Auto-Update: 2025-04-03T08:00:21.881224+00:00

This commit is contained in:
cad-safe-bot 2025-04-03 08:03:55 +00:00
parent 68ae442cd4
commit 8bd9e27ac7
14 changed files with 1183 additions and 23 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-5598",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2019-05-15T16:29:01.080",
"lastModified": "2024-11-21T04:45:12.387",
"lastModified": "2025-04-03T06:15:40.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -192,6 +192,10 @@
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2025/Apr/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/108395",
"source": "af854a3a-2127-422b-91ae-364da2661108"

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-10157",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-19T23:15:04.033",
"lastModified": "2024-10-22T14:42:50.303",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-03T07:15:40.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/password-recovery.php of the component Reset Your Password Page. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
"value": "A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/password-recovery.php of the component Reset Your Password Page. The manipulation of the argument username/mobileno leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
@ -133,6 +133,10 @@
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-2055",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-04-03T06:15:42.727",
"lastModified": "2025-04-03T06:15:42.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MapPress Maps for WordPress plugin before 2.94.9 does not sanitise and escape some parameters when outputing them in the page, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/a8bfdbbf-6963-4fab-826a-6be770ac72c3/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-30485",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-04-03T07:15:41.110",
"lastModified": "2025-04-03T07:15:41.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "UNIX symbolic link (Symlink) following issue exists in FutureNet NXR series, VXR series and WXR series routers. Attaching to the affected product an external storage containing malicious symbolic link files, a logged-in administrative user may obtain and/or destroy internal files."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-61"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU92821536/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.centurysys.co.jp/backnumber/common/jvnvu92821536.html",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-31334",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-04-03T06:15:42.903",
"lastModified": "2025-04-03T06:15:42.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Issue that bypasses the \"Mark of the Web\" security warning function for files when opening a symbolic link that points to an executable file exists in WinRAR versions prior to 7.11. If a symbolic link specially crafted by an attacker is opened on the affected product, arbitrary code may be executed."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-356"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN59547048/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.win-rar.com/start.html?&L=0",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3142",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T06:15:43.200",
"lastModified": "2025-04-03T06:15:43.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Apartment Visitor Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /add-apartment.php. The manipulation of the argument buildingno leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Lena-lyy/SQL/blob/main/SQL3.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303047",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303047",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.525320",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-3143",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T06:15:43.467",
"lastModified": "2025-04-03T06:15:43.467",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Apartment Visitor Management System 1.0. Affected is an unknown function of the file /visitor-entry.php. The manipulation of the argument visname/address leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Lena-lyy/SQL/blob/main/SQL4.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Lena-lyy/SQL/blob/main/SQL5.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303048",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303048",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.525321",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-3144",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T06:15:43.677",
"lastModified": "2025-04-03T06:15:43.677",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in MindSpore 2.5.0. Affected by this vulnerability is the function mindspore.numpy.fft.hfftn. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"baseScore": 1.7,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://gitee.com/mindspore/mindspore/issues/IBVKM8",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303049",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303049",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.525333",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,133 @@
{
"id": "CVE-2025-3145",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T07:15:41.290",
"lastModified": "2025-04-03T07:15:41.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in MindSpore 2.5.0. Affected by this issue is the function mindspore.numpy.fft.rfft2. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"baseScore": 1.7,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://gitee.com/mindspore/mindspore/issues/IBVKM8",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303050",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303050",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3146",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T07:15:41.517",
"lastModified": "2025-04-03T07:15:41.517",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Bus Pass Management System 1.0. This affects an unknown part of the file /view-pass-detail.php. The manipulation of the argument viewid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/nabiland/cve/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303051",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303051",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.525340",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3147",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T07:15:41.707",
"lastModified": "2025-04-03T07:15:41.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-subadmin.php. The manipulation of the argument sadminusername leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/nabiland/cve/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303052",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303052",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.525388",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-3148",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T07:15:41.927",
"lastModified": "2025-04-03T07:15:41.927",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in codeprojects Product Management System 1.0 and classified as problematic. This issue affects some unknown processing of the component Login. The manipulation of the argument Str1 leads to buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"baseScore": 1.7,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/LxxxtSec/CVE/blob/main/CVE-Product_Management_System.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303053",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303053",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.525395",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-03T06:00:22.226864+00:00
2025-04-03T08:00:21.881224+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-03T05:15:42.363000+00:00
2025-04-03T07:15:41.927000+00:00
```
### Last Data Feed Release
@ -33,25 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
288277
288287
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `10`
- [CVE-2025-3136](CVE-2025/CVE-2025-31xx/CVE-2025-3136.json) (`2025-04-03T04:15:38.540`)
- [CVE-2025-3137](CVE-2025/CVE-2025-31xx/CVE-2025-3137.json) (`2025-04-03T04:15:39.307`)
- [CVE-2025-3138](CVE-2025/CVE-2025-31xx/CVE-2025-3138.json) (`2025-04-03T04:15:39.733`)
- [CVE-2025-3139](CVE-2025/CVE-2025-31xx/CVE-2025-3139.json) (`2025-04-03T04:15:39.940`)
- [CVE-2025-3140](CVE-2025/CVE-2025-31xx/CVE-2025-3140.json) (`2025-04-03T05:15:40.777`)
- [CVE-2025-3141](CVE-2025/CVE-2025-31xx/CVE-2025-3141.json) (`2025-04-03T05:15:42.363`)
- [CVE-2025-2055](CVE-2025/CVE-2025-20xx/CVE-2025-2055.json) (`2025-04-03T06:15:42.727`)
- [CVE-2025-30485](CVE-2025/CVE-2025-304xx/CVE-2025-30485.json) (`2025-04-03T07:15:41.110`)
- [CVE-2025-31334](CVE-2025/CVE-2025-313xx/CVE-2025-31334.json) (`2025-04-03T06:15:42.903`)
- [CVE-2025-3142](CVE-2025/CVE-2025-31xx/CVE-2025-3142.json) (`2025-04-03T06:15:43.200`)
- [CVE-2025-3143](CVE-2025/CVE-2025-31xx/CVE-2025-3143.json) (`2025-04-03T06:15:43.467`)
- [CVE-2025-3144](CVE-2025/CVE-2025-31xx/CVE-2025-3144.json) (`2025-04-03T06:15:43.677`)
- [CVE-2025-3145](CVE-2025/CVE-2025-31xx/CVE-2025-3145.json) (`2025-04-03T07:15:41.290`)
- [CVE-2025-3146](CVE-2025/CVE-2025-31xx/CVE-2025-3146.json) (`2025-04-03T07:15:41.517`)
- [CVE-2025-3147](CVE-2025/CVE-2025-31xx/CVE-2025-3147.json) (`2025-04-03T07:15:41.707`)
- [CVE-2025-3148](CVE-2025/CVE-2025-31xx/CVE-2025-3148.json) (`2025-04-03T07:15:41.927`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `2`
- [CVE-2019-5598](CVE-2019/CVE-2019-55xx/CVE-2019-5598.json) (`2025-04-03T06:15:40.680`)
- [CVE-2024-10157](CVE-2024/CVE-2024-101xx/CVE-2024-10157.json) (`2025-04-03T07:15:40.593`)
## Download and Usage

View File

@ -140815,7 +140815,7 @@ CVE-2019-5594,0,0,8935e7b74d5896342c8c4381f0a3a609ce5940d3194cc5b4b6abe5ab7668f5
CVE-2019-5595,0,0,ae95c6ba813b964bbeef9fbbef02421b244db6978ab367cd6e99e6bfa48d8664,2024-11-21T04:45:12.020000
CVE-2019-5596,0,0,04e7bb70289bfd72d58ddd1379058b9d099a2f9dee07c7679a0595fef145703d,2024-11-21T04:45:12.130000
CVE-2019-5597,0,0,e623e896734cec08384d46d70639e8307cfaa17b18b63dade5e962c283714ccb,2024-11-21T04:45:12.257000
CVE-2019-5598,0,0,49858b9fa2bbaf206e166b56ff6b92dd52bcb6568b7766a27af2d218a8e4b548,2024-11-21T04:45:12.387000
CVE-2019-5598,0,1,0c49dc58c2fa62e4e88dc219764afc2efad671e82d41bea0b3684b2ab34f7706,2025-04-03T06:15:40.680000
CVE-2019-5599,0,0,c0e2b58c3ae26a9dc22d5f7d08c9f58ede2b0dccb4d4bf3be5b4d8fff2be0c45,2024-11-21T04:45:12.517000
CVE-2019-5600,0,0,9e9a9b4e1f4ce0f5393ef7f3e988cc2d113620303e62c223f2453fb9f17a493d,2024-11-21T04:45:12.653000
CVE-2019-5601,0,0,99af976ad83f1ad92f773423141ac9603fa1704242259fdda43b3ad8307fc84e,2024-11-21T04:45:12.767000
@ -244610,7 +244610,7 @@ CVE-2024-10153,0,0,7bc579e7bec45689a036cc79b1aa4411e6ee6dd2be550c900171b69d6d417
CVE-2024-10154,0,0,881067e74e39ed69d1e96d86c551a91f65aae8723617d9113c95819b20a5b961,2024-10-22T14:44:47.807000
CVE-2024-10155,0,0,69ecac29dc7d85f6dc32fa941cb477f1015cc4923a81013963fc8d1644072128,2024-10-22T14:43:42.607000
CVE-2024-10156,0,0,ecc45f2d45ec0f80c7c71287b6cd15b59c38ac5b046533ddc094bf068a506aaf,2024-10-22T14:43:00.543000
CVE-2024-10157,0,0,83888d36a9830229e0a4b2d86fd5dbb627c3a9048e93954967e605076fa07304,2024-10-22T14:42:50.303000
CVE-2024-10157,0,1,33177b41f57194a5cdc12c8dbff6da021724b4e837ee2c015544ff2442e88fa4,2025-04-03T07:15:40.593000
CVE-2024-10158,0,0,e8ebebdac47bde38062bb5d226e1c4df694f16b9811139b95579246f23fc1041,2024-10-22T14:42:26.727000
CVE-2024-10159,0,0,e15abd934f733c827ccd81ce40d53844dce135e8c78e686a5e9446cafd0a0c0a,2024-10-22T14:41:34.370000
CVE-2024-1016,0,0,f9896bef5aa7dc4020d64a45984d4c4245a6f50daf44f8e836870f64804ec467,2024-11-21T08:49:36.187000
@ -282558,6 +282558,7 @@ CVE-2025-2051,0,0,39762f6a6ab838c9c7c8c7045b5c898cc8c8adf302ea2b672648686c9da954
CVE-2025-2052,0,0,e83c7aa2eccb3016f6fe6ee1219a19fb4c9c5f3abb951310ecbb9877f369a143,2025-03-07T01:15:13.173000
CVE-2025-2053,0,0,d81f8831ad291e72c410bd38a7bef93530425fe8afba7724c8cea3f151c76d7b,2025-03-07T01:15:13.373000
CVE-2025-2054,0,0,379a4b72c65195b9c1f74209beae2954b8d8bceddb2685ce00b0169df2ca4267,2025-03-07T02:15:38.060000
CVE-2025-2055,1,1,afa429e456cba4a08c9d040465a431512b3e6c5f2f54487552d485e3b06f04e7,2025-04-03T06:15:42.727000
CVE-2025-2056,0,0,8095a33aa7b878f6a20af2e1f56146fc0a9c6dfcafcbf76d7e26afde35e4dc93,2025-03-14T05:15:42.523000
CVE-2025-2057,0,0,94c62e1813e3383c1c644270c99bce527f5ca9bba506cf96d35fdf67759b586d,2025-03-07T02:15:38.237000
CVE-2025-2058,0,0,f17d74d5176557010d92e84206629b4ae32b579c9df6cd1825b5253f9069cfd2,2025-03-07T02:15:38.413000
@ -287530,6 +287531,7 @@ CVE-2025-30471,0,0,1fa123ff5c95e6c8f98b01edf92c14e5731bc4a7b28b13f232e9d72f6db6f
CVE-2025-30472,0,0,a9a589c92e85a7dd5dc78fc910cf31729074e91942c97c7d1b5338ab1df8371e,2025-04-01T20:28:02.283000
CVE-2025-30474,0,0,eb6c167d1736e5a0a05d76dda95c9383453e456c61b97e97ddf0c32b61180eb9,2025-04-01T18:15:30.003000
CVE-2025-3048,0,0,8c9d9ed36af65f4d6aa3fb74d6647d88f2ae80886b1a7fcca7e2b0a1fc1e20e2,2025-04-01T20:26:22.890000
CVE-2025-30485,1,1,40c2bfc3a7529030acaba7b858cf13857c2ea57bdac4e839daf060735cb16f8a,2025-04-03T07:15:41.110000
CVE-2025-3051,0,0,191e4438cb371e2a15f1e0848098419500c25d30e4bc0eb4a4497eb60bb0a69b,2025-04-01T20:26:11.547000
CVE-2025-30520,0,0,4594ffcb887663f1dc394fd83a45832001aba3082bc418a07983b58e49399108,2025-04-01T20:26:11.547000
CVE-2025-30521,0,0,eee2f839741a5e176cacf865cc6d42d2df432fd3f60c0ff1d8e1355c4ac5b964,2025-03-27T16:44:44.143000
@ -287909,35 +287911,38 @@ CVE-2025-31285,0,0,b172cbeed5ac8088424f5c8980ffb3b75f69e5cd77c077f244769565c0b4e
CVE-2025-31286,0,0,98f9dbfeff2632a739d61c532dd215aeef9aa200787e22f939947f68ec23d274,2025-04-02T17:15:49.290000
CVE-2025-3129,0,0,59b0a635c94241dfa08e31a67437b80001601b3e87b34eddd3148a01f36d8f52,2025-04-02T22:15:21.593000
CVE-2025-3130,0,0,fb2487cf83e92bc2ce03b5c143b00168949c6aec885b5df3006682eb7f439c3e,2025-04-02T22:15:21.710000
CVE-2025-31334,1,1,22df1c93ba536c3038787aa0f054ef511d2e661a66785fc089bb8dccce64b1ac,2025-04-03T06:15:42.903000
CVE-2025-31335,0,0,23839e3692f6b9292f971ac2ba3542c0132ffb2a9a22b6edf4f234426c27d3e9,2025-03-28T18:11:40.180000
CVE-2025-3134,0,0,f183e34c58cd7bfa52ca6390fba281a17c76eb5c23ce4b4f669ceedd2488f2ff,2025-04-03T02:15:20.340000
CVE-2025-3135,0,0,9d56a64675361a09a8b212b75af86a3fa03d2cb1cc819fd91a2e8a929d6b27b1,2025-04-03T02:15:20.540000
CVE-2025-3136,1,1,e122787f854723069afdcb24292900b46a7a386c8e816f1453109a14f38f51a3,2025-04-03T04:15:38.540000
CVE-2025-3136,0,0,e122787f854723069afdcb24292900b46a7a386c8e816f1453109a14f38f51a3,2025-04-03T04:15:38.540000
CVE-2025-31367,0,0,85cd14db2ac76f9194e6a05115a520fe93ce77ad125f659bc4b1625771b812eb,2025-03-29T04:15:24.037000
CVE-2025-31368,0,0,07c9f19a54136c020ece5afe45106551d4106a87fecd0821fbb57cd0575c1b58,2025-03-29T04:15:29.740000
CVE-2025-31369,0,0,25ade6a3774203ee6fdcd4321ce56e82b90112f6538ef50e396382d43bc53a60,2025-03-29T04:15:38.600000
CVE-2025-3137,1,1,7dbbf176cfe69a6bfcf67844ceaa6652135c083a2685a0e3a2a1b987aa4c0242,2025-04-03T04:15:39.307000
CVE-2025-3137,0,0,7dbbf176cfe69a6bfcf67844ceaa6652135c083a2685a0e3a2a1b987aa4c0242,2025-04-03T04:15:39.307000
CVE-2025-31370,0,0,79fdc8cf1348d46f7b63d37f6025aae5b5fea7041ff8807c4f3c14cdafc4bc61,2025-03-29T04:15:38.677000
CVE-2025-31371,0,0,cd370f88c92ee402d4c5aaef8baeb9e083693b4c18cd5565fe7e097d1b4221e1,2025-03-29T04:15:38.813000
CVE-2025-31372,0,0,7a7a683873bc962dfe6aa91ab7aa77a42948f5cb58f2a30db9c2fe953aee9559,2025-03-29T04:15:38.950000
CVE-2025-31373,0,0,f9071278a14d544e1d638810d17e35e9b3cf783fa438c6415cfa720de050a0f8,2025-03-29T04:15:39.090000
CVE-2025-31374,0,0,a0063074d97edd2d0b6a359f9337f2fbc025fc83f5ab0917de6d943a4c010e45,2025-03-29T04:15:39.340000
CVE-2025-31376,0,0,b701b7ba661f1762215842f01eaab352e5cec0fffbde18b5aedc908f1c5af508,2025-04-01T20:26:30.593000
CVE-2025-3138,1,1,de78ebf42f0bfa538b3736d4d683541e6c1b32395e045ff2be2d7bdc619a9efe,2025-04-03T04:15:39.733000
CVE-2025-3138,0,0,de78ebf42f0bfa538b3736d4d683541e6c1b32395e045ff2be2d7bdc619a9efe,2025-04-03T04:15:39.733000
CVE-2025-31386,0,0,42df843cc2ac2bb87523fa10c4b86c9cfeca984ee6e6907b70f825251fac8592,2025-04-01T20:26:30.593000
CVE-2025-31387,0,0,efeeafd47dcaa2c1fe833b1f78eecd6f90d244213e2c3fd9dadef428bb8988f8,2025-04-01T20:26:30.593000
CVE-2025-3139,1,1,38102b143991772fa8965f269a5c5d3a7a1954a7edba1619271b901bddba3680,2025-04-03T04:15:39.940000
CVE-2025-3140,1,1,ef0cac805617f2a84e59a3dfd08137631212c01f79707ef599c2a7633c0a6e4a,2025-04-03T05:15:40.777000
CVE-2025-3139,0,0,38102b143991772fa8965f269a5c5d3a7a1954a7edba1619271b901bddba3680,2025-04-03T04:15:39.940000
CVE-2025-3140,0,0,ef0cac805617f2a84e59a3dfd08137631212c01f79707ef599c2a7633c0a6e4a,2025-04-03T05:15:40.777000
CVE-2025-31406,0,0,5912a412471ff3d877945941ec5dfa793f9b328130992797be8d7429384326a2,2025-04-01T20:26:30.593000
CVE-2025-31408,0,0,4bce0889fff07e9d2af0109421fe58b7234ee5ebf9fa6560ab95ff15e16d923e,2025-04-01T20:26:11.547000
CVE-2025-31409,0,0,82dbb111649d8cf9e26a4c460fca8cf167c66dfbe7749d633be5ad71c1f22147,2025-04-01T20:26:11.547000
CVE-2025-3141,1,1,29059e08783bef3bbfe68d9a87c4635884da13d315c6f1c3e0044ca33eb4cf56,2025-04-03T05:15:42.363000
CVE-2025-3141,0,0,29059e08783bef3bbfe68d9a87c4635884da13d315c6f1c3e0044ca33eb4cf56,2025-04-03T05:15:42.363000
CVE-2025-31410,0,0,d2744125929669a0550251c0ca1a9221dc78cee85634e7974f1b02dfdfbfe3ca,2025-04-01T20:26:30.593000
CVE-2025-31412,0,0,f2a3a75101b5fbb687e484fbb151373c9b65c031636af9fa6343c10e46f352fd,2025-04-01T20:26:30.593000
CVE-2025-31414,0,0,c7c8b152028249fcda3808d41ed059a882fd165da9cc6176d922213c7f3b4129,2025-04-01T20:26:30.593000
CVE-2025-31415,0,0,414e63d224a09cd075a83b960b86b86bc2238dd067741c725e74f347156214de,2025-04-01T20:26:11.547000
CVE-2025-31417,0,0,0d3c1b109fae4b739454cb1a0b8eb7abc566c168fc7a86169fb95a201cbbcd1f,2025-04-01T20:26:30.593000
CVE-2025-31419,0,0,86daefd4cfae6cd0bc5dfe16310f6844d1f9e0f956e501ba1300c694a97deb9e,2025-04-01T20:26:30.593000
CVE-2025-3142,1,1,89dad725a78f99af9996b26eb4fd0b6e3130ff2cdf8b39de58f0a92b7681d0ad,2025-04-03T06:15:43.200000
CVE-2025-3143,1,1,94ecb7e4d681183309e1820ee8aa59c723a65e9bcb295db0aa131fd273d1f89e,2025-04-03T06:15:43.467000
CVE-2025-31431,0,0,9b65447f095eb6450cd16ceaae607c3f49ad8abcc8b0a8029061fac7fc7f6b63,2025-04-02T14:58:07.527000
CVE-2025-31432,0,0,66cb912d57f88bc72b111a0fcfbe419506a386c0afd760e3d30a46c5880e1d8f,2025-03-28T18:11:40.180000
CVE-2025-31433,0,0,29229c0e5e364d182f865fd66896e72801948e3d4a178c39c73725ee177d1d9c,2025-03-28T18:11:40.180000
@ -287946,6 +287951,7 @@ CVE-2025-31435,0,0,0f62c96c036522ad5186e49b737ef2befa37e3c5fad8564550f8570ac0168
CVE-2025-31437,0,0,bb9bebaa1e8049b6f9f323de79f1b89f64d0b8fa50986fd6d4b4769de19a4e05,2025-03-28T18:11:40.180000
CVE-2025-31438,0,0,55b6cc7e6be8d251de6290ec4d11a0ed212ecb2367169b9673e1863d951d6df5,2025-03-28T18:11:40.180000
CVE-2025-31439,0,0,c5c1da5e09db0442f7accb5c1822c26b14e61ab3b8df06836d07f9e6a67a5b2d,2025-03-28T18:11:40.180000
CVE-2025-3144,1,1,23847978f74bd5c821df07e15380e61330db3c22283a620edc833139db216301,2025-04-03T06:15:43.677000
CVE-2025-31440,0,0,fc686f5e7a5560d59dab940c9feae33dbee5619e900c7ecf44ae2d029cdd78a2,2025-03-28T18:11:40.180000
CVE-2025-31441,0,0,086b8131d4f42372de25b0b9c9890c1b9c03533b53378e72946e94576dc09f60,2025-04-02T14:58:07.527000
CVE-2025-31443,0,0,a810a0ca0a57301b9d28937b27cf4f2f7004f4c29319f67b09d54b716d8647f7,2025-03-28T18:11:40.180000
@ -287955,6 +287961,7 @@ CVE-2025-31446,0,0,1abbb4190ab1533ff8924c7127cf1b8e8b97d28f446a1674c1877505eeea2
CVE-2025-31447,0,0,a2e24f812a26cfffba6a6833b02599e438b1d438242739f5ab16be2c4e8d8c7c,2025-03-28T18:11:40.180000
CVE-2025-31448,0,0,dbc24153384cdd280ff0ffbaac62baad727e56a7ed12e4c5d618e4466506b0de,2025-03-28T18:11:40.180000
CVE-2025-31449,0,0,c84e231a93bf4ff01b3aa7a20d0a30116e7a77cc9ce263a8afa09f62ac82d414,2025-03-28T18:11:40.180000
CVE-2025-3145,1,1,3000cce549dc45c0e392fb1580ffbab3ef110a7b9e62e35cffe2f744d4eeada8,2025-04-03T07:15:41.290000
CVE-2025-31450,0,0,2e691b4a20957344fc3f29c67e4ed46d7b1bc532cf783467b3109fc35a7b82cd,2025-03-28T18:11:40.180000
CVE-2025-31451,0,0,22da2aaa904049403ee28b6e4c3472cbcecc3c989354bbd5b0b0a8dceff1b47c,2025-03-28T18:11:40.180000
CVE-2025-31452,0,0,a03b3313f3e1b883743f768c769f3eaf27504279e23c8c00d258d4ea56af861e,2025-03-28T18:11:40.180000
@ -287965,6 +287972,7 @@ CVE-2025-31456,0,0,2bff385e8e0baa2ea87c8a48582c4981407a6004e4d53a30ca1a140f69765
CVE-2025-31457,0,0,94db5c74744c7e3010a6292f6398e658b2f1f4c4bfd962bc226325e8473a53a6,2025-03-28T18:11:40.180000
CVE-2025-31458,0,0,bb420d9150dfa038eb56c1560d5ee862881401033f4e9a66754a4bcb53931cf7,2025-03-28T18:11:40.180000
CVE-2025-31459,0,0,8f530f7b78bbe2c8b9cbd724d2022ba6735ddb60be16f64b7bf05413a18ac804,2025-03-28T18:11:40.180000
CVE-2025-3146,1,1,c7d31b9f5e532f71fbce3ba9471ef5bd327cff2023def95d7ab408fd6a7c2449,2025-04-03T07:15:41.517000
CVE-2025-31460,0,0,09a19caf595f9b29966b1f49149104446c040f2d710b05930c9641719b4fffc0,2025-03-28T18:11:40.180000
CVE-2025-31461,0,0,bdc620dd49593c387f4a803645c68b850c06521048c648b5747c9585ddbd7413,2025-04-02T14:58:07.527000
CVE-2025-31462,0,0,5f9812a3f73c9de6fa4e1f00a3593337b0bd5f2ec7e8395e765dbef36c70e055,2025-04-02T14:58:07.527000
@ -287973,6 +287981,7 @@ CVE-2025-31464,0,0,cef469810eb1423bb7a7e1716b75c91cc72134c0c506e1793f76922b93cd9
CVE-2025-31465,0,0,6e44e720ae1ebb67aaf908a22fed5ec3ede3833fd6421e9faf5f98fde13494f5,2025-03-28T18:11:40.180000
CVE-2025-31466,0,0,8949ca4155d826510f40ba20fa018ebf472feb4783c6c45a3203ee2328cf61ad,2025-03-28T18:11:40.180000
CVE-2025-31469,0,0,b2368052847cee226f25de858a53defbbb5ee791af876ecd60ac831bb3efb065,2025-03-28T18:11:40.180000
CVE-2025-3147,1,1,0ee9eb71ea7ff8164ed149bf96cca86a37ab712e8d182f3a5d0b9c1717e161fb,2025-04-03T07:15:41.707000
CVE-2025-31470,0,0,b3e524e60e22c08db04157398abd8ee8eb05546d49c011c6dac54bed2b0b24f3,2025-03-28T18:11:40.180000
CVE-2025-31471,0,0,f14a73777598a992310e0897619724d0e55e2ad37cd96fbfe8ec71a2d2fd30b2,2025-03-28T18:11:40.180000
CVE-2025-31472,0,0,ae81b04fb65d7c7cbd3ac866886f9e1ba5d7ced37e5c5d1b62e397df92b5809a,2025-03-28T18:11:40.180000
@ -287980,6 +287989,7 @@ CVE-2025-31473,0,0,6b8642bfa6d52c3065cf9a40b6bbee92e5edddb9a1e9e71f4dd87e54a9e84
CVE-2025-31474,0,0,3b178b6034f0ae913924408b2660b0dac0698dd9519ef434ea55136482afe5ec,2025-03-28T18:11:40.180000
CVE-2025-31477,0,0,33ac2e21f00ef6d48a2260593dc1c2c9adea6dcc8cac84a69784343bf2fa14fa,2025-04-02T22:15:20.420000
CVE-2025-31479,0,0,485ec0f7811e62ce1bf9617832c8d4a72441c2dfd15b0ede2a29c3dab4515900,2025-04-02T22:15:20.563000
CVE-2025-3148,1,1,337608d55a900fe3e4ec5261cfec01a9c31886dc12a4f17a7b38d5c53c4dbe53,2025-04-03T07:15:41.927000
CVE-2025-31484,0,0,dcc45bae9152a2eda779f3ce6fd498af89197d18dcaca27bbfad7d5d40b3c401,2025-04-02T22:15:20.720000
CVE-2025-31515,0,0,65e0cceff3005eb000d81df9c13b2b61bcc11ce5d49244e52c4f8300da4f784d,2025-04-01T03:15:17.700000
CVE-2025-31516,0,0,523a9f1a981866b0e2c8b8f2bf03776b6eb23f7f0c09f8442b9e17379be69af4,2025-04-01T03:15:18.140000

Can't render this file because it is too large.