Auto-Update: 2025-04-04T04:00:19.957346+00:00

This commit is contained in:
cad-safe-bot 2025-04-04 04:03:59 +00:00
parent 3cacd31fe4
commit 8f163af507
16 changed files with 1540 additions and 43 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-24310",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-04-04T02:15:17.463",
"lastModified": "2025-04-04T02:15:17.463",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper restriction of rendered UI layers or frames issue exists in HMI ViewJet C-more series, which may allow a remote unauthenticated attacker to trick the product user to perform operations on the product's web pages."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN17260367/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.electronics.jtekt.co.jp/en/topics/202503207271/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-24317",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-04-04T02:15:17.757",
"lastModified": "2025-04-04T02:15:17.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Allocation of resources without limits or throttling issue exists in HMI ViewJet C-more series and HMI GC-A2 series, which may allow a remote unauthenticated attacker to cause a denial-of-service (DoS) condition."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN17260367/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.electronics.jtekt.co.jp/en/topics/202503207269/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.electronics.jtekt.co.jp/en/topics/202503207271/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-25061",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-04-04T02:15:17.910",
"lastModified": "2025-04-04T02:15:17.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unintended proxy or intermediary ('Confused Deputy') issue exists in HMI ViewJet C-more series and HMI GC-A2 series, which may allow a remote unauthenticated attacker to use the product as an intermediary for FTP bounce attack."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-441"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN17260367/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.electronics.jtekt.co.jp/en/topics/202503207269/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.electronics.jtekt.co.jp/en/topics/202503207271/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-26401",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-04-04T02:15:18.047",
"lastModified": "2025-04-04T02:15:18.047",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Weak encoding for password vulnerability exists in HMI ViewJet C-more series. If this vulnerability is exploited, authentication information may be obtained by a local authenticated attacker."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-261"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN17260367/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.electronics.jtekt.co.jp/en/topics/202503207271/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -2,13 +2,20 @@
"id": "CVE-2025-29070",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-01T21:15:44.023",
"lastModified": "2025-04-02T14:58:07.527",
"lastModified": "2025-04-04T02:15:18.183",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A heap buffer overflow vulnerability has been identified in thesmooth2() in cmsgamma.c in lcms2-2.16 which allows a remote attacker to cause a denial of service."
"value": "A heap buffer overflow vulnerability has been identified in thesmooth2() in cmsgamma.c in lcms2-2.16 which allows a remote attacker to cause a denial of service. NOTE: the Supplier disputes this because \"this is not exploitable as this function is never called on normal color management, is there only as a helper for low-level programming and investigation.\""
},
{
"lang": "es",
@ -20,6 +27,10 @@
{
"url": "https://github.com/mm2/Little-CMS/issues/475",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/mm2/Little-CMS/issues/475#issuecomment-2696785063",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,51 @@
"id": "CVE-2025-30406",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T20:15:24.987",
"lastModified": "2025-04-03T20:15:24.987",
"lastModified": "2025-04-04T02:15:18.300",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, which enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. NOTE: the CentreStack admin can manually delete the machineKey defined in portal\\web.config."
"value": "Gladinet CentreStack through 16.1.10296.56315 (fixed in 16.4.10315.56368) has a deserialization vulnerability due to the CentreStack portal's hardcoded machineKey use, as exploited in the wild in March 2025. This enables threat actors (who know the machineKey) to serialize a payload for server-side deserialization to achieve remote code execution. NOTE: a CentreStack admin can manually delete the machineKey defined in portal\\web.config."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2005.pdf",

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3195",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T02:15:18.423",
"lastModified": "2025-04-04T02:15:18.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in itsourcecode Online Blood Bank Management System 1.0. This issue affects some unknown processing of the file /bbms.php. The manipulation of the argument Search leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/21",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303149",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303149",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.544147",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-3196",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T02:15:18.627",
"lastModified": "2025-04-04T02:15:18.627",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. Affected is the function Assimp::MD2Importer::InternReadFile in the library code/AssetLib/MD2/MD2Loader.cpp of the component Malformed File Handler. The manipulation of the argument Name leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 4.3,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/assimp/assimp/issues/6069",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/assimp/assimp/issues/6069#issuecomment-2763273425",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/assimp/assimp/milestone/11",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303150",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303150",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.545368",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,153 @@
{
"id": "CVE-2025-3198",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T02:15:18.803",
"lastModified": "2025-04-04T02:15:18.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"baseScore": 1.7,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
},
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"references": [
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32716",
"source": "cna@vuldb.com"
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0",
"source": "cna@vuldb.com"
},
{
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303151",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303151",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.545773",
"source": "cna@vuldb.com"
},
{
"url": "https://www.gnu.org/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,157 @@
{
"id": "CVE-2025-3199",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T02:15:19.013",
"lastModified": "2025-04-04T02:15:19.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ageerle ruoyi-ai up to 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysModelController.java of the component API Interface. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.2 is able to address this issue. The name of the patch is c0daf641fb25b244591b7a6c3affa35c69d321fe. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/Tr0e/CVE_Hunter/blob/main/ruoyi-ai/ruoyi-ai_UnauthorizedAccess_01.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ageerle/ruoyi-ai/issues/43",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ageerle/ruoyi-ai/issues/43#issuecomment-2763091490",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ageerle/ruoyi-ai/releases/tag/v2.0.2",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gwozai/ruoyi-ai/commit/c0daf641fb25b244591b7a6c3affa35c69d321fe",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303152",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303152",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.545830",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,153 @@
{
"id": "CVE-2025-3202",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T03:15:13.997",
"lastModified": "2025-04-04T03:15:13.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in ageerle ruoyi-ai up to 2.0.0. Affected is an unknown function of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysNoticeController.java. The manipulation leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is 6382e177bf90cc56ff70521842409e35c50df32d. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/Tr0e/CVE_Hunter/blob/main/ruoyi-ai/ruoyi-ai_UnauthorizedAccess_02.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ageerle/ruoyi-ai/commit/6382e177bf90cc56ff70521842409e35c50df32d",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ageerle/ruoyi-ai/issues/44#issue-2957771318",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ageerle/ruoyi-ai/releases/tag/v2.0.1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303156",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303156",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.545866",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3203",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T03:15:14.207",
"lastModified": "2025-04-04T03:15:14.207",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Tenda W18E 16.01.0.11. Affected by this vulnerability is the function formSetAccountList of the file /goform/setModules. The manipulation of the argument Password leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/ZIKH26/tmp_store_reports/blob/main/tenda-w18e.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303157",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303157",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.545883",
"source": "cna@vuldb.com"
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3204",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T03:15:14.413",
"lastModified": "2025-04-04T03:15:14.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in CodeAstro Car Rental System 1.0. Affected by this issue is some unknown functionality of the file /returncar.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://codeastro.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/21",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303158",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303158",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.545893",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-3205",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-04T03:15:14.613",
"lastModified": "2025-04-04T03:15:14.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in CodeAstro Student Grading System 1.0. This affects an unknown part of the file studentsubject.php. The manipulation of the argument studentId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://codeastro.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/20",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.303159",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.303159",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.545894",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-04T02:00:19.724823+00:00
2025-04-04T04:00:19.957346+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-04T01:15:40.407000+00:00
2025-04-04T03:15:14.613000+00:00
```
### Last Data Feed Release
@ -33,34 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
288445
288457
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `12`
- [CVE-2025-25000](CVE-2025/CVE-2025-250xx/CVE-2025-25000.json) (`2025-04-04T01:15:38.070`)
- [CVE-2025-25001](CVE-2025/CVE-2025-250xx/CVE-2025-25001.json) (`2025-04-04T01:15:39.153`)
- [CVE-2025-29796](CVE-2025/CVE-2025-297xx/CVE-2025-29796.json) (`2025-04-04T01:15:39.310`)
- [CVE-2025-29815](CVE-2025/CVE-2025-298xx/CVE-2025-29815.json) (`2025-04-04T01:15:39.487`)
- [CVE-2025-3186](CVE-2025/CVE-2025-31xx/CVE-2025-3186.json) (`2025-04-04T00:15:15.347`)
- [CVE-2025-3187](CVE-2025/CVE-2025-31xx/CVE-2025-3187.json) (`2025-04-04T01:15:40.197`)
- [CVE-2025-3188](CVE-2025/CVE-2025-31xx/CVE-2025-3188.json) (`2025-04-04T01:15:40.407`)
- [CVE-2025-24310](CVE-2025/CVE-2025-243xx/CVE-2025-24310.json) (`2025-04-04T02:15:17.463`)
- [CVE-2025-24317](CVE-2025/CVE-2025-243xx/CVE-2025-24317.json) (`2025-04-04T02:15:17.757`)
- [CVE-2025-25061](CVE-2025/CVE-2025-250xx/CVE-2025-25061.json) (`2025-04-04T02:15:17.910`)
- [CVE-2025-26401](CVE-2025/CVE-2025-264xx/CVE-2025-26401.json) (`2025-04-04T02:15:18.047`)
- [CVE-2025-3195](CVE-2025/CVE-2025-31xx/CVE-2025-3195.json) (`2025-04-04T02:15:18.423`)
- [CVE-2025-3196](CVE-2025/CVE-2025-31xx/CVE-2025-3196.json) (`2025-04-04T02:15:18.627`)
- [CVE-2025-3198](CVE-2025/CVE-2025-31xx/CVE-2025-3198.json) (`2025-04-04T02:15:18.803`)
- [CVE-2025-3199](CVE-2025/CVE-2025-31xx/CVE-2025-3199.json) (`2025-04-04T02:15:19.013`)
- [CVE-2025-3202](CVE-2025/CVE-2025-32xx/CVE-2025-3202.json) (`2025-04-04T03:15:13.997`)
- [CVE-2025-3203](CVE-2025/CVE-2025-32xx/CVE-2025-3203.json) (`2025-04-04T03:15:14.207`)
- [CVE-2025-3204](CVE-2025/CVE-2025-32xx/CVE-2025-3204.json) (`2025-04-04T03:15:14.413`)
- [CVE-2025-3205](CVE-2025/CVE-2025-32xx/CVE-2025-3205.json) (`2025-04-04T03:15:14.613`)
### CVEs modified in the last Commit
Recently modified CVEs: `8`
Recently modified CVEs: `2`
- [CVE-2025-2964](CVE-2025/CVE-2025-29xx/CVE-2025-2964.json) (`2025-04-04T01:15:39.640`)
- [CVE-2025-2965](CVE-2025/CVE-2025-29xx/CVE-2025-2965.json) (`2025-04-04T01:15:39.727`)
- [CVE-2025-2966](CVE-2025/CVE-2025-29xx/CVE-2025-2966.json) (`2025-04-04T01:15:39.793`)
- [CVE-2025-2967](CVE-2025/CVE-2025-29xx/CVE-2025-2967.json) (`2025-04-04T01:15:39.857`)
- [CVE-2025-2968](CVE-2025/CVE-2025-29xx/CVE-2025-2968.json) (`2025-04-04T01:15:39.930`)
- [CVE-2025-2969](CVE-2025/CVE-2025-29xx/CVE-2025-2969.json) (`2025-04-04T01:15:40.000`)
- [CVE-2025-2970](CVE-2025/CVE-2025-29xx/CVE-2025-2970.json) (`2025-04-04T01:15:40.067`)
- [CVE-2025-2972](CVE-2025/CVE-2025-29xx/CVE-2025-2972.json) (`2025-04-04T01:15:40.127`)
- [CVE-2025-29070](CVE-2025/CVE-2025-290xx/CVE-2025-29070.json) (`2025-04-04T02:15:18.183`)
- [CVE-2025-30406](CVE-2025/CVE-2025-304xx/CVE-2025-30406.json) (`2025-04-04T02:15:18.300`)
## Download and Usage

View File

@ -285147,8 +285147,10 @@ CVE-2025-24283,0,0,121f1ece0c38836070b45b6a7e97dd599c9b8d7607d034861bb57da70cce8
CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000
CVE-2025-24306,0,0,73cf37771b6f85cbd5893cb054304bfb4bf15e5622c3cdffb9a2e4a50bd301ae,2025-03-18T09:15:13.570000
CVE-2025-24309,0,0,b881e80e18a543dac7caf5dbe4ebf8345a69e13fed09525eee5962b72198dbe3,2025-03-04T17:16:06.513000
CVE-2025-24310,1,1,dbb1fae0173568ec93c0cb78aa5f4af558c60a81752a5bc4059d5b1b1aaae7c7,2025-04-04T02:15:17.463000
CVE-2025-24312,0,0,95c47bb536b453078b50948ffe457339fcccb14868a3af4b230325aee112d79c,2025-02-05T18:15:34.060000
CVE-2025-24316,0,0,3d67fc5ca9257bdefdc420f872260ce49c49fc7bc45018e469adac707c1de56f,2025-02-28T17:15:16.790000
CVE-2025-24317,1,1,7e0973c2f941742c30a1ffad535dc904382c432c679a6d84f1c6cc6eaaf88ae5,2025-04-04T02:15:17.757000
CVE-2025-24318,0,0,45737d4f27e86b0669543a856f157a50a0c8a223d43ce9658341d0666e6cb01e,2025-02-28T17:15:16.937000
CVE-2025-24319,0,0,9187be60b0cac196c7936aff1f9769e0582f5aeeb7750ad9a385d1c3e1292585,2025-02-05T18:15:34.557000
CVE-2025-24320,0,0,22204bebd126ec0b8efa20c54300c5d2c2817352b294d53c5a23f29d2ef87e4f,2025-02-05T18:15:34.960000
@ -285629,8 +285631,8 @@ CVE-2025-24995,0,0,bb79edc40370416fadbeef79bb99cbf826843e88974657326e0d594c0f48f
CVE-2025-24996,0,0,5e01ef73e370a4a2117dd1b707933e940e2d4a54bfa021edb0969c9dc677a02c,2025-03-11T17:16:36.803000
CVE-2025-24997,0,0,b80490d4098a0688d9be5ae2794984498208bc9fe48ed009a78a58ec5b3c38cc,2025-03-11T17:16:37.103000
CVE-2025-24998,0,0,97ff83c7f8c3dc3c86cf3e217ce8a9825fb5a93ab4895982732725d23057fced,2025-03-11T17:16:37.670000
CVE-2025-25000,1,1,b9b41f7f733e3faaf787ed24d61d8afea4083d99e853bd27ccb9d6c953d7584b,2025-04-04T01:15:38.070000
CVE-2025-25001,1,1,adbd4a60d9b09047ab82de14c940ca31151ec474a72cbae47ad2f8067bc0d68b,2025-04-04T01:15:39.153000
CVE-2025-25000,0,0,b9b41f7f733e3faaf787ed24d61d8afea4083d99e853bd27ccb9d6c953d7584b,2025-04-04T01:15:38.070000
CVE-2025-25001,0,0,adbd4a60d9b09047ab82de14c940ca31151ec474a72cbae47ad2f8067bc0d68b,2025-04-04T01:15:39.153000
CVE-2025-25003,0,0,81c7aaa0459bff03b421e5d180256f499147e53c41ab2bff8ad40b62fee74ec9,2025-03-11T17:16:38.043000
CVE-2025-25008,0,0,dd0d6b1d65c4bc3e0a08b5500a49fa40b10c2ed4de56e853cd146dcf325a2884,2025-03-11T17:16:38.483000
CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000
@ -285644,6 +285646,7 @@ CVE-2025-2505,0,0,1c5dbc559f463be147cb12740d372dacf2302c45c3ca19193c3edfdb65cecd
CVE-2025-25054,0,0,5be11f7aa8767f62986e873818aa7bafb83a58f1dfa102f5a36254246868acc6,2025-02-19T06:15:22.010000
CVE-2025-25055,0,0,715a07bb29b79c7fb7ed93b83baf8d9d3a9109839cf0cb0b13f9fa08d28e54fd,2025-02-18T00:15:21.277000
CVE-2025-25060,0,0,0a8c2b6524932cd2aa3b427f8f4980261a4c0e66f4c81723c7a600e1d7bc04fa,2025-04-02T14:58:07.527000
CVE-2025-25061,1,1,d619cf1a3426bd898befec044f73382eb9dc3e52082567b637a5bba1a23b88ba,2025-04-04T02:15:17.910000
CVE-2025-25062,0,0,c25c343fff538b868333c18656ef24f68b7ac30942ec67bd9f1be9d92e00b2a9,2025-02-03T04:15:09.587000
CVE-2025-25063,0,0,fe8d3efef171b62a11b34e6bca9a7ce9094019d5a41cf3cdaf3675f4485dfea9,2025-02-03T04:15:09.760000
CVE-2025-25064,0,0,9e84cd685c2899ba87d91b60e716dae82288b1f59c39c2c263fed050bcca5916,2025-03-14T18:15:31.637000
@ -286227,6 +286230,7 @@ CVE-2025-2638,0,0,cc1cadb7c34750a1375701cb1da4bb47de30a65ba1265bd222b67359b4a311
CVE-2025-2639,0,0,eeccd7e86f1a8e6550900d4406a77fd9c06a6948c701e759827649fddf007255,2025-03-28T19:33:14.553000
CVE-2025-26393,0,0,0084efd52fbee3d09de405c3fe48d1fbc4bd7655a73c657547c37f33e81d553f,2025-03-17T20:15:14.140000
CVE-2025-2640,0,0,cb1c6d71f05715e40a599d54b3e503bcebd1109fe2ad2ac7ebfd5568ea675609,2025-04-02T14:26:23.040000
CVE-2025-26401,1,1,23c765a09f13b180bc747a94510c12a7063ff4af9743432d0525dc3d2bac0881,2025-04-04T02:15:18.047000
CVE-2025-26408,0,0,cc3ff44719bfe263908c93711d844cb0c43379729d03c83e2a4a7413b5395225,2025-03-22T15:15:38.687000
CVE-2025-26409,0,0,cdf29866235215f5068aacbcbdb6f999e9c9f7adf8baf249758a0e54e8048ba1,2025-03-17T17:15:39.723000
CVE-2025-2641,0,0,0c4e7f6e917c2684e1ef81919020337c8afbfd73d5a46107cea6f98fc25ffc5c,2025-04-02T14:32:40.757000
@ -287194,7 +287198,7 @@ CVE-2025-29062,0,0,1ff2788dd5f552fb8f21e6f091d54996ff20577905a9f1e63eae4f03a7524
CVE-2025-29063,0,0,34c83d2b2f8747e0448570188fd7da004b692225da81e1310374a66d5214ae22,2025-04-03T16:15:36.067000
CVE-2025-29064,0,0,63ef2fd1078f099b2d4d893188c74bf00622e0eae4c040f38bf6d47d983ee862,2025-04-03T20:15:24.117000
CVE-2025-29069,0,0,3fc38b256f6920e55af2799f6d4a36a07c56b3270e0c87c9d5d1bb299d0f3d00,2025-04-03T20:15:24.247000
CVE-2025-29070,0,0,d5d2c3a6363d4714f2dac9103782577c5150c1d2ca74d7253e47ba89ad24d7b8,2025-04-02T14:58:07.527000
CVE-2025-29070,0,1,24569788487d0400d538146d963f6020db8a44ab6999b4d9aa33cc87364054d5,2025-04-04T02:15:18.183000
CVE-2025-29072,0,0,49c945210f3f78e56e41b3df1156a5372b970d771a90cb3e84f3b7747252dacb,2025-03-28T16:15:29.640000
CVE-2025-2908,0,0,041eb1fa89a8461da19bf701f06a30feb1f340b875a2b47541929394f018f7d6,2025-03-28T18:11:40.180000
CVE-2025-29085,0,0,c44b69307beb0453aed56dae25de077fc78d4a4a1d674a6e169b097704137004,2025-04-03T16:15:36.237000
@ -287297,19 +287301,19 @@ CVE-2025-2960,0,0,c08819bedf646cc171f0258b0a94c3a41e46867e1b14a737b82467d2de4f87
CVE-2025-2961,0,0,99a9282acf76e32af58efa1bac54403a0a08178dfa00cc28168e32b8a53d8a08,2025-04-01T20:26:30.593000
CVE-2025-2963,0,0,84d2c4a858a789275648d5c139e966fa3d1f94dab800d93bbe623441c26249a9,2025-04-03T23:15:38.103000
CVE-2025-29635,0,0,ec72c4a9bc58304e70384a4323071097e434b0be9c6a730e4fb246fc5922f36a,2025-04-03T17:35:51.163000
CVE-2025-2964,0,1,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b74,2025-04-04T01:15:39.640000
CVE-2025-2964,0,0,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b74,2025-04-04T01:15:39.640000
CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000
CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000
CVE-2025-29647,0,0,e4f04bbbe875ce7da0c023cd455f13c3d3b5bf507c434d64d650aeffc548fcda,2025-04-03T19:15:39.580000
CVE-2025-2965,0,1,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000
CVE-2025-2966,0,1,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000
CVE-2025-2967,0,1,14b33c1f634d82e0ee8f6eba9d8900eb26f8e5ef6b28fe9846307dc0432895cc,2025-04-04T01:15:39.857000
CVE-2025-2968,0,1,2f5310773b41e32a0609f9013ca63505bab1761feb2b83c508abd214cd1156b1,2025-04-04T01:15:39.930000
CVE-2025-2969,0,1,2c92f9aaf929a695828188a9354c9039b1da27ec28571736050e209bd0423cad,2025-04-04T01:15:40
CVE-2025-2970,0,1,67c007e67877a94fb703f9d730b81129ea1f6387e2e40954ff831fd4807254f0,2025-04-04T01:15:40.067000
CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000
CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000
CVE-2025-2967,0,0,14b33c1f634d82e0ee8f6eba9d8900eb26f8e5ef6b28fe9846307dc0432895cc,2025-04-04T01:15:39.857000
CVE-2025-2968,0,0,2f5310773b41e32a0609f9013ca63505bab1761feb2b83c508abd214cd1156b1,2025-04-04T01:15:39.930000
CVE-2025-2969,0,0,2c92f9aaf929a695828188a9354c9039b1da27ec28571736050e209bd0423cad,2025-04-04T01:15:40
CVE-2025-2970,0,0,67c007e67877a94fb703f9d730b81129ea1f6387e2e40954ff831fd4807254f0,2025-04-04T01:15:40.067000
CVE-2025-2971,0,0,99110d2b96fc1aa569c084aaa6cd6032729ce20862de3ac106c6017d2b904a25,2025-04-01T20:26:30.593000
CVE-2025-29719,0,0,b446742345b6419ca385b67386be33abb53634f1c575e6e3c610b661b326cd63,2025-04-03T15:15:47.860000
CVE-2025-2972,0,1,9bd90eb57737eba9afab46fcd8061576d92129d2495ebdef7228d08af4388952,2025-04-04T01:15:40.127000
CVE-2025-2972,0,0,9bd90eb57737eba9afab46fcd8061576d92129d2495ebdef7228d08af4388952,2025-04-04T01:15:40.127000
CVE-2025-2973,0,0,67e1820b7acfc1735d88b6df2040e61a8d139e219017233e4ee98b5acf7e76cc,2025-04-01T20:26:30.593000
CVE-2025-2974,0,0,695ae768ef6524a31e333a2a15c7b6d7e58b63b62d57be8f5f977780042de419,2025-04-01T20:26:30.593000
CVE-2025-2975,0,0,a51ab4826f882dfc9eb64143ebea4f1b786d39ebf186c00a08fe8a9302ac16b4,2025-04-01T20:26:30.593000
@ -287338,13 +287342,13 @@ CVE-2025-29789,0,0,55e4fc65897de45b10ba90aa15c5781d247cfaecd047ac1420d07ded72514
CVE-2025-2979,0,0,70faf91b6346859b7f0d1497bcf6eeac537ef02b632bd23b2e0e2ae37255bb13,2025-04-01T20:26:30.593000
CVE-2025-29790,0,0,a917e7f845d5526a877724b56a3ae7cbb2c47c308a32a65b6f3b54e65b4f8c98,2025-03-18T19:15:50.813000
CVE-2025-29795,0,0,6628c110a8ddfa1ddc624b3c8e04a9da92178a53d5d396807fa8edc11e306135,2025-03-23T17:15:28.920000
CVE-2025-29796,1,1,eb8b45a8b9341b28dca0cd57c00217a8507056b4db39483facbb797663006caa,2025-04-04T01:15:39.310000
CVE-2025-29796,0,0,eb8b45a8b9341b28dca0cd57c00217a8507056b4db39483facbb797663006caa,2025-04-04T01:15:39.310000
CVE-2025-2980,0,0,e90bea9fa0869a16071d3d0a033a2bb76e259b349a9a0bf9fb845593fb53ed2d,2025-04-01T20:26:30.593000
CVE-2025-29806,0,0,dde4af49c411f184b167c313d22e18033ab4a12ed1db72bb3f1109ada8823750,2025-04-02T14:16:10.870000
CVE-2025-29807,0,0,530d9f651149a8b635edd48694d649666884c8d7e97fd101d5bd23cb34763719,2025-03-21T01:15:17.070000
CVE-2025-2981,0,0,e1592099f2c8ea306adfab1774d65aad5b1081bf2f727bd1f3845471e7bfa07c,2025-04-01T20:26:30.593000
CVE-2025-29814,0,0,435e9e17285030a77811f9738adb8ece14bf52c5a294fba746e389024996a262,2025-03-21T01:15:17.253000
CVE-2025-29815,1,1,ec59be300b12eac46a919eabe6e78e5ea1e569f1c009de1b6fe89e5a92b4d7dc,2025-04-04T01:15:39.487000
CVE-2025-29815,0,0,ec59be300b12eac46a919eabe6e78e5ea1e569f1c009de1b6fe89e5a92b4d7dc,2025-04-04T01:15:39.487000
CVE-2025-2982,0,0,18147376cbfa81f921d40bd8f9b57eee8ed0932c2ab1d6080b91a0ef0abe19e2,2025-04-01T20:26:30.593000
CVE-2025-2983,0,0,efeaa991885da11a1c8124e07f7de31c07c78c44b0bef43fd1faec4e54149319,2025-04-01T20:26:30.593000
CVE-2025-2984,0,0,3f4e6cd5cc63eeb9ae67002e32115346660333feb5923743bc7019b2dd2d5767,2025-04-01T20:26:30.593000
@ -287540,7 +287544,7 @@ CVE-2025-30372,0,0,e366784170fd69403c95573e66e81140f6ab7eebcee57a3b740e41f187b2c
CVE-2025-3038,0,0,22534a6e99d8435c0e3640274e43279290c0824de864795a486909ffa65e03da,2025-04-01T20:26:11.547000
CVE-2025-3039,0,0,8412b53044798e7429c2f1e43b2eaff144fc88ee266808028d00fb7035e9ff90,2025-04-01T20:26:11.547000
CVE-2025-3040,0,0,274892af91b4ed207c6fb8d845fb283c63d995b076d284b90cfd8062dbb59a9e,2025-04-01T20:26:11.547000
CVE-2025-30406,0,0,27ff0b84237b5365678435d706a85e0c3b9d999766d0daa955368cbc4885ce14,2025-04-03T20:15:24.987000
CVE-2025-30406,0,1,5a48163112e03d0f2934ffc4ab32df898c45bdaae108cd7b2a52fde7e5d585c4,2025-04-04T02:15:18.300000
CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000
CVE-2025-3041,0,0,d9fe1e53f2cdd91c8975c5476eceec361ea81e0c3d05a42ad90016292a4f1e02,2025-04-01T20:26:11.547000
CVE-2025-3042,0,0,fd88736e20fff4d6fb751d6092858797dcfb15be28c6cc70538ea93c2bdbe3e3,2025-04-01T20:26:11.547000
@ -288382,7 +288386,7 @@ CVE-2025-31856,0,0,34c9fc8d24de41c656ac2805eaf617d6f31f2944d882d6642faa0b19204f7
CVE-2025-31857,0,0,0eaa697196a3d1fb849532bc5f963b45750e7713342450c99d75dc836d65e978,2025-04-01T20:26:01.990000
CVE-2025-31858,0,0,c2ec00ea59ebe2663ac1287a618365ce41b1b831a8031b74deaeb9865bfa6ed1,2025-04-03T14:15:41.167000
CVE-2025-31859,0,0,0bd37faf5aa7bed594ef599c665cf9c14b44c1fc24cc20b3b4f8ae748baee81a,2025-04-01T20:26:01.990000
CVE-2025-3186,1,1,edf2a059ca86a44bf3fa53a9620e01070fab1f9c2996e9150dc21106abd36b73,2025-04-04T00:15:15.347000
CVE-2025-3186,0,0,edf2a059ca86a44bf3fa53a9620e01070fab1f9c2996e9150dc21106abd36b73,2025-04-04T00:15:15.347000
CVE-2025-31860,0,0,a72f34979df5ea0f16f22d6be6f34791499b83fc474deeda184f29d5a3586f16,2025-04-01T20:26:01.990000
CVE-2025-31861,0,0,270394a1ed801f34baac85043a0338629aceb9ea547e96b69925a7871f6f410f,2025-04-01T20:26:01.990000
CVE-2025-31862,0,0,f5e26b03b1c6a9c746787b8f1eae5b285f09d6a5b285db236ae0ab62303f81e8,2025-04-01T20:26:01.990000
@ -288393,7 +288397,7 @@ CVE-2025-31866,0,0,b1757216c5229111de47d2492109bf00959f5e0be1025ee53f11d9ac0ec4e
CVE-2025-31867,0,0,f0d04afbe15fc797c7e0b952c07dd038cfc5bc6bd5ff6cc22332cb22442d474c,2025-04-01T20:26:01.990000
CVE-2025-31868,0,0,7fce1b16d7319b670d91f083fb479d0ea901776dc979f5d9f4faa6e6dd75c63e,2025-04-01T20:26:01.990000
CVE-2025-31869,0,0,c05b5c7524b97c44ec996697f88528e544d73226c1005b3bf22149344c275009,2025-04-01T20:26:01.990000
CVE-2025-3187,1,1,ab8ea29889e3f741b5fc2363fe536ffec2960267e90b517700cf0042f4cf99af,2025-04-04T01:15:40.197000
CVE-2025-3187,0,0,ab8ea29889e3f741b5fc2363fe536ffec2960267e90b517700cf0042f4cf99af,2025-04-04T01:15:40.197000
CVE-2025-31870,0,0,516bd3dc92a9edf6d58adba078c340db9b751aeca60d06d50cd0c752e4124a6d,2025-04-01T20:26:01.990000
CVE-2025-31871,0,0,ba3f6eb1f55d50280c63e646246ff297c2ab652772d382bd165365ac6ff5f543,2025-04-01T20:26:01.990000
CVE-2025-31872,0,0,ad5fdb6bc0fce36e8acfc4372bef57c4855fa46763792dda7fb84307d174baec,2025-04-01T20:26:01.990000
@ -288404,7 +288408,7 @@ CVE-2025-31876,0,0,237cca5039376e52e203a5e414f4e614dba2ddd4aba3aabcc965a3387b199
CVE-2025-31877,0,0,6695fc81ae4f1608812de0df2a48f876e6c792399ee3aedfa35ef0d26c46b0b7,2025-04-01T20:26:01.990000
CVE-2025-31878,0,0,48d3d84407e6a50771b12d94862e4dc2c6c01145b0177f720bd10d09e7973464,2025-04-01T20:26:01.990000
CVE-2025-31879,0,0,56661b046add1cb143b689e63ff80e575b5ec72251c3b02615596b7e0eacf49f,2025-04-01T20:26:01.990000
CVE-2025-3188,1,1,a461ec8371173b75bbc0b842f6883e037505b167e532a1f818ca2870358ee022,2025-04-04T01:15:40.407000
CVE-2025-3188,0,0,a461ec8371173b75bbc0b842f6883e037505b167e532a1f818ca2870358ee022,2025-04-04T01:15:40.407000
CVE-2025-31880,0,0,ab8b1e1580597ac2391b52f512ec6c6eeda0e71e614909309489b380e240716a,2025-04-01T20:26:01.990000
CVE-2025-31881,0,0,3d55f1ccbab65b8ce874e09e49ea52fbaf130db5299085e44d6898ed9ca39fde,2025-04-01T20:26:01.990000
CVE-2025-31882,0,0,6f2604863895c5b9f134ca2f29d6a3c3a81326b8e5a592764997fc22def30c3e,2025-04-01T20:26:01.990000
@ -288438,7 +288442,15 @@ CVE-2025-31908,0,0,eb42864180a2f3ae29ca7fcb7b1369893cc75fb1cfe5c6047b9b04c7be11c
CVE-2025-31909,0,0,81eff332f8808b56a6e7fb4cb9dd28a2a0d39da7b5ec69237fa3a2fbf730de58,2025-04-03T14:15:43.107000
CVE-2025-31910,0,0,b832932727781de50b17852301cd5a5c89392213265492ff6ff074f0ba795d9f,2025-04-01T20:26:01.990000
CVE-2025-31911,0,0,dafd63d68911a812be24e808d99a55a8ceeb5feee73a79d1772176f67f721793,2025-04-03T14:15:43.257000
CVE-2025-3195,1,1,e308bbc9d3f37a0c8a9faf387891f3285bc40798453437526976c2501eee7c24,2025-04-04T02:15:18.423000
CVE-2025-3196,1,1,0c469902e9c03af3c2770eb5cc31c7d1c31b69b0dd88372a701cee966793608a,2025-04-04T02:15:18.627000
CVE-2025-3198,1,1,5d95a2ea82b745791bf640f9d48bf15646c2f00575cbe9c113a8856b82db0671,2025-04-04T02:15:18.803000
CVE-2025-3199,1,1,3c39a54e77c268763e35ff0806d798e495bbb47478d8118de3630638857b12fa,2025-04-04T02:15:19.013000
CVE-2025-3202,1,1,7d2271acefbd0aeb4336195e51e318c90694b16ffaeb4c3f403e4e40b17682a9,2025-04-04T03:15:13.997000
CVE-2025-3203,1,1,919ec0de9ce5860ade794c4c664422a4664c6732dda101b9589a441b4494f02a,2025-04-04T03:15:14.207000
CVE-2025-3204,1,1,4d1e6c6ff25b45f0c88f0e90b71c7514d44c90d7f8c06f66563eb1f7b4c442db,2025-04-04T03:15:14.413000
CVE-2025-32049,0,0,435007e02cdb62387f8cca68a934782de471662e50e804431c640daa69c918ff,2025-04-03T14:15:43.410000
CVE-2025-3205,1,1,fbb5543a0c7cfb570f3eeac59d46f7b715fd2fb8f441d6740c7d5956f46c3695,2025-04-04T03:15:14.613000
CVE-2025-32050,0,0,4f54b48312cd325a8316d449afd24730a2312b870b9fb45229eadf38b9ccc1c0,2025-04-03T14:15:43.690000
CVE-2025-32051,0,0,589593a5c32fc3f7a2c9e7f401bf3b9d6791113746b52db46878a17a59e4b6ae,2025-04-03T14:15:43.903000
CVE-2025-32052,0,0,93f807bd4245cc5799f1be08815a308eceaa0bb1e8adb95a792899ec2afa2d3d,2025-04-03T15:15:51.933000

Can't render this file because it is too large.