Auto-Update: 2025-04-28T16:00:20.643077+00:00

This commit is contained in:
cad-safe-bot 2025-04-28 16:03:54 +00:00
parent e7618c3201
commit 7e4b7aa9ce
59 changed files with 2396 additions and 262 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2015-2079",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-28T15:15:44.007",
"lastModified": "2025-04-28T15:15:44.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Usermin 0.980 through 1.x before 1.660 allows uconfig_save.cgi sig_file_free remote code execution because it uses the two argument (not three argument) form of Perl open."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-96"
}
]
}
],
"references": [
{
"url": "https://code-white.com/blog/2015-05-cve-2015-2079-rce-usermin/",
"source": "cve@mitre.org"
},
{
"url": "https://code-white.com/public-vulnerability-list/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23740",
"sourceIdentifier": "product-cna@github.com",
"published": "2022-11-23T18:15:11.130",
"lastModified": "2024-11-21T06:49:12.987",
"lastModified": "2025-04-28T15:15:44.577",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45422",
"sourceIdentifier": "product.security@lge.com",
"published": "2022-11-21T17:15:30.857",
"lastModified": "2024-11-21T07:29:13.907",
"lastModified": "2025-04-28T15:15:44.910",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25837",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-16T18:15:08.907",
"lastModified": "2024-10-30T15:35:08.810",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:06:50.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/RatMD/bloghub-plugin/blob/master/CHANGELOG.md#version-139---stable",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.getastra.com/blog/vulnerability/stored-xss-vulnerability-in-bloghub-plugin/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.3.8",
"matchCriteriaId": "94235FE2-576B-4EDB-B53C-F087DE499A6A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/RatMD/bloghub-plugin/blob/master/CHANGELOG.md#version-139---stable",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.getastra.com/blog/vulnerability/stored-xss-vulnerability-in-bloghub-plugin/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27717",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-05T17:15:11.423",
"lastModified": "2024-11-21T09:04:56.707",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:47:26.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27717-cross-site-request-forgery-csrf-in-eskooly-web-product-less-than-v3.0",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27717-cross-site-request-forgery-csrf-in-eskooly-web-product-less-than-v3.0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eskooly:eskooly:*:*:*:*:-:-:*:*",
"versionEndIncluding": "3.0",
"matchCriteriaId": "DFA23144-8E06-4F22-AE7F-2A3D06F2C4CD"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27717-cross-site-request-forgery-csrf-in-eskooly-web-product-less-than-v3.0",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27717-cross-site-request-forgery-csrf-in-eskooly-web-product-less-than-v3.0",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35538",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-19T21:15:09.850",
"lastModified": "2024-08-20T15:44:20.567",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:00:34.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -55,14 +55,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://typecho.org",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typecho:typecho:1.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "95BE475D-DE29-4126-ABF3-FC9BB0382419"
}
]
}
]
}
],
"references": [
{
"url": "https://cyberaz0r.info/2024/08/typecho-multiple-vulnerabilities/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"Release Notes"
]
},
{
"url": "https://typecho.org",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38909",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-30T14:15:02.897",
"lastModified": "2025-03-14T19:15:46.707",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:35:52.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,22 +61,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://elfinder.com",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/B0D0B0P0T/CVE/blob/main/CVE-2024-38909",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "http://elfinder.com",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/B0D0B0P0T/CVE/blob/main/CVE-2024-38909",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:std42:elfinder:2.1.64:*:*:*:*:*:*:*",
"matchCriteriaId": "6C76D05F-90D4-4EF5-B048-D517C949E461"
}
]
}
]
}
],
"references": [
{
"url": "http://elfinder.com",
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
},
{
"url": "https://github.com/B0D0B0P0T/CVE/blob/main/CVE-2024-38909",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://elfinder.com",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://github.com/B0D0B0P0T/CVE/blob/main/CVE-2024-38909",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38996",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-01T13:15:05.103",
"lastModified": "2024-11-21T09:27:04.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-28T14:37:52.810",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,30 +51,72 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://gist.github.com/mestrtee/c1590660750744f25e86ba1bf240844b",
"source": "cve@mitre.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "https://gist.github.com/mestrtee/f8037d492dab0d77bca719e05d31c08b",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://gist.github.com/mestrtee/c1590660750744f25e86ba1bf240844b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://gist.github.com/mestrtee/f8037d492dab0d77bca719e05d31c08b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:ag-grid:ag-grid:*:*:*:*:*:*:*:*",
"versionEndExcluding": "31.3.4",
"matchCriteriaId": "4DC27DDE-3069-432F-9A7B-EB5F7957EE78"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/mestrtee/c1590660750744f25e86ba1bf240844b",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/mestrtee/f8037d492dab0d77bca719e05d31c08b",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/mestrtee/18e8c27f3a6376e7cf082cfe1ca766fa",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/mestrtee/c1590660750744f25e86ba1bf240844b",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/mestrtee/f8037d492dab0d77bca719e05d31c08b",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40425",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-16T18:15:08.433",
"lastModified": "2024-11-21T09:31:05.133",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:46:31.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gist.github.com/J1rrY-learn/26524d4714a81cf2d64583069e96f765",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://gist.github.com/J1rrY-learn/26524d4714a81cf2d64583069e96f765",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sparkshop:sparkshop:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.7",
"matchCriteriaId": "7B591554-F401-4A89-8DA6-1425B7D63B13"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/J1rrY-learn/26524d4714a81cf2d64583069e96f765",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://gist.github.com/J1rrY-learn/26524d4714a81cf2d64583069e96f765",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40455",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-16T20:15:03.587",
"lastModified": "2025-03-13T15:15:46.557",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:44:33.090",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://gold-textbook-8ff.notion.site/ThinkSAAS-Arbitrary-folder-deletion-vulnerability-f992ed6124bc46ccaa8c2982274b17e2?pvs=25",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://gold-textbook-8ff.notion.site/ThinkSAAS-Arbitrary-folder-deletion-vulnerability-f992ed6124bc46ccaa8c2982274b17e2?pvs=25",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thinksaas:thinksaas:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "4886BF91-72D0-4758-A534-20C33E4219A8"
}
]
}
]
}
],
"references": [
{
"url": "https://gold-textbook-8ff.notion.site/ThinkSAAS-Arbitrary-folder-deletion-vulnerability-f992ed6124bc46ccaa8c2982274b17e2?pvs=25",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://gold-textbook-8ff.notion.site/ThinkSAAS-Arbitrary-folder-deletion-vulnerability-f992ed6124bc46ccaa8c2982274b17e2?pvs=25",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40456",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-16T20:15:03.687",
"lastModified": "2024-11-21T09:31:07.020",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:43:04.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thinksaas:thinksaas:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "4886BF91-72D0-4758-A534-20C33E4219A8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.notion.so/ThinkSAAS-administrator-backend-SQL-injection-3a5c8c72fc374446892f8dc81ec94923?pvs=4",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40482",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:29.180",
"lastModified": "2024-08-13T01:13:50.130",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:32:00.203",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Unrestricted%20File%20Upload.pdf",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Unrestricted%20File%20Upload.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40486",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:29.360",
"lastModified": "2024-08-13T01:13:52.383",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:29:24.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/SQL%20Injection.pdf",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/SQL%20Injection.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40487",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:29.447",
"lastModified": "2024-08-23T15:35:06.307",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:28:51.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Stored%20XSS.pdf",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/Stored%20XSS.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.kashipara.com/project/php/12997/live-membership-system-in-php-php-project-source-code",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40488",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:29.537",
"lastModified": "2024-08-13T01:13:53.230",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:24:28.293",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://capec.mitre.org/data/definitions/62.html",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/CSRF.pdf",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lopalopa:live_membership_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "933687D6-2726-4893-A846-11C853AF1412"
}
]
}
]
}
],
"references": [
{
"url": "https://capec.mitre.org/data/definitions/62.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Live%20Membership%20System%20v1.0/CSRF.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42794",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T20:15:46.770",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T15:09:59.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +61,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Save%20User%20%26%20Account%20Takeover.pdf",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Save%20User%20%26%20Account%20Takeover.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42795",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T20:15:46.830",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T15:08:25.213",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +61,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20User.pdf",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.kashipara.com/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20View%20User.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.kashipara.com/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42796",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T20:15:46.890",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:56:46.983",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +61,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Delete%20Genre.pdf",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Delete%20Genre.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.kashipara.com/project/php/12978/music-management-system-in-php-php-project-source-code",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42798",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T20:15:46.957",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:56:09.830",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +61,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Priv%20Esc%20-%20Save%20Edit%20User%20-%20AC%20Takeover.pdf",
"source": "cve@mitre.org"
},
"nodes": [
{
"url": "https://www.kashipara.com/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lopalopa:music_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B9E63270-AF05-41C1-8464-61ECA2425ABA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Music%20Management%20System%20v1.0/Broken%20Access%20Control%20-%20Priv%20Esc%20-%20Save%20Edit%20User%20-%20AC%20Takeover.pdf",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.kashipara.com/",
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42994",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-16T17:15:15.153",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:10:13.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.shielder.com/advisories/vtiger-mailmanager-sqli/",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.1.0",
"matchCriteriaId": "55C5E8CB-FCC4-4211-A9ED-1AFDE2F99280"
}
]
}
]
}
],
"references": [
{
"url": "https://www.shielder.com/advisories/vtiger-mailmanager-sqli/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42995",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-16T17:15:15.273",
"lastModified": "2024-08-19T13:00:23.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:09:10.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +61,32 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.shielder.com/advisories/vtiger-migration-bac/",
"source": "cve@mitre.org"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.1.0",
"matchCriteriaId": "55C5E8CB-FCC4-4211-A9ED-1AFDE2F99280"
}
]
}
]
}
],
"references": [
{
"url": "https://www.shielder.com/advisories/vtiger-migration-bac/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44571",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-11T17:15:13.630",
"lastModified": "2024-09-12T12:35:54.013",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T15:22:14.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +61,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.2.1",
"versionEndIncluding": "23.1.0",
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
}
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
}
]
}
]
}
],
"references": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44572",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-11T17:15:13.677",
"lastModified": "2024-09-12T12:35:54.013",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T15:20:25.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.2.1",
"versionEndIncluding": "23.1.0",
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
}
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
}
]
}
]
}
],
"references": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44573",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-11T17:15:13.727",
"lastModified": "2024-11-01T19:35:27.177",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T15:18:27.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.2.1",
"versionEndIncluding": "23.1.0",
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
}
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
}
]
}
]
}
],
"references": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44574",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-11T17:15:13.770",
"lastModified": "2024-09-12T12:35:54.013",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T15:16:15.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.2.1",
"versionEndIncluding": "23.1.0",
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
}
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
}
]
}
]
}
],
"references": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44575",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-11T17:15:13.820",
"lastModified": "2024-11-25T18:15:12.667",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T15:14:44.490",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.2.1",
"versionEndIncluding": "23.1.0",
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
}
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
}
]
}
]
}
],
"references": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44577",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-11T17:15:13.870",
"lastModified": "2024-09-12T12:35:54.013",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T15:13:42.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.2.1",
"versionEndIncluding": "23.1.0",
"matchCriteriaId": "293D0284-65A6-43B4-9E25-5B6F06F4350B"
}
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:relyum:rely-pcie:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F42305-83EB-4393-95A4-268E3C1DEB81"
}
]
}
]
}
],
"references": [
{
"url": "http://system-on-chip.com",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.relyum.com/web/support/vulnerability-report/",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8372",
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
"published": "2024-09-09T15:15:12.560",
"lastModified": "2025-02-12T20:14:39.330",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-28T14:15:20.107",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c",
@ -15,7 +15,7 @@
"descriptions": [
{
"lang": "en",
"value": "Improper sanitization of the value of the '[srcset]' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ."
"value": "Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .\n\nThis issue affects AngularJS versions 1.3.0-rc.4 and greater.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status ."
},
{
"lang": "es",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23375",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-28T15:15:45.157",
"lastModified": "2025-04-28T15:15:45.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerProtect Data Manager Reporting, version(s) 19.17, contain(s) an Incorrect Use of Privileged APIs vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-648"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23376",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-28T15:15:45.303",
"lastModified": "2025-04-28T15:15:45.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerProtect Data Manager Reporting, version(s) 19.16, 19.17, 19.18, contain(s) an Improper Neutralization of Special Elements Used in a Template Engine vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to information disclosure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-23377",
"sourceIdentifier": "security_alert@emc.com",
"published": "2025-04-28T15:15:45.437",
"lastModified": "2025-04-28T15:15:45.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell PowerProtect Data Manager Reporting, version(s) 19.17, 19.18 contain(s) an Improper Encoding or Escaping of Output vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability to inject arbitrary web script or html in reporting outputs."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000311083/dsa-2025-062-security-update-for-dell-powerprotect-data-manager-multiple-security-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25776",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-28T15:15:45.587",
"lastModified": "2025-04-28T15:15:45.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability exists in the User Registration and User Profile features of Codeastro Bus Ticket Booking System v1.0 allows an attacker to execute arbitrary code into the Full Name and Address fields during user registration or profile editing."
}
],
"metrics": {},
"references": [
{
"url": "https://codeastro.com/bus-ticket-booking-system-in-php-codeigniter-with-source-code/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/arunmodi/Vulnerability-Research/tree/main/CVE-2025-25776",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-39735",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-18T07:15:44.150",
"lastModified": "2025-04-21T14:23:45.950",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T14:37:34.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,43 +15,187 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jfs: correcci\u00f3n de lectura fuera de los l\u00edmites de slab en ea_get(). Durante la etiqueta \"size_check\" en ea_get(), el c\u00f3digo comprueba si el tama\u00f1o de la lista de atributos extendidos (xattr) coincide con ea_size. De lo contrario, registra \"ea_get: atributo extendido no v\u00e1lido\" y llama a print_hex_dump(). En este caso, EALIST_SIZE(ea_buf->xattr) devuelve 4110417968, que excede INT_MAX (2147483647). A continuaci\u00f3n, se fija ea_size: int size = clamp_t(int, ea_size, 0, EALIST_SIZE(ea_buf->xattr)); Aunque clamp_t busca limitar ea_size entre 0 y 4110417968, el l\u00edmite superior se trata como un entero, lo que provoca un desbordamiento por encima de 2^31 - 1. Esto hace que \"size\" se repita y se vuelva negativo (-184549328). El \"size\" se pasa a print_hex_dump() (llamado \"len\" en print_hex_dump()) como tipo size_t (un tipo sin signo). Este se almacena en una variable llamada \"int remaining\", que se asigna a \"int linelen\", que a su vez se pasa a hex_dump_to_buffer(). En print_hex_dump(), el bucle for itera desde 0 hasta len-1, donde len es 18446744073525002176 y llama a hex_dump_to_buffer() en cada iteraci\u00f3n: for (i = 0; i < len; i += rowsize) { linelen = min(remaining, rowsize); remaining -= rowsize; hex_dump_to_buffer(ptr + i, linelen, rowsize, groupsize, linebuf, sizeof(linebuf), ascii); ... } La condici\u00f3n de detenci\u00f3n esperada (i < len) se rompe efectivamente ya que len est\u00e1 da\u00f1ado y es muy grande. Esto eventualmente lleva a que \"ptr+i\" se pase a hex_dump_to_buffer() para acercarse al final de los l\u00edmites reales de \"ptr\", eventualmente se realiza un acceso fuera de los l\u00edmites en hex_dump_to_buffer() en el siguiente bucle for: for (j = 0; j < len; j++) { if (linebuflen < lx + 2) goto overflow2; ch = ptr[j]; ... } Para solucionar esto debemos validar \"EALIST_SIZE(ea_buf->xattr)\" antes de utilizarlo."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/0beddc2a3f9b9cf7d8887973041e36c2d0fa3652",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/16d3d36436492aa248b2d8045e75585ebcc2f34d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/3d6fd5b9c6acbc005e53d0211c7381f566babec1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/46e2c031aa59ea65128991cbca474bd5c0c2ecdb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/50afcee7011155933d8d5e8832f52eeee018cfd3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5263822558a8a7c0d0248d5679c2dcf4d5cda61f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/78c9cbde8880ec02d864c166bcb4fe989ce1d95f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a8c31808925b11393a6601f534bb63bac5366bab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fdf480da5837c23b146c4743c18de97202fcab37",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.325",
"versionEndExcluding": "4.20",
"matchCriteriaId": "3C960EB7-4E90-49E0-BB92-BE6F1B8CF26F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.287",
"versionEndExcluding": "5.4.292",
"matchCriteriaId": "16E1C46D-7C0B-4307-928A-8D0ABDF8D1B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.231",
"versionEndExcluding": "5.10.236",
"matchCriteriaId": "8F0C4A9A-87C3-4779-923D-5E19C9A26EA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.174",
"versionEndExcluding": "5.15.180",
"matchCriteriaId": "B6B383DC-5ED6-4326-885D-2F161A71E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.120",
"versionEndExcluding": "6.1.134",
"matchCriteriaId": "B9344B2D-88D1-4540-9748-8CC37D3B25C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.64",
"versionEndExcluding": "6.6.87",
"matchCriteriaId": "042FFA18-3C6A-4999-AB8F-4F6F5902BEEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11.11",
"versionEndExcluding": "6.12",
"matchCriteriaId": "4CBF5F6E-D446-4CAE-AAA4-413442319824"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.12.2",
"versionEndExcluding": "6.12.23",
"matchCriteriaId": "B5C71FC9-A61C-431A-9215-38D09F5A2FF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.11",
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.14",
"versionEndExcluding": "6.14.2",
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0beddc2a3f9b9cf7d8887973041e36c2d0fa3652",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/16d3d36436492aa248b2d8045e75585ebcc2f34d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3d6fd5b9c6acbc005e53d0211c7381f566babec1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/46e2c031aa59ea65128991cbca474bd5c0c2ecdb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/50afcee7011155933d8d5e8832f52eeee018cfd3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5263822558a8a7c0d0248d5679c2dcf4d5cda61f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/78c9cbde8880ec02d864c166bcb4fe989ce1d95f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a8c31808925b11393a6601f534bb63bac5366bab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fdf480da5837c23b146c4743c18de97202fcab37",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-39755",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-18T07:15:44.263",
"lastModified": "2025-04-21T14:23:45.950",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T15:32:46.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: staging: gpib: Fix cb7210 pcmcia Oops. La estructura pcmcia_driver segu\u00eda usando \u00fanicamente la inicializaci\u00f3n anterior de .name en el campo drv. Esto provocaba un puntero nulo deref Oops en strcmp llamado desde pcmcia_register_driver. Inicialice el campo name de la estructura pcmcia_driver."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/7ec50077d7f6647cb6ba3a2a20a6c26f51259c7d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/c1baf6528bcfd6a86842093ff3f8ff8caf309c12",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/c82ae06f49e70d1c14ee9c76c392345856d050c9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.11",
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.14",
"versionEndExcluding": "6.14.2",
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/7ec50077d7f6647cb6ba3a2a20a6c26f51259c7d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c1baf6528bcfd6a86842093ff3f8ff8caf309c12",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c82ae06f49e70d1c14ee9c76c392345856d050c9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-39778",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-18T07:15:44.363",
"lastModified": "2025-04-21T14:23:45.950",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-28T15:37:34.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: objtool, nvmet: Se corrige el acceso a la pila fuera de los l\u00edmites en nvmet_ctrl_state_show(). La matriz csts_state_names[] solo tiene seis entradas dispersas, pero el c\u00f3digo de iteraci\u00f3n en nvmet_ctrl_state_show() itera siete, lo que resulta en una posible lectura de la pila fuera de los l\u00edmites. Se soluciona. Se corrige la siguiente advertencia con un kernel UBSAN: vmlinux.o: advertencia: objtool: .text.nvmet_ctrl_state_show: final inesperado de secci\u00f3n."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/0cc0efc58d6c741b2868d4af24874d7fec28a575",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/107a23185d990e3df6638d9a84c835f963fe30a6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/1adc93a525fdee8e2b311e6d5fd93eb69714ca05",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/8fbf37a3577b4d64c150cafde338eee17b2f2ea4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.12.23",
"matchCriteriaId": "36AF5265-52FA-43B1-996B-D05FDF2FCCDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.11",
"matchCriteriaId": "E7E864B0-8C00-4679-BA55-659B4C9C3AD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.14",
"versionEndExcluding": "6.14.2",
"matchCriteriaId": "FADAE5D8-4808-442C-B218-77B2CE8780A0"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0cc0efc58d6c741b2868d4af24874d7fec28a575",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/107a23185d990e3df6638d9a84c835f963fe30a6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1adc93a525fdee8e2b311e6d5fd93eb69714ca05",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8fbf37a3577b4d64c150cafde338eee17b2f2ea4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-3960",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T06:15:14.870",
"lastModified": "2025-04-27T06:15:14.870",
"lastModified": "2025-04-28T15:15:45.817",
"vulnStatus": "Received",
"cveTags": [
{
@ -16,6 +16,10 @@
{
"lang": "en",
"value": "A vulnerability was found in withstars Books-Management-System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /allreaders.html of the component Background Interface. The manipulation leads to missing authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en withstars Books-Management-System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /allreaders.html del componente Background Interface. La manipulaci\u00f3n provoca la p\u00e9rdida de autorizaci\u00f3n. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
}
],
"metrics": {
@ -66,7 +70,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -114,7 +118,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -143,6 +147,10 @@
{
"url": "https://vuldb.com/?submit.557230",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-3961",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T07:15:15.307",
"lastModified": "2025-04-27T07:15:15.307",
"lastModified": "2025-04-28T15:15:45.943",
"vulnStatus": "Received",
"cveTags": [
{
@ -16,6 +16,10 @@
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in withstars Books-Management-System 1.0. This affects an unknown part of the file /admin/article/add/do. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en withstars Books-Management-System 1.0. Esta afecta a una parte desconocida del archivo /admin/article/add/do. La manipulaci\u00f3n del argumento \"T\u00edtulo\" provoca ataques de cross-site scripting. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
}
],
"metrics": {
@ -66,7 +70,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -114,7 +118,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -143,6 +147,10 @@
{
"url": "https://vuldb.com/?submit.557231",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS1.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-3962",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T07:15:15.580",
"lastModified": "2025-04-27T07:15:15.580",
"lastModified": "2025-04-28T15:15:46.060",
"vulnStatus": "Received",
"cveTags": [
{
@ -16,6 +16,10 @@
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in withstars Books-Management-System 1.0. This vulnerability affects unknown code of the file /api/comment/add of the component Comment Handler. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en withstars Books-Management-System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /api/comment/add del componente Comment Handler. La manipulaci\u00f3n del contenido del argumento provoca ataques de cross site scripting. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
}
],
"metrics": {
@ -66,7 +70,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -114,7 +118,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -143,6 +147,10 @@
{
"url": "https://vuldb.com/?submit.557236",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/XSS2.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-3963",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T08:15:14.353",
"lastModified": "2025-04-27T08:15:14.353",
"lastModified": "2025-04-28T15:15:46.180",
"vulnStatus": "Received",
"cveTags": [
{
@ -16,6 +16,10 @@
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in withstars Books-Management-System 1.0. This issue affects some unknown processing of the file /admin/article/list of the component Background Interface. The manipulation leads to missing authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en withstars Books-Management-System 1.0. Este problema afecta a un procesamiento desconocido del archivo /admin/article/list del componente Background Interface. La manipulaci\u00f3n provoca la omisi\u00f3n de la autorizaci\u00f3n. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
}
],
"metrics": {
@ -66,7 +70,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -114,7 +118,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -143,6 +147,10 @@
{
"url": "https://vuldb.com/?submit.557237",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/Blog-System/%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3966",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T10:15:15.717",
"lastModified": "2025-04-27T10:15:15.717",
"lastModified": "2025-04-28T15:15:46.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itwanger paicoding 1.0.3 and classified as problematic. Affected by this issue is some unknown functionality of the file /user/home?userId=1&homeSelectType=read of the component Browsing History Handler. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en itwanger paicing 1.0.3 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /user/home?userId=1&homeSelectType=read del componente Browsing History Handler. La manipulaci\u00f3n provoca la divulgaci\u00f3n de informaci\u00f3n. El ataque podr\u00eda ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,14 @@
{
"url": "https://vuldb.com/?submit.557250",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/uglory-gll/javasec/blob/main/paicoding.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
},
{
"url": "https://github.com/uglory-gll/javasec/blob/main/paicoding.md#21userhomeuserid1homeselecttyperead-view-browsing-history-of-others",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3967",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T11:15:16.743",
"lastModified": "2025-04-27T11:15:16.743",
"lastModified": "2025-04-28T15:15:46.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itwanger paicoding 1.0.3. It has been classified as critical. This affects an unknown part of the file /article/api/post of the component Article Handler. The manipulation of the argument articleId leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en itwanger paicing 1.0.3. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /article/api/post del componente Article Handler. La manipulaci\u00f3n del argumento articleId provoca una autorizaci\u00f3n incorrecta. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.557251",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/uglory-gll/javasec/blob/main/paicoding.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3968",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T11:15:16.950",
"lastModified": "2025-04-27T11:15:16.950",
"lastModified": "2025-04-28T15:15:46.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in codeprojects News Publishing Site Dashboard 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /api.php. The manipulation of the argument cat_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en codeprojects News Publishing Site Dashboard 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /api.php. La manipulaci\u00f3n del argumento cat_id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.557286",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/zzZxby/Vulnerability-Exploration/blob/main/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A11.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3975",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T16:15:15.260",
"lastModified": "2025-04-27T16:15:15.260",
"lastModified": "2025-04-28T15:15:46.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ScriptAndTools eCommerce-website-in-PHP 3.0 and classified as problematic. This issue affects some unknown processing of the file /admin/subscriber-csv.php. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en ScriptAndTools eCommerce-website-in-PHP 3.0 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a un procesamiento desconocido del archivo /admin/subscriber-csv.php. La manipulaci\u00f3n provoca la divulgaci\u00f3n de informaci\u00f3n. El ataque podr\u00eda iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://www.websecurityinsights.my.id/2025/04/script-and-tools-ecommerce-30_53.html",
"source": "cna@vuldb.com"
},
{
"url": "https://www.websecurityinsights.my.id/2025/04/script-and-tools-ecommerce-30_53.html",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3977",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T17:15:15.853",
"lastModified": "2025-04-27T17:15:15.853",
"lastModified": "2025-04-28T14:15:21.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in iteachyou Dreamer CMS up to 4.1.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/attachment/download of the component Attachment Handler. The manipulation of the argument ID leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en iteachyou Dreamer CMS hasta la versi\u00f3n 4.1.3. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/attachment/download del componente Attachment Handler. La manipulaci\u00f3n del ID del argumento provoca una autorizaci\u00f3n indebida. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.557639",
"source": "cna@vuldb.com"
},
{
"url": "https://gitee.com/iteachyou/dreamer_cms/issues/IC13O1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3978",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T17:15:16.030",
"lastModified": "2025-04-27T17:15:16.030",
"lastModified": "2025-04-28T14:15:21.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in dazhouda lecms 3.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin/view/default/user_set.htm. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en dazhouda lecms 3.0.3. Se ha clasificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo admin/view/default/user_set.htm. La manipulaci\u00f3n conlleva la divulgaci\u00f3n de informaci\u00f3n. El ataque podr\u00eda ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.557748",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_2.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3979",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T18:15:16.020",
"lastModified": "2025-04-27T18:15:16.020",
"lastModified": "2025-04-28T14:15:21.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in dazhouda lecms 3.0.3. This affects an unknown part of the file /index.php?my-password-ajax-1 of the component Password Change Handler. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en dazhouda lecms 3.0.3. Esta afecta a una parte desconocida del archivo /index.php?my-password-ajax-1 del componente Password Change Handler. Esta manipulaci\u00f3n provoca Cross-Site Request Forgery. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.557787",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/dtwin88/cve-md/blob/main/lecms%20V3.0.3/lecms_3.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3980",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T18:15:16.237",
"lastModified": "2025-04-27T18:15:16.237",
"lastModified": "2025-04-28T14:15:21.890",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in wowjoy \u6d59\u6c5f\u6e56\u5dde\u534e\u5353\u4fe1\u606f\u79d1\u6280\u6709\u9650\u516c\u53f8 Internet Doctor Workstation System 1.0. This vulnerability affects unknown code of the file /v1/prescription/list. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en wowjoy ?????????????? Internet Doctor Workstation System 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /v1/prescription/list. La manipulaci\u00f3n da lugar a una autorizaci\u00f3n indebida. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.557930",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/38279/3/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-3981",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-27T19:15:15.750",
"lastModified": "2025-04-27T19:15:15.750",
"lastModified": "2025-04-28T14:15:22.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in wowjoy \u6d59\u6c5f\u6e56\u5dde\u534e\u5353\u4fe1\u606f\u79d1\u6280\u6709\u9650\u516c\u53f8 Internet Doctor Workstation System 1.0. This issue affects some unknown processing of the file /v1/prescription/details/. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en wowjoy ?????????????? Internet Doctor Workstation System 1.0. Este problema afecta a un procesamiento desconocido del archivo /v1/prescription/details/. La manipulaci\u00f3n da lugar a una autorizaci\u00f3n indebida. El ataque podr\u00eda iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -132,6 +136,10 @@
{
"url": "https://vuldb.com/?id.306317",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/38279/3/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-4022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-28T14:15:22.867",
"lastModified": "2025-04-28T14:15:22.867",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in web-arena-x webarena up to 0.2.0. It has been declared as critical. This vulnerability affects the function HTMLContentEvaluator of the file webarena/evaluation_harness/evaluators.py. The manipulation of the argument target[\"url\"] leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/web-arena-x/webarena/issues/194",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/web-arena-x/webarena/issues/194#issuecomment-2796165922",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.306376",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.306376",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.558415",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-4023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-28T14:15:23.043",
"lastModified": "2025-04-28T14:15:23.043",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Placement Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /add_company.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/xingyu-wu4678/cve/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.306377",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.306377",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.558546",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-4024",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-28T15:15:47.600",
"lastModified": "2025-04-28T15:15:47.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in itsourcecode Placement Management System 1.0. Affected is an unknown function of the file /add_drive.php. The manipulation of the argument drive_title leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/xingyu-wu4678/cve/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.306378",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.306378",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.558616",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-4025",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-28T15:15:47.767",
"lastModified": "2025-04-28T15:15:47.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in itsourcecode Placement Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /registration.php. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/xingyu-wu4678/cve/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.306379",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.306379",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.558621",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,13 +2,20 @@
"id": "CVE-2025-43919",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-20T01:15:45.233",
"lastModified": "2025-04-24T16:22:37.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2025-04-28T14:15:22.137",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter."
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to read arbitrary files via ../ directory traversal at /mailman/private/mailman (aka the private archive authentication endpoint) via the username parameter. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used."
},
{
"lang": "es",
@ -113,9 +120,17 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"Mitigation"
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://github.com/cpanel/mailman2-python3",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2025/04/21/6",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,20 @@
"id": "CVE-2025-43920",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-20T01:15:45.867",
"lastModified": "2025-04-24T16:20:36.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2025-04-28T14:15:22.323",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line."
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), in certain external archiver configurations, allows unauthenticated attackers to execute arbitrary OS commands via shell metacharacters in an email Subject line. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used."
},
{
"lang": "es",
@ -115,6 +122,14 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/cpanel/mailman2-python3",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2025/04/21/6",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,20 @@
"id": "CVE-2025-43921",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-20T01:15:46.043",
"lastModified": "2025-04-24T16:16:59.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"lastModified": "2025-04-28T14:15:22.477",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint."
"value": "GNU Mailman 2.1.39, as bundled in cPanel (and WHM), allows unauthenticated attackers to create lists via the /mailman/create endpoint. NOTE: multiple third parties report that they are unable to reproduce this, regardless of whether cPanel or WHM is used."
},
{
"lang": "es",
@ -115,6 +122,14 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/cpanel/mailman2-python3",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2025/04/21/6",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-46333",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-25T21:15:39.577",
"lastModified": "2025-04-25T21:15:39.577",
"lastModified": "2025-04-28T15:15:47.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "z2d is a pure Zig 2D graphics library. In version 0.6.0, when writing from one surface to another using `z2d.compositor.StrideCompositor.run`, the source surface can be completely out-of-bounds on the x-axis (but not on the y-axis) by way of a negative offset. This results in an overflow of the value controlling the length of the stride. In non-safe optimization modes (consumers compiling with `ReleaseFast` or `ReleaseSmall`), this could potentially lead to invalid memory accesses or corruption. This issue is patched in version 0.6.1."
"value": "z2d is a pure Zig 2D graphics library. Versions of z2d after `0.5.1` and up to and including `0.6.0`, when writing from one surface to another using `z2d.compositor.StrideCompositor.run`, and higher-level operations when the anti-aliasing mode is set to `.default` (such as `Context.fill`, `Context.stroke`, `painter.fill`, and `painter.stroke`), the source surface can be completely out-of-bounds on the x-axis, but not on the y-axis, by way of a negative offset. This results in an overflow of the value controlling the length of the stride. In non-safe optimization modes (consumers compiling with `ReleaseFast` or `ReleaseSmall`), this could potentially lead to invalid memory accesses or corruption.\n\nThis issue is patched in version `0.6.1`. Users on an untagged version after `v0.5.1` and before `v0.6.1` are advised to update to address the vulnerability. Those still on Zig `0.13.0` are recommended to downgrade to `v0.5.1`."
},
{
"lang": "es",
"value": "z2d es una librer\u00eda de gr\u00e1ficos Zig 2D pura. En la versi\u00f3n 0.6.0, al escribir de una superficie a otra usando `z2d.compositor.StrideCompositor.run`, la superficie de origen puede estar completamente fuera de los l\u00edmites en el eje x (pero no en el eje y) debido a un desplazamiento negativo. Esto provoca un desbordamiento del valor que controla la longitud de la zancada. En modos de optimizaci\u00f3n no seguros (consumidores que compilan con `ReleaseFast` o `ReleaseSmall`), esto podr\u00eda provocar accesos no v\u00e1lidos a memoria o corrupci\u00f3n. Este problema se solucion\u00f3 en la versi\u00f3n 0.6.1."
}
],
"metrics": {
@ -60,7 +64,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,16 +2,51 @@
"id": "CVE-2025-46661",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-28T13:15:24.117",
"lastModified": "2025-04-28T13:15:24.117",
"lastModified": "2025-04-28T14:15:22.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection."
"value": "IPW Systems Metazo through 8.1.3 allows unauthenticated Remote Code Execution because smartyValidator.php enables the attacker to provide template expressions, aka Server-Side Template-Injection. All instances have been patched by the Supplier."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://code-white.com/public-vulnerability-list/",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-28T14:00:19.945572+00:00
2025-04-28T16:00:20.643077+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-28T13:45:09.357000+00:00
2025-04-28T15:37:34.230000+00:00
```
### Last Data Feed Release
@ -33,30 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
291587
291596
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `9`
- [CVE-2025-32472](CVE-2025/CVE-2025-324xx/CVE-2025-32472.json) (`2025-04-28T13:15:23.053`)
- [CVE-2025-4018](CVE-2025/CVE-2025-40xx/CVE-2025-4018.json) (`2025-04-28T12:15:31.913`)
- [CVE-2025-4019](CVE-2025/CVE-2025-40xx/CVE-2025-4019.json) (`2025-04-28T12:15:32.093`)
- [CVE-2025-4020](CVE-2025/CVE-2025-40xx/CVE-2025-4020.json) (`2025-04-28T13:15:24.603`)
- [CVE-2025-4021](CVE-2025/CVE-2025-40xx/CVE-2025-4021.json) (`2025-04-28T13:15:24.773`)
- [CVE-2025-46661](CVE-2025/CVE-2025-466xx/CVE-2025-46661.json) (`2025-04-28T13:15:24.117`)
- [CVE-2015-2079](CVE-2015/CVE-2015-20xx/CVE-2015-2079.json) (`2025-04-28T15:15:44.007`)
- [CVE-2025-23375](CVE-2025/CVE-2025-233xx/CVE-2025-23375.json) (`2025-04-28T15:15:45.157`)
- [CVE-2025-23376](CVE-2025/CVE-2025-233xx/CVE-2025-23376.json) (`2025-04-28T15:15:45.303`)
- [CVE-2025-23377](CVE-2025/CVE-2025-233xx/CVE-2025-23377.json) (`2025-04-28T15:15:45.437`)
- [CVE-2025-25776](CVE-2025/CVE-2025-257xx/CVE-2025-25776.json) (`2025-04-28T15:15:45.587`)
- [CVE-2025-4022](CVE-2025/CVE-2025-40xx/CVE-2025-4022.json) (`2025-04-28T14:15:22.867`)
- [CVE-2025-4023](CVE-2025/CVE-2025-40xx/CVE-2025-4023.json) (`2025-04-28T14:15:23.043`)
- [CVE-2025-4024](CVE-2025/CVE-2025-40xx/CVE-2025-4024.json) (`2025-04-28T15:15:47.600`)
- [CVE-2025-4025](CVE-2025/CVE-2025-40xx/CVE-2025-4025.json) (`2025-04-28T15:15:47.767`)
### CVEs modified in the last Commit
Recently modified CVEs: `5`
Recently modified CVEs: `48`
- [CVE-2023-51533](CVE-2023/CVE-2023-515xx/CVE-2023-51533.json) (`2025-04-28T13:13:33.597`)
- [CVE-2023-52048](CVE-2023/CVE-2023-520xx/CVE-2023-52048.json) (`2025-04-28T13:08:59.177`)
- [CVE-2024-24714](CVE-2024/CVE-2024-247xx/CVE-2024-24714.json) (`2025-04-28T12:48:10.637`)
- [CVE-2024-25170](CVE-2024/CVE-2024-251xx/CVE-2024-25170.json) (`2025-04-28T13:45:09.357`)
- [CVE-2024-26342](CVE-2024/CVE-2024-263xx/CVE-2024-26342.json) (`2025-04-28T13:15:09.927`)
- [CVE-2024-44574](CVE-2024/CVE-2024-445xx/CVE-2024-44574.json) (`2025-04-28T15:16:15.657`)
- [CVE-2024-44575](CVE-2024/CVE-2024-445xx/CVE-2024-44575.json) (`2025-04-28T15:14:44.490`)
- [CVE-2024-44577](CVE-2024/CVE-2024-445xx/CVE-2024-44577.json) (`2025-04-28T15:13:42.720`)
- [CVE-2024-8372](CVE-2024/CVE-2024-83xx/CVE-2024-8372.json) (`2025-04-28T14:15:20.107`)
- [CVE-2025-3960](CVE-2025/CVE-2025-39xx/CVE-2025-3960.json) (`2025-04-28T15:15:45.817`)
- [CVE-2025-3961](CVE-2025/CVE-2025-39xx/CVE-2025-3961.json) (`2025-04-28T15:15:45.943`)
- [CVE-2025-3962](CVE-2025/CVE-2025-39xx/CVE-2025-3962.json) (`2025-04-28T15:15:46.060`)
- [CVE-2025-3963](CVE-2025/CVE-2025-39xx/CVE-2025-3963.json) (`2025-04-28T15:15:46.180`)
- [CVE-2025-3966](CVE-2025/CVE-2025-39xx/CVE-2025-3966.json) (`2025-04-28T15:15:46.290`)
- [CVE-2025-3967](CVE-2025/CVE-2025-39xx/CVE-2025-3967.json) (`2025-04-28T15:15:46.410`)
- [CVE-2025-3968](CVE-2025/CVE-2025-39xx/CVE-2025-3968.json) (`2025-04-28T15:15:46.527`)
- [CVE-2025-39735](CVE-2025/CVE-2025-397xx/CVE-2025-39735.json) (`2025-04-28T14:37:34.487`)
- [CVE-2025-3975](CVE-2025/CVE-2025-39xx/CVE-2025-3975.json) (`2025-04-28T15:15:46.760`)
- [CVE-2025-39755](CVE-2025/CVE-2025-397xx/CVE-2025-39755.json) (`2025-04-28T15:32:46.553`)
- [CVE-2025-3977](CVE-2025/CVE-2025-39xx/CVE-2025-3977.json) (`2025-04-28T14:15:21.520`)
- [CVE-2025-39778](CVE-2025/CVE-2025-397xx/CVE-2025-39778.json) (`2025-04-28T15:37:34.230`)
- [CVE-2025-3978](CVE-2025/CVE-2025-39xx/CVE-2025-3978.json) (`2025-04-28T14:15:21.640`)
- [CVE-2025-3979](CVE-2025/CVE-2025-39xx/CVE-2025-3979.json) (`2025-04-28T14:15:21.767`)
- [CVE-2025-3980](CVE-2025/CVE-2025-39xx/CVE-2025-3980.json) (`2025-04-28T14:15:21.890`)
- [CVE-2025-3981](CVE-2025/CVE-2025-39xx/CVE-2025-3981.json) (`2025-04-28T14:15:22.013`)
- [CVE-2025-43919](CVE-2025/CVE-2025-439xx/CVE-2025-43919.json) (`2025-04-28T14:15:22.137`)
- [CVE-2025-43920](CVE-2025/CVE-2025-439xx/CVE-2025-43920.json) (`2025-04-28T14:15:22.323`)
- [CVE-2025-43921](CVE-2025/CVE-2025-439xx/CVE-2025-43921.json) (`2025-04-28T14:15:22.477`)
- [CVE-2025-46333](CVE-2025/CVE-2025-463xx/CVE-2025-46333.json) (`2025-04-28T15:15:47.057`)
- [CVE-2025-46661](CVE-2025/CVE-2025-466xx/CVE-2025-46661.json) (`2025-04-28T14:15:22.637`)
## Download and Usage

View File

@ -75559,6 +75559,7 @@ CVE-2015-2075,0,0,e2b9cfdccf5716685cc1e4d8cc1bc3a54797e772b0a1447d55a8f318c3576a
CVE-2015-2076,0,0,3d8b112a5706df5d84310bb9b8ed104e56569c2923fa69b716ed38a355a69b2a,2025-04-12T10:46:40.837000
CVE-2015-2077,0,0,4411d36c64e75264ae4b5cd885f8ca45fd6474dc1e2b6cd680bb1a19f78a7f18,2025-04-12T10:46:40.837000
CVE-2015-2078,0,0,2611ed6e45a1c171159eb27c59a79256a622d5f057d44ff7975c92201c58de46,2025-04-12T10:46:40.837000
CVE-2015-2079,1,1,f2f765cafa57b5c53cfac166351fda648b78b5622810f6e5e02e217e7c1564e0,2025-04-28T15:15:44.007000
CVE-2015-2080,0,0,1269de43ed4c4370565793a28753d3e81328a5b9b90e6133a8ceb967b3d23093,2025-04-12T10:46:40.837000
CVE-2015-2081,0,0,dbf23d9a94c6e7e32fefef8d65be0a4a8bd93470966a94df1e50b94d9db43619,2024-11-21T02:26:43.660000
CVE-2015-2082,0,0,7f5418dc360570b72eb84eefc32bc34eba854d22b1b5f25bc2ee784686888094,2025-04-12T10:46:40.837000
@ -193427,7 +193428,7 @@ CVE-2022-23737,0,0,00bd5b8e77776c824d9367fe4e3bd6f356e3bcbf490141f8b74768cefd021
CVE-2022-23738,0,0,0eaa47d3d4006afa09ec7cb704b1f8468722477b8e76ecdafe6acdf69b5eb977,2024-11-21T06:49:12.737000
CVE-2022-23739,0,0,f6dd41fc9b18ff225249e63ed3de75d4f78a2a0eabee0e65e248c438d071d051,2025-04-08T21:15:44.423000
CVE-2022-2374,0,0,e8aea41fb4969ca1ce97b6b67b3414e0f25ada9e4b58edf35238b03b9dccf668,2024-11-21T07:00:51.853000
CVE-2022-23740,0,0,73df818fba6a5db1c781b7a253d13fa4858bc42c8aaba1b97da3002f3df83d42,2024-11-21T06:49:12.987000
CVE-2022-23740,0,1,3e1be9444a6173f399b977ddfb22aac75d5bb2d7c58fa44294560eefe333620e,2025-04-28T15:15:44.577000
CVE-2022-23741,0,0,3a64d91448bd62035134cb767623d94872c48ddd1ec46258ed91d43ab47820cc,2025-04-22T16:15:21.053000
CVE-2022-23742,0,0,7dea878edb5ad2cbdb3abc4beeb51490a987e35f3a4f8363cd49f2a2e7c043a1,2024-11-21T06:49:13.227000
CVE-2022-23743,0,0,a7454e6467ca11378287d0671c5f75d14fde2b38947403f7a5ca829d4c6db62b,2024-11-21T06:49:13.347000
@ -210607,7 +210608,7 @@ CVE-2022-45419,0,0,e5e80247049cf7154de037d9e58ef6fb0998b7ad2c529e1ca7b6c319fab16
CVE-2022-4542,0,0,1e8daab49fb467c0edc9286efcd4cbc9b024e0d6f613c2ff20ca5238d9ed329d,2025-04-03T20:15:18.443000
CVE-2022-45420,0,0,f1eff6696caa2e5ae623f262112221f1b06b603256e633ff4d1368d68d1794ee,2025-04-15T15:16:03.193000
CVE-2022-45421,0,0,5454303fe1616edea179c1a907dc0b9588624264b8c1c40f842ce8b70dbbd8e0,2025-04-15T15:16:03.357000
CVE-2022-45422,0,0,1b36c85fe2672583a3ef0eda64ee1cd537bbee4b3a3cd5639f8e7b843dc1fbf9,2024-11-21T07:29:13.907000
CVE-2022-45422,0,1,cbaa4e97ba94b306f8ff8fba0c5d4711702ae46e5916b688dbd38829f7250a40,2025-04-28T15:15:44.910000
CVE-2022-45423,0,0,1f033df1fc4960b99357cb040b9af81355eeabbedd198749f65aa65f3ad0d51f,2025-04-14T13:15:15.970000
CVE-2022-45424,0,0,2c9d05b22d8c4b9c1e6d273139d88262e63599a434074936adacad9cb44fafe0,2025-04-14T14:15:20.313000
CVE-2022-45425,0,0,520990494cde392487585b2b2277647d9ae6ee50312a99a0315937862c6404ea,2025-04-14T14:15:20.493000
@ -240449,7 +240450,7 @@ CVE-2023-5153,0,0,9c9af9ee0585ae99c11dc28be44a3d285d24f0e534e56e6e3bc49f885c490b
CVE-2023-51530,0,0,10aa7972ebcc143fc175a676ecc0636cfb1bd808ee825b8d1ba9998f1ed6f97f,2025-02-27T02:51:16.947000
CVE-2023-51531,0,0,ed65fb56698b1668a229da16713fbb3a00de61d6cd1c84cc2b94de89c27c7bfa,2025-02-27T02:55:35.553000
CVE-2023-51532,0,0,ab7508cc452da5caaa84a729d614de6dcf5a6b68199b1a01ad6bed86c7b79196,2024-11-21T08:38:19.377000
CVE-2023-51533,0,1,2ef6b746e3ae13092e5325bb7897fb9a47cf6eafaf6307c389e0af4501a290f9,2025-04-28T13:13:33.597000
CVE-2023-51533,0,0,2ef6b746e3ae13092e5325bb7897fb9a47cf6eafaf6307c389e0af4501a290f9,2025-04-28T13:13:33.597000
CVE-2023-51534,0,0,674283aa9bee476e3f518de07ee15ce728e3ea64deca08374beae81fdb205f23,2024-11-21T08:38:19.663000
CVE-2023-51535,0,0,b4ee7d4c77008fec43e7a917d42277372a9bc28a04a14adf861b98934323efbd,2024-11-21T08:38:19.803000
CVE-2023-51536,0,0,5459c09b4b1682eae7f140dbb92e6e712692b6c8c3fc2399e747fac5b9fd78de,2024-11-21T08:38:19.930000
@ -240823,7 +240824,7 @@ CVE-2023-52044,0,0,5b5e70107668847bba1d6062e34c0bf4eaededd76c0935abbe5da27ca0360
CVE-2023-52045,0,0,b95570fd6064d2fac3cb39dff45979071738bfc47c15c31d200252b85a2f3e9f,2025-04-17T19:11:05.073000
CVE-2023-52046,0,0,194849462bf429fc749f298b05a36377ff7074363e301b433cd9950d69c4c501,2024-11-21T08:39:04.817000
CVE-2023-52047,0,0,d56b5255bbf43ce833425482d3a7c4458ee12e08ce88fc91b5b4e4a71c62ee74,2025-04-01T13:30:28.050000
CVE-2023-52048,0,1,dc6a64e99c990ac71e2e5fd5c1632b65bf305feb3beb43bad667892a5fedb150,2025-04-28T13:08:59.177000
CVE-2023-52048,0,0,dc6a64e99c990ac71e2e5fd5c1632b65bf305feb3beb43bad667892a5fedb150,2025-04-28T13:08:59.177000
CVE-2023-5205,0,0,ad9e6403ed51d32e238949552f23850cd3c894ce7b700f7f43181c17b96bcabf,2024-11-21T08:41:17.900000
CVE-2023-52059,0,0,631fc170b23676a9d5a914e1efcd033aa6ac461afd7c0cbe7ba670738271ca23,2024-11-21T08:39:05.367000
CVE-2023-52060,0,0,916b6d0023ba25356201b349f9585af7af15e0ab89951480565e91e01992b734,2025-03-13T20:15:16.240000
@ -252729,7 +252730,7 @@ CVE-2024-24710,0,0,3e1e20a8dfa79a8b78b75c17d13801e5e4aa6e91804fe24acce34eb915d0b
CVE-2024-24711,0,0,22ae5814b6f1b3b16c3d1525f8fcb2be9e6f73b9bf83108e69c5d785af0e14a5,2024-11-21T08:59:33.490000
CVE-2024-24712,0,0,efc844b6aac243f9d2a4e2fa0e4f20ffb1fa53d6800923dfed2d946c95888150,2024-11-21T08:59:33.620000
CVE-2024-24713,0,0,9b6abef33bc7d884bbcfe7f84a8de01ffd604fe1e84fadee5fa6903c498a1f90,2024-11-21T08:59:33.757000
CVE-2024-24714,0,1,fa6f31994511f691ec58d6cd25d830472c6518df8eb14d92ad8a1216e17c5ef2,2025-04-28T12:48:10.637000
CVE-2024-24714,0,0,fa6f31994511f691ec58d6cd25d830472c6518df8eb14d92ad8a1216e17c5ef2,2025-04-28T12:48:10.637000
CVE-2024-24715,0,0,0e1efbeecdbbc67506e62ff0a15195fb63b9939321818a7128fc2e9bb4370e11,2024-11-21T08:59:34.020000
CVE-2024-24716,0,0,2a1681202601d9e99709e6831ac4b63ea8c43e8b87405bb1f57ab626394c187f,2024-11-21T08:59:34.150000
CVE-2024-24717,0,0,75805cbf14610b8ac5098a39951fb1a53c50c5d54fe991e08ae0e81f017efa6f,2024-11-21T08:59:34.317000
@ -253137,7 +253138,7 @@ CVE-2024-25167,0,0,6680c9ae0b5f0e6a56ae0f989b9e9129826f63fc1c07b9d46b893bd2a5ea0
CVE-2024-25168,0,0,8cefebfb25cf73bfbc7148eb27cdd7832e378fc25a13306a6452184972fcdac6,2024-11-21T09:00:23.370000
CVE-2024-25169,0,0,99447ba0d35007c05de0bb325e4f626f2e771e1210f38989dc4b7d60408a0543,2025-03-28T19:15:19.433000
CVE-2024-2517,0,0,295e66015290670d17656ff58cb1c4da5fc5fa5488e00738c41044e38528f829,2025-02-14T17:00:42.847000
CVE-2024-25170,0,1,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f00c2,2025-04-28T13:45:09.357000
CVE-2024-25170,0,0,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f00c2,2025-04-28T13:45:09.357000
CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000
CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000
CVE-2024-25180,0,0,0d4a542b02265d3f9b8201e343a419b397fe0f87ee7decd85beea8db7b2a744c,2024-11-21T09:00:24.200000
@ -253549,7 +253550,7 @@ CVE-2024-25830,0,0,48f111b9df759d41453a93b4045c2ff567a72cf519523820b0bdb3651b119
CVE-2024-25831,0,0,bd8cc628942f0cfec3cd605617d2c1225f2d77c4bfbb5c43b8cabd63ea5984ac,2025-01-16T17:50:46.660000
CVE-2024-25832,0,0,0359e72eed9b587f1da939ee2b4f202d62bdd6b390e2936728c43fb3aef82845,2025-03-27T15:15:50.607000
CVE-2024-25833,0,0,50dde66bc691dda473a0e2525b2d4cb41dc2484c7572d20b63fa74d0870cf5ff,2025-01-16T17:50:18.237000
CVE-2024-25837,0,0,9324aae20b150fb712a45f0d12f866250e517905551e94092fb5dfb75742ad97,2024-10-30T15:35:08.810000
CVE-2024-25837,0,1,7bbde50123e9dad85e59add4941e11a3c0f989fc362143f8cbc962577f00d521,2025-04-28T14:06:50.453000
CVE-2024-25839,0,0,a6951a161c8400420691d40a579c87f91e6e0f1f8f29502c5d7b5cde306b0917,2024-11-21T09:01:24.383000
CVE-2024-2584,0,0,147866b6cc23dcf59e36f6b74e2eee47e7c2220f33f9e8fd97c35cfd9a0a049d,2025-04-11T14:47:05.300000
CVE-2024-25840,0,0,8953a162377158948ebf7583b7c44850336b1c32eb8d66824e9b6ea8a16712b3,2024-11-21T09:01:24.607000
@ -254039,7 +254040,7 @@ CVE-2024-26335,0,0,d935f588a5f25fc8eb3a1cad35a0e183dcfe3bb620dcbf94cb5db283d0be6
CVE-2024-26337,0,0,8f97136a32143d7c5cb4e695fc03098705d0a94d9a4445524aede82b9c17fb81,2025-04-01T15:48:49.013000
CVE-2024-26339,0,0,50901e7be8d4dc2f1ae969674b464222e6c5cb243f33556cac70b86975fdb414,2025-04-01T15:48:23.610000
CVE-2024-2634,0,0,f23d5a69439faf8e582a9c275f183d86336ce7e598134e5aefd6ea8385c5e2eb,2024-11-21T09:10:10.983000
CVE-2024-26342,0,1,da6762122e9027a78d524f6ee4cae5691172afa8889ba4ddcc1104b2ff0a8e3b,2025-04-28T13:15:09.927000
CVE-2024-26342,0,0,da6762122e9027a78d524f6ee4cae5691172afa8889ba4ddcc1104b2ff0a8e3b,2025-04-28T13:15:09.927000
CVE-2024-26349,0,0,1bbbf3597c87b9929fc5eb4bb026f97edb7f2e0b4184399ebdf8842d543c4e8f,2025-03-25T17:00:12.093000
CVE-2024-2635,0,0,5fc435b0b5b40519e84566e07c1fce38fb260b472efb6bf37eb63fcc0934d662,2024-11-21T09:10:11.093000
CVE-2024-26350,0,0,aafbc8f10bb2284d20ad7acc10a6c83f87626d2b046e77e8585f67ff9e4808a2,2025-03-28T19:15:20.007000
@ -255161,7 +255162,7 @@ CVE-2024-27712,0,0,39c268969bc18b1f885f38f09190df12ceb146b6e360b90342f96472616f2
CVE-2024-27713,0,0,b65152a8721dfc398af59bf6c393bf5fdd8d930eac7a2b15f4d417361b801ba6,2025-04-16T19:15:12.260000
CVE-2024-27715,0,0,588f0129d251c25a62c6758efd788f377fccf8c1d3855c585b3b6fa48c2014b3,2025-04-16T19:15:07.433000
CVE-2024-27716,0,0,4e33ff7b1a83f51fed4b80a3d94c6d3a9ee0c5bb94137c0b4ce8ff1d81d644a3,2024-11-21T09:04:56.483000
CVE-2024-27717,0,0,2bfbcd1fda90d99c6d9799ec5f6ea4a1024e40e784a07aae7d197f311065a041,2024-11-21T09:04:56.707000
CVE-2024-27717,0,1,7c5360378c1c098145273942daac7e3b2041c6891631d0b1d163bd0d3e72c1e7,2025-04-28T14:47:26.353000
CVE-2024-27718,0,0,6fd0ecf52683c3600c47787d4abfe093befe302da46880121fb7e6cebae4c848,2024-11-21T09:04:56.920000
CVE-2024-27719,0,0,341c9c74660e8da6c3b635ee840b9ff7db619da44f18728b3cc02c5bde0fae9d,2024-11-21T09:04:57.123000
CVE-2024-2772,0,0,02f750b020a1c0ddcf10a0cbf86dad19edb566b57ce2911796231437ddd08a75,2025-02-06T18:38:03.913000
@ -261015,7 +261016,7 @@ CVE-2024-35527,0,0,d802d5954ff7f9b39a6b2dc0af26915bbf794a29707ccef9cebcfa3c1be1e
CVE-2024-3553,0,0,685d6a9bec12f61a7106ff31505bbc229bf16d433649e9dec535a367c421d912,2025-01-15T18:36:47.993000
CVE-2024-35532,0,0,feed18e3e5768cea1f19bf7390d6eac06db80fa1667c8f051e007dd8daab0194,2025-01-08T15:15:17.793000
CVE-2024-35537,0,0,a64f8ae8ab86725040f9e1b6d109b67b42cd2d40678fcb31e32a5fa325e35c6c,2025-03-13T15:15:44.547000
CVE-2024-35538,0,0,96eff6484fca11848a83b78627b6ae787a7804df3fd835a8374ef951bb6f2ad1,2024-08-20T15:44:20.567000
CVE-2024-35538,0,1,f53475906dfdb17612612ecb2abd6bf10186d205bd4d089601d9c5c2b22789cf,2025-04-28T14:00:34.500000
CVE-2024-35539,0,0,97ada96f796dc4b3f1c0d706963a18d7205ef36dca04b0052b95398f16195ac9,2024-08-21T14:35:10.017000
CVE-2024-3554,0,0,b7f3e638ef3a822354fb7124a5277075531fad510bfdcd6faa19f3ac09434bf0,2024-11-21T09:29:51.930000
CVE-2024-35540,0,0,7617ec41b467bc5de8aa2d05744dbd4fc53e6d5d057c21556d6cac0d34e12490,2024-08-21T16:05:06.290000
@ -263945,7 +263946,7 @@ CVE-2024-38897,0,0,b43024c8c4cd5005ae2c3ac6e382f0314f8925a2efba660eda76a12caae34
CVE-2024-3890,0,0,fce70548afac71463049803d99839c76f83c3f99644b737e71452f11bf39c15a,2025-01-07T18:13:29.557000
CVE-2024-38902,0,0,4f43d793db0c62321cf943185d9719a34e2b038e0d34991b7e0e1a885b3d56ec,2025-03-13T15:15:46.197000
CVE-2024-38903,0,0,5ac36a5d0829f2d9338553ce3926f23b23b26a430d990d436d81e63cebcf3b1a,2024-11-21T09:26:59.357000
CVE-2024-38909,0,0,7a534ed14d1ecaec78a6d0eb2287c1e617529c12447aed6a1bc518a184ec1064,2025-03-14T19:15:46.707000
CVE-2024-38909,0,1,e855d3e4bcc6debe8825dcac1f84960c0ea9fdd610320e92597c28f7d4585441,2025-04-28T14:35:52.783000
CVE-2024-3891,0,0,4d72bc4ea7906c74fa96e7962b045759b217e44e525621a88b5a5a6135790d8b,2025-01-07T18:11:13.230000
CVE-2024-38910,0,0,d2dff3af8a966f6c22ba1ee4e9572a11e68c5f4930901faf724b461844929ff4,2024-12-06T20:15:26.337000
CVE-2024-3892,0,0,d29e438e1d0c06b67fbb683ee1ad1805f7ecf63a0185dbf87e1e3c4e7505b0f6,2025-01-28T16:39:55.417000
@ -263986,7 +263987,7 @@ CVE-2024-38991,0,0,40100092f65cabc0a38a9cd2fc9407a2ace7ce781b9a81c291e5aad2037b1
CVE-2024-38992,0,0,3fe46fe53ebbd61cbcbeb026b882a36c55f7df74d80bd73da297882e8a29fda8,2024-11-21T09:27:03.730000
CVE-2024-38993,0,0,172de65e7240c6a5f6bf645e694b0d2e344b70f8de661fa2be14422eb43b5e24,2024-11-21T09:27:03.943000
CVE-2024-38994,0,0,2a61e436904a48b4ded58b92d6bc8b107cabc4ea861dff38f3dcd8ff23c78c3a,2024-11-21T09:27:04.170000
CVE-2024-38996,0,0,8fd4a7ef6b42b1a63cd868322179bb9481740ea02fd238379ee386c0fbf6a026,2024-11-21T09:27:04.387000
CVE-2024-38996,0,1,3f9d786844732d7b8465ea56f6ffca091cbc25ebc4440147a358ddbf759f2b49,2025-04-28T14:37:52.810000
CVE-2024-38997,0,0,29421658f8acbee523241d363ca96c6a4d61054e874bc93ac98fb62157248214,2024-11-21T09:27:04.613000
CVE-2024-38998,0,0,1ddfa2c100a7af4725f52a46bac654024fff6a96a1ee34fbb54fd0ca70641bb2,2025-01-28T20:15:31.103000
CVE-2024-38999,0,0,7f217baaa25d7f40b740199108f4604ad2f09c6c0fdc981cabbaf727e9dace92,2024-11-21T09:27:05.063000
@ -264881,7 +264882,7 @@ CVE-2024-40417,0,0,52920b59587ee59d8965c4a5b0b101605d7bbbf1f449f954819cec48760aa
CVE-2024-4042,0,0,cecab8b1687d6be49a591036e1f884eeaaaac74f662dec1e0d521caf21f5dd55,2024-11-21T09:42:05.310000
CVE-2024-40420,0,0,2cc64060c56a9cd8ae43221cc949a39e78df1f9a724e5e5fe2d1f288499041f6,2024-12-18T20:15:22.773000
CVE-2024-40422,0,0,6808f4638a336c49c8bee4ab2c82ba14479baa38f197ca7d031042a0e1bcff02,2025-01-29T22:15:29.260000
CVE-2024-40425,0,0,6aeac73ee2eae081e2470f06e1862d7c95ccca07478d222a6faa8bdbe87a2e48,2024-11-21T09:31:05.133000
CVE-2024-40425,0,1,81a735aa760a40f04f27a92364bcdd5799b5ae544ac617e40c579d873b6adcfa,2025-04-28T14:46:31.877000
CVE-2024-40427,0,0,edb2ed6f04ab924988a6c43762419200f816f91f867e2f61b6ea78a526ec38ae,2025-01-08T19:15:31.043000
CVE-2024-4043,0,0,d4b5f95f306543d879cec12e990f7b6a12bdbc75a98caec12c24a6e719c63084,2024-11-21T09:42:05.460000
CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000
@ -264896,8 +264897,8 @@ CVE-2024-40445,0,0,acf4cbc29ae92f9a56fdef6f118c1427fc2f07e0ad7c091d1b4352b9172a5
CVE-2024-40446,0,0,06e9b4334aa4360577a217b606b4c757a9efe0ad1ca34b90bc04789a404c59c4,2025-04-23T15:15:59.513000
CVE-2024-4045,0,0,f4ea98769850930c051ddc885b28524cc4af702b69cedf5723780c9f7bd76361,2024-11-21T09:42:05.710000
CVE-2024-40453,0,0,44028ded5df7ca69cdf493f195db9cc0d99fa7bb7b128c31936f66f8a0891140,2024-08-23T17:35:05.463000
CVE-2024-40455,0,0,ebb560c70d34d188402c3c6b014cf93d1b00bcbb7dab920ce20724d469ccb1c5,2025-03-13T15:15:46.557000
CVE-2024-40456,0,0,75e9cec6fc0fd65f300d988b660b459ac55c19cbe24788956c572edbb27e0987,2024-11-21T09:31:07.020000
CVE-2024-40455,0,1,de7fbbe58f22122912bb4505b4fac34aed399683e93e39080dcf369a911444ce,2025-04-28T14:44:33.090000
CVE-2024-40456,0,1,b282c3faed2b169890d7c393ead6de175fbbf60b11c5017118af2cac3eb0aed1,2025-04-28T14:43:04.063000
CVE-2024-40457,0,0,390d8a58e2d154cd9c58a3e4748ba4c5a47c1d045aaef6fb95193c7f046d0256,2024-10-31T20:15:05.173000
CVE-2024-4046,0,0,138bf9d15d808a387f1842c46e6552085e59aca18c14e013e3ba3c3747ce3bc9,2024-12-09T19:01:57.977000
CVE-2024-40464,0,0,24a2b11fcc0b71c0371d2caf323eabbeaed9510a92bc85a0da1ff652186f468c,2024-08-15T13:02:33
@ -264912,11 +264913,11 @@ CVE-2024-40478,0,0,18f9d2601b45b0155659911e0ae2c29ee23e133c8cb47ee86400e795a0ae6
CVE-2024-40479,0,0,ed772cf67a46ac3c7e9bc9693937a7eef7702ab77b807ded4bc39bba120db634,2024-08-13T01:13:47.860000
CVE-2024-40480,0,0,2e13e61f572f387adfee6973f14487ab73725a0b4fc14a2193599bd0e9b21708,2025-03-14T16:15:33.230000
CVE-2024-40481,0,0,d82f9452819eeadc6328f6b92c8888f503a8260a868e9cfae3c7009725c43c4b,2024-08-15T13:58:16.033000
CVE-2024-40482,0,0,266582d1863cb6f9cacd62450b573030e5accf0b5228135aa6d1f7c171d7bab5,2024-08-13T01:13:50.130000
CVE-2024-40482,0,1,6a6efb225f2d1df9f4214be70a3ce35675a07dc191321a4d71af6b98e29aaf40,2025-04-28T14:32:00.203000
CVE-2024-40484,0,0,1b66c3eaa0e6379cfa70f895317e11d73e311cd0bc5454c518db9b1e0b2cd179,2024-08-15T13:59:35.813000
CVE-2024-40486,0,0,d698075353303498a2db5d19141e90d62f8a7e4fb3f59884deee03e270025f14,2024-08-13T01:13:52.383000
CVE-2024-40487,0,0,80f40b446727615aa7e23f0d132a3666dbc5775dc8a0bbcc5d383612b5712a97,2024-08-23T15:35:06.307000
CVE-2024-40488,0,0,d28f79bf5316ea5f1cca14b30243cbda5679bfde1552dc26f219c697d2ef444e,2024-08-13T01:13:53.230000
CVE-2024-40486,0,1,cde41397685b1b76952cb8ca4c533c5be95452075620945321445f9b77c4a148,2025-04-28T14:29:24.907000
CVE-2024-40487,0,1,c1c444c493c45a57e2593b7c8ca9d88dc5ae2268819fae610a46ec7876ed6500,2025-04-28T14:28:51.710000
CVE-2024-40488,0,1,ad22cf5d2ab3c9ffc78f1597bec32960e2b4fbdd5e0d003a7a7a0e08f406b162,2025-04-28T14:24:28.293000
CVE-2024-40490,0,0,dff45e8b937b0d43e514699f6678cc1eb9310868386eff11863fd2135561092a,2024-11-04T21:35:05.530000
CVE-2024-40492,0,0,15d7a965787ba65f0b0c3a9bed6ce34898e8762185902bff45ae0d0229ab4c68,2024-11-21T09:31:10.977000
CVE-2024-40493,0,0,d8cc68a495620dcb2d28bb34338d4bad4b040e899e98ffb2db4c475330153317,2024-10-25T17:01:22.433000
@ -266769,11 +266770,11 @@ CVE-2024-42790,0,0,539360a9beda973ab08fb912d592087f677c6fb9a6fff6589cd7f5b776b9b
CVE-2024-42791,0,0,02ed9b68cf0104e47b6bfe6d7010a50b9ef1323336267bf9e897fa9cd2d940d2,2024-08-26T19:35:30.910000
CVE-2024-42792,0,0,d46d80558cda01ef420339b2588d51cdd59e10dffb1a2c4145461835bf0c2904,2024-09-05T18:35:24.220000
CVE-2024-42793,0,0,c32fe29f81a44e565c3a5216abb9d035104b36adb22a5629ff920d51df01d239,2024-08-30T15:56:51.510000
CVE-2024-42794,0,0,cb31f4d1d3a65655a7981910b73b7afb3f70bfecfb91294cb64754ea3d033a46,2024-09-20T12:31:20.110000
CVE-2024-42795,0,0,dc95748e45ada2ed6217b8e00be53860a7a0b08b00faa6bbacb60135635b53bc,2024-09-20T12:31:20.110000
CVE-2024-42796,0,0,519ab154d872fb06894f2be4372dfddd252381e87cf9c061dd6fa4e1b48c0873,2024-09-20T12:31:20.110000
CVE-2024-42794,0,1,1388760710e98e4dd9825c92a0c1b25ba5d76a571c56cd23ab0c01d9cfa0bd60,2025-04-28T15:09:59.570000
CVE-2024-42795,0,1,4b1825186993e94584d1caa74cd7c10ecb55f2957c94abd67a0e8bfcfe5a76c2,2025-04-28T15:08:25.213000
CVE-2024-42796,0,1,f3013659b81b414b232c6879971f4ee4e0d060103a8264ca54b3014f1fe3f548,2025-04-28T14:56:46.983000
CVE-2024-42797,0,0,b0ffe521c0bda597641c9c63f096241cab44c6e592ff9c6671135d9a88355e07,2024-09-26T13:32:02.803000
CVE-2024-42798,0,0,7641c62fd524e532def64c945e40bae6882a3bef91b1594b00330f3ffdf8d905,2024-09-20T12:31:20.110000
CVE-2024-42798,0,1,b6a15ed14ab901d8f830c1c2ca39552d9c52c3ccb25a03c7d550c70943dff7af,2025-04-28T14:56:09.830000
CVE-2024-4280,0,0,b3797ff2151727941d9c366b289b5d3e0b88350afb872404e2bdcfe0d7122163,2024-11-21T09:42:32.167000
CVE-2024-4281,0,0,61e5371b0a3255e76472e43eacd6c1c0207d9397155487a12c704d61028dcc77,2025-02-03T18:53:40.487000
CVE-2024-42812,0,0,163e07a54ddac84e7821d0efc800bc7e7d10ae1d47903174af8c3b5ac8976f4b,2025-03-17T16:15:22.480000
@ -266866,8 +266867,8 @@ CVE-2024-42988,0,0,5fef959cbc78ebe08189d85f59ac43355192595ed5bb119fd152c126c45c0
CVE-2024-4299,0,0,06ff6656c614a1eb297948d61726a31acef16b15b4f4cc0e0cfb9d02f54c7a70,2024-11-21T09:42:34.330000
CVE-2024-42991,0,0,8c4440572b8c1b15f9e28e1fd419725aea046bc3d3f09f5e12a0e76f85c0bdaf,2024-09-03T19:40:46.783000
CVE-2024-42992,0,0,922ec86108ffde155b16bab8bce05d736126b3c84831d9a4ac12e72887280de3,2024-08-26T15:15:08.593000
CVE-2024-42994,0,0,47a47d7a4496fbb4be0c8919660a2bc390f162500de5ed0c546e02d118a1f1d5,2024-08-19T13:00:23.117000
CVE-2024-42995,0,0,73928fa11894c7bb88c7b00b60cb9e97c2f3d2eacbbb9d748c7e65dceed81641,2024-08-19T13:00:23.117000
CVE-2024-42994,0,1,9d999392425042623e15f7faa35559c12373567a5bd93ad11d5f5b767f6d9226,2025-04-28T14:10:13.853000
CVE-2024-42995,0,1,68c4e42f2f1f42bc08e5e10ffbd4b4428bbbaf157c94fda70fbf4af56c25082e,2025-04-28T14:09:10.273000
CVE-2024-4300,0,0,91c6796b7b00ac208d0ef970c233086a0adcf2f87abd1ccbd0345b3366886d09,2024-11-21T09:42:34.457000
CVE-2024-43005,0,0,90be3bacc36bee38568ac0616e5a259a15f0b18f629aac335dac5a60c517ea07,2025-04-21T14:59:47.323000
CVE-2024-43006,0,0,6f99e55991478cb76d4ae41fc977e7ae067e6c2daf2293b36eecaf1e69677bdf,2025-04-21T14:59:34.717000
@ -268192,12 +268193,12 @@ CVE-2024-4456,0,0,9e256113ce6b5f434b1029225d9b7c490634452bbac2479c1f026431fd87fe
CVE-2024-44563,0,0,5199f8441754771b5dda361a721b2fbc485484332750808462a845349142050c,2024-08-27T13:43:26.300000
CVE-2024-44565,0,0,704a4a34e28ec3aed8b7d29891a7e7fd22dbe7a4261cd86983a70f86adbf6dad,2024-08-27T13:43:46.897000
CVE-2024-44570,0,0,c3f413693b0a67d171f5237e75f3598ab991dbf250c04c0e42a3fd54e1bea849,2024-09-12T12:35:54.013000
CVE-2024-44571,0,0,a9c13e11ec32d25cabe568516bc80bba8663f3b06e2d2dc5f53fcc749d66a0fc,2024-09-12T12:35:54.013000
CVE-2024-44572,0,0,4a32f91d55e111790347c15e6c383a7d7bcdb78371e1cc25bcba1170473f2ab0,2024-09-12T12:35:54.013000
CVE-2024-44573,0,0,2f0de06f30df5693ea0832bd1477898fe876fe09e8b1c397168545c7d90f980c,2024-11-01T19:35:27.177000
CVE-2024-44574,0,0,0ac30f53a8403481d3e53068e545f9d6b0d9848f97ca5145343590384ace9338,2024-09-12T12:35:54.013000
CVE-2024-44575,0,0,a2dfcd30da86654b1601cf89030c855e53ba6b1465846e0f94ea255214477420,2024-11-25T18:15:12.667000
CVE-2024-44577,0,0,86ef7b12524494f408d6e73b8d9a0cc3a595a4f00b0e6d5c87753c9c6567cbb6,2024-09-12T12:35:54.013000
CVE-2024-44571,0,1,2c40131898ec7a9c56a91e7756c62636f116dc6e5677a39ddcbe54a5c651cbea,2025-04-28T15:22:14.460000
CVE-2024-44572,0,1,4f4ead38e06948d091f8d1e12c653b9f93f098030647a6be11450d4901ec7d86,2025-04-28T15:20:25.193000
CVE-2024-44573,0,1,cc255c259019816f3146a3ebd697d11943657aabe2dbb9f6bc11d051c40e07f3,2025-04-28T15:18:27.100000
CVE-2024-44574,0,1,250840f6a5b68f0596aadb312c28af191e71501ff153313f8404b9b56d3dcb80,2025-04-28T15:16:15.657000
CVE-2024-44575,0,1,2fdb4523fb93480e17a81cb2289c26fd5b8fb4bd885808938c0dc8387a7e0173,2025-04-28T15:14:44.490000
CVE-2024-44577,0,1,012cd3687489f6b683572bfff38cebfa29461ab1df5e35223241e335c2144a6f,2025-04-28T15:13:42.720000
CVE-2024-4458,0,0,d181cdfe1239b7370e0229e24ced49e59c93df8ded36a14106b44f2e538fe3b1,2024-11-21T09:42:52.170000
CVE-2024-44587,0,0,a5e1f3ebd4d6bf6589458feb9c709eaa46f4397db0fc7239eceb5c9b4e9301cb,2024-09-05T17:44:56.007000
CVE-2024-44589,0,0,efe6dd10612c3f4023c557d137bbb3d918a6e4892340cf75c11b9c76638fa63e,2024-09-20T12:30:17.483000
@ -279887,7 +279888,7 @@ CVE-2024-8368,0,0,cbd58d02608421226ccc3e5ed1266e5c25af06684456963a09ab875beeb4b4
CVE-2024-8369,0,0,a6d05ac94fd162bcee8803884a010b60435524cf6e0d9e13d056a1897ad22b6c,2024-09-26T15:43:20.720000
CVE-2024-8370,0,0,6ff247f0498c9a9b7066f4ad89c0a9d54e8c78b0a7b7e46d47dc3aa51aeb81d2,2024-09-03T14:15:17.787000
CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000
CVE-2024-8372,0,0,44c699b1f3a3e29a193bc9101ff8d192db8f9758ab2c51fe9fafb4abd6243d71,2025-02-12T20:14:39.330000
CVE-2024-8372,0,1,712ae3556095fe97ae3ecc479945a9ea4cf01b8730ea7b80d21ea609bf958a8e,2025-04-28T14:15:20.107000
CVE-2024-8373,0,0,11487d08657f4ba3b88ea7448ca7eeca5854e7d9e363edc87b0e7b98253dceda,2025-02-12T20:15:05.360000
CVE-2024-8374,0,0,ca02cb1d8f9493301326b3f2ebcbf769706c4933bc89729cb22baf7e425cf724,2024-09-16T16:44:42.403000
CVE-2024-8375,0,0,6d034a249584f3f3249aac9575cef27d1b8e645fd1ceb9646e6f860db02d62b5,2024-09-20T12:30:17.483000
@ -284959,6 +284960,9 @@ CVE-2025-23368,0,0,3fba7751170fbf245919938130180b8631c2c01153566e23c5e60aa4599df
CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000
CVE-2025-2337,0,0,7d9e5607ad2b02dfc242a3305f849e66226e5392d822e3a7a605b0e9bacb542e,2025-03-17T15:15:44.983000
CVE-2025-23374,0,0,dc7fc0938dfddbb9f9d96945d0cf484d16ace6397f0b6d455113dea4502470b2,2025-02-07T20:09:28.717000
CVE-2025-23375,1,1,60a30d666f924aa2a1fbd0b350cf2ba4f1fb00c61bf50d7a92b2da19469c598f,2025-04-28T15:15:45.157000
CVE-2025-23376,1,1,99e3f948ddf7a678d5b136c1473e9784a345dad6cf941a73ebe22baa711ae193,2025-04-28T15:15:45.303000
CVE-2025-23377,1,1,c7548c88f400297aaf76213175c31e191929777001aa7062816fa34d035e2829,2025-04-28T15:15:45.437000
CVE-2025-23378,0,0,7d1f583ba2fbd4a87629a0c6e9b1a82753dab9032ddd798f8461f250af5dc576,2025-04-11T15:40:10.277000
CVE-2025-2338,0,0,d6a145ee9d99f0b331d4e327057f954207c4362f81df3d1dbf4d76a1b480aa57,2025-03-17T15:15:45.113000
CVE-2025-23382,0,0,22d0333b6ebd7b3c598a3add3cb34bf6adf53ccfd12bc4731614dfff20d58612,2025-03-19T16:15:30.787000
@ -286784,6 +286788,7 @@ CVE-2025-25770,0,0,97e9cbcf9f5eb368db8f03cd6097bc99f8f3fab4a945a4e034edb2a9ce72d
CVE-2025-25772,0,0,049a4d8ccd7e92d8a6c37014ca81c63552e30fbd0e2bdc0e271ff3963136769b,2025-02-21T22:15:12.813000
CVE-2025-25774,0,0,217aaab1390f6b1eba60d1bc1ee5dcd1167d8b5507491fd4cc7d4a7ca3945256,2025-03-12T19:15:39.777000
CVE-2025-25775,0,0,5544670cc9a7add259c6e5cbf53cd850470977944146ac06f99bc3b124b05057,2025-04-25T18:15:25.937000
CVE-2025-25776,1,1,569bad96221a4fb7f5d7ff11127e82bd4d257fb2f6a6b6e71240b92b84243bf0,2025-04-28T15:15:45.587000
CVE-2025-25777,0,0,45f8b3c1c1f9d7109212dde9ce59be38e9992e6e24b2477c4857a0d7ca8e285e,2025-04-25T17:15:18.143000
CVE-2025-2578,0,0,d4dee3e12d3294c1c6910c7eef7307144aa2b73a2adfa63b47bbc637e9cbd042,2025-03-28T18:11:40.180000
CVE-2025-25783,0,0,6329df69fd0a54ba6d0f31849a17600b168da9709376108915818dc3764ea037,2025-04-07T19:11:53.150000
@ -290315,7 +290320,7 @@ CVE-2025-32464,0,0,d585900889b901117e0fe728cc5e64b12123c28db643e71ecaab58b676037
CVE-2025-3247,0,0,de417f93083f53a095a331b7f7a4a52b9b1338fe061d7ed48128d633e68ff031,2025-04-16T13:25:37.340000
CVE-2025-32470,0,0,7dbeb6b6cb094fd7f696e62a410c872fc392f11a7c72598439cf161f2bb1ead2,2025-04-28T09:15:20.643000
CVE-2025-32471,0,0,d22d1b90bf02f3583666588af972e5f20ef3a20c8b44c857c2696eed80c41065,2025-04-28T09:15:21.263000
CVE-2025-32472,1,1,fce3c184bf175e1d727111b51d6fafe6a64818eddd51d33f1f21b4c8d2601bd8,2025-04-28T13:15:23.053000
CVE-2025-32472,0,0,fce3c184bf175e1d727111b51d6fafe6a64818eddd51d33f1f21b4c8d2601bd8,2025-04-28T13:15:23.053000
CVE-2025-32475,0,0,cf74498a36221a51f220d05d078ed063eee4c8ce48d68258cae808bc296530bd,2025-04-17T20:21:48.243000
CVE-2025-32476,0,0,9d54d65167184e122be5c3a790d5ad19d5abaa6b052713e592bcb27d26085427,2025-04-09T20:02:41.860000
CVE-2025-32477,0,0,6aaeb344af7fac729d48ed1cd0817d6c11c34e76428c0bd5b074c3df21934506,2025-04-09T20:02:41.860000
@ -291259,18 +291264,18 @@ CVE-2025-39596,0,0,e173976a1c0999b01b788ac1a4c5ae24f6505527b92ae9fe5f45ca8a72d79
CVE-2025-39597,0,0,b362997db93d9bfea0d7af44af4fd221eb0b25a2a82395ff55df61546df84055,2025-04-16T13:25:37.340000
CVE-2025-39598,0,0,73d622048aeed09278774e13f22cb598b1a5cb08b2f1dd7ec3313a376059ffea,2025-04-16T13:25:37.340000
CVE-2025-39599,0,0,091138247dcd1675bb93a1a469c4c7e89efe9b80c6a9739e4d163c5f536db88d,2025-04-16T13:25:37.340000
CVE-2025-3960,0,0,0a205fc71590454f80109f0a1ee8ee5a9fa54132db4db7c45917814b38948f8d,2025-04-27T06:15:14.870000
CVE-2025-3960,0,1,9677322420fe33e07dfc504ad7254ea1d626cb41f3d5bf0542d2405976ebbf7a,2025-04-28T15:15:45.817000
CVE-2025-39600,0,0,71f55bfcced2bb7d7f35d4ab207853635aec1cc4573a3ee9f10ef122db1f0de7,2025-04-16T13:25:37.340000
CVE-2025-39601,0,0,4f2eb6f0c2c624c12002346e13c479a2ea3b462ff0c42b3b14b9783c236c648a,2025-04-16T13:25:37.340000
CVE-2025-39602,0,0,372857ab0b3fa589d5d3849a523521babea3aee49aea0f2c09c05c2852655522,2025-04-16T13:25:37.340000
CVE-2025-3961,0,0,45a7ac44f384c30e3fbb9f668e36f375f4d1331a1daa19419d9d2a8c22592190,2025-04-27T07:15:15.307000
CVE-2025-3962,0,0,346464949fea6dd25a02f68fe26d10089c971b819db5bc3379dd490e49dc640e,2025-04-27T07:15:15.580000
CVE-2025-3963,0,0,08e91f8172cd60fb1f81af6801be8a8df69f0b804a3726797c783fc055a1c6e2,2025-04-27T08:15:14.353000
CVE-2025-3961,0,1,4bac8fa6ffd06eead33e6e370e63a9d828b21c8d9f02a9990e5d2f449b575654,2025-04-28T15:15:45.943000
CVE-2025-3962,0,1,509120d034512bf7590ee71a042f7320fc22247348ecd1057a0702893aabd58a,2025-04-28T15:15:46.060000
CVE-2025-3963,0,1,71c436a30c3b10d07aaef3ba1920b96268b7af99010ea47f98671a9f77ec2757,2025-04-28T15:15:46.180000
CVE-2025-3964,0,0,b21fb1af90e49351c094d0c93db5350a4a1ed4c9c3c93e6bf7307e295306726c,2025-04-27T09:15:15.540000
CVE-2025-3965,0,0,a17d5bd0b47e8064ef7c9d5e1993630e1dc56ecc7264405e35a73c3f20bfee4c,2025-04-27T10:15:14.627000
CVE-2025-3966,0,0,ec73bdd3843a77f5bf4f961981167ab50a0b1b584f442db8a5830f6f3af37085,2025-04-27T10:15:15.717000
CVE-2025-3967,0,0,a757485c83f7ad3ae23444f7f56db24945a9a40f1e3d1780685fe14f9596cb56,2025-04-27T11:15:16.743000
CVE-2025-3968,0,0,ae59d296b5fd013d095aff5042674e9e502e1410c13e6a6da34c3026db0e7c21,2025-04-27T11:15:16.950000
CVE-2025-3966,0,1,1d09051196710df394b8716799ff77adb1274f7749209046c5ec89183797b557,2025-04-28T15:15:46.290000
CVE-2025-3967,0,1,375e3af67e01a929adfbae270af5ba8b0cc708d97363f459d8438dd196930c84,2025-04-28T15:15:46.410000
CVE-2025-3968,0,1,9a203e8ad808a1fd51353ba4c2b2977bd9e3577749fb00ee64ccbcdb0f779556,2025-04-28T15:15:46.527000
CVE-2025-39688,0,0,98c7c61fe32c2ce6358a9d7ef0df54915bb47bee498593264d8ad933fcce6211,2025-04-21T14:23:45.950000
CVE-2025-3969,0,0,e13cfaa079ae5e2ea512c3bd056969d8efef50ef70aac260842aa3e5c549567b,2025-04-27T12:15:14.077000
CVE-2025-3970,0,0,7dfe31de7823dca76a8f72ec4f37c8d851a494db013815863a946195bede5d97,2025-04-27T13:15:14.550000
@ -291278,17 +291283,17 @@ CVE-2025-3971,0,0,b6a0911b8d8d327777a5907887cb538046833daa6c5cee410dad7fc2d8c291
CVE-2025-3972,0,0,575245ec139ee05243662ecc4693f08b08894c5030048b9cb53fdb6e9c2ce858,2025-04-27T14:15:16.240000
CVE-2025-39728,0,0,1aabeb48c74961651a085e70675ac1fbb7850a26c8e3690479606fce3eed8d57,2025-04-21T14:23:45.950000
CVE-2025-3973,0,0,7185a71a7968bab05d8a7ab2de6648dc249e6a8df96171e643478fc72e2bd846,2025-04-27T15:15:15.577000
CVE-2025-39735,0,0,685f7725750b068bcf70f45c9b43584f95555d2cf42375499465209022c1892a,2025-04-21T14:23:45.950000
CVE-2025-39735,0,1,96f9db3a9cd8ed512fd20eb50b496781a9c7b7582664dceb1a9693b9f654ce9e,2025-04-28T14:37:34.487000
CVE-2025-3974,0,0,cc88a5551cfeb7a6ea2c180ac6862f1a69f07ceda7e1534a180ace6214ee67cb,2025-04-27T15:15:15.750000
CVE-2025-3975,0,0,ccd2090e0033c3182f35c42461c91b7420600b4065a04085380e97e54751f7a5,2025-04-27T16:15:15.260000
CVE-2025-39755,0,0,1f38e61cb827ac50879084bd3bf4c59efb9767371f960520c29d85a66c57d533,2025-04-21T14:23:45.950000
CVE-2025-3975,0,1,62bf110e98456b96adbb0e1d79c9b53117e1bf71d76b6104b5a677fa2f81ce42,2025-04-28T15:15:46.760000
CVE-2025-39755,0,1,9592dfcb27feea4aabb5a7ba0dc0c6514650aa209fd5fe2f3ededbb735ed12fd,2025-04-28T15:32:46.553000
CVE-2025-3976,0,0,13905d0f00709e6872151e7ad1b1a6c91b55e9419f2a701304870aa7e8e601fd,2025-04-27T16:15:15.433000
CVE-2025-3977,0,0,5e645294bea4f955dbd0c8bfe2e4d659f8a6cbaeaef4d07a6abec039717e4035,2025-04-27T17:15:15.853000
CVE-2025-39778,0,0,fe7c9bb969991c6f8bd7e817623bae52cecda002e042590bfe971c7c81dc9221,2025-04-21T14:23:45.950000
CVE-2025-3978,0,0,2ae726000475a1877b6d2b2bc2bce0aefd6ddc7a5b797a2eec055d71b6e4c1a9,2025-04-27T17:15:16.030000
CVE-2025-3979,0,0,f4d2791ebc027f4f4851dce9ea15411bb525aa09eceed7cb069e5ffd2cf0f1ab,2025-04-27T18:15:16.020000
CVE-2025-3980,0,0,c60e8fd71f58158175a8f0778b502b82e82edff0ca359aaa3a416b667c30a069,2025-04-27T18:15:16.237000
CVE-2025-3981,0,0,e00538d9c56dd754fe25e8b3e5c7f162e04e282f768ed8abdbece459893339eb,2025-04-27T19:15:15.750000
CVE-2025-3977,0,1,c1e50e78d343274621129f20445321598604c72f47885898eb78406f21e52a8a,2025-04-28T14:15:21.520000
CVE-2025-39778,0,1,fc2e9a1fb637bb73885f33b2d5ce93fc454f2a441f142db493ef48df409e1554,2025-04-28T15:37:34.230000
CVE-2025-3978,0,1,bc92ce55af996f6b405f8d8b6d897abb53d44677d7371d599fe1529394f5a206,2025-04-28T14:15:21.640000
CVE-2025-3979,0,1,3eed181a4a18815f5d24e2e7c49bc0dfd20618c1736a3e4c48366a678e45673f,2025-04-28T14:15:21.767000
CVE-2025-3980,0,1,ba3e464d7879015ce3f1e955f56f48a0c9c49dc48a63db59cfbd3db7bbe9d790,2025-04-28T14:15:21.890000
CVE-2025-3981,0,1,a9636669d8d4cb9261149c2b06c3c7be44e8490c89b8b9be4fb90813c912214f,2025-04-28T14:15:22.013000
CVE-2025-3982,0,0,4f8f549d1d80deb736d2fa8a9bf8c95ff99706664721ec9ea5e797ffff0b5328,2025-04-27T19:15:15.923000
CVE-2025-3983,0,0,25cef30fdb4fe10ba7219695edb63044f6f8ab36f7472ef6a7410a1f5e2146f4,2025-04-27T20:15:15.350000
CVE-2025-3984,0,0,c91dac686fb472be23da0ee0c6a53588be8c31d73e3e88b2f873b4f69af09b70,2025-04-27T20:15:15.537000
@ -291326,10 +291331,14 @@ CVE-2025-4014,0,0,f259da298f4f8af0d94e8db357ade1efd3596c515c364d9d5ad548177efecd
CVE-2025-4015,0,0,232ad8d07784c7f62ca3c92d0470dbab847354aba047abbda5ccbbb5a53b9ce5,2025-04-28T10:15:17.057000
CVE-2025-4016,0,0,16f701a218e4c9c52d5777c88e9d05fa414760ac751896fa6c1b284b8a014d10,2025-04-28T11:15:38.657000
CVE-2025-4017,0,0,9f05b4a2eb6e84cc88a7e99ef8ccfa2b8d02b26e170cf3daf0c31a72832baaaa,2025-04-28T11:15:38.847000
CVE-2025-4018,1,1,b12b51cf30fc2db7d195c2c9ee830ba57f48502213630f4d9ad39d9d3bfacbe7,2025-04-28T12:15:31.913000
CVE-2025-4019,1,1,026f93b3c776aee8c544c5f460bdd25f6379836f2a5d55dda570425a7ee6b846,2025-04-28T12:15:32.093000
CVE-2025-4020,1,1,511fd7ea80791808b10d31addcf8c936b71df14f2c24338c3857d1e24f7e838a,2025-04-28T13:15:24.603000
CVE-2025-4021,1,1,c6b32e73983711a929174c81d1269e862674efafae7a66852d16c04025876af8,2025-04-28T13:15:24.773000
CVE-2025-4018,0,0,b12b51cf30fc2db7d195c2c9ee830ba57f48502213630f4d9ad39d9d3bfacbe7,2025-04-28T12:15:31.913000
CVE-2025-4019,0,0,026f93b3c776aee8c544c5f460bdd25f6379836f2a5d55dda570425a7ee6b846,2025-04-28T12:15:32.093000
CVE-2025-4020,0,0,511fd7ea80791808b10d31addcf8c936b71df14f2c24338c3857d1e24f7e838a,2025-04-28T13:15:24.603000
CVE-2025-4021,0,0,c6b32e73983711a929174c81d1269e862674efafae7a66852d16c04025876af8,2025-04-28T13:15:24.773000
CVE-2025-4022,1,1,a011d38395c9e900e4bcada9858b098f8d7441fd9b3e763ec79c0a9945d82071,2025-04-28T14:15:22.867000
CVE-2025-4023,1,1,85c9398c80f20a209b25f610ddf665ce3506d1e4fe920218361ca91662c22eb5,2025-04-28T14:15:23.043000
CVE-2025-4024,1,1,0ac57cf9887f802b63cc7c5701c4d82c5287aedf4b9f1ab63ff42a695cbedb85,2025-04-28T15:15:47.600000
CVE-2025-4025,1,1,1b1b49f00b16e2bf6d2e9a008bc6dc606c5611760e84fe2041b0af8493c82b9a,2025-04-28T15:15:47.767000
CVE-2025-40325,0,0,21d661e5b65e79dd3cd00a7c9db2e14d6a6a65a1394969a7ad07f16fa08c79ce,2025-04-21T14:23:45.950000
CVE-2025-40364,0,0,e1468b00bb22572a62ec1b141065bed37efcb85f9368d87c29b0ce5bc57ec67c,2025-04-21T14:23:45.950000
CVE-2025-41395,0,0,c0d9bccd77abd47bebe5c3b7233aa41647dd331b6362659738a8c7fec7081455,2025-04-24T07:15:31.600000
@ -291374,9 +291383,9 @@ CVE-2025-43903,0,0,00b37505e4bad1c011979aeeb7ac0f46d600f0a3a2ddd582ccd8bfed7356e
CVE-2025-43916,0,0,681d8be38d92746749b1aa52bc81a99ae8dcb7d5c6c1be22a9ecf0d141bf9654,2025-04-21T14:23:45.950000
CVE-2025-43917,0,0,6cbc8a0cc4b5f4a260ea1bcaa2e61bc873dc43de357e9552c071e8ec2a49bca5,2025-04-21T14:23:45.950000
CVE-2025-43918,0,0,c6804f12f91fd2a33114034d2a7e21d55151c0cf36b011a784bd1cc327d47c14,2025-04-21T14:23:45.950000
CVE-2025-43919,0,0,55ad852a78495f6e218472fc33e0acbc71b7ed92ab828e832d69c95ea803d68c,2025-04-24T16:22:37.117000
CVE-2025-43920,0,0,05b3e4c1a5c3a0593ddd3faa440158c8a71103e88ab91b374b9c65df4142c52d,2025-04-24T16:20:36.953000
CVE-2025-43921,0,0,860aba6699eab477405736f86cb620ec9a60d3be813cd4186e40b0b2a10867ed,2025-04-24T16:16:59.597000
CVE-2025-43919,0,1,755abcb8d09616a195e9d6af1306163e6a8ac43b52edd282a6c37eaf3c4a6f2b,2025-04-28T14:15:22.137000
CVE-2025-43920,0,1,a93ea085d5c9b285842c20a6cabb6e3bd669bd42c39c42462b7c06195a41f1d6,2025-04-28T14:15:22.323000
CVE-2025-43921,0,1,4042bcd81d7e3864da5b8ba4d01fe494ca12b33f201fc6021c6725eb890091e8,2025-04-28T14:15:22.477000
CVE-2025-43922,0,0,78ba59a603bfb99812991a8e1a7955ce6faa943c6ec5cbadbdfa1e2ab9c91614,2025-04-23T14:08:13.383000
CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000
CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000
@ -291452,7 +291461,7 @@ CVE-2025-46272,0,0,6723f88845cee1e1cbb0cc8f1bfd044966d04b97767ef53e121be0034a68b
CVE-2025-46273,0,0,d17f1c243c8f331f47f487cb9b89ff51d5b9a1113a60ac7af8fce23396651144,2025-04-24T23:15:15.673000
CVE-2025-46274,0,0,6278bbb431335706a41e3628a533ceb0ce48f92d57ea7b392bf579f553e8b8c6,2025-04-24T23:15:15.827000
CVE-2025-46275,0,0,a7109528e796df3e754eeba6ee8017193e4e96b7dbaf347dc967b55909d9e9a5,2025-04-24T23:15:15.977000
CVE-2025-46333,0,0,4717c7f4cce97ab4f0a603aa816c1dd9bf72647fab1bd9590976420890c69a90,2025-04-25T21:15:39.577000
CVE-2025-46333,0,1,3f604e4ec484052a98804d8813a23cfbac08509ef9dc35db23d61edbd2f31482,2025-04-28T15:15:47.057000
CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000
CVE-2025-46375,0,0,c7cadd24d0c0ef6263c2e4f0e993c1b14e1cbac838119ad2f4f42dcfb3b1b113,2025-04-24T03:15:15.867000
CVE-2025-46376,0,0,4a4eb88dda9426fffae031e9cc4c1cb39c01ffb8fef76394b4584f59d8624ab6,2025-04-24T03:15:15.917000
@ -291577,7 +291586,7 @@ CVE-2025-46654,0,0,572c4d63fa2f8afca64ec12e1381813d160fa2c2ee84d4e0448e47cdcd412
CVE-2025-46655,0,0,a9f672e75f586721e3ec47d88a24167a5da40f45a10ccbe0303bfb6061c72944,2025-04-26T21:15:15.260000
CVE-2025-46656,0,0,696b18d293f3e47530d9a462ec4dcce6fe7c7473fa83e2a90e8336464b46aa30,2025-04-26T22:15:17.260000
CVE-2025-46657,0,0,61b5714a3945d18f5b1028d9d01f06343b4f515928a414fd8f4acc9db2248fff,2025-04-27T17:15:16.193000
CVE-2025-46661,1,1,1b88a1421b991af9f83e00012e017bc52e3d2608548a1f64585fab31eb98f621,2025-04-28T13:15:24.117000
CVE-2025-46661,0,1,2337e0af0721676a9a8551219ea6d6cbd8b1bdbec9e22e2c7f7acea8c59de4a9,2025-04-28T14:15:22.637000
CVE-2025-46672,0,0,a515f04f2684525b908fbd5bf52c62317ae3f104cec7ce6d3fbe0f544f2f50f4,2025-04-27T01:15:44.327000
CVE-2025-46673,0,0,b4b185c7af04fb38cea193788026d34ee5cbd860f38177d871857854e4306632,2025-04-27T01:15:44.477000
CVE-2025-46674,0,0,46444152edd713c1307e6ccc5d1033b322cbe1d07cb6f10dea38fc2301d3d28e,2025-04-27T01:15:44.623000

Can't render this file because it is too large.