diff --git a/CVE-2020/CVE-2020-182xx/CVE-2020-18243.json b/CVE-2020/CVE-2020-182xx/CVE-2020-18243.json index 1ba24939ad8..8641e1e9d61 100644 --- a/CVE-2020/CVE-2020-182xx/CVE-2020-18243.json +++ b/CVE-2020/CVE-2020-182xx/CVE-2020-18243.json @@ -2,7 +2,7 @@ "id": "CVE-2020-18243", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T16:15:17.777", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T20:15:29.707", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "SQL injection vulnerability found in Enricozab CMS v.1.0 allows a remote attacker to execute arbitrary code via /hdo/hdo-view-case.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/enricozab/CMS/issues/1", diff --git a/CVE-2022/CVE-2022-244xx/CVE-2022-24431.json b/CVE-2022/CVE-2022-244xx/CVE-2022-24431.json index 91166b17639..7592cb8417d 100644 --- a/CVE-2022/CVE-2022-244xx/CVE-2022-24431.json +++ b/CVE-2022/CVE-2022-244xx/CVE-2022-24431.json @@ -2,7 +2,7 @@ "id": "CVE-2022-24431", "sourceIdentifier": "report@snyk.io", "published": "2022-12-21T05:15:11.123", - "lastModified": "2024-11-21T06:50:24.457", + "lastModified": "2025-04-15T20:15:35.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-258xx/CVE-2022-25893.json b/CVE-2022/CVE-2022-258xx/CVE-2022-25893.json index 549705c1c23..f76b0995799 100644 --- a/CVE-2022/CVE-2022-258xx/CVE-2022-25893.json +++ b/CVE-2022/CVE-2022-258xx/CVE-2022-25893.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25893", "sourceIdentifier": "report@snyk.io", "published": "2022-12-21T05:15:11.220", - "lastModified": "2024-11-21T06:53:10.577", + "lastModified": "2025-04-15T20:15:35.633", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-471" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-263xx/CVE-2022-26385.json b/CVE-2022/CVE-2022-263xx/CVE-2022-26385.json index 65647c807ac..6b725ca39e9 100644 --- a/CVE-2022/CVE-2022-263xx/CVE-2022-26385.json +++ b/CVE-2022/CVE-2022-263xx/CVE-2022-26385.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26385", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:21.923", - "lastModified": "2024-11-21T06:53:53.500", + "lastModified": "2025-04-15T21:15:45.007", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-263xx/CVE-2022-26386.json b/CVE-2022/CVE-2022-263xx/CVE-2022-26386.json index a93c1b779f5..138aaee62c2 100644 --- a/CVE-2022/CVE-2022-263xx/CVE-2022-26386.json +++ b/CVE-2022/CVE-2022-263xx/CVE-2022-26386.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26386", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:22.137", - "lastModified": "2024-11-21T06:53:53.593", + "lastModified": "2025-04-15T21:15:45.963", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-377" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-263xx/CVE-2022-26387.json b/CVE-2022/CVE-2022-263xx/CVE-2022-26387.json index aa5740c83c8..ffb7e2a3d98 100644 --- a/CVE-2022/CVE-2022-263xx/CVE-2022-26387.json +++ b/CVE-2022/CVE-2022-263xx/CVE-2022-26387.json @@ -2,7 +2,7 @@ "id": "CVE-2022-26387", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:22.340", - "lastModified": "2024-11-21T06:53:53.700", + "lastModified": "2025-04-15T21:15:46.117", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-282xx/CVE-2022-28281.json b/CVE-2022/CVE-2022-282xx/CVE-2022-28281.json index 5170790a536..61c38e32bcd 100644 --- a/CVE-2022/CVE-2022-282xx/CVE-2022-28281.json +++ b/CVE-2022/CVE-2022-282xx/CVE-2022-28281.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28281", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:23.023", - "lastModified": "2024-11-21T06:57:06.293", + "lastModified": "2025-04-15T21:15:46.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-282xx/CVE-2022-28282.json b/CVE-2022/CVE-2022-282xx/CVE-2022-28282.json index ce00b3f3311..9924f3fecc1 100644 --- a/CVE-2022/CVE-2022-282xx/CVE-2022-28282.json +++ b/CVE-2022/CVE-2022-282xx/CVE-2022-28282.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28282", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:23.430", - "lastModified": "2024-11-21T06:57:06.423", + "lastModified": "2025-04-15T20:15:35.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-299xx/CVE-2022-29912.json b/CVE-2022/CVE-2022-299xx/CVE-2022-29912.json index f4069d5ee91..35f62feaa45 100644 --- a/CVE-2022/CVE-2022-299xx/CVE-2022-29912.json +++ b/CVE-2022/CVE-2022-299xx/CVE-2022-29912.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29912", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:26.010", - "lastModified": "2024-11-21T06:59:57.680", + "lastModified": "2025-04-15T20:15:36.013", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-299xx/CVE-2022-29913.json b/CVE-2022/CVE-2022-299xx/CVE-2022-29913.json index 373fa860fd3..d80e04711cc 100644 --- a/CVE-2022/CVE-2022-299xx/CVE-2022-29913.json +++ b/CVE-2022/CVE-2022-299xx/CVE-2022-29913.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29913", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:26.203", - "lastModified": "2024-11-21T06:59:57.790", + "lastModified": "2025-04-15T20:15:36.187", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-299xx/CVE-2022-29914.json b/CVE-2022/CVE-2022-299xx/CVE-2022-29914.json index df4a88a1b05..465ef9299e2 100644 --- a/CVE-2022/CVE-2022-299xx/CVE-2022-29914.json +++ b/CVE-2022/CVE-2022-299xx/CVE-2022-29914.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29914", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:26.397", - "lastModified": "2024-11-21T06:59:57.913", + "lastModified": "2025-04-15T20:15:36.377", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-344xx/CVE-2022-34472.json b/CVE-2022/CVE-2022-344xx/CVE-2022-34472.json index 4020ac4a610..68cbcf753f5 100644 --- a/CVE-2022/CVE-2022-344xx/CVE-2022-34472.json +++ b/CVE-2022/CVE-2022-344xx/CVE-2022-34472.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34472", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:31.723", - "lastModified": "2024-11-21T07:09:38.383", + "lastModified": "2025-04-15T20:15:36.803", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-703" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-344xx/CVE-2022-34473.json b/CVE-2022/CVE-2022-344xx/CVE-2022-34473.json index 1fb050321fe..8dd6e0a53ab 100644 --- a/CVE-2022/CVE-2022-344xx/CVE-2022-34473.json +++ b/CVE-2022/CVE-2022-344xx/CVE-2022-34473.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34473", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:31.917", - "lastModified": "2024-11-21T07:09:38.520", + "lastModified": "2025-04-15T20:15:37.010", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-344xx/CVE-2022-34474.json b/CVE-2022/CVE-2022-344xx/CVE-2022-34474.json index 3a7b580b8da..a67ec71cefe 100644 --- a/CVE-2022/CVE-2022-344xx/CVE-2022-34474.json +++ b/CVE-2022/CVE-2022-344xx/CVE-2022-34474.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34474", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:32.117", - "lastModified": "2024-11-21T07:09:38.643", + "lastModified": "2025-04-15T20:15:37.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-344xx/CVE-2022-34475.json b/CVE-2022/CVE-2022-344xx/CVE-2022-34475.json index be86e150120..0c3211208f4 100644 --- a/CVE-2022/CVE-2022-344xx/CVE-2022-34475.json +++ b/CVE-2022/CVE-2022-344xx/CVE-2022-34475.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34475", "sourceIdentifier": "security@mozilla.org", "published": "2022-12-22T20:15:32.307", - "lastModified": "2024-11-21T07:09:38.767", + "lastModified": "2025-04-15T20:15:37.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43840.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43840.json index 502c783601f..1a148d068bf 100644 --- a/CVE-2022/CVE-2022-438xx/CVE-2022-43840.json +++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43840.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43840", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-04-14T21:15:16.200", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T21:15:46.440", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-643" + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7169766", diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44643.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44643.json index f78465f3400..faec56f9847 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44643.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44643.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44643", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-20T15:15:11.780", - "lastModified": "2024-11-21T07:28:15.233", + "lastModified": "2025-04-15T20:15:37.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25699.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25699.json index 16199684055..7d60350a318 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25699.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25699.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25699", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-03T13:15:59.923", - "lastModified": "2024-11-21T07:49:57.770", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T21:08:51.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:videowhisper:videowhisper_live_streaming_integration:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.5.16", + "matchCriteriaId": "37D16760-4C6E-4945-AFDE-956BA448B884" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/videowhisper-live-streaming-integration/wordpress-broadcast-live-video-live-streaming-html5-webrtc-hls-rtsp-rtmp-plugin-5-5-15-remote-code-execution-rce?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/videowhisper-live-streaming-integration/wordpress-broadcast-live-video-live-streaming-html5-webrtc-hls-rtsp-rtmp-plugin-5-5-15-remote-code-execution-rce?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25966.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25966.json index 0abbbf55ba0..55f7f407fcf 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25966.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25966.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25966", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:24.370", - "lastModified": "2024-12-09T13:15:24.370", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T20:49:05.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:filebird:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.5", + "matchCriteriaId": "39ECEEA4-A26A-4190-B324-0DBBCC91E883" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/filebird/vulnerability/wordpress-filebird-plugin-5-1-4-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48319.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48319.json index ebfd0706db1..cca6593bcfc 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48319.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48319.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48319", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T09:15:13.873", - "lastModified": "2024-11-21T08:31:28.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T20:56:20.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salonbookingsystem:salon_booking_system:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.7", + "matchCriteriaId": "4E7A8DEA-09F7-4E2B-BD35-128C5294EBA2" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/salon-booking-system/wordpress-salon-booking-system-plugin-8-7-editor-privilege-escalation-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/salon-booking-system/wordpress-salon-booking-system-plugin-8-7-editor-privilege-escalation-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51525.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51525.json index 8dd6704f37a..7905337ff50 100644 --- a/CVE-2023/CVE-2023-515xx/CVE-2023-51525.json +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51525.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51525", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T14:15:07.457", - "lastModified": "2024-11-21T21:15:15.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T21:13:12.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpsimplebookingcalendar:wp_simple_booking_calendar:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.8.4", + "matchCriteriaId": "81186547-1133-47E5-8E80-C23F193F8273" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-simple-booking-calendar/wordpress-wp-simple-booking-calendar-plugin-2-0-8-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-simple-booking-calendar/wordpress-wp-simple-booking-calendar-plugin-2-0-8-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5616.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5616.json index b1721ceaeb2..abd4dd21e2e 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5616.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5616.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5616", "sourceIdentifier": "security@ubuntu.com", "published": "2025-04-15T19:16:06.647", - "lastModified": "2025-04-15T19:16:06.647", + "lastModified": "2025-04-15T21:15:46.583", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In Ubuntu, gnome-control-center did not properly reflect SSH remote login status when the system was configured to use systemd socket activation for openssh-server. This could unknowingly leave the local machine exposed to remote SSH access contrary to expectation of the user." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "https://bugs.launchpad.net/ubuntu/+source/gnome-control-center/+bug/2039577", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27193.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27193.json index d1a5ff06321..95dc225680e 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27193.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27193", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:09.043", - "lastModified": "2024-11-21T09:04:04.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T21:12:22.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:woocommerce:payu_india_payment_gateway:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.8.2", + "matchCriteriaId": "42779C4A-AF4C-4D32-B3E2-66A3FEE00C50" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/payu-india/wordpress-payu-india-plugin-3-8-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/payu-india/wordpress-payu-india-plugin-3-8-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27196.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27196.json index 4ac3662d05c..7e6049a65fa 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27196.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27196.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27196", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-15T13:15:09.277", - "lastModified": "2024-11-21T09:04:04.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T21:12:42.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jmash:postmash:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.0", + "matchCriteriaId": "B78E6213-BC1E-4AA9-8E3B-62B6907E42BD" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/postmash/wordpress-postmash-custom-post-order-plugin-1-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/postmash/wordpress-postmash-custom-post-order-plugin-1-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30477.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30477.json index 8d2e9cf37a2..57101b52df1 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30477.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30477.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30477", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T16:15:09.687", - "lastModified": "2024-11-21T09:12:00.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T21:08:30.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:klarna:klarna_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.2.4", + "matchCriteriaId": "9ECBEE8C-A94C-451C-9BAF-4717C0008560" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/klarna-payments-for-woocommerce/wordpress-klarna-payments-for-woocommerce-plugin-3-2-4-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/klarna-payments-for-woocommerce/wordpress-klarna-payments-for-woocommerce-plugin-3-2-4-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30482.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30482.json index dd1478a351c..5b749209a33 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30482.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30482.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30482", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T16:15:09.943", - "lastModified": "2024-11-21T09:12:00.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T21:11:59.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:b-website:simple_revisions_delete:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.5.3", + "matchCriteriaId": "78BDAE16-A8FA-4AAB-8455-3A6A07AE7024" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/simple-revisions-delete/wordpress-simple-revisions-delete-plugin-1-5-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/simple-revisions-delete/wordpress-simple-revisions-delete-plugin-1-5-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31099.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31099.json index 95e01f9bfa6..ac252558b43 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31099.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31099.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31099", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-01T14:15:07.517", - "lastModified": "2024-11-21T09:12:51.237", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T21:11:00.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:depicter:shortcodes_and_extra_features_for_phlox_theme:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.15.7", + "matchCriteriaId": "DD6DB8A2-8870-4057-A294-66D52EF48745" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/auxin-elements/wordpress-phlox-core-elements-plugin-2-15-5-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/auxin-elements/wordpress-phlox-core-elements-plugin-2-15-5-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33651.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33651.json index fb439aa26e5..dbb38b3dedd 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33651.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33651.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33651", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-26T08:15:13.370", - "lastModified": "2024-11-21T09:17:19.423", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T20:02:09.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.1", + "matchCriteriaId": "9A95FA02-9E77-43CF-8A55-E9C907928ED7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/mf-gig-calendar/wordpress-mf-gig-calendar-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/mf-gig-calendar/wordpress-mf-gig-calendar-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35166.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35166.json index cda34a47d81..d2fa5298f46 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35166.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35166.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35166", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-14T15:39:40.047", - "lastModified": "2024-11-21T09:19:51.097", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T20:56:04.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:filebird:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.6.4", + "matchCriteriaId": "FB9EE551-2AD2-44AA-9AC1-969D9C7DB9C0" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/filebird/wordpress-filebird-wordpress-media-library-folders-file-manager-plugin-5-6-3-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/filebird/wordpress-filebird-wordpress-media-library-folders-file-manager-plugin-5-6-3-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36842.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36842.json index 2d3d3fda2d3..e14286bd269 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36842.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36842.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36842", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T16:15:23.187", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T20:15:38.160", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in Oncord+ Android Infotainment Systems OS Android 12, Model Hardware TS17,Hardware part Number F57L_V3.2_20220301, and Build Number PlatformVER:K24-2023/05/09-v0.01 allows a remote attacker to execute arbitrary code via the ADB port component." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/abbiy/Backdooring-Oncord-Android-Sterio-/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44843.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44843.json new file mode 100644 index 00000000000..19da0ae5486 --- /dev/null +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44843.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-44843", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-15T21:15:46.730", + "lastModified": "2025-04-15T21:15:46.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the web socket handshake process of SteVe v3.7.1 allows attackers to bypass authentication and execute arbitrary coammands via supplying crafted OCPP requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Badranh/94359664799db6d4709871f0c353f476", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/steve-community/steve/blob/master/src/main/java/de/rwth/idsg/steve/ocpp/ws/OcppWebSocketHandshakeHandler.java", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/steve-community/steve/issues/1546", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53481.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53481.json index ff3425eb861..0db1f856960 100644 --- a/CVE-2024/CVE-2024-534xx/CVE-2024-53481.json +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53481.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53481", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-10T20:15:21.033", - "lastModified": "2024-12-10T21:15:20.003", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T20:35:16.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:beauty_parlour_management_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A0663F5C-7E50-4432-817D-518802751580" + } + ] + } + ] + } + ], "references": [ { "url": "http://phpgurukul.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/sbksibi/CVEs/blob/main/CVE-2024-53481.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53825.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53825.json index 13a90bfefed..a1061747f91 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53825.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53825.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53825", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-06T14:15:24.937", - "lastModified": "2024-12-06T14:15:24.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T20:55:02.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:filebird:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "6.3.2", + "matchCriteriaId": "52096E92-C169-4B06-8D81-6C548BAAAB91" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/filebird/vulnerability/wordpress-filebird-lite-plugin-6-3-2-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54211.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54211.json index e792af0cbc1..9852ffb929c 100644 --- a/CVE-2024/CVE-2024-542xx/CVE-2024-54211.json +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54211.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54211", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-06T14:15:26.093", - "lastModified": "2024-12-06T14:15:26.093", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T20:35:50.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:visualmodo:borderless:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.9", + "matchCriteriaId": "5A24B672-E9EC-4B65-9988-141268C3090D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/borderless/vulnerability/wordpress-borderless-widgets-elements-templates-and-toolkit-for-elementor-gutenberg-plugin-1-5-7-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json b/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json index b9b78d4781f..0c58ac43f8b 100644 --- a/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json +++ b/CVE-2024/CVE-2024-571xx/CVE-2024-57159.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57159", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:32.700", - "lastModified": "2025-03-13T14:15:33.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T20:09:13.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:07fly:07flycms:1.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E9E565AA-68C6-429F-BC02-0680396BD9A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/1091101/yang.xian/tree/main/6/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57611.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57611.json index 6071ba7fe0b..5b969b885c1 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57611.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57611.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57611", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T16:15:33.893", - "lastModified": "2025-02-03T19:15:13.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T20:09:27.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:07fly:07flycms:1.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E9E565AA-68C6-429F-BC02-0680396BD9A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/daodaoshao/Yunpeng-Yin/tree/main/7/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0539.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0539.json index eeb95741717..d777114bdc7 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0539.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0539.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0539", "sourceIdentifier": "security@octopus.com", "published": "2025-04-10T06:15:53.133", - "lastModified": "2025-04-11T15:40:10.277", + "lastModified": "2025-04-15T21:15:46.847", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://advisories.octopus.com/post/2025/sa2025-06", diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1122.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1122.json new file mode 100644 index 00000000000..115ee08a80e --- /dev/null +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1122.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-1122", + "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", + "published": "2025-04-15T20:15:38.317", + "lastModified": "2025-04-15T20:15:38.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 122.0.6261.132 stable on Cr50 Boards allows an attacker with root access to gain persistence and \nbypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://issues.chromium.org/issues/b/324336238", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + }, + { + "url": "https://issuetracker.google.com/issues/324336238", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1273.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1273.json new file mode 100644 index 00000000000..25cffacd16a --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1273.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1273", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-04-15T21:15:46.960", + "lastModified": "2025-04-15T21:15:46.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1274.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1274.json new file mode 100644 index 00000000000..691bd277261 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1274.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1274", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-04-15T21:15:47.083", + "lastModified": "2025-04-15T21:15:47.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted RCS file, when parsed through Autodesk Revit, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0007", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1275.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1275.json new file mode 100644 index 00000000000..e6634415c60 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1275.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1275", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-04-15T21:15:47.197", + "lastModified": "2025-04-15T21:15:47.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted JPG file, when linked or imported into certain Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0006", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1276.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1276.json new file mode 100644 index 00000000000..a0f7dc8e018 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1276.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1276", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-04-15T21:15:47.320", + "lastModified": "2025-04-15T21:15:47.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWG file, when parsed through certain Autodesk applications, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0004", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1277.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1277.json new file mode 100644 index 00000000000..9d3ae19fd5d --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1277.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1277", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-04-15T21:15:47.443", + "lastModified": "2025-04-15T21:15:47.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted PDF file, when parsed through Autodesk applications, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1292.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1292.json new file mode 100644 index 00000000000..72bada069b4 --- /dev/null +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1292.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-1292", + "sourceIdentifier": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f", + "published": "2025-04-15T20:15:38.410", + "lastModified": "2025-04-15T20:15:38.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 122.0.6261.132 stable on Cr50 Boards allows an attacker with root access to gain persistence and \nbypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://issues.chromium.org/issues/b/324336238", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + }, + { + "url": "https://issuetracker.google.com/issues/324336238", + "source": "7f6e188d-c52a-4a19-8674-3c3fa7d1fc7f" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1656.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1656.json new file mode 100644 index 00000000000..24f6766aa10 --- /dev/null +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1656.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1656", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-04-15T21:15:47.560", + "lastModified": "2025-04-15T21:15:47.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21573.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21573.json new file mode 100644 index 00000000000..a3d38a555a4 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21573.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21573", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:47.670", + "lastModified": "2025-04-15T21:15:47.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Financial Services Revenue Management and Billing product of Oracle Financial Services Applications (component: Chatbot). Supported versions that are affected are 5.1.0.0.0, 6.1.0.0.0 and 7.0.0.0.0. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Financial Services Revenue Management and Billing. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Revenue Management and Billing accessible data as well as unauthorized access to critical data or complete access to all Oracle Financial Services Revenue Management and Billing accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Financial Services Revenue Management and Billing. CVSS 3.1 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.5 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21574.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21574.json new file mode 100644 index 00000000000..2324dabd5c0 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21574.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21574", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:47.793", + "lastModified": "2025-04-15T21:15:47.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21575.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21575.json new file mode 100644 index 00000000000..99d23629610 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21575.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21575", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:47.897", + "lastModified": "2025-04-15T21:15:47.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21576.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21576.json new file mode 100644 index 00000000000..82d7cb7051c --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21576.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21576", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:48.007", + "lastModified": "2025-04-15T21:15:48.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Commerce Platform product of Oracle Commerce (component: Dynamo Personalization Server). Supported versions that are affected are 11.3.0, 11.3.1 and 11.3.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Commerce Platform. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Commerce Platform, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Commerce Platform accessible data as well as unauthorized read access to a subset of Oracle Commerce Platform accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21577.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21577.json new file mode 100644 index 00000000000..726b5d29687 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21577.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21577", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:48.120", + "lastModified": "2025-04-15T21:15:48.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21578.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21578.json new file mode 100644 index 00000000000..24aff45fcd6 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21578.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21578", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:48.240", + "lastModified": "2025-04-15T21:15:48.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in Oracle Secure Backup (component: General). Supported versions that are affected are 12.1.0.1, 12.1.0.2, 12.1.0.3, 18.1.0.0, 18.1.0.1 and 18.1.0.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Secure Backup executes to compromise Oracle Secure Backup. Successful attacks of this vulnerability can result in takeover of Oracle Secure Backup. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21579.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21579.json new file mode 100644 index 00000000000..fe0ffa6fa33 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21579.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21579", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:53.233", + "lastModified": "2025-04-15T21:15:53.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21580.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21580.json new file mode 100644 index 00000000000..ec431fb776e --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21580.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21580", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:53.393", + "lastModified": "2025-04-15T21:15:53.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21581.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21581.json new file mode 100644 index 00000000000..0867dd8c9d1 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21581.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21581", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:53.557", + "lastModified": "2025-04-15T21:15:53.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21582.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21582.json new file mode 100644 index 00000000000..0610ff66343 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21582.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21582", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:53.687", + "lastModified": "2025-04-15T21:15:53.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle CRM Technical Foundation product of Oracle E-Business Suite (component: Preferences). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data as well as unauthorized read access to a subset of Oracle CRM Technical Foundation accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21583.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21583.json new file mode 100644 index 00000000000..fce6239ef7d --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21583.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21583", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:53.797", + "lastModified": "2025-04-15T21:15:53.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.4.0 and 9.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21584.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21584.json new file mode 100644 index 00000000000..52059ccbfbb --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21584.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21584", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:53.910", + "lastModified": "2025-04-15T21:15:53.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21585.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21585.json new file mode 100644 index 00000000000..1780e915cdd --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21585.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21585", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:54.037", + "lastModified": "2025-04-15T21:15:54.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21586.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21586.json new file mode 100644 index 00000000000..d47b6a356f8 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21586.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21586", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:54.160", + "lastModified": "2025-04-15T21:15:54.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21587.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21587.json new file mode 100644 index 00000000000..9e03b08ebc4 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21587.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21587", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:54.293", + "lastModified": "2025-04-15T21:15:54.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE:8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK:17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition:20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21588.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21588.json new file mode 100644 index 00000000000..159566bb564 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21588.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-21588", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:54.427", + "lastModified": "2025-04-15T21:15:54.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21601.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21601.json index 97a61e414b2..a8b8092d07b 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21601.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21601.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21601", "sourceIdentifier": "sirt@juniper.net", "published": "2025-04-09T20:15:26.350", - "lastModified": "2025-04-11T15:40:10.277", + "lastModified": "2025-04-15T21:15:54.560", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "sirt@juniper.net", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -83,6 +83,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-573" + } + ] + } + ], "references": [ { "url": "https://supportportal.juniper.net/JSA96452", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24487.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24487.json new file mode 100644 index 00000000000..34ff730ce2b --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24487.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-24487", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T21:15:54.717", + "lastModified": "2025-04-15T21:15:54.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated attacker can infer the existence of usernames in the system by querying an API." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24948.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24948.json index 4e1a9ed67bf..891586affab 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24948.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24948.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24948", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T16:16:05.830", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T20:15:38.547", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In JotUrl 2.0, passwords are sent via HTTP GET-type requests, potentially exposing credentials to eavesdropping or insecure records." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-598" + } + ] + } + ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24949.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24949.json index dc61bc20a53..aeaaf83a6a9 100644 --- a/CVE-2025/CVE-2025-249xx/CVE-2025-24949.json +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24949.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24949", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T16:16:05.927", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T20:15:38.690", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In JotUrl 2.0, is possible to bypass security requirements during the password change process." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2497.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2497.json new file mode 100644 index 00000000000..348e9a9a9a1 --- /dev/null +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2497.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2497", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-04-15T21:15:56.630", + "lastModified": "2025-04-15T21:15:56.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWG file, when parsed through Autodesk Revit, can cause a Stack-Based Buffer Overflow vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0005", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25379.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25379.json index 4ee1c151fd4..c5316dea5ea 100644 --- a/CVE-2025/CVE-2025-253xx/CVE-2025-25379.json +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25379.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25379", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T23:15:10.790", - "lastModified": "2025-03-04T16:15:39.433", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T20:10:40.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:07fly:07flycms:1.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "E9E565AA-68C6-429F-BC02-0680396BD9A3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/R2og/Sun-jialiang/tree/main/9/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/R2og/Sun-jialiang/tree/main/9/readme.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25456.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25456.json index 510e971d010..f87416b15d0 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25456.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25456.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25456", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T19:16:07.327", - "lastModified": "2025-04-15T19:16:07.327", + "lastModified": "2025-04-15T21:15:54.877", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via mac2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/xyqer1/ab1e6a2bd369aaada0666639c843aff0", @@ -20,6 +55,14 @@ { "url": "https://github.com/xyqer1/Tenda-AC10-AdvSetMacMtuWan-mac2-StackOverflow", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/xyqer1/ab1e6a2bd369aaada0666639c843aff0", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/xyqer1/Tenda-AC10-AdvSetMacMtuWan-mac2-StackOverflow", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2567.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2567.json new file mode 100644 index 00000000000..0f364d11bb6 --- /dev/null +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2567.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-2567", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T20:15:38.990", + "lastModified": "2025-04-15T20:15:38.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker could modify or disable settings, disrupt fuel monitoring \nand supply chain operations, leading to disabling of ATG monitoring. \nThis would result in potential safety hazards in fuel storage and \ntransportation." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-05", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26977.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26977.json index 4a894616c16..a63b82e55f0 100644 --- a/CVE-2025/CVE-2025-269xx/CVE-2025-26977.json +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26977.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26977", "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-25T15:15:30.443", - "lastModified": "2025-02-25T15:15:30.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-15T20:15:04.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ninjateam:filebird:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.4.6", + "matchCriteriaId": "2EE6CCFF-7FA7-4B8D-ADCD-375345E95ED2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/filebird/vulnerability/wordpress-filebird-plugin-6-4-2-1-insecure-direct-object-references-idor-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27410.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27410.json index 3b1172cecf6..3201c3238cc 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27410.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27410.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27410", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-28T21:15:27.677", - "lastModified": "2025-03-04T21:15:14.197", + "lastModified": "2025-04-15T20:19:49.100", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -53,28 +73,73 @@ "value": "CWE-23" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pwndoc_project:pwndoc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2.0", + "matchCriteriaId": "11E7BA7B-6D6B-4186-80A8-06B69AA22B20" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/routes/backup.js#L527", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/pwndoc/pwndoc/commit/98f284291d73d3a0b11d3181d845845c192d1080", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/pwndoc/pwndoc/releases/tag/v1.2.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27413.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27413.json index 5782ab7881e..51f7ba7ce2d 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27413.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27413.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27413", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-28T21:15:27.820", - "lastModified": "2025-03-04T21:15:14.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T20:27:24.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -51,34 +71,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pwndoc_project:pwndoc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2.0", + "matchCriteriaId": "11E7BA7B-6D6B-4186-80A8-06B69AA22B20" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/models/template.js#L170-L175", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/routes/backup.js#L826-L827", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/routes/template.js#L63-L66", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/pwndoc/pwndoc/commit/68aa1ea676a91e17bfb333a27571151bd07fb21d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/pwndoc/pwndoc/releases/tag/v1.2.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-r3vj-47cf-4672", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-r3vj-47cf-4672", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27568.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27568.json new file mode 100644 index 00000000000..aa1be0b48a0 --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27568.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-27568", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T21:15:55.060", + "lastModified": "2025-04-15T21:15:55.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated attacker can get users' emails by knowing usernames. A password reset email will be sent in response to this unsolicited request." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27938.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27938.json new file mode 100644 index 00000000000..05f98155f2f --- /dev/null +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27938.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-27938", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T21:15:55.273", + "lastModified": "2025-04-15T21:15:55.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unauthenticated attackers can obtain restricted information about a user's smart device collections (i.e., \"rooms\")." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27939.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27939.json new file mode 100644 index 00000000000..319d4ec3021 --- /dev/null +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27939.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-27939", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T21:15:55.433", + "lastModified": "2025-04-15T21:15:55.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker can change registered email addresses of other users and take over arbitrary accounts." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27980.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27980.json index ae1e64ff54c..025a5417e2f 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27980.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27980.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27980", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T15:16:07.940", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T21:15:55.583", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "cashbook v4.0.3 has an arbitrary file read vulnerability in /api/entry/flow/invoice/show?invoice=." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://blog.csdn.net/qq_52469895/article/details/145496958?sharetype=blogdetail&sharerId=145496958&sharerefer=PC&sharesource=qq_52469895&spm=1011.2480.3001.8118", diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28136.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28136.json index d4ddd6bbd8a..fd48e8b2762 100644 --- a/CVE-2025/CVE-2025-281xx/CVE-2025-28136.json +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28136.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28136", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T14:15:41.283", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T21:15:55.767", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerability in the downloadFile.cgi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/Zerone0x00/CVE/blob/main/TOTOLINK/CVE-2025-28136.md", diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28142.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28142.json index 9719a73e920..82ebc790fb0 100644 --- a/CVE-2025/CVE-2025-281xx/CVE-2025-28142.json +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28142.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28142", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T15:16:08.243", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T21:15:55.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3_1.0.15 was discovered to contain a command injection vulnerability via the foldername in /boafrm/formDiskCreateShare." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/regainer27/fb033d40b9d0245c36e520eeb34b7e76", diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28143.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28143.json index 2334ad8b60c..092f64888ba 100644 --- a/CVE-2025/CVE-2025-281xx/CVE-2025-28143.json +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28143.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28143", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T15:16:08.360", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T21:15:56.123", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3_1.0.15 was discovered to contain a command injection vulnerability via the groupname at the /boafrm/formDiskCreateGroup." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/regainer27/885505cda80f81069ba39b11f2f996fc", diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28144.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28144.json index 0a191caffe8..1be6cd6685f 100644 --- a/CVE-2025/CVE-2025-281xx/CVE-2025-28144.json +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28144.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28144", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T15:16:08.463", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T21:15:56.283", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3 1.0.15 was discovered to contain a stack overflow vlunerability via peerPin parameter in the formWsc function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/regainer27/31a4df78e523635085908ddd4b68d91f", diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28145.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28145.json index a94dda14fe4..f5ac77c7283 100644 --- a/CVE-2025/CVE-2025-281xx/CVE-2025-28145.json +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28145.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28145", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T15:16:08.563", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T21:15:56.457", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3 1.0.15 was discovered to contain a command injection vulnerability via partition in /boafrm/formDiskFormat." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/regainer27/cee49ede0f576447cc4b1bb078e7a981", diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28198.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28198.json index 46b5b3ab629..ef305ca07df 100644 --- a/CVE-2025/CVE-2025-281xx/CVE-2025-28198.json +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28198.json @@ -2,7 +2,7 @@ "id": "CVE-2025-28198", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-15T16:16:06.137", - "lastModified": "2025-04-15T18:39:27.967", + "lastModified": "2025-04-15T20:15:38.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A SQL injection vulnerability in Hitout car sale 1.0 allows a remote attacker to obtain sensitive information via the orderBy parameter of the StoreController.java component." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/Hitout/carsale/issues/24", diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30206.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30206.json new file mode 100644 index 00000000000..2a45122a058 --- /dev/null +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30206.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-30206", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-15T20:15:39.127", + "lastModified": "2025-04-15T20:15:39.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dpanel is a Docker visualization panel system which provides complete Docker management functions. The Dpanel service contains a hardcoded JWT secret in its default configuration, allowing attackers to generate valid JWT tokens and compromise the host machine. This security flaw allows attackers to analyze the source code, discover the embedded secret, and craft legitimate JWT tokens. By forging these tokens, an attacker can successfully bypass authentication mechanisms, impersonate privileged users, and gain unauthorized administrative access. Consequently, this enables full control over the host machine, potentially leading to severe consequences such as sensitive data exposure, unauthorized command execution, privilege escalation, or further lateral movement within the network environment. This issue is patched in version 1.6.1. A workaround for this vulnerability involves replacing the hardcoded secret with a securely generated value and load it from secure configuration storage." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + }, + { + "lang": "en", + "value": "CWE-453" + }, + { + "lang": "en", + "value": "CWE-547" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/donknap/dpanel/security/advisories/GHSA-j752-cjcj-w847", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30254.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30254.json new file mode 100644 index 00000000000..83ae5c9b125 --- /dev/null +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30254.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30254", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T21:15:56.807", + "lastModified": "2025-04-15T21:15:56.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated attacker can obtain a serial number of a smart meter(s) using its owner's username." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json index 2ce3350b963..42cb147b89a 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30285", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.127", - "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-15T20:02:19.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,190 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*", + "matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*", + "matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*", + "matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*", + "matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*", + "matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*", + "matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update14:*:*:*:*:*:*", + "matchCriteriaId": "10616A3A-0C1C-474A-BD7D-A2A5BB870F74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update15:*:*:*:*:*:*", + "matchCriteriaId": "D7DA523E-1D9B-45FD-94D9-D4F9F2B9296B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update16:*:*:*:*:*:*", + "matchCriteriaId": "151AFF8B-F05C-4D27-85FC-DF88E9C11BEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update17:*:*:*:*:*:*", + "matchCriteriaId": "53A0E245-2915-4DFF-AFB5-A12F5C435702" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update18:*:*:*:*:*:*", + "matchCriteriaId": "C5653D18-7534-48A3-819F-9F049A418F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*", + "matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*", + "matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*", + "matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*", + "matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*", + "matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*", + "matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*", + "matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*", + "matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*", + "matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*", + "matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update10:*:*:*:*:*:*", + "matchCriteriaId": "645D1B5F-2DAB-4AB8-A465-AC37FF494F95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update11:*:*:*:*:*:*", + "matchCriteriaId": "ED6D8996-0770-4C9F-BEA5-87EA479D40A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update12:*:*:*:*:*:*", + "matchCriteriaId": "4836086E-3D4A-4A07-A372-382D385CB490" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*", + "matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*", + "matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*", + "matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*", + "matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*", + "matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*", + "matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update8:*:*:*:*:*:*", + "matchCriteriaId": "DB97ADBA-C1A9-4EE0-9509-68CB12358AE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update9:*:*:*:*:*:*", + "matchCriteriaId": "E17C38F0-9B0F-4433-9CBD-6E3D63EA9BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2025:-:*:*:*:*:*:*", + "matchCriteriaId": "30779417-D4E5-4A01-BE0E-1CE1D134292A" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30511.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30511.json new file mode 100644 index 00000000000..33da4b799a0 --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30511.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30511", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T21:15:56.953", + "lastModified": "2025-04-15T21:15:56.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated attacker can achieve stored XSS by exploiting improper sanitization of the plant name value while adding or editing a plant." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-305xx/CVE-2025-30514.json b/CVE-2025/CVE-2025-305xx/CVE-2025-30514.json new file mode 100644 index 00000000000..fc8ddedbdaf --- /dev/null +++ b/CVE-2025/CVE-2025-305xx/CVE-2025-30514.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30514", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T21:15:57.090", + "lastModified": "2025-04-15T21:15:57.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unauthenticated attackers can obtain restricted information about a user's smart device collections (i.e., \"scenes\")." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30681.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30681.json new file mode 100644 index 00000000000..14bb839c96e --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30681.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30681", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:57.233", + "lastModified": "2025-04-15T21:15:57.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30682.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30682.json new file mode 100644 index 00000000000..97a7aad5258 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30682.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30682", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:57.347", + "lastModified": "2025-04-15T21:15:57.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30683.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30683.json new file mode 100644 index 00000000000..5b43083b0a9 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30683.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30683", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:57.447", + "lastModified": "2025-04-15T21:15:57.447", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30684.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30684.json new file mode 100644 index 00000000000..43845d565f4 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30684.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30684", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:57.560", + "lastModified": "2025-04-15T21:15:57.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30685.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30685.json new file mode 100644 index 00000000000..7c68a4d1bed --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30685.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30685", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:57.670", + "lastModified": "2025-04-15T21:15:57.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30686.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30686.json new file mode 100644 index 00000000000..a0d0ebb6409 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30686.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30686", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:57.787", + "lastModified": "2025-04-15T21:15:57.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: EMC). Supported versions that are affected are 19.1-19.7. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data as well as unauthorized update, insert or delete access to some of Oracle Hospitality Simphony accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hospitality Simphony. CVSS 3.1 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30687.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30687.json new file mode 100644 index 00000000000..75846363f4d --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30687.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30687", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:57.903", + "lastModified": "2025-04-15T21:15:57.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30688.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30688.json new file mode 100644 index 00000000000..834ff2b6c67 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30688.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30688", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:58.013", + "lastModified": "2025-04-15T21:15:58.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30689.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30689.json new file mode 100644 index 00000000000..204757ff32f --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30689.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30689", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:58.130", + "lastModified": "2025-04-15T21:15:58.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30690.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30690.json new file mode 100644 index 00000000000..004d37cff3e --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30690.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30690", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:58.247", + "lastModified": "2025-04-15T21:15:58.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Solaris, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.6, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30691.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30691.json new file mode 100644 index 00000000000..e4e688237d5 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30691.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30691", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:58.360", + "lastModified": "2025-04-15T21:15:58.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle Java SE: 21.0.6, 24; Oracle GraalVM for JDK: 21.0.6 and 24. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data as well as unauthorized read access to a subset of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30692.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30692.json new file mode 100644 index 00000000000..134b4bf9dc6 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30692.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30692", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:58.470", + "lastModified": "2025-04-15T21:15:58.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle iSupplier Portal product of Oracle E-Business Suite (component: Attachments). Supported versions that are affected are 12.2.7-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iSupplier Portal. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iSupplier Portal accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30693.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30693.json new file mode 100644 index 00000000000..303ebeb3793 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30693.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30693", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:58.580", + "lastModified": "2025-04-15T21:15:58.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30694.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30694.json new file mode 100644 index 00000000000..75d16352682 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30694.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30694", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:58.697", + "lastModified": "2025-04-15T21:15:58.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the XML Database component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Easily exploitable vulnerability allows low privileged attacker having User Account privilege with network access via HTTP to compromise XML Database. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in XML Database, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of XML Database accessible data as well as unauthorized read access to a subset of XML Database accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30695.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30695.json new file mode 100644 index 00000000000..0f89bd1f7bb --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30695.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30695", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:58.810", + "lastModified": "2025-04-15T21:15:58.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30696.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30696.json new file mode 100644 index 00000000000..36b7ea2c8f7 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30696.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30696", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:58.917", + "lastModified": "2025-04-15T21:15:58.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30697.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30697.json new file mode 100644 index 00000000000..98a47986156 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30697.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30697", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:59.030", + "lastModified": "2025-04-15T21:15:59.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Panel Processor). Supported versions that are affected are 8.60, 8.61 and 8.62. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30698.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30698.json new file mode 100644 index 00000000000..93a65556bb3 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30698.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30698", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:59.137", + "lastModified": "2025-04-15T21:15:59.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK: 17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition: 20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30699.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30699.json new file mode 100644 index 00000000000..ae922e3ea15 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30699.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30699", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:59.247", + "lastModified": "2025-04-15T21:15:59.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30700.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30700.json new file mode 100644 index 00000000000..76ee324f5b6 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30700.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30700", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:59.357", + "lastModified": "2025-04-15T21:15:59.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Solaris. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Solaris accessible data. CVSS 3.1 Base Score 3.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30701.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30701.json new file mode 100644 index 00000000000..442fcd669ae --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30701.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30701", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:59.470", + "lastModified": "2025-04-15T21:15:59.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the RAS Security component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Easily exploitable vulnerability allows low privileged attacker having User Account privilege with network access via Oracle Net to compromise RAS Security. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all RAS Security accessible data as well as unauthorized access to critical data or complete access to all RAS Security accessible data. CVSS 3.1 Base Score 7.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30702.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30702.json new file mode 100644 index 00000000000..18a558e8028 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30702.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30702", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:59.580", + "lastModified": "2025-04-15T21:15:59.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Fleet Patching and amp; Provisioning component of Oracle Database Server. Supported versions that are affected are 19.3-19.26. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Fleet Patching and amp; Provisioning. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Fleet Patching and amp; Provisioning accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30703.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30703.json new file mode 100644 index 00000000000..57615ac15d5 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30703.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30703", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:59.697", + "lastModified": "2025-04-15T21:15:59.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30704.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30704.json new file mode 100644 index 00000000000..cdf8e00af21 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30704.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30704", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:59.810", + "lastModified": "2025-04-15T21:15:59.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30705.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30705.json new file mode 100644 index 00000000000..ab6fb57bd1f --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30705.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30705", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:15:59.927", + "lastModified": "2025-04-15T21:15:59.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30706.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30706.json new file mode 100644 index 00000000000..80cd2c9d4f9 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30706.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30706", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:00.043", + "lastModified": "2025-04-15T21:16:00.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30707.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30707.json new file mode 100644 index 00000000000..8822ae4bd04 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30707.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30707", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:00.163", + "lastModified": "2025-04-15T21:16:00.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: User Management). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30708.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30708.json new file mode 100644 index 00000000000..6a60dbe064c --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30708.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30708", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:00.290", + "lastModified": "2025-04-15T21:16:00.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle User Management product of Oracle E-Business Suite (component: Search and Register Users). Supported versions that are affected are 12.2.4-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle User Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle User Management accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30709.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30709.json new file mode 100644 index 00000000000..9cd2b070667 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30709.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30709", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:00.420", + "lastModified": "2025-04-15T21:16:00.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30710.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30710.json new file mode 100644 index 00000000000..bd6fabb2f65 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30710.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30710", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:00.527", + "lastModified": "2025-04-15T21:16:00.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: NDBCluster Plugin). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Cluster. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30711.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30711.json new file mode 100644 index 00000000000..12b022f2978 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30711.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30711", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:00.637", + "lastModified": "2025-04-15T21:16:00.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Attachments, File Upload). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30712.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30712.json new file mode 100644 index 00000000000..2a73e15b46e --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30712.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30712", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:00.750", + "lastModified": "2025-04-15T21:16:00.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30713.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30713.json new file mode 100644 index 00000000000..4aa7038d509 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30713.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30713", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:00.860", + "lastModified": "2025-04-15T21:16:00.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the PeopleSoft Enterprise HCM Talent Acquisition Manager product of Oracle PeopleSoft (component: Job Opening). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Talent Acquisition Manager. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise HCM Talent Acquisition Manager, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Talent Acquisition Manager accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Talent Acquisition Manager accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30714.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30714.json new file mode 100644 index 00000000000..51d934e5956 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30714.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30714", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:00.970", + "lastModified": "2025-04-15T21:16:00.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30715.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30715.json new file mode 100644 index 00000000000..ff44058281a --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30715.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30715", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:01.080", + "lastModified": "2025-04-15T21:16:01.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30716.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30716.json new file mode 100644 index 00000000000..932ed38bb91 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30716.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30716", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:01.193", + "lastModified": "2025-04-15T21:16:01.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Common Applications product of Oracle E-Business Suite (component: CRM User Management Framework). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30717.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30717.json new file mode 100644 index 00000000000..e53e169d12f --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30717.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30717", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:01.317", + "lastModified": "2025-04-15T21:16:01.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Teleservice product of Oracle E-Business Suite (component: Service Diagnostics Scripts). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Teleservice. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Teleservice accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30718.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30718.json new file mode 100644 index 00000000000..91dbb328384 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30718.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30718", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:01.417", + "lastModified": "2025-04-15T21:16:01.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Attachments, File Upload). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30719.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30719.json new file mode 100644 index 00000000000..e9f955f88a8 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30719.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30719", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:01.530", + "lastModified": "2025-04-15T21:16:01.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30720.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30720.json new file mode 100644 index 00000000000..714e83c8d93 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30720.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30720", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:01.647", + "lastModified": "2025-04-15T21:16:01.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Orders). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Configurator, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Configurator accessible data as well as unauthorized read access to a subset of Oracle Configurator accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30721.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30721.json new file mode 100644 index 00000000000..60f069a7c17 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30721.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30721", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:01.760", + "lastModified": "2025-04-15T21:16:01.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.3, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30722.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30722.json new file mode 100644 index 00000000000..c24dc4f4d28 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30722.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30722", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:01.870", + "lastModified": "2025-04-15T21:16:01.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Client accessible data as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30723.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30723.json new file mode 100644 index 00000000000..d631ba48591 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30723.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30723", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:01.990", + "lastModified": "2025-04-15T21:16:01.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: XML Services). Supported versions that are affected are 7.6.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle BI Publisher. CVSS 3.1 Base Score 5.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30724.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30724.json new file mode 100644 index 00000000000..19c9bd08d64 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30724.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30724", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:02.103", + "lastModified": "2025-04-15T21:16:02.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: XML Services). Supported versions that are affected are 7.6.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30725.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30725.json new file mode 100644 index 00000000000..3ecab2a2bd3 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30725.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30725", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:02.217", + "lastModified": "2025-04-15T21:16:02.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.3 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30726.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30726.json new file mode 100644 index 00000000000..e2c1ad06366 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30726.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30726", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:02.327", + "lastModified": "2025-04-15T21:16:02.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30727.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30727.json new file mode 100644 index 00000000000..bb3b9fd5938 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30727.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30727", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:02.457", + "lastModified": "2025-04-15T21:16:02.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Scripting product of Oracle E-Business Suite (component: iSurvey Module). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Scripting. Successful attacks of this vulnerability can result in takeover of Oracle Scripting. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30728.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30728.json new file mode 100644 index 00000000000..0113edbae77 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30728.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30728", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:02.563", + "lastModified": "2025-04-15T21:16:02.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30729.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30729.json new file mode 100644 index 00000000000..1f4a99a934c --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30729.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30729", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:02.677", + "lastModified": "2025-04-15T21:16:02.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security). Supported versions that are affected are 7.4.0, 7.4.1 and 7.5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Order and Service Management accessible data as well as unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Communications Order and Service Management. CVSS 3.1 Base Score 5.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30730.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30730.json new file mode 100644 index 00000000000..988317489d5 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30730.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30730", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:02.793", + "lastModified": "2025-04-15T21:16:02.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.5-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Application Object Library. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30731.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30731.json new file mode 100644 index 00000000000..0c9d5d9085d --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30731.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30731", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:02.907", + "lastModified": "2025-04-15T21:16:02.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration). Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Applications Technology Stack executes to compromise Oracle Applications Technology Stack. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Technology Stack accessible data as well as unauthorized read access to a subset of Oracle Applications Technology Stack accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.6, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30732.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30732.json new file mode 100644 index 00000000000..35119efec2c --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30732.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30732", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:03.013", + "lastModified": "2025-04-15T21:16:03.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data as well as unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30733.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30733.json new file mode 100644 index 00000000000..27a0ec4fd5f --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30733.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30733", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:03.133", + "lastModified": "2025-04-15T21:16:03.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the RDBMS Listener component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise RDBMS Listener. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all RDBMS Listener accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30735.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30735.json new file mode 100644 index 00000000000..9bdd809c05f --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30735.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30735", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:03.247", + "lastModified": "2025-04-15T21:16:03.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Page and Field Configuration). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise CC Common Application Objects accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30736.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30736.json new file mode 100644 index 00000000000..3e772624e02 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30736.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30736", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:03.360", + "lastModified": "2025-04-15T21:16:03.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data as well as unauthorized access to critical data or complete access to all Java VM accessible data. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30737.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30737.json new file mode 100644 index 00000000000..869d6e2f2c3 --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30737.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30737", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:03.473", + "lastModified": "2025-04-15T21:16:03.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the Oracle Smart View for Office product of Oracle Hyperion (component: Core Smart View). The supported version that is affected is 24.200. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Smart View for Office. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Smart View for Office accessible data as well as unauthorized access to critical data or complete access to all Oracle Smart View for Office accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.2 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-307xx/CVE-2025-30740.json b/CVE-2025/CVE-2025-307xx/CVE-2025-30740.json new file mode 100644 index 00000000000..8687366455e --- /dev/null +++ b/CVE-2025/CVE-2025-307xx/CVE-2025-30740.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-30740", + "sourceIdentifier": "secalert_us@oracle.com", + "published": "2025-04-15T21:16:03.597", + "lastModified": "2025-04-15T21:16:03.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert_us@oracle.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "source": "secalert_us@oracle.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31357.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31357.json new file mode 100644 index 00000000000..f0d499de60c --- /dev/null +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31357.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-31357", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T21:16:03.737", + "lastModified": "2025-04-15T21:16:03.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated attacker can obtain a user's plant list by knowing the username." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31497.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31497.json new file mode 100644 index 00000000000..4ce5ef4b82d --- /dev/null +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31497.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31497", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-15T20:15:39.270", + "lastModified": "2025-04-15T20:15:39.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TEIGarage is a webservice and RESTful service to transform, convert and validate various formats, focussing on the TEI format. The Document Conversion Service contains a critical XML External Entity (XXE) Injection vulnerability in its document conversion functionality. The service processes XML files during the conversion process but fails to disable external entity processing, allowing an attacker to read arbitrary files from the server's filesystem. This vulnerability could allow attackers to read sensitive files from the server's filesystem, potentially exposing configuration files, credentials, or other confidential information. Additionally, depending on the server configuration, this could potentially be used to perform server-side request forgery (SSRF) attacks by making the server connect to internal services. This issue is patched in version 1.2.4. A workaround for this vulnerability includes disabling external entity processing in the XML parser by setting the appropriate security features (e.g., XMLConstants.FEATURE_SECURE_PROCESSING)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/TEIC/TEIGarage/security/advisories/GHSA-w2hq-3cjc-2x55", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31499.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31499.json new file mode 100644 index 00000000000..ea870ec852e --- /dev/null +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31499.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-31499", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-15T21:16:03.937", + "lastModified": "2025-04-15T21:16:03.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jellyfin is an open source self hosted media server. Versions before 10.10.7 are vulnerable to argument injection in FFmpeg. This can be leveraged to possibly achieve remote code execution by anyone with credentials to a low-privileged user. This vulnerability was previously reported in CVE-2023-49096 and patched in version 10.8.13, but the patch can be bypassed. The original fix sanitizes some parameters to make injection impossible, but certain unsanitized parameters can still be used for argument injection. The same unauthenticated endpoints are vulnerable: /Videos//stream and /Videos//stream., likely alongside similar endpoints in AudioController. This argument injection can be exploited to achieve arbitrary file write, leading to possible remote code execution through the plugin system. While the unauthenticated endpoints are vulnerable, a valid itemId is required for exploitation and any authenticated attacker could easily retrieve a valid itemId to make the exploit work. This vulnerability is patched in version 10.10.7." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-88" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jellyfin/jellyfin/commit/79f3ce53257c5291887cd52d8ac735b5252c9a97", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-2c3c-r7gp-q32m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-319xx/CVE-2025-31933.json b/CVE-2025/CVE-2025-319xx/CVE-2025-31933.json new file mode 100644 index 00000000000..a5f53b3040a --- /dev/null +++ b/CVE-2025/CVE-2025-319xx/CVE-2025-31933.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-31933", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T21:16:04.063", + "lastModified": "2025-04-15T21:16:04.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated attacker can check the existence of usernames in the system by querying an API." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-319xx/CVE-2025-31941.json b/CVE-2025/CVE-2025-319xx/CVE-2025-31941.json new file mode 100644 index 00000000000..0b305195b1e --- /dev/null +++ b/CVE-2025/CVE-2025-319xx/CVE-2025-31941.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-31941", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T21:16:04.200", + "lastModified": "2025-04-15T21:16:04.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An unauthenticated attacker can obtain a list of smart devices by knowing a valid username." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-319xx/CVE-2025-31949.json b/CVE-2025/CVE-2025-319xx/CVE-2025-31949.json new file mode 100644 index 00000000000..704d683152b --- /dev/null +++ b/CVE-2025/CVE-2025-319xx/CVE-2025-31949.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-31949", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-04-15T21:16:04.337", + "lastModified": "2025-04-15T21:16:04.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated attacker can obtain any plant name by knowing the plant ID." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json index b27241e12e7..14e5100f189 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3114", "sourceIdentifier": "security@tibco.com", "published": "2025-04-09T18:15:50.643", - "lastModified": "2025-04-09T20:02:41.860", + "lastModified": "2025-04-15T21:16:04.847", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,22 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], "references": [ { "url": "https://community.spotfire.com/articles/spotfire/spotfire-security-advisory-april-08-2025-spotfire-cve-2025-3114-r3484/", diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32012.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32012.json new file mode 100644 index 00000000000..ae2ab61cbca --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32012.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-32012", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-15T20:15:39.400", + "lastModified": "2025-04-15T20:15:39.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jellyfin is an open source self hosted media server. In versions 10.9.0 to before 10.10.7, the /System/Restart endpoint provides administrators the ability to restart their Jellyfin server. This endpoint is intended to be admins-only, but it also authorizes requests from any device in the same local network as the Jellyfin server. Due to the method Jellyfin uses to determine the source IP of a request, an unauthenticated attacker is able to spoof their IP to appear as a LAN IP, allowing them to restart the Jellyfin server process without authentication. This means that an unauthenticated attacker could mount a denial-of-service attack on any default-configured Jellyfin server by simply sending the same spoofed request every few seconds to restart the server over and over. This method of IP spoofing also bypasses some security mechanisms, cause a denial-of-service attack, and possible bypass the admin restart requirement if combined with remote code execution. This issue is patched in version 10.10.7." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jellyfin/jellyfin/commit/f625665cb116a7e3feb8b79aaf1ed39a956e0585", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-qcmf-gmhm-rfv9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32021.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32021.json new file mode 100644 index 00000000000..0c5b2dda59f --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32021.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32021", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-15T21:16:04.523", + "lastModified": "2025-04-15T21:16:04.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Weblate is a web based localization tool. Prior to version 5.11, when creating a new component from an existing component that has a source code repository URL specified in settings, this URL is included in the client's URL parameters during the creation process. If, for example, the source code repository URL contains GitHub credentials, the confidential PAT and username are shown in plaintext and get saved into browser history. Moreover, if the request URL is logged, the credentials are written to logs in plaintext. If using Weblate official Docker image, nginx logs the URL and the token in plaintext. This issue is patched in version 5.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.2, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.7, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-598" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/WeblateOrg/weblate/releases/tag/weblate-5.11", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/WeblateOrg/weblate/security/advisories/GHSA-m67m-3p5g-cw9j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32438.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32438.json new file mode 100644 index 00000000000..cde5c0bf74a --- /dev/null +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32438.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-32438", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-15T20:15:39.533", + "lastModified": "2025-04-15T20:15:39.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "make-initrd-ng is a tool for copying binaries and their dependencies. Local privilege escalation affecting all NixOS users. With systemd.shutdownRamfs.enable enabled (the default) a local user is able to create a program that will be executed by root during shutdown. Patches exist for NixOS 24.11 and 25.05 / unstable. As a workaround, set systemd.shutdownRamfs.enable = false;." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-378" + }, + { + "lang": "en", + "value": "CWE-379" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/NixOS/nixpkgs/commit/b17590193d8e5697000c23c66afcf11e1753734d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NixOS/nixpkgs/commit/fbf76bf72b161b9f4ab97704a8258776d5f3ffba", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/NixOS/nixpkgs/security/advisories/GHSA-m7pq-h9p4-8rr4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32439.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32439.json new file mode 100644 index 00000000000..986660aaac7 --- /dev/null +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32439.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32439", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-15T20:15:39.677", + "lastModified": "2025-04-15T20:15:39.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "pleezer is a headless Deezer Connect player. Hook scripts in pleezer can be triggered by various events like track changes and playback state changes. In versions before 0.16.0, these scripts were spawned without proper process cleanup, leaving zombie processes in the system's process table. Even during normal usage, every track change and playback event would leave behind zombie processes. This leads to inevitable resource exhaustion over time as the system's process table fills up, eventually preventing new processes from being created. The issue is exacerbated if events occur rapidly, whether through normal use (e.g., skipping through a playlist) or potential manipulation of the Deezer Connect protocol traffic. This issue has been fixed in version 0.16.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-460" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/roderickvd/pleezer/security/advisories/GHSA-472w-7w45-g3w5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32445.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32445.json new file mode 100644 index 00000000000..0848111117d --- /dev/null +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32445.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-32445", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-15T20:15:39.807", + "lastModified": "2025-04-15T20:15:39.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Argo Events is an event-driven workflow automation framework for Kubernetes. A user with permission to create/modify EventSource and Sensor custom resources can gain privileged access to the host system and cluster, even without having direct administrative privileges. The EventSource and Sensor CRs allow the corresponding orchestrated pod to be customized with spec.template and spec.template.container (with type k8s.io/api/core/v1.Container), thus, any specification under container such as command, args, securityContext , volumeMount can be specified, and applied to the EventSource or Sensor pod. With these, a user would be able to gain privileged access to the cluster host, if he/she specified the EventSource/Sensor CR with some particular properties under template. This vulnerability is fixed in v1.9.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/argoproj/argo-events/commit/18412293a699f559848b00e6e459c9ce2de0d3e2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/argoproj/argo-events/security/advisories/GHSA-hmp7-x699-cvhq", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32778.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32778.json new file mode 100644 index 00000000000..3434d1d38da --- /dev/null +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32778.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-32778", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-15T21:16:04.710", + "lastModified": "2025-04-15T21:16:04.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Web-Check is an all-in-one OSINT tool for analyzing any website. A command injection vulnerability exists in the screenshot API of the Web Check project (Lissy93/web-check). The issue stems from user-controlled input (url) being passed unsanitized into a shell command using exec(), allowing attackers to execute arbitrary system commands on the underlying host. This could be exploited by sending crafted url parameters to extract files or even establish remote access. The vulnerability has been patched by replacing exec() with execFile(), which avoids using a shell and properly isolates arguments." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Lissy93/web-check/commit/0e4958aa10b2650d32439a799f6fc83a7cd46cef", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Lissy93/web-check/pull/243", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Lissy93/web-check/security/advisories/GHSA-5qg5-g7c2-pfx8", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 58e6e0f3541..6e4db24500d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-15T20:00:20.387449+00:00 +2025-04-15T22:00:21.084397+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-15T19:58:46.530000+00:00 +2025-04-15T21:16:04.847000+00:00 ``` ### Last Data Feed Release @@ -33,64 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -289929 +290033 ``` ### CVEs added in the last Commit -Recently added CVEs: `20` +Recently added CVEs: `104` -- [CVE-2021-27289](CVE-2021/CVE-2021-272xx/CVE-2021-27289.json) (`2025-04-15T18:15:41.850`) -- [CVE-2023-5616](CVE-2023/CVE-2023-56xx/CVE-2023-5616.json) (`2025-04-15T19:16:06.647`) -- [CVE-2024-42189](CVE-2024/CVE-2024-421xx/CVE-2024-42189.json) (`2025-04-15T18:15:44.983`) -- [CVE-2024-42193](CVE-2024/CVE-2024-421xx/CVE-2024-42193.json) (`2025-04-15T19:16:06.800`) -- [CVE-2024-42200](CVE-2024/CVE-2024-422xx/CVE-2024-42200.json) (`2025-04-15T18:15:45.137`) -- [CVE-2024-50960](CVE-2024/CVE-2024-509xx/CVE-2024-50960.json) (`2025-04-15T18:15:45.263`) -- [CVE-2025-22900](CVE-2025/CVE-2025-229xx/CVE-2025-22900.json) (`2025-04-15T19:16:06.987`) -- [CVE-2025-22903](CVE-2025/CVE-2025-229xx/CVE-2025-22903.json) (`2025-04-15T19:16:07.090`) -- [CVE-2025-24358](CVE-2025/CVE-2025-243xx/CVE-2025-24358.json) (`2025-04-15T19:16:07.193`) -- [CVE-2025-25456](CVE-2025/CVE-2025-254xx/CVE-2025-25456.json) (`2025-04-15T19:16:07.327`) -- [CVE-2025-27791](CVE-2025/CVE-2025-277xx/CVE-2025-27791.json) (`2025-04-15T19:16:07.433`) -- [CVE-2025-28100](CVE-2025/CVE-2025-281xx/CVE-2025-28100.json) (`2025-04-15T18:15:51.057`) -- [CVE-2025-28399](CVE-2025/CVE-2025-283xx/CVE-2025-28399.json) (`2025-04-15T19:16:07.567`) -- [CVE-2025-29213](CVE-2025/CVE-2025-292xx/CVE-2025-29213.json) (`2025-04-15T19:16:07.673`) -- [CVE-2025-29705](CVE-2025/CVE-2025-297xx/CVE-2025-29705.json) (`2025-04-15T18:15:51.453`) -- [CVE-2025-33026](CVE-2025/CVE-2025-330xx/CVE-2025-33026.json) (`2025-04-15T18:15:53.030`) -- [CVE-2025-33027](CVE-2025/CVE-2025-330xx/CVE-2025-33027.json) (`2025-04-15T18:15:53.183`) -- [CVE-2025-33028](CVE-2025/CVE-2025-330xx/CVE-2025-33028.json) (`2025-04-15T18:15:53.333`) -- [CVE-2025-3617](CVE-2025/CVE-2025-36xx/CVE-2025-3617.json) (`2025-04-15T18:15:53.620`) -- [CVE-2025-3618](CVE-2025/CVE-2025-36xx/CVE-2025-3618.json) (`2025-04-15T18:15:53.767`) +- [CVE-2025-30725](CVE-2025/CVE-2025-307xx/CVE-2025-30725.json) (`2025-04-15T21:16:02.217`) +- [CVE-2025-30726](CVE-2025/CVE-2025-307xx/CVE-2025-30726.json) (`2025-04-15T21:16:02.327`) +- [CVE-2025-30727](CVE-2025/CVE-2025-307xx/CVE-2025-30727.json) (`2025-04-15T21:16:02.457`) +- [CVE-2025-30728](CVE-2025/CVE-2025-307xx/CVE-2025-30728.json) (`2025-04-15T21:16:02.563`) +- [CVE-2025-30729](CVE-2025/CVE-2025-307xx/CVE-2025-30729.json) (`2025-04-15T21:16:02.677`) +- [CVE-2025-30730](CVE-2025/CVE-2025-307xx/CVE-2025-30730.json) (`2025-04-15T21:16:02.793`) +- [CVE-2025-30731](CVE-2025/CVE-2025-307xx/CVE-2025-30731.json) (`2025-04-15T21:16:02.907`) +- [CVE-2025-30732](CVE-2025/CVE-2025-307xx/CVE-2025-30732.json) (`2025-04-15T21:16:03.013`) +- [CVE-2025-30733](CVE-2025/CVE-2025-307xx/CVE-2025-30733.json) (`2025-04-15T21:16:03.133`) +- [CVE-2025-30735](CVE-2025/CVE-2025-307xx/CVE-2025-30735.json) (`2025-04-15T21:16:03.247`) +- [CVE-2025-30736](CVE-2025/CVE-2025-307xx/CVE-2025-30736.json) (`2025-04-15T21:16:03.360`) +- [CVE-2025-30737](CVE-2025/CVE-2025-307xx/CVE-2025-30737.json) (`2025-04-15T21:16:03.473`) +- [CVE-2025-30740](CVE-2025/CVE-2025-307xx/CVE-2025-30740.json) (`2025-04-15T21:16:03.597`) +- [CVE-2025-31357](CVE-2025/CVE-2025-313xx/CVE-2025-31357.json) (`2025-04-15T21:16:03.737`) +- [CVE-2025-31497](CVE-2025/CVE-2025-314xx/CVE-2025-31497.json) (`2025-04-15T20:15:39.270`) +- [CVE-2025-31499](CVE-2025/CVE-2025-314xx/CVE-2025-31499.json) (`2025-04-15T21:16:03.937`) +- [CVE-2025-31933](CVE-2025/CVE-2025-319xx/CVE-2025-31933.json) (`2025-04-15T21:16:04.063`) +- [CVE-2025-31941](CVE-2025/CVE-2025-319xx/CVE-2025-31941.json) (`2025-04-15T21:16:04.200`) +- [CVE-2025-31949](CVE-2025/CVE-2025-319xx/CVE-2025-31949.json) (`2025-04-15T21:16:04.337`) +- [CVE-2025-32012](CVE-2025/CVE-2025-320xx/CVE-2025-32012.json) (`2025-04-15T20:15:39.400`) +- [CVE-2025-32021](CVE-2025/CVE-2025-320xx/CVE-2025-32021.json) (`2025-04-15T21:16:04.523`) +- [CVE-2025-32438](CVE-2025/CVE-2025-324xx/CVE-2025-32438.json) (`2025-04-15T20:15:39.533`) +- [CVE-2025-32439](CVE-2025/CVE-2025-324xx/CVE-2025-32439.json) (`2025-04-15T20:15:39.677`) +- [CVE-2025-32445](CVE-2025/CVE-2025-324xx/CVE-2025-32445.json) (`2025-04-15T20:15:39.807`) +- [CVE-2025-32778](CVE-2025/CVE-2025-327xx/CVE-2025-32778.json) (`2025-04-15T21:16:04.710`) ### CVEs modified in the last Commit -Recently modified CVEs: `274` +Recently modified CVEs: `53` -- [CVE-2025-3566](CVE-2025/CVE-2025-35xx/CVE-2025-3566.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3567](CVE-2025/CVE-2025-35xx/CVE-2025-3567.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3568](CVE-2025/CVE-2025-35xx/CVE-2025-3568.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3569](CVE-2025/CVE-2025-35xx/CVE-2025-3569.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3570](CVE-2025/CVE-2025-35xx/CVE-2025-3570.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3571](CVE-2025/CVE-2025-35xx/CVE-2025-3571.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3572](CVE-2025/CVE-2025-35xx/CVE-2025-3572.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3573](CVE-2025/CVE-2025-35xx/CVE-2025-3573.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3574](CVE-2025/CVE-2025-35xx/CVE-2025-3574.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3575](CVE-2025/CVE-2025-35xx/CVE-2025-3575.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3576](CVE-2025/CVE-2025-35xx/CVE-2025-3576.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3578](CVE-2025/CVE-2025-35xx/CVE-2025-3578.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3579](CVE-2025/CVE-2025-35xx/CVE-2025-3579.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3585](CVE-2025/CVE-2025-35xx/CVE-2025-3585.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3587](CVE-2025/CVE-2025-35xx/CVE-2025-3587.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3588](CVE-2025/CVE-2025-35xx/CVE-2025-3588.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3589](CVE-2025/CVE-2025-35xx/CVE-2025-3589.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3590](CVE-2025/CVE-2025-35xx/CVE-2025-3590.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3591](CVE-2025/CVE-2025-35xx/CVE-2025-3591.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3592](CVE-2025/CVE-2025-35xx/CVE-2025-3592.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3593](CVE-2025/CVE-2025-35xx/CVE-2025-3593.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3608](CVE-2025/CVE-2025-36xx/CVE-2025-3608.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3612](CVE-2025/CVE-2025-36xx/CVE-2025-3612.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3613](CVE-2025/CVE-2025-36xx/CVE-2025-3613.json) (`2025-04-15T18:39:27.967`) -- [CVE-2025-3622](CVE-2025/CVE-2025-36xx/CVE-2025-3622.json) (`2025-04-15T18:39:27.967`) +- [CVE-2024-35166](CVE-2024/CVE-2024-351xx/CVE-2024-35166.json) (`2025-04-15T20:56:04.463`) +- [CVE-2024-36842](CVE-2024/CVE-2024-368xx/CVE-2024-36842.json) (`2025-04-15T20:15:38.160`) +- [CVE-2024-53481](CVE-2024/CVE-2024-534xx/CVE-2024-53481.json) (`2025-04-15T20:35:16.203`) +- [CVE-2024-53825](CVE-2024/CVE-2024-538xx/CVE-2024-53825.json) (`2025-04-15T20:55:02.877`) +- [CVE-2024-54211](CVE-2024/CVE-2024-542xx/CVE-2024-54211.json) (`2025-04-15T20:35:50.483`) +- [CVE-2024-57159](CVE-2024/CVE-2024-571xx/CVE-2024-57159.json) (`2025-04-15T20:09:13.510`) +- [CVE-2024-57611](CVE-2024/CVE-2024-576xx/CVE-2024-57611.json) (`2025-04-15T20:09:27.233`) +- [CVE-2025-0539](CVE-2025/CVE-2025-05xx/CVE-2025-0539.json) (`2025-04-15T21:15:46.847`) +- [CVE-2025-21601](CVE-2025/CVE-2025-216xx/CVE-2025-21601.json) (`2025-04-15T21:15:54.560`) +- [CVE-2025-24948](CVE-2025/CVE-2025-249xx/CVE-2025-24948.json) (`2025-04-15T20:15:38.547`) +- [CVE-2025-24949](CVE-2025/CVE-2025-249xx/CVE-2025-24949.json) (`2025-04-15T20:15:38.690`) +- [CVE-2025-25379](CVE-2025/CVE-2025-253xx/CVE-2025-25379.json) (`2025-04-15T20:10:40.157`) +- [CVE-2025-25456](CVE-2025/CVE-2025-254xx/CVE-2025-25456.json) (`2025-04-15T21:15:54.877`) +- [CVE-2025-26977](CVE-2025/CVE-2025-269xx/CVE-2025-26977.json) (`2025-04-15T20:15:04.003`) +- [CVE-2025-27410](CVE-2025/CVE-2025-274xx/CVE-2025-27410.json) (`2025-04-15T20:19:49.100`) +- [CVE-2025-27413](CVE-2025/CVE-2025-274xx/CVE-2025-27413.json) (`2025-04-15T20:27:24.010`) +- [CVE-2025-27980](CVE-2025/CVE-2025-279xx/CVE-2025-27980.json) (`2025-04-15T21:15:55.583`) +- [CVE-2025-28136](CVE-2025/CVE-2025-281xx/CVE-2025-28136.json) (`2025-04-15T21:15:55.767`) +- [CVE-2025-28142](CVE-2025/CVE-2025-281xx/CVE-2025-28142.json) (`2025-04-15T21:15:55.927`) +- [CVE-2025-28143](CVE-2025/CVE-2025-281xx/CVE-2025-28143.json) (`2025-04-15T21:15:56.123`) +- [CVE-2025-28144](CVE-2025/CVE-2025-281xx/CVE-2025-28144.json) (`2025-04-15T21:15:56.283`) +- [CVE-2025-28145](CVE-2025/CVE-2025-281xx/CVE-2025-28145.json) (`2025-04-15T21:15:56.457`) +- [CVE-2025-28198](CVE-2025/CVE-2025-281xx/CVE-2025-28198.json) (`2025-04-15T20:15:38.833`) +- [CVE-2025-30285](CVE-2025/CVE-2025-302xx/CVE-2025-30285.json) (`2025-04-15T20:02:19.560`) +- [CVE-2025-3114](CVE-2025/CVE-2025-31xx/CVE-2025-3114.json) (`2025-04-15T21:16:04.847`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2ab8c440de5..3a1398268a6 100644 --- a/_state.csv +++ b/_state.csv @@ -152132,7 +152132,7 @@ CVE-2020-1823,0,0,78688f05bac37c7a383b6fb4e653235eb880ce3304dbcadfa2dea48970d362 CVE-2020-18230,0,0,ebe6a5a6a2698552960b0422ae9d0e50a9d70f16138ca3d85f0e7ad4347f523d,2024-11-21T05:08:29.907000 CVE-2020-18232,0,0,5705461e816b6f6694e9ef2f2718b69a045749e869a3533e3ed5283cd8248b1c,2024-11-21T05:08:30.053000 CVE-2020-1824,0,0,58a8ea64e3ed8a5ec1daebc856765572e8e7f785d09c3ca56b57919941da3c25,2025-01-13T18:39:27.433000 -CVE-2020-18243,0,1,a14b05666ede6060f6e18c9dcdca328175a37c1859a0dbb479f277fa03aa6afa,2025-04-15T18:39:27.967000 +CVE-2020-18243,0,1,801b64a9dc2a0c27a03a9f75988b18b754383f8f2097756b178000e65ddb17fe,2025-04-15T20:15:29.707000 CVE-2020-1825,0,0,a942dde46b900514ca47c8e921ccce8d9844cba45eeb3a931cde0bf330b07fb0,2024-11-21T05:11:26.497000 CVE-2020-18259,0,0,b06cdddd0c60b9cb1417c4294714ea460eb7e87371666ba861010dfe792d37cd,2024-11-21T05:08:30.217000 CVE-2020-1826,0,0,9d793ee12c01e44af13c183cf0b2187da1411c3957dcb1f4bfb4e1b041d3db56,2024-11-21T05:11:26.610000 @@ -158270,9 +158270,9 @@ CVE-2020-35135,0,0,03e5b9dec7cadd457a22597d59251372c4d97cad23f7e08fd9c93601a409e CVE-2020-35136,0,0,3d2d871a5b6359ceba2dfc982446a270827641fa0735c06eef76d7b923cfff05,2024-11-21T05:26:50.300000 CVE-2020-35137,0,0,ebe677f91daab40d3bed867f26582b601439972ecdc2b977d6ddf802cec0ad31,2024-11-21T05:26:50.480000 CVE-2020-35138,0,0,53bcdf981ce1c5178dee31d919d7167894f89e2292d64d9c3f4e90eb8bf1a37e,2024-11-21T05:26:50.673000 -CVE-2020-35139,0,1,c34592b1445612dfeb0c66e7e7a073dbe1f5a9ddd14eacf7dab8bb51dcffd787,2025-04-15T18:31:29.130000 +CVE-2020-35139,0,0,c34592b1445612dfeb0c66e7e7a073dbe1f5a9ddd14eacf7dab8bb51dcffd787,2025-04-15T18:31:29.130000 CVE-2020-3514,0,0,6cd0e192a3e64e396ee056a3e2baf4ac5776e94c465138b6830585e36dcf2a48,2024-11-26T16:09:02.407000 -CVE-2020-35141,0,1,e62bd5943760b107dddacc927d79c2cd78f2dd4008260ee9e7bfb8cff702afa0,2025-04-15T18:31:29.130000 +CVE-2020-35141,0,0,e62bd5943760b107dddacc927d79c2cd78f2dd4008260ee9e7bfb8cff702afa0,2025-04-15T18:31:29.130000 CVE-2020-35144,0,0,d2624b867715b886126190c94dd0f1c44f539e628cadb0f4ac4a053c38b2e7ae,2023-11-07T03:21:52.727000 CVE-2020-35145,0,0,433c2bcb51b386b89bbfafa94ad3c280427d85e1af8e6f75eb7a817cdef47dd1,2024-11-21T05:26:51.220000 CVE-2020-35149,0,0,922fd204ba3e0fc505a284c5c083b6e37f5b0be5dc63ba4e03064ce9fea838a6,2024-11-21T05:26:51.390000 @@ -172788,7 +172788,7 @@ CVE-2021-27279,0,0,9c1c22f6fce2e2c0a5b3e3c5e960440c197e62d251afcdd93c46f655ba969 CVE-2021-27280,0,0,4654a285bc93320b1892d1640349757dd6a4ed8eab4264434f8c4ec3f5664e3d,2025-01-29T17:15:13.293000 CVE-2021-27285,0,0,cb462cd233992fcf83f47ebd4c13f0bbcea85a9884fba7f39f0d12b3e1613a72,2025-01-07T17:15:09.260000 CVE-2021-27288,0,0,606ad26a1abd722ab2cd939613d0803a2551dc95bf04397c8efcf59866de7236,2024-11-21T05:57:45.377000 -CVE-2021-27289,1,1,4478817a145d23383bfffc3116ad5da2cb22d553022d9fc043e0207633f7684f,2025-04-15T18:39:27.967000 +CVE-2021-27289,0,0,4478817a145d23383bfffc3116ad5da2cb22d553022d9fc043e0207633f7684f,2025-04-15T18:39:27.967000 CVE-2021-27290,0,0,be04b1216152563800893871eddbfc237f57b512e2d32676fcdada8b5e6c4b91,2024-11-21T05:57:45.503000 CVE-2021-27291,0,0,a6a2bca68b907033ff929c7ca1aee0cdabfcf505cc9ed4eff271611781565338,2024-11-21T05:57:45.667000 CVE-2021-27292,0,0,9ea5c66e784e16d7ccd48ee93e9d399ea76f8e4b9949e57778271207f80288a0,2024-11-21T05:57:45.830000 @@ -194000,7 +194000,7 @@ CVE-2022-24427,0,0,f79c0a90e47467074a9f2e6d52ba5c3c73bba24d1114db392bda79f4bef16 CVE-2022-24428,0,0,91dd2668655d641f116f6b3c9b4f118aa94808debef3cbeaf63cf8983c183b31,2024-11-21T06:50:24.220000 CVE-2022-24429,0,0,3f948220633bee62a0c0cea8d53c373683e57a9de9d37288ab4ef6c537819cab,2024-11-21T06:50:24.337000 CVE-2022-2443,0,0,f17f25d941341a488fcb82a90ad2808b053c3b6b30dcdfb30199dfdc82b1b35a,2024-11-21T07:01:00.140000 -CVE-2022-24431,0,0,8efe10d0b0476cf9a2e26f002a03f1e138647d78830c87491a0584e2d20dc761,2024-11-21T06:50:24.457000 +CVE-2022-24431,0,1,9df3d3a049c2094e15a6585c8895150a325e8db7166af52102f5ee6d7678fd54,2025-04-15T20:15:35.433000 CVE-2022-24432,0,0,b64335fea9f64089898d8bed4e41771d92a2a85ff2bf44da35cdd611d7e66849,2024-11-21T06:50:24.570000 CVE-2022-24433,0,0,bbb7da2c638d5c960ace68cebb7807dd87d1d8693c2ae605c16bdce23ec98b01,2024-11-21T06:50:24.690000 CVE-2022-24434,0,0,819b623128a3d1ddf0fc6433058239125a10aec80424fd68583ff90b9a143d45,2024-11-21T06:50:24.817000 @@ -195293,7 +195293,7 @@ CVE-2022-2589,0,0,5b7b02e4d27a147f915a3e63923403f12bbc18e06e558004ca3038770a44d2 CVE-2022-25890,0,0,29a39e5d8489d8831fc74f17bbb3b261d1a8054701af0316333c62e6f908343d,2025-04-09T14:15:23.507000 CVE-2022-25891,0,0,5b92bd15d186bb2ede60819d8049ae8cd1029b30910c825be308b28ff8733d97,2024-11-21T06:53:10.343000 CVE-2022-25892,0,0,71768c3c12acb2a2b166fe41a4fdf9ddf0520dd382ca3482777bd99ac8fb5df7,2024-11-21T06:53:10.463000 -CVE-2022-25893,0,0,5af9ce2b04b3034978f18e7dc51aaf08fa59b948a4f14611b0d1093fe4c002d8,2024-11-21T06:53:10.577000 +CVE-2022-25893,0,1,0bf07b6c528f30479eb9e0feec0d387481d9cfb48e926110ea494f9ed2b41a77,2025-04-15T20:15:35.633000 CVE-2022-25894,0,0,c34b886cbf3f48d45d68dc392c684a916d6a0797ac6531c39defb08665109e53,2025-04-01T15:15:52.450000 CVE-2022-25895,0,0,88330e67d790655610ce061c5c0df3fbd5773584f5b75bff0bf947d991d42992,2024-11-21T06:53:10.807000 CVE-2022-25896,0,0,4214fa283de875c6f79b5b915593b98ece323e260844aaa7adca1305818b5883,2024-11-21T06:53:10.917000 @@ -195664,9 +195664,9 @@ CVE-2022-26381,0,0,9b36a1c39de5a55a2142e56e946dc0aa779e202e2c40b1863a17b7fd3efab CVE-2022-26382,0,0,4ce43d1cfdfebc27f95036edf3fb54d7fef58d57ca81ccad9212cd649a066718,2024-11-21T06:53:53.150000 CVE-2022-26383,0,0,6ee4097a8eee4d71fc163a702eacd8dbee4b07e3b412fc664f5cb7d7d52a536c,2024-11-21T06:53:53.260000 CVE-2022-26384,0,0,6198d4c01431e2c23c0801b185cb98302c8eb19addebb8592f93ae0a95fc8ef7,2024-11-21T06:53:53.393000 -CVE-2022-26385,0,0,7d10345eabb9557f09adcfbff170093607f6a92a8a451cd688c49241d041d13e,2024-11-21T06:53:53.500000 -CVE-2022-26386,0,0,4db78d42d69a098e259bb74e6f9cbb5bc2a7fe55beb054585ebd54795f54a424,2024-11-21T06:53:53.593000 -CVE-2022-26387,0,0,bd47710bced117c65b659de5e36ef5f11c9ecace0ec33ef94bbb64fb132f6aad,2024-11-21T06:53:53.700000 +CVE-2022-26385,0,1,c170a741c62491f529f824de3223d4a48728f1b3ba9e9c530bc9190e0a4ef0ca,2025-04-15T21:15:45.007000 +CVE-2022-26386,0,1,0a8a57071bca5c5c0e3d6300a86112d5647aca44bea9c1aa599f7055ed9d7497,2025-04-15T21:15:45.963000 +CVE-2022-26387,0,1,11d78adc8a9e9037d6f6524e32732e95b45d44828bd1b1101aa302ccdcb4ad5a,2025-04-15T21:15:46.117000 CVE-2022-26388,0,0,a101c7735eee28b0f8c3080bb4c90b786ae15bd9cbaf3452f6a8a999bc639391,2025-02-07T17:15:21.960000 CVE-2022-26389,0,0,8cc09572bd8f8bbd31ee6d37d2f5f55f8ba844169be3512b465c275676836bf4,2025-02-07T17:15:22.130000 CVE-2022-2639,0,0,46eb68ac748136665fe3ef3676bfe429c7214002c69e54c45d73db3e76507eef,2024-11-21T07:01:25.320000 @@ -197177,8 +197177,8 @@ CVE-2022-28277,0,0,805bf500597afd969dbd6c052224b4b5c8bc614b5e8cb8827026ca3539c98 CVE-2022-28278,0,0,aefd56c7ba36e27b56fd50534f35066b961d9b08b583f10fcb3fdb1884bc8a40,2024-11-21T06:57:06.040000 CVE-2022-28279,0,0,af5570a51545956ae000acce99ff044f5c08c42188f2acdbec97bdecc29dd1c1,2024-11-21T06:57:06.170000 CVE-2022-2828,0,0,4686807a5fae49822d2ae49cf3d53f0b11ba527ee5afb228b7ce4fe5a8288f44,2024-11-21T07:01:45.973000 -CVE-2022-28281,0,0,22e0ecc57c4e2a3ff94ab17cee3eb71f041587005cfba21725adc47e5d5466f9,2024-11-21T06:57:06.293000 -CVE-2022-28282,0,0,7c140203f50f7962a4c6dac307b3c85cd647e70af32e81be48a55a15a5d3d394,2024-11-21T06:57:06.423000 +CVE-2022-28281,0,1,8320884e2e52f7d4fa9e56581402f491cf596916331f180ba1c93df75fb4dc49,2025-04-15T21:15:46.270000 +CVE-2022-28282,0,1,903dd4a30504119ae39b6f3e8169a2b679faa9056f07b3d4dad0b675ce0558de,2025-04-15T20:15:35.830000 CVE-2022-28283,0,0,3a58191dc9a0ffdcdc0eea97e68027f137b63b81507d1ee518ef26630eb688ae,2024-11-21T06:57:06.540000 CVE-2022-28284,0,0,8d8ceb34a0d938d799841848a675bbeeff14f6b252c1211fd57e32d76dad98f3,2024-11-21T06:57:06.663000 CVE-2022-28285,0,0,fd1f05f3b8e5d722422a95a83c2fe4679bdf54e1dd23d40581b3b1390262ddca,2024-11-21T06:57:06.777000 @@ -198533,9 +198533,9 @@ CVE-2022-29909,0,0,1b6c0ede6d4ea56132cf639a4cd7dc957e3152d3edce2e2595362df93e65c CVE-2022-2991,0,0,ac905a515712605722d892cfbf14e7897cfd88b6a49a4e012ede4154aacf071e,2024-11-21T07:02:02.830000 CVE-2022-29910,0,0,d3287eb0db84d1ee92275cc4876fb9f35131cf94c63462bd054c8d85638c7d1f,2024-11-21T06:59:57.450000 CVE-2022-29911,0,0,fb5c675252c739890e80b7430cfbe2b0ad80b205c37004959312396c6116d784,2024-11-21T06:59:57.560000 -CVE-2022-29912,0,0,35a4a0706b569f58447785b36a0200070f81dfdbbc661a071c6153d373be4885,2024-11-21T06:59:57.680000 -CVE-2022-29913,0,0,b6b330cea7d8989b6124c54ccf34aa9a37aa864bb8c360b6925d73b7e606a685,2024-11-21T06:59:57.790000 -CVE-2022-29914,0,0,9d3dfdc24cdefabca7cd95fd9b0d7f57603077322b2cd295d0232910be30c15a,2024-11-21T06:59:57.913000 +CVE-2022-29912,0,1,deef494875f9bcc8d9fcaab41201cef31f970d00e50c06bd57fd2de02d429cf3,2025-04-15T20:15:36.013000 +CVE-2022-29913,0,1,1906aa3b2db3dd13c6344228e57416661a0d92e7af5e1ad2372c14029708f585,2025-04-15T20:15:36.187000 +CVE-2022-29914,0,1,cbd729f5505a69c77461a140cd51d3e57ba335ffa1af08584ecf0d5c2fa67aeb,2025-04-15T20:15:36.377000 CVE-2022-29915,0,0,b361f4fb33f921161cc005e425062b8074b3acf8cd8085dae19ad444d296d736,2025-04-15T16:15:18.570000 CVE-2022-29916,0,0,9cb9af21b6e79565bbcf00cb0ed5e1927944c164911cbafaac0dc4948e32469f,2025-04-15T15:15:56.510000 CVE-2022-29917,0,0,b20cba2493778bc141e17edd31af9e78aa0aede51145f8abbbdff44a79469c5d,2025-04-15T15:15:57.100000 @@ -200088,14 +200088,14 @@ CVE-2022-31738,0,0,1bf1348a10c6a1a0753610cad16ef2c4225734ee020c623e141a7663261d8 CVE-2022-31739,0,0,c931b13252ce8b29fdda26392680da35ba39bf0f60c4043745a1ee79c1a1ab57,2024-11-21T07:05:12.397000 CVE-2022-3174,0,0,6dc0845d41adfda2411e407e994f62fd14601dbd0c9ef580f54090da48226bfd,2024-11-21T07:18:58.700000 CVE-2022-31740,0,0,a9b351b2984d8827183d9c796f8dcbb855a5b62a730249d3652a27803630ac2f,2024-11-21T07:05:12.547000 -CVE-2022-31741,0,1,d4020305c07a5024d3cdbfeb84f543551fbae618c5aae558fb18f313817ca4ad,2025-04-15T19:15:58.547000 -CVE-2022-31742,0,1,9f188968ce09cc9c979ccd17b193054a8fe8003a773b1d6fa1c8071b007f2259,2025-04-15T19:15:58.717000 -CVE-2022-31743,0,1,ecdee1090d1b067698bf232c3a6f1714af7cc8fd826c9f107ec24b55732596bc,2025-04-15T19:15:58.887000 -CVE-2022-31744,0,1,4aa42cf4159e995a594a2e8221b407b9434f37470028a63f46b3fb4c6c8e028e,2025-04-15T19:15:59.040000 -CVE-2022-31745,0,1,98824d1b9d5363f15d855dad20f344389b95358e947894737bd5ec05119c689e,2025-04-15T19:15:59.207000 -CVE-2022-31746,0,1,e1ec3c1b8f223c03ba9f1a74ea45c11c9460bfa18e3400b5e78214b0b5e5d6c8,2025-04-15T19:15:59.367000 -CVE-2022-31747,0,1,f878fba063284ee7b32bb8e6484892f362d090f5da789cdec4ba3234a4076c05,2025-04-15T19:15:59.517000 -CVE-2022-31748,0,1,5c4c09803cb65abfe257c712067b7cd094eef0dd2dd3d20f32c08a441c088a50,2025-04-15T19:15:59.663000 +CVE-2022-31741,0,0,d4020305c07a5024d3cdbfeb84f543551fbae618c5aae558fb18f313817ca4ad,2025-04-15T19:15:58.547000 +CVE-2022-31742,0,0,9f188968ce09cc9c979ccd17b193054a8fe8003a773b1d6fa1c8071b007f2259,2025-04-15T19:15:58.717000 +CVE-2022-31743,0,0,ecdee1090d1b067698bf232c3a6f1714af7cc8fd826c9f107ec24b55732596bc,2025-04-15T19:15:58.887000 +CVE-2022-31744,0,0,4aa42cf4159e995a594a2e8221b407b9434f37470028a63f46b3fb4c6c8e028e,2025-04-15T19:15:59.040000 +CVE-2022-31745,0,0,98824d1b9d5363f15d855dad20f344389b95358e947894737bd5ec05119c689e,2025-04-15T19:15:59.207000 +CVE-2022-31746,0,0,e1ec3c1b8f223c03ba9f1a74ea45c11c9460bfa18e3400b5e78214b0b5e5d6c8,2025-04-15T19:15:59.367000 +CVE-2022-31747,0,0,f878fba063284ee7b32bb8e6484892f362d090f5da789cdec4ba3234a4076c05,2025-04-15T19:15:59.517000 +CVE-2022-31748,0,0,5c4c09803cb65abfe257c712067b7cd094eef0dd2dd3d20f32c08a441c088a50,2025-04-15T19:15:59.663000 CVE-2022-31749,0,0,b1477a733d3f8726940ff613eac16b40356d07f0d76c0a45e0b3943b4ec4d4e5,2025-01-28T00:15:06.487000 CVE-2022-3175,0,0,5979148044c66c6028b231b1d591fe58ace48d5a9e79ab312cff92f90666e9eb,2024-11-21T07:18:58.840000 CVE-2022-31751,0,0,73f69c8f00b2e5572c5ae456dd84479c6f30b8d5c31a805834a8ce67f875efc3,2024-11-21T07:05:13.820000 @@ -202172,26 +202172,26 @@ CVE-2022-34464,0,0,4e00c17949b4172f88be8703968c9e48828a19c565977ca71f6c66615d17a CVE-2022-34465,0,0,5b07bee564f6ab4dba2efab52594fe12f368088d2c653e6cb77342e3391c5a53,2024-11-21T07:09:37.473000 CVE-2022-34466,0,0,2215dd1dfd86ef1f274dae91c41abf0820f178f983b82d8753f8cbc07cf64bdb,2024-11-21T07:09:37.600000 CVE-2022-34467,0,0,d6e1bea5599b3734744b717ef80fdd8ac947afc23240b02550e8c1fa86067c2e,2024-11-21T07:09:37.737000 -CVE-2022-34468,0,1,a0454ca5ae31ca987797a72bd789c04a2d235231e38f3d4fde6e0618dc040b9e,2025-04-15T19:16:02.173000 -CVE-2022-34469,0,1,e90bb837358694171c883325cb4bc45ac8db11a786111235c4e31b485f47aa04,2025-04-15T19:16:03.120000 +CVE-2022-34468,0,0,a0454ca5ae31ca987797a72bd789c04a2d235231e38f3d4fde6e0618dc040b9e,2025-04-15T19:16:02.173000 +CVE-2022-34469,0,0,e90bb837358694171c883325cb4bc45ac8db11a786111235c4e31b485f47aa04,2025-04-15T19:16:03.120000 CVE-2022-3447,0,0,d8fa7f055ca4b9d12142b581def21afc62c8d7eab7fda771a5879b53a83dd95f,2024-11-21T07:19:32.410000 -CVE-2022-34470,0,1,36b45a8596aed9b0d6d31dfc42699cfe18ef41aa85cfa6c5080d5319b49fd46d,2025-04-15T19:16:03.270000 -CVE-2022-34471,0,1,0443bc5eaf424060e808c116f71bc4081f85fa23f371e6cda781316ea4d29fd2,2025-04-15T19:16:03.420000 -CVE-2022-34472,0,0,b15c51615649a8378d3fda979587f41994111c68ff03b7ea8c8ed101f1bc59c2,2024-11-21T07:09:38.383000 -CVE-2022-34473,0,0,54c678eb348041ed8dc229894d73874d380e07b08839bd4fdfa7c3b1e5cf4595,2024-11-21T07:09:38.520000 -CVE-2022-34474,0,0,0889b5c600b6a189b6e408a2d42d7140bfc8c33408bbd11115d20c213d75b412,2024-11-21T07:09:38.643000 -CVE-2022-34475,0,0,463c976535efe021fa53062134b853291afbbdeb06668dd633cc948ac6523cda,2024-11-21T07:09:38.767000 -CVE-2022-34476,0,1,fa15d113317bbae2a70306f57a9c7f703c516a67fa139b60e9107aebb91565ee,2025-04-15T19:16:03.597000 -CVE-2022-34477,0,1,2f4b24fbf57b9baec2968603aa97ec2eee2eb082422d7e519bc8d64ddd644e8e,2025-04-15T19:16:03.767000 -CVE-2022-34478,0,1,96653b21d224082f877fe249ebd925c4f833e5ca7240453b5bb58e22b85d4236,2025-04-15T19:16:03.930000 -CVE-2022-34479,0,1,4f1bd15b81e7b79e9c06f62f0b502a0c2e9e84a50eeae415f8a9ae910a7996bb,2025-04-15T19:16:04.097000 +CVE-2022-34470,0,0,36b45a8596aed9b0d6d31dfc42699cfe18ef41aa85cfa6c5080d5319b49fd46d,2025-04-15T19:16:03.270000 +CVE-2022-34471,0,0,0443bc5eaf424060e808c116f71bc4081f85fa23f371e6cda781316ea4d29fd2,2025-04-15T19:16:03.420000 +CVE-2022-34472,0,1,5aa199a38353ff94890902198976876751da5820861ad19c1698806db3bb4268,2025-04-15T20:15:36.803000 +CVE-2022-34473,0,1,3f0b07ee4bf7065252bcb63c4baef65741a55cad284939ba28787ff849682c98,2025-04-15T20:15:37.010000 +CVE-2022-34474,0,1,fc586d8252ba16f97f2ead32098e3fd6ab05a94a1d22055b45b29505c4600d28,2025-04-15T20:15:37.203000 +CVE-2022-34475,0,1,c3227c394b2515805acbf05a210d837a5c05372c17b76904f2bcab87e191dac8,2025-04-15T20:15:37.370000 +CVE-2022-34476,0,0,fa15d113317bbae2a70306f57a9c7f703c516a67fa139b60e9107aebb91565ee,2025-04-15T19:16:03.597000 +CVE-2022-34477,0,0,2f4b24fbf57b9baec2968603aa97ec2eee2eb082422d7e519bc8d64ddd644e8e,2025-04-15T19:16:03.767000 +CVE-2022-34478,0,0,96653b21d224082f877fe249ebd925c4f833e5ca7240453b5bb58e22b85d4236,2025-04-15T19:16:03.930000 +CVE-2022-34479,0,0,4f1bd15b81e7b79e9c06f62f0b502a0c2e9e84a50eeae415f8a9ae910a7996bb,2025-04-15T19:16:04.097000 CVE-2022-3448,0,0,71d3876830be2877b3479b9d188b8e77ac089e178efc8ba3c9f4ab32c9228e37,2024-11-21T07:19:32.613000 -CVE-2022-34480,0,1,2cecd929d01261a17cdd6651972726a5cbb1388af144f5d9e9d73c4977318277,2025-04-15T18:15:42.160000 -CVE-2022-34481,0,1,609d697f3f309e1de150b90ddd1102cc0f8eefc398389ab54defaf240e5a3c01,2025-04-15T18:15:42.407000 -CVE-2022-34482,0,1,bde01c794c8124b521632c8da0e5741455828e576bab0c60721d7025aeba687a,2025-04-15T18:15:42.563000 -CVE-2022-34483,0,1,4e1e0e43845914ecaa6895cf18e552ea28450fbea5b1a9103dd73b5d199acf88,2025-04-15T18:15:42.730000 -CVE-2022-34484,0,1,8192aed6960df9588fb023c17b6b9e81e0868a6bb0a265f5e886f479d682859e,2025-04-15T18:15:42.887000 -CVE-2022-34485,0,1,6b18a517aac793eeff34346f39312ee161e761065d63f13e7d488347d7bb82eb,2025-04-15T18:15:43.050000 +CVE-2022-34480,0,0,2cecd929d01261a17cdd6651972726a5cbb1388af144f5d9e9d73c4977318277,2025-04-15T18:15:42.160000 +CVE-2022-34481,0,0,609d697f3f309e1de150b90ddd1102cc0f8eefc398389ab54defaf240e5a3c01,2025-04-15T18:15:42.407000 +CVE-2022-34482,0,0,bde01c794c8124b521632c8da0e5741455828e576bab0c60721d7025aeba687a,2025-04-15T18:15:42.563000 +CVE-2022-34483,0,0,4e1e0e43845914ecaa6895cf18e552ea28450fbea5b1a9103dd73b5d199acf88,2025-04-15T18:15:42.730000 +CVE-2022-34484,0,0,8192aed6960df9588fb023c17b6b9e81e0868a6bb0a265f5e886f479d682859e,2025-04-15T18:15:42.887000 +CVE-2022-34485,0,0,6b18a517aac793eeff34346f39312ee161e761065d63f13e7d488347d7bb82eb,2025-04-15T18:15:43.050000 CVE-2022-34486,0,0,73a71e1f77d0db95faf44d581ebc7697f58e47daa52f286b1737b58b52030cc1,2024-11-21T07:09:40.210000 CVE-2022-34487,0,0,6ce1ccea025a4a271a03bc9f211e020097976ad6b82aba7dc5230a69f3b14d2a,2024-11-21T07:09:40.343000 CVE-2022-34488,0,0,5bd7380e268f73f286ab4df14ba1a4022f5c04a59282ab2c65a94c6700b0d5c6,2025-02-18T16:15:11.813000 @@ -203746,9 +203746,9 @@ CVE-2022-36310,0,0,933ab2a108d4959fd40311026d558b63123f5d3d901ccde2f866831f4b41f CVE-2022-36311,0,0,aaebcb8f6a22cfcf19a064a414b8c147d0a9f70f655c3150e3a3cee1ad542d0e,2024-11-21T07:12:45.460000 CVE-2022-36312,0,0,3d6274d2cdec0a0f349691e770884e2d076c8d031d8d5ddfbf51b0060d9ded19,2024-11-21T07:12:45.580000 CVE-2022-36313,0,0,65ac0c14b77289090aa8b4818426ea2d1996c742a72eca04a1768aa1ca0af463,2024-11-21T07:12:45.740000 -CVE-2022-36314,0,1,02acca6a9588ddc28790d06d4843ec397b6d19991f0efa6ce2e61a2a171a3a4e,2025-04-15T18:15:43.207000 -CVE-2022-36315,0,1,c1ff4c99d82cbd698c9e6ff03d75331598f586462ab45fc571cf1f07d2f325e6,2025-04-15T19:16:05.593000 -CVE-2022-36316,0,1,cd8b29a94174112ba3d2c28a19d69f32ef742b47e85ae93f010539d6c3b744cf,2025-04-15T18:15:43.377000 +CVE-2022-36314,0,0,02acca6a9588ddc28790d06d4843ec397b6d19991f0efa6ce2e61a2a171a3a4e,2025-04-15T18:15:43.207000 +CVE-2022-36315,0,0,c1ff4c99d82cbd698c9e6ff03d75331598f586462ab45fc571cf1f07d2f325e6,2025-04-15T19:16:05.593000 +CVE-2022-36316,0,0,cd8b29a94174112ba3d2c28a19d69f32ef742b47e85ae93f010539d6c3b744cf,2025-04-15T18:15:43.377000 CVE-2022-36317,0,0,e9a92750bc8f5ab1eaa55499987912b24d93ed26ac29fd19f8ed6444fd128fa6,2025-04-15T17:15:33.860000 CVE-2022-36318,0,0,19f7cbcf4ebed5c3901c2bf201488fc16f2de697805e6141e98b0bf9301c21c3,2025-04-15T17:15:35.397000 CVE-2022-36319,0,0,4297563fa88c1bd23dc67df3ba928ff224180689d4f71be48a4b138ddc4a28f1,2025-04-15T17:15:35.717000 @@ -205424,10 +205424,10 @@ CVE-2022-38470,0,0,ee5cdafe0750cc9ef7ee2399591ed2027d1bb3cef934e09e7ebf919bd68c1 CVE-2022-38472,0,0,4ef21d2d6651942a2c6985eef31b77e2897abed67ca6eef2b0fab304a0b29c11,2025-04-15T17:15:36.150000 CVE-2022-38473,0,0,79e145abda660b1f17ff565d68ee7cede14e88f825886954394e6ce37382db5c,2025-04-15T17:15:36.350000 CVE-2022-38474,0,0,f860e6ea50d7cd80c5f5aa9de067bf12641be486f8e507f0e85fb4e0b1c22a71,2025-04-15T17:15:36.573000 -CVE-2022-38475,0,1,c72cdd91c218dc3032ac3c90b114a76a3f057ba2b80717b324d0260e01fe9718,2025-04-15T18:15:43.597000 -CVE-2022-38476,0,1,bcdcb3343af9fd73a81fd992682154326060082bc32b25b97eb6d9319161043e,2025-04-15T18:15:43.750000 -CVE-2022-38477,0,1,e02fe71d5abd679a3dc416f62508e20ba3201d6b09f6b74ceee437eeef496785,2025-04-15T18:15:43.907000 -CVE-2022-38478,0,1,eb03c97b6896f851462ad3367333599cbfb99fc16aae3b9a6b2e2fc24fbc9108,2025-04-15T18:15:44.067000 +CVE-2022-38475,0,0,c72cdd91c218dc3032ac3c90b114a76a3f057ba2b80717b324d0260e01fe9718,2025-04-15T18:15:43.597000 +CVE-2022-38476,0,0,bcdcb3343af9fd73a81fd992682154326060082bc32b25b97eb6d9319161043e,2025-04-15T18:15:43.750000 +CVE-2022-38477,0,0,e02fe71d5abd679a3dc416f62508e20ba3201d6b09f6b74ceee437eeef496785,2025-04-15T18:15:43.907000 +CVE-2022-38478,0,0,eb03c97b6896f851462ad3367333599cbfb99fc16aae3b9a6b2e2fc24fbc9108,2025-04-15T18:15:44.067000 CVE-2022-3848,0,0,de383ae1a53e3d0aa561d19764791c6db0f7588ffac9421e8a76d994471ae2fb,2024-11-21T07:20:21.693000 CVE-2022-38481,0,0,5db63a047b363568cb90bf596fe4d291b3daee17e3f40efb2b89befed15067d3,2025-04-09T16:15:19.517000 CVE-2022-38482,0,0,35b995182a57df288dcce9e70c14a84d2fd48c55a6fa17c202b06b8cd7500e7a,2025-04-09T16:15:19.720000 @@ -206555,7 +206555,7 @@ CVE-2022-40141,0,0,5ddd156c1cc8b48effc77aed2ae9bf8dcd0549a3eee4c971b09bbb1d5b62b CVE-2022-40142,0,0,73ea076baaaeb4668f7ad09afb119693d2e385a273a3ad5d80b4c492551fc69e,2024-11-21T07:20:58.063000 CVE-2022-40143,0,0,3ddd3ec928e429a438673596f2f217b7732089748d16e3a0461501f142b21215,2024-11-21T07:20:58.200000 CVE-2022-40144,0,0,df12595cbf3cec172b6be1ac5c21bbd44cada3309db285d5816db0f1a45f011d,2024-11-21T07:20:58.330000 -CVE-2022-40145,0,1,f544c864ead4b946c8707926eb214033d1cbe52d68f2403f5f45ffb7527c93b9,2025-04-15T18:15:44.667000 +CVE-2022-40145,0,0,f544c864ead4b946c8707926eb214033d1cbe52d68f2403f5f45ffb7527c93b9,2025-04-15T18:15:44.667000 CVE-2022-40146,0,0,a225ab94f0b0b162df0eac49a4d80171415199bd2cae3268c212f64c804528c3,2024-11-21T07:20:58.587000 CVE-2022-40147,0,0,22b4c95e9f7601cafc7530e9e01597aee98cf8a1951c60a979a5840f7979c5c1,2024-11-21T07:20:58.717000 CVE-2022-40148,0,0,5ffe3665ba8f3761c57c7acf24e5b9212052583cc7ff9631dad6c963bc6c8647,2023-11-07T03:52:06.687000 @@ -209568,19 +209568,19 @@ CVE-2022-4383,0,0,4f3978e4f233cbb9ea3de8a171f30bbfb0c78ab6638a66a4ebf99903af67e7 CVE-2022-43830,0,0,2f64150b363b8e69222f4767b2a962c4259c9aa91848800fda8ecd6f999d6183,2023-11-15T07:15:14.527000 CVE-2022-43831,0,0,4b824d13f4654134bfaa17c7c5acf538260c76da9795c9bb806d1640e5487247,2024-11-21T07:27:15.673000 CVE-2022-4384,0,0,e4a42500f1faf0f01c4bfb043390142606fdcf1d1d2db89407d32200252c33e2,2025-03-25T21:15:38.660000 -CVE-2022-43840,0,1,6d52accb23ed767c97dbd98cbcdc8616917c9921af1c3761c20d5b73270d2b61,2025-04-15T18:39:27.967000 +CVE-2022-43840,0,1,17b6a4cb24007ec977e60889a6e08821bcc6c5745ad3e4daae541616660c9c28,2025-04-15T21:15:46.440000 CVE-2022-43841,0,0,6dac3a6012885404339a039f533cfe4b8c4ab64fc90a590d1b6f4c9d270c1163,2025-01-08T17:13:14.077000 CVE-2022-43842,0,0,968543d78d4d0106d71002238fd33b4337c8761617723fc4383d8ec785dd2e77,2024-12-31T15:32:22.737000 CVE-2022-43843,0,0,aa4e8920b27430c0e020c56337aaf572b7590d86ac4b80d6e5ec6ab868ab7eb7,2024-11-21T07:27:16.070000 CVE-2022-43844,0,0,672de2cb0d98677bddf73f5d7509ae40e7079274243c5f9710169e0c89e80b02,2025-04-10T14:15:23.393000 CVE-2022-43845,0,0,4dd0555a0d80dc6547097d2325e631aae8cc1a25ed03e0c104688f7fd5b7e883,2024-09-30T15:53:01.643000 -CVE-2022-43847,0,1,738a22c5d718d6a57a5f4199f16ebe23577253bc5b12ab7d75f38d4d85e48c4b,2025-04-15T18:39:27.967000 +CVE-2022-43847,0,0,738a22c5d718d6a57a5f4199f16ebe23577253bc5b12ab7d75f38d4d85e48c4b,2025-04-15T18:39:27.967000 CVE-2022-43848,0,0,10733803c11c371a0a9c9ee79c86f454e6481168e95b3e9730f0535811d5ceb8,2024-11-21T07:27:16.430000 CVE-2022-43849,0,0,19b75e027c95da1828001070b83b6be44a4cfbf71a32632e6411f0d83c7bf310,2024-11-21T07:27:16.567000 CVE-2022-4385,0,0,e8b4e2410cfe63eeb4bcbcabc4ca3915e6daad03830092325a0bfa5b6170d60b,2025-03-12T17:15:36.817000 -CVE-2022-43850,0,1,2b87c8e3ff800d3b638cd7c06b6611d053357dbd4e2331ccd989283b7fa5ef2d,2025-04-15T18:39:27.967000 -CVE-2022-43851,0,1,ca5e97e653c3d3fda024e9e86c7bdc37a420abbf9da4f07ff1e40f509e65ea22,2025-04-15T18:39:27.967000 -CVE-2022-43852,0,1,ebdc368d84f3016d163259bea9b56b0f45eda0b76893462e34bbfc09085a858d,2025-04-15T18:39:27.967000 +CVE-2022-43850,0,0,2b87c8e3ff800d3b638cd7c06b6611d053357dbd4e2331ccd989283b7fa5ef2d,2025-04-15T18:39:27.967000 +CVE-2022-43851,0,0,ca5e97e653c3d3fda024e9e86c7bdc37a420abbf9da4f07ff1e40f509e65ea22,2025-04-15T18:39:27.967000 +CVE-2022-43852,0,0,ebdc368d84f3016d163259bea9b56b0f45eda0b76893462e34bbfc09085a858d,2025-04-15T18:39:27.967000 CVE-2022-43855,0,0,64fbe7dc298ae5c5ac98c70a6d144003654c18affb03fce85bbaadaad755a546,2025-01-07T15:38:33.697000 CVE-2022-43857,0,0,c2306b55f2b4c37a83b047fd2388728e99b12612bc990aa59fe7703ba18ae695,2024-11-21T07:27:16.837000 CVE-2022-43858,0,0,f37263e6c9a749dffda738fdd0099cd194b151233806de545336aaf55f4891b9,2024-11-21T07:27:16.990000 @@ -210091,7 +210091,7 @@ CVE-2022-44638,0,0,cd4dfe11fbb405feccdca7af9c78159d06c16ecbe89ded61e0cc6f9a854d2 CVE-2022-4464,0,0,259a9f4962efef21c077a96a1ba131ab972940338700bdf9187b508a3513d6c1,2025-04-08T20:15:18.080000 CVE-2022-44640,0,0,94295028d217e3bb0ba173183320ca472590524abf08221d862f20011148710c,2025-04-15T14:15:35.400000 CVE-2022-44641,0,0,bd2b96429909ff706fa61227d6b2ac49b53ec04af7472e2114c8fb9702398be2,2024-11-21T07:28:15.090000 -CVE-2022-44643,0,0,816282731d1897d1403dddd3b3ee8fa9cbfa2dc76c5b73f34a7c9486cacbe33d,2024-11-21T07:28:15.233000 +CVE-2022-44643,0,1,62a3726819a40e5d0d90636f75929bc30298540ef0461aad727017727c14ed2d,2025-04-15T20:15:37.970000 CVE-2022-44644,0,0,21125e9b4e4c11bda3b2af045401b9d0b9f0373cfc3c13cae1d733b7787a8d15,2025-03-27T15:15:37.987000 CVE-2022-44645,0,0,ac47fe4951fddf3f04f46fadbbbd600814e6bb6d2e7aa94f3ed3e4bf7c3a5b64,2025-03-27T15:15:38.180000 CVE-2022-44646,0,0,d783dbc904347bb1878a4a5a46b20ed6619c1485867a49a7b7f3a5f7cbed555a,2024-11-21T07:28:15.670000 @@ -210433,8 +210433,8 @@ CVE-2022-45180,0,0,9f620c4a664e3e793609c73bc097f6ede0c71acddff0176caa3a2a131c9de CVE-2022-45182,0,0,5ce5fd3aa8778337f722afc8524f8be33eca4a37a3b49427434ef8a1f42497ed,2024-11-21T07:28:55.140000 CVE-2022-45183,0,0,17c24bcc8ff5f83b3692890867f1b0390aceb5de23aec693bc352190eaa3a4c7,2024-11-21T07:28:55.287000 CVE-2022-45184,0,0,3d0fcb0285b7ec260e08c96917c32aa853ace4307fda2ec9ee77dd573c819440,2024-11-21T07:28:55.440000 -CVE-2022-45185,0,1,4d24224c6050c4d3d84c527e1c10e9f789d419815b44ec3f3e1355c3f71d7a56,2025-04-15T18:38:13.663000 -CVE-2022-45186,0,1,24e3e9cbc7dce7bc99dbda39b7790375281834d370a4cd61703e8f45bbb49c21,2025-04-15T18:33:57.950000 +CVE-2022-45185,0,0,4d24224c6050c4d3d84c527e1c10e9f789d419815b44ec3f3e1355c3f71d7a56,2025-04-15T18:38:13.663000 +CVE-2022-45186,0,0,24e3e9cbc7dce7bc99dbda39b7790375281834d370a4cd61703e8f45bbb49c21,2025-04-15T18:33:57.950000 CVE-2022-45188,0,0,897fe5d1be1d67bd18e0e84eecbd7aca5e96a3d426012bdcc62fcf1d224f7bf1,2024-11-21T07:28:55.583000 CVE-2022-4519,0,0,7e1b44f974b691b3ba99a7d6700f057355f3a483598f1d23e777976a85d319f9,2024-11-21T07:35:25.163000 CVE-2022-45190,0,0,f73aa26a6891c9ffeeac54b85ee8816a251564df5d1f415837c833d564391596,2025-03-25T16:15:16.280000 @@ -220731,7 +220731,7 @@ CVE-2023-25695,0,0,09a2b882ca7cac926d032761d8998e4a483fed65d18007c0314ec4513df80 CVE-2023-25696,0,0,9b30fc8f3c9a71ae427b279858c40ae676558377846bf61fb9aa78e7e7489835,2024-11-21T07:49:57.320000 CVE-2023-25697,0,0,1ddc4535b182d65fccd47e71db42817aa3614e13662ca36b13717dda226bced3,2024-11-21T07:49:57.517000 CVE-2023-25698,0,0,85e697c414fb65361935cfd67798d1168f7dd2b2d5fcdc4e1bbc5dc760604cb7,2024-11-21T07:49:57.657000 -CVE-2023-25699,0,0,10ae5b608aec3170f9bb5ce05996302f087c7bc0a1fe0f6549b993286f17b9cb,2024-11-21T07:49:57.770000 +CVE-2023-25699,0,1,a72ea770fd24fa838dfcbd972b183318a23ba0b9f7070cb8ed94a681f251fdb9,2025-04-15T21:08:51.860000 CVE-2023-2570,0,0,c1f1f78724acb700a699cb87655fc4e7df7eb8087d0351fdc4a22030829b9604,2024-11-21T07:58:51.133000 CVE-2023-25700,0,0,8be35ad5a50c41a4d9a77a71839c0b0b6801de53c5cc5deae863a117983648f1,2024-11-21T07:49:57.897000 CVE-2023-25701,0,0,692301bb050b88eb5f85e376c22af7e4812a8ac50623f271bfe0d1504ce66984,2024-11-21T07:49:58.077000 @@ -220993,7 +220993,7 @@ CVE-2023-25962,0,0,c111eadc6e76b87a67eaff779856e4e1ba8d7befd7ed957004fb6d276c9a8 CVE-2023-25963,0,0,80c90160b0bccb8177518a9441fdcf4c0ed4c7e1d8edb154eb7eb794229793a2,2024-11-21T07:50:31.750000 CVE-2023-25964,0,0,970ab16ccbe8f4741d683cd0164b3259ab2953bde5cc3a26f8f015462e7796bf,2024-11-21T07:50:31.870000 CVE-2023-25965,0,0,37c452616c3bdf0fcdaf606a8b0b0c7cc0d7696337a5231531548825d42b4a48,2024-11-21T07:50:31.987000 -CVE-2023-25966,0,0,3d7dd70a67d5f092c2424fbfbb57e32da4fdebaff090fe8a6744ed81dd3c6494,2024-12-09T13:15:24.370000 +CVE-2023-25966,0,1,594e62c4e16b49cfc724c2c8309a970d1abf194b35298cd457020e80cc52543d,2025-04-15T20:49:05.790000 CVE-2023-25967,0,0,0c2ab37311b84e00edc3ab8c9c34a7006f4b68cdb98c1fe8db9b60a486455470,2024-11-21T07:50:32.100000 CVE-2023-25968,0,0,9501899328ec22571151ea22c5fd147323b6adfe9a8d1333be51b62b4238fbc4,2024-11-21T07:50:32.220000 CVE-2023-2597,0,0,303cc785566dc8801b26b54d7ade491ff996c6bc976f3b826f6eff26020c8f98,2024-11-21T07:58:54.127000 @@ -221931,7 +221931,7 @@ CVE-2023-27269,0,0,a2cb75ed8e8f4c7a63182346384deb1e0c5a2486b1b434760e6fbd8c0ca66 CVE-2023-2727,0,0,966c88e15066bc43dba1ec2aa370d7b0c785373b9390bae0c2499965e9855be3,2025-02-13T17:16:22.307000 CVE-2023-27270,0,0,b353b6a72e4e58410301ccefd29c08ef46fb0abf28ef408799b5c9355a0801fb,2024-11-21T07:52:34.367000 CVE-2023-27271,0,0,ca26e9f6d27c3aafb7eb9fc8b5ca0b11f608a799e69fc7a6b578b3fbd658c1fb,2024-11-21T07:52:34.510000 -CVE-2023-27272,0,1,6fa7be621d77617648c670f8223e813af1608516fa15b3ff8509af3e44f50bf2,2025-04-15T18:39:27.967000 +CVE-2023-27272,0,0,6fa7be621d77617648c670f8223e813af1608516fa15b3ff8509af3e44f50bf2,2025-04-15T18:39:27.967000 CVE-2023-27279,0,0,ab9df5075109ac6cc605ce982239417da3476eea3efb0dd3f2019e217ea04529,2024-11-21T07:52:34.650000 CVE-2023-2728,0,0,caa147a0d3ae97b86200dda15070a29a4d00c335f312e3d8a13e8ab9b856601e,2025-02-13T17:16:22.447000 CVE-2023-27283,0,0,4eb7cf6aaab63ab057573f5328debaefda12e59e8a469fc0511c6b657323a182,2025-01-07T21:08:32.720000 @@ -229112,7 +229112,7 @@ CVE-2023-36501,0,0,c5fd1d48310551e06c32858d3409f4b3bb81cd7bf054db0d3372ef926c25d CVE-2023-36502,0,0,e9d4311f7e63b9210af8c1a166cb719dc6be2e97fafa60cc1a82e40b1b54f98c,2024-11-21T08:09:50.440000 CVE-2023-36503,0,0,fcdad8415d080aa47a84afac77e8960e774a0ec452ae2f7f9d9cac880e3ce051,2024-11-21T08:09:50.547000 CVE-2023-36504,0,0,b5bae85a56b80cc82ee2f0e40cb8a5ddeda98713155429cf430d437601a3fe5d,2024-12-26T14:58:30.100000 -CVE-2023-36505,0,1,547719f3b754e99721c4dc0fc9ce9cd8a3d7a35abdc686ceda1ceed394e6e48f,2025-04-15T19:58:20.940000 +CVE-2023-36505,0,0,547719f3b754e99721c4dc0fc9ce9cd8a3d7a35abdc686ceda1ceed394e6e48f,2025-04-15T19:58:20.940000 CVE-2023-36506,0,0,6af22016e284031d53b3ef3f11af4b1bf92676c075b4e08e2aebb1352de367b9,2024-12-13T15:15:16.450000 CVE-2023-36507,0,0,860d90b5f40d8a7bffdd9335fefbba3d2a2e252c703ad45f15814d2a2853d7b9,2024-11-21T08:09:50.870000 CVE-2023-36508,0,0,b5e9cd7ff00e539cb1c5d4430e09c6663d3754240c253a68df9338197c2fac39,2025-02-19T22:15:19.237000 @@ -233622,7 +233622,7 @@ CVE-2023-41961,0,0,d9eaf9a08b277b340f7d29fb515e8b334169a617c247410cfe10f782b5e55 CVE-2023-41962,0,0,8e211ae560f0b224b6dc90a762c337812a7535e5c4a77ff74c318f202d3b9783,2025-02-20T18:34:50.990000 CVE-2023-41963,0,0,c488bbe213194cd9c4226a7f83fad3df13113f5834bb9bc7fa01fced3c6de0ef,2024-11-21T08:22:00.053000 CVE-2023-41964,0,0,717405df1f2cf03c06becb18f5d6cdd82b5117004176fedd87a240e96fd3fe6f,2024-11-21T08:22:00.200000 -CVE-2023-41965,0,1,fbb30afd763122e726fa539d2c3896b613d5a9e27e4b41ed1f3b3e6b3e3e4eb6,2025-04-15T19:16:06.290000 +CVE-2023-41965,0,0,fbb30afd763122e726fa539d2c3896b613d5a9e27e4b41ed1f3b3e6b3e3e4eb6,2025-04-15T19:16:06.290000 CVE-2023-41966,0,0,39b569e77222c5cb7697f8f3337074099459ff65fe63e092afdf25fbc8e83381,2024-11-21T08:22:00.493000 CVE-2023-41967,0,0,34ff322eda8e24882f4c46a8d5878445c0cf24da8123e96fe3e72ae2bc6cec0a,2024-11-21T08:22:00.680000 CVE-2023-41968,0,0,44f67f87a8a96cb53bf452e0d406f2dfd7a25a9b6e4826eab4e93c969b301c51,2024-11-21T08:22:00.810000 @@ -237403,7 +237403,7 @@ CVE-2023-47267,0,0,7f82be7239b4513632a087213dc1b6bc6b0799a782de23dc6207c9c3c8139 CVE-2023-4727,0,0,ccf28711f5d402124cc1b796c6dfea846dbbd77633b83fe2230c14ba8f652557,2024-11-21T08:35:50.450000 CVE-2023-47271,0,0,4e36cc6c047d04609b02214c9aa611ec485c07ed11ce70f1d96def4ebf4a320c,2024-11-21T08:30:05.777000 CVE-2023-47272,0,0,1fc173c0e28b4f8487264c0287eadc27a5dc6dcbdab45eb1d9e676cfc540b1b9,2024-11-21T08:30:05.950000 -CVE-2023-47279,0,1,03779cacffb2432018907343ae27aa2c58f05fa519f93abe07552dd53a2ba677,2025-04-15T19:16:06.480000 +CVE-2023-47279,0,0,03779cacffb2432018907343ae27aa2c58f05fa519f93abe07552dd53a2ba677,2025-04-15T19:16:06.480000 CVE-2023-4728,0,0,c339ab5d87c7af4ab30b66d47f7562aee044b141169095045add07af35952c50,2025-01-15T16:31:50.053000 CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb836,2024-11-21T08:30:07.197000 CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000 @@ -238090,7 +238090,7 @@ CVE-2023-48315,0,0,0ce5bcb1f61b32ec58364507f3c2670354de060e5ea10d1d1099bde646e8c CVE-2023-48316,0,0,8abe8345ecdcfca12500314184dab2cee64a3bfdeea16d453153a22c3e3dab85,2024-11-21T08:31:28.590000 CVE-2023-48317,0,0,26db5ebd55e51ec988e8aca2aa556839c0011e5a7eba6ca7e48fbdc0abd7279c,2024-11-21T08:31:28.720000 CVE-2023-48318,0,0,2fdf4678be6002539232f73901305f13b759dc0bae792701ce6d76118aaf1018,2025-03-10T17:45:44.900000 -CVE-2023-48319,0,0,381ce5d0a0b69d6d2ad987c8da446529a977e79cc87492b0f481e67844d6b241,2024-11-21T08:31:28.970000 +CVE-2023-48319,0,1,bae78d8c2132413185c7cf36347c1070e9219e1322c549d016b17476a8d3915a,2025-04-15T20:56:20.810000 CVE-2023-4832,0,0,e6b2c1bc6eaa78a4b56b4804cc88c0571744536b4c97b319c2cffbe6a62608db,2024-11-21T08:36:03.957000 CVE-2023-48320,0,0,41cae7e6406d93214a5b8cc75fd41a289beab8affc1552fb80e64835a39f0cea,2024-11-21T08:31:29.097000 CVE-2023-48321,0,0,70a7326b8d4535c3125f55bb497795610837abbd5ca6e32455c4c9deae2ada8d,2024-11-21T08:31:29.223000 @@ -240412,7 +240412,7 @@ CVE-2023-51521,0,0,63ace0e2ea9fec07e829fa38073d05ad373f28a4301e5d66ae7f894c4d5be CVE-2023-51522,0,0,c6369bde75865a714d78fff1c89293c5e3692b71adb9355531bcc70ed17ff25d,2025-02-09T20:35:17.963000 CVE-2023-51523,0,0,cd66cc622042618a01e1a4e6a7152686dfb1446731c00f96a33e19b671eb768d,2024-11-21T08:38:18.253000 CVE-2023-51524,0,0,3f15f496afced8105551aa9221c730a16b2feaac3f249e417442e5dc1a4ba608,2024-11-21T08:38:18.383000 -CVE-2023-51525,0,0,cc8a41c95e97e3eef08e489711755257d7199a61c16f9491fa2dfe0854a508b2,2024-11-21T21:15:15.553000 +CVE-2023-51525,0,1,33f84d50f8aba18648b002a4022a322c49c4d3a2c0ee8191a3f2bf5138c36c26,2025-04-15T21:13:12.197000 CVE-2023-51526,0,0,dc39ba53880880a209811de957064dec653f5a2194637d5488682a7102ecc314,2024-11-21T08:38:18.633000 CVE-2023-51527,0,0,c3da9a7c1c016de9d25d32847d10f50d0382b55f23b651c58546e170ef761d78,2024-11-21T08:38:18.760000 CVE-2023-51528,0,0,6a7c1646caea9a3b2d1bd938ad0a8905a104aa3d08ff6cad27ebee9d1a861ffe,2025-02-27T02:50:12.997000 @@ -241734,22 +241734,22 @@ CVE-2023-53010,0,0,8be5c56f20098173b08c1945530ce299aaa2141d1e8686a29170788c825b6 CVE-2023-53011,0,0,77c9716594521e41afacd9f68eb5beb1f62ad22a646866570fda58816132e6ab,2025-04-14T20:51:37.577000 CVE-2023-53012,0,0,20db874967f2e2a35cb541dd77c4889068086af85346455691ade5b530584b7b,2025-03-28T18:11:40.180000 CVE-2023-53013,0,0,1003be9fa7f68b12030cb3eee1e74924d486ae9e3d428f03e861298515bf534d,2025-04-14T20:51:49.353000 -CVE-2023-53014,0,1,9611da8219314ccbad341cfa30e5a53a1efc48bd1bad3edcf76c74f08b72e7c3,2025-04-15T19:40:48.390000 -CVE-2023-53015,0,1,89d1b010380b964c39b3d7b2853df3a445d53c34a5b9cfb828e4242d7b49fa7b,2025-04-15T19:41:18.383000 -CVE-2023-53016,0,1,2bf44226c4bf24c7f335fd4dd65d051cf12440c5ccba569a6a6e5b6dc6fa5771,2025-04-15T19:41:27.160000 -CVE-2023-53017,0,1,7806a25746e4d39653223a4a1182d24af9da875df892a5d839552ae87c02c16e,2025-04-15T19:41:36.207000 -CVE-2023-53018,0,1,1d11ce6ddc27f6593ca1b428a5b397f9fb42a957cab5157e0dbea557cd5c28b8,2025-04-15T19:41:43.143000 +CVE-2023-53014,0,0,9611da8219314ccbad341cfa30e5a53a1efc48bd1bad3edcf76c74f08b72e7c3,2025-04-15T19:40:48.390000 +CVE-2023-53015,0,0,89d1b010380b964c39b3d7b2853df3a445d53c34a5b9cfb828e4242d7b49fa7b,2025-04-15T19:41:18.383000 +CVE-2023-53016,0,0,2bf44226c4bf24c7f335fd4dd65d051cf12440c5ccba569a6a6e5b6dc6fa5771,2025-04-15T19:41:27.160000 +CVE-2023-53017,0,0,7806a25746e4d39653223a4a1182d24af9da875df892a5d839552ae87c02c16e,2025-04-15T19:41:36.207000 +CVE-2023-53018,0,0,1d11ce6ddc27f6593ca1b428a5b397f9fb42a957cab5157e0dbea557cd5c28b8,2025-04-15T19:41:43.143000 CVE-2023-53019,0,0,bc78062ebca534ea96cdb0db4033c76b947a55aafb57566a42238f13b52cba25,2025-03-28T18:11:40.180000 CVE-2023-5302,0,0,0b22a053fce6deed6d5e5a202f69ebfca3fc6dde094fa45bdf36b6adb6a02384,2024-11-21T08:41:29.287000 -CVE-2023-53020,0,1,081f70c78298e3ad20f3fc725e80b14ceeed6af10b072f49202d71ba9596c0f0,2025-04-15T19:41:50.600000 +CVE-2023-53020,0,0,081f70c78298e3ad20f3fc725e80b14ceeed6af10b072f49202d71ba9596c0f0,2025-04-15T19:41:50.600000 CVE-2023-53021,0,0,d18203a7515a18eebf7e570fae00e8582c48864cd56b806bca0c6c2b0456019a,2025-04-01T15:40:10.120000 -CVE-2023-53022,0,1,abb27bc045fc8ac749b6a69dc725632f6e3bd74416bfef7d9da8364e916a37bb,2025-04-15T19:41:54.910000 +CVE-2023-53022,0,0,abb27bc045fc8ac749b6a69dc725632f6e3bd74416bfef7d9da8364e916a37bb,2025-04-15T19:41:54.910000 CVE-2023-53023,0,0,ad0ea17b988c0681c23b9ed73e004750d32fc4e5ad9e2327fb070aef9e1c299a,2025-04-01T15:39:10.740000 CVE-2023-53024,0,0,d83c79a9e188befc7588e03155f005f9f9f2f2f79d0e6ca341644af4842597ee,2025-03-28T18:11:40.180000 CVE-2023-53025,0,0,efe3474accdea92345a2022672c62759bac3b200b8dfffbd0c62ed08000e6db2,2025-04-01T15:38:53.187000 -CVE-2023-53026,0,1,492775c6bdaaea127b2f5228b67bb8b2d893df080173bba02e36320976b6e471,2025-04-15T19:42:05.810000 +CVE-2023-53026,0,0,492775c6bdaaea127b2f5228b67bb8b2d893df080173bba02e36320976b6e471,2025-04-15T19:42:05.810000 CVE-2023-53027,0,0,abe52dfb43bbd686e3fe35e91f50766f811247cd5855fb2a0edd84ee7dec5768,2025-03-28T07:15:37.860000 -CVE-2023-53028,0,1,7f0cc0a5d5e510e4810c552fa30b65b135df8416b5fa9cd82a4da94b645eb2b7,2025-04-15T19:42:15.790000 +CVE-2023-53028,0,0,7f0cc0a5d5e510e4810c552fa30b65b135df8416b5fa9cd82a4da94b645eb2b7,2025-04-15T19:42:15.790000 CVE-2023-53029,0,0,57851a20a611c1aeefdd45aa9d18f37f4985fdfd202db3c5594a7dce60b632cf,2025-03-28T18:11:40.180000 CVE-2023-5303,0,0,1fd7805db54c4356f03291c90e402ea807b85aec18298fa337830f7108304fe4,2024-11-21T08:41:29.423000 CVE-2023-53030,0,0,7320bc84c92d9cd5305cb9754d3855bbc3a7e674b5b3eb1dc52e95195833c936,2025-03-28T18:11:40.180000 @@ -242049,7 +242049,7 @@ CVE-2023-5612,0,0,07d0fd9a01002c02d5049608faf1e176194fafe91daa7d393bb2813eaacb89 CVE-2023-5613,0,0,5c296e92ec08c076f024fb1be87a24997c51c32836e3ceadabd7db4f93d8403e,2024-11-21T08:42:07.397000 CVE-2023-5614,0,0,df3c7aef14595e231847df4cbf9f65fbb272aa8124fbcb08193c413d34988a90,2024-11-21T08:42:07.520000 CVE-2023-5615,0,0,56f89aa31fa6edba415dfec96afddd04047544455cab84c6571e893daa26c567,2024-11-21T08:42:07.633000 -CVE-2023-5616,1,1,0db9c311363a7dfbccd41065f61a2ba661530daa2bfc585b89e73dffddbb4bfb,2025-04-15T19:16:06.647000 +CVE-2023-5616,0,1,834b7eb8635762528cd8c0e474b3e731f62b9945e9779a312408e3a6f758fc71,2025-04-15T21:15:46.583000 CVE-2023-5617,0,0,730cedd938375b817937d4e4574096bafbca4b272c62ac316091c801825e7a02,2025-02-14T15:31:44.250000 CVE-2023-5618,0,0,111e22e7e80976f8f05c5cdfd526ea0caa1da19bd88e1d9d6d161392d3bb7b6a,2024-11-21T08:42:07.863000 CVE-2023-5619,0,0,a19fb0d9c1ec2158ccf365d70c7c69e74f9a9e11e8a35b996d155c23740d5bc4,2024-01-04T20:15:25.230000 @@ -244573,11 +244573,11 @@ CVE-2024-10082,0,0,06415cdb965ac64636892c496f9de214d59f82f169c648183613af8a98253 CVE-2024-10083,0,0,38e5dd874f867621565e43b60ceb8e1f354d946ee13dde203b48c3daa671568c,2025-02-13T06:15:19.210000 CVE-2024-10084,0,0,aa7524ac6f9ff0a4b9d5665381cefd3535aab2cd20f5b5573266707557de2a8a,2024-11-06T18:17:17.287000 CVE-2024-10086,0,0,c34575f938553fa7d7ae7ba88022934e50d186981e616c6c9f4320956c07bcc0,2025-01-10T13:15:08.623000 -CVE-2024-10087,0,1,e9e423bd2e72f6b996150b15d434b815b0f7bdfb949392e6872eae23a12bd54a,2025-04-15T18:39:27.967000 -CVE-2024-10088,0,1,2c921c006a26719e6f16bb8e34d19fe332d286f15db80279cf2ab84a6213d1c1,2025-04-15T18:39:27.967000 -CVE-2024-10089,0,1,aa96f7d46f267a2d0b204afcdcccf51b9d204e7bd689ba80f1dce570b86b0087,2025-04-15T18:39:27.967000 +CVE-2024-10087,0,0,e9e423bd2e72f6b996150b15d434b815b0f7bdfb949392e6872eae23a12bd54a,2025-04-15T18:39:27.967000 +CVE-2024-10088,0,0,2c921c006a26719e6f16bb8e34d19fe332d286f15db80279cf2ab84a6213d1c1,2025-04-15T18:39:27.967000 +CVE-2024-10089,0,0,aa96f7d46f267a2d0b204afcdcccf51b9d204e7bd689ba80f1dce570b86b0087,2025-04-15T18:39:27.967000 CVE-2024-1009,0,0,7f10991a2aedcbb0eeb168a4df9621d13325fa39adae509b0e5c1de61defa9f2,2024-11-21T08:49:35.077000 -CVE-2024-10090,0,1,daeaeca84ac248f2b1905168da6ff087ae783762692475412fe09dda0c8b4a3a,2025-04-15T18:39:27.967000 +CVE-2024-10090,0,0,daeaeca84ac248f2b1905168da6ff087ae783762692475412fe09dda0c8b4a3a,2025-04-15T18:39:27.967000 CVE-2024-10091,0,0,6e7587c6e48a4895e0398f4ef5a128ee8ab9d12529d1ec8cebe459ac4ee7d408,2025-01-16T21:48:55.983000 CVE-2024-10092,0,0,3187158205da52d65b1fd5fde676bfb3bfd6fed14de72d76a8aab9b275f77138,2024-10-28T13:58:09.230000 CVE-2024-10093,0,0,0b4f7b1e1ef181948292cdf0451d434c8b0b600a4a601aafca87364e5f264510,2024-11-01T18:07:07.003000 @@ -245578,7 +245578,7 @@ CVE-2024-1108,0,0,41de46f3dcaf9533283bc7e75a781616c5054e3d3c6e5f547b16c496a7c97d CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000 CVE-2024-11082,0,0,2068f4ddbc0d21e33db6ba3989176bd5aedcb5da6f30a07d96e2944d8ba88bcb,2024-11-28T10:15:05.973000 CVE-2024-11083,0,0,8060d1be07c2085add29a68ce088e46bf1b117fbd5e8fe231b842cd4d2355c1d,2024-11-27T06:15:17.707000 -CVE-2024-11084,0,1,a2a7c023bc2ec71cbb1203e5cda88ce803c404539274ec4c43e5c55f6a886409,2025-04-15T18:39:27.967000 +CVE-2024-11084,0,0,a2a7c023bc2ec71cbb1203e5cda88ce803c404539274ec4c43e5c55f6a886409,2025-04-15T18:39:27.967000 CVE-2024-11085,0,0,997988ac78259b1ae8db8c6e9651c22f46fbbaea4f307171e6fff12e9b424710,2024-11-18T17:11:17.393000 CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000 CVE-2024-11087,0,0,e2fe7093d86622f551b217e3b2fb07f9de32adec7e3dcf2388d9405a65f8c4e6,2025-03-13T13:09:46.483000 @@ -246175,7 +246175,7 @@ CVE-2024-11675,0,0,3307440f3fbc1d0020addd10cbdefb08c2908e3f9d73aa5c6b8271db5c084 CVE-2024-11676,0,0,fcf5d70b9ae975c1a7f068bd37af4b95546042ab6b688133671d0ee3a0794c78,2024-12-04T20:19:52.030000 CVE-2024-11677,0,0,e54f262b29a170bcc5d5e14bcf8cefe92c998c263008d057514c86f0f18e3d8a,2024-12-04T20:33:13.023000 CVE-2024-11678,0,0,7be8f96ddd54102217e8767d7cf1c2c97e393fb3d3cdf216618065fe375e69b2,2024-12-04T20:39:07.400000 -CVE-2024-11679,0,1,ca7d956e9d4f34be9ea95253f71618bcd103ce2ae7e9a245bb805230e1706892,2025-04-15T18:39:43.697000 +CVE-2024-11679,0,0,ca7d956e9d4f34be9ea95253f71618bcd103ce2ae7e9a245bb805230e1706892,2025-04-15T18:39:43.697000 CVE-2024-1168,0,0,361fc3dacab1a6af3309993965ec9d946bde5b152da006d3137d0cea2c78645f,2024-11-21T08:49:57.020000 CVE-2024-11680,0,0,413293c09da5679a3e6b3bb9a6bdd26dd9245aca40b801761cabf7d2cf810aa4,2024-12-06T18:42:17.390000 CVE-2024-11681,0,0,07ce852e1f481465e000f807ac541fdf042292c0a090d70151a0f51d3eced91e,2025-01-07T16:15:32.097000 @@ -247649,7 +247649,7 @@ CVE-2024-13171,0,0,699657c265d040f82de898618a447265bb42e4c5f15629b32474eb0a58331 CVE-2024-13172,0,0,4be3076bfc8edd49ff4de334b04e8f62cacb071216b0af58069e07996765e5eb,2025-01-14T18:15:29.110000 CVE-2024-13173,0,0,2768d4d30b9929c378ae1adc2bb52bbd8a72496705430c6e9fec10944c8109a2,2025-01-08T15:15:16.577000 CVE-2024-13176,0,0,1cf45d61c3123e29f04ede9ad254eb9e81a9c3e712b42a472e33ac8838112b90,2025-03-18T08:15:10.200000 -CVE-2024-13177,0,1,86ef447c187d49ac5e4b57400fc3a6404f154c5d0f602d75aebf6655a1665424,2025-04-15T18:39:27.967000 +CVE-2024-13177,0,0,86ef447c187d49ac5e4b57400fc3a6404f154c5d0f602d75aebf6655a1665424,2025-04-15T18:39:27.967000 CVE-2024-13179,0,0,9d2a982b824c67bbacd2e3f4856194d80faa53a9ffb503fdbd054d373079f25f,2025-01-16T21:01:38.177000 CVE-2024-1318,0,0,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bbca,2024-12-31T16:56:50.763000 CVE-2024-13180,0,0,d8eed302f18bf4ce52a1f3c3aecacb18daed8ee47876692255a4c4adf22e5203,2025-01-16T21:01:52.650000 @@ -247681,7 +247681,7 @@ CVE-2024-13203,0,0,11bfc55ed42972063fc955c2d0c8f69f70cddabebfe720251245a4b26fa00 CVE-2024-13204,0,0,65f8720725fd1a4a26e6a07126f7187b2bc7f465df068f740193be0f23776236,2025-01-09T03:15:24.603000 CVE-2024-13205,0,0,c2b814e909720e3001fd89a5a2654cdb94030a96383d50b5af0f45d2ec228e85,2025-01-10T13:15:09.097000 CVE-2024-13206,0,0,38f706ce6b6c370d84f9fdfa1a0fa83d7b17374dd65798f61119206bb3782636,2025-01-09T04:15:10.990000 -CVE-2024-13207,0,1,a4f96c10ae9949ccde3537b26d72e1eea0400e38ab370a42de894af380d79fcc,2025-04-15T18:39:27.967000 +CVE-2024-13207,0,0,a4f96c10ae9949ccde3537b26d72e1eea0400e38ab370a42de894af380d79fcc,2025-04-15T18:39:27.967000 CVE-2024-13208,0,0,71bd2688b33e8c87e0e4d0e01f1e5d39fe709ca8ed68375fa7ac3f8572225776,2025-02-18T21:15:19.743000 CVE-2024-13209,0,0,baa015cff758be58106afa3e01020f1bdf5549c5f97e2b61a17a79470f399e57,2025-01-09T04:15:11.683000 CVE-2024-1321,0,0,30e32da96fca5d7cb6d75d56eec50ed4acda46aa46332d8960f720d659578da6,2025-01-15T18:27:07.990000 @@ -247819,8 +247819,8 @@ CVE-2024-13333,0,0,413ea7e4b64b8aef5dd8714980de1abedc1d4af046b4d782740c89a880443 CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655747,2025-01-15T04:15:19.720000 CVE-2024-13335,0,0,20c8c7696547a710a7247fc1375c3fab2f06247460845b286129a3d00d1d053e,2025-02-05T01:37:46.517000 CVE-2024-13336,0,0,0617973929b7ee171ae51423b79a35eb33e0e7b251f4a98140a45686002fe4e1,2025-03-06T15:11:50.350000 -CVE-2024-13337,0,1,316d7fd32d4a67f8bf57cbfb4d8a540e1974365c070542959594e3c9a81d5c10,2025-04-15T18:39:27.967000 -CVE-2024-13338,0,1,a5313cab3eb4dde2da0e5c262e36fa09b910817eaacde52c98d73f8c3da50c4f,2025-04-15T18:39:27.967000 +CVE-2024-13337,0,0,316d7fd32d4a67f8bf57cbfb4d8a540e1974365c070542959594e3c9a81d5c10,2025-04-15T18:39:27.967000 +CVE-2024-13338,0,0,a5313cab3eb4dde2da0e5c262e36fa09b910817eaacde52c98d73f8c3da50c4f,2025-04-15T18:39:27.967000 CVE-2024-13339,0,0,340eea0e2bd475f42d733c8b21f5a4ae0c4c2c22f00aa8474acaaa1473a3f477,2025-02-26T13:36:56.200000 CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000 CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000 @@ -248086,8 +248086,8 @@ CVE-2024-13593,0,0,fa3fece164aaf9e5bdce4149920be38daaf35514256e02e0d8ee1f95b69ca CVE-2024-13594,0,0,e40694f60357c551d50cfd64c32b62fc5a068d57b870210e0ac9e99e736df254,2025-02-05T17:01:24.577000 CVE-2024-13595,0,0,0af37cc42779bfca530d3961d770211d9305aca9c7ecdc98a5bd6399b4365465,2025-02-21T18:11:08.257000 CVE-2024-13596,0,0,2b347cb4a79836e676774e7c831f562b3de9868f3b716c19ca500dd58b6901ef,2025-01-31T18:16:35.347000 -CVE-2024-13597,0,1,f2f3052ed9b48e5adbd1969b386ed5b49b37ab884c9b35b3746cb48d340c5c37,2025-04-15T18:39:27.967000 -CVE-2024-13598,0,1,8bebbc65e3d5e0ffe2bb2a4bb38c54309b15c93221f75a625ac972e5d18c8e41,2025-04-15T18:39:27.967000 +CVE-2024-13597,0,0,f2f3052ed9b48e5adbd1969b386ed5b49b37ab884c9b35b3746cb48d340c5c37,2025-04-15T18:39:27.967000 +CVE-2024-13598,0,0,8bebbc65e3d5e0ffe2bb2a4bb38c54309b15c93221f75a625ac972e5d18c8e41,2025-04-15T18:39:27.967000 CVE-2024-13599,0,0,03405f2c3d79b505fbb84b1ff3dea79fdc81e050ef9a41f4a5537eddbfaf081d,2025-02-04T18:13:20.930000 CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb8486a,2025-02-05T21:46:19.363000 CVE-2024-13600,0,0,484c9129acb282fae32ab7c653ddfde69cea1c6dd837845606bbf7ace7ea91d5,2025-02-24T15:56:30.290000 @@ -248101,7 +248101,7 @@ CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e552 CVE-2024-13608,0,0,b8b173401de3e1097c36a401f8928ae8cd5257912fc8cac1e3eea9f3234c491d,2025-02-19T19:15:14.260000 CVE-2024-13609,0,0,007c027106c3ec1d23edeaef367a828bff90431ee7cff957b7b00cd86e9cc2ee,2025-02-21T16:06:13.673000 CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000 -CVE-2024-13610,0,1,b0ce27273d6e93fea1f19ac44a0729655c663da7a2b5596f05299dbcee2c870a,2025-04-15T18:39:27.967000 +CVE-2024-13610,0,0,b0ce27273d6e93fea1f19ac44a0729655c663da7a2b5596f05299dbcee2c870a,2025-04-15T18:39:27.967000 CVE-2024-13611,0,0,12cf0d23fdb6ecb0f110f9a143d60d61370605283cf62e7faa4a9aec63988bc1,2025-03-01T09:15:09.220000 CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000 CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000 @@ -254727,10 +254727,10 @@ CVE-2024-2719,0,0,0f1354c295052f9eab2ca9f2c209587a31fc5fd6495412ff81d6aeaf6590b0 CVE-2024-27190,0,0,ae28f7be603d69c48f9e6d73de7bafd6cbc321f3b7cafd6062aaa9b60156f42e,2025-02-14T15:54:14.630000 CVE-2024-27191,0,0,7e1a337757b8aff8d2dc69e1e28fb2265d47c37e53b8f0b5f2b0f8fde7334696,2024-11-21T09:04:03.993000 CVE-2024-27192,0,0,767670ef275580ce021e633de9a65889e976bf6dca5c2f5778f38bc12d297187,2024-11-21T09:04:04.123000 -CVE-2024-27193,0,0,f07656366dc531df102a1404f6e00426e458de4576b2777141c911593e2bcd50,2024-11-21T09:04:04.250000 +CVE-2024-27193,0,1,229d08bfc95dfccc67969d41511c63ad5c13934cfab8205edd44a3b4e47f3715,2025-04-15T21:12:22.507000 CVE-2024-27194,0,0,77f39e66620166402b75f895266d73cb4a34149d5e8e0b17910bb63c46218f10,2025-02-28T15:24:32.960000 CVE-2024-27195,0,0,68f85d3e1201e3452938e14e0e91cce1f14d6d9125dae2a69df328af01a2534e,2024-11-21T09:04:04.517000 -CVE-2024-27196,0,0,c974b6c0b1f82a6c341ae450a21ff1f8a075bfc0feac22ce9dc831baf4cb8b9f,2024-11-21T09:04:04.640000 +CVE-2024-27196,0,1,19ab7cfc48da2fbf7f347367d54f57b15bf839338566a862fe5f8a3e2f692e45,2025-04-15T21:12:42.587000 CVE-2024-27197,0,0,08fc2d714f1d12ab320703fdbc50d6a91db99df17169281351a6ffac5a71715b,2024-11-21T09:04:04.763000 CVE-2024-27198,0,0,de438747af70d3a35b18668b9b31d3da0ee0ca592d998e76d2e324c336123584,2024-11-29T16:25:32.523000 CVE-2024-27199,0,0,82ee3c054db940a599ef04a223b1edddbc0af922d3b2c864cd97a9e1669b1412,2024-12-16T14:56:40.747000 @@ -257203,13 +257203,13 @@ CVE-2024-30470,0,0,401350549a9af2e6d47de73b92a22226a42adb8030494eebd3f507fd43cb0 CVE-2024-30471,0,0,7f05159d7b1bb52c7f44f1503d91bcf3ddb878300d6d0f685babe2188a880de6,2024-11-21T09:11:59.580000 CVE-2024-30472,0,0,f99421b44702b1bfa7591fc35986a5e44a7c75afd2395131e35a18241f34b854,2024-11-21T09:11:59.780000 CVE-2024-30473,0,0,8a48066726a6946e8d6fbf02f4834d5e17669616d02513742cf7028713d497f7,2025-02-04T17:22:53.270000 -CVE-2024-30477,0,0,1f06fafdb180549f7981332dba6500c527ca195ec45e14adf493e6ed7b3bc4d2,2024-11-21T09:12:00.047000 +CVE-2024-30477,0,1,e42f47c65842ef66dd6cea84df40c2a25eefb42f04042d77625f907cd9d4f4fa,2025-04-15T21:08:30.220000 CVE-2024-30478,0,0,57b57e3e4f162ea7cfadf849d46428d19ae0d3a9359405a225487d2e35ac783b,2025-02-27T14:58:49.950000 CVE-2024-30479,0,0,3a1c45d84b195b84f8d4de162f387c14126668af368e7be294e7e3937eb3e371,2024-11-21T09:12:00.287000 CVE-2024-3048,0,0,b45859794096e9789b16af327bbbaf4ffd55ea7d3fdff52dc4d2a53dcaa166fc,2024-11-21T09:28:45.697000 CVE-2024-30480,0,0,2e15e0231151aa8e84d8885d70d7113ba628105d9affd7bdb295edcc9c141e57,2024-11-21T09:12:00.427000 CVE-2024-30481,0,0,8631cbb9c51a50d99523b794faa2947095770ff7160a8a0de8a87dffb815cc03,2025-03-14T17:15:43.727000 -CVE-2024-30482,0,0,f16efce3b0eed7fab2fe9a35a331c3bbafdeb8eda41efff6fe45ca866003c709,2024-11-21T09:12:00.690000 +CVE-2024-30482,0,1,f6f54b9eb02af953bb9f4e117500585a9dd85b8003a40b487b6e8de43289e884,2025-04-15T21:11:59.110000 CVE-2024-30483,0,0,77901ef91c5ac3a21f7e5b31c77894523145af0ee84fa46e93b8cba650cba3b5,2025-04-08T17:05:11.560000 CVE-2024-30484,0,0,1fdba9dc6ba163c6ba4b9414dc5d5c3d692e31129a19f55068cab57903ac52c7,2024-11-21T09:12:00.917000 CVE-2024-30485,0,0,959873beb181fc032ad160c5aa64db18502af2ec0b5777f048b062bd1212809c,2024-11-21T09:12:01.057000 @@ -257602,7 +257602,7 @@ CVE-2024-31095,0,0,d1046656b410107279b99c358be2acf5f04867a301c14644a636e95218778 CVE-2024-31096,0,0,258500fe10555b5234d43d3128e9871fa98e9b5064209c7ef1d251f008f6d41b,2024-11-21T09:12:50.880000 CVE-2024-31097,0,0,569dd2a8923221b094f4de10b97379219aef9cd0a0e33ee4ab1f5cc066cbece8,2024-11-21T09:12:51 CVE-2024-31098,0,0,9bb1c3d9cab75da0d75de47529759911056cbe7515841809febef0a6c27129e9,2024-11-21T09:12:51.113000 -CVE-2024-31099,0,0,493441b298df6868ac645cae4f6cdd9b7876591729dd5933a488789e690316b3,2024-11-21T09:12:51.237000 +CVE-2024-31099,0,1,09fa0f50a8499deea46ba2d7d283a23f339dbbc9e1dddb3c5e032092ea56c47f,2025-04-15T21:11:00.347000 CVE-2024-3110,0,0,c45ee200841ab52834df76da82849793179d444adb75f7ff4244a907d73096c2,2024-11-21T09:28:55.220000 CVE-2024-31100,0,0,9579fa3bbaacff8c7a6010e2053e318c346692d4f12a58cbff3397a0b92b48dc,2024-11-21T09:12:51.360000 CVE-2024-31101,0,0,75523336de12432b9edb0fbaf328269569e92aa44fed7ad856473fa15f56b3db,2024-11-21T09:12:51.473000 @@ -259569,7 +259569,7 @@ CVE-2024-33648,0,0,a3f998e477351e33e8eb564c7d09a85f92b4221cde0c0188d0615ced3d342 CVE-2024-33649,0,0,cb77f07b931e258d2b1ccf1b17f8c012857c5f1554b01a2903119681ceee8d2c,2024-11-21T09:17:19.180000 CVE-2024-3365,0,0,51804d734ea1d797d23e7d42d0d92b9e643465fdc46c654f8741c2c57f64b5b7,2025-02-10T23:13:58.790000 CVE-2024-33650,0,0,9178a81706ac732c4c4fdd0be6efbd33d3c9ba6ba04ce6abfc42737525387065,2024-11-21T09:17:19.303000 -CVE-2024-33651,0,0,517c1f33571b21262d3f6d421b54d4d65c6ab96f9b081ab6cd6ce1641154a097,2024-11-21T09:17:19.423000 +CVE-2024-33651,0,1,10150224d05cc9be835ccc550ee273ea4cbae764e1dbecc94e95a36a92a59c4b,2025-04-15T20:02:09.200000 CVE-2024-33652,0,0,7f1d56e827d12418fc0802b3b603113aab1a2247c73b0ff8d17b5cee75c57ee4,2024-11-21T09:17:19.537000 CVE-2024-33653,0,0,545dec16cb762387bd6572a72d3d27ce0fe959ad86cd9453d55c22e3dd9ff040,2024-11-21T09:17:19.660000 CVE-2024-33654,0,0,679f0da6158c8ef3dbe1a34775a2e16b4b4cf8e03a7e4e9ab0e81ee03fa26fdf,2024-11-21T09:17:19.813000 @@ -260698,7 +260698,7 @@ CVE-2024-35160,0,0,318ce523570aa2a281e98ab12c2ca421a0d155ef6ca7820b4c93b91389e32 CVE-2024-35161,0,0,74d1d58b7caf81c95e1ff919f262e1fd560e12cb383b56b749f45f557e6d48d2,2024-11-21T09:19:50.580000 CVE-2024-35162,0,0,cc3a1e9ad17185933b2ccd6c60215dad31a11f8c95ac23e34980d635d83969d3,2024-11-21T09:19:50.790000 CVE-2024-35165,0,0,bd84a0514dff8a605dc50b54c16c9cc6171c010b56575dd659fe0b7e359e2106,2024-11-21T09:19:50.973000 -CVE-2024-35166,0,0,e7714aa5701f5ed03e0eaa30f8558086883533258790143b7a0c50676961f71f,2024-11-21T09:19:51.097000 +CVE-2024-35166,0,1,d1835ec0ca0be1b8bc12d9f59963f8eba529b0ebb30a28b0b5b3c8a55caa5c7b,2025-04-15T20:56:04.463000 CVE-2024-35167,0,0,c2513d43f656a488b422b88e872f8731ca7a12f09c56525d862172686b3e1b6d,2025-03-25T17:26:21.273000 CVE-2024-35168,0,0,72c360513b343ef3d5d110e12281ef48774c959f016065c2926365e7e0b61420,2024-11-21T09:19:51.340000 CVE-2024-35169,0,0,a1f628ccf8d3c2ce1e9c501ab96fcec6269b275293b150f1cce2b1d591443a51,2024-11-21T09:19:51.460000 @@ -262022,7 +262022,7 @@ CVE-2024-36832,0,0,bc99c97b09ee0afaaa8b7f300e3a80a0a0895cb088adc76fbb005719241b8 CVE-2024-36837,0,0,d83fc28981d319ecf854be01b7dc28f82c71da56080e984abdcd526f25d1bab7,2024-11-21T09:22:41.213000 CVE-2024-3684,0,0,bc358363415738df391830c2c3e66cdd750f4480781ea5b14341855b580ed24b,2024-11-21T09:30:10.410000 CVE-2024-36840,0,0,df76986cf4b78b412b0f52e824699180a22287010c032e08a5b788b4993c826f,2024-11-21T09:22:41.443000 -CVE-2024-36842,0,1,3ce7edb418cafaf6988e43eae4830431caabc689d99ca3a90c85adc25cf71528,2025-04-15T18:39:27.967000 +CVE-2024-36842,0,1,c961a38737d4782b9bf4a845de97e49e191e20bf253effc32962f5ed7df2a9f6,2025-04-15T20:15:38.160000 CVE-2024-36843,0,0,0dd88625e4c7927017ac2ccd743026dc0bf8dec364e7370ed4476d6c15f67003,2024-11-21T09:22:41.673000 CVE-2024-36844,0,0,0db2c3d462d7ef694fdfe2f6888312c32e020055907b6f4c8aa2c7f269d2f9ce,2024-11-21T09:22:41.893000 CVE-2024-36845,0,0,529960ecea926e798a44b8fbaf67e53a1386a02af542112cc5cbae429ea7b091,2024-11-21T09:22:42.107000 @@ -266206,14 +266206,14 @@ CVE-2024-42185,0,0,4fcca28bd46f144c3c51b1a10d7ee9632532ab1dfa9a2d83e50eecb696162 CVE-2024-42186,0,0,184581ed60eb1e6c21e00c7e72f572fc755aec6b14811d01de5d14632d8094ce,2025-01-23T03:15:08.983000 CVE-2024-42187,0,0,1a7e90ec8fd6111568607e7fe4efa4740b10d0987e11092bcc048a6df4194471,2025-01-23T03:15:09.103000 CVE-2024-42188,0,0,a8278cfe50e3ca68bde755bed653483d11589c1acd3e94c1e7362476b4ce136e,2024-11-15T13:58:08.913000 -CVE-2024-42189,1,1,06b5629c8ee24a8ad937342d1441c2754103e3815347b457fd3fd5457eb2cef1,2025-04-15T18:39:27.967000 +CVE-2024-42189,0,0,06b5629c8ee24a8ad937342d1441c2754103e3815347b457fd3fd5457eb2cef1,2025-04-15T18:39:27.967000 CVE-2024-4219,0,0,cd28361343cc861bde40c0bbbee1aabb101ed013946c5589d3ba0dabbead402f,2024-11-21T09:42:24.783000 -CVE-2024-42193,1,1,0e15a6923949a82a61e83f8581ce998d3348a488a008a8775e2069381e4bb7c0,2025-04-15T19:16:06.800000 +CVE-2024-42193,0,0,0e15a6923949a82a61e83f8581ce998d3348a488a008a8775e2069381e4bb7c0,2025-04-15T19:16:06.800000 CVE-2024-42194,0,0,af3a202d05f65dc11d1d1e7b62226f11c65e5914cb08b7ffa3083b3f3386e580,2024-12-17T18:15:23.590000 CVE-2024-42195,0,0,c65de58c728753f86038d98c371fbbe3457add02821d0b6bcc2d79ecc064624f,2024-12-05T05:15:06.923000 CVE-2024-42196,0,0,86572e299010ed9c933dd6e15fc8f817087307b7b1acb778fb2306342762ea6d,2025-04-14T17:16:43.817000 CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d81a,2024-11-21T09:42:24.913000 -CVE-2024-42200,1,1,0d40d0a9831533c58c4d5082f630806b2953e93876b1a4b257ce95620e07d01d,2025-04-15T18:39:27.967000 +CVE-2024-42200,0,0,0d40d0a9831533c58c4d5082f630806b2953e93876b1a4b257ce95620e07d01d,2025-04-15T18:39:27.967000 CVE-2024-42207,0,0,7999bd374d3d2e00ca96b064d6050023c869b6b304031749819fd6f354ea6a70,2025-02-05T16:15:40.447000 CVE-2024-42208,0,0,7279db8edf90469f45fbe58ad50ae0f2729b6abb33262abb49e045282c050905,2025-04-07T14:18:15.560000 CVE-2024-42218,0,0,3bca921601eaa25faf0015687ed4f595ccacf0ae5ca15099cde7ba2db042877a,2024-08-12T18:27:54.660000 @@ -268213,6 +268213,7 @@ CVE-2024-44837,0,0,d99be13bd28102fab04d2436e2423a9abe7e5510be44a84cf457d3b46476b CVE-2024-44838,0,0,8d376af95f42d0d8bf980ba63f53616a78fab858760e0c31e2a6fb218ae7c30a,2024-09-09T14:35:06.773000 CVE-2024-44839,0,0,1b98dbfbdec4a61210e539bb2abdbaf3319f35d3dda44d650971ff8cb9b58707,2024-09-09T15:35:10.797000 CVE-2024-4484,0,0,e9d9ab7a181084a2609fc26ec989da9dcf4a22d48b5c7405b3d8209db6a264e7,2025-01-29T18:26:19.747000 +CVE-2024-44843,1,1,da4bb7e73322abac267cea80c5a56cdc4c85f14eece587450e7b4b35b91d760e,2025-04-15T21:15:46.730000 CVE-2024-44844,0,0,543b67798b80c9f433394b5371f67242f69c06e81a35f5031e65aa2bc37f2c80,2024-09-11T16:24:51.660000 CVE-2024-44845,0,0,be723405d776fcd23ce5801cd5dc6a06dd41574f2f123999283d6be69263ae54,2024-09-11T16:24:23.970000 CVE-2024-44849,0,0,556a0bd4002e0d7931d67df8540866973c154d8cb1d32b49d0c67e3b0c20db93,2024-09-09T20:35:18.097000 @@ -268936,7 +268937,7 @@ CVE-2024-45709,0,0,a0d4e56bb263bc9e47877f3006692003a99a930acd527517129f8ee5e89f2 CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000 CVE-2024-45710,0,0,d5d20bd0fdb7865f82e5f4b909a4d875dc5f3d77d52392f9ffe78a5294c66c14,2024-10-17T20:18:04.277000 CVE-2024-45711,0,0,22c1ac5b6f0da26129aa7e9e3ba97f2e8dcb4bd8ce735f9d8d4ba8f17c970de0,2024-10-17T20:17:29.207000 -CVE-2024-45712,0,1,e32885e49d569b9749cf44e68ed29d149ac497c8e1cc3330412decaf43f37e9c,2025-04-15T18:39:27.967000 +CVE-2024-45712,0,0,e32885e49d569b9749cf44e68ed29d149ac497c8e1cc3330412decaf43f37e9c,2025-04-15T18:39:27.967000 CVE-2024-45713,0,0,32ed7424619f61f0e03fc9972f78fa1c726821d98390dabdc73054fbc284d4f3,2025-02-25T17:15:36.083000 CVE-2024-45714,0,0,c21a61c96d9ad07289ac1311a92c3e561bfa126cb238bbc3e6ffd66427ef24a4,2024-10-30T20:33:59.393000 CVE-2024-45715,0,0,b59b14b28dcb4298df8d6640386a10aa143d80809296166ad7bdf16d746d8447,2025-02-26T18:47:19.923000 @@ -271721,11 +271722,11 @@ CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757 CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000 CVE-2024-49703,0,0,773f468dd20b89d6b077ffb05058547737a4c510a41e2a52930200811683b9b8,2024-10-25T12:56:07.750000 CVE-2024-49704,0,0,53e0ddf4c3ec57125f7e163acf7959921e5634e4438faab081bcfc397dd19436,2024-12-10T14:30:44.573000 -CVE-2024-49705,0,1,fc95cf6d3a9b51ee276cdd8e1908139bdbdefb4092405ae98bf134804b31fa8f,2025-04-15T18:39:27.967000 -CVE-2024-49706,0,1,74d1da98972005252a31d993cb161f28990d6d3996407046dbb9e96f235328a8,2025-04-15T18:39:27.967000 -CVE-2024-49707,0,1,b3b6b46492bf7fb384f56ea3c517bd993f40faecde0318c151ba67c88b5ed016,2025-04-15T18:39:27.967000 -CVE-2024-49708,0,1,b45628aad7e96d8cdfed857ad91cd37098285133628f4a3432113eea8c19bb76,2025-04-15T18:39:27.967000 -CVE-2024-49709,0,1,5e61288f2d29ec31dab9220e7c255dc96f7d51d8eb3e0d69cdba42a02908a0fb,2025-04-15T18:39:27.967000 +CVE-2024-49705,0,0,fc95cf6d3a9b51ee276cdd8e1908139bdbdefb4092405ae98bf134804b31fa8f,2025-04-15T18:39:27.967000 +CVE-2024-49706,0,0,74d1da98972005252a31d993cb161f28990d6d3996407046dbb9e96f235328a8,2025-04-15T18:39:27.967000 +CVE-2024-49707,0,0,b3b6b46492bf7fb384f56ea3c517bd993f40faecde0318c151ba67c88b5ed016,2025-04-15T18:39:27.967000 +CVE-2024-49708,0,0,b45628aad7e96d8cdfed857ad91cd37098285133628f4a3432113eea8c19bb76,2025-04-15T18:39:27.967000 +CVE-2024-49709,0,0,5e61288f2d29ec31dab9220e7c255dc96f7d51d8eb3e0d69cdba42a02908a0fb,2025-04-15T18:39:27.967000 CVE-2024-4971,0,0,17f65e33f654be41e85b2c190603b91b92e7c1a1f8fa7f8e99556cdd76507595,2025-01-08T19:28:26.847000 CVE-2024-4972,0,0,43bdd225cdcbd9a9a4620ce805328bc918966049d5b1be691ed85664aa743f88,2025-02-18T18:38:56.967000 CVE-2024-49724,0,0,9ae8f770760a17b31b8d886f65225c34c4b6c821905cd65185b307a9aeaed466,2025-03-24T18:15:19.873000 @@ -271805,7 +271806,7 @@ CVE-2024-49820,0,0,fe904aab3b1423196226c288487d3e9f35952361c8f61f2d528fcf7833452 CVE-2024-49822,0,0,6694f3da0a0611d56e0827801adf9ea2ee14c80f04d6a4b97c1a71bf68cfbc6e,2025-03-18T15:15:56.283000 CVE-2024-49823,0,0,b9995d30c3d89f300a49ed834da93e73c4c732eba4dbf905de0dceb3a3258543,2025-03-11T01:15:33.583000 CVE-2024-49824,0,0,4072c1a943cc33d63481a74407022b24878ec14cb5f9e9fc6f5cb6ba7f3e8966,2025-01-18T16:15:39.183000 -CVE-2024-49825,0,1,92a25f04c4fa483bb4fc54ae368c07ade0cfe867671a9b0af19f66d0d12d548a,2025-04-15T18:39:27.967000 +CVE-2024-49825,0,0,92a25f04c4fa483bb4fc54ae368c07ade0cfe867671a9b0af19f66d0d12d548a,2025-04-15T18:39:27.967000 CVE-2024-4983,0,0,b82ab4bc704d323c7d9f24e0a3641c93b0503dba6a5392acd5923000e9eef05a,2025-01-29T18:07:43.813000 CVE-2024-49832,0,0,391e39e7c5b3e995146e5c9a1ef83712ccc04ea31043b019d156c859ce3b56e4,2025-02-05T16:01:09.627000 CVE-2024-49833,0,0,329298065bd1bb3d724e94c1deac431743ff5a22858b998a02d9a56030763581,2025-02-05T16:01:01.780000 @@ -272782,7 +272783,7 @@ CVE-2024-50954,0,0,02068458dd8d6a2ffb99f46bf4d0a02d5a8b6d37dbba06978db764a483c08 CVE-2024-50955,0,0,d286c5359e65ec4107e3297ae49fde58b3efeb0287b5581ad11b8684b68fae9a,2025-03-13T19:15:48.793000 CVE-2024-50956,0,0,cd8ccb18453c11262209c6e4973c32ca207270a933eedc52f0d4a58126b3fbdd,2024-11-25T20:15:09.383000 CVE-2024-5096,0,0,158df124ac63cd0f2f1e57be7cd9d0373dc2a0ceea7bd2bb10f556aa3af44df8,2024-11-21T09:46:57.483000 -CVE-2024-50960,1,1,52e9eff87c5805b1c6efba409141f90f7eb73f96f05d98116dabee951bdb7970,2025-04-15T18:39:27.967000 +CVE-2024-50960,0,0,52e9eff87c5805b1c6efba409141f90f7eb73f96f05d98116dabee951bdb7970,2025-04-15T18:39:27.967000 CVE-2024-50965,0,0,bbc6a73cd1df7f436fec355cc047fda3682a22f2410fb27edce07ce2659c6e83,2024-11-22T18:15:17.690000 CVE-2024-50966,0,0,8759d183e73952bff599171ed5ad82ca5c1dd2759a5c3c752a1139d7e8657cee,2024-11-08T19:01:03.880000 CVE-2024-50967,0,0,a510a0bc53da9b8204db12045069c14674f172a420837c75cd83c80e3a09cc7a,2025-02-04T16:15:37.863000 @@ -274571,7 +274572,7 @@ CVE-2024-53476,0,0,445cb11a55503c7fabeb917897f4172db604756c11d8fca90e521e45b43af CVE-2024-53477,0,0,3dfbb52637bb052a793d1b67a024cd50b899929ad7fee8a9366a9aa6e069e388,2024-12-11T16:15:14.150000 CVE-2024-5348,0,0,0c3454114961657672c2409af3f9f2f3bb9995c6579ea15f7d29552347b906f3,2024-11-21T09:47:28.240000 CVE-2024-53480,0,0,7077a8a07c5ab9aea3b93f3fb1448ae811d99f326da3b432b1ee3a545cb8bf96,2025-04-07T15:17:50.370000 -CVE-2024-53481,0,0,27b27d853d2a318f2e3ccb184ed5441547a06d4988dea849df8a41c061ceed2e,2024-12-10T21:15:20.003000 +CVE-2024-53481,0,1,42295212f642a03e02fabce0223d7a7c34a9262a30bcd673c09d07650c426910,2025-04-15T20:35:16.203000 CVE-2024-53484,0,0,0fc6633eb0bb323c7c1b56ffa21d5cd5b78570e350e583a38942d8a30f904a22,2024-12-03T16:15:23.980000 CVE-2024-5349,0,0,75911b9a04c41ba625bf561a6fda73d6a6249d16eb1736f313b0d58e1202f17d,2024-11-21T09:47:28.357000 CVE-2024-53490,0,0,229997de596954b948d854ed350eb8461ad79b06939654658f3b483b570ec130,2024-12-11T17:15:19.903000 @@ -274802,7 +274803,7 @@ CVE-2024-53821,0,0,b7c3c75f4b6c089a04e8e3406d470dc13d99b06ed8676c75f0329d6dc20fd CVE-2024-53822,0,0,b7f7f482bc073bc48750fcb8cb3196b76411ac4c93cdbfbbef09355aef02ff0d,2024-12-09T13:15:41.507000 CVE-2024-53823,0,0,a2fb73f2ed3c264fa2273f50a7bd13fdc9baf0aeba8c2b8788b891ea8f31845a,2025-02-11T13:17:51.273000 CVE-2024-53824,0,0,ba3b0995b198dddbea8e833e326899bd456b4ee76119ba0f40443a51770415d1,2024-12-06T14:15:24.800000 -CVE-2024-53825,0,0,07af7202ddabda05f0daeb42ca06edbcf3fb20c192ea7ca7dd7082861a20bb4a,2024-12-06T14:15:24.937000 +CVE-2024-53825,0,1,714414fc0042e8a7a833c54f74289a59b54cc0b638c247eb94cf442e45262c31,2025-04-15T20:55:02.877000 CVE-2024-53826,0,0,0b04b1b5846f39442507bbeb125d0ae4870d599699b329db9d8ecf7c2429b842,2024-12-06T14:15:25.077000 CVE-2024-53829,0,0,5da8bd9f2a723130fc67f6c200a52276b15a1d0328bcee21413008a77bbd3916,2025-01-21T15:15:13.200000 CVE-2024-5383,0,0,6a0b78dfba876119b07ab0802e74360deaf34253afeae700b6ed020916255028,2024-11-21T09:47:32.963000 @@ -275099,7 +275100,7 @@ CVE-2024-54208,0,0,d539e5a7313a31627790a03faedb2bd0395cc03d7fe3db590e0c3a313f878 CVE-2024-54209,0,0,63985ab9bc81167d6b4445b0fd25467b7cea6675e8cfc38804b37f47f7d14485,2024-12-06T14:15:25.790000 CVE-2024-5421,0,0,a1fc69c47db10c7a773a385573d9005cca98c8929acf930b163cee98620da0fe,2024-11-21T09:47:37.330000 CVE-2024-54210,0,0,f83f30ee27a661d46c5111f7262e27c9f0414dc5f3f0a660c29ce543d494f75f,2024-12-06T14:15:25.940000 -CVE-2024-54211,0,0,2422c8fd409acc1726704515da2f130f881015a0f765274d92b4cfe719dabe49,2024-12-06T14:15:26.093000 +CVE-2024-54211,0,1,c1f9233d8623a38d693d81603d35fc19f61cb45c8318fb3111a6fbfc8cd81d90,2025-04-15T20:35:50.483000 CVE-2024-54212,0,0,da37889d055399d33765c37e42d340a0af015f6364c0cac2ae31e2305a826bce,2025-02-03T14:33:05.887000 CVE-2024-54213,0,0,509cdc61113dccf0a4117c9f17cbb87e45d7a6efba5fb2b5bc372f73d2bbb0cd,2024-12-06T14:15:26.373000 CVE-2024-54214,0,0,6a0d19ffe7e7425aef813bcf3c1322b00952909677745d5ce26bafe4dfab7e84,2024-12-20T13:15:21.880000 @@ -276279,7 +276280,7 @@ CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000 CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000 CVE-2024-56404,0,0,0922979315c1e629cdb1fe6a847df3905e5c41f9b68e7cd17dbd9ff65fcb7683,2025-01-24T18:15:31.883000 -CVE-2024-56406,0,1,a51c8c859f1431c900d04197f06db42321d181628995611326592b2730a847f2,2025-04-15T18:39:27.967000 +CVE-2024-56406,0,0,a51c8c859f1431c900d04197f06db42321d181628995611326592b2730a847f2,2025-04-15T18:39:27.967000 CVE-2024-56408,0,0,afea4ec88a0c4f08d13a60e8ad60ee434ed5e10f4d4e8338b1f856c6e34cc00b,2025-01-03T19:15:12.533000 CVE-2024-56409,0,0,a43aa805ff701655a22fb4deb11b925e5e1108fad53ac1562d0e2d49e92fea52,2025-01-03T19:15:12.627000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 @@ -276365,7 +276366,7 @@ CVE-2024-56521,0,0,9fffd2d33d5e032f4dea69c35a0383d33eb10d016355c08e207b6cf004548 CVE-2024-56522,0,0,c0719b044dbc0fcdc0d4eaed012a8c95725e84ecda329fba60f601478e6101fc,2024-12-30T16:15:11.920000 CVE-2024-56525,0,0,d6729633b717b4b202a836c9421934b16a82f4fe7ee35b2e24fe7351b6d5cc20,2025-02-25T15:15:22.190000 CVE-2024-56527,0,0,96fba30809b836cf267eca65f8263ec3d49c4c998fb626aebb92216fb24016fc,2025-03-13T14:15:33.533000 -CVE-2024-56528,0,1,a13f5e8493d5f1cbe9994bee7ebc88ff8bcd8fdf0828d08b3cd39cfa5e146288,2025-04-15T19:29:19.070000 +CVE-2024-56528,0,0,a13f5e8493d5f1cbe9994bee7ebc88ff8bcd8fdf0828d08b3cd39cfa5e146288,2025-04-15T19:29:19.070000 CVE-2024-56529,0,0,94ecc5e7888c31e5ca74e56cbfc874e3d0b30a8176cba1c69f30edb32e91d375,2025-03-14T17:15:48.860000 CVE-2024-5653,0,0,c6a9df87d03b4f19acef7e9a86e0e953cc0289ec3d2d41a0a6478834d57899a7,2024-11-21T09:48:05.873000 CVE-2024-56531,0,0,9232cb3a908777655dbde1aa267550e5ea5aa16a08b8557030526152c4ddd82e,2024-12-27T14:15:32.503000 @@ -276805,7 +276806,7 @@ CVE-2024-5713,0,0,3391d5de33d01a2f3feb723b6a12c2cc29413174b2bdbe5c4e85347aebdc9b CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190ce,2024-11-21T09:48:13.440000 CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000 CVE-2024-57151,0,0,944a6dc3ba475fdd7447be0228d927a06d461ee99dfa15dc00e8962d0a8ee7c4,2025-04-01T20:37:14.433000 -CVE-2024-57159,0,0,3faa9b36a72056ed0de234550b823c928aabb660836be443f2d509165eec936c,2025-03-13T14:15:33.960000 +CVE-2024-57159,0,1,6ff8d890a48b868e1ef76fcf68f0b7de6ceff53d2f06ec9d1f21dea304a0a248,2025-04-15T20:09:13.510000 CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000 CVE-2024-57160,0,0,21efe21d39d81640d4b28d9b56e9e9917bc8862bd99f1332fce5cfffc07d8da0,2025-02-24T19:38:22.867000 CVE-2024-57161,0,0,2a35bb3f44d198292743676a0dabcc3033caa3631e24c5b8bbfb982d9a2e1148,2025-02-24T19:38:43.083000 @@ -276986,7 +276987,7 @@ CVE-2024-57608,0,0,f13d7092b69ab1bb8b9d9e29e8d71dd51ba622da797972897165fa9f6e4af CVE-2024-57609,0,0,7e89dbfffc522c22f84645f0c7d618897ea46d1866f82abe6573f3d9437ce18a,2025-02-10T22:15:36.660000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 CVE-2024-57610,0,0,fb8a513d5a0e34ee3275d17e53b163d875527cc466c4bde851405005eb787883,2025-02-07T16:15:38.303000 -CVE-2024-57611,0,0,5a6260621739d59dcd08f111a764de6bcadc66f193b1b7892272336da3d323c2,2025-02-03T19:15:13.717000 +CVE-2024-57611,0,1,1a44a6e848260c153c374cd7a7dd1b6b1699c97f231ca84e16da3b026bcc3d63,2025-04-15T20:09:27.233000 CVE-2024-57615,0,0,98e8a28bdace50d5f45e1775168c7094162a33c2febec26063bb19f3c5854617,2025-04-10T18:11:22.227000 CVE-2024-57616,0,0,061340d922d9b6167b6dd317b62ef6e1d4f76c1c99247e13889d4df96ee3bbc8,2025-04-10T18:11:10.737000 CVE-2024-57617,0,0,01d003d47eee8511b3ca5fd6d6d547ce8ec710ae3bb0499447af1e1477b84edb,2025-04-10T18:11:04.720000 @@ -280553,7 +280554,7 @@ CVE-2024-9225,0,0,1704719e0ea2e5f5e0606a9d5d2023b553aeaf4205c1ecb8982fb87bfe7ba8 CVE-2024-9226,0,0,737254889761e79043d7b1ce1fabb643ec8682cb3fdbebee93469fa9d609c8b3,2024-11-12T13:56:24.513000 CVE-2024-9228,0,0,f832c4e68b6d914b6db8d0a26923de9ac2d359b666ae353a594a1dbebd259870,2024-10-07T19:01:04.960000 CVE-2024-9229,0,0,8ca2c97a38c4e01347e36dcc5beaf6ee08ed3c0d4d835cdeaff8b3cc58e2c1f0,2025-03-20T10:15:47.603000 -CVE-2024-9230,0,1,86194dd12fc66a2bf53238d796ac2faec5cef3d5734d289e1ea2ba20d095e55f,2025-04-15T18:39:27.967000 +CVE-2024-9230,0,0,86194dd12fc66a2bf53238d796ac2faec5cef3d5734d289e1ea2ba20d095e55f,2025-04-15T18:39:27.967000 CVE-2024-9231,0,0,07b78bcf598bdcc4695b3c1cf7651973edb0c6022b910ae480cfe1459ca81ece,2024-10-30T18:56:03.380000 CVE-2024-9232,0,0,c437dd6828a2bb6c2fef4b80c8004716f23c3f046aa60d93e2c14ad1e09f2d4f,2024-10-15T12:58:51.050000 CVE-2024-9234,0,0,c697ca46bb4a35f9e405ad10af95fb57a9d88346748e059f61a0140ee2b3f87b,2024-10-15T12:58:51.050000 @@ -281285,17 +281286,17 @@ CVE-2025-0115,0,0,afde9450c6a9a3c952e2cc5bf26fc5be7906a5e6783c860dcea8a013cdf1d3 CVE-2025-0116,0,0,755d3babec7a4fcd8fc3f5dd9f72be7aec497d243dc731232b3ce6e1fc0a553f,2025-03-18T00:15:12.860000 CVE-2025-0117,0,0,c368ae59fb321c63f810db1cb0ec2feda0287727ba4def77cb7fd0f7f9859486,2025-03-12T19:15:37.883000 CVE-2025-0118,0,0,2549278d26918d76bbeca0606d91920cad877d84c662cacbfb360849c8582ba7,2025-03-12T19:15:38.040000 -CVE-2025-0119,0,1,b7e2a1326c3c636b0f945ffddba72f3e3ab522cf3742d5abd8d23d66745c6b08,2025-04-15T18:39:43.697000 +CVE-2025-0119,0,0,b7e2a1326c3c636b0f945ffddba72f3e3ab522cf3742d5abd8d23d66745c6b08,2025-04-15T18:39:43.697000 CVE-2025-0120,0,0,a71d3a1a4937cf377933679e94f42c26db7ae6a866f56967f3e6058c59f88b4c,2025-04-11T15:39:52.920000 CVE-2025-0121,0,0,ab1b5f513492b32da52a345b509b42810605f75413b2320c976db919e45e2e95,2025-04-11T15:39:52.920000 CVE-2025-0122,0,0,8a7047ba6772458fc769cae5828f4011d52f01fea8b67b5172f392f80be1dd9e,2025-04-11T15:39:52.920000 -CVE-2025-0123,0,1,a7088e566bc8804d17ca62220e284e92107359310cbd692ff90014b5f96e882a,2025-04-15T18:39:43.697000 +CVE-2025-0123,0,0,a7088e566bc8804d17ca62220e284e92107359310cbd692ff90014b5f96e882a,2025-04-15T18:39:43.697000 CVE-2025-0124,0,0,e8e197ac1ff008b828a5380a9e0103c84e5c3ab32fd8d558caf3d218406b568b,2025-04-11T15:39:52.920000 CVE-2025-0125,0,0,e554dff44f9688a52010db8440762a4a8d907276dd2745e071baf7624a2a0b91,2025-04-11T15:39:52.920000 CVE-2025-0126,0,0,1b4453e3324d0750a93960a33294f4914c0302b059bcbcc71281d7c9d513d6bf,2025-04-11T15:39:52.920000 CVE-2025-0127,0,0,e303a9a2c01a285aee210c2131c17c310104b348913f180c4d8d27a3c936dc7b,2025-04-11T15:39:52.920000 CVE-2025-0128,0,0,5a6e1f2103fed6b7d0a6d6bd4052b1f0b447f16d29b0b3df590d2aa9e8e29a5b,2025-04-11T15:39:52.920000 -CVE-2025-0129,0,1,45927dc1925492fd76c2818825a15c4f4aab00dcdb7f22ddfb7265326389851b,2025-04-15T18:39:43.697000 +CVE-2025-0129,0,0,45927dc1925492fd76c2818825a15c4f4aab00dcdb7f22ddfb7265326389851b,2025-04-15T18:39:43.697000 CVE-2025-0142,0,0,79348507832bccb3dfb1eba9563d5795fbadbc3e9e1a05cb5ea2a751abd30411,2025-01-30T20:15:33.853000 CVE-2025-0143,0,0,09ad13005701a80a3a5816ecb54ffa484521fbf4e695c8cfa61de5a2bf3b5e04,2025-01-30T20:15:34.050000 CVE-2025-0144,0,0,b469d06026fa315960ae1810bc5062e8f3147e0d9b9578adc31dd388525d8f25,2025-01-30T20:15:34.210000 @@ -281608,7 +281609,7 @@ CVE-2025-0535,0,0,05ca9299a72ec8427b3cfb190dd5e4f1a4ace07a5a3821216637564157729b CVE-2025-0536,0,0,412cd2683e58a1de99579b236649cb4bd6b2182db9918e53a30fe5cc8242b56b,2025-02-25T22:25:04.860000 CVE-2025-0537,0,0,ac18629f3505fc8d01ed75e493b563a9195f7e930c5c5595394a818b3f1d8d86,2025-02-21T21:32:41.437000 CVE-2025-0538,0,0,23a74353ce4d38faae66783e1cf58936a188bf24527270171417447ac3a1997e,2025-02-21T21:22:54.457000 -CVE-2025-0539,0,0,326b78a03709c90b6f68f49b47aee385b64be7e3ba45fcba103bfb0f94b9f0cf,2025-04-11T15:40:10.277000 +CVE-2025-0539,0,1,01338d3007fbed0c07a97410003c396b6f067e559c537340d9f166a7af40a5ad,2025-04-15T21:15:46.847000 CVE-2025-0540,0,0,477bb769b8d3e7a17387e56bf8963022110dfb0384c277c279161d54e393c481,2025-02-07T14:58:25.477000 CVE-2025-0541,0,0,185bfc59de787ff6a7aed59304dec973fe8c904f3f2e9dfa433a1fdef3b0c726,2025-02-25T22:22:22.760000 CVE-2025-0542,0,0,6313331796a87cfd429c6887ebdeb1b0129ce5eba24c6840f8a5db7fe9415456,2025-01-25T17:15:21.030000 @@ -282012,6 +282013,7 @@ CVE-2025-1117,0,0,689febb6066d1fec82c60e215bad724ad5df8fa85c4636fc9e776b8da79fe4 CVE-2025-1118,0,0,1d46e95b87fe7edb9839b43fa6447bac85df34e285b438ecef13347991dc098d,2025-02-19T18:15:24.280000 CVE-2025-1119,0,0,ed2f2afd1626a47beb4c308f115314a6b5ebef6317483cf0ebb458fbd885cde2,2025-03-13T07:15:36.517000 CVE-2025-1121,0,0,8d7e51789a8f4e6f72fe04d25da7f8a750f4217ccc4197e0d9fc4face52a96bf,2025-03-07T20:15:37.407000 +CVE-2025-1122,1,1,f3e0ce55b1063ef25374adbf21a81c79dd0a770c87594147ae61d99dd002e6d5,2025-04-15T20:15:38.317000 CVE-2025-1125,0,0,2f04992a8811506ffd86df04ce8fd4c4eaf818b2350c9b37d99c1e9008bb7d98,2025-03-05T21:15:19.707000 CVE-2025-1126,0,0,75a0af68b2de42873e4ee33ccd68bb162ec9dabf122dea8ebb0bf11a24b953a1,2025-02-11T17:15:23.537000 CVE-2025-1127,0,0,5cab03037829677b3ff4c77d268b6ebc0b526a062cfabc702392a7f88c64ffc1,2025-02-13T19:15:14.153000 @@ -282125,11 +282127,17 @@ CVE-2025-1268,0,0,f3575a32c76699685cbba5c7bf003a9bc75e184925f6768d4d4c92dd8992c2 CVE-2025-1269,0,0,3d8990f3f321bb84afc5ce31cc37206b4dfeae7b9639d4320eceb6f39d26cfbc,2025-02-18T14:15:28.513000 CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000 CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000 +CVE-2025-1273,1,1,c2bca940f1bdeef6600611cd0a99c7d3017e0bb45ed6e0c14d0e204d38f6af00,2025-04-15T21:15:46.960000 +CVE-2025-1274,1,1,d5c2d135120b1dcd87153413d542d166559e45e8a9c39760d0547205b0a5f685,2025-04-15T21:15:47.083000 +CVE-2025-1275,1,1,950e93f0a617d35bb4695c3a50f89235254d837b41e1c061ae2672969dec0b2d,2025-04-15T21:15:47.197000 +CVE-2025-1276,1,1,3c7c46d371822ca32d835a6a77d602aa42d6d5ec142717eafdb8908365b3f96b,2025-04-15T21:15:47.320000 +CVE-2025-1277,1,1,27ad5edb8b5d58ed0b79582b9ca062a189d335ec696b140edb8e7272273209ac,2025-04-15T21:15:47.443000 CVE-2025-1282,0,0,09bbe8fbf6ad958ee527dda55af05e43520fd8fabad49e275c5ad8ac54adbc57,2025-03-11T16:08:00.790000 CVE-2025-1283,0,0,a4d93a77d81ec07731b68bab3e1d00afd05dc0ae7fee050881be213abacce036,2025-04-10T18:55:23.537000 CVE-2025-1285,0,0,3182990c1bc942ab8f686c8030ea96842badd7c599b496272a03f16c99f15c97,2025-03-14T05:15:41.977000 CVE-2025-1287,0,0,c1d2e5c86643fd051f72a870384be2d364cc20de377757abb01837028348772f,2025-03-24T18:19:22.993000 CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000 +CVE-2025-1292,1,1,22d03f0e785d5cad8379c9d04d9986dc417bc86d80895142eee402731f934d2f,2025-04-15T20:15:38.410000 CVE-2025-1293,0,0,60a11b51b89461cf0f7c120de5ab3c93294ee5f6a5e19d6ba8d0bb06e8828d44,2025-02-20T01:15:09.950000 CVE-2025-1295,0,0,2a4bc8a9e306b7d7cae49d0fff6161acb070f2799f35d70bd6c6546c6dbde442,2025-02-27T06:15:21.990000 CVE-2025-1296,0,0,d95bfd9a7f0753e22aec4081e35e5f3d5b17ed2789c524a1845821d0907a79ad,2025-03-10T18:15:30.237000 @@ -282239,8 +282247,8 @@ CVE-2025-1449,0,0,96e80016899d7efd6b5903e0bd5984545e6534e36d574b5746b82bf2741684 CVE-2025-1450,0,0,f0a28cf37155f4c16fff9326b0ffe6a415c6c5c1475546052ba68718728afcec,2025-03-11T15:46:05.180000 CVE-2025-1451,0,0,12a938aee967d5ea2c9b43d523c78df71d3aa4fc1d58b85bd5cbd9ad34dbd3d2,2025-03-27T15:40:03.640000 CVE-2025-1452,0,0,3e2a2b961d493642668dd5d757e3135aee03e85d6914645ab6a62b9e89b5cf1e,2025-03-27T16:45:46.410000 -CVE-2025-1455,0,1,a722a284ad67ecc7a44b18be73677728bbf83153c8ea8adb2278c4479749ad2d,2025-04-15T18:39:27.967000 -CVE-2025-1456,0,1,7385fec8b9655177bca81181cb9eb82cb5f3b35e5e54267ee0945e55844805e5,2025-04-15T18:39:27.967000 +CVE-2025-1455,0,0,a722a284ad67ecc7a44b18be73677728bbf83153c8ea8adb2278c4479749ad2d,2025-04-15T18:39:27.967000 +CVE-2025-1456,0,0,7385fec8b9655177bca81181cb9eb82cb5f3b35e5e54267ee0945e55844805e5,2025-04-15T18:39:27.967000 CVE-2025-1459,0,0,84da8b0d00734a81887e372630f8aae1161cbf72d12203a68a08585146659d7a,2025-03-01T07:15:10.980000 CVE-2025-1460,0,0,a5c8e5382cd35abbaca03691402634777bdd210b53f824eaa70027825fcc1ff3,2025-02-26T23:15:10.193000 CVE-2025-1463,0,0,2a489d18ab145c49d92d5d5423e0c75c250fe44656454c4f0f8f59222848993b,2025-03-05T12:15:35.270000 @@ -282375,6 +282383,7 @@ CVE-2025-1650,0,0,4218c32cbb82256e1ff0a9ceabf09dcbbee0c890d930e1b88a57eb073009cf CVE-2025-1651,0,0,dc02b23df4eb433cfaae6381155dd744e0ca82e8901f8e7d30555b36cffdf17c,2025-03-13T17:15:36.153000 CVE-2025-1652,0,0,40ae07eb9aa50c5b6645abc9188293b11d3a3751f84fa68087927a34dfc8a3ac,2025-03-13T17:15:36.297000 CVE-2025-1653,0,0,81399ad7d0a3dd190eaf3e76c57ec1bd3ec75f06763142e168c62e4df94036c7,2025-03-28T13:17:33.270000 +CVE-2025-1656,1,1,42feb064272a740ae1fc341309f6c2004754f0986c5c214cd995429f1ea6c8f8,2025-04-15T21:15:47.560000 CVE-2025-1657,0,0,00b8c4fa900fcbf8fcc8352570319a690900e4acdb978bf02695203588721ccc,2025-03-28T12:59:00.413000 CVE-2025-1658,0,0,a9a4970b4e8c9be89051e7ea1fd9ce1ab750dde675e3d54e4993b32c8643df73,2025-04-01T20:26:11.547000 CVE-2025-1659,0,0,c9722d059164770d3875a51a7e0c94b2e0ed8137da6dc91dea4eade92194196b,2025-04-01T20:26:11.547000 @@ -282401,7 +282410,7 @@ CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f7 CVE-2025-1683,0,0,bd65547481d5838793e5ad335f0bed73820ac4e81083a338100991ba4dbdb8f6,2025-03-13T10:15:19.687000 CVE-2025-1686,0,0,d1ef42202e7d4a5987e7a7fded4c55f6d574235579a6aece0e74834a9611412f,2025-04-07T18:29:22.970000 CVE-2025-1687,0,0,553889bbf1832e8d0246ba505a729ffeb25a6379aca1ca1f8f3f4851031d21de,2025-02-28T00:15:36.240000 -CVE-2025-1688,0,1,9731137c270466101936ddb187548b65647ba5f584a69d1b1f46cca31d995a18,2025-04-15T18:39:27.967000 +CVE-2025-1688,0,0,9731137c270466101936ddb187548b65647ba5f584a69d1b1f46cca31d995a18,2025-04-15T18:39:27.967000 CVE-2025-1689,0,0,ab0c739015e868491c3393a9dbae0818d17aadfd3d893b02587a47ce8b53dda1,2025-03-11T16:19:41.870000 CVE-2025-1690,0,0,8515e3753c09328c692a367a40f4a48932e87850b11ca7360289773890aa45cb,2025-03-11T15:59:35.800000 CVE-2025-1691,0,0,5eec1cea57e35f579c692b6064aead03fa43885ba22ff953ac9e969443e43853,2025-02-27T16:15:38.610000 @@ -282452,7 +282461,7 @@ CVE-2025-1774,0,0,b7bc9b6d14117ea41567dc2b1ec0413a34cc48ebc3a8f058e66c949851cae5 CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000 CVE-2025-1780,0,0,3f45bedc6155c2b8b2fa77d1259dea132c1de7996dc227477ece460ea93a3593,2025-03-01T04:15:09.713000 CVE-2025-1781,0,0,822d9dd7d94e5b498257a849d2a77ab936366d257a4d3fe0593c5d9951a3a28b,2025-03-28T18:11:40.180000 -CVE-2025-1782,0,1,6aea8f25140a1eb31ca87a4e0a055b3d3bb7044b8fd5261b4750e78f7c586330,2025-04-15T18:39:27.967000 +CVE-2025-1782,0,0,6aea8f25140a1eb31ca87a4e0a055b3d3bb7044b8fd5261b4750e78f7c586330,2025-04-15T18:39:27.967000 CVE-2025-1783,0,0,abaa00c601bee956b3371bfcaaba76ce7a717f99aa4b7c3f09c9ab4a67269a90,2025-03-24T18:10:03.760000 CVE-2025-1784,0,0,c2e88433e5f4fd53c57a5f2e70483cc7b56c5c77ed5450625dda142b6e60f89a,2025-03-27T16:45:46.410000 CVE-2025-1785,0,0,1f076f0c9f192b8e8f14d346f2656e13d4fb6e02482d8046f76354a15aebf16f,2025-03-13T08:15:10.950000 @@ -282818,7 +282827,7 @@ CVE-2025-2078,0,0,9de7f9d36f257c6e4ade1283dce5bdc5d09f9fe37ce0133e41f71eebe0b83d CVE-2025-2079,0,0,1df99b44115761c768e37334a26d3048ad67e1a5d7d245b0266a3de82699255e,2025-03-13T17:15:38.080000 CVE-2025-2080,0,0,8997dd07180b59c809f3df794229cdf89e46a6b355c2dafb103afdfc1a28dd39,2025-03-13T17:15:38.253000 CVE-2025-2081,0,0,4bcbb760543adfc2793fb421232d69f0d37c0297321a5cb193e8d3ca3a30e752,2025-03-13T17:15:38.420000 -CVE-2025-2083,0,1,b8170d0fdd5e76ee2a8d87ec5e0eae6703335284d0f20b14cf99de3e6b15e3dc,2025-04-15T18:39:27.967000 +CVE-2025-2083,0,0,b8170d0fdd5e76ee2a8d87ec5e0eae6703335284d0f20b14cf99de3e6b15e3dc,2025-04-15T18:39:27.967000 CVE-2025-2084,0,0,9186874e9417709e91bfbc0560be14cc85e2d2f24397f030f63236f2d997e78b,2025-03-12T17:20:12.987000 CVE-2025-2085,0,0,cdc776ce557f1f5be020949a2de79ef2cb25d7baf89cebb5bb3d5d1806b66fad,2025-03-13T15:23:29.823000 CVE-2025-2086,0,0,4e4362d5771bd0746a87b792e272a1c98aa3e837b1c239bf63f7ebc27efa4148,2025-03-13T16:05:15.390000 @@ -283332,6 +283341,22 @@ CVE-2025-21569,0,0,5df0154e36384276f1807ec7f051b457b9528fd8420a266b3a9f61e681a5e CVE-2025-2157,0,0,5c6192ea5b2e45321f17a6fe2ad70d5b25d9e993a209c52e11c52f0c6d50997f,2025-03-15T07:15:34.930000 CVE-2025-21570,0,0,ace167949078eb846cc68a40950678bfa282af3d76d61bcddefc7d830cafe3ca,2025-02-04T17:15:21.550000 CVE-2025-21571,0,0,bdb8c4caf4103cfe30d360ecbf83480841b6726b170ed756d9f8b563b72e6029,2025-02-04T19:15:33.230000 +CVE-2025-21573,1,1,1fc25c2a16ca59b6be0933309a5f9155689322cfbb52c42f25d5fe0112456166,2025-04-15T21:15:47.670000 +CVE-2025-21574,1,1,8524ae92537141b7e08233b9b726e6e517893b5518e1d4f38640c58ca1e36d31,2025-04-15T21:15:47.793000 +CVE-2025-21575,1,1,e284c925b9a3010d9a68f676969c0b04f0d66a8e6095049521fd20bc5146afde,2025-04-15T21:15:47.897000 +CVE-2025-21576,1,1,9e29677a4143d089114639a33de458f78127fc8974db390f91cc19911a5fbf60,2025-04-15T21:15:48.007000 +CVE-2025-21577,1,1,b89daf277017b6aa306178cba102aaed1e695f85f57bfc94c4ece6a03376c26c,2025-04-15T21:15:48.120000 +CVE-2025-21578,1,1,66ad0834e8683ff94dbcf091e36a56237fd049f7254bf7f02e6d0fc0391377c2,2025-04-15T21:15:48.240000 +CVE-2025-21579,1,1,da9489b0afeef94c4e4e2819fda901022f1fb3a925edfad87af0352d60177451,2025-04-15T21:15:53.233000 +CVE-2025-21580,1,1,9c2f3e46c16182b12aaee747abc4b91c84cc15c38d0ab8b67bbbd0793b15b4b2,2025-04-15T21:15:53.393000 +CVE-2025-21581,1,1,c800b6b2a11a2386ede6faf0ec715d9e585499dc1ef91b8680e69cde2e925955,2025-04-15T21:15:53.557000 +CVE-2025-21582,1,1,55a0a7baa47bde698ab2ed192f2d9629f8bbe47cc1334b97d9baad2475e8ab81,2025-04-15T21:15:53.687000 +CVE-2025-21583,1,1,e561a7dc5ed41ff099c2865e1e84c06117bf06e5fbcfc0fc7c50629d72543562,2025-04-15T21:15:53.797000 +CVE-2025-21584,1,1,508825aa45a8c22c438c069e562ca0cc061064a013f0f305ec1566e47e87b901,2025-04-15T21:15:53.910000 +CVE-2025-21585,1,1,501bcf9444fb37a2c97437c7b4ed6512d7a4c448f4605b8203009e766e093c9b,2025-04-15T21:15:54.037000 +CVE-2025-21586,1,1,3f5db663639349b3ed0c107bf087842dc6ce62de31cc3e6856a0fb0117fb7f96,2025-04-15T21:15:54.160000 +CVE-2025-21587,1,1,0e2c7cf22795e4fa97252530383ee695a89b362ba9a026eea7f61cf84a4f6743,2025-04-15T21:15:54.293000 +CVE-2025-21588,1,1,1ed41e2e6f83355069f7c6d996ceea7556ae4d56896e418533edc24374f7e2e3,2025-04-15T21:15:54.427000 CVE-2025-2159,0,0,c35f74dfe08a5e5a8f4d124ff145211eb32cd2a8c33fc42587e5543591991341,2025-04-07T14:18:15.560000 CVE-2025-21590,0,0,b36ae92dc904bf55dc4028b2cedf584a24120b0d6e0ef4bd06450d9ddd9f9379,2025-03-14T20:35:13.207000 CVE-2025-21591,0,0,f32e5a3ff3f5737738865f7947fa4ff9466736186fcb9ebeaa4bded6546f54c4,2025-04-11T15:40:10.277000 @@ -283343,9 +283368,9 @@ CVE-2025-21596,0,0,1096071862a1a4b487a7ca6a43c6a80beba27fa305e8350c6fd445c040716 CVE-2025-21597,0,0,1f1adbf7c262e34dba1d8ce031473845273c09baa85b7c10ad9a8a20271caac6,2025-04-11T15:40:10.277000 CVE-2025-21598,0,0,5c3566de5925fc00a103455df088729284ddc356b891286f5a8a7d061a4afc7d,2025-01-09T19:15:20.123000 CVE-2025-21599,0,0,9a870570f5d5bf66cd754c8a1d17f82fd90380fc87a793c8ae36c8199406c321,2025-01-09T17:15:18.770000 -CVE-2025-2160,0,1,41f44e46844b80dbf1ceb2468b6006d45925d1dbabe5f7d5271c82ec8a50c749,2025-04-15T18:39:27.967000 +CVE-2025-2160,0,0,41f44e46844b80dbf1ceb2468b6006d45925d1dbabe5f7d5271c82ec8a50c749,2025-04-15T18:39:27.967000 CVE-2025-21600,0,0,ccb13893e7de17eabc5a694789cec3336df98d94c48128502c18864542035947,2025-01-27T22:15:14.873000 -CVE-2025-21601,0,0,734617ed9dba757da2ab38f4b9a66e9ff1aee2c512ff202bd66f0fe463765aae,2025-04-11T15:40:10.277000 +CVE-2025-21601,0,1,0a3de1bd0f7b2152d39100c8775a8996119c68746c8d9f247ee42e02416b1883,2025-04-15T21:15:54.560000 CVE-2025-21602,0,0,c19be4b4737359a2e4ed4f02c889d9a8f5b6a59c1e0d49883a4919ec981debf6,2025-01-09T17:15:19.150000 CVE-2025-21603,0,0,de5a98ab5a1846941043ac114cde34c932a06d56fde93bc5468f6ea62d88c11e,2025-01-08T15:15:21.320000 CVE-2025-21604,0,0,a34f469e60a5c97c37f25f38185bf1e66489153f244790f5fcee58d0e1ef98a9,2025-01-06T16:15:30.927000 @@ -283353,7 +283378,7 @@ CVE-2025-21606,0,0,a19668b5b8fc9af5d593a5704f1b419f2af7457a16702862aae2b42a335d3 CVE-2025-21607,0,0,853308cc8c471813553ca9ee76112b7a86c43b193b1dff4d3732c3ff8ccdd593,2025-01-15T16:15:34.463000 CVE-2025-21608,0,0,d574978b81bfed48d2606c0950417bee8811351e74bb8d93791061c4e37c7692,2025-02-18T19:15:25.220000 CVE-2025-21609,0,0,a6de42b29fb27af22b2f328a2adb6b55148d54130efdaed884c8fa4d6c4faf6a,2025-01-03T17:15:09.147000 -CVE-2025-2161,0,1,feef1a7f1e8e74939963cffd7b5e9340fabf2885c23ce3b82fc769c72051f6a8,2025-04-15T18:39:27.967000 +CVE-2025-2161,0,0,feef1a7f1e8e74939963cffd7b5e9340fabf2885c23ce3b82fc769c72051f6a8,2025-04-15T18:39:27.967000 CVE-2025-21610,0,0,7316a86caea5346e233350f085898ca7619157368c1365d30f5c1d1d8901ed25,2025-01-03T17:15:09.290000 CVE-2025-21611,0,0,8e422e5fc6d4af0b6b34d70cc0908397e091aab260ca691c03a0f88c30af7c40,2025-01-06T16:15:31.413000 CVE-2025-21612,0,0,138b1e9798db0ff4693818b692f56ae3cb40db3fdb9ae68afaca02a8383a0a8a,2025-01-06T17:15:46.840000 @@ -283854,7 +283879,7 @@ CVE-2025-22230,0,0,3e91dce00139a0364993ef91e4dc70d3b6016fb8a3b6eea2cbe343e4ad228 CVE-2025-22231,0,0,bd2ff59ef079880253edeca06616e1c3a205871c44a51a92d95e60e5497419ad,2025-04-01T20:26:11.547000 CVE-2025-22232,0,0,bee762df9dfabd3d4c6c12e64136a19453238ca07b81d2e49eee527157bf661b,2025-04-11T15:39:52.920000 CVE-2025-2224,0,0,a251902d7a3f4027222d02a92ceecc551380ed3d87526ebb058f0bdbf9a04b21,2025-03-27T16:45:46.410000 -CVE-2025-2225,0,1,d26980ce605de1c16e8b872e505802fad1242bb85c846db0c5c70a05dbfaf01f,2025-04-15T18:39:27.967000 +CVE-2025-2225,0,0,d26980ce605de1c16e8b872e505802fad1242bb85c846db0c5c70a05dbfaf01f,2025-04-15T18:39:27.967000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000 CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000 @@ -283966,9 +283991,9 @@ CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9 CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000 CVE-2025-2237,0,0,6c579bdd62bb8bda18ad2566fa6cb9554676ec322606aaab27d5422395dc3d2a,2025-04-01T20:26:11.547000 CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000 -CVE-2025-22371,0,1,c4b5dcfeead1910ae96a15d3cbcfb5bf3edb4fd979ba4a71d3c03ed0244c4e7b,2025-04-15T18:39:27.967000 -CVE-2025-22372,0,1,8eb6091961aa97f963b8dcb04fdfe2229a68b02ca22a8e8e99cfc05c86fe7672,2025-04-15T18:39:27.967000 -CVE-2025-22373,0,1,2129b77552ed7485fc9c37fe3b0ce0a4fd167043212640fc5969b758ce73cbdf,2025-04-15T18:39:27.967000 +CVE-2025-22371,0,0,c4b5dcfeead1910ae96a15d3cbcfb5bf3edb4fd979ba4a71d3c03ed0244c4e7b,2025-04-15T18:39:27.967000 +CVE-2025-22372,0,0,8eb6091961aa97f963b8dcb04fdfe2229a68b02ca22a8e8e99cfc05c86fe7672,2025-04-15T18:39:27.967000 +CVE-2025-22373,0,0,2129b77552ed7485fc9c37fe3b0ce0a4fd167043212640fc5969b758ce73cbdf,2025-04-15T18:39:27.967000 CVE-2025-22374,0,0,3c76c0c310d0a27c4ffac60f4f224c77b792b9b62909428eaeef4914314662fa,2025-04-11T15:39:52.920000 CVE-2025-22375,0,0,ad41e29f59774e7ec2e9cb8e8af4d844651a9cedc9ff6f6b9f174f11c786065a,2025-04-11T15:39:52.920000 CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000 @@ -284216,10 +284241,10 @@ CVE-2025-22685,0,0,0aca1e462c147586a6ae88d5cff70e9389d5f88504020905ad7bc42c58db5 CVE-2025-22686,0,0,e7aedb7f26c8e953eeabe70988ee957926c38e58630395561780d2b497945e24,2025-02-03T15:15:18.863000 CVE-2025-22688,0,0,92e6b7ae109ab9a018062b886e106633218ca644a2c59e2e57282ed813f67e0b,2025-02-03T15:15:19.007000 CVE-2025-22689,0,0,a6bb71e4967076b3f540b3610fafcb785c5a34d17d73ce5496d44ac029c935b3,2025-02-16T23:15:10.330000 -CVE-2025-2269,0,1,48fe2926e51b3bf22496c8e98885116bddfc21f976ce1cbbf4a9875bc41705d0,2025-04-15T18:39:43.697000 +CVE-2025-2269,0,0,48fe2926e51b3bf22496c8e98885116bddfc21f976ce1cbbf4a9875bc41705d0,2025-04-15T18:39:43.697000 CVE-2025-22690,0,0,15f7912d818373c9c9ee9191f4c491841a741afc5dc5b966749a324d18e0fcb6,2025-02-03T15:15:19.150000 CVE-2025-22691,0,0,d28916fc3dd8ee07125059b5bcbacce6b8b0e15a257991053ddc23a703d8c5ba,2025-02-03T15:15:19.307000 -CVE-2025-22693,0,1,863d4d7bd4e9e2375a097e245df44521e304d0a19a473bda52d238a92bc39ed5,2025-04-15T19:58:46.530000 +CVE-2025-22693,0,0,863d4d7bd4e9e2375a097e245df44521e304d0a19a473bda52d238a92bc39ed5,2025-04-15T19:58:46.530000 CVE-2025-22694,0,0,96b1bc67077d6724bed157ad909e382f421512dbde661698a81e8882d1d6a676,2025-02-03T15:15:19.597000 CVE-2025-22695,0,0,0a8a71d8bc1a4d3051f4475b36e68c6610b345ec6ee024bc91b765df5cb592ec,2025-02-03T15:15:19.770000 CVE-2025-22696,0,0,a78ad16e71ffcef32da6e8beedb19b7429b4548fb7904e608e5ab76d1d2bd28c,2025-02-04T15:15:21.643000 @@ -284376,8 +284401,8 @@ CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29 CVE-2025-22896,0,0,cadb16b30aa07fd019cf5a31775c9c5a2a292f523d02b1c4ef2ed5d9558f302e,2025-03-04T21:25:33.663000 CVE-2025-22897,0,0,9a22b887d81fcac41848fbf55628d95a06189013b3a027c7ddc8085a3cd9eb1a,2025-03-04T17:39:48.960000 CVE-2025-2290,0,0,4f9c342ac3f078cc778b27ca93122440b9316877dedbbd45d5a29242af4367fe,2025-03-19T05:15:41.180000 -CVE-2025-22900,1,1,0da5b52e3247e6ba48a70a43daed05d21025f9655cd431e2e7b9ed20b83c4f4a,2025-04-15T19:16:06.987000 -CVE-2025-22903,1,1,17483d937773c31b6a9d30d680ef374a1242af9d92417b4d1f508b1c4a3e5fa9,2025-04-15T19:16:07.090000 +CVE-2025-22900,0,0,0da5b52e3247e6ba48a70a43daed05d21025f9655cd431e2e7b9ed20b83c4f4a,2025-04-15T19:16:06.987000 +CVE-2025-22903,0,0,17483d937773c31b6a9d30d680ef374a1242af9d92417b4d1f508b1c4a3e5fa9,2025-04-15T19:16:07.090000 CVE-2025-22904,0,0,86b28319b40b8d7a66d7d03f157c4134653a72c10f1688103124dc640f8895a5,2025-04-09T18:44:38.387000 CVE-2025-22905,0,0,382074945b27a096018acdb89ab8419cee5a926b55aca9b4c05298642fc660ca,2025-04-09T18:44:26.190000 CVE-2025-22906,0,0,69174bb723d0779d45e6e8ede34109835ab1ff87db3539705d9e4fc9b2841ad7,2025-04-09T18:44:12.040000 @@ -285423,7 +285448,7 @@ CVE-2025-24236,0,0,6f35aae8e5b2275b2c69183ab7776a716442e803a5454ae85f2994d6ce986 CVE-2025-24237,0,0,27bd8aec1cacbdda457d4c54321da7772780a885b84dc379b0850dfb4a03a57f,2025-04-04T17:11:50.760000 CVE-2025-24238,0,0,eb385efe8cda4bf9f1c35756a77fb4af48f89427c693cc6ce5f1501ae0be4d28,2025-04-04T17:12:14.453000 CVE-2025-24239,0,0,34160c098216745dbddd9ea66458d406055bc4d5f852b3dbd17c24cb8226d924,2025-04-04T17:12:32.720000 -CVE-2025-2424,0,1,4cafecbec8a2f80ac381a093454d1ff0277aa6ed2e9be5b5276b9b5f30948932,2025-04-15T18:39:27.967000 +CVE-2025-2424,0,0,4cafecbec8a2f80ac381a093454d1ff0277aa6ed2e9be5b5276b9b5f30948932,2025-04-15T18:39:27.967000 CVE-2025-24240,0,0,31e1fbc4a9906522b59d5426cc41c13b0cc9baa11bbcd68e50f13950436aaf0f,2025-04-04T17:12:40.510000 CVE-2025-24241,0,0,a279cf4c641bb9c3ca243836a9cfff64caa6f150180c868bc752ebe35d2580ea,2025-04-04T17:12:47.040000 CVE-2025-24242,0,0,7198a4ff47a69ba0a9fd45b2c507b49c3ac18f25e906b0f7d0919752e8bf374f,2025-04-04T17:13:00.923000 @@ -285479,7 +285504,7 @@ CVE-2025-24354,0,0,33e96f6ab404cf45f0a4405c77520b82358348aceacdc778687814571e590 CVE-2025-24355,0,0,2b68b163db748dec99ff55b2d4d371492d44a4482a7f15b8973aa6b3a0f994c5,2025-01-24T17:15:16.047000 CVE-2025-24356,0,0,d0b82c0018364f3dc83d637e30ca6c64f4be25093ccf7468d678a6ec3efd7022,2025-01-27T18:15:41.347000 CVE-2025-24357,0,0,33b4b3c939c862c35be8fbd83a4f327fbd80fdaea485d698b2dba1d8e5ecb167,2025-01-27T18:15:41.523000 -CVE-2025-24358,1,1,063a206435864fabecbf382607afd067ac76f59a72d2b86a440672f1f66555a7,2025-04-15T19:16:07.193000 +CVE-2025-24358,0,0,063a206435864fabecbf382607afd067ac76f59a72d2b86a440672f1f66555a7,2025-04-15T19:16:07.193000 CVE-2025-24359,0,0,1ef1d48aa16d3d1524839190f2a92e68f271b7bbb06dbb86c77c3115b6a414ab,2025-01-24T17:15:16.197000 CVE-2025-24360,0,0,9b8d13d61afdc9c82b83c3501ec96029794286adee2fcfad926404556ff5277e,2025-01-25T01:15:24.047000 CVE-2025-24361,0,0,398144fa5fffc1da1e51f93b9cc9373c390b7e27a0bd14059d4987e6ffaf08d7,2025-01-25T01:15:24.193000 @@ -285559,7 +285584,7 @@ CVE-2025-24442,0,0,a8f66209dff397fff7f7fdf29f96f82075d9a60307fa72b99b6f3e7ee385a CVE-2025-24443,0,0,9b387e062ed566e1e08bfc55742fe23d0bd36f63e01c70993f03b9eaee489c81,2025-04-01T19:23:33.860000 CVE-2025-24444,0,0,647636ffe7ff72b15983b0abc2a3e4aab7b2deed062acf0eb294c895b2d1ae65,2025-04-01T19:23:15.063000 CVE-2025-24445,0,0,642582fb1e4e4925eb11b91795bfa62bd7866c6426ae815f76e6742aab043e8a,2025-04-01T19:23:11.093000 -CVE-2025-24446,0,1,80a25ecfe66db28a2c4e26cc5ac1a75b7a3653fd9716ad569f1d31b8a4d09177,2025-04-15T19:56:49.520000 +CVE-2025-24446,0,0,80a25ecfe66db28a2c4e26cc5ac1a75b7a3653fd9716ad569f1d31b8a4d09177,2025-04-15T19:56:49.520000 CVE-2025-24447,0,0,8af35f20b7fd0792f823a3b0a598ee49bc16311252d569e05f79da4bafda29bd,2025-04-15T14:04:38.663000 CVE-2025-24448,0,0,92fe73012e725b49bd396375c68a68d8b9ed29c7a5ac564ca7f989860080ec5e,2025-03-11T18:15:31.543000 CVE-2025-24449,0,0,ec7bf425be00a5e3f888baa83e1ed5df8dbc232fae8233f3f93c333265e574e9,2025-03-11T18:15:31.700000 @@ -285581,6 +285606,7 @@ CVE-2025-24480,0,0,8c69070e4602e3e045b6de7421f305082c0b32c33d67076e7034c529b969d CVE-2025-24481,0,0,1f18ba539d38ed86105e18de8f701df1ae615df6838eaafd5a3bd88fcca169e2,2025-01-28T21:15:18.520000 CVE-2025-24482,0,0,bddd8d62e1d1ef759d3d72d308a4499752a0ac6f47d6ad7b4c765c13d2fd27ef,2025-01-28T21:15:18.687000 CVE-2025-24483,0,0,8e8c3f541513089421e16456a3415c9fe977a1e0274a2d9a7826bef889eecc77,2025-02-06T08:15:30.327000 +CVE-2025-24487,1,1,56a79953bb767ee8ea4a55d09703b343576e91b5050a9e429842486448a617be,2025-04-15T21:15:54.717000 CVE-2025-2449,0,0,0dbd069203a80b660cdb63a2610dc85f23643235633ff15eeaf11d0c77ab186d,2025-03-18T14:15:45.670000 CVE-2025-24490,0,0,c90744a991c52fb51aa8e878b4b2657f71ca215607f5858e899dd6952ad19778,2025-02-24T08:15:10.260000 CVE-2025-24494,0,0,43ac2d60a286060ae572ec37f3d35d579c4245be449efae1f59958937f264e22,2025-03-05T16:15:38.937000 @@ -285804,7 +285830,7 @@ CVE-2025-24744,0,0,bc8bbe894f88fed69b4bb24f69d681e27c01e6147c3768ca6f1adf789040a CVE-2025-24746,0,0,e640d68193c997efe97249e6f1cee0e9ce9f97ddc69dd52467ca15646a5683b0,2025-03-28T19:15:14.553000 CVE-2025-24747,0,0,d8d5879f141d02ac440b19c8b796e44b06e3fcae6bfd445bce644f72bd561c9d,2025-01-27T15:15:17.253000 CVE-2025-24749,0,0,7e56b04f2f502be4c647ffa52a0c1f2e91f2bc25e979a1ff629db670a4b544fb,2025-01-31T09:15:11.760000 -CVE-2025-2475,0,1,c0a0336fb403efb898458fa5072cfe904fb815c7e89b5030a20878b1fe124799,2025-04-15T18:39:27.967000 +CVE-2025-2475,0,0,c0a0336fb403efb898458fa5072cfe904fb815c7e89b5030a20878b1fe124799,2025-04-15T18:39:27.967000 CVE-2025-24750,0,0,6398f7b1e29d3519e65e0864494e38f2a68b8317a82c560542e0c4814ca79359,2025-01-24T18:15:48.663000 CVE-2025-24751,0,0,d999066b9fc4be710f419f3d363e7444c778eaf47794160a144b74e633cf7720,2025-01-24T18:15:48.810000 CVE-2025-24753,0,0,a2c1331499f1ee93474d032a5492134141c22dfbef3d88782211f0652176fefc,2025-02-07T14:39:27.320000 @@ -285831,7 +285857,7 @@ CVE-2025-24793,0,0,e28f23f8765521f3c09231efc18389c18020ab59aed59a8a8b47cb836c195 CVE-2025-24794,0,0,c04b940ac82a2657417f797fe796501aa31f53e5a08053b008970823006b7cde,2025-01-29T21:15:21.397000 CVE-2025-24795,0,0,4e7d355e1e973178e45904614970e5915bed2547d76d074d93927fc694a1b13e,2025-01-29T21:15:21.533000 CVE-2025-24796,0,0,a9610c1be84a5c4d5741f879bb27b31db5774f479b1300b84fcf068018c2ff21,2025-03-06T19:15:26.953000 -CVE-2025-24797,0,1,0e70cff373863f69d891845b371b346f401be60839c6f0598b5ae086d63af357,2025-04-15T18:39:27.967000 +CVE-2025-24797,0,0,0e70cff373863f69d891845b371b346f401be60839c6f0598b5ae086d63af357,2025-04-15T18:39:27.967000 CVE-2025-24799,0,0,b91362920a1bdf5922f70455160d5f7b874b44c2ef0aa4aa4a1b91e413396201,2025-03-18T19:15:48.927000 CVE-2025-2480,0,0,8c114ab82f1a69ecb2cba58c867ae8116e5c5738533441fe65cb3b622f3d42be,2025-03-20T17:15:38.523000 CVE-2025-24800,0,0,7ed7267931cd5ab7815e3084be7a388ce38e4d4a267ef28098f1d5b3017953e4,2025-01-28T16:15:45.063000 @@ -285870,7 +285896,7 @@ CVE-2025-24852,0,0,e5207d00131e6702a9295a9bdc1c6895f578dee210a994787ecb0c10a6489 CVE-2025-24855,0,0,3b83ed2e42d12574419e7a5d93b58d3d4fa5393073d22ec518ba075ff8bdfcf5,2025-03-14T02:15:15.717000 CVE-2025-24856,0,0,de81d5fa3871c8fea36d9f92d65c776b1ac74e3aaeeb12190f8f5c33a73c1a6a,2025-03-16T04:15:14.517000 CVE-2025-24858,0,0,80a2e3e27ced5551413d1f52e03f6696ce40853726c2f8318cd2bd73891576ca,2025-01-26T07:15:09.237000 -CVE-2025-24859,0,1,6b36e65c927600e4b163b51eb3b1a474e7717aa7ddbcdc5e6716070c84b2e0c2,2025-04-15T18:39:27.967000 +CVE-2025-24859,0,0,6b36e65c927600e4b163b51eb3b1a474e7717aa7ddbcdc5e6716070c84b2e0c2,2025-04-15T18:39:27.967000 CVE-2025-24860,0,0,f6b6c9635e86cbebd470da0b1fb7a3385879aa273aed1cf32bf09076c689158e,2025-02-15T01:15:11.327000 CVE-2025-24861,0,0,cda35c31a52f18b1ea661e5db3735fa3ea7e6195ecdfe91c4593ecf77fb63f96,2025-03-04T19:27:30.983000 CVE-2025-24864,0,0,03d90ee76247121aec5193d6e140b18b95834894f967758504c08d3025e47e84,2025-03-06T04:15:25.713000 @@ -285920,8 +285946,8 @@ CVE-2025-2493,0,0,676bfb3fae988b7f59f84e2d119ffc2e2dbb296d8377ca555044ab18d56339 CVE-2025-2494,0,0,bcaebcb1515af09f885a274b8c37bce4332f814c62227922c0b3b3b40ff36ddd,2025-03-18T12:15:16.090000 CVE-2025-24946,0,0,6cbcc6ed12b7350bc1e3ba362180af6c5ebed1ea35a0fb612c7c5af9a1e19fef,2025-02-20T03:15:12.800000 CVE-2025-24947,0,0,0710d5740f5af2ba6f51dfd5917029f75791b75ba51884293887edaa47dfb4bd,2025-02-20T03:15:12.943000 -CVE-2025-24948,0,1,ecd4c4e508df1e85d46fc7a1f42d1932a16098159a5b2d28c5201eaea580cd99,2025-04-15T18:39:27.967000 -CVE-2025-24949,0,1,7167c8b6497b47fd4244eb9d07a25a4179484c5cae9aa28e76d6f7b765c60c7e,2025-04-15T18:39:27.967000 +CVE-2025-24948,0,1,8a86f17d91292cb21807def7c2fe5503cf9aaca197debbd3a2078d6f6b9783ac,2025-04-15T20:15:38.547000 +CVE-2025-24949,0,1,a464878388ec5391f5c44231a20c802f99fa283f1abde08f5c10e0b009401b22,2025-04-15T20:15:38.690000 CVE-2025-2495,0,0,e45b713c39e19a1ca1a75215099f4bc50e791fc79824ab87f82f4b1c8c27f512,2025-03-18T12:15:16.227000 CVE-2025-24956,0,0,915adf46e5e8d613d503b5df374b84b9ffba9c57344980265efed54c45eafcd8,2025-02-11T11:15:17.273000 CVE-2025-24957,0,0,caab3bc6d07aaaaaeb40190f59933fb518192f43d9ea569cde48752d4b2b9c97,2025-02-13T18:59:32.867000 @@ -285937,6 +285963,7 @@ CVE-2025-24965,0,0,ba73304fa401c257949a63c9073322cf9d165b85acb67f8266f3dba90d290 CVE-2025-24966,0,0,01d95f45d88a1298f4cb0a9ab1e280c8339ef3fdbf1a2c657ebfd219b7b57d43,2025-02-04T20:15:50.627000 CVE-2025-24967,0,0,1c50949fac013da6e9270ba4035d03fad3fe3bacaf2e070d29068d518d318faa,2025-02-04T20:15:50.813000 CVE-2025-24968,0,0,e07f901cf7b356f85243eb69a8d49d189b396867f0cba0e1d10bbb82d5ac61c1,2025-02-04T20:15:50.997000 +CVE-2025-2497,1,1,1a9ba976794713f5c5f4b1a3edef787e855a3f658b692ad7f1bc5d9244de279d,2025-04-15T21:15:56.630000 CVE-2025-24970,0,0,1ec79588f47d61fc7f5eddb1acee5b0ffee64dc90dbd9954713ce89fba4e7d11,2025-02-21T18:15:36.383000 CVE-2025-24971,0,0,793f718b4bfb5d7a7a1d927b157b1ca84e15924b7b8def879502f3162eb90333,2025-02-04T20:15:51.150000 CVE-2025-24972,0,0,2bfeab49fb3f39eb9e65ce9ece026906b6d6d88216e33613e47c2e76c1f0f6a2,2025-03-27T16:45:27.850000 @@ -286206,7 +286233,7 @@ CVE-2025-25371,0,0,049c632b58d7029c04da8590c580b34984ba285f838086506b2cd37871e62 CVE-2025-25372,0,0,240bc71dd84dfac32c47fb199d651cb3e67f8af768bdc10c675ee6797857fb7b,2025-04-03T15:19:21.277000 CVE-2025-25373,0,0,7f9cc4bb8a04940c64da7bfce879c64ec9344a6a2eb58612061267ebdfad05e3,2025-04-03T15:24:00.740000 CVE-2025-25374,0,0,6859cbf8bd398e89829e2307cc6a606a243043acfaf50291bd1cd1d34c1583c4,2025-04-01T18:46:33.137000 -CVE-2025-25379,0,0,10c6b59b7ced1a65c44b725df73613b964204bd8bcc126008f75da9f2d8ec909,2025-03-04T16:15:39.433000 +CVE-2025-25379,0,1,12e940536872ecb4b346a5af416b1ea7c2c4be1f615da3c7fe51934862dd7ad8,2025-04-15T20:10:40.157000 CVE-2025-2538,0,0,7eb1ab6c92644f739221ddc3d061f1be7805eee13ac3c3d30ea5dbe030045c14,2025-04-01T14:15:33.303000 CVE-2025-25381,0,0,98993479fbad247c0a645016b4d364f3055a4b0ab28a945432dc14f688f0a955,2025-03-12T14:15:15.923000 CVE-2025-25382,0,0,9492b1b6b1185f3ade35d8ec9feb68e32bd4db56e46753ca3a20faa7b8d0f3c9,2025-03-20T21:15:23.030000 @@ -286225,7 +286252,7 @@ CVE-2025-2544,0,0,61f3dad808e2359bbac367a26f479ab656345326f5e769e424e5a0af4077fa CVE-2025-25450,0,0,e3ddffa39d860b594bb74ab98ef16e7416f14ecc887f5721e7943e1b1d73ce80,2025-03-07T17:15:21.640000 CVE-2025-25451,0,0,4c60686324e8dfbebc3bac09932f9dca9715cd901e8b055c1d7eb1acd46fa78d,2025-03-07T17:15:21.803000 CVE-2025-25452,0,0,f8ac00e705c69600b7bd756ffd6640407ab44891503ee6108f0e991980324498,2025-03-07T17:15:21.947000 -CVE-2025-25456,1,1,2f4ab1936e0c48d488ef78fb31987f131f5a0b8e670f18b8b91bedb169dfa71f,2025-04-15T19:16:07.327000 +CVE-2025-25456,0,1,7fc1996f17ae9b866f7ab42c929c13c004cbbaf0df7ae12091fd3af8a8905392,2025-04-15T21:15:54.877000 CVE-2025-2546,0,0,c3027dbe34196254c0063ed1c57ce0360ffc141678360f958c71a638a14495ad,2025-03-20T15:15:46.420000 CVE-2025-25460,0,0,82c83de72621855fac95e9c964cfbdf72c297a15a88fc1d2ee5a87f0355f72e3,2025-02-24T17:15:13.900000 CVE-2025-25461,0,0,ab0b84ac9f3f8ac10a932ec6905826cba8e3222301f41fba0cc01c825409c256,2025-02-28T16:15:39.387000 @@ -286303,7 +286330,7 @@ CVE-2025-2562,0,0,d71b02468cafdbce84509f67bdfaa8893fe73450f99731b0a90af791f6f728 CVE-2025-25620,0,0,2998f203d004ba2c3686a85bfd6e4a9c803d92001b76576bf7ced9c40410ee3c,2025-03-10T19:15:40.393000 CVE-2025-25621,0,0,63a694a2198c853cb02da81979b70cf80909e4f217d0ad14b5c2cf8cdc3ac35a,2025-03-17T18:15:21.593000 CVE-2025-25625,0,0,d35a53456bc87fc30424277ce00ed28d6dd49da4bed527e81b7815b9777704dd,2025-04-03T18:26:47.920000 -CVE-2025-2563,0,1,2d2636894f44f5c2d15d5665677a78cbb14819ef342055cc730437b30b7f27ee,2025-04-15T18:39:27.967000 +CVE-2025-2563,0,0,2d2636894f44f5c2d15d5665677a78cbb14819ef342055cc730437b30b7f27ee,2025-04-15T18:39:27.967000 CVE-2025-25632,0,0,63a9daf8d062287fb49c86902495e07de54d2264559e40d7c6a1a7888562d43b,2025-04-09T20:56:55.750000 CVE-2025-25634,0,0,d0b51d7c1db69276cd41b2edd1346abe98f6557183fb728a8205e284d548820a,2025-04-10T18:17:11.187000 CVE-2025-25635,0,0,beaccf1b133ae432bcedfcf1b43f20544c4e5ac5d5d33afd3d44ae08bcd8754b,2025-04-03T15:37:36.397000 @@ -286314,6 +286341,7 @@ CVE-2025-25663,0,0,5a746eea3634250332bacc9c924ac5e785f1cc29be7fb51e65232a0170bb6 CVE-2025-25664,0,0,1da9718d556db2a8964602e6e91c5c694bfb0281423a38648b821b59368a1401,2025-03-17T15:19:50.133000 CVE-2025-25667,0,0,d0a445cc31a702833da7b419bfb916db019325d0a01c653b1aff0acf6f057027,2025-03-17T17:00:39.953000 CVE-2025-25668,0,0,3a390720dec3e2d486dc54a6361f2f35ae4d39f099b715395f225090d62ea40f,2025-03-17T16:59:59.693000 +CVE-2025-2567,1,1,74c4e6e2941c036d6c245424b48658ad4595679fa99e81b1fb369271708a1e70,2025-04-15T20:15:38.990000 CVE-2025-25674,0,0,8ce40ba3c5a2d332ca848bf332b28ce5e1ea817c4e5b7751e0bf1c1f0eeb7a9f,2025-03-17T14:23:02.403000 CVE-2025-25675,0,0,c72dca8ea86886a3af81f324f3cf1b0ae0870a19e6aae0e2e014084eb2e1c680,2025-03-17T14:26:22.483000 CVE-2025-25676,0,0,2caeac199d92898771cb61a1f50bc4e997a82341fb0b8426f50c92948f273cc4,2025-04-10T13:37:42.663000 @@ -286327,7 +286355,7 @@ CVE-2025-25685,0,0,204deb7c4ce53f6e492fa281d6e8bf3f8c2d8728cd8c95a39540e1d64c356 CVE-2025-25686,0,0,4572059816c223b003dcfdffbac57f4eb8534757a2fb6cbc63605046c3c8e752,2025-04-11T17:34:10.580000 CVE-2025-25709,0,0,9d314f451c270f6d71f71b4acae3d9115f11fe64a66489ce5bdac5bbfa4be764,2025-03-12T14:15:16.077000 CVE-2025-25711,0,0,687cbddc40bafa1aa553307129c536c978baa7c3ff70ab2a66988ede6a6f0e53,2025-03-12T16:15:23.023000 -CVE-2025-2572,0,1,031d444c67ae0946e078dd7689fec8375a9c2817f0fdfd65532cd6250cdaf8e2,2025-04-15T18:39:27.967000 +CVE-2025-2572,0,0,031d444c67ae0946e078dd7689fec8375a9c2817f0fdfd65532cd6250cdaf8e2,2025-04-15T18:39:27.967000 CVE-2025-25723,0,0,e8c9c3b7ce8a94391f1e2d0696694643f2079bf2d5039cbd8233d30f1078ac40,2025-04-03T19:15:39.403000 CVE-2025-25724,0,0,b38e9501f3518fc8b79ccc8bc6f4bc07f2a4c98992aa95823eb5aac9be02cfc0,2025-03-02T02:15:36.603000 CVE-2025-25725,0,0,ac97ba103984120a346a524ddb442d8216a673461532b95f069cbd7053e539c0,2025-03-02T02:15:36.760000 @@ -286819,11 +286847,11 @@ CVE-2025-26737,0,0,ef70e0172c0763982b4f704c98436f4e8fa7d9222206609f397682c2bb7a4 CVE-2025-26738,0,0,fe74511d18daa7f8c822f7c00f478c77ab9fe05590b455ccad4998d15c474085,2025-03-27T16:45:12.210000 CVE-2025-26739,0,0,2514d7567fdad9bf988b03c827c3cf9332db7eb4aaa61ffce3b49cc72d1bf133,2025-03-27T16:45:27.850000 CVE-2025-2674,0,0,b17ff2a840d43872ce8941660011244ce317e8241898334fca92f2c7e2d2df13,2025-03-27T18:21:20.710000 -CVE-2025-26741,0,1,a2f406331136add48f12bb3b5a571163efcdbc88343388d56794e4875124fc7f,2025-04-15T18:39:27.967000 +CVE-2025-26741,0,0,a2f406331136add48f12bb3b5a571163efcdbc88343388d56794e4875124fc7f,2025-04-15T18:39:27.967000 CVE-2025-26742,0,0,d1c1ef0a2d3414bdd8fc0829685f2cb4bdc30a516dc3a80c709e135b1569fc7e,2025-03-27T16:45:46.410000 -CVE-2025-26743,0,1,aa5333d9dea9d8ed2dcdd95262008df6e705367a9b483bbea2ceac30851be044,2025-04-15T18:39:27.967000 -CVE-2025-26744,0,1,f748841282870c4334f82bbb19fd3d4a75a56c89c036ff8da13ca2859e3adcb9,2025-04-15T18:39:27.967000 -CVE-2025-26745,0,1,551b4e9f9eac01666003984c5b0c0a3034f75dcc543e1a8dda9d5473e96f1470,2025-04-15T18:39:27.967000 +CVE-2025-26743,0,0,aa5333d9dea9d8ed2dcdd95262008df6e705367a9b483bbea2ceac30851be044,2025-04-15T18:39:27.967000 +CVE-2025-26744,0,0,f748841282870c4334f82bbb19fd3d4a75a56c89c036ff8da13ca2859e3adcb9,2025-04-15T18:39:27.967000 +CVE-2025-26745,0,0,551b4e9f9eac01666003984c5b0c0a3034f75dcc543e1a8dda9d5473e96f1470,2025-04-15T18:39:27.967000 CVE-2025-26747,0,0,f799dbfce90467344ad4aaf43405a0c5bb92178129ef15a39374277528ecf159,2025-03-27T16:45:27.850000 CVE-2025-2675,0,0,e49840b3a5ca3e77744a146445fa06f116b5cc16d89bcce736017749e482f04f,2025-03-26T14:03:31.380000 CVE-2025-26750,0,0,d88bdcd674193a8c592f1b97cbf3fbf882d139c99406f62e08a860c366f790c0,2025-02-22T16:15:31.210000 @@ -286902,12 +286930,12 @@ CVE-2025-26885,0,0,2ef732a4cebbeb85a5dbbaf27f49124f8d762a49e8e7f3b22ab266ddbd21a CVE-2025-26886,0,0,3fccb07cd6593c19d4ebd609ac67b0d6e5961e270965b650cf84c0ac5737cb12,2025-03-15T22:15:13.837000 CVE-2025-26887,0,0,d620956d3ea5625abfbc4595a1a19c4cbaf27ed3b93aec2afc55fa2fa354983d,2025-02-25T15:15:25.117000 CVE-2025-26888,0,0,88340f4d9fa5152f8d2baf93269a38c0f6caaecf7620d64ac415d48780f03414,2025-04-11T15:40:10.277000 -CVE-2025-26889,0,1,161e90cfd9d816c06229400c5794667a4e3891a0c6844972b0d78dbb6f93d800,2025-04-15T18:39:27.967000 +CVE-2025-26889,0,0,161e90cfd9d816c06229400c5794667a4e3891a0c6844972b0d78dbb6f93d800,2025-04-15T18:39:27.967000 CVE-2025-2689,0,0,a0a16f7e7cbfe138500325b64261c6e20c16741d6a695a680e6c214018b4891c,2025-03-24T17:17:26.607000 CVE-2025-26890,0,0,7c5bd562991190453d0d95d46540e8b902fafbca311e972364b1df4ac9dc0f02,2025-03-28T18:11:40.180000 CVE-2025-26891,0,0,20d9b98fa953b2c2ae1876c761e770a063cad8d8555cb8705b5f8d6ebece6625,2025-02-25T15:15:25.253000 CVE-2025-26893,0,0,1e55e8031dea60b355f7bfdcd2784f0b2b9ad5afec3a445aae3078ebb5e3718e,2025-02-25T15:15:25.390000 -CVE-2025-26894,0,1,2d16cd4a8fae7a0ff88056a453e9093c1d9e3443e114af0c53676ab1f8a817a5,2025-04-15T18:39:27.967000 +CVE-2025-26894,0,0,2d16cd4a8fae7a0ff88056a453e9093c1d9e3443e114af0c53676ab1f8a817a5,2025-04-15T18:39:27.967000 CVE-2025-26895,0,0,3eb6addb22fb4b37c6c3f31fac229fd983ae417a5135246d65834c2c589c8b04,2025-03-15T22:15:14.013000 CVE-2025-26896,0,0,698aeca623c70e4b06e040cd55b5c2549a6c6c52876a66af61cb43c3e54c60ab,2025-02-25T15:15:25.527000 CVE-2025-26897,0,0,008344bbc82c06e5be6950b4745d40969170caa982c12bbebacc137b35f38f42,2025-02-25T15:15:25.690000 @@ -286949,21 +286977,21 @@ CVE-2025-26938,0,0,ccee8025a5da0f5335768772061878090bde7e99bf569f115b93a00b9aeb2 CVE-2025-26939,0,0,58ae7bfaf9694ba77b15898e6615a5486bcece1885e349ca30dab005e95021c4,2025-02-25T15:15:27.883000 CVE-2025-26940,0,0,027a042a9996f74c1b536a3ee0cf90caed7b08e7a2e9d51808cb5cb94c96159d,2025-03-15T22:15:14.810000 CVE-2025-26941,0,0,eeab969e211d00d26492a623edb2ecb8e112a324bb65c6f415710335014e5142,2025-03-27T16:45:27.850000 -CVE-2025-26942,0,1,6903f47c82d3106f9ea25acdbd1e5aee249214f914f26514ef99c4f3c778954d,2025-04-15T18:39:27.967000 +CVE-2025-26942,0,0,6903f47c82d3106f9ea25acdbd1e5aee249214f914f26514ef99c4f3c778954d,2025-04-15T18:39:27.967000 CVE-2025-26943,0,0,880198cc8338519544198ca562f39ac104b8bef0a8c121e384075bf4aedbb34a,2025-02-25T15:15:28.030000 -CVE-2025-26944,0,1,b8b80339f588cb52b7321eb267c00b3d9e72b2f68295e4067a7bc3414da53b1d,2025-04-15T18:39:27.967000 +CVE-2025-26944,0,0,b8b80339f588cb52b7321eb267c00b3d9e72b2f68295e4067a7bc3414da53b1d,2025-04-15T18:39:27.967000 CVE-2025-26945,0,0,6b5c2fad0a9b8f40f34855e800ac09994d07fec61ef015d056c7f881c616332e,2025-02-25T15:15:28.177000 CVE-2025-26946,0,0,df781d5aa26b91c3cad6d895bb9f19c76a8ac0bc37b086b89e10307c3390056d,2025-02-25T15:15:28.320000 CVE-2025-26947,0,0,17ca4a960f692537dd7bd29667eead07a638e9187cd25b27f2e6eb39d83f12f2,2025-02-25T15:15:28.457000 CVE-2025-26948,0,0,7e692ce2f0fb2189773dab014b01c64cf92c1c0d6e24b0bdecd31d44fc8a160e,2025-02-25T15:15:28.597000 CVE-2025-26949,0,0,756ec3a8273ffe21cd013eae401b29681f02ddf1186e27472f179b3deeae84ca,2025-02-25T15:15:28.733000 CVE-2025-26952,0,0,a13de9204c8fb7f5ac97c6580a46c2af94bfa390df931bb26a31447f73f1cb45,2025-02-25T15:15:28.870000 -CVE-2025-26954,0,1,61bbb677c76367dc681a61a9eb34b1cb4b843872dfbc537b65e6b0e5164d6927,2025-04-15T18:39:27.967000 -CVE-2025-26955,0,1,4c1429af0322731502991eac13c1a9065d93dfaec66c7f3aebcd3a2addb646bd,2025-04-15T18:39:27.967000 +CVE-2025-26954,0,0,61bbb677c76367dc681a61a9eb34b1cb4b843872dfbc537b65e6b0e5164d6927,2025-04-15T18:39:27.967000 +CVE-2025-26955,0,0,4c1429af0322731502991eac13c1a9065d93dfaec66c7f3aebcd3a2addb646bd,2025-04-15T18:39:27.967000 CVE-2025-26956,0,0,67dc3e0376c57291d36674bc82b71c5ab19cd7ba364ee74deb6f26199d4b6b1d,2025-03-28T18:11:40.180000 CVE-2025-26957,0,0,6c29e79d7d5ad28c3d1452c9dd015db2eba8e2ce8661a68ea61bf9040ea56305,2025-02-25T15:15:29.010000 -CVE-2025-26958,0,1,bcfa6e8a99221a4df9f2ddd663cf0ded24cf4f070f8a14cb3857059d1827e984,2025-04-15T18:39:27.967000 -CVE-2025-26959,0,1,a9cabe46fa09e9128bc33beffba0e4e00a8f0e5bffca5cb2e4af15c8afcb7ca8,2025-04-15T18:39:27.967000 +CVE-2025-26958,0,0,bcfa6e8a99221a4df9f2ddd663cf0ded24cf4f070f8a14cb3857059d1827e984,2025-04-15T18:39:27.967000 +CVE-2025-26959,0,0,a9cabe46fa09e9128bc33beffba0e4e00a8f0e5bffca5cb2e4af15c8afcb7ca8,2025-04-15T18:39:27.967000 CVE-2025-26960,0,0,ad36f999467934854428e722bc7b7f4dfd105622c135096dd3c0aa70afd80457,2025-02-25T15:15:29.150000 CVE-2025-26961,0,0,32038fb2c0fd1f686db79d976fcbcdf3a25031c595e82f3f1b331462be320b81,2025-03-15T22:15:14.960000 CVE-2025-26962,0,0,050ad56156a26d49e3d36ac5fa3745ab1b7f9b90df44edc74e086668cb228eab,2025-02-25T15:15:29.290000 @@ -286980,12 +287008,12 @@ CVE-2025-26973,0,0,dfc2b4d3fdbe9f7b9fc4015477cd2b76bd1f2004f6502405d65906b3259ef CVE-2025-26974,0,0,087b2068688c855d65bcc9dc5a6b0a9d8b357bc70b730524b9e5919cb0ee5a69,2025-02-25T15:15:30.153000 CVE-2025-26975,0,0,bc94ef92e4ae0e9211bb5bd8368f38ff4a13cd5277f00c8a683eccc72363d347,2025-02-25T15:15:30.300000 CVE-2025-26976,0,0,e3eb1573a0c594c2aed9b3aa281794a5002c7d4fab17f1e9ecb9a0d4e3ed199b,2025-03-15T22:15:15.407000 -CVE-2025-26977,0,0,3e76965d9d412abc48a1660772dd22be59de06b63cf1a0e24b4d5b5945fd841b,2025-02-25T15:15:30.443000 +CVE-2025-26977,0,1,0a6395823694e5544301f25e85c1221fd1991d69786de7e68367c11abd1ed7f8,2025-04-15T20:15:04.003000 CVE-2025-26978,0,0,772f8c7e1cc61be12e475c7e34fcd1b8cf09b60bc8c45928de3d3849a34cf069,2025-03-15T22:15:15.553000 CVE-2025-26979,0,0,3430c3c7589910c0ce9812da83cd3b1e3a2f205c2786e4db026732f56da4254c,2025-02-25T15:15:30.587000 CVE-2025-26980,0,0,dde475827d98f921adf627fe3afe81e813ccdfcae63ecbed9473027c0ab62abe,2025-02-25T15:15:30.730000 CVE-2025-26981,0,0,3c198cc5da3d6f650a9e99b4d0dde322351720ee3c085612f1fbc577072a1976,2025-02-25T15:15:30.873000 -CVE-2025-26982,0,1,bdf4e5f2998014077bd252e80391c650f26e0f149f423992e69164a18f9c8921,2025-04-15T18:39:27.967000 +CVE-2025-26982,0,0,bdf4e5f2998014077bd252e80391c650f26e0f149f423992e69164a18f9c8921,2025-04-15T18:39:27.967000 CVE-2025-26983,0,0,d6a859f29d624b201143fae24b6b474b6dfa136735775ba5e00cc884a212ebed,2025-02-25T15:15:31.043000 CVE-2025-26984,0,0,850870a6d13166bab30d2f61af8dc6fc95f6d7238517ef3ceb04f89d1f9a98a1,2025-03-07T20:35:00.770000 CVE-2025-26985,0,0,5fb0ce30a005f045393ce6a9e4877e64e68127385c508c29b67962ad383bc902,2025-02-25T15:15:31.183000 @@ -286994,9 +287022,9 @@ CVE-2025-26987,0,0,597d2628b42a4a65165e807aa9eb7e16ab56b0bee51783965b846b2753d56 CVE-2025-26988,0,0,0319a38815984a3d7757bba2dab0c325e1f38ec9d387be497de99ad33c8d24a9,2025-03-07T20:35:36.553000 CVE-2025-26989,0,0,b0ef3d20e454de8c22a4b1527a3da924af34822ec9bc2b6dd3acc50906fd5b9d,2025-03-07T20:36:56.700000 CVE-2025-2699,0,0,6396e1b9f8444bd1d0105b607426e0438fae6c8e1cad3a588c50e09924ca055e,2025-03-24T17:33:00.020000 -CVE-2025-26990,0,1,1a2244c0ae8c405d4561f7fae7f896b3cea2e2ea67d1ed44fe9feae8262428ae,2025-04-15T18:39:27.967000 +CVE-2025-26990,0,0,1a2244c0ae8c405d4561f7fae7f896b3cea2e2ea67d1ed44fe9feae8262428ae,2025-04-15T18:39:27.967000 CVE-2025-26991,0,0,84217b1c95797f5f6a3434460f887fd28027f10e4a2535fce5046994c53e0aac,2025-02-25T15:15:31.460000 -CVE-2025-26992,0,1,c93906bec2c33a02d838c5a2d09c21bba267dbc68120aa93c178090114737dfd,2025-04-15T18:39:27.967000 +CVE-2025-26992,0,0,c93906bec2c33a02d838c5a2d09c21bba267dbc68120aa93c178090114737dfd,2025-04-15T18:39:27.967000 CVE-2025-26993,0,0,25d916d390de90b80a1e84bf0243f302c32b655919eea97f6f91c9f96aa389dc,2025-02-25T15:15:31.590000 CVE-2025-26994,0,0,03494b736a3ca693fdaefc610166ca8a10d800440713e480c6b170f7815e45d0,2025-03-07T20:37:45.723000 CVE-2025-26995,0,0,9f9fd1cf4c78a39e37c563908ec2c351a2e202019a39ae0f35b6be53c49be04b,2025-02-25T15:15:31.720000 @@ -287004,7 +287032,7 @@ CVE-2025-26999,0,0,cdacabf1a660ac6dee9a5685fa630f6b1572dbc44af9dd2498823746cb2cf CVE-2025-2700,0,0,5071cd8329bcbe3e4081f465d8ee368358c8db967df119c33d261aceab1236e6,2025-04-01T20:47:42.813000 CVE-2025-27000,0,0,1ac554f083699af2e8a7ca7e5b9fee0cf63423d6e7b9eac2cf80407f8bbcfb4d,2025-02-25T15:15:31.853000 CVE-2025-27001,0,0,9549fdac37d52ebf8e1c75331c3601de8f03a77a6f35cd82e54896fef08473b7,2025-03-28T18:11:40.180000 -CVE-2025-27009,0,1,ba7a3973ccfababfdb452ae41b4eb27fe597fd251e088b37a2e2b8e171857c6b,2025-04-15T18:39:27.967000 +CVE-2025-27009,0,0,ba7a3973ccfababfdb452ae41b4eb27fe597fd251e088b37a2e2b8e171857c6b,2025-04-15T18:39:27.967000 CVE-2025-2701,0,0,4a00a8c87ae1a8f8d8996e5497fbf475b3761e12c82cf113f0ba83ecc0864e95,2025-03-24T09:15:13.950000 CVE-2025-27012,0,0,3a1893682864e642f849034c4092180dc7a4b18b7a6ad2f7375bac0e9841b34a,2025-02-22T16:15:32.497000 CVE-2025-27013,0,0,9b9378b18f13319340e1f24d5072a99db201f1036e2a63d2b47d9e89c2a36e2e,2025-02-18T20:15:33.880000 @@ -287127,9 +287155,9 @@ CVE-2025-27198,0,0,9a5d2357770f80005d36abe26d2cc6d5bc888484faf8cdfc049abf6065f82 CVE-2025-27199,0,0,dc1eae193bcecf1ff669540b48c6b48023b42e344facb3a7094db2db815d8443,2025-04-09T20:03:01.577000 CVE-2025-2720,0,0,9ae0525d8f85a05348d1159e71fc380adf3a8b9852bd68a0d6d2a49136b12cab,2025-03-27T06:15:29.720000 CVE-2025-27200,0,0,da512c28854d13b5d1c87ef0331923ee9d98d56b30ef9634b0c3b1b6fdcd6d2c,2025-04-09T20:03:01.577000 -CVE-2025-27201,0,1,e16a69f1e6ee9c10ddc82bfd85516ec2ecce4ab46419db4f3ca5e53d3f6d3f33,2025-04-15T19:47:25.960000 -CVE-2025-27202,0,1,e2fb121a71de22e29c90f28400f5e2a8546243d6f41eee6c3fef551b0ae3b445,2025-04-15T19:50:43.587000 -CVE-2025-27204,0,1,915ee58270bed657aa3414a33920c2828a16919cebf1c439beba158fba489933,2025-04-15T19:56:13.910000 +CVE-2025-27201,0,0,e16a69f1e6ee9c10ddc82bfd85516ec2ecce4ab46419db4f3ca5e53d3f6d3f33,2025-04-15T19:47:25.960000 +CVE-2025-27202,0,0,e2fb121a71de22e29c90f28400f5e2a8546243d6f41eee6c3fef551b0ae3b445,2025-04-15T19:50:43.587000 +CVE-2025-27204,0,0,915ee58270bed657aa3414a33920c2828a16919cebf1c439beba158fba489933,2025-04-15T19:56:13.910000 CVE-2025-27205,0,0,622fc600a5f2cc0012bd82d989d2a6b6005bac37857e576b9cccf13c1f678ff5,2025-04-09T20:03:01.577000 CVE-2025-2721,0,0,0ea4b131912f1c1068f18b233bf30f3ee27e9289a3b0d0502eb3374bc8db710c,2025-03-27T16:45:46.410000 CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40a25,2025-02-20T21:15:26.510000 @@ -287247,10 +287275,10 @@ CVE-2025-27405,0,0,663163c6c073b18f53346712329739a975081e88ca8125075a565c094735c CVE-2025-27406,0,0,16d66ed71bcc122eca2801ed1c57d9068f62c5d5532697159291cafa7e5c3495,2025-03-27T16:45:27.850000 CVE-2025-27407,0,0,1d15654ef204c91cd32beae5fe1b20af01b3f98dc702fb1b2edea51c8a7ee1cf,2025-03-12T21:15:42.560000 CVE-2025-27408,0,0,93737553abae903ea76018e61e22703521d366acf436a7c85e20d8d3f4423a3a,2025-03-04T23:15:10.897000 -CVE-2025-27410,0,0,b0303a9d6ae285d344bd4b183e09e6249db13662c4d6a0c2adf257bc94d8b72c,2025-03-04T21:15:14.197000 +CVE-2025-27410,0,1,c17e2cf05fc1e5815bfea0a0ae78fd9d0f61a50a1e1564df1f57054d7ec57468,2025-04-15T20:19:49.100000 CVE-2025-27411,0,0,0a8c61754ca17a315a8d6c0a67146f15c92b522c31bf75cc818698eafa246ea6,2025-03-05T16:15:40.310000 CVE-2025-27412,0,0,d9bbfd830ce3a327538dfaf425c1c45f17af21af968a5c50b137821ea628ebef,2025-03-05T16:15:40.457000 -CVE-2025-27413,0,0,3c6df10a4b674de018ae1676213c837633b3564b1055cc75094dfe9454f1a444,2025-03-04T21:15:14.303000 +CVE-2025-27413,0,1,3bf0ae01f8e6b7627b108e281288e91ed99512fff48352570acffd4f0573a43b,2025-04-15T20:27:24.010000 CVE-2025-27414,0,0,929fb75122881174d77a5f272353ca474f8f31f3e2150b8f4eb15693c5e1bce0,2025-02-28T21:15:27.957000 CVE-2025-27415,0,0,5c13e45a51ec2cff72537e412ce1ec86fb678a4cb1991d54966cfc60572ae3df,2025-03-19T19:15:47.257000 CVE-2025-27416,0,0,7d697ee2a206d2c6a4b9875052c6dbb5339b6641445690f52932a9ae6193dd23,2025-03-01T01:15:28.857000 @@ -287348,6 +287376,7 @@ CVE-2025-27554,0,0,cf23284196495ef624f6aebb4a495f3e36a6b5bfc39b634f5a2b752d43a77 CVE-2025-27556,0,0,4ca86b14fb70d2b656f3535be9cca045a182add78643be3ce819c6025668a902,2025-04-02T22:15:19.367000 CVE-2025-2756,0,0,092a25b42b3189a59251afe4527fb8569dc69374ff038cad349569e68ebf3853,2025-03-27T16:45:46.410000 CVE-2025-27567,0,0,8ca9b74c3e219a4d15e6ee8281f7f16769702266f24ed34aea1ada953bbf2d6a,2025-03-28T18:11:40.180000 +CVE-2025-27568,1,1,959628bcba2be6020a933bd25140d5c2bf0651a2d0c53dca589425d24c4d331e,2025-04-15T21:15:55.060000 CVE-2025-2757,0,0,7bd39bef42ca34fb5d12792b895089cd6318ba18d4fbf0374c2916e645d3eab2,2025-03-27T16:45:46.410000 CVE-2025-27574,0,0,93f87063722ae1c1814b2d9c92899de9d571237b060b0430e67ac3aa4baec2c6,2025-03-28T18:11:40.180000 CVE-2025-27579,0,0,e37901d639203dabeb0abb1f8d25952e3d9090042ecc93a0b94bf072c75c186f,2025-03-04T19:15:38.800000 @@ -287497,7 +287526,7 @@ CVE-2025-27787,0,0,155035fe75bae04ee902cac5759b78779c185535cde642fccfdd2b025dec0 CVE-2025-27788,0,0,b24a56e317b2a6ab1d22b1dee70e073e47082751d4072c9e5bc5b9f65a1fa097,2025-04-02T12:35:54.383000 CVE-2025-27789,0,0,1d6dffc84798f01608e4f99792545443ae7fe01f00fb8a5ade60b9d3392855a3,2025-03-11T20:15:18.330000 CVE-2025-2779,0,0,f769b50fc7746b0a71d436d1e829f1cd996f030f421eebbc56b6cd3744554c33,2025-04-02T14:58:07.527000 -CVE-2025-27791,1,1,5d37fd3efda29142db4d59d4f4c4bf5614512242bb9507ddd121f00f18386617,2025-04-15T19:16:07.433000 +CVE-2025-27791,0,0,5d37fd3efda29142db4d59d4f4c4bf5614512242bb9507ddd121f00f18386617,2025-04-15T19:16:07.433000 CVE-2025-27792,0,0,b74c7d86509a90375e7b6ae418264a1e46ee3163db3412e248a72d4623f714ea,2025-03-12T14:15:16.930000 CVE-2025-27793,0,0,62455994f5face7dbcfa1a98caad81214c4b0da370d91206c6d21af82a45c6cf,2025-03-27T16:45:12.210000 CVE-2025-27794,0,0,29af72e657ff2464b2a2937c7c4f1f9dbae6fd8fd9c8cc38aa28016fcbce1e25,2025-04-02T12:33:56.437000 @@ -287548,10 +287577,12 @@ CVE-2025-27926,0,0,55eb57ada8c72239b09d3012ac06f54ef846ef608760d35a348131200e00a CVE-2025-27932,0,0,e89ea3f7bc1f24dc892df481b28cf611425fca497d4d9ab9fafb911d848cbe47,2025-03-28T18:11:40.180000 CVE-2025-27933,0,0,93368137a33aa362057a4035ec036f1aedaefb3c8486745a8d93918e46a37c4e,2025-03-27T14:55:25.660000 CVE-2025-27934,0,0,95b3d1b020dd3defb4f0c3dbb03f408c8cd96475518f9b12ef782500b5b25703,2025-04-09T20:02:41.860000 +CVE-2025-27938,1,1,d7bcba0f632aea5ba1fa66cdb4197163f583f147ed6637861a43074f1b6bdc99,2025-04-15T21:15:55.273000 +CVE-2025-27939,1,1,a8b0a5d4ce4ab89c9d411bc9587b1d3b976725e3774d2de4ed0fe101b1a61c51,2025-04-15T21:15:55.433000 CVE-2025-2794,0,0,b6c5052929166b2fdf6e3c269a20ead353e60c001082fefc35ed2b51aad72541,2025-04-01T20:26:22.890000 CVE-2025-2797,0,0,b1486c99f88bb0fe24ee44879fb68daede55b0ca436e040e01e9162820f0ca7f,2025-04-07T14:18:15.560000 CVE-2025-2798,0,0,ce50f1abf598f0e20dbb0b231565f286c9fd88d139aecf5e428c88b471d2c0d4,2025-04-07T14:18:15.560000 -CVE-2025-27980,0,1,c76463e5f206251c3763fe3943bf16ed067537f8d589dadf6a490d2251382d86,2025-04-15T18:39:27.967000 +CVE-2025-27980,0,1,6bc1ba98a3f874498f9e85a32c34829b4242d6bca3938f007c6a53c2be7a6e2a,2025-04-15T21:15:55.583000 CVE-2025-28010,0,0,716afcbc5cebfe3c684dbf7aa12e99a30e3cb54526d7e93ef8e97f615752b08f,2025-04-03T16:42:46.520000 CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccdc59,2025-03-28T20:00:36.220000 CVE-2025-28015,0,0,631137508e8a20a86b77040d3a1f398272eddb26c2d8f5274ce598561c73146c,2025-03-28T19:49:16.520000 @@ -287570,22 +287601,22 @@ CVE-2025-28093,0,0,29a5b3080e3cbf963755de2e44da431efef91255ecccdc5fdce85267962b8 CVE-2025-28094,0,0,43b699593b6066edfc5dc99b07a87e6aa9cb43db61462f8282257bc196f89aa1,2025-04-07T14:09:44.973000 CVE-2025-28096,0,0,35d4134d78905af0129462be767cef757b9b22ca399b6d6ee9e18c61774ffdf3,2025-04-07T14:00:57.987000 CVE-2025-28097,0,0,6168db1fe1d777fd2d394c22e9d594177390d1d2e476a2272a9ebd5e94287f26,2025-04-07T13:59:18.590000 -CVE-2025-28100,1,1,3de5a288a7d1ae51dd7eb3d3e5009ebd1b5e377a7aa6a2d2198245c6ff5f58f9,2025-04-15T18:39:27.967000 +CVE-2025-28100,0,0,3de5a288a7d1ae51dd7eb3d3e5009ebd1b5e377a7aa6a2d2198245c6ff5f58f9,2025-04-15T18:39:27.967000 CVE-2025-28131,0,0,0e6d437e3a9f63309173cfffb683667f8de949bf1baa410130154ac2738212a3,2025-04-01T20:26:01.990000 CVE-2025-28132,0,0,97b47f11d67eb8801e01a6ba8c51fcb6171d404dc753f2ff5e62dc9c1e96c78b,2025-04-01T20:26:01.990000 CVE-2025-28135,0,0,3c4c5b74864d84436149ac901c7ee84cc8a8d394ff1e3314e6ce4d35a081fb42,2025-04-15T14:15:41.103000 -CVE-2025-28136,0,1,b67224c18e5508a5c40de380e9631f428b9cbc2fef251c01f2026c36e7e7eeb8,2025-04-15T18:39:27.967000 -CVE-2025-28137,0,1,3a6c616f5efa5c6ce999bde48783b82d2ea62ddabeef6ffdcce8966d580beefc,2025-04-15T18:39:27.967000 +CVE-2025-28136,0,1,9534d6245e429fc9cb5ad2537e0ed297849b68354a4e2708d9fe39e2349f09c4,2025-04-15T21:15:55.767000 +CVE-2025-28137,0,0,3a6c616f5efa5c6ce999bde48783b82d2ea62ddabeef6ffdcce8966d580beefc,2025-04-15T18:39:27.967000 CVE-2025-28138,0,0,1b34e50519727583c2509248c4a99e365feb1498de5e5962b10a3a7f43512fae,2025-04-15T15:16:08.067000 -CVE-2025-2814,0,1,09edb5ffe7a5c57b1d00366da83ea3795ad0b26d59e02444662429a90a7a208f,2025-04-15T18:39:27.967000 -CVE-2025-28142,0,1,36e28730f9db06f7ac2f95d9a326bc781fb71c1b8dcd6df61953134989372206,2025-04-15T18:39:27.967000 -CVE-2025-28143,0,1,2fd2d351fd31240bfca86265eaebcc1cccb9cbe19ce144bf4b21a68645c7f53c,2025-04-15T18:39:27.967000 -CVE-2025-28144,0,1,52794b00bba26138f5a2f9c16aca006d74e587524fac76425d46ae28a65a981f,2025-04-15T18:39:27.967000 -CVE-2025-28145,0,1,1dfcd01a1c6b245057cd4bc085a180d051e0dd53fabe11440ed1de4feb9665e8,2025-04-15T18:39:27.967000 +CVE-2025-2814,0,0,09edb5ffe7a5c57b1d00366da83ea3795ad0b26d59e02444662429a90a7a208f,2025-04-15T18:39:27.967000 +CVE-2025-28142,0,1,ea026c7062cbcd06c6d62698c2dd79207b4a8421d1fddc1cbe89d4789bc06a8e,2025-04-15T21:15:55.927000 +CVE-2025-28143,0,1,2e46bc6c27355817f645a4a2ec97a2493e54630201e211223442c3a3a4fdbe0c,2025-04-15T21:15:56.123000 +CVE-2025-28144,0,1,0edbd3d624e7c24d3e1c5c43801694dd27b86dac377be758dd04e7ec6d8f8a27,2025-04-15T21:15:56.283000 +CVE-2025-28145,0,1,12578323676da90de1c153a2ea3f56f0aa6a447d5b0604569c71a7f610185bb3,2025-04-15T21:15:56.457000 CVE-2025-28146,0,0,32c9b208c84d9df041320792b106820cf214078a35a3cb79372374645d1870eb,2025-04-15T15:16:08.660000 CVE-2025-2815,0,0,242155fff6e988a29170d3e8e0a0ff904f29004fb7975cc06cbc247a50a0c090,2025-03-28T18:11:40.180000 CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000 -CVE-2025-28198,0,1,86565fab83901a4a2557c7ea98954090c48d286ab93c433d245ebf7916392bdc,2025-04-15T18:39:27.967000 +CVE-2025-28198,0,1,776fc64f0bfee07e090f26d916f04179d431e67eea7c61390a0788f0ccac78f3,2025-04-15T20:15:38.833000 CVE-2025-2820,0,0,6cdeb95f9b6504397d792f97c785fc6adf2ecfa6c7ab16f1c8d1d83356fe06c9,2025-03-27T16:45:27.850000 CVE-2025-28219,0,0,e1b7ad511688218627fda313274ae55255c2e072edd5fc05ac0a78cadb7afbe1,2025-03-28T18:11:40.180000 CVE-2025-28220,0,0,e2a4aa55d41a566e121997f5f817f2ed5c08f118dc84aa5a5b7b6f9f16b7a36e,2025-03-28T18:11:40.180000 @@ -287595,7 +287626,7 @@ CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18 CVE-2025-28256,0,0,c16943b644cdad0f362ff940632bf3b431153c240410202f1016e53c5c3bd875,2025-04-14T17:06:52.373000 CVE-2025-2829,0,0,059a0cf4c937544428f8f9992f350ccef1c580a6c89e3bad6c17d91e38c4aa72,2025-04-08T18:13:53.347000 -CVE-2025-2830,0,1,9f9de835284fe77bef50b8a54cca4a5afd0c16d26ad608954e0f0b3c880b3b53,2025-04-15T19:16:07.927000 +CVE-2025-2830,0,0,9f9de835284fe77bef50b8a54cca4a5afd0c16d26ad608954e0f0b3c880b3b53,2025-04-15T19:16:07.927000 CVE-2025-2831,0,0,b84154d9a7200c34454fa9b25d7562fdd5779d7106c4ee6e9588212eed85834a,2025-04-11T17:00:07.067000 CVE-2025-2832,0,0,4793b0e61870dc2623c9525ce0b6e978786dc9b055c079ba680182ca85609996,2025-04-11T16:25:55.093000 CVE-2025-2833,0,0,5ee1553047443311af90b172ce83a898e2802ed44b7f8cedda9626fc88ddfee1,2025-04-01T15:43:23.657000 @@ -287606,7 +287637,7 @@ CVE-2025-2837,0,0,b89aeb2a53f8a50fdc7d1cb971618f78d6548d3dfb914df0b41cb0d9a2a5f8 CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4dfa3,2025-03-27T16:45:27.850000 CVE-2025-28395,0,0,e2a008eff6d871d94e498e18fdcd7ec1a8104377f0bfd0c36d8d69a8cfbea062,2025-04-15T12:52:46.433000 CVE-2025-28398,0,0,a80aa3350f7ebc843f0b185d49e6b66d7edf0d8201a54a2ee3a02548dd1b1270,2025-04-15T12:51:12.750000 -CVE-2025-28399,1,1,890515fc4c5ee5f31215b4d77822313672e2e8f4e4673dda090a433835910eb3,2025-04-15T19:16:07.567000 +CVE-2025-28399,0,0,890515fc4c5ee5f31215b4d77822313672e2e8f4e4673dda090a433835910eb3,2025-04-15T19:16:07.567000 CVE-2025-2840,0,0,1611919e470b3959ac5f5634b987862e109125e9a8a008183091dc9630f3ea33,2025-04-01T20:26:30.593000 CVE-2025-28400,0,0,cc1f6f84cf8a6714de7f979e521029089d85e3bab5eb1dddede51bed2df8cbb6,2025-04-09T17:29:47.113000 CVE-2025-28401,0,0,f7b9c29cb1543d57a788f6df9919d9bc678436ddeda3822118494d478d80547d,2025-04-09T17:19:47.947000 @@ -287617,7 +287648,7 @@ CVE-2025-28406,0,0,8a8584932ab9b30901f733e1b8a8a21e4c7b2fc672972e9d10fc1d5750215 CVE-2025-28407,0,0,02ff9b99320c3233f5b0003257d084563bbb73ef199de05918def25b69139a43,2025-04-09T19:00:44.523000 CVE-2025-28408,0,0,556d1da5e4b09370d02f117a4f9eb27e5e37ca05d1c933d6571d5048adb4a027,2025-04-09T19:00:22.650000 CVE-2025-28409,0,0,1d13bbbd37d815fb6acbd49cc553af3b39f1a6a7d080c3d5a8369d4d6c155c19,2025-04-09T18:59:55.370000 -CVE-2025-2841,0,1,545b5366a114015cb1f7af73a3f43aa1b305aab9f06d16f24fd1f0f75d7feaea,2025-04-15T18:39:43.697000 +CVE-2025-2841,0,0,545b5366a114015cb1f7af73a3f43aa1b305aab9f06d16f24fd1f0f75d7feaea,2025-04-15T18:39:43.697000 CVE-2025-28410,0,0,390a852160bddcf2c156cf274d0d8bca8a6721ecd4d3570b30e72c83c7674ba1,2025-04-09T18:53:55.197000 CVE-2025-28411,0,0,e9415e3b22995161cfbee07866f540247a4fae9e1d653d56761cfbbc552cd7ef,2025-04-09T18:45:40.463000 CVE-2025-28412,0,0,e6e051343f3112a9d08b359070fea94cc6ed8af3cfe5b527f4eba28e476b3165,2025-04-09T18:41:48.533000 @@ -287643,13 +287674,13 @@ CVE-2025-2867,0,0,64215baabccd6fdf04d8b048452d95e3b2ff4d5237bc2e15b566982b293865 CVE-2025-2868,0,0,8956298391ba0923e590541b3fae1d38dc061830ea826ef81d09ab51842ff44b,2025-03-28T18:11:40.180000 CVE-2025-2869,0,0,c096e0a3f8c1567897f984075f9b7eae7e0b2ff1c1febfd4a8d8f0861bac0208,2025-03-28T18:11:40.180000 CVE-2025-2870,0,0,ca33e2f6e2a6e0703a9540671a46388cc00e335b8b92af1dfdf1002f06620382,2025-03-28T18:11:40.180000 -CVE-2025-2871,0,1,72928dbafeddfbf08ee8147b72abcd54f7c9f7a803d6dd235cea8d19acbf438f,2025-04-15T18:39:43.697000 +CVE-2025-2871,0,0,72928dbafeddfbf08ee8147b72abcd54f7c9f7a803d6dd235cea8d19acbf438f,2025-04-15T18:39:43.697000 CVE-2025-2873,0,0,edeec97aec2b3292b499f5094d0f168ecd8763c5a36659abef4c11888578eb0e,2025-04-10T08:15:14.857000 CVE-2025-2874,0,0,6a503ede6640ff91644e2f2d002d5c6c981994fafd27ed943d3456640dee218b,2025-04-07T14:18:34.453000 CVE-2025-2876,0,0,fb0e4b92d84009faee60c62d1ccf1db28c8137bc50cb10bf701561ec9ad0e3a6,2025-04-08T18:13:53.347000 CVE-2025-2877,0,0,84ec84d2bfb12624c83348efbdfe58ac8be43428be65066c732bbd9fdb6142cb,2025-04-07T16:15:25.720000 CVE-2025-2878,0,0,91ed70612b37527f5a64720333f3ec88a66eb4235ee494c58d3cdb31eafddc33,2025-03-28T18:11:40.180000 -CVE-2025-2881,0,1,f9a8f1071073585b0e17ccfe204702ab0d38d9338469cb67641392702cb26ea3,2025-04-15T18:39:43.697000 +CVE-2025-2881,0,0,f9a8f1071073585b0e17ccfe204702ab0d38d9338469cb67641392702cb26ea3,2025-04-15T18:39:43.697000 CVE-2025-2882,0,0,c97b3f3ea8d4bf1b525408e9c0aeb5839e6b1dab2a43ddecf7ef1915f34a41ad,2025-04-08T18:13:53.347000 CVE-2025-2883,0,0,de11120bf19ac8735b713769da981d898702017cd1ccc7eb0f5a880098b288b6,2025-04-08T18:13:53.347000 CVE-2025-2885,0,0,d7e6b0bcc2bde4b9a153bfaf9504a6fe34cca823b62dab5c29aeb4ff68d351e8,2025-03-28T18:11:40.180000 @@ -287790,7 +287821,7 @@ CVE-2025-2919,0,0,b96ce7ce0f34936fb136f2b1ffc6459c07bdc587830fdf6a756fc40e2dfb51 CVE-2025-2920,0,0,2401864f099a711f30f8b2d38398a72d7195f85541e7f19ba35b8b1ff663c52a,2025-04-01T20:26:39.627000 CVE-2025-29208,0,0,67e2605039ee3d1f3c5ea9f6fc4b9f6bb3ff72ecfc77443b4593d17db1d38ecf,2025-04-14T18:15:29.100000 CVE-2025-2921,0,0,d4bcd9d1bb65075ea7939e905e49c36e22f8a771b8d05601490e3dfa0958d0cf,2025-04-01T20:26:39.627000 -CVE-2025-29213,1,1,3a9fda1762d4d3be9b89268198a6d7cb8d542eb3a8d4320fe195cbc3b7d87368,2025-04-15T19:16:07.673000 +CVE-2025-29213,0,0,3a9fda1762d4d3be9b89268198a6d7cb8d542eb3a8d4320fe195cbc3b7d87368,2025-04-15T19:16:07.673000 CVE-2025-29214,0,0,2f3c93fd24943456f370bfa5c5d58e2eb2d54f2259ee734aa123f6beaa43463e,2025-03-25T17:37:42.507000 CVE-2025-29215,0,0,96e2f565718ae35623a5dad2291d2bb27d05c2c10bebe7c06ba56599d76124a9,2025-03-25T17:38:20.710000 CVE-2025-29217,0,0,e64e2910b1dc1b0effd2ebba9d04863326d941e1021d8d58ce80e3146dd4312c,2025-03-25T17:38:28.670000 @@ -287806,8 +287837,8 @@ CVE-2025-2925,0,0,57c779cb80b04dea98d1306bb52a4ba039c948f0dfa18686d63a5c924ae120 CVE-2025-2926,0,0,3e72a087e763323bf5856d294592139ea832180777dddbb463811921e15208e3,2025-04-01T20:26:39.627000 CVE-2025-29266,0,0,ebe0e382c4a5abdfbad4d36c3a40b9356ea4b38f02b497fb84326608368d7b76,2025-04-01T20:26:30.593000 CVE-2025-2927,0,0,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb99,2025-04-14T17:09:19.427000 -CVE-2025-29280,0,1,3791042cc6babca68a5c51080adf7ec6abebfb061e5cf8f6357f5c61c91ab18c,2025-04-15T18:39:27.967000 -CVE-2025-29281,0,1,af14f6aa29e86feabd924d626164169442c4866ff6e5341a758fcbe692dd6451,2025-04-15T18:39:27.967000 +CVE-2025-29280,0,0,3791042cc6babca68a5c51080adf7ec6abebfb061e5cf8f6357f5c61c91ab18c,2025-04-15T18:39:27.967000 +CVE-2025-29281,0,0,af14f6aa29e86feabd924d626164169442c4866ff6e5341a758fcbe692dd6451,2025-04-15T18:39:27.967000 CVE-2025-29294,0,0,473bd475f5fb8d7702e2a93a3ba641b31019129d004d4409bf3c3b190bf15c6d,2025-03-24T17:15:20.880000 CVE-2025-29306,0,0,567e03f8ff449bb7e634022c2ce74be869643687b17fcd889b697e34563a9d1f,2025-04-11T17:50:50.240000 CVE-2025-29310,0,0,6e73f20315929ac6e51322cdc62ad6436937170ed8ab91331b8363a99e479dcc,2025-04-01T19:51:09.180000 @@ -287880,9 +287911,9 @@ CVE-2025-2956,0,0,12b742621d86c28d988776b85da597ef776ef6fe74e703c6823d14feeb258a CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf04f,2025-04-01T20:26:30.593000 CVE-2025-29570,0,0,ce09831559b48fe479ba4c5f9b34d0db4bbbbbf20068eb3ed4fe546923ebfe0f,2025-04-07T15:15:43.543000 CVE-2025-2958,0,0,9728ea5d0e1e0ffe03d484b47c7dc7d2f752fe0ff3a0cf460614ef3d0b6ffb41,2025-04-01T20:26:30.593000 -CVE-2025-2959,0,1,57439d37e721214da77398b2206968b1ad6df0cab306317270d7e0fd15a79d3d,2025-04-15T18:17:30.903000 +CVE-2025-2959,0,0,57439d37e721214da77398b2206968b1ad6df0cab306317270d7e0fd15a79d3d,2025-04-15T18:17:30.903000 CVE-2025-29594,0,0,2f622bba8fdc6dc52fbb1c6d9cffd703149b20ba0389fb0df41fe5a0ef1aba15,2025-04-08T18:13:53.347000 -CVE-2025-2960,0,1,48a895c8f54538f74cec3a9e11744bb422ef858e72d370441685f9bd785c394d,2025-04-15T18:28:01.283000 +CVE-2025-2960,0,0,48a895c8f54538f74cec3a9e11744bb422ef858e72d370441685f9bd785c394d,2025-04-15T18:28:01.283000 CVE-2025-2961,0,0,99a9282acf76e32af58efa1bac54403a0a08178dfa00cc28168e32b8a53d8a08,2025-04-01T20:26:30.593000 CVE-2025-2963,0,0,84d2c4a858a789275648d5c139e966fa3d1f94dab800d93bbe623441c26249a9,2025-04-03T23:15:38.103000 CVE-2025-29635,0,0,ec72c4a9bc58304e70384a4323071097e434b0be9c6a730e4fb246fc5922f36a,2025-04-03T17:35:51.163000 @@ -287896,11 +287927,11 @@ CVE-2025-2967,0,0,14b33c1f634d82e0ee8f6eba9d8900eb26f8e5ef6b28fe9846307dc0432895 CVE-2025-2968,0,0,2f5310773b41e32a0609f9013ca63505bab1761feb2b83c508abd214cd1156b1,2025-04-04T01:15:39.930000 CVE-2025-2969,0,0,2c92f9aaf929a695828188a9354c9039b1da27ec28571736050e209bd0423cad,2025-04-04T01:15:40 CVE-2025-2970,0,0,67c007e67877a94fb703f9d730b81129ea1f6387e2e40954ff831fd4807254f0,2025-04-04T01:15:40.067000 -CVE-2025-29705,1,1,d50bc7403680eaf9635e360140860dd9bb945ed47cbe680766215a624ae6d64d,2025-04-15T19:16:07.783000 +CVE-2025-29705,0,0,d50bc7403680eaf9635e360140860dd9bb945ed47cbe680766215a624ae6d64d,2025-04-15T19:16:07.783000 CVE-2025-2971,0,0,2706995c55a7dbc3fec5708d9b29d92444bde85b5e349db5ecc56094ac7bd4d7,2025-04-07T23:15:43.050000 CVE-2025-29719,0,0,8e7057a22540e0bc6e719ee80087d1e3317b2b2e7c0e51bfcdcdafe3f5440328,2025-04-10T14:27:50.553000 CVE-2025-2972,0,0,9bd90eb57737eba9afab46fcd8061576d92129d2495ebdef7228d08af4388952,2025-04-04T01:15:40.127000 -CVE-2025-29720,0,1,5ec932914a7d81da0b10599d75c12821d0c2e8eb7f364340baae17593b19712a,2025-04-15T18:39:27.967000 +CVE-2025-29720,0,0,5ec932914a7d81da0b10599d75c12821d0c2e8eb7f364340baae17593b19712a,2025-04-15T18:39:27.967000 CVE-2025-2973,0,0,f988078874627143c2def1ab30019bab3c4d13be44205338de0c50c2330cd94b,2025-04-10T14:34:24.567000 CVE-2025-2974,0,0,695ae768ef6524a31e333a2a15c7b6d7e58b63b62d57be8f5f977780042de419,2025-04-01T20:26:30.593000 CVE-2025-2975,0,0,a51ab4826f882dfc9eb64143ebea4f1b786d39ebf186c00a08fe8a9302ac16b4,2025-04-01T20:26:30.593000 @@ -287939,7 +287970,7 @@ CVE-2025-2980,0,0,e90bea9fa0869a16071d3d0a033a2bb76e259b349a9a0bf9fb845593fb53ed CVE-2025-29800,0,0,aa88ac334e3cd604c62f77dfd84972dee93997f0496d3c9899d6b123738b9e7c,2025-04-09T20:03:01.577000 CVE-2025-29801,0,0,f30e3573fbc30d148919af02cba137f289819a51d5b9eee78416badb077c0363,2025-04-09T20:03:01.577000 CVE-2025-29802,0,0,46c6a557868779b154ff9aed262faa8bb2e5f5d0c5c9b86e54991fc1f06a6f56,2025-04-09T20:03:01.577000 -CVE-2025-29803,0,1,9d006594323dbfe6187fcd6a78a42ae514cf0ee6ec85f27f56221230e283c6b9,2025-04-15T18:39:43.697000 +CVE-2025-29803,0,0,9d006594323dbfe6187fcd6a78a42ae514cf0ee6ec85f27f56221230e283c6b9,2025-04-15T18:39:43.697000 CVE-2025-29804,0,0,ca1cad07e08ecaedeb2eafb47c36614038147850e0b096fd73a494ee2f654c18,2025-04-09T20:03:01.577000 CVE-2025-29805,0,0,7845e0d29cd139c610706039b774486523ec11a7a3670f5f227cb58b14d3c44a,2025-04-09T20:03:01.577000 CVE-2025-29806,0,0,dde4af49c411f184b167c313d22e18033ab4a12ed1db72bb3f1109ada8823750,2025-04-02T14:16:10.870000 @@ -287953,7 +287984,7 @@ CVE-2025-29812,0,0,5f5315af1327d52cbeaa2b595b26bee5d15120c0fc5e1d6a5682623e7d46f CVE-2025-29814,0,0,435e9e17285030a77811f9738adb8ece14bf52c5a294fba746e389024996a262,2025-03-21T01:15:17.253000 CVE-2025-29815,0,0,1f4f3e8e153f17fdbb8262dd7f05d4fe97a5b776e03d0624e95ae0ccca656378,2025-04-07T14:18:34.453000 CVE-2025-29816,0,0,0f28f4d6b062144521da93fd52e293f6ac7b0bce3b6ac97d2d45ee7d8437fc19,2025-04-09T20:03:01.577000 -CVE-2025-29817,0,1,1170329ee2e0467f928a5ef3017c5650db5b6fff4256f199920823573aa5e2d3,2025-04-15T18:39:27.967000 +CVE-2025-29817,0,0,1170329ee2e0467f928a5ef3017c5650db5b6fff4256f199920823573aa5e2d3,2025-04-15T18:39:27.967000 CVE-2025-29819,0,0,13c5154fc859eb7884684c717d992e6b1620b6ae7f0942d5cfe5931b09754396,2025-04-09T20:03:01.577000 CVE-2025-2982,0,0,2c2ebcac608fe0d1adcb1e6d3ea075ad059f2f0c1d50f6b5761a2ce38a606d84,2025-04-01T20:26:30.593000 CVE-2025-29820,0,0,ceece2b096c5b57274d87d5eccbf5459776b2e25facea8bd356b4873a294d6fe,2025-04-09T20:03:01.577000 @@ -287962,7 +287993,7 @@ CVE-2025-29822,0,0,4de7dc0240419b00e77efcf43425faa5e15e299e871fbc149227db8670e83 CVE-2025-29823,0,0,7020e8f361c2e1051ff80b6673ee2bc8c14b1552e575c216beb796659e5526c1,2025-04-09T20:03:01.577000 CVE-2025-29824,0,0,98cb78aee90059a4523542d9603153b103d0d54101029a6433c3089528857b68,2025-04-11T13:52:51.510000 CVE-2025-2983,0,0,d31f69cd4a503a465c90bfed858cd3831ad229c0ecb657ddc75c62172e5f9155,2025-04-01T20:26:30.593000 -CVE-2025-29834,0,1,3442f61662daaf82cdb155076f9f74550f7378d3f34007788d35fee89bef7552,2025-04-15T18:39:43.697000 +CVE-2025-29834,0,0,3442f61662daaf82cdb155076f9f74550f7378d3f34007788d35fee89bef7552,2025-04-15T18:39:43.697000 CVE-2025-2984,0,0,1ca7c36096a1944da99408d66ce040b5e7a8b1b551935cef4ecf4b2025e27c21,2025-04-01T20:26:30.593000 CVE-2025-2985,0,0,687fc2820bd43d778eaf02f10df92a92091bdb50597369a30af5a9476cdae1b0,2025-04-01T20:26:30.593000 CVE-2025-29868,0,0,b927f2785378c622235f633189b112c490059ef762d715c0b82b004d9b8787d2,2025-04-15T13:07:54.393000 @@ -288005,8 +288036,8 @@ CVE-2025-2998,0,0,f06516e01ca436e5d104d75c09e27010d33dfc4165ed7c41c61b0ba2b3ec8a CVE-2025-29980,0,0,02b1f4fe8cc2958b2decdcfb4a2e99acadf56a3773103d9215c6253bff189364,2025-03-20T20:15:33.233000 CVE-2025-29981,0,0,bc2e92e7c7060096b3d1962707be8389c3bd356ce03926ba8bfa8db6b09023fa,2025-04-02T14:58:07.527000 CVE-2025-29982,0,0,07e38f4a7e83f4e02dd67a856ae6395d2d06b5a3b56ffb75e9f9faa0ed4b7ed5,2025-04-02T14:58:07.527000 -CVE-2025-29983,0,1,06381632c894d0b7c7d68cbd4ba90ec8a9505521df60700da874956df7791137,2025-04-15T18:39:27.967000 -CVE-2025-29984,0,1,1ea0f4e18007057cc419571e288e4347be87a9c7dbb01ca591fe880f64a3d934,2025-04-15T18:39:27.967000 +CVE-2025-29983,0,0,06381632c894d0b7c7d68cbd4ba90ec8a9505521df60700da874956df7791137,2025-04-15T18:39:27.967000 +CVE-2025-29984,0,0,1ea0f4e18007057cc419571e288e4347be87a9c7dbb01ca591fe880f64a3d934,2025-04-15T18:39:27.967000 CVE-2025-29985,0,0,1eec117dbf1705dbb49dade4527f2796a0b3e1a4a8df53018f9374af083df05b,2025-04-08T18:13:53.347000 CVE-2025-29986,0,0,ef87710ecf0b1b3921f667539fd6bad7e152cdf84671159872c1fc43b230a3bc,2025-04-08T18:13:53.347000 CVE-2025-29987,0,0,962644397d15823d289c2ad8de7be5eae2dfe8787c0957eaa9f9d8409e9ed1a4,2025-04-07T14:18:34.453000 @@ -288111,6 +288142,7 @@ CVE-2025-30197,0,0,2d4109cd57eb04a1dbf5d412cbfee8b568c6ea58cd4671c7483e548e96f39 CVE-2025-30203,0,0,5db06c38cdbea2eb8c493695ff18560d3171df5fdf98e563249182ea23863bb1,2025-04-01T20:26:22.890000 CVE-2025-30204,0,0,a62a2febc5dc48c687f751c501a508130f5fcc004bb8b764581a0a0be25b0f0a,2025-04-10T13:15:52.097000 CVE-2025-30205,0,0,5a6e6a15e27f16257c15600ed612a889ee89ec4cb07cdade70362275ccba48b8,2025-03-27T16:45:46.410000 +CVE-2025-30206,1,1,20dd65517169f54b2695361fbfcaa6fc084c16ec10b330d4ec81a791c17d4ecb,2025-04-15T20:15:39.127000 CVE-2025-30208,0,0,8d10db1183f79516c18383e3ab326bcd260d9a2a6e5e9bbda5d21358e669589c,2025-03-27T16:45:46.410000 CVE-2025-30209,0,0,296b6bfd92b671240c888b0d7357ec25edc1731069d0df4d8d354cf96814c041,2025-04-01T20:26:22.890000 CVE-2025-3021,0,0,a819f7885f966c318efce1137c78018078cd56f1c4c8d8cc0e7412d02d27b6bc,2025-04-01T20:26:30.593000 @@ -288134,6 +288166,7 @@ CVE-2025-30232,0,0,eeb8ece2fb628c02d10a566625252905e84a897de93ba8f383987da02d0cb CVE-2025-30234,0,0,cf20660d6d37e637116a40ce9b3055465db9a1b9c87663c91728f3bae499e866,2025-03-19T05:15:41.353000 CVE-2025-30235,0,0,9222f9a2278ce550ac692bab27bb8a819d1de8dee62df51cf264df3162d55e58,2025-03-19T06:15:16.043000 CVE-2025-30236,0,0,3f73c2c498a83243d93d66190e1e818a0ccbcdd521592f269afac288686f067a,2025-03-19T07:15:34.313000 +CVE-2025-30254,1,1,35456a363fbf28c87b603f42a9cdced4864f1016ea3df3893befcc1f55b193a9,2025-04-15T21:15:56.807000 CVE-2025-30258,0,0,cc431d0d4fe6a8b6881434ff2ad3ef316269606a3845b529c54a958324c9ac24,2025-03-19T20:15:20.140000 CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3bed9,2025-03-20T00:15:13.780000 CVE-2025-3026,0,0,e1d5f90de5cffdef16fb6ac0720c6a50512e756b166ba5e7f995a1b9b9409a90,2025-04-01T20:26:30.593000 @@ -288143,7 +288176,7 @@ CVE-2025-30280,0,0,30288d638eb0e9dbcf0aa5896bd69db9acfcecdbc6d868f34c8a52e27afc1 CVE-2025-30281,0,0,50a072f873968e0884926f8e8e3ac417a87058a178898fc0d8f8841b5e4ff462,2025-04-09T20:02:41.860000 CVE-2025-30282,0,0,d87ae56d2f3f199e9c72f285535bd92d6953c70cb127ed50acbefa75c489c16e,2025-04-15T14:02:30.633000 CVE-2025-30284,0,0,fcfe4b641e24a5d6edb0fad44597e9a8db41e7640854b7b8e24bb0269390b9dd,2025-04-15T13:13:50.853000 -CVE-2025-30285,0,0,7935713339eb97b0ce053ce1b5aa84345b8a159bb91df1c7304cb11e02fd0f8b,2025-04-09T20:02:41.860000 +CVE-2025-30285,0,1,4ad534a1a21e72db4a23d60625f8233f0935572afc2f1f5382590f0a3ab6d4fa,2025-04-15T20:02:19.560000 CVE-2025-30286,0,0,e43adce2918b7c668d5d3cfc6aa7930d2b02a0ac84efbfb06cb6686e51b0f496,2025-04-14T17:43:28.940000 CVE-2025-30287,0,0,bfb8139b266be0d2cb7b484acdd34e2bb85891baac94150ccb14b18f684529fb,2025-04-14T17:46:20.293000 CVE-2025-30288,0,0,2b95720ab33f0ae9e65c099b6f773af38954863679de5e5b091d1ba280f6467f,2025-04-14T17:48:04.153000 @@ -288262,7 +288295,9 @@ CVE-2025-30474,0,0,eb6c167d1736e5a0a05d76dda95c9383453e456c61b97e97ddf0c32b61180 CVE-2025-3048,0,0,5eb6156d35bbaa6ace17e28077befe8dbbf8441f38642f57d7841d345fe9515f,2025-04-01T20:26:22.890000 CVE-2025-30485,0,0,f2856ee96c6d55a594aa71df88615bdd59c4c1a0f52dcb79297759def1147103,2025-04-07T14:18:34.453000 CVE-2025-3051,0,0,03f9e07d76193917b8de9d74f13ff070438d20cd42142f9b8ee6c497180d4b37,2025-04-01T20:26:11.547000 -CVE-2025-30516,0,1,6e9088ba36985b7325f51c1d3c78cbc79ac0a2c6c97bf904fbc9eebc8d7f06b9,2025-04-15T18:39:27.967000 +CVE-2025-30511,1,1,950ba25bd4e531329ce5219090eea50d95491a49061ec48f0eadfcd5b9fed3b7,2025-04-15T21:15:56.953000 +CVE-2025-30514,1,1,d858590fbc89e9efeeb8e4efd9fb97d8fafd4ddb6b63d0e0dd65cc029ed7a067,2025-04-15T21:15:57.090000 +CVE-2025-30516,0,0,6e9088ba36985b7325f51c1d3c78cbc79ac0a2c6c97bf904fbc9eebc8d7f06b9,2025-04-15T18:39:27.967000 CVE-2025-30520,0,0,36202f4247a4e2c05ed8fe3c2794dc6deb26ec20b4118dea06db3314c5e3a395,2025-04-01T20:26:11.547000 CVE-2025-30521,0,0,eee2f839741a5e176cacf865cc6d42d2df432fd3f60c0ff1d8e1355c4ac5b964,2025-03-27T16:44:44.143000 CVE-2025-30522,0,0,ab298bed764aa241f7fdd86556fbb1b68374df7068fea4de0fc7d11feb11540d,2025-03-27T16:44:44.143000 @@ -288397,12 +288432,69 @@ CVE-2025-30673,0,0,e292e0371f10baa0dbb2b4b3b206efd65282a8bcd608d5d5a448633581759 CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc884a,2025-04-02T22:15:20.260000 CVE-2025-30677,0,0,ac691303aa13f8ca9aabebde82f77f60d124e3f5ca096d5288780405b88472c8,2025-04-09T20:02:41.860000 CVE-2025-3068,0,0,de66f3afaa7fd4a67fa9d3ab57331fb0ab9491ba6c44d88f9dc6104a16396311,2025-04-07T13:30:02.277000 +CVE-2025-30681,1,1,de727ccbf693b4911ceeb269f6c442e993342edfa40c4b48a18ecafee569717b,2025-04-15T21:15:57.233000 +CVE-2025-30682,1,1,4e341e25f571ff3bf5869817fa9844d08b74ce26de9c382b4a2ab866beda3c8a,2025-04-15T21:15:57.347000 +CVE-2025-30683,1,1,706edaf8ce60226b6137ceddb891c2f7e5ef51c6b73d27ecfc819e8831fafbb6,2025-04-15T21:15:57.447000 +CVE-2025-30684,1,1,332550cf9ac274a815719502ce817571fa51894566465d205f272d8a7c246745,2025-04-15T21:15:57.560000 +CVE-2025-30685,1,1,c45394444a2657603065e733496b429ccbe3928f2f3d36f257fed708aa0393ff,2025-04-15T21:15:57.670000 +CVE-2025-30686,1,1,57667bdd347957535337d1674acdc6bae11667773b17e45f98ba7309919c5a55,2025-04-15T21:15:57.787000 +CVE-2025-30687,1,1,02f2deef2680134cf008fa1a919a5cba7bd8db30f5f4fc1686fb1858c02492f8,2025-04-15T21:15:57.903000 +CVE-2025-30688,1,1,742e23b1df3b104646dbb936ca87efcf74147035c61f8d85a09f464390b7024f,2025-04-15T21:15:58.013000 +CVE-2025-30689,1,1,df828656e716dc7ac700651ca6a1c3e3f60755a23b85827eb44de1be6d397d38,2025-04-15T21:15:58.130000 CVE-2025-3069,0,0,c275422f91841fbe2892e1b63afd1da88d5376102ceba230e87a55bfbdd7bb13,2025-04-07T13:28:15.670000 +CVE-2025-30690,1,1,14976c02198e53a54d924c3ef20cf6b8a0dac09dee9ec1c54bf327fb501643e4,2025-04-15T21:15:58.247000 +CVE-2025-30691,1,1,26f9e37b73f1846343b6f70c68afc88c2dd0e5e3d4325167bbb91605a5325910,2025-04-15T21:15:58.360000 +CVE-2025-30692,1,1,3a141603a009bd7e9604f285bc589eb6df4995755ae48cfc3d88b9432b4c585d,2025-04-15T21:15:58.470000 +CVE-2025-30693,1,1,14a611c2658eb3a40bae4db7caf80e96dde378f4ef40e4564103b6215c779825,2025-04-15T21:15:58.580000 +CVE-2025-30694,1,1,05f7d0997e4389487da285027c5d35a84a2b7249fee4d1cad5acb4c00cc32cb7,2025-04-15T21:15:58.697000 +CVE-2025-30695,1,1,9ce4804f83de837e5d892b6a749c137787212af36857320c75299f2a9d40fc37,2025-04-15T21:15:58.810000 +CVE-2025-30696,1,1,d7deb80e6182391c9cbca6797520d8de02c8a760528dec4f0a4496892ee29a4f,2025-04-15T21:15:58.917000 +CVE-2025-30697,1,1,2e37f43adefca055c89105d0556b2aa56d5a0ffbe9b4018448d0479e8343c32c,2025-04-15T21:15:59.030000 +CVE-2025-30698,1,1,6681def26219ef87ae7e56bb36b78230e46dd18e7d540c5159e058f843f5f225,2025-04-15T21:15:59.137000 +CVE-2025-30699,1,1,56b3b6e8e3a55f99a49572dba01496c5eca8af4eff9438d9bbd11745a54511d1,2025-04-15T21:15:59.247000 CVE-2025-3070,0,0,389eca2715a25e0502dfee20fa689abffda48144e371016d21a2980b0deeba8c,2025-04-07T13:28:06.423000 +CVE-2025-30700,1,1,6c1f1c11dd96926fc987198621a97c3f888f6d160f5272497f9b80e2a13383e2,2025-04-15T21:15:59.357000 +CVE-2025-30701,1,1,02320e0f79de653f0e63ed8ef952acfae9537886c8b2c6bb73279adb07c79e61,2025-04-15T21:15:59.470000 +CVE-2025-30702,1,1,e85f780839776d6e5dec1ea78bba08027d3a0dfb820867f2363a04c0b270add0,2025-04-15T21:15:59.580000 +CVE-2025-30703,1,1,41447de662f40f530efa40f6da0551998ba4ce7ea27fa36e369363244c0fb939,2025-04-15T21:15:59.697000 +CVE-2025-30704,1,1,530c76a78ad6099a5f797fbce09a46ca492cf3dea427993416a68c125e69878d,2025-04-15T21:15:59.810000 +CVE-2025-30705,1,1,4c2f08f25f3a06d9aefbd2a5ea6975bd7b41e598e21c9c0fa400047baf37cabf,2025-04-15T21:15:59.927000 +CVE-2025-30706,1,1,1076bc9255e6e5de6bbe4d4a0dbf049eb216e1aa98b82a04fe29924bf253e2d2,2025-04-15T21:16:00.043000 +CVE-2025-30707,1,1,28f707aa999a0ed69379a943551430dbf174f0f6c89913b7db7b6ebd22bc016a,2025-04-15T21:16:00.163000 +CVE-2025-30708,1,1,a855a578aeef1425fa47570535ccc71fccda39e78ef850829d3285738ddd6b76,2025-04-15T21:16:00.290000 +CVE-2025-30709,1,1,d6da4c3929277a643773b54d97ca5a3d35fe79da3830f7b9e39f38edd39e7d73,2025-04-15T21:16:00.420000 CVE-2025-3071,0,0,d16bcf87876b69db8889459754164a9a7a5a7660b7bb26af9304dff3429a1889,2025-04-10T21:15:49.347000 +CVE-2025-30710,1,1,bd663a973cde3f71dfc1bb0c1fa86318d5c575ad1163058d9c6281d4fceadfbe,2025-04-15T21:16:00.527000 +CVE-2025-30711,1,1,a37cb5a3f95881a6aa0ef83355123b82b96b6b41cb4813735681fb42020988dc,2025-04-15T21:16:00.637000 +CVE-2025-30712,1,1,b053f602e86df40463d3936d6afd9813b8f01f60a56d7e83b804cbb62e9e03c1,2025-04-15T21:16:00.750000 +CVE-2025-30713,1,1,3c7370d5635817de23647344cdd6e2803bc38c58d512a973bd66b37319c420f2,2025-04-15T21:16:00.860000 +CVE-2025-30714,1,1,b56f3bf5f5304b3890cfcaa02f2dfd7d3e696e80b099e93673a484a2e7e7bceb,2025-04-15T21:16:00.970000 +CVE-2025-30715,1,1,79a0080619eda539de2b97a3ec78e9154af44669496fc2f2481eb185479543e1,2025-04-15T21:16:01.080000 +CVE-2025-30716,1,1,5ef2ec7c1bbdb01fe317fd65637074ab3b993ec6b2d02de8d7456169ab702cb0,2025-04-15T21:16:01.193000 +CVE-2025-30717,1,1,5e628152e63610aa0c717986d11b501c59fda5e0a2df2f1309a19c5318d26f46,2025-04-15T21:16:01.317000 +CVE-2025-30718,1,1,20911dffdb8b5003da6259a5a46641ee4cc2311951e1aeeee5588b8d947e0e4b,2025-04-15T21:16:01.417000 +CVE-2025-30719,1,1,979ccca11b84d949959334c6cf4cc73bc1fd9f936b4c044a29f911949a31fafe,2025-04-15T21:16:01.530000 CVE-2025-3072,0,0,eeb3db7593d5f3529425ae721269ae179a33f0348a29e56f5910d6e63bdc88c2,2025-04-15T14:15:42.603000 +CVE-2025-30720,1,1,be711cd2afdcefce54643a3e6a3b7a315dbd2bf0a19c4c1033220dc6e7cf9654,2025-04-15T21:16:01.647000 +CVE-2025-30721,1,1,eb619243a3d6d76ac434721d0d0df64234f5f82291f9a2d13e5fb699753bd627,2025-04-15T21:16:01.760000 +CVE-2025-30722,1,1,13565ec682ea175a579d697f04f9f114bca5e90a1eb20ffc3d78ad1f931934a6,2025-04-15T21:16:01.870000 +CVE-2025-30723,1,1,52f7a3f4b3f28e744254067195be18e57c4fd1a9c00e37192faca26147348e6d,2025-04-15T21:16:01.990000 +CVE-2025-30724,1,1,9aa6c3cd275e066340079f80c291adca96e4d7cd1b5237a3df4b639e87a2665b,2025-04-15T21:16:02.103000 +CVE-2025-30725,1,1,d8828de8a9e5ab761670ed6cda45419eb3abfc683100aadf68e5dd75c6d8a12c,2025-04-15T21:16:02.217000 +CVE-2025-30726,1,1,20fc90cfb9f1fc12e33145c90e1ad220c2958880e1a612ca8ebc2ba844612b46,2025-04-15T21:16:02.327000 +CVE-2025-30727,1,1,94a65f456189111be3ea7332e0bc5b8b5a25a09cf20e074e29a9151223b66014,2025-04-15T21:16:02.457000 +CVE-2025-30728,1,1,5f2b981cfa31636ce8734f7e029e0c40cfdabf71d93ca6ef14961325bf73d550,2025-04-15T21:16:02.563000 +CVE-2025-30729,1,1,00813415b33bd9b8b3323393e8caf123e46a4904311be76cd6cede28d194196f,2025-04-15T21:16:02.677000 CVE-2025-3073,0,0,b8cefb713e892a781a35310514ad6b3b41dd1484763cb3422d2c498e41be370a,2025-04-15T14:15:42.760000 +CVE-2025-30730,1,1,4e0248b42bb41941444b4baad8b0cd067071ddfd5e9d08dad4cff58186cb730a,2025-04-15T21:16:02.793000 +CVE-2025-30731,1,1,715b4163025c8136edcc29a3affebf84a0ae31a31807dfc54f87df7fcb0a6b42,2025-04-15T21:16:02.907000 +CVE-2025-30732,1,1,26afe28e36e9844321f01570bd271451cd681f30b0d44d8467a37c65ee99db43,2025-04-15T21:16:03.013000 +CVE-2025-30733,1,1,25d7d25c61eeb44835e0d90f0a1dea40102f183c67c83a6631de6824552e975a,2025-04-15T21:16:03.133000 +CVE-2025-30735,1,1,704f922d9702731b326a230b3edd0b4790b8871943860c2a6cef138bee19f6c8,2025-04-15T21:16:03.247000 +CVE-2025-30736,1,1,3f2164f9cfc4847badd98bee40c9afe59b2289af7a554a64fb3f9f079f8dde55,2025-04-15T21:16:03.360000 +CVE-2025-30737,1,1,7ff0a27daf3370ed8a0d6ad95dcbd57a3e98b60a0f5b25c589b2b8ca8ca2b71f,2025-04-15T21:16:03.473000 CVE-2025-3074,0,0,2919bffa252d2ef1244b20f9a8e634aa667db9aeff764ace7dd4a346fb40ac69,2025-04-15T14:15:42.900000 +CVE-2025-30740,1,1,801e2b3b97949116ba0792fe1a8a34b2b193fa3ac7c85bd2bdedff3b2a7d1924,2025-04-15T21:16:03.597000 CVE-2025-30741,0,0,a7ba724d5523a4cf0c1b38678a2ee1b0c99bfb24f80e0249782577c8771159ad,2025-03-27T16:45:46.410000 CVE-2025-30742,0,0,86ca35df94be3200dc999955b93d6c2b0d3e9fbdd347944fb57613c93c49228a,2025-03-27T16:45:46.410000 CVE-2025-30763,0,0,8cae761cd1fe343dec958c3bde26a021d7b611e1f3fb5c049ea6e8543db73e0c,2025-03-27T16:45:27.850000 @@ -288576,14 +288668,14 @@ CVE-2025-30925,0,0,303059a0519907d0c47140322e242ea05b7024546a805d0c164e0f0e362aa CVE-2025-30926,0,0,b661a84f99652a2821e7ff3d11c13e4069bdece4b97608c23c3ec387d8764f48,2025-04-01T20:26:11.547000 CVE-2025-3096,0,0,8268841e6f7bc41398dcf36b7be8d3dcaa69d002c9097adfeaedeae01b3e118b,2025-04-01T20:26:01.990000 CVE-2025-30961,0,0,a9060b0c2e5039ac1c7dc0d0a4866d8355c5b144195397ac7f7bbd22c91d7a82,2025-04-01T20:26:30.593000 -CVE-2025-30962,0,1,61abc3537c316341b81e3b604ec8a2370306f1ae7f221848a71a48416fe8c0ba,2025-04-15T18:39:27.967000 +CVE-2025-30962,0,0,61abc3537c316341b81e3b604ec8a2370306f1ae7f221848a71a48416fe8c0ba,2025-04-15T18:39:27.967000 CVE-2025-30963,0,0,8f31ec02fefff5554b72626ba454b387f81489df6ae8a03a71d1b10a82ac3371,2025-04-01T20:26:30.593000 -CVE-2025-30964,0,1,b1bdd1e8b847395bebbbef539d6bee054063ea1911ad7226d4d14c5adf11ab91,2025-04-15T18:39:27.967000 -CVE-2025-30965,0,1,2aab2c872c22b115fc299a8fe36cec7869a34f86e4bdcc406bb909df9f628702,2025-04-15T18:39:27.967000 +CVE-2025-30964,0,0,b1bdd1e8b847395bebbbef539d6bee054063ea1911ad7226d4d14c5adf11ab91,2025-04-15T18:39:27.967000 +CVE-2025-30965,0,0,2aab2c872c22b115fc299a8fe36cec7869a34f86e4bdcc406bb909df9f628702,2025-04-15T18:39:27.967000 CVE-2025-3097,0,0,a56f46f6ab586feb1d3c504e3ae22e548d2acd2889f7f29233e79a32e7240220,2025-04-02T14:58:07.527000 CVE-2025-30971,0,0,bdaa81d5f90f891b35dfd2da44198cf771c61350682b9305a17f8bc2d53e966d,2025-04-01T20:26:11.547000 CVE-2025-3098,0,0,64e3da7989169613fb4eaf552a0f5621059a5a42e666f32ff39d3d155f26ca41,2025-04-02T14:58:07.527000 -CVE-2025-30985,0,1,4d5b87b2ec0bef3e56e1cd5a13b3f11fdf6c579a0e83bf5a1537331fb22c849f,2025-04-15T18:39:27.967000 +CVE-2025-30985,0,0,4d5b87b2ec0bef3e56e1cd5a13b3f11fdf6c579a0e83bf5a1537331fb22c849f,2025-04-15T18:39:27.967000 CVE-2025-30987,0,0,1ddeca9f293b13339e82c187149d285418438fc60231797e7c68c5fcad6fe64b,2025-04-01T20:26:30.593000 CVE-2025-3099,0,0,8b5b94044c5b312a61081eb6466602886f5edc420174286cf66115736f8de591,2025-04-02T14:58:07.527000 CVE-2025-3100,0,0,d223f6bdad24adad7bfeb8d8433bb786f4e26245258914a6d5f9c277f321f0fd,2025-04-09T20:02:41.860000 @@ -288595,7 +288687,7 @@ CVE-2025-31005,0,0,ceb79a2f36fcb390061964b11e10127964f5604b0d6b95191e77fe9337f63 CVE-2025-31008,0,0,574e1cf42f8a16e13e787c6fb8ae3504d667cff8301f5b3817d1be7163f33d9b,2025-04-09T20:02:41.860000 CVE-2025-31009,0,0,00ef1dcb50827d398a2f6c01ffba26a90073ce49541136b216e5baa33ed8b4e8,2025-04-09T20:02:41.860000 CVE-2025-31010,0,0,c1f5ed11290de791a7c3fbb3f13d7b367feca7817eca67ce914a4ef488ac6cf5,2025-03-28T18:11:40.180000 -CVE-2025-31011,0,1,1ddd2af7b5c3319338208dc1ff1fd942b4d60a44f2c5530af3ad38b43cab0747,2025-04-15T18:39:27.967000 +CVE-2025-31011,0,0,1ddd2af7b5c3319338208dc1ff1fd942b4d60a44f2c5530af3ad38b43cab0747,2025-04-15T18:39:27.967000 CVE-2025-31012,0,0,1f46b9635d7584db0ebef271a97e01198fa0633ac746e331966237bdddb260f8,2025-04-09T20:02:41.860000 CVE-2025-31014,0,0,05a65cf1c53aaa3729696e93139ef997043ba9893b8c9b11b54bf89e713672b8,2025-04-11T15:39:52.920000 CVE-2025-31015,0,0,cc9d5bb58bd9acbdec8dd13e2813c11ba30f9d64e279f9a8cd7570dbb05b8b09,2025-04-11T15:39:52.920000 @@ -288679,7 +288771,7 @@ CVE-2025-31135,0,0,207e0c0576bd29325f457097be93c7a44eb5e24c5f685d26d2830ea953a65 CVE-2025-31137,0,0,68ee066855a1ed540acafdd46a9114f6082667580fb68d589f14ffae7073796c,2025-04-01T20:26:01.990000 CVE-2025-31138,0,0,082239a994f84f895f28ca91baa1d97931f8adb4927719990c0f96236ec2630c,2025-04-08T18:14:17.307000 CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000 -CVE-2025-3114,0,0,10c52aae615ff76dc9c4bfd4236c21f18b97126c968483efd0fa83dd9a78516b,2025-04-09T20:02:41.860000 +CVE-2025-3114,0,1,418d9b2c4c39970a6b7c0e8549739605f4addaf83e877938cc0f3fc3ab0c1506,2025-04-15T21:16:04.847000 CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000 CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000 CVE-2025-3115,0,0,56373582c6a36776aed89b3820adf24688db4877d09f8b8d1c0e67b7b8bdee29,2025-04-09T20:02:41.860000 @@ -288729,9 +288821,10 @@ CVE-2025-31333,0,0,08699a9906ce65a0334a63e341c6baa3bab14124a78670666f36434a88ab4 CVE-2025-31334,0,0,90b4ed63dc1be647230b7e7d107e9e1dc7ff2e1eceac7d38af6b4703cfff3e2b,2025-04-07T14:18:34.453000 CVE-2025-31335,0,0,a59dc29e49bc09b300cb323976dd36a985ae5397e4dd70b31cd1f3d833e330c2,2025-03-28T18:11:40.180000 CVE-2025-3134,0,0,a71cb6e1788fa22b93ff06d650061e802b0d1c6df7394ab696b49920594382f7,2025-04-07T14:18:34.453000 -CVE-2025-31344,0,1,65c936e29f1de25d67d01a063b267643eaf5638b5d4808a0121d439e68cf0905,2025-04-15T18:39:27.967000 +CVE-2025-31344,0,0,65c936e29f1de25d67d01a063b267643eaf5638b5d4808a0121d439e68cf0905,2025-04-15T18:39:27.967000 CVE-2025-3135,0,0,faf2817fe977a6ad95e9552e324f8f965e6f56a203594f3cbe1385fe01f217f4,2025-04-07T14:18:34.453000 -CVE-2025-31354,0,1,8859aebbd9d1507a0ccff49785879adc62d0266669311963d5ee8770dbdc051b,2025-04-15T18:39:43.697000 +CVE-2025-31354,0,0,8859aebbd9d1507a0ccff49785879adc62d0266669311963d5ee8770dbdc051b,2025-04-15T18:39:43.697000 +CVE-2025-31357,1,1,1dcbf52d71c5b1a7ef73593329e4bd6e9a93fd35a0759c036187653e0f0c2856,2025-04-15T21:16:03.737000 CVE-2025-3136,0,0,80636d1eff19bdca2f7e3675f7eceb70040c1df75b8bc383cc4d01584e4433e6,2025-04-07T14:18:34.453000 CVE-2025-31362,0,0,29e714bdac918165d1f72d9b66a1fef39fc1fe95242e3501acdc160e75ffc0c8,2025-04-11T15:39:52.920000 CVE-2025-31367,0,0,85cd14db2ac76f9194e6a05115a520fe93ce77ad125f659bc4b1625771b812eb,2025-03-29T04:15:24.037000 @@ -288854,12 +288947,14 @@ CVE-2025-31487,0,0,b82f95e4ce12b67bc4c5d4168a317e50698188e3e02053101fd5378a82a78 CVE-2025-31488,0,0,41eabe2a806d521b5b533a51fb5b17aa17d50bd34ad511fec1512904c0a777c0,2025-04-07T14:17:50.220000 CVE-2025-31489,0,0,86b687749f556cb33a8356498a01d508d0da05ad595a76560944268496b2bd46,2025-04-07T14:18:34.453000 CVE-2025-3149,0,0,61479a4dbdbba6ab59d1ae99d855a79e55a52858fd9b2654fa6a6f9d8eddf660,2025-04-07T14:18:34.453000 -CVE-2025-31490,0,1,fa1d5b8676c6e56670fc9996520b73230716c35b92d199e113f88f4fd639c21c,2025-04-15T18:39:27.967000 -CVE-2025-31491,0,1,121a93a76a8e7ee91d64bde9e260caf7e7fcc2f30832e94abd08189e26e2d067,2025-04-15T18:39:27.967000 +CVE-2025-31490,0,0,fa1d5b8676c6e56670fc9996520b73230716c35b92d199e113f88f4fd639c21c,2025-04-15T18:39:27.967000 +CVE-2025-31491,0,0,121a93a76a8e7ee91d64bde9e260caf7e7fcc2f30832e94abd08189e26e2d067,2025-04-15T18:39:27.967000 CVE-2025-31492,0,0,c3a8af2b78a6ecf7a731e5159a73f99e4e0787364701aa4aef00fbbfc177b209,2025-04-07T14:17:50.220000 -CVE-2025-31494,0,1,49e512ef4ebfe8914086467b54ce6e9a2ad2dba6ac7ca963a5d77ca48d87fef5,2025-04-15T18:39:27.967000 +CVE-2025-31494,0,0,49e512ef4ebfe8914086467b54ce6e9a2ad2dba6ac7ca963a5d77ca48d87fef5,2025-04-15T18:39:27.967000 CVE-2025-31496,0,0,12f17064ea4e4584d7a91216d2d100c9a89220efe7b8206230e9a4ff7e506dee,2025-04-08T18:13:53.347000 +CVE-2025-31497,1,1,d2eb0a84cd26ddb4971b6a4980660bf39bef72b267885351680d57c6bad841f3,2025-04-15T20:15:39.270000 CVE-2025-31498,0,0,f84cf018b9a7f2d3baed2463f19bf6204e206ba0c9a21e4ea32e21746b404d29,2025-04-08T18:13:53.347000 +CVE-2025-31499,1,1,68ea86c421fc8a23a1bb46288bb8e1d590f84c93314488cf6a3bd2f878eb4b22,2025-04-15T21:16:03.937000 CVE-2025-3150,0,0,a30a7688ae10248ab6f92b08d529b33559f00224524ffa44e9f5b1d925f39cc6,2025-04-07T14:18:34.453000 CVE-2025-3151,0,0,fc53025e57933c63ffd27d66baa971840e395a51a52617b1c48843e916fa986d,2025-04-07T14:18:34.453000 CVE-2025-31515,0,0,65e0cceff3005eb000d81df9c13b2b61bcc11ce5d49244e52c4f8300da4f784d,2025-04-01T03:15:17.700000 @@ -289176,7 +289271,7 @@ CVE-2025-31856,0,0,0248194a78eecf2d863abcad99ee94c931b3dcf86c540b294d40102a454fe CVE-2025-31857,0,0,c85e0f3d20c02eebd816fd920d050000778bfbfa60b9a16a7a7c62aca289efce,2025-04-01T20:26:01.990000 CVE-2025-31858,0,0,c5ae3168254e6a4fa34c285f28cb290840c0f513ccc212e6e5acc0e6198fbd69,2025-04-07T14:18:34.453000 CVE-2025-31859,0,0,fb615c48f5039a344c362386723b91b31c7da467ed603db93c960fda3fc187f5,2025-04-14T12:15:15.967000 -CVE-2025-3186,0,1,7029e94bccefabe1bf55a37ec78f962d33072f67ed42a504e927d4785b46e7a0,2025-04-15T19:05:19.227000 +CVE-2025-3186,0,0,7029e94bccefabe1bf55a37ec78f962d33072f67ed42a504e927d4785b46e7a0,2025-04-15T19:05:19.227000 CVE-2025-31860,0,0,76a3ba7f83b66ebb55fe84587ab2b108006b732aca8969b4b1620fb6c3c1a61f,2025-04-01T20:26:01.990000 CVE-2025-31861,0,0,73f821b5e49dc31de4be6c94456199eec0b884624798216788a1fead1da33e7f,2025-04-01T20:26:01.990000 CVE-2025-31862,0,0,98f8ddebcc3b2cd3f942d9ad1d1b16be02fdb54575bb80f1f14952db04bbd534,2025-04-01T20:26:01.990000 @@ -289236,13 +289331,17 @@ CVE-2025-31910,0,0,f90306bb3a5ca866ba4ad6c3e2e3265ac1aee43de585a8755ddbdfd5d848a CVE-2025-31911,0,0,a3e8c05d42eb38721b859fcb5e3e84e7f358ba837d299b49c2c70eab8912fd09,2025-04-07T14:18:34.453000 CVE-2025-3192,0,0,14f88a64f4f058599196fb894b7652f55d55387666faa45a3d02f24f7d0ecfe8,2025-04-07T14:18:15.560000 CVE-2025-31932,0,0,362dfb3dede0e01aeba8ae3f507453eedf01ad64b58b11b9af4da649bce815d6,2025-04-11T15:39:52.920000 -CVE-2025-31935,0,1,1a1eebc01d15fbf2c63c6382620e7c4790cb67d3b55395a82d0ec6c7df306a0c,2025-04-15T18:39:43.697000 +CVE-2025-31933,1,1,52176559ed996047acf3cdfe6474df7f53f3501bb4d353550f6b653d7f799d77,2025-04-15T21:16:04.063000 +CVE-2025-31935,0,0,1a1eebc01d15fbf2c63c6382620e7c4790cb67d3b55395a82d0ec6c7df306a0c,2025-04-15T18:39:43.697000 CVE-2025-3194,0,0,23a5c95379b253424e9febb0b842b536dd2f8dd3324a3c76cbac09d82342e603,2025-04-07T14:18:15.560000 -CVE-2025-3195,0,1,93a6c89bac6b891825aae9732fe4ce25fe868ef9ef97cfbba20606c8bcdcc376,2025-04-15T18:49:36.733000 +CVE-2025-31941,1,1,56ec8495309ee4d3db55b58dd91eb1942e9a12588924b8072b3c8ffceedd1713,2025-04-15T21:16:04.200000 +CVE-2025-31949,1,1,82ad48a902781c5e8b3d05c476fe9bd563af6002448b9038fd17b9e1440e9dbf,2025-04-15T21:16:04.337000 +CVE-2025-3195,0,0,93a6c89bac6b891825aae9732fe4ce25fe868ef9ef97cfbba20606c8bcdcc376,2025-04-15T18:49:36.733000 CVE-2025-3196,0,0,bb0d2ecf21993903a71e6dff645fdb05a339ebaf3e6e9f8f684bcf59eec4ea9d,2025-04-07T14:18:15.560000 CVE-2025-3197,0,0,e79e9bde316dbfd1ba7b8b9ac58822adceab867075d18a7670c50494d881764a,2025-04-07T14:18:15.560000 CVE-2025-3198,0,0,9ea9a8c586fb27cd4141f26bc5f53c6d47512dda4a6f8f32123c47190f49343b,2025-04-07T14:18:15.560000 CVE-2025-3199,0,0,b2c8a0f552e5c66b559702403ed11bd1140ca56173e2c4b53e84f8a9895b6f6e,2025-04-07T14:18:15.560000 +CVE-2025-32012,1,1,08dc34f05cdbff74ee93f758e43274cf2fbd5ba46ee2243f43a4a533b44cefe2,2025-04-15T20:15:39.400000 CVE-2025-32013,0,0,b9e014f5fd31f7e573b509bf40d04ff5548b21d354f26d5a5266036bb938dc7e,2025-04-08T18:54:07.337000 CVE-2025-32014,0,0,af089ef047d3ce8d7747406914b66a9d22daea2274c66b4c0d88bc73728bf977,2025-04-08T18:14:17.307000 CVE-2025-32016,0,0,210d54eeb85679dba0aa0fa591ab7524396a1833fed6c42b9666ce95c8071335,2025-04-09T20:02:41.860000 @@ -289250,6 +289349,7 @@ CVE-2025-32017,0,0,8a0f7f2a3dc0f318bf58248c4fe2f160ba48033de9c615edbc9d5ce3722cc CVE-2025-32018,0,0,f9a9dd5168ecc7953ffdea2ce7e4019a350eb30fd43b370fc3c1a5f23e1a320f,2025-04-08T18:13:53.347000 CVE-2025-3202,0,0,b5df9a4f10b6a094526640bce151f74d263fe1512b1e3334f9249ec0e5e39a5f,2025-04-07T14:18:15.560000 CVE-2025-32020,0,0,5b7d2613617c9ad4e941ba7e2b1cf1f147b7a3d7b6c82162fb86d6a3786c79d3,2025-04-08T18:13:53.347000 +CVE-2025-32021,1,1,f5de35570fd18b279ed3edc00072ab0d6440a80ca60d4e2a4de58929680620a7,2025-04-15T21:16:04.523000 CVE-2025-32024,0,0,aaff324cba06ca8f03c4a4173bee9b2afa9dec13a6b5d5f449993fc4b6eea500,2025-04-08T18:13:53.347000 CVE-2025-32025,0,0,5b101f2fdaeb4bea12aa8eb2f822059db81531c623e382758e69fd88182cc8e2,2025-04-08T18:13:53.347000 CVE-2025-32026,0,0,a3f057cbd474338c495f1d95a560978a772ad4f2f87d9883afb826980afa64ff,2025-04-08T18:13:53.347000 @@ -289264,7 +289364,7 @@ CVE-2025-32033,0,0,40b3b208d052d7879d2f8f3adb9e51b46b4a05b975f75dca712aaefa23ec7 CVE-2025-32034,0,0,39b72df89785b876c4ffe3d85c99f5c70d32cc05dfbbbe1938fd282aa04ebea9,2025-04-08T18:13:53.347000 CVE-2025-32035,0,0,70a6888bf34d8ab81fb00f2d46e41bf70535bbafb3937f8df2bfd461f8a5aab1,2025-04-09T20:03:01.577000 CVE-2025-32036,0,0,392ced4a7ceffb3860fa36c03a132228e0c351b485f1983727787214d9a82a67,2025-04-09T20:03:01.577000 -CVE-2025-3204,0,1,640564153dde48d17342c52eff358ea56840605e43f6aab84cda78f222b9e0c5,2025-04-15T18:48:43.403000 +CVE-2025-3204,0,0,640564153dde48d17342c52eff358ea56840605e43f6aab84cda78f222b9e0c5,2025-04-15T18:48:43.403000 CVE-2025-32049,0,0,4a492d3e48b4caa699bbe628c5401d02fd93365e9cd0841713ed46afaee15215,2025-04-07T14:18:34.453000 CVE-2025-3205,0,0,51e3f14857d78569279198f5dc30e56ea630bb12580d37bc688ca7f3b09b35a0,2025-04-07T14:18:15.560000 CVE-2025-32050,0,0,0a47cfad52d7f8e56c261b87c53507ae6a7f0c5195729ce7a2f5bf37484c4b9d,2025-04-07T14:18:34.453000 @@ -289273,27 +289373,27 @@ CVE-2025-32052,0,0,6116901b373eabf1a12f464e61c73150b05b477e86d57bd2242dea845380e CVE-2025-32053,0,0,60f5d2252d9b47d90be71a91241fe823e174198ba60194538808a8aa0b6ddc25,2025-04-07T14:18:34.453000 CVE-2025-32054,0,0,75e4d347927079956a9bc5ad92137deea99b9b15ced411f0baaff24ce0928a82,2025-04-07T14:18:34.453000 CVE-2025-3206,0,0,42d59949bcfd70f3ffd69cd102c160f0c7c28fb29a1f31fa69a71eb901f00492,2025-04-08T17:59:46.877000 -CVE-2025-32067,0,1,a1366f916b258d43e091791e6bfc8f68fffb72479a805b7aab0dd3f2e089d5b6,2025-04-15T18:39:43.697000 -CVE-2025-32068,0,1,71292430547aa992409b9ccce3af039b515d857f4176be924195c6c2e91e486e,2025-04-15T18:39:43.697000 -CVE-2025-32069,0,1,46222047d70dc60fc7abfb6b88c96297a35b9d710352b7741be251c499f215d5,2025-04-15T18:39:43.697000 +CVE-2025-32067,0,0,a1366f916b258d43e091791e6bfc8f68fffb72479a805b7aab0dd3f2e089d5b6,2025-04-15T18:39:43.697000 +CVE-2025-32068,0,0,71292430547aa992409b9ccce3af039b515d857f4176be924195c6c2e91e486e,2025-04-15T18:39:43.697000 +CVE-2025-32069,0,0,46222047d70dc60fc7abfb6b88c96297a35b9d710352b7741be251c499f215d5,2025-04-15T18:39:43.697000 CVE-2025-3207,0,0,8c4a43b2a497a8aa9c548fe0056155548a5ad115021163d0bb4670d8373f6166,2025-04-08T17:56:53.623000 -CVE-2025-32070,0,1,d59d8fe8cc728eb4b81adcf026ca81f38a5bfb05381f50a5fef93ddf7b8a4ef4,2025-04-15T18:39:43.697000 -CVE-2025-32071,0,1,1ac61618a5ed8834c0e9ae55807ae54fc3dca7fc294dbcd26c1f80743dafa47f,2025-04-15T18:39:43.697000 -CVE-2025-32072,0,1,10d36ece06021be65548db82d78dc87d71d799a91891d84063a7dac3fd383c1d,2025-04-15T18:39:43.697000 -CVE-2025-32073,0,1,c46bd87f69c66796e5f6c6f5f85dc1fb7d943ae8bd0436f7681729415cf18e88,2025-04-15T18:39:43.697000 -CVE-2025-32074,0,1,d4f4446ab1df4c570e46700a17d9184bee04b3cdff1de21d2349c9ff274d9c41,2025-04-15T18:39:43.697000 -CVE-2025-32075,0,1,c5511a20e869cd372800461b1f63db736bb0b7fbcc9b611e73c6a4312d19d9c4,2025-04-15T18:39:43.697000 -CVE-2025-32076,0,1,2980cca8cd65f3bcabe5733207645178404d75a9ae669cf21d9c9cdaf3b970dc,2025-04-15T18:39:43.697000 -CVE-2025-32077,0,1,cd84913ef5da75fc92ac2c0040e567d90c0ca99df0895fa2f344cb82cd2a4cfd,2025-04-15T18:39:43.697000 -CVE-2025-32078,0,1,edfebb59a07d161bf757913e0dae7d5684c48d9d81a2f837e1da7232427865b1,2025-04-15T18:39:43.697000 -CVE-2025-32079,0,1,a38feb39af843a6fc73b93fdfb5ea18112890ff603c39f66eb8609acbef44ab0,2025-04-15T18:39:43.697000 +CVE-2025-32070,0,0,d59d8fe8cc728eb4b81adcf026ca81f38a5bfb05381f50a5fef93ddf7b8a4ef4,2025-04-15T18:39:43.697000 +CVE-2025-32071,0,0,1ac61618a5ed8834c0e9ae55807ae54fc3dca7fc294dbcd26c1f80743dafa47f,2025-04-15T18:39:43.697000 +CVE-2025-32072,0,0,10d36ece06021be65548db82d78dc87d71d799a91891d84063a7dac3fd383c1d,2025-04-15T18:39:43.697000 +CVE-2025-32073,0,0,c46bd87f69c66796e5f6c6f5f85dc1fb7d943ae8bd0436f7681729415cf18e88,2025-04-15T18:39:43.697000 +CVE-2025-32074,0,0,d4f4446ab1df4c570e46700a17d9184bee04b3cdff1de21d2349c9ff274d9c41,2025-04-15T18:39:43.697000 +CVE-2025-32075,0,0,c5511a20e869cd372800461b1f63db736bb0b7fbcc9b611e73c6a4312d19d9c4,2025-04-15T18:39:43.697000 +CVE-2025-32076,0,0,2980cca8cd65f3bcabe5733207645178404d75a9ae669cf21d9c9cdaf3b970dc,2025-04-15T18:39:43.697000 +CVE-2025-32077,0,0,cd84913ef5da75fc92ac2c0040e567d90c0ca99df0895fa2f344cb82cd2a4cfd,2025-04-15T18:39:43.697000 +CVE-2025-32078,0,0,edfebb59a07d161bf757913e0dae7d5684c48d9d81a2f837e1da7232427865b1,2025-04-15T18:39:43.697000 +CVE-2025-32079,0,0,a38feb39af843a6fc73b93fdfb5ea18112890ff603c39f66eb8609acbef44ab0,2025-04-15T18:39:43.697000 CVE-2025-3208,0,0,467c67ee8369e3212684108818f80d158b2f4485a63647368e73220138caff6d,2025-04-08T17:48:42.087000 -CVE-2025-32080,0,1,53e1adceb8f6e7d69d67bf82fb5d51f9056cd27c6bfbe44222c1dea679d4cfb5,2025-04-15T18:39:43.697000 +CVE-2025-32080,0,0,53e1adceb8f6e7d69d67bf82fb5d51f9056cd27c6bfbe44222c1dea679d4cfb5,2025-04-15T18:39:43.697000 CVE-2025-3209,0,0,efaeccbde8dfc66e8697afeb5d539c2f695606dff80d7c548cff76ae6514c4e4,2025-04-07T14:18:15.560000 -CVE-2025-32093,0,1,0be67561f687e419f366910e8dba9fd229d2f66cc865d230a0136e401d9d9941,2025-04-15T18:39:27.967000 +CVE-2025-32093,0,0,0be67561f687e419f366910e8dba9fd229d2f66cc865d230a0136e401d9d9941,2025-04-15T18:39:27.967000 CVE-2025-3210,0,0,e3a6c98204c21b98a0522091394112cf3856887b7b64633cf1e308a0cb6727df,2025-04-08T17:43:12.840000 -CVE-2025-32102,0,1,94728fca8a45b0efcc2246724db2689c4f335bc6b91cb7309faf386d18b772e1,2025-04-15T18:39:27.967000 -CVE-2025-32103,0,1,016d3429888ae4712d542ce74cc46fc0be01f1d0ada320e3a95e9141a8d4bea4,2025-04-15T18:39:27.967000 +CVE-2025-32102,0,0,94728fca8a45b0efcc2246724db2689c4f335bc6b91cb7309faf386d18b772e1,2025-04-15T18:39:27.967000 +CVE-2025-32103,0,0,016d3429888ae4712d542ce74cc46fc0be01f1d0ada320e3a95e9141a8d4bea4,2025-04-15T18:39:27.967000 CVE-2025-32107,0,0,a689a2435b39d5968d7bf2a8f1256f4c1ffc589945169a8a583af99a6981cea6,2025-04-11T15:39:52.920000 CVE-2025-3211,0,0,e2eebcc8ba292d8d3d123757d4623f49a37b0c48559fde3713cb0f540bc6af19,2025-04-07T14:18:15.560000 CVE-2025-32111,0,0,4216c6506d31334c8d23317eabe3bae930691d012b7febaea26a4964764ff3bb,2025-04-07T14:18:15.560000 @@ -289481,7 +289581,7 @@ CVE-2025-32360,0,0,bb479322720a17f33681d06c2b72f8f9968c8279b25bef01375556fcba91b CVE-2025-32364,0,0,e894db5f7d73d7313223c296f4a47feb8ad50e78e5cf8ff87fc79232ef635220,2025-04-07T14:17:50.220000 CVE-2025-32365,0,0,ade41b47e186b36ef3a8ffb90bcc36f39e4b9fcb4f5e42cad9936ea94190fde8,2025-04-07T14:17:50.220000 CVE-2025-32366,0,0,2cb122d34d9646a6a43a36f2eb474f65496bd6cc784a6e4ac53a72eb6b15670f,2025-04-11T18:15:39.950000 -CVE-2025-32367,0,1,7f6a829f46cc88fc4a8de5d7842254e89c5bfcf0b3289bf7121f71e5ce517e58,2025-04-15T18:39:43.697000 +CVE-2025-32367,0,0,7f6a829f46cc88fc4a8de5d7842254e89c5bfcf0b3289bf7121f71e5ce517e58,2025-04-15T18:39:43.697000 CVE-2025-32369,0,0,96d402924571180f1e04aec6a92f212002710a79eaea9c3eabbe3a90881f80a2,2025-04-08T17:27:42.950000 CVE-2025-3237,0,0,5eb23ae150e778d4e0e8512099269eb9b19a07bb05f106ae634562ab1cde60d7,2025-04-07T14:18:15.560000 CVE-2025-32370,0,0,52539d7c5e40c96e3c6580caaac756c4f836d7993783b3dbdb4c110f6e19f5e4,2025-04-08T18:54:51.523000 @@ -289511,9 +289611,12 @@ CVE-2025-32414,0,0,2fcec998435005e0d1d3c8610833b216e4c5fa674ee9df013c153e6a84f33 CVE-2025-3242,0,0,7a3796558c3172b29f1754f0aa43f7d570abcefa6f88716250c661d5fd24e293,2025-04-07T14:18:15.560000 CVE-2025-32426,0,0,97f7719ef42c67257e2006b52ab9747f51788ff83c926fc892139743aec5a5b7,2025-04-11T15:39:52.920000 CVE-2025-32427,0,0,0416426b54022f69535fafb066a105f3453a61c3cc047d8982deab84a0710a9d,2025-04-11T15:39:52.920000 -CVE-2025-32428,0,1,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000 +CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b345a,2025-04-15T18:39:27.967000 CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000 +CVE-2025-32438,1,1,bb64812376d0f8c327414293e83e3eb4e7826963b95d6fad17d830466791c359,2025-04-15T20:15:39.533000 +CVE-2025-32439,1,1,1fb298802f1711c990bb5f83d30b91c97afe550e21454e25e5a50939f2db6034,2025-04-15T20:15:39.677000 CVE-2025-3244,0,0,a20bb1d848a28a44d0b8d510e43cbe068220041e655dcf96cf8633b9bc977caf,2025-04-07T14:18:15.560000 +CVE-2025-32445,1,1,efadc0d2312e38527e9b43436366383bf8dd4a41f3fdce4ffe8f9ebbf65733de,2025-04-15T20:15:39.807000 CVE-2025-3245,0,0,396ea3bbe154112d349f915c8c28a6610578699cecf486191d9d012a69d9c5b9,2025-04-07T14:18:15.560000 CVE-2025-32460,0,0,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000 CVE-2025-32461,0,0,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000 @@ -289664,7 +289767,7 @@ CVE-2025-32697,0,0,19fee2a61856ee4a7320f7190e69e8ccea7572ac4306df698c960a26103f7 CVE-2025-32698,0,0,16466f8b695d6edbf317b0af563ba9f209d642f17ecdd1954cc311df468a6223,2025-04-11T15:39:52.920000 CVE-2025-32699,0,0,23a94d723c50baa82e78f6da8a3b64d0890697435859549aeff94050657616dd,2025-04-11T15:39:52.920000 CVE-2025-32700,0,0,c0e8c73e6cd2dba0f2638bdb87a5004e45d9151953fe53305663743891fc2cb9,2025-04-11T15:39:52.920000 -CVE-2025-32726,0,1,19a678c6aee3f2513613406a7b19477a3106ef9e8aa79b51257f1a92146e986d,2025-04-15T18:39:43.697000 +CVE-2025-32726,0,0,19a678c6aee3f2513613406a7b19477a3106ef9e8aa79b51257f1a92146e986d,2025-04-15T18:39:43.697000 CVE-2025-32728,0,0,3412470eeb78d54bf8cb06076372596e4f91bb03b171bf6dd938a768564aebbf,2025-04-11T15:40:10.277000 CVE-2025-32743,0,0,22cd88375a4ea091d730f6e11751ffcb7fa9bb31f6c5963a03a37755aa77afd4,2025-04-11T15:39:52.920000 CVE-2025-32754,0,0,ae122a89fe2ff1f5e82a8c1270ad0ed695d11eff047f3e9907db07d410a6a7ca,2025-04-11T15:39:52.920000 @@ -289672,7 +289775,7 @@ CVE-2025-32755,0,0,0e4b2d997ad26f458b04806dc5bea537010e4bad018db4379186ce4e7652b CVE-2025-32757,0,0,c640364748c5c666fd6dc8aec9d84948af9deb15cd9711efe75ce6833fb0d8c1,2025-04-11T03:15:13.903000 CVE-2025-32758,0,0,d3608f6f13a9a5b49230d2ebeae393f102196b87b92e834ebddf934752919dc3,2025-04-11T03:15:14.427000 CVE-2025-32759,0,0,4ec2028500fce9598ebd65d94b8913a1d569360cd32f22b47c68102fcbfca47a,2025-04-11T03:15:14.477000 -CVE-2025-3276,0,1,1ec6438a79ff793a1964a11d5b4197b843d95830e593a8a03809b9e1d64f257e,2025-04-15T18:39:27.967000 +CVE-2025-3276,0,0,1ec6438a79ff793a1964a11d5b4197b843d95830e593a8a03809b9e1d64f257e,2025-04-15T18:39:27.967000 CVE-2025-32760,0,0,b49616aee650d484034da17cd41c523e46d17a1af9bca82d77fef3f534ef6eb7,2025-04-11T03:15:14.530000 CVE-2025-32761,0,0,177a1c1146899dbe2adee28b3395241103cc5f3e843fc2a57149473c7e8b0150,2025-04-11T03:15:14.583000 CVE-2025-32762,0,0,d0d8b9a3f3412c3e1ec3920ce0a53310113d5e2867a9b430bee3e240824aae2c,2025-04-11T03:15:14.637000 @@ -289682,39 +289785,40 @@ CVE-2025-32765,0,0,dcbcde62fdff401d6533083c6f6475fe8bd86ab5cb293984e4392a0da2ab5 CVE-2025-32767,0,0,3f90274095229f98e0603e497c72fd5bfc736bd7fb12ec110e8b26192048e083,2025-04-11T03:15:14.843000 CVE-2025-32768,0,0,1483cae31959254bcbeeb62a75a0342f9f3ab05a573151c7b742065596351ca3,2025-04-11T03:15:14.893000 CVE-2025-32769,0,0,d87af69c16786e74cfa8fd841dc8a47858c4cb266f0b38fc887bc94a573abbed,2025-04-11T03:15:14.943000 -CVE-2025-3277,0,1,382bcc42ad541193221b5767ceed62986fc2add40770acbcbb73fcaf3178f166,2025-04-15T18:39:27.967000 +CVE-2025-3277,0,0,382bcc42ad541193221b5767ceed62986fc2add40770acbcbb73fcaf3178f166,2025-04-15T18:39:27.967000 CVE-2025-32770,0,0,e879cb856385008a5a030da1f2f52e9188c55a4c92cd2936d47c4399aede7a06,2025-04-11T03:15:14.993000 CVE-2025-32771,0,0,c6e52811cb5d920942a21d471ca81350909d1cde0ef114a099f62648d927e2dd,2025-04-11T03:15:15.047000 CVE-2025-32772,0,0,a192b72f7407e2dddb9288a08a9fc67f6dbc97c24f0e1f2b7e06b7601af05155,2025-04-11T03:15:15.100000 CVE-2025-32773,0,0,03fdfca9cc7985ee58aee953e3e633f3a2fbca9f53ceb1ba1a00e94646c94003,2025-04-11T03:15:15.153000 CVE-2025-32774,0,0,b203f315043800eab189186279357f210925b21f5fcfc47ce9b5782e61185f7d,2025-04-11T03:15:15.200000 CVE-2025-32775,0,0,0fc8e60ca0e0a1e6b116ccd0b6b05a3155be0d53785b8ae060df538fffe53282,2025-04-11T03:15:15.250000 -CVE-2025-32776,0,1,9e510bcd55ba94130d952891959e8f9c8e62241b99eeaada5797ed9f8a73c832,2025-04-15T18:39:27.967000 -CVE-2025-32779,0,1,9b0c0f3e1679aa6a29c07a0230230eddd75bcf03028ff914fcc18fd0552bd825,2025-04-15T18:39:27.967000 -CVE-2025-32780,0,1,66c032871841ee8f1135c9a708f1264f3edee13154b2ee90fcea8f285386936f,2025-04-15T18:39:27.967000 +CVE-2025-32776,0,0,9e510bcd55ba94130d952891959e8f9c8e62241b99eeaada5797ed9f8a73c832,2025-04-15T18:39:27.967000 +CVE-2025-32778,1,1,f304101d133f9a7b53cec5c27697c17efb7bb5486ec3be362c97fa4800acc652,2025-04-15T21:16:04.710000 +CVE-2025-32779,0,0,9b0c0f3e1679aa6a29c07a0230230eddd75bcf03028ff914fcc18fd0552bd825,2025-04-15T18:39:27.967000 +CVE-2025-32780,0,0,66c032871841ee8f1135c9a708f1264f3edee13154b2ee90fcea8f285386936f,2025-04-15T18:39:27.967000 CVE-2025-32807,0,0,791ea9650394de4a3c6a4bce28448af084ce5e8fb834d69b1769b35b955fdca4,2025-04-11T15:39:52.920000 CVE-2025-32808,0,0,4460b802a312298836218e51f145ee69f847802ae0b680f0631fd4c9d767af72,2025-04-11T16:15:20.673000 CVE-2025-32809,0,0,ca90ff3ced06efa4e939486b48b76783f1482c86186847921ab08cd5bd99e3d5,2025-04-11T16:15:20.807000 CVE-2025-32816,0,0,7146ab229fea4de6245a9faadeb60513e017f27b734755baaf195d3f55011510,2025-04-11T15:39:52.920000 -CVE-2025-3282,0,1,4f7d1b48e17ccd00afeee2e7a595ed2b28190fc5a8aec67b855d00f5d80e0bc2,2025-04-15T18:39:27.967000 +CVE-2025-3282,0,0,4f7d1b48e17ccd00afeee2e7a595ed2b28190fc5a8aec67b855d00f5d80e0bc2,2025-04-15T18:39:27.967000 CVE-2025-3285,0,0,118d23b715223007d53f885f6e6272e3e1077c4b2e9b8e92fc3197ffc0e6e14a,2025-04-08T18:13:53.347000 CVE-2025-3286,0,0,8139d6e6df664199f354424e68610fbc2f4bc55f3ac9ae6ea11f766fff222a31,2025-04-08T18:13:53.347000 CVE-2025-3287,0,0,506736b5e0376194047aa5beabc2406cc40c6682d560c154acdc11c5838ee81f,2025-04-08T18:13:53.347000 CVE-2025-3288,0,0,f38b6103c86e4b43a603efa2302f1894dd9c86a56576c13140616463a055f77c,2025-04-08T18:13:53.347000 CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000 -CVE-2025-32906,0,1,4ec5f2ca7b9b8ea45c77e5ce5ab48abb3a754736cb55462f85af932adb790b5a,2025-04-15T18:39:27.967000 -CVE-2025-32907,0,1,f8bbe74c5da625d02f6e04870821b80a44ca12ff70e0b1b9f8137ceb61f92a68,2025-04-15T18:39:27.967000 -CVE-2025-32908,0,1,f80bb7c7aa52de7bec22f93e1f33735c17e76c61d454a4c320c750a2c077bf2f,2025-04-15T18:39:27.967000 -CVE-2025-32909,0,1,0884dca753e2c79439ff41be1ac33162b422fea3f958d4f092d8b4757c9eeb8e,2025-04-15T18:39:27.967000 -CVE-2025-32910,0,1,8c3c89c7ada7acbcb1166439c21c35fca837058d502fd7e6ae633b46c7521a45,2025-04-15T18:39:27.967000 -CVE-2025-32911,0,1,3977a100038f2d762bb4f4c4b851e28d31b2ca33f2b0e35666620b6266120f66,2025-04-15T18:39:27.967000 -CVE-2025-32912,0,1,d3070db8447868fa2ece35d0452a8355ec1e0bd109d8c6849b4a995c4f9a6f4f,2025-04-15T18:39:27.967000 -CVE-2025-32913,0,1,9a6437af944f5a8dfca81e0157cf042c9111cc56e3ea3f711289676647b70152,2025-04-15T18:39:27.967000 -CVE-2025-32914,0,1,9339e03e13fdc57e8071d217b67af961566b6ba4b2f1f9b9540277c735046c80,2025-04-15T18:39:27.967000 -CVE-2025-3292,0,1,ec50c9f00071ec9815b655c626839dc9ebd5356aafa51cbcaed8da23653663c8,2025-04-15T18:39:27.967000 -CVE-2025-32929,0,1,9c30465d7a5e541eac6d942c2f37e3e9c23ade67288367f38047cabdb5901be4,2025-04-15T18:39:27.967000 +CVE-2025-32906,0,0,4ec5f2ca7b9b8ea45c77e5ce5ab48abb3a754736cb55462f85af932adb790b5a,2025-04-15T18:39:27.967000 +CVE-2025-32907,0,0,f8bbe74c5da625d02f6e04870821b80a44ca12ff70e0b1b9f8137ceb61f92a68,2025-04-15T18:39:27.967000 +CVE-2025-32908,0,0,f80bb7c7aa52de7bec22f93e1f33735c17e76c61d454a4c320c750a2c077bf2f,2025-04-15T18:39:27.967000 +CVE-2025-32909,0,0,0884dca753e2c79439ff41be1ac33162b422fea3f958d4f092d8b4757c9eeb8e,2025-04-15T18:39:27.967000 +CVE-2025-32910,0,0,8c3c89c7ada7acbcb1166439c21c35fca837058d502fd7e6ae633b46c7521a45,2025-04-15T18:39:27.967000 +CVE-2025-32911,0,0,3977a100038f2d762bb4f4c4b851e28d31b2ca33f2b0e35666620b6266120f66,2025-04-15T18:39:27.967000 +CVE-2025-32912,0,0,d3070db8447868fa2ece35d0452a8355ec1e0bd109d8c6849b4a995c4f9a6f4f,2025-04-15T18:39:27.967000 +CVE-2025-32913,0,0,9a6437af944f5a8dfca81e0157cf042c9111cc56e3ea3f711289676647b70152,2025-04-15T18:39:27.967000 +CVE-2025-32914,0,0,9339e03e13fdc57e8071d217b67af961566b6ba4b2f1f9b9540277c735046c80,2025-04-15T18:39:27.967000 +CVE-2025-3292,0,0,ec50c9f00071ec9815b655c626839dc9ebd5356aafa51cbcaed8da23653663c8,2025-04-15T18:39:27.967000 +CVE-2025-32929,0,0,9c30465d7a5e541eac6d942c2f37e3e9c23ade67288367f38047cabdb5901be4,2025-04-15T18:39:27.967000 CVE-2025-32930,0,0,7aa7721c6427b0edc6ca10f6fa05a98645a2b1c5fcd736b40f97d37f2fbc0637,2025-04-14T15:15:25.787000 -CVE-2025-32931,0,1,108b21d731c5f4a0a283b6bbe8ff4f995ddbf4e1cd71101b317d56e45bddc4d1,2025-04-15T18:39:27.967000 +CVE-2025-32931,0,0,108b21d731c5f4a0a283b6bbe8ff4f995ddbf4e1cd71101b317d56e45bddc4d1,2025-04-15T18:39:27.967000 CVE-2025-32933,0,0,e4399dc1130e415e7bcf2d27718e9f13cbbe89ea193c41df5f50b1886eb6018b,2025-04-15T03:15:17.590000 CVE-2025-32934,0,0,957be4a7e5f7996bca73355e95d284ebe460a2cb3244fced81310fc36a40aad6,2025-04-15T03:15:17.680000 CVE-2025-32935,0,0,820c462cdb3fcd6df3d2fd30e699b53ee3db08e46bb7e27dfa5d7ed0fa5dae53,2025-04-15T03:15:17.733000 @@ -289724,24 +289828,24 @@ CVE-2025-32938,0,0,d97032ba2fb62d85b0fd781b1a847fc87e2cde9e5de8598412a81c2f7b235 CVE-2025-32939,0,0,6d0ae9200a7976c683c740ee0295d246f733a1e3dbef51e2eacbe3ae7efb8a4d,2025-04-15T03:15:17.957000 CVE-2025-32940,0,0,ef492180fd67c205ba6c2e08604b15b7b05288970e18fade437210606e359428,2025-04-15T03:15:18.013000 CVE-2025-32941,0,0,7b47b38d71f23645464b8e8efcb34f5cd92a1b50b5494bf228368f472d5e5710,2025-04-15T03:15:18.077000 -CVE-2025-32943,0,1,8da80cfe2534c19b706545f146442699c19028eec95686cadadb83d78172a33c,2025-04-15T18:39:27.967000 -CVE-2025-32944,0,1,73f5ac872c635f07c5228ad86c94eb72278d81f4e6e30686839a68ecd21051d3,2025-04-15T18:39:27.967000 -CVE-2025-32945,0,1,cfd730a5cdcb03093ba24bfae78e1c39697c31a5cc13faae0d7b5c73f732f0ca,2025-04-15T18:39:27.967000 -CVE-2025-32946,0,1,e502d8257a0e54b07a9a15a77196ba5f219fb0f7dfbe64bb96996d1195659a24,2025-04-15T18:39:27.967000 -CVE-2025-32947,0,1,9770822acefd8a91f7f92b12f4afc9c6d40ba8a370784108c08acb9b87dd4e36,2025-04-15T18:39:27.967000 -CVE-2025-32948,0,1,e7b1322f9dca2c3d94e7071e5958f64377666146936a54c3970c1112cf430167,2025-04-15T18:39:27.967000 -CVE-2025-32949,0,1,dd1479aa4f6a7efdeed71347534e296fcef6b322436f826e6348b41beb2527ff,2025-04-15T18:39:27.967000 +CVE-2025-32943,0,0,8da80cfe2534c19b706545f146442699c19028eec95686cadadb83d78172a33c,2025-04-15T18:39:27.967000 +CVE-2025-32944,0,0,73f5ac872c635f07c5228ad86c94eb72278d81f4e6e30686839a68ecd21051d3,2025-04-15T18:39:27.967000 +CVE-2025-32945,0,0,cfd730a5cdcb03093ba24bfae78e1c39697c31a5cc13faae0d7b5c73f732f0ca,2025-04-15T18:39:27.967000 +CVE-2025-32946,0,0,e502d8257a0e54b07a9a15a77196ba5f219fb0f7dfbe64bb96996d1195659a24,2025-04-15T18:39:27.967000 +CVE-2025-32947,0,0,9770822acefd8a91f7f92b12f4afc9c6d40ba8a370784108c08acb9b87dd4e36,2025-04-15T18:39:27.967000 +CVE-2025-32948,0,0,e7b1322f9dca2c3d94e7071e5958f64377666146936a54c3970c1112cf430167,2025-04-15T18:39:27.967000 +CVE-2025-32949,0,0,dd1479aa4f6a7efdeed71347534e296fcef6b322436f826e6348b41beb2527ff,2025-04-15T18:39:27.967000 CVE-2025-3296,0,0,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000 CVE-2025-3297,0,0,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000 CVE-2025-3298,0,0,289613560130dabe199eea55128a1bdfe9eecd882e62238f3674c43e858ef0bc,2025-04-08T16:49:00.290000 -CVE-2025-32987,0,1,22fee82644638daf52e45d25879682a7b8e6315d4283004fcb29ee09fc3f6bc1,2025-04-15T18:39:27.967000 +CVE-2025-32987,0,0,22fee82644638daf52e45d25879682a7b8e6315d4283004fcb29ee09fc3f6bc1,2025-04-15T18:39:27.967000 CVE-2025-3299,0,0,1ecd0bb3145f0c6f50b4ad5e92205fbf9ac7cbde82394cd28e5dab2186389f15,2025-04-08T16:48:45.137000 -CVE-2025-32993,0,1,efe10e43b700d805bab5f9cbf4da0d85804a68c5ec719e614ee799809a295233,2025-04-15T18:39:27.967000 -CVE-2025-32996,0,1,66cdefdd4ac5ef2c3d78ef7b0a3a801233b441eea948b7804c8316fb0d1631f0,2025-04-15T18:39:27.967000 -CVE-2025-32997,0,1,585b29f934052489f32ea07f36835b226451d0492c02f05a8ece6f7bdf5daba5,2025-04-15T18:39:27.967000 -CVE-2025-33026,1,1,f31292f39979e59d60455586ca7e03a64d81f35ece88d2afb8d3c07e7cfec217,2025-04-15T18:39:27.967000 -CVE-2025-33027,1,1,abe59358efee0fdd10513f216cce07714c1518b566ad8fef65de5c35238abd68,2025-04-15T18:39:27.967000 -CVE-2025-33028,1,1,e03f9e87f69e58792246984291153b12a6d5bb8e107e21b7fdef70aba76a382b,2025-04-15T18:39:27.967000 +CVE-2025-32993,0,0,efe10e43b700d805bab5f9cbf4da0d85804a68c5ec719e614ee799809a295233,2025-04-15T18:39:27.967000 +CVE-2025-32996,0,0,66cdefdd4ac5ef2c3d78ef7b0a3a801233b441eea948b7804c8316fb0d1631f0,2025-04-15T18:39:27.967000 +CVE-2025-32997,0,0,585b29f934052489f32ea07f36835b226451d0492c02f05a8ece6f7bdf5daba5,2025-04-15T18:39:27.967000 +CVE-2025-33026,0,0,f31292f39979e59d60455586ca7e03a64d81f35ece88d2afb8d3c07e7cfec217,2025-04-15T18:39:27.967000 +CVE-2025-33027,0,0,abe59358efee0fdd10513f216cce07714c1518b566ad8fef65de5c35238abd68,2025-04-15T18:39:27.967000 +CVE-2025-33028,0,0,e03f9e87f69e58792246984291153b12a6d5bb8e107e21b7fdef70aba76a382b,2025-04-15T18:39:27.967000 CVE-2025-3303,0,0,a88559a89b09c7db23c32ee2c85028152291b57ba44bc3a0730626f1d4cddeda,2025-04-08T15:02:36.210000 CVE-2025-3304,0,0,2ec25b3b916c9e696963707dba4544ab011813ba6a5064128b7ade1c94bf65f1,2025-04-07T14:17:50.220000 CVE-2025-3305,0,0,dc66bf91b2f6e196955f9173f9c137f77852eb10ef0394de20bd1afdd72a0b74,2025-04-08T16:46:55.203000 @@ -289838,10 +289942,10 @@ CVE-2025-3412,0,0,25a3c2ab8fa0aef3dfffc2c9723b43f279f3600f9f3d1f7632095f66cdc52e CVE-2025-3413,0,0,e9ae6f9ee954dc0b39e2e9a8b6ad41f6cbd8628b2d84dff62138fbf7e2823b11,2025-04-08T18:13:53.347000 CVE-2025-3416,0,0,52d35af283afef5bb6d8cccc38fa0eb8d4ad3029b21142a4de9837a0c397cd70,2025-04-09T20:02:41.860000 CVE-2025-3417,0,0,e393b15114feb46d95f488ee34d16b125c38ee49e2798d5b216b189c39465cf9,2025-04-11T15:39:52.920000 -CVE-2025-3418,0,1,4154876292ebbb38f7acc24d5fa01c00885887734d791a65df188de6eec86890,2025-04-15T18:39:27.967000 +CVE-2025-3418,0,0,4154876292ebbb38f7acc24d5fa01c00885887734d791a65df188de6eec86890,2025-04-15T18:39:27.967000 CVE-2025-3421,0,0,f0b0f2fac32f095e78653a3f079907a85827a89faac1aa3c204f37fe09b5c50e,2025-04-11T15:39:52.920000 CVE-2025-3422,0,0,67da956b7a6b8167e42afa6b34d074d1413252f8ae249df1ac8fab6d91861e99,2025-04-11T15:39:52.920000 -CVE-2025-3423,0,1,3fa8a09778f16c82b1e19ba21bd25b5abb35659f095b1243e7d4bba8cca3f5c2,2025-04-15T18:39:27.967000 +CVE-2025-3423,0,0,3fa8a09778f16c82b1e19ba21bd25b5abb35659f095b1243e7d4bba8cca3f5c2,2025-04-15T18:39:27.967000 CVE-2025-3424,0,0,f161b96f7ead82573f94b591ee29deb4e0df9f8f7eb925f2312c3762b9a3484d,2025-04-10T16:15:29.207000 CVE-2025-3425,0,0,e4c4f45e6bc4a81a24ca597b6793799084263ef11e2d6bf0b3e7fb89e1bfca21,2025-04-10T16:15:29.350000 CVE-2025-3426,0,0,cedfa9c4f32fcdb1b955b9680fcf595688fe655ff45258ecaefd79f4661dc8ca,2025-04-10T16:15:29.460000 @@ -289857,74 +289961,74 @@ CVE-2025-3436,0,0,350fe0ab040ca88ca01e6b9c153bc7bb9c0c6c278cf5357b8d0cb98bb355f4 CVE-2025-3437,0,0,e73b4884af1e4c5b90938b61853540dd90f98780db8cdd9f4d702d9b75697db1,2025-04-08T18:13:53.347000 CVE-2025-3439,0,0,5a45d3a4e5746a323275efd17cc6f0776b222d5dbffb626174e7480f10014b98,2025-04-11T15:39:52.920000 CVE-2025-3442,0,0,2a59e6aeb9a7ce85db231c9e4252568faabc9932311aa3489ec1af959c55a52f,2025-04-09T20:02:41.860000 -CVE-2025-3445,0,1,9368fe2ffe41458977755cb44cb2101cef3e3cbb78b4473c7335a5f09fb177cb,2025-04-15T18:39:27.967000 +CVE-2025-3445,0,0,9368fe2ffe41458977755cb44cb2101cef3e3cbb78b4473c7335a5f09fb177cb,2025-04-15T18:39:27.967000 CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000 -CVE-2025-3470,0,1,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000 +CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000 CVE-2025-3474,0,0,86c754cf553decd220dba53e5d0d63448d8121da39946fc69feccec714981904,2025-04-09T20:02:41.860000 CVE-2025-3475,0,0,443d35ed0e717701a1888d83d8695b8f16fb37648583a3e79025b880997d544a,2025-04-09T20:02:41.860000 CVE-2025-3489,0,0,67fcd6c9f94bb6bf638f4e8bb2240b0887ef71aca32f3728fb5180eccf26711c,2025-04-11T15:40:10.277000 CVE-2025-3512,0,0,036d013cd0e3204c7e29f8f12826d9befccf940571ea0ad101dc3475585d72f8,2025-04-11T15:39:52.920000 -CVE-2025-3522,0,1,13b86e2113b9916628d4f3c98532160fc0a580631a97f6054902fe5b2e21cfb5,2025-04-15T19:16:08.057000 -CVE-2025-3523,0,1,fa61e276ed520c60ef470d9ec997dd78ddb7b8dd8cb8ae65af3613434a0804b4,2025-04-15T18:39:27.967000 -CVE-2025-3531,0,1,a1decdd234168eb76bc68bc5b83f3982cca53fa01cc6afb6bd923d1aa0236709,2025-04-15T18:39:27.967000 -CVE-2025-3532,0,1,a2f5d1e1aeeff6c317e31a6e6d9145846fef7ec6ec6973517901d1a73b613717,2025-04-15T18:39:27.967000 -CVE-2025-3533,0,1,0517ee64c7ed259e758d3f181da415a253b558981950122d1448e5774aae3999,2025-04-15T18:39:27.967000 -CVE-2025-3534,0,1,2272ee5251cae38598be241c56971c979c5200bb3e067a8d10aed0694d3aed07,2025-04-15T18:39:27.967000 -CVE-2025-3535,0,1,f999a89f76aec7b751bc0506d7eea783fe36cff05bacd7f9284f3dd0ef46110d,2025-04-15T18:39:27.967000 -CVE-2025-3536,0,1,cbf075565d4e5c0210d4b6ba9a0935c83c0fd27158c4c7ea66c9f2cf9f8c4860,2025-04-15T18:39:27.967000 -CVE-2025-3537,0,1,646653e415a34fffe28479790fd8912fc1e6b7a45e39d0dcb7feab678ee6816a,2025-04-15T18:39:27.967000 -CVE-2025-3538,0,1,be8972ee100bbce77ca472972c9e8d6b2e8810a9136a4043fbbb19bd2cda8449,2025-04-15T18:39:27.967000 -CVE-2025-3539,0,1,13ffbd6325942e7997c9d670a6185b23f5b8169726331abd465f9125c41e2cac,2025-04-15T18:39:27.967000 -CVE-2025-3540,0,1,f985cb3ef1ae01ebd2dd0344431149f5225f213ab49c447467ad0f6d71a72ecc,2025-04-15T18:39:27.967000 -CVE-2025-3541,0,1,76054be5f6cf9b541b7d6c89b3eb53c3c2e710e67999603a5607042d88d09527,2025-04-15T18:39:27.967000 -CVE-2025-3542,0,1,7069234034d1085384239612ef1cc06a52922300116a8e30b4dd85ee7e19936d,2025-04-15T18:39:27.967000 -CVE-2025-3543,0,1,42b4958a6b4097c9ab72211163e6bb81f2872c70c5e0844eb093dfe8d525d58c,2025-04-15T18:39:27.967000 -CVE-2025-3544,0,1,fb4292fbe8f54ebce87a451a88dde09488b3a4a38d5557d70780d0bc7dcd8ae5,2025-04-15T18:39:27.967000 -CVE-2025-3545,0,1,657281bd3da40a2604f3d7479b33f50d890eff134287481debeb8d8bc2292f0a,2025-04-15T18:39:27.967000 -CVE-2025-3546,0,1,6ef73244db9bc8d844498e5920934afe6543740765d9e13c0c72c9354a32ac71,2025-04-15T18:39:27.967000 -CVE-2025-3547,0,1,b8a8bcfd16382c6f669ee8b0e767a9b348387ef570b4ccac540ec0ccce46c6e8,2025-04-15T18:39:27.967000 -CVE-2025-3548,0,1,6144ed5d0d918b47e0b3455f4989275371cbf6245da9570b52c077e637e4dc46,2025-04-15T18:39:27.967000 -CVE-2025-3549,0,1,fd480975e611b3aa329471ac846d61053e320de544cf16373b88df2f23530e93,2025-04-15T18:39:27.967000 -CVE-2025-3550,0,1,f579947c5b178a817932c0b6fcead0a074c3d6bb705e7020a43daf576a1fe1fe,2025-04-15T18:39:27.967000 -CVE-2025-3551,0,1,0af495328e32fa4289c7f25e609803a47f9639c2693a9cf28fe39eba4f6a3f0f,2025-04-15T18:39:27.967000 -CVE-2025-3552,0,1,2eee97925b40dc2eacf4ba01e66d0bdb8d286a517e59cfd6a72f8d18568a8faf,2025-04-15T18:39:27.967000 -CVE-2025-3553,0,1,8c1f5e14061a66a48b1706566e256d4f8488eab0bb5ab64ca443be3751b0a454,2025-04-15T18:39:27.967000 -CVE-2025-3554,0,1,c0abfdbdf90c0e224f35d24ce51fd8768d7addfcdcc1d013eb7c63964315f5b4,2025-04-15T18:39:27.967000 -CVE-2025-3555,0,1,8eca78afb6c3c086b8826336dedc5421e422c629e8646942dd9c194230b6dc13,2025-04-15T18:39:27.967000 -CVE-2025-3556,0,1,d12905e155562707b06a9e9974d9bfe005a7a0a024cc3ba45931abb5bde5ccfa,2025-04-15T18:39:27.967000 -CVE-2025-3557,0,1,2c478abf035beb9b2ad09ad87af3d5ed64194e5d380caa7931bb43584130f989,2025-04-15T18:39:27.967000 -CVE-2025-3558,0,1,10acb6868ff41d47a26f80e62e2c4783cc3d1f3a2972e51874c32dfeeb80cf4a,2025-04-15T18:39:27.967000 -CVE-2025-3559,0,1,d092c1ef1b57d07ecb86075a08fa993d8dc60f278d1e37b448fbd0a739b2dd6f,2025-04-15T18:39:27.967000 -CVE-2025-3560,0,1,901d759d1212f3ae35bea3e99a8c9bed1943bc8007273ff6733a4a20efe0dcad,2025-04-15T18:39:27.967000 -CVE-2025-3561,0,1,5b832076b98cec2c73224620182f02a1bb7150b66b3799dc4f198b600351a9f4,2025-04-15T18:39:27.967000 -CVE-2025-3562,0,1,89f29ee4fad583700e2b12432b778a197db430ad13061d2163d85eaf86502377,2025-04-15T18:39:27.967000 -CVE-2025-3563,0,1,4c805cdd233644b24988a884412bae599bf2639c2157fede64dd5fb799fe3d4a,2025-04-15T18:39:27.967000 -CVE-2025-3564,0,1,7a5c0cec7bb52465514d32d748ca1edf7cd44f783fc866a939fe016c3a988a1b,2025-04-15T18:39:27.967000 -CVE-2025-3565,0,1,754d4ea332081e0786001463d81dd3ff5ec61340094593c6442254556dad4d9f,2025-04-15T18:39:27.967000 -CVE-2025-3566,0,1,cc368f59c733d76a6e106315b1595a006aad2387d4d9b77c16ff665725d4bf23,2025-04-15T18:39:27.967000 -CVE-2025-3567,0,1,8bda0f27cf43920e306156a22ceda2d1c37b4dd6c395b917f7bbbe189c540c69,2025-04-15T18:39:27.967000 -CVE-2025-3568,0,1,0692d692ca353a4d199fa640e653711195fe20c6d7c31e94f5e95b3c5dc66993,2025-04-15T18:39:27.967000 -CVE-2025-3569,0,1,eaea60455688a211ea5baaf831058cdaef50cf74a085fcd92236b44f65f7120b,2025-04-15T18:39:27.967000 -CVE-2025-3570,0,1,c274186b312732bd74b85c0d90497b94d51408512cdbdb77e83278dcaf75b590,2025-04-15T18:39:27.967000 -CVE-2025-3571,0,1,cb1fc9eedbcf14c05e5b2cbf0d0a1b12b61f076a383ed1d43c1c47b3366d13fd,2025-04-15T18:39:27.967000 -CVE-2025-3572,0,1,85452ae8a7fdcd086072bc1a78d977cf0bc1d5dd6fa9f5553989fa8c8fb7fdfb,2025-04-15T18:39:27.967000 -CVE-2025-3573,0,1,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae558,2025-04-15T18:39:27.967000 -CVE-2025-3574,0,1,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000 -CVE-2025-3575,0,1,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000 -CVE-2025-3576,0,1,deae6d2d8d5b4017663bfe6ad3a42c90c0ec677638bc1934e2b722f46e515120,2025-04-15T18:39:27.967000 -CVE-2025-3578,0,1,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000 -CVE-2025-3579,0,1,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 -CVE-2025-3585,0,1,a54288693643171c0acabc6ec95ab94f7327c2199882403bf0dab9c0f61422eb,2025-04-15T18:39:27.967000 -CVE-2025-3587,0,1,766ca17a6eb8489be0c0c9a1346a82464f26020cfd84ceca7694920ed05f0f9c,2025-04-15T18:39:27.967000 -CVE-2025-3588,0,1,da176b06433f826abfeb7533e116e8f1c0acf114fe10a330f45ab13cc6f35417,2025-04-15T18:39:27.967000 -CVE-2025-3589,0,1,1a964d17eb95202a7da2bcf2454a2e9ea46088a420d19d4c0664f4d79312c39b,2025-04-15T18:39:27.967000 -CVE-2025-3590,0,1,4a0453d8b3689d6f2e7dcbfdf29c48f9e72ed335c884f8c177d44093a3f9f857,2025-04-15T18:39:27.967000 -CVE-2025-3591,0,1,9faf0d8d54afa4d861e787bba12e728bac4244da2f6db382b13f6aac7674e68a,2025-04-15T18:39:27.967000 -CVE-2025-3592,0,1,3766f02a8a9b7546b3744ae601fb2a46406e95eb867e2ef9712274445e3cdb7b,2025-04-15T18:39:27.967000 -CVE-2025-3593,0,1,a01f66982e63d1a9077a22fb9d3bb17c3788e9968a5ce8acfaa25734a955883b,2025-04-15T18:39:27.967000 -CVE-2025-3608,0,1,838aedee297b1dbbe0afe512560041feff5effbe5ceac80b2ec5ed3a6d143565,2025-04-15T18:39:27.967000 -CVE-2025-3612,0,1,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b50,2025-04-15T18:39:27.967000 -CVE-2025-3613,0,1,9c314abbc6473987a4462c7f86d0ede7026d1a1d89f3e10127913343b31eedd8,2025-04-15T18:39:27.967000 -CVE-2025-3617,1,1,8b166380afe19241854c65e4319a7a4bf7fa4a3b21b435fec16e6239c6e67cc8,2025-04-15T18:39:27.967000 -CVE-2025-3618,1,1,eda45473138c6808735db2df162e6171a422dd9195142056b67b3d52202066c7,2025-04-15T18:39:27.967000 -CVE-2025-3622,0,1,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000 +CVE-2025-3522,0,0,13b86e2113b9916628d4f3c98532160fc0a580631a97f6054902fe5b2e21cfb5,2025-04-15T19:16:08.057000 +CVE-2025-3523,0,0,fa61e276ed520c60ef470d9ec997dd78ddb7b8dd8cb8ae65af3613434a0804b4,2025-04-15T18:39:27.967000 +CVE-2025-3531,0,0,a1decdd234168eb76bc68bc5b83f3982cca53fa01cc6afb6bd923d1aa0236709,2025-04-15T18:39:27.967000 +CVE-2025-3532,0,0,a2f5d1e1aeeff6c317e31a6e6d9145846fef7ec6ec6973517901d1a73b613717,2025-04-15T18:39:27.967000 +CVE-2025-3533,0,0,0517ee64c7ed259e758d3f181da415a253b558981950122d1448e5774aae3999,2025-04-15T18:39:27.967000 +CVE-2025-3534,0,0,2272ee5251cae38598be241c56971c979c5200bb3e067a8d10aed0694d3aed07,2025-04-15T18:39:27.967000 +CVE-2025-3535,0,0,f999a89f76aec7b751bc0506d7eea783fe36cff05bacd7f9284f3dd0ef46110d,2025-04-15T18:39:27.967000 +CVE-2025-3536,0,0,cbf075565d4e5c0210d4b6ba9a0935c83c0fd27158c4c7ea66c9f2cf9f8c4860,2025-04-15T18:39:27.967000 +CVE-2025-3537,0,0,646653e415a34fffe28479790fd8912fc1e6b7a45e39d0dcb7feab678ee6816a,2025-04-15T18:39:27.967000 +CVE-2025-3538,0,0,be8972ee100bbce77ca472972c9e8d6b2e8810a9136a4043fbbb19bd2cda8449,2025-04-15T18:39:27.967000 +CVE-2025-3539,0,0,13ffbd6325942e7997c9d670a6185b23f5b8169726331abd465f9125c41e2cac,2025-04-15T18:39:27.967000 +CVE-2025-3540,0,0,f985cb3ef1ae01ebd2dd0344431149f5225f213ab49c447467ad0f6d71a72ecc,2025-04-15T18:39:27.967000 +CVE-2025-3541,0,0,76054be5f6cf9b541b7d6c89b3eb53c3c2e710e67999603a5607042d88d09527,2025-04-15T18:39:27.967000 +CVE-2025-3542,0,0,7069234034d1085384239612ef1cc06a52922300116a8e30b4dd85ee7e19936d,2025-04-15T18:39:27.967000 +CVE-2025-3543,0,0,42b4958a6b4097c9ab72211163e6bb81f2872c70c5e0844eb093dfe8d525d58c,2025-04-15T18:39:27.967000 +CVE-2025-3544,0,0,fb4292fbe8f54ebce87a451a88dde09488b3a4a38d5557d70780d0bc7dcd8ae5,2025-04-15T18:39:27.967000 +CVE-2025-3545,0,0,657281bd3da40a2604f3d7479b33f50d890eff134287481debeb8d8bc2292f0a,2025-04-15T18:39:27.967000 +CVE-2025-3546,0,0,6ef73244db9bc8d844498e5920934afe6543740765d9e13c0c72c9354a32ac71,2025-04-15T18:39:27.967000 +CVE-2025-3547,0,0,b8a8bcfd16382c6f669ee8b0e767a9b348387ef570b4ccac540ec0ccce46c6e8,2025-04-15T18:39:27.967000 +CVE-2025-3548,0,0,6144ed5d0d918b47e0b3455f4989275371cbf6245da9570b52c077e637e4dc46,2025-04-15T18:39:27.967000 +CVE-2025-3549,0,0,fd480975e611b3aa329471ac846d61053e320de544cf16373b88df2f23530e93,2025-04-15T18:39:27.967000 +CVE-2025-3550,0,0,f579947c5b178a817932c0b6fcead0a074c3d6bb705e7020a43daf576a1fe1fe,2025-04-15T18:39:27.967000 +CVE-2025-3551,0,0,0af495328e32fa4289c7f25e609803a47f9639c2693a9cf28fe39eba4f6a3f0f,2025-04-15T18:39:27.967000 +CVE-2025-3552,0,0,2eee97925b40dc2eacf4ba01e66d0bdb8d286a517e59cfd6a72f8d18568a8faf,2025-04-15T18:39:27.967000 +CVE-2025-3553,0,0,8c1f5e14061a66a48b1706566e256d4f8488eab0bb5ab64ca443be3751b0a454,2025-04-15T18:39:27.967000 +CVE-2025-3554,0,0,c0abfdbdf90c0e224f35d24ce51fd8768d7addfcdcc1d013eb7c63964315f5b4,2025-04-15T18:39:27.967000 +CVE-2025-3555,0,0,8eca78afb6c3c086b8826336dedc5421e422c629e8646942dd9c194230b6dc13,2025-04-15T18:39:27.967000 +CVE-2025-3556,0,0,d12905e155562707b06a9e9974d9bfe005a7a0a024cc3ba45931abb5bde5ccfa,2025-04-15T18:39:27.967000 +CVE-2025-3557,0,0,2c478abf035beb9b2ad09ad87af3d5ed64194e5d380caa7931bb43584130f989,2025-04-15T18:39:27.967000 +CVE-2025-3558,0,0,10acb6868ff41d47a26f80e62e2c4783cc3d1f3a2972e51874c32dfeeb80cf4a,2025-04-15T18:39:27.967000 +CVE-2025-3559,0,0,d092c1ef1b57d07ecb86075a08fa993d8dc60f278d1e37b448fbd0a739b2dd6f,2025-04-15T18:39:27.967000 +CVE-2025-3560,0,0,901d759d1212f3ae35bea3e99a8c9bed1943bc8007273ff6733a4a20efe0dcad,2025-04-15T18:39:27.967000 +CVE-2025-3561,0,0,5b832076b98cec2c73224620182f02a1bb7150b66b3799dc4f198b600351a9f4,2025-04-15T18:39:27.967000 +CVE-2025-3562,0,0,89f29ee4fad583700e2b12432b778a197db430ad13061d2163d85eaf86502377,2025-04-15T18:39:27.967000 +CVE-2025-3563,0,0,4c805cdd233644b24988a884412bae599bf2639c2157fede64dd5fb799fe3d4a,2025-04-15T18:39:27.967000 +CVE-2025-3564,0,0,7a5c0cec7bb52465514d32d748ca1edf7cd44f783fc866a939fe016c3a988a1b,2025-04-15T18:39:27.967000 +CVE-2025-3565,0,0,754d4ea332081e0786001463d81dd3ff5ec61340094593c6442254556dad4d9f,2025-04-15T18:39:27.967000 +CVE-2025-3566,0,0,cc368f59c733d76a6e106315b1595a006aad2387d4d9b77c16ff665725d4bf23,2025-04-15T18:39:27.967000 +CVE-2025-3567,0,0,8bda0f27cf43920e306156a22ceda2d1c37b4dd6c395b917f7bbbe189c540c69,2025-04-15T18:39:27.967000 +CVE-2025-3568,0,0,0692d692ca353a4d199fa640e653711195fe20c6d7c31e94f5e95b3c5dc66993,2025-04-15T18:39:27.967000 +CVE-2025-3569,0,0,eaea60455688a211ea5baaf831058cdaef50cf74a085fcd92236b44f65f7120b,2025-04-15T18:39:27.967000 +CVE-2025-3570,0,0,c274186b312732bd74b85c0d90497b94d51408512cdbdb77e83278dcaf75b590,2025-04-15T18:39:27.967000 +CVE-2025-3571,0,0,cb1fc9eedbcf14c05e5b2cbf0d0a1b12b61f076a383ed1d43c1c47b3366d13fd,2025-04-15T18:39:27.967000 +CVE-2025-3572,0,0,85452ae8a7fdcd086072bc1a78d977cf0bc1d5dd6fa9f5553989fa8c8fb7fdfb,2025-04-15T18:39:27.967000 +CVE-2025-3573,0,0,095399568374006bc1e93d539eebcb743d7cc965cdc4a121e4480938fddae558,2025-04-15T18:39:27.967000 +CVE-2025-3574,0,0,94473ff233af08be74c232281156bfa5db699f8872e1802977040bd9e36c2d62,2025-04-15T18:39:27.967000 +CVE-2025-3575,0,0,73e2cf1e3fbb3ccb86ef07985e1084456954c5cbbd5b3215dbed3da8318cbbf4,2025-04-15T18:39:27.967000 +CVE-2025-3576,0,0,deae6d2d8d5b4017663bfe6ad3a42c90c0ec677638bc1934e2b722f46e515120,2025-04-15T18:39:27.967000 +CVE-2025-3578,0,0,e13e840aaf0a24c67a679c44959c85bec14fbcb560caa6c65722eed662e1826f,2025-04-15T18:39:27.967000 +CVE-2025-3579,0,0,6c0217c9a43a942438244f9ebf630b5c65085fd986d644363e1cb943f76ed2bf,2025-04-15T18:39:27.967000 +CVE-2025-3585,0,0,a54288693643171c0acabc6ec95ab94f7327c2199882403bf0dab9c0f61422eb,2025-04-15T18:39:27.967000 +CVE-2025-3587,0,0,766ca17a6eb8489be0c0c9a1346a82464f26020cfd84ceca7694920ed05f0f9c,2025-04-15T18:39:27.967000 +CVE-2025-3588,0,0,da176b06433f826abfeb7533e116e8f1c0acf114fe10a330f45ab13cc6f35417,2025-04-15T18:39:27.967000 +CVE-2025-3589,0,0,1a964d17eb95202a7da2bcf2454a2e9ea46088a420d19d4c0664f4d79312c39b,2025-04-15T18:39:27.967000 +CVE-2025-3590,0,0,4a0453d8b3689d6f2e7dcbfdf29c48f9e72ed335c884f8c177d44093a3f9f857,2025-04-15T18:39:27.967000 +CVE-2025-3591,0,0,9faf0d8d54afa4d861e787bba12e728bac4244da2f6db382b13f6aac7674e68a,2025-04-15T18:39:27.967000 +CVE-2025-3592,0,0,3766f02a8a9b7546b3744ae601fb2a46406e95eb867e2ef9712274445e3cdb7b,2025-04-15T18:39:27.967000 +CVE-2025-3593,0,0,a01f66982e63d1a9077a22fb9d3bb17c3788e9968a5ce8acfaa25734a955883b,2025-04-15T18:39:27.967000 +CVE-2025-3608,0,0,838aedee297b1dbbe0afe512560041feff5effbe5ceac80b2ec5ed3a6d143565,2025-04-15T18:39:27.967000 +CVE-2025-3612,0,0,b3e7e1fd46c9147c27f3feb15d1a5ba8eabce3f8bab41f1f78e6d74dff7b1b50,2025-04-15T18:39:27.967000 +CVE-2025-3613,0,0,9c314abbc6473987a4462c7f86d0ede7026d1a1d89f3e10127913343b31eedd8,2025-04-15T18:39:27.967000 +CVE-2025-3617,0,0,8b166380afe19241854c65e4319a7a4bf7fa4a3b21b435fec16e6239c6e67cc8,2025-04-15T18:39:27.967000 +CVE-2025-3618,0,0,eda45473138c6808735db2df162e6171a422dd9195142056b67b3d52202066c7,2025-04-15T18:39:27.967000 +CVE-2025-3622,0,0,6b7db9933e6b248f0000367113483a5e806bad53678214380c37af6b793ac885,2025-04-15T18:39:27.967000