diff --git a/CVE-2015/CVE-2015-20xx/CVE-2015-2079.json b/CVE-2015/CVE-2015-20xx/CVE-2015-2079.json new file mode 100644 index 00000000000..14a8b302877 --- /dev/null +++ b/CVE-2015/CVE-2015-20xx/CVE-2015-2079.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2015-2079", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-28T15:15:44.007", + "lastModified": "2025-04-28T15:15:44.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Usermin 0.980 through 1.x before 1.660 allows uconfig_save.cgi sig_file_free remote code execution because it uses the two argument (not three argument) form of Perl open." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-96" + } + ] + } + ], + "references": [ + { + "url": "https://code-white.com/blog/2015-05-cve-2015-2079-rce-usermin/", + "source": "cve@mitre.org" + }, + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-237xx/CVE-2022-23740.json b/CVE-2022/CVE-2022-237xx/CVE-2022-23740.json index 765a0b7b7e1..293145b8e76 100644 --- a/CVE-2022/CVE-2022-237xx/CVE-2022-23740.json +++ b/CVE-2022/CVE-2022-237xx/CVE-2022-23740.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23740", "sourceIdentifier": "product-cna@github.com", "published": "2022-11-23T18:15:11.130", - "lastModified": "2024-11-21T06:49:12.987", + "lastModified": "2025-04-28T15:15:44.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45422.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45422.json index 657848e6e8b..87332b0d322 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45422.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45422.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45422", "sourceIdentifier": "product.security@lge.com", "published": "2022-11-21T17:15:30.857", - "lastModified": "2024-11-21T07:29:13.907", + "lastModified": "2025-04-28T15:15:44.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25837.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25837.json index 83f9ae378bf..6f4f2596457 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25837.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25837.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25837", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-16T18:15:08.907", - "lastModified": "2024-10-30T15:35:08.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:06:50.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.3.8", + "matchCriteriaId": "94235FE2-576B-4EDB-B53C-F087DE499A6A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/RatMD/bloghub-plugin/blob/master/CHANGELOG.md#version-139---stable", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.getastra.com/blog/vulnerability/stored-xss-vulnerability-in-bloghub-plugin/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27717.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27717.json index d54945a09d2..28df86c3430 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27717.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27717.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27717", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:11.423", - "lastModified": "2024-11-21T09:04:56.707", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:47:26.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eskooly:eskooly:*:*:*:*:-:-:*:*", + "versionEndIncluding": "3.0", + "matchCriteriaId": "DFA23144-8E06-4F22-AE7F-2A3D06F2C4CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27717-cross-site-request-forgery-csrf-in-eskooly-web-product-less-than-v3.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27717-cross-site-request-forgery-csrf-in-eskooly-web-product-less-than-v3.0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35538.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35538.json index 1c723f035f3..ed773e9535a 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35538.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35538.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35538", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T21:15:09.850", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:00:34.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,14 +55,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:typecho:typecho:1.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "95BE475D-DE29-4126-ABF3-FC9BB0382419" + } + ] + } + ] + } + ], "references": [ { "url": "https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Release Notes" + ] }, { "url": "https://typecho.org", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json index b5a98744147..bdc9d7a99c8 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38909", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T14:15:02.897", - "lastModified": "2025-03-14T19:15:46.707", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:35:52.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +61,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:std42:elfinder:2.1.64:*:*:*:*:*:*:*", + "matchCriteriaId": "6C76D05F-90D4-4EF5-B048-D517C949E461" + } + ] + } + ] + } + ], "references": [ { "url": "http://elfinder.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/B0D0B0P0T/CVE/blob/main/CVE-2024-38909", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://elfinder.com", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/B0D0B0P0T/CVE/blob/main/CVE-2024-38909", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json index ff458527c59..ce876ace1ab 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38996.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38996", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.103", - "lastModified": "2024-11-21T09:27:04.387", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-28T14:37:52.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ag-grid:ag-grid:*:*:*:*:*:*:*:*", + "versionEndExcluding": "31.3.4", + "matchCriteriaId": "4DC27DDE-3069-432F-9A7B-EB5F7957EE78" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/mestrtee/c1590660750744f25e86ba1bf240844b", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/mestrtee/f8037d492dab0d77bca719e05d31c08b", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/mestrtee/c1590660750744f25e86ba1bf240844b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/mestrtee/f8037d492dab0d77bca719e05d31c08b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40425.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40425.json index 9c7e9ec9436..5d894185d42 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40425.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40425.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40425", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T18:15:08.433", - "lastModified": "2024-11-21T09:31:05.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:46:31.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sparkshop:sparkshop:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.7", + "matchCriteriaId": "7B591554-F401-4A89-8DA6-1425B7D63B13" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/J1rrY-learn/26524d4714a81cf2d64583069e96f765", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://gist.github.com/J1rrY-learn/26524d4714a81cf2d64583069e96f765", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40455.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40455.json index 89d270ed327..37838e05fe7 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40455.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40455.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40455", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T20:15:03.587", - "lastModified": "2025-03-13T15:15:46.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:44:33.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thinksaas:thinksaas:3.70:*:*:*:*:*:*:*", + "matchCriteriaId": "4886BF91-72D0-4758-A534-20C33E4219A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gold-textbook-8ff.notion.site/ThinkSAAS-Arbitrary-folder-deletion-vulnerability-f992ed6124bc46ccaa8c2982274b17e2?pvs=25", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://gold-textbook-8ff.notion.site/ThinkSAAS-Arbitrary-folder-deletion-vulnerability-f992ed6124bc46ccaa8c2982274b17e2?pvs=25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40456.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40456.json index 83f6c5919b2..6a04b96969f 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40456.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40456.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40456", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T20:15:03.687", - "lastModified": "2024-11-21T09:31:07.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:43:04.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thinksaas:thinksaas:3.70:*:*:*:*:*:*:*", + "matchCriteriaId": "4886BF91-72D0-4758-A534-20C33E4219A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40482.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40482.json index 5c835bff52f..cb342b3a894 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40482.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40482.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40482", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:29.180", - "lastModified": "2024-08-13T01:13:50.130", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:32:00.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Unrestricted%20File%20Upload.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40486.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40486.json index 08b83152c7b..29aa4216297 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40486.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40486.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40486", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:29.360", - "lastModified": "2024-08-13T01:13:52.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:29:24.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/SQL%20Injection.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40487.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40487.json index 36249470f80..4893430beb1 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40487.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40487.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40487", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:29.447", - "lastModified": "2024-08-23T15:35:06.307", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:28:51.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Stored%20XSS.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40488.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40488.json index 1cd889b4f8a..33f577079af 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40488.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40488.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40488", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:29.537", - "lastModified": "2024-08-13T01:13:53.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:24:28.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412" + } + ] + } + ] + } + ], "references": [ { "url": "https://capec.mitre.org/data/definitions/62.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/CSRF.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42794.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42794.json index 5cc949e8202..0f79d9bddc0 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42794.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42794.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42794", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-16T20:15:46.770", - "lastModified": "2024-09-20T12:31:20.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T15:09:59.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Save%20User%20%26%20Account%20Takeover.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42795.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42795.json index a5cc55c1443..0176d254e32 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42795.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42795.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42795", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-16T20:15:46.830", - "lastModified": "2024-09-20T12:31:20.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T15:08:25.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20User.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42796.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42796.json index 0c7a4de681a..c7d19115b81 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42796.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42796.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42796", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-16T20:15:46.890", - "lastModified": "2024-09-20T12:31:20.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:56:46.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Delete%20Genre.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42798.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42798.json index dd6fb93a5e0..9ccd2b0714c 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42798.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42798.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42798", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-16T20:15:46.957", - "lastModified": "2024-09-20T12:31:20.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:56:09.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Priv%20Esc%20-%20Save%20Edit%20User%20-%20AC%20Takeover.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.kashipara.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42994.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42994.json index d6193c1a320..73d8cac81d4 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42994.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42994.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42994", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-16T17:15:15.153", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:10:13.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*", + "versionEndIncluding": "8.1.0", + "matchCriteriaId": "55C5E8CB-FCC4-4211-A9ED-1AFDE2F99280" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.shielder.com/advisories/vtiger-mailmanager-sqli/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42995.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42995.json index 571b74c0010..b087fd4b6c7 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42995.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42995.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42995", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-16T17:15:15.273", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:09:10.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*", + "versionEndIncluding": "8.1.0", + "matchCriteriaId": "55C5E8CB-FCC4-4211-A9ED-1AFDE2F99280" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.shielder.com/advisories/vtiger-migration-bac/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44571.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44571.json index c4e20bb6d2a..ddde2c3acbc 100644 --- a/CVE-2024/CVE-2024-445xx/CVE-2024-44571.json +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44571", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-11T17:15:13.630", - "lastModified": "2024-09-12T12:35:54.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T15:22:14.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +61,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.2.1", + "versionEndIncluding": "23.1.0", + "matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81" + } + ] + } + ] + } + ], "references": [ { "url": "http://system-on-chip.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.relyum.com/web/support/vulnerability-report/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44572.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44572.json index b6c92ca92da..240437c281b 100644 --- a/CVE-2024/CVE-2024-445xx/CVE-2024-44572.json +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44572", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-11T17:15:13.677", - "lastModified": "2024-09-12T12:35:54.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T15:20:25.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.2.1", + "versionEndIncluding": "23.1.0", + "matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81" + } + ] + } + ] + } + ], "references": [ { "url": "http://system-on-chip.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.relyum.com/web/support/vulnerability-report/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44573.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44573.json index 11a5c2bf042..310c7ddb9c3 100644 --- a/CVE-2024/CVE-2024-445xx/CVE-2024-44573.json +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44573.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44573", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-11T17:15:13.727", - "lastModified": "2024-11-01T19:35:27.177", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T15:18:27.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.2.1", + "versionEndIncluding": "23.1.0", + "matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81" + } + ] + } + ] + } + ], "references": [ { "url": "http://system-on-chip.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.relyum.com/web/support/vulnerability-report/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44574.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44574.json index 68b8e72e8eb..a50402e7af5 100644 --- a/CVE-2024/CVE-2024-445xx/CVE-2024-44574.json +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44574.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44574", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-11T17:15:13.770", - "lastModified": "2024-09-12T12:35:54.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T15:16:15.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.2.1", + "versionEndIncluding": "23.1.0", + "matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81" + } + ] + } + ] + } + ], "references": [ { "url": "http://system-on-chip.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.relyum.com/web/support/vulnerability-report/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44575.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44575.json index d26722ba6cb..809200e0e70 100644 --- a/CVE-2024/CVE-2024-445xx/CVE-2024-44575.json +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44575.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44575", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-11T17:15:13.820", - "lastModified": "2024-11-25T18:15:12.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T15:14:44.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.2.1", + "versionEndIncluding": "23.1.0", + "matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81" + } + ] + } + ] + } + ], "references": [ { "url": "http://system-on-chip.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.relyum.com/web/support/vulnerability-report/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44577.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44577.json index b25c93dd187..f0406c17c08 100644 --- a/CVE-2024/CVE-2024-445xx/CVE-2024-44577.json +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44577.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44577", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-11T17:15:13.870", - "lastModified": "2024-09-12T12:35:54.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T15:13:42.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.2.1", + "versionEndIncluding": "23.1.0", + "matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81" + } + ] + } + ] + } + ], "references": [ { "url": "http://system-on-chip.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.relyum.com/web/support/vulnerability-report/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8372.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8372.json index fc72f987e47..5d16d27157d 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8372.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8372.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8372", "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", "published": "2024-09-09T15:15:12.560", - "lastModified": "2025-02-12T20:14:39.330", - "vulnStatus": "Analyzed", + "lastModified": "2025-04-28T14:15:20.107", + "vulnStatus": "Modified", "cveTags": [ { "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", @@ -15,7 +15,7 @@ "descriptions": [ { "lang": "en", - "value": "Improper sanitization of the value of the '[srcset]' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ." + "value": "Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23375.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23375.json new file mode 100644 index 00000000000..9f803a5c9cd --- /dev/null +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23375.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23375", + "sourceIdentifier": "security_alert@emc.com", + "published": "2025-04-28T15:15:45.157", + "lastModified": "2025-04-28T15:15:45.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerProtect Data Manager Reporting, version(s) 19.17, contain(s) an Incorrect Use of Privileged APIs vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-648" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23376.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23376.json new file mode 100644 index 00000000000..f0ce6d09f3a --- /dev/null +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23376.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23376", + "sourceIdentifier": "security_alert@emc.com", + "published": "2025-04-28T15:15:45.303", + "lastModified": "2025-04-28T15:15:45.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerProtect Data Manager Reporting, version(s) 19.16, 19.17, 19.18, contain(s) an Improper Neutralization of Special Elements Used in a Template Engine vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1336" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23377.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23377.json new file mode 100644 index 00000000000..da15c60adbb --- /dev/null +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23377.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23377", + "sourceIdentifier": "security_alert@emc.com", + "published": "2025-04-28T15:15:45.437", + "lastModified": "2025-04-28T15:15:45.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerProtect Data Manager Reporting, version(s) 19.17, 19.18 contain(s) an Improper Encoding or Escaping of Output vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to inject arbitrary web script or html in reporting outputs." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25776.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25776.json new file mode 100644 index 00000000000..884682ef850 --- /dev/null +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25776.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-25776", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-28T15:15:45.587", + "lastModified": "2025-04-28T15:15:45.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Scripting (XSS) vulnerability exists in the User Registration and User Profile features of Codeastro Bus Ticket Booking System v1.0 allows an attacker to execute arbitrary code into the Full Name and Address fields during user registration or profile editing." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://codeastro.com/bus-ticket-booking-system-in-php-codeigniter-with-source-code/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/arunmodi/Vulnerability-Research/tree/main/CVE-2025-25776", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-397xx/CVE-2025-39735.json b/CVE-2025/CVE-2025-397xx/CVE-2025-39735.json index a27f93f0f87..47a3ecc28f1 100644 --- a/CVE-2025/CVE-2025-397xx/CVE-2025-39735.json +++ b/CVE-2025/CVE-2025-397xx/CVE-2025-39735.json @@ -2,8 +2,8 @@ "id": "CVE-2025-39735", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-18T07:15:44.150", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T14:37:34.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,187 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jfs: correcci\u00f3n de lectura fuera de los l\u00edmites de slab en ea_get(). Durante la etiqueta \"size_check\" en ea_get(), el c\u00f3digo comprueba si el tama\u00f1o de la lista de atributos extendidos (xattr) coincide con ea_size. De lo contrario, registra \"ea_get: atributo extendido no v\u00e1lido\" y llama a print_hex_dump(). En este caso, EALIST_SIZE(ea_buf->xattr) devuelve 4110417968, que excede INT_MAX (2147483647). A continuaci\u00f3n, se fija ea_size: int size = clamp_t(int, ea_size, 0, EALIST_SIZE(ea_buf->xattr)); Aunque clamp_t busca limitar ea_size entre 0 y 4110417968, el l\u00edmite superior se trata como un entero, lo que provoca un desbordamiento por encima de 2^31 - 1. Esto hace que \"size\" se repita y se vuelva negativo (-184549328). El \"size\" se pasa a print_hex_dump() (llamado \"len\" en print_hex_dump()) como tipo size_t (un tipo sin signo). Este se almacena en una variable llamada \"int remaining\", que se asigna a \"int linelen\", que a su vez se pasa a hex_dump_to_buffer(). En print_hex_dump(), el bucle for itera desde 0 hasta len-1, donde len es 18446744073525002176 y llama a hex_dump_to_buffer() en cada iteraci\u00f3n: for (i = 0; i < len; i += rowsize) { linelen = min(remaining, rowsize); remaining -= rowsize; hex_dump_to_buffer(ptr + i, linelen, rowsize, groupsize, linebuf, sizeof(linebuf), ascii); ... } La condici\u00f3n de detenci\u00f3n esperada (i < len) se rompe efectivamente ya que len est\u00e1 da\u00f1ado y es muy grande. Esto eventualmente lleva a que \"ptr+i\" se pase a hex_dump_to_buffer() para acercarse al final de los l\u00edmites reales de \"ptr\", eventualmente se realiza un acceso fuera de los l\u00edmites en hex_dump_to_buffer() en el siguiente bucle for: for (j = 0; j < len; j++) { if (linebuflen < lx + 2) goto overflow2; ch = ptr[j]; ... } Para solucionar esto debemos validar \"EALIST_SIZE(ea_buf->xattr)\" antes de utilizarlo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.325", + "versionEndExcluding": "4.20", + "matchCriteriaId": "3C960EB7-4E90-49E0-BB92-BE6F1B8CF26F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.287", + "versionEndExcluding": "5.4.292", + "matchCriteriaId": "16E1C46D-7C0B-4307-928A-8D0ABDF8D1B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.231", + "versionEndExcluding": "5.10.236", + "matchCriteriaId": "8F0C4A9A-87C3-4779-923D-5E19C9A26EA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.174", + "versionEndExcluding": "5.15.180", + "matchCriteriaId": "B6B383DC-5ED6-4326-885D-2F161A71E2D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.120", + "versionEndExcluding": "6.1.134", + "matchCriteriaId": "B9344B2D-88D1-4540-9748-8CC37D3B25C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.64", + "versionEndExcluding": "6.6.87", + "matchCriteriaId": "042FFA18-3C6A-4999-AB8F-4F6F5902BEEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11.11", + "versionEndExcluding": "6.12", + "matchCriteriaId": "4CBF5F6E-D446-4CAE-AAA4-413442319824" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12.2", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "B5C71FC9-A61C-431A-9215-38D09F5A2FF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0beddc2a3f9b9cf7d8887973041e36c2d0fa3652", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/16d3d36436492aa248b2d8045e75585ebcc2f34d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d6fd5b9c6acbc005e53d0211c7381f566babec1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/46e2c031aa59ea65128991cbca474bd5c0c2ecdb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/50afcee7011155933d8d5e8832f52eeee018cfd3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5263822558a8a7c0d0248d5679c2dcf4d5cda61f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/78c9cbde8880ec02d864c166bcb4fe989ce1d95f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a8c31808925b11393a6601f534bb63bac5366bab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fdf480da5837c23b146c4743c18de97202fcab37", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-397xx/CVE-2025-39755.json b/CVE-2025/CVE-2025-397xx/CVE-2025-39755.json index 5ce7ed4bef7..8755672cc21 100644 --- a/CVE-2025/CVE-2025-397xx/CVE-2025-39755.json +++ b/CVE-2025/CVE-2025-397xx/CVE-2025-39755.json @@ -2,8 +2,8 @@ "id": "CVE-2025-39755", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-18T07:15:44.263", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T15:32:46.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: gpib: Fix cb7210 pcmcia Oops. La estructura pcmcia_driver segu\u00eda usando \u00fanicamente la inicializaci\u00f3n anterior de .name en el campo drv. Esto provocaba un puntero nulo deref Oops en strcmp llamado desde pcmcia_register_driver. Inicialice el campo name de la estructura pcmcia_driver." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7ec50077d7f6647cb6ba3a2a20a6c26f51259c7d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c1baf6528bcfd6a86842093ff3f8ff8caf309c12", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c82ae06f49e70d1c14ee9c76c392345856d050c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-397xx/CVE-2025-39778.json b/CVE-2025/CVE-2025-397xx/CVE-2025-39778.json index d66de0d6f15..066f457121a 100644 --- a/CVE-2025/CVE-2025-397xx/CVE-2025-39778.json +++ b/CVE-2025/CVE-2025-397xx/CVE-2025-39778.json @@ -2,8 +2,8 @@ "id": "CVE-2025-39778", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-04-18T07:15:44.363", - "lastModified": "2025-04-21T14:23:45.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-28T15:37:34.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: objtool, nvmet: Se corrige el acceso a la pila fuera de los l\u00edmites en nvmet_ctrl_state_show(). La matriz csts_state_names[] solo tiene seis entradas dispersas, pero el c\u00f3digo de iteraci\u00f3n en nvmet_ctrl_state_show() itera siete, lo que resulta en una posible lectura de la pila fuera de los l\u00edmites. Se soluciona. Se corrige la siguiente advertencia con un kernel UBSAN: vmlinux.o: advertencia: objtool: .text.nvmet_ctrl_state_show: final inesperado de secci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.12.23", + "matchCriteriaId": "36AF5265-52FA-43B1-996B-D05FDF2FCCDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.13", + "versionEndExcluding": "6.13.11", + "matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.14", + "versionEndExcluding": "6.14.2", + "matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0cc0efc58d6c741b2868d4af24874d7fec28a575", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/107a23185d990e3df6638d9a84c835f963fe30a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1adc93a525fdee8e2b311e6d5fd93eb69714ca05", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8fbf37a3577b4d64c150cafde338eee17b2f2ea4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3960.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3960.json index 9e349f75ee6..5a420b48dd4 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3960.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3960.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3960", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T06:15:14.870", - "lastModified": "2025-04-27T06:15:14.870", + "lastModified": "2025-04-28T15:15:45.817", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability was found in withstars Books-Management-System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /allreaders.html of the component Background Interface. The manipulation leads to missing authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en withstars Books-Management-System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /allreaders.html del componente Background Interface. La manipulaci\u00f3n provoca la p\u00e9rdida de autorizaci\u00f3n. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -143,6 +147,10 @@ { "url": "https://vuldb.com/?submit.557230", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3961.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3961.json index 999d0bc88a3..d7410cbda4c 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3961.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3961.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3961", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T07:15:15.307", - "lastModified": "2025-04-27T07:15:15.307", + "lastModified": "2025-04-28T15:15:45.943", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic has been found in withstars Books-Management-System 1.0. This affects an unknown part of the file /admin/article/add/do. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en withstars Books-Management-System 1.0. Esta afecta a una parte desconocida del archivo /admin/article/add/do. La manipulaci\u00f3n del argumento \"T\u00edtulo\" provoca ataques de cross-site scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -143,6 +147,10 @@ { "url": "https://vuldb.com/?submit.557231", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3962.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3962.json index cbe5c00fd6d..47ab2bc5763 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3962.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3962.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3962", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T07:15:15.580", - "lastModified": "2025-04-27T07:15:15.580", + "lastModified": "2025-04-28T15:15:46.060", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability classified as problematic was found in withstars Books-Management-System 1.0. This vulnerability affects unknown code of the file /api/comment/add of the component Comment Handler. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en withstars Books-Management-System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /api/comment/add del componente Comment Handler. La manipulaci\u00f3n del contenido del argumento provoca ataques de cross site scripting. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -143,6 +147,10 @@ { "url": "https://vuldb.com/?submit.557236", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS2.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3963.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3963.json index 66423ef316f..fb08b8dae6d 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3963.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3963.json @@ -2,7 +2,7 @@ "id": "CVE-2025-3963", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T08:15:14.353", - "lastModified": "2025-04-27T08:15:14.353", + "lastModified": "2025-04-28T15:15:46.180", "vulnStatus": "Received", "cveTags": [ { @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in withstars Books-Management-System 1.0. This issue affects some unknown processing of the file /admin/article/list of the component Background Interface. The manipulation leads to missing authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en withstars Books-Management-System 1.0. Este problema afecta a un procesamiento desconocido del archivo /admin/article/list del componente Background Interface. La manipulaci\u00f3n provoca la omisi\u00f3n de la autorizaci\u00f3n. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante." } ], "metrics": { @@ -66,7 +70,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -114,7 +118,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -143,6 +147,10 @@ { "url": "https://vuldb.com/?submit.557237", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3966.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3966.json index f63d980b9a0..1f94afae53a 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3966.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3966.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3966", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T10:15:15.717", - "lastModified": "2025-04-27T10:15:15.717", + "lastModified": "2025-04-28T15:15:46.290", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itwanger paicoding 1.0.3 and classified as problematic. Affected by this issue is some unknown functionality of the file /user/home?userId=1&homeSelectType=read of the component Browsing History Handler. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en itwanger paicing 1.0.3 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /user/home?userId=1&homeSelectType=read del componente Browsing History Handler. La manipulaci\u00f3n provoca la divulgaci\u00f3n de informaci\u00f3n. El ataque podr\u00eda ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,14 @@ { "url": "https://vuldb.com/?submit.557250", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/uglory-gll/javasec/blob/main/paicoding.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + }, + { + "url": "https://github.com/uglory-gll/javasec/blob/main/paicoding.md#21userhomeuserid1homeselecttyperead-view-browsing-history-of-others", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3967.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3967.json index 5ce9e68da06..7c00de1c1b1 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3967.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3967.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3967", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T11:15:16.743", - "lastModified": "2025-04-27T11:15:16.743", + "lastModified": "2025-04-28T15:15:46.410", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itwanger paicoding 1.0.3. It has been classified as critical. This affects an unknown part of the file /article/api/post of the component Article Handler. The manipulation of the argument articleId leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en itwanger paicing 1.0.3. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /article/api/post del componente Article Handler. La manipulaci\u00f3n del argumento articleId provoca una autorizaci\u00f3n incorrecta. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.557251", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/uglory-gll/javasec/blob/main/paicoding.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3968.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3968.json index 55264147395..2fe2bb189c4 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3968.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3968.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3968", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T11:15:16.950", - "lastModified": "2025-04-27T11:15:16.950", + "lastModified": "2025-04-28T15:15:46.527", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in codeprojects News Publishing Site Dashboard 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /api.php. The manipulation of the argument cat_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en codeprojects News Publishing Site Dashboard 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /api.php. La manipulaci\u00f3n del argumento cat_id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.557286", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zzZxby/Vulnerability-Exploration/blob/main/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A11.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3975.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3975.json index 4fe91bcf93d..93acf742725 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3975.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3975.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3975", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T16:15:15.260", - "lastModified": "2025-04-27T16:15:15.260", + "lastModified": "2025-04-28T15:15:46.760", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ScriptAndTools eCommerce-website-in-PHP 3.0 and classified as problematic. This issue affects some unknown processing of the file /admin/subscriber-csv.php. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en ScriptAndTools eCommerce-website-in-PHP 3.0 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo /admin/subscriber-csv.php. La manipulaci\u00f3n provoca la divulgaci\u00f3n de informaci\u00f3n. El ataque podr\u00eda iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://www.websecurityinsights.my.id/2025/04/script-and-tools-ecommerce-30_53.html", "source": "cna@vuldb.com" + }, + { + "url": "https://www.websecurityinsights.my.id/2025/04/script-and-tools-ecommerce-30_53.html", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3977.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3977.json index af68fc99084..df62556a3b7 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3977.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3977.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3977", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T17:15:15.853", - "lastModified": "2025-04-27T17:15:15.853", + "lastModified": "2025-04-28T14:15:21.520", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in iteachyou Dreamer CMS up to 4.1.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/attachment/download of the component Attachment Handler. The manipulation of the argument ID leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en iteachyou Dreamer CMS hasta la versi\u00f3n 4.1.3. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/attachment/download del componente Attachment Handler. La manipulaci\u00f3n del ID del argumento provoca una autorizaci\u00f3n indebida. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.557639", "source": "cna@vuldb.com" + }, + { + "url": "https://gitee.com/iteachyou/dreamer_cms/issues/IC13O1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3978.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3978.json index f8f4670ac26..b0913b46bea 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3978.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3978.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3978", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T17:15:16.030", - "lastModified": "2025-04-27T17:15:16.030", + "lastModified": "2025-04-28T14:15:21.640", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in dazhouda lecms 3.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin/view/default/user_set.htm. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en dazhouda lecms 3.0.3. Se ha clasificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo admin/view/default/user_set.htm. La manipulaci\u00f3n conlleva la divulgaci\u00f3n de informaci\u00f3n. El ataque podr\u00eda ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.557748", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_2.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3979.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3979.json index 759d2f59de8..96aecf04402 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3979.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3979.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3979", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T18:15:16.020", - "lastModified": "2025-04-27T18:15:16.020", + "lastModified": "2025-04-28T14:15:21.767", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in dazhouda lecms 3.0.3. This affects an unknown part of the file /index.php?my-password-ajax-1 of the component Password Change Handler. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en dazhouda lecms 3.0.3. Esta afecta a una parte desconocida del archivo /index.php?my-password-ajax-1 del componente Password Change Handler. Esta manipulaci\u00f3n provoca Cross-Site Request Forgery. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.557787", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_3.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3980.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3980.json index 4b6eeff1aa8..44779a1519f 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3980.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3980.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3980", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T18:15:16.237", - "lastModified": "2025-04-27T18:15:16.237", + "lastModified": "2025-04-28T14:15:21.890", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in wowjoy \u6d59\u6c5f\u6e56\u5dde\u534e\u5353\u4fe1\u606f\u79d1\u6280\u6709\u9650\u516c\u53f8 Internet Doctor Workstation System 1.0. This vulnerability affects unknown code of the file /v1/prescription/list. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en wowjoy ?????????????? Internet Doctor Workstation System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /v1/prescription/list. La manipulaci\u00f3n da lugar a una autorizaci\u00f3n indebida. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.557930", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/38279/3/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-39xx/CVE-2025-3981.json b/CVE-2025/CVE-2025-39xx/CVE-2025-3981.json index 0260b717b20..49801f3e765 100644 --- a/CVE-2025/CVE-2025-39xx/CVE-2025-3981.json +++ b/CVE-2025/CVE-2025-39xx/CVE-2025-3981.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3981", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-27T19:15:15.750", - "lastModified": "2025-04-27T19:15:15.750", + "lastModified": "2025-04-28T14:15:22.013", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in wowjoy \u6d59\u6c5f\u6e56\u5dde\u534e\u5353\u4fe1\u606f\u79d1\u6280\u6709\u9650\u516c\u53f8 Internet Doctor Workstation System 1.0. This issue affects some unknown processing of the file /v1/prescription/details/. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en wowjoy ?????????????? Internet Doctor Workstation System 1.0. Este problema afecta a un procesamiento desconocido del archivo /v1/prescription/details/. La manipulaci\u00f3n da lugar a una autorizaci\u00f3n indebida. El ataque podr\u00eda iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?id.306317", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/38279/3/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4022.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4022.json new file mode 100644 index 00000000000..b97203d497b --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4022.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4022", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-28T14:15:22.867", + "lastModified": "2025-04-28T14:15:22.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in web-arena-x webarena up to 0.2.0. It has been declared as critical. This vulnerability affects the function HTMLContentEvaluator of the file webarena/evaluation_harness/evaluators.py. The manipulation of the argument target[\"url\"] leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/web-arena-x/webarena/issues/194", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/web-arena-x/webarena/issues/194#issuecomment-2796165922", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306376", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306376", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.558415", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4023.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4023.json new file mode 100644 index 00000000000..a20e152cefa --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4023.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4023", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-28T14:15:23.043", + "lastModified": "2025-04-28T14:15:23.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in itsourcecode Placement Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /add_company.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xingyu-wu4678/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://itsourcecode.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306377", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306377", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.558546", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4024.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4024.json new file mode 100644 index 00000000000..0e8dc715c27 --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4024.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4024", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-28T15:15:47.600", + "lastModified": "2025-04-28T15:15:47.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in itsourcecode Placement Management System 1.0. Affected is an unknown function of the file /add_drive.php. The manipulation of the argument drive_title leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xingyu-wu4678/cve/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://itsourcecode.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306378", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306378", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.558616", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4025.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4025.json new file mode 100644 index 00000000000..c9f4326451d --- /dev/null +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4025.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4025", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-28T15:15:47.767", + "lastModified": "2025-04-28T15:15:47.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in itsourcecode Placement Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /registration.php. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xingyu-wu4678/cve/issues/3", + "source": "cna@vuldb.com" + }, + { + "url": "https://itsourcecode.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306379", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306379", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.558621", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43919.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43919.json index 582d821dc86..b483b6af58b 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43919.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43919.json @@ -2,13 +2,20 @@ "id": "CVE-2025-43919", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-20T01:15:45.233", - "lastModified": "2025-04-24T16:22:37.117", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2025-04-28T14:15:22.137", + "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter." + "value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used." }, { "lang": "es", @@ -113,9 +120,17 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory", - "Mitigation" + "Mitigation", + "Third Party Advisory" ] + }, + { + "url": "https://github.com/cpanel/mailman2-python3", + "source": "cve@mitre.org" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2025/04/21/6", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43920.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43920.json index 81320d65652..d247ddd410c 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43920.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43920.json @@ -2,13 +2,20 @@ "id": "CVE-2025-43920", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-20T01:15:45.867", - "lastModified": "2025-04-24T16:20:36.953", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2025-04-28T14:15:22.323", + "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line." + "value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used." }, { "lang": "es", @@ -115,6 +122,14 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://github.com/cpanel/mailman2-python3", + "source": "cve@mitre.org" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2025/04/21/6", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-439xx/CVE-2025-43921.json b/CVE-2025/CVE-2025-439xx/CVE-2025-43921.json index 356a59b708d..8762a8e101c 100644 --- a/CVE-2025/CVE-2025-439xx/CVE-2025-43921.json +++ b/CVE-2025/CVE-2025-439xx/CVE-2025-43921.json @@ -2,13 +2,20 @@ "id": "CVE-2025-43921", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-20T01:15:46.043", - "lastModified": "2025-04-24T16:16:59.597", - "vulnStatus": "Analyzed", - "cveTags": [], + "lastModified": "2025-04-28T14:15:22.477", + "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint." + "value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used." }, { "lang": "es", @@ -115,6 +122,14 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://github.com/cpanel/mailman2-python3", + "source": "cve@mitre.org" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2025/04/21/6", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-463xx/CVE-2025-46333.json b/CVE-2025/CVE-2025-463xx/CVE-2025-46333.json index 33434c705d3..a94120c1d64 100644 --- a/CVE-2025/CVE-2025-463xx/CVE-2025-46333.json +++ b/CVE-2025/CVE-2025-463xx/CVE-2025-46333.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46333", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-25T21:15:39.577", - "lastModified": "2025-04-25T21:15:39.577", + "lastModified": "2025-04-28T15:15:47.057", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "z2d is a pure Zig 2D graphics library. In version 0.6.0, when writing from one surface to another using `z2d.compositor.StrideCompositor.run`, the source surface can be completely out-of-bounds on the x-axis (but not on the y-axis) by way of a negative offset. This results in an overflow of the value controlling the length of the stride. In non-safe optimization modes (consumers compiling with `ReleaseFast` or `ReleaseSmall`), this could potentially lead to invalid memory accesses or corruption. This issue is patched in version 0.6.1." + "value": "z2d is a pure Zig 2D graphics library. Versions of z2d after `0.5.1` and up to and including `0.6.0`, when writing from one surface to another using `z2d.compositor.StrideCompositor.run`, and higher-level operations when the anti-aliasing mode is set to `.default` (such as `Context.fill`, `Context.stroke`, `painter.fill`, and `painter.stroke`), the source surface can be completely out-of-bounds on the x-axis, but not on the y-axis, by way of a negative offset. This results in an overflow of the value controlling the length of the stride. In non-safe optimization modes (consumers compiling with `ReleaseFast` or `ReleaseSmall`), this could potentially lead to invalid memory accesses or corruption.\n\nThis issue is patched in version `0.6.1`. Users on an untagged version after `v0.5.1` and before `v0.6.1` are advised to update to address the vulnerability. Those still on Zig `0.13.0` are recommended to downgrade to `v0.5.1`." + }, + { + "lang": "es", + "value": "z2d es una librer\u00eda de gr\u00e1ficos Zig 2D pura. En la versi\u00f3n 0.6.0, al escribir de una superficie a otra usando `z2d.compositor.StrideCompositor.run`, la superficie de origen puede estar completamente fuera de los l\u00edmites en el eje x (pero no en el eje y) debido a un desplazamiento negativo. Esto provoca un desbordamiento del valor que controla la longitud de la zancada. En modos de optimizaci\u00f3n no seguros (consumidores que compilan con `ReleaseFast` o `ReleaseSmall`), esto podr\u00eda provocar accesos no v\u00e1lidos a memoria o corrupci\u00f3n. Este problema se solucion\u00f3 en la versi\u00f3n 0.6.1." } ], "metrics": { @@ -60,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-466xx/CVE-2025-46661.json b/CVE-2025/CVE-2025-466xx/CVE-2025-46661.json index 00957d7a05b..859ce2cc10f 100644 --- a/CVE-2025/CVE-2025-466xx/CVE-2025-46661.json +++ b/CVE-2025/CVE-2025-466xx/CVE-2025-46661.json @@ -2,16 +2,51 @@ "id": "CVE-2025-46661", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-28T13:15:24.117", - "lastModified": "2025-04-28T13:15:24.117", + "lastModified": "2025-04-28T14:15:22.637", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection." + "value": "IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection. All instances have been patched by the Supplier." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1336" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://code-white.com/public-vulnerability-list/", diff --git a/README.md b/README.md index a76958ac337..11cf75a0875 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-28T14:00:19.945572+00:00 +2025-04-28T16:00:20.643077+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-28T13:45:09.357000+00:00 +2025-04-28T15:37:34.230000+00:00 ``` ### Last Data Feed Release @@ -33,30 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -291587 +291596 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `9` -- [CVE-2025-32472](CVE-2025/CVE-2025-324xx/CVE-2025-32472.json) (`2025-04-28T13:15:23.053`) -- [CVE-2025-4018](CVE-2025/CVE-2025-40xx/CVE-2025-4018.json) (`2025-04-28T12:15:31.913`) -- [CVE-2025-4019](CVE-2025/CVE-2025-40xx/CVE-2025-4019.json) (`2025-04-28T12:15:32.093`) -- [CVE-2025-4020](CVE-2025/CVE-2025-40xx/CVE-2025-4020.json) (`2025-04-28T13:15:24.603`) -- [CVE-2025-4021](CVE-2025/CVE-2025-40xx/CVE-2025-4021.json) (`2025-04-28T13:15:24.773`) -- [CVE-2025-46661](CVE-2025/CVE-2025-466xx/CVE-2025-46661.json) (`2025-04-28T13:15:24.117`) +- [CVE-2015-2079](CVE-2015/CVE-2015-20xx/CVE-2015-2079.json) (`2025-04-28T15:15:44.007`) +- [CVE-2025-23375](CVE-2025/CVE-2025-233xx/CVE-2025-23375.json) (`2025-04-28T15:15:45.157`) +- [CVE-2025-23376](CVE-2025/CVE-2025-233xx/CVE-2025-23376.json) (`2025-04-28T15:15:45.303`) +- [CVE-2025-23377](CVE-2025/CVE-2025-233xx/CVE-2025-23377.json) (`2025-04-28T15:15:45.437`) +- [CVE-2025-25776](CVE-2025/CVE-2025-257xx/CVE-2025-25776.json) (`2025-04-28T15:15:45.587`) +- [CVE-2025-4022](CVE-2025/CVE-2025-40xx/CVE-2025-4022.json) (`2025-04-28T14:15:22.867`) +- [CVE-2025-4023](CVE-2025/CVE-2025-40xx/CVE-2025-4023.json) (`2025-04-28T14:15:23.043`) +- [CVE-2025-4024](CVE-2025/CVE-2025-40xx/CVE-2025-4024.json) (`2025-04-28T15:15:47.600`) +- [CVE-2025-4025](CVE-2025/CVE-2025-40xx/CVE-2025-4025.json) (`2025-04-28T15:15:47.767`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `48` -- [CVE-2023-51533](CVE-2023/CVE-2023-515xx/CVE-2023-51533.json) (`2025-04-28T13:13:33.597`) -- [CVE-2023-52048](CVE-2023/CVE-2023-520xx/CVE-2023-52048.json) (`2025-04-28T13:08:59.177`) -- [CVE-2024-24714](CVE-2024/CVE-2024-247xx/CVE-2024-24714.json) (`2025-04-28T12:48:10.637`) -- [CVE-2024-25170](CVE-2024/CVE-2024-251xx/CVE-2024-25170.json) (`2025-04-28T13:45:09.357`) -- [CVE-2024-26342](CVE-2024/CVE-2024-263xx/CVE-2024-26342.json) (`2025-04-28T13:15:09.927`) +- [CVE-2024-44574](CVE-2024/CVE-2024-445xx/CVE-2024-44574.json) (`2025-04-28T15:16:15.657`) +- [CVE-2024-44575](CVE-2024/CVE-2024-445xx/CVE-2024-44575.json) (`2025-04-28T15:14:44.490`) +- [CVE-2024-44577](CVE-2024/CVE-2024-445xx/CVE-2024-44577.json) (`2025-04-28T15:13:42.720`) +- [CVE-2024-8372](CVE-2024/CVE-2024-83xx/CVE-2024-8372.json) (`2025-04-28T14:15:20.107`) +- [CVE-2025-3960](CVE-2025/CVE-2025-39xx/CVE-2025-3960.json) (`2025-04-28T15:15:45.817`) +- [CVE-2025-3961](CVE-2025/CVE-2025-39xx/CVE-2025-3961.json) (`2025-04-28T15:15:45.943`) +- [CVE-2025-3962](CVE-2025/CVE-2025-39xx/CVE-2025-3962.json) (`2025-04-28T15:15:46.060`) +- [CVE-2025-3963](CVE-2025/CVE-2025-39xx/CVE-2025-3963.json) (`2025-04-28T15:15:46.180`) +- [CVE-2025-3966](CVE-2025/CVE-2025-39xx/CVE-2025-3966.json) (`2025-04-28T15:15:46.290`) +- [CVE-2025-3967](CVE-2025/CVE-2025-39xx/CVE-2025-3967.json) (`2025-04-28T15:15:46.410`) +- [CVE-2025-3968](CVE-2025/CVE-2025-39xx/CVE-2025-3968.json) (`2025-04-28T15:15:46.527`) +- [CVE-2025-39735](CVE-2025/CVE-2025-397xx/CVE-2025-39735.json) (`2025-04-28T14:37:34.487`) +- [CVE-2025-3975](CVE-2025/CVE-2025-39xx/CVE-2025-3975.json) (`2025-04-28T15:15:46.760`) +- [CVE-2025-39755](CVE-2025/CVE-2025-397xx/CVE-2025-39755.json) (`2025-04-28T15:32:46.553`) +- [CVE-2025-3977](CVE-2025/CVE-2025-39xx/CVE-2025-3977.json) (`2025-04-28T14:15:21.520`) +- [CVE-2025-39778](CVE-2025/CVE-2025-397xx/CVE-2025-39778.json) (`2025-04-28T15:37:34.230`) +- [CVE-2025-3978](CVE-2025/CVE-2025-39xx/CVE-2025-3978.json) (`2025-04-28T14:15:21.640`) +- [CVE-2025-3979](CVE-2025/CVE-2025-39xx/CVE-2025-3979.json) (`2025-04-28T14:15:21.767`) +- [CVE-2025-3980](CVE-2025/CVE-2025-39xx/CVE-2025-3980.json) (`2025-04-28T14:15:21.890`) +- [CVE-2025-3981](CVE-2025/CVE-2025-39xx/CVE-2025-3981.json) (`2025-04-28T14:15:22.013`) +- [CVE-2025-43919](CVE-2025/CVE-2025-439xx/CVE-2025-43919.json) (`2025-04-28T14:15:22.137`) +- [CVE-2025-43920](CVE-2025/CVE-2025-439xx/CVE-2025-43920.json) (`2025-04-28T14:15:22.323`) +- [CVE-2025-43921](CVE-2025/CVE-2025-439xx/CVE-2025-43921.json) (`2025-04-28T14:15:22.477`) +- [CVE-2025-46333](CVE-2025/CVE-2025-463xx/CVE-2025-46333.json) (`2025-04-28T15:15:47.057`) +- [CVE-2025-46661](CVE-2025/CVE-2025-466xx/CVE-2025-46661.json) (`2025-04-28T14:15:22.637`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7cbd6268c4e..17d8ab0781b 100644 --- a/_state.csv +++ b/_state.csv @@ -75559,6 +75559,7 @@ CVE-2015-2075,0,0,e2b9cfdccf5716685cc1e4d8cc1bc3a54797e772b0a1447d55a8f318c3576a CVE-2015-2076,0,0,3d8b112a5706df5d84310bb9b8ed104e56569c2923fa69b716ed38a355a69b2a,2025-04-12T10:46:40.837000 CVE-2015-2077,0,0,4411d36c64e75264ae4b5cd885f8ca45fd6474dc1e2b6cd680bb1a19f78a7f18,2025-04-12T10:46:40.837000 CVE-2015-2078,0,0,2611ed6e45a1c171159eb27c59a79256a622d5f057d44ff7975c92201c58de46,2025-04-12T10:46:40.837000 +CVE-2015-2079,1,1,f2f765cafa57b5c53cfac166351fda648b78b5622810f6e5e02e217e7c1564e0,2025-04-28T15:15:44.007000 CVE-2015-2080,0,0,1269de43ed4c4370565793a28753d3e81328a5b9b90e6133a8ceb967b3d23093,2025-04-12T10:46:40.837000 CVE-2015-2081,0,0,dbf23d9a94c6e7e32fefef8d65be0a4a8bd93470966a94df1e50b94d9db43619,2024-11-21T02:26:43.660000 CVE-2015-2082,0,0,7f5418dc360570b72eb84eefc32bc34eba854d22b1b5f25bc2ee784686888094,2025-04-12T10:46:40.837000 @@ -193427,7 +193428,7 @@ CVE-2022-23737,0,0,00bd5b8e77776c824d9367fe4e3bd6f356e3bcbf490141f8b74768cefd021 CVE-2022-23738,0,0,0eaa47d3d4006afa09ec7cb704b1f8468722477b8e76ecdafe6acdf69b5eb977,2024-11-21T06:49:12.737000 CVE-2022-23739,0,0,f6dd41fc9b18ff225249e63ed3de75d4f78a2a0eabee0e65e248c438d071d051,2025-04-08T21:15:44.423000 CVE-2022-2374,0,0,e8aea41fb4969ca1ce97b6b67b3414e0f25ada9e4b58edf35238b03b9dccf668,2024-11-21T07:00:51.853000 -CVE-2022-23740,0,0,73df818fba6a5db1c781b7a253d13fa4858bc42c8aaba1b97da3002f3df83d42,2024-11-21T06:49:12.987000 +CVE-2022-23740,0,1,3e1be9444a6173f399b977ddfb22aac75d5bb2d7c58fa44294560eefe333620e,2025-04-28T15:15:44.577000 CVE-2022-23741,0,0,3a64d91448bd62035134cb767623d94872c48ddd1ec46258ed91d43ab47820cc,2025-04-22T16:15:21.053000 CVE-2022-23742,0,0,7dea878edb5ad2cbdb3abc4beeb51490a987e35f3a4f8363cd49f2a2e7c043a1,2024-11-21T06:49:13.227000 CVE-2022-23743,0,0,a7454e6467ca11378287d0671c5f75d14fde2b38947403f7a5ca829d4c6db62b,2024-11-21T06:49:13.347000 @@ -210607,7 +210608,7 @@ CVE-2022-45419,0,0,e5e80247049cf7154de037d9e58ef6fb0998b7ad2c529e1ca7b6c319fab16 CVE-2022-4542,0,0,1e8daab49fb467c0edc9286efcd4cbc9b024e0d6f613c2ff20ca5238d9ed329d,2025-04-03T20:15:18.443000 CVE-2022-45420,0,0,f1eff6696caa2e5ae623f262112221f1b06b603256e633ff4d1368d68d1794ee,2025-04-15T15:16:03.193000 CVE-2022-45421,0,0,5454303fe1616edea179c1a907dc0b9588624264b8c1c40f842ce8b70dbbd8e0,2025-04-15T15:16:03.357000 -CVE-2022-45422,0,0,1b36c85fe2672583a3ef0eda64ee1cd537bbee4b3a3cd5639f8e7b843dc1fbf9,2024-11-21T07:29:13.907000 +CVE-2022-45422,0,1,cbaa4e97ba94b306f8ff8fba0c5d4711702ae46e5916b688dbd38829f7250a40,2025-04-28T15:15:44.910000 CVE-2022-45423,0,0,1f033df1fc4960b99357cb040b9af81355eeabbedd198749f65aa65f3ad0d51f,2025-04-14T13:15:15.970000 CVE-2022-45424,0,0,2c9d05b22d8c4b9c1e6d273139d88262e63599a434074936adacad9cb44fafe0,2025-04-14T14:15:20.313000 CVE-2022-45425,0,0,520990494cde392487585b2b2277647d9ae6ee50312a99a0315937862c6404ea,2025-04-14T14:15:20.493000 @@ -240449,7 +240450,7 @@ CVE-2023-5153,0,0,9c9af9ee0585ae99c11dc28be44a3d285d24f0e534e56e6e3bc49f885c490b CVE-2023-51530,0,0,10aa7972ebcc143fc175a676ecc0636cfb1bd808ee825b8d1ba9998f1ed6f97f,2025-02-27T02:51:16.947000 CVE-2023-51531,0,0,ed65fb56698b1668a229da16713fbb3a00de61d6cd1c84cc2b94de89c27c7bfa,2025-02-27T02:55:35.553000 CVE-2023-51532,0,0,ab7508cc452da5caaa84a729d614de6dcf5a6b68199b1a01ad6bed86c7b79196,2024-11-21T08:38:19.377000 -CVE-2023-51533,0,1,2ef6b746e3ae13092e5325bb7897fb9a47cf6eafaf6307c389e0af4501a290f9,2025-04-28T13:13:33.597000 +CVE-2023-51533,0,0,2ef6b746e3ae13092e5325bb7897fb9a47cf6eafaf6307c389e0af4501a290f9,2025-04-28T13:13:33.597000 CVE-2023-51534,0,0,674283aa9bee476e3f518de07ee15ce728e3ea64deca08374beae81fdb205f23,2024-11-21T08:38:19.663000 CVE-2023-51535,0,0,b4ee7d4c77008fec43e7a917d42277372a9bc28a04a14adf861b98934323efbd,2024-11-21T08:38:19.803000 CVE-2023-51536,0,0,5459c09b4b1682eae7f140dbb92e6e712692b6c8c3fc2399e747fac5b9fd78de,2024-11-21T08:38:19.930000 @@ -240823,7 +240824,7 @@ CVE-2023-52044,0,0,5b5e70107668847bba1d6062e34c0bf4eaededd76c0935abbe5da27ca0360 CVE-2023-52045,0,0,b95570fd6064d2fac3cb39dff45979071738bfc47c15c31d200252b85a2f3e9f,2025-04-17T19:11:05.073000 CVE-2023-52046,0,0,194849462bf429fc749f298b05a36377ff7074363e301b433cd9950d69c4c501,2024-11-21T08:39:04.817000 CVE-2023-52047,0,0,d56b5255bbf43ce833425482d3a7c4458ee12e08ce88fc91b5b4e4a71c62ee74,2025-04-01T13:30:28.050000 -CVE-2023-52048,0,1,dc6a64e99c990ac71e2e5fd5c1632b65bf305feb3beb43bad667892a5fedb150,2025-04-28T13:08:59.177000 +CVE-2023-52048,0,0,dc6a64e99c990ac71e2e5fd5c1632b65bf305feb3beb43bad667892a5fedb150,2025-04-28T13:08:59.177000 CVE-2023-5205,0,0,ad9e6403ed51d32e238949552f23850cd3c894ce7b700f7f43181c17b96bcabf,2024-11-21T08:41:17.900000 CVE-2023-52059,0,0,631fc170b23676a9d5a914e1efcd033aa6ac461afd7c0cbe7ba670738271ca23,2024-11-21T08:39:05.367000 CVE-2023-52060,0,0,916b6d0023ba25356201b349f9585af7af15e0ab89951480565e91e01992b734,2025-03-13T20:15:16.240000 @@ -252729,7 +252730,7 @@ CVE-2024-24710,0,0,3e1e20a8dfa79a8b78b75c17d13801e5e4aa6e91804fe24acce34eb915d0b CVE-2024-24711,0,0,22ae5814b6f1b3b16c3d1525f8fcb2be9e6f73b9bf83108e69c5d785af0e14a5,2024-11-21T08:59:33.490000 CVE-2024-24712,0,0,efc844b6aac243f9d2a4e2fa0e4f20ffb1fa53d6800923dfed2d946c95888150,2024-11-21T08:59:33.620000 CVE-2024-24713,0,0,9b6abef33bc7d884bbcfe7f84a8de01ffd604fe1e84fadee5fa6903c498a1f90,2024-11-21T08:59:33.757000 -CVE-2024-24714,0,1,fa6f31994511f691ec58d6cd25d830472c6518df8eb14d92ad8a1216e17c5ef2,2025-04-28T12:48:10.637000 +CVE-2024-24714,0,0,fa6f31994511f691ec58d6cd25d830472c6518df8eb14d92ad8a1216e17c5ef2,2025-04-28T12:48:10.637000 CVE-2024-24715,0,0,0e1efbeecdbbc67506e62ff0a15195fb63b9939321818a7128fc2e9bb4370e11,2024-11-21T08:59:34.020000 CVE-2024-24716,0,0,2a1681202601d9e99709e6831ac4b63ea8c43e8b87405bb1f57ab626394c187f,2024-11-21T08:59:34.150000 CVE-2024-24717,0,0,75805cbf14610b8ac5098a39951fb1a53c50c5d54fe991e08ae0e81f017efa6f,2024-11-21T08:59:34.317000 @@ -253137,7 +253138,7 @@ CVE-2024-25167,0,0,6680c9ae0b5f0e6a56ae0f989b9e9129826f63fc1c07b9d46b893bd2a5ea0 CVE-2024-25168,0,0,8cefebfb25cf73bfbc7148eb27cdd7832e378fc25a13306a6452184972fcdac6,2024-11-21T09:00:23.370000 CVE-2024-25169,0,0,99447ba0d35007c05de0bb325e4f626f2e771e1210f38989dc4b7d60408a0543,2025-03-28T19:15:19.433000 CVE-2024-2517,0,0,295e66015290670d17656ff58cb1c4da5fc5fa5488e00738c41044e38528f829,2025-02-14T17:00:42.847000 -CVE-2024-25170,0,1,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f00c2,2025-04-28T13:45:09.357000 +CVE-2024-25170,0,0,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f00c2,2025-04-28T13:45:09.357000 CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000 CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000 CVE-2024-25180,0,0,0d4a542b02265d3f9b8201e343a419b397fe0f87ee7decd85beea8db7b2a744c,2024-11-21T09:00:24.200000 @@ -253549,7 +253550,7 @@ CVE-2024-25830,0,0,48f111b9df759d41453a93b4045c2ff567a72cf519523820b0bdb3651b119 CVE-2024-25831,0,0,bd8cc628942f0cfec3cd605617d2c1225f2d77c4bfbb5c43b8cabd63ea5984ac,2025-01-16T17:50:46.660000 CVE-2024-25832,0,0,0359e72eed9b587f1da939ee2b4f202d62bdd6b390e2936728c43fb3aef82845,2025-03-27T15:15:50.607000 CVE-2024-25833,0,0,50dde66bc691dda473a0e2525b2d4cb41dc2484c7572d20b63fa74d0870cf5ff,2025-01-16T17:50:18.237000 -CVE-2024-25837,0,0,9324aae20b150fb712a45f0d12f866250e517905551e94092fb5dfb75742ad97,2024-10-30T15:35:08.810000 +CVE-2024-25837,0,1,7bbde50123e9dad85e59add4941e11a3c0f989fc362143f8cbc962577f00d521,2025-04-28T14:06:50.453000 CVE-2024-25839,0,0,a6951a161c8400420691d40a579c87f91e6e0f1f8f29502c5d7b5cde306b0917,2024-11-21T09:01:24.383000 CVE-2024-2584,0,0,147866b6cc23dcf59e36f6b74e2eee47e7c2220f33f9e8fd97c35cfd9a0a049d,2025-04-11T14:47:05.300000 CVE-2024-25840,0,0,8953a162377158948ebf7583b7c44850336b1c32eb8d66824e9b6ea8a16712b3,2024-11-21T09:01:24.607000 @@ -254039,7 +254040,7 @@ CVE-2024-26335,0,0,d935f588a5f25fc8eb3a1cad35a0e183dcfe3bb620dcbf94cb5db283d0be6 CVE-2024-26337,0,0,8f97136a32143d7c5cb4e695fc03098705d0a94d9a4445524aede82b9c17fb81,2025-04-01T15:48:49.013000 CVE-2024-26339,0,0,50901e7be8d4dc2f1ae969674b464222e6c5cb243f33556cac70b86975fdb414,2025-04-01T15:48:23.610000 CVE-2024-2634,0,0,f23d5a69439faf8e582a9c275f183d86336ce7e598134e5aefd6ea8385c5e2eb,2024-11-21T09:10:10.983000 -CVE-2024-26342,0,1,da6762122e9027a78d524f6ee4cae5691172afa8889ba4ddcc1104b2ff0a8e3b,2025-04-28T13:15:09.927000 +CVE-2024-26342,0,0,da6762122e9027a78d524f6ee4cae5691172afa8889ba4ddcc1104b2ff0a8e3b,2025-04-28T13:15:09.927000 CVE-2024-26349,0,0,1bbbf3597c87b9929fc5eb4bb026f97edb7f2e0b4184399ebdf8842d543c4e8f,2025-03-25T17:00:12.093000 CVE-2024-2635,0,0,5fc435b0b5b40519e84566e07c1fce38fb260b472efb6bf37eb63fcc0934d662,2024-11-21T09:10:11.093000 CVE-2024-26350,0,0,aafbc8f10bb2284d20ad7acc10a6c83f87626d2b046e77e8585f67ff9e4808a2,2025-03-28T19:15:20.007000 @@ -255161,7 +255162,7 @@ CVE-2024-27712,0,0,39c268969bc18b1f885f38f09190df12ceb146b6e360b90342f96472616f2 CVE-2024-27713,0,0,b65152a8721dfc398af59bf6c393bf5fdd8d930eac7a2b15f4d417361b801ba6,2025-04-16T19:15:12.260000 CVE-2024-27715,0,0,588f0129d251c25a62c6758efd788f377fccf8c1d3855c585b3b6fa48c2014b3,2025-04-16T19:15:07.433000 CVE-2024-27716,0,0,4e33ff7b1a83f51fed4b80a3d94c6d3a9ee0c5bb94137c0b4ce8ff1d81d644a3,2024-11-21T09:04:56.483000 -CVE-2024-27717,0,0,2bfbcd1fda90d99c6d9799ec5f6ea4a1024e40e784a07aae7d197f311065a041,2024-11-21T09:04:56.707000 +CVE-2024-27717,0,1,7c5360378c1c098145273942daac7e3b2041c6891631d0b1d163bd0d3e72c1e7,2025-04-28T14:47:26.353000 CVE-2024-27718,0,0,6fd0ecf52683c3600c47787d4abfe093befe302da46880121fb7e6cebae4c848,2024-11-21T09:04:56.920000 CVE-2024-27719,0,0,341c9c74660e8da6c3b635ee840b9ff7db619da44f18728b3cc02c5bde0fae9d,2024-11-21T09:04:57.123000 CVE-2024-2772,0,0,02f750b020a1c0ddcf10a0cbf86dad19edb566b57ce2911796231437ddd08a75,2025-02-06T18:38:03.913000 @@ -261015,7 +261016,7 @@ CVE-2024-35527,0,0,d802d5954ff7f9b39a6b2dc0af26915bbf794a29707ccef9cebcfa3c1be1e CVE-2024-3553,0,0,685d6a9bec12f61a7106ff31505bbc229bf16d433649e9dec535a367c421d912,2025-01-15T18:36:47.993000 CVE-2024-35532,0,0,feed18e3e5768cea1f19bf7390d6eac06db80fa1667c8f051e007dd8daab0194,2025-01-08T15:15:17.793000 CVE-2024-35537,0,0,a64f8ae8ab86725040f9e1b6d109b67b42cd2d40678fcb31e32a5fa325e35c6c,2025-03-13T15:15:44.547000 -CVE-2024-35538,0,0,96eff6484fca11848a83b78627b6ae787a7804df3fd835a8374ef951bb6f2ad1,2024-08-20T15:44:20.567000 +CVE-2024-35538,0,1,f53475906dfdb17612612ecb2abd6bf10186d205bd4d089601d9c5c2b22789cf,2025-04-28T14:00:34.500000 CVE-2024-35539,0,0,97ada96f796dc4b3f1c0d706963a18d7205ef36dca04b0052b95398f16195ac9,2024-08-21T14:35:10.017000 CVE-2024-3554,0,0,b7f3e638ef3a822354fb7124a5277075531fad510bfdcd6faa19f3ac09434bf0,2024-11-21T09:29:51.930000 CVE-2024-35540,0,0,7617ec41b467bc5de8aa2d05744dbd4fc53e6d5d057c21556d6cac0d34e12490,2024-08-21T16:05:06.290000 @@ -263945,7 +263946,7 @@ CVE-2024-38897,0,0,b43024c8c4cd5005ae2c3ac6e382f0314f8925a2efba660eda76a12caae34 CVE-2024-3890,0,0,fce70548afac71463049803d99839c76f83c3f99644b737e71452f11bf39c15a,2025-01-07T18:13:29.557000 CVE-2024-38902,0,0,4f43d793db0c62321cf943185d9719a34e2b038e0d34991b7e0e1a885b3d56ec,2025-03-13T15:15:46.197000 CVE-2024-38903,0,0,5ac36a5d0829f2d9338553ce3926f23b23b26a430d990d436d81e63cebcf3b1a,2024-11-21T09:26:59.357000 -CVE-2024-38909,0,0,7a534ed14d1ecaec78a6d0eb2287c1e617529c12447aed6a1bc518a184ec1064,2025-03-14T19:15:46.707000 +CVE-2024-38909,0,1,e855d3e4bcc6debe8825dcac1f84960c0ea9fdd610320e92597c28f7d4585441,2025-04-28T14:35:52.783000 CVE-2024-3891,0,0,4d72bc4ea7906c74fa96e7962b045759b217e44e525621a88b5a5a6135790d8b,2025-01-07T18:11:13.230000 CVE-2024-38910,0,0,d2dff3af8a966f6c22ba1ee4e9572a11e68c5f4930901faf724b461844929ff4,2024-12-06T20:15:26.337000 CVE-2024-3892,0,0,d29e438e1d0c06b67fbb683ee1ad1805f7ecf63a0185dbf87e1e3c4e7505b0f6,2025-01-28T16:39:55.417000 @@ -263986,7 +263987,7 @@ CVE-2024-38991,0,0,40100092f65cabc0a38a9cd2fc9407a2ace7ce781b9a81c291e5aad2037b1 CVE-2024-38992,0,0,3fe46fe53ebbd61cbcbeb026b882a36c55f7df74d80bd73da297882e8a29fda8,2024-11-21T09:27:03.730000 CVE-2024-38993,0,0,172de65e7240c6a5f6bf645e694b0d2e344b70f8de661fa2be14422eb43b5e24,2024-11-21T09:27:03.943000 CVE-2024-38994,0,0,2a61e436904a48b4ded58b92d6bc8b107cabc4ea861dff38f3dcd8ff23c78c3a,2024-11-21T09:27:04.170000 -CVE-2024-38996,0,0,8fd4a7ef6b42b1a63cd868322179bb9481740ea02fd238379ee386c0fbf6a026,2024-11-21T09:27:04.387000 +CVE-2024-38996,0,1,3f9d786844732d7b8465ea56f6ffca091cbc25ebc4440147a358ddbf759f2b49,2025-04-28T14:37:52.810000 CVE-2024-38997,0,0,29421658f8acbee523241d363ca96c6a4d61054e874bc93ac98fb62157248214,2024-11-21T09:27:04.613000 CVE-2024-38998,0,0,1ddfa2c100a7af4725f52a46bac654024fff6a96a1ee34fbb54fd0ca70641bb2,2025-01-28T20:15:31.103000 CVE-2024-38999,0,0,7f217baaa25d7f40b740199108f4604ad2f09c6c0fdc981cabbaf727e9dace92,2024-11-21T09:27:05.063000 @@ -264881,7 +264882,7 @@ CVE-2024-40417,0,0,52920b59587ee59d8965c4a5b0b101605d7bbbf1f449f954819cec48760aa CVE-2024-4042,0,0,cecab8b1687d6be49a591036e1f884eeaaaac74f662dec1e0d521caf21f5dd55,2024-11-21T09:42:05.310000 CVE-2024-40420,0,0,2cc64060c56a9cd8ae43221cc949a39e78df1f9a724e5e5fe2d1f288499041f6,2024-12-18T20:15:22.773000 CVE-2024-40422,0,0,6808f4638a336c49c8bee4ab2c82ba14479baa38f197ca7d031042a0e1bcff02,2025-01-29T22:15:29.260000 -CVE-2024-40425,0,0,6aeac73ee2eae081e2470f06e1862d7c95ccca07478d222a6faa8bdbe87a2e48,2024-11-21T09:31:05.133000 +CVE-2024-40425,0,1,81a735aa760a40f04f27a92364bcdd5799b5ae544ac617e40c579d873b6adcfa,2025-04-28T14:46:31.877000 CVE-2024-40427,0,0,edb2ed6f04ab924988a6c43762419200f816f91f867e2f61b6ea78a526ec38ae,2025-01-08T19:15:31.043000 CVE-2024-4043,0,0,d4b5f95f306543d879cec12e990f7b6a12bdbc75a98caec12c24a6e719c63084,2024-11-21T09:42:05.460000 CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000 @@ -264896,8 +264897,8 @@ CVE-2024-40445,0,0,acf4cbc29ae92f9a56fdef6f118c1427fc2f07e0ad7c091d1b4352b9172a5 CVE-2024-40446,0,0,06e9b4334aa4360577a217b606b4c757a9efe0ad1ca34b90bc04789a404c59c4,2025-04-23T15:15:59.513000 CVE-2024-4045,0,0,f4ea98769850930c051ddc885b28524cc4af702b69cedf5723780c9f7bd76361,2024-11-21T09:42:05.710000 CVE-2024-40453,0,0,44028ded5df7ca69cdf493f195db9cc0d99fa7bb7b128c31936f66f8a0891140,2024-08-23T17:35:05.463000 -CVE-2024-40455,0,0,ebb560c70d34d188402c3c6b014cf93d1b00bcbb7dab920ce20724d469ccb1c5,2025-03-13T15:15:46.557000 -CVE-2024-40456,0,0,75e9cec6fc0fd65f300d988b660b459ac55c19cbe24788956c572edbb27e0987,2024-11-21T09:31:07.020000 +CVE-2024-40455,0,1,de7fbbe58f22122912bb4505b4fac34aed399683e93e39080dcf369a911444ce,2025-04-28T14:44:33.090000 +CVE-2024-40456,0,1,b282c3faed2b169890d7c393ead6de175fbbf60b11c5017118af2cac3eb0aed1,2025-04-28T14:43:04.063000 CVE-2024-40457,0,0,390d8a58e2d154cd9c58a3e4748ba4c5a47c1d045aaef6fb95193c7f046d0256,2024-10-31T20:15:05.173000 CVE-2024-4046,0,0,138bf9d15d808a387f1842c46e6552085e59aca18c14e013e3ba3c3747ce3bc9,2024-12-09T19:01:57.977000 CVE-2024-40464,0,0,24a2b11fcc0b71c0371d2caf323eabbeaed9510a92bc85a0da1ff652186f468c,2024-08-15T13:02:33 @@ -264912,11 +264913,11 @@ CVE-2024-40478,0,0,18f9d2601b45b0155659911e0ae2c29ee23e133c8cb47ee86400e795a0ae6 CVE-2024-40479,0,0,ed772cf67a46ac3c7e9bc9693937a7eef7702ab77b807ded4bc39bba120db634,2024-08-13T01:13:47.860000 CVE-2024-40480,0,0,2e13e61f572f387adfee6973f14487ab73725a0b4fc14a2193599bd0e9b21708,2025-03-14T16:15:33.230000 CVE-2024-40481,0,0,d82f9452819eeadc6328f6b92c8888f503a8260a868e9cfae3c7009725c43c4b,2024-08-15T13:58:16.033000 -CVE-2024-40482,0,0,266582d1863cb6f9cacd62450b573030e5accf0b5228135aa6d1f7c171d7bab5,2024-08-13T01:13:50.130000 +CVE-2024-40482,0,1,6a6efb225f2d1df9f4214be70a3ce35675a07dc191321a4d71af6b98e29aaf40,2025-04-28T14:32:00.203000 CVE-2024-40484,0,0,1b66c3eaa0e6379cfa70f895317e11d73e311cd0bc5454c518db9b1e0b2cd179,2024-08-15T13:59:35.813000 -CVE-2024-40486,0,0,d698075353303498a2db5d19141e90d62f8a7e4fb3f59884deee03e270025f14,2024-08-13T01:13:52.383000 -CVE-2024-40487,0,0,80f40b446727615aa7e23f0d132a3666dbc5775dc8a0bbcc5d383612b5712a97,2024-08-23T15:35:06.307000 -CVE-2024-40488,0,0,d28f79bf5316ea5f1cca14b30243cbda5679bfde1552dc26f219c697d2ef444e,2024-08-13T01:13:53.230000 +CVE-2024-40486,0,1,cde41397685b1b76952cb8ca4c533c5be95452075620945321445f9b77c4a148,2025-04-28T14:29:24.907000 +CVE-2024-40487,0,1,c1c444c493c45a57e2593b7c8ca9d88dc5ae2268819fae610a46ec7876ed6500,2025-04-28T14:28:51.710000 +CVE-2024-40488,0,1,ad22cf5d2ab3c9ffc78f1597bec32960e2b4fbdd5e0d003a7a7a0e08f406b162,2025-04-28T14:24:28.293000 CVE-2024-40490,0,0,dff45e8b937b0d43e514699f6678cc1eb9310868386eff11863fd2135561092a,2024-11-04T21:35:05.530000 CVE-2024-40492,0,0,15d7a965787ba65f0b0c3a9bed6ce34898e8762185902bff45ae0d0229ab4c68,2024-11-21T09:31:10.977000 CVE-2024-40493,0,0,d8cc68a495620dcb2d28bb34338d4bad4b040e899e98ffb2db4c475330153317,2024-10-25T17:01:22.433000 @@ -266769,11 +266770,11 @@ CVE-2024-42790,0,0,539360a9beda973ab08fb912d592087f677c6fb9a6fff6589cd7f5b776b9b CVE-2024-42791,0,0,02ed9b68cf0104e47b6bfe6d7010a50b9ef1323336267bf9e897fa9cd2d940d2,2024-08-26T19:35:30.910000 CVE-2024-42792,0,0,d46d80558cda01ef420339b2588d51cdd59e10dffb1a2c4145461835bf0c2904,2024-09-05T18:35:24.220000 CVE-2024-42793,0,0,c32fe29f81a44e565c3a5216abb9d035104b36adb22a5629ff920d51df01d239,2024-08-30T15:56:51.510000 -CVE-2024-42794,0,0,cb31f4d1d3a65655a7981910b73b7afb3f70bfecfb91294cb64754ea3d033a46,2024-09-20T12:31:20.110000 -CVE-2024-42795,0,0,dc95748e45ada2ed6217b8e00be53860a7a0b08b00faa6bbacb60135635b53bc,2024-09-20T12:31:20.110000 -CVE-2024-42796,0,0,519ab154d872fb06894f2be4372dfddd252381e87cf9c061dd6fa4e1b48c0873,2024-09-20T12:31:20.110000 +CVE-2024-42794,0,1,1388760710e98e4dd9825c92a0c1b25ba5d76a571c56cd23ab0c01d9cfa0bd60,2025-04-28T15:09:59.570000 +CVE-2024-42795,0,1,4b1825186993e94584d1caa74cd7c10ecb55f2957c94abd67a0e8bfcfe5a76c2,2025-04-28T15:08:25.213000 +CVE-2024-42796,0,1,f3013659b81b414b232c6879971f4ee4e0d060103a8264ca54b3014f1fe3f548,2025-04-28T14:56:46.983000 CVE-2024-42797,0,0,b0ffe521c0bda597641c9c63f096241cab44c6e592ff9c6671135d9a88355e07,2024-09-26T13:32:02.803000 -CVE-2024-42798,0,0,7641c62fd524e532def64c945e40bae6882a3bef91b1594b00330f3ffdf8d905,2024-09-20T12:31:20.110000 +CVE-2024-42798,0,1,b6a15ed14ab901d8f830c1c2ca39552d9c52c3ccb25a03c7d550c70943dff7af,2025-04-28T14:56:09.830000 CVE-2024-4280,0,0,b3797ff2151727941d9c366b289b5d3e0b88350afb872404e2bdcfe0d7122163,2024-11-21T09:42:32.167000 CVE-2024-4281,0,0,61e5371b0a3255e76472e43eacd6c1c0207d9397155487a12c704d61028dcc77,2025-02-03T18:53:40.487000 CVE-2024-42812,0,0,163e07a54ddac84e7821d0efc800bc7e7d10ae1d47903174af8c3b5ac8976f4b,2025-03-17T16:15:22.480000 @@ -266866,8 +266867,8 @@ CVE-2024-42988,0,0,5fef959cbc78ebe08189d85f59ac43355192595ed5bb119fd152c126c45c0 CVE-2024-4299,0,0,06ff6656c614a1eb297948d61726a31acef16b15b4f4cc0e0cfb9d02f54c7a70,2024-11-21T09:42:34.330000 CVE-2024-42991,0,0,8c4440572b8c1b15f9e28e1fd419725aea046bc3d3f09f5e12a0e76f85c0bdaf,2024-09-03T19:40:46.783000 CVE-2024-42992,0,0,922ec86108ffde155b16bab8bce05d736126b3c84831d9a4ac12e72887280de3,2024-08-26T15:15:08.593000 -CVE-2024-42994,0,0,47a47d7a4496fbb4be0c8919660a2bc390f162500de5ed0c546e02d118a1f1d5,2024-08-19T13:00:23.117000 -CVE-2024-42995,0,0,73928fa11894c7bb88c7b00b60cb9e97c2f3d2eacbbb9d748c7e65dceed81641,2024-08-19T13:00:23.117000 +CVE-2024-42994,0,1,9d999392425042623e15f7faa35559c12373567a5bd93ad11d5f5b767f6d9226,2025-04-28T14:10:13.853000 +CVE-2024-42995,0,1,68c4e42f2f1f42bc08e5e10ffbd4b4428bbbaf157c94fda70fbf4af56c25082e,2025-04-28T14:09:10.273000 CVE-2024-4300,0,0,91c6796b7b00ac208d0ef970c233086a0adcf2f87abd1ccbd0345b3366886d09,2024-11-21T09:42:34.457000 CVE-2024-43005,0,0,90be3bacc36bee38568ac0616e5a259a15f0b18f629aac335dac5a60c517ea07,2025-04-21T14:59:47.323000 CVE-2024-43006,0,0,6f99e55991478cb76d4ae41fc977e7ae067e6c2daf2293b36eecaf1e69677bdf,2025-04-21T14:59:34.717000 @@ -268192,12 +268193,12 @@ CVE-2024-4456,0,0,9e256113ce6b5f434b1029225d9b7c490634452bbac2479c1f026431fd87fe CVE-2024-44563,0,0,5199f8441754771b5dda361a721b2fbc485484332750808462a845349142050c,2024-08-27T13:43:26.300000 CVE-2024-44565,0,0,704a4a34e28ec3aed8b7d29891a7e7fd22dbe7a4261cd86983a70f86adbf6dad,2024-08-27T13:43:46.897000 CVE-2024-44570,0,0,c3f413693b0a67d171f5237e75f3598ab991dbf250c04c0e42a3fd54e1bea849,2024-09-12T12:35:54.013000 -CVE-2024-44571,0,0,a9c13e11ec32d25cabe568516bc80bba8663f3b06e2d2dc5f53fcc749d66a0fc,2024-09-12T12:35:54.013000 -CVE-2024-44572,0,0,4a32f91d55e111790347c15e6c383a7d7bcdb78371e1cc25bcba1170473f2ab0,2024-09-12T12:35:54.013000 -CVE-2024-44573,0,0,2f0de06f30df5693ea0832bd1477898fe876fe09e8b1c397168545c7d90f980c,2024-11-01T19:35:27.177000 -CVE-2024-44574,0,0,0ac30f53a8403481d3e53068e545f9d6b0d9848f97ca5145343590384ace9338,2024-09-12T12:35:54.013000 -CVE-2024-44575,0,0,a2dfcd30da86654b1601cf89030c855e53ba6b1465846e0f94ea255214477420,2024-11-25T18:15:12.667000 -CVE-2024-44577,0,0,86ef7b12524494f408d6e73b8d9a0cc3a595a4f00b0e6d5c87753c9c6567cbb6,2024-09-12T12:35:54.013000 +CVE-2024-44571,0,1,2c40131898ec7a9c56a91e7756c62636f116dc6e5677a39ddcbe54a5c651cbea,2025-04-28T15:22:14.460000 +CVE-2024-44572,0,1,4f4ead38e06948d091f8d1e12c653b9f93f098030647a6be11450d4901ec7d86,2025-04-28T15:20:25.193000 +CVE-2024-44573,0,1,cc255c259019816f3146a3ebd697d11943657aabe2dbb9f6bc11d051c40e07f3,2025-04-28T15:18:27.100000 +CVE-2024-44574,0,1,250840f6a5b68f0596aadb312c28af191e71501ff153313f8404b9b56d3dcb80,2025-04-28T15:16:15.657000 +CVE-2024-44575,0,1,2fdb4523fb93480e17a81cb2289c26fd5b8fb4bd885808938c0dc8387a7e0173,2025-04-28T15:14:44.490000 +CVE-2024-44577,0,1,012cd3687489f6b683572bfff38cebfa29461ab1df5e35223241e335c2144a6f,2025-04-28T15:13:42.720000 CVE-2024-4458,0,0,d181cdfe1239b7370e0229e24ced49e59c93df8ded36a14106b44f2e538fe3b1,2024-11-21T09:42:52.170000 CVE-2024-44587,0,0,a5e1f3ebd4d6bf6589458feb9c709eaa46f4397db0fc7239eceb5c9b4e9301cb,2024-09-05T17:44:56.007000 CVE-2024-44589,0,0,efe6dd10612c3f4023c557d137bbb3d918a6e4892340cf75c11b9c76638fa63e,2024-09-20T12:30:17.483000 @@ -279887,7 +279888,7 @@ CVE-2024-8368,0,0,cbd58d02608421226ccc3e5ed1266e5c25af06684456963a09ab875beeb4b4 CVE-2024-8369,0,0,a6d05ac94fd162bcee8803884a010b60435524cf6e0d9e13d056a1897ad22b6c,2024-09-26T15:43:20.720000 CVE-2024-8370,0,0,6ff247f0498c9a9b7066f4ad89c0a9d54e8c78b0a7b7e46d47dc3aa51aeb81d2,2024-09-03T14:15:17.787000 CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000 -CVE-2024-8372,0,0,44c699b1f3a3e29a193bc9101ff8d192db8f9758ab2c51fe9fafb4abd6243d71,2025-02-12T20:14:39.330000 +CVE-2024-8372,0,1,712ae3556095fe97ae3ecc479945a9ea4cf01b8730ea7b80d21ea609bf958a8e,2025-04-28T14:15:20.107000 CVE-2024-8373,0,0,11487d08657f4ba3b88ea7448ca7eeca5854e7d9e363edc87b0e7b98253dceda,2025-02-12T20:15:05.360000 CVE-2024-8374,0,0,ca02cb1d8f9493301326b3f2ebcbf769706c4933bc89729cb22baf7e425cf724,2024-09-16T16:44:42.403000 CVE-2024-8375,0,0,6d034a249584f3f3249aac9575cef27d1b8e645fd1ceb9646e6f860db02d62b5,2024-09-20T12:30:17.483000 @@ -284959,6 +284960,9 @@ CVE-2025-23368,0,0,3fba7751170fbf245919938130180b8631c2c01153566e23c5e60aa4599df CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000 CVE-2025-2337,0,0,7d9e5607ad2b02dfc242a3305f849e66226e5392d822e3a7a605b0e9bacb542e,2025-03-17T15:15:44.983000 CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000 +CVE-2025-23375,1,1,60a30d666f924aa2a1fbd0b350cf2ba4f1fb00c61bf50d7a92b2da19469c598f,2025-04-28T15:15:45.157000 +CVE-2025-23376,1,1,99e3f948ddf7a678d5b136c1473e9784a345dad6cf941a73ebe22baa711ae193,2025-04-28T15:15:45.303000 +CVE-2025-23377,1,1,c7548c88f400297aaf76213175c31e191929777001aa7062816fa34d035e2829,2025-04-28T15:15:45.437000 CVE-2025-23378,0,0,7d1f583ba2fbd4a87629a0c6e9b1a82753dab9032ddd798f8461f250af5dc576,2025-04-11T15:40:10.277000 CVE-2025-2338,0,0,d6a145ee9d99f0b331d4e327057f954207c4362f81df3d1dbf4d76a1b480aa57,2025-03-17T15:15:45.113000 CVE-2025-23382,0,0,22d0333b6ebd7b3c598a3add3cb34bf6adf53ccfd12bc4731614dfff20d58612,2025-03-19T16:15:30.787000 @@ -286784,6 +286788,7 @@ CVE-2025-25770,0,0,97e9cbcf9f5eb368db8f03cd6097bc99f8f3fab4a945a4e034edb2a9ce72d CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000 CVE-2025-25774,0,0,217aaab1390f6b1eba60d1bc1ee5dcd1167d8b5507491fd4cc7d4a7ca3945256,2025-03-12T19:15:39.777000 CVE-2025-25775,0,0,5544670cc9a7add259c6e5cbf53cd850470977944146ac06f99bc3b124b05057,2025-04-25T18:15:25.937000 +CVE-2025-25776,1,1,569bad96221a4fb7f5d7ff11127e82bd4d257fb2f6a6b6e71240b92b84243bf0,2025-04-28T15:15:45.587000 CVE-2025-25777,0,0,45f8b3c1c1f9d7109212dde9ce59be38e9992e6e24b2477c4857a0d7ca8e285e,2025-04-25T17:15:18.143000 CVE-2025-2578,0,0,d4dee3e12d3294c1c6910c7eef7307144aa2b73a2adfa63b47bbc637e9cbd042,2025-03-28T18:11:40.180000 CVE-2025-25783,0,0,6329df69fd0a54ba6d0f31849a17600b168da9709376108915818dc3764ea037,2025-04-07T19:11:53.150000 @@ -290315,7 +290320,7 @@ CVE-2025-32464,0,0,d585900889b901117e0fe728cc5e64b12123c28db643e71ecaab58b676037 CVE-2025-3247,0,0,de417f93083f53a095a331b7f7a4a52b9b1338fe061d7ed48128d633e68ff031,2025-04-16T13:25:37.340000 CVE-2025-32470,0,0,7dbeb6b6cb094fd7f696e62a410c872fc392f11a7c72598439cf161f2bb1ead2,2025-04-28T09:15:20.643000 CVE-2025-32471,0,0,d22d1b90bf02f3583666588af972e5f20ef3a20c8b44c857c2696eed80c41065,2025-04-28T09:15:21.263000 -CVE-2025-32472,1,1,fce3c184bf175e1d727111b51d6fafe6a64818eddd51d33f1f21b4c8d2601bd8,2025-04-28T13:15:23.053000 +CVE-2025-32472,0,0,fce3c184bf175e1d727111b51d6fafe6a64818eddd51d33f1f21b4c8d2601bd8,2025-04-28T13:15:23.053000 CVE-2025-32475,0,0,cf74498a36221a51f220d05d078ed063eee4c8ce48d68258cae808bc296530bd,2025-04-17T20:21:48.243000 CVE-2025-32476,0,0,9d54d65167184e122be5c3a790d5ad19d5abaa6b052713e592bcb27d26085427,2025-04-09T20:02:41.860000 CVE-2025-32477,0,0,6aaeb344af7fac729d48ed1cd0817d6c11c34e76428c0bd5b074c3df21934506,2025-04-09T20:02:41.860000 @@ -291259,18 +291264,18 @@ CVE-2025-39596,0,0,e173976a1c0999b01b788ac1a4c5ae24f6505527b92ae9fe5f45ca8a72d79 CVE-2025-39597,0,0,b362997db93d9bfea0d7af44af4fd221eb0b25a2a82395ff55df61546df84055,2025-04-16T13:25:37.340000 CVE-2025-39598,0,0,73d622048aeed09278774e13f22cb598b1a5cb08b2f1dd7ec3313a376059ffea,2025-04-16T13:25:37.340000 CVE-2025-39599,0,0,091138247dcd1675bb93a1a469c4c7e89efe9b80c6a9739e4d163c5f536db88d,2025-04-16T13:25:37.340000 -CVE-2025-3960,0,0,0a205fc71590454f80109f0a1ee8ee5a9fa54132db4db7c45917814b38948f8d,2025-04-27T06:15:14.870000 +CVE-2025-3960,0,1,9677322420fe33e07dfc504ad7254ea1d626cb41f3d5bf0542d2405976ebbf7a,2025-04-28T15:15:45.817000 CVE-2025-39600,0,0,71f55bfcced2bb7d7f35d4ab207853635aec1cc4573a3ee9f10ef122db1f0de7,2025-04-16T13:25:37.340000 CVE-2025-39601,0,0,4f2eb6f0c2c624c12002346e13c479a2ea3b462ff0c42b3b14b9783c236c648a,2025-04-16T13:25:37.340000 CVE-2025-39602,0,0,372857ab0b3fa589d5d3849a523521babea3aee49aea0f2c09c05c2852655522,2025-04-16T13:25:37.340000 -CVE-2025-3961,0,0,45a7ac44f384c30e3fbb9f668e36f375f4d1331a1daa19419d9d2a8c22592190,2025-04-27T07:15:15.307000 -CVE-2025-3962,0,0,346464949fea6dd25a02f68fe26d10089c971b819db5bc3379dd490e49dc640e,2025-04-27T07:15:15.580000 -CVE-2025-3963,0,0,08e91f8172cd60fb1f81af6801be8a8df69f0b804a3726797c783fc055a1c6e2,2025-04-27T08:15:14.353000 +CVE-2025-3961,0,1,4bac8fa6ffd06eead33e6e370e63a9d828b21c8d9f02a9990e5d2f449b575654,2025-04-28T15:15:45.943000 +CVE-2025-3962,0,1,509120d034512bf7590ee71a042f7320fc22247348ecd1057a0702893aabd58a,2025-04-28T15:15:46.060000 +CVE-2025-3963,0,1,71c436a30c3b10d07aaef3ba1920b96268b7af99010ea47f98671a9f77ec2757,2025-04-28T15:15:46.180000 CVE-2025-3964,0,0,b21fb1af90e49351c094d0c93db5350a4a1ed4c9c3c93e6bf7307e295306726c,2025-04-27T09:15:15.540000 CVE-2025-3965,0,0,a17d5bd0b47e8064ef7c9d5e1993630e1dc56ecc7264405e35a73c3f20bfee4c,2025-04-27T10:15:14.627000 -CVE-2025-3966,0,0,ec73bdd3843a77f5bf4f961981167ab50a0b1b584f442db8a5830f6f3af37085,2025-04-27T10:15:15.717000 -CVE-2025-3967,0,0,a757485c83f7ad3ae23444f7f56db24945a9a40f1e3d1780685fe14f9596cb56,2025-04-27T11:15:16.743000 -CVE-2025-3968,0,0,ae59d296b5fd013d095aff5042674e9e502e1410c13e6a6da34c3026db0e7c21,2025-04-27T11:15:16.950000 +CVE-2025-3966,0,1,1d09051196710df394b8716799ff77adb1274f7749209046c5ec89183797b557,2025-04-28T15:15:46.290000 +CVE-2025-3967,0,1,375e3af67e01a929adfbae270af5ba8b0cc708d97363f459d8438dd196930c84,2025-04-28T15:15:46.410000 +CVE-2025-3968,0,1,9a203e8ad808a1fd51353ba4c2b2977bd9e3577749fb00ee64ccbcdb0f779556,2025-04-28T15:15:46.527000 CVE-2025-39688,0,0,98c7c61fe32c2ce6358a9d7ef0df54915bb47bee498593264d8ad933fcce6211,2025-04-21T14:23:45.950000 CVE-2025-3969,0,0,e13cfaa079ae5e2ea512c3bd056969d8efef50ef70aac260842aa3e5c549567b,2025-04-27T12:15:14.077000 CVE-2025-3970,0,0,7dfe31de7823dca76a8f72ec4f37c8d851a494db013815863a946195bede5d97,2025-04-27T13:15:14.550000 @@ -291278,17 +291283,17 @@ CVE-2025-3971,0,0,b6a0911b8d8d327777a5907887cb538046833daa6c5cee410dad7fc2d8c291 CVE-2025-3972,0,0,575245ec139ee05243662ecc4693f08b08894c5030048b9cb53fdb6e9c2ce858,2025-04-27T14:15:16.240000 CVE-2025-39728,0,0,1aabeb48c74961651a085e70675ac1fbb7850a26c8e3690479606fce3eed8d57,2025-04-21T14:23:45.950000 CVE-2025-3973,0,0,7185a71a7968bab05d8a7ab2de6648dc249e6a8df96171e643478fc72e2bd846,2025-04-27T15:15:15.577000 -CVE-2025-39735,0,0,685f7725750b068bcf70f45c9b43584f95555d2cf42375499465209022c1892a,2025-04-21T14:23:45.950000 +CVE-2025-39735,0,1,96f9db3a9cd8ed512fd20eb50b496781a9c7b7582664dceb1a9693b9f654ce9e,2025-04-28T14:37:34.487000 CVE-2025-3974,0,0,cc88a5551cfeb7a6ea2c180ac6862f1a69f07ceda7e1534a180ace6214ee67cb,2025-04-27T15:15:15.750000 -CVE-2025-3975,0,0,ccd2090e0033c3182f35c42461c91b7420600b4065a04085380e97e54751f7a5,2025-04-27T16:15:15.260000 -CVE-2025-39755,0,0,1f38e61cb827ac50879084bd3bf4c59efb9767371f960520c29d85a66c57d533,2025-04-21T14:23:45.950000 +CVE-2025-3975,0,1,62bf110e98456b96adbb0e1d79c9b53117e1bf71d76b6104b5a677fa2f81ce42,2025-04-28T15:15:46.760000 +CVE-2025-39755,0,1,9592dfcb27feea4aabb5a7ba0dc0c6514650aa209fd5fe2f3ededbb735ed12fd,2025-04-28T15:32:46.553000 CVE-2025-3976,0,0,13905d0f00709e6872151e7ad1b1a6c91b55e9419f2a701304870aa7e8e601fd,2025-04-27T16:15:15.433000 -CVE-2025-3977,0,0,5e645294bea4f955dbd0c8bfe2e4d659f8a6cbaeaef4d07a6abec039717e4035,2025-04-27T17:15:15.853000 -CVE-2025-39778,0,0,fe7c9bb969991c6f8bd7e817623bae52cecda002e042590bfe971c7c81dc9221,2025-04-21T14:23:45.950000 -CVE-2025-3978,0,0,2ae726000475a1877b6d2b2bc2bce0aefd6ddc7a5b797a2eec055d71b6e4c1a9,2025-04-27T17:15:16.030000 -CVE-2025-3979,0,0,f4d2791ebc027f4f4851dce9ea15411bb525aa09eceed7cb069e5ffd2cf0f1ab,2025-04-27T18:15:16.020000 -CVE-2025-3980,0,0,c60e8fd71f58158175a8f0778b502b82e82edff0ca359aaa3a416b667c30a069,2025-04-27T18:15:16.237000 -CVE-2025-3981,0,0,e00538d9c56dd754fe25e8b3e5c7f162e04e282f768ed8abdbece459893339eb,2025-04-27T19:15:15.750000 +CVE-2025-3977,0,1,c1e50e78d343274621129f20445321598604c72f47885898eb78406f21e52a8a,2025-04-28T14:15:21.520000 +CVE-2025-39778,0,1,fc2e9a1fb637bb73885f33b2d5ce93fc454f2a441f142db493ef48df409e1554,2025-04-28T15:37:34.230000 +CVE-2025-3978,0,1,bc92ce55af996f6b405f8d8b6d897abb53d44677d7371d599fe1529394f5a206,2025-04-28T14:15:21.640000 +CVE-2025-3979,0,1,3eed181a4a18815f5d24e2e7c49bc0dfd20618c1736a3e4c48366a678e45673f,2025-04-28T14:15:21.767000 +CVE-2025-3980,0,1,ba3e464d7879015ce3f1e955f56f48a0c9c49dc48a63db59cfbd3db7bbe9d790,2025-04-28T14:15:21.890000 +CVE-2025-3981,0,1,a9636669d8d4cb9261149c2b06c3c7be44e8490c89b8b9be4fb90813c912214f,2025-04-28T14:15:22.013000 CVE-2025-3982,0,0,4f8f549d1d80deb736d2fa8a9bf8c95ff99706664721ec9ea5e797ffff0b5328,2025-04-27T19:15:15.923000 CVE-2025-3983,0,0,25cef30fdb4fe10ba7219695edb63044f6f8ab36f7472ef6a7410a1f5e2146f4,2025-04-27T20:15:15.350000 CVE-2025-3984,0,0,c91dac686fb472be23da0ee0c6a53588be8c31d73e3e88b2f873b4f69af09b70,2025-04-27T20:15:15.537000 @@ -291326,10 +291331,14 @@ CVE-2025-4014,0,0,f259da298f4f8af0d94e8db357ade1efd3596c515c364d9d5ad548177efecd CVE-2025-4015,0,0,232ad8d07784c7f62ca3c92d0470dbab847354aba047abbda5ccbbb5a53b9ce5,2025-04-28T10:15:17.057000 CVE-2025-4016,0,0,16f701a218e4c9c52d5777c88e9d05fa414760ac751896fa6c1b284b8a014d10,2025-04-28T11:15:38.657000 CVE-2025-4017,0,0,9f05b4a2eb6e84cc88a7e99ef8ccfa2b8d02b26e170cf3daf0c31a72832baaaa,2025-04-28T11:15:38.847000 -CVE-2025-4018,1,1,b12b51cf30fc2db7d195c2c9ee830ba57f48502213630f4d9ad39d9d3bfacbe7,2025-04-28T12:15:31.913000 -CVE-2025-4019,1,1,026f93b3c776aee8c544c5f460bdd25f6379836f2a5d55dda570425a7ee6b846,2025-04-28T12:15:32.093000 -CVE-2025-4020,1,1,511fd7ea80791808b10d31addcf8c936b71df14f2c24338c3857d1e24f7e838a,2025-04-28T13:15:24.603000 -CVE-2025-4021,1,1,c6b32e73983711a929174c81d1269e862674efafae7a66852d16c04025876af8,2025-04-28T13:15:24.773000 +CVE-2025-4018,0,0,b12b51cf30fc2db7d195c2c9ee830ba57f48502213630f4d9ad39d9d3bfacbe7,2025-04-28T12:15:31.913000 +CVE-2025-4019,0,0,026f93b3c776aee8c544c5f460bdd25f6379836f2a5d55dda570425a7ee6b846,2025-04-28T12:15:32.093000 +CVE-2025-4020,0,0,511fd7ea80791808b10d31addcf8c936b71df14f2c24338c3857d1e24f7e838a,2025-04-28T13:15:24.603000 +CVE-2025-4021,0,0,c6b32e73983711a929174c81d1269e862674efafae7a66852d16c04025876af8,2025-04-28T13:15:24.773000 +CVE-2025-4022,1,1,a011d38395c9e900e4bcada9858b098f8d7441fd9b3e763ec79c0a9945d82071,2025-04-28T14:15:22.867000 +CVE-2025-4023,1,1,85c9398c80f20a209b25f610ddf665ce3506d1e4fe920218361ca91662c22eb5,2025-04-28T14:15:23.043000 +CVE-2025-4024,1,1,0ac57cf9887f802b63cc7c5701c4d82c5287aedf4b9f1ab63ff42a695cbedb85,2025-04-28T15:15:47.600000 +CVE-2025-4025,1,1,1b1b49f00b16e2bf6d2e9a008bc6dc606c5611760e84fe2041b0af8493c82b9a,2025-04-28T15:15:47.767000 CVE-2025-40325,0,0,21d661e5b65e79dd3cd00a7c9db2e14d6a6a65a1394969a7ad07f16fa08c79ce,2025-04-21T14:23:45.950000 CVE-2025-40364,0,0,e1468b00bb22572a62ec1b141065bed37efcb85f9368d87c29b0ce5bc57ec67c,2025-04-21T14:23:45.950000 CVE-2025-41395,0,0,c0d9bccd77abd47bebe5c3b7233aa41647dd331b6362659738a8c7fec7081455,2025-04-24T07:15:31.600000 @@ -291374,9 +291383,9 @@ CVE-2025-43903,0,0,00b37505e4bad1c011979aeeb7ac0f46d600f0a3a2ddd582ccd8bfed7356e CVE-2025-43916,0,0,681d8be38d92746749b1aa52bc81a99ae8dcb7d5c6c1be22a9ecf0d141bf9654,2025-04-21T14:23:45.950000 CVE-2025-43917,0,0,6cbc8a0cc4b5f4a260ea1bcaa2e61bc873dc43de357e9552c071e8ec2a49bca5,2025-04-21T14:23:45.950000 CVE-2025-43918,0,0,c6804f12f91fd2a33114034d2a7e21d55151c0cf36b011a784bd1cc327d47c14,2025-04-21T14:23:45.950000 -CVE-2025-43919,0,0,55ad852a78495f6e218472fc33e0acbc71b7ed92ab828e832d69c95ea803d68c,2025-04-24T16:22:37.117000 -CVE-2025-43920,0,0,05b3e4c1a5c3a0593ddd3faa440158c8a71103e88ab91b374b9c65df4142c52d,2025-04-24T16:20:36.953000 -CVE-2025-43921,0,0,860aba6699eab477405736f86cb620ec9a60d3be813cd4186e40b0b2a10867ed,2025-04-24T16:16:59.597000 +CVE-2025-43919,0,1,755abcb8d09616a195e9d6af1306163e6a8ac43b52edd282a6c37eaf3c4a6f2b,2025-04-28T14:15:22.137000 +CVE-2025-43920,0,1,a93ea085d5c9b285842c20a6cabb6e3bd669bd42c39c42462b7c06195a41f1d6,2025-04-28T14:15:22.323000 +CVE-2025-43921,0,1,4042bcd81d7e3864da5b8ba4d01fe494ca12b33f201fc6021c6725eb890091e8,2025-04-28T14:15:22.477000 CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000 CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000 CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000 @@ -291452,7 +291461,7 @@ CVE-2025-46272,0,0,6723f88845cee1e1cbb0cc8f1bfd044966d04b97767ef53e121be0034a68b CVE-2025-46273,0,0,d17f1c243c8f331f47f487cb9b89ff51d5b9a1113a60ac7af8fce23396651144,2025-04-24T23:15:15.673000 CVE-2025-46274,0,0,6278bbb431335706a41e3628a533ceb0ce48f92d57ea7b392bf579f553e8b8c6,2025-04-24T23:15:15.827000 CVE-2025-46275,0,0,a7109528e796df3e754eeba6ee8017193e4e96b7dbaf347dc967b55909d9e9a5,2025-04-24T23:15:15.977000 -CVE-2025-46333,0,0,4717c7f4cce97ab4f0a603aa816c1dd9bf72647fab1bd9590976420890c69a90,2025-04-25T21:15:39.577000 +CVE-2025-46333,0,1,3f604e4ec484052a98804d8813a23cfbac08509ef9dc35db23d61edbd2f31482,2025-04-28T15:15:47.057000 CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000 CVE-2025-46375,0,0,c7cadd24d0c0ef6263c2e4f0e993c1b14e1cbac838119ad2f4f42dcfb3b1b113,2025-04-24T03:15:15.867000 CVE-2025-46376,0,0,4a4eb88dda9426fffae031e9cc4c1cb39c01ffb8fef76394b4584f59d8624ab6,2025-04-24T03:15:15.917000 @@ -291577,7 +291586,7 @@ CVE-2025-46654,0,0,572c4d63fa2f8afca64ec12e1381813d160fa2c2ee84d4e0448e47cdcd412 CVE-2025-46655,0,0,a9f672e75f586721e3ec47d88a24167a5da40f45a10ccbe0303bfb6061c72944,2025-04-26T21:15:15.260000 CVE-2025-46656,0,0,696b18d293f3e47530d9a462ec4dcce6fe7c7473fa83e2a90e8336464b46aa30,2025-04-26T22:15:17.260000 CVE-2025-46657,0,0,61b5714a3945d18f5b1028d9d01f06343b4f515928a414fd8f4acc9db2248fff,2025-04-27T17:15:16.193000 -CVE-2025-46661,1,1,1b88a1421b991af9f83e00012e017bc52e3d2608548a1f64585fab31eb98f621,2025-04-28T13:15:24.117000 +CVE-2025-46661,0,1,2337e0af0721676a9a8551219ea6d6cbd8b1bdbec9e22e2c7f7acea8c59de4a9,2025-04-28T14:15:22.637000 CVE-2025-46672,0,0,a515f04f2684525b908fbd5bf52c62317ae3f104cec7ce6d3fbe0f544f2f50f4,2025-04-27T01:15:44.327000 CVE-2025-46673,0,0,b4b185c7af04fb38cea193788026d34ee5cbd860f38177d871857854e4306632,2025-04-27T01:15:44.477000 CVE-2025-46674,0,0,46444152edd713c1307e6ccc5d1033b322cbe1d07cb6f10dea38fc2301d3d28e,2025-04-27T01:15:44.623000