqueada durante 22 s! ... Rastreo de llamadas: hem_list_alloc_mid_bt+0x124/0x394 [hns_roce_hw_v2] hns_roce_hem_list_request+0xf8/0x160 [hns_roce_hw_v2] hns_roce_mtr_create+0x2e4/0x360 [hns_roce_hw_v2] alloc_mr_pbl+0xd4/0x17c [hns_roce_hw_v2] hns_roce_reg_user_mr+0xf8/0x190 [hns_roce_hw_v2] ib_uverbs_reg_mr+0x118/0x290 perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU n.\u00ba 35 bloqueada durante 23 s! ... Seguimiento de llamadas: hns_roce_hem_list_find_mtt+0x7c/0xb0 [hns_roce_hw_v2] mtr_map_bufs+0xc4/0x204 [hns_roce_hw_v2] hns_roce_mtr_create+0x31c/0x3c4 [hns_roce_hw_v2] alloc_mr_pbl+0xb0/0x160 [hns_roce_hw_v2] hns_roce_reg_user_mr+0x108/0x1c0 [hns_roce_hw_v2] ib_uverbs_reg_mr+0x120/0x2bc Agregue un cond_resched() para corregir el bloqueo suave durante estos bucles. Para no afectar el rendimiento de asignaci\u00f3n de un b\u00fafer de tama\u00f1o normal, establezca el recuento de bucles de un MR de 100 GB como el umbral para llamar a cond_resched()." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22011.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22011.json index 3ad45b30798..c8a9259d37a 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22011.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22011.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22011", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-08T09:15:25.020", - "lastModified": "2025-04-08T09:15:25.020", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: dts: bcm2711: Fix xHCI power-domain\n\nDuring s2idle tests on the Raspberry CM4 the VPU firmware always crashes\non xHCI power-domain resume:\n\nroot@raspberrypi:/sys/power# echo freeze > state\n[ 70.724347] xhci_suspend finished\n[ 70.727730] xhci_plat_suspend finished\n[ 70.755624] bcm2835-power bcm2835-power: Power grafx off\n[ 70.761127] USB: Set power to 0\n\n[ 74.653040] USB: Failed to set power to 1 (-110)\n\nThis seems to be caused because of the mixed usage of\nraspberrypi-power and bcm2835-power at the same time. So avoid\nthe usage of the VPU firmware power-domain driver, which\nprevents the VPU crash." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ARM: dts: bcm2711: Reparar xHCI power-domain Durante las pruebas s2idle en Raspberry CM4, el firmware de la VPU siempre falla en xHCI power-domain resume: root@raspberrypi:/sys/power# echo freeze > state [ 70.724347] xhci_suspend finished [ 70.727730] xhci_plat_suspend finished [ 70.755624] bcm2835-power bcm2835-power: Apagar grafx [ 70.761127] USB: Establecer la energ\u00eda en 0 [ 74.653040] USB: No se pudo establecer la energ\u00eda en 1 (-110) Esto parece deberse al uso mixto de raspberrypi-power y bcm2835-power al mismo tiempo. Por lo tanto, evite el uso del controlador de dominio de energ\u00eda del firmware VPU, lo que evita el bloqueo de la VPU." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22012.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22012.json index 01b388149a9..b86113d79c5 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22012.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22012.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22012", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-08T09:15:25.420", - "lastModified": "2025-04-08T09:15:25.420", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"arm64: dts: qcom: sdm845: Affirm IDR0.CCTW on apps_smmu\"\n\nThere are reports that the pagetable walker cache coherency is not a\ngiven across the spectrum of SDM845/850 devices, leading to lock-ups\nand resets. It works fine on some devices (like the Dragonboard 845c,\nbut not so much on the Lenovo Yoga C630).\n\nThis unfortunately looks like a fluke in firmware development, where\nlikely somewhere in the vast hypervisor stack, a change to accommodate\nfor this was only introduced after the initial software release (which\noften serves as a baseline for products).\n\nRevert the change to avoid additional guesswork around crashes.\n\nThis reverts commit 6b31a9744b8726c69bb0af290f8475a368a4b805." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Revertir \"arm64: dts: qcom: sdm845: Affirm IDR0.CCTW en apps_smmu\". Hay informes de que la coherencia de la cach\u00e9 del pagetable walker no es constante en todos los dispositivos SDM845/850, lo que provoca bloqueos y reinicios. Funciona correctamente en algunos dispositivos (como el Dragonboard 845c, pero no tanto en el Lenovo Yoga C630). Lamentablemente, esto parece ser un fallo en el desarrollo del firmware, ya que, probablemente en alg\u00fan lugar de la vasta pila de hipervisores, se introdujo un cambio para adaptarlo despu\u00e9s del lanzamiento inicial del software (que suele servir como base para los productos). Revertir el cambio para evitar conjeturas adicionales sobre fallos. Esto revierte el commit 6b31a9744b8726c69bb0af290f8475a368a4b805." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22013.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22013.json index b0f418cd223..283557b71cb 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22013.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22013.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22013", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-08T09:15:25.643", - "lastModified": "2025-04-08T09:15:25.643", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state\n\nThere are several problems with the way hyp code lazily saves the host's\nFPSIMD/SVE state, including:\n\n* Host SVE being discarded unexpectedly due to inconsistent\n configuration of TIF_SVE and CPACR_ELx.ZEN. This has been seen to\n result in QEMU crashes where SVE is used by memmove(), as reported by\n Eric Auger:\n\n https://issues.redhat.com/browse/RHEL-68997\n\n* Host SVE state is discarded *after* modification by ptrace, which was an\n unintentional ptrace ABI change introduced with lazy discarding of SVE state.\n\n* The host FPMR value can be discarded when running a non-protected VM,\n where FPMR support is not exposed to a VM, and that VM uses\n FPSIMD/SVE. In these cases the hyp code does not save the host's FPMR\n before unbinding the host's FPSIMD/SVE/SME state, leaving a stale\n value in memory.\n\nAvoid these by eagerly saving and \"flushing\" the host's FPSIMD/SVE/SME\nstate when loading a vCPU such that KVM does not need to save any of the\nhost's FPSIMD/SVE/SME state. For clarity, fpsimd_kvm_prepare() is\nremoved and the necessary call to fpsimd_save_and_flush_cpu_state() is\nplaced in kvm_arch_vcpu_load_fp(). As 'fpsimd_state' and 'fpmr_ptr'\nshould not be used, they are set to NULL; all uses of these will be\nremoved in subsequent patches.\n\nHistorical problems go back at least as far as v5.17, e.g. erroneous\nassumptions about TIF_SVE being clear in commit:\n\n 8383741ab2e773a9 (\"KVM: arm64: Get rid of host SVE tracking/saving\")\n\n... and so this eager save+flush probably needs to be backported to ALL\nstable trees." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: arm64: Guardar y vaciar incondicionalmente el estado FPSIMD/SVE/SME del host Hay varios problemas con la forma en que el c\u00f3digo hyp guarda de forma diferida el estado FPSIMD/SVE del host, incluidos: * El SVE del host se descarta inesperadamente debido a una configuraci\u00f3n inconsistente de TIF_SVE y CPACR_ELx.ZEN. Se ha visto que esto da como resultado fallos de QEMU donde memmove() usa SVE, como lo inform\u00f3 Eric Auger: https://issues.redhat.com/browse/RHEL-68997 * El estado SVE del host se descarta *despu\u00e9s* de la modificaci\u00f3n por ptrace, que fue un cambio de ABI de ptrace no intencionado introducido con el descarte diferido del estado SVE. * El valor FPMR del host se puede descartar cuando se ejecuta una VM no protegida, donde la compatibilidad con FPMR no est\u00e1 expuesta a una VM y esa VM usa FPSIMD/SVE. En estos casos, el c\u00f3digo hyp no guarda el FPMR del host antes de desvincular su estado FPSIMD/SVE/SME, lo que deja un valor obsoleto en memoria. Para evitar esto, guarde y vac\u00ede el estado FPSIMD/SVE/SME del host al cargar una vCPU, de modo que KVM no tenga que guardar ninguno de sus estados. Para mayor claridad, se ha eliminado fpsimd_kvm_prepare() y la llamada necesaria a fpsimd_save_and_flush_cpu_state() se ha ubicado en kvm_arch_vcpu_load_fp(). Dado que 'fpsimd_state' y 'fpmr_ptr' no deben usarse, se establecen en NULL; todos sus usos se eliminar\u00e1n en parches posteriores. Los problemas hist\u00f3ricos se remontan al menos a la versi\u00f3n v5.17, por ejemplo, suposiciones err\u00f3neas acerca de que TIF_SVE est\u00e1 claro en el commit: 8383741ab2e773a9 (\"KVM: arm64: deshacerse del seguimiento/guardado de SVE del host\")... y por eso, este ansioso guardado y vaciado probablemente deba ser retrotra\u00eddo a TODOS los \u00e1rboles estables." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22014.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22014.json index 2334f0ffe43..07230de2ea1 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22014.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22014.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22014", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-08T09:15:25.783", - "lastModified": "2025-04-08T09:15:25.783", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: pdr: Fix the potential deadlock\n\nWhen some client process A call pdr_add_lookup() to add the look up for\nthe service and does schedule locator work, later a process B got a new\nserver packet indicating locator is up and call pdr_locator_new_server()\nwhich eventually sets pdr->locator_init_complete to true which process A\nsees and takes list lock and queries domain list but it will timeout due\nto deadlock as the response will queued to the same qmi->wq and it is\nordered workqueue and process B is not able to complete new server\nrequest work due to deadlock on list lock.\n\nFix it by removing the unnecessary list iteration as the list iteration\nis already being done inside locator work, so avoid it here and just\ncall schedule_work() here.\n\n Process A Process B\n\n process_scheduled_works()\npdr_add_lookup() qmi_data_ready_work()\n process_scheduled_works() pdr_locator_new_server()\n pdr->locator_init_complete=true;\n pdr_locator_work()\n mutex_lock(&pdr->list_lock);\n\n pdr_locate_service() mutex_lock(&pdr->list_lock);\n\n pdr_get_domain_list()\n pr_err(\"PDR: %s get domain list\n txn wait failed: %d\\n\",\n req->service_name,\n ret);\n\nTimeout error log due to deadlock:\n\n\"\n PDR: tms/servreg get domain list txn wait failed: -110\n PDR: service lookup for msm/adsp/sensor_pd:tms/servreg failed: -110\n\"\n\nThanks to Bjorn and Johan for letting me know that this commit also fixes\nan audio regression when using the in-kernel pd-mapper as that makes it\neasier to hit this race. [1]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: qcom: pdr: Corrige el posible bloqueo cuando alg\u00fan proceso de cliente A llama a pdr_add_lookup() para agregar la b\u00fasqueda para el servicio y realiza el trabajo del localizador de programaci\u00f3n, m\u00e1s tarde un proceso B obtiene un nuevo paquete de servidor que indica que el localizador est\u00e1 activo y llama a pdr_locator_new_server() que finalmente establece pdr->locator_init_complete en verdadero, lo que hace que el proceso A vea y tome el bloqueo de lista y consulte la lista de dominios, pero se agotar\u00e1 el tiempo de espera debido al bloqueo, ya que la respuesta se pondr\u00e1 en cola en el mismo qmi->wq y se ordenar\u00e1 workqueue y el proceso B no puede completar el nuevo trabajo de solicitud del servidor debido al bloqueo en el bloqueo de lista. Arr\u00e9glelo eliminando la iteraci\u00f3n de lista innecesaria, ya que la iteraci\u00f3n de lista ya se est\u00e1 realizando dentro del trabajo del localizador, as\u00ed que ev\u00edtelo aqu\u00ed y simplemente llame a schedule_work() aqu\u00ed. Proceso A Proceso B process_scheduled_works() pdr_add_lookup() qmi_data_ready_work() process_scheduled_works() pdr_locator_new_server() pdr->locator_init_complete=true; pdr_locator_work() mutex_lock(&pdr->list_lock); pdr_locate_service() mutex_lock(&pdr->list_lock); pdr_get_domain_list() pr_err(\"PDR: %s error en la espera de la transacci\u00f3n para obtener la lista de dominios: %d\\n\", req->service_name, ret); Registro de errores de tiempo de espera debido a un bloqueo: \"PDR: tms/servreg get domain list txn wait fallo: -110 PDR: service lookup for msm/adsp/sensor_pd:tms/servreg failed: -110\" Gracias a Bjorn y Johan por informarme que esta confirmaci\u00f3n tambi\u00e9n corrige una regresi\u00f3n de audio al usar el pd-mapper dentro del kernel, ya que eso hace que sea m\u00e1s f\u00e1cil alcanzar esta ejecuci\u00f3n. [1]" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22015.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22015.json index 107d8b93b44..e434e608758 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22015.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22015.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22015", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-08T09:15:26.150", - "lastModified": "2025-04-08T09:15:26.150", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/migrate: fix shmem xarray update during migration\n\nA shmem folio can be either in page cache or in swap cache, but not at the\nsame time. Namely, once it is in swap cache, folio->mapping should be\nNULL, and the folio is no longer in a shmem mapping.\n\nIn __folio_migrate_mapping(), to determine the number of xarray entries to\nupdate, folio_test_swapbacked() is used, but that conflates shmem in page\ncache case and shmem in swap cache case. It leads to xarray multi-index\nentry corruption, since it turns a sibling entry to a normal entry during\nxas_store() (see [1] for a userspace reproduction). Fix it by only using\nfolio_test_swapcache() to determine whether xarray is storing swap cache\nentries or not to choose the right number of xarray entries to update.\n\n[1] https://lore.kernel.org/linux-mm/Z8idPCkaJW1IChjT@casper.infradead.org/\n\nNote:\nIn __split_huge_page(), folio_test_anon() && folio_test_swapcache() is\nused to get swap_cache address space, but that ignores the shmem folio in\nswap cache case. It could lead to NULL pointer dereferencing when a\nin-swap-cache shmem folio is split at __xa_store(), since\n!folio_test_anon() is true and folio->mapping is NULL. But fortunately,\nits caller split_huge_page_to_list_to_order() bails out early with EBUSY\nwhen folio->mapping is NULL. So no need to take care of it here." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/migrate: arregla la actualizaci\u00f3n de xarray de shmem durante la migraci\u00f3n un folio de shmem puede estar en la cach\u00e9 de p\u00e1gina o en la cach\u00e9 de intercambio, pero no al mismo tiempo. Es decir, una vez que est\u00e1 en la cach\u00e9 de intercambio, folio->mapping debe ser NULL y el folio ya no est\u00e1 en una asignaci\u00f3n de shmem. En __folio_migrate_mapping(), para determinar el n\u00famero de entradas de xarray a actualizar, se usa folio_test_swapbacked(), pero eso combina shmem en el caso de la cach\u00e9 de p\u00e1gina y shmem en el caso de la cach\u00e9 de intercambio. Lleva a la corrupci\u00f3n de entradas de m\u00faltiples \u00edndices de xarray, ya que convierte una entrada hermana en una entrada normal durante xas_store() (vea [1] para una reproducci\u00f3n del espacio de usuario). Arr\u00e9glelo usando solo folio_test_swapcache() para determinar si xarray est\u00e1 almacenando entradas de cach\u00e9 de intercambio o no para elegir el n\u00famero correcto de entradas de xarray para actualizar. [1] https://lore.kernel.org/linux-mm/Z8idPCkaJW1IChjT@casper.infradead.org/ Nota: En __split_huge_page(), se usan folio_test_anon() y folio_test_swapcache() para obtener el espacio de direcciones de la cach\u00e9 de intercambio, pero esto ignora el folio shmem en el caso de la cach\u00e9 de intercambio. Esto podr\u00eda provocar la desreferenciaci\u00f3n de punteros nulos cuando un folio shmem en la cach\u00e9 de intercambio se divide en __xa_store(), ya que !folio_test_anon() es verdadero y folio->mapping es nulo. Afortunadamente, su llamador, split_huge_page_to_list_to_order(), se detiene antes de tiempo con EBUSY cuando folio->mapping es nulo. Por lo tanto, no es necesario ocuparse de ello aqu\u00ed." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22016.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22016.json index 9b5da835b57..5829242aaa7 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22016.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22016.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22016", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-08T09:15:26.413", - "lastModified": "2025-04-08T09:15:26.413", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndpll: fix xa_alloc_cyclic() error handling\n\nIn case of returning 1 from xa_alloc_cyclic() (wrapping) ERR_PTR(1) will\nbe returned, which will cause IS_ERR() to be false. Which can lead to\ndereference not allocated pointer (pin).\n\nFix it by checking if err is lower than zero.\n\nThis wasn't found in real usecase, only noticed. Credit to Pierre." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dpll: correcci\u00f3n de la gesti\u00f3n de errores de xa_alloc_cyclic(). Si se devuelve 1 desde xa_alloc_cyclic() (encapsulamiento), se devolver\u00e1 ERR_PTR(1), lo que har\u00e1 que IS_ERR() sea falso. Esto puede provocar la desreferencia de un puntero no asignado (pin). Se corrige comprobando si err es menor que cero. Esto no se detect\u00f3 en un caso pr\u00e1ctico real, solo se detect\u00f3. Gracias a Pierre." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22017.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22017.json index 105f2782487..57bf1001967 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22017.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22017.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22017", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-08T09:15:26.557", - "lastModified": "2025-04-08T09:15:26.557", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndevlink: fix xa_alloc_cyclic() error handling\n\nIn case of returning 1 from xa_alloc_cyclic() (wrapping) ERR_PTR(1) will\nbe returned, which will cause IS_ERR() to be false. Which can lead to\ndereference not allocated pointer (rel).\n\nFix it by checking if err is lower than zero.\n\nThis wasn't found in real usecase, only noticed. Credit to Pierre." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: devlink: correcci\u00f3n de la gesti\u00f3n de errores de xa_alloc_cyclic(). Si se devuelve 1 desde xa_alloc_cyclic() (wrapping), se devolver\u00e1 ERR_PTR(1), lo que har\u00e1 que IS_ERR() sea falso. Esto puede provocar la desreferenciaci\u00f3n de un puntero no asignado (rel). Se corrige comprobando si err es menor que cero. Esto no se detect\u00f3 en un caso pr\u00e1ctico real, solo se detect\u00f3. Gracias a Pierre." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22458.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22458.json index a8c1483c94a..e03c97a764f 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22458.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22458.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22458", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-04-08T15:15:48.857", - "lastModified": "2025-04-08T15:15:48.857", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22459.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22459.json index f5963f1004f..9d3bf59e7c3 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22459.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22459.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22459", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-04-08T15:15:49.020", - "lastModified": "2025-04-08T15:15:49.020", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22461.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22461.json index e4d48a26d57..31b6a42300c 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22461.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22461.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22461", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-04-08T15:15:49.167", - "lastModified": "2025-04-08T15:15:49.167", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22464.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22464.json index 605368b937e..55e88b63d88 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22464.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22464.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22464", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-04-08T15:15:49.310", - "lastModified": "2025-04-08T15:15:49.310", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22465.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22465.json index f540bb6eacc..dbb8038102d 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22465.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22465.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22465", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-04-08T15:15:49.473", - "lastModified": "2025-04-08T15:15:49.473", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22466.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22466.json index d6859e4ed3f..9e10e3d9c13 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22466.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22466.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22466", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-04-08T15:15:49.620", - "lastModified": "2025-04-08T15:15:49.620", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22855.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22855.json index 92c9fd7a149..f9080331b03 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22855.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22855.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22855", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-04-08T14:15:32.690", - "lastModified": "2025-04-08T14:15:32.690", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2285.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2285.json index faa3d998c47..add1bc8591b 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2285.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2285.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2285", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2025-04-08T16:15:26.303", - "lastModified": "2025-04-08T16:15:26.303", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2286.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2286.json index 65757f24f31..1eda4869ec8 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2286.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2286.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2286", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2025-04-08T16:15:26.480", - "lastModified": "2025-04-08T16:15:26.480", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2287.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2287.json index 8396b0c22fc..c82e18c1dfa 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2287.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2287.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2287", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2025-04-08T16:15:26.620", - "lastModified": "2025-04-08T16:15:26.620", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2288.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2288.json index 412cf25109f..79eab88f3b8 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2288.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2288.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2288", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2025-04-08T16:15:26.750", - "lastModified": "2025-04-08T16:15:26.750", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2293.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2293.json index b618fef7cd7..7e427a0a9ca 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2293.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2293.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2293", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2025-04-08T16:15:26.887", - "lastModified": "2025-04-08T16:15:26.887", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23186.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23186.json index 3394b5af087..97db9499508 100644 --- a/CVE-2025/CVE-2025-231xx/CVE-2025-23186.json +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23186.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23186", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:15.133", - "lastModified": "2025-04-08T08:15:15.133", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24058.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24058.json new file mode 100644 index 00000000000..2417ad3a467 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24058.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24058", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:46.037", + "lastModified": "2025-04-08T18:15:46.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24058", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24060.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24060.json new file mode 100644 index 00000000000..a9b7b8b220f --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24060.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24060", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:46.193", + "lastModified": "2025-04-08T18:15:46.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24060", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24062.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24062.json new file mode 100644 index 00000000000..5860bdb55f0 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24062.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24062", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:46.353", + "lastModified": "2025-04-08T18:15:46.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24062", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24073.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24073.json new file mode 100644 index 00000000000..0ed5ab85ab5 --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24073.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24073", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:46.543", + "lastModified": "2025-04-08T18:15:46.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24073", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24074.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24074.json new file mode 100644 index 00000000000..baded92dd9a --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24074.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24074", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:46.740", + "lastModified": "2025-04-08T18:15:46.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24074", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25002.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25002.json new file mode 100644 index 00000000000..eb8e045048e --- /dev/null +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25002.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-25002", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:47.030", + "lastModified": "2025-04-08T18:15:47.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of sensitive information into log file in Azure Local Cluster allows an authorized attacker to disclose information over an adjacent network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25002", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25226.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25226.json index 904cd7346c1..67a8e4b1388 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25226.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25226.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25226", "sourceIdentifier": "security@joomla.org", "published": "2025-04-08T17:15:35.453", - "lastModified": "2025-04-08T17:15:35.453", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25227.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25227.json index d1080904dc1..70703a2c91a 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25227.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25227.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25227", "sourceIdentifier": "security@joomla.org", "published": "2025-04-08T17:15:35.610", - "lastModified": "2025-04-08T17:15:35.610", - "vulnStatus": "Received", + "lastModified": "2025-04-08T19:15:47.290", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,30 @@ "value": "Insufficient state checks lead to a vector that allows to bypass 2FA checks." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@joomla.org", diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25254.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25254.json index 5c1c73eaa1e..87ddce3356e 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25254.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25254.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25254", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-04-08T14:15:32.857", - "lastModified": "2025-04-08T14:15:32.857", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2519.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2519.json index cdb3008038e..87d7a86b90a 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2519.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2519.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2519", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T02:15:19.283", - "lastModified": "2025-04-08T02:15:19.283", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Sreamit theme for WordPress is vulnerable to arbitrary file downloads in all versions up to, and including, 4.0.1. This is due to insufficient file validation in the 'st_send_download_file' function. This makes it possible for authenticated attackers, with subscriber-level access and above, to download arbitrary files." + }, + { + "lang": "es", + "value": "El tema Sreamit para WordPress es vulnerable a la descarga de archivos arbitrarios en todas las versiones hasta la 4.0.1 incluida. Esto se debe a una validaci\u00f3n de archivos insuficiente en la funci\u00f3n 'st_send_download_file'. Esto permite que atacantes autenticados, con acceso de suscriptor o superior, descarguen archivos arbitrarios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2525.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2525.json index b5a6b6ca6fd..addb76ba28e 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2525.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2525.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2525", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T02:15:20.363", - "lastModified": "2025-04-08T02:15:20.363", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Streamit theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'st_Authentication_Controller::edit_profile' function in all versions up to, and including, 4.0.1. This makes it possible for authenticated attackers, with subscriber-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": "El tema Streamit para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n 'st_Authentication_Controller::edit_profile' en todas las versiones hasta la 4.0.1 incluida. Esto permite que atacantes autenticados, con permisos de suscriptor o superiores, carguen archivos arbitrarios en el servidor del sitio afectado, lo que podr\u00eda posibilitar la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2526.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2526.json index 12ebef5b5fd..24a0b4b5746 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2526.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2526.json @@ -2,13 +2,17 @@ "id": "CVE-2025-2526", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T02:15:20.523", - "lastModified": "2025-04-08T02:15:20.523", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Streamit theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like email in the 'st_Authentication_Controller::edit_profile' function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account." + }, + { + "lang": "es", + "value": "El tema Streamit para WordPress es vulnerable a la escalada de privilegios mediante robo de cuenta en todas las versiones hasta la 4.0.2 incluida. Esto se debe a que el complemento no valida correctamente la identidad del usuario antes de actualizar sus datos, como el correo electr\u00f3nico, en la funci\u00f3n 'st_Authentication_Controller::edit_profile'. Esto permite que atacantes no autenticados cambien las direcciones de correo electr\u00f3nico de usuarios arbitrarios, incluidos los administradores, y aprovechen esta situaci\u00f3n para restablecer la contrase\u00f1a del usuario y acceder a su cuenta." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2568.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2568.json index 1f6b31984ad..9470b6fa351 100644 --- a/CVE-2025/CVE-2025-25xx/CVE-2025-2568.json +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2568.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2568", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T12:15:15.760", - "lastModified": "2025-04-08T12:15:15.760", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26628.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26628.json new file mode 100644 index 00000000000..8f1b2403160 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26628.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26628", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:47.180", + "lastModified": "2025-04-08T18:15:47.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficiently protected credentials in Azure Local Cluster allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26628", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26635.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26635.json new file mode 100644 index 00000000000..256c50132e5 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26635.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26635", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:47.337", + "lastModified": "2025-04-08T18:15:47.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26637.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26637.json new file mode 100644 index 00000000000..42f30871f00 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26637.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26637", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:47.490", + "lastModified": "2025-04-08T18:15:47.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26637", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26639.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26639.json new file mode 100644 index 00000000000..4765644c5d6 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26639.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26639", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:47.657", + "lastModified": "2025-04-08T18:15:47.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Integer overflow or wraparound in Windows USB Print Driver allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + }, + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26639", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26640.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26640.json new file mode 100644 index 00000000000..38762ae59b1 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26640.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26640", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:47.817", + "lastModified": "2025-04-08T18:15:47.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26640", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26641.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26641.json new file mode 100644 index 00000000000..bc029338839 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26641.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26641", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:47.990", + "lastModified": "2025-04-08T18:15:47.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26641", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26642.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26642.json new file mode 100644 index 00000000000..a84bfc64ed7 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26642.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26642", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:48.160", + "lastModified": "2025-04-08T18:15:48.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26642", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26644.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26644.json new file mode 100644 index 00000000000..d12ad9975dc --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26644.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26644", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:48.347", + "lastModified": "2025-04-08T18:15:48.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1039" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26644", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26647.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26647.json new file mode 100644 index 00000000000..2ce40f1c639 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26647.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26647", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:48.510", + "lastModified": "2025-04-08T18:15:48.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26647", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26648.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26648.json new file mode 100644 index 00000000000..23fdca23fa4 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26648.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26648", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:48.667", + "lastModified": "2025-04-08T18:15:48.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + }, + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26648", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26649.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26649.json new file mode 100644 index 00000000000..cfe4369cccc --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26649.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26649", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:48.843", + "lastModified": "2025-04-08T18:15:48.843", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26649", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26651.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26651.json new file mode 100644 index 00000000000..cd48975f57c --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26651.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26651", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:49.007", + "lastModified": "2025-04-08T18:15:49.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-749" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26651", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26652.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26652.json new file mode 100644 index 00000000000..7a662967647 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26652.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26652", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:49.157", + "lastModified": "2025-04-08T18:15:49.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26652", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26653.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26653.json index 5c5621ed9b1..2acd1347138 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26653.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26653.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26653", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:15.710", - "lastModified": "2025-04-08T08:15:15.710", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26654.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26654.json index 1f4d37efd11..953c3340733 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26654.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26654.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26654", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:15.903", - "lastModified": "2025-04-08T08:15:15.903", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26657.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26657.json index f4c54ee7d32..804af8cc6e5 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26657.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26657.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26657", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:16.077", - "lastModified": "2025-04-08T08:15:16.077", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26663.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26663.json new file mode 100644 index 00000000000..b0116570053 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26663.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26663", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:49.337", + "lastModified": "2025-04-08T18:15:49.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26663", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26664.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26664.json new file mode 100644 index 00000000000..cc90c5c3857 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26664.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26664", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:49.510", + "lastModified": "2025-04-08T18:15:49.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26664", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26665.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26665.json new file mode 100644 index 00000000000..d5bfc1ca0bc --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26665.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26665", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:49.670", + "lastModified": "2025-04-08T18:15:49.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26665", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26666.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26666.json new file mode 100644 index 00000000000..2039e117466 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26666.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26666", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:49.833", + "lastModified": "2025-04-08T18:15:49.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26666", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26667.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26667.json new file mode 100644 index 00000000000..676217a26fa --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26667.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26667", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:50.000", + "lastModified": "2025-04-08T18:15:50.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26667", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json new file mode 100644 index 00000000000..4208c9d4a3c --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26668", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:50.160", + "lastModified": "2025-04-08T18:15:50.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26668", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json new file mode 100644 index 00000000000..0aa64f618ac --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26669", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:50.347", + "lastModified": "2025-04-08T18:15:50.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26669", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json new file mode 100644 index 00000000000..564df598f84 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26670", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:50.817", + "lastModified": "2025-04-08T18:15:50.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26670", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26671.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26671.json new file mode 100644 index 00000000000..e80905fec5e --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26671.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-26671", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:51.003", + "lastModified": "2025-04-08T18:15:51.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + }, + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26671", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json new file mode 100644 index 00000000000..3a9cd604092 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26672", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:51.177", + "lastModified": "2025-04-08T18:15:51.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26672", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26673.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26673.json new file mode 100644 index 00000000000..5684a9c5c0e --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26673.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26673", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:51.350", + "lastModified": "2025-04-08T18:15:51.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26673", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26674.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26674.json new file mode 100644 index 00000000000..82421be1287 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26674.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26674", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:51.553", + "lastModified": "2025-04-08T18:15:51.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26674", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26675.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26675.json new file mode 100644 index 00000000000..5aad4043ee1 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26675.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26675", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:51.757", + "lastModified": "2025-04-08T18:15:51.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26675", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26676.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26676.json new file mode 100644 index 00000000000..5f50a5cc349 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26676.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26676", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:52.023", + "lastModified": "2025-04-08T18:15:52.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26676", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26678.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26678.json new file mode 100644 index 00000000000..53ef95446b0 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26678.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26678", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:52.303", + "lastModified": "2025-04-08T18:15:52.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26678", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26679.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26679.json new file mode 100644 index 00000000000..e40a41e276e --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26679.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26679", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:52.463", + "lastModified": "2025-04-08T18:15:52.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26679", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26680.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26680.json new file mode 100644 index 00000000000..427fce82919 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26680.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26680", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:52.667", + "lastModified": "2025-04-08T18:15:52.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26680", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26681.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26681.json new file mode 100644 index 00000000000..47d4057ca80 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26681.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26681", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:52.863", + "lastModified": "2025-04-08T18:15:52.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26681", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26682.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26682.json new file mode 100644 index 00000000000..3be6d3cf16c --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26682.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26682", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:53.033", + "lastModified": "2025-04-08T18:15:53.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26682", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26686.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26686.json new file mode 100644 index 00000000000..d9db4ee0650 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26686.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26686", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:53.220", + "lastModified": "2025-04-08T18:15:53.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sensitive data storage in improperly locked memory in Windows TCP/IP allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26686", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26687.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26687.json new file mode 100644 index 00000000000..616849788c4 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26687.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26687", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:53.383", + "lastModified": "2025-04-08T18:15:53.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Win32K - GRFX allows an unauthorized attacker to elevate privileges over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26687", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26688.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26688.json new file mode 100644 index 00000000000..2a62b6e0eb8 --- /dev/null +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26688.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26688", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:53.550", + "lastModified": "2025-04-08T18:15:53.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Stack-based buffer overflow in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26688", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27078.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27078.json index e0d676c7e2b..d44fa656b45 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27078.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27078.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27078", "sourceIdentifier": "security-alert@hpe.com", "published": "2025-04-08T16:15:25.683", - "lastModified": "2025-04-08T17:15:35.767", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27079.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27079.json index fe700916aec..032d868d9a9 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27079.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27079.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27079", "sourceIdentifier": "security-alert@hpe.com", "published": "2025-04-08T16:15:25.837", - "lastModified": "2025-04-08T17:15:35.970", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27082.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27082.json index d524ee1121e..595450f071c 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27082.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27082.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27082", "sourceIdentifier": "security-alert@hpe.com", "published": "2025-04-08T17:15:36.233", - "lastModified": "2025-04-08T17:15:36.233", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27083.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27083.json index 44a9c2a3f44..8a23538c64e 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27083.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27083.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27083", "sourceIdentifier": "security-alert@hpe.com", "published": "2025-04-08T17:15:36.500", - "lastModified": "2025-04-08T17:15:36.500", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27084.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27084.json index 6ccadf4266d..c841ee38fef 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27084.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27084.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27084", "sourceIdentifier": "security-alert@hpe.com", "published": "2025-04-08T17:15:36.700", - "lastModified": "2025-04-08T17:15:36.700", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27085.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27085.json index ba140b886ea..64b5ca635f3 100644 --- a/CVE-2025/CVE-2025-270xx/CVE-2025-27085.json +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27085.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27085", "sourceIdentifier": "security-alert@hpe.com", "published": "2025-04-08T17:15:36.887", - "lastModified": "2025-04-08T17:15:36.887", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27182.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27182.json new file mode 100644 index 00000000000..90741d93645 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27182.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27182", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:53.740", + "lastModified": "2025-04-08T18:15:53.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb25-23.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27183.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27183.json new file mode 100644 index 00000000000..6ca3fea941b --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27183.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27183", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:53.937", + "lastModified": "2025-04-08T18:15:53.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb25-23.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27184.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27184.json new file mode 100644 index 00000000000..d606af6ad1c --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27184.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27184", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:54.090", + "lastModified": "2025-04-08T18:15:54.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb25-23.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27185.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27185.json new file mode 100644 index 00000000000..10975726325 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27185.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27185", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:54.233", + "lastModified": "2025-04-08T18:15:54.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb25-23.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27186.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27186.json new file mode 100644 index 00000000000..d0dc8b685a8 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27186.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27186", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:54.380", + "lastModified": "2025-04-08T18:15:54.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb25-23.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27187.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27187.json new file mode 100644 index 00000000000..52315eee018 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27187.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27187", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:54.540", + "lastModified": "2025-04-08T18:15:54.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb25-23.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27193.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27193.json new file mode 100644 index 00000000000..df7324a3161 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27193.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27193", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:54.687", + "lastModified": "2025-04-08T18:15:54.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Bridge versions 14.1.5, 15.0.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/bridge/apsb25-25.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27194.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27194.json new file mode 100644 index 00000000000..384138e27a4 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27194.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27194", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:54.853", + "lastModified": "2025-04-08T18:15:54.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Media Encoder versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/media-encoder/apsb25-24.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27195.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27195.json new file mode 100644 index 00000000000..56442e39c01 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27195.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27195", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:55.027", + "lastModified": "2025-04-08T18:15:55.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Media Encoder versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/media-encoder/apsb25-24.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27196.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27196.json new file mode 100644 index 00000000000..a43bb35ef44 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27196.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27196", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:55.170", + "lastModified": "2025-04-08T18:15:55.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Premiere Pro versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/premiere_pro/apsb25-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27198.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27198.json new file mode 100644 index 00000000000..7f3ec1c89ec --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27198.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27198", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:55.323", + "lastModified": "2025-04-08T18:15:55.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Photoshop Desktop versions 25.12.1, 26.4.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb25-30.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27199.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27199.json new file mode 100644 index 00000000000..6fd82da8522 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27199.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27199", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:55.477", + "lastModified": "2025-04-08T18:15:55.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Animate versions 24.0.7, 23.0.10 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/animate/apsb25-31.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27200.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27200.json new file mode 100644 index 00000000000..88387ccfdf2 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27200.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27200", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:55.630", + "lastModified": "2025-04-08T18:15:55.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Animate versions 24.0.7, 23.0.10 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/animate/apsb25-31.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27201.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27201.json new file mode 100644 index 00000000000..91807983829 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27201.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27201", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:55.787", + "lastModified": "2025-04-08T18:15:55.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/animate/apsb25-31.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27202.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27202.json new file mode 100644 index 00000000000..d138580ac07 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27202.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27202", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:55.960", + "lastModified": "2025-04-08T18:15:55.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/animate/apsb25-31.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27204.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27204.json new file mode 100644 index 00000000000..c5cf0ba6bd7 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27204.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27204", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:56.130", + "lastModified": "2025-04-08T18:15:56.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb25-23.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27205.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27205.json new file mode 100644 index 00000000000..457ad7c31a2 --- /dev/null +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27205.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27205", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T18:15:56.290", + "lastModified": "2025-04-08T18:15:56.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager Screens versions FP11.3 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Exploitation of this issue requires user interaction in that a victim must open a malicious link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/aem-screens/apsb25-32.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27428.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27428.json index ed5787f37f5..1db1cb25e86 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27428.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27428.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27428", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:16.230", - "lastModified": "2025-04-08T08:15:16.230", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27429.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27429.json index c308af923c3..be9d2f07f7f 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27429.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27429.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27429", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:16.397", - "lastModified": "2025-04-08T08:15:16.397", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27435.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27435.json index 3747ffd67e5..0b55b023e28 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27435.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27435.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27435", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:16.550", - "lastModified": "2025-04-08T08:15:16.550", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27437.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27437.json index e6d9bf58fae..dbce2398bf7 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27437.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27437.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27437", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:16.697", - "lastModified": "2025-04-08T08:15:16.697", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27441.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27441.json index 029577a6f8c..c6ee7a7c705 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27441.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27441.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27441", "sourceIdentifier": "security@zoom.us", "published": "2025-04-08T17:15:37.080", - "lastModified": "2025-04-08T17:15:37.080", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27442.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27442.json index 981412c735c..bdd9adcaea9 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27442.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27442.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27442", "sourceIdentifier": "security@zoom.us", "published": "2025-04-08T17:15:37.487", - "lastModified": "2025-04-08T17:15:37.487", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27443.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27443.json index 1df71ba1eaf..cc933369ccb 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27443.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27443.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27443", "sourceIdentifier": "security@zoom.us", "published": "2025-04-08T17:15:38.113", - "lastModified": "2025-04-08T17:15:38.113", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27467.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27467.json new file mode 100644 index 00000000000..6c638e680a0 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27467.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27467", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:56.453", + "lastModified": "2025-04-08T18:15:56.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27467", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27469.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27469.json new file mode 100644 index 00000000000..244c668d61c --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27469.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27469", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:56.613", + "lastModified": "2025-04-08T18:15:56.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27469", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27470.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27470.json new file mode 100644 index 00000000000..2f2261ed5ae --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27470.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27470", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:56.797", + "lastModified": "2025-04-08T18:15:56.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27470", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27471.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27471.json new file mode 100644 index 00000000000..99483f5b95f --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27471.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27471", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:56.970", + "lastModified": "2025-04-08T18:15:56.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sensitive data storage in improperly locked memory in Microsoft Streaming Service allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27471", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27472.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27472.json new file mode 100644 index 00000000000..deec57dc285 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27472.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27472", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:57.140", + "lastModified": "2025-04-08T18:15:57.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27472", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27473.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27473.json new file mode 100644 index 00000000000..3305fbf238f --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27473.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27473", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:57.290", + "lastModified": "2025-04-08T18:15:57.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27473", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27474.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27474.json new file mode 100644 index 00000000000..9191dc42dfb --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27474.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27474", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:57.457", + "lastModified": "2025-04-08T18:15:57.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27474", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27475.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27475.json new file mode 100644 index 00000000000..6457aa18b74 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27475.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27475", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:57.620", + "lastModified": "2025-04-08T18:15:57.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sensitive data storage in improperly locked memory in Windows Update Stack allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27475", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27476.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27476.json new file mode 100644 index 00000000000..ef0c7e4da4f --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27476.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27476", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:57.777", + "lastModified": "2025-04-08T18:15:57.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27476", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27477.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27477.json new file mode 100644 index 00000000000..bdf21b4e976 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27477.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27477", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:57.947", + "lastModified": "2025-04-08T18:15:57.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27477", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27478.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27478.json new file mode 100644 index 00000000000..20539a1332a --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27478.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27478", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:58.120", + "lastModified": "2025-04-08T18:15:58.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27478", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27479.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27479.json new file mode 100644 index 00000000000..25985f0924f --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27479.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27479", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:58.287", + "lastModified": "2025-04-08T18:15:58.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient resource pool in Windows Kerberos allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-410" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27479", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27480.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27480.json new file mode 100644 index 00000000000..64bf630a86a --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27480.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27480", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:58.447", + "lastModified": "2025-04-08T18:15:58.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27480", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27481.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27481.json new file mode 100644 index 00000000000..e78442629be --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27481.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27481", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:58.610", + "lastModified": "2025-04-08T18:15:58.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27481", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27482.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27482.json new file mode 100644 index 00000000000..a188f0d1b6d --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27482.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27482", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:58.773", + "lastModified": "2025-04-08T18:15:58.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27482", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27483.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27483.json new file mode 100644 index 00000000000..58dec8ac147 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27483.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27483", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:58.943", + "lastModified": "2025-04-08T18:15:58.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27483", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27484.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27484.json new file mode 100644 index 00000000000..2856d833771 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27484.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27484", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:59.130", + "lastModified": "2025-04-08T18:15:59.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27484", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27485.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27485.json new file mode 100644 index 00000000000..25278ebd85c --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27485.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27485", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:59.300", + "lastModified": "2025-04-08T18:15:59.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27485", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27486.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27486.json new file mode 100644 index 00000000000..8b3b44e8562 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27486.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27486", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:59.450", + "lastModified": "2025-04-08T18:15:59.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27486", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27487.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27487.json new file mode 100644 index 00000000000..5352d5dd5b3 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27487.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27487", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:59.620", + "lastModified": "2025-04-08T18:15:59.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27487", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27489.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27489.json new file mode 100644 index 00000000000..4fb0f979ab0 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27489.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27489", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:59.787", + "lastModified": "2025-04-08T18:15:59.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27489", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27490.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27490.json new file mode 100644 index 00000000000..624d9d07927 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27490.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27490", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:15:59.953", + "lastModified": "2025-04-08T18:15:59.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + }, + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27490", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json new file mode 100644 index 00000000000..2ad629ec2e7 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27491", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:00.140", + "lastModified": "2025-04-08T18:16:00.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Hyper-V allows an authorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27491", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27492.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27492.json new file mode 100644 index 00000000000..59df64b53a0 --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27492.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27492", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:00.313", + "lastModified": "2025-04-08T18:16:00.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27492", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json new file mode 100644 index 00000000000..6088f56dc4f --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27727", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:00.477", + "lastModified": "2025-04-08T18:16:00.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27728.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27728.json new file mode 100644 index 00000000000..e11ba42956d --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27728.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27728", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:00.653", + "lastModified": "2025-04-08T18:16:00.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27728", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27729.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27729.json new file mode 100644 index 00000000000..2b32a907b12 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27729.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27729", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:00.813", + "lastModified": "2025-04-08T18:16:00.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Shell allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27729", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27730.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27730.json new file mode 100644 index 00000000000..43a5d6337c8 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27730.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27730", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:00.990", + "lastModified": "2025-04-08T18:16:00.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27730", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27731.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27731.json new file mode 100644 index 00000000000..6ea290f1f56 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27731.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27731", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:01.163", + "lastModified": "2025-04-08T18:16:01.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in OpenSSH for Windows allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27731", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json new file mode 100644 index 00000000000..2f41f4e6b62 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27732", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:01.333", + "lastModified": "2025-04-08T18:16:01.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27733.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27733.json new file mode 100644 index 00000000000..1811359af12 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27733.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27733", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:01.517", + "lastModified": "2025-04-08T18:16:01.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27733", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27735.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27735.json new file mode 100644 index 00000000000..cced3784f34 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27735.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27735", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:01.697", + "lastModified": "2025-04-08T18:16:01.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient verification of data authenticity in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27735", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27736.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27736.json new file mode 100644 index 00000000000..dd182135ccc --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27736.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27736", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:01.913", + "lastModified": "2025-04-08T18:16:01.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of sensitive information to an unauthorized actor in Windows Power Dependency Coordinator allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27736", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27737.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27737.json new file mode 100644 index 00000000000..cdb80489c66 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27737.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27737", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:02.097", + "lastModified": "2025-04-08T18:16:02.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Windows Security Zone Mapping allows an unauthorized attacker to bypass a security feature locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27737", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27738.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27738.json new file mode 100644 index 00000000000..484372de1ae --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27738.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27738", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:02.280", + "lastModified": "2025-04-08T18:16:02.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27738", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27739.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27739.json new file mode 100644 index 00000000000..4dcf2dac482 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27739.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27739", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:02.470", + "lastModified": "2025-04-08T18:16:02.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27739", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27740.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27740.json new file mode 100644 index 00000000000..5a4078e2acc --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27740.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27740", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:02.653", + "lastModified": "2025-04-08T18:16:02.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Weak authentication in Windows Active Directory Certificate Services allows an authorized attacker to elevate privileges over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27740", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27741.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27741.json new file mode 100644 index 00000000000..8471e71b3e8 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27741.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27741", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:02.833", + "lastModified": "2025-04-08T18:16:02.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27741", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27742.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27742.json new file mode 100644 index 00000000000..2ce50b3c81f --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27742.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27742", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:03.040", + "lastModified": "2025-04-08T18:16:03.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27742", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27743.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27743.json new file mode 100644 index 00000000000..a048d8fee51 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27743.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27743", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:03.260", + "lastModified": "2025-04-08T18:16:03.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Untrusted search path in System Center allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27743", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27744.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27744.json new file mode 100644 index 00000000000..2374884031d --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27744.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27744", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:03.497", + "lastModified": "2025-04-08T18:16:03.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Microsoft Office allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27744", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27745.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27745.json new file mode 100644 index 00000000000..606851ece7a --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27745.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27745", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:03.670", + "lastModified": "2025-04-08T18:16:03.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27745", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27746.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27746.json new file mode 100644 index 00000000000..881be9af9ca --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27746.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27746", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:03.877", + "lastModified": "2025-04-08T18:16:03.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27746", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27747.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27747.json new file mode 100644 index 00000000000..e14d5e9c176 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27747.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27747", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:04.047", + "lastModified": "2025-04-08T18:16:04.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27747", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27748.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27748.json new file mode 100644 index 00000000000..c624f97916e --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27748.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27748", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:04.213", + "lastModified": "2025-04-08T18:16:04.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27748", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27749.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27749.json new file mode 100644 index 00000000000..55788ee63ac --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27749.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27749", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:04.370", + "lastModified": "2025-04-08T18:16:04.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27749", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27750.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27750.json new file mode 100644 index 00000000000..ae37e57dd34 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27750.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27750", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:04.520", + "lastModified": "2025-04-08T18:16:04.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27750", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27751.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27751.json new file mode 100644 index 00000000000..6b7c0d8bee6 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27751.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27751", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:04.680", + "lastModified": "2025-04-08T18:16:04.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27751", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27752.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27752.json new file mode 100644 index 00000000000..1618ea701e6 --- /dev/null +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27752.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27752", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:04.840", + "lastModified": "2025-04-08T18:16:04.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27752", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28400.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28400.json index 262ffcc7f98..da3a07df71c 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28400.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28400.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28400", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:24.137", - "lastModified": "2025-04-07T19:15:55.330", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the postID parameter in the edit method" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del par\u00e1metro postID en el m\u00e9todo de edici\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28401.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28401.json index 41b85af6bb7..5a3c0b915f5 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28401.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28401.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28401", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:24.270", - "lastModified": "2025-04-07T19:15:55.480", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the menuId parameter" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del par\u00e1metro menuId" } ], "metrics": { diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28402.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28402.json index cc65f935838..4f1f37dfec7 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28402.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28402.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28402", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:24.383", - "lastModified": "2025-04-07T16:15:24.383", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the jobId parameter" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del par\u00e1metro jobId" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28403.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28403.json index b279aa83fc6..b766cf06c10 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28403.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28403.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28403", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:24.493", - "lastModified": "2025-04-07T16:15:24.493", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the editSave method does not properly validate whether the requesting user has administrative privileges before allowing modifications to system configuration settings" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo editSave y no valida correctamente si el usuario solicitante tiene privilegios administrativos antes de permitir modificaciones en la configuraci\u00f3n del sistema." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28405.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28405.json index b57ccfa175d..73fc8b08cb5 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28405.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28405.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28405", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:24.603", - "lastModified": "2025-04-07T16:15:24.603", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the changeStatus method" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo changeStatus" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28406.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28406.json index 23fd013c1ea..25e3589d8da 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28406.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28406.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28406", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:24.710", - "lastModified": "2025-04-07T16:15:24.710", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the jobLogId parameter" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del par\u00e1metro jobLogId" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28407.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28407.json index af86f17de19..e86c0b7a228 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28407.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28407.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28407", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:24.827", - "lastModified": "2025-04-07T16:15:24.827", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the edit method of the /edit/{dictId} endpoint does not properly validate whether the requesting user has permission to modify the specified dictId" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo de edici\u00f3n del endpoint /edit/{dictId} y no valida correctamente si el usuario solicitante tiene permiso para modificar el dictId especificado." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28408.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28408.json index e7908c0e965..8652cbc547f 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28408.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28408.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28408", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:24.947", - "lastModified": "2025-04-07T16:15:24.947", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the selectDeptTree method of the /selectDeptTree/{deptId} endpoint does not properly validate the deptId parameter" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo selectDeptTree del endpoint /selectDeptTree/{deptId} no valida correctamente el par\u00e1metro deptId" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28409.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28409.json index cc014a7c529..964b37181bb 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28409.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28409.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28409", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:25.057", - "lastModified": "2025-04-07T16:15:25.057", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the add method of the /add/{parentId} endpoint does not properly validate whether the requesting user has permission to add a menu item under the specified parentId" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo add del endpoint /add/{parentId} y no valida correctamente si el usuario solicitante tiene permiso para agregar un elemento del men\u00fa bajo el parentId especificado." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28410.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28410.json index 6d66a22d196..16bccd83737 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28410.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28410.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28410", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:25.170", - "lastModified": "2025-04-07T16:15:25.170", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the cancelAuthUserAll method does not properly validate whether the requesting user has administrative privileges" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo cancelAuthUserAll y no valida correctamente si el usuario solicitante tiene privilegios administrativos." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28411.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28411.json index 74af7ae6498..2a5a3c6fa38 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28411.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28411.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28411", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:25.300", - "lastModified": "2025-04-07T16:15:25.300", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the editSave method in /tool/gen/editSave" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo editSave en /tool/gen/editSave" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28412.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28412.json index 9da1f3aa8ad..178fd698443 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28412.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28412.json @@ -2,13 +2,17 @@ "id": "CVE-2025-28412", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:25.433", - "lastModified": "2025-04-07T16:15:25.433", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the /editSave method in SysNoticeController" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo /editSave en SysNoticeController" } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28413.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28413.json index 8af8d2c2d8c..9320297dc60 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28413.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28413.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28413", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:25.543", - "lastModified": "2025-04-08T16:15:25.983", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2807.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2807.json index 337fff0a377..90635f2793c 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2807.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2807.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2807", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T10:15:16.780", - "lastModified": "2025-04-08T10:15:16.780", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2808.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2808.json index 7dff861486a..d897447e3d2 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2808.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2808.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2808", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T10:15:18.940", - "lastModified": "2025-04-08T10:15:18.940", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2829.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2829.json index d6354fe6c25..f23330daf52 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2829.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2829.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2829", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2025-04-08T16:15:27.133", - "lastModified": "2025-04-08T16:15:27.133", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2876.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2876.json index 2a64ea9f4e0..e6c346d9552 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2876.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2876.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2876", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T12:15:16.820", - "lastModified": "2025-04-08T12:15:16.820", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2882.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2882.json index 72b67a1ffaf..fcbb0747a14 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2882.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2882.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2882", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T08:15:16.860", - "lastModified": "2025-04-08T08:15:16.860", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2883.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2883.json index cc143a57601..7719b2d8246 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2883.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2883.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2883", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T10:15:19.197", - "lastModified": "2025-04-08T10:15:19.197", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json index 6096cbed6df..2cb78c964c9 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29087", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T20:15:20.253", - "lastModified": "2025-04-08T14:15:33.240", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29322.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29322.json index 9aaf9b13e96..694ac6aec3a 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29322.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29322.json @@ -2,7 +2,7 @@ "id": "CVE-2025-29322", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-26T19:15:27.510", - "lastModified": "2025-03-27T16:45:27.850", + "lastModified": "2025-04-08T19:15:48.650", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) en ScriptCase anterior a v1.0.003 - Build 3 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulada en el \"Nombre de conexi\u00f3n\" en las p\u00e1ginas Nueva Conexi\u00f3n y Cambiar Nombre de Conexi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/simalamuel/Research/tree/main/CVE-2025-29322", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29478.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29478.json index 265c531cc7c..1833cf46502 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29478.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29478.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29478", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T20:15:20.373", - "lastModified": "2025-04-08T14:15:33.417", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29479.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29479.json index 66394112790..6177c4033f2 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29479.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29479.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29479", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T20:15:20.490", - "lastModified": "2025-04-07T20:15:20.490", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow in hiredis 1.2.0 allows a local attacker to cause a denial of service via the sdscatlen function." + }, + { + "lang": "es", + "value": "El desbordamiento de b\u00fafer en hiredis 1.2.0 permite que un atacante local provoque una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n sdscatlen." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29480.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29480.json index 192a95e5b00..c06b23cbad9 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29480.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29480.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29480", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T20:15:20.607", - "lastModified": "2025-04-08T14:15:33.590", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29481.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29481.json index 96d05f75d46..c07135ac58d 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29481.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29481.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29481", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T20:15:20.720", - "lastModified": "2025-04-07T20:15:20.720", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in libbpf 1.5.0 allows a local attacker to execute arbitrary code via the bpf_object__init_prog` function of libbpf." + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer en libbpf 1.5.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n bpf_object__init_prog` de libbpf." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29482.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29482.json index 74c91a4d967..648cbb96860 100644 --- a/CVE-2025/CVE-2025-294xx/CVE-2025-29482.json +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29482.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29482", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T20:15:20.847", - "lastModified": "2025-04-07T20:15:20.847", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in libheif 1.19.7 allows a local attacker to execute arbitrary code via the SAO (Sample Adaptive Offset) processing of libde265." + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer en libheif 1.19.7 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del procesamiento SAO (Sample Adaptive Offset) de libde265." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-295xx/CVE-2025-29594.json b/CVE-2025/CVE-2025-295xx/CVE-2025-29594.json index f0eb4b4bc19..5ae1160fac2 100644 --- a/CVE-2025/CVE-2025-295xx/CVE-2025-29594.json +++ b/CVE-2025/CVE-2025-295xx/CVE-2025-29594.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29594", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T20:15:20.963", - "lastModified": "2025-04-08T14:15:33.767", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29769.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29769.json index bc146267958..b81d4b0a8bb 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29769.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29769.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29769", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T20:15:21.090", - "lastModified": "2025-04-07T20:15:21.090", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "libvips is a demand-driven, horizontally threaded image processing library. The heifsave operation could incorrectly determine the presence of an alpha channel in an input when it was not possible to determine the colour interpretation, known internally within libvips as \"multiband\". There aren't many ways to create a \"multiband\" input, but it is possible with a well-crafted TIFF image. If a \"multiband\" TIFF input image had 4 channels and HEIF-based output was requested, this led to libvips creating a 3 channel HEIF image without an alpha channel but then attempting to write 4 channels of data. This caused a heap buffer overflow, which could crash the process. This vulnerability is fixed in 8.16.1." + }, + { + "lang": "es", + "value": "libvips es una librer\u00eda de procesamiento de im\u00e1genes basada en demanda y con subprocesos horizontales. La operaci\u00f3n heifsave pod\u00eda determinar incorrectamente la presencia de un canal alfa en una entrada cuando no era posible determinar la interpretaci\u00f3n del color, lo que se conoce internamente en libvips como \"multibanda\". No existen muchas maneras de crear una entrada \"multibanda\", pero es posible con una imagen TIFF bien manipulada. Si una imagen de entrada TIFF \"multibanda\" ten\u00eda 4 canales y se solicitaba una salida basada en HEIF, libvips creaba una imagen HEIF de 3 canales sin canal alfa, pero luego intentaba escribir 4 canales de datos. Esto provocaba un desbordamiento del b\u00fafer de pila, lo que pod\u00eda bloquear el proceso. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 8.16.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29791.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29791.json new file mode 100644 index 00000000000..7caaa851e81 --- /dev/null +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29791.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29791", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:05.003", + "lastModified": "2025-04-08T18:16:05.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29791", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29792.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29792.json new file mode 100644 index 00000000000..b0cd5c61b80 --- /dev/null +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29792.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29792", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:05.160", + "lastModified": "2025-04-08T18:16:05.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29792", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29793.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29793.json new file mode 100644 index 00000000000..aedf81ed694 --- /dev/null +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29793.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29793", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:05.320", + "lastModified": "2025-04-08T18:16:05.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29793", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29794.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29794.json new file mode 100644 index 00000000000..326937dd966 --- /dev/null +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29794.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29794", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:05.467", + "lastModified": "2025-04-08T18:16:05.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29794", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29800.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29800.json new file mode 100644 index 00000000000..5152ce78642 --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29800.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29800", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:05.680", + "lastModified": "2025-04-08T18:16:05.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper privilege management in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29800", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29801.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29801.json new file mode 100644 index 00000000000..0b953dfbd9f --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29801.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29801", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:05.840", + "lastModified": "2025-04-08T18:16:05.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29801", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29802.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29802.json new file mode 100644 index 00000000000..42f1d3e4df9 --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29802.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29802", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:06.017", + "lastModified": "2025-04-08T18:16:06.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29802", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29804.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29804.json new file mode 100644 index 00000000000..15deb0859af --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29804.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29804", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:06.180", + "lastModified": "2025-04-08T18:16:06.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29804", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29805.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29805.json new file mode 100644 index 00000000000..e6e7a53cdb2 --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29805.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29805", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:06.330", + "lastModified": "2025-04-08T18:16:06.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of sensitive information to an unauthorized actor in Outlook for Android allows an unauthorized attacker to disclose information over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29805", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29808.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29808.json new file mode 100644 index 00000000000..717f8ee7f29 --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29808.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29808", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:06.483", + "lastModified": "2025-04-08T18:16:06.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1240" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29808", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29809.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29809.json new file mode 100644 index 00000000000..fecc96eaa89 --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29809.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29809", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:06.633", + "lastModified": "2025-04-08T18:16:06.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29809", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29810.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29810.json new file mode 100644 index 00000000000..48a89da1782 --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29810.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29810", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:06.797", + "lastModified": "2025-04-08T18:16:06.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29810", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29811.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29811.json new file mode 100644 index 00000000000..9b5531a1052 --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29811.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-29811", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:06.977", + "lastModified": "2025-04-08T18:16:06.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Windows Mobile Broadband allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-122" + }, + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29811", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29812.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29812.json new file mode 100644 index 00000000000..4332b04187f --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29812.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29812", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:07.160", + "lastModified": "2025-04-08T18:16:07.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Untrusted pointer dereference in Windows Kernel Memory allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29812", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29816.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29816.json new file mode 100644 index 00000000000..558719caa62 --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29816.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29816", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:07.370", + "lastModified": "2025-04-08T18:16:07.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Microsoft Office Word allows an unauthorized attacker to bypass a security feature over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-349" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29816", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29819.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29819.json new file mode 100644 index 00000000000..a6b02e95dbb --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29819.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29819", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:07.520", + "lastModified": "2025-04-08T18:16:07.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "External control of file name or path in Azure Portal Windows Admin Center allows an unauthorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29819", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29820.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29820.json new file mode 100644 index 00000000000..4387f0f46f6 --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29820.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29820", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:07.683", + "lastModified": "2025-04-08T18:16:07.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29820", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29821.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29821.json new file mode 100644 index 00000000000..3ca78ef568a --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29821.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29821", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:07.867", + "lastModified": "2025-04-08T18:16:07.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29821", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29822.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29822.json new file mode 100644 index 00000000000..945fb4c8d2c --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29822.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29822", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:08.023", + "lastModified": "2025-04-08T18:16:08.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-184" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29822", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29823.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29823.json new file mode 100644 index 00000000000..d525ebab22e --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29823.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29823", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:08.190", + "lastModified": "2025-04-08T18:16:08.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29823", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29824.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29824.json new file mode 100644 index 00000000000..7f7e38eee02 --- /dev/null +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29824.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-29824", + "sourceIdentifier": "secure@microsoft.com", + "published": "2025-04-08T18:16:08.340", + "lastModified": "2025-04-08T18:16:08.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29985.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29985.json index 0f39d4b4bea..82fe91c0562 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29985.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29985.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29985", "sourceIdentifier": "security_alert@emc.com", "published": "2025-04-08T11:15:42.707", - "lastModified": "2025-04-08T11:15:42.707", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29986.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29986.json index 60e6f9e6465..ee96235c0fe 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29986.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29986.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29986", "sourceIdentifier": "security_alert@emc.com", "published": "2025-04-08T11:15:44.033", - "lastModified": "2025-04-08T11:15:44.033", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29999.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29999.json index 91ea9dd8ce4..7a859a2fcb6 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29999.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29999.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29999", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:27.053", - "lastModified": "2025-04-08T09:15:27.053", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affected application searches for executable files in the application folder without proper validation.\r\nThis could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Siemens License Server (SLS) (todas las versiones anteriores a la V4.3). La aplicaci\u00f3n afectada busca archivos ejecutables en la carpeta de la aplicaci\u00f3n sin la validaci\u00f3n adecuada. Esto podr\u00eda permitir que un atacante ejecute c\u00f3digo arbitrario con privilegios administrativos colocando un ejecutable malicioso en el mismo directorio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30000.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30000.json index f729c8a38df..91d8f4c2ca3 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30000.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30000.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30000", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:27.340", - "lastModified": "2025-04-08T09:15:27.340", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affected application does not properly restrict permissions of the users. This could allow a lowly-privileged attacker to escalate their privileges." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Siemens License Server (SLS) (todas las versiones anteriores a la V4.3). La aplicaci\u00f3n afectada no restringe correctamente los permisos de los usuarios. Esto podr\u00eda permitir que un atacante con pocos privilegios aumente sus privilegios." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30013.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30013.json index d6664b29f09..4f4eeaab5c6 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30013.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30013.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30013", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:17.023", - "lastModified": "2025-04-08T08:15:17.023", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30014.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30014.json index 472df372365..697694ef5ac 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30014.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30014.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30014", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:17.177", - "lastModified": "2025-04-08T08:15:17.177", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30015.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30015.json index 5c75e83f925..f4da775de15 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30015.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30015.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30015", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:17.340", - "lastModified": "2025-04-08T08:15:17.340", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30016.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30016.json index 5bc56a7db98..203575cb0ce 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30016.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30016.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30016", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:17.493", - "lastModified": "2025-04-08T08:15:17.493", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30017.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30017.json index 4caa53d9954..7065811ef53 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30017.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30017.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30017", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:17.650", - "lastModified": "2025-04-08T08:15:17.650", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30150.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30150.json index ce98788976c..c37f399ed15 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30150.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30150.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30150", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T14:15:34.540", - "lastModified": "2025-04-08T14:15:34.540", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30151.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30151.json index 0b94c2bb311..be733b0b6be 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30151.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30151.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30151", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T14:15:34.737", - "lastModified": "2025-04-08T14:15:34.737", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30166.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30166.json index f189bd6b44a..f6655e35611 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30166.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30166.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30166", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T11:15:44.267", - "lastModified": "2025-04-08T11:15:44.267", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30280.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30280.json index d7cd7a839a4..db098a1e948 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30280.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30280.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30280", "sourceIdentifier": "productcert@siemens.com", "published": "2025-04-08T09:15:27.793", - "lastModified": "2025-04-08T09:15:27.793", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.21.0), Mendix Runtime V10.12 (All versions), Mendix Runtime V10.18 (All versions), Mendix Runtime V10.6 (All versions), Mendix Runtime V8 (All versions), Mendix Runtime V9 (All versions < V9.24.34). Affected applications allow for entity enumeration due to distinguishable responses in certain client actions. This could allow an unauthenticated remote attacker to list all valid entities and attribute names of a Mendix Runtime-based application." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Mendix Runtime V10 (todas las versiones anteriores a la V10.21.0), Mendix Runtime V10.12 (todas las versiones), Mendix Runtime V10.18 (todas las versiones), Mendix Runtime V10.6 (todas las versiones), Mendix Runtime V8 (todas las versiones) y Mendix Runtime V9 (todas las versiones anteriores a la V9.24.34). Las aplicaciones afectadas permiten la enumeraci\u00f3n de entidades debido a respuestas distinguibles en ciertas acciones del cliente. Esto podr\u00eda permitir que un atacante remoto no autenticado liste todas las entidades y nombres de atributos v\u00e1lidos de una aplicaci\u00f3n basada en Mendix Runtime." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30295.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30295.json new file mode 100644 index 00000000000..14b5841cdfc --- /dev/null +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30295.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30295", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:49.453", + "lastModified": "2025-04-08T19:15:49.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-33.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30296.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30296.json new file mode 100644 index 00000000000..7d61eded99c --- /dev/null +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30296.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30296", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:49.613", + "lastModified": "2025-04-08T19:15:49.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-33.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30297.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30297.json new file mode 100644 index 00000000000..eece67742ba --- /dev/null +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30297.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30297", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:49.770", + "lastModified": "2025-04-08T19:15:49.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-33.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30298.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30298.json new file mode 100644 index 00000000000..152ce776e9c --- /dev/null +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30298.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30298", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:49.923", + "lastModified": "2025-04-08T19:15:49.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-33.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30299.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30299.json new file mode 100644 index 00000000000..1060e30f483 --- /dev/null +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30299.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30299", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:50.083", + "lastModified": "2025-04-08T19:15:50.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-33.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30300.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30300.json new file mode 100644 index 00000000000..e88a2229a09 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30300.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30300", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:50.240", + "lastModified": "2025-04-08T19:15:50.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-33.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30301.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30301.json new file mode 100644 index 00000000000..807dc06b9d2 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30301.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30301", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:50.390", + "lastModified": "2025-04-08T19:15:50.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-33.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30302.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30302.json new file mode 100644 index 00000000000..451b90be98c --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30302.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30302", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:50.537", + "lastModified": "2025-04-08T19:15:50.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-33.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30303.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30303.json new file mode 100644 index 00000000000..eb31dd86a05 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30303.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30303", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:50.693", + "lastModified": "2025-04-08T19:15:50.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-33.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30304.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30304.json new file mode 100644 index 00000000000..8f8d9e1b50d --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30304.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30304", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:50.863", + "lastModified": "2025-04-08T19:15:50.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/framemaker/apsb25-33.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30305.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30305.json new file mode 100644 index 00000000000..1875c00a5c6 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30305.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30305", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:51.027", + "lastModified": "2025-04-08T19:15:51.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/xmpcore/apsb25-34.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30306.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30306.json new file mode 100644 index 00000000000..02ee648c0b0 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30306.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30306", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:51.197", + "lastModified": "2025-04-08T19:15:51.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/xmpcore/apsb25-34.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30307.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30307.json new file mode 100644 index 00000000000..aa264d3e015 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30307.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30307", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:51.353", + "lastModified": "2025-04-08T19:15:51.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/xmpcore/apsb25-34.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30308.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30308.json new file mode 100644 index 00000000000..5721d63916a --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30308.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30308", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:51.513", + "lastModified": "2025-04-08T19:15:51.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/xmpcore/apsb25-34.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30309.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30309.json new file mode 100644 index 00000000000..04cd01e64b6 --- /dev/null +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30309.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30309", + "sourceIdentifier": "psirt@adobe.com", + "published": "2025-04-08T19:15:51.670", + "lastModified": "2025-04-08T19:15:51.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/xmpcore/apsb25-34.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30373.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30373.json index 059ebf89fca..ac8aa4a337f 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30373.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30373.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30373", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T15:15:43.887", - "lastModified": "2025-04-07T15:15:43.887", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Graylog is a free and open log management platform. Starting with 6.1, HTTP Inputs can be configured to check if a specified header is present and has a specified value to authenticate HTTP-based ingestion. Unfortunately, even though in cases of a missing header or a wrong value the correct HTTP response (401) is returned, the message will be ingested nonetheless. To mitigate the vulnerability, disable http-based inputs and allow only authenticated pull-based inputs. This vulnerability is fixed in 6.1.9." + }, + { + "lang": "es", + "value": "Graylog es una plataforma de gesti\u00f3n de registros gratuita y abierta. A partir de la versi\u00f3n 6.1, las entradas HTTP se pueden configurar para comprobar si un encabezado espec\u00edfico est\u00e1 presente y tiene un valor espec\u00edfico para autenticar la ingesta basada en HTTP. Desafortunadamente, aunque en caso de que falte un encabezado o se muestre un valor incorrecto, se devuelve la respuesta HTTP correcta (401), el mensaje se ingiere de todas formas. Para mitigar esta vulnerabilidad, deshabilite las entradas basadas en HTTP y permita solo las entradas autenticadas basadas en pull. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 6.1.9." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30670.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30670.json index a7a13710eea..b99f5fae892 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30670.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30670.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30670", "sourceIdentifier": "security@zoom.us", "published": "2025-04-08T17:15:38.413", - "lastModified": "2025-04-08T17:15:38.413", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30671.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30671.json index 86ffc8d9c5e..4d75f83c6dd 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30671.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30671.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30671", "sourceIdentifier": "security@zoom.us", "published": "2025-04-08T17:15:38.607", - "lastModified": "2025-04-08T17:15:38.607", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3064.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3064.json index 3cdcb7b60ff..4fbf146b0a0 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3064.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3064.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3064", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T09:15:28.140", - "lastModified": "2025-04-08T09:15:28.140", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPFront User Role Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.1. This is due to missing or incorrect nonce validation on the whitelist_options() function. This makes it possible for unauthenticated attackers to update the default role option that can be leveraged for privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This is only exploitable on multisite instances." + }, + { + "lang": "es", + "value": "El complemento WPFront User Role Editor para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.2.1 incluida. Esto se debe a la falta o a una validaci\u00f3n incorrecta de nonce en la funci\u00f3n whitelist_options(). Esto permite que atacantes no autenticados actualicen la opci\u00f3n de rol predeterminada, lo que puede utilizarse para la escalada de privilegios mediante una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. Esto solo es explotable en instancias multisitio." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31138.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31138.json index 06137efd887..d5eecdb3ae9 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31138.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31138.json @@ -2,13 +2,17 @@ "id": "CVE-2025-31138", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T15:15:44.047", - "lastModified": "2025-04-07T15:15:44.047", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "tarteaucitron.js is a compliant and accessible cookie banner. A vulnerability was identified in tarteaucitron.js prior to 1.20.1, where user-controlled inputs for element dimensions (width and height) were not properly validated. This allowed an attacker with direct access to the site's source code or a CMS plugin to set values like 100%;height:100%;position:fixed;, potentially covering the entire viewport and facilitating clickjacking attacks. An attacker with high privileges could exploit this vulnerability to overlay malicious UI elements on top of legitimate content, trick users into interacting with hidden elements (clickjacking), or disrupt the intended functionality and accessibility of the website. This vulnerability is fixed in 1.20.1." + }, + { + "lang": "es", + "value": "tarteaucitron.js es un banner de cookies compatible y accesible. Se identific\u00f3 una vulnerabilidad en tarteaucitron.js antes de la versi\u00f3n 1.20.1, donde las entradas controladas por el usuario para las dimensiones de los elementos (ancho y alto) no se validaban correctamente. Esto permit\u00eda a un atacante con acceso directo al c\u00f3digo fuente del sitio o a un complemento de CMS establecer valores como 100%;height:100%;position:fixed;, lo que podr\u00eda cubrir toda la ventana gr\u00e1fica y facilitar ataques de clickjacking. Un atacante con privilegios elevados podr\u00eda explotar esta vulnerabilidad para superponer elementos maliciosos de la interfaz de usuario sobre contenido leg\u00edtimo, enga\u00f1ar a los usuarios para que interact\u00faen con elementos ocultos (clickjacking) o interrumpir la funcionalidad y la accesibilidad previstas del sitio web. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.20.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31330.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31330.json index 4d1e084dce4..955eb45d565 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31330.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31330.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31330", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:17.800", - "lastModified": "2025-04-08T08:15:17.800", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31331.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31331.json index 45626b0cd79..b6426466801 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31331.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31331.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31331", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:17.977", - "lastModified": "2025-04-08T08:15:17.977", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31332.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31332.json index 033781a5ae8..30da5ec7fa0 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31332.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31332.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31332", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:18.130", - "lastModified": "2025-04-08T08:15:18.130", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31333.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31333.json index 93df938bda5..54c01ca27a3 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31333.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31333.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31333", "sourceIdentifier": "cna@sap.com", "published": "2025-04-08T08:15:18.287", - "lastModified": "2025-04-08T08:15:18.287", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31475.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31475.json index d4f2cbc887c..31a20b47ac3 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31475.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31475.json @@ -2,13 +2,17 @@ "id": "CVE-2025-31475", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T15:15:44.220", - "lastModified": "2025-04-07T15:15:44.220", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "tarteaucitron.js is a compliant and accessible cookie banner. A vulnerability was identified in tarteaucitron.js prior to 1.20.1, where the addOrUpdate function, used for applying custom texts, did not properly validate input. This allowed an attacker with direct access to the site's source code or a CMS plugin to manipulate JavaScript object prototypes, leading to potential security risks such as data corruption or unintended code execution. An attacker with high privileges could exploit this vulnerability to modify object prototypes, affecting core JavaScript behavior, cause application crashes or unexpected behavior, or potentially introduce further security vulnerabilities depending on the application's architecture. This vulnerability is fixed in 1.20.1." + }, + { + "lang": "es", + "value": "tarteaucitron.js es un banner de cookies compatible y accesible. Se identific\u00f3 una vulnerabilidad en tarteaucitron.js antes de la versi\u00f3n 1.20.1, donde la funci\u00f3n addOrUpdate, utilizada para aplicar textos personalizados, no validaba correctamente la entrada. Esto permit\u00eda a un atacante con acceso directo al c\u00f3digo fuente del sitio o a un complemento de CMS manipular prototipos de objetos JavaScript, lo que conllevaba posibles riesgos de seguridad, como corrupci\u00f3n de datos o ejecuci\u00f3n de c\u00f3digo no intencionada. Un atacante con privilegios elevados podr\u00eda explotar esta vulnerabilidad para modificar prototipos de objetos, lo que afectar\u00eda el comportamiento principal de JavaScript, provocar\u00eda fallos en la aplicaci\u00f3n o comportamientos inesperados, o incluso introducir\u00eda vulnerabilidades de seguridad adicionales seg\u00fan la arquitectura de la aplicaci\u00f3n. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.20.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31476.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31476.json index 49d9bb751b7..73fb1f41614 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31476.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31476.json @@ -2,13 +2,17 @@ "id": "CVE-2025-31476", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T15:15:44.370", - "lastModified": "2025-04-07T15:15:44.370", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "tarteaucitron.js is a compliant and accessible cookie banner. A vulnerability was identified in tarteaucitron.js, allowing a user with high privileges (access to the site's source code or a CMS plugin) to enter a URL containing an insecure scheme such as javascript:alert(). Before the fix, URL validation was insufficient, which could allow arbitrary JavaScript execution if a user clicked on a malicious link. An attacker with high privileges could insert a link exploiting an insecure URL scheme, leading to execution of arbitrary JavaScript code, theft of sensitive data through phishing attacks, or modification of the user interface behavior. This vulnerability is fixed in 1.20.1." + }, + { + "lang": "es", + "value": "tarteaucitron.js es un banner de cookies compatible y accesible. Se identific\u00f3 una vulnerabilidad en tarteaucitron.js que permit\u00eda a un usuario con privilegios elevados (acceso al c\u00f3digo fuente del sitio o a un complemento de CMS) introducir una URL con un esquema inseguro como javascript:alert(). Antes de la correcci\u00f3n, la validaci\u00f3n de URL era insuficiente, lo que pod\u00eda permitir la ejecuci\u00f3n arbitraria de JavaScript si un usuario hac\u00eda clic en un enlace malicioso. Un atacante con privilegios elevados podr\u00eda insertar un enlace aprovechando un esquema de URL inseguro, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario, el robo de datos confidenciales mediante ataques de phishing o la modificaci\u00f3n del comportamiento de la interfaz de usuario. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.20.1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31496.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31496.json index a353063b827..5ccc512153c 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31496.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31496.json @@ -2,13 +2,17 @@ "id": "CVE-2025-31496", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T21:15:42.720", - "lastModified": "2025-04-07T21:15:42.720", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "apollo-compiler is a query-based compiler for the GraphQL query language. Prior to 1.27.0, a vulnerability in Apollo Compiler allowed queries with deeply nested and reused named fragments to be prohibitively expensive to validate. Named fragments were being processed once per fragment spread in some cases during query validation, leading to exponential resource usage when deeply nested and reused fragments were involved. This could lead to excessive resource consumption and denial of service in applications. This vulnerability is fixed in 1.27.0." + }, + { + "lang": "es", + "value": "apollo-compiler es un compilador basado en consultas para el lenguaje de consulta GraphQL. Antes de la versi\u00f3n 1.27.0, una vulnerabilidad en Apollo Compiler hac\u00eda que la validaci\u00f3n de consultas con fragmentos con nombre profundamente anidados y reutilizados fuera extremadamente costosa. En algunos casos, los fragmentos con nombre se procesaban una vez por fragmento distribuido durante la validaci\u00f3n de consultas, lo que provocaba un consumo exponencial de recursos al usar fragmentos profundamente anidados y reutilizados. Esto pod\u00eda provocar un consumo excesivo de recursos y denegaci\u00f3n de servicio en las aplicaciones. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 1.27.0." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31498.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31498.json index 858c406b9a7..65f276ea0b3 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31498.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31498.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31498", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T14:15:35.293", - "lastModified": "2025-04-08T15:15:50.310", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3166.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3166.json index 66e4ee99e6d..704170ef4b0 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3166.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3166.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3166", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T17:15:31.150", - "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:54:38.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:product_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "59492FC6-2874-4DFB-87C9-C1D257B28267" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/zzzxc643/cve_Product-Management-System/blob/main/cve.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303112", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303112", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.542668", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/zzzxc643/cve_Product-Management-System/blob/main/cve.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3177.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3177.json index 54b87b4d54e..9e06b1310a7 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3177.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3177.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3177", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T20:15:27.507", - "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T19:40:08.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,78 @@ "value": "CWE-321" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fastcms_project:fastcms:0.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "52080321-4FB5-4168-97FD-8810BD97623B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/chujianxin0101/vuln/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.303136", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303136", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.543673", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/chujianxin0101/vuln/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3178.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3178.json index a769081e9c0..95e71828369 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3178.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3178.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3178", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T21:15:42.000", - "lastModified": "2025-04-07T19:15:57.020", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:48:19.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,78 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:doctor_appointment_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6EA10EEC-D351-4E8D-A527-FA6886E8FB5B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/12", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.303137", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303137", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.543838", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/p1026/CVE/issues/12", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3179.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3179.json index b9507b9becd..f16a70bb851 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3179.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3179.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3179", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T21:15:42.183", - "lastModified": "2025-04-07T19:15:57.153", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:38:52.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,78 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:doctor_appointment_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6EA10EEC-D351-4E8D-A527-FA6886E8FB5B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/13", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.303138", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303138", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.543839", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/p1026/CVE/issues/13", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3180.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3180.json index aab5c222bba..11d5d8ba9be 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3180.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3180.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3180", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T21:15:42.370", - "lastModified": "2025-04-07T19:15:57.290", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:09:20.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,78 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:doctor_appointment_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6EA10EEC-D351-4E8D-A527-FA6886E8FB5B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/14", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.303139", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303139", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.543840", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/p1026/CVE/issues/14", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3187.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3187.json index 431dd2ad14b..c827cd03f39 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3187.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3187.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3187", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-04T01:15:40.197", - "lastModified": "2025-04-07T14:18:15.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:03:15.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:e-diary_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F19D617A-8930-45B8-AC0B-9449AFBB7AFD" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/TiggerT/MyCVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.303146", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303146", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.544098", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/TiggerT/MyCVE/issues/1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3188.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3188.json index 08b73a1e39d..72b13e68cfe 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3188.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3188.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3188", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-04T01:15:40.407", - "lastModified": "2025-04-07T14:18:15.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:01:35.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:e-diary_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F19D617A-8930-45B8-AC0B-9449AFBB7AFD" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/TiggerT/MyCVE/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.303147", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303147", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.544110", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/TiggerT/MyCVE/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32013.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32013.json index b532fbb8118..2b71714b28a 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32013.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32013.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32013", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-06T20:15:15.217", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:54:07.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -73,14 +95,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lnbits:lnbits:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.12.12", + "matchCriteriaId": "B6044020-AF79-4714-A42C-6ADC9B8B61BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lnbits/lnbits/security/advisories/GHSA-qp8j-p87f-c8cc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/lnbits/lnbits/security/advisories/GHSA-qp8j-p87f-c8cc", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32014.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32014.json index d8293a33e9c..c0abe59d9d0 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32014.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32014.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32014", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T15:15:44.593", - "lastModified": "2025-04-07T15:15:44.593", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "estree-util-value-to-estree converts a JavaScript value to an ESTree expression. When generating an ESTree from a value with a property named __proto__, valueToEstree would generate an object that specifies a prototype instead. This vulnerability is fixed in 3.3.3." + }, + { + "lang": "es", + "value": "estree-util-value-to-estree convierte un valor de JavaScript en una expresi\u00f3n ESTree. Al generar un ESTree a partir de un valor con una propiedad llamada __proto__, valueToEstree generaba un objeto que especificaba un prototipo. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 3.3.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32017.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32017.json index a4839ed135c..41bd1a88a57 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32017.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32017.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32017", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T16:15:27.320", - "lastModified": "2025-04-08T16:15:27.320", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32018.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32018.json index ee5c729392c..7ee5cd6daad 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32018.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32018.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32018", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T16:15:27.487", - "lastModified": "2025-04-08T16:15:27.487", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32020.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32020.json index d83a124bf69..a724936e951 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32020.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32020.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32020", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T15:15:50.430", - "lastModified": "2025-04-08T15:15:50.430", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32024.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32024.json index 77bd8a38f1c..edd1f8ed2c1 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32024.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32024.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32024", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T16:15:27.703", - "lastModified": "2025-04-08T16:15:27.703", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32025.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32025.json index f86553f40fa..e1a23296b4b 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32025.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32025.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32025", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T16:15:27.873", - "lastModified": "2025-04-08T16:15:27.873", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32026.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32026.json index 1d4fa0040f0..5dac6d5e62b 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32026.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32026.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32026", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T16:15:28.023", - "lastModified": "2025-04-08T16:15:28.023", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32028.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32028.json index d602fa1f598..be8152acab0 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32028.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32028.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32028", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T16:15:28.180", - "lastModified": "2025-04-08T16:15:28.180", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32029.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32029.json index 71bc362d8e9..46d51d7e0eb 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32029.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32029.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32029", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T21:15:42.880", - "lastModified": "2025-04-07T21:15:42.880", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ts-asn1-der is a collection of utility classes to encode ASN.1 data following DER rule. Incorrect number DER encoding can lead to denial on service for absolute values in the range 2**31 -- 2**32 - 1. The arithmetic in the numBitLen didn't take into account that values in this range could result in a negative result upon applying the >> operator, leading to an infinite loop. The issue is patched in version 1.0.4. If upgrading is not an option, the issue can be mitigated by validating inputs to Asn1Integer to ensure that they are not smaller than -2**31 + 1 and no larger than 2**31 - 1." + }, + { + "lang": "es", + "value": "ts-asn1-der es una colecci\u00f3n de clases de utilidad para codificar datos ASN.1 seg\u00fan la regla DER. Una codificaci\u00f3n DER incorrecta de n\u00fameros puede provocar la denegaci\u00f3n de servicio para valores absolutos en el rango 2**31 - 2**32 - 1. La aritm\u00e9tica de numBitLen no tuvo en cuenta que los valores en este rango podr\u00edan generar un resultado negativo al aplicar el operador >>, lo que genera un bucle infinito. El problema se solucion\u00f3 en la versi\u00f3n 1.0.4. Si no es posible actualizar, el problema se puede mitigar validando las entradas de Asn1Integer para garantizar que no sean menores que -2**31 + 1 ni mayores que 2**31 - 1." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32030.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32030.json index 82cb8796093..9dcb6f967e3 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32030.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32030.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32030", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T21:15:43.037", - "lastModified": "2025-04-07T21:15:43.037", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically during named fragment expansion. Named fragments were being expanded once per fragment spread during query planning, leading to exponential resource usage when deeply nested and reused fragments were involved. This could lead to excessive resource consumption and denial of service. This has been remediated in @apollo/gateway version 2.10.1." + }, + { + "lang": "es", + "value": "Apollo Gateway proporciona utilidades para combinar m\u00faltiples microservicios GraphQL en un \u00fanico endpoint GraphQL. Antes de la versi\u00f3n 2.10.1, una vulnerabilidad en Apollo Gateway hac\u00eda que las consultas con fragmentos con nombre profundamente anidados y reutilizados fueran excesivamente costosas de planificar, especialmente durante la expansi\u00f3n de fragmentos con nombre. Los fragmentos con nombre se expand\u00edan una vez por cada fragmento extendido durante la planificaci\u00f3n, lo que provocaba un uso exponencial de recursos al involucrar fragmentos profundamente anidados y reutilizados. Esto pod\u00eda provocar un consumo excesivo de recursos y denegaci\u00f3n de servicio. Esto se ha solucionado en la versi\u00f3n 2.10.1 de @apollo/gateway." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32031.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32031.json index 5ad63c36443..728a0677acf 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32031.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32031.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32031", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T21:15:43.220", - "lastModified": "2025-04-07T21:15:43.220", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apollo Gateway provides utilities for combining multiple GraphQL microservices into a single GraphQL endpoint. Prior to 2.10.1, a vulnerability in Apollo Gateway allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically due to internal optimizations being frequently bypassed. The query planner includes an optimization that significantly speeds up planning for applicable GraphQL selections. However, queries with deeply nested and reused named fragments can generate many selections where this optimization does not apply, leading to significantly longer planning times. Because the query planner does not enforce a timeout, a small number of such queries can render gateway inoperable. This could lead to excessive resource consumption and denial of service. This has been remediated in @apollo/gateway version 2.10.1." + }, + { + "lang": "es", + "value": "Apollo Gateway proporciona utilidades para combinar m\u00faltiples microservicios GraphQL en un \u00fanico endpoint GraphQL. Antes de la versi\u00f3n 2.10.1, una vulnerabilidad en Apollo Gateway hac\u00eda que la planificaci\u00f3n de consultas con fragmentos con nombre profundamente anidados y reutilizados fuera excesivamente costosa, especialmente debido a que las optimizaciones internas se omit\u00edan con frecuencia. El planificador de consultas incluye una optimizaci\u00f3n que acelera significativamente la planificaci\u00f3n de las selecciones GraphQL aplicables. Sin embargo, las consultas con fragmentos con nombre profundamente anidados y reutilizados pueden generar muchas selecciones donde esta optimizaci\u00f3n no aplica, lo que resulta en tiempos de planificaci\u00f3n significativamente m\u00e1s largos. Dado que el planificador de consultas no impone un tiempo de espera, un peque\u00f1o n\u00famero de estas consultas puede inutilizar la puerta de enlace. Esto podr\u00eda provocar un consumo excesivo de recursos y una denegaci\u00f3n de servicio. Esto se ha solucionado en la versi\u00f3n 2.10.1 de @apollo/gateway." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32032.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32032.json index 161846efbd3..2c1efb29be7 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32032.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32032.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32032", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T21:15:43.363", - "lastModified": "2025-04-07T21:15:43.363", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. A vulnerability in Apollo Router allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically due to internal optimizations being frequently bypassed. The query planner includes an optimization that significantly speeds up planning for applicable GraphQL selections. However, queries with deeply nested and reused named fragments can generate many selections where this optimization does not apply, leading to significantly longer planning times. Because the query planner does not enforce a timeout, a small number of such queries can exhaust router's thread pool, rendering it inoperable. This could lead to excessive resource consumption and denial of service. This has been remediated in apollo-router versions 1.61.2 and 2.1.1." + }, + { + "lang": "es", + "value": "Apollo Router Core es un enrutador de grafos configurable y de alto rendimiento, escrito en Rust para ejecutar un supergrafo federado que utiliza Apollo Federation 2. Una vulnerabilidad en Apollo Router hac\u00eda que la planificaci\u00f3n de consultas con fragmentos con nombre profundamente anidados y reutilizados fuera prohibitivamente costosa, especialmente debido a que las optimizaciones internas se omit\u00edan con frecuencia. El planificador de consultas incluye una optimizaci\u00f3n que acelera significativamente la planificaci\u00f3n de las selecciones GraphQL aplicables. Sin embargo, las consultas con fragmentos con nombre profundamente anidados y reutilizados pueden generar muchas selecciones donde esta optimizaci\u00f3n no aplica, lo que resulta en tiempos de planificaci\u00f3n significativamente m\u00e1s largos. Dado que el planificador de consultas no impone un tiempo de espera, un peque\u00f1o n\u00famero de estas consultas puede agotar el grupo de subprocesos del enrutador, dej\u00e1ndolo inoperativo. Esto podr\u00eda provocar un consumo excesivo de recursos y denegaci\u00f3n de servicio. Esto se ha solucionado en las versiones 1.61.2 y 2.1.1 de apollo-router." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32033.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32033.json index 72426b7038b..5144c7ab292 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32033.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32033.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32033", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T21:15:43.527", - "lastModified": "2025-04-07T21:15:43.527", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Prior to 1.61.2 and 2.1.1, the operation limits plugin uses unsigned 32-bit integers to track limit counters (e.g. for a query's height). If a counter exceeded the maximum value for this data type (4,294,967,295), it wrapped around to 0, unintentionally allowing queries to bypass configured thresholds. This could occur for large queries if the payload limit were sufficiently increased, but could also occur for small queries with deeply nested and reused named fragments. This has been remediated in apollo-router versions 1.61.2 and 2.1.1." + }, + { + "lang": "es", + "value": "Apollo Router Core es un enrutador de gr\u00e1ficos configurable y de alto rendimiento, escrito en Rust, para ejecutar un supergrafo federado que utiliza Apollo Federation 2. Antes de las versiones 1.61.2 y 2.1.1, el complemento de los l\u00edmites de operaci\u00f3n utilizaba enteros de 32 bits sin signo para controlar los contadores de los l\u00edmites (por ejemplo, la altura de una consulta). Si un contador superaba el valor m\u00e1ximo para este tipo de dato (4 294 967 295), se reiniciaba a 0, lo que permit\u00eda involuntariamente que las consultas superaran los umbrales configurados. Esto pod\u00eda ocurrir en consultas grandes si el l\u00edmite de payload se aumentaba lo suficiente, pero tambi\u00e9n en consultas peque\u00f1as con fragmentos con nombre profundamente anidados y reutilizados. Esto se ha solucionado en las versiones 1.61.2 y 2.1.1 de apollo-router." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32034.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32034.json index 6c5b918e309..5b9e793ecd0 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32034.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32034.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32034", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-07T21:15:43.690", - "lastModified": "2025-04-07T21:15:43.690", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Apollo Router Core is a configurable, high-performance graph router written in Rust to run a federated supergraph that uses Apollo Federation 2. Prior to 1.61.2 and 2.1.1, a vulnerability in Apollo Router allowed queries with deeply nested and reused named fragments to be prohibitively expensive to query plan, specifically during named fragment expansion. Named fragments were being expanded once per fragment spread during query planning, leading to exponential resource usage when deeply nested and reused fragments were involved. This could lead to excessive resource consumption and denial of service. This has been remediated in apollo-router versions 1.61.2 and 2.1.1." + }, + { + "lang": "es", + "value": "Apollo Router Core es un enrutador de grafos configurable y de alto rendimiento, escrito en Rust, para ejecutar un supergrafo federado que utiliza Apollo Federation 2. Antes de las versiones 1.61.2 y 2.1.1, una vulnerabilidad en el Apollo Router hac\u00eda que las consultas con fragmentos con nombre profundamente anidados y reutilizados fueran excesivamente costosas de planificar, especialmente durante la expansi\u00f3n de fragmentos con nombre. Los fragmentos con nombre se expand\u00edan una vez por cada fragmento propagado durante la planificaci\u00f3n de la consulta, lo que provocaba un uso exponencial de recursos al involucrar fragmentos profundamente anidados y reutilizados. Esto pod\u00eda provocar un consumo excesivo de recursos y denegaci\u00f3n de servicio. Esto se ha solucionado en las versiones 1.61.2 y 2.1.1 de apollo-router." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32035.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32035.json new file mode 100644 index 00000000000..11f5d7a9a37 --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32035.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32035", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-08T18:16:08.597", + "lastModified": "2025-04-08T18:16:08.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 9.13.2, when uploading files (e.g. when uploading assets), the file extension is checked to see if it's an allowed file type but the actual contents of the file aren't checked. This means that it's possible to e.g. upload an executable file renamed to be a .jpg. This file could then be executed by another security vulnerability. This vulnerability is fixed in 9.13.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.6, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-351" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dnnsoftware/Dnn.Platform/commit/a5c13c3836cfbde374dc19dac032cd51af41050a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-8q89-mqw7-9pp7", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32036.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32036.json new file mode 100644 index 00000000000..8dd2a833859 --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32036.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32036", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-08T18:16:08.750", + "lastModified": "2025-04-08T18:16:08.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. The algorithm used to generate the captcha image shows the least complexity of the desired image. For this reason, the created image can be easily read by OCR tools, and the intruder can send automatic requests by building a robot and using this tool. This vulnerability is fixed in 9.13.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-804" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dnnsoftware/Dnn.Platform/commit/abda726e75f1938c8d89795b5dceb80dc4e2e6c5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-48q9-3p26-8595", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32117.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32117.json index 272cf3dc736..b2adf129bc3 100644 --- a/CVE-2025/CVE-2025-321xx/CVE-2025-32117.json +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32117.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32117", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-08T17:15:38.837", - "lastModified": "2025-04-08T17:15:38.837", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32164.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32164.json index af41915e25b..4b12dfb0543 100644 --- a/CVE-2025/CVE-2025-321xx/CVE-2025-32164.json +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32164.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32164", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-08T17:15:39.143", - "lastModified": "2025-04-08T17:15:39.143", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32211.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32211.json index fd2c8aa8453..56c01c61228 100644 --- a/CVE-2025/CVE-2025-322xx/CVE-2025-32211.json +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32211.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32211", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-08T17:15:39.407", - "lastModified": "2025-04-08T17:15:39.407", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32279.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32279.json index 9689fbd4ca0..1e4232002e3 100644 --- a/CVE-2025/CVE-2025-322xx/CVE-2025-32279.json +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32279.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32279", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-08T17:15:39.600", - "lastModified": "2025-04-08T17:15:39.600", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32370.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32370.json index 5324645f907..3f9467df352 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32370.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32370.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32370", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-06T07:15:40.970", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:54:51.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,20 +69,59 @@ "value": "CWE-912" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kentico:xperience:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.178", + "matchCriteriaId": "98D609C3-307D-4D49-9AAB-0AA4750FD786" + } + ] + } + ] } ], "references": [ { "url": "https://devnet.kentico.com/download/hotfixes", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32406.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32406.json index 21d6db5b114..59075ac1d69 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32406.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32406.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32406", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-08T15:15:50.677", - "lastModified": "2025-04-08T15:15:50.677", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:16:08.917", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -18,20 +18,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", - "baseScore": 5.8, - "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 8.6, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", - "confidentialityImpact": "LOW", + "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, - "impactScore": 1.4 + "impactScore": 4.0 } ] }, diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32409.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32409.json index 4f17db5ab55..7ce8cb463f9 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32409.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32409.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32409", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T22:15:16.963", - "lastModified": "2025-04-08T16:15:28.547", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32413.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32413.json index 8f4530510b2..678c87005a7 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32413.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32413.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32413", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-08T03:15:14.723", - "lastModified": "2025-04-08T03:15:14.723", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability-Lookup before 2.7.1 allows stored XSS via a user bio in website/web/views/user.py." + }, + { + "lang": "es", + "value": "Vulnerability-Lookup anterior a 2.7.1 permite XSS almacenado a trav\u00e9s de una biograf\u00eda de usuario en website/web/views/user.py." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32414.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32414.json index e69bdf9a306..d9bfad62ff8 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32414.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32414.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32414", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-08T03:15:15.940", - "lastModified": "2025-04-08T03:15:15.940", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters." + }, + { + "lang": "es", + "value": "En libxml2 anterior a la versi\u00f3n 2.13.8 y 2.14.x anterior a la versi\u00f3n 2.14.2, se pueden producir accesos a memoria fuera de los l\u00edmites en la API de Python (enlaces de Python) debido a un valor de retorno incorrecto. Esto ocurre en xmlPythonFileRead y xmlPythonFileReadRaw debido a una diferencia entre bytes y caracteres." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3248.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3248.json index d4828bcf064..af291931c1c 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3248.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3248.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3248", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2025-04-07T15:15:44.897", - "lastModified": "2025-04-07T15:15:44.897", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Langflow versions prior to 1.3.0 are susceptible to code injection in \nthe /api/v1/validate/code endpoint. A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary\ncode." + }, + { + "lang": "es", + "value": "Las versiones de Langflow anteriores a la 1.3.0 son susceptibles a la inyecci\u00f3n de c\u00f3digo en el endpoint /api/v1/validate/code. Un atacante remoto no autenticado puede enviar solicitudes HTTP manipuladas para ejecutar c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3285.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3285.json index 15f421c43a4..669374b270c 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3285.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3285.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3285", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2025-04-08T16:15:28.690", - "lastModified": "2025-04-08T16:15:28.690", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3286.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3286.json index 3dc8fbd6b1b..b7c9870948f 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3286.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3286.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3286", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2025-04-08T16:15:28.840", - "lastModified": "2025-04-08T16:15:28.840", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3287.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3287.json index 8258200f561..7ab452588ed 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3287.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3287.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3287", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2025-04-08T16:15:28.980", - "lastModified": "2025-04-08T16:15:28.980", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3288.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3288.json index 7c25c4f7dac..faec77e6cf2 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3288.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3288.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3288", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2025-04-08T16:15:29.120", - "lastModified": "2025-04-08T16:15:29.120", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3289.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3289.json index c4678ac576c..465a08dac04 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3289.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3289.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3289", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2025-04-08T16:15:29.253", - "lastModified": "2025-04-08T16:15:29.253", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3318.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3318.json index 2aa6a7ffcc7..800bb9926a0 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3318.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3318.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3318", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-06T14:15:35.690", - "lastModified": "2025-04-07T15:15:45.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:54:37.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,24 +122,67 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kennifrog:company_financial_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F3135F75-A1C3-4703-BEB5-B0B1DB738B63" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/Kenj_Frog/company-financial-management/issues/IBM6D9", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.303517", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303517", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://gitee.com/Kenj_Frog/company-financial-management/issues/IBM6D9", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3325.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3325.json index c141f3e4075..382c2881bfc 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3325.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3325.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3325", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-06T23:15:39.640", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:53:43.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,28 +122,73 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iteaj:iboot:1.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "737E9372-347B-433F-8CAD-2673BBA2B25E" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/uglory-gll/javasec/blob/main/iboot.md#1logical-loopholes", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.303537", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303537", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551869", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/uglory-gll/javasec/blob/main/iboot.md#1logical-loopholes", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3326.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3326.json index 952389cd818..7f82312690e 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3326.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3326.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3326", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T00:15:14.603", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:53:35.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,26 +124,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iteaj:iboot:1.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "737E9372-347B-433F-8CAD-2673BBA2B25E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/uglory-gll/javasec/blob/main/iboot.md#2file-upload", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.303538", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303538", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551870", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/uglory-gll/javasec/blob/main/iboot.md#2file-upload", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3327.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3327.json index f9d577d98dd..ceda3affe43 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3327.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3327.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3327", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T01:15:42.750", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:53:26.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,73 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iteaj:iboot:1.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "737E9372-347B-433F-8CAD-2673BBA2B25E" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/uglory-gll/javasec/blob/main/iboot.md#22commonuploadbatch-arbitrary-file-upload", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.303539", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303539", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551871", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/uglory-gll/javasec/blob/main/iboot.md#22commonuploadbatch-arbitrary-file-upload", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3329.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3329.json index 385036e20cc..f641b2ad507 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3329.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3329.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3329", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T01:15:43.157", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T18:55:02.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,32 +122,83 @@ "value": "CWE-319" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:consumer:comanda_mobile:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.7.1.4", + "versionEndIncluding": "15.0.0.8", + "matchCriteriaId": "EAFE1190-6079-4C69-A1E4-914880CBC8C5" + } + ] + } + ] } ], "references": [ { "url": "https://medium.com/@davimouar/from-order-to-exploit-a-deep-dive-into-restaurant-network-security-64aeaf3a6f64", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.303543", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303543", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551790", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://medium.com/@davimouar/from-order-to-exploit-a-deep-dive-into-restaurant-network-security-64aeaf3a6f64", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?submit.551790", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3361.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3361.json index cb1215c5a50..4e088cedad3 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3361.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3361.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3361", "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-04-08T02:15:20.737", - "lastModified": "2025-04-08T02:15:20.737", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server." + }, + { + "lang": "es", + "value": "El servicio web iSherlock de HGiga tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo, que permite a atacantes remotos no autenticados inyectar comandos arbitrarios del sistema operativo y ejecutarlos en el servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3362.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3362.json index 4e082306a1b..c63a4784c58 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3362.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3362.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3362", "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-04-08T02:15:20.913", - "lastModified": "2025-04-08T02:15:20.913", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server." + }, + { + "lang": "es", + "value": "El servicio web iSherlock de HGiga tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo, que permite a atacantes remotos no autenticados inyectar comandos arbitrarios del sistema operativo y ejecutarlos en el servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3363.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3363.json index 881e4744729..92b56974828 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3363.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3363.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3363", "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-04-08T02:15:21.077", - "lastModified": "2025-04-08T02:15:21.077", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web service of iSherlock from HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server." + }, + { + "lang": "es", + "value": "El servicio web iSherlock de HGiga tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo, que permite a atacantes remotos no autenticados inyectar comandos arbitrarios del sistema operativo y ejecutarlos en el servidor." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3364.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3364.json index 2202faa9a50..755325d5a5b 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3364.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3364.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3364", "sourceIdentifier": "twcert@cert.org.tw", "published": "2025-04-08T03:15:16.107", - "lastModified": "2025-04-08T06:15:44.690", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SSH service of PowerStation from HGiga has a Chroot Escape vulnerability, allowing attackers with root privileges to bypass chroot restrictions and access the entire file system." + }, + { + "lang": "es", + "value": "El servicio SSH de PowerStation de HGiga tiene una vulnerabilidad de escape de chroot, que permite a los atacantes con privilegios de root eludir las restricciones de chroot y acceder a todo el sistema de archivos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3371.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3371.json index 978513fa8fa..15c26cf4633 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3371.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3371.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3371", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T15:15:46.097", - "lastModified": "2025-04-07T15:15:46.097", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. This issue affects some unknown processing of the component DELETE Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PCMan FTP Server 2.0.7. Este problema afecta a un procesamiento desconocido del componente DELETE Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque podr\u00eda iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3372.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3372.json index 6a6eb74e419..960997a355a 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3372.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3372.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3372", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T15:15:46.300", - "lastModified": "2025-04-07T15:15:46.300", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in PCMan FTP Server 2.0.7. Affected is an unknown function of the component MKDIR Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PCMan FTP Server 2.0.7. Se ve afectada una funci\u00f3n desconocida del componente MKDIR Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3373.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3373.json index dfd4083b7b4..e6c63d03f0a 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3373.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3373.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3373", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T16:15:27.340", - "lastModified": "2025-04-07T16:15:27.340", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as critical. Affected by this vulnerability is an unknown functionality of the component SITE CHMOD Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en PCMan FTP Server 2.0.7, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente SITE CHMOD Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3374.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3374.json index 8154c7cf18e..bb6a27ac1cf 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3374.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3374.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3374", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T16:15:27.530", - "lastModified": "2025-04-07T17:15:39.303", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PCMan FTP Server 2.0.7 and classified as critical. Affected by this issue is some unknown functionality of the component CCC Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PCMan FTP Server 2.0.7, clasificada como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del componente CCC Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3375.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3375.json index 05d0d1f911a..b551c5a0c3f 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3375.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3375.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3375", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T17:15:39.457", - "lastModified": "2025-04-07T17:15:39.457", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PCMan FTP Server 2.0.7. It has been classified as critical. This affects an unknown part of the component CDUP Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PCMan FTP Server 2.0.7. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del componente CDUP Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3376.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3376.json index 514997deded..addea4fadae 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3376.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3376.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3376", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T17:15:39.680", - "lastModified": "2025-04-07T17:15:39.680", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PCMan FTP Server 2.0.7. It has been declared as critical. This vulnerability affects unknown code of the component CONF Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PCMan FTP Server 2.0.7. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del componente CONF Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3377.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3377.json index 91a74f14b58..198614f07f4 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3377.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3377.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3377", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T18:15:45.733", - "lastModified": "2025-04-07T18:15:45.733", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PCMan FTP Server 2.0.7. It has been rated as critical. This issue affects some unknown processing of the component ENC Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en PCMan FTP Server 2.0.7. Se ha clasificado como cr\u00edtica. Este problema afecta a un procesamiento desconocido del componente ENC Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3378.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3378.json index 1aed613c842..309b0874251 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3378.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3378.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3378", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T18:15:45.923", - "lastModified": "2025-04-07T19:15:57.413", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in PCMan FTP Server 2.0.7. Affected is an unknown function of the component EPRT Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en PCMan FTP Server 2.0.7. Se ve afectada una funci\u00f3n desconocida del componente EPRT Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3379.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3379.json index 4bdfd3506f7..ef663e84049 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3379.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3379.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3379", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T19:15:57.533", - "lastModified": "2025-04-07T19:15:57.533", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in PCMan FTP Server 2.0.7. Affected by this vulnerability is an unknown functionality of the component EPSV Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en PCMan FTP Server 2.0.7. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente EPSV Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3380.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3380.json index f606064c7c4..8cadff5c28d 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3380.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3380.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3380", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T19:15:57.747", - "lastModified": "2025-04-07T20:15:21.640", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. Affected by this issue is some unknown functionality of the component FEAT Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en PCMan FTP Server 2.0.7. Este problema afecta a una funcionalidad desconocida del componente FEAT Command Handler. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3381.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3381.json index 78f43ed25d7..362fae7781e 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3381.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3381.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3381", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T20:15:21.760", - "lastModified": "2025-04-08T16:15:29.563", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3382.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3382.json index d7c04db91a7..ff5edfd27a7 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3382.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3382.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3382", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T20:15:21.943", - "lastModified": "2025-04-08T16:15:29.780", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3383.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3383.json index 112745045c5..5e0ea8f46dd 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3383.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3383.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3383", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T21:15:43.850", - "lastModified": "2025-04-08T16:15:29.913", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3384.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3384.json index e7fe9f64cdc..925e7cd2589 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3384.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3384.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3384", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T21:15:44.053", - "lastModified": "2025-04-08T16:15:30.047", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3385.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3385.json index 37894bc92ef..9acb80fe9c6 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3385.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3385.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3385", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T22:15:17.137", - "lastModified": "2025-04-08T16:15:30.180", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3386.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3386.json index b3350561a1a..9f7db9232a8 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3386.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3386.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3386", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T22:15:17.337", - "lastModified": "2025-04-08T16:15:30.307", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3387.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3387.json index cc93b74436e..4b8b70e4ef2 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3387.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3387.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3387", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T23:15:43.530", - "lastModified": "2025-04-07T23:15:43.530", - "vulnStatus": "Received", + "lastModified": "2025-04-08T19:15:52.823", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in renrenio renren-security up to 5.4.0. This affects an unknown part of the component JSON Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en renrenio renren-security (hasta la versi\u00f3n 5.4.0). Esta afecta a una parte desconocida del componente JSON Handler. La manipulaci\u00f3n provoca ataques de cross site scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?id.303633", "source": "cna@vuldb.com" + }, + { + "url": "https://gitee.com/renrenio/renren-security/issues/IBOU02", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3388.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3388.json index c67b67db478..00f1dac4b31 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3388.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3388.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3388", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T23:15:44.033", - "lastModified": "2025-04-07T23:15:44.033", - "vulnStatus": "Received", + "lastModified": "2025-04-08T19:15:52.950", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in hailey888 oa_system up to 2025.01.01. This vulnerability affects the function loginCheck of the file cn/gson/oasys/controller/login/LoginsController.java of the component Frontend. The manipulation of the argument Username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en hailey888 oa_system hasta la versi\u00f3n 2025.01.01. Esta vulnerabilidad afecta a la funci\u00f3n loginCheck del archivo cn/gson/oasys/controller/login/LoginsController.java del componente Frontend. La manipulaci\u00f3n del argumento \"Username\" provoca ataques de cross site scripting. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza un sistema de entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?id.303634", "source": "cna@vuldb.com" + }, + { + "url": "https://gitee.com/hailey888/oa_system/issues/IBRQYI", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3389.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3389.json index 9bfd567480f..969a8767f85 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3389.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3389.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3389", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T00:15:15.793", - "lastModified": "2025-04-08T00:15:15.793", - "vulnStatus": "Received", + "lastModified": "2025-04-08T19:15:53.143", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in hailey888 oa_system up to 2025.01.01. This issue affects the function testMess of the file cn/gson/oasys/controller/inform/InformManageController.java of the component Backend. The manipulation of the argument menu leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en hailey888 oa_system hasta la versi\u00f3n 2025.01.01. Este problema afecta a la funci\u00f3n testMess del archivo cn/gson/oasys/controller/inform/InformManageController.java del componente Backend. La manipulaci\u00f3n del men\u00fa de argumentos provoca ataques de cross site scripting. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto no utiliza control de versiones. Por ello, no hay informaci\u00f3n disponible sobre las versiones afectadas y no afectadas." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?id.303635", "source": "cna@vuldb.com" + }, + { + "url": "https://gitee.com/hailey888/oa_system/issues/IBRQXH", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3390.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3390.json index 51da5ce3710..2de7af560f1 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3390.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3390.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3390", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T00:15:15.993", - "lastModified": "2025-04-08T14:15:35.717", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3391.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3391.json index 43f4bad74ce..34fce77f27f 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3391.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3391.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3391", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T01:15:42.223", - "lastModified": "2025-04-08T15:15:51.127", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3392.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3392.json index 6bb864d9c3a..fdae490ff02 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3392.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3392.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3392", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T02:15:21.227", - "lastModified": "2025-04-08T16:15:30.430", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3393.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3393.json index 9d45ad9080f..3de8ad3e7f3 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3393.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3393.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3393", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T02:15:21.410", - "lastModified": "2025-04-08T15:15:51.250", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3397.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3397.json index 7cb2b9907f8..3e6cb3d9219 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3397.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3397.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3397", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T02:15:21.597", - "lastModified": "2025-04-08T15:15:51.383", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3398.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3398.json index e801a645457..bd513c7035d 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3398.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3398.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3398", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T02:15:21.780", - "lastModified": "2025-04-08T02:15:21.780", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in lenve VBlog up to 1.0.0. Affected by this vulnerability is the function configure of the file blogserver/src/main/java/org/sang/config/WebSecurityConfig.java. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en lenve VBlog hasta la versi\u00f3n 1.0.0. Esta vulnerabilidad afecta la funci\u00f3n configure del archivo blogserver/src/main/java/org/sang/config/WebSecurityConfig.java. La manipulaci\u00f3n genera controles de acceso inadecuados. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3399.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3399.json index ffa2dcb9fd9..b92e7381f84 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3399.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3399.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3399", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T02:15:21.980", - "lastModified": "2025-04-08T16:15:30.563", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3400.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3400.json index 6a5d0c66972..77f008c248b 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3400.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3400.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3400", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T02:15:22.167", - "lastModified": "2025-04-08T16:15:30.730", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3401.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3401.json index 8ffcc58faf1..046691a5b0c 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3401.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3401.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3401", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T03:15:16.280", - "lastModified": "2025-04-08T15:15:52.110", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3402.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3402.json index 74a15d57790..d67cd3462ae 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3402.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3402.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3402", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T03:15:16.463", - "lastModified": "2025-04-08T03:15:16.463", - "vulnStatus": "Received", + "lastModified": "2025-04-08T19:15:53.267", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Seeyon Zhiyuan Interconnect FE Collaborative Office Platform 5.5.2 and classified as critical. This issue affects some unknown processing of the file /sysform/042/check.js%70. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Seeyon Zhiyuan Interconnect FE Collaborative Office Platform 5.5.2, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /sysform/042/check.js%70. La manipulaci\u00f3n del argumento \"Name\" provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.542343", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Angel12345623/CVE/blob/main/CVE_1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3403.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3403.json index b8557c3826d..94ec247f5bd 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3403.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3403.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3403", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T03:15:16.670", - "lastModified": "2025-04-08T03:15:16.670", - "vulnStatus": "Received", + "lastModified": "2025-04-08T19:15:53.387", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Vivotek NVR ND8422P, NVR ND9525P and NVR ND9541P 2.4.0.204/3.3.0.104/4.2.0.101. It has been classified as problematic. Affected is an unknown function of the component HTML Form Handler. The manipulation leads to inclusion of sensitive information in source code. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Vivotek NVR ND8422P, NVR ND9525P y NVR ND9541P 2.4.0.204/3.3.0.104/4.2.0.101. Se ha clasificado como problem\u00e1tica. Se ve afectada una funci\u00f3n desconocida del componente HTML Form Handler. La manipulaci\u00f3n conlleva la inclusi\u00f3n de informaci\u00f3n confidencial en el c\u00f3digo fuente. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.543589", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/lfparizzi/CVE-VIVOTEK-ID/blob/main/README.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3405.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3405.json index edcfd17d9da..3a62297c8bf 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3405.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3405.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3405", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T04:15:31.400", - "lastModified": "2025-04-08T04:15:31.400", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in FCJ Venture Builder appclientefiel 3.0.27. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /rest/cliente/ObterPedido/ of the component HTTP GET Request Handler. The manipulation of the argument ORDER_ID leads to improper control of resource identifiers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en FCJ Venture Builder appclientefiel 3.0.27. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /rest/cliente/ObterPedido/ del componente HTTP GET Request Handler. La manipulaci\u00f3n del argumento ORDER_ID conlleva un control indebido de los identificadores de recursos. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3406.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3406.json index 3f090f63c83..3cbcef6f8f1 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3406.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3406.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3406", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T04:15:31.647", - "lastModified": "2025-04-08T04:15:31.647", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Nothings stb up to f056911. It has been classified as problematic. Affected is the function stbhw_build_tileset_from_image of the component Header Array Handler. The manipulation of the argument w leads to out-of-bounds read. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Nothings stb hasta f056911. Se ha clasificado como problem\u00e1tica. La funci\u00f3n stbhw_build_tileset_from_image del componente Header Array Handler est\u00e1 afectada. La manipulaci\u00f3n del argumento w provoca una lectura fuera de los l\u00edmites. Es posible ejecutar el ataque de forma remota. Este producto utiliza una versi\u00f3n continua para una entrega continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3407.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3407.json index e1419b69638..01de1286803 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3407.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3407.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3407", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T04:15:31.877", - "lastModified": "2025-04-08T04:15:31.877", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Nothings stb up to f056911. It has been declared as critical. Affected by this vulnerability is the function stbhw_build_tileset_from_image. The manipulation of the argument h_count/v_count leads to out-of-bounds read. The attack can be launched remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Nothings stb hasta f056911. Se ha declarado cr\u00edtica. La funci\u00f3n stbhw_build_tileset_from_image se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento h_count/v_count provoca una lectura fuera de los l\u00edmites. El ataque puede ejecutarse remotamente. Este producto utiliza el enfoque de lanzamiento continuo para garantizar una entrega continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las actualizadas. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3408.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3408.json index cc245700f18..ae91f48c996 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3408.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3408.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3408", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T04:15:32.077", - "lastModified": "2025-04-08T16:15:30.873", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3409.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3409.json index 25243d15012..a73127a7735 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3409.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3409.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3409", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T05:15:40.050", - "lastModified": "2025-04-08T05:15:40.050", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Nothings stb up to f056911. This affects the function stb_include_string. The manipulation of the argument path_to_includes leads to stack-based buffer overflow. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en Nothings stb hasta f056911. Esta afecta a la funci\u00f3n stb_include_string. La manipulaci\u00f3n del argumento path_to_includes provoca un desbordamiento del b\u00fafer en la pila. Es posible iniciar el ataque de forma remota. Este producto no utiliza control de versiones. Por ello, no se dispone de informaci\u00f3n sobre las versiones afectadas y no afectadas. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3410.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3410.json index d34ec70b52a..6b267496b61 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3410.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3410.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3410", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T05:15:40.243", - "lastModified": "2025-04-08T16:15:31.110", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3411.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3411.json index 457cb01d9fd..0f9d1aad7f7 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3411.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3411.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3411", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T05:15:40.423", - "lastModified": "2025-04-08T16:15:31.250", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3412.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3412.json index b9e0c26d466..55da8f26f86 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3412.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3412.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3412", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T06:15:44.970", - "lastModified": "2025-04-08T16:15:31.370", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3413.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3413.json index d547bf033e2..6edaf03735c 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3413.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3413.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3413", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T06:15:45.333", - "lastModified": "2025-04-08T16:15:31.493", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3416.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3416.json new file mode 100644 index 00000000000..db60adeca2d --- /dev/null +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3416.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2025-3416", + "sourceIdentifier": "secalert@redhat.com", + "published": "2025-04-08T19:15:53.717", + "lastModified": "2025-04-08T19:15:53.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3416", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357560", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/sfackler/rust-openssl", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/sfackler/rust-openssl/commit/87085bd67896b7f92e6de35d081f607a334beae4", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/sfackler/rust-openssl/pull/2390", + "source": "secalert@redhat.com" + }, + { + "url": "https://rustsec.org/advisories/RUSTSEC-2025-0022.html", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3424.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3424.json index a6f14eec205..168289f4e4b 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3424.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3424.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3424", "sourceIdentifier": "20705f08-db8b-4497-8f94-7eea62317651", "published": "2025-04-07T16:15:27.703", - "lastModified": "2025-04-07T16:15:27.703", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IntelliSpace portal application utilizes .NET\nRemoting for its functionality. The vulnerability arises from the exploitation\nof port 755 through the \"Object Marshalling\" technique, which allows\nan attacker to read internal files without any authentication. This is possible\nby crafting specific .NET Remoting URLs derived from information enumerated in\nthe client-side configuration files.\n\n\n\n\n\n\n\nThis issue affects IntelliSpace Portal: 12 and prior." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n de Intellispace Portal utiliza .NET Remoting para su funcionalidad. La vulnerabilidad surge de la explotaci\u00f3n del puerto 755 mediante la t\u00e9cnica de \"Object Marshalling\", que permite a un atacante leer archivos internos sin autenticaci\u00f3n. Esto es posible mediante la manipulaci\u00f3n de URL espec\u00edficas de .NET Remoting derivadas de la informaci\u00f3n enumerada en los archivos de configuraci\u00f3n del cliente. Este problema afecta a IntelliSpace Portal: 12 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3425.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3425.json index 2e7a46c5f14..9c69781e060 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3425.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3425.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3425", "sourceIdentifier": "20705f08-db8b-4497-8f94-7eea62317651", "published": "2025-04-07T16:15:27.963", - "lastModified": "2025-04-07T16:15:27.963", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The IntelliSpace portal application utilizes .NET Remoting for its functionality. The vulnerability arises from the exploitation of port 755 through the deserialization vulnerability. After analyzing the configuration files, we observed that the server had set the TypeFilterLevel to Full which is dangerous as it can potentially lead to remote code execution using deserialization. This issue affects IntelliSpace Portal: 12 and prior." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n de Intellispace Portal utiliza .NET Remoting para su funcionalidad. La vulnerabilidad surge de la explotaci\u00f3n del puerto 755 mediante la vulnerabilidad de deserializaci\u00f3n. Tras analizar los archivos de configuraci\u00f3n, observamos que el servidor hab\u00eda establecido el TypeFilterLevel en Full, lo cual es peligroso, ya que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo mediante deserializaci\u00f3n. Este problema afecta a IntelliSpace Portal: 12 y versiones anteriores." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3426.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3426.json index ae531641998..97d43fa27b3 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3426.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3426.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3426", "sourceIdentifier": "20705f08-db8b-4497-8f94-7eea62317651", "published": "2025-04-07T17:15:40.073", - "lastModified": "2025-04-07T17:15:40.073", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:14:17.307", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "We observed that Intellispace Portal binaries doesn\u2019t have any protection mechanisms to prevent reverse engineering. Specifically, the app\u2019s code is not obfuscated, and no measures are in place to protect against decompilation, disassembly, or debugging. As a result, attackers can reverse-engineer the application to gain insights into its internal workings, which can potentially lead to the discovery of sensitive information, business logic flaws, and other vulnerabilities.\nUtilizing this flaw, the attacker was able to identify the Hardcoded credentials from PortalUsersDatabase.dll, which contains .NET remoting definition. Inside the namespace PortalUsersDatabase, the class Users contains the functions CreateAdmin and CreateService that are used to initialize accounts in the Portal service. Both CreateAdmin and CreateService functions contain a hardcoded encrypted password along with its respective salt that are set with the function SetInitialPasswordAndSalt.\nThis issue affects IntelliSpace Portal: 12 and prior; Advanced Visualization Workspace: 15." + }, + { + "lang": "es", + "value": "Observamos que los binarios de Intellispace Portal carecen de mecanismos de protecci\u00f3n para evitar la ingenier\u00eda inversa. En concreto, el c\u00f3digo de la aplicaci\u00f3n no est\u00e1 ofuscado y no existen medidas de protecci\u00f3n contra la descompilaci\u00f3n, el desensamblado ni la depuraci\u00f3n. Como resultado, los atacantes pueden aplicar ingenier\u00eda inversa a la aplicaci\u00f3n para obtener informaci\u00f3n sobre su funcionamiento interno, lo que podr\u00eda conducir al descubrimiento de informaci\u00f3n confidencial, fallos de l\u00f3gica de negocio y otras vulnerabilidades. Aprovechando esta vulnerabilidad, el atacante pudo identificar las credenciales codificadas de PortalUsersDatabase.dll, que contiene la definici\u00f3n de comunicaci\u00f3n remota .NET. Dentro del espacio de nombres PortalUsersDatabase, la clase Users contiene las funciones CreateAdmin y CreateService, que se utilizan para inicializar cuentas en el servicio Portal. Ambas funciones, CreateAdmin y CreateService, contienen una contrase\u00f1a cifrada codificada junto con su respectiva sal, que se configura con la funci\u00f3n SetInitialPasswordAndSalt. Este problema afecta a IntelliSpace Portal: versi\u00f3n 12 y anteriores; Advanced Visualization Workspace: versi\u00f3n 15." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3427.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3427.json index b475cf6dd2e..0eb8b37d5ad 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3427.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3427.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3427", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T07:15:42.740", - "lastModified": "2025-04-08T07:15:42.740", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The 3DPrint Lite plugin for WordPress is vulnerable to SQL Injection via the 'infill_text' parameter in all versions up to, and including, 2.1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento 3DPrint Lite para WordPress es vulnerable a la inyecci\u00f3n SQL mediante el par\u00e1metro 'infill_text' en todas las versiones hasta la 2.1.3.6 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes no autenticados a\u00f1adir consultas SQL adicionales a las consultas ya existentes, que pueden utilizarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3428.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3428.json index e07e2102eb3..6254fb8a594 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3428.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3428.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3428", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T07:15:42.943", - "lastModified": "2025-04-08T07:15:42.943", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The 3DPrint Lite plugin for WordPress is vulnerable to SQL Injection via the 'coating_text' parameter in all versions up to, and including, 2.1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento 3DPrint Lite para WordPress es vulnerable a la inyecci\u00f3n SQL mediante el par\u00e1metro 'coating_text' en todas las versiones hasta la 2.1.3.6 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes no autenticados a\u00f1adir consultas SQL adicionales a las consultas ya existentes, que pueden utilizarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3429.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3429.json index d1d62eee903..47be1f1a37c 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3429.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3429.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3429", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T07:15:43.120", - "lastModified": "2025-04-08T07:15:43.120", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The 3DPrint Lite plugin for WordPress is vulnerable to SQL Injection via the 'material_text' parameter in all versions up to, and including, 2.1.3.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento 3DPrint Lite para WordPress es vulnerable a la inyecci\u00f3n SQL mediante el par\u00e1metro 'material_text' en todas las versiones hasta la 2.1.3.6 incluida, debido a un escape insuficiente del par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n de la consulta SQL existente. Esto permite a atacantes no autenticados a\u00f1adir consultas SQL adicionales a las consultas ya existentes, que pueden utilizarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3430.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3430.json index 155fd0b4286..fdd7872691b 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3430.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3430.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3430", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T07:15:43.303", - "lastModified": "2025-04-08T07:15:43.303", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3431.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3431.json index fb86e20e961..405c2ca7b4b 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3431.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3431.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3431", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T08:15:18.447", - "lastModified": "2025-04-08T08:15:18.447", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3432.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3432.json index fac6dab82a7..dc3a27b9574 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3432.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3432.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3432", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T09:15:28.630", - "lastModified": "2025-04-08T09:15:28.630", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AAWP Obfuscator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'data-aawp-web' parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento AAWP Obfuscator para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'data-aawp-web' en todas las versiones hasta la 1.0 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes autenticados, con acceso de autor o superior, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3433.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3433.json index 5b50863ed6a..5f12151792f 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3433.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3433.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3433", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T09:15:28.943", - "lastModified": "2025-04-08T09:15:28.943", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Advanced Advertising System plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 1.3.1. This is due to insufficient validation on the redirect url supplied via the 'redir' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action." + }, + { + "lang": "es", + "value": "El complemento Advanced Advertising System para WordPress es vulnerable a Open Redirect en todas las versiones hasta la 1.3.1 incluida. Esto se debe a una validaci\u00f3n insuficiente de la URL de redirecci\u00f3n proporcionada mediante el par\u00e1metro 'redir'. Esto permite que atacantes no autenticados redirijan a los usuarios a sitios potencialmente maliciosos si logran enga\u00f1arlos para que realicen una acci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3436.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3436.json index 3d47abfde79..edf9f6c7ed4 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3436.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3436.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3436", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T09:15:29.300", - "lastModified": "2025-04-08T09:15:29.300", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3437.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3437.json index f0047681327..7e2c0e797a5 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3437.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3437.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3437", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-08T10:15:19.413", - "lastModified": "2025-04-08T10:15:19.413", - "vulnStatus": "Received", + "lastModified": "2025-04-08T18:13:53.347", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index 93c4f8a443c..39f6c7117a1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-08T18:00:20.362308+00:00 +2025-04-08T20:00:20.464321+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-08T17:59:46.877000+00:00 +2025-04-08T19:54:38.830000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -289076 +289230 ``` ### CVEs added in the last Commit -Recently added CVEs: `39` +Recently added CVEs: `154` -- [CVE-2025-27082](CVE-2025/CVE-2025-270xx/CVE-2025-27082.json) (`2025-04-08T17:15:36.233`) -- [CVE-2025-27083](CVE-2025/CVE-2025-270xx/CVE-2025-27083.json) (`2025-04-08T17:15:36.500`) -- [CVE-2025-27084](CVE-2025/CVE-2025-270xx/CVE-2025-27084.json) (`2025-04-08T17:15:36.700`) -- [CVE-2025-27085](CVE-2025/CVE-2025-270xx/CVE-2025-27085.json) (`2025-04-08T17:15:36.887`) -- [CVE-2025-27441](CVE-2025/CVE-2025-274xx/CVE-2025-27441.json) (`2025-04-08T17:15:37.080`) -- [CVE-2025-27442](CVE-2025/CVE-2025-274xx/CVE-2025-27442.json) (`2025-04-08T17:15:37.487`) -- [CVE-2025-27443](CVE-2025/CVE-2025-274xx/CVE-2025-27443.json) (`2025-04-08T17:15:38.113`) -- [CVE-2025-2829](CVE-2025/CVE-2025-28xx/CVE-2025-2829.json) (`2025-04-08T16:15:27.133`) -- [CVE-2025-30670](CVE-2025/CVE-2025-306xx/CVE-2025-30670.json) (`2025-04-08T17:15:38.413`) -- [CVE-2025-30671](CVE-2025/CVE-2025-306xx/CVE-2025-30671.json) (`2025-04-08T17:15:38.607`) -- [CVE-2025-32017](CVE-2025/CVE-2025-320xx/CVE-2025-32017.json) (`2025-04-08T16:15:27.320`) -- [CVE-2025-32018](CVE-2025/CVE-2025-320xx/CVE-2025-32018.json) (`2025-04-08T16:15:27.487`) -- [CVE-2025-32024](CVE-2025/CVE-2025-320xx/CVE-2025-32024.json) (`2025-04-08T16:15:27.703`) -- [CVE-2025-32025](CVE-2025/CVE-2025-320xx/CVE-2025-32025.json) (`2025-04-08T16:15:27.873`) -- [CVE-2025-32026](CVE-2025/CVE-2025-320xx/CVE-2025-32026.json) (`2025-04-08T16:15:28.023`) -- [CVE-2025-32028](CVE-2025/CVE-2025-320xx/CVE-2025-32028.json) (`2025-04-08T16:15:28.180`) -- [CVE-2025-32117](CVE-2025/CVE-2025-321xx/CVE-2025-32117.json) (`2025-04-08T17:15:38.837`) -- [CVE-2025-32164](CVE-2025/CVE-2025-321xx/CVE-2025-32164.json) (`2025-04-08T17:15:39.143`) -- [CVE-2025-32211](CVE-2025/CVE-2025-322xx/CVE-2025-32211.json) (`2025-04-08T17:15:39.407`) -- [CVE-2025-32279](CVE-2025/CVE-2025-322xx/CVE-2025-32279.json) (`2025-04-08T17:15:39.600`) -- [CVE-2025-3285](CVE-2025/CVE-2025-32xx/CVE-2025-3285.json) (`2025-04-08T16:15:28.690`) -- [CVE-2025-3286](CVE-2025/CVE-2025-32xx/CVE-2025-3286.json) (`2025-04-08T16:15:28.840`) -- [CVE-2025-3287](CVE-2025/CVE-2025-32xx/CVE-2025-3287.json) (`2025-04-08T16:15:28.980`) -- [CVE-2025-3288](CVE-2025/CVE-2025-32xx/CVE-2025-3288.json) (`2025-04-08T16:15:29.120`) -- [CVE-2025-3289](CVE-2025/CVE-2025-32xx/CVE-2025-3289.json) (`2025-04-08T16:15:29.253`) +- [CVE-2025-29816](CVE-2025/CVE-2025-298xx/CVE-2025-29816.json) (`2025-04-08T18:16:07.370`) +- [CVE-2025-29819](CVE-2025/CVE-2025-298xx/CVE-2025-29819.json) (`2025-04-08T18:16:07.520`) +- [CVE-2025-29820](CVE-2025/CVE-2025-298xx/CVE-2025-29820.json) (`2025-04-08T18:16:07.683`) +- [CVE-2025-29821](CVE-2025/CVE-2025-298xx/CVE-2025-29821.json) (`2025-04-08T18:16:07.867`) +- [CVE-2025-29822](CVE-2025/CVE-2025-298xx/CVE-2025-29822.json) (`2025-04-08T18:16:08.023`) +- [CVE-2025-29823](CVE-2025/CVE-2025-298xx/CVE-2025-29823.json) (`2025-04-08T18:16:08.190`) +- [CVE-2025-29824](CVE-2025/CVE-2025-298xx/CVE-2025-29824.json) (`2025-04-08T18:16:08.340`) +- [CVE-2025-30295](CVE-2025/CVE-2025-302xx/CVE-2025-30295.json) (`2025-04-08T19:15:49.453`) +- [CVE-2025-30296](CVE-2025/CVE-2025-302xx/CVE-2025-30296.json) (`2025-04-08T19:15:49.613`) +- [CVE-2025-30297](CVE-2025/CVE-2025-302xx/CVE-2025-30297.json) (`2025-04-08T19:15:49.770`) +- [CVE-2025-30298](CVE-2025/CVE-2025-302xx/CVE-2025-30298.json) (`2025-04-08T19:15:49.923`) +- [CVE-2025-30299](CVE-2025/CVE-2025-302xx/CVE-2025-30299.json) (`2025-04-08T19:15:50.083`) +- [CVE-2025-30300](CVE-2025/CVE-2025-303xx/CVE-2025-30300.json) (`2025-04-08T19:15:50.240`) +- [CVE-2025-30301](CVE-2025/CVE-2025-303xx/CVE-2025-30301.json) (`2025-04-08T19:15:50.390`) +- [CVE-2025-30302](CVE-2025/CVE-2025-303xx/CVE-2025-30302.json) (`2025-04-08T19:15:50.537`) +- [CVE-2025-30303](CVE-2025/CVE-2025-303xx/CVE-2025-30303.json) (`2025-04-08T19:15:50.693`) +- [CVE-2025-30304](CVE-2025/CVE-2025-303xx/CVE-2025-30304.json) (`2025-04-08T19:15:50.863`) +- [CVE-2025-30305](CVE-2025/CVE-2025-303xx/CVE-2025-30305.json) (`2025-04-08T19:15:51.027`) +- [CVE-2025-30306](CVE-2025/CVE-2025-303xx/CVE-2025-30306.json) (`2025-04-08T19:15:51.197`) +- [CVE-2025-30307](CVE-2025/CVE-2025-303xx/CVE-2025-30307.json) (`2025-04-08T19:15:51.353`) +- [CVE-2025-30308](CVE-2025/CVE-2025-303xx/CVE-2025-30308.json) (`2025-04-08T19:15:51.513`) +- [CVE-2025-30309](CVE-2025/CVE-2025-303xx/CVE-2025-30309.json) (`2025-04-08T19:15:51.670`) +- [CVE-2025-32035](CVE-2025/CVE-2025-320xx/CVE-2025-32035.json) (`2025-04-08T18:16:08.597`) +- [CVE-2025-32036](CVE-2025/CVE-2025-320xx/CVE-2025-32036.json) (`2025-04-08T18:16:08.750`) +- [CVE-2025-3416](CVE-2025/CVE-2025-34xx/CVE-2025-3416.json) (`2025-04-08T19:15:53.717`) ### CVEs modified in the last Commit -Recently modified CVEs: `74` +Recently modified CVEs: `295` -- [CVE-2025-3207](CVE-2025/CVE-2025-32xx/CVE-2025-3207.json) (`2025-04-08T17:56:53.623`) -- [CVE-2025-3208](CVE-2025/CVE-2025-32xx/CVE-2025-3208.json) (`2025-04-08T17:48:42.087`) -- [CVE-2025-3210](CVE-2025/CVE-2025-32xx/CVE-2025-3210.json) (`2025-04-08T17:43:12.840`) -- [CVE-2025-32369](CVE-2025/CVE-2025-323xx/CVE-2025-32369.json) (`2025-04-08T17:27:42.950`) -- [CVE-2025-32409](CVE-2025/CVE-2025-324xx/CVE-2025-32409.json) (`2025-04-08T16:15:28.547`) -- [CVE-2025-3296](CVE-2025/CVE-2025-32xx/CVE-2025-3296.json) (`2025-04-08T16:49:21.037`) -- [CVE-2025-3297](CVE-2025/CVE-2025-32xx/CVE-2025-3297.json) (`2025-04-08T16:49:12.910`) -- [CVE-2025-3298](CVE-2025/CVE-2025-32xx/CVE-2025-3298.json) (`2025-04-08T16:49:00.290`) -- [CVE-2025-3299](CVE-2025/CVE-2025-32xx/CVE-2025-3299.json) (`2025-04-08T16:48:45.137`) -- [CVE-2025-3305](CVE-2025/CVE-2025-33xx/CVE-2025-3305.json) (`2025-04-08T16:46:55.203`) -- [CVE-2025-3308](CVE-2025/CVE-2025-33xx/CVE-2025-3308.json) (`2025-04-08T17:38:09.607`) -- [CVE-2025-3381](CVE-2025/CVE-2025-33xx/CVE-2025-3381.json) (`2025-04-08T16:15:29.563`) -- [CVE-2025-3382](CVE-2025/CVE-2025-33xx/CVE-2025-3382.json) (`2025-04-08T16:15:29.780`) -- [CVE-2025-3383](CVE-2025/CVE-2025-33xx/CVE-2025-3383.json) (`2025-04-08T16:15:29.913`) -- [CVE-2025-3384](CVE-2025/CVE-2025-33xx/CVE-2025-3384.json) (`2025-04-08T16:15:30.047`) -- [CVE-2025-3385](CVE-2025/CVE-2025-33xx/CVE-2025-3385.json) (`2025-04-08T16:15:30.180`) -- [CVE-2025-3386](CVE-2025/CVE-2025-33xx/CVE-2025-3386.json) (`2025-04-08T16:15:30.307`) -- [CVE-2025-3392](CVE-2025/CVE-2025-33xx/CVE-2025-3392.json) (`2025-04-08T16:15:30.430`) -- [CVE-2025-3399](CVE-2025/CVE-2025-33xx/CVE-2025-3399.json) (`2025-04-08T16:15:30.563`) -- [CVE-2025-3400](CVE-2025/CVE-2025-34xx/CVE-2025-3400.json) (`2025-04-08T16:15:30.730`) -- [CVE-2025-3408](CVE-2025/CVE-2025-34xx/CVE-2025-3408.json) (`2025-04-08T16:15:30.873`) -- [CVE-2025-3410](CVE-2025/CVE-2025-34xx/CVE-2025-3410.json) (`2025-04-08T16:15:31.110`) -- [CVE-2025-3411](CVE-2025/CVE-2025-34xx/CVE-2025-3411.json) (`2025-04-08T16:15:31.250`) -- [CVE-2025-3412](CVE-2025/CVE-2025-34xx/CVE-2025-3412.json) (`2025-04-08T16:15:31.370`) -- [CVE-2025-3413](CVE-2025/CVE-2025-34xx/CVE-2025-3413.json) (`2025-04-08T16:15:31.493`) +- [CVE-2025-3400](CVE-2025/CVE-2025-34xx/CVE-2025-3400.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3401](CVE-2025/CVE-2025-34xx/CVE-2025-3401.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3402](CVE-2025/CVE-2025-34xx/CVE-2025-3402.json) (`2025-04-08T19:15:53.267`) +- [CVE-2025-3403](CVE-2025/CVE-2025-34xx/CVE-2025-3403.json) (`2025-04-08T19:15:53.387`) +- [CVE-2025-3405](CVE-2025/CVE-2025-34xx/CVE-2025-3405.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3406](CVE-2025/CVE-2025-34xx/CVE-2025-3406.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3407](CVE-2025/CVE-2025-34xx/CVE-2025-3407.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3408](CVE-2025/CVE-2025-34xx/CVE-2025-3408.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3409](CVE-2025/CVE-2025-34xx/CVE-2025-3409.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3410](CVE-2025/CVE-2025-34xx/CVE-2025-3410.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3411](CVE-2025/CVE-2025-34xx/CVE-2025-3411.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3412](CVE-2025/CVE-2025-34xx/CVE-2025-3412.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3413](CVE-2025/CVE-2025-34xx/CVE-2025-3413.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3424](CVE-2025/CVE-2025-34xx/CVE-2025-3424.json) (`2025-04-08T18:14:17.307`) +- [CVE-2025-3425](CVE-2025/CVE-2025-34xx/CVE-2025-3425.json) (`2025-04-08T18:14:17.307`) +- [CVE-2025-3426](CVE-2025/CVE-2025-34xx/CVE-2025-3426.json) (`2025-04-08T18:14:17.307`) +- [CVE-2025-3427](CVE-2025/CVE-2025-34xx/CVE-2025-3427.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3428](CVE-2025/CVE-2025-34xx/CVE-2025-3428.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3429](CVE-2025/CVE-2025-34xx/CVE-2025-3429.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3430](CVE-2025/CVE-2025-34xx/CVE-2025-3430.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3431](CVE-2025/CVE-2025-34xx/CVE-2025-3431.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3432](CVE-2025/CVE-2025-34xx/CVE-2025-3432.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3433](CVE-2025/CVE-2025-34xx/CVE-2025-3433.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3436](CVE-2025/CVE-2025-34xx/CVE-2025-3436.json) (`2025-04-08T18:13:53.347`) +- [CVE-2025-3437](CVE-2025/CVE-2025-34xx/CVE-2025-3437.json) (`2025-04-08T18:13:53.347`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 46b8409c91a..f6247a6f92e 100644 --- a/_state.csv +++ b/_state.csv @@ -88398,7 +88398,7 @@ CVE-2016-5191,0,0,e832a2fb565762fab465e468041eda30d89e55480b8578c32f1baf2cfe1248 CVE-2016-5192,0,0,7757e47b18dd071c8f5f898dfe4dfaed0fb7a2163f8c74dc19911d16258132a3,2024-11-21T02:53:48.470000 CVE-2016-5193,0,0,2605ee92a09a71c4845c3613185e94857066a09aa717d01fe88e85d455273b3a,2024-11-21T02:53:48.593000 CVE-2016-5194,0,0,8185033d9012165cc31acb2382c5db14cc153b70b8e1ec74f008137fb7447233,2024-11-21T02:53:48.713000 -CVE-2016-5195,0,0,a72b2a47f09f317d155c3faa867aa5de0484857a93d1a6bb00eb8bb513581af3,2025-01-29T18:15:28.220000 +CVE-2016-5195,0,1,9946bce7eab13f1870bc8228a3206c70687c6df2f0edfc4690407aae8c833aca,2025-04-08T18:12:18.353000 CVE-2016-5196,0,0,85d60c53c34b34a94d1179275edd2dbc1908adaf314ce782eec74fdc214d2790,2024-11-21T02:53:49.200000 CVE-2016-5197,0,0,74734dde4ecc6b3409ed55059c42eca7f8eadfb7f8d2fce0bff152caf355fae2,2024-11-21T02:53:49.310000 CVE-2016-5198,0,0,f8e72c129d1860d6b27a996fa600331dc1e5cb837213e5e87450ca3b8f5e267f,2025-02-20T18:06:01.273000 @@ -138600,7 +138600,7 @@ CVE-2019-2522,0,0,638737140f258e11051ee5bbdf0348d4d75583dff335dd9bacaf5548d0e7c0 CVE-2019-25220,0,0,d816e7498110be9fdee3cfe309ef71779578ebdc0da778db7a8c501d80ff8668,2024-11-18T17:35:01.780000 CVE-2019-25221,0,0,1df42d22725f30b375d9fa95a2ea36f97268cbdd206d333006cebd98ba4f48ba,2024-12-13T04:15:04.713000 CVE-2019-25222,0,0,1c3e94cef49da52b598375ce55e0334a5c0500fa73191415471f8de8ae5a9861,2025-03-21T11:08:00.220000 -CVE-2019-25223,0,0,55efe24dc6319a0a3f5ce900a427ab5946a9d4f67db5d16895166d2aba82d330,2025-04-08T07:15:42.290000 +CVE-2019-25223,0,1,c7bdb12c3015eff26f39473815cdc11079b84aed29996848586c3f4429bec921,2025-04-08T18:13:53.347000 CVE-2019-2523,0,0,8dbf09cc09a9d36d5d379aecf44a233c56df498cda1cca6ed13442ba59e0191b,2024-11-21T04:41:02.417000 CVE-2019-2524,0,0,e78029c84d578c9195f9dc77e1bc1d99a41eb834e1b9ea40680656159ff29559,2024-11-21T04:41:02.543000 CVE-2019-2525,0,0,45bc199935b7701dbac60abc55ae16ce2ad0edb17c245390c2e47faaca8aac93,2024-11-21T04:41:02.660000 @@ -144935,7 +144935,7 @@ CVE-2020-0634,0,0,ed7acc9364b8e9889f3b506bb5b8af25863347dc298ea6543e45d716daa2f1 CVE-2020-0635,0,0,66d672bb02f4dd8b0df8440108082f96c2f66a053b722dd3c88485db96bc0460,2024-11-21T04:53:54.060000 CVE-2020-0636,0,0,87f40cd68a1fa810c98739ba50b05ac9bd0c6eb88970f39158df96f933de4b28,2024-11-21T04:53:54.180000 CVE-2020-0637,0,0,374db80798fcb9a8b24a45eb7c5266483183b975efcef4cd1a6b37ec87584f4d,2024-11-21T04:53:54.283000 -CVE-2020-0638,0,1,9c3f9b8bf436d53457f9ab39163535c9955a08f3a9567fdf1e4fe5c3a375a9ba,2025-04-08T16:00:35.440000 +CVE-2020-0638,0,0,9c3f9b8bf436d53457f9ab39163535c9955a08f3a9567fdf1e4fe5c3a375a9ba,2025-04-08T16:00:35.440000 CVE-2020-0639,0,0,145a4d04acc253fc198bb93d8d6917ff86c92ac4c9c4246bacfd1c5775a99308,2024-11-21T04:53:54.503000 CVE-2020-0640,0,0,1b61e51eeafb5b5cdfab364ff8f50e4f8b178612eefeac4dd8f2134b59069776,2024-11-21T04:53:54.623000 CVE-2020-0641,0,0,4c199c277db5181d014f961c2e0813ac5b5bcec247c0a512bf694b8179e4bb2e,2024-11-21T04:53:54.740000 @@ -144970,7 +144970,7 @@ CVE-2020-0670,0,0,7c1a63adc3f1490430bd023ee691c198243d1129cd875502f6de7ec9a8586d CVE-2020-0671,0,0,f1f82776b93fa9b22837865fd38527b3088b19abdbf94f10808dc75649bc539b,2024-11-21T04:53:58.253000 CVE-2020-0672,0,0,57579f674d275435818a0f8c80719393de8002ef25725d18d74b8e4a9bdbe604,2024-11-21T04:53:58.373000 CVE-2020-0673,0,0,4e1e64e83613c3c7f501ca3f5e71e7467adbdf633d983118b7a2650a9abdf8c2,2024-11-21T04:53:58.497000 -CVE-2020-0674,0,1,c603fcc5bc6035d1c1edb17d224cf04485cde4f48dc83f0e722cd8aad7878138,2025-04-08T16:00:10.390000 +CVE-2020-0674,0,0,c603fcc5bc6035d1c1edb17d224cf04485cde4f48dc83f0e722cd8aad7878138,2025-04-08T16:00:10.390000 CVE-2020-0675,0,0,62aba8b198bff250b53f2be2b9de581521c7acc7513d2800314032b90749e725,2024-11-21T04:53:58.773000 CVE-2020-0676,0,0,642a0fc4450329cd5b8c36b4dd4f89bcc61120012bde09f1aa3a1728220cbff0,2024-11-21T04:53:58.910000 CVE-2020-0677,0,0,d1bf2c6ff2a95fbb182d2e33def74c444a234a67f9523ffbc2a51b8f2338ee09,2024-11-21T04:53:59.037000 @@ -188720,7 +188720,7 @@ CVE-2022-0843,0,0,403653ef40daf0477b521e89ff38cd66d7c433e49e6680f01c174c6b4cd59a CVE-2022-0844,0,0,20aad9a2dd83607c889e0f35501e7d064ffb666561227c6630a593e65cdaf797,2023-11-07T03:41:35.647000 CVE-2022-0845,0,0,d5bb6f0ca9c9f7421e015107c90e35921bc3b720933a6702358c21c6b74af422,2024-11-21T06:39:30.760000 CVE-2022-0846,0,0,be35cec6ee0a5816719e802abe9aa9007e470b047ef4ec2ad0854db5f597f55a,2024-11-21T06:39:30.880000 -CVE-2022-0847,0,0,af1030d3a2be8d8e56cefa1ef70961d5e51817f33360157b12de4ad9f9fdb3dc,2025-02-04T19:15:25.130000 +CVE-2022-0847,0,1,95b6f4a62d9076a1e43263ce11db33d45df4dcb9b01d34e449ab3e970162d90a,2025-04-08T18:12:53.563000 CVE-2022-0848,0,0,f74aa3410cc2219361b0ef87c599c758f287d7508683c404c9b44dad4ffb1863,2024-11-21T06:39:31.187000 CVE-2022-0849,0,0,3f5eeaa812f74e1c9c669a033f5d662f48122800d180876e3a34cbd9a0d76d84,2024-11-21T06:39:31.343000 CVE-2022-0850,0,0,dfb806eb60ccb182be4ad686ce1fc6e9768af767b8b6b213860365f81ce78ab8,2024-11-21T06:39:31.500000 @@ -192282,7 +192282,7 @@ CVE-2022-22506,0,0,27a896399c358f35ca0c1747eaebc4c623329fae457ab321117fc1c038d5c CVE-2022-22507,0,0,e1fa094623535fc33aeecbc98c2f182e4ecc30a003af5b21cb3b72969da37690,2023-11-07T03:43:55.640000 CVE-2022-22508,0,0,c16c117d7a2e95770a02da4e9d81113cb0ea4a31090fbbf1f3112557b4594656,2024-11-21T06:46:54.870000 CVE-2022-22509,0,0,b8b8823a4a98e20c6f65f66a0ab7dbfc7a524e69813af033307187b177bb3c4c,2024-11-21T06:46:55.010000 -CVE-2022-2251,0,0,4a7495b32250067b47f18d56d45b8322453cee58addd06ce1f7b9d8aa913eb12,2024-11-21T07:00:37.180000 +CVE-2022-2251,0,1,a8076268b496e19cee8dec09912fcc9ead5de37e6a8e1f68ebe29951a7c97cb9,2025-04-08T19:15:45.583000 CVE-2022-22510,0,0,ea54cf5324baafeda893b380c2e90f2b2ba20c6eb5066c4a3916901b7d32598f,2024-11-21T06:46:55.503000 CVE-2022-22511,0,0,4b792928503025873e603b87fbab34d373730cf1f6b590c58ef9f2e77496ad60,2024-11-21T06:46:55.623000 CVE-2022-22512,0,0,634675fa40a374e369c0d2f163f467b67aaafb4d643b9e1ab362c74e5f34a082,2024-11-21T06:46:55.760000 @@ -194464,7 +194464,7 @@ CVE-2022-24908,0,0,23fa6018946849b8f7d88a71b1d006f0805135adcc277cbbb24bbdd5aebed CVE-2022-2491,0,0,4f16229146c8318c69a2527501eae86a8d4acc09d2192ecca1e116168ee31653,2024-11-21T07:01:06.440000 CVE-2022-24910,0,0,a3b487a6748a671eb4a9eaefae2829b72088dee6a81e054e96af3d54a2bf942d,2024-11-21T06:51:22.440000 CVE-2022-24912,0,0,a394edd0c71bc5262970877013599f26503b89e64801447d6c9f7971afe2fafe,2024-11-21T06:51:22.570000 -CVE-2022-24913,0,0,f2ffbee4b1c75ff8f7e052baf66e073b7a6bfa69ec1b0fed0741a42b0677b0d6,2024-11-21T06:51:22.703000 +CVE-2022-24913,0,1,1e54913979602f9a8ff25419bb0b04fbf2c7911c7f71bb055ec3efd1151e951e,2025-04-08T18:15:43.670000 CVE-2022-24915,0,0,2e6f64535b153338f3c320c0b219a5e6526c57b2d0f422ed86216855da39b784,2024-11-21T06:51:22.840000 CVE-2022-24916,0,0,adc861893f0fe7c81ecbca06016e75a6d49335872df6bf5adeb466fa05d41eab,2024-11-21T06:51:22.970000 CVE-2022-24917,0,0,abc2207370a657be5d2101ce4ccccad42b8beec80d7e3105b39020a93a14761d,2024-11-21T06:51:23.127000 @@ -201454,7 +201454,7 @@ CVE-2022-3337,0,0,b8b8018f10fa7252e9e34d4463034ecf4f1ec882bb95aef9f6771c1a48acfc CVE-2022-3338,0,0,23d03f4e1333d230671ded29ceac962c46fd09c965c4589fbe1e58e69735ea5a,2024-11-21T07:19:19.557000 CVE-2022-3339,0,0,cbffe13fb6b0e87f46c669e1b9447ed44fe8afa7993f51a3a517ffb01a6e3f6f,2024-11-21T07:19:19.710000 CVE-2022-3340,0,0,1c0131f8ae7619409c9e22441b92c203624074cc66c5b69cd8e66b27f5cacf57,2024-11-21T07:19:19.833000 -CVE-2022-3341,0,1,8b7f9d51a7c8e27555a9e1820dec79396da4e5045f1bd113de7eea34663a0963,2025-04-08T16:15:19.387000 +CVE-2022-3341,0,0,8b7f9d51a7c8e27555a9e1820dec79396da4e5045f1bd113de7eea34663a0963,2025-04-08T16:15:19.387000 CVE-2022-3342,0,0,6af9bb7fff5a44d311a195e4c8ab1ced801e074dcdba3c126856f176e1a38eb8,2024-11-21T07:19:20.087000 CVE-2022-3343,0,0,ce4c17e5e846f02260324dacba72981d42dc1b147c9fe2b12acc6d4528128cba,2024-11-21T07:19:20.230000 CVE-2022-3344,0,0,fa8bc78ec543a940b711eaf64472386a0dae2fb0ddadc01f14718e0de068a088,2024-11-21T07:19:20.367000 @@ -202727,13 +202727,13 @@ CVE-2022-35134,0,0,6fd2b07296c663669660c914151f59618176f7ff46676de2f0f99f009a6a5 CVE-2022-35135,0,0,fb342196c8306e6d202c170ddcd72cbe8df032108b89c0f808ad3bbf2e841657,2024-11-21T07:10:48.210000 CVE-2022-35136,0,0,ed11c71144a73f8c046714c3d7754efc52089c9bd0a66a7bb8a2cda1b09c01af,2024-11-21T07:10:48.347000 CVE-2022-35137,0,0,cdc8106ce62fa5dbc32dc63e485e3fec32e06215505886d7b6a8bc2f4fbb7549,2024-11-21T07:10:48.507000 -CVE-2022-3514,0,1,e6f302b56e086c1c9589f0c59933315faed928e4a67aba48de82033f76da4ff8,2025-04-08T16:15:19.627000 +CVE-2022-3514,0,0,e6f302b56e086c1c9589f0c59933315faed928e4a67aba48de82033f76da4ff8,2025-04-08T16:15:19.627000 CVE-2022-35142,0,0,91025d7dc17c0f7d87e471cc8af3f379507dcbcefda8b3bf6e5c42f3dcec70fe,2024-11-21T07:10:48.643000 CVE-2022-35143,0,0,1553629ae18f0c657f9fa9ac98d27b2d630498b8bf771f7a2702ca88d8531e8f,2024-11-21T07:10:48.797000 CVE-2022-35144,0,0,c2e2c44390160f8c514e019170974381c3fb5c7444b56f8555c3df390b0c9cd1,2024-11-21T07:10:48.940000 CVE-2022-35147,0,0,2e51f664a8b59053d9e9811070ef8b7910691769becd7052f7a5c78a808c065a,2024-11-21T07:10:49.097000 CVE-2022-35148,0,0,74633bcd27ec47ddb8d77d06e27462640af4cb8eb6b86f4a418df69c1a2f7c40,2024-11-21T07:10:49.233000 -CVE-2022-3515,0,1,e4490dae54008fae27183f5dc5bff7e9791b348f532b0d17a8898094a1f72ba6,2025-04-08T16:15:19.830000 +CVE-2022-3515,0,0,e4490dae54008fae27183f5dc5bff7e9791b348f532b0d17a8898094a1f72ba6,2025-04-08T16:15:19.830000 CVE-2022-35150,0,0,60ad7e9dfe349b280fb7d4196d796933a0ecf49340126db5f4e6e1b6b7d09f19,2024-11-21T07:10:49.377000 CVE-2022-35151,0,0,40f847b3919576a94651627c46e78983b62784afdfac6c87213b8bee4364cb20,2024-11-21T07:10:49.520000 CVE-2022-35153,0,0,980455a345155255b1049b17baa49369f1d9fba1e65c16582b7c21d3836b07a9,2024-11-21T07:10:49.667000 @@ -203202,7 +203202,7 @@ CVE-2022-35725,0,0,ed4ebcbbbddfd1d6cb7e69093d321bf9bc61dbc26bddf13fc699383c64275 CVE-2022-35726,0,0,e03b89baa6bd0160b24ebe4c28c29a3f718a47968b76a6f0f14f41d671418949,2025-02-20T21:15:23.280000 CVE-2022-35728,0,0,2d9a29150e8c54f594a3bf63931edbc6643e80515a0b49e3b32b06136d135aea,2024-11-21T07:11:33.717000 CVE-2022-35729,0,0,002bd4e7c3948d1a5d2c15807a0aef795eb516b47f3517204eaeee3b153252f6,2024-11-21T07:11:33.860000 -CVE-2022-3573,0,1,6378fd544862d478d1ca3345c0d3bb6b1ce26d610d6527d6d204c33145f4683e,2025-04-08T16:15:22.300000 +CVE-2022-3573,0,0,6378fd544862d478d1ca3345c0d3bb6b1ce26d610d6527d6d204c33145f4683e,2025-04-08T16:15:22.300000 CVE-2022-35730,0,0,77b7411230bc55473fe5eb8bb30abc5693ce15371522700edcd2822d949e11e9,2024-11-21T07:11:33.983000 CVE-2022-35733,0,0,d9e706a545d6b14ec70fae17a27fdc313d8d44fb24dd44c198fa040b55716ee4,2024-11-21T07:11:34.117000 CVE-2022-35734,0,0,83b44310055eecd0d6b8ca69ce2323794a34d814d09d552bd36042e67f919953,2024-11-21T07:11:34.257000 @@ -203391,7 +203391,7 @@ CVE-2022-35916,0,0,9af87e09731f27efc95196b424b67dd321aa236a2082bf5ebbbcb2d730080 CVE-2022-35917,0,0,7e238076ca80dfe65eff9f389b38bd22676dbbcca323966feafdf40cc77142c4,2024-11-21T07:11:57.457000 CVE-2022-35918,0,0,348da3a4e52b678556db8aa666304ff01ae18bad0468d6aa194a6b02348748a0,2024-11-21T07:11:57.603000 CVE-2022-35919,0,0,4e7c608037bb19f763d38902d14367b1e7a702647e7c42e0e90f78ed6a8de183,2024-11-21T07:11:57.743000 -CVE-2022-3592,0,1,e5d2f1a5394a71b992dcc7c7b1a4df60e3eb564620778cfb67916bdae0ac5786,2025-04-08T16:15:23.333000 +CVE-2022-3592,0,0,e5d2f1a5394a71b992dcc7c7b1a4df60e3eb564620778cfb67916bdae0ac5786,2025-04-08T16:15:23.333000 CVE-2022-35920,0,0,1070136de31948ebb38a74cfa1ba31ca0ce6b6dc26b374768ac283a31ffa26f6,2024-11-21T07:11:57.880000 CVE-2022-35921,0,0,29c3d1183c4ccda43803da839eb4c0d4bdc7d73d681ae0801d9b7af17b7876b0,2024-11-21T07:11:58.017000 CVE-2022-35922,0,0,3b2b21c6fb4c740f1509023e1add11f8f3803c83a84f44e80c890a1b9700ee90,2024-11-21T07:11:58.143000 @@ -203617,7 +203617,7 @@ CVE-2022-36125,0,0,d5df59b13465e3be2db409a61402d9c630be1cee79368c6655b8c28626ca0 CVE-2022-36126,0,0,8841116aeefe5d5ac230ad7295d19f5afd1ee2887af9a2d92ce9a022336fc253,2024-11-21T07:12:27.163000 CVE-2022-36127,0,0,8526a2e7974aa96d31db0a9182f6ba1c311f6255f24b023cff47d132691f321e,2024-11-21T07:12:27.360000 CVE-2022-36129,0,0,646c01cd1216604cb685ab0bff87fb4f808d312ac35261cabf5ff5e4da679ac0,2024-11-21T07:12:27.497000 -CVE-2022-3613,0,1,df8f8f98c56bf9fe01bec37941a8c2d4b227ea26f2ec007e657ec3e6f1019fc7,2025-04-08T16:15:23.557000 +CVE-2022-3613,0,0,df8f8f98c56bf9fe01bec37941a8c2d4b227ea26f2ec007e657ec3e6f1019fc7,2025-04-08T16:15:23.557000 CVE-2022-36130,0,0,f4e11023ff6a59b7cde6ab523f5c204ef615371979da1e9523a1e3d3d7a3850c,2024-11-21T07:12:27.663000 CVE-2022-36131,0,0,50572ab64b8cc42fad6645c745005ae7986f76bb701e85c25648d9e83b3e8e5b,2024-11-21T07:12:27.817000 CVE-2022-36133,0,0,e9859aad9ae4062117d37ddeb7823ed57b9e94b6e7bcae929874b58e61d8ef09,2024-11-21T07:12:27.977000 @@ -206249,7 +206249,7 @@ CVE-2022-3973,0,0,b0701d5bad217feda716e93bf7343aaa4f243d408ca27efe0b2e68f2635922 CVE-2022-3974,0,0,17c758733cf0328ce04bb08ce2d692c988e34d9d6c3bc1c81eadf4b7b2809785,2024-11-21T07:20:39.250000 CVE-2022-3975,0,0,34523d3a523c2f593c7e990c4c6157302e5a70ec8db96356f27898ef240a538c,2024-11-21T07:20:39.383000 CVE-2022-3976,0,0,8b7eb574300d8293649a80f2eb920531a13102a351572dd9be5d3ad761c0e9fd,2024-11-21T07:20:39.517000 -CVE-2022-3977,0,0,84d3beae0ea18332e37df60674463fb3b375cbf1fbbb465dd92dc0d7dc912faf,2024-11-21T07:20:39.660000 +CVE-2022-3977,0,1,1b3d248fee2b390f433d2ff842a3d12766d41799ebb941b58975dc634aac6aa0,2025-04-08T18:15:44.317000 CVE-2022-3978,0,0,9e8def547d5f62c73202afccf8e23bbfcaf00f3e6379f819a46d279fc18b9eab,2024-11-21T07:20:39.780000 CVE-2022-3979,0,0,012bbfb3edbc71141fc3b45d42489bcfc33c65e3c11991d37616f13000b6b0ad,2024-11-21T07:20:39.910000 CVE-2022-39799,0,0,ef664b8009a660a96f0a31bedbf0e870db991b119ad699043562a07806982c43,2024-11-21T07:18:16.317000 @@ -206740,7 +206740,7 @@ CVE-2022-4036,0,0,115831242908d4be1ab19f46aa39460a1926637174ba1ad971369ab78af698 CVE-2022-40361,0,0,70b3932ea511598c0d3d7069a689e6718f9d25542c71c50c253b29eaedca1d89,2024-11-21T07:21:21.140000 CVE-2022-40363,0,0,422700ae8c0846f0e2b4307545f4849a654496d2b3003f74d9b1f07cf14fc648,2024-11-21T07:21:21.300000 CVE-2022-40365,0,0,11248d09b53c311f4c945e2c845b9980aea90ed2e5ff3c8cf85f8d767dae1a02,2024-11-21T07:21:21.453000 -CVE-2022-4037,0,1,124ac240cf09eb9d7d675e42462f1aa0d9f92965ba6a825538e829ff2b863cbb,2025-04-08T17:15:32.497000 +CVE-2022-4037,0,0,124ac240cf09eb9d7d675e42462f1aa0d9f92965ba6a825538e829ff2b863cbb,2025-04-08T17:15:32.497000 CVE-2022-40373,0,0,dd911887846dc0144c7761d09a553781ac5dcf3f235e396618f053d02563171f,2024-11-21T07:21:21.600000 CVE-2022-4038,0,0,658fb7af30700ae89494d993bb6c362c23f5ff6bc5f8e3e97e6116b51c14faf2,2024-07-29T20:15:03.317000 CVE-2022-4039,0,0,0f3d55aaf1fdb66122933b67a2edfdbbf803b60f8753899bcf6b7e56a0d6c89c,2024-11-21T07:34:29.670000 @@ -207527,7 +207527,7 @@ CVE-2022-41306,0,0,d28849fc012f0f16cae44ccbd9894f4d3c0752fb3d61482f7ae3d70dc5b31 CVE-2022-41307,0,0,72d678d8d90b53e7ad5d5c3c07b3d22ae888e74c9b39ee89e00ce1f744844638,2024-11-21T07:23:00.770000 CVE-2022-41308,0,0,fc06984e604cd3917ff83f1aa2442b4354c8512c4df5bd0258dd754e5d9b000c,2024-11-21T07:23:00.870000 CVE-2022-41309,0,0,d1891854449b0503e1d97545a51c49f3e0f13aa905b96adf78f0a34e26066007,2024-11-21T07:23:01.003000 -CVE-2022-4131,0,1,30101d6aec56d1e02d03064a9c36cae444977c3702f614f80636a174a1bf066a,2025-04-08T17:15:33.520000 +CVE-2022-4131,0,0,30101d6aec56d1e02d03064a9c36cae444977c3702f614f80636a174a1bf066a,2025-04-08T17:15:33.520000 CVE-2022-41310,0,0,ac833b14041a9c3f00786a70ff63c34d419d4ecc0348bc8d6b88349d78d7b745,2024-11-21T07:23:01.147000 CVE-2022-41311,0,0,062eb7fcf6f81d992cef91116983ddd71762554160a58dcc79b44d3d19916208,2024-11-21T07:23:01.267000 CVE-2022-41312,0,0,9eee7a666c92e5a7ed474ebe66e9cf7368f6e72ba5df1427cbbe3e4ea92f7ec5,2024-11-21T07:23:01.400000 @@ -207819,7 +207819,7 @@ CVE-2022-41666,0,0,d44424892e9e8d071520710dde865dafee9da5d4af2e6525b0b6343dda5b3 CVE-2022-41667,0,0,0d8938202f49ea4a0f6c364c83822cd12c0ad02d1d867272a4e0a443d20ee74f,2024-11-21T07:23:36.180000 CVE-2022-41668,0,0,bca54e3b55cbff5cbfb5f29205bcc252baec4b1ea5b8e9dc6cde60b7b0dd290c,2024-11-21T07:23:36.310000 CVE-2022-41669,0,0,024447291089265be7e1913cc7de0e2ac5cf755ba4e956aad0b34e2b0ccd9d90,2024-11-21T07:23:36.437000 -CVE-2022-4167,0,1,74810c1025e5ebdf099fef6dbc2e751f95449318d102a29cd96a622e4e1f24c8,2025-04-08T17:15:33.827000 +CVE-2022-4167,0,0,74810c1025e5ebdf099fef6dbc2e751f95449318d102a29cd96a622e4e1f24c8,2025-04-08T17:15:33.827000 CVE-2022-41670,0,0,cf8c0f22d9bc8472de729600957fade27a412610b031140b8db6b8f60ee9fc6a,2024-11-21T07:23:36.567000 CVE-2022-41671,0,0,823c179b6fcede429b468efcaaa4cbd942322820a0fcd1311dc181d7afefb65c,2024-11-21T07:23:36.693000 CVE-2022-41672,0,0,188bc523046f55bd017e4ad72bd8246d438aab1a6d37969c11e2f442b0313e23,2024-11-21T07:23:36.813000 @@ -209197,7 +209197,7 @@ CVE-2022-43443,0,0,71c9b61f564b64cdde9106e1121ab6bbe64db292750bbb2951ccda390fa1c CVE-2022-43447,0,0,4cec51b45994c962aa7ad64df34427ffa601d6d4fb59ffcc6a09b25585e8bf27,2024-11-21T07:26:30.160000 CVE-2022-43448,0,0,f546420a99557b1ce7bbfc8e81500c4e34a3664f6714347b5732dee7d2067000,2024-11-21T07:26:30.310000 CVE-2022-43449,0,0,f0b066899da1ce8299cb386e353d72a56aaf08b082cdda3c007310f8d3d35331,2024-11-21T07:26:30.443000 -CVE-2022-4345,0,1,4b4abc1b70ae4e79e484e7350fca8edac6f5ae5d7c4f5f16c1d166a83977ba47,2025-04-08T17:15:34.117000 +CVE-2022-4345,0,0,4b4abc1b70ae4e79e484e7350fca8edac6f5ae5d7c4f5f16c1d166a83977ba47,2025-04-08T17:15:34.117000 CVE-2022-43450,0,0,ff11065ab1878411c86e121c204774be230efb1199a088374b23eb411b4ff08b,2024-11-21T07:26:30.573000 CVE-2022-43451,0,0,55c3f35c43cae6bb1ee37ca66ffdbe18c8660044f95b78328f16c704dbc3f474,2024-11-21T07:26:30.713000 CVE-2022-43452,0,0,c78276254f5f2218b7c77331235d9e2be37d8823bb5fc2252dcd20f8a5f4e515,2024-11-21T07:26:30.860000 @@ -209518,7 +209518,7 @@ CVE-2022-43786,0,0,867509cbee3369c9ab6b76c1580b62828c60dc8539d2ae42c5dda83d56922 CVE-2022-43787,0,0,bd278238a00174cb0dda3bd06196d138f512e6ae93daf11f5f36ca6b9dbb554f,2023-11-15T07:15:07.963000 CVE-2022-43788,0,0,bc39b744aae86655032f35bbae58994154f70161a1676c683de1ac5fb7cdfcef,2023-11-15T07:15:08 CVE-2022-43789,0,0,fe3405ddabc5216ffc65326d75f6ca968fc05f57e5c3b3913a332373eda73093,2023-11-15T07:15:08.350000 -CVE-2022-4379,0,0,6b3b0b282efd41eeb8a9918fa2982f5cbea28045ea77a8bd92e46750b5cac9e5,2024-11-21T07:35:10.030000 +CVE-2022-4379,0,1,a1e74b4b4be14cbd11891bfc855386fe3ea4620a4847e978eebeb4af04dff34b,2025-04-08T19:15:46.243000 CVE-2022-43790,0,0,f31c325d4c989652d2250cdd6dc3343b4b2e4de1f08794967bdbcf1dd6d240b0,2023-11-15T07:15:08.390000 CVE-2022-43791,0,0,efd01fa7f4bf3bcde7ce68c7b1b5c0ed2905121a6d91f19a54371492e66b88ae,2023-11-15T07:15:08.430000 CVE-2022-43792,0,0,911d5946ae61759994d5e691738daeab4af02da5d63b388efbb8b5ba06797f35,2023-11-15T07:15:08.620000 @@ -210803,8 +210803,8 @@ CVE-2022-45721,0,0,e739b1f1d0f4749f5e91d3dab2e936e8314e60304fb4a2e1d21bfe1ff4820 CVE-2022-45722,0,0,6527e6e793046331226252180f51133fdb61de3fc4b4c49b4fcf754f42cc8b3d,2024-11-21T07:29:38.940000 CVE-2022-45724,0,0,06183cd5ff07a6d04785f159aa52d073ed5adc0bb5da6c457b81e7a9b5c12d0c,2025-03-24T18:15:15.837000 CVE-2022-45725,0,0,10475023800e350d15ffdb5683afb3dcad60ac82c8c42f2ec7fcd2c0472ccc3d,2025-03-24T18:15:16.020000 -CVE-2022-45728,0,1,7275a5c3659bae879f0556d95579f54bb356894e9af46d5593ac709353fe139f,2025-04-08T16:15:23.770000 -CVE-2022-45729,0,1,135ae7554fe22d24688a9b3594b2ff5b4ad15e56c0ab610f47f38e7c1888e26f,2025-04-08T16:15:24.010000 +CVE-2022-45728,0,0,7275a5c3659bae879f0556d95579f54bb356894e9af46d5593ac709353fe139f,2025-04-08T16:15:23.770000 +CVE-2022-45729,0,0,135ae7554fe22d24688a9b3594b2ff5b4ad15e56c0ab610f47f38e7c1888e26f,2025-04-08T16:15:24.010000 CVE-2022-4573,0,0,c8e704616c5ed81df2ca6bc3974afec377bd1ef775bb99f5b5a099348c49b0a8,2024-11-21T07:35:31.190000 CVE-2022-45730,0,0,914b8c352394e986b5dce2204fe6201d92139e47777f0cf0e098bb0b10e801d5,2025-04-01T16:15:17.310000 CVE-2022-4574,0,0,c4bd7a68d6d40a00a34e01f201fe51a749afe08d86dfe9f6145f0a62aab3c9f9,2024-11-21T07:35:31.330000 @@ -212291,7 +212291,7 @@ CVE-2022-4792,0,0,8a68b7e39c2bc7081c1e5785899083df37df9ed2dc29c07e463ede969ceefd CVE-2022-47924,0,0,c376096147afc4276748c64a5358831d282c0e13aa1e9627b371fb823fb32a20,2024-11-21T07:32:31.850000 CVE-2022-47925,0,0,3c4aa65890b2d4b2655588fba8d970251832319df447501dee67e1c780551a67,2024-11-21T07:32:32.057000 CVE-2022-47926,0,0,6fb9eeaf9bce7c0718734ae3534265d12ffcd4adf936dec7fd38521c5d5e583e,2024-11-21T07:32:32.243000 -CVE-2022-47927,0,1,39f547271cd0d64cb35097a56d787ab799e6d3347ecf234ab7de6585693292e0,2025-04-08T16:15:24.250000 +CVE-2022-47927,0,0,39f547271cd0d64cb35097a56d787ab799e6d3347ecf234ab7de6585693292e0,2025-04-08T16:15:24.250000 CVE-2022-47928,0,0,bb1f9509023e24d36d79fffee2d16ac8507bcf41ac832c4875a26f9520273dc1,2024-11-21T07:32:32.790000 CVE-2022-47929,0,0,8029fd6ef83b6a0a40287e582ba4e131f5d3f771ef0c8489c1e7a8519b0e3c11,2025-04-04T18:15:43.927000 CVE-2022-4793,0,0,6d1e9f792a7838bd1432d3121154a424b060cc0460b4dd4afad72cec1a43b138,2025-03-27T21:15:41.340000 @@ -212829,7 +212829,7 @@ CVE-2022-48665,0,0,4cdb6b337ea1021d4626bec78d7a4fa0316ede88a6a1eb36b9a3e96f2bef5 CVE-2022-48666,0,0,d2995af1925e586f45fb6ef6ee8e14c7e952a94b45a1643abdb58b595b29b977,2025-03-20T21:34:01.143000 CVE-2022-48667,0,0,c64b1c27111877288d13798a4436698338a58aaf3e6a7b29d6a274bfa75175ca,2024-11-21T07:33:44.240000 CVE-2022-48668,0,0,a59ed4e667ced9421531fde62342cf12a1029c350be9a69ffb161fa9af730a4c,2024-11-21T07:33:44.343000 -CVE-2022-48669,0,0,08bb8b21c1e8e32e2e1fa68298f3f5c750fff3c3d55fda3b13b952edd9eda3e0,2024-11-21T07:33:44.447000 +CVE-2022-48669,0,1,4e8a75abdd48ea41ab64f291f408da91c8cbad8a28c7fc420c7f8d877e6a9f35,2025-04-08T18:42:41.247000 CVE-2022-4867,0,0,e1059ace6930fd217b60e0b9efbe0f76641eb09358e61ee9bf1e0af33bf374f6,2024-11-21T07:36:06.150000 CVE-2022-48670,0,0,92e6121f91564e9727331044c8f7987600e87da5de9b24a1f709b9fe1d140cd5,2025-01-10T19:07:21.170000 CVE-2022-48671,0,0,160232b6240d4d85c5cf27aa0febbc0323a1b8dbed66e8ad9410980b1c19206c,2024-11-21T07:33:44.827000 @@ -227491,7 +227491,7 @@ CVE-2023-34120,0,0,f656e181bafc2d2961a70ea48fa9c78c0a620ac9ae0a0b3a92a91f375470a CVE-2023-34121,0,0,972d452d763b0b0879cf757c8d51bedcde4020e9bf8488b9a820e18c09e38e7a,2024-11-21T08:06:35.540000 CVE-2023-34122,0,0,f585e4332bb8bfbbab2b3607d749ecaf3551ff5d2da712c1ba0736863bada1bc,2024-09-04T19:15:29.087000 CVE-2023-34123,0,0,a736ba4d3d7fcefeae653e424292cabfbaf0efbc05dc55df966b21a6c9356869,2024-11-21T08:06:35.690000 -CVE-2023-34124,0,1,f554cfed73018f460eb6939825dc9e2da8c3939862c8c51683d16dc7cca07bed,2025-04-08T16:15:24.530000 +CVE-2023-34124,0,0,f554cfed73018f460eb6939825dc9e2da8c3939862c8c51683d16dc7cca07bed,2025-04-08T16:15:24.530000 CVE-2023-34125,0,0,a3b84ad182997fe5309c2c5ce7534a26453fddd9a7f49e5442abc6877bc59332,2024-11-21T08:06:35.997000 CVE-2023-34126,0,0,55ba82460c707fa30e10b55c7b6e930a7bf0e71527716191017a6327c4b04101,2024-11-21T08:06:36.143000 CVE-2023-34127,0,0,54f272a150d5a7f9e08cd2746bf69d1776b07018fe98a6a283aa9ca1c015a855,2024-11-21T08:06:36.273000 @@ -228922,7 +228922,7 @@ CVE-2023-36266,0,0,71b4300be3fcb33d012067eb384643a4f1d2310d18f18b4c66091e85a90c8 CVE-2023-36268,0,0,0d36957fbc7e5c71861a4d41ac1aa9c2b2b9fdb7a1080f5312f94994107e995a,2024-09-20T09:15:02.363000 CVE-2023-3627,0,0,23dab9cf0b65c725c9b6cd573d35c7859fd3c18de02b546469752cb60119f628,2024-11-21T08:17:42.350000 CVE-2023-36271,0,0,16a17056501dd2a6f602b088cb772d5ca3f8a9030526f685d814eabb963d3a4a,2025-03-14T18:26:57.183000 -CVE-2023-36272,0,0,015457e81042f298c8ed129705eea2d226b34d91f52c6c228a4320e391ef5832,2025-03-14T18:26:28.453000 +CVE-2023-36272,0,1,f9094e2cc944ee17c8d19ccd95b72f7320fed0f30f97533a6427fef6d2ccda48,2025-04-08T19:15:46.610000 CVE-2023-36273,0,0,fc16f00a4ecbb13c4bb7db3b74d068c64caec301fb6dad15bd70a36918445223,2024-11-21T08:09:29.010000 CVE-2023-36274,0,0,265e217af3809813000ec64b3de9f68447c519e8e92f29f847ea194e90fb8b9b,2025-03-14T18:27:05.517000 CVE-2023-3628,0,0,2c09faac0551fca909b92a32d30b4ce92490ecf4b686c7de27fcac9e3ab06e4d,2024-11-21T08:17:42.490000 @@ -230263,7 +230263,7 @@ CVE-2023-37927,0,0,91c985b74b4cf0c20cf9ee2e34abb6e9d5e5bc09f1967cdc6aacd97f6165b CVE-2023-37928,0,0,dec776d364ef37b6e291aec9a18f90850b125ef62937fdd2b294a62c2fd46954,2024-11-21T08:12:29.503000 CVE-2023-37929,0,0,4095396c6fb48583172ab2f6692b90080e3afde295fcb5a19cf8d9f8e85d9718,2025-01-22T22:55:02.317000 CVE-2023-3793,0,0,e9ede59406bf67af7b0914c618fd7187696ca61b0cb1dc2d5985173c262f0733,2024-11-21T08:18:04.660000 -CVE-2023-37930,0,0,fb43cbad0eb288f1baa25fd1dbaca71b2ebd76310ca8a825d5612a7e604b375a,2025-04-08T14:15:30.653000 +CVE-2023-37930,0,1,c318404004aff1ddefa8802200ce3e83c5514c0cf60c345bb8d7ba056b06ac27,2025-04-08T18:13:53.347000 CVE-2023-37931,0,0,a0b40b55eb2247b05e0ceeef5e9f955a4a55dda449f703f6bca219262f750a7a,2025-02-18T22:15:09.843000 CVE-2023-37932,0,0,f0df6819630bb22aa824d7b6acf6b4dd3a2036be6cce60c742b53c8d1d382fd2,2024-11-21T08:12:29.797000 CVE-2023-37933,0,0,2f1bd770acf60f6c7e800508cf362e293531d59e8eb1b0ce483ebb596350a679,2025-03-11T15:15:38.480000 @@ -239311,7 +239311,7 @@ CVE-2023-49852,0,0,32cecf17a576eba2a4e4615295d04eb919a748eb094f94350a6e72ca414dc CVE-2023-49853,0,0,c0f053894edc8fcd226ea4bf07acfb40d4ae520d03e81948f15528b932bdd5a3,2024-11-21T08:33:57.303000 CVE-2023-49854,0,0,916acdb781afde9a94582c7eccb7ca3bab02dc64c7cdd0ac029f01e8c3a21b98,2024-11-21T08:33:57.433000 CVE-2023-49855,0,0,a7685ee328429bed4302e46df8ed5aa0dee0b09be627e0a281d219aa9c1df196,2024-11-21T08:33:57.563000 -CVE-2023-49856,0,0,81e4e85b1d28b53f06d4e5f8d73b3b3287205459edea6d7dc822a9829f010dc8,2024-12-09T13:15:37.557000 +CVE-2023-49856,0,1,edc31f9ffb3fd51cec09ca00c4f45429dd6ebbf458b44e54df7114c685330572,2025-04-08T19:07:10.853000 CVE-2023-49857,0,0,bae046708077cb39204f6b1d1563c0e33974e5be2c89da00a24b79ef57b33aee,2024-12-09T13:15:37.683000 CVE-2023-49858,0,0,6db8241fa2be4af2ff996b8d6b07dbd4b689fbaacb6b44e31431078324754636,2024-12-09T13:15:37.810000 CVE-2023-49859,0,0,5738e842540b4562bd5413fef776a5e4a220363557086ed5ef8d1c18b6befeb4,2024-12-09T13:15:37.933000 @@ -240118,7 +240118,7 @@ CVE-2023-51136,0,0,2214ce2d265582739a994b3602130c1b0f586cd0abc18b2e0eaf309621347 CVE-2023-5114,0,0,955883614f0da98733469860e174f3523d89a42c1e1548955ec5cdc1e4a50745,2024-11-21T08:41:05.423000 CVE-2023-51141,0,0,24f1892a50f50ef4c188aac4bb4407ad875ca3375298fc5663edad16243b3858,2024-11-21T08:37:52.960000 CVE-2023-51142,0,0,e94a900b871adde31844c5801ab03d4240628df34bff84c4ec48fe02431fa301,2024-11-21T08:37:53.213000 -CVE-2023-51146,0,0,44a4486fae5177a83c4fec787f3c8611bfb9c5aa6f917ffaf632afaf2f6117d4,2024-11-21T08:37:53.443000 +CVE-2023-51146,0,1,dc2eb8a40ced547d029e3fe110ae6324adf8bc152d195f0b32b75d475738fab5,2025-04-08T19:09:38.437000 CVE-2023-51147,0,0,e6f7d5aea2c81837410211e29ec522481486b926e05d237e5f3b4454e41f1a98,2024-11-21T08:37:53.670000 CVE-2023-51148,0,0,5eb9a2531d4bea20b330a460958b7678746e77b3b0c2da791fb44a324ae2b2d5,2024-11-21T08:37:53.993000 CVE-2023-5115,0,0,05e3e9c0dc22461b743c2358ed803bf3147865ec12621e61796b475c03cf4d88,2024-12-06T11:15:07.183000 @@ -240263,7 +240263,7 @@ CVE-2023-51405,0,0,7be27b93dd3ef0d20e84faebeded39670d294017db3352a2031d81ff77dae CVE-2023-51406,0,0,4c46add111b8f29e7264975661197582d14d2829e85eb7ca707de7439cae69a8,2024-11-21T08:38:02.733000 CVE-2023-51407,0,0,6bf9e6656f6a7072e563f0103201ec4c7f8d4e5c6010a5bad1b25b421115041e,2025-02-27T03:34:02.640000 CVE-2023-51408,0,0,607add0970381eca751c9e3cc19850d2192da7bdc676cef9ca4b61bd01424698,2024-11-21T08:38:03.027000 -CVE-2023-51409,0,1,77ba5a699d4e5f1a1cd87bed762faea703cb2ef548e0678ded5c7c2196fe1b09,2025-04-08T16:29:05.930000 +CVE-2023-51409,0,0,77ba5a699d4e5f1a1cd87bed762faea703cb2ef548e0678ded5c7c2196fe1b09,2025-04-08T16:29:05.930000 CVE-2023-5141,0,0,8a8f4aa44abb772350191ec0669f68b87f92aee5e05fef39e08d7ed28974e9fc,2024-11-21T08:41:08.730000 CVE-2023-51410,0,0,3fd46a1d2cdcc7e095c3bae89edfbfc71aee69434a2f5141e5dba583e17bbaac,2024-11-21T08:38:03.337000 CVE-2023-51411,0,0,354aca64560031240b5c859da270d7370e48be73069f6ed21db996641f3ceb39,2024-11-21T08:38:03.483000 @@ -241301,10 +241301,10 @@ CVE-2023-52625,0,0,d00ce206402348c1e8dfed55a457bfd186051d322171818247e0064bf0acd CVE-2023-52626,0,0,dac91148ba6fe2abc0db519a71410013a94a0d9f29901030eede33be206dfdeb,2025-03-17T15:19:21.573000 CVE-2023-52627,0,0,a056a3a8f7364aae9ec024daa399ef5ce0d23971c8439cbd8a7902e40ea1e590,2024-11-21T08:40:14.050000 CVE-2023-52628,0,0,3fde007300ab8339b5de4c0f6f892ef6ece799b0d0620cf6d8add943a9905090,2025-03-17T15:18:34.223000 -CVE-2023-52629,0,0,4397575617d15536dcd5f735ff905b76dbe7f8e0b9055c01509a8f500872b6d9,2024-11-21T08:40:14.360000 +CVE-2023-52629,0,1,eca57741c69ee95a3737f2fcda04a1dec7fc962f6db0548d10d46e36ddc68cc7,2025-04-08T19:28:53.087000 CVE-2023-5263,0,0,cf79e50f0f1b7619076e68c8fb3bbd8b2a6a7fa96228c9cab11bda71fc305d13,2024-11-21T08:41:24.237000 CVE-2023-52630,0,0,c87212efbf5139852fd7e71805df929a746c8df75c9ee82e120adfee45deba78,2024-04-30T09:15:06.730000 -CVE-2023-52631,0,0,2ea7e2ce9e6e65631282b310b2bd5c16cffff4054cc91f7639bdc3dd1fc81e9a,2024-11-21T08:40:14.577000 +CVE-2023-52631,0,1,c9c5b366ec4791a42b0ffa6d16153e48142243aa720c95e558e36f397c4042e1,2025-04-08T19:28:36.347000 CVE-2023-52632,0,0,855ec21292ea67ea0831b14c455b82d8e55976b6f6debcba7b811d02a12bbb9c,2025-03-17T15:17:57.207000 CVE-2023-52633,0,0,1fc7053c4bae8b11c9899de6a229c64850185e6c7287d597362701af2fe02ad7,2025-03-17T15:17:46.350000 CVE-2023-52634,0,0,0bc00625ba7edc0271a83000c51b6388315859295113da51130f53ad9c7e3d8a,2025-03-17T15:17:36.907000 @@ -241328,7 +241328,7 @@ CVE-2023-5265,0,0,3be8e5110f5a8eca568e8c9e8873089d4346ff1f83ab84fb39209889eeaf58 CVE-2023-52650,0,0,82cd733f79a1f4052a9c2cc8405d0c98244becaa4151159d589fc3401cc1df1c,2024-12-23T14:09:30.523000 CVE-2023-52651,0,0,00131e194f6b58054657b0e79a88a7fa1f8e43248fe63e6633670aa65dcb2d7d,2024-05-02T10:15:07.500000 CVE-2023-52652,0,0,ef1e9f279e94af2516aff4b86fb7557b56a3322c602be6d61196f38ed170f046,2024-11-21T08:40:17.397000 -CVE-2023-52653,0,0,37b6c74d200fb5853af83be13537943bd13d68387ca860aabce7cee062e3b3a6,2024-11-21T08:40:17.520000 +CVE-2023-52653,0,1,c4af0f2dfa924f154a5b63b87f1d10e5d009adbcfd121593aff5aaff206bc0bf,2025-04-08T18:42:28.773000 CVE-2023-52654,0,0,40b64d8df7f1095cc1aeaea203ad2b4c64f7ddffe42e4f417595ec90f73380c1,2024-11-21T08:40:17.703000 CVE-2023-52655,0,0,152954f723c448b886bee3d0ff25f0ab4449e6f0caf4b42d2ad37fc2a11c21cd,2024-11-21T08:40:17.820000 CVE-2023-52656,0,0,068e02073c94a4c784df5cf88e5fb25fbbebc8ce9c9e3ec4c810fcfc394df092,2024-11-21T08:40:17.940000 @@ -243464,7 +243464,7 @@ CVE-2023-7199,0,0,cde0dbd550f91a6bb21c09a38761272cd07970defff37e36c4c9e94445ad0c CVE-2023-7200,0,0,3c7e088e235f0c6bc0c55c6bfe1c4e0f40bb031bef20ea59553b0a33a6746e54,2024-11-21T08:45:29.587000 CVE-2023-7201,0,0,20f5fb9a8b28ae604ebe19392f1a4262b09dda75249c2f47898985ed1b0a1d04,2024-11-21T08:45:29.710000 CVE-2023-7202,0,0,d459e9057b2bc8fd30a6f8219c093fc90bdb1964c7dcbb0dd10ac037576830ef,2024-11-21T08:45:29.907000 -CVE-2023-7203,0,0,52ecc40bae648f87f010e13f347443580a8ae2bbce6ee0f73a54acb70e72d84d,2024-11-21T08:45:30.120000 +CVE-2023-7203,0,1,6e8a02f45eb1aaabea52b40f04d4e30cb4257cd43dacfbf1fd9f8b1f7aec488e,2025-04-08T19:43:37.427000 CVE-2023-7204,0,0,0792189881fda8b7498faf7aca2d846a8e28ed085511e9038424f967462cbe60,2024-11-21T08:45:30.343000 CVE-2023-7206,0,0,8f4d505e00f8da8413dd7d513710cc80f9d23e5f936ca98e57a1bf7631bb1218,2024-11-21T08:45:30.470000 CVE-2023-7207,0,0,0b44587082f37056899259105b6e7f65d8dd48fbf6bf858ab4dde7fa8100c548,2024-11-21T08:45:30.623000 @@ -247505,13 +247505,13 @@ CVE-2024-13056,0,0,2a579c70383af6c1823f3194e42b18390b0b4f81be433e074d29e63765e5e CVE-2024-13057,0,0,b4317fb8b1891e8395b711e805931c5a80c442d3f400a693a4524e7a3dccacf4,2025-01-27T20:15:33.200000 CVE-2024-13058,0,0,c5644ef89750856e75c92a38ebb4acb3842af03f9839dca175c3cdbf779a267c,2024-12-30T22:15:05.957000 CVE-2024-13059,0,0,2d881063a2f558168a4ad177a9a31536f3417e4d6cd540b2c801f355fb5578a9,2025-02-11T00:15:28.563000 -CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000 +CVE-2024-1306,0,1,ede8dc4e824945d41665cf4179ae38d375e8419c5c16bdbc3ef3275fc6492272,2025-04-08T19:43:28.627000 CVE-2024-13060,0,0,15f92c27d6f1e0216dedd625009ee1f9539582e30d977bcf6495f3d4816446f9,2025-04-01T20:34:17.010000 CVE-2024-13061,0,0,f0d229ddc53c34e4105e6b89d4e6cbe6fcae50e1fc38e3eb92bb7d84d07d1623,2025-01-02T02:15:19.897000 CVE-2024-13062,0,0,bfb1ffc886a0949d9ed69f7e0da80e7f91792af21c2e02f1c9f10695e7c5c742,2025-01-02T10:15:06.153000 CVE-2024-13067,0,0,88090e840b3eb16364a9de2c5803e7f10980b773fb2b293e3c6465c18bb51719,2025-04-03T16:29:10.763000 CVE-2024-13069,0,0,7cef2ce3c25be223a78f7b7df986e019faf87fafb1806d212c60cec672fe1183,2024-12-31T16:15:25.580000 -CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000 +CVE-2024-1307,0,1,d3b3495e2f3c1e53dc04b576c476f515c15a852d04ebb3b4b8251b1e16078228,2025-04-08T19:43:21.050000 CVE-2024-13070,0,0,788f97878c3ca15ae033f63368cdaa6d306c9777e375d6a686342b8883aa11ce,2025-04-03T16:29:20.227000 CVE-2024-13072,0,0,7a8ad14b1ed7c23164b3aeb991b8b95fcd9c163183ab3d56dc1f71972768e26c,2025-01-06T15:19:09.547000 CVE-2024-13074,0,0,b3145914f52ca6d5dd659bb20d066b97e92ba16835da25dd623117489e68ef28,2025-04-03T14:52:28.923000 @@ -248258,7 +248258,7 @@ CVE-2024-13816,0,0,0cc34a51d53a80c858ce2d43f6d4bd1247e7d0f4da717997083f594220381 CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000 CVE-2024-13818,0,0,b34cef01cb19d809209555e3902d48d3c034a9e483326b43d02f63f2eb6722a8,2025-02-25T17:03:16.093000 CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000 -CVE-2024-13820,0,0,d43d7495a9a9e98430c7e9df7198ba3c560992313431ffc1abb639c1bcb1b5d6,2025-04-08T05:15:37.070000 +CVE-2024-13820,0,1,3f47e2346a0959c05c93a153ce340ec2fa8ffde91098f5b8973269a0c75cf098,2025-04-08T18:13:53.347000 CVE-2024-13821,0,0,fa63e95562fe6d0f5424bef06c66fc83e2349c34bd54ad7786c2856fc307ac82,2025-02-25T19:37:29.223000 CVE-2024-13822,0,0,3edf451af12e328cb622d46a3fda862fd00644484907c17ca32254fbaff076b3,2025-02-24T12:15:11.193000 CVE-2024-13824,0,0,67482a69202c7d8524c2937123de815118d1a61f0eec42b9fce0e13c942735ad,2025-03-21T14:55:08.103000 @@ -248654,7 +248654,7 @@ CVE-2024-1708,0,0,9046bf6df7b5407027e6526b317a707fb0e597c8a478298cf2e268d00d5efe CVE-2024-1709,0,0,f75e75be5b68325f5e70652bc5e84a1c7f6bf9317747292f6c8f81b5bf5aa7a7,2025-01-27T21:48:25.323000 CVE-2024-1710,0,0,03b0301c04615fd11703e265ee09a925b1e771019388661955ff9ca3056da38d,2025-02-27T22:13:12.060000 CVE-2024-1711,0,0,c4463fec9e05b1118ee1bfddd76265d4a13e64e908000c805957c19574204370,2024-11-21T08:51:08.610000 -CVE-2024-1712,0,1,fdebbcb1d7b1c7ec991ba78bfd8ed7eed39b0c0d983fd7e0a307d27d960b06a6,2025-04-08T16:31:49.733000 +CVE-2024-1712,0,0,fdebbcb1d7b1c7ec991ba78bfd8ed7eed39b0c0d983fd7e0a307d27d960b06a6,2025-04-08T16:31:49.733000 CVE-2024-1713,0,0,2c4b0a7ec23a0438b0f7f0a179c6acb91b550ffcb40b7c7185413e8a48111cad,2025-01-23T19:18:07.843000 CVE-2024-1714,0,0,b234b1c111e954137cd5c21e719e75973e2b1876898036fcaf67defabe0a2443,2024-12-18T18:15:07.087000 CVE-2024-1715,0,0,a39c7238a47641a1559a03eccfc580fec09edf9e40fae3465f0a89c38d32e634,2024-08-02T15:16:31.550000 @@ -248841,7 +248841,7 @@ CVE-2024-1900,0,0,d1681c8fc7d747108f96463045705a997eaa303af36b5fd18ab38aeae53b44 CVE-2024-1901,0,0,ae2fb4d0db49c6bcf89bd1aeb69356a186cfc08c0bf34e22c5fc2117de6eeaf2,2025-03-28T16:21:10.993000 CVE-2024-1902,0,0,dc9150fbfc8e8407e248cfc687ffa0aa089edfe85cb497a2aed3531352c4bf8c,2025-01-10T14:29:55.370000 CVE-2024-1904,0,0,0cf7723d0c62c6cd3e75c38e78ad1d2cd4227a97de5199b013cae16deb74248f,2025-01-17T19:22:36.853000 -CVE-2024-1905,0,0,89e66388bf72309fd4ff9726e625980aab39e8c33d56a042fc26e7a64fb92fc5,2025-03-26T21:15:21.247000 +CVE-2024-1905,0,1,9da621fde24140d18acfd48a5e07773ebf9968a5093cf03a9cb142c049efb58e,2025-04-08T19:43:10.350000 CVE-2024-1906,0,0,65a5b580a4bb0499af91f7c60cbc491837104a1582f1628e1348e677652a4479,2025-01-07T14:34:56.787000 CVE-2024-1907,0,0,0d1c0a46d1573db072506f5b3966dd1201e193f5a385ced2f06af13f04d1ca5f,2025-01-07T14:34:27.417000 CVE-2024-1908,0,0,d44020120150eb7b39feca6fbace4134ba28014106094bae340333b7c5a78161,2024-11-21T08:51:34.483000 @@ -249194,7 +249194,7 @@ CVE-2024-20329,0,0,59bc89e172c3db01e2da16247216791562db76304a4e6467b9f47a122f82d CVE-2024-2033,0,0,8a9325accbb5e95011f069183eb95b4369668f581b52d1c64931eabfc42d1fe9,2024-11-21T09:08:53.393000 CVE-2024-20330,0,0,8ba79e64256db4e20d7f893356c700012d7764696ed4a35022c6cfb9fef2a9fa,2024-10-25T12:56:36.827000 CVE-2024-20331,0,0,7ac19cd54d374beecf09f7a9d9f0b2bee3bd547342030b289664e259437b39b2,2024-11-01T17:32:56.807000 -CVE-2024-20332,0,0,81d91889de71be17abbc2c646ca27dabcec4bd97ec9dc49c52192eb39dad467e,2024-11-21T08:52:23.593000 +CVE-2024-20332,0,1,cba9f4881d89f0b71c3df6cdc1331af652238ecb094a4677984cf47f34f72d1f,2025-04-08T19:44:31.590000 CVE-2024-20333,0,0,8e2fd6f0b062d71bcf9fa926927097bc7a56d2fdf082ea72f06b540b126cfeb7,2024-11-21T08:52:23.783000 CVE-2024-20334,0,0,26b63c2763b68202e61a56390161e9dc332049292ae867711c866bdf9b8dad9b,2024-11-21T08:52:23.913000 CVE-2024-20335,0,0,38da38af3b0a791913c57da5fdee6d056dbcc4c51a9bcdc9c7606a00e5b5c636,2024-11-21T08:52:24.043000 @@ -253613,7 +253613,7 @@ CVE-2024-26007,0,0,5566a1952f2701dd4149a375a6c93e3c6434006ebc54211b6a50bcacb2b01 CVE-2024-26010,0,0,aa94400b6d9b88521b847077f70baf8416af93283c6afed0d9452bca0e3c5cd0,2024-12-11T19:54:35.323000 CVE-2024-26011,0,0,c11541fdad772e94b22af8e91bceb09116d56319f79d2943860d22ca66673a67,2024-12-12T19:33:58.833000 CVE-2024-26012,0,0,8aa28068116e469ce60689bd893aa21d2c14e5bdc62c5fcdabf85329f80fa7f9,2025-01-31T17:25:06.157000 -CVE-2024-26013,0,0,bb11d51c2216468f0ebd7cc3c031195555023da837666df1a61bd2223079aef2,2025-04-08T14:15:30.863000 +CVE-2024-26013,0,1,7487745243541e17ee56dc164b6abad225e006bac2691226e73fd594f705916a,2025-04-08T18:13:53.347000 CVE-2024-26015,0,0,61e1ee285e159a140490fe9bac1615210ace2b02df5e5f1a9d7b48836125a67e,2024-11-21T09:01:45.940000 CVE-2024-26016,0,0,551548e94ceebe327cd043d6da7726194f348087a0883cfb1f63a672494915fd,2025-02-13T18:17:17.677000 CVE-2024-26017,0,0,04cda222e539a12656e61a62aaaa957af91c2a3bf44edf8b04502b71224b59af,2024-11-15T14:00:09.720000 @@ -254091,12 +254091,12 @@ CVE-2024-26644,0,0,cea9a7e4803c79d4d81c182e1c7e8b487ebc56704470714078d61743c1187 CVE-2024-26645,0,0,803ab785b6fcb895611f2c67dc2f31b17eddbb4b58024934e0d69dd94f439088,2025-03-17T15:20:10.733000 CVE-2024-26646,0,0,1a956380b6c5675e3cee7dd96da2aa128d2b4153800c767c2a0571c86be1ed93,2025-03-17T15:19:07.240000 CVE-2024-26647,0,0,0087defa8b2daf5e29c0c380220574740551b7537aefbd17ea5876ff9a0ca272,2025-01-07T20:15:48.587000 -CVE-2024-26648,0,0,57660c3f5372b373298dbe0cd29fd4332764e7181a5b50e285b698a5ae516b44,2024-11-21T09:02:45.723000 +CVE-2024-26648,0,1,c229e9e2813e4230c6bb499a6ef1a92638196aa90a2841bc89e1b7127b475cf0,2025-04-08T19:29:14.917000 CVE-2024-26649,0,0,affc58726c4d9b6522d6bde29012b9a628801f04a98430ddf530cfc9d83cbf05,2025-01-27T14:50:35.380000 CVE-2024-2665,0,0,9599114bbdfa2a0582ef31246d1d066104e4d9c0a632852f0476807f6686fd48,2025-01-08T20:05:50.257000 CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000 CVE-2024-26651,0,0,e5df3858fbaac21e38e92f06ac2c8cc92ccb9983ccabac4a6bf828860ce52995,2025-03-17T15:18:55.783000 -CVE-2024-26652,0,0,105744a3326cfd97769655231f5141eceba4e2c7ae5c2e6279ca9167a71c0f9b,2024-11-21T09:02:46.153000 +CVE-2024-26652,0,1,3f2ef8b3296b90582c7479704ac160fbb747783bb7c9ad50b3c6d4e0df59581b,2025-04-08T19:29:03.727000 CVE-2024-26653,0,0,8866d2d1752b4fe3a78b08cd6c19a2f178b3cbc04d520bc84ae31c43b66dc51f,2025-01-14T15:37:45.440000 CVE-2024-26654,0,0,3b9733514348f22bc9a84fa3928369488859dc6099e0c8c0edcee02b3a089651,2025-02-03T14:32:27.763000 CVE-2024-26655,0,0,44c6fc1f60aa28c9bb65a03278297b88c473f78c7cccc5d35bc94149a1733e48,2025-01-07T17:19:13.987000 @@ -254106,19 +254106,19 @@ CVE-2024-26658,0,0,fdb2631e448bd210fea3052df1cd33afa28ec2d71cfc06366e87396444d81 CVE-2024-26659,0,0,507bfe545d3becf9a9037a4273a711fd116e7c2e069ab02299b078f3fa8dd37f,2025-03-17T15:13:19.260000 CVE-2024-2666,0,0,94c10c4038495e2feaf574a5456d0064fe9e83a56f9b4605d7001b425c92541e,2025-01-08T19:47:15.707000 CVE-2024-26660,0,0,d97ef48df8f75a6efd9cbd18500b3e55e890bd3c88a6fa592f9023cbf997be07,2025-03-03T17:43:32.960000 -CVE-2024-26661,0,0,d45863d2e30232e358edb0d1a1e889067585e710a0e2ee684c544bcee0a67515,2024-11-21T09:02:47.317000 -CVE-2024-26662,0,0,a88f4521b9b995afb0e21d9f507fb182180356687597cd7121dd3a6b42115b74,2024-11-21T09:02:47.500000 +CVE-2024-26661,0,1,4fb6edb1f36c844bdad84ee30c94b41feedb9399dc22f462e023828aba29cde8,2025-04-08T19:25:13.270000 +CVE-2024-26662,0,1,47fb646cae08256595e170eb9893e3a5ae79ba27fc657c0078d4147e4db3a5a1,2025-04-08T19:25:02.407000 CVE-2024-26663,0,0,74a791432f5d59cb2bc083592aaf9ae5c64f10e827e4bfdc39da1da462ef98fd,2025-01-07T17:20:30.367000 CVE-2024-26664,0,0,9c5508e7dd3d001bfd5cb60b1e75db16edecdc362f4785202977db09d90d87e4,2025-03-17T15:13:10.637000 CVE-2024-26665,0,0,04e35018512b09eae41fe71b4b81c45f0e7114f3ffecabc85d6f1b7e0a6a51f8,2025-03-03T17:36:42.837000 -CVE-2024-26666,0,0,f3d57571a156c221255e6ed43ce466550f0474a9e05c86712515e781d1d5dfe2,2024-11-21T09:02:48.060000 +CVE-2024-26666,0,1,db4ad936531a6340d7734ec0b24449cc1afa5d56b5706fd58d584ddb73a0a938,2025-04-08T19:24:39.293000 CVE-2024-26667,0,0,e4cb9dd443d3b01dd2ad5452212fef391108d930ced9b29e0157a4c2b2b8b9e9,2025-03-17T15:04:31.197000 CVE-2024-26668,0,0,814e930dad36470a2abed92bec76dc2cabb31e6c74c96407271e4ed592944ddb,2025-03-17T15:04:22.180000 CVE-2024-26669,0,0,f953883a34eae729598de811e3f0aacdae680426bf21638d207965ae006010c6,2025-03-17T15:04:10.660000 CVE-2024-2667,0,0,27b21a53eda6df055088fa7ca753cc0e39ec841212da03554fec70e1efe6b4e4,2025-02-06T18:05:25.020000 CVE-2024-26670,0,0,d32fb02be9a8934b8f11d93094d51b59f1d786e8af3d0d09d8baf3ede1364523,2025-03-17T15:03:58.880000 CVE-2024-26671,0,0,f3787107a3aeafc204b8f8c110a7f153493d0c8a550d8ae2540a199fd858d6aa,2025-03-17T15:03:48.280000 -CVE-2024-26672,0,0,c70a64110bcd68bbde0a906463b82213fcccd910d662981df3a389ebb7bea170,2024-11-21T09:02:48.840000 +CVE-2024-26672,0,1,11deb996bf78e09a068e6a77cfcbd798fea3d714100b89f2b027e392eb2fc2fa,2025-04-08T19:24:08.673000 CVE-2024-26673,0,0,18126b23ebbb3349e334a596cbd43b765f7378480ff57061c9de666c560fd5b7,2025-03-17T15:43:02.517000 CVE-2024-26674,0,0,a7def8d3d8370efab1d03b5e1019dcbbc48dcc907eeb19f517fd753f34cf6bf5,2025-03-17T15:42:54.880000 CVE-2024-26675,0,0,7cd4d73c762323b0ebcbb68814d648e41354c78f3b87b8e90a5e81ea318a1a58,2025-03-17T15:42:44.150000 @@ -254270,7 +254270,7 @@ CVE-2024-26807,0,0,51524658cc01dd1e361a08df9d4605239bbfd0a93db5e3b5c528b73815190 CVE-2024-26808,0,0,45e1911707e2ce798bae29d3102741e23c8b168e11638aad40a06add2af3f08a,2025-04-04T14:21:16.990000 CVE-2024-26809,0,0,bbd3925ce680832ff739963d7071fb5f911c8e070b89e06a876adb017e20c048,2025-03-19T16:19:56.507000 CVE-2024-2681,0,0,09637121fb785cf682a8dd0ecf80a1c8447b09396e0be9cf76bee7528ea996ef,2025-02-19T18:17:19.687000 -CVE-2024-26810,0,0,5b78c798ab699830f25c706791bc5869344bd655b9540ce5b00869b839745e17,2024-11-21T09:03:07.600000 +CVE-2024-26810,0,1,7ccbdf8c8be11b508d83ad3d178150cb1b2ecca2e9ba6d575b9acd0ad8136c6a,2025-04-08T19:20:46.490000 CVE-2024-26811,0,0,dc3f597a02e4d45f823b41846ed47d9e5bdacf9ae78e65dedf7d0184730be610,2025-03-27T21:37:50.797000 CVE-2024-26812,0,0,902e8fe70f82a1cd9e6e81b66f93f93de8df5bc70a353813308c69ec229ef56b,2025-03-18T17:04:12.737000 CVE-2024-26813,0,0,d5b7f2b6b4f59a7ab93dfaf0cce6b486b64b40821d4f07f5dc544253006ebf3d,2024-12-20T14:30:24.357000 @@ -254289,7 +254289,7 @@ CVE-2024-26824,0,0,36f11e0915841bb6be3a03d1680ae03124972352335be1bde74ee17b33c70 CVE-2024-26825,0,0,5ce48738814319bfdc0872ba26b2b463e8d87f9b2edf67de8e88f9e8483cffae,2025-03-27T20:56:39.283000 CVE-2024-26826,0,0,ef7b75c128b5631f4acb91497bc6db3efb75b4e39a3d93ea904f63614f9960ae,2025-03-27T20:57:04.587000 CVE-2024-26827,0,0,4cc514efbe22ca04935a47f409b758351113d51b04fbbf02df44e27fcf8c06d7,2024-04-18T15:15:28.957000 -CVE-2024-26828,0,0,bd00e52c625d709e58fad6c68a7b5a17f577546fe0f6a4f902334be57e619af3,2024-11-21T09:03:09.600000 +CVE-2024-26828,0,1,84cc1261ddaa48629277944c8edcecccf8c15c1a0d5d26c02dc97eff20614da7,2025-04-08T19:16:26.800000 CVE-2024-26829,0,0,33b858020b676d55d8dbfd0b8da63d045ba99285dcf6c6b1575c915b01f21130,2025-01-14T14:58:05.850000 CVE-2024-2683,0,0,d31db9b74162f34437448255d1f05adaf71bd3df21d7a1817f74540be30fbc76,2025-02-19T18:17:48.753000 CVE-2024-26830,0,0,2e2d3d6269a8cd6a1cd47762591871dad624cc396e1ad5b9c684796d0e57ebe7,2025-04-02T13:19:07.453000 @@ -254385,7 +254385,7 @@ CVE-2024-26911,0,0,e979a8a74dcd1427a2023e0f6f06ab14470f5a77dc6da16e1b01fb62ca6d7 CVE-2024-26912,0,0,af2960e26c21d51b40d9a2f4d23d19ed971905cf5d8304da3c4d7035350ccdd0,2024-11-21T09:03:21.943000 CVE-2024-26913,0,0,4b087974b6cd2d28bb6095eb731e4763f913035a4ccf5f3760fe80e579278043,2025-03-07T20:29:01.043000 CVE-2024-26914,0,0,87cddcd687f0c5f3091be3532d54a2204a35b10253c4c61f7740c146626894bc,2024-11-21T09:03:22.227000 -CVE-2024-26915,0,0,16f52bfb3e577eebc6d2599d6112556de57060d7756ddd977271e34d91c2bde7,2024-11-21T09:03:22.360000 +CVE-2024-26915,0,1,33b279abf30d4098bee5c585ee2bbc4321957ad67f72a31616f269cc9f67db99,2025-04-08T18:56:18.657000 CVE-2024-26916,0,0,7d08689445b962f57999bd6175bdf87b0d4c80905ad2c2d6ffd97738de7148ff,2024-11-21T09:03:22.550000 CVE-2024-26917,0,0,5e07d74e7b663a3ab962de2f0598449aa985618312c6c2dc2c0fbf3dba2da6d5,2025-02-03T16:18:26.460000 CVE-2024-26918,0,0,e7bb26f389a5a5916198efb78afb6d12bb2b7711e670c6a544e944a53023f715,2024-11-21T09:03:22.790000 @@ -254411,7 +254411,7 @@ CVE-2024-26935,0,0,57b6f698c25c97ecde915494ca6f15e62c5e3a9e42413ec44564d14c28887 CVE-2024-26936,0,0,144cdd371322134fa6d98993e0f4fd26022aa1c68b494cde3f81066b3fc31841,2024-11-21T09:03:25.637000 CVE-2024-26937,0,0,84abd147e2de87068c8552502e9d5f3a03b4298ec190da68d4135b0c4ca63f2c,2024-11-21T09:03:25.757000 CVE-2024-26938,0,0,0c70fb2feb140bdbececb331d09112c041df234a19fd4b8b218a2ac066b95c14,2024-11-21T09:03:25.890000 -CVE-2024-26939,0,0,c3fb2db696e04ae1904b668515e0031ce50a5de2baf1f29a140797ebf4ff5018,2024-11-21T09:03:26.017000 +CVE-2024-26939,0,1,e5d1ed15734586d8c0721b0432ccfc640cca2195176ec9b6809d2489f2c8919b,2025-04-08T18:55:49.513000 CVE-2024-2694,0,0,4d728e1d04ebd874b9753d4251373dca1c8d4686a42dcbe990217886910977cf,2024-09-03T15:10:54.557000 CVE-2024-26940,0,0,34c47a54c4ec2b8de5152bd6afa4735b3aa9378b8030a82ab47dbd84486bcf18,2025-03-20T21:34:39.207000 CVE-2024-26941,0,0,e5ae6d1a3983ec93dbc1ebb0a1587dda9da5ac8274be6169e8d6e3064e41052a,2025-01-14T14:37:37.710000 @@ -254452,23 +254452,23 @@ CVE-2024-26972,0,0,cb815d256c738176b35ac7d4b54a98540b3097e6a6f896002f385b4cd625e CVE-2024-26973,0,0,cf8490afda62a71ab194e612ff9edbd6861c2de2e9b04c48831b88a77daec63d,2025-03-04T16:25:57.333000 CVE-2024-26974,0,0,0e4a56366252557edbb2b1398208500709b44987bfad59520bf0a9bd4532569e,2024-12-23T14:00:33.587000 CVE-2024-26975,0,0,4961103f5afe82ab19bd2d5c28d95ec6a0e6e841685afff291147442422c4ce9,2024-12-23T14:02:46.103000 -CVE-2024-26976,0,0,4660a52215caac481687e5a7d29aecca4ed04fa21a373cba57d090e5d9c5d1a0,2024-11-21T09:03:31.953000 +CVE-2024-26976,0,1,d3d0c459bb86585ae7c7fafb98ddbf8089df654945c999eb9b3959d366e1026e,2025-04-08T18:53:44.430000 CVE-2024-26977,0,0,1f7a8de5cdeaf46fb8b3e7c1f9a003addb59f518218d0554d394033af057c58f,2024-11-21T09:03:32.193000 CVE-2024-26978,0,0,9f0afb61ebfd2a81c4c460b2c8d0cee7dd4d2cd6d33af2f1fce5b729035357bb,2024-11-21T09:03:32.417000 CVE-2024-26979,0,0,33d8a117099141e9ac17b778389695861dbfcb2a950ec3472e402d03bd709b88,2024-06-12T16:15:11.147000 CVE-2024-2698,0,0,92caf5de1a4db3d2766017db2b8c2c83c4ffe4ed3a628a64f14163835fb45ff5,2024-11-24T17:15:04.170000 -CVE-2024-26980,0,0,c664518d666b8dc60398076a7315aa316908c8287d246e166912ba77399e9ec0,2024-11-21T09:03:32.600000 +CVE-2024-26980,0,1,33127b0f3b1e367e5146709d874af6b88b6f9441709434f5a7870c7d434c8d8f,2025-04-08T18:45:21.210000 CVE-2024-26981,0,0,e3d85d4378a3dedaa0ea4ee82c134e38e306ef680bd7e72d630d02192612620c,2024-12-23T20:42:57.277000 CVE-2024-26982,0,0,0520ce6408fb5ac397a5d52a602e516a6a3e209adfa6af0fb381a0c5464d370d,2025-03-13T13:15:40.163000 CVE-2024-26983,0,0,668befa1524b84eb804e032a2857d5c5316ec13983095bd9d2f5e231c1910c36,2024-12-23T14:53:02.043000 -CVE-2024-26984,0,0,d5fba52a36226feb49bb95128fa870f8c609ab762c84661aa0776867387cbc6c,2024-11-21T09:03:33.177000 +CVE-2024-26984,0,1,ce16cf4098b5ea714220075d54f7ce247c66aed28151370bcd4a5f15f56202c0,2025-04-08T18:45:02.520000 CVE-2024-26985,0,0,828c1d0fb4c1394a0226e133cac1cf8633b8aef9bacbe1c0d4677aeab25a0507,2024-11-21T09:03:33.427000 CVE-2024-26986,0,0,2d5e90c27de03273df3c3a4dddba5f37390a47f124b9efbc14fb5a174055e902,2024-11-21T09:03:33.550000 CVE-2024-26987,0,0,d9201e7da7cc0d6b520adf309274caea80c709e3234541b4cecdf14de37f61bf,2024-11-21T09:03:33.697000 CVE-2024-26988,0,0,b72a6db8cb813c5d17d4c81d91c1ef7ed8f0b453c7d8a85ca9d54b25cb6c75f5,2024-11-21T09:03:33.830000 CVE-2024-26989,0,0,b184e6e01f90b2a80d2af168f35eaddccd2b3f1da296eb258e1d53040db364b6,2024-12-23T20:43:38.437000 CVE-2024-26990,0,0,89cea06ef826df46e7704f1d21f5fb884d6cccd9351cbfac6cbcd01fe7d1300a,2024-11-21T09:03:34.077000 -CVE-2024-26991,0,0,5ca0e3dfb8785d1dd6af26259ab6001bbd5fc97c812a77b9f9046aab9aa5779d,2024-11-21T09:03:34.190000 +CVE-2024-26991,0,1,7b42b7cf38efecca11c9cf33d815cc8cff45686c57f0363f55c8f2a67d250c49,2025-04-08T18:44:44.460000 CVE-2024-26992,0,0,ad3ac1c7673016b954170907d87fe9446feb8c3d161c5585a2cb66416d0b91e0,2024-11-21T09:03:34.383000 CVE-2024-26993,0,0,2ff36cb9b8e8612f133155256ff088e8fc6fadeac8bfe9bd768370696b2acb88,2024-12-23T20:43:56.733000 CVE-2024-26994,0,0,49a17eef060f9bf1ac9d1914c993c3487e3fb0420f3a94df3698d8f979c9294c,2024-11-21T09:03:34.623000 @@ -254483,7 +254483,7 @@ CVE-2024-27001,0,0,68a5501bb9c3e0b332c21c192c280c2859679c23e4fc027f83619dd9c1512 CVE-2024-27002,0,0,9cf0cf5fd72a2800002a56112a73db55f28b9b7dec4b320c79f00b5eed92cd99,2024-12-23T19:51:06.733000 CVE-2024-27003,0,0,c203f45c8f1d97bd302649094986ff5258c4f7bfeefce3cacd9ec66ba70661e7,2024-12-23T20:39:58.963000 CVE-2024-27004,0,0,f83d4726c9eaf02e20d27777484adeba44d10c3f8142914019d0b828afc6f9ee,2024-11-21T09:03:35.970000 -CVE-2024-27005,0,0,90b0627f5d8f37de60d811f44c5fb13c405a58e5343912faef8949e8f1b9ab45,2024-11-21T09:03:36.110000 +CVE-2024-27005,0,1,b35369562f8d6e81058993f9c7f5ceaa7d666bdfe292f82cdb7ca679dedb5e68,2025-04-08T18:43:15.860000 CVE-2024-27006,0,0,f99857766778f03ac72a3c7e775775eadee02d9df0193c5fca85f4242b8c61d6,2024-11-21T09:03:36.310000 CVE-2024-27007,0,0,f2a05b178ac4106d9070d246425a81626e2e0a7f121bcd24031c8978d22c585c,2024-11-21T09:03:36.437000 CVE-2024-27008,0,0,497e746f8e4209cf773e775bf9e69b7d9aae6cf615610957263a1f2a779243ac,2025-03-04T16:43:49.613000 @@ -254507,22 +254507,22 @@ CVE-2024-27024,0,0,ebee5e148de6b3dde2fcaa8816a9f4f8ed64a771f098565be007ca61974f2 CVE-2024-27025,0,0,5c3859f46c671ad7ffd95b4676d27d7a5d64666b3d74e9808cc4d7ce65e2e8ff,2024-12-23T19:24:12.370000 CVE-2024-27026,0,0,14bd71e4d284e66f0b970806b4099453c4b7765e00bc79f2b6dca1205180f51c,2025-03-05T15:18:05.380000 CVE-2024-27027,0,0,ec024f008e45533c7aa91a2939bed64fbe577975d8b93228076417e0feb7b7fa,2024-11-21T09:03:41.650000 -CVE-2024-27028,0,0,4246551a6c16b60a708e8d31512be639408dd731b44c719c490d0705c79e5515,2024-11-21T09:03:41.770000 +CVE-2024-27028,0,1,0b533a85014d97bacea694b3c2ac18a295b5c7293a8a7cba3ef9f45538aa8025,2025-04-08T18:42:15.227000 CVE-2024-27029,0,0,1bc28b467b9b9b92bd81e2a843981108d7a2bcb3adede434c7103dc028886ab0,2024-12-23T19:33:28.437000 CVE-2024-2703,0,0,c9a68ebea086b1029008af78c4567f462cebcbd1c90bc610ff5a2636d7089ddc,2024-12-12T17:26:40.867000 CVE-2024-27030,0,0,81a42d017ff2a2374aefa7bff36a9e82fcf707ef94a2c0aee62e28c0194051ea,2024-12-23T19:33:10.110000 CVE-2024-27031,0,0,3810e513d80101e5db5de2e8bfd860ea05053183ef045a88846dd8babb3a956e,2024-12-23T19:46:47.357000 -CVE-2024-27032,0,0,e068ae8ac1d8d474830da7be0da09ff4c92e7b237812b93a406b780ffdb2a3fe,2024-11-21T09:03:42.353000 +CVE-2024-27032,0,1,e351a7dd4abdc1b5678c8024603823170eb2c7257a02466fdb8791080b4dba28,2025-04-08T18:41:55.580000 CVE-2024-27033,0,0,4bf66f03e6ba3137d8ecf573b1befe4641b1146e2898ed2cc6aceb52eb888a44,2024-12-23T19:12:40.210000 CVE-2024-27034,0,0,9874c1db278dcfc3bd6c43a5a9c11e614e2bc1b6c5f73a3182eb8a7c8608ba84,2024-11-21T09:03:42.663000 CVE-2024-27035,0,0,a3f223514d69e22d1cc0a4d7abe8b095509dba5ec3f4c12adcfd6c587d9748c4,2024-11-21T09:03:42.797000 CVE-2024-27036,0,0,dfea46e2522d2d18e0cc6a9be82afdac129cdfaeb38d9953b97399c588ca691e,2024-11-21T09:03:42.940000 -CVE-2024-27037,0,0,3e725300d6a4526e55f969539b8217b91220992a50dd1eacc11de8caeecbafea,2024-11-21T09:03:43.053000 +CVE-2024-27037,0,1,78b49dd2f00765578d79792778791b4043abe2ed446987bfd465e16eb2dac836,2025-04-08T18:39:41.400000 CVE-2024-27038,0,0,0cd4520e6799c3f265e4fb485baf4b7f8b0b9699e5059dbd616173307c83dbe5,2024-12-23T14:11:28.137000 CVE-2024-27039,0,0,b5208e7380b924d92f69017aea5f13f8418ceb2f3e9287ac96416ef79799f293,2024-11-21T09:03:43.410000 CVE-2024-2704,0,0,08574c4c93b7eb8d39fe9ad19e5915cf67b4518a9ad69e3b003ae0373a536a61,2024-12-12T17:27:11.390000 -CVE-2024-27040,0,0,daadacbb6e9e7c80fef17ec3ae32c519f0b5983bc589ce776ef1242d64bd3e8b,2024-11-21T09:03:43.543000 -CVE-2024-27041,0,0,763a17f6a488caa403465e7987579ba453cdd4097447f29e20834d9daf7dbe42,2024-11-21T09:03:43.730000 +CVE-2024-27040,0,1,14a1e734840ddb21b679cb4045f3e123187d67e0cbd2032b08d06d234a48ad21,2025-04-08T18:39:21.683000 +CVE-2024-27041,0,1,b5578c4f511656e924f9a233fa390b13bf1c7afa46e4323735de365fe70fbb66,2025-04-08T18:38:51.473000 CVE-2024-27042,0,0,87cc162a259f533a64a1299221ec2eab29cf0f72505d5036e1c5990c71bde103,2024-12-23T19:12:55.067000 CVE-2024-27043,0,0,65bc53462686f66e98fbf5b8eb04affbbfd0d964569943ec6ab2df2f103c802e,2024-12-23T19:13:31.163000 CVE-2024-27044,0,0,d9407acf9a323715f0614827a427d94c43b6cd02625bebf359c6271e309d347e,2024-12-23T14:12:17.657000 @@ -254532,20 +254532,20 @@ CVE-2024-27047,0,0,110bfcb96f9864c7ba7b9da588f0f76c61f22127fd896befdd7498a6178bb CVE-2024-27048,0,0,d61c922e329e61d71a6538afef7ec58451ff4d7886dc3f1ee0ae22a003c986a4,2024-12-23T19:05:50.830000 CVE-2024-27049,0,0,8e61077125a252948b0bb7222bc6a281c84eaca242a53e7004b44d5edd1ef12d,2024-12-23T19:11:05.037000 CVE-2024-2705,0,0,e626070f180caa122294e7f41895b56d79e384475450e8e9dbb2b4cc88f97f8f,2024-12-12T17:27:35.747000 -CVE-2024-27050,0,0,4121ff17e0e7ffed687d903c808e57c6a91a9fd4a37de7c8602de749e226af97,2024-11-21T09:03:44.947000 +CVE-2024-27050,0,1,3ab34f7bc6e9df93b5236d1c1110489dc1097c27e5e8a3ef357fba137f3d5a6d,2025-04-08T18:38:39.097000 CVE-2024-27051,0,0,29c4b363431a5a9f51f00fd8a89b743131cb7ef3c9e253b048cd323779287ce5,2024-12-23T19:11:23.533000 -CVE-2024-27052,0,0,b014ef3d70e7d52f212b070ccf280ec8602a40234d19cdb7cfeefe9fb54997dc,2024-11-21T09:03:45.253000 -CVE-2024-27053,0,0,fab5ac77fb553181428dd3f4ccb1dfcc138fd34b12976177a1399f1f5f83e7be,2024-11-21T09:03:45.457000 -CVE-2024-27054,0,0,56c6f67afa434cc0076215a854fd0036a15b86608accbe0d9b824b22834c21d6,2024-11-21T09:03:45.667000 +CVE-2024-27052,0,1,2390a1fc246ec2c992af7defe31751148173a78f776e7e22873249acd690819b,2025-04-08T19:43:24.513000 +CVE-2024-27053,0,1,1494a3178ba94485b321e16530cea9953829a930281e102af8a68822f6f8212c,2025-04-08T19:43:15.420000 +CVE-2024-27054,0,1,5c15e7d8f31e84a444af016eca40d73980997746f839be761e8197173f863480,2025-04-08T19:43:08.293000 CVE-2024-27055,0,0,7b39e69c60cdf41f6248e9f85b771f9c297d2438c8a24fe3eda1cac546961d77,2025-03-10T08:15:10.287000 CVE-2024-27056,0,0,35c027cbcff71c2fbb123d010c4d1c9a140deff20d039f8b0af167a2d8f43aeb,2025-03-28T22:15:16.373000 CVE-2024-27057,0,0,59020acf3ab82c0eef52cab6667be5665e673c02ff7c385265b72e8eb5c4ebf2,2024-11-21T09:03:46.097000 -CVE-2024-27058,0,0,e8e18c8efb56c2ad87995b6dc7ebbe8c01bb5c8a51c8ae719afbfa612893fc4d,2024-11-21T09:03:46.217000 +CVE-2024-27058,0,1,865694a7a9e07c31b00e33b9b8a7a107f1cb4ec87a25ef90620cb0990e18b4e4,2025-04-08T19:42:55.700000 CVE-2024-27059,0,0,b8d358dc987b94bc06e49be13c99ba48022e2070d952b9bca9d47418a24f172e,2025-01-14T14:36:42.747000 CVE-2024-2706,0,0,ec4b783f22cb2952cae8bff1153eed6be7a282f6f994a45b7c4840589cd8711c,2024-12-12T17:27:56.637000 CVE-2024-27060,0,0,22bda1115b48ba58b7256e3896819cc9078fb8284ee48e35606dd5d9241e5131,2024-12-23T14:22:29.173000 CVE-2024-27061,0,0,12baa08e47ca5ed53340b14883989e8216896ea3866d202dd86dc474a8f980f0,2025-03-05T15:17:55.297000 -CVE-2024-27062,0,0,1731f85c74cbfffe2b0174004fb7faa0936dcae34c056b7a42ec2105bb8663bc,2024-11-21T09:03:46.793000 +CVE-2024-27062,0,1,334bffe277d7f68dabdc05821a6a036d4f246a69a94960e8a874ae05b77a6782,2025-04-08T19:42:41.690000 CVE-2024-27063,0,0,7ee22d524b1409264e7967210020859acead09ce5897f02f265765222a640dd8,2024-11-21T09:03:46.987000 CVE-2024-27064,0,0,51ddac2c3289f375846afce0848ba809f5baf86f50157e78463267321c7eeb6e,2024-12-23T14:17:03.783000 CVE-2024-27065,0,0,221827fd02ab4968130a505b9d4bdc94fe096149cd3724664a74f1ccf7bb1171,2024-11-21T09:03:47.243000 @@ -254556,8 +254556,8 @@ CVE-2024-27069,0,0,e9743f38f3b0307385f1bf26cbe4e0920b023cc4f5b6078577cef6174c9c2 CVE-2024-2707,0,0,1c5a60cef474a81d1fab363355d07e4a7ef12a7bda1b4579797c67ff5ecd783a,2024-12-12T17:28:32.270000 CVE-2024-27070,0,0,22450b1e71cb2adac794b5cbb8e2ca5758570f50b2f3b5e5e4b60759a7b88242,2024-12-26T20:25:12.927000 CVE-2024-27071,0,0,f5c95a4e265b74c4d8d05696d83ac5ecfb071a5a01e7c5104e1365de1e9db89f,2024-12-23T14:27:46.877000 -CVE-2024-27072,0,0,dbf4bba440af57458f216ea6e1cce4da447124fd45b4acb93cabbca6afe511c6,2024-11-21T09:03:48.090000 -CVE-2024-27073,0,0,68e4926038b809a77ddca4e47a4755a38e9227904c05e5228b0114227f4229a7,2024-11-21T09:03:48.280000 +CVE-2024-27072,0,1,8d300a72c86f1de9367ce16fde876a161bea793bf4cc5477683d837e810fec2d,2025-04-08T19:42:22.757000 +CVE-2024-27073,0,1,c2e8db9c9e6413c6882547940cac2855d86e223b427a5ad2d7d7c4bba9fdd3a8,2025-04-08T18:54:36.537000 CVE-2024-27074,0,0,cc7d332d3c20aabde40b8a4e8101d924452acefac2855cd8c9d9be38ae5668c5,2024-12-23T14:31:11.797000 CVE-2024-27075,0,0,bbc8253a771dc51806d5205d7483e1a3fb0cf345232dab1fd0c81023001aa714,2024-11-21T09:03:48.593000 CVE-2024-27076,0,0,67207a2d32a43cace3a63d153fb1693a83721d20345be41ce05847c86c97c805,2024-12-23T15:08:03.860000 @@ -254881,8 +254881,8 @@ CVE-2024-2739,0,0,bbf7d706016e4b5d6720a148e492ec8c2b85ab75b873dcf890b3a36ec5799c CVE-2024-27390,0,0,7780428a286bfe2ad84944e0e3c56b2f0984a92e2b031a42317e22e477ac14fc,2024-11-21T09:04:30.793000 CVE-2024-27391,0,0,74e7ba782a652174d6e44269cc22f7e3eae02e2f8b1404503a1469482e17c178,2024-11-21T09:04:30.910000 CVE-2024-27392,0,0,51788877a716c0011203ead65a89d91afe3ce071b5d9cd963e34730d678899ad,2024-12-26T20:32:43.923000 -CVE-2024-27393,0,0,7acb0ea1cd19fda4e5e2f41152272208ba891fcce16f238ba8adfdf815157c77,2024-11-21T09:04:31.160000 -CVE-2024-27394,0,0,b26d808a796a57c43a2737a6a589c18d606c49ce4d9b02ac0d6935ec64645293,2024-11-21T09:04:31.353000 +CVE-2024-27393,0,1,1c77bb74ee1027f94a6949f4b58069e34e948ee5fefbdfac809f9115bb583957,2025-04-08T19:42:11.457000 +CVE-2024-27394,0,1,136ddc22b965283e112ddf72357ec6192932a84195db8061dac00d46e8315d81,2025-04-08T19:41:12.423000 CVE-2024-27395,0,0,574d9fe9b6861b86a67985da6f3829a04cbab7adac1a4f8c46394c30d29e001f,2025-01-14T14:27:22.167000 CVE-2024-27396,0,0,619052d7edfa2606a0df6550296e33629a00872a87588e2fdde8447ec8bbd43c,2025-01-14T14:26:09.117000 CVE-2024-27397,0,0,4595afa48c603548fe9064267f2b8f9ceb27979b1740551c0b2f88a81809c684,2025-03-24T16:15:18.030000 @@ -256089,7 +256089,7 @@ CVE-2024-29085,0,0,cc32c798ca94a9c499b922c9e141198212cadbc18a78905f260f607c30202 CVE-2024-29086,0,0,f8386da3f0d52a7567801d019c815cf7bf90221d72c043ef9d5776f1b876a101,2025-01-02T19:12:16.077000 CVE-2024-29089,0,0,30aa9ca77c70df19d13f418cb49ccc92807a86af53902c3476abc26c74f9f9b1,2024-11-21T09:07:31.810000 CVE-2024-2909,0,0,212d6092864ea8ef0ce591560bd67457e3ce8a4501b23e595c5fa210644143e5,2024-11-21T09:10:48.840000 -CVE-2024-29090,0,1,235abeb49b0597a8271d519e21ffe177ebf671c29a3b84525140058a8dc2be59,2025-04-08T16:38:50.373000 +CVE-2024-29090,0,0,235abeb49b0597a8271d519e21ffe177ebf671c29a3b84525140058a8dc2be59,2025-04-08T16:38:50.373000 CVE-2024-29091,0,0,001d79447f1fd937da20fef3e5028a795193f99a6f4e8301650bafcff28f24ac,2024-11-21T09:07:32.063000 CVE-2024-29092,0,0,fa448aa280a8a7df8fb2f21f502a9b3a0a3f09f91b2b699f093310eaab34a315,2025-02-05T15:38:53.443000 CVE-2024-29093,0,0,5e85ebe8afa5c7bbdc30ad2504cebdc2a8ad5bf8cc4008892cc1938c37a3dd06,2024-11-21T09:07:32.320000 @@ -256100,7 +256100,7 @@ CVE-2024-29097,0,0,875b77e2230e2e26de4a929ee2fe27956bef590824050f669e1da3fc89b9a CVE-2024-29098,0,0,9b1008b83cbe94703d043bfdf5904f8bef4f3123ac6a8137d811039c2b1c46f9,2024-11-21T09:07:32.980000 CVE-2024-29099,0,0,dfb287214effd2633f11d81c1ead997426bc5dc5ea4f7cfee32a840922e9d9ff,2025-02-27T03:38:50.780000 CVE-2024-2910,0,0,bbc5651269bc757d63b4a047fd6f50531f9ae2606d9c89885eef5674cb9b94c0,2024-11-21T09:10:48.977000 -CVE-2024-29100,0,1,7153277e36c5e72266fda5e7d9c5d08d4e3d6805c1eaf1454b0830389c8c5652,2025-04-08T16:40:26.640000 +CVE-2024-29100,0,0,7153277e36c5e72266fda5e7d9c5d08d4e3d6805c1eaf1454b0830389c8c5652,2025-04-08T16:40:26.640000 CVE-2024-29101,0,0,d68c9d48094a200a599355cfec1d238de1c4829e96d7df1fac520bec91454f40,2025-01-27T16:21:01.500000 CVE-2024-29102,0,0,ed935bbc4f82c0c84be43e4d1a7b61d5ebce7f3fd54cf950c79feff7a35ac46f,2024-11-21T09:07:33.500000 CVE-2024-29103,0,0,d41735cb9da95e849a5b45306d53d28ce564494ecee17e60023a3cbe91f78521,2024-11-21T09:07:33.623000 @@ -256872,7 +256872,7 @@ CVE-2024-30190,0,0,c1ee3f7c4079fcf440af04688987ea8a94b49f1ead7bea8a3a7ef5bc4308b CVE-2024-30191,0,0,c192831d1340a1f8de92872fcc669bc9702371340b6b6b256ee07c52924679d9,2024-11-21T09:11:24.210000 CVE-2024-30192,0,0,e673df472551d6b8fd5a2fe775fa5577daf8d1ee842b7399431ac6fed73462f2,2024-11-21T09:11:24.383000 CVE-2024-30193,0,0,539a44b67c38ec937205474e13699fb45c3f8c333f396c7fc353f02ec24e5112,2024-11-21T09:11:24.607000 -CVE-2024-30194,0,1,3ee35f816df53a9d0571182a12cff5a95063002a5adca1f19d2311012c883661,2025-04-08T16:40:00.357000 +CVE-2024-30194,0,0,3ee35f816df53a9d0571182a12cff5a95063002a5adca1f19d2311012c883661,2025-04-08T16:40:00.357000 CVE-2024-30195,0,0,56183fe1e8139f559e25d722c7b1a365fd5350df897212f1adb0b3a204b7eab9,2024-11-21T09:11:24.857000 CVE-2024-30196,0,0,37be30bbc04d77f14cce9a07c248621d1cd4a4dc4f56535aaf4096fb66ce57f8,2024-11-21T09:11:24.983000 CVE-2024-30197,0,0,e4c8f54b9d1294e8beac84ba32593d03defa4833d8073d2c84e97f457ebe0ddc,2024-11-21T09:11:25.110000 @@ -256902,23 +256902,23 @@ CVE-2024-30218,0,0,62ab1357959cfbcc7eb28f53243d1a18228ff767f9cfec29cd8382365b686 CVE-2024-30219,0,0,f7577199718dbaf17326d5228f5760508fb82afcbb46147d1ae70fe6299db123,2025-02-26T13:15:38.863000 CVE-2024-3022,0,0,c0b2ab18f4ddf27bd1888310fcf31460b206066adf8181fccf29aff5b55609b6,2025-03-13T01:38:18.387000 CVE-2024-30220,0,0,8b203f55b5baa8765b4143b55effdb05037bf59c6d794356b2325067ebd4a9b6,2025-02-26T13:15:39.090000 -CVE-2024-30221,0,1,d9b634f88748560963a3caa74a8b7b488592530658c74021a660a5b1a6abb2af,2025-04-08T16:40:47.867000 +CVE-2024-30221,0,0,d9b634f88748560963a3caa74a8b7b488592530658c74021a660a5b1a6abb2af,2025-04-08T16:40:47.867000 CVE-2024-30222,0,0,69800e6e6fc24088c6652503225b53f822421e5230f06bed4052b12efed4f108,2024-11-21T09:11:28.853000 CVE-2024-30223,0,0,3fc25919f1667d5a00c5c550c3492c7182dc8b60b8795a9bd0cdee538c5f3fab,2024-11-21T09:11:28.977000 -CVE-2024-30224,0,1,b0e2f0004affcad892d1afbabd7d164deda90b711091610eb140c13691381789,2025-04-08T16:39:44.773000 +CVE-2024-30224,0,0,b0e2f0004affcad892d1afbabd7d164deda90b711091610eb140c13691381789,2025-04-08T16:39:44.773000 CVE-2024-30225,0,0,650fab7b2e4c40c41c55f51f874e8c7d66eeb8bcf6eaa1b4d37d85ba802a69b6,2024-11-21T09:11:29.223000 CVE-2024-30226,0,0,50741aa468112dcaaea07d32c9e54bc6afbc372d8c0c5a51fcfab49fce8acef3,2024-11-21T09:11:29.350000 CVE-2024-30227,0,0,9c173945495eda2d9981763fd57ee34c67e315f1a5e59aea1f45e77e72875702,2024-11-21T09:11:29.470000 CVE-2024-30228,0,0,bae82ddc8fd5dc1643cab86dfb0675ea4a30b8239df3eaeed916854313d32bc9,2024-11-21T09:11:29.600000 CVE-2024-30229,0,0,a6bfc413ec8cdd153b81f6fa52c3949324a68cebd2a18280012ebd4a7c98bf29,2025-02-27T14:02:47.410000 CVE-2024-3023,0,0,263153a293163fa286e9c101f6bafff3237bb13b48d4d071321a37d0a1fdd8bd,2024-11-21T09:28:42.340000 -CVE-2024-30230,0,1,c4d63a9ec2b13d7e523cb94b9af957fb163aa6d005d2a1bbd7bf87a6b194de77,2025-04-08T16:39:31.563000 +CVE-2024-30230,0,0,c4d63a9ec2b13d7e523cb94b9af957fb163aa6d005d2a1bbd7bf87a6b194de77,2025-04-08T16:39:31.563000 CVE-2024-30231,0,0,f4c70af931c4a7dd93f57db08c46f6b181ba6718fd21c7de416dedb13c635394,2025-03-10T17:06:14.653000 CVE-2024-30232,0,0,504c2d526557d8455aaf3a0b19dae7a38c7019be0b80d9ec9ce07532d067d424,2025-03-05T21:15:01.303000 CVE-2024-30233,0,0,81d1f117bd3bababefee9fd012d7f155f07ab08571fe314121e0b75e3dc908dc,2025-03-27T18:56:07.040000 CVE-2024-30234,0,0,f25d5a0ad1ee024d43f2f2bb40e62db19507e57dac819fc5e44392e4f34e6603,2025-03-27T19:25:19.060000 CVE-2024-30235,0,0,b2c4f57b4563c0044433cc89cae813d48dc16e7df7e1220a14d67430afee5c8f,2025-02-07T16:54:26.067000 -CVE-2024-30236,0,1,81db04902ed1a9159e9727f2ba6771872127105845fe38bbd7a440953b16d761,2025-04-08T16:39:14.740000 +CVE-2024-30236,0,0,81db04902ed1a9159e9727f2ba6771872127105845fe38bbd7a440953b16d761,2025-04-08T16:39:14.740000 CVE-2024-30237,0,0,939a8bcadb7b63965cb9f5b533e4dc6d69106e1beaad0c41f1e0e0db25e59f5d,2024-11-21T09:11:30.693000 CVE-2024-30238,0,0,ddc7f88fa97c9acddcbdd95b3238ad3310c0604e68d74437ff79fd24a67bd420,2025-04-01T18:32:27.370000 CVE-2024-30239,0,0,9132f8dff38c94a9158c4e428fa5fb533b78831229696aae31c2cfd1e8f955f6,2024-11-21T09:11:30.943000 @@ -257165,12 +257165,12 @@ CVE-2024-3048,0,0,b45859794096e9789b16af327bbbaf4ffd55ea7d3fdff52dc4d2a53dcaa166 CVE-2024-30480,0,0,2e15e0231151aa8e84d8885d70d7113ba628105d9affd7bdb295edcc9c141e57,2024-11-21T09:12:00.427000 CVE-2024-30481,0,0,8631cbb9c51a50d99523b794faa2947095770ff7160a8a0de8a87dffb815cc03,2025-03-14T17:15:43.727000 CVE-2024-30482,0,0,f16efce3b0eed7fab2fe9a35a331c3bbafdeb8eda41efff6fe45ca866003c709,2024-11-21T09:12:00.690000 -CVE-2024-30483,0,1,77901ef91c5ac3a21f7e5b31c77894523145af0ee84fa46e93b8cba650cba3b5,2025-04-08T17:05:11.560000 +CVE-2024-30483,0,0,77901ef91c5ac3a21f7e5b31c77894523145af0ee84fa46e93b8cba650cba3b5,2025-04-08T17:05:11.560000 CVE-2024-30484,0,0,1fdba9dc6ba163c6ba4b9414dc5d5c3d692e31129a19f55068cab57903ac52c7,2024-11-21T09:12:00.917000 CVE-2024-30485,0,0,959873beb181fc032ad160c5aa64db18502af2ec0b5777f048b062bd1212809c,2024-11-21T09:12:01.057000 CVE-2024-30486,0,0,2636b7ca72fcc83ab76e46ed85ccf7083244ca1fc5ae3da9251ea650daeb7e77,2025-03-13T02:00:09.523000 CVE-2024-30487,0,0,44e76078517893bf1cc3851df2c3f60079ad355c29fc120ead15ea5e778782be,2025-01-31T19:41:37.667000 -CVE-2024-30488,0,1,a5479c9bd75c370bd37aba09250aac06edbcce2d13aed0aaa23b57f8a641ddc0,2025-04-08T17:01:49.073000 +CVE-2024-30488,0,0,a5479c9bd75c370bd37aba09250aac06edbcce2d13aed0aaa23b57f8a641ddc0,2025-04-08T17:01:49.073000 CVE-2024-30489,0,0,746eb42c1d4701f5dab7993ae5fc87612143a868b6199455ec72c55bae79c78e,2024-11-21T09:12:01.587000 CVE-2024-3049,0,0,20f7e76b72edf5855d588d0316ed10874b8207f2f3b8002bded49efc30fa22c0,2024-11-21T09:28:45.870000 CVE-2024-30490,0,0,d6134cbb402eab81b5496c3a10a0b1901817c22ea2db064481c9735634f40605,2025-02-04T20:23:23.073000 @@ -257187,7 +257187,7 @@ CVE-2024-3050,0,0,ea924fda60ac78bc036804edbc9b66e637782ae6170917108b2ab388bedf65 CVE-2024-30500,0,0,ebbc220b29457284d6343a3a88149de5ed0626b4e53d1a718766d5d0560c53dd,2025-02-27T15:02:02.463000 CVE-2024-30501,0,0,63ac070e9a183a2262922c8de0e1a6e7c0fe95b00506f818528d0454b84f3213,2025-02-27T15:02:30.103000 CVE-2024-30502,0,0,6c7a4d1ff2edb20874f219fd9b7c44e3e14fe4033e0c9c5135980248a75ca2f4,2025-02-11T16:18:02.843000 -CVE-2024-30503,0,1,543661ba6083ca1da1ec1f903c023e311fa64067ac78bdef767d0d99a15af80c,2025-04-08T17:04:31.510000 +CVE-2024-30503,0,0,543661ba6083ca1da1ec1f903c023e311fa64067ac78bdef767d0d99a15af80c,2025-04-08T17:04:31.510000 CVE-2024-30504,0,0,bd7910bf5f2abbbd558fb097face388120af35e91e6eb8b12ebe3e5ef85c4604,2025-02-11T16:14:45.497000 CVE-2024-30505,0,0,f9026e289963482a6587574e759fff6e0772d212b0db48c13bb8282f9428e114,2024-11-21T09:12:03.753000 CVE-2024-30506,0,0,e4dd31cca694016d91cc4dca8a4c030fd19512f39a15e39026ded55acdb9cf22,2024-11-21T09:12:03.877000 @@ -257203,9 +257203,9 @@ CVE-2024-30514,0,0,151dc5562eacf9a933cf7b7ab6688b8e2f46a9b29673d47cc8f20f9090f6d CVE-2024-30515,0,0,d593087dabbf867f89abb76998f0b05f17dd9e50f155c6b94ac5af7a7758a9f0,2024-11-21T09:12:04.980000 CVE-2024-30517,0,0,c945c7432ed17fadda71d7753be36634f87e8241879eca01374c3f0fe2ec42fa,2024-11-21T09:12:05.113000 CVE-2024-30518,0,0,ae16f241f5dceea19e699966b2c7e4204258ca7aa15dfe26a101feb3d1917f25,2024-11-21T09:12:05.247000 -CVE-2024-30519,0,1,f3c2f24683841470055cee15c4b4abbaa30be6eb74bbf58c92e633778317ff48,2025-04-08T17:03:57.723000 +CVE-2024-30519,0,0,f3c2f24683841470055cee15c4b4abbaa30be6eb74bbf58c92e633778317ff48,2025-04-08T17:03:57.723000 CVE-2024-3052,0,0,03a7ddee8267abdaae07cc425774e73ff521a926c5c29b864030eff6db01bca4,2025-02-05T22:15:29.877000 -CVE-2024-30520,0,1,92eb630ecc77bbde3fad3f2fbf08957f1461ebdb19279af80d8a6ca53e1dee33,2025-04-08T17:03:29.167000 +CVE-2024-30520,0,0,92eb630ecc77bbde3fad3f2fbf08957f1461ebdb19279af80d8a6ca53e1dee33,2025-04-08T17:03:29.167000 CVE-2024-30521,0,0,1eb685d42547bf11776c8b1ed8d645a40f10ecef9007ee2ea3bc82f28ae0c33c,2024-11-21T09:12:05.630000 CVE-2024-30522,0,0,6def4b4ac703232a13b936756d6bfa5e570bc5920335f26baa9aeb77449e0f79,2024-11-21T09:12:05.753000 CVE-2024-30523,0,0,c8766a4f29f8f835459bee11a13309f429d32a5fc0101461c72c19c354291320,2024-11-21T09:12:05.887000 @@ -257696,22 +257696,22 @@ CVE-2024-31237,0,0,66bfa9e4dadc57180a229dfe2ccba2695c9bcc4fff41697828ab41aa905d5 CVE-2024-31238,0,0,b5bc5bc7dcbc3950ea45cd4c90f95133fcc9f0db0ea5a2f46ff19751709ec871,2025-02-10T19:11:09.237000 CVE-2024-31239,0,0,5db5a8dec6862679e5e5ef2b043410a1073eaeb51a99cc29fbd99418a0892955,2024-11-21T09:13:06.253000 CVE-2024-3124,0,0,5505888a3472c1095f1c94f8f2bc93d9c3aaf6b82e918553fe0b64044ecbccd7,2024-11-21T09:28:57.220000 -CVE-2024-31240,0,1,8bcd54e76fa7f4e1ed10df6d6fb5983bce32bd233f1672fdba5f3f0e416b56bc,2025-04-08T16:34:32.620000 +CVE-2024-31240,0,0,8bcd54e76fa7f4e1ed10df6d6fb5983bce32bd233f1672fdba5f3f0e416b56bc,2025-04-08T16:34:32.620000 CVE-2024-31241,0,0,4172090e1e89638c7b7593653b6b9c6a38bd7a847bc05969a3b30ecd52c329ed,2024-11-21T09:13:06.487000 CVE-2024-31242,0,0,f59f45139f3a0148b942cf67ea5fe1ede2c54b7195bfc0dd4eac9c46f204f851,2024-11-21T09:13:06.600000 CVE-2024-31243,0,0,ce650227a189d49600b591b471031bc307ebb1f370bbd7c530e8afc60005353a,2024-11-21T09:13:06.720000 CVE-2024-31244,0,0,186a3cce9a3c1b36edc08b9d5634e4ea5a8b00dfa66cba5d6ca3fcb375d2b4bd,2024-11-21T09:13:06.850000 -CVE-2024-31245,0,1,ae3f638fd38ba3f07e81cef275b9356595561268a9f2b5a60ec980bc338110d2,2025-04-08T16:35:33.887000 +CVE-2024-31245,0,0,ae3f638fd38ba3f07e81cef275b9356595561268a9f2b5a60ec980bc338110d2,2025-04-08T16:35:33.887000 CVE-2024-31246,0,0,28d5ffca01dfd63278f95b86051691a2b760849a58196db04dca9bb30d41e001,2024-11-21T09:13:07.127000 -CVE-2024-31247,0,1,c719b6212ac9c80f4152d7bdd7bd05b729caf98b3ee49983993ba216e14c6465,2025-04-08T16:36:09.910000 +CVE-2024-31247,0,0,c719b6212ac9c80f4152d7bdd7bd05b729caf98b3ee49983993ba216e14c6465,2025-04-08T16:36:09.910000 CVE-2024-31248,0,0,35c4ff92ec1293103b8bb3508537e3a529b4243b00dd90d275a8ad72983ebe8c,2024-12-02T14:03:36.677000 -CVE-2024-31249,0,1,2e16b57f153ebbb052222fae33d019a337041248db4a9eef780cb12d72b750ca,2025-04-08T16:36:41.943000 +CVE-2024-31249,0,0,2e16b57f153ebbb052222fae33d019a337041248db4a9eef780cb12d72b750ca,2025-04-08T16:36:41.943000 CVE-2024-3125,0,0,3311924d8913110721bd2e60bdab66546735977675130e3f0ca7f671743d033e,2024-11-21T09:28:57.370000 CVE-2024-31250,0,0,b8215080c21b803e176e82ee282c290d355f58d584b4fb19c27193db6ca11b54,2024-11-21T09:13:07.723000 CVE-2024-31251,0,0,d1d83ba4ba6bfe0e3380dd113312648dd3113ffdb6c92a48f517eec9b336e830,2024-11-21T09:13:07.850000 CVE-2024-31252,0,0,a65ae82b8947c952cb272177942aba0b25cd96578b5d11450c7de29633459d06,2024-11-26T16:03:54.233000 -CVE-2024-31253,0,1,2c95214647e2723ae2994cf4508d0c8902bc680a13c9cdf3a124b38483bdce6c,2025-04-08T16:37:25.197000 -CVE-2024-31254,0,1,150816a482da8a016ee64c733fc9c694cacf95bfda65465f460e0ffd0453edb2,2025-04-08T16:37:46.997000 +CVE-2024-31253,0,0,2c95214647e2723ae2994cf4508d0c8902bc680a13c9cdf3a124b38483bdce6c,2025-04-08T16:37:25.197000 +CVE-2024-31254,0,0,150816a482da8a016ee64c733fc9c694cacf95bfda65465f460e0ffd0453edb2,2025-04-08T16:37:46.997000 CVE-2024-31255,0,0,fe0c90c57a0a1c01f406b1c62362b7182fdb7c107c786ba6af472c0f66062b8a,2024-11-21T09:13:08.360000 CVE-2024-31256,0,0,592139096ac6eb09b1b90bd15d1594575bcc431d14fc5a331bf8509d765dfed5,2024-11-21T09:13:08.480000 CVE-2024-31257,0,0,2c6e4aa23b14797a7f60b7345ce1f46d2483b7df1db43515a016a63fcdab16c7,2024-11-21T09:13:08.600000 @@ -258365,7 +258365,7 @@ CVE-2024-32115,0,0,ec0a8d5a4cbbd5113ad9a80a0c093985a380b14a1c6ef996f4aba1017c578 CVE-2024-32116,0,0,140b66d8b58d23b0fe567501dcd986adbe9732a7da9e43b727de51e69eac6a7d,2025-01-21T22:19:07.690000 CVE-2024-32117,0,0,bd78be4c7fc18e4c6cdf647393be0c96c39e14b7e7c17f1e39dba267511a48ce,2025-01-21T22:19:39.353000 CVE-2024-32118,0,0,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000 -CVE-2024-32122,0,0,98c36ba3f75a8c9791fd75fc11b497f98dd4f3c91a48be22a1613de1ffce51b3,2025-04-08T14:15:31.040000 +CVE-2024-32122,0,1,1df72ffd8cfcce7143fa6d1989c51b77807c72cceb55a7f95ef201f2433790d2,2025-04-08T18:13:53.347000 CVE-2024-32123,0,0,60129c37069c23661983217154006f556b580f62559adb1b35a9e1f56364af41,2025-03-11T15:15:41.353000 CVE-2024-32125,0,0,d36ac7f8a17677d938b5bf6c12b9c868ee2ece6d692e8f1181aa5a94b725cccb,2025-03-12T18:52:52.640000 CVE-2024-32126,0,0,45af23cb6fd016f363f996b64e239b35d3f7c25ac6138e901c5aa8f136e4359a,2024-11-21T09:14:30.620000 @@ -259465,7 +259465,7 @@ CVE-2024-3359,0,0,df1c3b923a9244c91387463d30b89b05bec81d7baf10a11ff3c9e56f96112f CVE-2024-33590,0,0,422b66b19ef9ce27f21ad5791da63f46cf73218df9b122cc9c712fa16a5340b2,2024-11-21T09:17:12.817000 CVE-2024-33591,0,0,cc0b3e1a8005fca6bdde429f1645199dae8127265f507aa7135f763d1ea211d5,2024-11-21T09:17:12.923000 CVE-2024-33592,0,0,57a423445817006efdc2e1718fd633c42602896845703c70fa12c3806ac934c2,2024-11-21T09:17:13.040000 -CVE-2024-33593,0,0,2ff7dd969b76cfef29da117603d3cf5b5321eb86d16894177faad46f88c22ff9,2024-11-21T09:17:13.160000 +CVE-2024-33593,0,1,6168bd1e23f14233ef41662b0d417af044940aaac27ac554ab14fcaa690eefb4,2025-04-08T19:40:51.863000 CVE-2024-33594,0,0,f93bf31615b7caf94835199d99388290be3f93ee1d582298cdd84b7dede79bc3,2024-11-21T09:17:13.270000 CVE-2024-33595,0,0,858b305bbc308c6897373e4ccb65624f7d08c3562203f6c55b7a3a06ebf219ef,2025-02-03T20:37:50.263000 CVE-2024-33596,0,0,fbaffa0b140a8362b482c3db61edc19b10f44782474d8f4af0258e0ff09787ad,2024-11-21T09:17:13.510000 @@ -261980,11 +261980,11 @@ CVE-2024-36840,0,0,df76986cf4b78b412b0f52e824699180a22287010c032e08a5b788b4993c8 CVE-2024-36843,0,0,0dd88625e4c7927017ac2ccd743026dc0bf8dec364e7370ed4476d6c15f67003,2024-11-21T09:22:41.673000 CVE-2024-36844,0,0,0db2c3d462d7ef694fdfe2f6888312c32e020055907b6f4c8aa2c7f269d2f9ce,2024-11-21T09:22:41.893000 CVE-2024-36845,0,0,529960ecea926e798a44b8fbaf67e53a1386a02af542112cc5cbae429ea7b091,2024-11-21T09:22:42.107000 -CVE-2024-3685,0,1,85506102da98379f96d772f857f6637d959cdd2fc3b3ce6cdd7dde65d11e9030,2025-04-08T16:38:03.363000 +CVE-2024-3685,0,0,85506102da98379f96d772f857f6637d959cdd2fc3b3ce6cdd7dde65d11e9030,2025-04-08T16:38:03.363000 CVE-2024-36856,0,0,c2c9e2a071273475ffd67fbc7ae98736ae7165895044bbeace0e5f5f79ae55cb,2024-11-21T09:22:42.327000 CVE-2024-36857,0,0,a42a68bedad76e5c1728ea90940ecf278487ee7de40ccce95e0e9777fcf5387e,2024-11-21T09:22:42.543000 CVE-2024-36858,0,0,afa948293518f0752cc62d2bf43b0cfb1c3f7b920d5daed6b10a4ee77102f44b,2024-11-21T09:22:42.760000 -CVE-2024-3686,0,1,a7a5ab3fdb5354caea09ab3facd04bb81edcd53748923c947303168620eaa872,2025-04-08T16:29:52.190000 +CVE-2024-3686,0,0,a7a5ab3fdb5354caea09ab3facd04bb81edcd53748923c947303168620eaa872,2025-04-08T16:29:52.190000 CVE-2024-3687,0,0,3144cd6195f2a60e3dc246d7e03e15444ec25255fb99baf8ad471bd2ca4c2861,2024-11-21T09:30:10.800000 CVE-2024-36877,0,0,7d7a55465df3dc9c8e1110e6a18c73bc9a91c4947d40446d91f09eadecdd33ce,2025-03-13T20:15:21.020000 CVE-2024-3688,0,0,052feb44b8d1ec6863ef819b37585d4a5f02c3beff5aab7ac941103dd336982e,2024-11-21T09:30:10.927000 @@ -262743,7 +262743,7 @@ CVE-2024-37662,0,0,88a4c2147c30ea5a0fae26e20d528c30a4f04b1f060a201d4e0094a477f8a CVE-2024-37663,0,0,fed344a0d61f1e567327514f6a8e91ad3162275e1c47738bf38d3802a419ffbb,2024-11-22T16:15:24.273000 CVE-2024-37664,0,0,ec10d2a017c572696a305d5984bbbc6e09db1615173526af4be64eee6d7ed665,2024-11-22T16:15:24.463000 CVE-2024-37665,0,0,1eb587434ded45d2e868af7abc77840ba8d1cc348193e8d80a8fd746774e5a12,2024-11-21T09:24:12.510000 -CVE-2024-3767,0,1,fe27424bc8470ecab4d1301b87244ae7dad3d92605d8bdc49938855cd182ba57,2025-04-08T16:30:20.067000 +CVE-2024-3767,0,0,fe27424bc8470ecab4d1301b87244ae7dad3d92605d8bdc49938855cd182ba57,2025-04-08T16:30:20.067000 CVE-2024-37671,0,0,63a7bb054b9783dd1c7933bd57d4a8f7e2cfd8dd008993792ee8177e6854a803,2025-03-14T16:15:32.600000 CVE-2024-37672,0,0,e44dfa3a5448c7ddc8be3e7358264cb6292a7fdffc27b2a73e33c9a81cd357fa,2024-11-21T09:24:12.893000 CVE-2024-37673,0,0,4948f447146a2f01fa61fd5402a993016f9583881e815929a457af264ecd9e35,2024-11-21T09:24:13.130000 @@ -262753,7 +262753,7 @@ CVE-2024-37676,0,0,415ada6299f7cd143b15bc431799ef76592986b2443e085c31e97cb8bf3da CVE-2024-37677,0,0,914b27f644b99c23fa73430b334c2012f02e568866d02ad51d6528274c4668e8,2024-11-21T09:24:13.930000 CVE-2024-37678,0,0,66d3748cd4e3715edd5f08d3f6dd1ace38fe5a2e775763ef129c478b46751a2f,2024-11-21T09:24:14.140000 CVE-2024-37679,0,0,53f415d3ff7d91648c94d1a02a752ae8c3f351b627771ec2bbaa0843079ebc94,2024-11-21T09:24:14.340000 -CVE-2024-3768,0,1,cc791d46f44c243e9e431053290b1ee671af45cbbc0d8d75988b58a76702e702,2025-04-08T16:30:31.517000 +CVE-2024-3768,0,0,cc791d46f44c243e9e431053290b1ee671af45cbbc0d8d75988b58a76702e702,2025-04-08T16:30:31.517000 CVE-2024-37680,0,0,f3f65d8393338162e88a1d73632657ff003dd480fe9f850aaa195a5bfecc1b29,2025-03-27T15:15:52.847000 CVE-2024-37681,0,0,4538c23271fd70e9a553f554f30bda76981c93c8606f42dfb4717cd2fcbf2110,2024-11-21T09:24:14.790000 CVE-2024-3769,0,0,928316cfd22b3b5bb0c6e5393e21abc27b9387bc9389c9d6fc448a034e2de86f,2025-02-28T18:23:29.187000 @@ -262769,10 +262769,10 @@ CVE-2024-37734,0,0,c29b7305eb3a656f6b393634d560813e85405c30b1d082e6cb5c8e32de8d8 CVE-2024-3774,0,0,7a7a597b589690c12f919940345595f31743063972f70d8b4f9ea657d33a59e6,2024-11-21T09:30:22.263000 CVE-2024-37741,0,0,cdea71c096b6020452f86c61c722c71d411c4901d61352f541581e27bedfb10b,2024-11-21T09:24:16.130000 CVE-2024-37742,0,0,7c57418640c4a372993ae3363ea2c4e93948b308f1c699d6cb68e3e245b5578a,2024-11-21T09:24:16.373000 -CVE-2024-3775,0,1,c451ed115577e5a89890b5a38fa397c5a305bf219558d71c71ace7abcecbe94e,2025-04-08T16:30:51.500000 +CVE-2024-3775,0,0,c451ed115577e5a89890b5a38fa397c5a305bf219558d71c71ace7abcecbe94e,2025-04-08T16:30:51.500000 CVE-2024-37758,0,0,6aad1ab20925aeaf835ed115698dffcd6067c2af6f08e49e2fb33789c105b9ec,2024-12-20T20:15:22.937000 CVE-2024-37759,0,0,18b1e88dc7a3b7f932762ee7014dce51b56c599cd2ee7466ac0b38dc37564402,2024-11-21T09:24:16.593000 -CVE-2024-3776,0,1,0f6327386a7c6173c59bd7cdf6f2c885168397a8b8eeee3a16a2d41ffe84c4a1,2025-04-08T16:31:04.280000 +CVE-2024-3776,0,0,0f6327386a7c6173c59bd7cdf6f2c885168397a8b8eeee3a16a2d41ffe84c4a1,2025-04-08T16:31:04.280000 CVE-2024-37762,0,0,f73bf4c4d5b076a67c41dc17aaf07f5b5021aedfe4f7bfded7c4e50f0cbcd240,2024-11-21T09:24:16.827000 CVE-2024-37763,0,0,bdd39afd4bae4e6cd2046ada3a9056ec24f8f980a8ed747d49b20204a1c75637,2024-11-21T09:24:17.070000 CVE-2024-37764,0,0,b70be141044f1a5ba9d64bb9a7469b942bffd6682353af5d9069f566c6a60adb,2024-11-21T09:24:17.290000 @@ -262780,14 +262780,14 @@ CVE-2024-37765,0,0,e398f7942398aeca5102dc2e8daef204a77221fb91c023468b8cac65c292d CVE-2024-37767,0,0,58a85c325101746390b58f934ab900468240b96d335a9904d63295638f00e941,2024-11-21T09:24:17.733000 CVE-2024-37768,0,0,50094b0f1db8404ad9bfd9bc5a559978e0dd5a7ad1bf07217a58688f10b9ae46,2025-03-13T18:15:41.653000 CVE-2024-37769,0,0,ebb9ba49fb51ffaaf91f9ff8b56894aba69c0664bde10d7ebfe9dd5080822c95,2024-11-21T09:24:18.103000 -CVE-2024-3777,0,1,0aea65dc8a0a7cd63d575c62da6f1aff0e206395199e5031ba055906f2c2fcf9,2025-04-08T16:31:20.500000 +CVE-2024-3777,0,0,0aea65dc8a0a7cd63d575c62da6f1aff0e206395199e5031ba055906f2c2fcf9,2025-04-08T16:31:20.500000 CVE-2024-37770,0,0,3ae1b26b08d620f39fd2fc9b0f3e94aeedfe3c4571e06714b0c443b19a9d4c82,2024-11-21T09:24:18.330000 CVE-2024-37773,0,0,2e017074765151e5ff695c0297fa00e3f03e86b1bfb2dff271743421377148ee,2024-12-17T16:15:25.580000 CVE-2024-37774,0,0,2ab42b0c0633061036f05297b975d97fe83d08d18d378d73ce77bd2cc921027b,2024-12-17T15:15:14.210000 CVE-2024-37775,0,0,d5fbd8966422b87b56ffba076c5e4680a0b14972527b1e66a09cef04e7bc291f,2024-12-17T15:15:14.637000 CVE-2024-37776,0,0,de5c8cc05842c77980e33d8cdd148d0ad3cf21489418fb1fe97fa440cc336d05,2024-12-17T17:15:09.047000 CVE-2024-37779,0,0,0aba20750978da4733349dadb1ca63b8044cf1d1605f2dd296fab6c62fcf39fd,2024-09-27T14:35:03.517000 -CVE-2024-3778,0,1,ad152e70970eac62723ac2513e656d71bf3815cbcd7954d8e5bc658741b746ce,2025-04-08T16:31:34.400000 +CVE-2024-3778,0,0,ad152e70970eac62723ac2513e656d71bf3815cbcd7954d8e5bc658741b746ce,2025-04-08T16:31:34.400000 CVE-2024-37782,0,0,e9f210e7f42c046d75d0b9f25adae39b4e1c61a1f888965bb1e0dfce89ee0e10,2024-11-27T17:15:11.320000 CVE-2024-37783,0,0,37775a282d48f40592657111afedd1d875da3d2a0df4266c2542dec5f23c341a,2024-11-22T19:15:06.653000 CVE-2024-3779,0,0,48f0f58ffc20a968f031c537d19ef4714b6de5a5c8cbcdf1d811266c880c2565,2024-11-21T09:30:22.927000 @@ -263761,7 +263761,7 @@ CVE-2024-38793,0,0,3abb4fadd98983f9c8a3f71f42811284ca10c92d1b43b534ec7aa2558a41a CVE-2024-38794,0,0,0e611d7d55b2e6c94eee9312ed11241297f8a473362db39470b8ea85723f38b2,2024-11-01T20:24:53.730000 CVE-2024-38795,0,0,e1f5c80ecd4b719afc803bc01646b0dbf082a41e566b00ce3cef907c999501ae,2024-08-30T16:31:03.887000 CVE-2024-38796,0,0,c4c33fa7474078d5c275288ac0c26a4a7de9b623a9c9f1253ec9f217f7c619bc,2024-12-06T14:15:20.437000 -CVE-2024-38797,0,0,69a3e3f3f6bf72df5761f5889bfd94fad610aca38f10bf107cc63eb4b07b3825,2025-04-07T18:15:45.337000 +CVE-2024-38797,0,1,245d3d65a782de4eae4eea11e0031ff3495cc97cf7a3b931f76e416d5c7fa5c7,2025-04-08T18:14:17.307000 CVE-2024-3880,0,0,d56040986238a77f83b423da390e12e4147bf016a3fc99a53781cb6cca9f4edd,2025-01-27T16:24:26.973000 CVE-2024-38806,0,0,d61f695019d50acbdde73a7d510a5092b17da85fe958cba5e056d8daccd509f6,2024-11-21T09:26:50.667000 CVE-2024-38807,0,0,dddf460600b3bd4efb51aaec3cf95bb5fba4990a48f37da4c2207afc16479dc6,2025-03-27T17:15:56.383000 @@ -265771,15 +265771,15 @@ CVE-2024-41783,0,0,ae1c0de72e5dfe79735ebfb7f8ec730c4db19a9e6ca5a3f003214d7fa45e7 CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000 CVE-2024-41785,0,0,c8540d1d43d0438fcf633df69d213201ae76d612d879b3fa5839154f3178ea9a,2025-03-06T21:32:02.937000 CVE-2024-41787,0,0,ca11b7c7cbae167fb879d0935e0fce76c280439ac257e0ea74c70f9235cbcc80,2025-01-10T14:15:28.947000 -CVE-2024-41788,0,0,ea2307eef89431e5ac0edbb367d79dd05250c3d6db013601f569184b37fbcdea,2025-04-08T09:15:17.820000 -CVE-2024-41789,0,0,4c4b3efa50342e4a4cc31e0b3747fbc633a82233d4310674c3ff7da4b6010983,2025-04-08T09:15:18.150000 -CVE-2024-41790,0,0,cbf3c1b4c152e41c8b4d40e9930585ca84f16a88303bdaa3d2f6e52520d9bcba,2025-04-08T09:15:18.590000 -CVE-2024-41791,0,0,35f8fd5e0b2f6e2918da8552f0b2ca1bd055580d987fb60978018c4a09dd77e5,2025-04-08T09:15:18.790000 -CVE-2024-41792,0,0,ce253945b5488ff07a4057f590641f616d59a905d15a0fb445053a4ac202e8a7,2025-04-08T09:15:19.257000 -CVE-2024-41793,0,0,8d0ccc098bb34580c481baa2e23f3e3e95dcec5fda0f4ded4b4da017f394ceac,2025-04-08T09:15:19.563000 -CVE-2024-41794,0,0,b2cba2a49b8798af2dbc319c5a2fc1454899056850eeddfaad10e848174b4e07,2025-04-08T09:15:20.010000 -CVE-2024-41795,0,0,00b6d801212c6d87840071f532b8495d5a01c0d3b82eed0325d739b1d1ef70de,2025-04-08T09:15:20.350000 -CVE-2024-41796,0,0,55b0773bcb07c40d3982485c62d353f4d1a4e8342bd76a7dbe16766c688403be,2025-04-08T09:15:20.813000 +CVE-2024-41788,0,1,1f69c712180e732affbc1e3a3b33b8e7bdf15fa5f9e9ecec795ebccc5494a258,2025-04-08T18:13:53.347000 +CVE-2024-41789,0,1,08ba41aadfac42b364d55648c7ec4e4bdb7166b059c87342cb05aefd121d3669,2025-04-08T18:13:53.347000 +CVE-2024-41790,0,1,3ed4d34e61c87ca08946e4484fc8f121057b59c67216f1dd94d2bed181782ac3,2025-04-08T18:13:53.347000 +CVE-2024-41791,0,1,e5f03679d91eec4eadcb07f61080f9da9ae850886aaca7a19f099786e42e2eba,2025-04-08T18:13:53.347000 +CVE-2024-41792,0,1,17f9548d7a06768ed1d419a31b8cee228688d104723b4ef9da3024c42ceea5ee,2025-04-08T18:13:53.347000 +CVE-2024-41793,0,1,8e0f06360f8c9430262f88784cd6d058958bc74bff917fef56ff6df96d005591,2025-04-08T18:13:53.347000 +CVE-2024-41794,0,1,d101542d2feb5713681bb1fffd3a46d79df3d8742e19f9fe28b709711b9a9da5,2025-04-08T18:13:53.347000 +CVE-2024-41795,0,1,5142a7be0ad6c4d39b0903178948e0bf21a48094c01e0ebc76e486e0b9fc6296,2025-04-08T18:13:53.347000 +CVE-2024-41796,0,1,e96bb81e73cf666075f3771c5042527bfc6dcb0948ae67be6743b1761cdfeb8b,2025-04-08T18:13:53.347000 CVE-2024-41798,0,0,5fea74d6ad8cd06d69b9494512651a1267ba07a833ce4e1ec1687234e2029539,2024-10-10T12:56:30.817000 CVE-2024-41799,0,0,57e0652da6088d2f7ef1d8a480b502117a7d15daea77cec2467e2ce23d41e466,2024-11-21T09:33:05.673000 CVE-2024-4180,0,0,130ce42da83b499edbac947bfc94b4a1e3a54824ec3a8a8cb78c4eb65e7d425f,2025-03-18T19:15:45.633000 @@ -269254,7 +269254,7 @@ CVE-2024-46486,0,0,6000c159ec790985a8f8b0baa816aa79580e9d13b05f3014b35b7b51c8e41 CVE-2024-46488,0,0,56f5fe55fa4ef09d855ee33f04dd341373041abcc8cd41a78f126a1716041dc8,2024-10-02T16:21:36.507000 CVE-2024-46489,0,0,8af935ea59345c18a65a02a5934ad59e5a604855494058e15126d177378cefdd,2024-10-02T16:24:32.300000 CVE-2024-4649,0,0,f64d2b4ba0c6460a9ead3048468022c15a6a01d0faaa5bf3c36ccd0615f06803,2025-02-19T18:03:44.760000 -CVE-2024-46494,0,0,9ec787caeba884b97dcf35ff35b312ee58a6a6b80aa36164ce3d1255e393adc9,2025-04-07T20:15:19.950000 +CVE-2024-46494,0,1,77c43d9f61d3b362f0879bda88835184972925796ebe21fe810507a65210d990,2025-04-08T18:13:53.347000 CVE-2024-4650,0,0,a0725088573bca3157246d7fc5e5180f0fb821fadf7f00a64494559769289d48,2025-02-19T18:08:51.490000 CVE-2024-46503,0,0,4f133c90e139e687d3dd9079c4687fb4224dd448ab71bd78013c69a7fcf35624,2024-10-10T14:15:05.183000 CVE-2024-46505,0,0,8a30b2b018a417760478138048dfdc666d3014f90e1bca5af5084411338920d1,2025-01-23T18:15:30.247000 @@ -269364,7 +269364,7 @@ CVE-2024-46668,0,0,92978c4aa13b62f29de9eb65197784fc4f6bdd9165d1d91b822132ada935f CVE-2024-46669,0,0,556fb44d48a2d1617893e813f90d3344679c0b14f9451ea92282d16149a97525,2025-01-31T16:11:27.577000 CVE-2024-4667,0,0,0ba4feb9061227f326b9f44983ec481dee587f64e4899bf77e538f69f9f74063,2024-11-21T09:43:20.190000 CVE-2024-46670,0,0,75ccf01e37b9b8c5ff22f079d1f2a636cf187d1c3561208c729c3716dba92382,2025-01-31T16:12:16.597000 -CVE-2024-46671,0,0,0cff02e27fd230680aae3afc91dd194709cba992be6e0ec99760a016d4102adb,2025-04-08T14:15:31.740000 +CVE-2024-46671,0,1,5e1cee334b25c60e4a67d6d7d0432030917c8b2235a22699797aeb5c7d225b87,2025-04-08T18:13:53.347000 CVE-2024-46672,0,0,bc507e64d04ea5640093bd9a3ca6fe7f0c7a71643b79e70f9ab8ae27db60ca75,2024-09-13T16:29:17.123000 CVE-2024-46673,0,0,3f51c09e700b38d12ae33fe015bc01f6f75ee9c1181458b7ce2541d901e5897e,2024-09-13T16:51:39.117000 CVE-2024-46674,0,0,658c5615ef5104d2b41abc83d32329287f71abd731b08493051a521ab04d6ebc,2024-09-13T16:51:45.103000 @@ -269876,7 +269876,7 @@ CVE-2024-47212,0,0,c35ff271b31a7391412533f04c54511dcc1cbdf051da54bbf9eddabf8d967 CVE-2024-47213,0,0,04b30dd06b47bd624c0ea92317eb571bb18e7eda14f9a4173d1f19a4597595f5,2025-04-07T14:18:34.453000 CVE-2024-47214,0,0,42f25dfb8db8cae5df36e924bb85b979a09f2b5292e410e9fd0fe3f58fb972e9,2025-04-07T19:15:53.147000 CVE-2024-47215,0,0,d058dd10bb1de131f6b594cf9eb61be90cf5dc89e729180c84d1d89902a748cd,2025-04-07T19:15:53.300000 -CVE-2024-47217,0,0,ee98c3ded6b81dc697f7cb6a39bf07be1179425c689bceb815187f33a0b43dde,2025-04-07T19:15:53.447000 +CVE-2024-47217,0,1,959ea08e604f6076b0cfb3f0015c60a8376accca2a2e83fe707c21c8552b263c,2025-04-08T18:55:43.790000 CVE-2024-47218,0,0,db03414a0794c64478156435016e14cfdd9450c8bd09172385f11c2f30d16310,2024-09-26T13:32:55.343000 CVE-2024-47219,0,0,3cd8ebfcf52791de5daa3f0450c6087b29daca73e6af6b22502f8faf72bb6596,2025-03-14T17:15:47.760000 CVE-2024-4722,0,0,f8a01d5cda394f95062bd0899a5b0ee759de21860c871ac98f32f3a90f8128e0,2025-02-20T20:55:46.727000 @@ -269906,7 +269906,7 @@ CVE-2024-47258,0,0,9a4a5c7393716979191d8b2658cfc20c67a5be5e7a582de99084d292c7b32 CVE-2024-47259,0,0,96188ceb8a1444b367115b0072184fa3d1d29c538e52a4d93d0e09ad178490c1,2025-03-04T06:15:29.190000 CVE-2024-4726,0,0,49547663fe5a48a2e84af0b7917fde9ae28364c558246e73a84aca564ba26d79,2025-02-19T18:33:05.473000 CVE-2024-47260,0,0,5b27c98e99ae4ad671e69cbfcf95d8f33ff9e3ae5e7b5b451c53923f7fad5127,2025-03-04T06:15:29.710000 -CVE-2024-47261,0,0,b71350d3f10e577d15ec94abebab979ee0cda32a37c04c9015797f370218e354,2025-04-08T06:15:43.053000 +CVE-2024-47261,0,1,e68daf9704a915b7d918a22868798093ba52e3e049ff7d26b5461f04d259ba98,2025-04-08T18:13:53.347000 CVE-2024-47262,0,0,f5b41f79a65d45ee654aaae851aa1366b58e5f035dc01ee0ca87108ff5e14c82,2025-03-04T06:15:29.867000 CVE-2024-47264,0,0,d54fe244881b7e5c414df0af4606542f59c360dc75511e77f72d84fc11d1faed,2025-02-18T18:15:24.630000 CVE-2024-47265,0,0,447da14559255165bf0f0446b50ef025a850be7f968f75b645935b037c27e8cd,2025-02-13T15:15:19.600000 @@ -271008,7 +271008,7 @@ CVE-2024-48883,0,0,adb8229ac61a0cf6e127a4ecda67bdf63ebce96100cad9493a388f5cd0c90 CVE-2024-48884,0,0,5fd0bb45d4daca6fec84e3590a2c87e5a7fdfd8e521218f0c75f216ace5f8df1,2025-02-03T22:18:16.507000 CVE-2024-48885,0,0,f1a5e74246adb6d7bd8e325564baa4055ce18f2e80eed587565e5479d790b2f4,2025-02-03T21:11:41.750000 CVE-2024-48886,0,0,0c43c603ad0a80f9c21978b3b5043d329abd064d0a00462c64b3fb5285dce5fd,2025-02-03T22:16:04.733000 -CVE-2024-48887,1,1,a5f806b56fa28cc568d47ee92d9a06ac41abb44d77d676f6fa39d0aefb319f8c,2025-04-08T17:15:34.440000 +CVE-2024-48887,0,1,c15c11634b56aa84a8dd870423efe5714ca743efc84dea9dea33cc9d6f7fadd5,2025-04-08T18:13:53.347000 CVE-2024-48889,0,0,b91146ff80af9e0a70e60d177059514309aa07d3d1ed7c0d2244bb40847957f1,2024-12-18T15:15:11.713000 CVE-2024-4889,0,0,54e41cd985dde0162870a1a62b42a9fd40bf90446677bc64ce2d3dd7fe90e1b1,2024-11-21T09:43:47.970000 CVE-2024-48890,0,0,e4c2ca148242c15d7451f4a3f4325a96e3aaa804db1c474d5b5964d77366de86,2025-02-03T22:13:42.850000 @@ -272525,7 +272525,7 @@ CVE-2024-50560,0,0,e5560d8e099bbdb75ebe3a313d5a07fb60056609d630bea2b282b04cbeaa1 CVE-2024-50561,0,0,51d6a6886183d861209a55cd82d08c7368f7ca6eecb96cadd88bb86e0f75077f,2025-02-11T11:15:14.037000 CVE-2024-50563,0,0,b5495e4d9248024f07eadfb97b72f88f39265d3dc21b8de2fb9485f4a9fc5cd8,2025-02-03T21:54:17.977000 CVE-2024-50564,0,0,9f92111f34b8a3f04643692b4b87512c1b9c808d088ae5cb493fe5eba0ae69cd,2025-02-03T22:11:08.317000 -CVE-2024-50565,0,0,40a9ac9d988319b61a916c83882019fb44453d796d40fa457cfd6e13c33c89a5,2025-04-08T14:15:31.920000 +CVE-2024-50565,0,1,2b2f5bb21f497a05ec5d76ab171fcb473bd2be744dc1b4282672f94cfb71a45b,2025-04-08T18:13:53.347000 CVE-2024-50566,0,0,73abc3a7ec0e89e7710714feab3590ac47ec6fd819b92c2c02e99292bb887750,2025-02-03T22:09:31.510000 CVE-2024-50567,0,0,fb2bfcdd677b57b5f254c8ba8bdb8b89df3eceeb887ef580d5f0711d99cce207,2025-02-11T17:15:22.980000 CVE-2024-50569,0,0,f395ce0ea2e4326ce9a1a0e799e0fd9e0f0f63be0581b485aece38df723835fc,2025-02-11T17:15:23.123000 @@ -274113,7 +274113,7 @@ CVE-2024-52959,0,0,ab868f6da3782d67cb53183f2f781a21b6375778bdbc1b7f5893121d76931 CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000 CVE-2024-52960,0,0,fae4551d6f5890cd1cc0118af23473ce9c16850a8f8d27eba0836b043bfb643a,2025-03-11T15:15:42.813000 CVE-2024-52961,0,0,dea18f81475188c7e018159200e77f633cf269c0485ba3fe6589eb2b7c40b189,2025-03-11T15:15:42.960000 -CVE-2024-52962,0,0,8d4452100c3278f3d1227501e6bc5c672eb7540c12da8cace02e7940f5b7c2da,2025-04-08T14:15:32.097000 +CVE-2024-52962,0,1,9b538e52f2505f09c2cb78b32e2dd201d8fc29ae01c2b7bfe057f4556cf798f3,2025-04-08T18:13:53.347000 CVE-2024-52963,0,0,ae3a3bc3ff79384440030ff505ca2ca370b023f5f8023877a92497503fa052d6,2025-02-03T21:56:00.043000 CVE-2024-52966,0,0,45e610534e7771fede3fd74a53db786846838aed2a0896cbe74153f4c82676d4,2025-02-11T17:15:23.260000 CVE-2024-52967,0,0,ff0457e9e50f167599374bf92a5654bd830b20e000ec1663543d1e47a49cfb63,2025-02-03T21:59:09.277000 @@ -274122,11 +274122,11 @@ CVE-2024-52969,0,0,7b7c31017bc020d55866c3b3fcc971134d3b96354f2debd63a54ecbb55729 CVE-2024-5297,0,0,4e7f74d9629bbb9b864fb76b28bd5d406dd3be0c174577372182a6d0a600d934,2024-11-21T09:47:22.990000 CVE-2024-52972,0,0,bd1952b84c87773d87a7a628c33b82c04f120ab1b040d082ef990417beebf08b,2025-01-23T07:15:08.700000 CVE-2024-52973,0,0,4b0162dbe0cc84ae90dcd59a5862af8efd2e82fdabf32f87ed28473f7456d193,2025-01-21T11:15:10.200000 -CVE-2024-52974,1,1,ad3ac1aa3dd6ee3d8d620ec668c9451a0d635f636ecb89f75ad17ad377e33304,2025-04-08T17:15:34.653000 +CVE-2024-52974,0,1,866a7323747846e7e1c49392c810fd741839cfdc09f523ecaf284117d172d0f6,2025-04-08T18:13:53.347000 CVE-2024-52975,0,0,087fe0fde0ceab7286a929c06c2ac45f511973f6a98162a3e6dc355fe877ca5e,2025-01-23T08:15:16.990000 CVE-2024-5298,0,0,329feabae44ccd7ff86530cac1ce0ba86c416ea44126377af7ea7290b6d65a10,2024-11-21T09:47:23.103000 -CVE-2024-52980,1,1,5cd5a60939e030bba2ad1bc1468d4820734066d9a809ccf50920701c90c52ea6,2025-04-08T17:15:34.880000 -CVE-2024-52981,1,1,0339da76fda50065e8b5542faaa4cbf2adec039cda928fcc46bd82c166b131aa,2025-04-08T17:15:35.187000 +CVE-2024-52980,0,1,cc05d7e106d5b14b7571f78cf4ea47c5f911e8818eb629b48d5ceda5d0b31568,2025-04-08T18:13:53.347000 +CVE-2024-52981,0,1,529915e776388af10a55d971e5aee79a0afce03af1703c2ac90c635b45cd8660,2025-04-08T18:13:53.347000 CVE-2024-52982,0,0,87ddbec0fddbec6a4eb61fd0607c77d31103b1dd9283c5a13ec4d5a36a8ccef0,2024-12-18T18:22:52.637000 CVE-2024-52983,0,0,6cf30a09aaa853464d214fc07b1d213f931e08bd912522971a9cefc2fb965c45,2024-12-18T18:23:06.273000 CVE-2024-52984,0,0,11fbf459d3485030a8f786e9a22df0fcdca9965df622457357e14148db310355,2024-12-18T18:23:18.347000 @@ -274902,8 +274902,8 @@ CVE-2024-54016,0,0,639aa106bb3e1987e1e073164a35006658ec1d494dc571ebf11ee73a840c8 CVE-2024-54018,0,0,cad6d12f1a14e927d37238581f95d0e8ab02634a89452232f8dadfac53c033d6,2025-03-11T15:15:43.113000 CVE-2024-5402,0,0,8a48be9314b3c9a679ac7b7baef4e61d2577cdb21f0001defb98f97ce31ab9a7,2024-11-21T09:47:34.947000 CVE-2024-54021,0,0,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000 -CVE-2024-54024,0,0,1154152694e5ae96326215fc537e200d146b1fd6f22f18060566a03143a6de43,2025-04-08T14:15:32.303000 -CVE-2024-54025,0,0,4945cfa92917c8cbb96ccabe5dc92b6ccd9bd7917e15f781e155f14c1f11306d,2025-04-08T14:15:32.463000 +CVE-2024-54024,0,1,6ceeef9496cadcc64e79b1844370c0fa1c02fb938bc5fca74c230591ca1e23d8,2025-04-08T18:13:53.347000 +CVE-2024-54025,0,1,e5a745fd97cf96434a4b8150a9903326f6b1ece4d8be99488b5d30c7eadfea0d,2025-04-08T18:13:53.347000 CVE-2024-54026,0,0,723fec38eab4317b0780c9816dd56e900186889e5e56922795660677a81a6c2f,2025-03-11T15:15:43.307000 CVE-2024-54027,0,0,7544813701dc95fd0c5530c62bca74c9e14470944bfaab3455d456f59c4e66ad,2025-03-17T14:15:19.613000 CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000 @@ -274940,7 +274940,7 @@ CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42a CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000 CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000 CVE-2024-54091,0,0,6669dfba9e4b52b11ac13f159a10cf6dd259350d4a591cc31c8accd2299f4839,2025-04-08T09:15:22.763000 -CVE-2024-54092,0,0,c603537ecd19c80744aee344d52d5e102f809f00455daf9376de6bffe9174510,2025-04-08T09:15:23.320000 +CVE-2024-54092,0,1,a6e6da3cd74c0f306142e6eb1230a6db9b96f478924732391d48c59502d536e8,2025-04-08T18:13:53.347000 CVE-2024-54093,0,0,8ff323e645aebc7aeef25ba10ab98f1f6ad0ea9c0f1d7ee8b34034da91ced70a,2025-03-04T19:11:00.280000 CVE-2024-54094,0,0,4b5414d6bb86aa6d5d0ad7d402a8fed5c92b81411a35a19b8983e665f6e00eaa,2025-03-04T18:48:25.970000 CVE-2024-54095,0,0,21c8eedb1a0957c805c27199698b550557aa3e86d67c7e9aa5fc64a1b6a6ca6d,2025-03-04T18:45:18.927000 @@ -277069,7 +277069,7 @@ CVE-2024-57822,0,0,43973cb11c0d7745a76972fd2125c40dd56918f079243999a6a248fd7bb74 CVE-2024-57823,0,0,5ca581226a27965f69cc1b47d8d6ed60ad65266a2e4a0de113585f678075fc75,2025-01-10T14:15:29.583000 CVE-2024-5783,0,0,457a67b18c53addb8fb271e75294a5e3a7e25c57923089dcfbdfc7dbab590f38,2024-06-12T08:15:51.480000 CVE-2024-57834,0,0,5a87b39773bde7ec95e0cc89e1090b2151e71493eb99b3d3e2c7fa1942b6bb7b,2025-03-13T13:15:42.243000 -CVE-2024-57835,0,1,8fef5a61b0668ebf94e5daa6fadb90839e31d09aacd032554c43f144b8a5f3f4,2025-04-08T16:48:07.570000 +CVE-2024-57835,0,0,8fef5a61b0668ebf94e5daa6fadb90839e31d09aacd032554c43f144b8a5f3f4,2025-04-08T16:48:07.570000 CVE-2024-57838,0,0,7205305ae1088ef41361b6511691e021bab207c0c324bab7b09b17a8c1a06218,2025-01-11T14:15:25.940000 CVE-2024-57839,0,0,5656e2417e5685f2e1ff410b1767104ed6341a8132fd402fbef4fd6f8615e85a,2025-01-11T15:15:07.050000 CVE-2024-5784,0,0,f27ecf8abffd9e6c282a3d3ca16cce2ce0cb1c19ecd7f5c543f166278a4d8c33,2024-09-03T14:48:19.570000 @@ -277331,7 +277331,7 @@ CVE-2024-58128,0,0,2f080faeec9b7abd005e501afed73e7df0c396dabb6a1e25bf77fc72ecfac CVE-2024-58129,0,0,11e98106a59e025e34ac181bdadb4c8348e20bba976912e51d2c9c8ef8d2204d,2025-04-01T20:26:30.593000 CVE-2024-5813,0,0,53a768ef9b74ee03be1393dbcc310c528fc37406ef9a9107d27a6d2a3860c95b,2025-02-11T21:36:40.947000 CVE-2024-58130,0,0,b1da61426890522f6374bed5d854c2d8adfdac7556fa6282fde3bf2122dc7cb0,2025-04-01T20:26:30.593000 -CVE-2024-58131,0,1,bc4908e979254be0dc1e1176cc36e7e2691904c3630b2abae16ce8f2a4516d81,2025-04-08T16:45:17.107000 +CVE-2024-58131,0,0,bc4908e979254be0dc1e1176cc36e7e2691904c3630b2abae16ce8f2a4516d81,2025-04-08T16:45:17.107000 CVE-2024-58132,0,0,87fc99e96492ae47f7ae88aebc39cca10a37119d96d5c66e6cef7cf588ab7762,2025-04-07T14:17:50.220000 CVE-2024-58133,0,0,4511afb6f4930bee53375abc516811f9928c158d8decf5ac029097e07f67929b,2025-04-07T14:17:50.220000 CVE-2024-5814,0,0,409f119643711fe465e9fd028af3caf838fd31e85495ee2ac73938edab3d7b3e,2024-08-28T12:57:39.090000 @@ -281180,7 +281180,7 @@ CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5 CVE-2025-0001,0,0,0b53097bff1778de9231713dab9a655e96b466d52a15df3f132fe8a8a77a7f52,2025-02-17T10:15:08.550000 CVE-2025-0014,0,0,a85170c840192d156f38eccc61ca038d577c819700d88e03a6460a0a1d9fd8ab,2025-04-07T14:18:49.830000 CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000 -CVE-2025-0050,0,0,ed6897a431c3c130607c53a9a11f37feb02071836760010f34d1a86667b35686,2025-04-07T14:17:50.220000 +CVE-2025-0050,0,1,482b5ff7576183287db2c32c74da0d2abbf92554144e005c1fef00f71efefdf1,2025-04-08T19:15:46.877000 CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000 CVE-2025-0054,0,0,b8bc9804913976424582a72964eb068b4365d1e22607e5b0c46a2e77e3b25525,2025-02-18T18:15:28.260000 CVE-2025-0055,0,0,0e89795bc87c51adbc679d78b37bf974fd01b97679ad0635934ee83322d4b078,2025-01-14T01:15:15.570000 @@ -281379,7 +281379,7 @@ CVE-2025-0356,0,0,7e522859a3d0689ccb777c8fef64a1b2b2f878cb4a2c9cceba026470a39874 CVE-2025-0357,0,0,0ae647dab29c7a227a1c7ef392ca808faddaedd9823b613fe8bd7952dd9efb7a,2025-01-25T02:15:26.990000 CVE-2025-0359,0,0,5d195c4a796a9d61c5445ec078ba210735f7a70ba6be4fd93632b7b4f6027f55,2025-03-04T06:15:30.023000 CVE-2025-0360,0,0,6206f28ff4cea73a7524a4842bc2375d59423b5ee65bea65d99ad80bb9353d1b,2025-03-04T06:15:30.180000 -CVE-2025-0361,0,0,2929927517c8a0d3f88a2b6f9d4aaefe9e0acce94db4ecb4ad49f33c17d21a31,2025-04-08T06:15:44.540000 +CVE-2025-0361,0,1,38c5565d3d35e3d9ea55d49f3958a1fdae6a96a7127a923a7e096f4b7af3eefa,2025-04-08T18:13:53.347000 CVE-2025-0364,0,0,d86e1de6aeb2da3860f3a6864380bb4611cec9a62b9db022fce493a15089702c,2025-02-28T20:15:46.323000 CVE-2025-0365,0,0,1b8565779f76dbc2dcd5a3d916c320dbd38623a9ae7b55c218867abc471d9737,2025-02-24T15:56:57.453000 CVE-2025-0366,0,0,920cbf026bda2b01c51576327bc7f0315b5ccf05dfdbae1172aca359c4e3431e,2025-02-24T15:56:36.713000 @@ -281805,7 +281805,7 @@ CVE-2025-0937,0,0,4d23918c79b57f87e4232ec5cbaefc29cbda81d3f6ffaa451d12f8c2e2e914 CVE-2025-0938,0,0,550b7296d47a56c2250b7b930d294560afabd9b18c74cb6ec5ff28ef021f5100,2025-03-14T10:15:15.847000 CVE-2025-0939,0,0,762c206abd21032a2362d7d03f8696dc3cda9bf876a13f8c73ebb711762a318f,2025-02-21T15:38:36.803000 CVE-2025-0941,0,0,c8666aaa7ced7c9f01c38235f5f0f79a25e500c559c1e710321a0ccfbaf4ca46,2025-02-26T17:15:21.910000 -CVE-2025-0942,0,0,f52d221cbf0b57c8af6cc59d40ffe046a06dd80e1e3bff9260de7567894cde3e,2025-04-07T22:15:16.020000 +CVE-2025-0942,0,1,e29fd74fa8a9bb2586288bd99dd387801033435d6f753cc7f1e2ff8631f0c941,2025-04-08T18:13:53.347000 CVE-2025-0943,0,0,4b30c1ddd7ae655b7bf4d2eb9793548500a8e02002071712c23dcca41b54333a,2025-02-07T14:03:39.237000 CVE-2025-0944,0,0,d13b662667ebb11ccdf7df575aebea999f2f98df20cada3f9e187be25fb4f53c,2025-02-07T14:02:27.067000 CVE-2025-0945,0,0,1a59820c4935e2d16009f5e71afda284dd2c717c729eccad6a055d3b163de706,2025-02-07T14:00:06.057000 @@ -281907,7 +281907,7 @@ CVE-2025-1085,0,0,240f000b2a2196559d3c93131a0f7508a4e94aebf865be36c2ffd695012f0f CVE-2025-1086,0,0,a69d2558168bf2a8aaa109750d1ed5860f8baf2bb5bad3b2b8e78234f1d8c631,2025-02-07T02:15:30.523000 CVE-2025-1091,0,0,41f3aeac640c3e0e17c6b04948a8dcf1ae635325d94a919fd15d739e41c450e8,2025-02-26T00:15:11.250000 CVE-2025-1094,0,0,dca1378d2e11e054a0baff76bda52bd172b0e41af32ad66e0ce66e679989e2ec,2025-02-21T18:15:20.033000 -CVE-2025-1095,1,1,e99a2f31419478e782bbf47f72838b3b2dc9030e3e931d14067584edae0a688e,2025-04-08T16:15:24.910000 +CVE-2025-1095,0,1,aca10ae4ebae50fbf2e739d2b065393a51d296e3dfc1c2ca3a9308b167281ea9,2025-04-08T18:13:53.347000 CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000 CVE-2025-1097,0,0,2202b89d343208abc4d734355b4c7ffd6f25bdeae0a3549fe1a1a5c18a5619b5,2025-03-27T16:45:46.410000 CVE-2025-1098,0,0,5e273d1d4e3b115282c7c75a71d4085bca65fed73fce8f6abccd6dd2ec5272b4,2025-03-27T16:45:46.410000 @@ -282541,7 +282541,7 @@ CVE-2025-20029,0,0,d9e3ca63dc18f9436b5043ebae0bcb543cc6452f75921963fed59e1df065c CVE-2025-2003,0,0,1ff74da9902681eb388838cb7011652f9b1b0fb32f468944cb3ae220136a25e3,2025-03-28T16:22:53.547000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 -CVE-2025-2004,0,0,f2fe93cbcdcc3165028afebaa153e333fd482abc464cdf09a4038eb2c9bdb45f,2025-04-08T05:15:39.767000 +CVE-2025-2004,0,1,97162036b7ce4e66deb2a736e669c684e86fa27398d0399c6b91076715d4d8b9,2025-04-08T18:13:53.347000 CVE-2025-20042,0,0,7331f9a32fa8f7edda7e90ecfb8214172e30817ece2cf7e097fe968d19847586,2025-03-04T19:11:26.743000 CVE-2025-20045,0,0,415d73f9fa018669b6b7896f4e36fdab92f13949bd42dccb63d15f65c73eedf3,2025-02-05T18:15:29.760000 CVE-2025-20049,0,0,5147cf342586e050754516438965bcd2818b726f9780fae2382ab9e034df3bfc,2025-02-28T17:15:16.277000 @@ -282789,24 +282789,24 @@ CVE-2025-20930,0,0,8ebf2a99b4c5c1c6b9cb7982c9aa1b34757800a21756457108aa20434e8a0 CVE-2025-20931,0,0,80628cf5e237017e565c2f85d2589faf869404232ef52d4d52e902c75a7308cc,2025-03-06T05:15:21.210000 CVE-2025-20932,0,0,452645591f250cefeb8364705b9184285f7f0ca711860108c9bef7228f459595,2025-03-06T05:15:21.440000 CVE-2025-20933,0,0,36c279b2571a17b64e8cd3a3ca4b95866bac192f6369be55dbc7be562f44587e,2025-03-06T05:15:21.607000 -CVE-2025-20934,0,0,bd25b42cc435f2d9c5469da78b49c3cd8f53630d6a0a718da989cc89c34a60a5,2025-04-08T15:15:48.457000 -CVE-2025-20935,0,0,eaad810eb8cb61fb7619ef5ad02b395364a1d6ab2034ae6bab74e160702c1e86,2025-04-08T05:15:37.923000 -CVE-2025-20936,0,0,95ed8eccbce294bf19d08ec77c2714105691119c48dc9afcaa662702794e4511,2025-04-08T05:15:38.043000 -CVE-2025-20938,0,0,c4b448b78a9f5674497541de07e4f39ffb20d14445ee30727f93595ea3b15a18,2025-04-08T05:15:38.170000 -CVE-2025-20939,0,0,a47a436dcbe55e1a3e886be099def96d6921ce556c3f8cccf3bcf80f056967cf,2025-04-08T05:15:38.293000 +CVE-2025-20934,0,1,58db690bdc08b9bd31ab1676321e93aff474c5594e698950b17179b4ece2d345,2025-04-08T18:13:53.347000 +CVE-2025-20935,0,1,650d65c6e171b5316155dd1fb3afad1d936cb7f333121fbeb6261f00e0b79174,2025-04-08T18:13:53.347000 +CVE-2025-20936,0,1,718a98c1aa89bb7701687ff6ff6b45700cac1c3a9d6f18719b0add68720a8c91,2025-04-08T18:13:53.347000 +CVE-2025-20938,0,1,95a19741f9a4b61769a304ab98d36e18cc271fa618a5db26e738b812a75ba72d,2025-04-08T18:13:53.347000 +CVE-2025-20939,0,1,987e2b49d02c033e3a0239bd9a563c706df996e3b9ad0bf3b3dc1436b19919b5,2025-04-08T18:13:53.347000 CVE-2025-2094,0,0,6d10a1626bcff91806c35ccdd7e0254c7a288801011773ef5d8ea131bd09a31b,2025-04-03T15:30:18.080000 -CVE-2025-20940,0,0,30161d22eb76fd8a3d5bb6f4f73ddda9dd1790968e20184e1df9f6224488d3ed,2025-04-08T05:15:38.413000 -CVE-2025-20941,0,0,b2af6fb95800ddc9f1c6f01eb5d2fda32294b0fd773c3bfef8c32e419e7a05f7,2025-04-08T05:15:38.550000 -CVE-2025-20942,0,0,3e4973dedb6587d23bd0b56a9cb5b9c3649af3c8df85bf3a6a03f4c51da11058,2025-04-08T05:15:38.670000 -CVE-2025-20943,0,0,16fb3841357592e9fae3bba55a43b0a4accb9c55f586178f3cc9b23d9e9c82bc,2025-04-08T05:15:38.787000 -CVE-2025-20944,0,0,6341db0fb047ef1bdcceae3e5323256cf0b2c090deed7a09fdd0240810cad46a,2025-04-08T05:15:38.913000 -CVE-2025-20945,0,0,da6418ddd7fd30763541f29e7c16d32ad88174f081f25944ac92d19a662e93c2,2025-04-08T05:15:39.037000 -CVE-2025-20946,0,0,9421e47029fa6192d427beef13b6b6c2e9869f904b434a504b2ba58331540576,2025-04-08T05:15:39.160000 -CVE-2025-20947,0,0,493c958189a782ddcbc60eb44b8ff5dbf21a37cc124b11ab3dcf9e12518033c6,2025-04-08T05:15:39.283000 -CVE-2025-20948,0,0,ae218db8c7ce2e72cec7a9346c434acbc53f8cd01779bd6ed1788cd09c63eed6,2025-04-08T05:15:39.400000 +CVE-2025-20940,0,1,71cb15f946dd635b6bf85a36004bf0149364381f6b8529d22d5a166eb7ae8b3c,2025-04-08T18:13:53.347000 +CVE-2025-20941,0,1,416f927c0a6184a77590bcda74f63d405dc088814aafbd86f4095efd976cf9d1,2025-04-08T18:13:53.347000 +CVE-2025-20942,0,1,7fab34ab47d8e900afe95868dfabb617537f5d8b420ed84afcee898c2a8ae319,2025-04-08T18:13:53.347000 +CVE-2025-20943,0,1,a1d7e11a08a18a73f248a30c1fb5fa6e87c3b70f4ebf67eaf8a42f2f47182d1e,2025-04-08T18:13:53.347000 +CVE-2025-20944,0,1,71a7e09672bade081632b603334a594c7a1780d56dec1b92bfab193ef4b17d0f,2025-04-08T18:13:53.347000 +CVE-2025-20945,0,1,26bcea1857f8dd9b979c84cbaf88cd91b5bca883acf65f117579d5e9f776e714,2025-04-08T18:13:53.347000 +CVE-2025-20946,0,1,a7f0ef41c8d399fcdde7fc3aa518d90ab2268a3cfd0134c855e58daac5a37c77,2025-04-08T18:13:53.347000 +CVE-2025-20947,0,1,80659d6899d001694f158c7efc2bae8d5a69c905e658819cde9bc6a38d99ef05,2025-04-08T18:13:53.347000 +CVE-2025-20948,0,1,f6d1bd92f635cd61b4936568dbcc7fc7c1c68ca2aa8c8bd9d88e63a4019d4f08,2025-04-08T18:13:53.347000 CVE-2025-2095,0,0,0771dfdaa7f5a9bdaa490d5905077058ee8317ef9abf41eb456694d6c50802c2,2025-04-03T15:29:25.480000 -CVE-2025-20950,0,0,d64069e3bde73321dcad24ad3371af67e0db9355340b8de2f50a0c30e1fa8c71,2025-04-08T05:15:39.527000 -CVE-2025-20951,0,0,b6f1f801c21661980c09e86f3bbbc13a0a4afdbfc74cb841f7eef24a11a48d24,2025-04-08T05:15:39.647000 +CVE-2025-20950,0,1,0159801c9148648b8f23d2df1c89375ac3ba0e9f6699a13e4cf15a70b2ebbdb0,2025-04-08T18:13:53.347000 +CVE-2025-20951,0,1,09d895bc746d2a550be66205932e05a0ff9c20cbb85bb356552015f4859a2c29,2025-04-08T18:13:53.347000 CVE-2025-2096,0,0,292db6447376201865fa6b6bca264868ca9268918f971bbc1b4140d2101af9d8,2025-04-03T15:24:48.847000 CVE-2025-2097,0,0,6047e39c4c31f56fb6b4d769332184afbdc9db68c4842cf97ac1d0c07798735b,2025-04-03T15:28:41.053000 CVE-2025-2098,0,0,339294206fd4d5be14c5ec0cfdf9d0429803ca53d006fc61729cc0a81c0f19c1,2025-03-27T16:45:27.850000 @@ -282875,6 +282875,7 @@ CVE-2025-21170,0,0,1450c7d6212057c0888c0725a2861d746344e735a3d98db59a493744ea82b CVE-2025-21171,0,0,5039d30bbad3c7a9ef0d4706f8bc1f73414fca568f5dd18586207d2df517e5d5,2025-02-05T20:07:01.797000 CVE-2025-21172,0,0,bacfb5c7449e528ff37d0b0dc34b744db150f394b1322d255e5475d0135374a7,2025-02-05T20:03:33.053000 CVE-2025-21173,0,0,777122bc11f0afe7d725be5fe0ce160609dbf692b0cdcf18e5e5b49ebf30a0f2,2025-02-05T18:56:08.103000 +CVE-2025-21174,1,1,d3b23eedeb7486dbd63e007d377c8f1d00bc0ade526056e5493de4539e747890,2025-04-08T18:15:44.667000 CVE-2025-21176,0,0,3a95640b372fc9da2c8c06537fe18e2ab9d55d13653d370c40ea3cce98ff789d,2025-02-05T19:12:24.030000 CVE-2025-21177,0,0,4f903499a658859fcb10826be90a0ea63b63f075823c3150567dddccfd65ed77,2025-02-11T22:19:45.057000 CVE-2025-21178,0,0,2e136374627162253d0167ff97a286c63e9372c61326ec5a052e546f8d476b27,2025-01-27T18:42:39.560000 @@ -282892,14 +282893,19 @@ CVE-2025-21188,0,0,61d904ce8e6c95796300defeff9d9b6f0efbb3f96f38de375b3e31d2b7fd8 CVE-2025-21189,0,0,329c5c7b58ec66de4b6d9cd35e4d5fad7c108585bdc451001b100691c802e6da,2025-01-27T18:42:24.057000 CVE-2025-2119,0,0,ab29849c56f7541fdf0c3005b1d9da81bd8ddf06649c2a19b32dc3b60d91d4db,2025-03-09T09:15:12.560000 CVE-2025-21190,0,0,819752cd3115f7af5207de865076f72a020a9a152494989bb3b0abf4b1c0761e,2025-02-28T16:48:20.103000 +CVE-2025-21191,1,1,69c784809880f84a41cfd13aa827c127934d68a0fcd63941662c1c8935ba6533,2025-04-08T18:15:44.857000 CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000 CVE-2025-21194,0,0,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000 +CVE-2025-21197,1,1,a0229ab24dae7a64dffa583fbad0f6b5f11bf03bfe880acafe01c7165edb1c44,2025-04-08T18:15:45.020000 CVE-2025-21198,0,0,53f4f6f369d20143c35bfb3b5b8897af38e7b533edcc49e38792fe973cc138bb,2025-02-28T16:55:17.600000 CVE-2025-21199,0,0,176b72582a1c759b2a221af004f3d1533ed53f519d379a96b3f3fa529467e5ed,2025-03-11T17:16:19.670000 CVE-2025-2120,0,0,0933aa4b9936e187fd4f948e78df06306502f3ac542ebc510852ac5f6bc0c99c,2025-03-10T16:15:14.347000 CVE-2025-21200,0,0,bed665fd252cfd79c02f5d4dae91a80a34e04b772a3708341c7356808fa5bc3c,2025-02-28T16:55:25.900000 CVE-2025-21201,0,0,8d16d2905177160db2b6032ff92e8d3931d8e334462a39af27f84ad6f44e497a,2025-02-28T16:55:31.473000 CVE-2025-21202,0,0,ec4260bee4bd33c21d930aa9c88a20abd99a3045b6128e76b4237cf160037447,2025-01-27T18:41:27.647000 +CVE-2025-21203,1,1,b8776d2b032da31b5919ffbbd42090d315115a1a654c1aba84f97a403c6d4d9f,2025-04-08T18:15:45.190000 +CVE-2025-21204,1,1,d42d46e35add5ffc41f6a194ab231f396370ff28107dd3bb2794bd00a1531849,2025-04-08T18:15:45.343000 +CVE-2025-21205,1,1,7b4b360f7addd9ba931ad4af9510a233bd55770d62097d6b68fc1584134a1a99,2025-04-08T18:15:45.513000 CVE-2025-21206,0,0,4b8246a0a9588c7114ed86965215dc66cea701cb1bb268d6282c30b2185a5b2c,2025-02-28T16:12:14.997000 CVE-2025-21207,0,0,101f5aedceeec8e95c7aa4d154c4fe35b53d1787f61e5e9c69598a5be6aa3415,2025-01-27T18:41:10.137000 CVE-2025-21208,0,0,6552aa4e080fa53d6aaa27d47aaaad081722abcef788f46ace27e1a9e0c90894,2025-02-28T16:11:22.287000 @@ -282916,6 +282922,8 @@ CVE-2025-21218,0,0,d47e4e79318ebd737fa658b56f12e5fb3e30018465210b7af2b0de06c0f4f CVE-2025-21219,0,0,424604839da721e4da825bd88d64a2416b0606f77e8b9a1190e69289c7bcf87d,2025-01-27T18:45:30.370000 CVE-2025-2122,0,0,c9ed4527a584d547462b8cd4e21e8f1b4222be6744dc90b957d2fea15b6843b8,2025-03-10T16:15:14.617000 CVE-2025-21220,0,0,82564910421308f385255df4786cde1003db7381c932ced5ca5e270285456183,2025-01-27T18:45:48.310000 +CVE-2025-21221,1,1,78658d5e549956073333c574448c0cd6deb61df7dceb225b8deaf468187a0840,2025-04-08T18:15:45.673000 +CVE-2025-21222,1,1,34d1f728b5a52a6c98dab31ed43361653d2c708781d9b80244f1d48ad42139d1,2025-04-08T18:15:45.850000 CVE-2025-21223,0,0,60b46abe07e24569b5150fc60453c8604d1695be1750a046f165ca749c1035bc,2025-01-27T18:45:59.727000 CVE-2025-21224,0,0,e06076d4b37df15b101a61c764231d733771a75106b77973898a9e88711a2e24,2025-01-27T18:46:27.673000 CVE-2025-21225,0,0,43d8a26b699bf26bb564adf13e70126920fe623472670908dddd2c504a6cb0ee,2025-01-27T18:46:45.813000 @@ -283665,17 +283673,17 @@ CVE-2025-22004,0,0,ec7d83042ff612f0c21b4758b3cd2e0f14c38a7a425cc15b58893f0b86b05 CVE-2025-22005,0,0,4cd51e496a9f3454848e95f5f6a05c13a69bece8dea5c169e93cded54562bc5f,2025-04-07T14:18:34.453000 CVE-2025-22006,0,0,3ae2f25725b261486943b919fae821476183fa3ab460047898f00af25ca11479,2025-04-07T14:18:34.453000 CVE-2025-22007,0,0,3d5542812aeb3ea12efdc811fa913b4e1456a9295a5ddae09e69426d5bbac28c,2025-04-07T14:18:34.453000 -CVE-2025-22008,0,0,f120b7de7afaff6eee918af7c65cdbe9b66dbc044c8812578d3675e5597d2b08,2025-04-08T09:15:24.157000 -CVE-2025-22009,0,0,6865d31272f56f391b0588d0de39fe4d74b1065bf0d0003344e2f55cbbf97504,2025-04-08T09:15:24.460000 +CVE-2025-22008,0,1,f1861e066c7602d0fb6be4b0e3e4ab42df21d9c93bd3421e979d394ceaee60b0,2025-04-08T18:13:53.347000 +CVE-2025-22009,0,1,39876f5b10aaf24703bef4be97ee51d2a32b27c9d6bcd2271e62edc553dfa3a8,2025-04-08T18:13:53.347000 CVE-2025-2201,0,0,2371e9549039387486019592f5bf6cd7cee4f08ab86a19044d07c960855c7b24,2025-03-17T10:15:16.543000 -CVE-2025-22010,0,0,2bed4b97a9f211897b042e78ab25426b3f8ec73b400fbd10e3f942a6d23b2055,2025-04-08T09:15:24.777000 -CVE-2025-22011,0,0,5ddf787aaacde1326e2d4b8497b44c431b78ee6d081ce1feae31a21c2e972662,2025-04-08T09:15:25.020000 -CVE-2025-22012,0,0,c55f40489df0bdebde815e5ee91a94f9817a21039aa97d5dd937d92d578ac44e,2025-04-08T09:15:25.420000 -CVE-2025-22013,0,0,15c062bbd4b8d867f7790f615f3a01afb129276ec33e26ed16f1296433034926,2025-04-08T09:15:25.643000 -CVE-2025-22014,0,0,20a6385621d9cfb6bd57fe0023c1a6726e21fe3726b0b681df4b6f72ec869868,2025-04-08T09:15:25.783000 -CVE-2025-22015,0,0,f5ad0d53aebb895223f4da6ab63ce41df765c7ba92c7261425fe0137b1ac10ec,2025-04-08T09:15:26.150000 -CVE-2025-22016,0,0,d2d1c2d3bb7a247c57584b4b6702681e73862d659bc2ba5de64b77636d944d2f,2025-04-08T09:15:26.413000 -CVE-2025-22017,0,0,5597612579672e38a107e9fb3e43faaf3443e37744fa6e912c6e180344edc051,2025-04-08T09:15:26.557000 +CVE-2025-22010,0,1,f88acf652cb3d6da73b75657d813960324ce38f35b32abd1ebc70acccdb79268,2025-04-08T18:13:53.347000 +CVE-2025-22011,0,1,efb46b9ea4b0237914ab8f947027203e9afbc34d005fee733a6bb917923e3820,2025-04-08T18:13:53.347000 +CVE-2025-22012,0,1,058b088ed350d800349354071fee4357ddaf82fd018990d6314f0a294c2cc0eb,2025-04-08T18:13:53.347000 +CVE-2025-22013,0,1,e1d841daf76fcef71b69c4e5a22ad4f97350e5378a8b689ae54366b50174eeff,2025-04-08T18:13:53.347000 +CVE-2025-22014,0,1,bc9b8387298f375e0da958063c23e6de2378a06711d407a941fe1cd939452f5e,2025-04-08T18:13:53.347000 +CVE-2025-22015,0,1,76ef40b09e4f1cb899d4a2ab31f22c4f6d8c6e60d75140b0b3e5777f401c7fbf,2025-04-08T18:13:53.347000 +CVE-2025-22016,0,1,147b90da5e7863ebd9aa554a0d14ec0b4cb2770bdef3a66630422d63719c334c,2025-04-08T18:13:53.347000 +CVE-2025-22017,0,1,47242ca22d32729ade7b3f671002250e206d140a0d8f74e89394f4529c76da51,2025-04-08T18:13:53.347000 CVE-2025-2202,0,0,cf0ba4cc9b924e183defbee63ce1af96a184cec0b7613a3c88b1e156bd38ec40,2025-03-17T11:15:37.970000 CVE-2025-2205,0,0,b1382e6746291ecf1fa2fa4001a821037496afd4b23e79b7c29516948b896185,2025-03-12T04:15:19.810000 CVE-2025-2206,0,0,6d4b6e8bdf6b24741a4430972818a20f8052ecfc15f1df2ff630f331c8dbd714,2025-03-11T20:15:18.487000 @@ -283882,12 +283890,12 @@ CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e CVE-2025-22452,0,0,ff338c2acc92abbef6e1d867487b0bd2693a0084a4ebaee6adef7d21d7f92aea,2025-04-07T14:17:50.220000 CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000 CVE-2025-22457,0,0,06854130f0059ca72764b9c6e13d7893e783ab5e6f2271d978b176c2139c91f1,2025-04-08T13:39:05.933000 -CVE-2025-22458,0,0,47a2addc8b510b3fe3252e495aedc9eb645d35d040e49ecde9015998ef20a6cb,2025-04-08T15:15:48.857000 -CVE-2025-22459,0,0,69bf93ab13e189d6effecfe1215a4249c855325a7ac92e79e5cd80a61b903e7f,2025-04-08T15:15:49.020000 -CVE-2025-22461,0,0,8be46fe1731f13bb01544ee07cdf0a21aa6ca271a87b80f716a628fe5f58964c,2025-04-08T15:15:49.167000 -CVE-2025-22464,0,0,166aabf9eacb7945a3df0168172a9a84981addd3c0499df0e11e86cf377f5fa1,2025-04-08T15:15:49.310000 -CVE-2025-22465,0,0,c4835292a5f37fe997eb8d0a4585aa649d7c9c20ccd6fd8f8e61998fd0d9b5f2,2025-04-08T15:15:49.473000 -CVE-2025-22466,0,0,108560b9cb4cd2dc265caaa97e41de822f975ded5b128c4e7c4b363e67e95d2c,2025-04-08T15:15:49.620000 +CVE-2025-22458,0,1,0310bb26883ce6cc1997daa8ec16445a1609bbdc1d10a0c92a2372a274c3f1a6,2025-04-08T18:13:53.347000 +CVE-2025-22459,0,1,803574726908d4841242ef9bcef05a30c709737122eae86120068b4657594172,2025-04-08T18:13:53.347000 +CVE-2025-22461,0,1,ac0ff79d18799e9e861ca9d33bd2cf43e185144b76fac6be40f2df6cda5e30b7,2025-04-08T18:13:53.347000 +CVE-2025-22464,0,1,c7424f72b2f96418913aad9be4d15eb4eede55a90794f0ba18faa47df393f66c,2025-04-08T18:13:53.347000 +CVE-2025-22465,0,1,59af6a83f339492193c42e44605376f3bda5aed7d0edfb5b53dc78af273645e2,2025-04-08T18:13:53.347000 +CVE-2025-22466,0,1,022f7c654cc1d5121d6b3bf4597e41fb8ac9a9cb85997e032207daf34545cade,2025-04-08T18:13:53.347000 CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000 CVE-2025-22472,0,0,da7c2c2731a1940c60b4ae6c1edcbbf175ca5a2d3964a03701282be7a86cbe41,2025-03-17T18:15:20.930000 CVE-2025-22473,0,0,24aeaee52dbfb2b3f71ea7cd4512b20455b60139bbfda5acf051e65598986ddc,2025-03-17T18:15:21.077000 @@ -284233,18 +284241,18 @@ CVE-2025-22841,0,0,c5bade831fbfcc0c448601d2e5123f6502d61bdcc4812c545d0acde86b73c CVE-2025-22842,0,0,faf6c920f460eaed5c71db376945195f25e95dd8f0b0b07a1be494ceccdfcf06,2025-04-07T14:17:50.220000 CVE-2025-22846,0,0,ccaf4947a08c20d6717ec860a31060641d37d75a3b98ee7b0493f2b2542b18e8,2025-02-05T18:15:31 CVE-2025-22847,0,0,0de483179c1066e1dcd28554acee3e5fb1b273a7c68d4f167ad861a991a595e2,2025-03-04T17:39:25.643000 -CVE-2025-2285,1,1,4ac3afb65754a35555c9a44e11d9e37ef95c30acda8fbfec9f3436fd3590140a,2025-04-08T16:15:26.303000 +CVE-2025-2285,0,1,768ed68f8cadb2e51078e6ab7f79b482b9ae7bc30f5270c8c1c9755b70039b38,2025-04-08T18:13:53.347000 CVE-2025-22851,0,0,f2a6332c8e5e9b9a1e6161891c357461c7bb64ff86725b50b37556c69f8a4a26,2025-04-07T14:17:50.220000 -CVE-2025-22855,0,0,abd1ac2de4144955d16a272ea7690676b17acd8daca801ba0924e98487b9a7bf,2025-04-08T14:15:32.690000 -CVE-2025-2286,1,1,bdf31803a1c7fe5b730665d3e039018874581b1255f6940ae8421518eb44bc76,2025-04-08T16:15:26.480000 +CVE-2025-22855,0,1,021f0ce6d559865f012508631f4f18936a8d85a2fdb38f591b71f892a9db3993,2025-04-08T18:13:53.347000 +CVE-2025-2286,0,1,69a44ca827bc7f60812131429c3957cf729fb23695b27d3954f6a4d9a0c18cbe,2025-04-08T18:13:53.347000 CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000 CVE-2025-22866,0,0,c708175c229fdd910b5da4acb829b622112b0d84eed2186edc0f9bf19e465443,2025-02-21T18:15:32.243000 CVE-2025-22867,0,0,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000 CVE-2025-22868,0,0,e60277ea4cd9e8b52a0bc5998998d4b70d591016f1b5f98965efe1007387aa98,2025-02-26T15:15:24.993000 CVE-2025-22869,0,0,5fcceae088032b557e3959982bed74e41a764f7c84c3726bffbbd6756b1cca25,2025-02-26T15:15:25.160000 -CVE-2025-2287,1,1,5a1241d3b19414ec4ad736c2ff5223f45480fb4d9d547bec6788c90c23223f77,2025-04-08T16:15:26.620000 +CVE-2025-2287,0,1,867479dfcedb4cce723b7a24882e9d97da2870c741258a3b4042096664ac6f25,2025-04-08T18:13:53.347000 CVE-2025-22870,0,0,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000 -CVE-2025-2288,1,1,c8da406fac5ad897244c92316782ac1a176e7b01f7b5cd5ccfa8103c29e18aec,2025-04-08T16:15:26.750000 +CVE-2025-2288,0,1,6d20448db5009c36c81fa010c5ec138daa8d6c739d9191b9c8bfd5b250732f41,2025-04-08T18:13:53.347000 CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000 CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000 CVE-2025-22888,0,0,8715446d28ee196d4b5c9f7b0ea6743f100a7fae140bfca4a55cb2369c02c83f,2025-02-19T06:15:21.687000 @@ -284275,7 +284283,7 @@ CVE-2025-22926,0,0,4154f936cdf39d4699ab6e53977f618e941380c599a7e883c52aab255fa1a CVE-2025-22927,0,0,88bf50b75a659bbab243a76f03ae8c557d1d6e8ca7f2e974e1743b02183cb5d8,2025-04-07T14:18:34.453000 CVE-2025-22928,0,0,4c964912abb95b29dbe026003f54c71c7874669cb5c0ddbb2b51bc75c13be164,2025-04-07T14:18:34.453000 CVE-2025-22929,0,0,1452b8a2fff94532d0fed1efabb09a58f398245a55704e8724aa3e5034629857,2025-04-07T14:18:34.453000 -CVE-2025-2293,1,1,dc901be6198d1c33a6412d3b7d322d93f940e7cec6bb58c13e7475f38e68ba54,2025-04-08T16:15:26.887000 +CVE-2025-2293,0,1,a7982a60f7b24b088bf712ff356ab40f3b97c7c780342c39e2025736db7a73a1,2025-04-08T18:13:53.347000 CVE-2025-22930,0,0,9f037cce0cbbdbb57ebcef79426c72c5c553146b35be0ba75c142417aafe25fa,2025-04-07T14:18:34.453000 CVE-2025-22931,0,0,7040cbf9d7877251b12ddaa03bb535fb63f9768d1a2571d19941499e73bb1b90,2025-04-07T14:18:34.453000 CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000 @@ -284405,7 +284413,7 @@ CVE-2025-23128,0,0,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a74 CVE-2025-2317,0,0,9ea9ba34615d5bc5ee8806158627db355af143699ea415828af46066a4160dd0,2025-04-07T14:18:15.560000 CVE-2025-23184,0,0,d117de9ebd2827a8b285a215a95edfb5f2bc8c36d298a840f4f419212fe8e651,2025-02-15T01:15:11.010000 CVE-2025-23185,0,0,6a8fc3993811d2ce0c7ae31663c2f10b11720d00b7d18acd6d25289de30c4360,2025-03-11T01:15:34.330000 -CVE-2025-23186,0,0,a81621f9a73754c9e154016b0b996f90edff598072d6c4db34458edb367540d2,2025-04-08T08:15:15.133000 +CVE-2025-23186,0,1,e24ff484abfeac0347aa2108d965b5fa2efbb5bbd9e6a6775e16a55a54369d2e,2025-04-08T18:13:53.347000 CVE-2025-23187,0,0,c290fe7dd4f9aea98485c447bf9862acb0a55538c675ba503d3516720f3efd65,2025-02-18T18:15:33.497000 CVE-2025-23188,0,0,38b58d0edc10fc1a9c41231926b7cfaaaf380211f861dba5aaca5167b534434b,2025-03-11T01:15:34.480000 CVE-2025-23189,0,0,b372693675c5d6d50e215d8acb54007642608e3ca2a789b9ea116e268e1e263e,2025-02-11T01:15:10.263000 @@ -285145,14 +285153,19 @@ CVE-2025-24054,0,0,d7c04592c90a944816d2b917a191db0500c456f1bd376113f331acc816b92 CVE-2025-24055,0,0,a8b8e4cdf1af85735e51c417e608db31da64b217ea9a84bbe3faa9ab9f183fac,2025-03-31T02:15:18.163000 CVE-2025-24056,0,0,5c04f556316dbd8033fde99ee6b7a7436c924957f8339e64eeff70189003a64b,2025-03-11T17:16:28.130000 CVE-2025-24057,0,0,e93c1320ebadbbf28092c6fd0ce7c31e79b375949df78d42f385ee860a69efb1,2025-03-11T17:16:28.390000 +CVE-2025-24058,1,1,115a9ba4d3aed410cd2a9e13f107bf890126a24af1a2099593723abcba0dc712,2025-04-08T18:15:46.037000 CVE-2025-24059,0,0,f8e6ee3cf4f897c579e406829de1888b7cd9f5fbe1c2ec65ab850867bf744c50,2025-03-11T17:16:28.593000 +CVE-2025-24060,1,1,384d1174ae85dc6e577a2b597e34ef3cd0d472b46a722719ed5c0c2bc4f573f3,2025-04-08T18:15:46.193000 CVE-2025-24061,0,0,0ef1a7b0609ecdef4cdde81984a4fac075ad8a7c62843e2109397867e45856fc,2025-03-11T17:16:28.800000 +CVE-2025-24062,1,1,db126b16ae60ecf7c29e5ef07c8a5283a4ccf69fa12c965676122f1b7967f86f,2025-04-08T18:15:46.353000 CVE-2025-24064,0,0,218f6cc47ad1a62f4f0e68482476a0e2acc1cd45af444b7c3515886baa130a34,2025-03-11T17:16:29.007000 CVE-2025-24066,0,0,7e56714b7788604a5479b2369ba8b4d48cd703a737a947c93e3adca9df2d3c20,2025-03-11T17:16:29.223000 CVE-2025-24067,0,0,aa73fd19f10afa521de3cf2b4792d2be73d56b2986f2ec937d30f318fcb22400,2025-03-11T17:16:29.477000 CVE-2025-24070,0,0,b6bc3e3a54c94f29a6c44e2db055b426248044109eaf535e38be0b94634462b8,2025-03-11T17:16:29.680000 CVE-2025-24071,0,0,b373bffdd46d8f33af306b3087c59ead51ca2709820305f6f569bfd2c231fc41,2025-04-03T22:15:18.470000 CVE-2025-24072,0,0,ff866ef25ff8b4b04c0047326b73042c2b63916962841c2130bf0f0eac64effd,2025-03-11T17:16:30.070000 +CVE-2025-24073,1,1,7c30ca705d93e7b52f9862f7b1e288371a2df095a0195fb771de5dd642c8439f,2025-04-08T18:15:46.543000 +CVE-2025-24074,1,1,ba13060875588a7ba80cc6dece04024c8fd33a98cf6a666f6578296b650d8abf,2025-04-08T18:15:46.740000 CVE-2025-24075,0,0,1937fe3a6045711fff750df57bc19b60d8487548289224ff047afdc503678158,2025-03-11T17:16:30.270000 CVE-2025-24076,0,0,5f6e02a1a3c83b4dfc5002327031bc10d5e45c77892b582ec81598e32b3dfd1c,2025-03-11T17:16:30.480000 CVE-2025-24077,0,0,2a13c5b7197d53f42fa25d514f59fcecca291e66c5abfd6d7e0aa9d7adb7e383,2025-03-11T17:16:30.657000 @@ -285810,6 +285823,7 @@ CVE-2025-24997,0,0,b80490d4098a0688d9be5ae2794984498208bc9fe48ed009a78a58ec5b3c3 CVE-2025-24998,0,0,97ff83c7f8c3dc3c86cf3e217ce8a9825fb5a93ab4895982732725d23057fced,2025-03-11T17:16:37.670000 CVE-2025-25000,0,0,f13ce058a093981dda2f50ac04ecc528a9285e0dfa6260a521abdf4c46e1bfcd,2025-04-07T14:18:34.453000 CVE-2025-25001,0,0,c45cc763a1547fefda7795f8d11522125ff7003c83cf07f197d3b95e585aaa2a,2025-04-07T14:18:34.453000 +CVE-2025-25002,1,1,671daf2ce19425551634732e8edb7d04386bec821d08fee78dd152e8d810aad0,2025-04-08T18:15:47.030000 CVE-2025-25003,0,0,81c7aaa0459bff03b421e5d180256f499147e53c41ab2bff8ad40b62fee74ec9,2025-03-11T17:16:38.043000 CVE-2025-25008,0,0,dd0d6b1d65c4bc3e0a08b5500a49fa40b10c2ed4de56e853cd146dcf325a2884,2025-03-11T17:16:38.483000 CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000 @@ -285950,7 +285964,7 @@ CVE-2025-25186,0,0,c422218bc2b3a51bb7e35622bef2d3f79367445faa61fc891c243b951694b CVE-2025-25187,0,0,2ca61614d958811964bebe01178416385840d15966b28619da4a847cdf1ef2a2,2025-02-10T18:15:35.703000 CVE-2025-25188,0,0,2461474c8c359fbc15a8610b387ef0ac657a3108436b2e05cbe126ccfb2936c2,2025-02-10T18:15:35.827000 CVE-2025-25189,0,0,f68ee5c586d07dec9a336fb2dbbfd3c5bd132d29662e9c4bc9ff1969295aaac8,2025-02-11T16:15:52.313000 -CVE-2025-2519,0,0,4109bd9eb179daaebd0fff7bc62f74481c8cd020bb6405ae6c9556569d01c9a9,2025-04-08T02:15:19.283000 +CVE-2025-2519,0,1,53e1da806e7009c99eda2ae100302d54ee976e1f2e910b31b9e64f58222ac8da,2025-04-08T18:13:53.347000 CVE-2025-25190,0,0,96316be3801ea8e34db1f71f151e934e00015e5d1a34196dfd79e3e824fb1a50,2025-02-11T16:15:52.420000 CVE-2025-25191,0,0,ebaa2bdb1f2b2bf394317ef2b89f43fe1aabf1dfa6c9b80b2c9248cedeac6aa0,2025-03-06T19:15:27.113000 CVE-2025-25192,0,0,5783eb8b8890bb3417a87f4556b52876901aba8094dc7d2d3a854512fed49412,2025-03-18T17:15:45.720000 @@ -285974,8 +285988,8 @@ CVE-2025-25222,0,0,c2ca7e3dc29f3574e03139c7399b4994d988797dae7ad6db23b85350baa3d CVE-2025-25223,0,0,a49bb693ef5024209af2cdf099d01934d199df8e6379e744ca5e733fcd788f54,2025-02-18T01:15:09.347000 CVE-2025-25224,0,0,a4f44e8389415111624e6d3b431cded203f069a8e58de6c5b5f4eb5c08d09e30,2025-02-18T01:15:09.473000 CVE-2025-25225,0,0,50e1db0214d749384eee9692d10836c10107d4550447d640f020938a4553ed14,2025-03-18T17:15:45.920000 -CVE-2025-25226,1,1,8e39c60963b84894060b765fa1edd02c01f5d8039fd120d427c9bfe40910c5a5,2025-04-08T17:15:35.453000 -CVE-2025-25227,1,1,5879aa4a1f60f5222de751f4a47e73b8a2db3f64d359f80273b083e1ceb25f49,2025-04-08T17:15:35.610000 +CVE-2025-25226,0,1,f294b88c465d2bfc13e1a558aeef64f8b8ed50ebcc2d4e877f6bcba5a64a98ed,2025-04-08T18:13:53.347000 +CVE-2025-25227,0,1,8ae9b6b987883d9e27471c412364bc0045976ee9401090ef55f9686624be196b,2025-04-08T19:15:47.290000 CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000 CVE-2025-25242,0,0,9434714e72888d1a52e5bad48430408baa107619f6e4dcba8f508d71d8cfd58f,2025-03-11T01:15:34.777000 CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000 @@ -285983,9 +285997,9 @@ CVE-2025-25244,0,0,7197d60ca1e3285870200625d0a8d8cd04d80b30334d6012efc30f6a7dae4 CVE-2025-25245,0,0,9553bdb2bbba17800d10d6fb307dc38303cc249115fd509a4ca397b2ef8f36c5,2025-03-11T01:15:35.080000 CVE-2025-25246,0,0,f4be18dcc4810edd797ab4348573a1992ac7758447b43b4ac7e677cc18ccb145,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,45a7686ea5976edcbc598e01fb577ca50507f74bc11b7b7bfc3045e83b294c70,2025-02-10T15:15:13.333000 -CVE-2025-2525,0,0,0994e3c2e24585cd5008c660b4b50b3cf67b8598aa0c7ecb45d831be89499ca6,2025-04-08T02:15:20.363000 -CVE-2025-25254,0,0,dce9fca4daf2546c7d78ae6c8248b9fc774f1681b8999537f93e27525a72b511,2025-04-08T14:15:32.857000 -CVE-2025-2526,0,0,247948e96f9305547baa31ada19db6ed824206eca005b3144d83206016536644,2025-04-08T02:15:20.523000 +CVE-2025-2525,0,1,6681512816c86a4dc20141a0c3ff6e8c54c015b41d7df5f29fc6bf7816448bbc,2025-04-08T18:13:53.347000 +CVE-2025-25254,0,1,9ebb3ce119a7da98468fe8ab8e8f92efecddf2ee8f41c4719df4f556e2753a51,2025-04-08T18:13:53.347000 +CVE-2025-2526,0,1,b4d2665b0df39fb8efb0ebc6a7ec708e940ede0cae79c4c99d0922650362cbb0,2025-04-08T18:13:53.347000 CVE-2025-25266,0,0,14fc4214833d5ffeb8f363743939de320f9169af46798b63b6da510cc3dfff47,2025-03-11T10:15:17.850000 CVE-2025-25267,0,0,327b2100edff4cbf9fdcfe1321dc00713a82279b4ead6a7ccdc62b6f97970ac6,2025-03-11T10:15:18.030000 CVE-2025-25274,0,0,90de1f80f28c13ac592acae9058f17aeba0fd544a5c1ea5aa19b39d1d3157bb2,2025-03-27T15:01:59.897000 @@ -286155,7 +286169,7 @@ CVE-2025-25675,0,0,c72dca8ea86886a3af81f324f3cf1b0ae0870a19e6aae0e2e014084eb2e1c CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000 CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000 CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000 -CVE-2025-2568,0,0,e63a9e1a5153be668a020909330e347014fc2091f50aceab3c0ade02f9bc05ac,2025-04-08T12:15:15.760000 +CVE-2025-2568,0,1,022c86ea4873b7192b1f44a6eb946050d85be07ef6e58bb492571e06c8bb2724,2025-04-08T18:13:53.347000 CVE-2025-25680,0,0,8919bd2c5780d2fa1291e3679750e4e12f0c9d491f8dd8781fc99e5d4e2ec16e,2025-03-21T21:15:36.390000 CVE-2025-25683,0,0,3255bc8ab1d20b4d3f7b9e4f7d5ecc3209c23b4404d764181c9a91c6bf864bb3,2025-03-12T19:15:39.490000 CVE-2025-25684,0,0,3b58a1bef0cae9aea4ea5fa2ee9c7e1f876d6c7c88d8df3de973a9b1df4c99cc,2025-03-19T20:15:19.383000 @@ -286563,26 +286577,61 @@ CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000 CVE-2025-26626,0,0,832135365afe9b165e627d6f2e660894eac8d147d041aabc91e7f8de0d91e92c,2025-03-14T13:15:40.077000 CVE-2025-26627,0,0,4f3d1d8e79c6467c58c4d783e1debde01a13c4c8b3f1ff7ec91bf1fb4fe28399,2025-03-11T17:16:38.930000 +CVE-2025-26628,1,1,0a25140596edd9cc4c25b7c8a87e826d5a51f631dc2adcb59f62ab732eb1e8e0,2025-04-08T18:15:47.180000 CVE-2025-26629,0,0,119651142d226de4e69d999f757c4da3db257145ca25f65863f6aa1fd4a5300b,2025-03-11T17:16:39.537000 CVE-2025-2663,0,0,aa164ffc717e67c23ae467b3f456c05b23907944ead8fb826b0b784b736528e0,2025-03-23T21:15:14.603000 CVE-2025-26630,0,0,af7d7e5fa840c887baf50d5c1735f7aa1619e17d1764c67afb65d807890e6865,2025-03-11T17:16:42.820000 CVE-2025-26631,0,0,59a2f45a7814bc8caf629a43c5f1ff123b906077fc8e25801290af954c09035d,2025-03-11T17:16:43.110000 CVE-2025-26633,0,0,5f33cb21fce2f0bb3c6b3d8a478731b982f566391108f0ab4112eea241a8777e,2025-03-13T14:27:50.300000 CVE-2025-26634,0,0,e4fd2b42e6c3227da4eabfeb027c93f3600e5512159933298b96dc2c0e6ab9dd,2025-03-11T17:16:43.743000 +CVE-2025-26635,1,1,1e615bafd50097163abb7341dcbc6abfa28336603330a7cfa9b38df7666adb11,2025-04-08T18:15:47.337000 +CVE-2025-26637,1,1,512471b59f4df2120c3514df25fcd0f843b291f092c43f3034a303b6943c5c62,2025-04-08T18:15:47.490000 +CVE-2025-26639,1,1,4f43d33ba56a4f850e53a349ce3e12998f384effef16322b790cebfc7ab5ee4b,2025-04-08T18:15:47.657000 CVE-2025-2664,0,0,6ff0ffc262e2befcd6bc6d4bc7b0cfbc02687b745501f8524d04b60b044f64e1,2025-03-23T21:15:14.790000 +CVE-2025-26640,1,1,f8df23bd41d900fa3bf8c03c384f2638e9dbb68257a5ea9ce6bd3dd70be9e8b2,2025-04-08T18:15:47.817000 +CVE-2025-26641,1,1,7087181cb61ad99f27ed40731fef35e98e598d0fbb894c82102516cbe9fc5899,2025-04-08T18:15:47.990000 +CVE-2025-26642,1,1,f959ae117f78abfc9f7be2665e4dc08c0f0d9dc3150b75dc99664086b77a2d9e,2025-04-08T18:15:48.160000 CVE-2025-26643,0,0,fdd1c1937beffd124d32a1ceadd3f98e87693b9c4f7e4b7907e61b194eac7eb4,2025-03-13T17:34:08.587000 +CVE-2025-26644,1,1,e85f11a9a23f0f606fc79f7cefb1e01920b87ad4991b5d2bcfc6036cb6c2a0f4,2025-04-08T18:15:48.347000 CVE-2025-26645,0,0,c81d070a14a19f5aa832e5ee1c6a2271fc8ee18e21d17ccbca0820999b902cec,2025-03-11T17:16:44.200000 +CVE-2025-26647,1,1,fbf390df40b86f16c332c0baaf44676843933d69264d20c3cfb64cd42b538e16,2025-04-08T18:15:48.510000 +CVE-2025-26648,1,1,de4a72ce8b439a9d1b39a17691ae42e4232989decfa21af8ea6047ab4b0948ee,2025-04-08T18:15:48.667000 +CVE-2025-26649,1,1,387ed3e0c7a2e40dbda2f5eb6dbd44aeb72076a26299faa40ba800db104ea684,2025-04-08T18:15:48.843000 CVE-2025-2665,0,0,374db404c8969e7c1a917201d9c10b42061053e18c1f29851f060f01a96376d4,2025-03-23T22:15:13.340000 -CVE-2025-26653,0,0,58a100fc55a5df34be5be38a38a57bc1234e805131cd72c9f4d140f8c6d11e63,2025-04-08T08:15:15.710000 -CVE-2025-26654,0,0,e5c04cd51fc29d2bafa7830154665acd324cc8ebce0e19b8b36edb15b906fce4,2025-04-08T08:15:15.903000 +CVE-2025-26651,1,1,09a8b1e7a8c5b5a0239a883281f819389bc6658dce60154f26dc26f91715b603,2025-04-08T18:15:49.007000 +CVE-2025-26652,1,1,133500f3d86d9fbc17503ce3f8d24c038cc8a083b168a8c373b19c1a69858cdd,2025-04-08T18:15:49.157000 +CVE-2025-26653,0,1,3d6c5ba690f95d5864e1a1e14cc21341e0ed47cac4c9c669fb0f1a40adb6989a,2025-04-08T18:13:53.347000 +CVE-2025-26654,0,1,ff47e67de947e2f39763845f22e5568b1e4c59563a24fb43a67bbdcca66081cc,2025-04-08T18:13:53.347000 CVE-2025-26655,0,0,2310006db81bae09c090aa02bc791abe44ca64048768875a974f320de93200af,2025-03-11T01:15:35.230000 CVE-2025-26656,0,0,34d4e35bb90461dd8f0d5168b5f8b88670bcc47fa5d50deb31db349b1e214e76,2025-03-11T01:15:35.383000 -CVE-2025-26657,0,0,bcf81fc79d840325faed8dd88b9788a690db409b9bc6c8aeb44fa28207231c1c,2025-04-08T08:15:16.077000 +CVE-2025-26657,0,1,e15e565867915e4b6227f13b30c0e448dd3baeb4fd3bcdcfd252a08b40401dc7,2025-04-08T18:13:53.347000 CVE-2025-26658,0,0,aedc4d0eb67f4f5f0b6a3ffda635a52c1b05624552df9e00a6801f2a11a2af99,2025-03-11T01:15:35.533000 CVE-2025-26659,0,0,e49bb37eae4d802d08529be287a8ee45c0a41d1e6476deffc54020440698032b,2025-03-11T01:15:35.683000 CVE-2025-26660,0,0,b711a00f5dfa32959fd3c766aaf7ba4ea22e4bae0e839f8f050152da069fcd60,2025-03-11T01:15:35.837000 CVE-2025-26661,0,0,6b07aa7e41ed32b21c57e51684aeb9e36856ccd243be242f1a25b61ed08c5995,2025-03-11T01:15:35.993000 +CVE-2025-26663,1,1,8c3100eef3dc148b9be3ab24a65eec58deaab55d175d06ffc6a8351cdc64e065,2025-04-08T18:15:49.337000 +CVE-2025-26664,1,1,afeba101e584f70177fb505e81d619cb3934fda090b055dd3861fd581767269d,2025-04-08T18:15:49.510000 +CVE-2025-26665,1,1,8fe39e7ebb6fbe257075b5fa63fc97fb8794f7bc09da46f26e468dc89d047123,2025-04-08T18:15:49.670000 +CVE-2025-26666,1,1,1ba56e839161e92f8889f1da24def40baa4de9e03b479cb1e847321b6e9b9e49,2025-04-08T18:15:49.833000 +CVE-2025-26667,1,1,aba40d8eafb560fe7f61df5e3d01471b1b930860b5bf3e560ff4fa03ef3dbd44,2025-04-08T18:15:50 +CVE-2025-26668,1,1,9f566e464683c9abc175804c8e7cb90333b49c7086abb3370aefe5e1bbcd7193,2025-04-08T18:15:50.160000 +CVE-2025-26669,1,1,557e299f2000ca166d5478c66d27776a797829319fa78fdb684e7233b5152ca0,2025-04-08T18:15:50.347000 +CVE-2025-26670,1,1,b1f955960f8c216ad798e71fb0a3519574c923b3a6143292ee036fd9db5658e8,2025-04-08T18:15:50.817000 +CVE-2025-26671,1,1,d44c685d64b37700b180ac0dc2031f04055f5e29d3498bd04995fc9e33871e36,2025-04-08T18:15:51.003000 +CVE-2025-26672,1,1,6b195e8a47dd36dc6aaf49f0af3082147661a9627cc8678f9562d951eaf530cf,2025-04-08T18:15:51.177000 +CVE-2025-26673,1,1,1cb9ecb5cde2e3a311f9c373a4b6c56fd13ef68839429a88a5da99f86bb42247,2025-04-08T18:15:51.350000 +CVE-2025-26674,1,1,12f32d15f23ae6031d0597f38ca0bb4a94b1c507a5c7a9907a691a8e513da093,2025-04-08T18:15:51.553000 +CVE-2025-26675,1,1,53bbc39b58ba2db6b6b16c3115bd31b401cb233f73b5dbe044e3c2171d999689,2025-04-08T18:15:51.757000 +CVE-2025-26676,1,1,c1bec0523ddace39dbe48b49deb438cf54154e9aebd64bd5cd4ee64177f02330,2025-04-08T18:15:52.023000 +CVE-2025-26678,1,1,0cbb43b66a6796ff64b47cd6aa62802c33e9aa183d05c4015cbf4cd72e2aa3aa,2025-04-08T18:15:52.303000 +CVE-2025-26679,1,1,f5e3404b8e4797429d49b0faf57f9b212dd0b26874281d582b507fe1da53ac68,2025-04-08T18:15:52.463000 +CVE-2025-26680,1,1,447f155105a74e8bbe5c1baad889a9f49e61873c5b20074bab2b095dbec660bc,2025-04-08T18:15:52.667000 +CVE-2025-26681,1,1,12ec253ce0d4e197605094cdfc1a2f5153f9d51fb4de0e5ae8cda8d028ee1b46,2025-04-08T18:15:52.863000 +CVE-2025-26682,1,1,dafe1d3160a6e7c5d456eeadc8fafe284a2f06f0da566b644bf0f59e1974594f,2025-04-08T18:15:53.033000 CVE-2025-26683,0,0,87988a6d4c6dbe800d3c42a8efc2bd51a6c5fb95b5257787759fe32f886bbf37,2025-04-01T20:26:22.890000 +CVE-2025-26686,1,1,a9154db141613a7a4309d326a5465ae4cdfb83ac286c8debf93045521772b1db,2025-04-08T18:15:53.220000 +CVE-2025-26687,1,1,b416c2d37ed4ab54332b6ca2cc87c6c3786c63b129a0766e0b201bb489834648,2025-04-08T18:15:53.383000 +CVE-2025-26688,1,1,eeea8def850fed2435af9ac4c45e50a1c731d1ccb6de99d0f428e3118082c175,2025-04-08T18:15:53.550000 CVE-2025-26689,0,0,dec5b99891737ae6a49560338e391a9fd35d35000ff58423c3aa4180c66c711d,2025-04-01T20:26:30.593000 CVE-2025-26695,0,0,f077e716806e3aa11572737cbb762272530f7e8504d9bb6d9406f576cc783416,2025-04-03T13:30:39.037000 CVE-2025-26696,0,0,b9658e1d3c0f3dd4003407283a716267ae4de824c8808025c4c0cd47206d44f0,2025-04-03T13:30:33.593000 @@ -286789,14 +286838,14 @@ CVE-2025-2704,0,0,f50441ffd3f3109d4071899808281b529314ab4de08ae18179b1bf16c0996e CVE-2025-2705,0,0,d7cf085971e80ff2f3017b9a76ca7e7c021414ba6b4da520921b330deccd7930,2025-03-27T16:45:46.410000 CVE-2025-2706,0,0,b7301874e71862c2693f8002ec404483a315cca246767eff2f97ca78b31281f9,2025-03-27T16:45:46.410000 CVE-2025-2707,0,0,f3d66cc3dc4dc05eca1164cc031bb281faa912ba2aa015da55a5b17439ea5a04,2025-03-27T16:45:46.410000 -CVE-2025-27078,1,1,15f22fb51cb18c2a8963f17db932120de4dafe83b8a9875a13451681b676e0b3,2025-04-08T17:15:35.767000 -CVE-2025-27079,1,1,78c1cb3cdf7b53b59a81d42528f99d41a08c67368ec8576f61bbed8b5846837f,2025-04-08T17:15:35.970000 +CVE-2025-27078,0,1,87218f7b63b7b41fffa6b2514a4f915ef2872294e97c4c90284d03940c5b9680,2025-04-08T18:13:53.347000 +CVE-2025-27079,0,1,0b052eb5620ef6c2a33f5074d0cda212573793a5998bf08dec9ab464e47ff414,2025-04-08T18:13:53.347000 CVE-2025-2708,0,0,035f6de4f231540df9d0a6b0f6672e128ae938a5bee1f8e3912f75b08cd18d96,2025-03-27T16:45:46.410000 CVE-2025-27080,0,0,42e0a7d70009a70996fc58eb7f4ee4c8d798d6b5d13faea5a93ec59abf435a8f,2025-03-18T20:15:26.300000 -CVE-2025-27082,1,1,12e2af2cbfd98326ddf9e4e833f440d4fa3244554123dc0b0feeb9ae2ca3be2c,2025-04-08T17:15:36.233000 -CVE-2025-27083,1,1,039b60b71ae96731b51e6ccc43c76a5172c74b62542eff07df959a75bb6f7f79,2025-04-08T17:15:36.500000 -CVE-2025-27084,1,1,73e36f7eea828b1ffe30452accd60e40ad73ee29ff7b6bc60aab1fae91c11e27,2025-04-08T17:15:36.700000 -CVE-2025-27085,1,1,28c32c2386529fa35cef9fd2dc58f2403ced06a2e1ed5aa4f59f7943c5c848eb,2025-04-08T17:15:36.887000 +CVE-2025-27082,0,1,9688146f99f58eda43cf091607922963c43013ac11246e44399be0d3426c0630,2025-04-08T18:13:53.347000 +CVE-2025-27083,0,1,eb729563f9dc0b01861bce09ce290e604359825f7ca782181459fb54aaa99f10,2025-04-08T18:13:53.347000 +CVE-2025-27084,0,1,fe4d579deeba90be185db4a1351475121d27a0a6994a4bf72954c5023bc61554,2025-04-08T18:13:53.347000 +CVE-2025-27085,0,1,41bae7d5af4aed5bd4d5b4d560641a43bd982ebddad893d228cfcba3b1e9bbce,2025-04-08T18:13:53.347000 CVE-2025-27088,0,0,fbdc36eed3cad3a0ad2022cbe7aca458560a9c5f707fbc00203d874cefc235d6,2025-02-21T22:15:13.673000 CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000 CVE-2025-2709,0,0,d6cc52b54cf9fe42db12e08a6931ac595590cbc41e2b6527b80a4b65b7cd7d63,2025-03-27T16:45:46.410000 @@ -286877,7 +286926,24 @@ CVE-2025-27178,0,0,c0d88664738e20e92964f976914afee130c9a89aa0dbea09624f6f217ab10 CVE-2025-27179,0,0,e658b366f7a3b06f1476082709f4a4e62efd35013484c2cf080c38676d042480,2025-03-11T18:15:36.353000 CVE-2025-27180,0,0,b19084cbc983aa321eeb856e49b47a1e72dbe787bf6a8284a3874ff61419d220,2025-03-11T21:15:42.463000 CVE-2025-27181,0,0,a6a9ce63b284d6ceeb21e9a4def4af91dd2ed31fd65fd783300575a45140db01,2025-03-11T21:15:42.613000 +CVE-2025-27182,1,1,10b98bb344081bbd7a7aafff3ad789d4caa2bf7a0fbe771de1edac596ab1a6a6,2025-04-08T18:15:53.740000 +CVE-2025-27183,1,1,a5825a0480ba31af25dc3747a70700a2d8e459d39d0cf34f8e5ff6c3c83edf06,2025-04-08T18:15:53.937000 +CVE-2025-27184,1,1,3055500183228bfee6cbb76c92db98ca6dcd291f749461d4e215bc90ce604346,2025-04-08T18:15:54.090000 +CVE-2025-27185,1,1,b9208d25fbe332631875bc3d1250ff6df87305662e944a4fb9bd6a9cedfcffa6,2025-04-08T18:15:54.233000 +CVE-2025-27186,1,1,be2947e6dd405aef88d33a294e3580ea77cecdb07a4e3a25d26400a7f23aba7d,2025-04-08T18:15:54.380000 +CVE-2025-27187,1,1,57f151cfe4ccfbd351acf474fa2570b4f81eafbb9e33115e42beaae9a8938b0e,2025-04-08T18:15:54.540000 +CVE-2025-27193,1,1,d661cd7214e76313a3763116228b554601c88624c0b141c0e82fe4ee82a3ef01,2025-04-08T18:15:54.687000 +CVE-2025-27194,1,1,fc43960258c9727aff4c1ad62a9440348dea06706b4cd698b947741bcd9d7b2d,2025-04-08T18:15:54.853000 +CVE-2025-27195,1,1,bc2847ea218716db92331474387eb1c775a89f64d9edd2bc214c5f2fb5970984,2025-04-08T18:15:55.027000 +CVE-2025-27196,1,1,0bc1109e04077430724ed05c2e192c8f4971d67d09d26c27c350dadcaee1b639,2025-04-08T18:15:55.170000 +CVE-2025-27198,1,1,94334ea4b134ac54f4e631b7f40bbd5e1aec2d20e2b7e3d1f09a1667075a3633,2025-04-08T18:15:55.323000 +CVE-2025-27199,1,1,c0ba8a3d5135706872f52e5315cac70e76c8f9e6437db3073559c23529819c22,2025-04-08T18:15:55.477000 CVE-2025-2720,0,0,9ae0525d8f85a05348d1159e71fc380adf3a8b9852bd68a0d6d2a49136b12cab,2025-03-27T06:15:29.720000 +CVE-2025-27200,1,1,7c335fd08050e11f5dcccef3d0aea7bc26d93cb094a340453f2003361ef0ee6e,2025-04-08T18:15:55.630000 +CVE-2025-27201,1,1,5d8225ad324bce720111eccf49407722ae92c1c4849b131f807f48a2e6733445,2025-04-08T18:15:55.787000 +CVE-2025-27202,1,1,5cee2fc48ed531473f15d62c328c72adc5c20fd086476e1e39820efe0ed386e2,2025-04-08T18:15:55.960000 +CVE-2025-27204,1,1,491d713319471072e7b63a3f7dcfd26bfe63ce804776efc640294af204a4562d,2025-04-08T18:15:56.130000 +CVE-2025-27205,1,1,5423c9a56440b3547feb4f381e48ec4ead9ed1fc4da0823a60b64d5adc485646,2025-04-08T18:15:56.290000 CVE-2025-2721,0,0,0ea4b131912f1c1068f18b233bf30f3ee27e9289a3b0d0502eb3374bc8db710c,2025-03-27T16:45:46.410000 CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40a25,2025-02-20T21:15:26.510000 CVE-2025-27219,0,0,daf263bc5dc335c24b10a63de4b30bc2cd803d7c7b13164f0156e1db3a4313a5,2025-03-05T14:08:20.493000 @@ -287011,28 +287077,52 @@ CVE-2025-27424,0,0,adf668e3c9da25d6988b65719ab3ae75e8ad4e12b749c578b26687f0998af CVE-2025-27425,0,0,c54e7d57183b35696ef02157ace5e7fd42481ebab040d62abf3070bfa84b558b,2025-04-03T13:31:06.323000 CVE-2025-27426,0,0,9e747dc870c0998abb3ea7b3f3a4eaa73dd29484d0d06dd5ec65096667269572,2025-04-03T13:30:49.883000 CVE-2025-27427,0,0,d565503dda339161e0c992bbf6fbe87052f992922e0285903e51c88162194d98,2025-04-02T22:15:19.083000 -CVE-2025-27428,0,0,2e00efb7c518344fda016741534aa27c6125843a8f71ac323dc3aba7cf97cc43,2025-04-08T08:15:16.230000 -CVE-2025-27429,0,0,bdfa24ad8119acc327c487975203b4b39b98635d21110a1b77cdd4b91660dbac,2025-04-08T08:15:16.397000 +CVE-2025-27428,0,1,9d4a393ebf9f527eb9f0b93ac4373e3ea15e281d10c2935f997ad96e9026a450,2025-04-08T18:13:53.347000 +CVE-2025-27429,0,1,e9c8d55b06ff9a31eebf269207964014eaed2a79edaa6a0c360b385b04695c66,2025-04-08T18:13:53.347000 CVE-2025-2743,0,0,8741e8ac5692905097a5a8e28797893f3dce794ca5823d56efd29770d2cd5a77,2025-03-27T16:45:46.410000 CVE-2025-27430,0,0,c8635f0b92dae7bf8e99c5e4e8dabb23fa1cb6267b38122c26d97fb0aff537e6,2025-03-11T01:15:36.157000 CVE-2025-27431,0,0,85033e3af4b6365958fcf162dc58009a9515212b38e9ac59600dfcd228492344,2025-03-11T01:15:36.310000 CVE-2025-27432,0,0,0097aad049d9f686ea71d8a6054e6d326f3e360a2d590fa8120819d74b49d0b1,2025-03-11T01:15:36.467000 CVE-2025-27433,0,0,e161df957ed89fa46830bd8be5e6f3613bdc39078a458446704c6b6e2d24aa49,2025-03-11T01:15:36.607000 CVE-2025-27434,0,0,9f3eccd1b65f086459b76c648d1b4ecbb9099d890e6e2239c04c850b487f55a6,2025-03-11T01:15:36.760000 -CVE-2025-27435,0,0,7b4f73a53d9d9fb7923a111ed6a4f02a04a7c91dd38687b333eb971a029d829e,2025-04-08T08:15:16.550000 +CVE-2025-27435,0,1,973be074daf0b0677bb9a5eaa7c327b6c41dc75c01768ea3c1ac2bea6b1daf12,2025-04-08T18:13:53.347000 CVE-2025-27436,0,0,e9dd40ff33da1e03b4af0fe710cae520f535a38763cba00e5b84d8f0ada2e28f,2025-03-11T01:15:36.920000 -CVE-2025-27437,0,0,215e7ade3cb15635674865941d74d1ec55f8829616844e53d484e0f8f105876e,2025-04-08T08:15:16.697000 +CVE-2025-27437,0,1,a0e17ae847ec1881ceca0cac60fc4ed064633f5c69f4991808c71db7b822de2f,2025-04-08T18:13:53.347000 CVE-2025-27438,0,0,aa271b66950b27900a45ff14fb7ffa30a34f109c554f6e3ef42a2a6604aa6c9a,2025-03-11T10:15:19.407000 CVE-2025-27439,0,0,0adb16bdd8175e50b2012f79d28e4b0f799da16ee6499b9aa741287f255e0365,2025-03-11T18:15:36.510000 CVE-2025-2744,0,0,70019c1a1354272236c9eec45caf986c8b60cd8d3eddcfb250ce564a0fe4e958,2025-03-27T16:45:46.410000 CVE-2025-27440,0,0,86277272131892140b431c748dacaa4d43e60fedf1d6315607fc09340bd3b7ff,2025-03-11T18:15:36.653000 -CVE-2025-27441,1,1,c81af3d956cc688c6a4a768321bde91f6587e37b4f0486d9eeabf291bc759ef8,2025-04-08T17:15:37.080000 -CVE-2025-27442,1,1,6ac6f35a008e0f0ede7a5330ae8abb3acf4f3d4f73145df77b75159a41b43d4a,2025-04-08T17:15:37.487000 -CVE-2025-27443,1,1,89a84d34de6c8b22c78adb0c6d7cbffdf810e646416a8b4a0fc8f30660302952,2025-04-08T17:15:38.113000 +CVE-2025-27441,0,1,e155e14530b453f75d9ce639c083535c2bb462e7677c02675b54cdb7ec5e7718,2025-04-08T18:13:53.347000 +CVE-2025-27442,0,1,590a31d2a85410cb452a92fc071cc7f6866652e66bdb0d80e7251943914c9c3a,2025-04-08T18:13:53.347000 +CVE-2025-27443,0,1,7a8323fcf0a74c428934ea50aee57123e3ecf5387592ae2d2dd2c1570929e5e1,2025-04-08T18:13:53.347000 CVE-2025-2746,0,0,71c2d17f9a5c716435e405e404de90f26a63b0f3426fd27a8f85b67d8ccfbefe,2025-03-27T16:45:46.410000 +CVE-2025-27467,1,1,2a73654408d523ad18335daa555958cea5a2bcf7767ea2db76534281e2f4d418,2025-04-08T18:15:56.453000 +CVE-2025-27469,1,1,5601264d2fe4901757f920d4620d82cec568f38fa347f6a6fe97087fd5fc2c11,2025-04-08T18:15:56.613000 CVE-2025-2747,0,0,893662fb5676d31ead9a58cd136c261bd2570bf64bfceca741f28b6354fadd24,2025-03-27T16:45:46.410000 +CVE-2025-27470,1,1,ad763281c1b7c9529df4885beea0a52246049a4b25777cbeb9666a7155e8521e,2025-04-08T18:15:56.797000 +CVE-2025-27471,1,1,42689d5823dcf54a4d86e9b5112d313d6dbc537abb64984c089229b5a9d417ec,2025-04-08T18:15:56.970000 +CVE-2025-27472,1,1,921e06f420583ebd6378cf1c02afd7c01d1a736ab0fc410ba88f6f921f870105,2025-04-08T18:15:57.140000 +CVE-2025-27473,1,1,3ccae01fb477d376f5b11275b86172659ab74239026607d55b2bcff2a194b7a7,2025-04-08T18:15:57.290000 +CVE-2025-27474,1,1,2feb2f5bfa0f87f832be3fe8ff6dea419d5d3e2d78d5dd41458d205b9aa18339,2025-04-08T18:15:57.457000 +CVE-2025-27475,1,1,3dd2fed416cf7a495bf91c30ec62387eb3c43ba58244122750051207ff569f24,2025-04-08T18:15:57.620000 +CVE-2025-27476,1,1,5001e058fd1a4857f1168646bc904df7c20adb0cc000afacf0a4b0aa7f3a0886,2025-04-08T18:15:57.777000 +CVE-2025-27477,1,1,b52fada90832e5a7af0b9dc3e633c1dc5bf941efc6f4b013524d949a07370ad1,2025-04-08T18:15:57.947000 +CVE-2025-27478,1,1,5ec924fd4001bc766651eff25fc88f0ead8d28fe204f02137b02f9f02624c09e,2025-04-08T18:15:58.120000 +CVE-2025-27479,1,1,087a58c6a862c5f2eafb4e9a98a6a017dce03c6b7abf3f90fc8bf2774a71afc6,2025-04-08T18:15:58.287000 CVE-2025-2748,0,0,ebc7389a6b5f06bc936b869752f476de54bd76de60953f756ced1aea5c0e21b8,2025-03-27T16:45:46.410000 +CVE-2025-27480,1,1,90580f72d2378728bf83ee70ac86b198aa3604afa9e8c8ea5616b7953ecdd4c5,2025-04-08T18:15:58.447000 +CVE-2025-27481,1,1,d596ca48c2334b25f555332fd64880b088a4adf431f54d8cab6632bb521da0b0,2025-04-08T18:15:58.610000 +CVE-2025-27482,1,1,739d080455c3a462d5baf47ae8236dc008239608ebea6d02b0c6722d380f5182,2025-04-08T18:15:58.773000 +CVE-2025-27483,1,1,fe73ed6ac064d4488634177b0a8616d779c008b50c412253a581a94b7f16f004,2025-04-08T18:15:58.943000 +CVE-2025-27484,1,1,3a80d2a1d5161a540575a437e28454adfd44eab70917c07b50c3071d01caed82,2025-04-08T18:15:59.130000 +CVE-2025-27485,1,1,bbfe4db28a59b0f2426e10b85ea7eccf84679acbe8d55b776209b95f362a8b76,2025-04-08T18:15:59.300000 +CVE-2025-27486,1,1,3e7b6f4d737c20531961341ab324f2f29f75fc8caf8154a15c8243925de48bf5,2025-04-08T18:15:59.450000 +CVE-2025-27487,1,1,8ae780b917635121025c48e5feb92f05a7288b3c0a0fb52f61a73e03d5577c57,2025-04-08T18:15:59.620000 +CVE-2025-27489,1,1,b5dfb4b91b6c63809b4c94c94adb5b3649ac1ce7c2ecbd124b54f3370b0d5bf8,2025-04-08T18:15:59.787000 CVE-2025-2749,0,0,d5c23d9cde9d80aa1fbed3bbb517b5bdbcccd79985234132ec9559d4ffa36ca1,2025-03-27T16:45:46.410000 +CVE-2025-27490,1,1,6db348c123dee972b3f72cd50e502cb86dce74f9b9605e620eca35e222c86d70,2025-04-08T18:15:59.953000 +CVE-2025-27491,1,1,a45e6c43bf22e9a1e5b8ec4814b14e81b13d1b147ffb40819d94be19381cd4a9,2025-04-08T18:16:00.140000 +CVE-2025-27492,1,1,3de17d8a5ec858f32a34415779040b6fbabff2f731a830fad5b3c88880310f85,2025-04-08T18:16:00.313000 CVE-2025-27493,0,0,5ed706f73f968eaed2a73fc0af7fc79cff24d7e3704ee418b1a94e6ee4caf2fe,2025-03-11T10:15:19.577000 CVE-2025-27494,0,0,629ff8926515d0723828ad76be68973f23d7843531167cb70ca06bf9d4ea120e,2025-03-11T10:15:19.783000 CVE-2025-27496,0,0,ccff5911af72635aa70d4fd8c0ad1b78ee109057412ec57494c2c4bd15ca4a0a,2025-03-13T19:15:52.050000 @@ -287164,6 +287254,31 @@ CVE-2025-27715,0,0,3945a29c5f5d17f328e68afe21b406dfe2951d48ca4e13bc184b7c24d7c6e CVE-2025-27716,0,0,684e5dfa71a2b1140f79e97b358f07ed099609c7dc59a57e04c089cfb53857e0,2025-03-28T18:11:40.180000 CVE-2025-27718,0,0,4ae0e44d09876a5600bf40aeaeaa3445f632ff2369ef793f3100dbaf36c9c477,2025-03-28T18:11:40.180000 CVE-2025-27726,0,0,8759c60319914b023e036c6f48a1b79eaac43e1e5a04e8c34d49c277a3332a2f,2025-03-28T18:11:40.180000 +CVE-2025-27727,1,1,d11ab7e43bf1bc90f2046ee7431eb803cf5f59a9e7485289df84f009d0ae4f5e,2025-04-08T18:16:00.477000 +CVE-2025-27728,1,1,8d8c0c0fda0f3e0bdc89b0940a872a746dfd56bb0ef5769dd2509d459ee8db2d,2025-04-08T18:16:00.653000 +CVE-2025-27729,1,1,70a328f5552cc2d11d046738553ffe3ff158b6de6f0e805765c659e94a1fdf51,2025-04-08T18:16:00.813000 +CVE-2025-27730,1,1,01cf96b9548f4d456ea2087793d81f599730a337ab688d2abe1b51d0ff1b58eb,2025-04-08T18:16:00.990000 +CVE-2025-27731,1,1,5174853f8c4bde432356f9ceb6972e5aedcf1841137ff2c87894ac0632fc9a8d,2025-04-08T18:16:01.163000 +CVE-2025-27732,1,1,212362c5fe24f76348437b7ab56a2e48a74ca2749b4ae70fdf8257e263b10603,2025-04-08T18:16:01.333000 +CVE-2025-27733,1,1,6dfa069259ed0e0eaf1b09d03ad19b4070ab35ca866efd503af0ba554b856f61,2025-04-08T18:16:01.517000 +CVE-2025-27735,1,1,35ea91096bb5f7cda696b2d73561fb9b085d8a86f81dbb874f595c540e2e165d,2025-04-08T18:16:01.697000 +CVE-2025-27736,1,1,32c9a30b90e36358a416a758b28fc60686102195b49781ef3079299d3379e4e2,2025-04-08T18:16:01.913000 +CVE-2025-27737,1,1,dbf3e595619ed2d24c761ed7c6b49a3636bafa2d5c568ab8cb980afb546ecc92,2025-04-08T18:16:02.097000 +CVE-2025-27738,1,1,3f1818d7d9efef7a27d0939fd25be21df4b6722dd55f81338738aaef253b3992,2025-04-08T18:16:02.280000 +CVE-2025-27739,1,1,4a716f08ced7199a080449bf4476e3505665d83323059b6f0df6d10b31df6f0f,2025-04-08T18:16:02.470000 +CVE-2025-27740,1,1,97a62975a2a2272bbf16d94fedaa6215c6436d9238587707e43244453f43ff15,2025-04-08T18:16:02.653000 +CVE-2025-27741,1,1,56b90e81ec810e85c5fef09120311317df8a110725991ff9c072e7868072b0d4,2025-04-08T18:16:02.833000 +CVE-2025-27742,1,1,0bb2d329c4cc61dfa016e570fdc0ba4c080cf40cd7af66d2f9ffbb49ae63864a,2025-04-08T18:16:03.040000 +CVE-2025-27743,1,1,f8bbe29c88720dbe020ea289286d198ccbdce65dd9def78a750e5d9d0aa6fedd,2025-04-08T18:16:03.260000 +CVE-2025-27744,1,1,dce8e5447f79f3550296e024b50f0dd4f407917e48b66ae88da00a5ed9c08ebd,2025-04-08T18:16:03.497000 +CVE-2025-27745,1,1,e5fbdd2331a4297014bff843f01f214136f0631d707b239b45348eaf00d73b61,2025-04-08T18:16:03.670000 +CVE-2025-27746,1,1,9f22ae375c1d81cdad52525ae9d37af6f221ed6d1b8c7a07677c034138927fec,2025-04-08T18:16:03.877000 +CVE-2025-27747,1,1,6c529adeef63d4260741c758376cf260e4f2f5c87ba396b258ec2a63d87a8ba7,2025-04-08T18:16:04.047000 +CVE-2025-27748,1,1,617afee794df0644b07e0014a928dbc83e62570ee173b50ec928b2085196a054,2025-04-08T18:16:04.213000 +CVE-2025-27749,1,1,4532344b5c02c703b8aa0070eda94695ec8b5a96d75139d5829f79449b7938e5,2025-04-08T18:16:04.370000 +CVE-2025-27750,1,1,df3fc27826f09a10fa0af74ba15f90390f3f39f518f9f03dae88aeba44194ba9,2025-04-08T18:16:04.520000 +CVE-2025-27751,1,1,ea299544869d65b39f562395b78a82f70d554de8b8237e5328263366cc284881,2025-04-08T18:16:04.680000 +CVE-2025-27752,1,1,3e76c863ee825f210f5f87029d2836969a522c0a0509a071a8a6940b63e037a7,2025-04-08T18:16:04.840000 CVE-2025-27760,0,0,0fe214e27ee00978be2b2db20453752d3c587e2a097907bcd7b6f52eec4fd67b,2025-03-17T23:15:17.740000 CVE-2025-27761,0,0,ccacd385546f9e849c6762c7104b07eacb4ee137232b68db7722ae4c039dd182,2025-03-17T23:15:17.807000 CVE-2025-27762,0,0,2807d546b38a9bbaac57f4b35c24d7978c6bb44d3e22ed6d6636bd10822c6fbe,2025-03-17T23:15:17.863000 @@ -287245,8 +287360,8 @@ CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccd CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000 CVE-2025-2803,0,0,e47ecd50bab8435762f20a0360685d74e0ceaca5cc3e5df3e0509ccc4da5c57f,2025-04-01T20:26:30.593000 CVE-2025-2804,0,0,920f730e5efd8732e0e5abb52416672a1a115bcae2eab5cbf394b4b15549c65b,2025-03-28T18:11:40.180000 -CVE-2025-2807,0,0,13a598db827a1b55c2d01d688eae408cbeef468c81f7cf27eaeefd3d38b0e726,2025-04-08T10:15:16.780000 -CVE-2025-2808,0,0,e7bfb734c1a2ea1587a06fb6b2eabdf9987ab02a2a6212e24d126411d61c6573,2025-04-08T10:15:18.940000 +CVE-2025-2807,0,1,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000 +CVE-2025-2808,0,1,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000 CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000 CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000 CVE-2025-28090,0,0,493fc323568428ac078046a31d0aa0ab344284d8b92655b7299afbb44b2e5613,2025-04-07T14:18:13.877000 @@ -287271,7 +287386,7 @@ CVE-2025-2825,0,0,1348b20aa0e099976065c5f501f6dcf6a498c894986b887d248ad2c9caac70 CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e388,2025-04-07T20:15:20.173000 CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18 CVE-2025-28256,0,0,b63d6b95334cfc627eaa3f9ee9948e650cb545bc12e96a49e4c25681e746d651,2025-04-01T20:26:30.593000 -CVE-2025-2829,1,1,d9be9d9cd986deff3d9773c86780322a0cbb580f28797e63eb6c5565528c796d,2025-04-08T16:15:27.133000 +CVE-2025-2829,0,1,3236ac6829fa593b108062dc7ed6dec4d108a816e3369d16a58cafd0a0c630a4,2025-04-08T18:13:53.347000 CVE-2025-2831,0,0,1ae81597715ce516aca81a4f719c74684bee390c094eaf6c3092e19f96d27ebc,2025-03-27T16:45:27.850000 CVE-2025-2832,0,0,9ba849558861453fef9ac84ebe5df211359e27bc420cd4cffb0300d913dc6662,2025-03-27T16:45:27.850000 CVE-2025-2833,0,0,5ee1553047443311af90b172ce83a898e2802ed44b7f8cedda9626fc88ddfee1,2025-04-01T15:43:23.657000 @@ -287283,19 +287398,19 @@ CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4df CVE-2025-28395,0,0,9b24ada5a8721e13ff9af0b39c2b2df626c65c0a7a509c73561e1e7818a4c2c8,2025-04-01T20:26:11.547000 CVE-2025-28398,0,0,9e8d60443ba5900bbfd92275cc7544f6fdff9a1aadc815750409231b762f85da,2025-04-01T20:26:11.547000 CVE-2025-2840,0,0,1611919e470b3959ac5f5634b987862e109125e9a8a008183091dc9630f3ea33,2025-04-01T20:26:30.593000 -CVE-2025-28400,0,0,ad5f9d9083e8b5eebd9643140bef73210c875b01a8b0f3e5756ee193092254c7,2025-04-07T19:15:55.330000 -CVE-2025-28401,0,0,c2a0930bb6b2a9b2453bdf4c681993ee743d409f4af086e1ed1617c8a216fc36,2025-04-07T19:15:55.480000 -CVE-2025-28402,0,0,219abc79e1fde71497ad413d59bff25c4e2d782782df9cc22c01e9e6998ce6f8,2025-04-07T16:15:24.383000 -CVE-2025-28403,0,0,6b41bb2cf6f48cc1388dac561480dc448f2f00ea5b62162cf79cd4a9b1058e40,2025-04-07T16:15:24.493000 -CVE-2025-28405,0,0,c7945504f42b8d54b0647019822e6e29962eefac12d078796b489ff989e1426c,2025-04-07T16:15:24.603000 -CVE-2025-28406,0,0,a8aa1065e402042e0106c72abafa8e8226aedeb647de63e4acf2ebe1c6535daa,2025-04-07T16:15:24.710000 -CVE-2025-28407,0,0,c69e1481ec55d3b7573d9d9b985ef43b6487ecde792d1b981e93cb8765ce51bb,2025-04-07T16:15:24.827000 -CVE-2025-28408,0,0,8dd132b660f36dc027647440052eaec0204f6091c09f448705da65aca4ec3f2f,2025-04-07T16:15:24.947000 -CVE-2025-28409,0,0,af255d94c53f02bcc7c44f3eb3d3149dbc8da42a91816dcb4d28e5d2092e8aae,2025-04-07T16:15:25.057000 -CVE-2025-28410,0,0,deca7b61d15581fa04062b253bfeed3eeca3ec4447a55aa05224d328de10378c,2025-04-07T16:15:25.170000 -CVE-2025-28411,0,0,ce94bbb2cfe2592fa165fc47f6c19172c117cc62297fef441dbf155143a46e8c,2025-04-07T16:15:25.300000 -CVE-2025-28412,0,0,aceca59ce36b4bebccc6a04e4ae8272d44fe2b6e72e5b5745ff3da7bc0c09681,2025-04-07T16:15:25.433000 -CVE-2025-28413,0,1,321d7d386d099070a81fba8c4036f916c7aac428205d2959a89f5fc687b796b7,2025-04-08T16:15:25.983000 +CVE-2025-28400,0,1,76630d498bba22859cd4b80c83a826339a586320e85b77e4150e813d13cd92f1,2025-04-08T18:14:17.307000 +CVE-2025-28401,0,1,4d87496a83068aea297180398f247d3b3e956d1ce8c97b9198bc8f5a5113c41c,2025-04-08T18:14:17.307000 +CVE-2025-28402,0,1,dd385ca43ab82695c5c1408d05b3a2d7f7fb0e6fb2c172b74a4619ed63b52a6e,2025-04-08T18:14:17.307000 +CVE-2025-28403,0,1,40052660e9cb4d49d4641e8645ed5b301660e3acfddc90390595592963ac4d5f,2025-04-08T18:14:17.307000 +CVE-2025-28405,0,1,6ff39c140ad3da697fc3c9cfc368d9c2c0b5a74ae0eb1168d5d4551ca5fbbba8,2025-04-08T18:14:17.307000 +CVE-2025-28406,0,1,e7cfd64783107ff62625500bcec5b41e4fdc963c7fc814befc3c007ba68e3e8d,2025-04-08T18:14:17.307000 +CVE-2025-28407,0,1,3bcb2b0dd90fbb25b7769355ff1fd256aa86377e93558dc1a67a4b4f4eb351a6,2025-04-08T18:14:17.307000 +CVE-2025-28408,0,1,51c284fc6205a47532626ea32d4e69d211fc17723483c440073d9d07c2031532,2025-04-08T18:14:17.307000 +CVE-2025-28409,0,1,bd611a0c0dc3c7a9d40087dabb7dc3b1db1337c16df4740bf98b0a445c5c6920,2025-04-08T18:14:17.307000 +CVE-2025-28410,0,1,50822f8afea483886e74794f92abb270b22bb51d352f280f10de090b70e4122b,2025-04-08T18:14:17.307000 +CVE-2025-28411,0,1,05d0621450ffade1847d1583a8c565af41e782f0dd8d642dbd52fbc0f3564a3b,2025-04-08T18:14:17.307000 +CVE-2025-28412,0,1,cd45a3781f846e61b80f970bcc0fca1b933014b2be506febd5ed9cf6dc93fdb3,2025-04-08T18:14:17.307000 +CVE-2025-28413,0,1,6e427fb51c642104f21ec54972a42cf8f0de05de93d3efadbb0da68f1915fbac,2025-04-08T18:14:17.307000 CVE-2025-2842,0,0,47b6fed0afeb8764a2eae2f8cabf83dc45e6430c2005f12d42ece8f2faf4ea8d,2025-04-04T14:15:22.517000 CVE-2025-2846,0,0,3b5287c806e8bc80973f9baaf0ea026d933f9fa8ff940c7a3667c18ec778e524,2025-03-27T16:45:12.210000 CVE-2025-2847,0,0,432b048d8c8afdfd4c92ac64bc4ec034bc3baee4250e2624e5d27f22cf3fe391,2025-03-27T16:45:12.210000 @@ -287317,11 +287432,11 @@ CVE-2025-2868,0,0,85b9dc17660105c1d52e94e9c61b1a822461960fd4e0c0e93de75ddcee9642 CVE-2025-2869,0,0,5066d8ca712c82ee845e66f8b1fc3a6c9e0a4e6b74c2b3263804ec9c98b4e586,2025-03-28T18:11:40.180000 CVE-2025-2870,0,0,532ce24468347275f11c46ecc24e5d6555c309a32268ad9ae9a421f0ae266a95,2025-03-28T18:11:40.180000 CVE-2025-2874,0,0,6a503ede6640ff91644e2f2d002d5c6c981994fafd27ed943d3456640dee218b,2025-04-07T14:18:34.453000 -CVE-2025-2876,0,0,8a04444f60d0c286f113af81e09efd398da0aec904766cae13c72e9a062c1e16,2025-04-08T12:15:16.820000 +CVE-2025-2876,0,1,93ded195bcbb0b5d9f004109e54f45d215e3de9103bc5d8820997a2888ec6270,2025-04-08T18:13:53.347000 CVE-2025-2877,0,0,84ec84d2bfb12624c83348efbdfe58ac8be43428be65066c732bbd9fdb6142cb,2025-04-07T16:15:25.720000 CVE-2025-2878,0,0,125728ac281a69ac5ecf14e31ba48aa14b6b6ffc7aef5853980db8dfb30bd674,2025-03-28T18:11:40.180000 -CVE-2025-2882,0,0,37159719a6744bd7c4b3e5214bb194116cb1f154395ebf42cd3293c288a9a410,2025-04-08T08:15:16.860000 -CVE-2025-2883,0,0,545a7679e9b3c6c1b299cd5e1d8da407be62e3f85141aaa4314765c3b1cf020f,2025-04-08T10:15:19.197000 +CVE-2025-2882,0,1,c97b3f3ea8d4bf1b525408e9c0aeb5839e6b1dab2a43ddecf7ef1915f34a41ad,2025-04-08T18:13:53.347000 +CVE-2025-2883,0,1,de11120bf19ac8735b713769da981d898702017cd1ccc7eb0f5a880098b288b6,2025-04-08T18:13:53.347000 CVE-2025-2885,0,0,e2d01fa5043ddafa560e776b063da46f782fa630659191bee2d9e55b0a2acc15,2025-03-28T18:11:40.180000 CVE-2025-28855,0,0,75330c0a82318338b0154938e1fd86b9e7a50bcf39b7166c9aad55a9af1a4355,2025-03-27T16:45:27.850000 CVE-2025-28856,0,0,db2bbb32cf52cca2ced522652c0571cdcf66f2f5f62f3cd167e79253416a8f6a,2025-03-11T21:15:42.763000 @@ -287434,7 +287549,7 @@ CVE-2025-29070,0,0,24569788487d0400d538146d963f6020db8a44ab6999b4d9aa33cc8736405 CVE-2025-29072,0,0,49c945210f3f78e56e41b3df1156a5372b970d771a90cb3e84f3b7747252dacb,2025-03-28T16:15:29.640000 CVE-2025-2908,0,0,041eb1fa89a8461da19bf701f06a30feb1f340b875a2b47541929394f018f7d6,2025-03-28T18:11:40.180000 CVE-2025-29085,0,0,f3b0229b2dbdb0918b1860c20c86a23a202aa8fd27b32fb25e3773ee78d284c2,2025-04-07T14:18:34.453000 -CVE-2025-29087,0,0,e301aa4e80f242ecb029dbb91c9332175482c546df9437efd128be68a3d9d04a,2025-04-08T14:15:33.240000 +CVE-2025-29087,0,1,089a9780b1f166bd8c072181912d7d69f969a758f54ce8dafb3cbd6601949045,2025-04-08T18:13:53.347000 CVE-2025-2909,0,0,97c0fe7ab6ec975ef24a907a995721890d6b9e4b583a692182e886d15cd6b91b,2025-03-28T18:11:40.180000 CVE-2025-2910,0,0,63b1776a3174c1a360045ac9eb5899920566d03dfd18cf1878580a96741c5eb9,2025-03-28T18:11:40.180000 CVE-2025-29100,0,0,03e4a9cc3df0d3df440cd5953f31e0b258dcc8840a20f25006f01137c8594a87,2025-04-01T20:06:53.017000 @@ -287478,7 +287593,7 @@ CVE-2025-29312,0,0,a83ab0803d593b7408ef47819047a8eed47716c263e6e6784a866c9451353 CVE-2025-29313,0,0,36b5dfbaccdc259f2b52ceac76431ece1292ff6ced8c88ea82c0057012874cbd,2025-03-27T16:45:46.410000 CVE-2025-29314,0,0,68cd136edb649d9eb6aec698b8b31c836ad747d7f35cb5e1d05f8aa177ad8f88,2025-03-27T16:45:46.410000 CVE-2025-29315,0,0,f907f053863754eafc89ac11a469f54443f6b549eee8182288b1596f75ccbd29,2025-03-27T16:45:46.410000 -CVE-2025-29322,0,0,49a1d4b12734a52d0fc52efc2251e56869705778ed4bdca3f12b7fdef8a41f85,2025-03-27T16:45:27.850000 +CVE-2025-29322,0,1,2d154ec4512c8c4d705799afa2ea73c17ca8f22a9dcc44f2fe16f737f7f4c5a2,2025-04-08T19:15:48.650000 CVE-2025-2933,0,0,d2bf8266af3293189f2fc83d9c7224df7d9162ddc33d6ffbeb12c1b55081638f,2025-04-07T14:17:50.220000 CVE-2025-29357,0,0,eb014a723aa009227f0255b17dfaab32ae69c018e0a2e5c6777057d80a0cac3f,2025-04-02T20:33:45.110000 CVE-2025-29358,0,0,610f6132677edbf66dfcad4906cefbaf7edab86ba5e1c4ae5ea8eda11e0df66d,2025-04-02T20:33:25.387000 @@ -287509,11 +287624,11 @@ CVE-2025-2946,0,0,d1b6bc216dd9866fedcefbedd5d27e2a55560ea3e179cb5e876100bee6cdba CVE-2025-29462,0,0,2dbf51a848bf77ad433e707ac24330b357114ddd7a825b863e5708fee007dbfd,2025-04-07T15:15:43.373000 CVE-2025-29476,0,0,3010ae735c879d92a342e7748811b3946ae8287c6c80f89374bb498690e8bd18,2025-04-07T19:15:55.790000 CVE-2025-29477,0,0,2b1c163b57b7284c39b710b65fa772d27c2dfad0127610dec2abcbdeeac4b145,2025-04-07T19:15:55.950000 -CVE-2025-29478,0,0,e1fa15f399b4fd91c965b658571344e78a8e0df9f2c58703d12dd09b160b45d7,2025-04-08T14:15:33.417000 -CVE-2025-29479,0,0,886e36646f97f4ec7e2f3f1e63119ca20dbf8967ca479553fd6c7e6965456d7d,2025-04-07T20:15:20.490000 -CVE-2025-29480,0,0,48aff45bffc4845cef589163edf9e0ea4329e08c7fd836289d300333f8a326f6,2025-04-08T14:15:33.590000 -CVE-2025-29481,0,0,264c2ebf93bf9f6a2f276a874ddabf409fbeda9af33e5518a36dad5d0a79aa12,2025-04-07T20:15:20.720000 -CVE-2025-29482,0,0,5aa47d8c253bbdab99dd7d1f00bcadd9e091a6d37750d9c095c4e45dd82f1971,2025-04-07T20:15:20.847000 +CVE-2025-29478,0,1,95539760950ade4571816f9ae6141a29c105591902e01f13a4661b18fef5d518,2025-04-08T18:13:53.347000 +CVE-2025-29479,0,1,054d194811a8b92ed78ca835cf97359a7dadfbc924c63a4c67fae88ad0cce3ed,2025-04-08T18:13:53.347000 +CVE-2025-29480,0,1,f9e87a1f21fc5da9549044ee20fdffa604917728ee598a27e53e5f840fc57beb,2025-04-08T18:13:53.347000 +CVE-2025-29481,0,1,5398ce4d53c1bb75d7f4b10615bcd86cdb4a260aab103cbf4c3d88af9b812a1f,2025-04-08T18:13:53.347000 +CVE-2025-29482,0,1,cd82d90f3aa5a72a130d4236f21247d052644baad5d31694f1771bbcb2f30d28,2025-04-08T18:13:53.347000 CVE-2025-29483,0,0,a44df1db1a75ca4ccf8a0bab57f388d77d71341421d00a01658dce0d1318836c,2025-04-01T16:08:17.700000 CVE-2025-29484,0,0,24b91db5e49838949bb21585890c30ebf131a4e7d93b1fa565238059473a3194,2025-04-01T16:07:37.140000 CVE-2025-29485,0,0,76a43926d5d32780e223e5d4ded19c1f1dead02fcfd0661c16775c712330ced9,2025-04-01T16:07:18.737000 @@ -287539,7 +287654,7 @@ CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf0 CVE-2025-29570,0,0,ce09831559b48fe479ba4c5f9b34d0db4bbbbbf20068eb3ed4fe546923ebfe0f,2025-04-07T15:15:43.543000 CVE-2025-2958,0,0,9728ea5d0e1e0ffe03d484b47c7dc7d2f752fe0ff3a0cf460614ef3d0b6ffb41,2025-04-01T20:26:30.593000 CVE-2025-2959,0,0,1e1c625f609a10be5a0b8a23aebaf67e7ab0d18811ee0ee5bccb17420006f738,2025-04-01T20:26:30.593000 -CVE-2025-29594,0,0,853a65c84e3f449ef6203f6fa9db2847ae25e6db77574ec93fb2fd77b22c0fee,2025-04-08T14:15:33.767000 +CVE-2025-29594,0,1,2f622bba8fdc6dc52fbb1c6d9cffd703149b20ba0389fb0df41fe5a0ef1aba15,2025-04-08T18:13:53.347000 CVE-2025-2960,0,0,c08819bedf646cc171f0258b0a94c3a41e46867e1b14a737b82467d2de4f87fc,2025-04-01T20:26:30.593000 CVE-2025-2961,0,0,99a9282acf76e32af58efa1bac54403a0a08178dfa00cc28168e32b8a53d8a08,2025-04-01T20:26:30.593000 CVE-2025-2963,0,0,84d2c4a858a789275648d5c139e966fa3d1f94dab800d93bbe623441c26249a9,2025-04-03T23:15:38.103000 @@ -287563,7 +287678,7 @@ CVE-2025-2975,0,0,a51ab4826f882dfc9eb64143ebea4f1b786d39ebf186c00a08fe8a9302ac16 CVE-2025-2976,0,0,2714beee469a94bef5bdeffcc7963fd27d32ec325e019e7704104b1aec409041,2025-04-01T20:26:30.593000 CVE-2025-29766,0,0,65a16707b8729a63f264f0b6d3ee68b10c485cbde8735a3eb7b19a0abb3b57a6,2025-04-01T20:26:22.890000 CVE-2025-29768,0,0,492de4cf9bc586f0c097ff358f0d6522edec16b3a3700b1c85d835d10d900b1f,2025-03-13T17:15:37.623000 -CVE-2025-29769,0,0,1ffc555d1e5fa975c225602d904fa1fa16d8a21a8afa28928d0e400fd37572db,2025-04-07T20:15:21.090000 +CVE-2025-29769,0,1,0de842b7c7e597ae7633d44140f4fb5c852e9d347c06f8c689707fdd8138a9ec,2025-04-08T18:13:53.347000 CVE-2025-2977,0,0,696e7740dbee2a5350b7ef96c3055a330727eb2106222123bfc4ab0d2a3f5d39,2025-04-01T20:26:30.593000 CVE-2025-29770,0,0,64a7761b4081159cba0465c32543c25f86c7bc3fdca10868943a613198ef8db7,2025-03-19T16:15:31.977000 CVE-2025-29771,0,0,40341ca82018118ee52a3bd3891794f5bfb5824a75c694db796b525153dba5da,2025-03-14T19:15:48.847000 @@ -287585,15 +287700,36 @@ CVE-2025-29788,0,0,864c3c65f52e851c38fc6d391e926f348d1c70745c997c79fa8abde39ce5b CVE-2025-29789,0,0,55e4fc65897de45b10ba90aa15c5781d247cfaecd047ac1420d07ded7251482a,2025-03-27T16:45:46.410000 CVE-2025-2979,0,0,70faf91b6346859b7f0d1497bcf6eeac537ef02b632bd23b2e0e2ae37255bb13,2025-04-01T20:26:30.593000 CVE-2025-29790,0,0,a917e7f845d5526a877724b56a3ae7cbb2c47c308a32a65b6f3b54e65b4f8c98,2025-03-18T19:15:50.813000 +CVE-2025-29791,1,1,46e27449517fc1cf3ebd2021a08915947b602d3bc15ab63834bbe4b7b843c139,2025-04-08T18:16:05.003000 +CVE-2025-29792,1,1,7b81b68a417245b340a2a1de25df2ef70f16bda3d6c86774cbf179469fbf2a9d,2025-04-08T18:16:05.160000 +CVE-2025-29793,1,1,039925f1f08b8682dedd873d4cc11cac80bae08e16a6d4e325aee7b03e1c10a9,2025-04-08T18:16:05.320000 +CVE-2025-29794,1,1,527b4faf6928da5c73eaf2941656f4cd3912cf38388ec2d748623ed241f4f6c9,2025-04-08T18:16:05.467000 CVE-2025-29795,0,0,6628c110a8ddfa1ddc624b3c8e04a9da92178a53d5d396807fa8edc11e306135,2025-03-23T17:15:28.920000 CVE-2025-29796,0,0,538594e52732519762324916fba3aaf079adb6c21d546750de86e44f00d4c82d,2025-04-07T14:18:34.453000 CVE-2025-2980,0,0,e90bea9fa0869a16071d3d0a033a2bb76e259b349a9a0bf9fb845593fb53ed2d,2025-04-01T20:26:30.593000 +CVE-2025-29800,1,1,b92879c7c36cae5a411523784939f14947788da8f6e75cdd51ca933bd587930a,2025-04-08T18:16:05.680000 +CVE-2025-29801,1,1,5c993ad62fa5e401e014ada450d2bd61d11f28804e6c1837ab0d4954ef85408e,2025-04-08T18:16:05.840000 +CVE-2025-29802,1,1,cbee3330fa596ad119069908cdcf7927dabe5f7c6434e232c443e6271bdfcb11,2025-04-08T18:16:06.017000 +CVE-2025-29804,1,1,aaa73ce03ab20693e9c00a19545c2630fe680f1627235e0eb85006b7381805b6,2025-04-08T18:16:06.180000 +CVE-2025-29805,1,1,04799c3a0801cc42f49ea852f54387c42defa969f17576ae35c2dc8aa00344a1,2025-04-08T18:16:06.330000 CVE-2025-29806,0,0,dde4af49c411f184b167c313d22e18033ab4a12ed1db72bb3f1109ada8823750,2025-04-02T14:16:10.870000 CVE-2025-29807,0,0,530d9f651149a8b635edd48694d649666884c8d7e97fd101d5bd23cb34763719,2025-03-21T01:15:17.070000 +CVE-2025-29808,1,1,c893be1a058d01204cd15782ed2cacaf8292d0f790d97734359983a7aa754a82,2025-04-08T18:16:06.483000 +CVE-2025-29809,1,1,1a1c77b05d4b643a725ffaa66f55665c6e333b58527c1210319574edf5e9f289,2025-04-08T18:16:06.633000 CVE-2025-2981,0,0,e1592099f2c8ea306adfab1774d65aad5b1081bf2f727bd1f3845471e7bfa07c,2025-04-01T20:26:30.593000 +CVE-2025-29810,1,1,e034ccf922cd1c0cbca04f5fc340ef9404778c8e95c3a5f1ae5d9b5485464e1d,2025-04-08T18:16:06.797000 +CVE-2025-29811,1,1,32d05551a1c5a0bcd20545633b7d4cda9e3dcdb837f14d1b69f0add08a6fe76e,2025-04-08T18:16:06.977000 +CVE-2025-29812,1,1,467346a422adca94ac7668c56cc281905f7e9dc36f3294829049ffd962815145,2025-04-08T18:16:07.160000 CVE-2025-29814,0,0,435e9e17285030a77811f9738adb8ece14bf52c5a294fba746e389024996a262,2025-03-21T01:15:17.253000 CVE-2025-29815,0,0,1f4f3e8e153f17fdbb8262dd7f05d4fe97a5b776e03d0624e95ae0ccca656378,2025-04-07T14:18:34.453000 +CVE-2025-29816,1,1,385fd79ec565d6ccadd06323ba4e5e4a4855c1e765f70fd1d1ac3fb92f0051c6,2025-04-08T18:16:07.370000 +CVE-2025-29819,1,1,bd12a6dc1911b5fbf13d001b2cdba3dde95269b1ee73fe55f136044dfe877dd5,2025-04-08T18:16:07.520000 CVE-2025-2982,0,0,18147376cbfa81f921d40bd8f9b57eee8ed0932c2ab1d6080b91a0ef0abe19e2,2025-04-01T20:26:30.593000 +CVE-2025-29820,1,1,5ec35bd28369b6d2af9ededa8a0586b1486817ad0d8b01ea1a57c8df40b8a7f3,2025-04-08T18:16:07.683000 +CVE-2025-29821,1,1,818f2003c1963f20193cbbb651e0f410896b2eb352e8f13708858a02b44cce06,2025-04-08T18:16:07.867000 +CVE-2025-29822,1,1,91e33900f6f7da8c44a0d791a221b0849b45167ef56eb2517e373ca988d85590,2025-04-08T18:16:08.023000 +CVE-2025-29823,1,1,5e70fdb65806e5011cf8e4c2d4a700ec80eab63fde399bc708e3938f7c3d4db1,2025-04-08T18:16:08.190000 +CVE-2025-29824,1,1,90743a5f670ff422581974cbe6d423c91accb3415665b888846cf653496d1991,2025-04-08T18:16:08.340000 CVE-2025-2983,0,0,efeaa991885da11a1c8124e07f7de31c07c78c44b0bef43fd1faec4e54149319,2025-04-01T20:26:30.593000 CVE-2025-2984,0,0,3f4e6cd5cc63eeb9ae67002e32115346660333feb5923743bc7019b2dd2d5767,2025-04-01T20:26:30.593000 CVE-2025-2985,0,0,a3543a73ce62ad86efa1e3373d8316301a2f3bab41174741e4e7d45e59a2160e,2025-04-01T20:26:30.593000 @@ -287632,8 +287768,8 @@ CVE-2025-2998,0,0,827aa23e1866da63b394bb2878f39c7208b378e6225cdb1e91f5f1852d0e36 CVE-2025-29980,0,0,02b1f4fe8cc2958b2decdcfb4a2e99acadf56a3773103d9215c6253bff189364,2025-03-20T20:15:33.233000 CVE-2025-29981,0,0,0cc2dcfb5af6923aabfbdf35cc06825eda3d5f1d817d89ebee60d30dc3aea5db,2025-04-02T14:58:07.527000 CVE-2025-29982,0,0,23affa7daecc4825576e77403823b6557774b9426b2d4d0f7cba7e9e66506adc,2025-04-02T14:58:07.527000 -CVE-2025-29985,0,0,89052bb19c7af55c8aa0a03957e6893eab53a59e520f2de71daaca4dadc653ef,2025-04-08T11:15:42.707000 -CVE-2025-29986,0,0,4acd386576fc63796eeeeb7ff01e5cdc5814f3dd50f3c5d462bb02ab309f26e7,2025-04-08T11:15:44.033000 +CVE-2025-29985,0,1,2aeb5a8f8ec35aa18845c0d4af21956a36a7c943d3b098b90b6c6bf8f695e5ce,2025-04-08T18:13:53.347000 +CVE-2025-29986,0,1,99c178153f6bbbad7e209292a65a7c4e43cf8706f8ea6bc3168202624c16c250,2025-04-08T18:13:53.347000 CVE-2025-29987,0,0,962644397d15823d289c2ad8de7be5eae2dfe8787c0957eaa9f9d8409e9ed1a4,2025-04-07T14:18:34.453000 CVE-2025-2999,0,0,81444588dd7906e6c8cac51c6c8e57e7e231b44db369bc45695ecb3a2d560ed4,2025-04-01T20:26:22.890000 CVE-2025-29991,0,0,40bf08e0cf4babdcbf62be0cd1c52dbd14323391ac7d7ab9cf689de3abb126a1,2025-04-07T14:18:34.453000 @@ -287643,18 +287779,18 @@ CVE-2025-29995,0,0,4e499babdfbbb2f8f3e0d85f41baf447f5b6555ca95dd3dd082c2591d71bb CVE-2025-29996,0,0,d9ce8180be5b647a2760a5e1584c793faf6e1ad0f69620939820540427591c65,2025-03-13T12:15:13.980000 CVE-2025-29997,0,0,23c5a96e3ca55a349666d8f7b75c279d7c1f39d20cf9fd2507bd7cdd234e7b90,2025-03-13T12:15:14.127000 CVE-2025-29998,0,0,3f15888bdd465d14766f235864b3d61f644d43d3eb6a7cb983806db35738379a,2025-03-13T12:15:14.277000 -CVE-2025-29999,0,0,84359c41084185f5b284ca1d2e7f21f12176ea15a8d11d8a0f3e3f4459257685,2025-04-08T09:15:27.053000 +CVE-2025-29999,0,1,8b8d91b56d225972b60395d0c4c52c26c06b3c4add7a35dbdf077f8b6c072743,2025-04-08T18:13:53.347000 CVE-2025-3000,0,0,ae1877066464f53804bc7b03ebb1b9d13c43cf43cde1adbea92f828110fcc0d7,2025-04-01T20:26:22.890000 -CVE-2025-30000,0,0,d17fb49cb8685651417946a968191cb7858f1babd67488dfea6fe45a47814abb,2025-04-08T09:15:27.340000 +CVE-2025-30000,0,1,affa6abe4dc1f666ac7528d709b6ebffe6f6752eec94a0822b7e3a349ec798e3,2025-04-08T18:13:53.347000 CVE-2025-30004,0,0,73e410cd8c1771ca59aa80fff53e7e0cfccf00b0105ca49a3494abebe1dc7b1d,2025-04-01T20:26:22.890000 CVE-2025-30005,0,0,e545c32af86b79a8f709b3efabb24b994072a6d6325d7acaca8653d3031c0594,2025-04-01T20:26:22.890000 CVE-2025-30006,0,0,c398c238e98621e23bd6b30abda93469f6d677d63847ffe76c3e73fbb2a98915,2025-04-01T20:26:22.890000 CVE-2025-3001,0,0,27bffbb3e7b3c7258a825a0570f29d054bd03ad9a07c098cbfafe6044bea1c9f,2025-04-01T20:26:22.890000 -CVE-2025-30013,0,0,9f0f0f8c8b510b4fd9e629061684580085597831e6a3eba75091256484fb35d9,2025-04-08T08:15:17.023000 -CVE-2025-30014,0,0,91dba11cece11ed3ea61d61a1a5013a54eb478d3566a59d6c3f9a69a72da0ede,2025-04-08T08:15:17.177000 -CVE-2025-30015,0,0,85dacd112e52b6dd724910b6b2160c84e6123a94048dec93332c9a9e0b877cb2,2025-04-08T08:15:17.340000 -CVE-2025-30016,0,0,bc7f6737648401d5789bbcadafd4441c8f9235c06315030392c904bda3ec0111,2025-04-08T08:15:17.493000 -CVE-2025-30017,0,0,fe3d6b7e0539c0cb40b419acdb1705c1cc691db7d99ec227e50589a4d67f07f3,2025-04-08T08:15:17.650000 +CVE-2025-30013,0,1,7932d8a85b9d770212454eee3b98c50b358df4b36d71db8888c54d58043de0d7,2025-04-08T18:13:53.347000 +CVE-2025-30014,0,1,054d315989d45087bc8a7fd9952992c725b3784578faa4359fbd402f71c020de,2025-04-08T18:13:53.347000 +CVE-2025-30015,0,1,1eb229a1f73e87f3b32a8ef5421619245cc21612830ccfd462f12595315a6145,2025-04-08T18:13:53.347000 +CVE-2025-30016,0,1,689b905437064d0cd5bb37cc2d942bb6a7f8f784026b78ecd17897b0fd6d840a,2025-04-08T18:13:53.347000 +CVE-2025-30017,0,1,00658069f31d7627dd093fc0ae9980c39830f453f77654c8854ce5faea559458,2025-04-08T18:13:53.347000 CVE-2025-3002,0,0,091ec418c4fe34b31a468958501cb85d78c731a0031e80a884c36ea5dec34f9b,2025-04-01T20:26:22.890000 CVE-2025-30022,0,0,323cd273db7b659115dae67e365f1f9a2dade36f53e606c124c9f18a94e682e6,2025-04-03T15:52:18.500000 CVE-2025-3003,0,0,37c02fb463f5c8a3a1dafcb39007a61a21e6fd3e14e7eb7da2154db9529b35a1,2025-04-01T20:26:22.890000 @@ -287707,8 +287843,8 @@ CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbf CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000 CVE-2025-30149,0,0,9d45b14f7ce1c383888c38736f5cf3ea63c5e434e58881699105d1fe3c5316e1,2025-04-01T20:26:22.890000 CVE-2025-3015,0,0,099717fc51ac180e71d1a26e8b38cd7df3f75ab75884b374ba09343d9b7ef833,2025-04-01T20:26:22.890000 -CVE-2025-30150,0,0,4e848504d4b6b16c7014e06ed400c7be32a67f9c3224aef2439785015ae43443,2025-04-08T14:15:34.540000 -CVE-2025-30151,0,0,43ef84afe3b5f99d283c8017097c4777b37f98b75d2033a8740563a67b55ab38,2025-04-08T14:15:34.737000 +CVE-2025-30150,0,1,78c0a67cc85c67ebae2202ed81d36fba73d24dbd816d4eab529fd509b9c71b6c,2025-04-08T18:13:53.347000 +CVE-2025-30151,0,1,2a8d368b6af639e9763bcb11bea6817909b13b4f025a6b32a64e4e4a25829b1a,2025-04-08T18:13:53.347000 CVE-2025-30152,0,0,fb7d8b36a0a9757a199a4cf8f9b4b43b19a772c330ea1d3bb0186654fc6f920c,2025-03-19T16:15:33.313000 CVE-2025-30153,0,0,da47524558affc65b6874f9bef3637406802e7d0a047ff83de555cab022828e8,2025-03-19T16:15:33.607000 CVE-2025-30154,0,0,f4c8f04ec10c8608001f5ee4aec87a1247d8c3c0588d5bdb69da7f038e16b9a7,2025-03-29T01:00:02.337000 @@ -287720,7 +287856,7 @@ CVE-2025-30161,0,0,93f02337f899fffc0a069554c6055fbd6fabd15132725d35bb3b73cfadbf6 CVE-2025-30162,0,0,8641e47d280f65cb3bb61486e9cfbaa56cd67a484749372cb3bbdafe7ce809ee,2025-03-27T16:45:46.410000 CVE-2025-30163,0,0,655322787d885aa61d50ea5e7ecff74dc9237e2c1710cc57eaf106a5eadfb182,2025-03-27T16:45:46.410000 CVE-2025-30164,0,0,c838231ddadd650538b91334381739f0e5f84496049f4ab61b98fedaf2408f7b,2025-03-27T16:45:27.850000 -CVE-2025-30166,0,0,e488d3d7d257df7e5f7a5bae3073f2d1e075901bd28792ff49f682935a366064,2025-04-08T11:15:44.267000 +CVE-2025-30166,0,1,412bdd08d8373a58cc6cb4c9eb2077f881c64072f235c4d1d06c3ef861b012b5,2025-04-08T18:13:53.347000 CVE-2025-30168,0,0,650d771cf97916a28afc5f172eb3b832385c1c5e1b844b714aca8ef5a55b9cbc,2025-03-21T15:15:43.440000 CVE-2025-3017,0,0,ae6477a257eae8225bc122e9d2ffd840d22d835e0499aad249230b11392c7bd0,2025-04-01T20:26:22.890000 CVE-2025-30177,0,0,bc31f6237a8a75bdd9699eb57e1c446258bc4f357acb1c9dcc48b902103b6e3c,2025-04-01T20:26:11.547000 @@ -287760,9 +287896,24 @@ CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3b CVE-2025-3026,0,0,1ccfc3db3fa998e9ff1cdb0d3328ce5e8b50ad41edf4870aec75e9db46dbd3f7,2025-04-01T20:26:30.593000 CVE-2025-3027,0,0,9355f1632bf438848aed82af6cf484da7a1ad46dac5db96331cc9a677136537c,2025-04-01T20:26:30.593000 CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d650,2025-04-07T13:31:38.947000 -CVE-2025-30280,0,0,fa514384c10154b0a32aabc2d09a11838cc630f1eb5cdd10e834c81e7fe5101e,2025-04-08T09:15:27.793000 +CVE-2025-30280,0,1,f3a0fe0b5085fe68096ebf708df029adbd9c722eb332cc6a18adecd63633310b,2025-04-08T18:13:53.347000 CVE-2025-3029,0,0,4233f9fe2c15ae070846afc464376435b2c22dc54bb1ae100ef75b468d792887,2025-04-07T13:31:33.743000 +CVE-2025-30295,1,1,2e596017a5b470a392645372c6eea247b5e7fcf0d4d2ca35d8ad663d0795c497,2025-04-08T19:15:49.453000 +CVE-2025-30296,1,1,489e728388c5a71d004d8b69e8b4ec2265bcd8e89df41c99d23b08339a8498a4,2025-04-08T19:15:49.613000 +CVE-2025-30297,1,1,76b18551d702511bf85a39db59e80a090846c80174546afc0c5cad9f6577b6e1,2025-04-08T19:15:49.770000 +CVE-2025-30298,1,1,4df83a322a3d53862c90e7cd17cb2f026916b6250991d240802ce303d2013552,2025-04-08T19:15:49.923000 +CVE-2025-30299,1,1,d3c1ff0fb70362ff45b6777381bdcefef3dd6b3e60f940321a11bf7cf2992466,2025-04-08T19:15:50.083000 CVE-2025-3030,0,0,6c5a3267936101701b471cc1e9319d0624c399611df44e115f8b7cc82dfb076c,2025-04-07T13:31:26.793000 +CVE-2025-30300,1,1,505b4c383bfe9d4f061c60b9a0fcd97858fc02ebc48748f222fcc60b2e44a2df,2025-04-08T19:15:50.240000 +CVE-2025-30301,1,1,4d466a322fb152bc49c42f1f4714f93dacca4d7f8bafdac4e5fd268728c5dc04,2025-04-08T19:15:50.390000 +CVE-2025-30302,1,1,ce4ca10a4cf6c4e7cd059e73812ef0773c93863a0588341eef8c82ca6f5d2c6b,2025-04-08T19:15:50.537000 +CVE-2025-30303,1,1,b4dd7bc7652d580165fac69896390b7d32dd5aa0b6efcf885c30c9b574e1478a,2025-04-08T19:15:50.693000 +CVE-2025-30304,1,1,4cf13ec87a48c2951c7f0bc17032a847a571566df5f8a0b6a20ca902e6e1702a,2025-04-08T19:15:50.863000 +CVE-2025-30305,1,1,9d15440d4d35927d5b9f024492d70859c0563744487b32cda46eecda5f410187,2025-04-08T19:15:51.027000 +CVE-2025-30306,1,1,8fc8c9c97de3668cc7724aa20a50fada343c1a25e6cab01fff06c651bb7315a0,2025-04-08T19:15:51.197000 +CVE-2025-30307,1,1,26e2e0699969ee1e095daba53253c82fbca1e6ae383f102f1047db2ef79183ff,2025-04-08T19:15:51.353000 +CVE-2025-30308,1,1,98c67f03b42c3895b19261b31629aaceb4330612c0ddda17a5585b59374993c2,2025-04-08T19:15:51.513000 +CVE-2025-30309,1,1,60786bc9366dd9f96ee7944cb22ec8735fecf7b260a6797239545f649519fe1a,2025-04-08T19:15:51.670000 CVE-2025-3031,0,0,5d60434c3fd1b9eb0ecabc1c274e22b04626361f427f9c196b8950f8f03f9539,2025-04-07T13:31:10.027000 CVE-2025-3032,0,0,f8b4ab2f73ff457fe82cca4d434a54ce5e1088aad2e6e70e30f2847b41780fdf,2025-04-07T13:31:04.710000 CVE-2025-3033,0,0,8def21998c2b2d3712dcfd8c779587a6dd338f31829b8436a6e15945baec01a3,2025-04-07T13:30:59.570000 @@ -287799,11 +287950,11 @@ CVE-2025-3037,0,0,6a2907c9cfc947d4ec7113a8daddc7fcd9474b61d3079d351d22ef4c304e04 CVE-2025-30370,0,0,2de42281682fa273e344bf2c04c64567a3dca7296e2e179568bc67f79e5803cc,2025-04-07T14:18:34.453000 CVE-2025-30371,0,0,460a9e9c642c5d00739d5b5e11ddec1f7f2ad086735daa8cc9c39d2d2cc86b2e,2025-03-28T18:11:40.180000 CVE-2025-30372,0,0,e366784170fd69403c95573e66e81140f6ab7eebcee57a3b740e41f187b2c54b,2025-03-28T18:11:40.180000 -CVE-2025-30373,0,0,a5110d56497869d0689dd6b8d6b1b5d8657b86284ae0cad7b2282492656824dd,2025-04-07T15:15:43.887000 +CVE-2025-30373,0,1,9fd9207fa251f338adafa2796470af71155f3a2c3aa1274f47f5a2901265696a,2025-04-08T18:14:17.307000 CVE-2025-3038,0,0,22534a6e99d8435c0e3640274e43279290c0824de864795a486909ffa65e03da,2025-04-01T20:26:11.547000 CVE-2025-3039,0,0,8412b53044798e7429c2f1e43b2eaff144fc88ee266808028d00fb7035e9ff90,2025-04-01T20:26:11.547000 CVE-2025-3040,0,0,274892af91b4ed207c6fb8d845fb283c63d995b076d284b90cfd8062dbb59a9e,2025-04-01T20:26:11.547000 -CVE-2025-30401,0,1,8e6bcb19135314057f4c0e4e05c81963f90b21469fe6d07aa9c9f6cb9400b29a,2025-04-08T16:48:26.703000 +CVE-2025-30401,0,0,8e6bcb19135314057f4c0e4e05c81963f90b21469fe6d07aa9c9f6cb9400b29a,2025-04-08T16:48:26.703000 CVE-2025-30406,0,0,f351aeea06e5f96599007e5f69eaf797f1a8422f126f2300d35fae3c1967d53f,2025-04-07T14:18:34.453000 CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000 CVE-2025-3041,0,0,d9fe1e53f2cdd91c8975c5476eceec361ea81e0c3d05a42ad90016292a4f1e02,2025-04-01T20:26:11.547000 @@ -287962,11 +288113,11 @@ CVE-2025-30621,0,0,8c6a6eedc9f943375208fa96aeb0d151078d5fa54598208cfb233511cfe9b CVE-2025-30622,0,0,797c397d49f77f00a276d4088c4e3466e59efa0b6ce4fa17d94546d3a32ca074,2025-04-01T20:26:11.547000 CVE-2025-30623,0,0,a8e0620fa0eff69e53f34c91bac6562d90d04f91188fb9d1c9bfa47d4c96dabd,2025-03-27T16:44:44.143000 CVE-2025-3063,0,0,2e45f7e85b76c34e4c90c66b657feb85dadfe8fb2002194cf56059b20b804015,2025-04-02T14:58:07.527000 -CVE-2025-3064,0,0,1d25beab72f42677239e09478a00b8915ce297d152397fa70a1f57f4261ba7a8,2025-04-08T09:15:28.140000 +CVE-2025-3064,0,1,f53e9a492cac40f0d95465aad0a29118d38f50ea14aaad499bc5a6be35199190,2025-04-08T18:13:53.347000 CVE-2025-3066,0,0,4036e1c523f4d168ee49a384a6c587b88b052f12af15ef61935538c6b06fefb9,2025-04-07T13:30:17.320000 CVE-2025-3067,0,0,7d3b2e645511578005abbbeacbec82fc74b74b6c63aa21cac1f18b360c60a63c,2025-04-08T14:03:21.997000 -CVE-2025-30670,1,1,417ec1bc986f1f95e1ee07f52e561d83091fc3d45665c08ac5dc8ca23680b858,2025-04-08T17:15:38.413000 -CVE-2025-30671,1,1,5c0715f47c6c3e417589ddac805ae9cfd9aa533ab166c2cbcf207398a2e61579,2025-04-08T17:15:38.607000 +CVE-2025-30670,0,1,33871fc914d81802954876c8654de6ba21fb316b8751c5736304878f0da0654c,2025-04-08T18:13:53.347000 +CVE-2025-30671,0,1,d126e406e2609b2da4208844ed1e95f6b0e14bd3da567ffa49ec098f1a51b8cd,2025-04-08T18:13:53.347000 CVE-2025-30672,0,0,3ded266990ba9009f55577f3f5d04302a5c6b8450014b92c80b83398ad23d15e,2025-04-01T20:26:11.547000 CVE-2025-30673,0,0,1cf76211fcfa10ad4c1393e8c6dafbf3bed92def83ca793b34e5eea95c528365,2025-04-01T20:26:11.547000 CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc884a,2025-04-02T22:15:20.260000 @@ -288220,7 +288371,7 @@ CVE-2025-31131,0,0,ffe40251d16a258e4a81f59dcec18bb939bd64bb0cc9817076ba3c26ae952 CVE-2025-31132,0,0,eaf6e55e3fdf39265a487f499946844b88ccfa5eca63cf5dd8b8ef7debd6ca38,2025-04-01T20:26:11.547000 CVE-2025-31135,0,0,c29646479a81ed688aa2c7dba2e194b8b12ec18ec185c562b74cf6cab4701c90,2025-04-02T14:58:07.527000 CVE-2025-31137,0,0,aa5cb365eeb8f1ccf4d4e02b2375f9788bb7b8b918887cbc536481f36524d9de,2025-04-01T20:26:01.990000 -CVE-2025-31138,0,0,09c09cad2931d645979fbf040f604c6c44667cf0b20f34e06098c666edcf28d6,2025-04-07T15:15:44.047000 +CVE-2025-31138,0,1,082239a994f84f895f28ca91baa1d97931f8adb4927719990c0f96236ec2630c,2025-04-08T18:14:17.307000 CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000 CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000 CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000 @@ -288262,10 +288413,10 @@ CVE-2025-31285,0,0,c76aee62b0e63406ce2bba4eb6cc45c049f27ae73b357eac3652593406911 CVE-2025-31286,0,0,e856201c9b42834f1c9528734a2606281893fc23418757a05099912d18c27fb4,2025-04-07T14:18:49.830000 CVE-2025-3129,0,0,222a3d9c8714652d0d6ba97391c55e31cbb028a8923d2de4eeec30cd2a04c719,2025-04-07T14:18:34.453000 CVE-2025-3130,0,0,2fc34a21e49634629835e2bfdad21b63fabf65952307e6d85abb2208a8a72837,2025-04-07T14:18:34.453000 -CVE-2025-31330,0,0,c416c456b393d5616a021bbc7d8e782bdc9ee8f389962ceb676777061d8f8e81,2025-04-08T08:15:17.800000 -CVE-2025-31331,0,0,ca3bf730531e56192f3c50d3d58ea623c6ea120776b9b0b204abfa53b8c02fe5,2025-04-08T08:15:17.977000 -CVE-2025-31332,0,0,c873d67d02383e551718b10d86ae9e0c8df5ce4ec4ecc4deb5797db8beba4463,2025-04-08T08:15:18.130000 -CVE-2025-31333,0,0,04840edfbb44224e5dce19993638e29f7e49a7b53cd79f64e15ec11b7bdd1c2f,2025-04-08T08:15:18.287000 +CVE-2025-31330,0,1,9b648c9ab2cbfab0d4ac3a100d1bd1b8fecdcaefd29ce618613bbd2f9e42ddfd,2025-04-08T18:13:53.347000 +CVE-2025-31331,0,1,48d6dcadbd283a08a1842391c0c9e47ce4c05f71de3f97bfd6b5e3101a4dda56,2025-04-08T18:13:53.347000 +CVE-2025-31332,0,1,3f108a9ac0319835d7c708da67bba48806ba6d1b5dc051eae9a5717ffd8b5266,2025-04-08T18:13:53.347000 +CVE-2025-31333,0,1,08699a9906ce65a0334a63e341c6baa3bab14124a78670666f36434a88ab4eae,2025-04-08T18:13:53.347000 CVE-2025-31334,0,0,90b4ed63dc1be647230b7e7d107e9e1dc7ff2e1eceac7d38af6b4703cfff3e2b,2025-04-07T14:18:34.453000 CVE-2025-31335,0,0,23839e3692f6b9292f971ac2ba3542c0132ffb2a9a22b6edf4f234426c27d3e9,2025-03-28T18:11:40.180000 CVE-2025-3134,0,0,a71cb6e1788fa22b93ff06d650061e802b0d1c6df7394ab696b49920594382f7,2025-04-07T14:18:34.453000 @@ -288356,8 +288507,8 @@ CVE-2025-31471,0,0,f14a73777598a992310e0897619724d0e55e2ad37cd96fbfe8ec71a2d2fd3 CVE-2025-31472,0,0,ae81b04fb65d7c7cbd3ac866886f9e1ba5d7ced37e5c5d1b62e397df92b5809a,2025-03-28T18:11:40.180000 CVE-2025-31473,0,0,6b8642bfa6d52c3065cf9a40b6bbee92e5edddb9a1e9e71f4dd87e54a9e84baa,2025-03-28T18:11:40.180000 CVE-2025-31474,0,0,3b178b6034f0ae913924408b2660b0dac0698dd9519ef434ea55136482afe5ec,2025-03-28T18:11:40.180000 -CVE-2025-31475,0,0,7339d50fdc88d14ee622ace8afd48a35fbc70aceca17db70a197b63f9e5e596f,2025-04-07T15:15:44.220000 -CVE-2025-31476,0,0,ee88aabdb3371c8479de5edbce93bc23bb0e4073c856f51c957a8199ca9b9cc0,2025-04-07T15:15:44.370000 +CVE-2025-31475,0,1,d054ab98458109d671d2e3362598fabc0f69079fd0804798837af9591fe8f8e4,2025-04-08T18:14:17.307000 +CVE-2025-31476,0,1,2278ecebe988f2494770aa5bcdde199a741030c5fdfef8bf4f1b7a701a4a759f,2025-04-08T18:14:17.307000 CVE-2025-31477,0,0,54285781555488a3668d04893deec45a9e20dfdee4ab1c462d402e7283dfccb5,2025-04-07T14:18:34.453000 CVE-2025-31479,0,0,2697cc1817114968aab8eafa22f3d26b926cb32529ad7873759be5d99c686601,2025-04-07T14:18:34.453000 CVE-2025-3148,0,0,b333acfda68d66ad1bae1483d9c733fd29bd9303bc53eccbc0d0767f3d1c789f,2025-04-07T14:18:34.453000 @@ -288372,8 +288523,8 @@ CVE-2025-31488,0,0,41eabe2a806d521b5b533a51fb5b17aa17d50bd34ad511fec1512904c0a77 CVE-2025-31489,0,0,86b687749f556cb33a8356498a01d508d0da05ad595a76560944268496b2bd46,2025-04-07T14:18:34.453000 CVE-2025-3149,0,0,61479a4dbdbba6ab59d1ae99d855a79e55a52858fd9b2654fa6a6f9d8eddf660,2025-04-07T14:18:34.453000 CVE-2025-31492,0,0,c3a8af2b78a6ecf7a731e5159a73f99e4e0787364701aa4aef00fbbfc177b209,2025-04-07T14:17:50.220000 -CVE-2025-31496,0,0,5d205436871d710e38af2038c923c60e408fc550e87ec590f080b1cc870bd837,2025-04-07T21:15:42.720000 -CVE-2025-31498,0,0,533d9be5a90ca58e967a5b631f2944fb1b017a00a89804355466289fac2fcb4b,2025-04-08T15:15:50.310000 +CVE-2025-31496,0,1,12f17064ea4e4584d7a91216d2d100c9a89220efe7b8206230e9a4ff7e506dee,2025-04-08T18:13:53.347000 +CVE-2025-31498,0,1,4d0b1d0443b00abb73c24b0904ebb872eaebcc417a52a0d2793abe18a50dbe23,2025-04-08T18:13:53.347000 CVE-2025-3150,0,0,a30a7688ae10248ab6f92b08d529b33559f00224524ffa44e9f5b1d925f39cc6,2025-04-07T14:18:34.453000 CVE-2025-3151,0,0,fc53025e57933c63ffd27d66baa971840e395a51a52617b1c48843e916fa986d,2025-04-07T14:18:34.453000 CVE-2025-31515,0,0,65e0cceff3005eb000d81df9c13b2b61bcc11ce5d49244e52c4f8300da4f784d,2025-04-01T03:15:17.700000 @@ -288501,7 +288652,7 @@ CVE-2025-31629,0,0,e1295c2dd478df83cec62e5ba9e1144364b5b4cea68d8a5a8715502b51a0a CVE-2025-3163,0,0,1abd6db1045bbae70669f1f8c9907280a5478489e8b1ebabb8eb88b115451d71,2025-04-07T14:18:34.453000 CVE-2025-3164,0,0,524d9769a71affe8b81690c3ed0b562fd00f5c5232f9c0d91b2d9be6cf9796fb,2025-04-07T14:18:34.453000 CVE-2025-3165,0,0,2e02105ce99f3564dd878406ce8c0b7835d84010bc4a7c0c3ba88c3a6192f2c5,2025-04-07T14:18:34.453000 -CVE-2025-3166,0,0,f93ee5d98274aaf48b0d321ffa90ba737cb5d64397eeed1cfa876157b59d3cfa,2025-04-07T14:18:34.453000 +CVE-2025-3166,0,1,17028d9ea804572df4baaaae9408352ee57c738220a3aec0680e295f0ee3c81b,2025-04-08T19:54:38.830000 CVE-2025-3167,0,0,b34599c040918980d6f606e5670b68090d1729d06d9c44998cbb7c2b6c7b9e52,2025-04-08T13:50:05.433000 CVE-2025-31673,0,0,4d87be6269b25250eebf5a9fce7cb9a2b88c94e00b9796d1018bcbd1dcf3b9cf,2025-04-01T20:26:22.890000 CVE-2025-31674,0,0,4c83b8fc56b3a5cdd09f994e999ba9d59f2e5140397359adac70c0dab25f825d,2025-04-03T18:15:47.417000 @@ -288587,7 +288738,7 @@ CVE-2025-31766,0,0,bac0cf3ef8b9b3e9dce64bb5e50529facc61f9e0dc1535f24805753853f10 CVE-2025-31767,0,0,d273eeee30994e164cd333960132367f35e22bc028e51a7f08600d8ef7fdf126,2025-04-01T20:26:11.547000 CVE-2025-31768,0,0,7f418a963dd1cb77799014afbc80e6edea8915b3e57ffabe594864a9d0f41303,2025-04-07T14:18:34.453000 CVE-2025-31769,0,0,1c28c462a098800e2a03f2b792210a4909eb30d846053e64b7947ce7a6a0934f,2025-04-01T20:26:11.547000 -CVE-2025-3177,0,0,e6e8b637c23ef898e69ab9a5bd628907e73c338680585d500fb608ff4644c120,2025-04-07T14:18:34.453000 +CVE-2025-3177,0,1,8ba4be865a1af4ee6c75fade0b8a5d1e16d76be12ad8f6c931edc0538ec5d839,2025-04-08T19:40:08.587000 CVE-2025-31770,0,0,b8156fdbdedc5e1284f2bea40650cfe77c4aad8872b74801d2d02fe3a5e36183,2025-04-01T20:26:11.547000 CVE-2025-31771,0,0,c1f41205055b2df83d68228914dd271d8c54578bce5b117b64b2a387b3da3b70,2025-04-01T20:26:11.547000 CVE-2025-31772,0,0,fdfd63b726bfca151c304d7a0a423dd060e317a518985cfc58fd6f5e7a697fff,2025-04-01T20:26:11.547000 @@ -288598,7 +288749,7 @@ CVE-2025-31776,0,0,f8c6a1aca3b42b92abdfcd385b63fa942fda99db314ba4a28e0398fdcadf3 CVE-2025-31777,0,0,eb5c89acfd3c942159585e1a9e95bf695c15b4d9740dbbe6ce61edc0e65195c9,2025-04-01T20:26:11.547000 CVE-2025-31778,0,0,683333874b7589916a8743ec6ef46284dafc36236ce525d0f97c7c91cb41aef0,2025-04-01T20:26:11.547000 CVE-2025-31779,0,0,105cefd4d28aa39d75376185345286643356c755466e090a94054c9f3d57db5e,2025-04-01T20:26:11.547000 -CVE-2025-3178,0,0,e0da6f97f41949699d4c3b705b7f4d555aa462bb8f539030aff5d5c15339ec9d,2025-04-07T19:15:57.020000 +CVE-2025-3178,0,1,92b2f99af98bc59113045ad7289373b0837382e2b6e90886506eb20123408365,2025-04-08T18:48:19.820000 CVE-2025-31780,0,0,63b07d90cd76dec19d5fd4cbecbc6fbbbee17c5d3c2639f6ec364f5fce839af3,2025-04-01T20:26:11.547000 CVE-2025-31781,0,0,e3d8f1fe3d272d505dbac68b80325c776eab6c65762aceee18a9f3c2f9b8fe13,2025-04-01T20:26:11.547000 CVE-2025-31782,0,0,592d76ccd272e8c18ee4687d3efaa20d27111be69ea12897f613e85c39a016fd,2025-04-01T20:26:11.547000 @@ -288609,7 +288760,7 @@ CVE-2025-31786,0,0,566847e7c0f1a4288d8527ab1c941df542409a3ec1d9c25aa3e52bba0054a CVE-2025-31787,0,0,ab30dd34959ec0a870f7a64acbe500230442f15e90f4940b6f5f5e0718ca4eea,2025-04-01T20:26:11.547000 CVE-2025-31788,0,0,ac7fffd893b869a4e6c483654a7a08a725be1827125cb0d5e431d678ec003ef1,2025-04-01T20:26:11.547000 CVE-2025-31789,0,0,c8ecc89fbd634acc4ab8a99cfc36abf751148268fb91d3fedd76f71420adf7de,2025-04-07T14:18:34.453000 -CVE-2025-3179,0,0,bf840b61bb80d451de2ecc0e89cae61ace50ff8e153f6cd43f054f09d0ed9a19,2025-04-07T19:15:57.153000 +CVE-2025-3179,0,1,3819f70317477c9c3dcbad1055a460bfd3f3980c5cbed00eeb806dca97874b74,2025-04-08T18:38:52.487000 CVE-2025-31790,0,0,4fb4e70e48bb0ad88948a6031b905cdf9b8087db474fef894fcc896296c130a7,2025-04-01T20:26:11.547000 CVE-2025-31791,0,0,87edb942753d84b5a1015bbf984638e5398e78a8f9e4bfc2113a39b49bdd5475,2025-04-01T20:26:11.547000 CVE-2025-31792,0,0,0e55b70c979e366179af36934d69cea795e070ff6f30abc2dc8605703f2b6712,2025-04-01T20:26:11.547000 @@ -288620,7 +288771,7 @@ CVE-2025-31796,0,0,28eb3dee860a6e5729a755f094a57ce73e6b5e43b971b96b1345d50deee59 CVE-2025-31797,0,0,b6513b6964fa057c9b76f9fbe9c88e6c4b0cde0e6e7f1b3ff8d7a99dc12ecb95,2025-04-01T20:26:01.990000 CVE-2025-31798,0,0,0315f72cab21896230aa05e5938661e0e548f1ecdc084463861c8bedc61fae63,2025-04-01T20:26:01.990000 CVE-2025-31799,0,0,11af5e399c230e7fe5684d483518c0f74879ea9263b82e47342967c063468646,2025-04-01T20:26:01.990000 -CVE-2025-3180,0,0,f656f53cc5288eb7533be602548ddafd9f5537b1852285c099bfb9b294867a22,2025-04-07T19:15:57.290000 +CVE-2025-3180,0,1,e8c4141d0261ab3ae92b12cee8d8e6a6df0c37cd0158997420076b1cf4a44358,2025-04-08T18:09:20.960000 CVE-2025-31800,0,0,7e1441c413ab06bd4bf18371e69ba9e22716daf77d16ace83ab9beca44ab9b76,2025-04-07T14:18:34.453000 CVE-2025-31801,0,0,474eaa62c5bc1472551e0d4339b83e4d1b3fb414baa341bccfd27ce0222a4c21,2025-04-01T20:26:01.990000 CVE-2025-31802,0,0,c613e642f85de93cc1e53b29eaada089b555fc8a1c40beeaa186983ea015937d,2025-04-01T20:26:01.990000 @@ -288697,7 +288848,7 @@ CVE-2025-31866,0,0,b1757216c5229111de47d2492109bf00959f5e0be1025ee53f11d9ac0ec4e CVE-2025-31867,0,0,f0d04afbe15fc797c7e0b952c07dd038cfc5bc6bd5ff6cc22332cb22442d474c,2025-04-01T20:26:01.990000 CVE-2025-31868,0,0,7fce1b16d7319b670d91f083fb479d0ea901776dc979f5d9f4faa6e6dd75c63e,2025-04-01T20:26:01.990000 CVE-2025-31869,0,0,c05b5c7524b97c44ec996697f88528e544d73226c1005b3bf22149344c275009,2025-04-01T20:26:01.990000 -CVE-2025-3187,0,0,8b7e4eb66674e9043254afb71bb7e25c18520d574b92011e435967f9b5edabdf,2025-04-07T14:18:15.560000 +CVE-2025-3187,0,1,6235a04bc0445f52d0ae47a3884a148a9ed4c7c135e899a616f7193735f37dbe,2025-04-08T18:03:15.570000 CVE-2025-31870,0,0,516bd3dc92a9edf6d58adba078c340db9b751aeca60d06d50cd0c752e4124a6d,2025-04-01T20:26:01.990000 CVE-2025-31871,0,0,ba3f6eb1f55d50280c63e646246ff297c2ab652772d382bd165365ac6ff5f543,2025-04-01T20:26:01.990000 CVE-2025-31872,0,0,ad5fdb6bc0fce36e8acfc4372bef57c4855fa46763792dda7fb84307d174baec,2025-04-01T20:26:01.990000 @@ -288708,7 +288859,7 @@ CVE-2025-31876,0,0,9b698d56e8863f401dc6b9fa7bd3bbca34a2104ca17ba28746599b305e187 CVE-2025-31877,0,0,6695fc81ae4f1608812de0df2a48f876e6c792399ee3aedfa35ef0d26c46b0b7,2025-04-01T20:26:01.990000 CVE-2025-31878,0,0,48d3d84407e6a50771b12d94862e4dc2c6c01145b0177f720bd10d09e7973464,2025-04-01T20:26:01.990000 CVE-2025-31879,0,0,56661b046add1cb143b689e63ff80e575b5ec72251c3b02615596b7e0eacf49f,2025-04-01T20:26:01.990000 -CVE-2025-3188,0,0,1c3ffe0be24848977412e6f40e166025dee82db245e8ea4e2bc60bee227f05fc,2025-04-07T14:18:15.560000 +CVE-2025-3188,0,1,0d42691e89af072056c6229a82cae393d0c0846f3314f3fca3332f235a91c80c,2025-04-08T18:01:35.220000 CVE-2025-31880,0,0,ab8b1e1580597ac2391b52f512ec6c6eeda0e71e614909309489b380e240716a,2025-04-01T20:26:01.990000 CVE-2025-31881,0,0,3d55f1ccbab65b8ce874e09e49ea52fbaf130db5299085e44d6898ed9ca39fde,2025-04-01T20:26:01.990000 CVE-2025-31882,0,0,6f2604863895c5b9f134ca2f29d6a3c3a81326b8e5a592764997fc22def30c3e,2025-04-01T20:26:01.990000 @@ -288751,23 +288902,25 @@ CVE-2025-3196,0,0,bb0d2ecf21993903a71e6dff645fdb05a339ebaf3e6e9f8f684bcf59eec4ea CVE-2025-3197,0,0,e79e9bde316dbfd1ba7b8b9ac58822adceab867075d18a7670c50494d881764a,2025-04-07T14:18:15.560000 CVE-2025-3198,0,0,9ea9a8c586fb27cd4141f26bc5f53c6d47512dda4a6f8f32123c47190f49343b,2025-04-07T14:18:15.560000 CVE-2025-3199,0,0,b2c8a0f552e5c66b559702403ed11bd1140ca56173e2c4b53e84f8a9895b6f6e,2025-04-07T14:18:15.560000 -CVE-2025-32013,0,0,c2a630586e3eb8d59df4073f809ec2e7f81c5bc7cc9d9bbbdf8f221f6d3abe12,2025-04-07T14:17:50.220000 -CVE-2025-32014,0,0,56762cbef9e5296f371a227e3d5a52cd9e157a1f840b6fd7cbb75f28d1fdeb59,2025-04-07T15:15:44.593000 -CVE-2025-32017,1,1,30216120aaf00b2bf106b05a05d2d321bfa7de3343d40799877f2214a4de4d28,2025-04-08T16:15:27.320000 -CVE-2025-32018,1,1,db286dcfba0ceb32ba10721305798746db835ba82f716c38bf53de31b88d0c3d,2025-04-08T16:15:27.487000 +CVE-2025-32013,0,1,b9e014f5fd31f7e573b509bf40d04ff5548b21d354f26d5a5266036bb938dc7e,2025-04-08T18:54:07.337000 +CVE-2025-32014,0,1,af089ef047d3ce8d7747406914b66a9d22daea2274c66b4c0d88bc73728bf977,2025-04-08T18:14:17.307000 +CVE-2025-32017,0,1,8ad1a4391d7f2f10d45fcec62c10a051e060c6fba5db86a027385be19816910f,2025-04-08T18:13:53.347000 +CVE-2025-32018,0,1,1844fc30427a0e5f1340a0d4b2b491b8b816d80738a0411934b5070b71fc43ae,2025-04-08T18:13:53.347000 CVE-2025-3202,0,0,b5df9a4f10b6a094526640bce151f74d263fe1512b1e3334f9249ec0e5e39a5f,2025-04-07T14:18:15.560000 -CVE-2025-32020,0,0,e843f7bc67d92c798da8c15cce89b2b98356a9464aea9df043eb243852dbbeb8,2025-04-08T15:15:50.430000 -CVE-2025-32024,1,1,7a40b5e979c2f5f538ac9653c7f7a4c98ce502368908a4e04a0cdb51ed3cbaaa,2025-04-08T16:15:27.703000 -CVE-2025-32025,1,1,d3f422f8ef63735b59167b0eefa7f05eac9e66f0888ada74b6e4237e904683fa,2025-04-08T16:15:27.873000 -CVE-2025-32026,1,1,159b91556d89120b2e46d1b48fad22558fe29f4bdcb318785bef7891cdf3edb1,2025-04-08T16:15:28.023000 -CVE-2025-32028,1,1,5aae4a1d30c5144aecd201102967fde5ff23a9012fe10ae61218f6ec4f4f2735,2025-04-08T16:15:28.180000 -CVE-2025-32029,0,0,8d9488255e68c0b28514f596d0e50e6d91cda4981696c0a5900811d7c043f680,2025-04-07T21:15:42.880000 +CVE-2025-32020,0,1,ed835337550d1af022a25ead8719b48fd0278920ca3f4a50f9110c3e9fc9d9d5,2025-04-08T18:13:53.347000 +CVE-2025-32024,0,1,2a81731508ada31033e0ed17d363191b7de1193dfd25aa413da57e238448c738,2025-04-08T18:13:53.347000 +CVE-2025-32025,0,1,9a8e0ba71c5c58cfcb63aac85316a9e9fbe8da1a7c23472c5263f4edeecb30e1,2025-04-08T18:13:53.347000 +CVE-2025-32026,0,1,2817c17c9b67154465e50755eb75afac2e1fad6c410e70ae29181f48c50d4e11,2025-04-08T18:13:53.347000 +CVE-2025-32028,0,1,a3aefc3258964eb49bd603ae1deb083e0d73344553e394e33fbc4221d8c43c80,2025-04-08T18:13:53.347000 +CVE-2025-32029,0,1,17f3d7a62a02d1dc2d4090ad588ece96dc4489035c1ba2500bd43578a1dba423,2025-04-08T18:13:53.347000 CVE-2025-3203,0,0,78b57c278226d9f3a2b475550553a6fb17775b43c46bacbb60b11f6ff85b8c2e,2025-04-08T13:41:35.810000 -CVE-2025-32030,0,0,6501cbda6f1602cfd9282e8257ed63760701f2685f6445d31ec8f27cc31c7ac2,2025-04-07T21:15:43.037000 -CVE-2025-32031,0,0,fbce7391a766676a7fa0a4ed2e770435aee21097045cdea7e0749ce233431124,2025-04-07T21:15:43.220000 -CVE-2025-32032,0,0,d1ecde2a08cd3b8c264c932685f37069a85c50652ba63181ea45821acd643460,2025-04-07T21:15:43.363000 -CVE-2025-32033,0,0,a9d3d583cc5d95a1088663121fa57f8eb56bc6eeaa2c9353df90a542cfb4225d,2025-04-07T21:15:43.527000 -CVE-2025-32034,0,0,625877d4b79a016e9661b9eb333c7ab2b5963e4e80cea781e1f4a1de1625ca01,2025-04-07T21:15:43.690000 +CVE-2025-32030,0,1,5b3dbaf8c498f868c300120d758eb67bca2ae26349bd33c2564d5f037b74ca5d,2025-04-08T18:13:53.347000 +CVE-2025-32031,0,1,37bea72547c945a8f2fab8d4fe45ae9ecf4433fff6973ea168be636247219a4b,2025-04-08T18:13:53.347000 +CVE-2025-32032,0,1,5b77537ccfb570130b57fff80bdbb7f541b48375f7843cd509fa4385f2610730,2025-04-08T18:13:53.347000 +CVE-2025-32033,0,1,40b3b208d052d7879d2f8f3adb9e51b46b4a05b975f75dca712aaefa23ec792f,2025-04-08T18:13:53.347000 +CVE-2025-32034,0,1,39b72df89785b876c4ffe3d85c99f5c70d32cc05dfbbbe1938fd282aa04ebea9,2025-04-08T18:13:53.347000 +CVE-2025-32035,1,1,3f3d5f9ed898bf76e3a14041e3570c3faf8576d7968db15a0822c0faa92a311f,2025-04-08T18:16:08.597000 +CVE-2025-32036,1,1,0fd2282afa05e98d8e89dee8d907037426741db3162238fbd41aa4e0d606b135,2025-04-08T18:16:08.750000 CVE-2025-3204,0,0,64fef00d821c113b4de0943d2e5e3bd619275d50a2fe970529a1c3d6f3f5b1d7,2025-04-07T14:18:15.560000 CVE-2025-32049,0,0,4a492d3e48b4caa699bbe628c5401d02fd93365e9cd0841713ed46afaee15215,2025-04-07T14:18:34.453000 CVE-2025-3205,0,0,51e3f14857d78569279198f5dc30e56ea630bb12580d37bc688ca7f3b09b35a0,2025-04-07T14:18:15.560000 @@ -288776,16 +288929,16 @@ CVE-2025-32051,0,0,ec8f7453e973b08ac0eea1b4a57f89489650f736d06ebe52f1def5e9918a3 CVE-2025-32052,0,0,6116901b373eabf1a12f464e61c73150b05b477e86d57bd2242dea845380e213,2025-04-07T14:18:34.453000 CVE-2025-32053,0,0,60f5d2252d9b47d90be71a91241fe823e174198ba60194538808a8aa0b6ddc25,2025-04-07T14:18:34.453000 CVE-2025-32054,0,0,75e4d347927079956a9bc5ad92137deea99b9b15ced411f0baaff24ce0928a82,2025-04-07T14:18:34.453000 -CVE-2025-3206,0,1,42d59949bcfd70f3ffd69cd102c160f0c7c28fb29a1f31fa69a71eb901f00492,2025-04-08T17:59:46.877000 -CVE-2025-3207,0,1,8c4a43b2a497a8aa9c548fe0056155548a5ad115021163d0bb4670d8373f6166,2025-04-08T17:56:53.623000 -CVE-2025-3208,0,1,467c67ee8369e3212684108818f80d158b2f4485a63647368e73220138caff6d,2025-04-08T17:48:42.087000 +CVE-2025-3206,0,0,42d59949bcfd70f3ffd69cd102c160f0c7c28fb29a1f31fa69a71eb901f00492,2025-04-08T17:59:46.877000 +CVE-2025-3207,0,0,8c4a43b2a497a8aa9c548fe0056155548a5ad115021163d0bb4670d8373f6166,2025-04-08T17:56:53.623000 +CVE-2025-3208,0,0,467c67ee8369e3212684108818f80d158b2f4485a63647368e73220138caff6d,2025-04-08T17:48:42.087000 CVE-2025-3209,0,0,efaeccbde8dfc66e8697afeb5d539c2f695606dff80d7c548cff76ae6514c4e4,2025-04-07T14:18:15.560000 -CVE-2025-3210,0,1,e3a6c98204c21b98a0522091394112cf3856887b7b64633cf1e308a0cb6727df,2025-04-08T17:43:12.840000 +CVE-2025-3210,0,0,e3a6c98204c21b98a0522091394112cf3856887b7b64633cf1e308a0cb6727df,2025-04-08T17:43:12.840000 CVE-2025-3211,0,0,e2eebcc8ba292d8d3d123757d4623f49a37b0c48559fde3713cb0f540bc6af19,2025-04-07T14:18:15.560000 CVE-2025-32111,0,0,4216c6506d31334c8d23317eabe3bae930691d012b7febaea26a4964764ff3bb,2025-04-07T14:18:15.560000 CVE-2025-32112,0,0,29850bd9ee8dba8b635f085816eb647aeb59b0cfc0a9b386d683b23018a1f144,2025-04-07T14:18:15.560000 CVE-2025-32113,0,0,e7db690820e60516e7c6d486df6b4a9cb3e0deb6e179d05676b0064d8d011abf,2025-04-07T14:18:15.560000 -CVE-2025-32117,1,1,54e8cedcf832a17db09fa684ca5b2144479e7297752d16662a3a308dcc57e983,2025-04-08T17:15:38.837000 +CVE-2025-32117,0,1,b7d6a1729ca786393f16429b29d329802061f39a4ba256fc44295557fe4cc8b7,2025-04-08T18:13:53.347000 CVE-2025-32118,0,0,8f0374a38abacc2da6332a1f76a9f5b8bd3a7b7fff2011293f9ae6b670f53f78,2025-04-07T14:18:15.560000 CVE-2025-32120,0,0,01d2b20382bdb828f787840ea9e1e3056675c528b77efb1580c1f6fa8893bf9e,2025-04-07T14:18:15.560000 CVE-2025-32121,0,0,232df9e163b0eec7e19130c423a6ab3bdf0e0dcd6188a5cdfd0116793669d2f3,2025-04-07T14:18:15.560000 @@ -288826,7 +288979,7 @@ CVE-2025-3216,0,0,edc9fd13d764092ca431bc6ceef74d3b3374bfa6ae13aaef7e8e2e94e9be53 CVE-2025-32161,0,0,9f369787356e75d953d09b35cf63430e5c96f379da3051f0dd353c65846a9eff,2025-04-07T14:18:15.560000 CVE-2025-32162,0,0,3f31d378fd232f88d11090e5787f7832a879d2a60d3a8f94219b359fabd09969,2025-04-07T14:18:15.560000 CVE-2025-32163,0,0,8ed2955d51a0bce692043782e954ddfe3fe0894e130dbcdb7e2f953e2f499edc,2025-04-07T14:18:15.560000 -CVE-2025-32164,1,1,55ee478c82e2a2dd2c3e196bd07bfcdf6379703a2b2f8930134edd8d06e492b2,2025-04-08T17:15:39.143000 +CVE-2025-32164,0,1,def1362e23e994d5b344ca2ab4bf94ec0b915de813ec7403c6cfaa67b93f0620,2025-04-08T18:13:53.347000 CVE-2025-32165,0,0,d1d497853aa0436f0422acfab7eea0ac1c50388efe047ce13e43e232de75e3e5,2025-04-07T14:18:15.560000 CVE-2025-32166,0,0,e28a64c3736c6121faba78540c859b9f0ac75ebb87722f3c9e0b9a192f2f6acb,2025-04-07T14:18:15.560000 CVE-2025-32167,0,0,a7011f0720bd874049366903b84f623bab33217f15f862346f3cb6f81e2efe33,2025-04-07T14:18:15.560000 @@ -288867,7 +289020,7 @@ CVE-2025-32201,0,0,c30dde8a770665eecb97510bd235216757d92d8b32e9ebc803312276adc6d CVE-2025-32203,0,0,ccab89d569b75f5768d43417a599956989a9fbbb3877e27459871c8e919b0be4,2025-04-07T14:18:15.560000 CVE-2025-32204,0,0,f0a103b22091698324c1fdb7e6e79b9efa8329d5e768eaf870d6ccc8c84acae3,2025-04-07T14:18:15.560000 CVE-2025-32207,0,0,eb72e016d55b2976a29a6912bfeda1ec133bcea7c0b3d85d9579f149b9503d17,2025-04-07T14:18:15.560000 -CVE-2025-32211,1,1,38e57a4951bccd8a2cb648fcafa1002c6cfa3536a004a5ee47a139fd376938b6,2025-04-08T17:15:39.407000 +CVE-2025-32211,0,1,b18a82b3f85ad207775d1cd37d7284800f47738dd09c10642178e6dd3e7a4375,2025-04-08T18:13:53.347000 CVE-2025-32217,0,0,46363fd6a2946a29feeda941a40a1c06c260911e96046cb4bd9eed1f0015127d,2025-04-07T14:18:15.560000 CVE-2025-32218,0,0,50ea87bab640c7d8e6f7a6701aeb7dea043447a00977822fd6aa28de44b55fb6,2025-04-07T14:18:15.560000 CVE-2025-32219,0,0,5178f7d1f0eec6d329438940fcca9e62e3cbae62e09bfd6e58598ad17b1ab0f4,2025-04-07T14:18:15.560000 @@ -288915,7 +289068,7 @@ CVE-2025-32274,0,0,0eca68fbad040b4858c60bf1e368b1919e5128143f7bda40b1bca9fd3149e CVE-2025-32276,0,0,2d58307e46b7067efedf11f095121f96b501a153603912c43d4654278d1c5d86,2025-04-07T14:17:50.220000 CVE-2025-32277,0,0,4c5beb804b84b7552a54d4404f6c409936619f520f5ab7f2060d18f52aa242ee,2025-04-07T14:17:50.220000 CVE-2025-32278,0,0,211d6ed6ada58eb335634d812d6f25038c2a3c7f1bf1fde12b2879747a714849,2025-04-07T14:17:50.220000 -CVE-2025-32279,1,1,d8b232f67895d20aed0f3c830326d1c4c4da8cbcfd04a8c8ae77a8ee3909d351,2025-04-08T17:15:39.600000 +CVE-2025-32279,0,1,b450ca72abb8c6d424cee28279d72c7d5d2ac489159d2bce752077d570c6ff96,2025-04-08T18:13:53.347000 CVE-2025-32280,0,0,c65c58425b7a3fadf6b57f68c3cc7b1aef290df02db7468737d1aecd5fc2343e,2025-04-07T14:17:50.220000 CVE-2025-3229,0,0,601e3d3bbee98b6c8d411bef361231118b9ba6394db4f244736698e0ae8f6293,2025-04-07T14:18:15.560000 CVE-2025-3231,0,0,e195c9aab4993647d4ae533ad8c6eda5a754cea40d4facd1ebd44795fa6d7640,2025-04-07T14:18:15.560000 @@ -288929,22 +289082,22 @@ CVE-2025-32360,0,0,9b4631aa9212cd8ff436558b652207dfc563895faae222463ae0d243f1512 CVE-2025-32364,0,0,e894db5f7d73d7313223c296f4a47feb8ad50e78e5cf8ff87fc79232ef635220,2025-04-07T14:17:50.220000 CVE-2025-32365,0,0,ade41b47e186b36ef3a8ffb90bcc36f39e4b9fcb4f5e42cad9936ea94190fde8,2025-04-07T14:17:50.220000 CVE-2025-32366,0,0,3fc866e724427b581d8cf53af242eabcde3cd158e37af4ae19225f3e0a4ffbf6,2025-04-07T14:17:50.220000 -CVE-2025-32369,0,1,96d402924571180f1e04aec6a92f212002710a79eaea9c3eabbe3a90881f80a2,2025-04-08T17:27:42.950000 +CVE-2025-32369,0,0,96d402924571180f1e04aec6a92f212002710a79eaea9c3eabbe3a90881f80a2,2025-04-08T17:27:42.950000 CVE-2025-3237,0,0,5eb23ae150e778d4e0e8512099269eb9b19a07bb05f106ae634562ab1cde60d7,2025-04-07T14:18:15.560000 -CVE-2025-32370,0,0,d778c242ab00bacbdd7c203b155734432e980d6c8dbe2374a06bea20044364de,2025-04-07T14:17:50.220000 +CVE-2025-32370,0,1,52539d7c5e40c96e3c6580caaac756c4f836d7993783b3dbdb4c110f6e19f5e4,2025-04-08T18:54:51.523000 CVE-2025-3238,0,0,273f0c8b3980a53c04674d23c4dc81b848f12a18d8a02a7425c58d0764474f6e,2025-04-07T14:18:15.560000 CVE-2025-3239,0,0,d82817b34dd7b66d6aa65a93073be6dc4033b0ef23e651c8d1c7428dd5441e76,2025-04-07T14:18:15.560000 CVE-2025-3240,0,0,fd4ee2fdb38ac17ffaee2ac6e70f3a2f5dcccf28e2968d4be2b86fe7dc62212e,2025-04-07T14:18:15.560000 -CVE-2025-32406,0,0,e609727330bd84cd0cacb304454415280dd70ad80cc64a593bcf5153f402e31b,2025-04-08T15:15:50.677000 -CVE-2025-32409,0,1,85c3d1fe0971ac5edaf86ee4a7f32a1e7050da31a4a1795cae3edaf7996a37ac,2025-04-08T16:15:28.547000 +CVE-2025-32406,0,1,c36ab6ae7e1e7303aa3eb42ed946f7d4900320595ae089bfc4f9d1df0d82382a,2025-04-08T18:16:08.917000 +CVE-2025-32409,0,1,90c935eaf5e08e3e6a0e3e6e3bd5188faa5a2fd80d7fe835b9b19800e46d38d1,2025-04-08T18:13:53.347000 CVE-2025-3241,0,0,594a540ab13070f27db4ae33cd1a92be4d81e360e241a5ce3cde519f3dcc5218,2025-04-07T14:18:15.560000 -CVE-2025-32413,0,0,50323dfb94f5bab4f3253d470ec9373ba17768fd308ebea99d55c9be35d361db,2025-04-08T03:15:14.723000 -CVE-2025-32414,0,0,14613c1caf18ed5eca317541a9e6ae92a32268c1ad3bfcecfd2776c1861d8ecb,2025-04-08T03:15:15.940000 +CVE-2025-32413,0,1,264a0d1d6affdc64cee850b499944750da36d787f6454e6724a671c6b9cc8e84,2025-04-08T18:13:53.347000 +CVE-2025-32414,0,1,f8a047a58ce95f98c331d6cba91985610656c35080f52ec7467cfdfc5bee9e8c,2025-04-08T18:13:53.347000 CVE-2025-3242,0,0,7a3796558c3172b29f1754f0aa43f7d570abcefa6f88716250c661d5fd24e293,2025-04-07T14:18:15.560000 CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000 CVE-2025-3244,0,0,a20bb1d848a28a44d0b8d510e43cbe068220041e655dcf96cf8633b9bc977caf,2025-04-07T14:18:15.560000 CVE-2025-3245,0,0,396ea3bbe154112d349f915c8c28a6610578699cecf486191d9d012a69d9c5b9,2025-04-07T14:18:15.560000 -CVE-2025-3248,0,0,49097f37af6815f7b6e264961c334c30a08a8cbcadcf590de80b9118d48681ee,2025-04-07T15:15:44.897000 +CVE-2025-3248,0,1,4c1d83c706cdfdbb3cf09231feeb35ab401e2dab4e1a5c8dcf5ba4fbd153922a,2025-04-08T18:14:17.307000 CVE-2025-3249,0,0,733737203692403dc364c9398a90d84cb34e7925fec94f7c4725b719e6f271e1,2025-04-07T14:18:15.560000 CVE-2025-3250,0,0,86c9421f263345a046bec996216d445d7aebcf0cefe445ca2d4279fffb4f74bd,2025-04-07T14:18:15.560000 CVE-2025-3251,0,0,40d0b8ce477fd906963245c3f47c46ed7c4260a43feb20789c6a6db271395106,2025-04-07T14:18:15.560000 @@ -288960,21 +289113,21 @@ CVE-2025-3265,0,0,1b08405cf7862a0d70f0211001bee004fe3d504e775eb888b6c2102dc0c554 CVE-2025-3266,0,0,72c61d5f89eeb94b30f634ae19d189745b893dd05829140f6047e84fafa81bf8,2025-04-07T18:18:56.247000 CVE-2025-3267,0,0,5957e45c3f258189da3aec49a626cf5736069fd66df3c72b04267cdc97a2b74c,2025-04-07T18:18:41.523000 CVE-2025-3268,0,0,13ebb75f155606fc18a6c469dfd2e1dc92481b7d2a4b4f437c20095a77a45083,2025-04-07T16:15:26.430000 -CVE-2025-3285,1,1,deb3c789ff956da04b3ff5a8da95d4f4dbdccba91055707d5355d74cabd5c186,2025-04-08T16:15:28.690000 -CVE-2025-3286,1,1,f9b1fef870a603219cb6c0a7900180d738c44d6aba108ca246fc8f5b4753e61e,2025-04-08T16:15:28.840000 -CVE-2025-3287,1,1,7df4ba4fd67acf69f507d93bdb1408f7d8f0ef1c27ac4c7835671c063f2d94c8,2025-04-08T16:15:28.980000 -CVE-2025-3288,1,1,2d3c043e01e599b0ef6b1e2770590024688458ada642ce4a7b0655a541d29811,2025-04-08T16:15:29.120000 -CVE-2025-3289,1,1,4e7449d5539986a81cec19b097170807712f142a729a995301eb33bd8e99fb7f,2025-04-08T16:15:29.253000 -CVE-2025-3296,0,1,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000 -CVE-2025-3297,0,1,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000 -CVE-2025-3298,0,1,289613560130dabe199eea55128a1bdfe9eecd882e62238f3674c43e858ef0bc,2025-04-08T16:49:00.290000 -CVE-2025-3299,0,1,1ecd0bb3145f0c6f50b4ad5e92205fbf9ac7cbde82394cd28e5dab2186389f15,2025-04-08T16:48:45.137000 +CVE-2025-3285,0,1,e28a4e88da7ffb77ad01de08bcfd2b4a71d41180820a080f587b6350c35f9e48,2025-04-08T18:13:53.347000 +CVE-2025-3286,0,1,c247e4e94cc04e66afe391d63c6254a128435a66f18dde665fe78a6cdb0ab317,2025-04-08T18:13:53.347000 +CVE-2025-3287,0,1,bff258a343cd08a61757791ae0246a98daa5f12cd52be7d2e4f1314c24254af2,2025-04-08T18:13:53.347000 +CVE-2025-3288,0,1,6c3436c1bb9a5ae79382862f9efeedd904207179bae65402a0755339708c80d4,2025-04-08T18:13:53.347000 +CVE-2025-3289,0,1,827f59b01ecb1240cc36827fa98bfacb84591c8b915a26513129f42996d37d73,2025-04-08T18:13:53.347000 +CVE-2025-3296,0,0,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000 +CVE-2025-3297,0,0,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000 +CVE-2025-3298,0,0,289613560130dabe199eea55128a1bdfe9eecd882e62238f3674c43e858ef0bc,2025-04-08T16:49:00.290000 +CVE-2025-3299,0,0,1ecd0bb3145f0c6f50b4ad5e92205fbf9ac7cbde82394cd28e5dab2186389f15,2025-04-08T16:48:45.137000 CVE-2025-3303,0,0,a88559a89b09c7db23c32ee2c85028152291b57ba44bc3a0730626f1d4cddeda,2025-04-08T15:02:36.210000 CVE-2025-3304,0,0,2ec25b3b916c9e696963707dba4544ab011813ba6a5064128b7ade1c94bf65f1,2025-04-07T14:17:50.220000 -CVE-2025-3305,0,1,dc66bf91b2f6e196955f9173f9c137f77852eb10ef0394de20bd1afdd72a0b74,2025-04-08T16:46:55.203000 +CVE-2025-3305,0,0,dc66bf91b2f6e196955f9173f9c137f77852eb10ef0394de20bd1afdd72a0b74,2025-04-08T16:46:55.203000 CVE-2025-3306,0,0,116c94def1d4a2e814002f4948b93b65daa72c17537f71098e725bdf140a908b,2025-04-08T14:54:03.220000 CVE-2025-3307,0,0,764533eb55c36b857743124d26869569dc2e30546eb2b26c9f7f85b2c9a577e7,2025-04-08T14:59:43.193000 -CVE-2025-3308,0,1,4b8d71911211f133728a91e073b25c990ecfbff65585df599965a7e80c999bcc,2025-04-08T17:38:09.607000 +CVE-2025-3308,0,0,4b8d71911211f133728a91e073b25c990ecfbff65585df599965a7e80c999bcc,2025-04-08T17:38:09.607000 CVE-2025-3309,0,0,3f9f270cc97eee1e0f0ce3a000736519afbb257b767b0a041d6523b7954d83cc,2025-04-07T14:17:50.220000 CVE-2025-3310,0,0,1316ea3a1c20aef7515b9b3e1e77a063bf7af0586d907a8400fc4510b8ede419,2025-04-07T14:17:50.220000 CVE-2025-3311,0,0,bbaed44de3593ef49e3d8df0f1e68c62d488107337bd0eb84e88befc789c022b,2025-04-07T14:17:50.220000 @@ -288984,14 +289137,14 @@ CVE-2025-3314,0,0,b2e2335737d6a91f292de8345d6deaadbaf0f33cf1e4a9bbb0063121a54fe1 CVE-2025-3315,0,0,c6fc02a913341f6c6c0b78bd159329abca327d96ddc7e26192911b306eaf39a5,2025-04-07T14:17:50.220000 CVE-2025-3316,0,0,4c90e03f2d181aa2a4d4e973d2c2fb344c0a34d4393c115450cc7eaca8266f6d,2025-04-07T14:17:50.220000 CVE-2025-3317,0,0,e1db1a1580e9b248a43b6931cce74249339dfb03e962eab3561364c3f8943ace,2025-04-07T14:17:50.220000 -CVE-2025-3318,0,0,ef399ed2872fdb7f18e0bb42112ca5e04bc42241f4440948b2decf663cacb039,2025-04-07T15:15:45.887000 +CVE-2025-3318,0,1,77ce30b26402d9ce06d5e5808411a265beb7d6c070ad232f151cfd343328979e,2025-04-08T18:54:37.387000 CVE-2025-3323,0,0,37acfe54a95d00fbd90085f0772424f0e59cecbbefc8d280be8716ab15971168,2025-04-07T18:18:28.467000 CVE-2025-3324,0,0,9e36bef004ef1e608c5124bc62604916196e8cc98749b7cc4f5375d132db9bd5,2025-04-07T18:18:32.793000 -CVE-2025-3325,0,0,2ea9a285d969d443da824dfbadc232cf198bfc45ce35e2fcca46f5a553caf2bc,2025-04-07T14:17:50.220000 -CVE-2025-3326,0,0,f5160abdfd725f7d3c284312aece047f9dc17f8a0198a82db00d4b8d885b84cc,2025-04-07T14:17:50.220000 -CVE-2025-3327,0,0,73c4226e850816dcb03a6188f70baaafa28c9dfbf137d1eb526255d425bf7c59,2025-04-07T14:17:50.220000 +CVE-2025-3325,0,1,091aaacf9befbd2c5e7e3225267a7e92410dcd52b6f7b5915d2d51a9f6e7a8e7,2025-04-08T18:53:43.787000 +CVE-2025-3326,0,1,9697bf686f8ab40df9c52f5147672d196f0efb40ce6247a8fdf612b99df632e2,2025-04-08T18:53:35.053000 +CVE-2025-3327,0,1,c55d704870423dd23fd9c7a915c94c76fa88ea107ba467599a650eea0b2eb2c3,2025-04-08T18:53:26.640000 CVE-2025-3328,0,0,1cc57e953252009111aa75cff1465e67fbe3c61dcdc18a15566b3e49c1078c6e,2025-04-07T18:17:37.687000 -CVE-2025-3329,0,0,89c764a7b8dee6ba5c04b17c4808490b5854f5d5525db2767cc1f735a9e24094,2025-04-07T14:17:50.220000 +CVE-2025-3329,0,1,8db45abcb151481135b55856aba8e6bbacc46c78ab146fd75298c31d3aa8c97a,2025-04-08T18:55:02.833000 CVE-2025-3330,0,0,81b91d3415d54487b0e72b874358b0e395945e81f185f09540a57d80adb3d6e2,2025-04-07T18:17:30.230000 CVE-2025-3331,0,0,de8d030e3c6d59904c2434ca0e69c66c8a7881a8abe027c7d0070392fc69af33,2025-04-07T18:17:01.327000 CVE-2025-3332,0,0,8670e415616f56fe491b3a0d92603ef6193b0c5721b561fa689da9e8e9a39b24,2025-04-07T18:16:40.283000 @@ -289018,60 +289171,61 @@ CVE-2025-3352,0,0,a9e364b417d4c1b9bcf70be1114bee2321f25df05acf5e2e7d6d36702a9946 CVE-2025-3353,0,0,b6f7ae489f578301c1233579d115f4b527cac9e74290596bbf18a401d93bc562,2025-04-07T14:17:50.220000 CVE-2025-3359,0,0,310397201643add7035d3dfe451e133ed75bc9a9599c95f2a8d2e8611e141127,2025-04-07T14:17:50.220000 CVE-2025-3360,0,0,00a8b0fe3c658775c0c228780a1e555aca09d51a98f5810881cf1b98d72242b6,2025-04-07T14:17:50.220000 -CVE-2025-3361,0,0,0ea20e277f4a9d2735063cc0cb60a65a3bfa98052232e5b3d9f7eb7b4e884e11,2025-04-08T02:15:20.737000 -CVE-2025-3362,0,0,dcadcf32942d6e019b98861990714d0be8e18d6cb35cbe37b8fc22491f746927,2025-04-08T02:15:20.913000 -CVE-2025-3363,0,0,6cdd1886233f0221600f5c66e457e17c70ee647df54bd43e495876954e18637e,2025-04-08T02:15:21.077000 -CVE-2025-3364,0,0,c1a92dc54c4f0dce6436323db4c83b7a1e68ea03126483ddb4b4bdc4aac33620,2025-04-08T06:15:44.690000 +CVE-2025-3361,0,1,1fe2ec8a64bc635c81624d6e5c98311c550cae1314a855e35bf93ef979c92b53,2025-04-08T18:13:53.347000 +CVE-2025-3362,0,1,f2596ce87f1b2ee767410b87c3d50eab6e0dd63bddff8a5282aeb95847ff2bc3,2025-04-08T18:13:53.347000 +CVE-2025-3363,0,1,0bfec75432dde717fba421cd754f82c62be00bc647a979275627a87dda1e3b02,2025-04-08T18:13:53.347000 +CVE-2025-3364,0,1,52e815ba5bfb5fe0409468beb50ec169d2973da5550914ad63b94a6a1fadff1c,2025-04-08T18:13:53.347000 CVE-2025-3369,0,0,9bfab61711c9bf7f6a8c870d9df6b844b16be953ff70535930a493b686277665,2025-04-07T14:17:50.220000 CVE-2025-3370,0,0,3ca9a9bd8cfc457fadd94e88b3803dfeedb7934bde407602fa694d4cec7fa434,2025-04-07T14:17:50.220000 -CVE-2025-3371,0,0,cf35734a694c96fa758a3813317d567d31fb084974287b75958b2467d9b5778e,2025-04-07T15:15:46.097000 -CVE-2025-3372,0,0,5c9b0e7858a7bc3bea66a83ce263b9dd546c3bb655ab335de98a82548a4d32c3,2025-04-07T15:15:46.300000 -CVE-2025-3373,0,0,7e60e2d9c93469b0e78a9bc139e5b3d07e65ddc632f3afc097e0ab60e3d57f57,2025-04-07T16:15:27.340000 -CVE-2025-3374,0,0,7bae743d601ac266e23c4b0954d3d5f0912cf96c8a667e347e6dd78579d2ce61,2025-04-07T17:15:39.303000 -CVE-2025-3375,0,0,be4f7c5876b017c9a80cdf283220ddbe1d219f286a32685352262b662103af49,2025-04-07T17:15:39.457000 -CVE-2025-3376,0,0,f044b988b65bed88d1f39e4a7a7b97fe40299624800e5bacefdb3bd31a2684c9,2025-04-07T17:15:39.680000 -CVE-2025-3377,0,0,f15e9f2a12603592a901539197b9cf1900609b90580b6f29669ce5d408d8653f,2025-04-07T18:15:45.733000 -CVE-2025-3378,0,0,b41c1e92ea39358a2a37e0afa4ea8efa6b253ddbd8fbb05da6b6a2995f98f3b7,2025-04-07T19:15:57.413000 -CVE-2025-3379,0,0,f23a9a261bdf918c1530330bd248a1a00eebcc5072f6dca448d66fd6289126e2,2025-04-07T19:15:57.533000 -CVE-2025-3380,0,0,1cad7baa07636cdce6da6565ea53507eecacf0a1bff169a2551a7e05749702ae,2025-04-07T20:15:21.640000 -CVE-2025-3381,0,1,617253e1437b111c82b1e4f812c227ee5c8ab245c388e2e82f361534ca43f0d5,2025-04-08T16:15:29.563000 -CVE-2025-3382,0,1,90065b48bac79256a4079ddccf88bdb83899c71f350259d6c1c3c4b2566de423,2025-04-08T16:15:29.780000 -CVE-2025-3383,0,1,dba32d91a7c770a0613f794ade98bc1f4ecbfcf6ec1e693324dd64cdd4886380,2025-04-08T16:15:29.913000 -CVE-2025-3384,0,1,3d251291010deff040de185095c3a960872bb23ad620acd043d5eee0c0eed3fd,2025-04-08T16:15:30.047000 -CVE-2025-3385,0,1,b0297574c19347669f2951416ccd950dd916b3993c39f40c55301cd4584ca47d,2025-04-08T16:15:30.180000 -CVE-2025-3386,0,1,77d8567af7c20cc91368633536c6ffcc2b3e0a2bd992069af835609400e381cd,2025-04-08T16:15:30.307000 -CVE-2025-3387,0,0,109216d2024cbc549c478141af7f937c3a5ffb542c64b6d4d9e3338cc30248cb,2025-04-07T23:15:43.530000 -CVE-2025-3388,0,0,e08032fbdd0416394687f327741f2f97a9e40f4e29c06995464229eade0e0728,2025-04-07T23:15:44.033000 -CVE-2025-3389,0,0,93f3db4d16adc7186c92ae6d0057a3a9a8d6ca481fde76d105db0fa5d733284f,2025-04-08T00:15:15.793000 -CVE-2025-3390,0,0,4c3eeaa45289c2fbd2ae2197139db2beaa64832b48e7db06c403d8df9f4f8435,2025-04-08T14:15:35.717000 -CVE-2025-3391,0,0,601a624868b38f220aefc41a487e3fc0637476d549c07e097ff1b175c11bec32,2025-04-08T15:15:51.127000 -CVE-2025-3392,0,1,6a7828a37dda06d32d2aae476e1b9a0398a7f9a61e546a5be95874a86ee48ef0,2025-04-08T16:15:30.430000 -CVE-2025-3393,0,0,975f6e04602e720746d8ae18d538623e060fd858627208470509836109875586,2025-04-08T15:15:51.250000 -CVE-2025-3397,0,0,7da588be7381757c900cbb8fd58238db4524483526bd8d9b5a632cc046fea5c2,2025-04-08T15:15:51.383000 -CVE-2025-3398,0,0,d9f95e6a3cebbc2ea9f9db8d2c8320ee269b787d01cb618537b11ac183e78ad5,2025-04-08T02:15:21.780000 -CVE-2025-3399,0,1,91ac1532589886846881e94a04ee007db6ac1b164d98e8d243768bbf93699ef0,2025-04-08T16:15:30.563000 -CVE-2025-3400,0,1,b4c484ed24b37a3f3e6fabe47a491722d24eaa4c635e538e5150ed28f40dffb9,2025-04-08T16:15:30.730000 -CVE-2025-3401,0,0,519d7cf7b29f499c997a6a458805be85dbdfa7f7f16dbf8bb92f6b6d8a66f3ad,2025-04-08T15:15:52.110000 -CVE-2025-3402,0,0,fbd2b094c2b24668b3f40172e9b003f65a18c6bcc92a94147f3742946f540634,2025-04-08T03:15:16.463000 -CVE-2025-3403,0,0,b46f602816252c11b21a610177f8f77740ecaa643652158318cc5847c4ab6a4c,2025-04-08T03:15:16.670000 -CVE-2025-3405,0,0,30a5b4720c4c1de75e49d78086f9e4d94c355b847071f9fe56de3d99ee1a5706,2025-04-08T04:15:31.400000 -CVE-2025-3406,0,0,ce7339178ebf8d652607b8c34e79d29206738ac0dcbc86aca04c568cb9ec5dc1,2025-04-08T04:15:31.647000 -CVE-2025-3407,0,0,91453288f516f44cee3c00d3d0d95324444a0677ae9903b32a01adf81e3d56dc,2025-04-08T04:15:31.877000 -CVE-2025-3408,0,1,22df4d1da68cca78197ee12641c7cec146c840e9864e72387b9f0a6f7ee453e7,2025-04-08T16:15:30.873000 -CVE-2025-3409,0,0,7e6c369f665f5cacb993009efd062e0fcb1ef1e93aa5eaac2f105df1a6aca67b,2025-04-08T05:15:40.050000 -CVE-2025-3410,0,1,506eb4ec2533a52229bdd48d66b5c88c6293472858f0105d17dd0c7bbf4a5d56,2025-04-08T16:15:31.110000 -CVE-2025-3411,0,1,055f14ef0edbc4ecd0eb42054fbfeb1ef180f7b34b383bc35fe1e56aa92597cf,2025-04-08T16:15:31.250000 -CVE-2025-3412,0,1,fa2a685d40e2f3ae5b3cefc3c9ae3f9486d0640a4ad30b023f6621cda20e7680,2025-04-08T16:15:31.370000 -CVE-2025-3413,0,1,b0605baec125ecc86083231bc5a0d6d2131e86f04f4a215f0c27c0336a80aa9d,2025-04-08T16:15:31.493000 -CVE-2025-3424,0,0,be0fe6f8406eda3536331ded14e2f6be10ec512141cedd16fb1a1f0fe02bf768,2025-04-07T16:15:27.703000 -CVE-2025-3425,0,0,9396f0e72f97b1c5b17d6a193f82e00c0d3f258bd16686092e11de9ff192286c,2025-04-07T16:15:27.963000 -CVE-2025-3426,0,0,bc136ddbc855578300039b703456513a80b7a9e221e0139f4084d1b3f0db77d4,2025-04-07T17:15:40.073000 -CVE-2025-3427,0,0,f850547ae767a17bb67296cfcae3c5a676ac86e89b763364a11d8f2ad2d824ff,2025-04-08T07:15:42.740000 -CVE-2025-3428,0,0,fe4880e21d35737d150b4e676a276b5c33b0ca527b526883ce410400b5f770b9,2025-04-08T07:15:42.943000 -CVE-2025-3429,0,0,a4df39c5b7cc2899a9366e62fb48d05074f63294683e2006494bb123e63cb51c,2025-04-08T07:15:43.120000 -CVE-2025-3430,0,0,b6c40d6b0ef3c8648892c15b77657ef236c19f9740d69b867859874e4fc54750,2025-04-08T07:15:43.303000 -CVE-2025-3431,0,0,e670e7d054e601025cf0eb72b723d5b37fb9fbb720309197877ef8f8d03470f7,2025-04-08T08:15:18.447000 -CVE-2025-3432,0,0,2bf3e23b6bedbebc6bd8cdc2583c4de94eee07f3a92d57f813cb35a4cfad2133,2025-04-08T09:15:28.630000 -CVE-2025-3433,0,0,c3110812ae023f72ad64a55b3ad2c3c0f766c027fee5bad7535d072d777395fa,2025-04-08T09:15:28.943000 -CVE-2025-3436,0,0,9f90f52a69532e8408936e7cbb7e0f366cbd02a815f6e064670c79628bd8cc03,2025-04-08T09:15:29.300000 -CVE-2025-3437,0,0,6875252e368ccc0365c18def92525cae93bda325f2d7ee4896a66443f4d3e9bf,2025-04-08T10:15:19.413000 +CVE-2025-3371,0,1,a6a0065603aada5d4ba78a78811213f4674807b77633adc55e5b432a3640d5b7,2025-04-08T18:14:17.307000 +CVE-2025-3372,0,1,b58da848efdf4686d80f28c70dd080debfd3e881526eafb4360d1110ccc0aa46,2025-04-08T18:14:17.307000 +CVE-2025-3373,0,1,b9a3bcf5f8be84e23eab48c66498a32f84f47c5ae4f9722f760eafe8de48b371,2025-04-08T18:14:17.307000 +CVE-2025-3374,0,1,e3558428a70d4874b3cc1adb86a154e7ace8454dd7a975b73dfe62a9067945c8,2025-04-08T18:14:17.307000 +CVE-2025-3375,0,1,f61ddfdaf531c5c2caf924739279b93fd56d7aaaf3050afd862f453b07ca2aea,2025-04-08T18:14:17.307000 +CVE-2025-3376,0,1,7a37f0f61b13291a5b0b090aa3662687dd8750eefcbcfd49f49f88198dfd7912,2025-04-08T18:14:17.307000 +CVE-2025-3377,0,1,1072552839cf009ce9e5789acb607157bcca0acc7eab443c95d17db194b1cee8,2025-04-08T18:13:53.347000 +CVE-2025-3378,0,1,094e4a8d97f847383ccae33d98c2871ee9900830a6a391929b489efa17ecef33,2025-04-08T18:13:53.347000 +CVE-2025-3379,0,1,b61dbeb7369d47988b80da9e59fce11aaeb9c28db4c444cf92e590aceef61fe4,2025-04-08T18:13:53.347000 +CVE-2025-3380,0,1,046240d88def70b3f4739635090755aea5c9b602c10161545d71766a43c7b751,2025-04-08T18:13:53.347000 +CVE-2025-3381,0,1,71e3b3c54648b559c4279cbc063cbc5da5a79c218ec7763d5ef76124af6d9fda,2025-04-08T18:13:53.347000 +CVE-2025-3382,0,1,9830a184308ca093b12d7a02bc227e3e7eb89d75a27df9ab876014b201d78c99,2025-04-08T18:13:53.347000 +CVE-2025-3383,0,1,5ed55e8140ec483c27fc611d05ad18a09514d98fa01e7e28815bade5114da4e2,2025-04-08T18:13:53.347000 +CVE-2025-3384,0,1,ca11c8cbc0dc90fe2dfb59d4812c7e9d20d35d618e191f7b88496e86afb2073f,2025-04-08T18:13:53.347000 +CVE-2025-3385,0,1,4efd52636f478e77f189028e4aa06d1a949186fae1318a41fe23990ac613e18c,2025-04-08T18:13:53.347000 +CVE-2025-3386,0,1,a0e5ca5f1de468657459a3388678e077bf77397ddaa0d466584449da34216e2b,2025-04-08T18:13:53.347000 +CVE-2025-3387,0,1,70f900adabc30dbe7d3863c250f5f90504d49ad077a96fd10dcc04ef29d73547,2025-04-08T19:15:52.823000 +CVE-2025-3388,0,1,9114353951316e853bc52308709d76f8c470fada9a96ba47515bae1fa9bb0563,2025-04-08T19:15:52.950000 +CVE-2025-3389,0,1,31649e2aa1cbf828d30c899c4043f97b31f2edacffeea7883a54211585eead5d,2025-04-08T19:15:53.143000 +CVE-2025-3390,0,1,1de8a1a3f1bbb43da050484218883f048b92e2cef37a445a14724e6269d8e13d,2025-04-08T18:13:53.347000 +CVE-2025-3391,0,1,cf2069e19e0beee748515026e128f6b4bb2f4d25f64270d74e8b26b016e20fce,2025-04-08T18:13:53.347000 +CVE-2025-3392,0,1,6e7aef0350df61b76209d1d031032bf130433037f6682fecd7cc1245c32ce13a,2025-04-08T18:13:53.347000 +CVE-2025-3393,0,1,70de7b98b5124ffd75cf4788f09d2af5335b7839f939fabb9280ce2b43755c34,2025-04-08T18:13:53.347000 +CVE-2025-3397,0,1,6750207843d9784977191199ecd0dfb30a5aae94130d6bf75c373d5c8d0db8db,2025-04-08T18:13:53.347000 +CVE-2025-3398,0,1,819dc858f22f99096dfba4356b31ee59577b479c8ca03b51afbbbb0eac5c54a9,2025-04-08T18:13:53.347000 +CVE-2025-3399,0,1,5ced99e3c7a30b5d192ad5a6a8659534fd57fb8b0f2a1d964aef1a4379cfe1be,2025-04-08T18:13:53.347000 +CVE-2025-3400,0,1,d34be283704d6bee2c9b2167f9e2a4281541310d2d538dbc49670649bbc52788,2025-04-08T18:13:53.347000 +CVE-2025-3401,0,1,39ec8ba5c25636448033c222e20d9ca66b935ed86dabf20d1eed77a48177fb89,2025-04-08T18:13:53.347000 +CVE-2025-3402,0,1,fb2eb5b194518a576d30d497d3c07d8afb7daa9ab5c7a3db51d822547dfc3965,2025-04-08T19:15:53.267000 +CVE-2025-3403,0,1,5499ba1d1841e737df5ef1f2a2d32505df727eeda279da8a9f0ff20d660ca6b7,2025-04-08T19:15:53.387000 +CVE-2025-3405,0,1,a31287bf487edd9888ccf3a2cc660111ad412bcd7d306362616791fdc35de9e0,2025-04-08T18:13:53.347000 +CVE-2025-3406,0,1,7ba1ebe9a4174ed6e20c2f4fe1e75a4864d330055141a3dcb596eb92ec7fbc3a,2025-04-08T18:13:53.347000 +CVE-2025-3407,0,1,e5cceac7b7d945db6bab90635fdc2ec04fc23eea7f5eaa5ff6a3dce8910502a2,2025-04-08T18:13:53.347000 +CVE-2025-3408,0,1,a88be7d5c921572f767d8ba3e6ebc652be3930b6ee80cf6e4b3b3197df125283,2025-04-08T18:13:53.347000 +CVE-2025-3409,0,1,f59095d51838a53941b8bd9796d34dc98a766466b963796da5b26614478f737a,2025-04-08T18:13:53.347000 +CVE-2025-3410,0,1,c70ad1f10853e4bee6dfe4932ecd12d3acdcade7cac158141968cc85be8d2fc1,2025-04-08T18:13:53.347000 +CVE-2025-3411,0,1,8cff3e75ab7d8c8c3df6b9fa01111f95a8fb7002f322628e53333c48f3625fa7,2025-04-08T18:13:53.347000 +CVE-2025-3412,0,1,25a3c2ab8fa0aef3dfffc2c9723b43f279f3600f9f3d1f7632095f66cdc52ea3,2025-04-08T18:13:53.347000 +CVE-2025-3413,0,1,e9ae6f9ee954dc0b39e2e9a8b6ad41f6cbd8628b2d84dff62138fbf7e2823b11,2025-04-08T18:13:53.347000 +CVE-2025-3416,1,1,5e690857a8d0eabfdc23066555ef98f8c89a927c4d4b5328d6e1b4b0c107df9c,2025-04-08T19:15:53.717000 +CVE-2025-3424,0,1,e4a6bd7e6ff2128bc5d939729449d80241551339ad344ad915f9387ff36da19c,2025-04-08T18:14:17.307000 +CVE-2025-3425,0,1,89b52021ac9535b7bfcd710ad3a41c5d483f876e564b2bf8efc340d7efdcfbdf,2025-04-08T18:14:17.307000 +CVE-2025-3426,0,1,90dd23ef26990db1fdca18c825634f92c9798fac280599ec08ba6ebce934ed6c,2025-04-08T18:14:17.307000 +CVE-2025-3427,0,1,60de0d2b8e5442f91f236a2edcb1916d069f3afe24a82799e57df8ca16001288,2025-04-08T18:13:53.347000 +CVE-2025-3428,0,1,cca22a6d17d962d6a506d0c59b8aae3f3711140d89d3c131d3446ceef91483fb,2025-04-08T18:13:53.347000 +CVE-2025-3429,0,1,25313d6c76acd6c4506a535b56db39fbc0502345abde5d63fabddd580edbfc83,2025-04-08T18:13:53.347000 +CVE-2025-3430,0,1,4108de5de28ea6ad3b283f6b1b4e124b53de0d34b577f3df5c6e6463ccd23bef,2025-04-08T18:13:53.347000 +CVE-2025-3431,0,1,3268c065a33ed9c3e0d65730bc3852cbe02c3e2891ed1aaf906166836cdedba3,2025-04-08T18:13:53.347000 +CVE-2025-3432,0,1,32b4909a605e3dc15d41b2069e1ead14c30bcbe2dfa78debc747a89be022e4ba,2025-04-08T18:13:53.347000 +CVE-2025-3433,0,1,46dd66c57af291abbb1b77326145823e13d716692eb68902a18c25a048a17397,2025-04-08T18:13:53.347000 +CVE-2025-3436,0,1,350fe0ab040ca88ca01e6b9c153bc7bb9c0c6c278cf5357b8d0cb98bb355f464,2025-04-08T18:13:53.347000 +CVE-2025-3437,0,1,e73b4884af1e4c5b90938b61853540dd90f98780db8cdd9f4d702d9b75697db1,2025-04-08T18:13:53.347000