mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-04-15T14:00:20.768944+00:00
This commit is contained in:
parent
08b7ca5f20
commit
5ab3091c1c
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-20022",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2022-06-09T23:15:08.110",
|
||||
"lastModified": "2024-11-21T03:22:28.090",
|
||||
"lastModified": "2025-04-15T13:15:45.220",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-2846",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2022-08-16T19:15:09.107",
|
||||
"lastModified": "2024-11-21T07:01:47.917",
|
||||
"lastModified": "2025-04-15T13:15:48.600",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -36,13 +36,33 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46853",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-23T14:15:09.410",
|
||||
"lastModified": "2024-11-21T07:31:10.500",
|
||||
"lastModified": "2025-04-15T13:10:20.330",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:radiustheme:post_grid:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:radiustheme:the_post_grid:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.0.5",
|
||||
"matchCriteriaId": "7CB6D8AE-5A86-45A3-BE0A-0B36D4257DB6"
|
||||
"matchCriteriaId": "0C863A46-9043-4CFD-A8A9-9AF72936CFDF"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3640",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-07-24T16:15:13.063",
|
||||
"lastModified": "2024-11-21T08:17:43.823",
|
||||
"lastModified": "2025-04-15T12:15:17.840",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -115,6 +115,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2023:6583",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-3640",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,20 +2,51 @@
|
||||
"id": "CVE-2024-13610",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-04-15T06:15:43.443",
|
||||
"lastModified": "2025-04-15T06:15:43.443",
|
||||
"lastModified": "2025-04-15T13:15:54.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Simple Social Media Share Buttons WordPress plugin before 6.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Simple Social Media Share Buttons de WordPress anterior a la versi\u00f3n 6.0.0 no depura ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados como el administrador realizar ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/85229528-1110-4d45-b972-8bbcba003a1f/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/85229528-1110-4d45-b972-8bbcba003a1f/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26741.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26741.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26741",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:19.230",
|
||||
"lastModified": "2025-04-15T12:15:19.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in AWEOS GmbH Email Notifications for Updates allows Privilege Escalation. This issue affects Email Notifications for Updates: from n/a through 1.1.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/wp-update-mail-notification/vulnerability/wordpress-email-notifications-for-updates-1-1-6-privilege-escalation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26743.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26743.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26743",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:19.407",
|
||||
"lastModified": "2025-04-15T12:15:19.407",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TC.K Advance WP Query Search Filter allows Reflected XSS. This issue affects Advance WP Query Search Filter: from n/a through 1.0.10."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/advance-wp-query-search-filter/vulnerability/wordpress-advance-wp-query-search-filter-plugin-1-0-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26744.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26744.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26744",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:19.587",
|
||||
"lastModified": "2025-04-15T12:15:19.587",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound JetBlog allows DOM-Based XSS. This issue affects JetBlog: from n/a through 2.4.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/jet-blog/vulnerability/wordpress-jetblog-plugin-2-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-267xx/CVE-2025-26745.json
Normal file
56
CVE-2025/CVE-2025-267xx/CVE-2025-26745.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26745",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:19.743",
|
||||
"lastModified": "2025-04-15T12:15:19.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RSTheme RS Elements Elementor Addon allows Stored XSS. This issue affects RS Elements Elementor Addon: from n/a through 1.1.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/rselements-lite/vulnerability/wordpress-rs-elements-elementor-addon-plugin-1-1-5-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-268xx/CVE-2025-26889.json
Normal file
56
CVE-2025/CVE-2025-268xx/CVE-2025-26889.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26889",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:19.907",
|
||||
"lastModified": "2025-04-15T12:15:19.907",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound hockeydata LOS allows PHP Local File Inclusion. This issue affects hockeydata LOS: from n/a through 1.2.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-98"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/hockeydata-los/vulnerability/wordpress-hockeydata-los-plugin-1-2-4-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-268xx/CVE-2025-26894.json
Normal file
56
CVE-2025/CVE-2025-268xx/CVE-2025-26894.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26894",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:20.073",
|
||||
"lastModified": "2025-04-15T12:15:20.073",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in NotFound Coming Soon, Maintenance Mode allows PHP Local File Inclusion. This issue affects Coming Soon, Maintenance Mode: from n/a through 1.1.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-98"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/site-mode/vulnerability/wordpress-coming-soon-maintenance-mode-plugin-1-1-1-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-269xx/CVE-2025-26942.json
Normal file
56
CVE-2025/CVE-2025-269xx/CVE-2025-26942.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26942",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:20.243",
|
||||
"lastModified": "2025-04-15T12:15:20.243",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in NotFound JetTricks allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects JetTricks: from n/a through 1.5.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/jet-tricks/vulnerability/wordpress-jettricks-1-5-1-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-269xx/CVE-2025-26944.json
Normal file
56
CVE-2025/CVE-2025-269xx/CVE-2025-26944.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26944",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:20.413",
|
||||
"lastModified": "2025-04-15T12:15:20.413",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in NotFound JetPopup allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects JetPopup: from n/a through 2.0.11."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/jet-popup/vulnerability/wordpress-jetpopup-2-0-11-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-269xx/CVE-2025-26954.json
Normal file
56
CVE-2025/CVE-2025-269xx/CVE-2025-26954.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26954",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:20.567",
|
||||
"lastModified": "2025-04-15T12:15:20.567",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 1pluginjquery ZooEffect allows Reflected XSS. This issue affects ZooEffect: from n/a through 1.11."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/1-jquery-photo-gallery-slideshow-flash/vulnerability/wordpress-zooeffect-plugin-1-11-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-269xx/CVE-2025-26955.json
Normal file
56
CVE-2025/CVE-2025-269xx/CVE-2025-26955.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26955",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:20.713",
|
||||
"lastModified": "2025-04-15T12:15:20.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in VW Themes Industrial Lite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Industrial Lite: from n/a through 1.0.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/theme/industrial-lite/vulnerability/wordpress-industrial-lite-theme-1-0-8-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-269xx/CVE-2025-26958.json
Normal file
56
CVE-2025/CVE-2025-269xx/CVE-2025-26958.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26958",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:20.880",
|
||||
"lastModified": "2025-04-15T12:15:20.880",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in NotFound JetBlog allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects JetBlog: from n/a through 2.4.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/jet-blog/vulnerability/wordpress-jetblog-2-4-3-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-269xx/CVE-2025-26959.json
Normal file
56
CVE-2025/CVE-2025-269xx/CVE-2025-26959.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26959",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:21.037",
|
||||
"lastModified": "2025-04-15T12:15:21.037",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Qu\u00fd L\u00ea 91 Administrator Z allows Privilege Escalation. This issue affects Administrator Z: from n/a through 2025.03.24."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/administrator-z/vulnerability/wordpress-administrator-z-2025-03-24-privilege-escalation-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-269xx/CVE-2025-26982.json
Normal file
56
CVE-2025/CVE-2025-269xx/CVE-2025-26982.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26982",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:21.267",
|
||||
"lastModified": "2025-04-15T12:15:21.267",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric-Oliver M\u00e4chler DSGVO Youtube allows DOM-Based XSS. This issue affects DSGVO Youtube: from n/a through 1.5.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/dsgvo-youtube/vulnerability/wordpress-dsgvo-youtube-plugin-1-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-269xx/CVE-2025-26990.json
Normal file
56
CVE-2025/CVE-2025-269xx/CVE-2025-26990.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26990",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:21.597",
|
||||
"lastModified": "2025-04-15T12:15:21.597",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in WP Royal Royal Elementor Addons allows Server Side Request Forgery. This issue affects Royal Elementor Addons: from n/a through 1.7.1006."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/royal-elementor-addons/vulnerability/wordpress-royal-elementor-addons-plugin-1-7-1006-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-269xx/CVE-2025-26992.json
Normal file
56
CVE-2025/CVE-2025-269xx/CVE-2025-26992.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-26992",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:21.773",
|
||||
"lastModified": "2025-04-15T12:15:21.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fatcatapps Landing Page Cat allows Reflected XSS. This issue affects Landing Page Cat: from n/a through 1.7.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/landing-page-cat/vulnerability/wordpress-landing-page-cat-plugin-1-7-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-28395",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-01T14:15:32.917",
|
||||
"lastModified": "2025-04-14T18:15:28.833",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-15T12:52:46.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:di-8100_firmware:16.07.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "907333CE-439A-4366-BD63-86FAC69BF00F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:di-8100:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93AD68FC-EB79-4510-BF0F-B091FD97E76C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Fizz-L/Vulnerability-report/blob/main/DI-8100Buffer%20overflow.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-28398",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-01T14:15:33.047",
|
||||
"lastModified": "2025-04-14T18:15:28.970",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-15T12:51:12.750",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:dlink:di-8100_firmware:16.07.26:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "907333CE-439A-4366-BD63-86FAC69BF00F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:dlink:di-8100:a1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93AD68FC-EB79-4510-BF0F-B091FD97E76C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Fizz-L/Vulnerability-report/blob/main/DI-8100Buffer%20overflow2.md",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-29150",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-10T15:16:03.550",
|
||||
"lastModified": "2025-04-11T15:39:52.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-15T13:50:15.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bluecms_project:bluecms:1.6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6A26806A-9CB5-4262-BAD1-049659C2CE2C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/electroN1chahaha/054a1af22157aa3010e89b3103ad7b9a",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-29389",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-09T15:16:02.593",
|
||||
"lastModified": "2025-04-09T20:02:41.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-15T13:42:23.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pbootcms:pbootcms:3.2.9:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A19EA43-31D6-4EAC-8C97-CCBA5BE47426"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/jaylan545/0540db17daca2bf42fe5a3ce864300c9",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jaylan545/security/issues/1",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-29868",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-04-01T08:15:14.990",
|
||||
"lastModified": "2025-04-10T15:16:03.860",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-15T13:07:54.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,22 +51,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "1.4.2",
|
||||
"matchCriteriaId": "29E2B105-1033-4FCE-8F05-20368605017D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/l7pohw5g03g3qsvrz8pqc9t29mdv5lhf",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/04/01/2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/04/02/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/04/10/3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30177",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2025-04-01T12:15:15.747",
|
||||
"lastModified": "2025-04-01T20:26:11.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-15T13:00:12.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.8.0",
|
||||
"versionEndExcluding": "4.8.6",
|
||||
"matchCriteriaId": "D9FD8755-3AFF-46F8-A830-FD0BF04B5DB8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10.0",
|
||||
"versionEndExcluding": "4.10.3",
|
||||
"matchCriteriaId": "874BB2C0-D562-4EC9-A839-BAEED574AD41"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://camel.apache.org/security/CVE-2025-27636.html",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://camel.apache.org/security/CVE-2025-29891.html",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/dj79zdgw01j337lr9gvyy4sv8xfyw8py",
|
||||
"source": "security@apache.org"
|
||||
"source": "security@apache.org",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-30284",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-04-08T20:15:25.980",
|
||||
"lastModified": "2025-04-09T20:02:41.860",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-04-15T13:13:50.853",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,190 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update14:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "10616A3A-0C1C-474A-BD7D-A2A5BB870F74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update15:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7DA523E-1D9B-45FD-94D9-D4F9F2B9296B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update16:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "151AFF8B-F05C-4D27-85FC-DF88E9C11BEA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update17:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53A0E245-2915-4DFF-AFB5-A12F5C435702"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update18:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C5653D18-7534-48A3-819F-9F049A418F99"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update10:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "645D1B5F-2DAB-4AB8-A465-AC37FF494F95"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update11:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED6D8996-0770-4C9F-BEA5-87EA479D40A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update12:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4836086E-3D4A-4A07-A372-382D385CB490"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update8:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB97ADBA-C1A9-4EE0-9509-68CB12358AE5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update9:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E17C38F0-9B0F-4433-9CBD-6E3D63EA9BDC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:adobe:coldfusion:2025:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30779417-D4E5-4A01-BE0E-1CE1D134292A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
|
||||
"source": "psirt@adobe.com"
|
||||
"source": "psirt@adobe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-309xx/CVE-2025-30962.json
Normal file
56
CVE-2025/CVE-2025-309xx/CVE-2025-30962.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-30962",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:21.957",
|
||||
"lastModified": "2025-04-15T12:15:21.957",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FS Poster allows Reflected XSS. This issue affects FS Poster: from n/a through 6.5.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/fs-poster/vulnerability/wordpress-fs-poster-plugin-6-5-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-309xx/CVE-2025-30964.json
Normal file
56
CVE-2025/CVE-2025-309xx/CVE-2025-30964.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-30964",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:22.140",
|
||||
"lastModified": "2025-04-15T12:15:22.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server-Side Request Forgery (SSRF) vulnerability in EPC Photography. This issue affects Photography: from n/a through 7.5.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/theme/photography/vulnerability/wordpress-photography-theme-7-5-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-309xx/CVE-2025-30965.json
Normal file
56
CVE-2025/CVE-2025-309xx/CVE-2025-30965.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-30965",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:22.313",
|
||||
"lastModified": "2025-04-15T12:15:22.313",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in NotFound WPJobBoard allows Cross Site Request Forgery. This issue affects WPJobBoard: from n/a through n/a."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/wpjobboard/vulnerability/wordpress-wpjobboard-plugin-5-11-1-multiple-cross-site-request-forgery-csrf-vulnerabilities-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-309xx/CVE-2025-30985.json
Normal file
56
CVE-2025/CVE-2025-309xx/CVE-2025-30985.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-30985",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:22.463",
|
||||
"lastModified": "2025-04-15T12:15:22.463",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in NotFound GNUCommerce allows Object Injection. This issue affects GNUCommerce: from n/a through 1.5.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/gnucommerce/vulnerability/wordpress-gnucommerce-plugin-1-5-4-php-object-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3035",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-04-01T13:15:41.893",
|
||||
"lastModified": "2025-04-10T21:15:49.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-15T12:55:21.203",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
|
||||
"versionEndExcluding": "137.0",
|
||||
"matchCriteriaId": "A6CBADD8-E865-41B5-BDDD-1572F97D5176"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1952268",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-20/",
|
||||
"source": "security@mozilla.org"
|
||||
"source": "security@mozilla.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-310xx/CVE-2025-31011.json
Normal file
56
CVE-2025/CVE-2025-310xx/CVE-2025-31011.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-31011",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:22.630",
|
||||
"lastModified": "2025-04-15T12:15:22.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ReichertBrothers SimplyRETS Real Estate IDX allows Reflected XSS. This issue affects SimplyRETS Real Estate IDX: from n/a through 3.0.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/simply-rets/vulnerability/wordpress-simplyrets-real-estate-idx-plugin-3-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3181",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T22:15:21.350",
|
||||
"lastModified": "2025-04-07T17:15:37.707",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-15T12:47:18.723",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,78 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/15",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303140",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303140",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.543841",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/15",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3182",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T22:15:21.533",
|
||||
"lastModified": "2025-04-07T17:15:37.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-15T12:36:25.193",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,76 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/16",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303141",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303141",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.543842",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/16",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3183",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T22:15:21.723",
|
||||
"lastModified": "2025-04-07T17:15:38.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-15T12:30:35.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,78 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/17",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303142",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303142",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.543843",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/17",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3184",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T23:15:38.170",
|
||||
"lastModified": "2025-04-07T14:18:34.453",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-15T12:25:42.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,78 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/18",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303143",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303143",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.543844",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/18",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-3185",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T23:15:38.350",
|
||||
"lastModified": "2025-04-07T14:18:34.453",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-04-15T12:22:57.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -122,28 +142,76 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0B48EAF-9F6C-40BF-8FE9-93023B9B39F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/19",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303144",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303144",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.543845",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/p1026/CVE/issues/19",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-321xx/CVE-2025-32102.json
Normal file
29
CVE-2025/CVE-2025-321xx/CVE-2025-32102.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-32102",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-15T13:15:54.783",
|
||||
"lastModified": "2025-04-15T13:15:54.783",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows SSRF via the host and port parameters in a command=telnetSocket request to the /WebInterface/function/ URI."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2025/Apr/17",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.crushftp.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.crushftp.com/download/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-321xx/CVE-2025-32103.json
Normal file
29
CVE-2025/CVE-2025-321xx/CVE-2025-32103.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-32103",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-15T13:15:54.893",
|
||||
"lastModified": "2025-04-15T13:15:54.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CrushFTP 9.x and 10.x through 10.8.4 and 11.x through 11.3.1 allows directory traversal via the /WebInterface/function/ URI to read files accessible by SMB at UNC share pathnames, bypassing SecurityManager restrictions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2025/Apr/17",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.crushftp.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.crushftp.com/download/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-329xx/CVE-2025-32929.json
Normal file
56
CVE-2025/CVE-2025-329xx/CVE-2025-32929.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-32929",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-04-15T12:15:22.787",
|
||||
"lastModified": "2025-04-15T12:15:22.787",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Dmitry V. (CEO of \"UKR Solution\") Barcode Generator for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Barcode Generator for WooCommerce: from n/a through 2.0.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/embedding-barcodes-into-product-pages-and-orders/vulnerability/wordpress-barcode-generator-for-woocommerce-plugin-2-0-4-arbitrary-content-deletion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-32943",
|
||||
"sourceIdentifier": "reefs@jfrog.com",
|
||||
"published": "2025-04-15T11:15:45.690",
|
||||
"lastModified": "2025-04-15T11:15:45.690",
|
||||
"lastModified": "2025-04-15T13:15:55.003",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -38,7 +38,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "reefs@jfrog.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://research.jfrog.com/vulnerabilities/peertube-hls-path-traversal/",
|
||||
"source": "reefs@jfrog.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.jfrog.com/vulnerabilities/peertube-hls-path-traversal/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-329xx/CVE-2025-32944.json
Normal file
60
CVE-2025/CVE-2025-329xx/CVE-2025-32944.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-32944",
|
||||
"sourceIdentifier": "reefs@jfrog.com",
|
||||
"published": "2025-04-15T13:15:55.100",
|
||||
"lastModified": "2025-04-15T13:15:55.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The vulnerability allows any authenticated user to cause the PeerTube server to stop functioning in a persistent manner.\u00a0\u00a0If user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. If the yauzl library encounters a filename that is considered illegal, it raises an exception that is uncaught by PeerTube, leading to a crash which repeats infinitely on startup."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "reefs@jfrog.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "reefs@jfrog.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-248"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1",
|
||||
"source": "reefs@jfrog.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.jfrog.com/vulnerabilities/peertube-archive-persistent-dos/",
|
||||
"source": "reefs@jfrog.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-329xx/CVE-2025-32945.json
Normal file
60
CVE-2025/CVE-2025-329xx/CVE-2025-32945.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-32945",
|
||||
"sourceIdentifier": "reefs@jfrog.com",
|
||||
"published": "2025-04-15T13:15:55.230",
|
||||
"lastModified": "2025-04-15T13:15:55.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The vulnerability allows an existing user to add playlists to a different user\u2019s channel using the PeerTube REST API. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "reefs@jfrog.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "reefs@jfrog.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-282"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1",
|
||||
"source": "reefs@jfrog.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.jfrog.com/vulnerabilities/peertube-arbitrary-playlist-creation-rest/",
|
||||
"source": "reefs@jfrog.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-329xx/CVE-2025-32946.json
Normal file
60
CVE-2025/CVE-2025-329xx/CVE-2025-32946.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-32946",
|
||||
"sourceIdentifier": "reefs@jfrog.com",
|
||||
"published": "2025-04-15T13:15:55.360",
|
||||
"lastModified": "2025-04-15T13:15:55.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This vulnerability allows any attacker to add playlists to a different user\u2019s channel using the ActivityPub protocol. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "reefs@jfrog.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "reefs@jfrog.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-282"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Chocobozzz/PeerTube/releases/tag/v7.1.1",
|
||||
"source": "reefs@jfrog.com"
|
||||
},
|
||||
{
|
||||
"url": "https://research.jfrog.com/vulnerabilities/peertube-arbitrary-playlist-creation-activitypub/",
|
||||
"source": "reefs@jfrog.com"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2025/CVE-2025-36xx/CVE-2025-3608.json
Normal file
29
CVE-2025/CVE-2025-36xx/CVE-2025-3608.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2025-3608",
|
||||
"sourceIdentifier": "security@mozilla.org",
|
||||
"published": "2025-04-15T13:15:55.590",
|
||||
"lastModified": "2025-04-15T13:15:55.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A race condition existed in nsHttpTransaction that could have been exploited to cause memory corruption, potentially leading to an exploitable condition. This vulnerability affects Firefox < 137.0.2."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1951554",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608",
|
||||
"source": "security@mozilla.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mozilla.org/security/advisories/mfsa2025-25/",
|
||||
"source": "security@mozilla.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-3622",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-15T06:15:44.227",
|
||||
"lastModified": "2025-04-15T06:15:44.227",
|
||||
"lastModified": "2025-04-15T13:15:55.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in Xorbits Inference up to 1.4.1. This issue affects the function load of the file xinference/thirdparty/cosyvoice/cli/model.py. The manipulation leads to deserialization."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad, clasificada como cr\u00edtica, en Xorbits Inference hasta la versi\u00f3n 1.4.1. Este problema afecta la carga de funciones del archivo xinference/thirdparty/cosyvoice/cli/model.py. La manipulaci\u00f3n provoca la deserializaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.552245",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xorbitsai/inference/issues/3190",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
63
README.md
63
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-15T12:00:23.122165+00:00
|
||||
2025-04-15T14:00:20.768944+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-15T11:15:45.690000+00:00
|
||||
2025-04-15T13:50:15.537000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,27 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
289855
|
||||
289882
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `27`
|
||||
|
||||
- [CVE-2025-1688](CVE-2025/CVE-2025-16xx/CVE-2025-1688.json) (`2025-04-15T11:15:44.140`)
|
||||
- [CVE-2025-2083](CVE-2025/CVE-2025-20xx/CVE-2025-2083.json) (`2025-04-15T10:15:14.680`)
|
||||
- [CVE-2025-32943](CVE-2025/CVE-2025-329xx/CVE-2025-32943.json) (`2025-04-15T11:15:45.690`)
|
||||
- [CVE-2025-26744](CVE-2025/CVE-2025-267xx/CVE-2025-26744.json) (`2025-04-15T12:15:19.587`)
|
||||
- [CVE-2025-26745](CVE-2025/CVE-2025-267xx/CVE-2025-26745.json) (`2025-04-15T12:15:19.743`)
|
||||
- [CVE-2025-26889](CVE-2025/CVE-2025-268xx/CVE-2025-26889.json) (`2025-04-15T12:15:19.907`)
|
||||
- [CVE-2025-26894](CVE-2025/CVE-2025-268xx/CVE-2025-26894.json) (`2025-04-15T12:15:20.073`)
|
||||
- [CVE-2025-26942](CVE-2025/CVE-2025-269xx/CVE-2025-26942.json) (`2025-04-15T12:15:20.243`)
|
||||
- [CVE-2025-26944](CVE-2025/CVE-2025-269xx/CVE-2025-26944.json) (`2025-04-15T12:15:20.413`)
|
||||
- [CVE-2025-26954](CVE-2025/CVE-2025-269xx/CVE-2025-26954.json) (`2025-04-15T12:15:20.567`)
|
||||
- [CVE-2025-26955](CVE-2025/CVE-2025-269xx/CVE-2025-26955.json) (`2025-04-15T12:15:20.713`)
|
||||
- [CVE-2025-26958](CVE-2025/CVE-2025-269xx/CVE-2025-26958.json) (`2025-04-15T12:15:20.880`)
|
||||
- [CVE-2025-26959](CVE-2025/CVE-2025-269xx/CVE-2025-26959.json) (`2025-04-15T12:15:21.037`)
|
||||
- [CVE-2025-26982](CVE-2025/CVE-2025-269xx/CVE-2025-26982.json) (`2025-04-15T12:15:21.267`)
|
||||
- [CVE-2025-26990](CVE-2025/CVE-2025-269xx/CVE-2025-26990.json) (`2025-04-15T12:15:21.597`)
|
||||
- [CVE-2025-26992](CVE-2025/CVE-2025-269xx/CVE-2025-26992.json) (`2025-04-15T12:15:21.773`)
|
||||
- [CVE-2025-30962](CVE-2025/CVE-2025-309xx/CVE-2025-30962.json) (`2025-04-15T12:15:21.957`)
|
||||
- [CVE-2025-30964](CVE-2025/CVE-2025-309xx/CVE-2025-30964.json) (`2025-04-15T12:15:22.140`)
|
||||
- [CVE-2025-30965](CVE-2025/CVE-2025-309xx/CVE-2025-30965.json) (`2025-04-15T12:15:22.313`)
|
||||
- [CVE-2025-30985](CVE-2025/CVE-2025-309xx/CVE-2025-30985.json) (`2025-04-15T12:15:22.463`)
|
||||
- [CVE-2025-31011](CVE-2025/CVE-2025-310xx/CVE-2025-31011.json) (`2025-04-15T12:15:22.630`)
|
||||
- [CVE-2025-32102](CVE-2025/CVE-2025-321xx/CVE-2025-32102.json) (`2025-04-15T13:15:54.783`)
|
||||
- [CVE-2025-32103](CVE-2025/CVE-2025-321xx/CVE-2025-32103.json) (`2025-04-15T13:15:54.893`)
|
||||
- [CVE-2025-32929](CVE-2025/CVE-2025-329xx/CVE-2025-32929.json) (`2025-04-15T12:15:22.787`)
|
||||
- [CVE-2025-32944](CVE-2025/CVE-2025-329xx/CVE-2025-32944.json) (`2025-04-15T13:15:55.100`)
|
||||
- [CVE-2025-32945](CVE-2025/CVE-2025-329xx/CVE-2025-32945.json) (`2025-04-15T13:15:55.230`)
|
||||
- [CVE-2025-32946](CVE-2025/CVE-2025-329xx/CVE-2025-32946.json) (`2025-04-15T13:15:55.360`)
|
||||
- [CVE-2025-3608](CVE-2025/CVE-2025-36xx/CVE-2025-3608.json) (`2025-04-15T13:15:55.590`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `20`
|
||||
|
||||
- [CVE-2024-12094](CVE-2024/CVE-2024-120xx/CVE-2024-12094.json) (`2025-04-15T10:15:13.780`)
|
||||
- [CVE-2025-22371](CVE-2025/CVE-2025-223xx/CVE-2025-22371.json) (`2025-04-15T11:15:45.217`)
|
||||
- [CVE-2025-22372](CVE-2025/CVE-2025-223xx/CVE-2025-22372.json) (`2025-04-15T11:15:45.380`)
|
||||
- [CVE-2025-22373](CVE-2025/CVE-2025-223xx/CVE-2025-22373.json) (`2025-04-15T11:15:45.533`)
|
||||
- [CVE-2025-3579](CVE-2025/CVE-2025-35xx/CVE-2025-3579.json) (`2025-04-15T09:15:13.950`)
|
||||
- [CVE-2017-20022](CVE-2017/CVE-2017-200xx/CVE-2017-20022.json) (`2025-04-15T13:15:45.220`)
|
||||
- [CVE-2022-2846](CVE-2022/CVE-2022-28xx/CVE-2022-2846.json) (`2025-04-15T13:15:48.600`)
|
||||
- [CVE-2022-46853](CVE-2022/CVE-2022-468xx/CVE-2022-46853.json) (`2025-04-15T13:10:20.330`)
|
||||
- [CVE-2023-3640](CVE-2023/CVE-2023-36xx/CVE-2023-3640.json) (`2025-04-15T12:15:17.840`)
|
||||
- [CVE-2024-13610](CVE-2024/CVE-2024-136xx/CVE-2024-13610.json) (`2025-04-15T13:15:54.463`)
|
||||
- [CVE-2025-28395](CVE-2025/CVE-2025-283xx/CVE-2025-28395.json) (`2025-04-15T12:52:46.433`)
|
||||
- [CVE-2025-28398](CVE-2025/CVE-2025-283xx/CVE-2025-28398.json) (`2025-04-15T12:51:12.750`)
|
||||
- [CVE-2025-29150](CVE-2025/CVE-2025-291xx/CVE-2025-29150.json) (`2025-04-15T13:50:15.537`)
|
||||
- [CVE-2025-29389](CVE-2025/CVE-2025-293xx/CVE-2025-29389.json) (`2025-04-15T13:42:23.447`)
|
||||
- [CVE-2025-29868](CVE-2025/CVE-2025-298xx/CVE-2025-29868.json) (`2025-04-15T13:07:54.393`)
|
||||
- [CVE-2025-30177](CVE-2025/CVE-2025-301xx/CVE-2025-30177.json) (`2025-04-15T13:00:12.587`)
|
||||
- [CVE-2025-30284](CVE-2025/CVE-2025-302xx/CVE-2025-30284.json) (`2025-04-15T13:13:50.853`)
|
||||
- [CVE-2025-3035](CVE-2025/CVE-2025-30xx/CVE-2025-3035.json) (`2025-04-15T12:55:21.203`)
|
||||
- [CVE-2025-3181](CVE-2025/CVE-2025-31xx/CVE-2025-3181.json) (`2025-04-15T12:47:18.723`)
|
||||
- [CVE-2025-3182](CVE-2025/CVE-2025-31xx/CVE-2025-3182.json) (`2025-04-15T12:36:25.193`)
|
||||
- [CVE-2025-3183](CVE-2025/CVE-2025-31xx/CVE-2025-3183.json) (`2025-04-15T12:30:35.003`)
|
||||
- [CVE-2025-3184](CVE-2025/CVE-2025-31xx/CVE-2025-3184.json) (`2025-04-15T12:25:42.497`)
|
||||
- [CVE-2025-3185](CVE-2025/CVE-2025-31xx/CVE-2025-3185.json) (`2025-04-15T12:22:57.350`)
|
||||
- [CVE-2025-32943](CVE-2025/CVE-2025-329xx/CVE-2025-32943.json) (`2025-04-15T13:15:55.003`)
|
||||
- [CVE-2025-3622](CVE-2025/CVE-2025-36xx/CVE-2025-3622.json) (`2025-04-15T13:15:55.687`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
81
_state.csv
81
_state.csv
@ -102375,7 +102375,7 @@ CVE-2017-20019,0,0,683a56b6abe009a4e6c1169eeea2ad6e50396b62a1071c31a68087d3cca0a
|
||||
CVE-2017-2002,0,0,9afd8990d44d2484aebcdca634b02c6ff87be1e6fc1c70f894728c54a8e9d7c0,2023-11-07T02:43:26.690000
|
||||
CVE-2017-20020,0,0,ddc154de59f9c868fc0bbcbfa8f648bf50d15a545d61406985b6cbc407c8ab36,2024-11-21T03:22:27.827000
|
||||
CVE-2017-20021,0,0,768b307da8c132d7530b1123bab87655cad9a898538e81cbb2c6b418fe25a156,2024-11-21T03:22:27.953000
|
||||
CVE-2017-20022,0,0,91dab59333128101b23212e7415a18d44527ede00e7f216aedfa2463a2a95329,2024-11-21T03:22:28.090000
|
||||
CVE-2017-20022,0,1,51a5bdc917b95e74452f82686f127303dfc5e1f615f348e9211c75ef850dd117,2025-04-15T13:15:45.220000
|
||||
CVE-2017-20023,0,0,6c1ea16a6f41a1f22bda81b99c03c212e564149aafd9760d9594f1ff47f07d6e,2024-11-21T03:22:28.220000
|
||||
CVE-2017-20024,0,0,eb70f202042b4262705ffa3e79f04cd7fb65a94d5c2ffc0a3182330b75ac26f9,2024-11-21T03:22:28.357000
|
||||
CVE-2017-20025,0,0,a254a2c0a691282e1725ca8af5505d9e915f19f6b3577a9cdc86bf0b2f883d72,2024-11-21T03:22:28.493000
|
||||
@ -197311,7 +197311,7 @@ CVE-2022-28450,0,0,902ef43b7befda46c35d8785897e3fc5b5418637614fd5787f7649f60f024
|
||||
CVE-2022-28451,0,0,ffb05d569011f6b22e8b805c206434cda860602b26d93d7c7bc8614ee72d3fa1,2024-11-21T06:57:22.743000
|
||||
CVE-2022-28452,0,0,90ebd6d6131edb981e7d90ce735f1c1503bfafe42cfaf846642b36683fc1a15b,2024-11-21T06:57:22.897000
|
||||
CVE-2022-28454,0,0,d2822d1e28973a3d23caad3102bc902e1f70acea584395e8d5f72e28c76561fc,2024-11-21T06:57:23.043000
|
||||
CVE-2022-2846,0,0,a000c56af61410d68cbea02b0aa6b8b05976a0c9cf6b34b80668830f18be798a,2024-11-21T07:01:47.917000
|
||||
CVE-2022-2846,0,1,55b13f77a85e10206206c0b1b4f83d4de4a63330f2d4673a0357cbd19adbc4aa,2025-04-15T13:15:48.600000
|
||||
CVE-2022-28461,0,0,eeba39462648912bc271d3540feb028bf0e88ed4e46938a4c73d6e50bca2309f,2024-11-21T06:57:23.193000
|
||||
CVE-2022-28462,0,0,6d195adf1051f5da9495d4323f8470f7ac3778960c39acdb9c65e7d06dd131d1,2024-11-21T06:57:23.343000
|
||||
CVE-2022-28463,0,0,b3f68ad17257b50142d434ae1c24ebdcbe3d90fe8ae16618ff8eff444d208882,2024-11-21T06:57:23.483000
|
||||
@ -211640,7 +211640,7 @@ CVE-2022-4685,0,0,f811885dae02c5392d6262d2ce12d3efc8cce3de17cc4b2f0f68d631d60d55
|
||||
CVE-2022-46850,0,0,1ee7230cd0ce68747cdc4c15d295683ec86f9c361c32306e65b18b714c4fb38c,2024-11-21T07:31:10.100000
|
||||
CVE-2022-46851,0,0,4a1db3251a0659832fecab1e76f8718c9cb41559e0349c62362e9b3203e01012,2024-11-21T07:31:10.240000
|
||||
CVE-2022-46852,0,0,d62f8845c68f8f8ad6e6e03680fd3d668f653f71cbe178c609fb50b16bba7682,2024-11-21T07:31:10.377000
|
||||
CVE-2022-46853,0,0,597ccea55c1d3761b9a080e5f64f901f6064f48f6a15ce6a136c5a2f910a7111,2024-11-21T07:31:10.500000
|
||||
CVE-2022-46853,0,1,32abb78ff89d3fda6c8fdbaf825c5f057c2942b788ec490ccf7e8ad86f4a8269,2025-04-15T13:10:20.330000
|
||||
CVE-2022-46854,0,0,d381d825968efa10033cef77f8bb8812957b4f8331dc8462132ed31e02e39d2d,2024-11-21T07:31:10.627000
|
||||
CVE-2022-46855,0,0,67f8e0843ed691e23edcc11c7c4a6b8cf6e871728a48c0617b73618d68161f94,2024-11-21T07:31:10.750000
|
||||
CVE-2022-46856,0,0,2a65047cf34cf7582390923064fe75323c8ee899ba58c16a39f6018116f42c5b,2024-11-21T07:31:10.890000
|
||||
@ -229018,7 +229018,7 @@ CVE-2023-36396,0,0,e830a5b2836398121cc1babf25a6160e95fed26a5fdcadcc50a99c5855116
|
||||
CVE-2023-36397,0,0,9f1524240de0fc258e50e8dd3cdb705a4624ff7e6f7a580d78a12d9c9c0f8199,2024-11-21T08:09:40.507000
|
||||
CVE-2023-36398,0,0,69eff38d70f40d33f0334de39d0896cdccc5d65936ab3f331dd107a771106637,2024-11-21T08:09:40.653000
|
||||
CVE-2023-36399,0,0,834680537442f52fe693618867ce29cd8f2d006f17004f0a1f0b4035ac58527c,2024-11-21T08:09:40.783000
|
||||
CVE-2023-3640,0,0,7c218bc64338d12981b8f04d38477795ef979ead89c50d6699585256b667c95b,2024-11-21T08:17:43.823000
|
||||
CVE-2023-3640,0,1,52e6c4aaabd1940fde11057b2dbb2eb1fb9331b7d1f0ca4ce868671d356ad7fe,2025-04-15T12:15:17.840000
|
||||
CVE-2023-36400,0,0,6a89060e5ecb3bb2f8dc431f6bbc50f27e642dc3a24fa99f850e64eb4bac1d7d,2024-11-21T08:09:40.880000
|
||||
CVE-2023-36401,0,0,08d1769059b8015b4b01fb9cb51405bd146a5d0afb0d9f0c65fa2b9da8dd413c,2024-11-21T08:09:41.010000
|
||||
CVE-2023-36402,0,0,42148c391faf42c04e20d58f46db408d6dd6426fb764fbb5d2415386aadb0e6e,2024-11-21T08:09:41.167000
|
||||
@ -246594,7 +246594,7 @@ CVE-2024-1209,0,0,0c11632b4f799f8334de1fe031a18ed75abc1306137789706f83e79036cdbf
|
||||
CVE-2024-12090,0,0,3ae49935c044b86a3444ecb09701dd060f603a46c2ce1e27c4f8226f9377436d,2024-12-16T15:15:06.393000
|
||||
CVE-2024-12091,0,0,35c9100407a2a2f03cc09233dbdc35208e548ffdd088d484bb9b374c740b5bc0,2024-12-16T15:15:06.540000
|
||||
CVE-2024-12092,0,0,6cedbb52bdc4fd872b35781acb98ac9a9b54d520c5d29f314ba42350997260f9,2024-12-16T15:15:06.677000
|
||||
CVE-2024-12094,0,1,12c81bd6e44afba106aa5b9c1f1003a5bf1fbf3bef13df97a3697ccb2bca6566,2025-04-15T10:15:13.780000
|
||||
CVE-2024-12094,0,0,12c81bd6e44afba106aa5b9c1f1003a5bf1fbf3bef13df97a3697ccb2bca6566,2025-04-15T10:15:13.780000
|
||||
CVE-2024-12095,0,0,266981a4f802a4e630b12ac2741c69386abcb730aae3bae3718e0ed36165b300,2025-02-11T02:15:33.547000
|
||||
CVE-2024-12096,0,0,a0b37dcc639d983cbff8481184c987ae3b7851e6c867f94b52bee5fdf38bc784,2024-12-24T17:15:07.497000
|
||||
CVE-2024-12097,0,0,080558aa7b3ac1febe350d71d1f75d062875ebd1cc067888fb9586ec0ac95026,2025-03-05T14:15:35.280000
|
||||
@ -248096,7 +248096,7 @@ CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e552
|
||||
CVE-2024-13608,0,0,b8b173401de3e1097c36a401f8928ae8cd5257912fc8cac1e3eea9f3234c491d,2025-02-19T19:15:14.260000
|
||||
CVE-2024-13609,0,0,007c027106c3ec1d23edeaef367a828bff90431ee7cff957b7b00cd86e9cc2ee,2025-02-21T16:06:13.673000
|
||||
CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000
|
||||
CVE-2024-13610,0,0,780aaf2a13dacf29d1830d4a86a4feefb0399e74ffb5bb7c5e9d9115d0d55015,2025-04-15T06:15:43.443000
|
||||
CVE-2024-13610,0,1,8b94fee0225fcd3b82e7fc76c2b19eca775fc2e8fd9448ca30db591247e0bcb2,2025-04-15T13:15:54.463000
|
||||
CVE-2024-13611,0,0,12cf0d23fdb6ecb0f110f9a143d60d61370605283cf62e7faa4a9aec63988bc1,2025-03-01T09:15:09.220000
|
||||
CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000
|
||||
CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000
|
||||
@ -282391,7 +282391,7 @@ CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f7
|
||||
CVE-2025-1683,0,0,bd65547481d5838793e5ad335f0bed73820ac4e81083a338100991ba4dbdb8f6,2025-03-13T10:15:19.687000
|
||||
CVE-2025-1686,0,0,d1ef42202e7d4a5987e7a7fded4c55f6d574235579a6aece0e74834a9611412f,2025-04-07T18:29:22.970000
|
||||
CVE-2025-1687,0,0,553889bbf1832e8d0246ba505a729ffeb25a6379aca1ca1f8f3f4851031d21de,2025-02-28T00:15:36.240000
|
||||
CVE-2025-1688,1,1,5c6a06bac422adb33706be8471e71dc0fb7c545a86012640310ae7a34b701c10,2025-04-15T11:15:44.140000
|
||||
CVE-2025-1688,0,0,5c6a06bac422adb33706be8471e71dc0fb7c545a86012640310ae7a34b701c10,2025-04-15T11:15:44.140000
|
||||
CVE-2025-1689,0,0,ab0c739015e868491c3393a9dbae0818d17aadfd3d893b02587a47ce8b53dda1,2025-03-11T16:19:41.870000
|
||||
CVE-2025-1690,0,0,8515e3753c09328c692a367a40f4a48932e87850b11ca7360289773890aa45cb,2025-03-11T15:59:35.800000
|
||||
CVE-2025-1691,0,0,5eec1cea57e35f579c692b6064aead03fa43885ba22ff953ac9e969443e43853,2025-02-27T16:15:38.610000
|
||||
@ -282808,7 +282808,7 @@ CVE-2025-2078,0,0,9de7f9d36f257c6e4ade1283dce5bdc5d09f9fe37ce0133e41f71eebe0b83d
|
||||
CVE-2025-2079,0,0,1df99b44115761c768e37334a26d3048ad67e1a5d7d245b0266a3de82699255e,2025-03-13T17:15:38.080000
|
||||
CVE-2025-2080,0,0,8997dd07180b59c809f3df794229cdf89e46a6b355c2dafb103afdfc1a28dd39,2025-03-13T17:15:38.253000
|
||||
CVE-2025-2081,0,0,4bcbb760543adfc2793fb421232d69f0d37c0297321a5cb193e8d3ca3a30e752,2025-03-13T17:15:38.420000
|
||||
CVE-2025-2083,1,1,b56ebbfb64e690ba283af5695296a4a84125b08da3edddfa6c1f4a6e681671a4,2025-04-15T10:15:14.680000
|
||||
CVE-2025-2083,0,0,b56ebbfb64e690ba283af5695296a4a84125b08da3edddfa6c1f4a6e681671a4,2025-04-15T10:15:14.680000
|
||||
CVE-2025-2084,0,0,9186874e9417709e91bfbc0560be14cc85e2d2f24397f030f63236f2d997e78b,2025-03-12T17:20:12.987000
|
||||
CVE-2025-2085,0,0,cdc776ce557f1f5be020949a2de79ef2cb25d7baf89cebb5bb3d5d1806b66fad,2025-03-13T15:23:29.823000
|
||||
CVE-2025-2086,0,0,4e4362d5771bd0746a87b792e272a1c98aa3e837b1c239bf63f7ebc27efa4148,2025-03-13T16:05:15.390000
|
||||
@ -283956,9 +283956,9 @@ CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9
|
||||
CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000
|
||||
CVE-2025-2237,0,0,6c579bdd62bb8bda18ad2566fa6cb9554676ec322606aaab27d5422395dc3d2a,2025-04-01T20:26:11.547000
|
||||
CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000
|
||||
CVE-2025-22371,0,1,0fd515925b08583f66cf085b616128c74a1f3ca917aaf620b57021f2d4ed8aeb,2025-04-15T11:15:45.217000
|
||||
CVE-2025-22372,0,1,75369389960d3f21f4b6bbb162c3c9c860956b812ae91586aca01dac2b81e9e1,2025-04-15T11:15:45.380000
|
||||
CVE-2025-22373,0,1,b4963d7ab520a3ca5c3658c16dccdae3f07c2db90137181fcb67a712fe2c95e6,2025-04-15T11:15:45.533000
|
||||
CVE-2025-22371,0,0,0fd515925b08583f66cf085b616128c74a1f3ca917aaf620b57021f2d4ed8aeb,2025-04-15T11:15:45.217000
|
||||
CVE-2025-22372,0,0,75369389960d3f21f4b6bbb162c3c9c860956b812ae91586aca01dac2b81e9e1,2025-04-15T11:15:45.380000
|
||||
CVE-2025-22373,0,0,b4963d7ab520a3ca5c3658c16dccdae3f07c2db90137181fcb67a712fe2c95e6,2025-04-15T11:15:45.533000
|
||||
CVE-2025-22374,0,0,3c76c0c310d0a27c4ffac60f4f224c77b792b9b62909428eaeef4914314662fa,2025-04-11T15:39:52.920000
|
||||
CVE-2025-22375,0,0,ad41e29f59774e7ec2e9cb8e8af4d844651a9cedc9ff6f6b9f174f11c786065a,2025-04-11T15:39:52.920000
|
||||
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
|
||||
@ -286803,7 +286803,11 @@ CVE-2025-26737,0,0,ef70e0172c0763982b4f704c98436f4e8fa7d9222206609f397682c2bb7a4
|
||||
CVE-2025-26738,0,0,fe74511d18daa7f8c822f7c00f478c77ab9fe05590b455ccad4998d15c474085,2025-03-27T16:45:12.210000
|
||||
CVE-2025-26739,0,0,2514d7567fdad9bf988b03c827c3cf9332db7eb4aaa61ffce3b49cc72d1bf133,2025-03-27T16:45:27.850000
|
||||
CVE-2025-2674,0,0,b17ff2a840d43872ce8941660011244ce317e8241898334fca92f2c7e2d2df13,2025-03-27T18:21:20.710000
|
||||
CVE-2025-26741,1,1,077493a15142459277063e747dcd2be4904c9fef94f2d67af93ba87b2692b4b1,2025-04-15T12:15:19.230000
|
||||
CVE-2025-26742,0,0,d1c1ef0a2d3414bdd8fc0829685f2cb4bdc30a516dc3a80c709e135b1569fc7e,2025-03-27T16:45:46.410000
|
||||
CVE-2025-26743,1,1,8f7e8fd715d3bf9e7d968b130b8cfbcd5b52046c49a4d1c38253711a76d245a5,2025-04-15T12:15:19.407000
|
||||
CVE-2025-26744,1,1,7b1c579591e22601854cda0a7b44e412b57bd02b95573aecf1bbbfd59ffd9c82,2025-04-15T12:15:19.587000
|
||||
CVE-2025-26745,1,1,a7b04b2e513e9ca108505428cad622643f9721f36f7e47e8c23845a6fb26f582,2025-04-15T12:15:19.743000
|
||||
CVE-2025-26747,0,0,f799dbfce90467344ad4aaf43405a0c5bb92178129ef15a39374277528ecf159,2025-03-27T16:45:27.850000
|
||||
CVE-2025-2675,0,0,e49840b3a5ca3e77744a146445fa06f116b5cc16d89bcce736017749e482f04f,2025-03-26T14:03:31.380000
|
||||
CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000
|
||||
@ -286882,10 +286886,12 @@ CVE-2025-26885,0,0,2ef732a4cebbeb85a5dbbaf27f49124f8d762a49e8e7f3b22ab266ddbd21a
|
||||
CVE-2025-26886,0,0,3fccb07cd6593c19d4ebd609ac67b0d6e5961e270965b650cf84c0ac5737cb12,2025-03-15T22:15:13.837000
|
||||
CVE-2025-26887,0,0,d620956d3ea5625abfbc4595a1a19c4cbaf27ed3b93aec2afc55fa2fa354983d,2025-02-25T15:15:25.117000
|
||||
CVE-2025-26888,0,0,88340f4d9fa5152f8d2baf93269a38c0f6caaecf7620d64ac415d48780f03414,2025-04-11T15:40:10.277000
|
||||
CVE-2025-26889,1,1,5d3d0230f247990f9b124f76f20277fc846f15b430b1a8878c6e493f1b4bb795,2025-04-15T12:15:19.907000
|
||||
CVE-2025-2689,0,0,a0a16f7e7cbfe138500325b64261c6e20c16741d6a695a680e6c214018b4891c,2025-03-24T17:17:26.607000
|
||||
CVE-2025-26890,0,0,7c5bd562991190453d0d95d46540e8b902fafbca311e972364b1df4ac9dc0f02,2025-03-28T18:11:40.180000
|
||||
CVE-2025-26891,0,0,20d9b98fa953b2c2ae1876c761e770a063cad8d8555cb8705b5f8d6ebece6625,2025-02-25T15:15:25.253000
|
||||
CVE-2025-26893,0,0,1e55e8031dea60b355f7bfdcd2784f0b2b9ad5afec3a445aae3078ebb5e3718e,2025-02-25T15:15:25.390000
|
||||
CVE-2025-26894,1,1,efe40f827831db45c8611c7778695b40f9072fb3eeb493ca45eec8a9764bcffe,2025-04-15T12:15:20.073000
|
||||
CVE-2025-26895,0,0,3eb6addb22fb4b37c6c3f31fac229fd983ae417a5135246d65834c2c589c8b04,2025-03-15T22:15:14.013000
|
||||
CVE-2025-26896,0,0,698aeca623c70e4b06e040cd55b5c2549a6c6c52876a66af61cb43c3e54c60ab,2025-02-25T15:15:25.527000
|
||||
CVE-2025-26897,0,0,008344bbc82c06e5be6950b4745d40969170caa982c12bbebacc137b35f38f42,2025-02-25T15:15:25.690000
|
||||
@ -286927,15 +286933,21 @@ CVE-2025-26938,0,0,ccee8025a5da0f5335768772061878090bde7e99bf569f115b93a00b9aeb2
|
||||
CVE-2025-26939,0,0,58ae7bfaf9694ba77b15898e6615a5486bcece1885e349ca30dab005e95021c4,2025-02-25T15:15:27.883000
|
||||
CVE-2025-26940,0,0,027a042a9996f74c1b536a3ee0cf90caed7b08e7a2e9d51808cb5cb94c96159d,2025-03-15T22:15:14.810000
|
||||
CVE-2025-26941,0,0,eeab969e211d00d26492a623edb2ecb8e112a324bb65c6f415710335014e5142,2025-03-27T16:45:27.850000
|
||||
CVE-2025-26942,1,1,f512122c4d445d2c2ba7f7573d91793303f6cb75e7d6a1fdd214ad5189437846,2025-04-15T12:15:20.243000
|
||||
CVE-2025-26943,0,0,880198cc8338519544198ca562f39ac104b8bef0a8c121e384075bf4aedbb34a,2025-02-25T15:15:28.030000
|
||||
CVE-2025-26944,1,1,10e2ca1533b2ca8be1d834521fc56889f16a97eb72358680e9004a27c1af48b2,2025-04-15T12:15:20.413000
|
||||
CVE-2025-26945,0,0,6b5c2fad0a9b8f40f34855e800ac09994d07fec61ef015d056c7f881c616332e,2025-02-25T15:15:28.177000
|
||||
CVE-2025-26946,0,0,df781d5aa26b91c3cad6d895bb9f19c76a8ac0bc37b086b89e10307c3390056d,2025-02-25T15:15:28.320000
|
||||
CVE-2025-26947,0,0,17ca4a960f692537dd7bd29667eead07a638e9187cd25b27f2e6eb39d83f12f2,2025-02-25T15:15:28.457000
|
||||
CVE-2025-26948,0,0,7e692ce2f0fb2189773dab014b01c64cf92c1c0d6e24b0bdecd31d44fc8a160e,2025-02-25T15:15:28.597000
|
||||
CVE-2025-26949,0,0,756ec3a8273ffe21cd013eae401b29681f02ddf1186e27472f179b3deeae84ca,2025-02-25T15:15:28.733000
|
||||
CVE-2025-26952,0,0,a13de9204c8fb7f5ac97c6580a46c2af94bfa390df931bb26a31447f73f1cb45,2025-02-25T15:15:28.870000
|
||||
CVE-2025-26954,1,1,fba51a125990b1498fbe197649e7964122b367070227862ca5d7dd606ae6ddb7,2025-04-15T12:15:20.567000
|
||||
CVE-2025-26955,1,1,3ad9de8b7f7d06940ead5a18c5a4e9131f579ea5f080ccfae967421bcc315474,2025-04-15T12:15:20.713000
|
||||
CVE-2025-26956,0,0,67dc3e0376c57291d36674bc82b71c5ab19cd7ba364ee74deb6f26199d4b6b1d,2025-03-28T18:11:40.180000
|
||||
CVE-2025-26957,0,0,6c29e79d7d5ad28c3d1452c9dd015db2eba8e2ce8661a68ea61bf9040ea56305,2025-02-25T15:15:29.010000
|
||||
CVE-2025-26958,1,1,c9d900dc687bf740a847cdf973f9d65ec0811330f9e6eeea1295b64225ddc2e6,2025-04-15T12:15:20.880000
|
||||
CVE-2025-26959,1,1,cc82209c7785983a31c6bf30c9459b0fd5521b510ea252cf2af39f0f3f9f8506,2025-04-15T12:15:21.037000
|
||||
CVE-2025-26960,0,0,ad36f999467934854428e722bc7b7f4dfd105622c135096dd3c0aa70afd80457,2025-02-25T15:15:29.150000
|
||||
CVE-2025-26961,0,0,32038fb2c0fd1f686db79d976fcbcdf3a25031c595e82f3f1b331462be320b81,2025-03-15T22:15:14.960000
|
||||
CVE-2025-26962,0,0,050ad56156a26d49e3d36ac5fa3745ab1b7f9b90df44edc74e086668cb228eab,2025-02-25T15:15:29.290000
|
||||
@ -286957,6 +286969,7 @@ CVE-2025-26978,0,0,772f8c7e1cc61be12e475c7e34fcd1b8cf09b60bc8c45928de3d3849a34cf
|
||||
CVE-2025-26979,0,0,3430c3c7589910c0ce9812da83cd3b1e3a2f205c2786e4db026732f56da4254c,2025-02-25T15:15:30.587000
|
||||
CVE-2025-26980,0,0,dde475827d98f921adf627fe3afe81e813ccdfcae63ecbed9473027c0ab62abe,2025-02-25T15:15:30.730000
|
||||
CVE-2025-26981,0,0,3c198cc5da3d6f650a9e99b4d0dde322351720ee3c085612f1fbc577072a1976,2025-02-25T15:15:30.873000
|
||||
CVE-2025-26982,1,1,f022ecca7d7cf214e067185008ebac7307c3a408b8dee2e48d258659dce1e48f,2025-04-15T12:15:21.267000
|
||||
CVE-2025-26983,0,0,d6a859f29d624b201143fae24b6b474b6dfa136735775ba5e00cc884a212ebed,2025-02-25T15:15:31.043000
|
||||
CVE-2025-26984,0,0,850870a6d13166bab30d2f61af8dc6fc95f6d7238517ef3ceb04f89d1f9a98a1,2025-03-07T20:35:00.770000
|
||||
CVE-2025-26985,0,0,5fb0ce30a005f045393ce6a9e4877e64e68127385c508c29b67962ad383bc902,2025-02-25T15:15:31.183000
|
||||
@ -286965,7 +286978,9 @@ CVE-2025-26987,0,0,597d2628b42a4a65165e807aa9eb7e16ab56b0bee51783965b846b2753d56
|
||||
CVE-2025-26988,0,0,0319a38815984a3d7757bba2dab0c325e1f38ec9d387be497de99ad33c8d24a9,2025-03-07T20:35:36.553000
|
||||
CVE-2025-26989,0,0,b0ef3d20e454de8c22a4b1527a3da924af34822ec9bc2b6dd3acc50906fd5b9d,2025-03-07T20:36:56.700000
|
||||
CVE-2025-2699,0,0,6396e1b9f8444bd1d0105b607426e0438fae6c8e1cad3a588c50e09924ca055e,2025-03-24T17:33:00.020000
|
||||
CVE-2025-26990,1,1,08a6b5eb79bf3734577f837a86de90ec311bec7058910c967622192930e32e1a,2025-04-15T12:15:21.597000
|
||||
CVE-2025-26991,0,0,84217b1c95797f5f6a3434460f887fd28027f10e4a2535fce5046994c53e0aac,2025-02-25T15:15:31.460000
|
||||
CVE-2025-26992,1,1,4b1d36d5d77271d2107c6aaf5af990fab7b413d1c5bce3347185592b864e20d2,2025-04-15T12:15:21.773000
|
||||
CVE-2025-26993,0,0,25d916d390de90b80a1e84bf0243f302c32b655919eea97f6f91c9f96aa389dc,2025-02-25T15:15:31.590000
|
||||
CVE-2025-26994,0,0,03494b736a3ca693fdaefc610166ca8a10d800440713e480c6b170f7815e45d0,2025-03-07T20:37:45.723000
|
||||
CVE-2025-26995,0,0,9f9fd1cf4c78a39e37c563908ec2c351a2e202019a39ae0f35b6be53c49be04b,2025-02-25T15:15:31.720000
|
||||
@ -287562,8 +287577,8 @@ CVE-2025-2836,0,0,fc5be678cb97345ef6d68aed15f5462ba8f4f63b5b10c6ab5fab3a18f12761
|
||||
CVE-2025-28361,0,0,012842a41606e730430b254a67bbb658386b3833897674145b51c035a48415eb,2025-04-01T15:43:05.143000
|
||||
CVE-2025-2837,0,0,b89aeb2a53f8a50fdc7d1cb971618f78d6548d3dfb914df0b41cb0d9a2a5f82a,2025-03-27T16:45:27.850000
|
||||
CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4dfa3,2025-03-27T16:45:27.850000
|
||||
CVE-2025-28395,0,0,787acf6514abb8a3a80c4bce46febca1493172cc64b611845553a9003726f018,2025-04-14T18:15:28.833000
|
||||
CVE-2025-28398,0,0,a2165cc7a8a87e902702dee4b645778bcee1de648071e795add12a5949a33fef,2025-04-14T18:15:28.970000
|
||||
CVE-2025-28395,0,1,e2a008eff6d871d94e498e18fdcd7ec1a8104377f0bfd0c36d8d69a8cfbea062,2025-04-15T12:52:46.433000
|
||||
CVE-2025-28398,0,1,a80aa3350f7ebc843f0b185d49e6b66d7edf0d8201a54a2ee3a02548dd1b1270,2025-04-15T12:51:12.750000
|
||||
CVE-2025-2840,0,0,1611919e470b3959ac5f5634b987862e109125e9a8a008183091dc9630f3ea33,2025-04-01T20:26:30.593000
|
||||
CVE-2025-28400,0,0,cc1f6f84cf8a6714de7f979e521029089d85e3bab5eb1dddede51bed2df8cbb6,2025-04-09T17:29:47.113000
|
||||
CVE-2025-28401,0,0,f7b9c29cb1543d57a788f6df9919d9bc678436ddeda3822118494d478d80547d,2025-04-09T17:19:47.947000
|
||||
@ -287739,7 +287754,7 @@ CVE-2025-29137,0,0,6931ace246948745a6b3fe7c0c4f84f92cdbdc6e8e8f8a7f93a7b8720a179
|
||||
CVE-2025-2914,0,0,f4da3bf15e0a024148c60f5942d8d165e3d668046cbe893c7644ad7b0d6619e0,2025-03-28T18:11:40.180000
|
||||
CVE-2025-29149,0,0,2b30e3ef51abdd15292670ac51eb247a8a581b78085e4a43217ece3a22f27ca1,2025-03-27T15:26:02.940000
|
||||
CVE-2025-2915,0,0,70cc8be03dfb35b9ef84c0237ac359de350c3b4b4245e9a89d1955b7eff26074,2025-04-14T14:03:21.190000
|
||||
CVE-2025-29150,0,0,d63dc144134bdd58d64b5a241d38aa93b7976fc0b18bc7b222ca5fad328899e9,2025-04-11T15:39:52.920000
|
||||
CVE-2025-29150,0,1,830ae278210dc8950b4025bdf811095dc9ceda7da749b4d24c53ea4d187bdb2f,2025-04-15T13:50:15.537000
|
||||
CVE-2025-2916,0,0,a9d32a009c2c479d4d99380c6f5c7dc74ee32d7bcd65aba7c50dbefe66cc315d,2025-03-28T18:11:40.180000
|
||||
CVE-2025-2917,0,0,456c071352ee17bf9505ffdef668916785181adeea61153a444057728f3de9f2,2025-04-14T13:53:30.877000
|
||||
CVE-2025-29189,0,0,8f05af4418320348346691aa7f962df7a836889ea838607875b166fe868cccb7,2025-04-09T20:02:41.860000
|
||||
@ -287784,7 +287799,7 @@ CVE-2025-29384,0,0,14456271181d2a6b38eac63454e7d903bdeae2563e5fc51ec6c8692dd53ec
|
||||
CVE-2025-29385,0,0,f60ee6091bef3db2d6081e2edd6e0a4a37d7ecd5c70fcec7c258e2d44478f256,2025-03-19T19:15:49.280000
|
||||
CVE-2025-29386,0,0,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff529e,2025-03-19T19:15:49.423000
|
||||
CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2f45,2025-03-17T19:51:04.180000
|
||||
CVE-2025-29389,0,0,7346acc1fe3e0bce9d89cb45e28f2dcad894f34f4ad9518c187469c5c46854ce,2025-04-09T20:02:41.860000
|
||||
CVE-2025-29389,0,1,b6e910417322f02be556ac9b548f6e8b6c35848d660fba9931faab004d75355d,2025-04-15T13:42:23.447000
|
||||
CVE-2025-29390,0,0,0d3f1a5443d923cd69474601e81c6ed56d32c74e48f2cfcfad1110a3c886a131,2025-04-09T20:02:41.860000
|
||||
CVE-2025-29391,0,0,42d4546ada0a2b49c124dbe88b48d006d7589fb91bb0a018d0dd79fa5a9f12f6,2025-04-09T20:02:41.860000
|
||||
CVE-2025-29394,0,0,b33985c121ec23217a26c766fe9bee2b1c6ed057a04b87c5f8c939ce3b37502f,2025-04-09T20:02:41.860000
|
||||
@ -287917,7 +287932,7 @@ CVE-2025-2983,0,0,d31f69cd4a503a465c90bfed858cd3831ad229c0ecb657ddc75c62172e5f91
|
||||
CVE-2025-29834,0,0,c1edafc5db08600d282b1d504c73c12ff10139e21c4a2899ff9f8e6c1240a7ff,2025-04-12T02:15:22.027000
|
||||
CVE-2025-2984,0,0,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2985,0,0,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000
|
||||
CVE-2025-29868,0,0,9813b653c5bca2e8acf756b26daf804f197eeda8b9cebaf4dca020346cbb34e2,2025-04-10T15:16:03.860000
|
||||
CVE-2025-29868,0,1,b927f2785378c622235f633189b112c490059ef762d715c0b82b004d9b8787d2,2025-04-15T13:07:54.393000
|
||||
CVE-2025-29870,0,0,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000
|
||||
CVE-2025-2989,0,0,45a6c1ba1e6cd2d5c62dcb10c0528d36d57eceee6f8ab3df2269f6315f9c7634,2025-04-07T14:15:04.880000
|
||||
CVE-2025-29891,0,0,752eb7db0cd8cf51c6f0df1d0540c6e0a94cdab3ef9ff768e6ace10510ce6968,2025-04-02T20:37:07.073000
|
||||
@ -288053,7 +288068,7 @@ CVE-2025-30164,0,0,c838231ddadd650538b91334381739f0e5f84496049f4ab61b98fedaf2408
|
||||
CVE-2025-30166,0,0,dc8fa2e955f9b83b24c2517018cb3ddc4399710004f918cf05eb88fd63c78734,2025-04-08T18:13:53.347000
|
||||
CVE-2025-30168,0,0,3703f1f4b9dfa087aa1c5a98a4898da5aafd4533d5e73d111e4aa608fa2c614e,2025-03-21T15:15:43.440000
|
||||
CVE-2025-3017,0,0,98ff904dc48968379de3c001eb6b068a3a8d13595e1e3e62ce18b74891721501,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30177,0,0,1bfbcea48aa1ea068670da36dff62558776eef3abe203d4326a5f744d663461b,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30177,0,1,e6a2dcc39bb402f3fbe897267a52a15e4f647d561f8f8204556d252b469adda6,2025-04-15T13:00:12.587000
|
||||
CVE-2025-30179,0,0,e6188b5cfe41efd4be24afd0a9be97fe3cad7c2aaaf7dc5206b7ef410f616059,2025-03-27T14:45:47.520000
|
||||
CVE-2025-3018,0,0,699e90ef59bc974dffc7069ff5404d401834f1962c8486f8c32f7bd651f7ed16,2025-04-07T14:35:25.290000
|
||||
CVE-2025-3019,0,0,70e870259e621652f69977e8a6f5a1f65a77b053f491785fe2e80412bfee7fd9,2025-04-01T20:26:30.593000
|
||||
@ -288094,7 +288109,7 @@ CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d6
|
||||
CVE-2025-30280,0,0,30288d638eb0e9dbcf0aa5896bd69db9acfcecdbc6d868f34c8a52e27afc1001,2025-04-14T08:15:13.823000
|
||||
CVE-2025-30281,0,0,50a072f873968e0884926f8e8e3ac417a87058a178898fc0d8f8841b5e4ff462,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30282,0,0,a17dd9832b027f03ba6a75d738edfc9d501eb453a9d5c6408c6b0cc08654cbf6,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30284,0,0,8e53e1c7c93960fd053bcc2c17b6442972477767d5d61a97f5c87a3737a9b037,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30284,0,1,fcfe4b641e24a5d6edb0fad44597e9a8db41e7640854b7b8e24bb0269390b9dd,2025-04-15T13:13:50.853000
|
||||
CVE-2025-30285,0,0,7935713339eb97b0ce053ce1b5aa84345b8a159bb91df1c7304cb11e02fd0f8b,2025-04-09T20:02:41.860000
|
||||
CVE-2025-30286,0,0,e43adce2918b7c668d5d3cfc6aa7930d2b02a0ac84efbfb06cb6686e51b0f496,2025-04-14T17:43:28.940000
|
||||
CVE-2025-30287,0,0,bfb8139b266be0d2cb7b484acdd34e2bb85891baac94150ccb14b18f684529fb,2025-04-14T17:46:20.293000
|
||||
@ -288135,7 +288150,7 @@ CVE-2025-30346,0,0,c406f26a6d5e86f9605358f371c0731991af9645cd15fe0065dbd940074e7
|
||||
CVE-2025-30347,0,0,ed9763d5b530026684262273e310ca4c964268ef0ffc4c726547353dbc6770db,2025-03-24T14:19:23.963000
|
||||
CVE-2025-30348,0,0,0fb0e9fd503e8730c9a3857e63ee0ac5611b8bb7632a64f763dd19e4ff36427c,2025-03-24T14:08:36.513000
|
||||
CVE-2025-30349,0,0,d863fcdacafbcc4265f861b9a5ca8402397ade3d5ede94aef0450f050ac91a50,2025-04-03T12:15:16.210000
|
||||
CVE-2025-3035,0,0,b624d70c9ce84d2ad8578eca595ef2a28e4f857af65f374123c0cabcc94665a6,2025-04-10T21:15:49.180000
|
||||
CVE-2025-3035,0,1,03d49d41973a269f63c10099f775c9d282c755415dac20b290dc221d2ddd8472,2025-04-15T12:55:21.203000
|
||||
CVE-2025-30350,0,0,769aed62b7c52c7efff0910786b1540702d43c431a2629a37c544cf6ab27d2c0,2025-03-27T16:45:27.850000
|
||||
CVE-2025-30351,0,0,41323de04c59da9296c71c6a7df779e6c0c767b4bcb8b455ab5524ba6b0475be,2025-03-27T16:45:27.850000
|
||||
CVE-2025-30352,0,0,2de13b7ea6496a9753fe04c1b9f1d1f6040e23740e41cd04836f25b10e4f3884,2025-03-27T16:45:27.850000
|
||||
@ -288528,10 +288543,14 @@ CVE-2025-30925,0,0,303059a0519907d0c47140322e242ea05b7024546a805d0c164e0f0e362aa
|
||||
CVE-2025-30926,0,0,b661a84f99652a2821e7ff3d11c13e4069bdece4b97608c23c3ec387d8764f48,2025-04-01T20:26:11.547000
|
||||
CVE-2025-3096,0,0,8268841e6f7bc41398dcf36b7be8d3dcaa69d002c9097adfeaedeae01b3e118b,2025-04-01T20:26:01.990000
|
||||
CVE-2025-30961,0,0,a9060b0c2e5039ac1c7dc0d0a4866d8355c5b144195397ac7f7bbd22c91d7a82,2025-04-01T20:26:30.593000
|
||||
CVE-2025-30962,1,1,92f9d0608eb664efd9f98110b71d46902de51c148fb5b10dec336484313b68e1,2025-04-15T12:15:21.957000
|
||||
CVE-2025-30963,0,0,8f31ec02fefff5554b72626ba454b387f81489df6ae8a03a71d1b10a82ac3371,2025-04-01T20:26:30.593000
|
||||
CVE-2025-30964,1,1,054c9e0dc9ff20c2673d3e6c23c5f6ca099dad9816b5c60e7c3dd0b3fca6f6c6,2025-04-15T12:15:22.140000
|
||||
CVE-2025-30965,1,1,b1e72a077c827a9903873441ad887e71c2cb4707e49e40535b6e6ea896cd7e9e,2025-04-15T12:15:22.313000
|
||||
CVE-2025-3097,0,0,a56f46f6ab586feb1d3c504e3ae22e548d2acd2889f7f29233e79a32e7240220,2025-04-02T14:58:07.527000
|
||||
CVE-2025-30971,0,0,bdaa81d5f90f891b35dfd2da44198cf771c61350682b9305a17f8bc2d53e966d,2025-04-01T20:26:11.547000
|
||||
CVE-2025-3098,0,0,64e3da7989169613fb4eaf552a0f5621059a5a42e666f32ff39d3d155f26ca41,2025-04-02T14:58:07.527000
|
||||
CVE-2025-30985,1,1,f1c0efd7f61ad31be2d85a253eb44030709ac96f30d30710840f7b385df1d41e,2025-04-15T12:15:22.463000
|
||||
CVE-2025-30987,0,0,1ddeca9f293b13339e82c187149d285418438fc60231797e7c68c5fcad6fe64b,2025-04-01T20:26:30.593000
|
||||
CVE-2025-3099,0,0,8b5b94044c5b312a61081eb6466602886f5edc420174286cf66115736f8de591,2025-04-02T14:58:07.527000
|
||||
CVE-2025-3100,0,0,d223f6bdad24adad7bfeb8d8433bb786f4e26245258914a6d5f9c277f321f0fd,2025-04-09T20:02:41.860000
|
||||
@ -288543,6 +288562,7 @@ CVE-2025-31005,0,0,ceb79a2f36fcb390061964b11e10127964f5604b0d6b95191e77fe9337f63
|
||||
CVE-2025-31008,0,0,574e1cf42f8a16e13e787c6fb8ae3504d667cff8301f5b3817d1be7163f33d9b,2025-04-09T20:02:41.860000
|
||||
CVE-2025-31009,0,0,00ef1dcb50827d398a2f6c01ffba26a90073ce49541136b216e5baa33ed8b4e8,2025-04-09T20:02:41.860000
|
||||
CVE-2025-31010,0,0,c1f5ed11290de791a7c3fbb3f13d7b367feca7817eca67ce914a4ef488ac6cf5,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31011,1,1,9546b5e8cf1243bfa2ce7b9631b56280844ae92bb5ea69cb69557a1abc605e7e,2025-04-15T12:15:22.630000
|
||||
CVE-2025-31012,0,0,1f46b9635d7584db0ebef271a97e01198fa0633ac746e331966237bdddb260f8,2025-04-09T20:02:41.860000
|
||||
CVE-2025-31014,0,0,05a65cf1c53aaa3729696e93139ef997043ba9893b8c9b11b54bf89e713672b8,2025-04-11T15:39:52.920000
|
||||
CVE-2025-31015,0,0,cc9d5bb58bd9acbdec8dd13e2813c11ba30f9d64e279f9a8cd7570dbb05b8b09,2025-04-11T15:39:52.920000
|
||||
@ -289068,7 +289088,7 @@ CVE-2025-31806,0,0,b90546fe747ffeced4d44aced92f273d225fc8c5d11ad57a051f41118eb25
|
||||
CVE-2025-31807,0,0,0e08e0604c12e5cea2f7379e458a3adca084c7a5855440b8d71ab1b1c7d9c1b6,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31808,0,0,3d9d6e9f5669b82ca3d672e2ccfeb2c91afa925ae5dd54939c90b2dd85ccae35,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31809,0,0,73058d0a46f7de7e061c7f5b0028f36e01d0870a364009415e4df7d474cd3f5d,2025-04-01T20:26:01.990000
|
||||
CVE-2025-3181,0,0,c9f3a66d711acc9255fcdcd4ad5b67cdc340374187cabe4ddc28e6a6c506bd77,2025-04-07T17:15:37.707000
|
||||
CVE-2025-3181,0,1,b591d0f8743932399910847ccbd3bbd46c1f4a3f984fd0a61e4c4e9cc7ae226d,2025-04-15T12:47:18.723000
|
||||
CVE-2025-31810,0,0,f3af702a8b20c4f987d774999a8ddd12aa571f2fe10a41ce20511ba1a2cacfb8,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31811,0,0,400261866a9c810fccf624494bec07aa4768f10150af518e78ca29f4c60fdc8a,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31812,0,0,9daf6fcddc98329956a0aa9d59258dcf41457c139f76ca9270f11e2c3a164bb0,2025-04-01T20:26:01.990000
|
||||
@ -289079,7 +289099,7 @@ CVE-2025-31816,0,0,64557a3d1239be530e2a1e62c66c0e81f7b944cab3496b9d59a67296fe2cd
|
||||
CVE-2025-31817,0,0,e5a966381f1315a5f1650cbed1e4b4a896efa49f06a649a2754cc3a33bee9532,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31818,0,0,c51f2b827b99396fd7cd2ec2f2df7952fe64d8d16fea049001d5837be8a75ea2,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31819,0,0,ae2b21919b6c3224744ced52a20e06e6f2512a8bba29cab78af5df48acae8d55,2025-04-02T14:58:07.527000
|
||||
CVE-2025-3182,0,0,39008f4be13c68bf5171775f35d7159f568ab981e7e534a483df290dcc77a074,2025-04-07T17:15:37.897000
|
||||
CVE-2025-3182,0,1,66aede1d8bf2dcc9d2638f004814ec5fd465d658672d7e5678ab7751e3ec0e07,2025-04-15T12:36:25.193000
|
||||
CVE-2025-31820,0,0,073d8c7b64eb5f396a123c1d65fdd10a7aa5293d8d2897e1e75c2b5d3c774bbc,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31821,0,0,f2a9afee35932e5b060ddf98091c755b4debe0bcc4962f7543d3c50f47c0ce5a,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31822,0,0,26a424b5398bc8e38e793525911b12f88341a03f98513c46361dc05f40c1ab33,2025-04-01T20:26:01.990000
|
||||
@ -289090,7 +289110,7 @@ CVE-2025-31826,0,0,92cb877e2f47e3269630047239793a9ae7b3842d5a44a53ebe254b8162e51
|
||||
CVE-2025-31827,0,0,ebcd02ffb546863b75e8fada9013048347d5ee958e0c25302ae3866720cfec17,2025-04-07T14:18:34.453000
|
||||
CVE-2025-31828,0,0,f10dbd563bef1cbe91ad1743a8128c22fa4a78229085f4eb0e1fd81caefa5935,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31829,0,0,3bae247e220b234227ffb98516d715ad943da55df969b05e4c05a5c22fa7ebc2,2025-04-01T20:26:01.990000
|
||||
CVE-2025-3183,0,0,bbe346c980c2e49c98d21f9417a079248655a451a250e9dbfe0668b87727dde5,2025-04-07T17:15:38.060000
|
||||
CVE-2025-3183,0,1,a64cc343f36e4336817ce87e3474cc5281c840f215f41b54a718b7a59a86aed7,2025-04-15T12:30:35.003000
|
||||
CVE-2025-31830,0,0,f4005e0df03f5b0098410454de12d4db7f27adab38ff501fb628b8fa4644f0c2,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31831,0,0,32b22e03b17ccff10b64f9f889e18c057b468d1d16e47914df96aad7d31270a7,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31832,0,0,f16011b94562e6a31b6c983885f867c6190a9745ccaa48b253aed9b44065c37f,2025-04-01T20:26:01.990000
|
||||
@ -289101,7 +289121,7 @@ CVE-2025-31836,0,0,f38ab4f141614df19843869b6087bd0cbb9d51e26f9521e7f3276270d68c4
|
||||
CVE-2025-31837,0,0,ac402ad57f29f01cdba421eecbf01cbcb48ac88fb0c11f69fe4851c2ea6795c5,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31838,0,0,b07f4080142cc3b3f849dceb582b25d45db6d7eacaa20c3a0858ff3728c8c6c8,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31839,0,0,8ccc5e7f43a07fe39edff2259cd62f228dd6fa749fa65e1d8d7439add485f68d,2025-04-01T20:26:01.990000
|
||||
CVE-2025-3184,0,0,3b1d34daed6408be59570b3fc960aadf2f9f75c25f4795aa79118329ba1cc358,2025-04-07T14:18:34.453000
|
||||
CVE-2025-3184,0,1,3716263cc4b57de20536509988425f13436cba75cc51cf01a240840800d19c20,2025-04-15T12:25:42.497000
|
||||
CVE-2025-31840,0,0,7f2497c0b1a2d1900697a8ba0465553322e4710166db98ed0ebdab22a966869e,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31841,0,0,12e523c209a2ac942470692736ba7c8cc3060109d2c24eaadbeec5f4ea02536b,2025-04-07T14:18:34.453000
|
||||
CVE-2025-31842,0,0,6dd948d22229910fbd0e6ced4abce6bec93f03f0e97782ed125f97ea96bd0524,2025-04-01T20:26:01.990000
|
||||
@ -289112,7 +289132,7 @@ CVE-2025-31846,0,0,4111964ab4f51b35422f5619862fd0b99b7ed3ea3b2568b878c698149f7e8
|
||||
CVE-2025-31847,0,0,c3570f8cb7be0dffdf13b7b228695374a87a8be3fd696ce7252872b67768a2d8,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31848,0,0,2021508868f87d7b8489dffeb73d11798a698408887254b70cac3abfb891fb3d,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31849,0,0,48374392c603a436f7cf6c787b5641066082ea5def2200cd6c4875cbed23144f,2025-04-01T20:26:01.990000
|
||||
CVE-2025-3185,0,0,ac329edfbea1d42e07bd262523de8bec05538ff0191c9081db798f40b2e27005,2025-04-07T14:18:34.453000
|
||||
CVE-2025-3185,0,1,1c1f711feaeeb603412e159ffff8a29ae040c86a85d83fa5de2501009bde47aa,2025-04-15T12:22:57.350000
|
||||
CVE-2025-31850,0,0,c1448f442836c08bf57589c331093d5e7c8ee77088fffa5b43d79a50ba79b571,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31851,0,0,66b0b6f8be667b2aaa27ff4eee3680d1eb8ed9d74ce74eda64cf20f49bc8230c,2025-04-01T20:26:01.990000
|
||||
CVE-2025-31852,0,0,0563e048f300a482a69f323871ff66d0792aaf33c02aa55960611976e63349ae,2025-04-01T20:26:01.990000
|
||||
@ -289239,6 +289259,8 @@ CVE-2025-32080,0,0,8c5137c35b2b3c54cc7c5e0e0214d97db0b8376e0d36e9287126ae8d1d4b1
|
||||
CVE-2025-3209,0,0,efaeccbde8dfc66e8697afeb5d539c2f695606dff80d7c548cff76ae6514c4e4,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32093,0,0,840d563c9f546c12b4c77ed00bbb397e353206c1cbc749eb0a2f2a027994d2c0,2025-04-14T07:15:14.700000
|
||||
CVE-2025-3210,0,0,e3a6c98204c21b98a0522091394112cf3856887b7b64633cf1e308a0cb6727df,2025-04-08T17:43:12.840000
|
||||
CVE-2025-32102,1,1,1e04efaf7a55cc84e492fea102bce113b5efdb1d3a73cf944b4b6e10df68f800,2025-04-15T13:15:54.783000
|
||||
CVE-2025-32103,1,1,6fb6a411b4865c5a0b6737078e4bc89e85223cc06b11c5a36f7700c25b9f64ca,2025-04-15T13:15:54.893000
|
||||
CVE-2025-32107,0,0,a689a2435b39d5968d7bf2a8f1256f4c1ffc589945169a8a583af99a6981cea6,2025-04-11T15:39:52.920000
|
||||
CVE-2025-3211,0,0,e2eebcc8ba292d8d3d123757d4623f49a37b0c48559fde3713cb0f540bc6af19,2025-04-07T14:18:15.560000
|
||||
CVE-2025-32111,0,0,4216c6506d31334c8d23317eabe3bae930691d012b7febaea26a4964764ff3bb,2025-04-07T14:18:15.560000
|
||||
@ -289653,6 +289675,7 @@ CVE-2025-32912,0,0,d33de40cd0f2adfe8bcd4894cbd2f85eba79dd1273db6220e05c79c9309fc
|
||||
CVE-2025-32913,0,0,d57ad36165f59819d303ec9ab2813ff5e3bf6501be5718c19b238e301d12630b,2025-04-14T14:15:24.860000
|
||||
CVE-2025-32914,0,0,de999727d5bce94a114462e2bc1bde19e09dd5cdd0f1e24a89bd7f2b18826694,2025-04-14T15:15:25.633000
|
||||
CVE-2025-3292,0,0,2e1db750cfd1563a06db7ac495c3f640edc42fb0c4158d03489de1beb7a4ae8f,2025-04-12T07:15:27.143000
|
||||
CVE-2025-32929,1,1,cedabae0b9d219e90c3ff760ffd5267799c5b806c51c09496b34e6fb9fb95fb3,2025-04-15T12:15:22.787000
|
||||
CVE-2025-32930,0,0,7aa7721c6427b0edc6ca10f6fa05a98645a2b1c5fcd736b40f97d37f2fbc0637,2025-04-14T15:15:25.787000
|
||||
CVE-2025-32931,0,0,94cc5fcddf25096d3020225e203ae16bfb1f4efa469cabee66ae53d695e6e9a8,2025-04-14T16:15:22.157000
|
||||
CVE-2025-32933,0,0,e4399dc1130e415e7bcf2d27718e9f13cbbe89ea193c41df5f50b1886eb6018b,2025-04-15T03:15:17.590000
|
||||
@ -289664,7 +289687,10 @@ CVE-2025-32938,0,0,d97032ba2fb62d85b0fd781b1a847fc87e2cde9e5de8598412a81c2f7b235
|
||||
CVE-2025-32939,0,0,6d0ae9200a7976c683c740ee0295d246f733a1e3dbef51e2eacbe3ae7efb8a4d,2025-04-15T03:15:17.957000
|
||||
CVE-2025-32940,0,0,ef492180fd67c205ba6c2e08604b15b7b05288970e18fade437210606e359428,2025-04-15T03:15:18.013000
|
||||
CVE-2025-32941,0,0,7b47b38d71f23645464b8e8efcb34f5cd92a1b50b5494bf228368f472d5e5710,2025-04-15T03:15:18.077000
|
||||
CVE-2025-32943,1,1,23e64df0fd35a825759aae24d8798ec09a333f7b3609395a3902498ee98d825b,2025-04-15T11:15:45.690000
|
||||
CVE-2025-32943,0,1,7c75a7f596d703b3758cf1a1170c8d89099896139a576371807ba2368d77efc3,2025-04-15T13:15:55.003000
|
||||
CVE-2025-32944,1,1,64c3fdc8548b3105cdc0600f862a70066b2acfcd152da4d56a05c1357e97783d,2025-04-15T13:15:55.100000
|
||||
CVE-2025-32945,1,1,25627aa20f6965f2fba572cae58ee7d565ea0b97277dde2a4a853f90d348c88d,2025-04-15T13:15:55.230000
|
||||
CVE-2025-32946,1,1,684fff9e206f18e7510238c19ce2c197ebd16949f6248eeaa3b2d306047ea787,2025-04-15T13:15:55.360000
|
||||
CVE-2025-3296,0,0,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000
|
||||
CVE-2025-3297,0,0,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000
|
||||
CVE-2025-3298,0,0,289613560130dabe199eea55128a1bdfe9eecd882e62238f3674c43e858ef0bc,2025-04-08T16:49:00.290000
|
||||
@ -289842,7 +289868,7 @@ CVE-2025-3574,0,0,f996911954026f2b9520c1e3b9e7bc2c127ad4cd73d0acb10a428900f0672f
|
||||
CVE-2025-3575,0,0,3b859cdcc75d19b0bd222446e0df21a3c805929d044033ae64d5f00e6acaf9a6,2025-04-15T09:15:13.670000
|
||||
CVE-2025-3576,0,0,b0049c6025d64b2929e211c65d145d94da2ded08e6e9fc81bae0b76f324cbdc5,2025-04-15T06:15:44.047000
|
||||
CVE-2025-3578,0,0,87d1e0551317c254c64c797e6713254af47bbba82a0ddab4b2b90342d2423840,2025-04-15T09:15:13.810000
|
||||
CVE-2025-3579,0,1,14a4df7542b5c70b893d9914691e4b28106064c1cc523e6fc5e4c2a44d170fa3,2025-04-15T09:15:13.950000
|
||||
CVE-2025-3579,0,0,14a4df7542b5c70b893d9914691e4b28106064c1cc523e6fc5e4c2a44d170fa3,2025-04-15T09:15:13.950000
|
||||
CVE-2025-3585,0,0,3f56099df0d5cbe2a28c49e0084d09a46fec0a860dece5bd91eb4466f785fbfe,2025-04-14T19:15:36.990000
|
||||
CVE-2025-3587,0,0,0b5d7c64b9281d67b2da75b50cd511d58c4d6400c863ce33e2f51939e792bcae,2025-04-14T21:15:18.220000
|
||||
CVE-2025-3588,0,0,325725e21d51ea302750035b03dc4eb21568d3831b2e5a943f3da0a80eb56df1,2025-04-14T21:15:18.343000
|
||||
@ -289851,6 +289877,7 @@ CVE-2025-3590,0,0,aa07cf51d9a0d561b10043bb7261822f0af57d8d6d4fee0ad683485554a00b
|
||||
CVE-2025-3591,0,0,86fad0a948ecf8f921345a86491b837545045bf239c666008f3a1038a8e13f8f,2025-04-14T22:15:16.827000
|
||||
CVE-2025-3592,0,0,1454212ef6249f5a5ec56ab9bb8016685ead208040c766cd4c83cd18b7c61f0e,2025-04-14T22:15:17
|
||||
CVE-2025-3593,0,0,1a81b98ecfba1979c3a4ccc38ff5bb341262b9aec183ca57e86bed8f737e2cd2,2025-04-14T23:15:22.270000
|
||||
CVE-2025-3608,1,1,cce37ad158327413338cb2046192c4a98ba3765fd6eb7304f37c48ca7bbc5e03,2025-04-15T13:15:55.590000
|
||||
CVE-2025-3612,0,0,697ce4214c78774beedb8be6991054d30b9a9fb680765454a424968b455ebab8,2025-04-15T03:15:18.850000
|
||||
CVE-2025-3613,0,0,a067b576d7ee99ea85156c126c0f1e5ea568b9c9c4c12ed42ef53e964551617f,2025-04-15T03:15:19.023000
|
||||
CVE-2025-3622,0,0,47753e571550028309f50a7357c2e7a2ffef09c161d69e6f86b6106c526c7aab,2025-04-15T06:15:44.227000
|
||||
CVE-2025-3622,0,1,b19ec5faf46a936315e531dd6572476bfdc165d0e5919b2330464b4f2986eee3,2025-04-15T13:15:55.687000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user