From 57721645558e9ad108cbf3b59539e5b9534521d6 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 25 Apr 2025 16:03:53 +0000 Subject: [PATCH] Auto-Update: 2025-04-25T16:00:20.371169+00:00 --- CVE-2020/CVE-2020-212xx/CVE-2020-21219.json | 32 ++++- CVE-2021/CVE-2021-250xx/CVE-2021-25059.json | 22 ++- CVE-2021/CVE-2021-317xx/CVE-2021-31740.json | 32 ++++- CVE-2022/CVE-2022-229xx/CVE-2022-22984.json | 12 +- CVE-2022/CVE-2022-237xx/CVE-2022-23746.json | 22 ++- CVE-2022/CVE-2022-361xx/CVE-2022-36136.json | 32 ++++- CVE-2022/CVE-2022-361xx/CVE-2022-36137.json | 32 ++++- CVE-2022/CVE-2022-364xx/CVE-2022-36433.json | 32 ++++- CVE-2022/CVE-2022-36xx/CVE-2022-3689.json | 22 ++- CVE-2022/CVE-2022-37xx/CVE-2022-3751.json | 6 +- CVE-2022/CVE-2022-37xx/CVE-2022-3769.json | 22 ++- CVE-2022/CVE-2022-38xx/CVE-2022-3823.json | 26 +++- CVE-2022/CVE-2022-38xx/CVE-2022-3831.json | 22 ++- CVE-2022/CVE-2022-38xx/CVE-2022-3850.json | 22 ++- CVE-2022/CVE-2022-38xx/CVE-2022-3865.json | 22 ++- CVE-2022/CVE-2022-407xx/CVE-2022-40799.json | 32 ++++- CVE-2022/CVE-2022-424xx/CVE-2022-42445.json | 12 +- CVE-2022/CVE-2022-440xx/CVE-2022-44096.json | 32 ++++- CVE-2022/CVE-2022-443xx/CVE-2022-44355.json | 32 ++++- CVE-2022/CVE-2022-443xx/CVE-2022-44356.json | 32 ++++- CVE-2022/CVE-2022-446xx/CVE-2022-44635.json | 24 +++- CVE-2022/CVE-2022-452xx/CVE-2022-45202.json | 32 ++++- CVE-2022/CVE-2022-452xx/CVE-2022-45204.json | 32 ++++- CVE-2022/CVE-2022-453xx/CVE-2022-45301.json | 32 ++++- CVE-2022/CVE-2022-453xx/CVE-2022-45304.json | 32 ++++- CVE-2022/CVE-2022-453xx/CVE-2022-45305.json | 32 ++++- CVE-2022/CVE-2022-453xx/CVE-2022-45306.json | 32 ++++- CVE-2022/CVE-2022-453xx/CVE-2022-45307.json | 32 ++++- CVE-2024/CVE-2024-04xx/CVE-2024-0406.json | 90 +++++++++++- CVE-2024/CVE-2024-32xx/CVE-2024-3203.json | 98 +++++++++++-- CVE-2024/CVE-2024-32xx/CVE-2024-3204.json | 100 +++++++++++-- CVE-2024/CVE-2024-32xx/CVE-2024-3207.json | 88 ++++++++++-- CVE-2024/CVE-2024-32xx/CVE-2024-3209.json | 151 +++++++++++++++++--- CVE-2024/CVE-2024-32xx/CVE-2024-3227.json | 6 +- CVE-2024/CVE-2024-496xx/CVE-2024-49672.json | 6 +- CVE-2024/CVE-2024-500xx/CVE-2024-50086.json | 32 ++++- CVE-2024/CVE-2024-573xx/CVE-2024-57375.json | 55 +++++++ CVE-2025/CVE-2025-220xx/CVE-2025-22097.json | 43 +++++- CVE-2025/CVE-2025-273xx/CVE-2025-27370.json | 6 +- CVE-2025/CVE-2025-273xx/CVE-2025-27371.json | 6 +- CVE-2025/CVE-2025-280xx/CVE-2025-28076.json | 25 ++++ CVE-2025/CVE-2025-283xx/CVE-2025-28354.json | 25 ++++ CVE-2025/CVE-2025-320xx/CVE-2025-32044.json | 60 ++++++++ CVE-2025/CVE-2025-320xx/CVE-2025-32045.json | 60 ++++++++ CVE-2025/CVE-2025-324xx/CVE-2025-32432.json | 72 ++++++++++ CVE-2025/CVE-2025-35xx/CVE-2025-3551.json | 17 ++- CVE-2025/CVE-2025-35xx/CVE-2025-3552.json | 17 ++- CVE-2025/CVE-2025-36xx/CVE-2025-3625.json | 60 ++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3627.json | 60 ++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3628.json | 60 ++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3634.json | 60 ++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3635.json | 60 ++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3636.json | 64 +++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3637.json | 64 +++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3638.json | 41 ++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3640.json | 64 +++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3641.json | 64 +++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3642.json | 64 +++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3643.json | 64 +++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3644.json | 64 +++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3645.json | 64 +++++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3647.json | 64 +++++++++ CVE-2025/CVE-2025-370xx/CVE-2025-37088.json | 20 +-- CVE-2025/CVE-2025-430xx/CVE-2025-43016.json | 56 ++++++++ CVE-2025/CVE-2025-438xx/CVE-2025-43862.json | 64 +++++++++ CVE-2025/CVE-2025-439xx/CVE-2025-43946.json | 4 +- CVE-2025/CVE-2025-464xx/CVE-2025-46432.json | 56 ++++++++ CVE-2025/CVE-2025-464xx/CVE-2025-46433.json | 56 ++++++++ CVE-2025/CVE-2025-466xx/CVE-2025-46618.json | 56 ++++++++ README.md | 67 +++++++-- _state.csv | 124 +++++++++------- 71 files changed, 2943 insertions(+), 180 deletions(-) create mode 100644 CVE-2024/CVE-2024-573xx/CVE-2024-57375.json create mode 100644 CVE-2025/CVE-2025-280xx/CVE-2025-28076.json create mode 100644 CVE-2025/CVE-2025-283xx/CVE-2025-28354.json create mode 100644 CVE-2025/CVE-2025-320xx/CVE-2025-32044.json create mode 100644 CVE-2025/CVE-2025-320xx/CVE-2025-32045.json create mode 100644 CVE-2025/CVE-2025-324xx/CVE-2025-32432.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3625.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3627.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3628.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3634.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3635.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3636.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3637.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3638.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3640.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3641.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3642.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3643.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3644.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3645.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3647.json create mode 100644 CVE-2025/CVE-2025-430xx/CVE-2025-43016.json create mode 100644 CVE-2025/CVE-2025-438xx/CVE-2025-43862.json create mode 100644 CVE-2025/CVE-2025-464xx/CVE-2025-46432.json create mode 100644 CVE-2025/CVE-2025-464xx/CVE-2025-46433.json create mode 100644 CVE-2025/CVE-2025-466xx/CVE-2025-46618.json diff --git a/CVE-2020/CVE-2020-212xx/CVE-2020-21219.json b/CVE-2020/CVE-2020-212xx/CVE-2020-21219.json index 90a1ce84cb6..4bb9a2795f6 100644 --- a/CVE-2020/CVE-2020-212xx/CVE-2020-21219.json +++ b/CVE-2020/CVE-2020-212xx/CVE-2020-21219.json @@ -2,7 +2,7 @@ "id": "CVE-2020-21219", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-15T19:15:15.510", - "lastModified": "2024-11-21T05:12:29.127", + "lastModified": "2025-04-25T15:15:29.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-250xx/CVE-2021-25059.json b/CVE-2021/CVE-2021-250xx/CVE-2021-25059.json index a7e96f950d2..76814ebc03d 100644 --- a/CVE-2021/CVE-2021-250xx/CVE-2021-25059.json +++ b/CVE-2021/CVE-2021-250xx/CVE-2021-25059.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25059", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-28T14:15:10.663", - "lastModified": "2024-11-21T05:54:16.363", + "lastModified": "2025-04-25T15:15:29.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, diff --git a/CVE-2021/CVE-2021-317xx/CVE-2021-31740.json b/CVE-2021/CVE-2021-317xx/CVE-2021-31740.json index 8f27a14c02b..4b070bc3690 100644 --- a/CVE-2021/CVE-2021-317xx/CVE-2021-31740.json +++ b/CVE-2021/CVE-2021-317xx/CVE-2021-31740.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31740", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-30T15:15:10.290", - "lastModified": "2024-11-21T06:06:10.357", + "lastModified": "2025-04-25T15:15:29.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-229xx/CVE-2022-22984.json b/CVE-2022/CVE-2022-229xx/CVE-2022-22984.json index 6e003798cad..73c600b3278 100644 --- a/CVE-2022/CVE-2022-229xx/CVE-2022-22984.json +++ b/CVE-2022/CVE-2022-229xx/CVE-2022-22984.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22984", "sourceIdentifier": "report@snyk.io", "published": "2022-11-30T13:15:10.517", - "lastModified": "2024-11-21T06:47:44.417", + "lastModified": "2025-04-25T15:15:30.193", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-237xx/CVE-2022-23746.json b/CVE-2022/CVE-2022-237xx/CVE-2022-23746.json index 5ebd004aeea..1f2d8029f1c 100644 --- a/CVE-2022/CVE-2022-237xx/CVE-2022-23746.json +++ b/CVE-2022/CVE-2022-237xx/CVE-2022-23746.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23746", "sourceIdentifier": "cve@checkpoint.com", "published": "2022-11-30T19:15:10.310", - "lastModified": "2024-11-21T06:49:13.710", + "lastModified": "2025-04-25T15:15:30.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-361xx/CVE-2022-36136.json b/CVE-2022/CVE-2022-361xx/CVE-2022-36136.json index ab5016655db..dc239d37f91 100644 --- a/CVE-2022/CVE-2022-361xx/CVE-2022-36136.json +++ b/CVE-2022/CVE-2022-361xx/CVE-2022-36136.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36136", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T04:15:10.503", - "lastModified": "2024-11-21T07:12:28.140", + "lastModified": "2025-04-25T15:15:30.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-361xx/CVE-2022-36137.json b/CVE-2022/CVE-2022-361xx/CVE-2022-36137.json index b33daac741d..69338ad0ae5 100644 --- a/CVE-2022/CVE-2022-361xx/CVE-2022-36137.json +++ b/CVE-2022/CVE-2022-361xx/CVE-2022-36137.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36137", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T04:15:10.567", - "lastModified": "2024-11-21T07:12:28.283", + "lastModified": "2025-04-25T15:15:30.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-364xx/CVE-2022-36433.json b/CVE-2022/CVE-2022-364xx/CVE-2022-36433.json index f0e3beb3097..e2bdf6d783e 100644 --- a/CVE-2022/CVE-2022-364xx/CVE-2022-36433.json +++ b/CVE-2022/CVE-2022-364xx/CVE-2022-36433.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36433", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T13:15:10.420", - "lastModified": "2024-11-21T07:12:59.967", + "lastModified": "2025-04-25T15:15:30.917", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3689.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3689.json index ad97986c8f8..a70e73ba687 100644 --- a/CVE-2022/CVE-2022-36xx/CVE-2022-3689.json +++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3689.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3689", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-28T14:15:13.530", - "lastModified": "2024-11-21T07:20:02.247", + "lastModified": "2025-04-25T15:15:31.303", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3751.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3751.json index 9230b438b8e..11c57a8370a 100644 --- a/CVE-2022/CVE-2022-37xx/CVE-2022-3751.json +++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3751.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3751", "sourceIdentifier": "security@huntr.dev", "published": "2022-11-29T21:15:11.217", - "lastModified": "2024-11-21T07:20:10.583", + "lastModified": "2025-04-25T15:15:31.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -133,6 +133,10 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://huntr.com/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3769.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3769.json index 866e784a8df..7c0d7204dc5 100644 --- a/CVE-2022/CVE-2022-37xx/CVE-2022-3769.json +++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3769.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3769", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-28T14:15:14.103", - "lastModified": "2024-11-21T07:20:12.690", + "lastModified": "2025-04-25T15:15:31.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3823.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3823.json index c27c2cdd307..ac11956680c 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3823.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3823.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3823", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-28T14:15:14.677", - "lastModified": "2024-11-21T07:20:18.497", + "lastModified": "2025-04-25T15:15:31.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -71,6 +91,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://wpscan.com/vulnerability/a072b091-5e5f-4e88-bd3d-2f4582e6564e/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3831.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3831.json index ac30abbe241..3c89984e58d 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3831.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3831.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3831", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-28T14:15:15.573", - "lastModified": "2024-11-21T07:20:19.523", + "lastModified": "2025-04-25T15:15:31.947", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3850.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3850.json index 5f7698c9c58..7142debe36a 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3850.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3850.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3850", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-28T14:15:18.280", - "lastModified": "2024-11-21T07:20:21.940", + "lastModified": "2025-04-25T15:15:32.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3865.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3865.json index 7b6a400317c..bc620702d79 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3865.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3865.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3865", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-28T14:15:18.593", - "lastModified": "2024-11-21T07:20:23.707", + "lastModified": "2025-04-25T15:15:32.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-407xx/CVE-2022-40799.json b/CVE-2022/CVE-2022-407xx/CVE-2022-40799.json index b03135d7ee7..e1a3a6dbe56 100644 --- a/CVE-2022/CVE-2022-407xx/CVE-2022-40799.json +++ b/CVE-2022/CVE-2022-407xx/CVE-2022-40799.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40799", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T05:15:11.310", - "lastModified": "2024-11-21T07:22:03.697", + "lastModified": "2025-04-25T15:15:32.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-494" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-424xx/CVE-2022-42445.json b/CVE-2022/CVE-2022-424xx/CVE-2022-42445.json index 8bbc3301719..189c47e9dbc 100644 --- a/CVE-2022/CVE-2022-424xx/CVE-2022-42445.json +++ b/CVE-2022/CVE-2022-424xx/CVE-2022-42445.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42445", "sourceIdentifier": "psirt@hcl.com", "published": "2022-12-12T13:15:14.737", - "lastModified": "2024-11-21T07:24:58.893", + "lastModified": "2025-04-25T15:15:32.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-440xx/CVE-2022-44096.json b/CVE-2022/CVE-2022-440xx/CVE-2022-44096.json index 1594946c6d6..d70a85ab6bd 100644 --- a/CVE-2022/CVE-2022-440xx/CVE-2022-44096.json +++ b/CVE-2022/CVE-2022-440xx/CVE-2022-44096.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44096", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-30T05:15:11.187", - "lastModified": "2024-11-21T07:27:38.020", + "lastModified": "2025-04-25T15:15:32.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44355.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44355.json index cafd1391a13..4a23d5b51e9 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44355.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44355.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44355", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T17:15:11.257", - "lastModified": "2024-11-21T07:27:54.787", + "lastModified": "2025-04-25T15:15:32.987", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44356.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44356.json index 170053aa5f6..db9812c814e 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44356.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44356.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44356", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T17:15:11.313", - "lastModified": "2024-11-21T07:27:54.923", + "lastModified": "2025-04-25T15:15:33.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-552" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44635.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44635.json index 555978dfb5f..cde86844a41 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44635.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44635.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44635", "sourceIdentifier": "security@apache.org", "published": "2022-11-29T15:15:10.897", - "lastModified": "2024-11-21T07:28:14.380", + "lastModified": "2025-04-25T15:15:33.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-452xx/CVE-2022-45202.json b/CVE-2022/CVE-2022-452xx/CVE-2022-45202.json index cc7c448def0..f90596f0e06 100644 --- a/CVE-2022/CVE-2022-452xx/CVE-2022-45202.json +++ b/CVE-2022/CVE-2022-452xx/CVE-2022-45202.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45202", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T04:15:11.207", - "lastModified": "2024-11-21T07:28:57.310", + "lastModified": "2025-04-25T15:15:33.627", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-452xx/CVE-2022-45204.json b/CVE-2022/CVE-2022-452xx/CVE-2022-45204.json index a69cd8fa3f0..0a64e42ded2 100644 --- a/CVE-2022/CVE-2022-452xx/CVE-2022-45204.json +++ b/CVE-2022/CVE-2022-452xx/CVE-2022-45204.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45204", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T04:15:11.253", - "lastModified": "2024-11-21T07:28:57.453", + "lastModified": "2025-04-25T15:15:33.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45301.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45301.json index 51882571883..264b3ec762a 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45301.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45301.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45301", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T02:15:08.893", - "lastModified": "2024-11-21T07:29:01.920", + "lastModified": "2025-04-25T15:15:33.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45304.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45304.json index 692e508fb6d..0214b83cebb 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45304.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45304.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45304", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T02:15:09.000", - "lastModified": "2024-11-21T07:29:02.067", + "lastModified": "2025-04-25T15:15:34.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45305.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45305.json index 3b960df87e0..199dd71d5db 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45305.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45305.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45305", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T02:15:09.067", - "lastModified": "2024-11-21T07:29:02.210", + "lastModified": "2025-04-25T15:15:34.287", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45306.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45306.json index 86acb642c2e..592174321ec 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45306.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45306.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45306", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T02:15:09.117", - "lastModified": "2024-11-21T07:29:02.360", + "lastModified": "2025-04-25T15:15:34.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45307.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45307.json index c6b174b15bd..942a30743be 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45307.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45307.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45307", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T02:15:09.167", - "lastModified": "2024-11-21T07:29:02.500", + "lastModified": "2025-04-25T15:15:34.593", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json index 916409d9111..b228f2b524a 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0406.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0406", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-06T17:15:07.127", - "lastModified": "2025-03-11T04:15:22.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-25T15:02:44.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,26 +71,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mholt:archiver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "4.0.0", + "matchCriteriaId": "A9611164-4F5F-4D75-8E6B-40C77B622481" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F0FD736A-8730-446A-BA3A-7B608DB62B0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.18", + "versionEndExcluding": "4.18.4", + "matchCriteriaId": "9865460D-A462-4F64-BD67-434E59AF36AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/errata/RHSA-2025:2449", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0406", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257749", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0406", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257749", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3203.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3203.json index 689810ce17b..cb55410afcf 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3203.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3203.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3203", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T22:15:10.320", - "lastModified": "2024-11-21T09:29:08.600", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-25T14:45:29.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,46 +96,100 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blosc:c-blosc2:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.13.2", + "matchCriteriaId": "3560FC02-24C1-498F-AA85-9EEF17F86841" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.259050", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259050", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304556", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "VDB Entry" + ] }, { "url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.259050", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259050", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304556", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3204.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3204.json index d2dc995efdc..6bc2640180a 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3204.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3204.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3204", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T22:15:11.040", - "lastModified": "2024-11-21T09:29:08.737", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-25T14:45:32.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,46 +96,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blosc:c-blosc2:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.13.2", + "matchCriteriaId": "3560FC02-24C1-498F-AA85-9EEF17F86841" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.259051", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259051", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304557", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://drive.google.com/drive/folders/1T1k3UeS09m65LjVXExUuZfedNQPWQWCo?usp=sharing", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Blosc/c-blosc2/releases/tag/v2.14.3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.259051", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259051", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304557", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3207.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3207.json index 26464726150..5de1f6b2968 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3207.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3207.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3207", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T23:15:54.853", - "lastModified": "2024-11-21T09:29:08.997", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-25T14:38:36.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,86 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ermig1979:simd:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.0.134", + "matchCriteriaId": "572340A7-7144-4B19-9E20-26A458BE41A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/drive/folders/1z0JBsZ-QR3RsuAf-uyit_ZGXCh0rEvFq?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259054", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259054", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304572", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry", + "Exploit" + ] }, { "url": "https://drive.google.com/drive/folders/1z0JBsZ-QR3RsuAf-uyit_ZGXCh0rEvFq?usp=sharing", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259054", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259054", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304572", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3209.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3209.json index 14be57644ff..11ef53fdb0c 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3209.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3209.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3209", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T23:15:55.083", - "lastModified": "2024-11-21T09:29:09.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-25T14:33:54.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,62 +96,161 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:upx:upx:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.2.2", + "matchCriteriaId": "FA0C3D96-C5B7-4783-B8F5-895E304ECA7C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/drive/folders/1qlUXvycOzGJygfkdQB9dGO6VwNRRZoih?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AE5OZ7YUEVLXVVS6PFP5RELVICQ4K6QK/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4DNK3AFPT4KIPTBKGCJ6FC3L7AWI2TN/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHWZN2NX5W3WYA6ACJ746PAZXXNZETKD/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259055", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259055", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304575", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Exploit" + ] }, { "url": "https://drive.google.com/drive/folders/1qlUXvycOzGJygfkdQB9dGO6VwNRRZoih?usp=sharing", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AE5OZ7YUEVLXVVS6PFP5RELVICQ4K6QK/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4DNK3AFPT4KIPTBKGCJ6FC3L7AWI2TN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHWZN2NX5W3WYA6ACJ746PAZXXNZETKD/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259055", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259055", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304575", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3227.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3227.json index b516b00bb3e..da64047fa89 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3227.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3227.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3227", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-03T03:15:11.457", - "lastModified": "2025-04-25T13:52:04.237", + "lastModified": "2025-04-25T14:23:04.283", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -115,9 +115,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:weaver:e-office_oa:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:weaver:e-office:*:*:*:*:*:*:*:*", "versionEndIncluding": "9.5", - "matchCriteriaId": "5BC57384-9952-4FD7-9E44-66307841C357" + "matchCriteriaId": "76FD9B2D-EEEE-4C55-9C33-237C662202F9" } ] } diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49672.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49672.json index fe4fff3b03d..12e99988a3e 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49672.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49672.json @@ -2,7 +2,7 @@ "id": "CVE-2024-49672", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-29T11:15:04.223", - "lastModified": "2024-11-08T15:16:00.327", + "lastModified": "2025-04-25T14:02:39.477", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:google_docs_rsvp_project:google_docs_rsvp:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:gief:google_docs_rsvp:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.0.1", - "matchCriteriaId": "E98DC42A-2BE2-4029-A27A-1ECE5C82A1E3" + "matchCriteriaId": "B96653A9-2F50-4203-8058-EDFD5F141C43" } ] } diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50086.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50086.json index 53ff35340a4..adf1b499f45 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50086.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50086.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50086", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:05.487", - "lastModified": "2024-11-08T16:15:46.247", + "lastModified": "2025-04-25T15:15:34.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57375.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57375.json new file mode 100644 index 00000000000..17915178372 --- /dev/null +++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57375.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-57375", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-25T14:15:20.567", + "lastModified": "2025-04-25T14:15:20.567", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Andamiro Pump It Up 20th Anniversary (aka Double X or XX/2019) 1.00.0-2.08.3 allows a physically proximate attacker to cause a denial of service (application crash) via certain deselect actions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.youtube.com/watch?v=DXrnQpTlQs0", + "source": "cve@mitre.org" + }, + { + "url": "https://xx.piugame.com/bbs/board.php?bo_table=global_notice&wr_id=368", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-220xx/CVE-2025-22097.json b/CVE-2025/CVE-2025-220xx/CVE-2025-22097.json index af486e4c4b8..2d5ace66c88 100644 --- a/CVE-2025/CVE-2025-220xx/CVE-2025-22097.json +++ b/CVE-2025/CVE-2025-220xx/CVE-2025-22097.json @@ -2,16 +2,55 @@ "id": "CVE-2025-22097", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-16T15:16:04.080", - "lastModified": "2025-04-17T20:22:16.240", + "lastModified": "2025-04-25T15:15:35.647", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vkms: Fix use after free and double free on init error\n\nIf the driver initialization fails, the vkms_exit() function might\naccess an uninitialized or freed default_config pointer and it might\ndouble free it.\n\nFix both possible errors by initializing default_config only when the\ndriver initialization succeeded." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vkms: Se corrige el error \"use after free\" y \"double free on init\". Si falla la inicializaci\u00f3n del controlador, la funci\u00f3n \"vkms_exit()\" podr\u00eda acceder a un puntero \"default_config\" no inicializado o liberado y liberarlo dos veces. Se corrigen ambos posibles errores inicializando \"default_config\" solo cuando la inicializaci\u00f3n del controlador se haya realizado correctamente." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1f68f1cf09d06061eb549726ff8339e064eddebd", diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27370.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27370.json index 00c4b318777..e4614881517 100644 --- a/CVE-2025/CVE-2025-273xx/CVE-2025-27370.json +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27370.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27370", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T18:15:40.650", - "lastModified": "2025-03-07T17:15:22.083", + "lastModified": "2025-04-25T15:15:35.820", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://eprint.iacr.org/2025/629", + "source": "cve@mitre.org" + }, { "url": "https://github.com/OWASP/ASVS/issues/2678", "source": "cve@mitre.org" diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27371.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27371.json index 8e22a0002bd..f4e419f176d 100644 --- a/CVE-2025/CVE-2025-273xx/CVE-2025-27371.json +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27371.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27371", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-03T18:15:40.850", - "lastModified": "2025-03-07T17:15:22.190", + "lastModified": "2025-04-25T15:15:35.937", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://eprint.iacr.org/2025/629", + "source": "cve@mitre.org" + }, { "url": "https://github.com/OWASP/ASVS/issues/2678", "source": "cve@mitre.org" diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28076.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28076.json new file mode 100644 index 00000000000..9edd7a9f0fc --- /dev/null +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28076.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-28076", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-25T15:15:36.057", + "lastModified": "2025-04-25T15:15:36.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple SQL injection vulnerabilities in EasyVirt DCScope <= 8.6.4 and CO2Scope <= 1.3.4 allows remote authenticated attackers to execute arbitrary SQL commands via the (1) timeago, (2) user, (3) filter, (4) target, (5) p1, (6) p2, (7) p3, (8) p4, (9) p5, (10) p6, (11) p7, (12) p8, (13) p9, (14) p10, (15) p11, (16) p12, (17) p13, (18) p14, (19) p15, (20) p16, (21) p17, (22) p18, (23) p19, or (24) p20 parameter to /api/management/updateihmsettings; the (25) ID, (26) NAME, (27) CPUTHREADNB, (28) RAMCAP, or (29) DISKCAP parameter to /api/capaplan/savetemplates." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2025-28076.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.easyvirt.com/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28354.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28354.json new file mode 100644 index 00000000000..9bc9ccf95bd --- /dev/null +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28354.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-28354", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-25T14:15:21.560", + "lastModified": "2025-04-25T14:15:21.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the Printer Manager Systm of Entrust Corp Printer Manager D3.18.4-3 and below allows attackers to execute a directory traversal via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/VAMorales/ef13d4edc14750f689e16c9e4922becb", + "source": "cve@mitre.org" + }, + { + "url": "https://www.entrust.com/sites/default/files/documentation/productsupport/entrust-security-bulletin-e25-002.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32044.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32044.json new file mode 100644 index 00000000000..6f41e44b5cd --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32044.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32044", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:36.170", + "lastModified": "2025-04-25T15:15:36.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw has been identified in Moodle where, on certain sites, unauthenticated users could retrieve sensitive user data\u2014including names, contact information, and hashed passwords\u2014via stack traces returned by specific API calls. Sites with PHP configured with zend.exception_ignore_args = 1 in the php.ini file are not affected by this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-32044", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356829", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32045.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32045.json new file mode 100644 index 00000000000..ab4a3a25567 --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32045.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32045", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:36.307", + "lastModified": "2025-04-25T15:15:36.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw has been identified in Moodle where insufficient capability checks in certain grade reports allowed users without the necessary permissions to access hidden grades." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-32045", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2356835", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32432.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32432.json new file mode 100644 index 00000000000..dc284cfac70 --- /dev/null +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32432.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-32432", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-25T15:15:36.440", + "lastModified": "2025-04-25T15:15:36.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additional fix for CVE-2023-41892." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/craftcms/cms/blob/3.x/CHANGELOG.md#3915---2025-04-10-critical", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/craftcms/cms/blob/4.x/CHANGELOG.md#41415---2025-04-10-critical", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/craftcms/cms/blob/5.x/CHANGELOG.md#5617---2025-04-10-critical", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/craftcms/cms/commit/e1c85441fa47eeb7c688c2053f25419bc0547b47", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/craftcms/cms/security/advisories/GHSA-f3gw-9ww9-jmc3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3551.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3551.json index 5fa68340c7e..0eb5e4e085c 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3551.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3551.json @@ -2,13 +2,20 @@ "id": "CVE-2025-3551", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-14T05:15:15.330", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-25T14:15:22.650", "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in Lingxing ERP 2 and classified as critical. Affected by this issue is the function DoUpload of the file /Api/FileUpload.ashx?method=DoUpload. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability was found in Lingxing ERP 2 and classified as critical. Affected by this issue is the function DoUpload of the file /Api/FileUpload.ashx?method=DoUpload. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment." }, { "lang": "es", @@ -63,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -111,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-35xx/CVE-2025-3552.json b/CVE-2025/CVE-2025-35xx/CVE-2025-3552.json index 8dc75de73f1..c0c644b925c 100644 --- a/CVE-2025/CVE-2025-35xx/CVE-2025-3552.json +++ b/CVE-2025/CVE-2025-35xx/CVE-2025-3552.json @@ -2,13 +2,20 @@ "id": "CVE-2025-3552", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-14T06:15:16.440", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-25T14:15:22.790", "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in Lingxing ERP 2. It has been classified as critical. This affects an unknown part of the file /Api/TinyMce/UploadAjax.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability was found in Lingxing ERP 2. It has been classified as critical. This affects an unknown part of the file /Api/TinyMce/UploadAjax.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment." }, { "lang": "es", @@ -63,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -111,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3625.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3625.json new file mode 100644 index 00000000000..fe62e42e433 --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3625.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3625", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:36.753", + "lastModified": "2025-04-25T15:15:36.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security vulnerability was discovered in Moodle that can allow hackers to gain access to sensitive information about students and prevent them from logging into their accounts, even after they had completed two-factor authentication (2FA)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3625", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359690", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3627.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3627.json new file mode 100644 index 00000000000..b7aa758502a --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3627.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3627", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:36.927", + "lastModified": "2025-04-25T15:15:36.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security vulnerability was discovered in Moodle that allows some users to access sensitive information about other students before they finish verifying their identities using two-factor authentication (2FA)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3627", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359692", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3628.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3628.json new file mode 100644 index 00000000000..8caf482bb65 --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3628.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3628", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:37.057", + "lastModified": "2025-04-25T15:15:37.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw has was found in Moodle where anonymous assignment submissions can be de-anonymized via search, revealing student identities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3628", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359706", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3634.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3634.json new file mode 100644 index 00000000000..553097f69b2 --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3634.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3634", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T14:15:22.917", + "lastModified": "2025-04-25T14:15:22.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security vulnerability was discovered in Moodle that allows students to enroll themselves in courses without completing all the necessary safety checks. Specifically, users can sign up for courses prematurely, even if they haven't finished two-step verification processes." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3634", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359707", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3635.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3635.json new file mode 100644 index 00000000000..22d764d78e5 --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3635.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-3635", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:37.230", + "lastModified": "2025-04-25T15:15:37.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security vulnerability was discovered in Moodle that allows anyone to duplicate existing tours without needing to log in due to a lack of protection against cross-site request forgery (CSRF) attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3635", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359709", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3636.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3636.json new file mode 100644 index 00000000000..011a7ce550f --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3636.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-3636", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:37.363", + "lastModified": "2025-04-25T15:15:37.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Moodle. This vulnerability allows unauthorized users to access and view RSS feeds due to insufficient capability checks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84499", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3636", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359726", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3637.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3637.json new file mode 100644 index 00000000000..a3c6b034230 --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3637.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-3637", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:37.510", + "lastModified": "2025-04-25T15:15:37.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security vulnerability was found in Moodle where confidential information that prevents cross-site request forgery (CSRF) attacks was shared publicly through the site's URL. This vulnerability occurred specifically on two types of pages within the mod_data module: edit and delete pages." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-598" + } + ] + } + ], + "references": [ + { + "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-65356", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3637", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359727", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3638.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3638.json new file mode 100644 index 00000000000..4dd55413650 --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3638.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2025-3638", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:37.640", + "lastModified": "2025-04-25T15:15:37.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Moodle. The analysis request action in the Brickfield tool did not include the necessary token to prevent a Cross-site request forgery (CSRF) risk." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3638", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359732", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=467600", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3640.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3640.json new file mode 100644 index 00000000000..fa5d4f8bafb --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3640.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-3640", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:37.757", + "lastModified": "2025-04-25T15:15:37.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Moodle. Insufficient capability checks made it possible for a user enrolled in a course to access some details, such as the full name and profile image URL, of other users they did not have permission to access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3640", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359734", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=467601", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3641.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3641.json new file mode 100644 index 00000000000..e5017c3baae --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3641.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-3641", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:37.887", + "lastModified": "2025-04-25T15:15:37.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default, this was only available to teachers and managers on sites with the Dropbox repository enabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3641", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359735", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=467602", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3642.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3642.json new file mode 100644 index 00000000000..374e9a1140d --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3642.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-3642", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:38.013", + "lastModified": "2025-04-25T15:15:38.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default, this was only available to teachers and managers on sites with the EQUELLA repository enabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3642", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359738", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=467603", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3643.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3643.json new file mode 100644 index 00000000000..e378882b832 --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3643.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-3643", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:38.147", + "lastModified": "2025-04-25T15:15:38.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Moodle. The return URL in the policy tool required additional sanitizing to prevent a reflected Cross-site scripting (XSS) risk." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3643", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359742", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=467604", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3644.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3644.json new file mode 100644 index 00000000000..a47abcc77ef --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3644.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-3644", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:38.280", + "lastModified": "2025-04-25T15:15:38.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Moodle. Additional checks were required to prevent users from deleting course sections they did not have permission to modify." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3644", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359745", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=467605", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3645.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3645.json new file mode 100644 index 00000000000..276fc2d7e37 --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3645.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-3645", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:38.410", + "lastModified": "2025-04-25T15:15:38.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in Moodle. Insufficient capability checks in a messaging web service allowed users to view other users' names and online statuses." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3645", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359761", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=467606", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3647.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3647.json new file mode 100644 index 00000000000..e81652ff436 --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3647.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-3647", + "sourceIdentifier": "patrick@puiterwijk.org", + "published": "2025-04-25T15:15:38.550", + "lastModified": "2025-04-25T15:15:38.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was discovered in Moodle. Additional checks were required to ensure that users can only access cohort data they are authorized to retrieve." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "patrick@puiterwijk.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2025-3647", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359762", + "source": "patrick@puiterwijk.org" + }, + { + "url": "https://moodle.org/mod/forum/discuss.php?d=467607", + "source": "patrick@puiterwijk.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-370xx/CVE-2025-37088.json b/CVE-2025/CVE-2025-370xx/CVE-2025-37088.json index 3c3e9f13bb6..164dbf35a9c 100644 --- a/CVE-2025/CVE-2025-370xx/CVE-2025-37088.json +++ b/CVE-2025/CVE-2025-370xx/CVE-2025-37088.json @@ -2,7 +2,7 @@ "id": "CVE-2025-37088", "sourceIdentifier": "security-alert@hpe.com", "published": "2025-04-22T22:15:17.450", - "lastModified": "2025-04-23T14:15:29.307", + "lastModified": "2025-04-25T15:15:36.593", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", + "integrityImpact": "HIGH", "availabilityImpact": "NONE" }, - "exploitabilityScore": 3.9, - "impactScore": 3.6 + "exploitabilityScore": 1.6, + "impactScore": 5.2 } ] }, @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-862" + "value": "CWE-362" } ] } diff --git a/CVE-2025/CVE-2025-430xx/CVE-2025-43016.json b/CVE-2025/CVE-2025-430xx/CVE-2025-43016.json new file mode 100644 index 00000000000..aa025d7207b --- /dev/null +++ b/CVE-2025/CVE-2025-430xx/CVE-2025-43016.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-43016", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-04-25T15:15:39.260", + "lastModified": "2025-04-25T15:15:39.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains Rider before 2025.1.2 custom archive unpacker allowed arbitrary file overwrite during remote debug session" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-438xx/CVE-2025-43862.json b/CVE-2025/CVE-2025-438xx/CVE-2025-43862.json new file mode 100644 index 00000000000..fca7039a2a4 --- /dev/null +++ b/CVE-2025/CVE-2025-438xx/CVE-2025-43862.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-43862", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-25T15:15:39.920", + "lastModified": "2025-04-25T15:15:39.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dify is an open-source LLM app development platform. Prior to version 0.6.12, a normal user is able to access and modify APP orchestration, even though the web UI of APP orchestration is not presented for a normal user. This access control flaw allows non-admin users to make unauthorized access and changes on the APPSs. This issue has been patched in version 0.6.12. A workaround for this vulnerability involves updating the the access control mechanisms to enforce stricter user role permissions and implementing role-based access controls (RBAC) to ensure that only users with admin privileges can access Orchestration of the APPs." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/langgenius/dify/pull/5266", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/langgenius/dify/security/advisories/GHSA-6pw4-jqhv-3626", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43946.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43946.json index dfd6b11353e..d9fb362e782 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43946.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43946.json @@ -2,7 +2,7 @@ "id": "CVE-2025-43946", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-22T18:16:01.047", - "lastModified": "2025-04-23T14:15:29.630", + "lastModified": "2025-04-25T15:15:40.050", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-434" } ] } diff --git a/CVE-2025/CVE-2025-464xx/CVE-2025-46432.json b/CVE-2025/CVE-2025-464xx/CVE-2025-46432.json new file mode 100644 index 00000000000..a722668963a --- /dev/null +++ b/CVE-2025/CVE-2025-464xx/CVE-2025-46432.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-46432", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-04-25T15:15:40.347", + "lastModified": "2025-04-25T15:15:40.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2025.03.1 base64-encoded credentials could be exposed in build logs" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-464xx/CVE-2025-46433.json b/CVE-2025/CVE-2025-464xx/CVE-2025-46433.json new file mode 100644 index 00000000000..44edbd9787d --- /dev/null +++ b/CVE-2025/CVE-2025-464xx/CVE-2025-46433.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-46433", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-04-25T15:15:40.480", + "lastModified": "2025-04-25T15:15:40.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2025.03.1 improper path validation in loggingPreset parameter was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46618.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46618.json new file mode 100644 index 00000000000..a2d798f9616 --- /dev/null +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46618.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-46618", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2025-04-25T15:15:40.957", + "lastModified": "2025-04-25T15:15:40.957", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2025.03.1 stored XSS was possible on Data Directory tab" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d9a6862c7f3..d48939ac33f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-25T14:00:19.709220+00:00 +2025-04-25T16:00:20.371169+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-25T13:52:04.237000+00:00 +2025-04-25T15:15:40.957000+00:00 ``` ### Last Data Feed Release @@ -33,26 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -291421 +291447 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `26` -- [CVE-2024-11917](CVE-2024/CVE-2024-119xx/CVE-2024-11917.json) (`2025-04-25T12:15:16.013`) -- [CVE-2024-6198](CVE-2024/CVE-2024-61xx/CVE-2024-6198.json) (`2025-04-25T13:15:42.370`) -- [CVE-2024-6199](CVE-2024/CVE-2024-61xx/CVE-2024-6199.json) (`2025-04-25T13:15:43.510`) -- [CVE-2025-2470](CVE-2025/CVE-2025-24xx/CVE-2025-2470.json) (`2025-04-25T12:15:16.903`) -- [CVE-2025-2986](CVE-2025/CVE-2025-29xx/CVE-2025-2986.json) (`2025-04-25T12:15:17.083`) -- [CVE-2025-3912](CVE-2025/CVE-2025-39xx/CVE-2025-3912.json) (`2025-04-25T12:15:17.243`) +- [CVE-2025-28076](CVE-2025/CVE-2025-280xx/CVE-2025-28076.json) (`2025-04-25T15:15:36.057`) +- [CVE-2025-28354](CVE-2025/CVE-2025-283xx/CVE-2025-28354.json) (`2025-04-25T14:15:21.560`) +- [CVE-2025-32044](CVE-2025/CVE-2025-320xx/CVE-2025-32044.json) (`2025-04-25T15:15:36.170`) +- [CVE-2025-32045](CVE-2025/CVE-2025-320xx/CVE-2025-32045.json) (`2025-04-25T15:15:36.307`) +- [CVE-2025-32432](CVE-2025/CVE-2025-324xx/CVE-2025-32432.json) (`2025-04-25T15:15:36.440`) +- [CVE-2025-3625](CVE-2025/CVE-2025-36xx/CVE-2025-3625.json) (`2025-04-25T15:15:36.753`) +- [CVE-2025-3627](CVE-2025/CVE-2025-36xx/CVE-2025-3627.json) (`2025-04-25T15:15:36.927`) +- [CVE-2025-3628](CVE-2025/CVE-2025-36xx/CVE-2025-3628.json) (`2025-04-25T15:15:37.057`) +- [CVE-2025-3634](CVE-2025/CVE-2025-36xx/CVE-2025-3634.json) (`2025-04-25T14:15:22.917`) +- [CVE-2025-3635](CVE-2025/CVE-2025-36xx/CVE-2025-3635.json) (`2025-04-25T15:15:37.230`) +- [CVE-2025-3636](CVE-2025/CVE-2025-36xx/CVE-2025-3636.json) (`2025-04-25T15:15:37.363`) +- [CVE-2025-3637](CVE-2025/CVE-2025-36xx/CVE-2025-3637.json) (`2025-04-25T15:15:37.510`) +- [CVE-2025-3638](CVE-2025/CVE-2025-36xx/CVE-2025-3638.json) (`2025-04-25T15:15:37.640`) +- [CVE-2025-3640](CVE-2025/CVE-2025-36xx/CVE-2025-3640.json) (`2025-04-25T15:15:37.757`) +- [CVE-2025-3641](CVE-2025/CVE-2025-36xx/CVE-2025-3641.json) (`2025-04-25T15:15:37.887`) +- [CVE-2025-3642](CVE-2025/CVE-2025-36xx/CVE-2025-3642.json) (`2025-04-25T15:15:38.013`) +- [CVE-2025-3643](CVE-2025/CVE-2025-36xx/CVE-2025-3643.json) (`2025-04-25T15:15:38.147`) +- [CVE-2025-3644](CVE-2025/CVE-2025-36xx/CVE-2025-3644.json) (`2025-04-25T15:15:38.280`) +- [CVE-2025-3645](CVE-2025/CVE-2025-36xx/CVE-2025-3645.json) (`2025-04-25T15:15:38.410`) +- [CVE-2025-3647](CVE-2025/CVE-2025-36xx/CVE-2025-3647.json) (`2025-04-25T15:15:38.550`) +- [CVE-2025-43016](CVE-2025/CVE-2025-430xx/CVE-2025-43016.json) (`2025-04-25T15:15:39.260`) +- [CVE-2025-43862](CVE-2025/CVE-2025-438xx/CVE-2025-43862.json) (`2025-04-25T15:15:39.920`) +- [CVE-2025-46432](CVE-2025/CVE-2025-464xx/CVE-2025-46432.json) (`2025-04-25T15:15:40.347`) +- [CVE-2025-46433](CVE-2025/CVE-2025-464xx/CVE-2025-46433.json) (`2025-04-25T15:15:40.480`) +- [CVE-2025-46618](CVE-2025/CVE-2025-466xx/CVE-2025-46618.json) (`2025-04-25T15:15:40.957`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `43` -- [CVE-2024-3227](CVE-2024/CVE-2024-32xx/CVE-2024-3227.json) (`2025-04-25T13:52:04.237`) +- [CVE-2022-44355](CVE-2022/CVE-2022-443xx/CVE-2022-44355.json) (`2025-04-25T15:15:32.987`) +- [CVE-2022-44356](CVE-2022/CVE-2022-443xx/CVE-2022-44356.json) (`2025-04-25T15:15:33.157`) +- [CVE-2022-44635](CVE-2022/CVE-2022-446xx/CVE-2022-44635.json) (`2025-04-25T15:15:33.310`) +- [CVE-2022-45202](CVE-2022/CVE-2022-452xx/CVE-2022-45202.json) (`2025-04-25T15:15:33.627`) +- [CVE-2022-45204](CVE-2022/CVE-2022-452xx/CVE-2022-45204.json) (`2025-04-25T15:15:33.810`) +- [CVE-2022-45301](CVE-2022/CVE-2022-453xx/CVE-2022-45301.json) (`2025-04-25T15:15:33.970`) +- [CVE-2022-45304](CVE-2022/CVE-2022-453xx/CVE-2022-45304.json) (`2025-04-25T15:15:34.133`) +- [CVE-2022-45305](CVE-2022/CVE-2022-453xx/CVE-2022-45305.json) (`2025-04-25T15:15:34.287`) +- [CVE-2022-45306](CVE-2022/CVE-2022-453xx/CVE-2022-45306.json) (`2025-04-25T15:15:34.437`) +- [CVE-2022-45307](CVE-2022/CVE-2022-453xx/CVE-2022-45307.json) (`2025-04-25T15:15:34.593`) +- [CVE-2024-0406](CVE-2024/CVE-2024-04xx/CVE-2024-0406.json) (`2025-04-25T15:02:44.233`) +- [CVE-2024-3203](CVE-2024/CVE-2024-32xx/CVE-2024-3203.json) (`2025-04-25T14:45:29.780`) +- [CVE-2024-3204](CVE-2024/CVE-2024-32xx/CVE-2024-3204.json) (`2025-04-25T14:45:32.610`) +- [CVE-2024-3207](CVE-2024/CVE-2024-32xx/CVE-2024-3207.json) (`2025-04-25T14:38:36.010`) +- [CVE-2024-3209](CVE-2024/CVE-2024-32xx/CVE-2024-3209.json) (`2025-04-25T14:33:54.060`) +- [CVE-2024-3227](CVE-2024/CVE-2024-32xx/CVE-2024-3227.json) (`2025-04-25T14:23:04.283`) +- [CVE-2024-49672](CVE-2024/CVE-2024-496xx/CVE-2024-49672.json) (`2025-04-25T14:02:39.477`) +- [CVE-2024-50086](CVE-2024/CVE-2024-500xx/CVE-2024-50086.json) (`2025-04-25T15:15:34.760`) +- [CVE-2025-22097](CVE-2025/CVE-2025-220xx/CVE-2025-22097.json) (`2025-04-25T15:15:35.647`) +- [CVE-2025-27370](CVE-2025/CVE-2025-273xx/CVE-2025-27370.json) (`2025-04-25T15:15:35.820`) +- [CVE-2025-27371](CVE-2025/CVE-2025-273xx/CVE-2025-27371.json) (`2025-04-25T15:15:35.937`) +- [CVE-2025-3551](CVE-2025/CVE-2025-35xx/CVE-2025-3551.json) (`2025-04-25T14:15:22.650`) +- [CVE-2025-3552](CVE-2025/CVE-2025-35xx/CVE-2025-3552.json) (`2025-04-25T14:15:22.790`) +- [CVE-2025-37088](CVE-2025/CVE-2025-370xx/CVE-2025-37088.json) (`2025-04-25T15:15:36.593`) +- [CVE-2025-43946](CVE-2025/CVE-2025-439xx/CVE-2025-43946.json) (`2025-04-25T15:15:40.050`) ## Download and Usage diff --git a/_state.csv b/_state.csv index aab9f0f376a..f70c0b3a6e9 100644 --- a/_state.csv +++ b/_state.csv @@ -153082,7 +153082,7 @@ CVE-2020-21180,0,0,303ba4cbecfd577c8675128e37d8369c2ef084f2e95b4f38c917bf9577050 CVE-2020-2119,0,0,ab060a15a5ea329e5da59d88d50505d7abca6bf7da2c7711a7b026b4ca2cf16a,2024-11-21T05:24:42.170000 CVE-2020-2120,0,0,0ed3332ba34424a03d6bf0bd23243d91d417fe01d3e7aa0e73b8fc1f6fec9721,2024-11-21T05:24:42.327000 CVE-2020-2121,0,0,5b52e309153039b54df2681a5d68ace094c0ecb4930523dc6c2c5375c4bfd739,2024-11-21T05:24:42.507000 -CVE-2020-21219,0,0,b1db0c5c350ba9e0b88f93000750d5787fafa84c443ce763436ac6e8eafd17e6,2024-11-21T05:12:29.127000 +CVE-2020-21219,0,1,c26edcbc610785b5c7d2f7827e3af5d01ec065e2c0dea271ba950cc2a12f9494,2025-04-25T15:15:29.040000 CVE-2020-2122,0,0,20fd5a5dd80fc14c6a66e78b31887aa53c5353426d77663c697f5ac93e0e7305,2024-11-21T05:24:42.673000 CVE-2020-21224,0,0,b89d14e5bc81a9de9b42af1aa7ba12da43c5794dd5026ccdf20368f17b6b3b9f,2024-11-21T05:12:29.270000 CVE-2020-21228,0,0,8f37cb9765b2a69b500100a069a506a05cb5e33a7271b47955f712502f1c7a42,2024-11-21T05:12:29.417000 @@ -171260,7 +171260,7 @@ CVE-2021-25055,0,0,7236064c94889148c41f806496f068d537c251ade137c74cd47e25f2e0f59 CVE-2021-25056,0,0,8ad03739eec0a143e533f36240327d2cf23d6c15360a725dded330c41efe38d9,2024-11-21T05:54:16.047000 CVE-2021-25057,0,0,2f295c3d84349c3531c30c01f3294ee6299f127457871f1d2f4ac91888a0d97d,2024-11-21T05:54:16.153000 CVE-2021-25058,0,0,a66b2e60f36a18044d483775c5e6e4538c5824d490ab11bcb6b35853656294c7,2024-11-21T05:54:16.260000 -CVE-2021-25059,0,0,bd4349a3c42f8814e760f2ca208a3169b2a07a3813c738bb9f001d2413ad6604,2024-11-21T05:54:16.363000 +CVE-2021-25059,0,1,b7f20c28d7a99aab7de9377815c4827d27691bec552bb4df740537b835ffd0c8,2025-04-25T15:15:29.763000 CVE-2021-25060,0,0,1139c273a9f2053f20d9f39643e00a266f5fafb7e0d9c382d9a15a74cbe20cdd,2024-11-21T05:54:16.490000 CVE-2021-25061,0,0,ea167eb147c4ab2edf7a9cf81474e723d481bf2edadbf7d639057aaa127b2325,2024-11-21T05:54:16.603000 CVE-2021-25062,0,0,c2de70bf7522f29e404269e2e3e7ef40a96ab54e22b01a873b08c11fcb52ff2e,2024-11-21T05:54:16.717000 @@ -176028,7 +176028,7 @@ CVE-2021-31731,0,0,2f09d3b0d20e294ef90277d66e935d0af27787f253ac13262c3ed4c0069c6 CVE-2021-31737,0,0,9d6a00a25dcfc223ba92bc36cc2e636c5f5ff5f625e5e56a5563622b736c4f08,2024-11-21T06:06:09.910000 CVE-2021-31738,0,0,cd05c4eef13cc84abd8ec7d9e3f7add5c58901b74366c55cf683354f951a37b4,2024-11-21T06:06:10.057000 CVE-2021-31739,0,0,fd5957d55dee3e4c4277a1fbd302efdfe6452802cd60ce5d19dde82d7ba3e619,2024-11-21T06:06:10.203000 -CVE-2021-31740,0,0,748309ac83594d96604284429d30e1da0c13096e8f09b18e3897344882a2edd6,2024-11-21T06:06:10.357000 +CVE-2021-31740,0,1,9fdf572984911e8ea7863ec8e2243a58805bf91fcdce3ed8758fff7b2fe46e21,2025-04-25T15:15:29.940000 CVE-2021-31745,0,0,ccd6bf0b8dc2c7292fa396fdab7855ad739ad2accf80a627909d4b5fc7efdd3e,2024-11-21T06:06:10.513000 CVE-2021-31746,0,0,13539c2f305ff92a6fbe864dae208d7192ec64f2a701b4b440f10140e2dc8536,2024-11-21T06:06:10.660000 CVE-2021-31747,0,0,8d589c7b437eea27faf0f53fedca0207bf4f7e05e6676735177b93d37debf9c1,2024-11-21T06:06:10.800000 @@ -192720,7 +192720,7 @@ CVE-2022-2298,0,0,a95805a0a13658fd0a16985348f5c1a2403dbffca9a2a7d0263cf2cb18be2d CVE-2022-22980,0,0,a994ec342d04ccad8dc633e7800d805763ac26bc27074e2f7248cc3ebd2e9509,2024-11-21T06:47:44.063000 CVE-2022-22982,0,0,7eb2b4877890c6c001a50bc755814c842ccf4384bed6f4821a32240102fd7eb7,2024-11-21T06:47:44.170000 CVE-2022-22983,0,0,8f4ede69b42a51b80c795d220aebdc7113cd7125c2950869e3be07023cdc09f4,2024-11-21T06:47:44.300000 -CVE-2022-22984,0,0,f799ce061ca9e74509ab3a0e212c5d194added7b3a3f7fae2182ddad3b17deb4,2024-11-21T06:47:44.417000 +CVE-2022-22984,0,1,12b0c25f41a810867b000d1817b01a50255dbab1b0d6b1e35f53986799a4e331,2025-04-25T15:15:30.193000 CVE-2022-22985,0,0,79b2a9552a1b10ada46de8bd02db3a2ac5448a48e907872622945aa108e887ad,2024-11-21T06:47:44.610000 CVE-2022-22986,0,0,e199ccc7a922f6597ce6bef579b86e7a6df5673dab1b56f0b18124cb0347cd97,2024-11-21T06:47:44.747000 CVE-2022-22987,0,0,a3b22d0acd975ce36f8cae233a28b115c9a2a48ed94fd9b6fa4f660c0865ea5a,2024-11-21T06:47:44.890000 @@ -193432,7 +193432,7 @@ CVE-2022-23742,0,0,7dea878edb5ad2cbdb3abc4beeb51490a987e35f3a4f8363cd49f2a2e7c04 CVE-2022-23743,0,0,a7454e6467ca11378287d0671c5f75d14fde2b38947403f7a5ca829d4c6db62b,2024-11-21T06:49:13.347000 CVE-2022-23744,0,0,a2ebd65c39528abca9283ad46d8bfd6d49ae5c18a6bf025a4f562f424489dc77,2024-11-21T06:49:13.467000 CVE-2022-23745,0,0,453ea33812425fe4b8f24565e26d1911a52b7d4f61e5e4da7cd895e3d55225e1,2024-11-21T06:49:13.593000 -CVE-2022-23746,0,0,9eeee461b71877b53dcf609958a8cd6693503b71bf2647c3cd27aeced1d79c82,2024-11-21T06:49:13.710000 +CVE-2022-23746,0,1,abeae22cedfc59943315fd8d98f40ee6da86840f7109994f9a1d789f1d393586,2025-04-25T15:15:30.380000 CVE-2022-23747,0,0,a0881c90aac8272e7d82e497d0d70466fe33c6cea5dcab3d5fb6d0f61cf3e774,2024-11-21T06:49:13.857000 CVE-2022-23748,0,0,136335102b55350a23691b297d0f9f026269bdc861292d10215f8958c85f2cf7,2025-04-02T20:30:42.237000 CVE-2022-2375,0,0,b665472ccd967b72e1975f37ea8ece177bf82a1796072289556fd815fa9e1b0d,2024-11-21T07:00:51.963000 @@ -203636,8 +203636,8 @@ CVE-2022-3613,0,0,df8f8f98c56bf9fe01bec37941a8c2d4b227ea26f2ec007e657ec3e6f1019f CVE-2022-36130,0,0,f4e11023ff6a59b7cde6ab523f5c204ef615371979da1e9523a1e3d3d7a3850c,2024-11-21T07:12:27.663000 CVE-2022-36131,0,0,50572ab64b8cc42fad6645c745005ae7986f76bb701e85c25648d9e83b3e8e5b,2024-11-21T07:12:27.817000 CVE-2022-36133,0,0,e9859aad9ae4062117d37ddeb7823ed57b9e94b6e7bcae929874b58e61d8ef09,2024-11-21T07:12:27.977000 -CVE-2022-36136,0,0,bea1d08b00f9d495d289bbc32ddd3ec67aec1abc43898f282ef0f88692e4b1ba,2024-11-21T07:12:28.140000 -CVE-2022-36137,0,0,51d55d42d2055f8c8e091ff8a3c5a2f7a1efbed7a6334df55e7213db0f514b1d,2024-11-21T07:12:28.283000 +CVE-2022-36136,0,1,f2da00eeb95619dc82935888d31d7dc5e37800676e71e79bf569e55982f884b8,2025-04-25T15:15:30.587000 +CVE-2022-36137,0,1,3e19c276bc61d87eb33c9bac15601459f55477ff8a0f6ead4ac974fe498a88e6,2025-04-25T15:15:30.760000 CVE-2022-36139,0,0,22bdb15852dd30b8f2f5ab5bf1ec8c83d48d99445394ee7e973fc0c1815e8ebe,2024-11-21T07:12:28.437000 CVE-2022-3614,0,0,2d4003694539ee1d96ff0bd346ad4bd73a386dbd4c8a7acf8f95bc49397d72c3,2025-04-10T15:15:50.037000 CVE-2022-36140,0,0,9edc335f53d8382d70a6c1d040e3e4f6a52e1f4cd9fa0bf1552cf48609873c37,2024-11-21T07:12:28.590000 @@ -203870,7 +203870,7 @@ CVE-2022-36429,0,0,20fb49e56c6f1adf794f2232cd360d3fc8e2dada5eda76f7ff2b356dd55c2 CVE-2022-3643,0,0,7aaaf9084bb84ab92fa70840701773c2dfe43e0ea77f112347b533a9f79656a6,2024-11-21T07:19:56.600000 CVE-2022-36431,0,0,ee12d34e458b3a3de33896b6afaca59da233821f7619d0c729cbab04e054dfd4,2025-04-24T18:15:17.247000 CVE-2022-36432,0,0,40f0f1ce1fba46db4fc49c3ddcc8785372b185cbc0738759f144e2ddbd897174,2024-11-21T07:12:59.810000 -CVE-2022-36433,0,0,ebed4a98af717246592113c07ecf5f2a10c8e7de56660e43fc24aa17f62df3d7,2024-11-21T07:12:59.967000 +CVE-2022-36433,0,1,72b9b679a2a29f3c1783e5801f15c3bcbd338983499be1ab0f4ef57ccf612fb3,2025-04-25T15:15:30.917000 CVE-2022-36436,0,0,9434892c0b256e55b1874516de3b5aa1348074c0cf8597a6066c5a94f012bba9,2024-11-21T07:13:00.140000 CVE-2022-36437,0,0,3153b59c88a0f5f7aa8f3a5a6e4669887b4635cb5dfc156c694a9b92b4f26c6a,2025-04-11T23:15:26.833000 CVE-2022-36438,0,0,17e2723b39644a785f394ac4f44f0529f418f4f06444889e2f0173c1f8e43f98,2024-11-21T07:13:00.573000 @@ -204260,7 +204260,7 @@ CVE-2022-36886,0,0,1f3c0b8ade645de1e53e62d0e685396150118cb50ddd97877baaa84eebbd9 CVE-2022-36887,0,0,1f8d37d9592aa8f752a6dfad7f0ce43cee71c57c5a7f9bca38989e58989cc896,2024-11-21T07:13:59.637000 CVE-2022-36888,0,0,4921fcf5afdb4f912155db3cc8a53583b6d70e9ad5dc7e9b72daba4003d9e202,2024-11-21T07:13:59.797000 CVE-2022-36889,0,0,e7119c14a6b4b2c9eae6a07158559f2d49d2efaa06f0159c8de8f68cd7303f9e,2024-11-21T07:13:59.973000 -CVE-2022-3689,0,0,f6a4246d825497f545ab8bc7f4b7c91830b45d6f0b12c1a4cda832ec25a4be33,2024-11-21T07:20:02.247000 +CVE-2022-3689,0,1,12892bde85d5c55fa294bf9aeaaaf8a9c87ae2f0a0d06b86dc60a19f05430394,2025-04-25T15:15:31.303000 CVE-2022-36890,0,0,0e9eee4f1955f88ffd0bac660ce61321cdfaa39e35c779981ce210b557e77f54,2024-11-21T07:14:00.163000 CVE-2022-36891,0,0,4a375726c9a8eb97602c989e40327ca8ec8b6e38a5041fd403d3855f98ebeb79,2024-11-21T07:14:00.370000 CVE-2022-36892,0,0,5cec0a9fe25eb7348db333bf5e44ba8fa525e6e8058963b1577f5c512f2554cf,2024-11-21T07:14:00.550000 @@ -204740,7 +204740,7 @@ CVE-2022-37462,0,0,f7e6351a908b88ab930dfb1c7c8a57aca70bc1cb2cde8b81941b2fb3342ee CVE-2022-3747,0,0,d33f321a72534df6c0f7d538ee493355ff4335736b80981cb6ab4e9e464bee7d,2024-11-21T07:20:10.190000 CVE-2022-3748,0,0,4c6a3ebc0d4e325cde97e2f8775aa85a033e1c82aa843579db77939eede30f50,2024-11-21T07:20:10.317000 CVE-2022-3750,0,0,a609e7c347b21edbf6d2fbc09521b9cdf9fb2b630cd9faec5d3705e6ee360cd1,2024-11-21T07:20:10.460000 -CVE-2022-3751,0,0,fff8c897554b0f53372618a3b0d50007127ee1748bd06c89d77850ab21b874f9,2024-11-21T07:20:10.583000 +CVE-2022-3751,0,1,5902e1d7d59b388c4665e28899787faf568a47db85afc7f0eabe9fde36273f50,2025-04-25T15:15:31.460000 CVE-2022-3752,0,0,3149b8e2599081f392146ab58580b459802c848a160578a945146e01e0055e9b,2024-11-21T07:20:10.707000 CVE-2022-3753,0,0,1348f0543d70a87d80ecd231c0b9c1275f07bb41a33410a33f3de4178cde9a44,2024-11-21T07:20:10.870000 CVE-2022-3754,0,0,b78f2c6a6570a5ccf68675c30f4630d6746362394da9b62db4f4ed358e5b7306,2024-11-21T07:20:10.990000 @@ -204776,7 +204776,7 @@ CVE-2022-37679,0,0,30163e65f6c85937f7e28a683176b09d9eb146c2cfb64fbb7a583e8bbaaa6 CVE-2022-3768,0,0,857736c58330b0e35ff7a3d6b161358f07f0524bacac925a9a494e5203d72703,2024-11-21T07:20:12.563000 CVE-2022-37680,0,0,0f45f78801f17e1f85d2fa1a73ca26a0150735d21b0b3cb11777a8712f135f61,2024-11-21T07:15:04.530000 CVE-2022-37681,0,0,2f948e8907ff83dd1c5c3e251826bb44fd66955ca1bfca3c33a0e188cac5cc5b,2024-11-21T07:15:04.670000 -CVE-2022-3769,0,0,c4bf34e87f9ae2f42ed28397fd098e05c35c9f6843e9690bca79f799658840f6,2024-11-21T07:20:12.690000 +CVE-2022-3769,0,1,9c39e37e60db84f67819b6edf308680304c897cf262f2b53a87c71447f65e161,2025-04-25T15:15:31.620000 CVE-2022-3770,0,0,056267d0dbc6d7110f2e71c1310d09e5ea740c482729425241ad1b06c3d3f156,2024-11-21T07:20:12.817000 CVE-2022-37700,0,0,f7b01506e331ff7bf29f91a017c4d6fb8e7444b7a067afb9e3bedcd9b55e6819,2024-11-21T07:15:04.807000 CVE-2022-37703,0,0,0bb1464f62e9d2b8293baf8a4f430c80898e274bb42ad3de2913a88b18041405,2024-11-21T07:15:04.973000 @@ -205224,7 +205224,7 @@ CVE-2022-38223,0,0,3f4fdfd7d100044b3e1d89b5c5e1369323d373ddf13b6ac76b34892021546 CVE-2022-38227,0,0,3d7c4cc08173e8054ebad46518e9009e437f57325ea046e61d56e17b23a82926,2024-11-21T07:16:05.410000 CVE-2022-38228,0,0,816dcccbed7337a6bc402c0b007938a378861f7a4c8bd2395f7fd9fc5e2192b3,2024-11-21T07:16:05.570000 CVE-2022-38229,0,0,efca8cc82294683fd7989d5ec5ca81f04a19e3cc06b9dc425201b9fb2fc4ca6f,2024-11-21T07:16:05.720000 -CVE-2022-3823,0,0,416d416a5d223d4b4148000b870380c243934fa56106cc17a904a983e359a8a5,2024-11-21T07:20:18.497000 +CVE-2022-3823,0,1,e4994fb00f4255d2d57d6299bf759b738f57be40c640d7f78e08222afdcd1424,2025-04-25T15:15:31.783000 CVE-2022-38230,0,0,40dbf13e9bc7dcf1737de4449055ecef320d52169e1f01fe6164196329150047,2024-11-21T07:16:05.870000 CVE-2022-38231,0,0,bbf269a5bcf23cb22529664df424f85a1beb36774d508ded664c20d1752aec6e,2024-11-21T07:16:06.020000 CVE-2022-38233,0,0,2194e76e0e0c73afb69bb1db25d94538133968d692172c945ea97a952ac195ff,2024-11-21T07:16:06.173000 @@ -205288,7 +205288,7 @@ CVE-2022-38306,0,0,e8f5dcacba0e6c57d5692e006a164302af90d57b35821879006d2771aeaa7 CVE-2022-38307,0,0,d59af72afb91538c9ba5dacd9d51feeec853f4a1aa943dc9263bbf2d3184c39f,2024-11-21T07:16:14.057000 CVE-2022-38308,0,0,de3db09742419c58c819e857898b3db9e083868d11e666551cc708fb4d23367c,2024-11-21T07:16:14.273000 CVE-2022-38309,0,0,b087dae21818f7ec2b648f3a011ca6feb2e8308912689a0646bb11dad5bcb10b,2024-11-21T07:16:14.500000 -CVE-2022-3831,0,0,1be0ab256767eb54a63e2b092ec2de5d32e4e9e9175cc6f453b686a595a555dc,2024-11-21T07:20:19.523000 +CVE-2022-3831,0,1,ec982fa2758fc6aeb988af44ec9a6ac5bcc54ce8127db7f6604e5b9ac8631efa,2025-04-25T15:15:31.947000 CVE-2022-38310,0,0,fa5b818aaf804e23f62859a12d0186a0b9342b29971f718afa3564aaca390001,2024-11-21T07:16:14.727000 CVE-2022-38311,0,0,edf4c524f4b3b4766fab2dfe3272c54df888ee510433242ad7f7363ef49b030c,2024-11-21T07:16:14.950000 CVE-2022-38312,0,0,9180aedab589aba05e0f781706ff46b1357d18f29131316cac546e53c50d9d83,2024-11-21T07:16:15.160000 @@ -205455,7 +205455,7 @@ CVE-2022-38493,0,0,7d3c8d07800e0868ab922c04f43dd51b3e3dfd753d464df9f9589698120f7 CVE-2022-38495,0,0,3e1a8f8c7c51ce189934578edb1fc3f7dd0c26a69fce6983a4a1960e697e49cf,2024-11-21T07:16:35.640000 CVE-2022-38496,0,0,7d9e593e4af025081f36a9df085d3bee0fa4f84231618397d1d2b795f464956d,2024-11-21T07:16:35.783000 CVE-2022-38497,0,0,dfbbbf1c39e278335512d6218a9cd7619081c2b5b6b8d6861ef6274e963e506d,2024-11-21T07:16:35.923000 -CVE-2022-3850,0,0,014e0ec67729dcc395e4b36cc6d4ac0ff44bc10411b9a768650029a06fa289ca,2024-11-21T07:20:21.940000 +CVE-2022-3850,0,1,962431257cffa4a4ce5c31a6a0ef1215c8c5c1231cf7badb8a316a768693786f,2025-04-25T15:15:32.100000 CVE-2022-38509,0,0,2515391f4274cbaba327f1239393d87b27324e2e58230c39be800f6b96a3439c,2024-11-21T07:16:36.063000 CVE-2022-38510,0,0,550a2d9c5447748e6ff45d4a073a7702db3ac0c93727f34f4c70abc8b1cc4e1f,2024-11-21T07:16:36.203000 CVE-2022-38511,0,0,64815cf128522467bbbaf91709d503ebd921fbd5d0fa281360677358f094f243,2024-11-21T07:16:36.347000 @@ -205539,7 +205539,7 @@ CVE-2022-38639,0,0,ef089ad0f4192a0b91a834c710a9e1249290b33bdea64a670a5be676a5df0 CVE-2022-3864,0,0,ba3f96f4fa174b2b0d3e24e5d89f4099f8b9a0efca79a024de32073ae52f8091,2024-11-21T07:20:23.540000 CVE-2022-38648,0,0,c2b1a29675da0a06063ce7783922e07647a6f9eda636aacd2cfe7f8e1285a431,2024-11-21T07:16:51.377000 CVE-2022-38649,0,0,a3802596c0711adcc83dec072ae19e2654143e26907bdcd6efadc138cdbfce22,2024-11-21T07:16:51.500000 -CVE-2022-3865,0,0,fc5ab6cd758d465b91ccd42c2d606b0f28bc38f5e9cff538c36a35eb7bbdef4b,2024-11-21T07:20:23.707000 +CVE-2022-3865,0,1,eafea4860b94094a04f93818db78ca2471cd5d51a5635518322434b3c5dbb455,2025-04-25T15:15:32.253000 CVE-2022-38650,0,0,35198c28f8bd005d0cf171fdd338c61f386fc95b192885d90ba28985791abb94,2024-11-21T07:16:51.633000 CVE-2022-38651,0,0,186d3608a285044d41c3697db2bd941bdcd2a0b5c1e7a4ec401f9bdee9564b5c,2024-11-21T07:16:51.790000 CVE-2022-38652,0,0,e88070e710abc56b7eb3502232d6b83b110e9bdef918cc83c89511310da790fe,2024-11-21T07:16:51.947000 @@ -207093,7 +207093,7 @@ CVE-2022-40785,0,0,0d06251319951eeee7bdaa71a82f05bc32e5db2e85812a7b72ff8b1fd2f15 CVE-2022-4079,0,0,2e195e8ce7a96c52db6e6cd391e2c7b115c697f82f9f0e227cf3888e325014f3,2023-11-07T03:56:52.547000 CVE-2022-40797,0,0,06ab9253b92b162b27ca724cded416d99846b7cad236227b0526d64762bf89a7,2024-11-21T07:22:03.370000 CVE-2022-40798,0,0,fecd6a87495b3d94a1ee8a4f130e75d739496a7d84e215b87e3e46923fabbb0c,2024-11-21T07:22:03.537000 -CVE-2022-40799,0,0,ff4dffc477176d9f3a228c3b8c6a0931048d674d30aca151eb12c57d210194d4,2024-11-21T07:22:03.697000 +CVE-2022-40799,0,1,4f1d0eb456c4ec35b634a0682ae51351f47548eed2262a6a39b29e3ce70c906e,2025-04-25T15:15:32.410000 CVE-2022-4080,0,0,2451c9d571d733037b09750056090b671d4a0e95bf3e35212e4bb5caad0e79e2,2023-11-07T03:56:52.670000 CVE-2022-40805,0,0,4f20b037a16c5670b8159350ab27545846f70f42558e52fea1d755619dafdd45,2024-11-21T07:22:03.853000 CVE-2022-40806,0,0,ac30ad36d7e7544ea0df57eac1ad635687001be1171a09eae0ad7de26adc7a9c,2024-11-21T07:22:04.007000 @@ -208509,7 +208509,7 @@ CVE-2022-4244,0,0,16ae99c985e7b36dcab810e8ccfc14c9fa257b27663d0c72059c2a5842fdc1 CVE-2022-42442,0,0,9f02592b0effba1bc336659f8f416a172ce8eaf02f19e1c1af2a6cd21863ff89,2024-11-21T07:24:58.523000 CVE-2022-42443,0,0,fc50246ac900a4083ccdedef27e62d7e1413964daee1a320fba3c5aaf67e1007,2025-01-22T17:11:53.350000 CVE-2022-42444,0,0,5329124ad7f1068195d555d1d0ed53c482283f2a11b45a18466b4858bf7aa527,2025-03-25T16:15:15.877000 -CVE-2022-42445,0,0,7135c0c8f5d54c81855dcfdaf053678518868309e600df07d7c8780aecf75dba,2024-11-21T07:24:58.893000 +CVE-2022-42445,0,1,dd54132cc2f25eab96c69020699c91a5ef1b4c28818402ec2478af2c03e2dd29,2025-04-25T15:15:32.680000 CVE-2022-42446,0,0,1738bdecf80dcb6a90c5b09b1f71384b9db6ee08c4f2ff62b40ca5fca1c34840,2025-04-24T15:15:49.730000 CVE-2022-42447,0,0,aba9a1675e23e43716c7f0e4b39304b4f640b1d80afcf5e6a33292e368a33983,2025-02-19T16:15:35.533000 CVE-2022-4245,0,0,7305d9be07f9487c1c925b80efa0a1de65c9ce2ebf2d82dff49a350744824522,2024-11-21T07:34:51.700000 @@ -209766,7 +209766,7 @@ CVE-2022-44087,0,0,282f1059bd270ea7016e45a4ee9d36ca0f82d50f15358bbc9f785309e63a7 CVE-2022-44088,0,0,f8bdae4051b8ba0544a5a6d5b9d3f3508b358614a633782f5bbd383d6f8ed0b9,2024-11-21T07:27:37.703000 CVE-2022-44089,0,0,387d01deaabf402eacb8c950b9248183b79f74b6de65418acb62c814dbfdab8a,2024-11-21T07:27:37.867000 CVE-2022-4409,0,0,d0bc837111287072a7c07728723929cf9c354b7b41a96199e43fbb9c53250d82,2024-11-21T07:35:12.927000 -CVE-2022-44096,0,0,4dcd9982dd6ab15a1ac4c3a92611415280558b01bb4c3738c24970129b86c490,2024-11-21T07:27:38.020000 +CVE-2022-44096,0,1,5d8ac3ead81d2e9c7fb42bc4a45638e4d6c92558bf3fdc1a787d9c2dbbb35657,2025-04-25T15:15:32.820000 CVE-2022-44097,0,0,7e314715626013de2719f26fb004226ae821e79dba7252b9d2792b6c9536fc69,2025-04-24T21:15:19.677000 CVE-2022-4410,0,0,ac37b87ecb818b8ad9950dbba076719aaaa7e0dca0e40a43f3b4ad06e732d8fc,2024-11-21T07:35:13.063000 CVE-2022-44108,0,0,facd5ad5f95c1b33da6f692999d7562212d2983fa0084da573d9aa142d066d2e,2025-04-17T15:15:49.053000 @@ -209897,8 +209897,8 @@ CVE-2022-44349,0,0,77e0ac1ea0d2dc430605d8413f12a35713a9f95944443f1b60acb50d80e1a CVE-2022-4435,0,0,09fcbc545d95dda0e23a80b812d81848513369bf47210635c1dfeb4dfb7f0751,2024-11-21T07:35:15.420000 CVE-2022-44351,0,0,c10897244d37a1ea917124caf93e5b932f852accad76e4264bb7d568b60b590d,2025-04-23T16:15:26.583000 CVE-2022-44354,0,0,a640ccf93174beb06eeb361e348e70ec7afe52c1df49c4aee6c99d1af743a995,2024-11-21T07:27:54.647000 -CVE-2022-44355,0,0,941aa03f1e5fca7681650ba950b69ef8af2a6aa076740015342da670daa7a53c,2024-11-21T07:27:54.787000 -CVE-2022-44356,0,0,314bf8cbae666cba63ae9d02ceb0420682d7eb1cf35b03e4d11bba6780c14c62,2024-11-21T07:27:54.923000 +CVE-2022-44355,0,1,46f52b6e90b4ac9041764e7a3e48635cd10698155a1fe005a7d739567fc5f74e,2025-04-25T15:15:32.987000 +CVE-2022-44356,0,1,7678667c0a4b5e6b43389a64f9a9efa65bbdfbd023ebb596082024943d137780,2025-04-25T15:15:33.157000 CVE-2022-4436,0,0,054096d3f3721387e7dc56a27e838b284f4344ca986c9ea87b6f33dddc4e2e72,2024-11-21T07:35:15.543000 CVE-2022-44361,0,0,158ecd08bcc8c992b334e8c57664261b8f7baf3f04b2be7d9265673963783b57,2025-04-23T16:15:26.770000 CVE-2022-44362,0,0,5de74f0423cb0832b158fc7782276089054534a3cae5a467753066b2e8fe9ab3,2025-04-24T20:15:27.430000 @@ -210096,7 +210096,7 @@ CVE-2022-44631,0,0,904a5299fff9f1e42831dd9fc3355acf63552007983f7ea10077d27a7a35f CVE-2022-44632,0,0,2189346ebe03fd6a8a3377bf04091ee79ee7a7b61743753d2b08063c09ad712d,2024-11-21T07:28:14.030000 CVE-2022-44633,0,0,0bfaac3c672191c188b3f4444616f3b5b039dbdbbe7f7dea28d72fe5e677910a,2024-11-21T07:28:14.150000 CVE-2022-44634,0,0,4e993b4b2d7eb3f52420143b74ffe66d7781b97d58c7e36ac1f9cf5ae2377e02,2025-02-20T20:15:43.653000 -CVE-2022-44635,0,0,1d4e9827860f1d893d17ced644b360aca4a9f601c13d078d5690c46725557645,2024-11-21T07:28:14.380000 +CVE-2022-44635,0,1,0d9c2c65e766980a30cb1546a922370a17062f5c3380ba54aaa4f361707fe5de,2025-04-25T15:15:33.310000 CVE-2022-44636,0,0,e665458aad0f0d22671191865ac84b2be1559efb5003d90593cf542d7bfcf6de,2025-04-22T04:15:22.493000 CVE-2022-44637,0,0,da7a53295a19af466bc4ca27b53eda2bd51c45808487aea816d1ed7230628a92,2025-04-23T14:15:24.383000 CVE-2022-44638,0,0,cd4dfe11fbb405feccdca7af9c78159d06c16ecbe89ded61e0cc6f9a854d2a6b,2024-11-21T07:28:14.783000 @@ -210462,8 +210462,8 @@ CVE-2022-45197,0,0,e2797594facab33eb8a64e894f3d80227e2c3fb6b001db583f81a9c4f5277 CVE-2022-45198,0,0,2f83eca86b413074047ae0108c6feb23d1202b02e6f4005aad94fb4653e9740e,2024-11-21T07:28:56.987000 CVE-2022-45199,0,0,d1c1175a0ef080fdf9a7cc241c1ae7cb7fccb388690911059d96e4fbe19a95c0,2024-11-21T07:28:57.157000 CVE-2022-4520,0,0,59776d2d88f47898fb2ed20a9d8341b4b24af397bef01454feef5b302af26bef,2024-11-21T07:35:25.283000 -CVE-2022-45202,0,0,7ead26bcfbbf435d52e99b1465af1cf5b95d4b9c03ad6c45cc041d150297c878,2024-11-21T07:28:57.310000 -CVE-2022-45204,0,0,092d58ecc48d5286aa2021f14afa88ee40c26a5c33306ab8571e9b59896fd0f9,2024-11-21T07:28:57.453000 +CVE-2022-45202,0,1,6d810646cf9e046103e1ed7e39a7ac83759b3cd3ca90520431debb7d12c60d93,2025-04-25T15:15:33.627000 +CVE-2022-45204,0,1,d2d39768e026bfb3b62a3942046fda292b5b6936c6060f38eb00666b832b7655,2025-04-25T15:15:33.810000 CVE-2022-45205,0,0,e6fa24785e02d2437657ce26199e180fe86db56ec5d79b8f1910e6ab0189a808,2024-11-21T07:28:57.597000 CVE-2022-45206,0,0,929abf60432f0b5a312a8a73c0c203d7ecdbfba21a1c6a3e48590e9aff8ef12e,2024-11-21T07:28:57.747000 CVE-2022-45207,0,0,228696c2311bc6d2e1e96776b82219e109666fce16b81004358914bf00bee35e,2024-11-21T07:28:57.890000 @@ -210503,11 +210503,11 @@ CVE-2022-45292,0,0,b6751d2b25f768435678970f6173efb33bf49946476133da8f80186049d39 CVE-2022-45297,0,0,c3d40692f2eb008a64501f776ffefb318506ed5f4f8f6afcf25ee9a4b43f6c16,2025-03-27T19:15:45.603000 CVE-2022-45299,0,0,c3cdec51ad489e268fa0adba84e426154f37216284280ee0f5cd064bdca33ade,2025-04-07T20:15:18.080000 CVE-2022-4530,0,0,cf8765ea8602d8dec88060a36fdc1b0bde04159fab852625f65a01f5454769e4,2024-08-30T20:15:06.780000 -CVE-2022-45301,0,0,7f21a6a89058d69c22a2f6146a515a15fceca6c3b69b098486015a26d4dab81a,2024-11-21T07:29:01.920000 -CVE-2022-45304,0,0,80a65f6816d77386d34521e9d264fe35e29c557a576795fd8e54012d6ad6ecc7,2024-11-21T07:29:02.067000 -CVE-2022-45305,0,0,b1619789a0822c2d8f5b37753cd4bc64870c87283b035efbfb171573e11f33af,2024-11-21T07:29:02.210000 -CVE-2022-45306,0,0,d70e566b4a0d5dcaee18467d88435622533217aae3bf891ab2975136f81e5ba0,2024-11-21T07:29:02.360000 -CVE-2022-45307,0,0,efec774b802115486fa6f52b3ea251aef6304f75603caf5dd11138d8348915e1,2024-11-21T07:29:02.500000 +CVE-2022-45301,0,1,480d6e2ee94f475b4c05c28a3766005e335ccfbd76428dc5d82107cc027d0e33,2025-04-25T15:15:33.970000 +CVE-2022-45304,0,1,41d8df1f88e99f9138aba36e5fc33e614fac6d772d4c583d996527518c3f5287,2025-04-25T15:15:34.133000 +CVE-2022-45305,0,1,78feafa2372a19987621527382d7262a6231c879403e921e624443a313369917,2025-04-25T15:15:34.287000 +CVE-2022-45306,0,1,86b3f5d6df5c52ae52718e7f104d9816f0c1c58c1c5d3fcf3525eea3a3ceba00,2025-04-25T15:15:34.437000 +CVE-2022-45307,0,1,43708ed18c5f7f3db58dbb06cfe9d22255608c044aa65e187e28a715d54b551e,2025-04-25T15:15:34.593000 CVE-2022-4531,0,0,83c9dea44857e2b3d5707eadb09615962b28f3408f88a3269d03262a57cdbf59,2023-11-07T03:58:05.790000 CVE-2022-45313,0,0,7df76c36ff95f039b19b9a5010d37f7d1c54257ed685c022114fa169cdb3ec28,2025-04-24T14:15:40.890000 CVE-2022-45315,0,0,f8ad030613b7695cdf72a7a1f7b384686f9a9303d0ca9f0fbca7b3b72fb6b0df,2025-04-24T14:15:41.063000 @@ -243966,7 +243966,7 @@ CVE-2024-0402,0,0,c949b5bd8222e6e23b4e7ba309ff59582bbc865f49ff9c531f74ebc2c33ecd CVE-2024-0403,0,0,c9b6ae724b586a946619c8ef0c81865180cac480da67df518481991ba669f2a4,2024-12-31T17:35:53.340000 CVE-2024-0404,0,0,e68675852fdad4a719b11b1ba5421da84ab893dbe21118b0c4ff6ad8acdc2b36,2024-11-21T08:46:30.660000 CVE-2024-0405,0,0,e66adb1ef6baed40b92ad2708a2a7f7801896af39f78da834867100b8b40a4a0,2024-11-21T08:46:30.777000 -CVE-2024-0406,0,0,9f2b6dbfc4bb6fd60151e853679215a73049311f45bbb54e1ce15eac5966bf97,2025-03-11T04:15:22.860000 +CVE-2024-0406,0,1,624b2b319e3e58430af78d1cf5b29e249f2f4fa81ef5368a490d7607f60ace06,2025-04-25T15:02:44.233000 CVE-2024-0407,0,0,bf7446b50e0f1a0b381fa6716fb89f82f79db67f0ab4fa78f751b5ca6c555100,2024-11-21T08:46:31.027000 CVE-2024-0408,0,0,e030a2f701c930b593d7d8ff457fa175da0a5c43fe41606146dc8b73cdf52f60,2024-11-21T08:46:31.200000 CVE-2024-0409,0,0,9ef4dd3ff45e8aeeb4d2ab9d9226ad37168b774e60bec3b6e361da09f5c22590,2024-11-21T08:46:31.373000 @@ -246458,7 +246458,7 @@ CVE-2024-11913,0,0,dd7d1aef6bd9b33c5cbc226bd6c46c9362be3e1f9ee0d5457fc9f3944230b CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000 CVE-2024-11915,0,0,28ea0a161b7eefe74ada087940b67270e2ec51b6fcf1def4945f57e6c8ae681f,2025-01-11T08:15:24.680000 CVE-2024-11916,0,0,772212fec6b655643f1c957d90058c2fa42ec3e452d3898107b79ded42b35191,2025-04-14T12:27:30.293000 -CVE-2024-11917,1,1,031167b73343774ee40ea835a42c4eab1f9c685cc3097d68bcac659311c4c55d,2025-04-25T12:15:16.013000 +CVE-2024-11917,0,0,031167b73343774ee40ea835a42c4eab1f9c685cc3097d68bcac659311c4c55d,2025-04-25T12:15:16.013000 CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000 CVE-2024-1192,0,0,5063d16699b3db058d0f99170ded601d82fcfc6f39ec66d01e8a7cebfd42903d,2025-01-08T14:35:22.633000 CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000 @@ -258385,7 +258385,7 @@ CVE-2024-32026,0,0,4773c1e06d48d931c50925611674b98234951891d140d0343af0eb572b751 CVE-2024-32027,0,0,6ce23269e48b4377ce344209985d7aeb11dc4ec2bf2a00a704c1d82f0ed8340b,2024-11-21T09:14:21.480000 CVE-2024-32028,0,0,22e622c774c542e7be36c4f7d635ed93a3762d447ae249c728e3841b0fb820a3,2024-11-21T09:14:21.583000 CVE-2024-32029,0,0,ec00582208fdbdbc31ad232b1ff8828b057f2b25e4f7f9338f4ce73ccf6c8240,2024-05-30T16:15:10.050000 -CVE-2024-3203,0,0,b9bd43409050d98289f0520141839a5b27219a64af11671f292622a563cd36d4,2024-11-21T09:29:08.600000 +CVE-2024-3203,0,1,1e2303c3547909eb91a5135ac853ec048bf0b4a7e25985e7e1f09b52bec09df0,2025-04-25T14:45:29.780000 CVE-2024-32030,0,0,7ab346951e5746ec7b6e6b83b5d2265e2532974224b95f7d8430a7ce3990347b,2024-11-21T09:14:21.720000 CVE-2024-32034,0,0,f9fc59a803fb9008f0d41053bab6a9b99be261b72e8c5e005adea690eeecf65a,2024-09-29T00:14:35.067000 CVE-2024-32035,0,0,6aeed2ead32f8adfb0b64fd6ab5bcc5fc1dd7fc2e6fffe8e5f59626195350f6b,2025-01-09T18:35:14.097000 @@ -258393,7 +258393,7 @@ CVE-2024-32036,0,0,b7bb0a68606be3a71619970156645c1c4a4fce8cd747e622f28c6010c1597 CVE-2024-32037,0,0,949387a92a73eceb7807931e568a1355c21b628d8d44a2415cefd9b4784da648,2025-02-11T22:15:27.930000 CVE-2024-32038,0,0,34cde6bba7f174368a97eb36a04d03123d5b022d383c07dafde4c8aa5c18b781,2025-01-09T17:38:55.253000 CVE-2024-32039,0,0,e75d836ac2de29a0c0b50581e5d6dc6ab8a2307f840547494c81dc65cfcfdadd,2025-02-04T18:03:30.070000 -CVE-2024-3204,0,0,b1166a23098fea3c82611f1499c0d6fe5df471feadfbca64f6a4601fdb9a6e74,2024-11-21T09:29:08.737000 +CVE-2024-3204,0,1,e41fa60a24fec2ed23a74802bb999150b30e9aecfea81ee0f33bc35c59482c9d,2025-04-25T14:45:32.610000 CVE-2024-32040,0,0,e8f90104a90da8610737c992d81a09858ef163c3a23ec8b9e39f3c7946394fbf,2025-02-04T17:54:59.780000 CVE-2024-32041,0,0,e9bed5c3651e2c0893124b7eacf46217be524e42bf05cd50c4a7df68e0e4d7bc,2025-02-04T17:56:13.770000 CVE-2024-32042,0,0,d0fd67f1ac88090ecbce5619555ebbbc8e6cafaf16de5009d4624dfe7a912cca,2024-11-21T09:14:22.697000 @@ -258419,7 +258419,7 @@ CVE-2024-32063,0,0,29f2a1892e1bdbc51f377e16f8f2040d6017a1d65a3f945cee689a886d42e CVE-2024-32064,0,0,dbd54301038cc21ecfd959ae6b4c22d3f3371dcb1f683d2492a8558fb73b537e,2024-11-21T09:14:25.020000 CVE-2024-32065,0,0,4e269c3b4617b51abbf7fad0fb189e864f793651d042c42c0e6c76cdaab0ff9f,2024-11-21T09:14:25.143000 CVE-2024-32066,0,0,e2d564a6fee7a9e5f3fdab2d0b49dd5d8b58b3bad6120a98104b2feb5f2112fa,2024-11-21T09:14:25.267000 -CVE-2024-3207,0,0,02d8ec17fdfdc3fcf46708a9320e4db12160865848100afd95416d6fbb5d38fa,2024-11-21T09:29:08.997000 +CVE-2024-3207,0,1,8fa2f3a0513bff3278c8dcece3222e4d4d6cebf4f86fa253a454a12dcf8d9ec9,2025-04-25T14:38:36.010000 CVE-2024-32077,0,0,393ddbdf68ebdbb785c0675192e8c78c93a985173eff509b5f298da2241d687d,2025-03-27T20:15:26.090000 CVE-2024-32078,0,0,82ba60cc46e9aa4228ce6f631a63a9303f5be477f0d9a2dc16c6651d36d28708,2024-11-21T09:14:25.543000 CVE-2024-32079,0,0,1bc3c03f2b5772f3aa8b52ceeb2e0251532ab71b12d3b25db239c0f26b173c66,2024-11-21T09:14:25.670000 @@ -258434,7 +258434,7 @@ CVE-2024-32086,0,0,72c9870173bce8d88a34ed70f3c12ae4d8f5b964aaf1ba4378ac5c2cb3f12 CVE-2024-32087,0,0,35a7c92bfe089a0106ac1cf4fcc6939a2d286d022cb6e3fe5479d3a1c8ad52aa,2025-04-02T15:07:31.400000 CVE-2024-32088,0,0,09b51e56a6b4f889b0e1b07b3f1d01c2b9169677a6b4526ef3345bb6696f4f00,2024-11-21T09:14:26.787000 CVE-2024-32089,0,0,ef8adcb2491e9d4f8796a216454a00d3605e19ebfa3a9b9e4d48da5c5d235765,2024-11-21T09:14:26.910000 -CVE-2024-3209,0,0,5228f92463fd9d1e4264aaefa77852711b145714e3e6ef47ceb920905bbab29e,2024-11-21T09:29:09.260000 +CVE-2024-3209,0,1,5ff619df9db84dcdbf6f9ad995f12b5d6411fa1a20893e41e9b88a1843ae185c,2025-04-25T14:33:54.060000 CVE-2024-32090,0,0,75926a377885047463452d5a3bf9253f75177f2255621a9473d19e9546b9034d,2024-11-21T09:14:27.043000 CVE-2024-32091,0,0,8b927b36c6473a1dd9b971a4882da7440d5c3a4627233401d44d0b45f1fc4b05,2024-11-21T09:14:27.170000 CVE-2024-32092,0,0,626f7d6fbf6c177cf8867b6f471f5c96daa6af3eec23f87f6edabf0d4ce72181,2024-11-21T09:14:27.290000 @@ -258530,7 +258530,7 @@ CVE-2024-32258,0,0,6307eaacd8410373f8e4971a56af08ef21a11ce548d7dc244e05c1cbd8242 CVE-2024-3226,0,0,d62a9b3627d473bf4da79a5994599afd5c9f26e2657570b8d6caf53a5569c149,2025-02-27T18:07:16.257000 CVE-2024-32268,0,0,4220b068189651923e7c03eaebbdaa1016b5566433d5df81372417a7a35be918,2025-02-10T23:15:13.667000 CVE-2024-32269,0,0,946bbdfbb629e9015a5d3fff72eb7016b39f3bb020c4b6fcea1e2b24974b3684,2024-11-21T09:14:38.380000 -CVE-2024-3227,0,1,9e1d1fdbd4e1a4c34f6443452404f929d05306c6519fd21de6a244492ebf2163,2025-04-25T13:52:04.237000 +CVE-2024-3227,0,1,9f9078b2d11d9d3abdbf01c873581dda3999b4080c3d4878841b1d9262d74bf9,2025-04-25T14:23:04.283000 CVE-2024-3228,0,0,08ccf2d9f01838c2ec15add697673a4972e6918a8d27a226bfa96edaba6deef9,2024-11-21T09:29:11.610000 CVE-2024-32281,0,0,7a66376ebdecf29b4444f8dc1c8f2ff04e98ba785ec70376a9c15ff0e2aacc79,2025-03-17T14:35:04.940000 CVE-2024-32282,0,0,46f9031bc243af75396d20ca183c4cf0747f94988e54cae7dc9de7135eba9c12,2025-04-09T14:20:58.563000 @@ -271764,7 +271764,7 @@ CVE-2024-49669,0,0,f5af1df54e8b7d7f9667dcdd7a6962c4e16f9b133913097ee0daebd53c256 CVE-2024-4967,0,0,4fec59b0c38110a60cb49f88104ba4994971df287b36df28c54db2c2b507f465,2025-02-10T13:42:20.800000 CVE-2024-49670,0,0,e6e2ea1c6b1aefc6292e9a4fc9f11356fc42c84627f1848e8c50c0236524cfd7,2024-11-08T14:57:58.190000 CVE-2024-49671,0,0,ca8113d74fabe4e2a65c834fdb9dd061048f4f7679635eb0241bc77cd321748d,2024-10-25T12:56:36.827000 -CVE-2024-49672,0,0,9b42148224eabbb4ba442eca72c86ebfe871626b37b9700a4cf0e41a21e29e63,2024-11-08T15:16:00.327000 +CVE-2024-49672,0,1,80432de28b0621ee15e36079d608bf1300b6798f2e500190929dd2a0c56def48,2025-04-25T14:02:39.477000 CVE-2024-49673,0,0,5cfbaeb230b289604e6a9a17a0e3169a5fd351a546e39f0d9f8cdbcaef1b223d,2024-11-08T14:57:27.190000 CVE-2024-49674,0,0,485cc36f092613aa15cc1bf9c84e4863b887e4a287065a305bbaf4e37c253850,2024-11-01T12:57:03.417000 CVE-2024-49675,0,0,b7fbdd38c92d79ba1d7bcc6ed0be95e3d48c155f778ae6bd0a0ba79a52dcf7e9,2024-11-06T22:24:22.907000 @@ -272154,7 +272154,7 @@ CVE-2024-50082,0,0,8e85b94985a472359e7ad0617254fd31b64c77f2f36289cb4bbc5af5d6a75 CVE-2024-50083,0,0,de1d51f865c94ab365e97cd039ee3870a1a30b178e746690742c8e78aca3de82,2024-10-30T15:07:02.577000 CVE-2024-50084,0,0,b5257c57e10aeb1b0e84c4712b2b356a0ca0c40710c5a3dd9a3145007b3bef22,2024-12-11T15:15:11.340000 CVE-2024-50085,0,0,b3ef415259af94dfaf8bcfe0bcff2c51beb7119bdbd5c2e18d18d67b492b8793,2024-12-11T15:15:11.520000 -CVE-2024-50086,0,0,c6f33f3609f366d17ec962500a85ec8a163f627e45c9fc88fa1d938f52063985,2024-11-08T16:15:46.247000 +CVE-2024-50086,0,1,0471e85c6b36e1c59b81acd3fcdc1f4238e2c471db3732bf92aa389e342c197d,2025-04-25T15:15:34.760000 CVE-2024-50087,0,0,95d447f6a3e5e9775f53a0aac1fc1d8bc3fd599edf42d3ca061af2094ebd2cf0,2024-10-30T14:40:16.377000 CVE-2024-50088,0,0,83a7a5adff7f3483f34508e6fe25dee9016d86cd5e803da2007d8e3925e20cd7,2024-11-01T16:05:44.403000 CVE-2024-50089,0,0,5a88dd8feee0f8dc71f033c863dd49e2c59b663323260d047a7a9dacd5a71d02,2024-12-12T16:15:43.107000 @@ -276975,6 +276975,7 @@ CVE-2024-5737,0,0,cd5c6423a27e90a610242cf52e502989ca1429c1507f238a032817178b3a04 CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279fedb,2025-01-23T21:15:14.663000 CVE-2024-57372,0,0,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000 CVE-2024-57373,0,0,55b5a66e1a93744a164d63416378de309c1b9a5faab6102e8edbf1875b843e8d,2025-02-06T17:15:20.213000 +CVE-2024-57375,1,1,82696e9ab6d80cf47263dffbeff460400b01b8eafd4708f416d81909b7716fa8,2025-04-25T14:15:20.567000 CVE-2024-57376,0,0,1b43a3e4a8037a8c708d6024b6d292337bbf71fefc30954ed4f4a8b250f57ff1,2025-01-29T16:15:43.367000 CVE-2024-57378,0,0,cc86489a14332f4fb3581ace2a871cae306512c21437ab59547843f810ccce83,2025-03-17T19:15:24.463000 CVE-2024-5738,0,0,ed407989160bc277c57b88c071485c42bcb76c7891fe4c3b678e4f981038b562,2025-02-11T02:15:35.480000 @@ -277867,8 +277868,8 @@ CVE-2024-6194,0,0,edbd6241b7f987aa3a81863460dff0ff43067716b0eb6760c0d7999432f960 CVE-2024-6195,0,0,b4caf70d1edba8ea49e05884b1f80490b69a86c6f542eb35b84fa4578f274f1c,2024-11-21T09:49:10.187000 CVE-2024-6196,0,0,b1f39cc423aa2f573c963bfda2e2954c189faa3c6a65007de94824a0fe67c7b5,2024-11-21T09:49:10.340000 CVE-2024-6197,0,0,341d9f6df4ae3e4e99279c2cfac2e321c8271a012cdb7cb8f491cac94878c7fc,2024-11-29T12:15:08.430000 -CVE-2024-6198,1,1,e2cdff1cf80ababece59ab0490c507d33c33b635c59ba8e50b012afe62fe25be,2025-04-25T13:15:42.370000 -CVE-2024-6199,1,1,15389f1e61eaf87a77f28615f893dcedcf409e67ecf18f2698fddddd6250ddba,2025-04-25T13:15:43.510000 +CVE-2024-6198,0,0,e2cdff1cf80ababece59ab0490c507d33c33b635c59ba8e50b012afe62fe25be,2025-04-25T13:15:42.370000 +CVE-2024-6199,0,0,15389f1e61eaf87a77f28615f893dcedcf409e67ecf18f2698fddddd6250ddba,2025-04-25T13:15:43.510000 CVE-2024-6200,0,0,9ea80a7e2b2604a341d4266c7e6316677c4c7b3562bbab6c326247f642929732,2024-08-29T17:53:40.483000 CVE-2024-6201,0,0,d7508e5c68d1c9f58af9fd9a0f0c496f8219bfb780e580739e4f5ce4075f9531,2024-08-29T17:52:07.493000 CVE-2024-6202,0,0,6ede66ad5d88af3e4e7acd719dab516e45d0d130ab973638092e6c9d7ab6930d,2024-08-29T17:48:43.723000 @@ -284062,7 +284063,7 @@ CVE-2025-22093,0,0,b24898d0dc107f2346d4f833c1e67c8777d58976698fba06e76ef65fa2245 CVE-2025-22094,0,0,09059d5b58fbce3fad4eec10c69cc254c1648cdfac3dad0ef08bac2421a9be35,2025-04-17T20:22:16.240000 CVE-2025-22095,0,0,4fe140e98f99be6f92b616d06388d067b7260a8e9d2fa1df5fc4a895c33e6785,2025-04-17T20:22:16.240000 CVE-2025-22096,0,0,15b45f8823c1996770a96b120ba092f00becf4bccf2d6c3fffa128e5e78bf9e9,2025-04-17T20:22:16.240000 -CVE-2025-22097,0,0,587655f74ecb9818a87daf42a5d4bb3f061499c9760d94d56f399edc1aabccc1,2025-04-17T20:22:16.240000 +CVE-2025-22097,0,1,97a4a0d6b56c0154f972186cd420d43ebf62d6e5f01e1cca44d8ecc0935f4b19,2025-04-25T15:15:35.647000 CVE-2025-22098,0,0,6c4fdc85168785cf9bc2888afe555bae93a6aae32137479fb1d6e685ac07fbc0,2025-04-17T20:22:16.240000 CVE-2025-22099,0,0,34c86007a0246898343f27ac5d47b808a7794c7beb1126406566dff2e90f041f,2025-04-17T20:22:16.240000 CVE-2025-2210,0,0,86475c50184989786e182feb1184f7a2855d2c84538b322933b89181189cad61,2025-03-12T14:15:20.017000 @@ -286124,7 +286125,7 @@ CVE-2025-24696,0,0,3f05e52259d3b900a80613c5b1e8b568819cf706464f6128c6614eb8c2149 CVE-2025-24697,0,0,524ece83a68382cbbf9bfb8b326769c1433565110882c970ecb2d390f56fd66b,2025-02-03T15:15:30.090000 CVE-2025-24698,0,0,ee9ed28bb6a4d45cbe5d6914ce763041875739a745cdfb0d75cc00a562396221,2025-01-24T18:15:43.050000 CVE-2025-24699,0,0,393e254dc7ad1cd4683fc4d4519da575204d2336c4593392a7c99d9a332989ca,2025-02-14T13:15:50.193000 -CVE-2025-2470,1,1,4488c07429fb0f638a2bcf5f18f1c8dcca11fa0873f3deecc47a9e2553b57a37,2025-04-25T12:15:16.903000 +CVE-2025-2470,0,0,4488c07429fb0f638a2bcf5f18f1c8dcca11fa0873f3deecc47a9e2553b57a37,2025-04-25T12:15:16.903000 CVE-2025-24700,0,0,751d45a0c372daf25447afad51791e39d3a984cf49ee5476e94da07a79832cbd,2025-02-14T13:15:50.330000 CVE-2025-24701,0,0,3286a9d08a955762787b23c92470d2629e626a4bb3688501e99db53a7da2cb4d,2025-01-24T18:15:43.207000 CVE-2025-24702,0,0,7c38f7de4d5427e8c69c77b42285f55828f36aa11705bf9605c2b3dfb09c1912,2025-01-24T18:15:43.360000 @@ -287696,8 +287697,8 @@ CVE-2025-2736,0,0,e7cf98020d21878cb789676050f2b64482f392b9f6e63f08f76876bbe2073f CVE-2025-27363,0,0,eacfc55a70741273922ea22dff488f5249055c44f792def36c729ba640204fe8,2025-04-02T22:15:18.963000 CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000 CVE-2025-2737,0,0,9d40414dcab50f45f0c2fa5c2a682879f8d578b9615da1fd43e795859731e769,2025-03-27T16:45:46.410000 -CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000 -CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000 +CVE-2025-27370,0,1,0e4b7966e83d8d55e2eb5b8a991cbcb244993a6e600774bc55d7606305b3dc3b,2025-04-25T15:15:35.820000 +CVE-2025-27371,0,1,45275223bafac4474512200e04f0e5f05b6e9358eb7647331e7f7cea3c7d0d4c,2025-04-25T15:15:35.937000 CVE-2025-2738,0,0,e698101b4b8baa5b6d74722f9a5a2fd56a7a9ed4b926613e8c3fa693afa80c00,2025-03-27T16:45:46.410000 CVE-2025-2739,0,0,f4fbf6446ec2451df539fdc2165d89cda075d9eb4f1c2bfad7a40ecffa8d5b9b,2025-03-27T16:45:46.410000 CVE-2025-27391,0,0,c782f9b884022f97c5a60c69190305dd5a13fa0bd9d3036dcc826fa9cec725bc,2025-04-09T20:02:41.860000 @@ -288090,6 +288091,7 @@ CVE-2025-2805,0,0,880e5f81bed603812ce823b5a2b526104be41586e76c7f27af893f077e49d0 CVE-2025-28059,0,0,0b528bcd391ca7d8898ab4bd4553bb61f607c8c85b3fa32f1b18963847081036,2025-04-22T15:16:10.627000 CVE-2025-2807,0,0,f8faf57b374faab8743fa15c01545fe02708770c7c9d6b7c7888f61e54c92b92,2025-04-08T18:13:53.347000 CVE-2025-28072,0,0,321583596f07ee7a11b5edcf4c985e43a00852706ec6a22ba926fc63543c9b04,2025-04-17T20:21:48.243000 +CVE-2025-28076,1,1,db70c8fef1d0820af94d47420f9b4ac9d92041297fcdd83fede7c3a5f63dbbf3,2025-04-25T15:15:36.057000 CVE-2025-2808,0,0,2d9ef6fcbe323df90c90b4e91a51bb82e8f5ef9746894b9f5e9c32273a3c6988,2025-04-08T18:13:53.347000 CVE-2025-28087,0,0,1a24fc8fa031815998ab3cec95d83c4ceea417049d18cb4b484e469d0233d5a6,2025-04-07T14:22:33.160000 CVE-2025-28089,0,0,67dcb00b253159ea36147dba2ae48f5f5632d8f7c0e820c0f6cd1525d263b4dd,2025-04-07T14:20:46.543000 @@ -288150,6 +288152,7 @@ CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed8583 CVE-2025-2832,0,0,cb7d7ad79effe9b806885a95f2ec7289cdd7a0d7d71df2be39be5f751b3cbeb5,2025-04-11T16:25:55.093000 CVE-2025-2833,0,0,9a52ee089c5cfe9509a1e8871d17816b70a7313c16002967d895358fd72885f7,2025-04-01T15:43:23.657000 CVE-2025-2835,0,0,f8c0fd9595480681bd283ae5c205524a5787cd2cba5ce2f877a12280939c81a6,2025-04-01T15:43:38.550000 +CVE-2025-28354,1,1,b7ca52ed378f87fd5c1ed9b145cf5fcb9eeb626e59116335650caa6a5f0fa671,2025-04-25T14:15:21.560000 CVE-2025-28355,0,0,bd8de930b23f6184ab39d0c81e4ee9cdd924adbcf0d121098e5d134a3a60799c,2025-04-21T14:23:45.950000 CVE-2025-2836,0,0,fc5be678cb97345ef6d68aed15f5462ba8f4f63b5b10c6ab5fab3a18f127610b,2025-04-07T14:18:15.560000 CVE-2025-28361,0,0,012842a41606e730430b254a67bbb658386b3833897674145b51c035a48415eb,2025-04-01T15:43:05.143000 @@ -288577,7 +288580,7 @@ CVE-2025-2983,0,0,d31f69cd4a503a465c90bfed858cd3831ad229c0ecb657ddc75c62172e5f91 CVE-2025-29834,0,0,4578a3b9050d36f7b5d401ef2cff9bd2a539c6ae9a0546aae8bc67b2af1fdb40,2025-04-15T18:39:43.697000 CVE-2025-2984,0,0,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000 CVE-2025-2985,0,0,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000 -CVE-2025-2986,1,1,971cb370a2208d6ff8e7ca861d70c22c3f320da3a2730619b33177fbeacbd69c,2025-04-25T12:15:17.083000 +CVE-2025-2986,0,0,971cb370a2208d6ff8e7ca861d70c22c3f320da3a2730619b33177fbeacbd69c,2025-04-25T12:15:17.083000 CVE-2025-29868,0,0,3cdd5d5bc9e5c1cb38e652f74faead4f53d8e8683a37455baaae14fba635a1fa,2025-04-15T13:07:54.393000 CVE-2025-2987,0,0,c5ae0e320f83eaa0b28afb3c153f6c745fec2a59a31f1b5ca52889e16590e49b,2025-04-23T14:08:13.383000 CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000 @@ -290008,6 +290011,8 @@ CVE-2025-32034,0,0,39b72df89785b876c4ffe3d85c99f5c70d32cc05dfbbbe1938fd282aa04eb CVE-2025-32035,0,0,70a6888bf34d8ab81fb00f2d46e41bf70535bbafb3937f8df2bfd461f8a5aab1,2025-04-09T20:03:01.577000 CVE-2025-32036,0,0,392ced4a7ceffb3860fa36c03a132228e0c351b485f1983727787214d9a82a67,2025-04-09T20:03:01.577000 CVE-2025-3204,0,0,640564153dde48d17342c52eff358ea56840605e43f6aab84cda78f222b9e0c5,2025-04-15T18:48:43.403000 +CVE-2025-32044,1,1,82488ff51414fffca606c9feb6d2238106d8fe543bd8d88e42ffdf646c55ce7c,2025-04-25T15:15:36.170000 +CVE-2025-32045,1,1,104efd8363c05c967ca4a14dfeae9d2f3d006cbfe9ec0bf2e4f766d5a3449f24,2025-04-25T15:15:36.307000 CVE-2025-32049,0,0,4a492d3e48b4caa699bbe628c5401d02fd93365e9cd0841713ed46afaee15215,2025-04-07T14:18:34.453000 CVE-2025-3205,0,0,0c26d77384caecfacdebfbce05973b001403188f1a4dd9f2048d6f99e8de6522,2025-04-07T14:18:15.560000 CVE-2025-32050,0,0,0a47cfad52d7f8e56c261b87c53507ae6a7f0c5195729ce7a2f5bf37484c4b9d,2025-04-07T14:18:34.453000 @@ -290263,6 +290268,7 @@ CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710 CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000 CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000 CVE-2025-32431,0,0,c841c5dc407677a5965f2a37065aa8f465f93e2d2ebac9e51959dc5b7aa3e0fc,2025-04-23T14:08:13.383000 +CVE-2025-32432,1,1,bb9c6d246a629688898cb376f2801e83dc1b55b2499826cfb239f3d739157757,2025-04-25T15:15:36.440000 CVE-2025-32433,0,0,b09c31f6643195b4a1d992889b32cafe0f931f328c07138c1e538f5f63253f0e,2025-04-21T17:15:24.330000 CVE-2025-32434,0,0,3d3061039e555845c648c2cd4ddde07ee66a966a450d5d2a63cf7163cec950d6,2025-04-21T14:23:45.950000 CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000 @@ -290842,8 +290848,8 @@ CVE-2025-3547,0,0,b8a8bcfd16382c6f669ee8b0e767a9b348387ef570b4ccac540ec0ccce46c6 CVE-2025-3548,0,0,6144ed5d0d918b47e0b3455f4989275371cbf6245da9570b52c077e637e4dc46,2025-04-15T18:39:27.967000 CVE-2025-3549,0,0,fd480975e611b3aa329471ac846d61053e320de544cf16373b88df2f23530e93,2025-04-15T18:39:27.967000 CVE-2025-3550,0,0,f579947c5b178a817932c0b6fcead0a074c3d6bb705e7020a43daf576a1fe1fe,2025-04-15T18:39:27.967000 -CVE-2025-3551,0,0,0af495328e32fa4289c7f25e609803a47f9639c2693a9cf28fe39eba4f6a3f0f,2025-04-15T18:39:27.967000 -CVE-2025-3552,0,0,2eee97925b40dc2eacf4ba01e66d0bdb8d286a517e59cfd6a72f8d18568a8faf,2025-04-15T18:39:27.967000 +CVE-2025-3551,0,1,7ed5829e5d026f1c03262321afe4b2fcc0af60af369c627605818f04ad27b702,2025-04-25T14:15:22.650000 +CVE-2025-3552,0,1,10bc72b296492c08f732779e187dfffb8db758900c33748a57d9854aae10efc4,2025-04-25T14:15:22.790000 CVE-2025-3553,0,0,8c1f5e14061a66a48b1706566e256d4f8488eab0bb5ab64ca443be3751b0a454,2025-04-15T18:39:27.967000 CVE-2025-3554,0,0,c0abfdbdf90c0e224f35d24ce51fd8768d7addfcdcc1d013eb7c63964315f5b4,2025-04-15T18:39:27.967000 CVE-2025-3555,0,0,b7c360be3db59a3fe1c48e7f971bfcde48092d0da4916799343add506c814c87,2025-04-16T12:15:16.760000 @@ -290895,6 +290901,21 @@ CVE-2025-3618,0,0,304b127c053921d914e116b0c3d51c4ee5b2fd33efb8ce7a0d299de12188b5 CVE-2025-3619,0,0,d6505a8fbe042bc57caae6de787bee69f36be813ff60b26db9609f14022d6c10,2025-04-23T18:12:45.323000 CVE-2025-3620,0,0,fac1ac0d011a3ca6c7407b0f1dd2c7aa4f0d27161282923069a13fa36620f271,2025-04-23T18:11:43.153000 CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000 +CVE-2025-3625,1,1,3bdf52e9169bfb6678a00932a78a0f452d8e65112fc777501b1fd7239568c811,2025-04-25T15:15:36.753000 +CVE-2025-3627,1,1,dabf06095078b9860f1769392c38fe36fec3b9ecc6c420da3f4d7317cdc01872,2025-04-25T15:15:36.927000 +CVE-2025-3628,1,1,423998b402f85d4296c3f8db6c0725e827a10a7ba3b3fe671c0f66abe5fe7a86,2025-04-25T15:15:37.057000 +CVE-2025-3634,1,1,c249616fcd5306954c7d56d551e8b0519a46a3d77d022c90495e60ea868758db,2025-04-25T14:15:22.917000 +CVE-2025-3635,1,1,82bb269846d3df9accc7f03b877a95650ed9373767a5bc824156d089abecb1cd,2025-04-25T15:15:37.230000 +CVE-2025-3636,1,1,baa88194ce5460ba4031b3c76f0ad7b59d61d93b8db26be41142300f1e981740,2025-04-25T15:15:37.363000 +CVE-2025-3637,1,1,3c38d23c601d6f8f06e183f269a947596b2ff8a03965e630670af08150139833,2025-04-25T15:15:37.510000 +CVE-2025-3638,1,1,591e988ecde7e9276bf9aa4b0cf755a560e73138187eb5b71e2d87dd843cbe25,2025-04-25T15:15:37.640000 +CVE-2025-3640,1,1,859eeb5ca538cc9609daa0f57bfb173c4c062bf5438e109a0572e4e175e312d2,2025-04-25T15:15:37.757000 +CVE-2025-3641,1,1,d7ced09d557988f3d03673d6158a9cba4ba2b4c8f6b5a36fd90c7068e9f39b3e,2025-04-25T15:15:37.887000 +CVE-2025-3642,1,1,b58524ae75fb0c1ea52ebe6efecec46a031660351cd24908bae81c30facc81be,2025-04-25T15:15:38.013000 +CVE-2025-3643,1,1,29d31905ca4d8a47767b92c8379d23bffddbb1ce482f5cfaeb6b6f4a96cd0115,2025-04-25T15:15:38.147000 +CVE-2025-3644,1,1,c0d7f6ccc2417c81e8f33db9f457bd8cc05a229dc602a014b4ccf8b31aeca770,2025-04-25T15:15:38.280000 +CVE-2025-3645,1,1,745f62b481d4218b210f1e051781b94d0f85c5bddeb53cfe92daa0d1c221718f,2025-04-25T15:15:38.410000 +CVE-2025-3647,1,1,bdf3593bc1009ac99e7220911651b086757fc39b97ca18d69fba0420972903c7,2025-04-25T15:15:38.550000 CVE-2025-3651,0,0,0d88deff7ea7df5b2f76479933db1e164c52ae4da2ee01153c4c1f7101550c92,2025-04-17T20:21:48.243000 CVE-2025-3661,0,0,57a3cd623ae52b068097bac07587daee7447c5e10d2129379d83b4265c5b02fd,2025-04-21T14:23:45.950000 CVE-2025-36625,0,0,45de53deee0dce100ce8c109fcd29d898f18f9e0ae3fd1f38ff75bfff7ae47fe,2025-04-21T14:23:45.950000 @@ -290930,7 +290951,7 @@ CVE-2025-3696,0,0,32f2de58ed96b74775e2c60a486478c10d70019522c35cc3e9b072109db54b CVE-2025-3697,0,0,efc24626d60f226a7c8893f741d68acfce7ef4171b33da45528fa7fe06636210,2025-04-17T20:22:16.240000 CVE-2025-3698,0,0,3410d174ae31c43abb68f418121b89dca3911c4e48575a9281b05507afa201de,2025-04-23T16:25:56.830000 CVE-2025-37087,0,0,a32cfc93639cde0565b8ba96aa9e37c7b9002ed2bfbea62267aca86b19c1b098,2025-04-23T14:15:29.167000 -CVE-2025-37088,0,0,71e133b695e1add0e8b8869552c8d0cfe6f0ddc03af2e189826b44ff9e058128,2025-04-23T14:15:29.307000 +CVE-2025-37088,0,1,71633ca0bded0afe76b62e0125774b335261cca8d10e4cf7c2e40c7ecc23dc6b,2025-04-25T15:15:36.593000 CVE-2025-3723,0,0,b4760de84ab5ad290fe476e11df508c34a5e1ece7a524dc9b4dda1f2e95b557b,2025-04-17T20:21:48.243000 CVE-2025-3724,0,0,3604e5f95b0ccc5cf202d1d68d9ef517bcacb52e6bf4b156e6577be4c7c5f23e,2025-04-17T20:21:48.243000 CVE-2025-3725,0,0,8ec71cb32939874b59fcf524cd8a7503311a419a9177764ff9a7d08a2f806b20,2025-04-17T20:21:48.243000 @@ -291039,7 +291060,7 @@ CVE-2025-3902,0,0,676970333097082de40f6f58233872070947df9bef43bb3df9e412f6058936 CVE-2025-3903,0,0,c819a464552e9e27e8ed2bfdd866426360d2fc34658c9fc1c82fb0c8ffcfc0a1,2025-04-23T19:16:25.843000 CVE-2025-3904,0,0,0d6553172301a91027b8c3c2558169e5d5696a7e7eb460e09b39ca21f58cb939,2025-04-23T19:16:25.977000 CVE-2025-3907,0,0,f81e129f5f652610151f5866cb425f616cfd83cdc084a2f30c48e0083539d88e,2025-04-23T18:16:03.620000 -CVE-2025-3912,1,1,901e67c14b99b1df95fb427fedf0205e55435551b230eb40d3ab7b801534a4de,2025-04-25T12:15:17.243000 +CVE-2025-3912,0,0,901e67c14b99b1df95fb427fedf0205e55435551b230eb40d3ab7b801534a4de,2025-04-25T12:15:17.243000 CVE-2025-3923,0,0,182118b3a4f54e107b68d12918f8a2e69019afc473ce8aee5e35db6077d81a3b,2025-04-25T06:15:46.117000 CVE-2025-39359,0,0,fe1620cebe6a3577f2510d166c3a64f56c7e8a35f76d5fc351e9b3c2125fe136,2025-04-24T16:15:30.737000 CVE-2025-39360,0,0,415da8a72d7f8b017363e845eb01588faa06aeb0917d4cea44c42e1c474de6f5,2025-04-24T16:15:30.877000 @@ -291210,6 +291231,7 @@ CVE-2025-43012,0,0,18e1af789e53f96a6c881eae07096e79716556b48ee757b9a80a5d7ad315f CVE-2025-43013,0,0,cea29fefbb7874147d20ca0439a948894c9ed92ca59da3ffe37724562ec07c4b,2025-04-23T15:29:33.910000 CVE-2025-43014,0,0,8c8e187893b05115834c1fe60888f6689d95da1f55e6603f1b98a0a40089dd30,2025-04-23T16:11:35.837000 CVE-2025-43015,0,0,2a48e113361cb9a0483ab563a6b6e0e9918b5505e9e0f6b69858ea7bf2701b9d,2025-04-17T20:21:05.203000 +CVE-2025-43016,1,1,d4e5ad3758c737aa4cd5c4bfda5a881ca8580212e69ffa040608a171f6d0e29c,2025-04-25T15:15:39.260000 CVE-2025-43703,0,0,9ffdd9596bfa1e88ec9059e0286523ec84cddbc80b74fbe08d9a126526684bcf,2025-04-17T20:21:48.243000 CVE-2025-43704,0,0,93215b502ded5b759f01e8bfd4bceefdbd3e881e2349bfb7d79f62333fd912ac,2025-04-17T20:21:48.243000 CVE-2025-43708,0,0,dcc5cc9a4e3747e1ffafbd764dd9d656ce28ca0c166ce05480007b6731988175,2025-04-17T20:21:48.243000 @@ -291220,6 +291242,7 @@ CVE-2025-43855,0,0,4d028e3310f63e7b38c21bf23731ae08e632de948592957426a9b77ab2fde CVE-2025-43858,0,0,be917ba81d6a4d272a488bb23a25073002401f8c107bf400145b77cd525a018b,2025-04-24T19:15:46.947000 CVE-2025-43859,0,0,7a013095b013ce1413e569741ba7a3ea7943a5c2c3b80bb4c5fde50bae191b7b,2025-04-24T19:15:47.060000 CVE-2025-43861,0,0,ababfbf43410d468d3b1cf5988fc1b1169850e57998f458994c591d91a5d40a5,2025-04-24T21:15:24.310000 +CVE-2025-43862,1,1,d337541dda278a63b48e56dbf2722874cf10bdc8cbe8b3446906dd70a2f92f14,2025-04-25T15:15:39.920000 CVE-2025-43864,0,0,d35200039b663ce38e5be44c2d98b816373656933116778671f27ce1e5e5fb63,2025-04-25T01:15:43.117000 CVE-2025-43865,0,0,fe3b7d3e8117adbc9d9fe73a5b54d5c41ecdb20fcc9aa86eb767a47e7d2934d0,2025-04-25T01:15:43.270000 CVE-2025-43893,0,0,ce2184c9570a27f32b1c53e1a7eb084bc072ba61bfa0569a85000898bdc56f02,2025-04-19T03:15:14.017000 @@ -291241,7 +291264,7 @@ CVE-2025-43921,0,0,860aba6699eab477405736f86cb620ec9a60d3be813cd4186e40b0b2a1086 CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000 CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000 CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000 -CVE-2025-43946,0,0,6b506e54a200df802ce1259ba4eaebc57f351718014e173df406945d407ec7f6,2025-04-23T14:15:29.630000 +CVE-2025-43946,0,1,30b1b66631e81e9cea6f13a15d14a3693a662f0512102eed75d0a09582b31af1,2025-04-25T15:15:40.050000 CVE-2025-43947,0,0,45dc55ef8d0feb1382386c26465395b874bd89f0f1e3ab24423e3a96653b3c87,2025-04-23T14:08:13.383000 CVE-2025-43948,0,0,efd3931cdaeca2d3b1dbf5f3f44aee732afa37b700ca8822c69f897fc0f80984,2025-04-23T14:08:13.383000 CVE-2025-43949,0,0,c8d8666427b910512729fd59d7334c67c298b545b1a137043425731a8a0336b5,2025-04-23T14:15:29.783000 @@ -291331,6 +291354,8 @@ CVE-2025-46417,0,0,90720a97861fe0edf996810e9f8b24cf965d682b200404a75f2856619f814 CVE-2025-46419,0,0,1a34f5342e64579d123a08cc24aef78b0d6763ffebef4f99c528ca3f0aa12df1,2025-04-24T01:15:51.360000 CVE-2025-46420,0,0,abc71b52b849f726ff8be64ef3abd516b554526457a7cbece372d17d3340fe09,2025-04-24T13:15:45.553000 CVE-2025-46421,0,0,5cbb299ad045c28edb58aa77219a50cf2d13612c6ce8ead13af817b802d58002,2025-04-24T13:15:45.703000 +CVE-2025-46432,1,1,aecf65fba42e2dbb1bf1a1ee12de0d9f753c6cf20c38d0c95ae6a6c2293b6b2b,2025-04-25T15:15:40.347000 +CVE-2025-46433,1,1,ee6c70859808495f920cc4802ce386ae1292288f3eb3ec4c12efa1fd6aaec717,2025-04-25T15:15:40.480000 CVE-2025-46435,0,0,d48bb27c598239c885ff66faff400a31ddacfc2e77f794e65e2deb46d7af7cd2,2025-04-24T16:15:34.613000 CVE-2025-46436,0,0,8e2edf5d6c15d988e2c57e12c5b455814b906ca6ebe9a781e03fd35cc0e8207c,2025-04-24T16:15:34.770000 CVE-2025-46438,0,0,7e9dd8bb37207b4aaedd1211fdc8230dca9a2429529669a208734dc2ddfe6eb0,2025-04-24T16:15:34.910000 @@ -291420,3 +291445,4 @@ CVE-2025-46599,0,0,507c3921a2341d2bbda9e73d2f3cef8c521c3ee588d0088efd73881d2da1d CVE-2025-46613,0,0,fb63aa932416287c8229af8ca941c8fc1e3cc17d68277bca805056b66b2de1ef,2025-04-25T06:15:46.273000 CVE-2025-46616,0,0,6f77a3deea80513a0e444e82f1b969313a83fb972c392a9b077d9c4200172c06,2025-04-25T07:15:48.643000 CVE-2025-46617,0,0,8264fe3c72bbb8b882b06aaed5126806c5af44dc16714e5ba80c3b2cd476f946,2025-04-25T07:15:48.837000 +CVE-2025-46618,1,1,4e5b2699bfdedc6ad58a2dd050f1132b14684461f25e6c5475feda78ee59e7e9,2025-04-25T15:15:40.957000