From 5ab3091c1c979f19efd2ff9d1cfcded95887e854 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 15 Apr 2025 14:04:31 +0000 Subject: [PATCH] Auto-Update: 2025-04-15T14:00:20.768944+00:00 --- CVE-2017/CVE-2017-200xx/CVE-2017-20022.json | 22 ++- CVE-2022/CVE-2022-28xx/CVE-2022-2846.json | 24 ++- CVE-2022/CVE-2022-468xx/CVE-2022-46853.json | 6 +- CVE-2023/CVE-2023-36xx/CVE-2023-3640.json | 6 +- CVE-2024/CVE-2024-136xx/CVE-2024-13610.json | 35 +++- CVE-2025/CVE-2025-267xx/CVE-2025-26741.json | 56 ++++++ CVE-2025/CVE-2025-267xx/CVE-2025-26743.json | 56 ++++++ CVE-2025/CVE-2025-267xx/CVE-2025-26744.json | 56 ++++++ CVE-2025/CVE-2025-267xx/CVE-2025-26745.json | 56 ++++++ CVE-2025/CVE-2025-268xx/CVE-2025-26889.json | 56 ++++++ CVE-2025/CVE-2025-268xx/CVE-2025-26894.json | 56 ++++++ CVE-2025/CVE-2025-269xx/CVE-2025-26942.json | 56 ++++++ CVE-2025/CVE-2025-269xx/CVE-2025-26944.json | 56 ++++++ CVE-2025/CVE-2025-269xx/CVE-2025-26954.json | 56 ++++++ CVE-2025/CVE-2025-269xx/CVE-2025-26955.json | 56 ++++++ CVE-2025/CVE-2025-269xx/CVE-2025-26958.json | 56 ++++++ CVE-2025/CVE-2025-269xx/CVE-2025-26959.json | 56 ++++++ CVE-2025/CVE-2025-269xx/CVE-2025-26982.json | 56 ++++++ CVE-2025/CVE-2025-269xx/CVE-2025-26990.json | 56 ++++++ CVE-2025/CVE-2025-269xx/CVE-2025-26992.json | 56 ++++++ CVE-2025/CVE-2025-283xx/CVE-2025-28395.json | 39 +++- CVE-2025/CVE-2025-283xx/CVE-2025-28398.json | 39 +++- CVE-2025/CVE-2025-291xx/CVE-2025-29150.json | 27 ++- CVE-2025/CVE-2025-293xx/CVE-2025-29389.json | 32 ++- CVE-2025/CVE-2025-298xx/CVE-2025-29868.json | 43 +++- CVE-2025/CVE-2025-301xx/CVE-2025-30177.json | 46 ++++- CVE-2025/CVE-2025-302xx/CVE-2025-30284.json | 208 +++++++++++++++++++- CVE-2025/CVE-2025-309xx/CVE-2025-30962.json | 56 ++++++ CVE-2025/CVE-2025-309xx/CVE-2025-30964.json | 56 ++++++ CVE-2025/CVE-2025-309xx/CVE-2025-30965.json | 56 ++++++ CVE-2025/CVE-2025-309xx/CVE-2025-30985.json | 56 ++++++ CVE-2025/CVE-2025-30xx/CVE-2025-3035.json | 32 ++- CVE-2025/CVE-2025-310xx/CVE-2025-31011.json | 56 ++++++ CVE-2025/CVE-2025-31xx/CVE-2025-3181.json | 84 +++++++- CVE-2025/CVE-2025-31xx/CVE-2025-3182.json | 82 +++++++- CVE-2025/CVE-2025-31xx/CVE-2025-3183.json | 84 +++++++- CVE-2025/CVE-2025-31xx/CVE-2025-3184.json | 84 +++++++- CVE-2025/CVE-2025-31xx/CVE-2025-3185.json | 82 +++++++- CVE-2025/CVE-2025-321xx/CVE-2025-32102.json | 29 +++ CVE-2025/CVE-2025-321xx/CVE-2025-32103.json | 29 +++ CVE-2025/CVE-2025-329xx/CVE-2025-32929.json | 56 ++++++ CVE-2025/CVE-2025-329xx/CVE-2025-32943.json | 8 +- CVE-2025/CVE-2025-329xx/CVE-2025-32944.json | 60 ++++++ CVE-2025/CVE-2025-329xx/CVE-2025-32945.json | 60 ++++++ CVE-2025/CVE-2025-329xx/CVE-2025-32946.json | 60 ++++++ CVE-2025/CVE-2025-36xx/CVE-2025-3608.json | 29 +++ CVE-2025/CVE-2025-36xx/CVE-2025-3622.json | 14 +- README.md | 63 ++++-- _state.csv | 81 +++++--- 49 files changed, 2463 insertions(+), 121 deletions(-) create mode 100644 CVE-2025/CVE-2025-267xx/CVE-2025-26741.json create mode 100644 CVE-2025/CVE-2025-267xx/CVE-2025-26743.json create mode 100644 CVE-2025/CVE-2025-267xx/CVE-2025-26744.json create mode 100644 CVE-2025/CVE-2025-267xx/CVE-2025-26745.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26889.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26894.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26942.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26944.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26954.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26955.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26958.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26959.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26982.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26990.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26992.json create mode 100644 CVE-2025/CVE-2025-309xx/CVE-2025-30962.json create mode 100644 CVE-2025/CVE-2025-309xx/CVE-2025-30964.json create mode 100644 CVE-2025/CVE-2025-309xx/CVE-2025-30965.json create mode 100644 CVE-2025/CVE-2025-309xx/CVE-2025-30985.json create mode 100644 CVE-2025/CVE-2025-310xx/CVE-2025-31011.json create mode 100644 CVE-2025/CVE-2025-321xx/CVE-2025-32102.json create mode 100644 CVE-2025/CVE-2025-321xx/CVE-2025-32103.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32929.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32944.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32945.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32946.json create mode 100644 CVE-2025/CVE-2025-36xx/CVE-2025-3608.json diff --git a/CVE-2017/CVE-2017-200xx/CVE-2017-20022.json b/CVE-2017/CVE-2017-200xx/CVE-2017-20022.json index 5c660f147e4..c5257b5270c 100644 --- a/CVE-2017/CVE-2017-200xx/CVE-2017-20022.json +++ b/CVE-2017/CVE-2017-200xx/CVE-2017-20022.json @@ -2,7 +2,7 @@ "id": "CVE-2017-20022", "sourceIdentifier": "cna@vuldb.com", "published": "2022-06-09T23:15:08.110", - "lastModified": "2024-11-21T03:22:28.090", + "lastModified": "2025-04-15T13:15:45.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2022/CVE-2022-28xx/CVE-2022-2846.json b/CVE-2022/CVE-2022-28xx/CVE-2022-2846.json index 276a77f4949..99f6438f968 100644 --- a/CVE-2022/CVE-2022-28xx/CVE-2022-2846.json +++ b/CVE-2022/CVE-2022-28xx/CVE-2022-2846.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2846", "sourceIdentifier": "cna@vuldb.com", "published": "2022-08-16T19:15:09.107", - "lastModified": "2024-11-21T07:01:47.917", + "lastModified": "2025-04-15T13:15:48.600", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46853.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46853.json index a44436878a2..1360202a1ee 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46853.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46853.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46853", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-23T14:15:09.410", - "lastModified": "2024-11-21T07:31:10.500", + "lastModified": "2025-04-15T13:10:20.330", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:radiustheme:post_grid:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:radiustheme:the_post_grid:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "5.0.5", - "matchCriteriaId": "7CB6D8AE-5A86-45A3-BE0A-0B36D4257DB6" + "matchCriteriaId": "0C863A46-9043-4CFD-A8A9-9AF72936CFDF" } ] } diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3640.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3640.json index 8d2fb79b5da..535cca74c90 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3640.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3640.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3640", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:13.063", - "lastModified": "2024-11-21T08:17:43.823", + "lastModified": "2025-04-15T12:15:17.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,6 +115,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2023:6583", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-3640", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13610.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13610.json index 49670498f09..20ea035cee5 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13610.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13610.json @@ -2,20 +2,51 @@ "id": "CVE-2024-13610", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-15T06:15:43.443", - "lastModified": "2025-04-15T06:15:43.443", + "lastModified": "2025-04-15T13:15:54.463", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Simple Social Media Share Buttons WordPress plugin before 6.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + }, + { + "lang": "es", + "value": "El complemento Simple Social Media Share Buttons de WordPress anterior a la versi\u00f3n 6.0.0 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados como el administrador realizar ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/85229528-1110-4d45-b972-8bbcba003a1f/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/85229528-1110-4d45-b972-8bbcba003a1f/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26741.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26741.json new file mode 100644 index 00000000000..75354a5b07c --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26741.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26741", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:19.230", + "lastModified": "2025-04-15T12:15:19.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in AWEOS GmbH Email Notifications for Updates allows Privilege Escalation. This issue affects Email Notifications for Updates: from n/a through 1.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-update-mail-notification/vulnerability/wordpress-email-notifications-for-updates-1-1-6-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26743.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26743.json new file mode 100644 index 00000000000..8b2ac74ea89 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26743.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26743", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:19.407", + "lastModified": "2025-04-15T12:15:19.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TC.K Advance WP Query Search Filter allows Reflected XSS. This issue affects Advance WP Query Search Filter: from n/a through 1.0.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/advance-wp-query-search-filter/vulnerability/wordpress-advance-wp-query-search-filter-plugin-1-0-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26744.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26744.json new file mode 100644 index 00000000000..67036db7913 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26744.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26744", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:19.587", + "lastModified": "2025-04-15T12:15:19.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound JetBlog allows DOM-Based XSS. This issue affects JetBlog: from n/a through 2.4.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/jet-blog/vulnerability/wordpress-jetblog-plugin-2-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-267xx/CVE-2025-26745.json b/CVE-2025/CVE-2025-267xx/CVE-2025-26745.json new file mode 100644 index 00000000000..06ae9ac8128 --- /dev/null +++ b/CVE-2025/CVE-2025-267xx/CVE-2025-26745.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26745", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:19.743", + "lastModified": "2025-04-15T12:15:19.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RSTheme RS Elements Elementor Addon allows Stored XSS. This issue affects RS Elements Elementor Addon: from n/a through 1.1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rselements-lite/vulnerability/wordpress-rs-elements-elementor-addon-plugin-1-1-5-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26889.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26889.json new file mode 100644 index 00000000000..a821f8b0735 --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26889.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26889", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:19.907", + "lastModified": "2025-04-15T12:15:19.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound hockeydata LOS allows PHP Local File Inclusion. This issue affects hockeydata LOS: from n/a through 1.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/hockeydata-los/vulnerability/wordpress-hockeydata-los-plugin-1-2-4-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26894.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26894.json new file mode 100644 index 00000000000..0651b0c0d93 --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26894.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26894", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:20.073", + "lastModified": "2025-04-15T12:15:20.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Coming Soon, Maintenance Mode allows PHP Local File Inclusion. This issue affects Coming Soon, Maintenance Mode: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/site-mode/vulnerability/wordpress-coming-soon-maintenance-mode-plugin-1-1-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26942.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26942.json new file mode 100644 index 00000000000..f85f0c94bac --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26942.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26942", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:20.243", + "lastModified": "2025-04-15T12:15:20.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in NotFound JetTricks allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects JetTricks: from n/a through 1.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/jet-tricks/vulnerability/wordpress-jettricks-1-5-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26944.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26944.json new file mode 100644 index 00000000000..8d501fd88b5 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26944.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26944", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:20.413", + "lastModified": "2025-04-15T12:15:20.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in NotFound JetPopup allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects JetPopup: from n/a through 2.0.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/jet-popup/vulnerability/wordpress-jetpopup-2-0-11-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26954.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26954.json new file mode 100644 index 00000000000..49e6f0dbe96 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26954.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26954", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:20.567", + "lastModified": "2025-04-15T12:15:20.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 1pluginjquery ZooEffect allows Reflected XSS. This issue affects ZooEffect: from n/a through 1.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/1-jquery-photo-gallery-slideshow-flash/vulnerability/wordpress-zooeffect-plugin-1-11-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26955.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26955.json new file mode 100644 index 00000000000..315147585cf --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26955.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26955", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:20.713", + "lastModified": "2025-04-15T12:15:20.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in VW Themes Industrial Lite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Industrial Lite: from n/a through 1.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/industrial-lite/vulnerability/wordpress-industrial-lite-theme-1-0-8-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26958.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26958.json new file mode 100644 index 00000000000..755f2f20a39 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26958.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26958", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:20.880", + "lastModified": "2025-04-15T12:15:20.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in NotFound JetBlog allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects JetBlog: from n/a through 2.4.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/jet-blog/vulnerability/wordpress-jetblog-2-4-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26959.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26959.json new file mode 100644 index 00000000000..d99cdcb57ed --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26959.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26959", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:21.037", + "lastModified": "2025-04-15T12:15:21.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Qu\u00fd L\u00ea 91 Administrator Z allows Privilege Escalation. This issue affects Administrator Z: from n/a through 2025.03.24." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/administrator-z/vulnerability/wordpress-administrator-z-2025-03-24-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26982.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26982.json new file mode 100644 index 00000000000..20179750978 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26982.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26982", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:21.267", + "lastModified": "2025-04-15T12:15:21.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric-Oliver M\u00e4chler DSGVO Youtube allows DOM-Based XSS. This issue affects DSGVO Youtube: from n/a through 1.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/dsgvo-youtube/vulnerability/wordpress-dsgvo-youtube-plugin-1-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26990.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26990.json new file mode 100644 index 00000000000..300895475e1 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26990.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26990", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:21.597", + "lastModified": "2025-04-15T12:15:21.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in WP Royal Royal Elementor Addons allows Server Side Request Forgery. This issue affects Royal Elementor Addons: from n/a through 1.7.1006." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/royal-elementor-addons/vulnerability/wordpress-royal-elementor-addons-plugin-1-7-1006-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26992.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26992.json new file mode 100644 index 00000000000..0485938d318 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26992.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26992", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:21.773", + "lastModified": "2025-04-15T12:15:21.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fatcatapps Landing Page Cat allows Reflected XSS. This issue affects Landing Page Cat: from n/a through 1.7.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/landing-page-cat/vulnerability/wordpress-landing-page-cat-plugin-1-7-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28395.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28395.json index fc0bf644b55..00e08b8d43a 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28395.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28395.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28395", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-01T14:15:32.917", - "lastModified": "2025-04-14T18:15:28.833", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T12:52:46.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:di-8100_firmware:16.07.26:*:*:*:*:*:*:*", + "matchCriteriaId": "907333CE-439A-4366-BD63-86FAC69BF00F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:di-8100:a1:*:*:*:*:*:*:*", + "matchCriteriaId": "93AD68FC-EB79-4510-BF0F-B091FD97E76C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Fizz-L/Vulnerability-report/blob/main/DI-8100Buffer%20overflow.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-283xx/CVE-2025-28398.json b/CVE-2025/CVE-2025-283xx/CVE-2025-28398.json index 1826a8c202d..1f4bade3d1f 100644 --- a/CVE-2025/CVE-2025-283xx/CVE-2025-28398.json +++ b/CVE-2025/CVE-2025-283xx/CVE-2025-28398.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28398", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-01T14:15:33.047", - "lastModified": "2025-04-14T18:15:28.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T12:51:12.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:di-8100_firmware:16.07.26:*:*:*:*:*:*:*", + "matchCriteriaId": "907333CE-439A-4366-BD63-86FAC69BF00F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:di-8100:a1:*:*:*:*:*:*:*", + "matchCriteriaId": "93AD68FC-EB79-4510-BF0F-B091FD97E76C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Fizz-L/Vulnerability-report/blob/main/DI-8100Buffer%20overflow2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29150.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29150.json index 0fd0b656cf0..b89fe5d829c 100644 --- a/CVE-2025/CVE-2025-291xx/CVE-2025-29150.json +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29150.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29150", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-10T15:16:03.550", - "lastModified": "2025-04-11T15:39:52.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T13:50:15.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bluecms_project:bluecms:1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6A26806A-9CB5-4262-BAD1-049659C2CE2C" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/electroN1chahaha/054a1af22157aa3010e89b3103ad7b9a", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json index 1631c712ada..cfc5580c11b 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29389", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-09T15:16:02.593", - "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T13:42:23.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pbootcms:pbootcms:3.2.9:*:*:*:*:*:*:*", + "matchCriteriaId": "5A19EA43-31D6-4EAC-8C97-CCBA5BE47426" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/jaylan545/0540db17daca2bf42fe5a3ce864300c9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/jaylan545/security/issues/1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29868.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29868.json index 19893f33035..7b8e525b929 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29868.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29868.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29868", "sourceIdentifier": "security@apache.org", "published": "2025-04-01T08:15:14.990", - "lastModified": "2025-04-10T15:16:03.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T13:07:54.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.4.2", + "matchCriteriaId": "29E2B105-1033-4FCE-8F05-20368605017D" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/l7pohw5g03g3qsvrz8pqc9t29mdv5lhf", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/04/01/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/04/02/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/04/10/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30177.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30177.json index 17616ee4b31..9c9263969bc 100644 --- a/CVE-2025/CVE-2025-301xx/CVE-2025-30177.json +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30177.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30177", "sourceIdentifier": "security@apache.org", "published": "2025-04-01T12:15:15.747", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T13:00:12.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.8.0", + "versionEndExcluding": "4.8.6", + "matchCriteriaId": "D9FD8755-3AFF-46F8-A830-FD0BF04B5DB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10.0", + "versionEndExcluding": "4.10.3", + "matchCriteriaId": "874BB2C0-D562-4EC9-A839-BAEED574AD41" + } + ] + } + ] + } + ], "references": [ { "url": "https://camel.apache.org/security/CVE-2025-27636.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://camel.apache.org/security/CVE-2025-29891.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://lists.apache.org/thread/dj79zdgw01j337lr9gvyy4sv8xfyw8py", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json index f43a7f8d21e..9fa3a951fd3 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30284", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:25.980", - "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T13:13:50.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,190 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*", + "matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*", + "matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*", + "matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*", + "matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*", + "matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*", + "matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update14:*:*:*:*:*:*", + "matchCriteriaId": "10616A3A-0C1C-474A-BD7D-A2A5BB870F74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update15:*:*:*:*:*:*", + "matchCriteriaId": "D7DA523E-1D9B-45FD-94D9-D4F9F2B9296B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update16:*:*:*:*:*:*", + "matchCriteriaId": "151AFF8B-F05C-4D27-85FC-DF88E9C11BEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update17:*:*:*:*:*:*", + "matchCriteriaId": "53A0E245-2915-4DFF-AFB5-A12F5C435702" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update18:*:*:*:*:*:*", + "matchCriteriaId": "C5653D18-7534-48A3-819F-9F049A418F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*", + "matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*", + "matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*", + "matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*", + "matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*", + "matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*", + "matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*", + "matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*", + "matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*", + "matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*", + "matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update10:*:*:*:*:*:*", + "matchCriteriaId": "645D1B5F-2DAB-4AB8-A465-AC37FF494F95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update11:*:*:*:*:*:*", + "matchCriteriaId": "ED6D8996-0770-4C9F-BEA5-87EA479D40A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update12:*:*:*:*:*:*", + "matchCriteriaId": "4836086E-3D4A-4A07-A372-382D385CB490" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*", + "matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*", + "matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*", + "matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*", + "matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*", + "matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*", + "matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update8:*:*:*:*:*:*", + "matchCriteriaId": "DB97ADBA-C1A9-4EE0-9509-68CB12358AE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update9:*:*:*:*:*:*", + "matchCriteriaId": "E17C38F0-9B0F-4433-9CBD-6E3D63EA9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2025:-:*:*:*:*:*:*", + "matchCriteriaId": "30779417-D4E5-4A01-BE0E-1CE1D134292A" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30962.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30962.json new file mode 100644 index 00000000000..86acb5f6535 --- /dev/null +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30962.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30962", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:21.957", + "lastModified": "2025-04-15T12:15:21.957", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FS Poster allows Reflected XSS. This issue affects FS Poster: from n/a through 6.5.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fs-poster/vulnerability/wordpress-fs-poster-plugin-6-5-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30964.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30964.json new file mode 100644 index 00000000000..e092aed7172 --- /dev/null +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30964.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30964", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:22.140", + "lastModified": "2025-04-15T12:15:22.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in EPC Photography. This issue affects Photography: from n/a through 7.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/photography/vulnerability/wordpress-photography-theme-7-5-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30965.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30965.json new file mode 100644 index 00000000000..cdd3e14ce97 --- /dev/null +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30965.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30965", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:22.313", + "lastModified": "2025-04-15T12:15:22.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in NotFound WPJobBoard allows Cross Site Request Forgery. This issue affects WPJobBoard: from n/a through n/a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpjobboard/vulnerability/wordpress-wpjobboard-plugin-5-11-1-multiple-cross-site-request-forgery-csrf-vulnerabilities-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-309xx/CVE-2025-30985.json b/CVE-2025/CVE-2025-309xx/CVE-2025-30985.json new file mode 100644 index 00000000000..28d73fd960b --- /dev/null +++ b/CVE-2025/CVE-2025-309xx/CVE-2025-30985.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30985", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:22.463", + "lastModified": "2025-04-15T12:15:22.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in NotFound GNUCommerce allows Object Injection. This issue affects GNUCommerce: from n/a through 1.5.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gnucommerce/vulnerability/wordpress-gnucommerce-plugin-1-5-4-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3035.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3035.json index 9e8845a728d..d84a72e6b30 100644 --- a/CVE-2025/CVE-2025-30xx/CVE-2025-3035.json +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3035.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3035", "sourceIdentifier": "security@mozilla.org", "published": "2025-04-01T13:15:41.893", - "lastModified": "2025-04-10T21:15:49.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T12:55:21.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "137.0", + "matchCriteriaId": "A6CBADD8-E865-41B5-BDDD-1572F97D5176" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1952268", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-20/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31011.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31011.json new file mode 100644 index 00000000000..58acf87f2b9 --- /dev/null +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31011.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31011", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:22.630", + "lastModified": "2025-04-15T12:15:22.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ReichertBrothers SimplyRETS Real Estate IDX allows Reflected XSS. This issue affects SimplyRETS Real Estate IDX: from n/a through 3.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simply-rets/vulnerability/wordpress-simplyrets-real-estate-idx-plugin-3-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3181.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3181.json index 496d9883c9f..84ee9df1b57 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3181.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3181.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3181", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T22:15:21.350", - "lastModified": "2025-04-07T17:15:37.707", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T12:47:18.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,78 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/15", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.303140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.543841", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/p1026/CVE/issues/15", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3182.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3182.json index ae0b08ee477..d80f9437673 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3182.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3182.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3182", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T22:15:21.533", - "lastModified": "2025-04-07T17:15:37.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T12:36:25.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,76 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/16", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303141", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303141", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.543842", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/p1026/CVE/issues/16", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3183.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3183.json index 61d47ba7e0b..f9179a18937 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3183.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3183.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3183", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T22:15:21.723", - "lastModified": "2025-04-07T17:15:38.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T12:30:35.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,78 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/17", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.303142", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303142", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.543843", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/p1026/CVE/issues/17", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3184.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3184.json index a23d435126e..dcf2ea46cd5 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3184.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3184.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3184", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T23:15:38.170", - "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T12:25:42.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,78 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/18", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.303143", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303143", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.543844", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/p1026/CVE/issues/18", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3185.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3185.json index 8a750d771d4..4ea07cca2cc 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3185.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3185.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3185", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T23:15:38.350", - "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T12:22:57.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,76 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/19", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303144", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303144", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.543845", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/p1026/CVE/issues/19", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32102.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32102.json new file mode 100644 index 00000000000..45e7bfd68b8 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32102.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-32102", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-15T13:15:54.783", + "lastModified": "2025-04-15T13:15:54.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://seclists.org/fulldisclosure/2025/Apr/17", + "source": "cve@mitre.org" + }, + { + "url": "https://www.crushftp.com/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.crushftp.com/download/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32103.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32103.json new file mode 100644 index 00000000000..19dad7ad8a2 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32103.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-32103", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-15T13:15:54.893", + "lastModified": "2025-04-15T13:15:54.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows directory traversal via the /WebInterface/function/ URI to read files accessible by SMB at UNC share pathnames, bypassing SecurityManager restrictions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://seclists.org/fulldisclosure/2025/Apr/17", + "source": "cve@mitre.org" + }, + { + "url": "https://www.crushftp.com/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.crushftp.com/download/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32929.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32929.json new file mode 100644 index 00000000000..ca46e39ed10 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32929.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32929", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-15T12:15:22.787", + "lastModified": "2025-04-15T12:15:22.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Dmitry V. (CEO of \"UKR Solution\") Barcode Generator for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Barcode Generator for WooCommerce: from n/a through 2.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/embedding-barcodes-into-product-pages-and-orders/vulnerability/wordpress-barcode-generator-for-woocommerce-plugin-2-0-4-arbitrary-content-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32943.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32943.json index 8c5f3cf7fe2..28aa3aa7d61 100644 --- a/CVE-2025/CVE-2025-329xx/CVE-2025-32943.json +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32943.json @@ -2,7 +2,7 @@ "id": "CVE-2025-32943", "sourceIdentifier": "reefs@jfrog.com", "published": "2025-04-15T11:15:45.690", - "lastModified": "2025-04-15T11:15:45.690", + "lastModified": "2025-04-15T13:15:55.003", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "reefs@jfrog.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://research.jfrog.com/vulnerabilities/peertube-hls-path-traversal/", "source": "reefs@jfrog.com" + }, + { + "url": "https://research.jfrog.com/vulnerabilities/peertube-hls-path-traversal/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32944.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32944.json new file mode 100644 index 00000000000..771a1e04b1a --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32944.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32944", + "sourceIdentifier": "reefs@jfrog.com", + "published": "2025-04-15T13:15:55.100", + "lastModified": "2025-04-15T13:15:55.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The vulnerability allows any authenticated user to cause the PeerTube server to stop functioning in a persistent manner.\u00a0\u00a0If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. If the yauzl library encounters a filename that is considered illegal, it raises an exception that is uncaught by PeerTube, leading to a crash which repeats infinitely on startup." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "reefs@jfrog.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "reefs@jfrog.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1", + "source": "reefs@jfrog.com" + }, + { + "url": "https://research.jfrog.com/vulnerabilities/peertube-archive-persistent-dos/", + "source": "reefs@jfrog.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32945.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32945.json new file mode 100644 index 00000000000..710286ee743 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32945.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32945", + "sourceIdentifier": "reefs@jfrog.com", + "published": "2025-04-15T13:15:55.230", + "lastModified": "2025-04-15T13:15:55.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The vulnerability allows an existing user to add playlists to a different user\u2019s channel using the PeerTube REST API. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "reefs@jfrog.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "reefs@jfrog.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-282" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1", + "source": "reefs@jfrog.com" + }, + { + "url": "https://research.jfrog.com/vulnerabilities/peertube-arbitrary-playlist-creation-rest/", + "source": "reefs@jfrog.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32946.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32946.json new file mode 100644 index 00000000000..54817adff4a --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32946.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32946", + "sourceIdentifier": "reefs@jfrog.com", + "published": "2025-04-15T13:15:55.360", + "lastModified": "2025-04-15T13:15:55.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This vulnerability allows any attacker to add playlists to a different user\u2019s channel using the ActivityPub protocol. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "reefs@jfrog.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "reefs@jfrog.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-282" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1", + "source": "reefs@jfrog.com" + }, + { + "url": "https://research.jfrog.com/vulnerabilities/peertube-arbitrary-playlist-creation-activitypub/", + "source": "reefs@jfrog.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3608.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3608.json new file mode 100644 index 00000000000..059e51839af --- /dev/null +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3608.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-3608", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-04-15T13:15:55.590", + "lastModified": "2025-04-15T13:15:55.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A race condition existed in nsHttpTransaction that could have been exploited to cause memory corruption, potentially leading to an exploitable condition. This vulnerability affects Firefox < 137.0.2." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1951554", + "source": "security@mozilla.org" + }, + { + "url": "https://www.cve.org/CVERecord?id=CVE-2025-3608", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-25/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-36xx/CVE-2025-3622.json b/CVE-2025/CVE-2025-36xx/CVE-2025-3622.json index 0c3217e4ff5..d7356e6da75 100644 --- a/CVE-2025/CVE-2025-36xx/CVE-2025-3622.json +++ b/CVE-2025/CVE-2025-36xx/CVE-2025-3622.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3622", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-15T06:15:44.227", - "lastModified": "2025-04-15T06:15:44.227", + "lastModified": "2025-04-15T13:15:55.687", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Xorbits Inference up to 1.4.1. This issue affects the function load of the file xinference/thirdparty/cosyvoice/cli/model.py. The manipulation leads to deserialization." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad, clasificada como cr\u00edtica, en Xorbits Inference hasta la versi\u00f3n 1.4.1. Este problema afecta la carga de funciones del archivo xinference/thirdparty/cosyvoice/cli/model.py. La manipulaci\u00f3n provoca la deserializaci\u00f3n." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.552245", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/xorbitsai/inference/issues/3190", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 105b33ce1ab..f6305cd2466 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-15T12:00:23.122165+00:00 +2025-04-15T14:00:20.768944+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-15T11:15:45.690000+00:00 +2025-04-15T13:50:15.537000+00:00 ``` ### Last Data Feed Release @@ -33,27 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -289855 +289882 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `27` -- [CVE-2025-1688](CVE-2025/CVE-2025-16xx/CVE-2025-1688.json) (`2025-04-15T11:15:44.140`) -- [CVE-2025-2083](CVE-2025/CVE-2025-20xx/CVE-2025-2083.json) (`2025-04-15T10:15:14.680`) -- [CVE-2025-32943](CVE-2025/CVE-2025-329xx/CVE-2025-32943.json) (`2025-04-15T11:15:45.690`) +- [CVE-2025-26744](CVE-2025/CVE-2025-267xx/CVE-2025-26744.json) (`2025-04-15T12:15:19.587`) +- [CVE-2025-26745](CVE-2025/CVE-2025-267xx/CVE-2025-26745.json) (`2025-04-15T12:15:19.743`) +- [CVE-2025-26889](CVE-2025/CVE-2025-268xx/CVE-2025-26889.json) (`2025-04-15T12:15:19.907`) +- [CVE-2025-26894](CVE-2025/CVE-2025-268xx/CVE-2025-26894.json) (`2025-04-15T12:15:20.073`) +- [CVE-2025-26942](CVE-2025/CVE-2025-269xx/CVE-2025-26942.json) (`2025-04-15T12:15:20.243`) +- [CVE-2025-26944](CVE-2025/CVE-2025-269xx/CVE-2025-26944.json) (`2025-04-15T12:15:20.413`) +- [CVE-2025-26954](CVE-2025/CVE-2025-269xx/CVE-2025-26954.json) (`2025-04-15T12:15:20.567`) +- [CVE-2025-26955](CVE-2025/CVE-2025-269xx/CVE-2025-26955.json) (`2025-04-15T12:15:20.713`) +- [CVE-2025-26958](CVE-2025/CVE-2025-269xx/CVE-2025-26958.json) (`2025-04-15T12:15:20.880`) +- [CVE-2025-26959](CVE-2025/CVE-2025-269xx/CVE-2025-26959.json) (`2025-04-15T12:15:21.037`) +- [CVE-2025-26982](CVE-2025/CVE-2025-269xx/CVE-2025-26982.json) (`2025-04-15T12:15:21.267`) +- [CVE-2025-26990](CVE-2025/CVE-2025-269xx/CVE-2025-26990.json) (`2025-04-15T12:15:21.597`) +- [CVE-2025-26992](CVE-2025/CVE-2025-269xx/CVE-2025-26992.json) (`2025-04-15T12:15:21.773`) +- [CVE-2025-30962](CVE-2025/CVE-2025-309xx/CVE-2025-30962.json) (`2025-04-15T12:15:21.957`) +- [CVE-2025-30964](CVE-2025/CVE-2025-309xx/CVE-2025-30964.json) (`2025-04-15T12:15:22.140`) +- [CVE-2025-30965](CVE-2025/CVE-2025-309xx/CVE-2025-30965.json) (`2025-04-15T12:15:22.313`) +- [CVE-2025-30985](CVE-2025/CVE-2025-309xx/CVE-2025-30985.json) (`2025-04-15T12:15:22.463`) +- [CVE-2025-31011](CVE-2025/CVE-2025-310xx/CVE-2025-31011.json) (`2025-04-15T12:15:22.630`) +- [CVE-2025-32102](CVE-2025/CVE-2025-321xx/CVE-2025-32102.json) (`2025-04-15T13:15:54.783`) +- [CVE-2025-32103](CVE-2025/CVE-2025-321xx/CVE-2025-32103.json) (`2025-04-15T13:15:54.893`) +- [CVE-2025-32929](CVE-2025/CVE-2025-329xx/CVE-2025-32929.json) (`2025-04-15T12:15:22.787`) +- [CVE-2025-32944](CVE-2025/CVE-2025-329xx/CVE-2025-32944.json) (`2025-04-15T13:15:55.100`) +- [CVE-2025-32945](CVE-2025/CVE-2025-329xx/CVE-2025-32945.json) (`2025-04-15T13:15:55.230`) +- [CVE-2025-32946](CVE-2025/CVE-2025-329xx/CVE-2025-32946.json) (`2025-04-15T13:15:55.360`) +- [CVE-2025-3608](CVE-2025/CVE-2025-36xx/CVE-2025-3608.json) (`2025-04-15T13:15:55.590`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `20` -- [CVE-2024-12094](CVE-2024/CVE-2024-120xx/CVE-2024-12094.json) (`2025-04-15T10:15:13.780`) -- [CVE-2025-22371](CVE-2025/CVE-2025-223xx/CVE-2025-22371.json) (`2025-04-15T11:15:45.217`) -- [CVE-2025-22372](CVE-2025/CVE-2025-223xx/CVE-2025-22372.json) (`2025-04-15T11:15:45.380`) -- [CVE-2025-22373](CVE-2025/CVE-2025-223xx/CVE-2025-22373.json) (`2025-04-15T11:15:45.533`) -- [CVE-2025-3579](CVE-2025/CVE-2025-35xx/CVE-2025-3579.json) (`2025-04-15T09:15:13.950`) +- [CVE-2017-20022](CVE-2017/CVE-2017-200xx/CVE-2017-20022.json) (`2025-04-15T13:15:45.220`) +- [CVE-2022-2846](CVE-2022/CVE-2022-28xx/CVE-2022-2846.json) (`2025-04-15T13:15:48.600`) +- [CVE-2022-46853](CVE-2022/CVE-2022-468xx/CVE-2022-46853.json) (`2025-04-15T13:10:20.330`) +- [CVE-2023-3640](CVE-2023/CVE-2023-36xx/CVE-2023-3640.json) (`2025-04-15T12:15:17.840`) +- [CVE-2024-13610](CVE-2024/CVE-2024-136xx/CVE-2024-13610.json) (`2025-04-15T13:15:54.463`) +- [CVE-2025-28395](CVE-2025/CVE-2025-283xx/CVE-2025-28395.json) (`2025-04-15T12:52:46.433`) +- [CVE-2025-28398](CVE-2025/CVE-2025-283xx/CVE-2025-28398.json) (`2025-04-15T12:51:12.750`) +- [CVE-2025-29150](CVE-2025/CVE-2025-291xx/CVE-2025-29150.json) (`2025-04-15T13:50:15.537`) +- [CVE-2025-29389](CVE-2025/CVE-2025-293xx/CVE-2025-29389.json) (`2025-04-15T13:42:23.447`) +- [CVE-2025-29868](CVE-2025/CVE-2025-298xx/CVE-2025-29868.json) (`2025-04-15T13:07:54.393`) +- [CVE-2025-30177](CVE-2025/CVE-2025-301xx/CVE-2025-30177.json) (`2025-04-15T13:00:12.587`) +- [CVE-2025-30284](CVE-2025/CVE-2025-302xx/CVE-2025-30284.json) (`2025-04-15T13:13:50.853`) +- [CVE-2025-3035](CVE-2025/CVE-2025-30xx/CVE-2025-3035.json) (`2025-04-15T12:55:21.203`) +- [CVE-2025-3181](CVE-2025/CVE-2025-31xx/CVE-2025-3181.json) (`2025-04-15T12:47:18.723`) +- [CVE-2025-3182](CVE-2025/CVE-2025-31xx/CVE-2025-3182.json) (`2025-04-15T12:36:25.193`) +- [CVE-2025-3183](CVE-2025/CVE-2025-31xx/CVE-2025-3183.json) (`2025-04-15T12:30:35.003`) +- [CVE-2025-3184](CVE-2025/CVE-2025-31xx/CVE-2025-3184.json) (`2025-04-15T12:25:42.497`) +- [CVE-2025-3185](CVE-2025/CVE-2025-31xx/CVE-2025-3185.json) (`2025-04-15T12:22:57.350`) +- [CVE-2025-32943](CVE-2025/CVE-2025-329xx/CVE-2025-32943.json) (`2025-04-15T13:15:55.003`) +- [CVE-2025-3622](CVE-2025/CVE-2025-36xx/CVE-2025-3622.json) (`2025-04-15T13:15:55.687`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0b5b19c3774..84719b75829 100644 --- a/_state.csv +++ b/_state.csv @@ -102375,7 +102375,7 @@ CVE-2017-20019,0,0,683a56b6abe009a4e6c1169eeea2ad6e50396b62a1071c31a68087d3cca0a CVE-2017-2002,0,0,9afd8990d44d2484aebcdca634b02c6ff87be1e6fc1c70f894728c54a8e9d7c0,2023-11-07T02:43:26.690000 CVE-2017-20020,0,0,ddc154de59f9c868fc0bbcbfa8f648bf50d15a545d61406985b6cbc407c8ab36,2024-11-21T03:22:27.827000 CVE-2017-20021,0,0,768b307da8c132d7530b1123bab87655cad9a898538e81cbb2c6b418fe25a156,2024-11-21T03:22:27.953000 -CVE-2017-20022,0,0,91dab59333128101b23212e7415a18d44527ede00e7f216aedfa2463a2a95329,2024-11-21T03:22:28.090000 +CVE-2017-20022,0,1,51a5bdc917b95e74452f82686f127303dfc5e1f615f348e9211c75ef850dd117,2025-04-15T13:15:45.220000 CVE-2017-20023,0,0,6c1ea16a6f41a1f22bda81b99c03c212e564149aafd9760d9594f1ff47f07d6e,2024-11-21T03:22:28.220000 CVE-2017-20024,0,0,eb70f202042b4262705ffa3e79f04cd7fb65a94d5c2ffc0a3182330b75ac26f9,2024-11-21T03:22:28.357000 CVE-2017-20025,0,0,a254a2c0a691282e1725ca8af5505d9e915f19f6b3577a9cdc86bf0b2f883d72,2024-11-21T03:22:28.493000 @@ -197311,7 +197311,7 @@ CVE-2022-28450,0,0,902ef43b7befda46c35d8785897e3fc5b5418637614fd5787f7649f60f024 CVE-2022-28451,0,0,ffb05d569011f6b22e8b805c206434cda860602b26d93d7c7bc8614ee72d3fa1,2024-11-21T06:57:22.743000 CVE-2022-28452,0,0,90ebd6d6131edb981e7d90ce735f1c1503bfafe42cfaf846642b36683fc1a15b,2024-11-21T06:57:22.897000 CVE-2022-28454,0,0,d2822d1e28973a3d23caad3102bc902e1f70acea584395e8d5f72e28c76561fc,2024-11-21T06:57:23.043000 -CVE-2022-2846,0,0,a000c56af61410d68cbea02b0aa6b8b05976a0c9cf6b34b80668830f18be798a,2024-11-21T07:01:47.917000 +CVE-2022-2846,0,1,55b13f77a85e10206206c0b1b4f83d4de4a63330f2d4673a0357cbd19adbc4aa,2025-04-15T13:15:48.600000 CVE-2022-28461,0,0,eeba39462648912bc271d3540feb028bf0e88ed4e46938a4c73d6e50bca2309f,2024-11-21T06:57:23.193000 CVE-2022-28462,0,0,6d195adf1051f5da9495d4323f8470f7ac3778960c39acdb9c65e7d06dd131d1,2024-11-21T06:57:23.343000 CVE-2022-28463,0,0,b3f68ad17257b50142d434ae1c24ebdcbe3d90fe8ae16618ff8eff444d208882,2024-11-21T06:57:23.483000 @@ -211640,7 +211640,7 @@ CVE-2022-4685,0,0,f811885dae02c5392d6262d2ce12d3efc8cce3de17cc4b2f0f68d631d60d55 CVE-2022-46850,0,0,1ee7230cd0ce68747cdc4c15d295683ec86f9c361c32306e65b18b714c4fb38c,2024-11-21T07:31:10.100000 CVE-2022-46851,0,0,4a1db3251a0659832fecab1e76f8718c9cb41559e0349c62362e9b3203e01012,2024-11-21T07:31:10.240000 CVE-2022-46852,0,0,d62f8845c68f8f8ad6e6e03680fd3d668f653f71cbe178c609fb50b16bba7682,2024-11-21T07:31:10.377000 -CVE-2022-46853,0,0,597ccea55c1d3761b9a080e5f64f901f6064f48f6a15ce6a136c5a2f910a7111,2024-11-21T07:31:10.500000 +CVE-2022-46853,0,1,32abb78ff89d3fda6c8fdbaf825c5f057c2942b788ec490ccf7e8ad86f4a8269,2025-04-15T13:10:20.330000 CVE-2022-46854,0,0,d381d825968efa10033cef77f8bb8812957b4f8331dc8462132ed31e02e39d2d,2024-11-21T07:31:10.627000 CVE-2022-46855,0,0,67f8e0843ed691e23edcc11c7c4a6b8cf6e871728a48c0617b73618d68161f94,2024-11-21T07:31:10.750000 CVE-2022-46856,0,0,2a65047cf34cf7582390923064fe75323c8ee899ba58c16a39f6018116f42c5b,2024-11-21T07:31:10.890000 @@ -229018,7 +229018,7 @@ CVE-2023-36396,0,0,e830a5b2836398121cc1babf25a6160e95fed26a5fdcadcc50a99c5855116 CVE-2023-36397,0,0,9f1524240de0fc258e50e8dd3cdb705a4624ff7e6f7a580d78a12d9c9c0f8199,2024-11-21T08:09:40.507000 CVE-2023-36398,0,0,69eff38d70f40d33f0334de39d0896cdccc5d65936ab3f331dd107a771106637,2024-11-21T08:09:40.653000 CVE-2023-36399,0,0,834680537442f52fe693618867ce29cd8f2d006f17004f0a1f0b4035ac58527c,2024-11-21T08:09:40.783000 -CVE-2023-3640,0,0,7c218bc64338d12981b8f04d38477795ef979ead89c50d6699585256b667c95b,2024-11-21T08:17:43.823000 +CVE-2023-3640,0,1,52e6c4aaabd1940fde11057b2dbb2eb1fb9331b7d1f0ca4ce868671d356ad7fe,2025-04-15T12:15:17.840000 CVE-2023-36400,0,0,6a89060e5ecb3bb2f8dc431f6bbc50f27e642dc3a24fa99f850e64eb4bac1d7d,2024-11-21T08:09:40.880000 CVE-2023-36401,0,0,08d1769059b8015b4b01fb9cb51405bd146a5d0afb0d9f0c65fa2b9da8dd413c,2024-11-21T08:09:41.010000 CVE-2023-36402,0,0,42148c391faf42c04e20d58f46db408d6dd6426fb764fbb5d2415386aadb0e6e,2024-11-21T08:09:41.167000 @@ -246594,7 +246594,7 @@ CVE-2024-1209,0,0,0c11632b4f799f8334de1fe031a18ed75abc1306137789706f83e79036cdbf CVE-2024-12090,0,0,3ae49935c044b86a3444ecb09701dd060f603a46c2ce1e27c4f8226f9377436d,2024-12-16T15:15:06.393000 CVE-2024-12091,0,0,35c9100407a2a2f03cc09233dbdc35208e548ffdd088d484bb9b374c740b5bc0,2024-12-16T15:15:06.540000 CVE-2024-12092,0,0,6cedbb52bdc4fd872b35781acb98ac9a9b54d520c5d29f314ba42350997260f9,2024-12-16T15:15:06.677000 -CVE-2024-12094,0,1,12c81bd6e44afba106aa5b9c1f1003a5bf1fbf3bef13df97a3697ccb2bca6566,2025-04-15T10:15:13.780000 +CVE-2024-12094,0,0,12c81bd6e44afba106aa5b9c1f1003a5bf1fbf3bef13df97a3697ccb2bca6566,2025-04-15T10:15:13.780000 CVE-2024-12095,0,0,266981a4f802a4e630b12ac2741c69386abcb730aae3bae3718e0ed36165b300,2025-02-11T02:15:33.547000 CVE-2024-12096,0,0,a0b37dcc639d983cbff8481184c987ae3b7851e6c867f94b52bee5fdf38bc784,2024-12-24T17:15:07.497000 CVE-2024-12097,0,0,080558aa7b3ac1febe350d71d1f75d062875ebd1cc067888fb9586ec0ac95026,2025-03-05T14:15:35.280000 @@ -248096,7 +248096,7 @@ CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e552 CVE-2024-13608,0,0,b8b173401de3e1097c36a401f8928ae8cd5257912fc8cac1e3eea9f3234c491d,2025-02-19T19:15:14.260000 CVE-2024-13609,0,0,007c027106c3ec1d23edeaef367a828bff90431ee7cff957b7b00cd86e9cc2ee,2025-02-21T16:06:13.673000 CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000 -CVE-2024-13610,0,0,780aaf2a13dacf29d1830d4a86a4feefb0399e74ffb5bb7c5e9d9115d0d55015,2025-04-15T06:15:43.443000 +CVE-2024-13610,0,1,8b94fee0225fcd3b82e7fc76c2b19eca775fc2e8fd9448ca30db591247e0bcb2,2025-04-15T13:15:54.463000 CVE-2024-13611,0,0,12cf0d23fdb6ecb0f110f9a143d60d61370605283cf62e7faa4a9aec63988bc1,2025-03-01T09:15:09.220000 CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000 CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000 @@ -282391,7 +282391,7 @@ CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f7 CVE-2025-1683,0,0,bd65547481d5838793e5ad335f0bed73820ac4e81083a338100991ba4dbdb8f6,2025-03-13T10:15:19.687000 CVE-2025-1686,0,0,d1ef42202e7d4a5987e7a7fded4c55f6d574235579a6aece0e74834a9611412f,2025-04-07T18:29:22.970000 CVE-2025-1687,0,0,553889bbf1832e8d0246ba505a729ffeb25a6379aca1ca1f8f3f4851031d21de,2025-02-28T00:15:36.240000 -CVE-2025-1688,1,1,5c6a06bac422adb33706be8471e71dc0fb7c545a86012640310ae7a34b701c10,2025-04-15T11:15:44.140000 +CVE-2025-1688,0,0,5c6a06bac422adb33706be8471e71dc0fb7c545a86012640310ae7a34b701c10,2025-04-15T11:15:44.140000 CVE-2025-1689,0,0,ab0c739015e868491c3393a9dbae0818d17aadfd3d893b02587a47ce8b53dda1,2025-03-11T16:19:41.870000 CVE-2025-1690,0,0,8515e3753c09328c692a367a40f4a48932e87850b11ca7360289773890aa45cb,2025-03-11T15:59:35.800000 CVE-2025-1691,0,0,5eec1cea57e35f579c692b6064aead03fa43885ba22ff953ac9e969443e43853,2025-02-27T16:15:38.610000 @@ -282808,7 +282808,7 @@ CVE-2025-2078,0,0,9de7f9d36f257c6e4ade1283dce5bdc5d09f9fe37ce0133e41f71eebe0b83d CVE-2025-2079,0,0,1df99b44115761c768e37334a26d3048ad67e1a5d7d245b0266a3de82699255e,2025-03-13T17:15:38.080000 CVE-2025-2080,0,0,8997dd07180b59c809f3df794229cdf89e46a6b355c2dafb103afdfc1a28dd39,2025-03-13T17:15:38.253000 CVE-2025-2081,0,0,4bcbb760543adfc2793fb421232d69f0d37c0297321a5cb193e8d3ca3a30e752,2025-03-13T17:15:38.420000 -CVE-2025-2083,1,1,b56ebbfb64e690ba283af5695296a4a84125b08da3edddfa6c1f4a6e681671a4,2025-04-15T10:15:14.680000 +CVE-2025-2083,0,0,b56ebbfb64e690ba283af5695296a4a84125b08da3edddfa6c1f4a6e681671a4,2025-04-15T10:15:14.680000 CVE-2025-2084,0,0,9186874e9417709e91bfbc0560be14cc85e2d2f24397f030f63236f2d997e78b,2025-03-12T17:20:12.987000 CVE-2025-2085,0,0,cdc776ce557f1f5be020949a2de79ef2cb25d7baf89cebb5bb3d5d1806b66fad,2025-03-13T15:23:29.823000 CVE-2025-2086,0,0,4e4362d5771bd0746a87b792e272a1c98aa3e837b1c239bf63f7ebc27efa4148,2025-03-13T16:05:15.390000 @@ -283956,9 +283956,9 @@ CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9 CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000 CVE-2025-2237,0,0,6c579bdd62bb8bda18ad2566fa6cb9554676ec322606aaab27d5422395dc3d2a,2025-04-01T20:26:11.547000 CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000 -CVE-2025-22371,0,1,0fd515925b08583f66cf085b616128c74a1f3ca917aaf620b57021f2d4ed8aeb,2025-04-15T11:15:45.217000 -CVE-2025-22372,0,1,75369389960d3f21f4b6bbb162c3c9c860956b812ae91586aca01dac2b81e9e1,2025-04-15T11:15:45.380000 -CVE-2025-22373,0,1,b4963d7ab520a3ca5c3658c16dccdae3f07c2db90137181fcb67a712fe2c95e6,2025-04-15T11:15:45.533000 +CVE-2025-22371,0,0,0fd515925b08583f66cf085b616128c74a1f3ca917aaf620b57021f2d4ed8aeb,2025-04-15T11:15:45.217000 +CVE-2025-22372,0,0,75369389960d3f21f4b6bbb162c3c9c860956b812ae91586aca01dac2b81e9e1,2025-04-15T11:15:45.380000 +CVE-2025-22373,0,0,b4963d7ab520a3ca5c3658c16dccdae3f07c2db90137181fcb67a712fe2c95e6,2025-04-15T11:15:45.533000 CVE-2025-22374,0,0,3c76c0c310d0a27c4ffac60f4f224c77b792b9b62909428eaeef4914314662fa,2025-04-11T15:39:52.920000 CVE-2025-22375,0,0,ad41e29f59774e7ec2e9cb8e8af4d844651a9cedc9ff6f6b9f174f11c786065a,2025-04-11T15:39:52.920000 CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000 @@ -286803,7 +286803,11 @@ CVE-2025-26737,0,0,ef70e0172c0763982b4f704c98436f4e8fa7d9222206609f397682c2bb7a4 CVE-2025-26738,0,0,fe74511d18daa7f8c822f7c00f478c77ab9fe05590b455ccad4998d15c474085,2025-03-27T16:45:12.210000 CVE-2025-26739,0,0,2514d7567fdad9bf988b03c827c3cf9332db7eb4aaa61ffce3b49cc72d1bf133,2025-03-27T16:45:27.850000 CVE-2025-2674,0,0,b17ff2a840d43872ce8941660011244ce317e8241898334fca92f2c7e2d2df13,2025-03-27T18:21:20.710000 +CVE-2025-26741,1,1,077493a15142459277063e747dcd2be4904c9fef94f2d67af93ba87b2692b4b1,2025-04-15T12:15:19.230000 CVE-2025-26742,0,0,d1c1ef0a2d3414bdd8fc0829685f2cb4bdc30a516dc3a80c709e135b1569fc7e,2025-03-27T16:45:46.410000 +CVE-2025-26743,1,1,8f7e8fd715d3bf9e7d968b130b8cfbcd5b52046c49a4d1c38253711a76d245a5,2025-04-15T12:15:19.407000 +CVE-2025-26744,1,1,7b1c579591e22601854cda0a7b44e412b57bd02b95573aecf1bbbfd59ffd9c82,2025-04-15T12:15:19.587000 +CVE-2025-26745,1,1,a7b04b2e513e9ca108505428cad622643f9721f36f7e47e8c23845a6fb26f582,2025-04-15T12:15:19.743000 CVE-2025-26747,0,0,f799dbfce90467344ad4aaf43405a0c5bb92178129ef15a39374277528ecf159,2025-03-27T16:45:27.850000 CVE-2025-2675,0,0,e49840b3a5ca3e77744a146445fa06f116b5cc16d89bcce736017749e482f04f,2025-03-26T14:03:31.380000 CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000 @@ -286882,10 +286886,12 @@ CVE-2025-26885,0,0,2ef732a4cebbeb85a5dbbaf27f49124f8d762a49e8e7f3b22ab266ddbd21a CVE-2025-26886,0,0,3fccb07cd6593c19d4ebd609ac67b0d6e5961e270965b650cf84c0ac5737cb12,2025-03-15T22:15:13.837000 CVE-2025-26887,0,0,d620956d3ea5625abfbc4595a1a19c4cbaf27ed3b93aec2afc55fa2fa354983d,2025-02-25T15:15:25.117000 CVE-2025-26888,0,0,88340f4d9fa5152f8d2baf93269a38c0f6caaecf7620d64ac415d48780f03414,2025-04-11T15:40:10.277000 +CVE-2025-26889,1,1,5d3d0230f247990f9b124f76f20277fc846f15b430b1a8878c6e493f1b4bb795,2025-04-15T12:15:19.907000 CVE-2025-2689,0,0,a0a16f7e7cbfe138500325b64261c6e20c16741d6a695a680e6c214018b4891c,2025-03-24T17:17:26.607000 CVE-2025-26890,0,0,7c5bd562991190453d0d95d46540e8b902fafbca311e972364b1df4ac9dc0f02,2025-03-28T18:11:40.180000 CVE-2025-26891,0,0,20d9b98fa953b2c2ae1876c761e770a063cad8d8555cb8705b5f8d6ebece6625,2025-02-25T15:15:25.253000 CVE-2025-26893,0,0,1e55e8031dea60b355f7bfdcd2784f0b2b9ad5afec3a445aae3078ebb5e3718e,2025-02-25T15:15:25.390000 +CVE-2025-26894,1,1,efe40f827831db45c8611c7778695b40f9072fb3eeb493ca45eec8a9764bcffe,2025-04-15T12:15:20.073000 CVE-2025-26895,0,0,3eb6addb22fb4b37c6c3f31fac229fd983ae417a5135246d65834c2c589c8b04,2025-03-15T22:15:14.013000 CVE-2025-26896,0,0,698aeca623c70e4b06e040cd55b5c2549a6c6c52876a66af61cb43c3e54c60ab,2025-02-25T15:15:25.527000 CVE-2025-26897,0,0,008344bbc82c06e5be6950b4745d40969170caa982c12bbebacc137b35f38f42,2025-02-25T15:15:25.690000 @@ -286927,15 +286933,21 @@ CVE-2025-26938,0,0,ccee8025a5da0f5335768772061878090bde7e99bf569f115b93a00b9aeb2 CVE-2025-26939,0,0,58ae7bfaf9694ba77b15898e6615a5486bcece1885e349ca30dab005e95021c4,2025-02-25T15:15:27.883000 CVE-2025-26940,0,0,027a042a9996f74c1b536a3ee0cf90caed7b08e7a2e9d51808cb5cb94c96159d,2025-03-15T22:15:14.810000 CVE-2025-26941,0,0,eeab969e211d00d26492a623edb2ecb8e112a324bb65c6f415710335014e5142,2025-03-27T16:45:27.850000 +CVE-2025-26942,1,1,f512122c4d445d2c2ba7f7573d91793303f6cb75e7d6a1fdd214ad5189437846,2025-04-15T12:15:20.243000 CVE-2025-26943,0,0,880198cc8338519544198ca562f39ac104b8bef0a8c121e384075bf4aedbb34a,2025-02-25T15:15:28.030000 +CVE-2025-26944,1,1,10e2ca1533b2ca8be1d834521fc56889f16a97eb72358680e9004a27c1af48b2,2025-04-15T12:15:20.413000 CVE-2025-26945,0,0,6b5c2fad0a9b8f40f34855e800ac09994d07fec61ef015d056c7f881c616332e,2025-02-25T15:15:28.177000 CVE-2025-26946,0,0,df781d5aa26b91c3cad6d895bb9f19c76a8ac0bc37b086b89e10307c3390056d,2025-02-25T15:15:28.320000 CVE-2025-26947,0,0,17ca4a960f692537dd7bd29667eead07a638e9187cd25b27f2e6eb39d83f12f2,2025-02-25T15:15:28.457000 CVE-2025-26948,0,0,7e692ce2f0fb2189773dab014b01c64cf92c1c0d6e24b0bdecd31d44fc8a160e,2025-02-25T15:15:28.597000 CVE-2025-26949,0,0,756ec3a8273ffe21cd013eae401b29681f02ddf1186e27472f179b3deeae84ca,2025-02-25T15:15:28.733000 CVE-2025-26952,0,0,a13de9204c8fb7f5ac97c6580a46c2af94bfa390df931bb26a31447f73f1cb45,2025-02-25T15:15:28.870000 +CVE-2025-26954,1,1,fba51a125990b1498fbe197649e7964122b367070227862ca5d7dd606ae6ddb7,2025-04-15T12:15:20.567000 +CVE-2025-26955,1,1,3ad9de8b7f7d06940ead5a18c5a4e9131f579ea5f080ccfae967421bcc315474,2025-04-15T12:15:20.713000 CVE-2025-26956,0,0,67dc3e0376c57291d36674bc82b71c5ab19cd7ba364ee74deb6f26199d4b6b1d,2025-03-28T18:11:40.180000 CVE-2025-26957,0,0,6c29e79d7d5ad28c3d1452c9dd015db2eba8e2ce8661a68ea61bf9040ea56305,2025-02-25T15:15:29.010000 +CVE-2025-26958,1,1,c9d900dc687bf740a847cdf973f9d65ec0811330f9e6eeea1295b64225ddc2e6,2025-04-15T12:15:20.880000 +CVE-2025-26959,1,1,cc82209c7785983a31c6bf30c9459b0fd5521b510ea252cf2af39f0f3f9f8506,2025-04-15T12:15:21.037000 CVE-2025-26960,0,0,ad36f999467934854428e722bc7b7f4dfd105622c135096dd3c0aa70afd80457,2025-02-25T15:15:29.150000 CVE-2025-26961,0,0,32038fb2c0fd1f686db79d976fcbcdf3a25031c595e82f3f1b331462be320b81,2025-03-15T22:15:14.960000 CVE-2025-26962,0,0,050ad56156a26d49e3d36ac5fa3745ab1b7f9b90df44edc74e086668cb228eab,2025-02-25T15:15:29.290000 @@ -286957,6 +286969,7 @@ CVE-2025-26978,0,0,772f8c7e1cc61be12e475c7e34fcd1b8cf09b60bc8c45928de3d3849a34cf CVE-2025-26979,0,0,3430c3c7589910c0ce9812da83cd3b1e3a2f205c2786e4db026732f56da4254c,2025-02-25T15:15:30.587000 CVE-2025-26980,0,0,dde475827d98f921adf627fe3afe81e813ccdfcae63ecbed9473027c0ab62abe,2025-02-25T15:15:30.730000 CVE-2025-26981,0,0,3c198cc5da3d6f650a9e99b4d0dde322351720ee3c085612f1fbc577072a1976,2025-02-25T15:15:30.873000 +CVE-2025-26982,1,1,f022ecca7d7cf214e067185008ebac7307c3a408b8dee2e48d258659dce1e48f,2025-04-15T12:15:21.267000 CVE-2025-26983,0,0,d6a859f29d624b201143fae24b6b474b6dfa136735775ba5e00cc884a212ebed,2025-02-25T15:15:31.043000 CVE-2025-26984,0,0,850870a6d13166bab30d2f61af8dc6fc95f6d7238517ef3ceb04f89d1f9a98a1,2025-03-07T20:35:00.770000 CVE-2025-26985,0,0,5fb0ce30a005f045393ce6a9e4877e64e68127385c508c29b67962ad383bc902,2025-02-25T15:15:31.183000 @@ -286965,7 +286978,9 @@ CVE-2025-26987,0,0,597d2628b42a4a65165e807aa9eb7e16ab56b0bee51783965b846b2753d56 CVE-2025-26988,0,0,0319a38815984a3d7757bba2dab0c325e1f38ec9d387be497de99ad33c8d24a9,2025-03-07T20:35:36.553000 CVE-2025-26989,0,0,b0ef3d20e454de8c22a4b1527a3da924af34822ec9bc2b6dd3acc50906fd5b9d,2025-03-07T20:36:56.700000 CVE-2025-2699,0,0,6396e1b9f8444bd1d0105b607426e0438fae6c8e1cad3a588c50e09924ca055e,2025-03-24T17:33:00.020000 +CVE-2025-26990,1,1,08a6b5eb79bf3734577f837a86de90ec311bec7058910c967622192930e32e1a,2025-04-15T12:15:21.597000 CVE-2025-26991,0,0,84217b1c95797f5f6a3434460f887fd28027f10e4a2535fce5046994c53e0aac,2025-02-25T15:15:31.460000 +CVE-2025-26992,1,1,4b1d36d5d77271d2107c6aaf5af990fab7b413d1c5bce3347185592b864e20d2,2025-04-15T12:15:21.773000 CVE-2025-26993,0,0,25d916d390de90b80a1e84bf0243f302c32b655919eea97f6f91c9f96aa389dc,2025-02-25T15:15:31.590000 CVE-2025-26994,0,0,03494b736a3ca693fdaefc610166ca8a10d800440713e480c6b170f7815e45d0,2025-03-07T20:37:45.723000 CVE-2025-26995,0,0,9f9fd1cf4c78a39e37c563908ec2c351a2e202019a39ae0f35b6be53c49be04b,2025-02-25T15:15:31.720000 @@ -287562,8 +287577,8 @@ CVE-2025-2836,0,0,fc5be678cb97345ef6d68aed15f5462ba8f4f63b5b10c6ab5fab3a18f12761 CVE-2025-28361,0,0,012842a41606e730430b254a67bbb658386b3833897674145b51c035a48415eb,2025-04-01T15:43:05.143000 CVE-2025-2837,0,0,b89aeb2a53f8a50fdc7d1cb971618f78d6548d3dfb914df0b41cb0d9a2a5f82a,2025-03-27T16:45:27.850000 CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4dfa3,2025-03-27T16:45:27.850000 -CVE-2025-28395,0,0,787acf6514abb8a3a80c4bce46febca1493172cc64b611845553a9003726f018,2025-04-14T18:15:28.833000 -CVE-2025-28398,0,0,a2165cc7a8a87e902702dee4b645778bcee1de648071e795add12a5949a33fef,2025-04-14T18:15:28.970000 +CVE-2025-28395,0,1,e2a008eff6d871d94e498e18fdcd7ec1a8104377f0bfd0c36d8d69a8cfbea062,2025-04-15T12:52:46.433000 +CVE-2025-28398,0,1,a80aa3350f7ebc843f0b185d49e6b66d7edf0d8201a54a2ee3a02548dd1b1270,2025-04-15T12:51:12.750000 CVE-2025-2840,0,0,1611919e470b3959ac5f5634b987862e109125e9a8a008183091dc9630f3ea33,2025-04-01T20:26:30.593000 CVE-2025-28400,0,0,cc1f6f84cf8a6714de7f979e521029089d85e3bab5eb1dddede51bed2df8cbb6,2025-04-09T17:29:47.113000 CVE-2025-28401,0,0,f7b9c29cb1543d57a788f6df9919d9bc678436ddeda3822118494d478d80547d,2025-04-09T17:19:47.947000 @@ -287739,7 +287754,7 @@ CVE-2025-29137,0,0,6931ace246948745a6b3fe7c0c4f84f92cdbdc6e8e8f8a7f93a7b8720a179 CVE-2025-2914,0,0,f4da3bf15e0a024148c60f5942d8d165e3d668046cbe893c7644ad7b0d6619e0,2025-03-28T18:11:40.180000 CVE-2025-29149,0,0,2b30e3ef51abdd15292670ac51eb247a8a581b78085e4a43217ece3a22f27ca1,2025-03-27T15:26:02.940000 CVE-2025-2915,0,0,70cc8be03dfb35b9ef84c0237ac359de350c3b4b4245e9a89d1955b7eff26074,2025-04-14T14:03:21.190000 -CVE-2025-29150,0,0,d63dc144134bdd58d64b5a241d38aa93b7976fc0b18bc7b222ca5fad328899e9,2025-04-11T15:39:52.920000 +CVE-2025-29150,0,1,830ae278210dc8950b4025bdf811095dc9ceda7da749b4d24c53ea4d187bdb2f,2025-04-15T13:50:15.537000 CVE-2025-2916,0,0,a9d32a009c2c479d4d99380c6f5c7dc74ee32d7bcd65aba7c50dbefe66cc315d,2025-03-28T18:11:40.180000 CVE-2025-2917,0,0,456c071352ee17bf9505ffdef668916785181adeea61153a444057728f3de9f2,2025-04-14T13:53:30.877000 CVE-2025-29189,0,0,8f05af4418320348346691aa7f962df7a836889ea838607875b166fe868cccb7,2025-04-09T20:02:41.860000 @@ -287784,7 +287799,7 @@ CVE-2025-29384,0,0,14456271181d2a6b38eac63454e7d903bdeae2563e5fc51ec6c8692dd53ec CVE-2025-29385,0,0,f60ee6091bef3db2d6081e2edd6e0a4a37d7ecd5c70fcec7c258e2d44478f256,2025-03-19T19:15:49.280000 CVE-2025-29386,0,0,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff529e,2025-03-19T19:15:49.423000 CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2f45,2025-03-17T19:51:04.180000 -CVE-2025-29389,0,0,7346acc1fe3e0bce9d89cb45e28f2dcad894f34f4ad9518c187469c5c46854ce,2025-04-09T20:02:41.860000 +CVE-2025-29389,0,1,b6e910417322f02be556ac9b548f6e8b6c35848d660fba9931faab004d75355d,2025-04-15T13:42:23.447000 CVE-2025-29390,0,0,0d3f1a5443d923cd69474601e81c6ed56d32c74e48f2cfcfad1110a3c886a131,2025-04-09T20:02:41.860000 CVE-2025-29391,0,0,42d4546ada0a2b49c124dbe88b48d006d7589fb91bb0a018d0dd79fa5a9f12f6,2025-04-09T20:02:41.860000 CVE-2025-29394,0,0,b33985c121ec23217a26c766fe9bee2b1c6ed057a04b87c5f8c939ce3b37502f,2025-04-09T20:02:41.860000 @@ -287917,7 +287932,7 @@ CVE-2025-2983,0,0,d31f69cd4a503a465c90bfed858cd3831ad229c0ecb657ddc75c62172e5f91 CVE-2025-29834,0,0,c1edafc5db08600d282b1d504c73c12ff10139e21c4a2899ff9f8e6c1240a7ff,2025-04-12T02:15:22.027000 CVE-2025-2984,0,0,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000 CVE-2025-2985,0,0,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000 -CVE-2025-29868,0,0,9813b653c5bca2e8acf756b26daf804f197eeda8b9cebaf4dca020346cbb34e2,2025-04-10T15:16:03.860000 +CVE-2025-29868,0,1,b927f2785378c622235f633189b112c490059ef762d715c0b82b004d9b8787d2,2025-04-15T13:07:54.393000 CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000 CVE-2025-2989,0,0,45a6c1ba1e6cd2d5c62dcb10c0528d36d57eceee6f8ab3df2269f6315f9c7634,2025-04-07T14:15:04.880000 CVE-2025-29891,0,0,752eb7db0cd8cf51c6f0df1d0540c6e0a94cdab3ef9ff768e6ace10510ce6968,2025-04-02T20:37:07.073000 @@ -288053,7 +288068,7 @@ CVE-2025-30164,0,0,c838231ddadd650538b91334381739f0e5f84496049f4ab61b98fedaf2408 CVE-2025-30166,0,0,dc8fa2e955f9b83b24c2517018cb3ddc4399710004f918cf05eb88fd63c78734,2025-04-08T18:13:53.347000 CVE-2025-30168,0,0,3703f1f4b9dfa087aa1c5a98a4898da5aafd4533d5e73d111e4aa608fa2c614e,2025-03-21T15:15:43.440000 CVE-2025-3017,0,0,98ff904dc48968379de3c001eb6b068a3a8d13595e1e3e62ce18b74891721501,2025-04-01T20:26:22.890000 -CVE-2025-30177,0,0,1bfbcea48aa1ea068670da36dff62558776eef3abe203d4326a5f744d663461b,2025-04-01T20:26:11.547000 +CVE-2025-30177,0,1,e6a2dcc39bb402f3fbe897267a52a15e4f647d561f8f8204556d252b469adda6,2025-04-15T13:00:12.587000 CVE-2025-30179,0,0,e6188b5cfe41efd4be24afd0a9be97fe3cad7c2aaaf7dc5206b7ef410f616059,2025-03-27T14:45:47.520000 CVE-2025-3018,0,0,699e90ef59bc974dffc7069ff5404d401834f1962c8486f8c32f7bd651f7ed16,2025-04-07T14:35:25.290000 CVE-2025-3019,0,0,70e870259e621652f69977e8a6f5a1f65a77b053f491785fe2e80412bfee7fd9,2025-04-01T20:26:30.593000 @@ -288094,7 +288109,7 @@ CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d6 CVE-2025-30280,0,0,30288d638eb0e9dbcf0aa5896bd69db9acfcecdbc6d868f34c8a52e27afc1001,2025-04-14T08:15:13.823000 CVE-2025-30281,0,0,50a072f873968e0884926f8e8e3ac417a87058a178898fc0d8f8841b5e4ff462,2025-04-09T20:02:41.860000 CVE-2025-30282,0,0,a17dd9832b027f03ba6a75d738edfc9d501eb453a9d5c6408c6b0cc08654cbf6,2025-04-09T20:02:41.860000 -CVE-2025-30284,0,0,8e53e1c7c93960fd053bcc2c17b6442972477767d5d61a97f5c87a3737a9b037,2025-04-09T20:02:41.860000 +CVE-2025-30284,0,1,fcfe4b641e24a5d6edb0fad44597e9a8db41e7640854b7b8e24bb0269390b9dd,2025-04-15T13:13:50.853000 CVE-2025-30285,0,0,7935713339eb97b0ce053ce1b5aa84345b8a159bb91df1c7304cb11e02fd0f8b,2025-04-09T20:02:41.860000 CVE-2025-30286,0,0,e43adce2918b7c668d5d3cfc6aa7930d2b02a0ac84efbfb06cb6686e51b0f496,2025-04-14T17:43:28.940000 CVE-2025-30287,0,0,bfb8139b266be0d2cb7b484acdd34e2bb85891baac94150ccb14b18f684529fb,2025-04-14T17:46:20.293000 @@ -288135,7 +288150,7 @@ CVE-2025-30346,0,0,c406f26a6d5e86f9605358f371c0731991af9645cd15fe0065dbd940074e7 CVE-2025-30347,0,0,ed9763d5b530026684262273e310ca4c964268ef0ffc4c726547353dbc6770db,2025-03-24T14:19:23.963000 CVE-2025-30348,0,0,0fb0e9fd503e8730c9a3857e63ee0ac5611b8bb7632a64f763dd19e4ff36427c,2025-03-24T14:08:36.513000 CVE-2025-30349,0,0,d863fcdacafbcc4265f861b9a5ca8402397ade3d5ede94aef0450f050ac91a50,2025-04-03T12:15:16.210000 -CVE-2025-3035,0,0,b624d70c9ce84d2ad8578eca595ef2a28e4f857af65f374123c0cabcc94665a6,2025-04-10T21:15:49.180000 +CVE-2025-3035,0,1,03d49d41973a269f63c10099f775c9d282c755415dac20b290dc221d2ddd8472,2025-04-15T12:55:21.203000 CVE-2025-30350,0,0,769aed62b7c52c7efff0910786b1540702d43c431a2629a37c544cf6ab27d2c0,2025-03-27T16:45:27.850000 CVE-2025-30351,0,0,41323de04c59da9296c71c6a7df779e6c0c767b4bcb8b455ab5524ba6b0475be,2025-03-27T16:45:27.850000 CVE-2025-30352,0,0,2de13b7ea6496a9753fe04c1b9f1d1f6040e23740e41cd04836f25b10e4f3884,2025-03-27T16:45:27.850000 @@ -288528,10 +288543,14 @@ CVE-2025-30925,0,0,303059a0519907d0c47140322e242ea05b7024546a805d0c164e0f0e362aa CVE-2025-30926,0,0,b661a84f99652a2821e7ff3d11c13e4069bdece4b97608c23c3ec387d8764f48,2025-04-01T20:26:11.547000 CVE-2025-3096,0,0,8268841e6f7bc41398dcf36b7be8d3dcaa69d002c9097adfeaedeae01b3e118b,2025-04-01T20:26:01.990000 CVE-2025-30961,0,0,a9060b0c2e5039ac1c7dc0d0a4866d8355c5b144195397ac7f7bbd22c91d7a82,2025-04-01T20:26:30.593000 +CVE-2025-30962,1,1,92f9d0608eb664efd9f98110b71d46902de51c148fb5b10dec336484313b68e1,2025-04-15T12:15:21.957000 CVE-2025-30963,0,0,8f31ec02fefff5554b72626ba454b387f81489df6ae8a03a71d1b10a82ac3371,2025-04-01T20:26:30.593000 +CVE-2025-30964,1,1,054c9e0dc9ff20c2673d3e6c23c5f6ca099dad9816b5c60e7c3dd0b3fca6f6c6,2025-04-15T12:15:22.140000 +CVE-2025-30965,1,1,b1e72a077c827a9903873441ad887e71c2cb4707e49e40535b6e6ea896cd7e9e,2025-04-15T12:15:22.313000 CVE-2025-3097,0,0,a56f46f6ab586feb1d3c504e3ae22e548d2acd2889f7f29233e79a32e7240220,2025-04-02T14:58:07.527000 CVE-2025-30971,0,0,bdaa81d5f90f891b35dfd2da44198cf771c61350682b9305a17f8bc2d53e966d,2025-04-01T20:26:11.547000 CVE-2025-3098,0,0,64e3da7989169613fb4eaf552a0f5621059a5a42e666f32ff39d3d155f26ca41,2025-04-02T14:58:07.527000 +CVE-2025-30985,1,1,f1c0efd7f61ad31be2d85a253eb44030709ac96f30d30710840f7b385df1d41e,2025-04-15T12:15:22.463000 CVE-2025-30987,0,0,1ddeca9f293b13339e82c187149d285418438fc60231797e7c68c5fcad6fe64b,2025-04-01T20:26:30.593000 CVE-2025-3099,0,0,8b5b94044c5b312a61081eb6466602886f5edc420174286cf66115736f8de591,2025-04-02T14:58:07.527000 CVE-2025-3100,0,0,d223f6bdad24adad7bfeb8d8433bb786f4e26245258914a6d5f9c277f321f0fd,2025-04-09T20:02:41.860000 @@ -288543,6 +288562,7 @@ CVE-2025-31005,0,0,ceb79a2f36fcb390061964b11e10127964f5604b0d6b95191e77fe9337f63 CVE-2025-31008,0,0,574e1cf42f8a16e13e787c6fb8ae3504d667cff8301f5b3817d1be7163f33d9b,2025-04-09T20:02:41.860000 CVE-2025-31009,0,0,00ef1dcb50827d398a2f6c01ffba26a90073ce49541136b216e5baa33ed8b4e8,2025-04-09T20:02:41.860000 CVE-2025-31010,0,0,c1f5ed11290de791a7c3fbb3f13d7b367feca7817eca67ce914a4ef488ac6cf5,2025-03-28T18:11:40.180000 +CVE-2025-31011,1,1,9546b5e8cf1243bfa2ce7b9631b56280844ae92bb5ea69cb69557a1abc605e7e,2025-04-15T12:15:22.630000 CVE-2025-31012,0,0,1f46b9635d7584db0ebef271a97e01198fa0633ac746e331966237bdddb260f8,2025-04-09T20:02:41.860000 CVE-2025-31014,0,0,05a65cf1c53aaa3729696e93139ef997043ba9893b8c9b11b54bf89e713672b8,2025-04-11T15:39:52.920000 CVE-2025-31015,0,0,cc9d5bb58bd9acbdec8dd13e2813c11ba30f9d64e279f9a8cd7570dbb05b8b09,2025-04-11T15:39:52.920000 @@ -289068,7 +289088,7 @@ CVE-2025-31806,0,0,b90546fe747ffeced4d44aced92f273d225fc8c5d11ad57a051f41118eb25 CVE-2025-31807,0,0,0e08e0604c12e5cea2f7379e458a3adca084c7a5855440b8d71ab1b1c7d9c1b6,2025-04-01T20:26:01.990000 CVE-2025-31808,0,0,3d9d6e9f5669b82ca3d672e2ccfeb2c91afa925ae5dd54939c90b2dd85ccae35,2025-04-01T20:26:01.990000 CVE-2025-31809,0,0,73058d0a46f7de7e061c7f5b0028f36e01d0870a364009415e4df7d474cd3f5d,2025-04-01T20:26:01.990000 -CVE-2025-3181,0,0,c9f3a66d711acc9255fcdcd4ad5b67cdc340374187cabe4ddc28e6a6c506bd77,2025-04-07T17:15:37.707000 +CVE-2025-3181,0,1,b591d0f8743932399910847ccbd3bbd46c1f4a3f984fd0a61e4c4e9cc7ae226d,2025-04-15T12:47:18.723000 CVE-2025-31810,0,0,f3af702a8b20c4f987d774999a8ddd12aa571f2fe10a41ce20511ba1a2cacfb8,2025-04-01T20:26:01.990000 CVE-2025-31811,0,0,400261866a9c810fccf624494bec07aa4768f10150af518e78ca29f4c60fdc8a,2025-04-01T20:26:01.990000 CVE-2025-31812,0,0,9daf6fcddc98329956a0aa9d59258dcf41457c139f76ca9270f11e2c3a164bb0,2025-04-01T20:26:01.990000 @@ -289079,7 +289099,7 @@ CVE-2025-31816,0,0,64557a3d1239be530e2a1e62c66c0e81f7b944cab3496b9d59a67296fe2cd CVE-2025-31817,0,0,e5a966381f1315a5f1650cbed1e4b4a896efa49f06a649a2754cc3a33bee9532,2025-04-01T20:26:01.990000 CVE-2025-31818,0,0,c51f2b827b99396fd7cd2ec2f2df7952fe64d8d16fea049001d5837be8a75ea2,2025-04-01T20:26:01.990000 CVE-2025-31819,0,0,ae2b21919b6c3224744ced52a20e06e6f2512a8bba29cab78af5df48acae8d55,2025-04-02T14:58:07.527000 -CVE-2025-3182,0,0,39008f4be13c68bf5171775f35d7159f568ab981e7e534a483df290dcc77a074,2025-04-07T17:15:37.897000 +CVE-2025-3182,0,1,66aede1d8bf2dcc9d2638f004814ec5fd465d658672d7e5678ab7751e3ec0e07,2025-04-15T12:36:25.193000 CVE-2025-31820,0,0,073d8c7b64eb5f396a123c1d65fdd10a7aa5293d8d2897e1e75c2b5d3c774bbc,2025-04-01T20:26:01.990000 CVE-2025-31821,0,0,f2a9afee35932e5b060ddf98091c755b4debe0bcc4962f7543d3c50f47c0ce5a,2025-04-01T20:26:01.990000 CVE-2025-31822,0,0,26a424b5398bc8e38e793525911b12f88341a03f98513c46361dc05f40c1ab33,2025-04-01T20:26:01.990000 @@ -289090,7 +289110,7 @@ CVE-2025-31826,0,0,92cb877e2f47e3269630047239793a9ae7b3842d5a44a53ebe254b8162e51 CVE-2025-31827,0,0,ebcd02ffb546863b75e8fada9013048347d5ee958e0c25302ae3866720cfec17,2025-04-07T14:18:34.453000 CVE-2025-31828,0,0,f10dbd563bef1cbe91ad1743a8128c22fa4a78229085f4eb0e1fd81caefa5935,2025-04-01T20:26:01.990000 CVE-2025-31829,0,0,3bae247e220b234227ffb98516d715ad943da55df969b05e4c05a5c22fa7ebc2,2025-04-01T20:26:01.990000 -CVE-2025-3183,0,0,bbe346c980c2e49c98d21f9417a079248655a451a250e9dbfe0668b87727dde5,2025-04-07T17:15:38.060000 +CVE-2025-3183,0,1,a64cc343f36e4336817ce87e3474cc5281c840f215f41b54a718b7a59a86aed7,2025-04-15T12:30:35.003000 CVE-2025-31830,0,0,f4005e0df03f5b0098410454de12d4db7f27adab38ff501fb628b8fa4644f0c2,2025-04-01T20:26:01.990000 CVE-2025-31831,0,0,32b22e03b17ccff10b64f9f889e18c057b468d1d16e47914df96aad7d31270a7,2025-04-01T20:26:01.990000 CVE-2025-31832,0,0,f16011b94562e6a31b6c983885f867c6190a9745ccaa48b253aed9b44065c37f,2025-04-01T20:26:01.990000 @@ -289101,7 +289121,7 @@ CVE-2025-31836,0,0,f38ab4f141614df19843869b6087bd0cbb9d51e26f9521e7f3276270d68c4 CVE-2025-31837,0,0,ac402ad57f29f01cdba421eecbf01cbcb48ac88fb0c11f69fe4851c2ea6795c5,2025-04-01T20:26:01.990000 CVE-2025-31838,0,0,b07f4080142cc3b3f849dceb582b25d45db6d7eacaa20c3a0858ff3728c8c6c8,2025-04-01T20:26:01.990000 CVE-2025-31839,0,0,8ccc5e7f43a07fe39edff2259cd62f228dd6fa749fa65e1d8d7439add485f68d,2025-04-01T20:26:01.990000 -CVE-2025-3184,0,0,3b1d34daed6408be59570b3fc960aadf2f9f75c25f4795aa79118329ba1cc358,2025-04-07T14:18:34.453000 +CVE-2025-3184,0,1,3716263cc4b57de20536509988425f13436cba75cc51cf01a240840800d19c20,2025-04-15T12:25:42.497000 CVE-2025-31840,0,0,7f2497c0b1a2d1900697a8ba0465553322e4710166db98ed0ebdab22a966869e,2025-04-01T20:26:01.990000 CVE-2025-31841,0,0,12e523c209a2ac942470692736ba7c8cc3060109d2c24eaadbeec5f4ea02536b,2025-04-07T14:18:34.453000 CVE-2025-31842,0,0,6dd948d22229910fbd0e6ced4abce6bec93f03f0e97782ed125f97ea96bd0524,2025-04-01T20:26:01.990000 @@ -289112,7 +289132,7 @@ CVE-2025-31846,0,0,4111964ab4f51b35422f5619862fd0b99b7ed3ea3b2568b878c698149f7e8 CVE-2025-31847,0,0,c3570f8cb7be0dffdf13b7b228695374a87a8be3fd696ce7252872b67768a2d8,2025-04-01T20:26:01.990000 CVE-2025-31848,0,0,2021508868f87d7b8489dffeb73d11798a698408887254b70cac3abfb891fb3d,2025-04-01T20:26:01.990000 CVE-2025-31849,0,0,48374392c603a436f7cf6c787b5641066082ea5def2200cd6c4875cbed23144f,2025-04-01T20:26:01.990000 -CVE-2025-3185,0,0,ac329edfbea1d42e07bd262523de8bec05538ff0191c9081db798f40b2e27005,2025-04-07T14:18:34.453000 +CVE-2025-3185,0,1,1c1f711feaeeb603412e159ffff8a29ae040c86a85d83fa5de2501009bde47aa,2025-04-15T12:22:57.350000 CVE-2025-31850,0,0,c1448f442836c08bf57589c331093d5e7c8ee77088fffa5b43d79a50ba79b571,2025-04-01T20:26:01.990000 CVE-2025-31851,0,0,66b0b6f8be667b2aaa27ff4eee3680d1eb8ed9d74ce74eda64cf20f49bc8230c,2025-04-01T20:26:01.990000 CVE-2025-31852,0,0,0563e048f300a482a69f323871ff66d0792aaf33c02aa55960611976e63349ae,2025-04-01T20:26:01.990000 @@ -289239,6 +289259,8 @@ CVE-2025-32080,0,0,8c5137c35b2b3c54cc7c5e0e0214d97db0b8376e0d36e9287126ae8d1d4b1 CVE-2025-3209,0,0,efaeccbde8dfc66e8697afeb5d539c2f695606dff80d7c548cff76ae6514c4e4,2025-04-07T14:18:15.560000 CVE-2025-32093,0,0,840d563c9f546c12b4c77ed00bbb397e353206c1cbc749eb0a2f2a027994d2c0,2025-04-14T07:15:14.700000 CVE-2025-3210,0,0,e3a6c98204c21b98a0522091394112cf3856887b7b64633cf1e308a0cb6727df,2025-04-08T17:43:12.840000 +CVE-2025-32102,1,1,1e04efaf7a55cc84e492fea102bce113b5efdb1d3a73cf944b4b6e10df68f800,2025-04-15T13:15:54.783000 +CVE-2025-32103,1,1,6fb6a411b4865c5a0b6737078e4bc89e85223cc06b11c5a36f7700c25b9f64ca,2025-04-15T13:15:54.893000 CVE-2025-32107,0,0,a689a2435b39d5968d7bf2a8f1256f4c1ffc589945169a8a583af99a6981cea6,2025-04-11T15:39:52.920000 CVE-2025-3211,0,0,e2eebcc8ba292d8d3d123757d4623f49a37b0c48559fde3713cb0f540bc6af19,2025-04-07T14:18:15.560000 CVE-2025-32111,0,0,4216c6506d31334c8d23317eabe3bae930691d012b7febaea26a4964764ff3bb,2025-04-07T14:18:15.560000 @@ -289653,6 +289675,7 @@ CVE-2025-32912,0,0,d33de40cd0f2adfe8bcd4894cbd2f85eba79dd1273db6220e05c79c9309fc CVE-2025-32913,0,0,d57ad36165f59819d303ec9ab2813ff5e3bf6501be5718c19b238e301d12630b,2025-04-14T14:15:24.860000 CVE-2025-32914,0,0,de999727d5bce94a114462e2bc1bde19e09dd5cdd0f1e24a89bd7f2b18826694,2025-04-14T15:15:25.633000 CVE-2025-3292,0,0,2e1db750cfd1563a06db7ac495c3f640edc42fb0c4158d03489de1beb7a4ae8f,2025-04-12T07:15:27.143000 +CVE-2025-32929,1,1,cedabae0b9d219e90c3ff760ffd5267799c5b806c51c09496b34e6fb9fb95fb3,2025-04-15T12:15:22.787000 CVE-2025-32930,0,0,7aa7721c6427b0edc6ca10f6fa05a98645a2b1c5fcd736b40f97d37f2fbc0637,2025-04-14T15:15:25.787000 CVE-2025-32931,0,0,94cc5fcddf25096d3020225e203ae16bfb1f4efa469cabee66ae53d695e6e9a8,2025-04-14T16:15:22.157000 CVE-2025-32933,0,0,e4399dc1130e415e7bcf2d27718e9f13cbbe89ea193c41df5f50b1886eb6018b,2025-04-15T03:15:17.590000 @@ -289664,7 +289687,10 @@ CVE-2025-32938,0,0,d97032ba2fb62d85b0fd781b1a847fc87e2cde9e5de8598412a81c2f7b235 CVE-2025-32939,0,0,6d0ae9200a7976c683c740ee0295d246f733a1e3dbef51e2eacbe3ae7efb8a4d,2025-04-15T03:15:17.957000 CVE-2025-32940,0,0,ef492180fd67c205ba6c2e08604b15b7b05288970e18fade437210606e359428,2025-04-15T03:15:18.013000 CVE-2025-32941,0,0,7b47b38d71f23645464b8e8efcb34f5cd92a1b50b5494bf228368f472d5e5710,2025-04-15T03:15:18.077000 -CVE-2025-32943,1,1,23e64df0fd35a825759aae24d8798ec09a333f7b3609395a3902498ee98d825b,2025-04-15T11:15:45.690000 +CVE-2025-32943,0,1,7c75a7f596d703b3758cf1a1170c8d89099896139a576371807ba2368d77efc3,2025-04-15T13:15:55.003000 +CVE-2025-32944,1,1,64c3fdc8548b3105cdc0600f862a70066b2acfcd152da4d56a05c1357e97783d,2025-04-15T13:15:55.100000 +CVE-2025-32945,1,1,25627aa20f6965f2fba572cae58ee7d565ea0b97277dde2a4a853f90d348c88d,2025-04-15T13:15:55.230000 +CVE-2025-32946,1,1,684fff9e206f18e7510238c19ce2c197ebd16949f6248eeaa3b2d306047ea787,2025-04-15T13:15:55.360000 CVE-2025-3296,0,0,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000 CVE-2025-3297,0,0,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000 CVE-2025-3298,0,0,289613560130dabe199eea55128a1bdfe9eecd882e62238f3674c43e858ef0bc,2025-04-08T16:49:00.290000 @@ -289842,7 +289868,7 @@ CVE-2025-3574,0,0,f996911954026f2b9520c1e3b9e7bc2c127ad4cd73d0acb10a428900f0672f CVE-2025-3575,0,0,3b859cdcc75d19b0bd222446e0df21a3c805929d044033ae64d5f00e6acaf9a6,2025-04-15T09:15:13.670000 CVE-2025-3576,0,0,b0049c6025d64b2929e211c65d145d94da2ded08e6e9fc81bae0b76f324cbdc5,2025-04-15T06:15:44.047000 CVE-2025-3578,0,0,87d1e0551317c254c64c797e6713254af47bbba82a0ddab4b2b90342d2423840,2025-04-15T09:15:13.810000 -CVE-2025-3579,0,1,14a4df7542b5c70b893d9914691e4b28106064c1cc523e6fc5e4c2a44d170fa3,2025-04-15T09:15:13.950000 +CVE-2025-3579,0,0,14a4df7542b5c70b893d9914691e4b28106064c1cc523e6fc5e4c2a44d170fa3,2025-04-15T09:15:13.950000 CVE-2025-3585,0,0,3f56099df0d5cbe2a28c49e0084d09a46fec0a860dece5bd91eb4466f785fbfe,2025-04-14T19:15:36.990000 CVE-2025-3587,0,0,0b5d7c64b9281d67b2da75b50cd511d58c4d6400c863ce33e2f51939e792bcae,2025-04-14T21:15:18.220000 CVE-2025-3588,0,0,325725e21d51ea302750035b03dc4eb21568d3831b2e5a943f3da0a80eb56df1,2025-04-14T21:15:18.343000 @@ -289851,6 +289877,7 @@ CVE-2025-3590,0,0,aa07cf51d9a0d561b10043bb7261822f0af57d8d6d4fee0ad683485554a00b CVE-2025-3591,0,0,86fad0a948ecf8f921345a86491b837545045bf239c666008f3a1038a8e13f8f,2025-04-14T22:15:16.827000 CVE-2025-3592,0,0,1454212ef6249f5a5ec56ab9bb8016685ead208040c766cd4c83cd18b7c61f0e,2025-04-14T22:15:17 CVE-2025-3593,0,0,1a81b98ecfba1979c3a4ccc38ff5bb341262b9aec183ca57e86bed8f737e2cd2,2025-04-14T23:15:22.270000 +CVE-2025-3608,1,1,cce37ad158327413338cb2046192c4a98ba3765fd6eb7304f37c48ca7bbc5e03,2025-04-15T13:15:55.590000 CVE-2025-3612,0,0,697ce4214c78774beedb8be6991054d30b9a9fb680765454a424968b455ebab8,2025-04-15T03:15:18.850000 CVE-2025-3613,0,0,a067b576d7ee99ea85156c126c0f1e5ea568b9c9c4c12ed42ef53e964551617f,2025-04-15T03:15:19.023000 -CVE-2025-3622,0,0,47753e571550028309f50a7357c2e7a2ffef09c161d69e6f86b6106c526c7aab,2025-04-15T06:15:44.227000 +CVE-2025-3622,0,1,b19ec5faf46a936315e531dd6572476bfdc165d0e5919b2330464b4f2986eee3,2025-04-15T13:15:55.687000