mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 10:18:41 +00:00
Auto-Update: 2025-04-03T08:00:21.881224+00:00
This commit is contained in:
parent
68ae442cd4
commit
8bd9e27ac7
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-5598",
|
||||
"sourceIdentifier": "secteam@freebsd.org",
|
||||
"published": "2019-05-15T16:29:01.080",
|
||||
"lastModified": "2024-11-21T04:45:12.387",
|
||||
"lastModified": "2025-04-03T06:15:40.680",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -192,6 +192,10 @@
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Apr/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/108395",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-10157",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-10-19T23:15:04.033",
|
||||
"lastModified": "2024-10-22T14:42:50.303",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-04-03T07:15:40.593",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/password-recovery.php of the component Reset Your Password Page. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
"value": "A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/password-recovery.php of the component Reset Your Password Page. The manipulation of the argument username/mobileno leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -133,6 +133,10 @@
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
|
21
CVE-2025/CVE-2025-20xx/CVE-2025-2055.json
Normal file
21
CVE-2025/CVE-2025-20xx/CVE-2025-2055.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-2055",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-04-03T06:15:42.727",
|
||||
"lastModified": "2025-04-03T06:15:42.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MapPress Maps for WordPress plugin before 2.94.9 does not sanitise and escape some parameters when outputing them in the page, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a8bfdbbf-6963-4fab-826a-6be770ac72c3/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-304xx/CVE-2025-30485.json
Normal file
60
CVE-2025/CVE-2025-304xx/CVE-2025-30485.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-30485",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2025-04-03T07:15:41.110",
|
||||
"lastModified": "2025-04-03T07:15:41.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "UNIX symbolic link (Symlink) following issue exists in FutureNet NXR series, VXR series and WXR series routers. Attaching to the affected product an external storage containing malicious symbolic link files, a logged-in administrative user may obtain and/or destroy internal files."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-61"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/vu/JVNVU92821536/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.centurysys.co.jp/backnumber/common/jvnvu92821536.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-313xx/CVE-2025-31334.json
Normal file
60
CVE-2025/CVE-2025-313xx/CVE-2025-31334.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-31334",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2025-04-03T06:15:42.903",
|
||||
"lastModified": "2025-04-03T06:15:42.903",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Issue that bypasses the \"Mark of the Web\" security warning function for files when opening a symbolic link that points to an executable file exists in WinRAR versions prior to 7.11. If a symbolic link specially crafted by an attacker is opened on the affected product, arbitrary code may be executed."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-356"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN59547048/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.win-rar.com/start.html?&L=0",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-31xx/CVE-2025-3142.json
Normal file
145
CVE-2025/CVE-2025-31xx/CVE-2025-3142.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3142",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T06:15:43.200",
|
||||
"lastModified": "2025-04-03T06:15:43.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in SourceCodester Apartment Visitor Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /add-apartment.php. The manipulation of the argument buildingno leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Lena-lyy/SQL/blob/main/SQL3.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303047",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303047",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.525320",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
149
CVE-2025/CVE-2025-31xx/CVE-2025-3143.json
Normal file
149
CVE-2025/CVE-2025-31xx/CVE-2025-3143.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2025-3143",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T06:15:43.467",
|
||||
"lastModified": "2025-04-03T06:15:43.467",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in SourceCodester Apartment Visitor Management System 1.0. Affected is an unknown function of the file /visitor-entry.php. The manipulation of the argument visname/address leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Lena-lyy/SQL/blob/main/SQL4.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Lena-lyy/SQL/blob/main/SQL5.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303048",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303048",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.525321",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2025/CVE-2025-31xx/CVE-2025-3144.json
Normal file
137
CVE-2025/CVE-2025-31xx/CVE-2025-3144.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-3144",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T06:15:43.677",
|
||||
"lastModified": "2025-04-03T06:15:43.677",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in MindSpore 2.5.0. Affected by this vulnerability is the function mindspore.numpy.fft.hfftn. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"baseScore": 1.7,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/mindspore/mindspore/issues/IBVKM8",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303049",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303049",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.525333",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
133
CVE-2025/CVE-2025-31xx/CVE-2025-3145.json
Normal file
133
CVE-2025/CVE-2025-31xx/CVE-2025-3145.json
Normal file
@ -0,0 +1,133 @@
|
||||
{
|
||||
"id": "CVE-2025-3145",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T07:15:41.290",
|
||||
"lastModified": "2025-04-03T07:15:41.290",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in MindSpore 2.5.0. Affected by this issue is the function mindspore.numpy.fft.rfft2. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"baseScore": 1.7,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/mindspore/mindspore/issues/IBVKM8",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303050",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303050",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-31xx/CVE-2025-3146.json
Normal file
145
CVE-2025/CVE-2025-31xx/CVE-2025-3146.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3146",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T07:15:41.517",
|
||||
"lastModified": "2025-04-03T07:15:41.517",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in PHPGurukul Bus Pass Management System 1.0. This affects an unknown part of the file /view-pass-detail.php. The manipulation of the argument viewid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nabiland/cve/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303051",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303051",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.525340",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-31xx/CVE-2025-3147.json
Normal file
145
CVE-2025/CVE-2025-31xx/CVE-2025-3147.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-3147",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T07:15:41.707",
|
||||
"lastModified": "2025-04-03T07:15:41.707",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-subadmin.php. The manipulation of the argument sadminusername leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nabiland/cve/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303052",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303052",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.525388",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-31xx/CVE-2025-3148.json
Normal file
141
CVE-2025/CVE-2025-31xx/CVE-2025-3148.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-3148",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-04-03T07:15:41.927",
|
||||
"lastModified": "2025-04-03T07:15:41.927",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in codeprojects Product Management System 1.0 and classified as problematic. This issue affects some unknown processing of the component Login. The manipulation of the argument Str1 leads to buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"baseScore": 1.7,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LxxxtSec/CVE/blob/main/CVE-Product_Management_System.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.303053",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.303053",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.525395",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
28
README.md
28
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-04-03T06:00:22.226864+00:00
|
||||
2025-04-03T08:00:21.881224+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-04-03T05:15:42.363000+00:00
|
||||
2025-04-03T07:15:41.927000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,25 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
288277
|
||||
288287
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `10`
|
||||
|
||||
- [CVE-2025-3136](CVE-2025/CVE-2025-31xx/CVE-2025-3136.json) (`2025-04-03T04:15:38.540`)
|
||||
- [CVE-2025-3137](CVE-2025/CVE-2025-31xx/CVE-2025-3137.json) (`2025-04-03T04:15:39.307`)
|
||||
- [CVE-2025-3138](CVE-2025/CVE-2025-31xx/CVE-2025-3138.json) (`2025-04-03T04:15:39.733`)
|
||||
- [CVE-2025-3139](CVE-2025/CVE-2025-31xx/CVE-2025-3139.json) (`2025-04-03T04:15:39.940`)
|
||||
- [CVE-2025-3140](CVE-2025/CVE-2025-31xx/CVE-2025-3140.json) (`2025-04-03T05:15:40.777`)
|
||||
- [CVE-2025-3141](CVE-2025/CVE-2025-31xx/CVE-2025-3141.json) (`2025-04-03T05:15:42.363`)
|
||||
- [CVE-2025-2055](CVE-2025/CVE-2025-20xx/CVE-2025-2055.json) (`2025-04-03T06:15:42.727`)
|
||||
- [CVE-2025-30485](CVE-2025/CVE-2025-304xx/CVE-2025-30485.json) (`2025-04-03T07:15:41.110`)
|
||||
- [CVE-2025-31334](CVE-2025/CVE-2025-313xx/CVE-2025-31334.json) (`2025-04-03T06:15:42.903`)
|
||||
- [CVE-2025-3142](CVE-2025/CVE-2025-31xx/CVE-2025-3142.json) (`2025-04-03T06:15:43.200`)
|
||||
- [CVE-2025-3143](CVE-2025/CVE-2025-31xx/CVE-2025-3143.json) (`2025-04-03T06:15:43.467`)
|
||||
- [CVE-2025-3144](CVE-2025/CVE-2025-31xx/CVE-2025-3144.json) (`2025-04-03T06:15:43.677`)
|
||||
- [CVE-2025-3145](CVE-2025/CVE-2025-31xx/CVE-2025-3145.json) (`2025-04-03T07:15:41.290`)
|
||||
- [CVE-2025-3146](CVE-2025/CVE-2025-31xx/CVE-2025-3146.json) (`2025-04-03T07:15:41.517`)
|
||||
- [CVE-2025-3147](CVE-2025/CVE-2025-31xx/CVE-2025-3147.json) (`2025-04-03T07:15:41.707`)
|
||||
- [CVE-2025-3148](CVE-2025/CVE-2025-31xx/CVE-2025-3148.json) (`2025-04-03T07:15:41.927`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2019-5598](CVE-2019/CVE-2019-55xx/CVE-2019-5598.json) (`2025-04-03T06:15:40.680`)
|
||||
- [CVE-2024-10157](CVE-2024/CVE-2024-101xx/CVE-2024-10157.json) (`2025-04-03T07:15:40.593`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
26
_state.csv
26
_state.csv
@ -140815,7 +140815,7 @@ CVE-2019-5594,0,0,8935e7b74d5896342c8c4381f0a3a609ce5940d3194cc5b4b6abe5ab7668f5
|
||||
CVE-2019-5595,0,0,ae95c6ba813b964bbeef9fbbef02421b244db6978ab367cd6e99e6bfa48d8664,2024-11-21T04:45:12.020000
|
||||
CVE-2019-5596,0,0,04e7bb70289bfd72d58ddd1379058b9d099a2f9dee07c7679a0595fef145703d,2024-11-21T04:45:12.130000
|
||||
CVE-2019-5597,0,0,e623e896734cec08384d46d70639e8307cfaa17b18b63dade5e962c283714ccb,2024-11-21T04:45:12.257000
|
||||
CVE-2019-5598,0,0,49858b9fa2bbaf206e166b56ff6b92dd52bcb6568b7766a27af2d218a8e4b548,2024-11-21T04:45:12.387000
|
||||
CVE-2019-5598,0,1,0c49dc58c2fa62e4e88dc219764afc2efad671e82d41bea0b3684b2ab34f7706,2025-04-03T06:15:40.680000
|
||||
CVE-2019-5599,0,0,c0e2b58c3ae26a9dc22d5f7d08c9f58ede2b0dccb4d4bf3be5b4d8fff2be0c45,2024-11-21T04:45:12.517000
|
||||
CVE-2019-5600,0,0,9e9a9b4e1f4ce0f5393ef7f3e988cc2d113620303e62c223f2453fb9f17a493d,2024-11-21T04:45:12.653000
|
||||
CVE-2019-5601,0,0,99af976ad83f1ad92f773423141ac9603fa1704242259fdda43b3ad8307fc84e,2024-11-21T04:45:12.767000
|
||||
@ -244610,7 +244610,7 @@ CVE-2024-10153,0,0,7bc579e7bec45689a036cc79b1aa4411e6ee6dd2be550c900171b69d6d417
|
||||
CVE-2024-10154,0,0,881067e74e39ed69d1e96d86c551a91f65aae8723617d9113c95819b20a5b961,2024-10-22T14:44:47.807000
|
||||
CVE-2024-10155,0,0,69ecac29dc7d85f6dc32fa941cb477f1015cc4923a81013963fc8d1644072128,2024-10-22T14:43:42.607000
|
||||
CVE-2024-10156,0,0,ecc45f2d45ec0f80c7c71287b6cd15b59c38ac5b046533ddc094bf068a506aaf,2024-10-22T14:43:00.543000
|
||||
CVE-2024-10157,0,0,83888d36a9830229e0a4b2d86fd5dbb627c3a9048e93954967e605076fa07304,2024-10-22T14:42:50.303000
|
||||
CVE-2024-10157,0,1,33177b41f57194a5cdc12c8dbff6da021724b4e837ee2c015544ff2442e88fa4,2025-04-03T07:15:40.593000
|
||||
CVE-2024-10158,0,0,e8ebebdac47bde38062bb5d226e1c4df694f16b9811139b95579246f23fc1041,2024-10-22T14:42:26.727000
|
||||
CVE-2024-10159,0,0,e15abd934f733c827ccd81ce40d53844dce135e8c78e686a5e9446cafd0a0c0a,2024-10-22T14:41:34.370000
|
||||
CVE-2024-1016,0,0,f9896bef5aa7dc4020d64a45984d4c4245a6f50daf44f8e836870f64804ec467,2024-11-21T08:49:36.187000
|
||||
@ -282558,6 +282558,7 @@ CVE-2025-2051,0,0,39762f6a6ab838c9c7c8c7045b5c898cc8c8adf302ea2b672648686c9da954
|
||||
CVE-2025-2052,0,0,e83c7aa2eccb3016f6fe6ee1219a19fb4c9c5f3abb951310ecbb9877f369a143,2025-03-07T01:15:13.173000
|
||||
CVE-2025-2053,0,0,d81f8831ad291e72c410bd38a7bef93530425fe8afba7724c8cea3f151c76d7b,2025-03-07T01:15:13.373000
|
||||
CVE-2025-2054,0,0,379a4b72c65195b9c1f74209beae2954b8d8bceddb2685ce00b0169df2ca4267,2025-03-07T02:15:38.060000
|
||||
CVE-2025-2055,1,1,afa429e456cba4a08c9d040465a431512b3e6c5f2f54487552d485e3b06f04e7,2025-04-03T06:15:42.727000
|
||||
CVE-2025-2056,0,0,8095a33aa7b878f6a20af2e1f56146fc0a9c6dfcafcbf76d7e26afde35e4dc93,2025-03-14T05:15:42.523000
|
||||
CVE-2025-2057,0,0,94c62e1813e3383c1c644270c99bce527f5ca9bba506cf96d35fdf67759b586d,2025-03-07T02:15:38.237000
|
||||
CVE-2025-2058,0,0,f17d74d5176557010d92e84206629b4ae32b579c9df6cd1825b5253f9069cfd2,2025-03-07T02:15:38.413000
|
||||
@ -287530,6 +287531,7 @@ CVE-2025-30471,0,0,1fa123ff5c95e6c8f98b01edf92c14e5731bc4a7b28b13f232e9d72f6db6f
|
||||
CVE-2025-30472,0,0,a9a589c92e85a7dd5dc78fc910cf31729074e91942c97c7d1b5338ab1df8371e,2025-04-01T20:28:02.283000
|
||||
CVE-2025-30474,0,0,eb6c167d1736e5a0a05d76dda95c9383453e456c61b97e97ddf0c32b61180eb9,2025-04-01T18:15:30.003000
|
||||
CVE-2025-3048,0,0,8c9d9ed36af65f4d6aa3fb74d6647d88f2ae80886b1a7fcca7e2b0a1fc1e20e2,2025-04-01T20:26:22.890000
|
||||
CVE-2025-30485,1,1,40c2bfc3a7529030acaba7b858cf13857c2ea57bdac4e839daf060735cb16f8a,2025-04-03T07:15:41.110000
|
||||
CVE-2025-3051,0,0,191e4438cb371e2a15f1e0848098419500c25d30e4bc0eb4a4497eb60bb0a69b,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30520,0,0,4594ffcb887663f1dc394fd83a45832001aba3082bc418a07983b58e49399108,2025-04-01T20:26:11.547000
|
||||
CVE-2025-30521,0,0,eee2f839741a5e176cacf865cc6d42d2df432fd3f60c0ff1d8e1355c4ac5b964,2025-03-27T16:44:44.143000
|
||||
@ -287909,35 +287911,38 @@ CVE-2025-31285,0,0,b172cbeed5ac8088424f5c8980ffb3b75f69e5cd77c077f244769565c0b4e
|
||||
CVE-2025-31286,0,0,98f9dbfeff2632a739d61c532dd215aeef9aa200787e22f939947f68ec23d274,2025-04-02T17:15:49.290000
|
||||
CVE-2025-3129,0,0,59b0a635c94241dfa08e31a67437b80001601b3e87b34eddd3148a01f36d8f52,2025-04-02T22:15:21.593000
|
||||
CVE-2025-3130,0,0,fb2487cf83e92bc2ce03b5c143b00168949c6aec885b5df3006682eb7f439c3e,2025-04-02T22:15:21.710000
|
||||
CVE-2025-31334,1,1,22df1c93ba536c3038787aa0f054ef511d2e661a66785fc089bb8dccce64b1ac,2025-04-03T06:15:42.903000
|
||||
CVE-2025-31335,0,0,23839e3692f6b9292f971ac2ba3542c0132ffb2a9a22b6edf4f234426c27d3e9,2025-03-28T18:11:40.180000
|
||||
CVE-2025-3134,0,0,f183e34c58cd7bfa52ca6390fba281a17c76eb5c23ce4b4f669ceedd2488f2ff,2025-04-03T02:15:20.340000
|
||||
CVE-2025-3135,0,0,9d56a64675361a09a8b212b75af86a3fa03d2cb1cc819fd91a2e8a929d6b27b1,2025-04-03T02:15:20.540000
|
||||
CVE-2025-3136,1,1,e122787f854723069afdcb24292900b46a7a386c8e816f1453109a14f38f51a3,2025-04-03T04:15:38.540000
|
||||
CVE-2025-3136,0,0,e122787f854723069afdcb24292900b46a7a386c8e816f1453109a14f38f51a3,2025-04-03T04:15:38.540000
|
||||
CVE-2025-31367,0,0,85cd14db2ac76f9194e6a05115a520fe93ce77ad125f659bc4b1625771b812eb,2025-03-29T04:15:24.037000
|
||||
CVE-2025-31368,0,0,07c9f19a54136c020ece5afe45106551d4106a87fecd0821fbb57cd0575c1b58,2025-03-29T04:15:29.740000
|
||||
CVE-2025-31369,0,0,25ade6a3774203ee6fdcd4321ce56e82b90112f6538ef50e396382d43bc53a60,2025-03-29T04:15:38.600000
|
||||
CVE-2025-3137,1,1,7dbbf176cfe69a6bfcf67844ceaa6652135c083a2685a0e3a2a1b987aa4c0242,2025-04-03T04:15:39.307000
|
||||
CVE-2025-3137,0,0,7dbbf176cfe69a6bfcf67844ceaa6652135c083a2685a0e3a2a1b987aa4c0242,2025-04-03T04:15:39.307000
|
||||
CVE-2025-31370,0,0,79fdc8cf1348d46f7b63d37f6025aae5b5fea7041ff8807c4f3c14cdafc4bc61,2025-03-29T04:15:38.677000
|
||||
CVE-2025-31371,0,0,cd370f88c92ee402d4c5aaef8baeb9e083693b4c18cd5565fe7e097d1b4221e1,2025-03-29T04:15:38.813000
|
||||
CVE-2025-31372,0,0,7a7a683873bc962dfe6aa91ab7aa77a42948f5cb58f2a30db9c2fe953aee9559,2025-03-29T04:15:38.950000
|
||||
CVE-2025-31373,0,0,f9071278a14d544e1d638810d17e35e9b3cf783fa438c6415cfa720de050a0f8,2025-03-29T04:15:39.090000
|
||||
CVE-2025-31374,0,0,a0063074d97edd2d0b6a359f9337f2fbc025fc83f5ab0917de6d943a4c010e45,2025-03-29T04:15:39.340000
|
||||
CVE-2025-31376,0,0,b701b7ba661f1762215842f01eaab352e5cec0fffbde18b5aedc908f1c5af508,2025-04-01T20:26:30.593000
|
||||
CVE-2025-3138,1,1,de78ebf42f0bfa538b3736d4d683541e6c1b32395e045ff2be2d7bdc619a9efe,2025-04-03T04:15:39.733000
|
||||
CVE-2025-3138,0,0,de78ebf42f0bfa538b3736d4d683541e6c1b32395e045ff2be2d7bdc619a9efe,2025-04-03T04:15:39.733000
|
||||
CVE-2025-31386,0,0,42df843cc2ac2bb87523fa10c4b86c9cfeca984ee6e6907b70f825251fac8592,2025-04-01T20:26:30.593000
|
||||
CVE-2025-31387,0,0,efeeafd47dcaa2c1fe833b1f78eecd6f90d244213e2c3fd9dadef428bb8988f8,2025-04-01T20:26:30.593000
|
||||
CVE-2025-3139,1,1,38102b143991772fa8965f269a5c5d3a7a1954a7edba1619271b901bddba3680,2025-04-03T04:15:39.940000
|
||||
CVE-2025-3140,1,1,ef0cac805617f2a84e59a3dfd08137631212c01f79707ef599c2a7633c0a6e4a,2025-04-03T05:15:40.777000
|
||||
CVE-2025-3139,0,0,38102b143991772fa8965f269a5c5d3a7a1954a7edba1619271b901bddba3680,2025-04-03T04:15:39.940000
|
||||
CVE-2025-3140,0,0,ef0cac805617f2a84e59a3dfd08137631212c01f79707ef599c2a7633c0a6e4a,2025-04-03T05:15:40.777000
|
||||
CVE-2025-31406,0,0,5912a412471ff3d877945941ec5dfa793f9b328130992797be8d7429384326a2,2025-04-01T20:26:30.593000
|
||||
CVE-2025-31408,0,0,4bce0889fff07e9d2af0109421fe58b7234ee5ebf9fa6560ab95ff15e16d923e,2025-04-01T20:26:11.547000
|
||||
CVE-2025-31409,0,0,82dbb111649d8cf9e26a4c460fca8cf167c66dfbe7749d633be5ad71c1f22147,2025-04-01T20:26:11.547000
|
||||
CVE-2025-3141,1,1,29059e08783bef3bbfe68d9a87c4635884da13d315c6f1c3e0044ca33eb4cf56,2025-04-03T05:15:42.363000
|
||||
CVE-2025-3141,0,0,29059e08783bef3bbfe68d9a87c4635884da13d315c6f1c3e0044ca33eb4cf56,2025-04-03T05:15:42.363000
|
||||
CVE-2025-31410,0,0,d2744125929669a0550251c0ca1a9221dc78cee85634e7974f1b02dfdfbfe3ca,2025-04-01T20:26:30.593000
|
||||
CVE-2025-31412,0,0,f2a3a75101b5fbb687e484fbb151373c9b65c031636af9fa6343c10e46f352fd,2025-04-01T20:26:30.593000
|
||||
CVE-2025-31414,0,0,c7c8b152028249fcda3808d41ed059a882fd165da9cc6176d922213c7f3b4129,2025-04-01T20:26:30.593000
|
||||
CVE-2025-31415,0,0,414e63d224a09cd075a83b960b86b86bc2238dd067741c725e74f347156214de,2025-04-01T20:26:11.547000
|
||||
CVE-2025-31417,0,0,0d3c1b109fae4b739454cb1a0b8eb7abc566c168fc7a86169fb95a201cbbcd1f,2025-04-01T20:26:30.593000
|
||||
CVE-2025-31419,0,0,86daefd4cfae6cd0bc5dfe16310f6844d1f9e0f956e501ba1300c694a97deb9e,2025-04-01T20:26:30.593000
|
||||
CVE-2025-3142,1,1,89dad725a78f99af9996b26eb4fd0b6e3130ff2cdf8b39de58f0a92b7681d0ad,2025-04-03T06:15:43.200000
|
||||
CVE-2025-3143,1,1,94ecb7e4d681183309e1820ee8aa59c723a65e9bcb295db0aa131fd273d1f89e,2025-04-03T06:15:43.467000
|
||||
CVE-2025-31431,0,0,9b65447f095eb6450cd16ceaae607c3f49ad8abcc8b0a8029061fac7fc7f6b63,2025-04-02T14:58:07.527000
|
||||
CVE-2025-31432,0,0,66cb912d57f88bc72b111a0fcfbe419506a386c0afd760e3d30a46c5880e1d8f,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31433,0,0,29229c0e5e364d182f865fd66896e72801948e3d4a178c39c73725ee177d1d9c,2025-03-28T18:11:40.180000
|
||||
@ -287946,6 +287951,7 @@ CVE-2025-31435,0,0,0f62c96c036522ad5186e49b737ef2befa37e3c5fad8564550f8570ac0168
|
||||
CVE-2025-31437,0,0,bb9bebaa1e8049b6f9f323de79f1b89f64d0b8fa50986fd6d4b4769de19a4e05,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31438,0,0,55b6cc7e6be8d251de6290ec4d11a0ed212ecb2367169b9673e1863d951d6df5,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31439,0,0,c5c1da5e09db0442f7accb5c1822c26b14e61ab3b8df06836d07f9e6a67a5b2d,2025-03-28T18:11:40.180000
|
||||
CVE-2025-3144,1,1,23847978f74bd5c821df07e15380e61330db3c22283a620edc833139db216301,2025-04-03T06:15:43.677000
|
||||
CVE-2025-31440,0,0,fc686f5e7a5560d59dab940c9feae33dbee5619e900c7ecf44ae2d029cdd78a2,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31441,0,0,086b8131d4f42372de25b0b9c9890c1b9c03533b53378e72946e94576dc09f60,2025-04-02T14:58:07.527000
|
||||
CVE-2025-31443,0,0,a810a0ca0a57301b9d28937b27cf4f2f7004f4c29319f67b09d54b716d8647f7,2025-03-28T18:11:40.180000
|
||||
@ -287955,6 +287961,7 @@ CVE-2025-31446,0,0,1abbb4190ab1533ff8924c7127cf1b8e8b97d28f446a1674c1877505eeea2
|
||||
CVE-2025-31447,0,0,a2e24f812a26cfffba6a6833b02599e438b1d438242739f5ab16be2c4e8d8c7c,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31448,0,0,dbc24153384cdd280ff0ffbaac62baad727e56a7ed12e4c5d618e4466506b0de,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31449,0,0,c84e231a93bf4ff01b3aa7a20d0a30116e7a77cc9ce263a8afa09f62ac82d414,2025-03-28T18:11:40.180000
|
||||
CVE-2025-3145,1,1,3000cce549dc45c0e392fb1580ffbab3ef110a7b9e62e35cffe2f744d4eeada8,2025-04-03T07:15:41.290000
|
||||
CVE-2025-31450,0,0,2e691b4a20957344fc3f29c67e4ed46d7b1bc532cf783467b3109fc35a7b82cd,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31451,0,0,22da2aaa904049403ee28b6e4c3472cbcecc3c989354bbd5b0b0a8dceff1b47c,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31452,0,0,a03b3313f3e1b883743f768c769f3eaf27504279e23c8c00d258d4ea56af861e,2025-03-28T18:11:40.180000
|
||||
@ -287965,6 +287972,7 @@ CVE-2025-31456,0,0,2bff385e8e0baa2ea87c8a48582c4981407a6004e4d53a30ca1a140f69765
|
||||
CVE-2025-31457,0,0,94db5c74744c7e3010a6292f6398e658b2f1f4c4bfd962bc226325e8473a53a6,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31458,0,0,bb420d9150dfa038eb56c1560d5ee862881401033f4e9a66754a4bcb53931cf7,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31459,0,0,8f530f7b78bbe2c8b9cbd724d2022ba6735ddb60be16f64b7bf05413a18ac804,2025-03-28T18:11:40.180000
|
||||
CVE-2025-3146,1,1,c7d31b9f5e532f71fbce3ba9471ef5bd327cff2023def95d7ab408fd6a7c2449,2025-04-03T07:15:41.517000
|
||||
CVE-2025-31460,0,0,09a19caf595f9b29966b1f49149104446c040f2d710b05930c9641719b4fffc0,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31461,0,0,bdc620dd49593c387f4a803645c68b850c06521048c648b5747c9585ddbd7413,2025-04-02T14:58:07.527000
|
||||
CVE-2025-31462,0,0,5f9812a3f73c9de6fa4e1f00a3593337b0bd5f2ec7e8395e765dbef36c70e055,2025-04-02T14:58:07.527000
|
||||
@ -287973,6 +287981,7 @@ CVE-2025-31464,0,0,cef469810eb1423bb7a7e1716b75c91cc72134c0c506e1793f76922b93cd9
|
||||
CVE-2025-31465,0,0,6e44e720ae1ebb67aaf908a22fed5ec3ede3833fd6421e9faf5f98fde13494f5,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31466,0,0,8949ca4155d826510f40ba20fa018ebf472feb4783c6c45a3203ee2328cf61ad,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31469,0,0,b2368052847cee226f25de858a53defbbb5ee791af876ecd60ac831bb3efb065,2025-03-28T18:11:40.180000
|
||||
CVE-2025-3147,1,1,0ee9eb71ea7ff8164ed149bf96cca86a37ab712e8d182f3a5d0b9c1717e161fb,2025-04-03T07:15:41.707000
|
||||
CVE-2025-31470,0,0,b3e524e60e22c08db04157398abd8ee8eb05546d49c011c6dac54bed2b0b24f3,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31471,0,0,f14a73777598a992310e0897619724d0e55e2ad37cd96fbfe8ec71a2d2fd30b2,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31472,0,0,ae81b04fb65d7c7cbd3ac866886f9e1ba5d7ced37e5c5d1b62e397df92b5809a,2025-03-28T18:11:40.180000
|
||||
@ -287980,6 +287989,7 @@ CVE-2025-31473,0,0,6b8642bfa6d52c3065cf9a40b6bbee92e5edddb9a1e9e71f4dd87e54a9e84
|
||||
CVE-2025-31474,0,0,3b178b6034f0ae913924408b2660b0dac0698dd9519ef434ea55136482afe5ec,2025-03-28T18:11:40.180000
|
||||
CVE-2025-31477,0,0,33ac2e21f00ef6d48a2260593dc1c2c9adea6dcc8cac84a69784343bf2fa14fa,2025-04-02T22:15:20.420000
|
||||
CVE-2025-31479,0,0,485ec0f7811e62ce1bf9617832c8d4a72441c2dfd15b0ede2a29c3dab4515900,2025-04-02T22:15:20.563000
|
||||
CVE-2025-3148,1,1,337608d55a900fe3e4ec5261cfec01a9c31886dc12a4f17a7b38d5c53c4dbe53,2025-04-03T07:15:41.927000
|
||||
CVE-2025-31484,0,0,dcc45bae9152a2eda779f3ce6fd498af89197d18dcaca27bbfad7d5d40b3c401,2025-04-02T22:15:20.720000
|
||||
CVE-2025-31515,0,0,65e0cceff3005eb000d81df9c13b2b61bcc11ce5d49244e52c4f8300da4f784d,2025-04-01T03:15:17.700000
|
||||
CVE-2025-31516,0,0,523a9f1a981866b0e2c8b8f2bf03776b6eb23f7f0c09f8442b9e17379be69af4,2025-04-01T03:15:18.140000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user