Auto-Update: 2025-04-15T14:00:20.768944+00:00

This commit is contained in:
cad-safe-bot 2025-04-15 14:04:31 +00:00
parent 08b7ca5f20
commit 5ab3091c1c
49 changed files with 2463 additions and 121 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2017-20022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-06-09T23:15:08.110",
"lastModified": "2024-11-21T03:22:28.090",
"lastModified": "2025-04-15T13:15:45.220",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2846",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-08-16T19:15:09.107",
"lastModified": "2024-11-21T07:01:47.917",
"lastModified": "2025-04-15T13:15:48.600",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,13 +36,33 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46853",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-23T14:15:09.410",
"lastModified": "2024-11-21T07:31:10.500",
"lastModified": "2025-04-15T13:10:20.330",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -76,9 +76,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:radiustheme:post_grid:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:radiustheme:the_post_grid:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.0.5",
"matchCriteriaId": "7CB6D8AE-5A86-45A3-BE0A-0B36D4257DB6"
"matchCriteriaId": "0C863A46-9043-4CFD-A8A9-9AF72936CFDF"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3640",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-24T16:15:13.063",
"lastModified": "2024-11-21T08:17:43.823",
"lastModified": "2025-04-15T12:15:17.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -115,6 +115,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-3640",
"source": "secalert@redhat.com",

View File

@ -2,20 +2,51 @@
"id": "CVE-2024-13610",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-04-15T06:15:43.443",
"lastModified": "2025-04-15T06:15:43.443",
"lastModified": "2025-04-15T13:15:54.463",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simple Social Media Share Buttons WordPress plugin before 6.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento Simple Social Media Share Buttons de WordPress anterior a la versi\u00f3n 6.0.0 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados como el administrador realizar ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/85229528-1110-4d45-b972-8bbcba003a1f/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/85229528-1110-4d45-b972-8bbcba003a1f/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26741",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:19.230",
"lastModified": "2025-04-15T12:15:19.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in AWEOS GmbH Email Notifications for Updates allows Privilege Escalation. This issue affects Email Notifications for Updates: from n/a through 1.1.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wp-update-mail-notification/vulnerability/wordpress-email-notifications-for-updates-1-1-6-privilege-escalation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26743",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:19.407",
"lastModified": "2025-04-15T12:15:19.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TC.K Advance WP Query Search Filter allows Reflected XSS. This issue affects Advance WP Query Search Filter: from n/a through 1.0.10."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/advance-wp-query-search-filter/vulnerability/wordpress-advance-wp-query-search-filter-plugin-1-0-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26744",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:19.587",
"lastModified": "2025-04-15T12:15:19.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound JetBlog allows DOM-Based XSS. This issue affects JetBlog: from n/a through 2.4.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/jet-blog/vulnerability/wordpress-jetblog-plugin-2-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26745",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:19.743",
"lastModified": "2025-04-15T12:15:19.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RSTheme RS Elements Elementor Addon allows Stored XSS. This issue affects RS Elements Elementor Addon: from n/a through 1.1.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/rselements-lite/vulnerability/wordpress-rs-elements-elementor-addon-plugin-1-1-5-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26889",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:19.907",
"lastModified": "2025-04-15T12:15:19.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound hockeydata LOS allows PHP Local File Inclusion. This issue affects hockeydata LOS: from n/a through 1.2.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/hockeydata-los/vulnerability/wordpress-hockeydata-los-plugin-1-2-4-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26894",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:20.073",
"lastModified": "2025-04-15T12:15:20.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Coming Soon, Maintenance Mode allows PHP Local File Inclusion. This issue affects Coming Soon, Maintenance Mode: from n/a through 1.1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/site-mode/vulnerability/wordpress-coming-soon-maintenance-mode-plugin-1-1-1-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26942",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:20.243",
"lastModified": "2025-04-15T12:15:20.243",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in NotFound JetTricks allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects JetTricks: from n/a through 1.5.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/jet-tricks/vulnerability/wordpress-jettricks-1-5-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26944",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:20.413",
"lastModified": "2025-04-15T12:15:20.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in NotFound JetPopup allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects JetPopup: from n/a through 2.0.11."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/jet-popup/vulnerability/wordpress-jetpopup-2-0-11-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26954",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:20.567",
"lastModified": "2025-04-15T12:15:20.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 1pluginjquery ZooEffect allows Reflected XSS. This issue affects ZooEffect: from n/a through 1.11."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/1-jquery-photo-gallery-slideshow-flash/vulnerability/wordpress-zooeffect-plugin-1-11-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26955",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:20.713",
"lastModified": "2025-04-15T12:15:20.713",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in VW Themes Industrial Lite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Industrial Lite: from n/a through 1.0.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/industrial-lite/vulnerability/wordpress-industrial-lite-theme-1-0-8-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26958",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:20.880",
"lastModified": "2025-04-15T12:15:20.880",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in NotFound JetBlog allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects JetBlog: from n/a through 2.4.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/jet-blog/vulnerability/wordpress-jetblog-2-4-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26959",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:21.037",
"lastModified": "2025-04-15T12:15:21.037",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Qu\u00fd L\u00ea 91 Administrator Z allows Privilege Escalation. This issue affects Administrator Z: from n/a through 2025.03.24."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/administrator-z/vulnerability/wordpress-administrator-z-2025-03-24-privilege-escalation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26982",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:21.267",
"lastModified": "2025-04-15T12:15:21.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric-Oliver M\u00e4chler DSGVO Youtube allows DOM-Based XSS. This issue affects DSGVO Youtube: from n/a through 1.5.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/dsgvo-youtube/vulnerability/wordpress-dsgvo-youtube-plugin-1-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26990",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:21.597",
"lastModified": "2025-04-15T12:15:21.597",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in WP Royal Royal Elementor Addons allows Server Side Request Forgery. This issue affects Royal Elementor Addons: from n/a through 1.7.1006."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/royal-elementor-addons/vulnerability/wordpress-royal-elementor-addons-plugin-1-7-1006-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-26992",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:21.773",
"lastModified": "2025-04-15T12:15:21.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fatcatapps Landing Page Cat allows Reflected XSS. This issue affects Landing Page Cat: from n/a through 1.7.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/landing-page-cat/vulnerability/wordpress-landing-page-cat-plugin-1-7-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28395",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-01T14:15:32.917",
"lastModified": "2025-04-14T18:15:28.833",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-15T12:52:46.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:di-8100_firmware:16.07.26:*:*:*:*:*:*:*",
"matchCriteriaId": "907333CE-439A-4366-BD63-86FAC69BF00F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:di-8100:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "93AD68FC-EB79-4510-BF0F-B091FD97E76C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Fizz-L/Vulnerability-report/blob/main/DI-8100Buffer%20overflow.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28398",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-01T14:15:33.047",
"lastModified": "2025-04-14T18:15:28.970",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-15T12:51:12.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:di-8100_firmware:16.07.26:*:*:*:*:*:*:*",
"matchCriteriaId": "907333CE-439A-4366-BD63-86FAC69BF00F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:di-8100:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "93AD68FC-EB79-4510-BF0F-B091FD97E76C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Fizz-L/Vulnerability-report/blob/main/DI-8100Buffer%20overflow2.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29150",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-10T15:16:03.550",
"lastModified": "2025-04-11T15:39:52.920",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-15T13:50:15.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bluecms_project:bluecms:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6A26806A-9CB5-4262-BAD1-049659C2CE2C"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/electroN1chahaha/054a1af22157aa3010e89b3103ad7b9a",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29389",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-09T15:16:02.593",
"lastModified": "2025-04-09T20:02:41.860",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-15T13:42:23.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pbootcms:pbootcms:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5A19EA43-31D6-4EAC-8C97-CCBA5BE47426"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/jaylan545/0540db17daca2bf42fe5a3ce864300c9",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/jaylan545/security/issues/1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29868",
"sourceIdentifier": "security@apache.org",
"published": "2025-04-01T08:15:14.990",
"lastModified": "2025-04-10T15:16:03.860",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-15T13:07:54.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,22 +51,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.4.2",
"matchCriteriaId": "29E2B105-1033-4FCE-8F05-20368605017D"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/l7pohw5g03g3qsvrz8pqc9t29mdv5lhf",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/04/01/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/04/02/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/04/10/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-30177",
"sourceIdentifier": "security@apache.org",
"published": "2025-04-01T12:15:15.747",
"lastModified": "2025-04-01T20:26:11.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-15T13:00:12.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.8.0",
"versionEndExcluding": "4.8.6",
"matchCriteriaId": "D9FD8755-3AFF-46F8-A830-FD0BF04B5DB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10.0",
"versionEndExcluding": "4.10.3",
"matchCriteriaId": "874BB2C0-D562-4EC9-A839-BAEED574AD41"
}
]
}
]
}
],
"references": [
{
"url": "https://camel.apache.org/security/CVE-2025-27636.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://camel.apache.org/security/CVE-2025-29891.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://lists.apache.org/thread/dj79zdgw01j337lr9gvyy4sv8xfyw8py",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-30284",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:25.980",
"lastModified": "2025-04-09T20:02:41.860",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-15T13:13:50.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,190 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*",
"matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*",
"matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*",
"matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*",
"matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*",
"matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*",
"matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update14:*:*:*:*:*:*",
"matchCriteriaId": "10616A3A-0C1C-474A-BD7D-A2A5BB870F74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update15:*:*:*:*:*:*",
"matchCriteriaId": "D7DA523E-1D9B-45FD-94D9-D4F9F2B9296B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update16:*:*:*:*:*:*",
"matchCriteriaId": "151AFF8B-F05C-4D27-85FC-DF88E9C11BEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update17:*:*:*:*:*:*",
"matchCriteriaId": "53A0E245-2915-4DFF-AFB5-A12F5C435702"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update18:*:*:*:*:*:*",
"matchCriteriaId": "C5653D18-7534-48A3-819F-9F049A418F99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*",
"matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*",
"matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*",
"matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*",
"matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*",
"matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*",
"matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*",
"matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*",
"matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*",
"matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
"matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update10:*:*:*:*:*:*",
"matchCriteriaId": "645D1B5F-2DAB-4AB8-A465-AC37FF494F95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update11:*:*:*:*:*:*",
"matchCriteriaId": "ED6D8996-0770-4C9F-BEA5-87EA479D40A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update12:*:*:*:*:*:*",
"matchCriteriaId": "4836086E-3D4A-4A07-A372-382D385CB490"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*",
"matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*",
"matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*",
"matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*",
"matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*",
"matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*",
"matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update8:*:*:*:*:*:*",
"matchCriteriaId": "DB97ADBA-C1A9-4EE0-9509-68CB12358AE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update9:*:*:*:*:*:*",
"matchCriteriaId": "E17C38F0-9B0F-4433-9CBD-6E3D63EA9BDC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2025:-:*:*:*:*:*:*",
"matchCriteriaId": "30779417-D4E5-4A01-BE0E-1CE1D134292A"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30962",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:21.957",
"lastModified": "2025-04-15T12:15:21.957",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FS Poster allows Reflected XSS. This issue affects FS Poster: from n/a through 6.5.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/fs-poster/vulnerability/wordpress-fs-poster-plugin-6-5-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30964",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:22.140",
"lastModified": "2025-04-15T12:15:22.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in EPC Photography. This issue affects Photography: from n/a through 7.5.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/theme/photography/vulnerability/wordpress-photography-theme-7-5-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30965",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:22.313",
"lastModified": "2025-04-15T12:15:22.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in NotFound WPJobBoard allows Cross Site Request Forgery. This issue affects WPJobBoard: from n/a through n/a."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/wpjobboard/vulnerability/wordpress-wpjobboard-plugin-5-11-1-multiple-cross-site-request-forgery-csrf-vulnerabilities-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30985",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:22.463",
"lastModified": "2025-04-15T12:15:22.463",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in NotFound GNUCommerce allows Object Injection. This issue affects GNUCommerce: from n/a through 1.5.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/gnucommerce/vulnerability/wordpress-gnucommerce-plugin-1-5-4-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3035",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-04-01T13:15:41.893",
"lastModified": "2025-04-10T21:15:49.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-15T12:55:21.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
"versionEndExcluding": "137.0",
"matchCriteriaId": "A6CBADD8-E865-41B5-BDDD-1572F97D5176"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1952268",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Permissions Required"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-20/",
"source": "security@mozilla.org"
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-31011",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:22.630",
"lastModified": "2025-04-15T12:15:22.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ReichertBrothers SimplyRETS Real Estate IDX allows Reflected XSS. This issue affects SimplyRETS Real Estate IDX: from n/a through 3.0.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/simply-rets/vulnerability/wordpress-simplyrets-real-estate-idx-plugin-3-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3181",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T22:15:21.350",
"lastModified": "2025-04-07T17:15:37.707",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-15T12:47:18.723",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,78 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/15",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.303140",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.303140",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.543841",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/p1026/CVE/issues/15",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3182",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T22:15:21.533",
"lastModified": "2025-04-07T17:15:37.897",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-15T12:36:25.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,76 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/16",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.303141",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.303141",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.543842",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/p1026/CVE/issues/16",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3183",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T22:15:21.723",
"lastModified": "2025-04-07T17:15:38.060",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-15T12:30:35.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,78 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/17",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.303142",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.303142",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.543843",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/p1026/CVE/issues/17",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3184",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T23:15:38.170",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-15T12:25:42.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,78 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/18",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://vuldb.com/?ctiid.303143",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.303143",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.543844",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/p1026/CVE/issues/18",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3185",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T23:15:38.350",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-15T12:22:57.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,76 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/19",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.303144",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.303144",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.543845",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/p1026/CVE/issues/19",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-32102",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-15T13:15:54.783",
"lastModified": "2025-04-15T13:15:54.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI."
}
],
"metrics": {},
"references": [
{
"url": "https://seclists.org/fulldisclosure/2025/Apr/17",
"source": "cve@mitre.org"
},
{
"url": "https://www.crushftp.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.crushftp.com/download/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-32103",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-15T13:15:54.893",
"lastModified": "2025-04-15T13:15:54.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows directory traversal via the /WebInterface/function/ URI to read files accessible by SMB at UNC share pathnames, bypassing SecurityManager restrictions."
}
],
"metrics": {},
"references": [
{
"url": "https://seclists.org/fulldisclosure/2025/Apr/17",
"source": "cve@mitre.org"
},
{
"url": "https://www.crushftp.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.crushftp.com/download/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-32929",
"sourceIdentifier": "audit@patchstack.com",
"published": "2025-04-15T12:15:22.787",
"lastModified": "2025-04-15T12:15:22.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Dmitry V. (CEO of \"UKR Solution\") Barcode Generator for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Barcode Generator for WooCommerce: from n/a through 2.0.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/embedding-barcodes-into-product-pages-and-orders/vulnerability/wordpress-barcode-generator-for-woocommerce-plugin-2-0-4-arbitrary-content-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-32943",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2025-04-15T11:15:45.690",
"lastModified": "2025-04-15T11:15:45.690",
"lastModified": "2025-04-15T13:15:55.003",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "reefs@jfrog.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,6 +55,10 @@
{
"url": "https://research.jfrog.com/vulnerabilities/peertube-hls-path-traversal/",
"source": "reefs@jfrog.com"
},
{
"url": "https://research.jfrog.com/vulnerabilities/peertube-hls-path-traversal/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-32944",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2025-04-15T13:15:55.100",
"lastModified": "2025-04-15T13:15:55.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The vulnerability allows any authenticated user to cause the PeerTube server to stop functioning in a persistent manner.\u00a0\u00a0If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. If the yauzl library encounters a filename that is considered illegal, it raises an exception that is uncaught by PeerTube, leading to a crash which repeats infinitely on startup."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "reefs@jfrog.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "reefs@jfrog.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-248"
}
]
}
],
"references": [
{
"url": "https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1",
"source": "reefs@jfrog.com"
},
{
"url": "https://research.jfrog.com/vulnerabilities/peertube-archive-persistent-dos/",
"source": "reefs@jfrog.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-32945",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2025-04-15T13:15:55.230",
"lastModified": "2025-04-15T13:15:55.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The vulnerability allows an existing user to add playlists to a different user\u2019s channel using the PeerTube REST API. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "reefs@jfrog.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "reefs@jfrog.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-282"
}
]
}
],
"references": [
{
"url": "https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1",
"source": "reefs@jfrog.com"
},
{
"url": "https://research.jfrog.com/vulnerabilities/peertube-arbitrary-playlist-creation-rest/",
"source": "reefs@jfrog.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-32946",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2025-04-15T13:15:55.360",
"lastModified": "2025-04-15T13:15:55.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability allows any attacker to add playlists to a different user\u2019s channel using the ActivityPub protocol. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "reefs@jfrog.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "reefs@jfrog.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-282"
}
]
}
],
"references": [
{
"url": "https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1",
"source": "reefs@jfrog.com"
},
{
"url": "https://research.jfrog.com/vulnerabilities/peertube-arbitrary-playlist-creation-activitypub/",
"source": "reefs@jfrog.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2025-3608",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-04-15T13:15:55.590",
"lastModified": "2025-04-15T13:15:55.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A race condition existed in nsHttpTransaction that could have been exploited to cause memory corruption, potentially leading to an exploitable condition. This vulnerability affects Firefox < 137.0.2."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1951554",
"source": "security@mozilla.org"
},
{
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-25/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3622",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-15T06:15:44.227",
"lastModified": "2025-04-15T06:15:44.227",
"lastModified": "2025-04-15T13:15:55.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Xorbits Inference up to 1.4.1. This issue affects the function load of the file xinference/thirdparty/cosyvoice/cli/model.py. The manipulation leads to deserialization."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad, clasificada como cr\u00edtica, en Xorbits Inference hasta la versi\u00f3n 1.4.1. Este problema afecta la carga de funciones del archivo xinference/thirdparty/cosyvoice/cli/model.py. La manipulaci\u00f3n provoca la deserializaci\u00f3n."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.552245",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/xorbitsai/inference/issues/3190",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-15T12:00:23.122165+00:00
2025-04-15T14:00:20.768944+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-15T11:15:45.690000+00:00
2025-04-15T13:50:15.537000+00:00
```
### Last Data Feed Release
@ -33,27 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
289855
289882
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `27`
- [CVE-2025-1688](CVE-2025/CVE-2025-16xx/CVE-2025-1688.json) (`2025-04-15T11:15:44.140`)
- [CVE-2025-2083](CVE-2025/CVE-2025-20xx/CVE-2025-2083.json) (`2025-04-15T10:15:14.680`)
- [CVE-2025-32943](CVE-2025/CVE-2025-329xx/CVE-2025-32943.json) (`2025-04-15T11:15:45.690`)
- [CVE-2025-26744](CVE-2025/CVE-2025-267xx/CVE-2025-26744.json) (`2025-04-15T12:15:19.587`)
- [CVE-2025-26745](CVE-2025/CVE-2025-267xx/CVE-2025-26745.json) (`2025-04-15T12:15:19.743`)
- [CVE-2025-26889](CVE-2025/CVE-2025-268xx/CVE-2025-26889.json) (`2025-04-15T12:15:19.907`)
- [CVE-2025-26894](CVE-2025/CVE-2025-268xx/CVE-2025-26894.json) (`2025-04-15T12:15:20.073`)
- [CVE-2025-26942](CVE-2025/CVE-2025-269xx/CVE-2025-26942.json) (`2025-04-15T12:15:20.243`)
- [CVE-2025-26944](CVE-2025/CVE-2025-269xx/CVE-2025-26944.json) (`2025-04-15T12:15:20.413`)
- [CVE-2025-26954](CVE-2025/CVE-2025-269xx/CVE-2025-26954.json) (`2025-04-15T12:15:20.567`)
- [CVE-2025-26955](CVE-2025/CVE-2025-269xx/CVE-2025-26955.json) (`2025-04-15T12:15:20.713`)
- [CVE-2025-26958](CVE-2025/CVE-2025-269xx/CVE-2025-26958.json) (`2025-04-15T12:15:20.880`)
- [CVE-2025-26959](CVE-2025/CVE-2025-269xx/CVE-2025-26959.json) (`2025-04-15T12:15:21.037`)
- [CVE-2025-26982](CVE-2025/CVE-2025-269xx/CVE-2025-26982.json) (`2025-04-15T12:15:21.267`)
- [CVE-2025-26990](CVE-2025/CVE-2025-269xx/CVE-2025-26990.json) (`2025-04-15T12:15:21.597`)
- [CVE-2025-26992](CVE-2025/CVE-2025-269xx/CVE-2025-26992.json) (`2025-04-15T12:15:21.773`)
- [CVE-2025-30962](CVE-2025/CVE-2025-309xx/CVE-2025-30962.json) (`2025-04-15T12:15:21.957`)
- [CVE-2025-30964](CVE-2025/CVE-2025-309xx/CVE-2025-30964.json) (`2025-04-15T12:15:22.140`)
- [CVE-2025-30965](CVE-2025/CVE-2025-309xx/CVE-2025-30965.json) (`2025-04-15T12:15:22.313`)
- [CVE-2025-30985](CVE-2025/CVE-2025-309xx/CVE-2025-30985.json) (`2025-04-15T12:15:22.463`)
- [CVE-2025-31011](CVE-2025/CVE-2025-310xx/CVE-2025-31011.json) (`2025-04-15T12:15:22.630`)
- [CVE-2025-32102](CVE-2025/CVE-2025-321xx/CVE-2025-32102.json) (`2025-04-15T13:15:54.783`)
- [CVE-2025-32103](CVE-2025/CVE-2025-321xx/CVE-2025-32103.json) (`2025-04-15T13:15:54.893`)
- [CVE-2025-32929](CVE-2025/CVE-2025-329xx/CVE-2025-32929.json) (`2025-04-15T12:15:22.787`)
- [CVE-2025-32944](CVE-2025/CVE-2025-329xx/CVE-2025-32944.json) (`2025-04-15T13:15:55.100`)
- [CVE-2025-32945](CVE-2025/CVE-2025-329xx/CVE-2025-32945.json) (`2025-04-15T13:15:55.230`)
- [CVE-2025-32946](CVE-2025/CVE-2025-329xx/CVE-2025-32946.json) (`2025-04-15T13:15:55.360`)
- [CVE-2025-3608](CVE-2025/CVE-2025-36xx/CVE-2025-3608.json) (`2025-04-15T13:15:55.590`)
### CVEs modified in the last Commit
Recently modified CVEs: `5`
Recently modified CVEs: `20`
- [CVE-2024-12094](CVE-2024/CVE-2024-120xx/CVE-2024-12094.json) (`2025-04-15T10:15:13.780`)
- [CVE-2025-22371](CVE-2025/CVE-2025-223xx/CVE-2025-22371.json) (`2025-04-15T11:15:45.217`)
- [CVE-2025-22372](CVE-2025/CVE-2025-223xx/CVE-2025-22372.json) (`2025-04-15T11:15:45.380`)
- [CVE-2025-22373](CVE-2025/CVE-2025-223xx/CVE-2025-22373.json) (`2025-04-15T11:15:45.533`)
- [CVE-2025-3579](CVE-2025/CVE-2025-35xx/CVE-2025-3579.json) (`2025-04-15T09:15:13.950`)
- [CVE-2017-20022](CVE-2017/CVE-2017-200xx/CVE-2017-20022.json) (`2025-04-15T13:15:45.220`)
- [CVE-2022-2846](CVE-2022/CVE-2022-28xx/CVE-2022-2846.json) (`2025-04-15T13:15:48.600`)
- [CVE-2022-46853](CVE-2022/CVE-2022-468xx/CVE-2022-46853.json) (`2025-04-15T13:10:20.330`)
- [CVE-2023-3640](CVE-2023/CVE-2023-36xx/CVE-2023-3640.json) (`2025-04-15T12:15:17.840`)
- [CVE-2024-13610](CVE-2024/CVE-2024-136xx/CVE-2024-13610.json) (`2025-04-15T13:15:54.463`)
- [CVE-2025-28395](CVE-2025/CVE-2025-283xx/CVE-2025-28395.json) (`2025-04-15T12:52:46.433`)
- [CVE-2025-28398](CVE-2025/CVE-2025-283xx/CVE-2025-28398.json) (`2025-04-15T12:51:12.750`)
- [CVE-2025-29150](CVE-2025/CVE-2025-291xx/CVE-2025-29150.json) (`2025-04-15T13:50:15.537`)
- [CVE-2025-29389](CVE-2025/CVE-2025-293xx/CVE-2025-29389.json) (`2025-04-15T13:42:23.447`)
- [CVE-2025-29868](CVE-2025/CVE-2025-298xx/CVE-2025-29868.json) (`2025-04-15T13:07:54.393`)
- [CVE-2025-30177](CVE-2025/CVE-2025-301xx/CVE-2025-30177.json) (`2025-04-15T13:00:12.587`)
- [CVE-2025-30284](CVE-2025/CVE-2025-302xx/CVE-2025-30284.json) (`2025-04-15T13:13:50.853`)
- [CVE-2025-3035](CVE-2025/CVE-2025-30xx/CVE-2025-3035.json) (`2025-04-15T12:55:21.203`)
- [CVE-2025-3181](CVE-2025/CVE-2025-31xx/CVE-2025-3181.json) (`2025-04-15T12:47:18.723`)
- [CVE-2025-3182](CVE-2025/CVE-2025-31xx/CVE-2025-3182.json) (`2025-04-15T12:36:25.193`)
- [CVE-2025-3183](CVE-2025/CVE-2025-31xx/CVE-2025-3183.json) (`2025-04-15T12:30:35.003`)
- [CVE-2025-3184](CVE-2025/CVE-2025-31xx/CVE-2025-3184.json) (`2025-04-15T12:25:42.497`)
- [CVE-2025-3185](CVE-2025/CVE-2025-31xx/CVE-2025-3185.json) (`2025-04-15T12:22:57.350`)
- [CVE-2025-32943](CVE-2025/CVE-2025-329xx/CVE-2025-32943.json) (`2025-04-15T13:15:55.003`)
- [CVE-2025-3622](CVE-2025/CVE-2025-36xx/CVE-2025-3622.json) (`2025-04-15T13:15:55.687`)
## Download and Usage

View File

@ -102375,7 +102375,7 @@ CVE-2017-20019,0,0,683a56b6abe009a4e6c1169eeea2ad6e50396b62a1071c31a68087d3cca0a
CVE-2017-2002,0,0,9afd8990d44d2484aebcdca634b02c6ff87be1e6fc1c70f894728c54a8e9d7c0,2023-11-07T02:43:26.690000
CVE-2017-20020,0,0,ddc154de59f9c868fc0bbcbfa8f648bf50d15a545d61406985b6cbc407c8ab36,2024-11-21T03:22:27.827000
CVE-2017-20021,0,0,768b307da8c132d7530b1123bab87655cad9a898538e81cbb2c6b418fe25a156,2024-11-21T03:22:27.953000
CVE-2017-20022,0,0,91dab59333128101b23212e7415a18d44527ede00e7f216aedfa2463a2a95329,2024-11-21T03:22:28.090000
CVE-2017-20022,0,1,51a5bdc917b95e74452f82686f127303dfc5e1f615f348e9211c75ef850dd117,2025-04-15T13:15:45.220000
CVE-2017-20023,0,0,6c1ea16a6f41a1f22bda81b99c03c212e564149aafd9760d9594f1ff47f07d6e,2024-11-21T03:22:28.220000
CVE-2017-20024,0,0,eb70f202042b4262705ffa3e79f04cd7fb65a94d5c2ffc0a3182330b75ac26f9,2024-11-21T03:22:28.357000
CVE-2017-20025,0,0,a254a2c0a691282e1725ca8af5505d9e915f19f6b3577a9cdc86bf0b2f883d72,2024-11-21T03:22:28.493000
@ -197311,7 +197311,7 @@ CVE-2022-28450,0,0,902ef43b7befda46c35d8785897e3fc5b5418637614fd5787f7649f60f024
CVE-2022-28451,0,0,ffb05d569011f6b22e8b805c206434cda860602b26d93d7c7bc8614ee72d3fa1,2024-11-21T06:57:22.743000
CVE-2022-28452,0,0,90ebd6d6131edb981e7d90ce735f1c1503bfafe42cfaf846642b36683fc1a15b,2024-11-21T06:57:22.897000
CVE-2022-28454,0,0,d2822d1e28973a3d23caad3102bc902e1f70acea584395e8d5f72e28c76561fc,2024-11-21T06:57:23.043000
CVE-2022-2846,0,0,a000c56af61410d68cbea02b0aa6b8b05976a0c9cf6b34b80668830f18be798a,2024-11-21T07:01:47.917000
CVE-2022-2846,0,1,55b13f77a85e10206206c0b1b4f83d4de4a63330f2d4673a0357cbd19adbc4aa,2025-04-15T13:15:48.600000
CVE-2022-28461,0,0,eeba39462648912bc271d3540feb028bf0e88ed4e46938a4c73d6e50bca2309f,2024-11-21T06:57:23.193000
CVE-2022-28462,0,0,6d195adf1051f5da9495d4323f8470f7ac3778960c39acdb9c65e7d06dd131d1,2024-11-21T06:57:23.343000
CVE-2022-28463,0,0,b3f68ad17257b50142d434ae1c24ebdcbe3d90fe8ae16618ff8eff444d208882,2024-11-21T06:57:23.483000
@ -211640,7 +211640,7 @@ CVE-2022-4685,0,0,f811885dae02c5392d6262d2ce12d3efc8cce3de17cc4b2f0f68d631d60d55
CVE-2022-46850,0,0,1ee7230cd0ce68747cdc4c15d295683ec86f9c361c32306e65b18b714c4fb38c,2024-11-21T07:31:10.100000
CVE-2022-46851,0,0,4a1db3251a0659832fecab1e76f8718c9cb41559e0349c62362e9b3203e01012,2024-11-21T07:31:10.240000
CVE-2022-46852,0,0,d62f8845c68f8f8ad6e6e03680fd3d668f653f71cbe178c609fb50b16bba7682,2024-11-21T07:31:10.377000
CVE-2022-46853,0,0,597ccea55c1d3761b9a080e5f64f901f6064f48f6a15ce6a136c5a2f910a7111,2024-11-21T07:31:10.500000
CVE-2022-46853,0,1,32abb78ff89d3fda6c8fdbaf825c5f057c2942b788ec490ccf7e8ad86f4a8269,2025-04-15T13:10:20.330000
CVE-2022-46854,0,0,d381d825968efa10033cef77f8bb8812957b4f8331dc8462132ed31e02e39d2d,2024-11-21T07:31:10.627000
CVE-2022-46855,0,0,67f8e0843ed691e23edcc11c7c4a6b8cf6e871728a48c0617b73618d68161f94,2024-11-21T07:31:10.750000
CVE-2022-46856,0,0,2a65047cf34cf7582390923064fe75323c8ee899ba58c16a39f6018116f42c5b,2024-11-21T07:31:10.890000
@ -229018,7 +229018,7 @@ CVE-2023-36396,0,0,e830a5b2836398121cc1babf25a6160e95fed26a5fdcadcc50a99c5855116
CVE-2023-36397,0,0,9f1524240de0fc258e50e8dd3cdb705a4624ff7e6f7a580d78a12d9c9c0f8199,2024-11-21T08:09:40.507000
CVE-2023-36398,0,0,69eff38d70f40d33f0334de39d0896cdccc5d65936ab3f331dd107a771106637,2024-11-21T08:09:40.653000
CVE-2023-36399,0,0,834680537442f52fe693618867ce29cd8f2d006f17004f0a1f0b4035ac58527c,2024-11-21T08:09:40.783000
CVE-2023-3640,0,0,7c218bc64338d12981b8f04d38477795ef979ead89c50d6699585256b667c95b,2024-11-21T08:17:43.823000
CVE-2023-3640,0,1,52e6c4aaabd1940fde11057b2dbb2eb1fb9331b7d1f0ca4ce868671d356ad7fe,2025-04-15T12:15:17.840000
CVE-2023-36400,0,0,6a89060e5ecb3bb2f8dc431f6bbc50f27e642dc3a24fa99f850e64eb4bac1d7d,2024-11-21T08:09:40.880000
CVE-2023-36401,0,0,08d1769059b8015b4b01fb9cb51405bd146a5d0afb0d9f0c65fa2b9da8dd413c,2024-11-21T08:09:41.010000
CVE-2023-36402,0,0,42148c391faf42c04e20d58f46db408d6dd6426fb764fbb5d2415386aadb0e6e,2024-11-21T08:09:41.167000
@ -246594,7 +246594,7 @@ CVE-2024-1209,0,0,0c11632b4f799f8334de1fe031a18ed75abc1306137789706f83e79036cdbf
CVE-2024-12090,0,0,3ae49935c044b86a3444ecb09701dd060f603a46c2ce1e27c4f8226f9377436d,2024-12-16T15:15:06.393000
CVE-2024-12091,0,0,35c9100407a2a2f03cc09233dbdc35208e548ffdd088d484bb9b374c740b5bc0,2024-12-16T15:15:06.540000
CVE-2024-12092,0,0,6cedbb52bdc4fd872b35781acb98ac9a9b54d520c5d29f314ba42350997260f9,2024-12-16T15:15:06.677000
CVE-2024-12094,0,1,12c81bd6e44afba106aa5b9c1f1003a5bf1fbf3bef13df97a3697ccb2bca6566,2025-04-15T10:15:13.780000
CVE-2024-12094,0,0,12c81bd6e44afba106aa5b9c1f1003a5bf1fbf3bef13df97a3697ccb2bca6566,2025-04-15T10:15:13.780000
CVE-2024-12095,0,0,266981a4f802a4e630b12ac2741c69386abcb730aae3bae3718e0ed36165b300,2025-02-11T02:15:33.547000
CVE-2024-12096,0,0,a0b37dcc639d983cbff8481184c987ae3b7851e6c867f94b52bee5fdf38bc784,2024-12-24T17:15:07.497000
CVE-2024-12097,0,0,080558aa7b3ac1febe350d71d1f75d062875ebd1cc067888fb9586ec0ac95026,2025-03-05T14:15:35.280000
@ -248096,7 +248096,7 @@ CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e552
CVE-2024-13608,0,0,b8b173401de3e1097c36a401f8928ae8cd5257912fc8cac1e3eea9f3234c491d,2025-02-19T19:15:14.260000
CVE-2024-13609,0,0,007c027106c3ec1d23edeaef367a828bff90431ee7cff957b7b00cd86e9cc2ee,2025-02-21T16:06:13.673000
CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000
CVE-2024-13610,0,0,780aaf2a13dacf29d1830d4a86a4feefb0399e74ffb5bb7c5e9d9115d0d55015,2025-04-15T06:15:43.443000
CVE-2024-13610,0,1,8b94fee0225fcd3b82e7fc76c2b19eca775fc2e8fd9448ca30db591247e0bcb2,2025-04-15T13:15:54.463000
CVE-2024-13611,0,0,12cf0d23fdb6ecb0f110f9a143d60d61370605283cf62e7faa4a9aec63988bc1,2025-03-01T09:15:09.220000
CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000
CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000
@ -282391,7 +282391,7 @@ CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f7
CVE-2025-1683,0,0,bd65547481d5838793e5ad335f0bed73820ac4e81083a338100991ba4dbdb8f6,2025-03-13T10:15:19.687000
CVE-2025-1686,0,0,d1ef42202e7d4a5987e7a7fded4c55f6d574235579a6aece0e74834a9611412f,2025-04-07T18:29:22.970000
CVE-2025-1687,0,0,553889bbf1832e8d0246ba505a729ffeb25a6379aca1ca1f8f3f4851031d21de,2025-02-28T00:15:36.240000
CVE-2025-1688,1,1,5c6a06bac422adb33706be8471e71dc0fb7c545a86012640310ae7a34b701c10,2025-04-15T11:15:44.140000
CVE-2025-1688,0,0,5c6a06bac422adb33706be8471e71dc0fb7c545a86012640310ae7a34b701c10,2025-04-15T11:15:44.140000
CVE-2025-1689,0,0,ab0c739015e868491c3393a9dbae0818d17aadfd3d893b02587a47ce8b53dda1,2025-03-11T16:19:41.870000
CVE-2025-1690,0,0,8515e3753c09328c692a367a40f4a48932e87850b11ca7360289773890aa45cb,2025-03-11T15:59:35.800000
CVE-2025-1691,0,0,5eec1cea57e35f579c692b6064aead03fa43885ba22ff953ac9e969443e43853,2025-02-27T16:15:38.610000
@ -282808,7 +282808,7 @@ CVE-2025-2078,0,0,9de7f9d36f257c6e4ade1283dce5bdc5d09f9fe37ce0133e41f71eebe0b83d
CVE-2025-2079,0,0,1df99b44115761c768e37334a26d3048ad67e1a5d7d245b0266a3de82699255e,2025-03-13T17:15:38.080000
CVE-2025-2080,0,0,8997dd07180b59c809f3df794229cdf89e46a6b355c2dafb103afdfc1a28dd39,2025-03-13T17:15:38.253000
CVE-2025-2081,0,0,4bcbb760543adfc2793fb421232d69f0d37c0297321a5cb193e8d3ca3a30e752,2025-03-13T17:15:38.420000
CVE-2025-2083,1,1,b56ebbfb64e690ba283af5695296a4a84125b08da3edddfa6c1f4a6e681671a4,2025-04-15T10:15:14.680000
CVE-2025-2083,0,0,b56ebbfb64e690ba283af5695296a4a84125b08da3edddfa6c1f4a6e681671a4,2025-04-15T10:15:14.680000
CVE-2025-2084,0,0,9186874e9417709e91bfbc0560be14cc85e2d2f24397f030f63236f2d997e78b,2025-03-12T17:20:12.987000
CVE-2025-2085,0,0,cdc776ce557f1f5be020949a2de79ef2cb25d7baf89cebb5bb3d5d1806b66fad,2025-03-13T15:23:29.823000
CVE-2025-2086,0,0,4e4362d5771bd0746a87b792e272a1c98aa3e837b1c239bf63f7ebc27efa4148,2025-03-13T16:05:15.390000
@ -283956,9 +283956,9 @@ CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9
CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000
CVE-2025-2237,0,0,6c579bdd62bb8bda18ad2566fa6cb9554676ec322606aaab27d5422395dc3d2a,2025-04-01T20:26:11.547000
CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000
CVE-2025-22371,0,1,0fd515925b08583f66cf085b616128c74a1f3ca917aaf620b57021f2d4ed8aeb,2025-04-15T11:15:45.217000
CVE-2025-22372,0,1,75369389960d3f21f4b6bbb162c3c9c860956b812ae91586aca01dac2b81e9e1,2025-04-15T11:15:45.380000
CVE-2025-22373,0,1,b4963d7ab520a3ca5c3658c16dccdae3f07c2db90137181fcb67a712fe2c95e6,2025-04-15T11:15:45.533000
CVE-2025-22371,0,0,0fd515925b08583f66cf085b616128c74a1f3ca917aaf620b57021f2d4ed8aeb,2025-04-15T11:15:45.217000
CVE-2025-22372,0,0,75369389960d3f21f4b6bbb162c3c9c860956b812ae91586aca01dac2b81e9e1,2025-04-15T11:15:45.380000
CVE-2025-22373,0,0,b4963d7ab520a3ca5c3658c16dccdae3f07c2db90137181fcb67a712fe2c95e6,2025-04-15T11:15:45.533000
CVE-2025-22374,0,0,3c76c0c310d0a27c4ffac60f4f224c77b792b9b62909428eaeef4914314662fa,2025-04-11T15:39:52.920000
CVE-2025-22375,0,0,ad41e29f59774e7ec2e9cb8e8af4d844651a9cedc9ff6f6b9f174f11c786065a,2025-04-11T15:39:52.920000
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
@ -286803,7 +286803,11 @@ CVE-2025-26737,0,0,ef70e0172c0763982b4f704c98436f4e8fa7d9222206609f397682c2bb7a4
CVE-2025-26738,0,0,fe74511d18daa7f8c822f7c00f478c77ab9fe05590b455ccad4998d15c474085,2025-03-27T16:45:12.210000
CVE-2025-26739,0,0,2514d7567fdad9bf988b03c827c3cf9332db7eb4aaa61ffce3b49cc72d1bf133,2025-03-27T16:45:27.850000
CVE-2025-2674,0,0,b17ff2a840d43872ce8941660011244ce317e8241898334fca92f2c7e2d2df13,2025-03-27T18:21:20.710000
CVE-2025-26741,1,1,077493a15142459277063e747dcd2be4904c9fef94f2d67af93ba87b2692b4b1,2025-04-15T12:15:19.230000
CVE-2025-26742,0,0,d1c1ef0a2d3414bdd8fc0829685f2cb4bdc30a516dc3a80c709e135b1569fc7e,2025-03-27T16:45:46.410000
CVE-2025-26743,1,1,8f7e8fd715d3bf9e7d968b130b8cfbcd5b52046c49a4d1c38253711a76d245a5,2025-04-15T12:15:19.407000
CVE-2025-26744,1,1,7b1c579591e22601854cda0a7b44e412b57bd02b95573aecf1bbbfd59ffd9c82,2025-04-15T12:15:19.587000
CVE-2025-26745,1,1,a7b04b2e513e9ca108505428cad622643f9721f36f7e47e8c23845a6fb26f582,2025-04-15T12:15:19.743000
CVE-2025-26747,0,0,f799dbfce90467344ad4aaf43405a0c5bb92178129ef15a39374277528ecf159,2025-03-27T16:45:27.850000
CVE-2025-2675,0,0,e49840b3a5ca3e77744a146445fa06f116b5cc16d89bcce736017749e482f04f,2025-03-26T14:03:31.380000
CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000
@ -286882,10 +286886,12 @@ CVE-2025-26885,0,0,2ef732a4cebbeb85a5dbbaf27f49124f8d762a49e8e7f3b22ab266ddbd21a
CVE-2025-26886,0,0,3fccb07cd6593c19d4ebd609ac67b0d6e5961e270965b650cf84c0ac5737cb12,2025-03-15T22:15:13.837000
CVE-2025-26887,0,0,d620956d3ea5625abfbc4595a1a19c4cbaf27ed3b93aec2afc55fa2fa354983d,2025-02-25T15:15:25.117000
CVE-2025-26888,0,0,88340f4d9fa5152f8d2baf93269a38c0f6caaecf7620d64ac415d48780f03414,2025-04-11T15:40:10.277000
CVE-2025-26889,1,1,5d3d0230f247990f9b124f76f20277fc846f15b430b1a8878c6e493f1b4bb795,2025-04-15T12:15:19.907000
CVE-2025-2689,0,0,a0a16f7e7cbfe138500325b64261c6e20c16741d6a695a680e6c214018b4891c,2025-03-24T17:17:26.607000
CVE-2025-26890,0,0,7c5bd562991190453d0d95d46540e8b902fafbca311e972364b1df4ac9dc0f02,2025-03-28T18:11:40.180000
CVE-2025-26891,0,0,20d9b98fa953b2c2ae1876c761e770a063cad8d8555cb8705b5f8d6ebece6625,2025-02-25T15:15:25.253000
CVE-2025-26893,0,0,1e55e8031dea60b355f7bfdcd2784f0b2b9ad5afec3a445aae3078ebb5e3718e,2025-02-25T15:15:25.390000
CVE-2025-26894,1,1,efe40f827831db45c8611c7778695b40f9072fb3eeb493ca45eec8a9764bcffe,2025-04-15T12:15:20.073000
CVE-2025-26895,0,0,3eb6addb22fb4b37c6c3f31fac229fd983ae417a5135246d65834c2c589c8b04,2025-03-15T22:15:14.013000
CVE-2025-26896,0,0,698aeca623c70e4b06e040cd55b5c2549a6c6c52876a66af61cb43c3e54c60ab,2025-02-25T15:15:25.527000
CVE-2025-26897,0,0,008344bbc82c06e5be6950b4745d40969170caa982c12bbebacc137b35f38f42,2025-02-25T15:15:25.690000
@ -286927,15 +286933,21 @@ CVE-2025-26938,0,0,ccee8025a5da0f5335768772061878090bde7e99bf569f115b93a00b9aeb2
CVE-2025-26939,0,0,58ae7bfaf9694ba77b15898e6615a5486bcece1885e349ca30dab005e95021c4,2025-02-25T15:15:27.883000
CVE-2025-26940,0,0,027a042a9996f74c1b536a3ee0cf90caed7b08e7a2e9d51808cb5cb94c96159d,2025-03-15T22:15:14.810000
CVE-2025-26941,0,0,eeab969e211d00d26492a623edb2ecb8e112a324bb65c6f415710335014e5142,2025-03-27T16:45:27.850000
CVE-2025-26942,1,1,f512122c4d445d2c2ba7f7573d91793303f6cb75e7d6a1fdd214ad5189437846,2025-04-15T12:15:20.243000
CVE-2025-26943,0,0,880198cc8338519544198ca562f39ac104b8bef0a8c121e384075bf4aedbb34a,2025-02-25T15:15:28.030000
CVE-2025-26944,1,1,10e2ca1533b2ca8be1d834521fc56889f16a97eb72358680e9004a27c1af48b2,2025-04-15T12:15:20.413000
CVE-2025-26945,0,0,6b5c2fad0a9b8f40f34855e800ac09994d07fec61ef015d056c7f881c616332e,2025-02-25T15:15:28.177000
CVE-2025-26946,0,0,df781d5aa26b91c3cad6d895bb9f19c76a8ac0bc37b086b89e10307c3390056d,2025-02-25T15:15:28.320000
CVE-2025-26947,0,0,17ca4a960f692537dd7bd29667eead07a638e9187cd25b27f2e6eb39d83f12f2,2025-02-25T15:15:28.457000
CVE-2025-26948,0,0,7e692ce2f0fb2189773dab014b01c64cf92c1c0d6e24b0bdecd31d44fc8a160e,2025-02-25T15:15:28.597000
CVE-2025-26949,0,0,756ec3a8273ffe21cd013eae401b29681f02ddf1186e27472f179b3deeae84ca,2025-02-25T15:15:28.733000
CVE-2025-26952,0,0,a13de9204c8fb7f5ac97c6580a46c2af94bfa390df931bb26a31447f73f1cb45,2025-02-25T15:15:28.870000
CVE-2025-26954,1,1,fba51a125990b1498fbe197649e7964122b367070227862ca5d7dd606ae6ddb7,2025-04-15T12:15:20.567000
CVE-2025-26955,1,1,3ad9de8b7f7d06940ead5a18c5a4e9131f579ea5f080ccfae967421bcc315474,2025-04-15T12:15:20.713000
CVE-2025-26956,0,0,67dc3e0376c57291d36674bc82b71c5ab19cd7ba364ee74deb6f26199d4b6b1d,2025-03-28T18:11:40.180000
CVE-2025-26957,0,0,6c29e79d7d5ad28c3d1452c9dd015db2eba8e2ce8661a68ea61bf9040ea56305,2025-02-25T15:15:29.010000
CVE-2025-26958,1,1,c9d900dc687bf740a847cdf973f9d65ec0811330f9e6eeea1295b64225ddc2e6,2025-04-15T12:15:20.880000
CVE-2025-26959,1,1,cc82209c7785983a31c6bf30c9459b0fd5521b510ea252cf2af39f0f3f9f8506,2025-04-15T12:15:21.037000
CVE-2025-26960,0,0,ad36f999467934854428e722bc7b7f4dfd105622c135096dd3c0aa70afd80457,2025-02-25T15:15:29.150000
CVE-2025-26961,0,0,32038fb2c0fd1f686db79d976fcbcdf3a25031c595e82f3f1b331462be320b81,2025-03-15T22:15:14.960000
CVE-2025-26962,0,0,050ad56156a26d49e3d36ac5fa3745ab1b7f9b90df44edc74e086668cb228eab,2025-02-25T15:15:29.290000
@ -286957,6 +286969,7 @@ CVE-2025-26978,0,0,772f8c7e1cc61be12e475c7e34fcd1b8cf09b60bc8c45928de3d3849a34cf
CVE-2025-26979,0,0,3430c3c7589910c0ce9812da83cd3b1e3a2f205c2786e4db026732f56da4254c,2025-02-25T15:15:30.587000
CVE-2025-26980,0,0,dde475827d98f921adf627fe3afe81e813ccdfcae63ecbed9473027c0ab62abe,2025-02-25T15:15:30.730000
CVE-2025-26981,0,0,3c198cc5da3d6f650a9e99b4d0dde322351720ee3c085612f1fbc577072a1976,2025-02-25T15:15:30.873000
CVE-2025-26982,1,1,f022ecca7d7cf214e067185008ebac7307c3a408b8dee2e48d258659dce1e48f,2025-04-15T12:15:21.267000
CVE-2025-26983,0,0,d6a859f29d624b201143fae24b6b474b6dfa136735775ba5e00cc884a212ebed,2025-02-25T15:15:31.043000
CVE-2025-26984,0,0,850870a6d13166bab30d2f61af8dc6fc95f6d7238517ef3ceb04f89d1f9a98a1,2025-03-07T20:35:00.770000
CVE-2025-26985,0,0,5fb0ce30a005f045393ce6a9e4877e64e68127385c508c29b67962ad383bc902,2025-02-25T15:15:31.183000
@ -286965,7 +286978,9 @@ CVE-2025-26987,0,0,597d2628b42a4a65165e807aa9eb7e16ab56b0bee51783965b846b2753d56
CVE-2025-26988,0,0,0319a38815984a3d7757bba2dab0c325e1f38ec9d387be497de99ad33c8d24a9,2025-03-07T20:35:36.553000
CVE-2025-26989,0,0,b0ef3d20e454de8c22a4b1527a3da924af34822ec9bc2b6dd3acc50906fd5b9d,2025-03-07T20:36:56.700000
CVE-2025-2699,0,0,6396e1b9f8444bd1d0105b607426e0438fae6c8e1cad3a588c50e09924ca055e,2025-03-24T17:33:00.020000
CVE-2025-26990,1,1,08a6b5eb79bf3734577f837a86de90ec311bec7058910c967622192930e32e1a,2025-04-15T12:15:21.597000
CVE-2025-26991,0,0,84217b1c95797f5f6a3434460f887fd28027f10e4a2535fce5046994c53e0aac,2025-02-25T15:15:31.460000
CVE-2025-26992,1,1,4b1d36d5d77271d2107c6aaf5af990fab7b413d1c5bce3347185592b864e20d2,2025-04-15T12:15:21.773000
CVE-2025-26993,0,0,25d916d390de90b80a1e84bf0243f302c32b655919eea97f6f91c9f96aa389dc,2025-02-25T15:15:31.590000
CVE-2025-26994,0,0,03494b736a3ca693fdaefc610166ca8a10d800440713e480c6b170f7815e45d0,2025-03-07T20:37:45.723000
CVE-2025-26995,0,0,9f9fd1cf4c78a39e37c563908ec2c351a2e202019a39ae0f35b6be53c49be04b,2025-02-25T15:15:31.720000
@ -287562,8 +287577,8 @@ CVE-2025-2836,0,0,fc5be678cb97345ef6d68aed15f5462ba8f4f63b5b10c6ab5fab3a18f12761
CVE-2025-28361,0,0,012842a41606e730430b254a67bbb658386b3833897674145b51c035a48415eb,2025-04-01T15:43:05.143000
CVE-2025-2837,0,0,b89aeb2a53f8a50fdc7d1cb971618f78d6548d3dfb914df0b41cb0d9a2a5f82a,2025-03-27T16:45:27.850000
CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4dfa3,2025-03-27T16:45:27.850000
CVE-2025-28395,0,0,787acf6514abb8a3a80c4bce46febca1493172cc64b611845553a9003726f018,2025-04-14T18:15:28.833000
CVE-2025-28398,0,0,a2165cc7a8a87e902702dee4b645778bcee1de648071e795add12a5949a33fef,2025-04-14T18:15:28.970000
CVE-2025-28395,0,1,e2a008eff6d871d94e498e18fdcd7ec1a8104377f0bfd0c36d8d69a8cfbea062,2025-04-15T12:52:46.433000
CVE-2025-28398,0,1,a80aa3350f7ebc843f0b185d49e6b66d7edf0d8201a54a2ee3a02548dd1b1270,2025-04-15T12:51:12.750000
CVE-2025-2840,0,0,1611919e470b3959ac5f5634b987862e109125e9a8a008183091dc9630f3ea33,2025-04-01T20:26:30.593000
CVE-2025-28400,0,0,cc1f6f84cf8a6714de7f979e521029089d85e3bab5eb1dddede51bed2df8cbb6,2025-04-09T17:29:47.113000
CVE-2025-28401,0,0,f7b9c29cb1543d57a788f6df9919d9bc678436ddeda3822118494d478d80547d,2025-04-09T17:19:47.947000
@ -287739,7 +287754,7 @@ CVE-2025-29137,0,0,6931ace246948745a6b3fe7c0c4f84f92cdbdc6e8e8f8a7f93a7b8720a179
CVE-2025-2914,0,0,f4da3bf15e0a024148c60f5942d8d165e3d668046cbe893c7644ad7b0d6619e0,2025-03-28T18:11:40.180000
CVE-2025-29149,0,0,2b30e3ef51abdd15292670ac51eb247a8a581b78085e4a43217ece3a22f27ca1,2025-03-27T15:26:02.940000
CVE-2025-2915,0,0,70cc8be03dfb35b9ef84c0237ac359de350c3b4b4245e9a89d1955b7eff26074,2025-04-14T14:03:21.190000
CVE-2025-29150,0,0,d63dc144134bdd58d64b5a241d38aa93b7976fc0b18bc7b222ca5fad328899e9,2025-04-11T15:39:52.920000
CVE-2025-29150,0,1,830ae278210dc8950b4025bdf811095dc9ceda7da749b4d24c53ea4d187bdb2f,2025-04-15T13:50:15.537000
CVE-2025-2916,0,0,a9d32a009c2c479d4d99380c6f5c7dc74ee32d7bcd65aba7c50dbefe66cc315d,2025-03-28T18:11:40.180000
CVE-2025-2917,0,0,456c071352ee17bf9505ffdef668916785181adeea61153a444057728f3de9f2,2025-04-14T13:53:30.877000
CVE-2025-29189,0,0,8f05af4418320348346691aa7f962df7a836889ea838607875b166fe868cccb7,2025-04-09T20:02:41.860000
@ -287784,7 +287799,7 @@ CVE-2025-29384,0,0,14456271181d2a6b38eac63454e7d903bdeae2563e5fc51ec6c8692dd53ec
CVE-2025-29385,0,0,f60ee6091bef3db2d6081e2edd6e0a4a37d7ecd5c70fcec7c258e2d44478f256,2025-03-19T19:15:49.280000
CVE-2025-29386,0,0,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff529e,2025-03-19T19:15:49.423000
CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2f45,2025-03-17T19:51:04.180000
CVE-2025-29389,0,0,7346acc1fe3e0bce9d89cb45e28f2dcad894f34f4ad9518c187469c5c46854ce,2025-04-09T20:02:41.860000
CVE-2025-29389,0,1,b6e910417322f02be556ac9b548f6e8b6c35848d660fba9931faab004d75355d,2025-04-15T13:42:23.447000
CVE-2025-29390,0,0,0d3f1a5443d923cd69474601e81c6ed56d32c74e48f2cfcfad1110a3c886a131,2025-04-09T20:02:41.860000
CVE-2025-29391,0,0,42d4546ada0a2b49c124dbe88b48d006d7589fb91bb0a018d0dd79fa5a9f12f6,2025-04-09T20:02:41.860000
CVE-2025-29394,0,0,b33985c121ec23217a26c766fe9bee2b1c6ed057a04b87c5f8c939ce3b37502f,2025-04-09T20:02:41.860000
@ -287917,7 +287932,7 @@ CVE-2025-2983,0,0,d31f69cd4a503a465c90bfed858cd3831ad229c0ecb657ddc75c62172e5f91
CVE-2025-29834,0,0,c1edafc5db08600d282b1d504c73c12ff10139e21c4a2899ff9f8e6c1240a7ff,2025-04-12T02:15:22.027000
CVE-2025-2984,0,0,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000
CVE-2025-2985,0,0,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000
CVE-2025-29868,0,0,9813b653c5bca2e8acf756b26daf804f197eeda8b9cebaf4dca020346cbb34e2,2025-04-10T15:16:03.860000
CVE-2025-29868,0,1,b927f2785378c622235f633189b112c490059ef762d715c0b82b004d9b8787d2,2025-04-15T13:07:54.393000
CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000
CVE-2025-2989,0,0,45a6c1ba1e6cd2d5c62dcb10c0528d36d57eceee6f8ab3df2269f6315f9c7634,2025-04-07T14:15:04.880000
CVE-2025-29891,0,0,752eb7db0cd8cf51c6f0df1d0540c6e0a94cdab3ef9ff768e6ace10510ce6968,2025-04-02T20:37:07.073000
@ -288053,7 +288068,7 @@ CVE-2025-30164,0,0,c838231ddadd650538b91334381739f0e5f84496049f4ab61b98fedaf2408
CVE-2025-30166,0,0,dc8fa2e955f9b83b24c2517018cb3ddc4399710004f918cf05eb88fd63c78734,2025-04-08T18:13:53.347000
CVE-2025-30168,0,0,3703f1f4b9dfa087aa1c5a98a4898da5aafd4533d5e73d111e4aa608fa2c614e,2025-03-21T15:15:43.440000
CVE-2025-3017,0,0,98ff904dc48968379de3c001eb6b068a3a8d13595e1e3e62ce18b74891721501,2025-04-01T20:26:22.890000
CVE-2025-30177,0,0,1bfbcea48aa1ea068670da36dff62558776eef3abe203d4326a5f744d663461b,2025-04-01T20:26:11.547000
CVE-2025-30177,0,1,e6a2dcc39bb402f3fbe897267a52a15e4f647d561f8f8204556d252b469adda6,2025-04-15T13:00:12.587000
CVE-2025-30179,0,0,e6188b5cfe41efd4be24afd0a9be97fe3cad7c2aaaf7dc5206b7ef410f616059,2025-03-27T14:45:47.520000
CVE-2025-3018,0,0,699e90ef59bc974dffc7069ff5404d401834f1962c8486f8c32f7bd651f7ed16,2025-04-07T14:35:25.290000
CVE-2025-3019,0,0,70e870259e621652f69977e8a6f5a1f65a77b053f491785fe2e80412bfee7fd9,2025-04-01T20:26:30.593000
@ -288094,7 +288109,7 @@ CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d6
CVE-2025-30280,0,0,30288d638eb0e9dbcf0aa5896bd69db9acfcecdbc6d868f34c8a52e27afc1001,2025-04-14T08:15:13.823000
CVE-2025-30281,0,0,50a072f873968e0884926f8e8e3ac417a87058a178898fc0d8f8841b5e4ff462,2025-04-09T20:02:41.860000
CVE-2025-30282,0,0,a17dd9832b027f03ba6a75d738edfc9d501eb453a9d5c6408c6b0cc08654cbf6,2025-04-09T20:02:41.860000
CVE-2025-30284,0,0,8e53e1c7c93960fd053bcc2c17b6442972477767d5d61a97f5c87a3737a9b037,2025-04-09T20:02:41.860000
CVE-2025-30284,0,1,fcfe4b641e24a5d6edb0fad44597e9a8db41e7640854b7b8e24bb0269390b9dd,2025-04-15T13:13:50.853000
CVE-2025-30285,0,0,7935713339eb97b0ce053ce1b5aa84345b8a159bb91df1c7304cb11e02fd0f8b,2025-04-09T20:02:41.860000
CVE-2025-30286,0,0,e43adce2918b7c668d5d3cfc6aa7930d2b02a0ac84efbfb06cb6686e51b0f496,2025-04-14T17:43:28.940000
CVE-2025-30287,0,0,bfb8139b266be0d2cb7b484acdd34e2bb85891baac94150ccb14b18f684529fb,2025-04-14T17:46:20.293000
@ -288135,7 +288150,7 @@ CVE-2025-30346,0,0,c406f26a6d5e86f9605358f371c0731991af9645cd15fe0065dbd940074e7
CVE-2025-30347,0,0,ed9763d5b530026684262273e310ca4c964268ef0ffc4c726547353dbc6770db,2025-03-24T14:19:23.963000
CVE-2025-30348,0,0,0fb0e9fd503e8730c9a3857e63ee0ac5611b8bb7632a64f763dd19e4ff36427c,2025-03-24T14:08:36.513000
CVE-2025-30349,0,0,d863fcdacafbcc4265f861b9a5ca8402397ade3d5ede94aef0450f050ac91a50,2025-04-03T12:15:16.210000
CVE-2025-3035,0,0,b624d70c9ce84d2ad8578eca595ef2a28e4f857af65f374123c0cabcc94665a6,2025-04-10T21:15:49.180000
CVE-2025-3035,0,1,03d49d41973a269f63c10099f775c9d282c755415dac20b290dc221d2ddd8472,2025-04-15T12:55:21.203000
CVE-2025-30350,0,0,769aed62b7c52c7efff0910786b1540702d43c431a2629a37c544cf6ab27d2c0,2025-03-27T16:45:27.850000
CVE-2025-30351,0,0,41323de04c59da9296c71c6a7df779e6c0c767b4bcb8b455ab5524ba6b0475be,2025-03-27T16:45:27.850000
CVE-2025-30352,0,0,2de13b7ea6496a9753fe04c1b9f1d1f6040e23740e41cd04836f25b10e4f3884,2025-03-27T16:45:27.850000
@ -288528,10 +288543,14 @@ CVE-2025-30925,0,0,303059a0519907d0c47140322e242ea05b7024546a805d0c164e0f0e362aa
CVE-2025-30926,0,0,b661a84f99652a2821e7ff3d11c13e4069bdece4b97608c23c3ec387d8764f48,2025-04-01T20:26:11.547000
CVE-2025-3096,0,0,8268841e6f7bc41398dcf36b7be8d3dcaa69d002c9097adfeaedeae01b3e118b,2025-04-01T20:26:01.990000
CVE-2025-30961,0,0,a9060b0c2e5039ac1c7dc0d0a4866d8355c5b144195397ac7f7bbd22c91d7a82,2025-04-01T20:26:30.593000
CVE-2025-30962,1,1,92f9d0608eb664efd9f98110b71d46902de51c148fb5b10dec336484313b68e1,2025-04-15T12:15:21.957000
CVE-2025-30963,0,0,8f31ec02fefff5554b72626ba454b387f81489df6ae8a03a71d1b10a82ac3371,2025-04-01T20:26:30.593000
CVE-2025-30964,1,1,054c9e0dc9ff20c2673d3e6c23c5f6ca099dad9816b5c60e7c3dd0b3fca6f6c6,2025-04-15T12:15:22.140000
CVE-2025-30965,1,1,b1e72a077c827a9903873441ad887e71c2cb4707e49e40535b6e6ea896cd7e9e,2025-04-15T12:15:22.313000
CVE-2025-3097,0,0,a56f46f6ab586feb1d3c504e3ae22e548d2acd2889f7f29233e79a32e7240220,2025-04-02T14:58:07.527000
CVE-2025-30971,0,0,bdaa81d5f90f891b35dfd2da44198cf771c61350682b9305a17f8bc2d53e966d,2025-04-01T20:26:11.547000
CVE-2025-3098,0,0,64e3da7989169613fb4eaf552a0f5621059a5a42e666f32ff39d3d155f26ca41,2025-04-02T14:58:07.527000
CVE-2025-30985,1,1,f1c0efd7f61ad31be2d85a253eb44030709ac96f30d30710840f7b385df1d41e,2025-04-15T12:15:22.463000
CVE-2025-30987,0,0,1ddeca9f293b13339e82c187149d285418438fc60231797e7c68c5fcad6fe64b,2025-04-01T20:26:30.593000
CVE-2025-3099,0,0,8b5b94044c5b312a61081eb6466602886f5edc420174286cf66115736f8de591,2025-04-02T14:58:07.527000
CVE-2025-3100,0,0,d223f6bdad24adad7bfeb8d8433bb786f4e26245258914a6d5f9c277f321f0fd,2025-04-09T20:02:41.860000
@ -288543,6 +288562,7 @@ CVE-2025-31005,0,0,ceb79a2f36fcb390061964b11e10127964f5604b0d6b95191e77fe9337f63
CVE-2025-31008,0,0,574e1cf42f8a16e13e787c6fb8ae3504d667cff8301f5b3817d1be7163f33d9b,2025-04-09T20:02:41.860000
CVE-2025-31009,0,0,00ef1dcb50827d398a2f6c01ffba26a90073ce49541136b216e5baa33ed8b4e8,2025-04-09T20:02:41.860000
CVE-2025-31010,0,0,c1f5ed11290de791a7c3fbb3f13d7b367feca7817eca67ce914a4ef488ac6cf5,2025-03-28T18:11:40.180000
CVE-2025-31011,1,1,9546b5e8cf1243bfa2ce7b9631b56280844ae92bb5ea69cb69557a1abc605e7e,2025-04-15T12:15:22.630000
CVE-2025-31012,0,0,1f46b9635d7584db0ebef271a97e01198fa0633ac746e331966237bdddb260f8,2025-04-09T20:02:41.860000
CVE-2025-31014,0,0,05a65cf1c53aaa3729696e93139ef997043ba9893b8c9b11b54bf89e713672b8,2025-04-11T15:39:52.920000
CVE-2025-31015,0,0,cc9d5bb58bd9acbdec8dd13e2813c11ba30f9d64e279f9a8cd7570dbb05b8b09,2025-04-11T15:39:52.920000
@ -289068,7 +289088,7 @@ CVE-2025-31806,0,0,b90546fe747ffeced4d44aced92f273d225fc8c5d11ad57a051f41118eb25
CVE-2025-31807,0,0,0e08e0604c12e5cea2f7379e458a3adca084c7a5855440b8d71ab1b1c7d9c1b6,2025-04-01T20:26:01.990000
CVE-2025-31808,0,0,3d9d6e9f5669b82ca3d672e2ccfeb2c91afa925ae5dd54939c90b2dd85ccae35,2025-04-01T20:26:01.990000
CVE-2025-31809,0,0,73058d0a46f7de7e061c7f5b0028f36e01d0870a364009415e4df7d474cd3f5d,2025-04-01T20:26:01.990000
CVE-2025-3181,0,0,c9f3a66d711acc9255fcdcd4ad5b67cdc340374187cabe4ddc28e6a6c506bd77,2025-04-07T17:15:37.707000
CVE-2025-3181,0,1,b591d0f8743932399910847ccbd3bbd46c1f4a3f984fd0a61e4c4e9cc7ae226d,2025-04-15T12:47:18.723000
CVE-2025-31810,0,0,f3af702a8b20c4f987d774999a8ddd12aa571f2fe10a41ce20511ba1a2cacfb8,2025-04-01T20:26:01.990000
CVE-2025-31811,0,0,400261866a9c810fccf624494bec07aa4768f10150af518e78ca29f4c60fdc8a,2025-04-01T20:26:01.990000
CVE-2025-31812,0,0,9daf6fcddc98329956a0aa9d59258dcf41457c139f76ca9270f11e2c3a164bb0,2025-04-01T20:26:01.990000
@ -289079,7 +289099,7 @@ CVE-2025-31816,0,0,64557a3d1239be530e2a1e62c66c0e81f7b944cab3496b9d59a67296fe2cd
CVE-2025-31817,0,0,e5a966381f1315a5f1650cbed1e4b4a896efa49f06a649a2754cc3a33bee9532,2025-04-01T20:26:01.990000
CVE-2025-31818,0,0,c51f2b827b99396fd7cd2ec2f2df7952fe64d8d16fea049001d5837be8a75ea2,2025-04-01T20:26:01.990000
CVE-2025-31819,0,0,ae2b21919b6c3224744ced52a20e06e6f2512a8bba29cab78af5df48acae8d55,2025-04-02T14:58:07.527000
CVE-2025-3182,0,0,39008f4be13c68bf5171775f35d7159f568ab981e7e534a483df290dcc77a074,2025-04-07T17:15:37.897000
CVE-2025-3182,0,1,66aede1d8bf2dcc9d2638f004814ec5fd465d658672d7e5678ab7751e3ec0e07,2025-04-15T12:36:25.193000
CVE-2025-31820,0,0,073d8c7b64eb5f396a123c1d65fdd10a7aa5293d8d2897e1e75c2b5d3c774bbc,2025-04-01T20:26:01.990000
CVE-2025-31821,0,0,f2a9afee35932e5b060ddf98091c755b4debe0bcc4962f7543d3c50f47c0ce5a,2025-04-01T20:26:01.990000
CVE-2025-31822,0,0,26a424b5398bc8e38e793525911b12f88341a03f98513c46361dc05f40c1ab33,2025-04-01T20:26:01.990000
@ -289090,7 +289110,7 @@ CVE-2025-31826,0,0,92cb877e2f47e3269630047239793a9ae7b3842d5a44a53ebe254b8162e51
CVE-2025-31827,0,0,ebcd02ffb546863b75e8fada9013048347d5ee958e0c25302ae3866720cfec17,2025-04-07T14:18:34.453000
CVE-2025-31828,0,0,f10dbd563bef1cbe91ad1743a8128c22fa4a78229085f4eb0e1fd81caefa5935,2025-04-01T20:26:01.990000
CVE-2025-31829,0,0,3bae247e220b234227ffb98516d715ad943da55df969b05e4c05a5c22fa7ebc2,2025-04-01T20:26:01.990000
CVE-2025-3183,0,0,bbe346c980c2e49c98d21f9417a079248655a451a250e9dbfe0668b87727dde5,2025-04-07T17:15:38.060000
CVE-2025-3183,0,1,a64cc343f36e4336817ce87e3474cc5281c840f215f41b54a718b7a59a86aed7,2025-04-15T12:30:35.003000
CVE-2025-31830,0,0,f4005e0df03f5b0098410454de12d4db7f27adab38ff501fb628b8fa4644f0c2,2025-04-01T20:26:01.990000
CVE-2025-31831,0,0,32b22e03b17ccff10b64f9f889e18c057b468d1d16e47914df96aad7d31270a7,2025-04-01T20:26:01.990000
CVE-2025-31832,0,0,f16011b94562e6a31b6c983885f867c6190a9745ccaa48b253aed9b44065c37f,2025-04-01T20:26:01.990000
@ -289101,7 +289121,7 @@ CVE-2025-31836,0,0,f38ab4f141614df19843869b6087bd0cbb9d51e26f9521e7f3276270d68c4
CVE-2025-31837,0,0,ac402ad57f29f01cdba421eecbf01cbcb48ac88fb0c11f69fe4851c2ea6795c5,2025-04-01T20:26:01.990000
CVE-2025-31838,0,0,b07f4080142cc3b3f849dceb582b25d45db6d7eacaa20c3a0858ff3728c8c6c8,2025-04-01T20:26:01.990000
CVE-2025-31839,0,0,8ccc5e7f43a07fe39edff2259cd62f228dd6fa749fa65e1d8d7439add485f68d,2025-04-01T20:26:01.990000
CVE-2025-3184,0,0,3b1d34daed6408be59570b3fc960aadf2f9f75c25f4795aa79118329ba1cc358,2025-04-07T14:18:34.453000
CVE-2025-3184,0,1,3716263cc4b57de20536509988425f13436cba75cc51cf01a240840800d19c20,2025-04-15T12:25:42.497000
CVE-2025-31840,0,0,7f2497c0b1a2d1900697a8ba0465553322e4710166db98ed0ebdab22a966869e,2025-04-01T20:26:01.990000
CVE-2025-31841,0,0,12e523c209a2ac942470692736ba7c8cc3060109d2c24eaadbeec5f4ea02536b,2025-04-07T14:18:34.453000
CVE-2025-31842,0,0,6dd948d22229910fbd0e6ced4abce6bec93f03f0e97782ed125f97ea96bd0524,2025-04-01T20:26:01.990000
@ -289112,7 +289132,7 @@ CVE-2025-31846,0,0,4111964ab4f51b35422f5619862fd0b99b7ed3ea3b2568b878c698149f7e8
CVE-2025-31847,0,0,c3570f8cb7be0dffdf13b7b228695374a87a8be3fd696ce7252872b67768a2d8,2025-04-01T20:26:01.990000
CVE-2025-31848,0,0,2021508868f87d7b8489dffeb73d11798a698408887254b70cac3abfb891fb3d,2025-04-01T20:26:01.990000
CVE-2025-31849,0,0,48374392c603a436f7cf6c787b5641066082ea5def2200cd6c4875cbed23144f,2025-04-01T20:26:01.990000
CVE-2025-3185,0,0,ac329edfbea1d42e07bd262523de8bec05538ff0191c9081db798f40b2e27005,2025-04-07T14:18:34.453000
CVE-2025-3185,0,1,1c1f711feaeeb603412e159ffff8a29ae040c86a85d83fa5de2501009bde47aa,2025-04-15T12:22:57.350000
CVE-2025-31850,0,0,c1448f442836c08bf57589c331093d5e7c8ee77088fffa5b43d79a50ba79b571,2025-04-01T20:26:01.990000
CVE-2025-31851,0,0,66b0b6f8be667b2aaa27ff4eee3680d1eb8ed9d74ce74eda64cf20f49bc8230c,2025-04-01T20:26:01.990000
CVE-2025-31852,0,0,0563e048f300a482a69f323871ff66d0792aaf33c02aa55960611976e63349ae,2025-04-01T20:26:01.990000
@ -289239,6 +289259,8 @@ CVE-2025-32080,0,0,8c5137c35b2b3c54cc7c5e0e0214d97db0b8376e0d36e9287126ae8d1d4b1
CVE-2025-3209,0,0,efaeccbde8dfc66e8697afeb5d539c2f695606dff80d7c548cff76ae6514c4e4,2025-04-07T14:18:15.560000
CVE-2025-32093,0,0,840d563c9f546c12b4c77ed00bbb397e353206c1cbc749eb0a2f2a027994d2c0,2025-04-14T07:15:14.700000
CVE-2025-3210,0,0,e3a6c98204c21b98a0522091394112cf3856887b7b64633cf1e308a0cb6727df,2025-04-08T17:43:12.840000
CVE-2025-32102,1,1,1e04efaf7a55cc84e492fea102bce113b5efdb1d3a73cf944b4b6e10df68f800,2025-04-15T13:15:54.783000
CVE-2025-32103,1,1,6fb6a411b4865c5a0b6737078e4bc89e85223cc06b11c5a36f7700c25b9f64ca,2025-04-15T13:15:54.893000
CVE-2025-32107,0,0,a689a2435b39d5968d7bf2a8f1256f4c1ffc589945169a8a583af99a6981cea6,2025-04-11T15:39:52.920000
CVE-2025-3211,0,0,e2eebcc8ba292d8d3d123757d4623f49a37b0c48559fde3713cb0f540bc6af19,2025-04-07T14:18:15.560000
CVE-2025-32111,0,0,4216c6506d31334c8d23317eabe3bae930691d012b7febaea26a4964764ff3bb,2025-04-07T14:18:15.560000
@ -289653,6 +289675,7 @@ CVE-2025-32912,0,0,d33de40cd0f2adfe8bcd4894cbd2f85eba79dd1273db6220e05c79c9309fc
CVE-2025-32913,0,0,d57ad36165f59819d303ec9ab2813ff5e3bf6501be5718c19b238e301d12630b,2025-04-14T14:15:24.860000
CVE-2025-32914,0,0,de999727d5bce94a114462e2bc1bde19e09dd5cdd0f1e24a89bd7f2b18826694,2025-04-14T15:15:25.633000
CVE-2025-3292,0,0,2e1db750cfd1563a06db7ac495c3f640edc42fb0c4158d03489de1beb7a4ae8f,2025-04-12T07:15:27.143000
CVE-2025-32929,1,1,cedabae0b9d219e90c3ff760ffd5267799c5b806c51c09496b34e6fb9fb95fb3,2025-04-15T12:15:22.787000
CVE-2025-32930,0,0,7aa7721c6427b0edc6ca10f6fa05a98645a2b1c5fcd736b40f97d37f2fbc0637,2025-04-14T15:15:25.787000
CVE-2025-32931,0,0,94cc5fcddf25096d3020225e203ae16bfb1f4efa469cabee66ae53d695e6e9a8,2025-04-14T16:15:22.157000
CVE-2025-32933,0,0,e4399dc1130e415e7bcf2d27718e9f13cbbe89ea193c41df5f50b1886eb6018b,2025-04-15T03:15:17.590000
@ -289664,7 +289687,10 @@ CVE-2025-32938,0,0,d97032ba2fb62d85b0fd781b1a847fc87e2cde9e5de8598412a81c2f7b235
CVE-2025-32939,0,0,6d0ae9200a7976c683c740ee0295d246f733a1e3dbef51e2eacbe3ae7efb8a4d,2025-04-15T03:15:17.957000
CVE-2025-32940,0,0,ef492180fd67c205ba6c2e08604b15b7b05288970e18fade437210606e359428,2025-04-15T03:15:18.013000
CVE-2025-32941,0,0,7b47b38d71f23645464b8e8efcb34f5cd92a1b50b5494bf228368f472d5e5710,2025-04-15T03:15:18.077000
CVE-2025-32943,1,1,23e64df0fd35a825759aae24d8798ec09a333f7b3609395a3902498ee98d825b,2025-04-15T11:15:45.690000
CVE-2025-32943,0,1,7c75a7f596d703b3758cf1a1170c8d89099896139a576371807ba2368d77efc3,2025-04-15T13:15:55.003000
CVE-2025-32944,1,1,64c3fdc8548b3105cdc0600f862a70066b2acfcd152da4d56a05c1357e97783d,2025-04-15T13:15:55.100000
CVE-2025-32945,1,1,25627aa20f6965f2fba572cae58ee7d565ea0b97277dde2a4a853f90d348c88d,2025-04-15T13:15:55.230000
CVE-2025-32946,1,1,684fff9e206f18e7510238c19ce2c197ebd16949f6248eeaa3b2d306047ea787,2025-04-15T13:15:55.360000
CVE-2025-3296,0,0,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000
CVE-2025-3297,0,0,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000
CVE-2025-3298,0,0,289613560130dabe199eea55128a1bdfe9eecd882e62238f3674c43e858ef0bc,2025-04-08T16:49:00.290000
@ -289842,7 +289868,7 @@ CVE-2025-3574,0,0,f996911954026f2b9520c1e3b9e7bc2c127ad4cd73d0acb10a428900f0672f
CVE-2025-3575,0,0,3b859cdcc75d19b0bd222446e0df21a3c805929d044033ae64d5f00e6acaf9a6,2025-04-15T09:15:13.670000
CVE-2025-3576,0,0,b0049c6025d64b2929e211c65d145d94da2ded08e6e9fc81bae0b76f324cbdc5,2025-04-15T06:15:44.047000
CVE-2025-3578,0,0,87d1e0551317c254c64c797e6713254af47bbba82a0ddab4b2b90342d2423840,2025-04-15T09:15:13.810000
CVE-2025-3579,0,1,14a4df7542b5c70b893d9914691e4b28106064c1cc523e6fc5e4c2a44d170fa3,2025-04-15T09:15:13.950000
CVE-2025-3579,0,0,14a4df7542b5c70b893d9914691e4b28106064c1cc523e6fc5e4c2a44d170fa3,2025-04-15T09:15:13.950000
CVE-2025-3585,0,0,3f56099df0d5cbe2a28c49e0084d09a46fec0a860dece5bd91eb4466f785fbfe,2025-04-14T19:15:36.990000
CVE-2025-3587,0,0,0b5d7c64b9281d67b2da75b50cd511d58c4d6400c863ce33e2f51939e792bcae,2025-04-14T21:15:18.220000
CVE-2025-3588,0,0,325725e21d51ea302750035b03dc4eb21568d3831b2e5a943f3da0a80eb56df1,2025-04-14T21:15:18.343000
@ -289851,6 +289877,7 @@ CVE-2025-3590,0,0,aa07cf51d9a0d561b10043bb7261822f0af57d8d6d4fee0ad683485554a00b
CVE-2025-3591,0,0,86fad0a948ecf8f921345a86491b837545045bf239c666008f3a1038a8e13f8f,2025-04-14T22:15:16.827000
CVE-2025-3592,0,0,1454212ef6249f5a5ec56ab9bb8016685ead208040c766cd4c83cd18b7c61f0e,2025-04-14T22:15:17
CVE-2025-3593,0,0,1a81b98ecfba1979c3a4ccc38ff5bb341262b9aec183ca57e86bed8f737e2cd2,2025-04-14T23:15:22.270000
CVE-2025-3608,1,1,cce37ad158327413338cb2046192c4a98ba3765fd6eb7304f37c48ca7bbc5e03,2025-04-15T13:15:55.590000
CVE-2025-3612,0,0,697ce4214c78774beedb8be6991054d30b9a9fb680765454a424968b455ebab8,2025-04-15T03:15:18.850000
CVE-2025-3613,0,0,a067b576d7ee99ea85156c126c0f1e5ea568b9c9c4c12ed42ef53e964551617f,2025-04-15T03:15:19.023000
CVE-2025-3622,0,0,47753e571550028309f50a7357c2e7a2ffef09c161d69e6f86b6106c526c7aab,2025-04-15T06:15:44.227000
CVE-2025-3622,0,1,b19ec5faf46a936315e531dd6572476bfdc165d0e5919b2330464b4f2986eee3,2025-04-15T13:15:55.687000

Can't render this file because it is too large.