From 96174c2347c011f6aace740817481ba4e5e565fb Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 1 Apr 2025 14:03:54 +0000 Subject: [PATCH] Auto-Update: 2025-04-01T14:00:20.034407+00:00 --- CVE-2013/CVE-2013-72xx/CVE-2013-7285.json | 12 +-- CVE-2019/CVE-2019-101xx/CVE-2019-10173.json | 6 +- CVE-2023/CVE-2023-520xx/CVE-2023-52047.json | 31 +++++- CVE-2024/CVE-2024-135xx/CVE-2024-13553.json | 64 +++++++++++ CVE-2024/CVE-2024-13xx/CVE-2024-1381.json | 74 +++++++++++-- CVE-2024/CVE-2024-14xx/CVE-2024-1437.json | 52 ++++++++- CVE-2024/CVE-2024-263xx/CVE-2024-26333.json | 35 +++++- CVE-2024/CVE-2024-263xx/CVE-2024-26334.json | 35 +++++- CVE-2024/CVE-2024-263xx/CVE-2024-26335.json | 35 +++++- CVE-2024/CVE-2024-284xx/CVE-2024-28429.json | 33 +++++- CVE-2024/CVE-2024-284xx/CVE-2024-28430.json | 33 +++++- CVE-2024/CVE-2024-284xx/CVE-2024-28431.json | 33 +++++- CVE-2024/CVE-2024-284xx/CVE-2024-28432.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28665.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28666.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28667.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28668.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28669.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28670.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28671.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28672.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28673.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28675.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28676.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28677.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28678.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28679.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28680.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28681.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28682.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28683.json | 33 +++++- CVE-2024/CVE-2024-286xx/CVE-2024-28684.json | 33 +++++- CVE-2024/CVE-2024-33xx/CVE-2024-3302.json | 114 +++++++++++++++++--- CVE-2024/CVE-2024-35xx/CVE-2024-3505.json | 62 ++++++++++- CVE-2024/CVE-2024-38xx/CVE-2024-3852.json | 94 +++++++++++++--- CVE-2025/CVE-2025-16xx/CVE-2025-1658.json | 56 ++++++++++ CVE-2025/CVE-2025-16xx/CVE-2025-1659.json | 56 ++++++++++ CVE-2025/CVE-2025-16xx/CVE-2025-1660.json | 56 ++++++++++ CVE-2025/CVE-2025-222xx/CVE-2025-22231.json | 44 ++++++++ CVE-2025/CVE-2025-22xx/CVE-2025-2237.json | 60 +++++++++++ CVE-2025/CVE-2025-233xx/CVE-2025-23367.json | 6 +- CVE-2025/CVE-2025-29xx/CVE-2025-2906.json | 64 +++++++++++ CVE-2025/CVE-2025-301xx/CVE-2025-30177.json | 41 +++++++ CVE-2025/CVE-2025-304xx/CVE-2025-30427.json | 4 +- CVE-2025/CVE-2025-304xx/CVE-2025-30470.json | 4 +- CVE-2025/CVE-2025-30xx/CVE-2025-3028.json | 41 +++++++ CVE-2025/CVE-2025-30xx/CVE-2025-3029.json | 37 +++++++ CVE-2025/CVE-2025-30xx/CVE-2025-3030.json | 37 +++++++ CVE-2025/CVE-2025-30xx/CVE-2025-3031.json | 29 +++++ CVE-2025/CVE-2025-30xx/CVE-2025-3032.json | 29 +++++ CVE-2025/CVE-2025-30xx/CVE-2025-3033.json | 29 +++++ CVE-2025/CVE-2025-30xx/CVE-2025-3034.json | 29 +++++ CVE-2025/CVE-2025-30xx/CVE-2025-3035.json | 25 +++++ CVE-2025/CVE-2025-30xx/CVE-2025-3083.json | 56 ++++++++++ CVE-2025/CVE-2025-30xx/CVE-2025-3084.json | 56 ++++++++++ CVE-2025/CVE-2025-30xx/CVE-2025-3085.json | 56 ++++++++++ CVE-2025/CVE-2025-314xx/CVE-2025-31408.json | 56 ++++++++++ README.md | 57 ++++++++-- _state.csv | 98 ++++++++++------- 59 files changed, 2187 insertions(+), 212 deletions(-) create mode 100644 CVE-2024/CVE-2024-135xx/CVE-2024-13553.json create mode 100644 CVE-2025/CVE-2025-16xx/CVE-2025-1658.json create mode 100644 CVE-2025/CVE-2025-16xx/CVE-2025-1659.json create mode 100644 CVE-2025/CVE-2025-16xx/CVE-2025-1660.json create mode 100644 CVE-2025/CVE-2025-222xx/CVE-2025-22231.json create mode 100644 CVE-2025/CVE-2025-22xx/CVE-2025-2237.json create mode 100644 CVE-2025/CVE-2025-29xx/CVE-2025-2906.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30177.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3028.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3029.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3030.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3031.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3032.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3033.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3034.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3035.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3083.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3084.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3085.json create mode 100644 CVE-2025/CVE-2025-314xx/CVE-2025-31408.json diff --git a/CVE-2013/CVE-2013-72xx/CVE-2013-7285.json b/CVE-2013/CVE-2013-72xx/CVE-2013-7285.json index 711c59e4a03..faa0f082032 100644 --- a/CVE-2013/CVE-2013-72xx/CVE-2013-7285.json +++ b/CVE-2013/CVE-2013-72xx/CVE-2013-7285.json @@ -2,7 +2,7 @@ "id": "CVE-2013-7285", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-15T17:29:00.297", - "lastModified": "2024-11-21T02:00:39.317", + "lastModified": "2025-04-01T13:07:22.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,14 +85,14 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*", - "versionEndIncluding": "1.4.6", - "matchCriteriaId": "6778C7B9-EA5D-44AA-8E26-FC292493D887" + "criteria": "cpe:2.3:a:x-stream:xstream:1.4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA4A48D-89A9-4020-90A5-6CB53F8D7529" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:xstream_project:xstream:1.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "3832CB4C-DDB8-439C-B396-1A1D91F70DEA" + "criteria": "cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.4.6", + "matchCriteriaId": "6778C7B9-EA5D-44AA-8E26-FC292493D887" } ] } diff --git a/CVE-2019/CVE-2019-101xx/CVE-2019-10173.json b/CVE-2019/CVE-2019-101xx/CVE-2019-10173.json index eea87bb0d5c..daf9e7ca895 100644 --- a/CVE-2019/CVE-2019-101xx/CVE-2019-10173.json +++ b/CVE-2019/CVE-2019-101xx/CVE-2019-10173.json @@ -2,7 +2,7 @@ "id": "CVE-2019-10173", "sourceIdentifier": "secalert@redhat.com", "published": "2019-07-23T13:15:13.177", - "lastModified": "2024-11-21T04:18:34.723", + "lastModified": "2025-04-01T13:07:22.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -117,8 +117,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:xstream_project:xstream:1.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "3832CB4C-DDB8-439C-B396-1A1D91F70DEA" + "criteria": "cpe:2.3:a:x-stream:xstream:1.4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA4A48D-89A9-4020-90A5-6CB53F8D7529" } ] } diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52047.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52047.json index ed92046247b..c751aa88ad7 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52047.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52047.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52047", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-28T20:15:41.590", - "lastModified": "2024-11-21T08:39:04.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:30:28.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7.112:*:*:*:*:*:*:*", + "matchCriteriaId": "A03BA3DE-8692-483B-AD78-AC288D0250DD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/chongfujun/test/blob/main/2023-52047.docx", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/chongfujun/test/blob/main/2023-52047.docx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13553.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13553.json new file mode 100644 index 00000000000..c8f55e9f2e9 --- /dev/null +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13553.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-13553", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-01T12:15:14.643", + "lastModified": "2025-04-01T12:15:14.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SMS Alert Order Notifications \u2013 WooCommerce plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.7.9. This is due to the plugin using the Host header to determine if the plugin is in a playground environment. This makes it possible for unauthenticated attackers to spoof the Host header to make the OTP code \"1234\" and authenticate as any user, including administrators." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227241%40sms-alert&new=3227241%40sms-alert&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3248017%40sms-alert&new=3248017%40sms-alert&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4e444a30-11c5-4219-b4fe-635084cbac3a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1381.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1381.json index a34ad661553..35593e29cae 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1381.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1381.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1381", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-05T02:15:26.620", - "lastModified": "2024-11-21T08:50:27.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-01T13:39:45.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pagebuildersandwich:page_builder_sandwich:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.1.0", + "matchCriteriaId": "D3BFF465-28EE-4E56-9C04-984E790DD567" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/page-builder-sandwich/trunk/class-inspector.php#L90", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e98d92a-fe64-4591-972b-ed11542506b7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/page-builder-sandwich/trunk/class-inspector.php#L90", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e98d92a-fe64-4591-972b-ed11542506b7?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1437.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1437.json index de4ae19216c..f781d922a82 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1437.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1437.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1437", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-29T06:15:46.593", - "lastModified": "2024-11-21T08:50:35.123", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-01T13:43:41.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adsplugin:adsmonetizer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.3", + "matchCriteriaId": "58D129E1-363B-47C9-9994-3734A682FDD4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/adsensei-b30/wordpress-adsmonetizer-plugin-3-1-2-reflected-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/adsensei-b30/wordpress-adsmonetizer-plugin-3-1-2-reflected-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26333.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26333.json index ff6b8b7b4bd..1f21e331a6b 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26333.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26333.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26333", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T08:15:39.500", - "lastModified": "2024-11-21T09:02:23.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:38:57.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/matthiaskramm/swftools/issues/219", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://github.com/matthiaskramm/swftools/issues/219", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26334.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26334.json index cde79723aa3..2b06f16ea77 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26334.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26334.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26334", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T09:15:45.040", - "lastModified": "2024-11-21T09:02:23.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:38:46.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/matthiaskramm/swftools/issues/221", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://github.com/matthiaskramm/swftools/issues/221", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26335.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26335.json index a328b86dc23..e3e799d5c0a 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26335.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26335.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26335", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T09:15:45.100", - "lastModified": "2024-11-21T09:02:23.423", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:38:30.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/matthiaskramm/swftools/issues/222", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://github.com/matthiaskramm/swftools/issues/222", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28429.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28429.json index 18bd252ab1e..c8a9d7d718c 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28429.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28429.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28429", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T13:15:47.837", - "lastModified": "2024-11-21T09:06:20.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:41:22.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/itsqian797/cms/blob/main/2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/itsqian797/cms/blob/main/2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28430.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28430.json index 6aa86ac912e..9d6fab0f9d4 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28430.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28430.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28430", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T13:15:47.897", - "lastModified": "2025-03-13T15:15:43.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:43:05.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/itsqian797/cms/blob/main/1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/itsqian797/cms/blob/main/1.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28431.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28431.json index 4144d6c26c6..19217468d9d 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28431.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28431.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28431", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T13:15:47.943", - "lastModified": "2024-11-21T09:06:20.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:43:02.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/itsqian797/cms/blob/main/3.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/itsqian797/cms/blob/main/3.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28432.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28432.json index 44869d4ad23..7746c9bd70f 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28432.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28432.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28432", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T13:15:47.987", - "lastModified": "2024-11-21T09:06:21.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:56.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/itsqian797/cms/blob/main/4.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/itsqian797/cms/blob/main/4.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28665.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28665.json index 37349cf9948..bc4c655cff6 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28665.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28665", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T13:15:48.033", - "lastModified": "2024-11-21T09:06:43.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:52.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/1.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28666.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28666.json index cbd8bb36d11..5724b2c94fc 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28666.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28666.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28666", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T13:15:48.080", - "lastModified": "2024-11-21T09:06:43.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:49.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28667.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28667.json index 3ad512ed396..407797bb88d 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28667.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28667.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28667", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T13:15:48.127", - "lastModified": "2024-11-21T09:06:43.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:45.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/6.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/6.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28668.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28668.json index c4c31c1abb6..8132e3b941d 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28668.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28668.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28668", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T13:15:48.170", - "lastModified": "2025-03-13T17:15:30.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:42.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/5.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/5.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28669.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28669.json index f3858c54bb7..95a2c7d0469 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28669.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28669.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28669", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.100", - "lastModified": "2024-11-21T09:06:44.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:31.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/10.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/10.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28670.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28670.json index 8583bc9af10..c79ca00ff8f 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28670.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28670.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28670", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.147", - "lastModified": "2024-11-21T09:06:44.270", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:28.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/9.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/9.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28671.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28671.json index ebba36d2b03..193e8bea268 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28671.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28671.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28671", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.197", - "lastModified": "2024-11-21T09:06:44.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:24.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/7.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/7.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28672.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28672.json index 8ffe4d66c55..ea0dceabca5 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28672.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28672.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28672", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.247", - "lastModified": "2024-11-21T09:06:44.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:21.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/3.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/3.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28673.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28673.json index 1581584fd87..657ac634760 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28673.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28673.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28673", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.297", - "lastModified": "2024-11-21T09:06:44.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:15.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/4.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/4.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28675.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28675.json index ac36263f817..9fbe0206f6c 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28675.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28675.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28675", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T14:15:07.770", - "lastModified": "2024-11-21T09:06:45.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:38.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/12.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/12.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28676.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28676.json index c9b4e70bdff..dd066557e41 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28676.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28676.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28676", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.347", - "lastModified": "2024-11-21T09:06:45.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:11.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/18.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/18.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28677.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28677.json index 77a1f9f30d4..2cca3ce2925 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28677.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28677.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28677", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.390", - "lastModified": "2024-11-21T09:06:45.597", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:08.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/14.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/14.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28678.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28678.json index e9180578ac5..272ef3e1ce2 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28678.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28678.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28678", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.440", - "lastModified": "2024-11-21T09:06:45.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:44:20.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/15.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/15.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28679.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28679.json index 62823f09749..6a7d42c3589 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28679.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28679.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28679", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.483", - "lastModified": "2024-11-21T09:06:46.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:44:16.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/19.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/19.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28680.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28680.json index edc0bf2afb5..7a2691ff9ea 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28680.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28680.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28680", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.530", - "lastModified": "2024-11-21T09:06:46.260", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:44:12.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/11.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/11.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28681.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28681.json index da18b3dd5f2..89fc3df757d 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28681.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28681.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28681", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.570", - "lastModified": "2024-11-21T09:06:46.473", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:44:09.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/17.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/17.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28682.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28682.json index 2bbec43b913..f38ce9dba74 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28682.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28682.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28682", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.620", - "lastModified": "2024-11-21T09:06:46.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:44:06.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/13.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/13.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28683.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28683.json index b035071bcda..bb206c7f28a 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28683.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28683.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28683", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T16:15:30.667", - "lastModified": "2024-11-21T09:06:46.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:44:01.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/20.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/20.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-286xx/CVE-2024-28684.json b/CVE-2024/CVE-2024-286xx/CVE-2024-28684.json index 4330115816b..7eb42314de3 100644 --- a/CVE-2024/CVE-2024-286xx/CVE-2024-28684.json +++ b/CVE-2024/CVE-2024-286xx/CVE-2024-28684.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28684", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-13T14:15:07.820", - "lastModified": "2024-11-21T09:06:47.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:42:35.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", + "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/777erp/cms/blob/main/16.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/777erp/cms/blob/main/16.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json index c4ff5188459..ce2d0ba3192 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3302", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.310", - "lastModified": "2025-03-29T00:15:22.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-01T13:39:33.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,62 +61,134 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.10", + "matchCriteriaId": "A9E787D0-BCFE-45BA-AC41-477D33CEBBE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "125.0", + "matchCriteriaId": "7334A1C6-C6BF-4C70-ADF1-736BCE0EA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndIncluding": "115.10", + "matchCriteriaId": "F7481AD2-CA76-4EE6-8162-78DE4C90C87D" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1881183", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://kb.cert.org/vuls/id/421644", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "US Government Resource" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-19/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-20/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1881183", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://kb.cert.org/vuls/id/421644", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "US Government Resource" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-19/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-20/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3505.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3505.json index 40f029e4ce9..62a101c112e 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3505.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3505.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3505", "sourceIdentifier": "reefs@jfrog.com", "published": "2024-04-15T08:15:18.180", - "lastModified": "2024-11-21T09:29:44.910", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-01T13:59:28.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*", + "versionEndExcluding": "7.77.3", + "matchCriteriaId": "4C1DE6A6-89C3-4E1F-A90D-CBEE0B9FB10B" + } + ] + } + ] } ], "references": [ { "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories", - "source": "reefs@jfrog.com" + "source": "reefs@jfrog.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json index e145b725ba6..4c4e714adfb 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3852", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.357", - "lastModified": "2024-11-21T09:30:32.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-01T13:39:19.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,54 +51,120 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.10", + "matchCriteriaId": "A9E787D0-BCFE-45BA-AC41-477D33CEBBE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "125.0", + "matchCriteriaId": "7334A1C6-C6BF-4C70-ADF1-736BCE0EA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.10", + "matchCriteriaId": "E0E4DEC0-5D13-48E9-B6A5-2DC8F30785DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883542", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-19/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-20/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883542", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-19/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-20/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1658.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1658.json new file mode 100644 index 00000000000..c35b14484b9 --- /dev/null +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1658.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1658", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-04-01T13:15:39.753", + "lastModified": "2025-04-01T13:15:39.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1659.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1659.json new file mode 100644 index 00000000000..121087d38ae --- /dev/null +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1659.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1659", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-04-01T13:15:39.913", + "lastModified": "2025-04-01T13:15:39.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-16xx/CVE-2025-1660.json b/CVE-2025/CVE-2025-16xx/CVE-2025-1660.json new file mode 100644 index 00000000000..a317c1b9f56 --- /dev/null +++ b/CVE-2025/CVE-2025-16xx/CVE-2025-1660.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1660", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2025-04-01T13:15:40.053", + "lastModified": "2025-04-01T13:15:40.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22231.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22231.json new file mode 100644 index 00000000000..62b084879fb --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22231.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-22231", + "sourceIdentifier": "security@vmware.com", + "published": "2025-04-01T13:15:40.197", + "lastModified": "2025-04-01T13:15:40.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "VMware Aria Operations contains a local privilege escalation vulnerability.\u00a0A malicious actor with local administrative privileges can escalate their privileges to root on the appliance running VMware Aria Operations." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25541", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2237.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2237.json new file mode 100644 index 00000000000..ab5d6a7c6e8 --- /dev/null +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2237.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-2237", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-01T12:15:15.420", + "lastModified": "2025-04-01T12:15:15.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WP RealEstate plugin for WordPress, used by the Homeo theme, is vulnerable to authentication bypass in all versions up to, and including, 1.6.26. This is due to insufficient role restrictions in the 'process_register' function. This makes it possible for unauthenticated attackers to register an account with the Administrator role." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://themeforest.net/item/homeo-real-estate-wordpress-theme/26372986#item-description__updates-history", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f7bff6-3bc3-4572-97fd-a039d54ac0ff?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23367.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23367.json index afe2cfc828f..c8485708f76 100644 --- a/CVE-2025/CVE-2025-233xx/CVE-2025-23367.json +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23367.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23367", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-30T15:15:18.610", - "lastModified": "2025-01-31T21:15:13.613", + "lastModified": "2025-04-01T13:15:40.327", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:3467", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-23367", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2906.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2906.json new file mode 100644 index 00000000000..9af8ba1a8d7 --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2906.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-2906", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-01T12:15:15.580", + "lastModified": "2025-04-01T12:15:15.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Contempo Real Estate Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://contempothemes.com/changelog/", + "source": "security@wordfence.com" + }, + { + "url": "https://themeforest.net/item/wp-pro-real-estate-7-responsive-real-estate-wordpress-theme/12473778", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/39c651c3-a478-4f58-af51-fd73d2934bdf?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30177.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30177.json new file mode 100644 index 00000000000..1a959f8350e --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30177.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2025-30177", + "sourceIdentifier": "security@apache.org", + "published": "2025-04-01T12:15:15.747", + "lastModified": "2025-04-01T12:15:15.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Bypass/Injection vulnerability in Apache Camel in Camel-Undertow component under particular conditions.\n\nThis issue affects Apache Camel: from 4.10.0 before 4.10.3, from 4.8.0 before 4.8.6.\n\nUsers are recommended to upgrade to version 4.10.3 for 4.10.x LTS and 4.8.6 for 4.8.x LTS.\n\nCamel undertow component is vulnerable to Camel message header injection, in particular the custom header filter strategy used by the component only filter the \"out\" direction, while it doesn't filter the \"in\" direction.\n\n\nThis allows an attacker to include Camel specific headers that for some Camel components can alter the behaviour such as the camel-bean component, or the camel-exec component." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-164" + } + ] + } + ], + "references": [ + { + "url": "https://camel.apache.org/security/CVE-2025-27636.html", + "source": "security@apache.org" + }, + { + "url": "https://camel.apache.org/security/CVE-2025-29891.html", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/dj79zdgw01j337lr9gvyy4sv8xfyw8py", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30427.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30427.json index 39c58e54401..656a653c277 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30427.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30427.json @@ -2,7 +2,7 @@ "id": "CVE-2025-30427", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:25.037", - "lastModified": "2025-04-01T04:15:48.400", + "lastModified": "2025-04-01T13:15:40.463", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -42,7 +42,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-416" } ] } diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30470.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30470.json index 0e279dc6b82..4e27373beaf 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30470.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30470.json @@ -2,7 +2,7 @@ "id": "CVE-2025-30470", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:28.247", - "lastModified": "2025-04-01T04:15:48.907", + "lastModified": "2025-04-01T13:15:40.650", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -42,7 +42,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-22" } ] } diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3028.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3028.json new file mode 100644 index 00000000000..272c1c93866 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3028.json @@ -0,0 +1,41 @@ +{ + "id": "CVE-2025-3028", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-04-01T13:15:41.190", + "lastModified": "2025-04-01T13:15:41.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability affects Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird ESR < 128.9." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1941002", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-20/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-21/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-22/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-23/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-24/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3029.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3029.json new file mode 100644 index 00000000000..2b8edde0428 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3029.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-3029", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-04-01T13:15:41.290", + "lastModified": "2025-04-01T13:15:41.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird ESR < 128.9." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1952213", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-20/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-22/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-23/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-24/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3030.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3030.json new file mode 100644 index 00000000000..595e95432ee --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3030.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-3030", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-04-01T13:15:41.390", + "lastModified": "2025-04-01T13:15:41.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird ESR < 128.9." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1850615%2C1932468%2C1942551%2C1951017%2C1951494", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-20/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-22/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-23/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-24/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3031.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3031.json new file mode 100644 index 00000000000..57359a33276 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3031.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-3031", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-04-01T13:15:41.493", + "lastModified": "2025-04-01T13:15:41.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker could read 32 bits of values spilled onto the stack in a JIT compiled function. This vulnerability affects Firefox < 137 and Thunderbird < 137." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1947141", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-20/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-23/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3032.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3032.json new file mode 100644 index 00000000000..d5245d26d95 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3032.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-3032", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-04-01T13:15:41.587", + "lastModified": "2025-04-01T13:15:41.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Leaking of file descriptors from the fork server to web content processes could allow for privilege escalation attacks. This vulnerability affects Firefox < 137 and Thunderbird < 137." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1949987", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-20/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-23/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3033.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3033.json new file mode 100644 index 00000000000..82da004c84e --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3033.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-3033", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-04-01T13:15:41.697", + "lastModified": "2025-04-01T13:15:41.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After selecting a malicious Windows `.url` shortcut from the local filesystem, an unexpected file could be uploaded. \n*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 137 and Thunderbird < 137." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1950056", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-20/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-23/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3034.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3034.json new file mode 100644 index 00000000000..ac5ca4d8bb4 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3034.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-3034", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-04-01T13:15:41.790", + "lastModified": "2025-04-01T13:15:41.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory safety bugs present in Firefox 136 and Thunderbird 136. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 137 and Thunderbird < 137." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1894100%2C1934086%2C1950360", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-20/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-23/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3035.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3035.json new file mode 100644 index 00000000000..9798611d83b --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3035.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-3035", + "sourceIdentifier": "security@mozilla.org", + "published": "2025-04-01T13:15:41.893", + "lastModified": "2025-04-01T13:15:41.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "By first using the AI chatbot in one tab and later activating it in another tab, the document title of the previous tab would leak into the chat prompt. This vulnerability affects Firefox < 137." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1952268", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2025-20/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3083.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3083.json new file mode 100644 index 00000000000..6bcebf8bdce --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3083.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-3083", + "sourceIdentifier": "cna@mongodb.com", + "published": "2025-04-01T12:15:15.883", + "lastModified": "2025-04-01T12:15:15.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Specifically crafted MongoDB wire protocol messages can cause mongos to crash during command validation. This can occur without using an authenticated connection. This issue affects MongoDB v5.0 versions prior to 5.0.31, \u00a0MongoDB v6.0 versions prior to\u00a06.0.20 and MongoDB v7.0 versions prior to 7.0.16" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + } + ] + } + ], + "references": [ + { + "url": "https://jira.mongodb.org/browse/SERVER-103152", + "source": "cna@mongodb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3084.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3084.json new file mode 100644 index 00000000000..33eb22e7512 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3084.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-3084", + "sourceIdentifier": "cna@mongodb.com", + "published": "2025-04-01T12:15:16.037", + "lastModified": "2025-04-01T12:15:16.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When run on commands with certain arguments set, explain may fail to validate these arguments before using them. This can lead to crashes in router servers. This affects MongoDB Server v5.0 prior to 5.0.31, MongoDB Server v6.0 prior to 6.0.20, MongoDB Server v7.0 prior to 7.0.16 and MongoDB Server v8.0 prior to 8.0.4" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-703" + } + ] + } + ], + "references": [ + { + "url": "https://jira.mongodb.org/browse/SERVER-103153", + "source": "cna@mongodb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3085.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3085.json new file mode 100644 index 00000000000..c1797bda0b6 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3085.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-3085", + "sourceIdentifier": "cna@mongodb.com", + "published": "2025-04-01T12:15:16.187", + "lastModified": "2025-04-01T12:15:16.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer's certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.\nRequired Configuration :\u00a0MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-299" + } + ] + } + ], + "references": [ + { + "url": "https://jira.mongodb.org/browse/SERVER-95445", + "source": "cna@mongodb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31408.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31408.json new file mode 100644 index 00000000000..ca47eabaeed --- /dev/null +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31408.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31408", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-01T13:15:41.037", + "lastModified": "2025-04-01T13:15:41.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Zoho Flow allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Zoho Flow: from n/a through 2.13.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/zoho-flow/vulnerability/wordpress-zoho-flow-plugin-2-13-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 05e1b4eb791..a8c3855f86d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-01T12:00:20.331088+00:00 +2025-04-01T14:00:20.034407+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-01T11:15:39.517000+00:00 +2025-04-01T13:59:28.320000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -287807 +287827 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `20` -- [CVE-2025-3082](CVE-2025/CVE-2025-30xx/CVE-2025-3082.json) (`2025-04-01T11:15:39.517`) +- [CVE-2024-13553](CVE-2024/CVE-2024-135xx/CVE-2024-13553.json) (`2025-04-01T12:15:14.643`) +- [CVE-2025-1658](CVE-2025/CVE-2025-16xx/CVE-2025-1658.json) (`2025-04-01T13:15:39.753`) +- [CVE-2025-1659](CVE-2025/CVE-2025-16xx/CVE-2025-1659.json) (`2025-04-01T13:15:39.913`) +- [CVE-2025-1660](CVE-2025/CVE-2025-16xx/CVE-2025-1660.json) (`2025-04-01T13:15:40.053`) +- [CVE-2025-22231](CVE-2025/CVE-2025-222xx/CVE-2025-22231.json) (`2025-04-01T13:15:40.197`) +- [CVE-2025-2237](CVE-2025/CVE-2025-22xx/CVE-2025-2237.json) (`2025-04-01T12:15:15.420`) +- [CVE-2025-2906](CVE-2025/CVE-2025-29xx/CVE-2025-2906.json) (`2025-04-01T12:15:15.580`) +- [CVE-2025-30177](CVE-2025/CVE-2025-301xx/CVE-2025-30177.json) (`2025-04-01T12:15:15.747`) +- [CVE-2025-3028](CVE-2025/CVE-2025-30xx/CVE-2025-3028.json) (`2025-04-01T13:15:41.190`) +- [CVE-2025-3029](CVE-2025/CVE-2025-30xx/CVE-2025-3029.json) (`2025-04-01T13:15:41.290`) +- [CVE-2025-3030](CVE-2025/CVE-2025-30xx/CVE-2025-3030.json) (`2025-04-01T13:15:41.390`) +- [CVE-2025-3031](CVE-2025/CVE-2025-30xx/CVE-2025-3031.json) (`2025-04-01T13:15:41.493`) +- [CVE-2025-3032](CVE-2025/CVE-2025-30xx/CVE-2025-3032.json) (`2025-04-01T13:15:41.587`) +- [CVE-2025-3033](CVE-2025/CVE-2025-30xx/CVE-2025-3033.json) (`2025-04-01T13:15:41.697`) +- [CVE-2025-3034](CVE-2025/CVE-2025-30xx/CVE-2025-3034.json) (`2025-04-01T13:15:41.790`) +- [CVE-2025-3035](CVE-2025/CVE-2025-30xx/CVE-2025-3035.json) (`2025-04-01T13:15:41.893`) +- [CVE-2025-3083](CVE-2025/CVE-2025-30xx/CVE-2025-3083.json) (`2025-04-01T12:15:15.883`) +- [CVE-2025-3084](CVE-2025/CVE-2025-30xx/CVE-2025-3084.json) (`2025-04-01T12:15:16.037`) +- [CVE-2025-3085](CVE-2025/CVE-2025-30xx/CVE-2025-3085.json) (`2025-04-01T12:15:16.187`) +- [CVE-2025-31408](CVE-2025/CVE-2025-314xx/CVE-2025-31408.json) (`2025-04-01T13:15:41.037`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `37` -- [CVE-2024-56325](CVE-2024/CVE-2024-563xx/CVE-2024-56325.json) (`2025-04-01T10:15:15.360`) +- [CVE-2024-28665](CVE-2024/CVE-2024-286xx/CVE-2024-28665.json) (`2025-04-01T13:42:52.583`) +- [CVE-2024-28666](CVE-2024/CVE-2024-286xx/CVE-2024-28666.json) (`2025-04-01T13:42:49.097`) +- [CVE-2024-28667](CVE-2024/CVE-2024-286xx/CVE-2024-28667.json) (`2025-04-01T13:42:45.900`) +- [CVE-2024-28668](CVE-2024/CVE-2024-286xx/CVE-2024-28668.json) (`2025-04-01T13:42:42.853`) +- [CVE-2024-28669](CVE-2024/CVE-2024-286xx/CVE-2024-28669.json) (`2025-04-01T13:42:31.980`) +- [CVE-2024-28670](CVE-2024/CVE-2024-286xx/CVE-2024-28670.json) (`2025-04-01T13:42:28.547`) +- [CVE-2024-28671](CVE-2024/CVE-2024-286xx/CVE-2024-28671.json) (`2025-04-01T13:42:24.713`) +- [CVE-2024-28672](CVE-2024/CVE-2024-286xx/CVE-2024-28672.json) (`2025-04-01T13:42:21.180`) +- [CVE-2024-28673](CVE-2024/CVE-2024-286xx/CVE-2024-28673.json) (`2025-04-01T13:42:15.560`) +- [CVE-2024-28675](CVE-2024/CVE-2024-286xx/CVE-2024-28675.json) (`2025-04-01T13:42:38.400`) +- [CVE-2024-28676](CVE-2024/CVE-2024-286xx/CVE-2024-28676.json) (`2025-04-01T13:42:11.823`) +- [CVE-2024-28677](CVE-2024/CVE-2024-286xx/CVE-2024-28677.json) (`2025-04-01T13:42:08.577`) +- [CVE-2024-28678](CVE-2024/CVE-2024-286xx/CVE-2024-28678.json) (`2025-04-01T13:44:20.637`) +- [CVE-2024-28679](CVE-2024/CVE-2024-286xx/CVE-2024-28679.json) (`2025-04-01T13:44:16.210`) +- [CVE-2024-28680](CVE-2024/CVE-2024-286xx/CVE-2024-28680.json) (`2025-04-01T13:44:12.623`) +- [CVE-2024-28681](CVE-2024/CVE-2024-286xx/CVE-2024-28681.json) (`2025-04-01T13:44:09.607`) +- [CVE-2024-28682](CVE-2024/CVE-2024-286xx/CVE-2024-28682.json) (`2025-04-01T13:44:06.493`) +- [CVE-2024-28683](CVE-2024/CVE-2024-286xx/CVE-2024-28683.json) (`2025-04-01T13:44:01.837`) +- [CVE-2024-28684](CVE-2024/CVE-2024-286xx/CVE-2024-28684.json) (`2025-04-01T13:42:35.420`) +- [CVE-2024-3302](CVE-2024/CVE-2024-33xx/CVE-2024-3302.json) (`2025-04-01T13:39:33.140`) +- [CVE-2024-3505](CVE-2024/CVE-2024-35xx/CVE-2024-3505.json) (`2025-04-01T13:59:28.320`) +- [CVE-2024-3852](CVE-2024/CVE-2024-38xx/CVE-2024-3852.json) (`2025-04-01T13:39:19.437`) +- [CVE-2025-23367](CVE-2025/CVE-2025-233xx/CVE-2025-23367.json) (`2025-04-01T13:15:40.327`) +- [CVE-2025-30427](CVE-2025/CVE-2025-304xx/CVE-2025-30427.json) (`2025-04-01T13:15:40.463`) +- [CVE-2025-30470](CVE-2025/CVE-2025-304xx/CVE-2025-30470.json) (`2025-04-01T13:15:40.650`) ## Download and Usage diff --git a/_state.csv b/_state.csv index cbc97955857..47d5a9cc72f 100644 --- a/_state.csv +++ b/_state.csv @@ -64292,7 +64292,7 @@ CVE-2013-7281,0,0,8414f8e6a52ac16fc1a3ad2b6fb96130564ecd206bc82bb48fb25b29b8e911 CVE-2013-7282,0,0,d56e230ab562a569a2f0498d1c0718526c0b604e6c6d1e05dd34a00c4b767019,2024-11-21T02:00:38.903000 CVE-2013-7283,0,0,1d59fc50e9fe3d5bc966cdd30114268b80949a468737ae3b4980998fa3984275,2024-11-21T02:00:39.047000 CVE-2013-7284,0,0,2825d7c406db013808ec90b02c946f85496c12af0196e8bcd1ef28dacd3a6289,2024-11-21T02:00:39.197000 -CVE-2013-7285,0,0,8afcf92966a68ba021dc1cd4609170df59dc5e9eacd242aecff3c30e106e8765,2024-11-21T02:00:39.317000 +CVE-2013-7285,0,1,8ef097ed01d62ecb0587d4fa746c0ecd0afd3066423743e69957b16209fb1e02,2025-04-01T13:07:22.907000 CVE-2013-7286,0,0,34fc856351f776eb47e5ef4c3bb4e0f7f1847a0a1acd4fc85bd479ef5a26760e,2024-11-21T02:00:39.553000 CVE-2013-7287,0,0,dfd8414dcef17b9efbc491e583acaf43abc4eaadf32c45e408ad49364d9073ed,2024-11-21T02:00:39.693000 CVE-2013-7288,0,0,595bb20fc7448d787f3b466e856f135740bc88dc169f2d5cb7f1155af8eedd18,2024-11-21T02:00:39.860000 @@ -128540,7 +128540,7 @@ CVE-2019-1017,0,0,76f87e83dc83dafe61e162ce6c2a97169557972584d1d13601651b6b5ebb17 CVE-2019-10170,0,0,ddf2a74c533bdedd723fedb9f282caad8030c6929dbbf5f2d1dc7303d4154da0,2024-11-21T04:18:34.220000 CVE-2019-10171,0,0,5000a3b223bdd5cd70c7ddc50d756130a892941c7ae78c0b5776c757bec80e48,2024-11-21T04:18:34.347000 CVE-2019-10172,0,0,c1a9f7f83c615a05be933cee6c3fee2cd3ee2a7ac76168e20a99a0d2bed74721,2024-11-21T04:18:34.477000 -CVE-2019-10173,0,0,d34feb949150a4571b43ef5b054630f49f875a2e2c0d0036b982585f10fa1ad6,2024-11-21T04:18:34.723000 +CVE-2019-10173,0,1,908dc41ab5d0f8587c63c544f7b3da74b78b2ce6f7f2b98e490f0115a75e0082,2025-04-01T13:07:22.907000 CVE-2019-10174,0,0,c7efb509df372b5759ef76da901f09a98b2ec22d90c2bc31b26f8775ec7d35ce,2024-11-21T04:18:34.940000 CVE-2019-10175,0,0,14a85a9f5f29e7d8bc938412453e7182fd73e4bd3f61380a8013d96ebd98ba1c,2024-11-21T04:18:35.090000 CVE-2019-10176,0,0,991fec9163e2e9793503c207ef6bf3d7341bce43f51705bcf7acf8d3b7365a62,2024-11-21T04:18:35.207000 @@ -240762,7 +240762,7 @@ CVE-2023-52043,0,0,90e54dc8f5faefeb0db40410720bff86ff8cbfce9cd09d50903f4f37ff56e CVE-2023-52044,0,0,27f01b802a56820e7cdc263c3cdc3f3f5710cce365b33699f214a04aa98efeab,2024-11-01T16:35:05.760000 CVE-2023-52045,0,0,e001878c4739bcc44b6d7cd402aee402c8b408536d7fff79df0d108c46bb8121,2024-11-01T18:35:02.070000 CVE-2023-52046,0,0,194849462bf429fc749f298b05a36377ff7074363e301b433cd9950d69c4c501,2024-11-21T08:39:04.817000 -CVE-2023-52047,0,0,ec74edf8f9f1203b85e2e02252b36297bb7ed9a6eaefff9c228d60c298b0cc63,2024-11-21T08:39:04.963000 +CVE-2023-52047,0,1,d56b5255bbf43ce833425482d3a7c4458ee12e08ce88fc91b5b4e4a71c62ee74,2025-04-01T13:30:28.050000 CVE-2023-52048,0,0,ef196fbe22a158873fe068671233b84bc4c47c84ad85cca18f115c471c37eb26,2024-11-26T16:15:08.977000 CVE-2023-5205,0,0,ad9e6403ed51d32e238949552f23850cd3c894ce7b700f7f43181c17b96bcabf,2024-11-21T08:41:17.900000 CVE-2023-52059,0,0,631fc170b23676a9d5a914e1efcd033aa6ac461afd7c0cbe7ba670738271ca23,2024-11-21T08:39:05.367000 @@ -247989,6 +247989,7 @@ CVE-2024-1355,0,0,b2f1b87d4539641a8b428dd70f8c417d220c7c7d389eb6cfd2926afaae656b CVE-2024-13550,0,0,a4fead6d03b6144abe5ac40b03d52a1da2858d08b4f2df68e9fe9b57926c0bff,2025-02-04T19:25:13.807000 CVE-2024-13551,0,0,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000 CVE-2024-13552,0,0,727d2501f561c703e4b830bea73318d02ecb82132ce891ff47b177cb8690df66,2025-03-07T10:15:14.493000 +CVE-2024-13553,1,1,89f04b8687ba3dd70134ecf1125b6b57d41efc81297b94aa54e650e504c6dca0,2025-04-01T12:15:14.643000 CVE-2024-13554,0,0,7c6792ed304320bad6afd2ef20fd307ba91eff7957375903da0bd819567a9045,2025-02-25T03:52:20.300000 CVE-2024-13555,0,0,49b73d745edef53131648713ff0454df654c61bc1fe448679f0e83788ee99801,2025-02-24T14:54:29.683000 CVE-2024-13556,0,0,227f79da3d8af7739955eed8b3ebf27bbbf505836c230601eee8e2a82464e9ab,2025-02-21T15:41:41.720000 @@ -248228,7 +248229,7 @@ CVE-2024-13804,0,0,546456cd578710618758b971a00a524b9b7f35326179380b6ee7971c53734 CVE-2024-13805,0,0,ab23ddffd79c9236654dca87d416c22cef2f181f71a6522374ad6bbab1e39bf2,2025-03-07T10:15:16.123000 CVE-2024-13806,0,0,2b103acb686ba11654b3e2c5ab41948ab81fbeb9ed340b778f561b48dfe3cc2f,2025-03-01T08:15:33.653000 CVE-2024-13809,0,0,0560f3b13a50d69c775a261a59e91c9ab0b720365e711ebd048429107113c32d,2025-03-05T10:15:17.313000 -CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 +CVE-2024-1381,0,1,029377302d4050442312d0ea5700149ec4187470e4ad3d8cfad55037f8e5ed9f,2025-04-01T13:39:45.360000 CVE-2024-13810,0,0,fdf2d49dfa34debf8ee34b4921f174214e4829a57323b43cd52f342f23da5598,2025-03-05T10:15:17.503000 CVE-2024-13811,0,0,57806b80d84984ab0707eab6f87b5409b8e69c8b4253d9d4911055373b8edd93,2025-03-05T10:15:17.877000 CVE-2024-13813,0,0,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000 @@ -248379,7 +248380,7 @@ CVE-2024-1433,0,0,87f22d20b32269d8237d95a25fad63601c11890ef469b28ff99ec357c5b212 CVE-2024-1434,0,0,994306318c9619745c98e64e5ddfaccba02b019ac9eb788f705f9a9a37523dc6,2025-03-25T17:10:49.277000 CVE-2024-1435,0,0,05097425ab6a682df0dc5e92a5543b615afc6198979b7e6e75ea44b19ea50815,2025-02-27T02:57:30 CVE-2024-1436,0,0,d4783e68c2b586c1835f2526883611a05c5ff1439060402eeecc1dda96caa007,2025-02-27T03:15:54.380000 -CVE-2024-1437,0,0,48f9317293466e50e9270a7a4c2ee4c7fe04a4aa3c804e8a49c32b35bb2e257b,2024-11-21T08:50:35.123000 +CVE-2024-1437,0,1,7a0c00c0a0d1d939ac1126e623fc7cd789a21419d9c99a096b6ac554e5041e24,2025-04-01T13:43:41.967000 CVE-2024-1438,0,0,fb430c357e1d68126b60f1d8048d93feaf0a298b7940bd08e7f1ba2d2923a492,2024-11-21T08:50:35.250000 CVE-2024-1439,0,0,f018ca5c79044eb8d371c019838f427bc56a525451022c350168bc4b20b8a53d,2024-11-21T08:50:35.387000 CVE-2024-1441,0,0,8524643e4a58354b4c6d975cbc4efa93d311c9d367be16dec8b7308fac65f976,2024-11-21T08:50:35.540000 @@ -253909,9 +253910,9 @@ CVE-2024-26329,0,0,220d0b86ce94a766397733f6ce3a3cf797489720133134e3ff765be44ac0f CVE-2024-2633,0,0,34e287e3b165005dc093379b5285b328642852573ae2cefe2ab0987f5b28ba29,2024-11-21T09:10:10.873000 CVE-2024-26330,0,0,c46c610b23495d4faa106b5b245b71ada340c670fa8084ba1f5df40f3c1ef570,2024-11-21T09:02:22.580000 CVE-2024-26331,0,0,01fc177211530416d3cc8b96511a3301b539df9ba84fd5c3ba0f077e004ddd49,2024-11-21T09:02:22.793000 -CVE-2024-26333,0,0,d3f374ff46f8253215537b40e92de00d5d8c68453f98c4f4db02905ac0a8ac1a,2024-11-21T09:02:23.010000 -CVE-2024-26334,0,0,70c5ca6e0bb4802e3c384c8026eab9602827df826155f97520e12bf8f5a32f8a,2024-11-21T09:02:23.217000 -CVE-2024-26335,0,0,d828962b3ef53400326348f6f8af16a43b0c16e3c8d1bd05a26ecfa3ca20e249,2024-11-21T09:02:23.423000 +CVE-2024-26333,0,1,25972d57d455b8ec425507b1cecb503ae52cd423eef7eb95c246938c67828113,2025-04-01T13:38:57.733000 +CVE-2024-26334,0,1,553ce5febbbf3ba40742d4632d06f2581a5f2bad594295b098e9d03971e6a933,2025-04-01T13:38:46.493000 +CVE-2024-26335,0,1,d935f588a5f25fc8eb3a1cad35a0e183dcfe3bb620dcbf94cb5db283d0be674f,2025-04-01T13:38:30.083000 CVE-2024-26337,0,0,67808c7f961a991c278f2b13996d5a00c80294ee39051abcc80934bd3c1a7d27,2024-11-26T16:15:14.620000 CVE-2024-26339,0,0,7ce8d4e4aeff23307a6b8f87da0e44a312fed8e5097587567c8366eba75a6f06,2024-11-21T09:02:23.777000 CVE-2024-2634,0,0,f23d5a69439faf8e582a9c275f183d86336ce7e598134e5aefd6ea8385c5e2eb,2024-11-21T09:10:10.983000 @@ -255609,11 +255610,11 @@ CVE-2024-28421,0,0,ce829c3928a8bd5eedeabe1cac8e130c580ae7339accf262ba0cdf8590d1c CVE-2024-28423,0,0,03e791c7d95281686418dfb48fab328a816c52873637287d2158a6b0e815b0f3,2024-11-21T09:06:19.313000 CVE-2024-28424,0,0,1bee11d59730c0beb0f5a2d758b688d13d007502eab82ecda0090926fa370f32,2024-11-21T09:06:19.643000 CVE-2024-28425,0,0,2e7ca7955f3200f3627ecb06dac5ba7d3ac676325016bb19aa1d31821f6906c5,2024-11-21T09:06:19.970000 -CVE-2024-28429,0,0,df938c67eea87a243c47b7aa8bda03e1c5cdf75daeaf005bd7f39ab979eb36ac,2024-11-21T09:06:20.280000 +CVE-2024-28429,0,1,f1bc99480895abf6bc4caf32af1c796e27f5ca64f4ad6892c9855b9941f3f4d7,2025-04-01T13:41:22.510000 CVE-2024-2843,0,0,82c82ac855f305bfe3ef4cdbfcc5cf82cda6bf4be251e6d0ffd253c65b2fa266,2024-08-07T20:35:16.833000 -CVE-2024-28430,0,0,44c40fdd48fb7b6dd45a86d4bd66897ee485f34d63291579d28696eb8df91960,2025-03-13T15:15:43.060000 -CVE-2024-28431,0,0,ea25091f9bd313ab6e8e9b8dc9d03c01c6b5a0512c4793d86a1cb59cd325f1b7,2024-11-21T09:06:20.890000 -CVE-2024-28432,0,0,da1f82e1e8772a9b8ac00f8c5126d8e5127ee09510def4e88254ccf20640bc7c,2024-11-21T09:06:21.177000 +CVE-2024-28430,0,1,1620f12ce414c61c726aaeb1192a9f7c84a01ebe763061fb1f08a4c8c77ec171,2025-04-01T13:43:05.863000 +CVE-2024-28431,0,1,1e452394c32e3861316c1a522650c54a56659dda35d21fa15a9655c99ceb4306,2025-04-01T13:43:02.943000 +CVE-2024-28432,0,1,fafb694e081f9e7340d4601ab9bcb8c40aa028427c000e64c789eed741152145,2025-04-01T13:42:56.350000 CVE-2024-28434,0,0,b4ec98e1977770c102909c7a0d588aabc57ecbb170e993639452a9a8542bb11e,2024-11-21T09:06:21.480000 CVE-2024-28435,0,0,c1eb3631efd3094abec5049eb4a799f488ec927a573dc60d97c11961b18410a7,2024-11-21T09:06:21.787000 CVE-2024-28436,0,0,fa5bd980c28c3f8f08d759f37ba571df3d374a0601a509206b0b069f844ed82f,2024-11-21T09:06:22.120000 @@ -255696,27 +255697,27 @@ CVE-2024-28640,0,0,990c29eb8c733a819b0a31dbb2e2b0510b47e9a808edbc4e02611ff94875e CVE-2024-2865,0,0,5829b9f895a4ba79b3592f650e6f3b7b48b361c5424fd86986d5cdb1471edc67,2024-11-21T09:10:42.747000 CVE-2024-2866,0,0,0b9e7e6b190edc1fb6f92975c3f997f504dfccfc4fc2eb0b51cfe7935d053241,2024-04-11T16:15:24.870000 CVE-2024-28662,0,0,f68c2c27b397b62f70a53b7a140601f1da5f18f70a32ca321d8038d451cb9ee3,2024-11-21T09:06:42.960000 -CVE-2024-28665,0,0,791ff851a4e808d2a209ff036731e994aec36f5c70b4e2cb4da728f4d63e976f,2024-11-21T09:06:43.187000 -CVE-2024-28666,0,0,624b6b2b388bce85a975ce3a777bfae7ed3108996cd956dca2a209f1f4b660e9,2024-11-21T09:06:43.393000 -CVE-2024-28667,0,0,7954c82a1b134d6d11512799a170b0f0e3d568e6c2821e6dbe8090b84dd30387,2024-11-21T09:06:43.600000 -CVE-2024-28668,0,0,9f9b00695d18c8b71f1ef89dfe9a4c206ef5b2a8460ef8d2184b221d7d0cd3f2,2025-03-13T17:15:30.470000 -CVE-2024-28669,0,0,fee252bc5a362683de5d6620bf53622d90aae197f4d777ecf6aa8875c3ca93be,2024-11-21T09:06:44.043000 +CVE-2024-28665,0,1,8027731b0abd0b67fc6063fe816cbc46f793c4c89baddb9a1cc4c90847cb0d74,2025-04-01T13:42:52.583000 +CVE-2024-28666,0,1,cbc12cd408e2944036d7bf89664cc7cff8cc4298a37589040909c9208b722b69,2025-04-01T13:42:49.097000 +CVE-2024-28667,0,1,81ad48e51647484bfecd440392a39fd3cf20c719a1a168e540d1028d22d24fa8,2025-04-01T13:42:45.900000 +CVE-2024-28668,0,1,26170fc5fd7788b16fc0d8588a3dcc46fbbdb6030649301d333b99d0ff987f19,2025-04-01T13:42:42.853000 +CVE-2024-28669,0,1,462fce18d67a7c1584abbea493601cec20188f2fc1aabe4a05e2d4de257411bb,2025-04-01T13:42:31.980000 CVE-2024-2867,0,0,695fb3cef52f8c43c4514aa63d89e2f41f7dd2846ca1454a5970d54e2aad2119,2025-02-03T21:31:46.770000 -CVE-2024-28670,0,0,ab1611ec1ccd2f7d119446b2099a2f6fb91c67e9ea96502c09668ca7e90eeafe,2024-11-21T09:06:44.270000 -CVE-2024-28671,0,0,e25733fa67de3d649f7259e16738d845a6db94b940dd14d343831edd5a38fae4,2024-11-21T09:06:44.500000 -CVE-2024-28672,0,0,182cb4e0c7a8ffda160916a5cb3c7781dca562943a914d3c5dacdeb9e9903ade,2024-11-21T09:06:44.720000 -CVE-2024-28673,0,0,a7e45ec3235bf0c068f36b47677aa67d0d39c35a2ec367e18e9c4b3f143bd5a4,2024-11-21T09:06:44.943000 -CVE-2024-28675,0,0,e1855456c60dab77d20f2e2601564532dfe57961063f3f05f418dfe8203f2626,2024-11-21T09:06:45.160000 -CVE-2024-28676,0,0,f0e87c474f5cd94c9c0a360ae3e4b29f0c55c5b9cf00b4c9204038ea97ae4866,2024-11-21T09:06:45.377000 -CVE-2024-28677,0,0,8135ecd2860e9918720503a973e6b70ae86292a85588521142ee4270ffbdc123,2024-11-21T09:06:45.597000 -CVE-2024-28678,0,0,b297beb058ef2954362c94584a9c654b760016ed6fb653bfe093f1f20dd79e10,2024-11-21T09:06:45.817000 -CVE-2024-28679,0,0,6f8b96e72bc5d8aed16297df3fc8d835288ed1497cc3fbe7b3bf726aa4d75453,2024-11-21T09:06:46.053000 +CVE-2024-28670,0,1,72b1bab7f28eba16da4a16ac821861c54ebb1b7a86b17393630d1c1744965edf,2025-04-01T13:42:28.547000 +CVE-2024-28671,0,1,45decdf7b653b158759b51f8365fd225391a212b349b94549db6f17a9d2f4838,2025-04-01T13:42:24.713000 +CVE-2024-28672,0,1,5083100588c37885c7c7d244798c805f1bd6bdde81654de65f601f3f292de6ee,2025-04-01T13:42:21.180000 +CVE-2024-28673,0,1,4ecf7c3d7c362b4a43c79dd52a43fd8c1c97edad73999a9bf73212166dadc031,2025-04-01T13:42:15.560000 +CVE-2024-28675,0,1,f4446dba18ac8b592350a7851a20f97b4d8824b957878f84d2d5c74500222f38,2025-04-01T13:42:38.400000 +CVE-2024-28676,0,1,3da4faae53e5f9aef257459fade567911fb502934a1e18ae6ce0826ee838c495,2025-04-01T13:42:11.823000 +CVE-2024-28677,0,1,d3c086cb28ba5df464150d9467af4c9aab0454b73043ea46fb3e9dd84cd936b9,2025-04-01T13:42:08.577000 +CVE-2024-28678,0,1,49e4390f02ce5022fe12716a64c4082a5d6e03062a61485e1b5b6d9cb6bd23c6,2025-04-01T13:44:20.637000 +CVE-2024-28679,0,1,2f5c3ff5e85fc4c18e8587c1ff9cf8efdbef80c2d9e8001b213b67a2bbbae37d,2025-04-01T13:44:16.210000 CVE-2024-2868,0,0,d502b3cd735e7e71df62431b994767df23282d99f025ad51317114201a7dd744,2025-03-24T17:15:11.790000 -CVE-2024-28680,0,0,bb616bee4faaaca8abafc5c68ee983a737f77186f2373e9fa937b02412501f37,2024-11-21T09:06:46.260000 -CVE-2024-28681,0,0,d052c8b2f46496beb9ba179784cc8722289cb35e4cd4f371958f4d19cfd3d908,2024-11-21T09:06:46.473000 -CVE-2024-28682,0,0,eba1627157a7a3a72608d0b3ee7a5e137d680076206e467179ea2ca655b76ff0,2024-11-21T09:06:46.683000 -CVE-2024-28683,0,0,bd3ebc7cd2defbc47dfd620685d89e3857bca20832536a1f8d0b97a90c6d8dd7,2024-11-21T09:06:46.930000 -CVE-2024-28684,0,0,0b39b67814403ed28a9b69c6df298687c3e3168028840d71e5d4fe0885cd1b11,2024-11-21T09:06:47.160000 +CVE-2024-28680,0,1,8f0ce523ff7fbbfc523318339e29b0eb3269a347ebc15d32455af8a06c0fb3e8,2025-04-01T13:44:12.623000 +CVE-2024-28681,0,1,763056724a78897617cd823f80d7cadf11cddb3e697b3a32061fa05010e0d0f9,2025-04-01T13:44:09.607000 +CVE-2024-28682,0,1,fbd89570710747e223e1c252cfd649eba3de0e3d2409798f4878672ebb908b84,2025-04-01T13:44:06.493000 +CVE-2024-28683,0,1,36afdff582fc6dd6f46160c7c0632e5ca3dfd5371a3cd5fd2d5ac02760d2def3,2025-04-01T13:44:01.837000 +CVE-2024-28684,0,1,a93787560cdebeff55892aa855df59e2544178c1a016db88bf713fbef9421899,2025-04-01T13:42:35.420000 CVE-2024-28698,0,0,7bff9eb853be399d28016dddd4d7e7e54435955f08e0f77f0342480a34ee490c,2024-11-21T09:06:47.377000 CVE-2024-28699,0,0,3ff33c05d94c8b0350bde38df7088a1cf466d3f4147165d5d130599d3542fed6,2024-11-21T09:06:47.597000 CVE-2024-2870,0,0,957a2e28128daad4167a4d5c33a553c0681763d782c86767172e6d01c011f13d,2024-11-21T09:10:43.113000 @@ -259093,7 +259094,7 @@ CVE-2024-33015,0,0,4d28a33fe94fa845981d525573fc7210cfbe7ac5572720df2dd2e769c2c70 CVE-2024-33016,0,0,b7a691d3f8a5769370cabebaa1c6baf77303bb19298c145d4a87a2d0e8cf5b35,2024-09-03T12:59:02.453000 CVE-2024-33018,0,0,675563cbcaa2ef92e6e204ac05e73112bfff759fc8ebf3d9fef6548ae8c58cd8,2024-11-20T19:40:37.843000 CVE-2024-33019,0,0,65b55195b6d36305a457ef79b35dd005b5584918c532a4eb6d0a59f0c7b2c587,2024-11-20T19:21:14.377000 -CVE-2024-3302,0,0,e5ce1030a00c312419a4c7be643155cff256b56cfc3b72469b84b30ef8fafc5a,2025-03-29T00:15:22.850000 +CVE-2024-3302,0,1,a9c0bfefabd7cdf9ff7de4a85277bce4c59f99071b0902d3e7ee22e187969944,2025-04-01T13:39:33.140000 CVE-2024-33020,0,0,78b282015d00523f763bba8047dc79e2477faf3042afc98a3f20038a1514be26,2024-11-20T19:24:57.907000 CVE-2024-33021,0,0,d1bf10fabd8a7aa65a410180cecde661706f392b167b1431ee831c1ae3f61c9e,2024-11-20T19:28:00.557000 CVE-2024-33022,0,0,2f91e8e22bd3cb4680d129ffaba868cdca7b1d0f09cfba7e3a1db029d8e75c0f,2024-11-20T19:30:31.947000 @@ -260558,7 +260559,7 @@ CVE-2024-35039,0,0,e5bb0b6ad9478238e5b8c321f2985e8d49ff0d9031464abf584ca60b90c2e CVE-2024-3504,0,0,1e76ca030a65692dbb6d630449e59791e5c57b83588b9e0692b4e2aa7884c7fa,2024-11-21T09:29:44.783000 CVE-2024-35048,0,0,135119f59dfaf319a97db7bd2c1bc169012c9a11400da34d4bae48ab413bd01a,2024-11-21T09:19:42.657000 CVE-2024-35049,0,0,e6c6e38cc256db6dc51e364334cbcdbc9df2120c52b12d9d4124206d8dc2bc94,2024-11-21T09:19:42.880000 -CVE-2024-3505,0,0,49106f376deb58288a725a5c5c02529aac8964759b5fb0e2d0485df7a7553485,2024-11-21T09:29:44.910000 +CVE-2024-3505,0,1,b0e518dbdaaf48c704866354ca2287d24bf142f790f45dca79b53d52c65303e2,2025-04-01T13:59:28.320000 CVE-2024-35050,0,0,682e2b49a90053eeaaa040f2386a827602cbca3817b62e9690c3226261c9e6ad,2024-11-21T09:19:43.100000 CVE-2024-35056,0,0,20a0d7a15bbc69847cd094f6795a20a0a09a1b1a168cc43625695f103e0d3d0a,2024-11-21T09:19:43.337000 CVE-2024-35057,0,0,c19e75355d2af0fd3bb115ae7bb599429fa7122b7441a85b6126975bcf84bf8b,2024-11-21T09:19:43.570000 @@ -263425,7 +263426,7 @@ CVE-2024-38516,0,0,c3b92d1f806c0367acf8d206ed141fceaa7f7feef0fd85eecaa0abd26fd8d CVE-2024-38517,0,0,05cb050616d5cf2096e9fb9f9719f45ce62d1ca16a9cefeee68cea881fcce0c1,2024-11-21T09:26:08.690000 CVE-2024-38518,0,0,067ab11c1d2cd2eaa1f30492cbeeb98240e06fe0a06ad3a6e7c8162218088dd7,2024-11-21T09:26:09.023000 CVE-2024-38519,0,0,ff68aceab6101a4a2d444b329975a23165283302e03ac2bb297bf786534c3a0d,2024-11-21T09:26:09.370000 -CVE-2024-3852,0,0,eef34f8c306acd6931a1f303a7de001d6bfc59fdc14757bee285c7dd1e646ed6,2024-11-21T09:30:32.690000 +CVE-2024-3852,0,1,b4d5201a2c82b44b2ac39046b63a4f751fc043738800e3f24abf9006fdcd4ccf,2025-04-01T13:39:19.437000 CVE-2024-38520,0,0,13714aae8a893cb0cb37ad2183ce57b54c82c46e9436fcf730682b217fb72994,2024-11-21T09:26:09.807000 CVE-2024-38521,0,0,fe59af26beafb1d6ac3c84b505b695c437a2d939550b13e48891788719e24788,2024-11-21T09:26:10.227000 CVE-2024-38522,0,0,163a0807e895af008e0356107c0ee6a4fe30e3d99691e9f9320a4c7a70b91c5e,2024-11-21T09:26:10.720000 @@ -276068,7 +276069,7 @@ CVE-2024-56321,0,0,74f6aaba2312f358c8612f649e79b3518a2426ea72dd60ae831d7b708032a CVE-2024-56322,0,0,0e3135ff21764520d5633cd3f61e61097988472a18e3a364fe45daa5a3f3f8e3,2025-01-03T16:15:26.480000 CVE-2024-56323,0,0,4d7e760b1fcd669a470d40b9026794b15b60e0764a30b5d7449fce19b8900b0d,2025-01-13T22:15:14.447000 CVE-2024-56324,0,0,a08049cfd3a2aafc3d9d1e1d3bb8e00ce236badc8e05a5e1ec35b8e21dc91a5e,2025-01-03T16:15:26.643000 -CVE-2024-56325,0,1,534674c0dec22b296138146fda6dcb2e707c1bb880fb5423119f5ee632b4c57c,2025-04-01T10:15:15.360000 +CVE-2024-56325,0,0,534674c0dec22b296138146fda6dcb2e707c1bb880fb5423119f5ee632b4c57c,2025-04-01T10:15:15.360000 CVE-2024-56326,0,0,a8a6b261057c1f8537eceacbb1f4ed32049ab9589d4f4c5db55a4163b2928c32,2024-12-27T18:15:38.947000 CVE-2024-56327,0,0,928e223be8bc0630fd740137b1fbb300d0c36c5b8420c69dddd568c70eb8ddc4,2024-12-20T18:15:31.083000 CVE-2024-56328,0,0,15361150e4c4eddd938c28dee0249fee42e046eac1018161ed075ca63881925e,2025-02-04T21:15:27.400000 @@ -282151,6 +282152,9 @@ CVE-2025-1651,0,0,dc02b23df4eb433cfaae6381155dd744e0ca82e8901f8e7d30555b36cffdf1 CVE-2025-1652,0,0,40ae07eb9aa50c5b6645abc9188293b11d3a3751f84fa68087927a34dfc8a3ac,2025-03-13T17:15:36.297000 CVE-2025-1653,0,0,81399ad7d0a3dd190eaf3e76c57ec1bd3ec75f06763142e168c62e4df94036c7,2025-03-28T13:17:33.270000 CVE-2025-1657,0,0,00b8c4fa900fcbf8fcc8352570319a690900e4acdb978bf02695203588721ccc,2025-03-28T12:59:00.413000 +CVE-2025-1658,1,1,f6867ed4950a11445bf014dc15faf8f0b581c7c14df7f3b902a7679a321532db,2025-04-01T13:15:39.753000 +CVE-2025-1659,1,1,daad1057cadcac39c103aed99c56d0eb47abb8662b675adebf84fa7f6c19c873,2025-04-01T13:15:39.913000 +CVE-2025-1660,1,1,a4a254a8fc6121f9a950308e2300db322ccfccab431bb188ae89c5b64b4dded4,2025-04-01T13:15:40.053000 CVE-2025-1661,0,0,fc56e5229eb6ac1a864e12ea87f6baac0d11f126c1fe50c79da09acd396fb73c,2025-03-19T20:48:03.360000 CVE-2025-1662,0,0,0b069e39d7b9c2cac3bb89ddd5f385bc750d1df17050dae193b4f39dcff51d62,2025-03-06T15:30:52.347000 CVE-2025-1664,0,0,2ddafd8220da97f286feaff6915cac1d1018546efd24c59b88969afcb5318c21,2025-03-11T21:25:56.700000 @@ -283416,6 +283420,7 @@ CVE-2025-22225,0,0,9e556bc7c3e33618b4b1fd67c232b5ec5342c22fd8db1a86d6c7512033ee8 CVE-2025-22226,0,0,d8b6281876fd003f404f7031a16d8be8c66b83496a9c80b329f6cf341e4f4e88,2025-03-05T16:22:52.433000 CVE-2025-22228,0,0,fa7f165a4b7ea7a15cc95ee04c8cc8a48940b5c217d39b7a5efd68469d6e9030,2025-03-20T18:15:18.663000 CVE-2025-22230,0,0,3e91dce00139a0364993ef91e4dc70d3b6016fb8a3b6eea2cbe343e4ad228132,2025-03-27T16:45:46.410000 +CVE-2025-22231,1,1,154df2d9ff355fc487b4b3aacd2785ed6b8e0965b71a65a1c0e78ddd19c1485d,2025-04-01T13:15:40.197000 CVE-2025-2224,0,0,a251902d7a3f4027222d02a92ceecc551380ed3d87526ebb058f0bdbf9a04b21,2025-03-27T16:45:46.410000 CVE-2025-22260,0,0,6bffdd50ff1b9a95889c1f9bea94c0f7f92eb9097aa6e2dd07529a5cbb0d5ce1,2025-02-03T15:15:17.503000 CVE-2025-22261,0,0,cabefa2bbb4850682fa8dc2dd04543561914d58490173d75f62166401d731c68,2025-02-26T15:15:24.877000 @@ -283522,6 +283527,7 @@ CVE-2025-22366,0,0,97374946d476a1e08535f722893bb8acd198d9f71f967181dcb7a41966417 CVE-2025-22367,0,0,f6b48e4e6414fa9f75650108ce2f805446a91f752f88d5798591a48240cb180f,2025-03-11T14:15:24.480000 CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9a6c,2025-03-11T14:15:24.627000 CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000 +CVE-2025-2237,1,1,48c83d35042731e789070b6b95cfe508969457829b21062a9f7d04fcde4c231e,2025-04-01T12:15:15.420000 CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000 CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000 CVE-2025-22383,0,0,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000 @@ -284102,7 +284108,7 @@ CVE-2025-23360,0,0,44ec4858c221e4e9b3ef85a446da660e97979bf1d4ef5b7d7efaafadb38d1 CVE-2025-23362,0,0,f1b04109bb5a53f0fa12693fb841988a838f82d29d11cab82e724120097242c3,2025-01-29T02:15:27.910000 CVE-2025-23363,0,0,b9bdb2f5570a42ae3d8b5d6f5614156fb3bb4c04b93a61bb990c205c4501f432,2025-03-20T17:15:38.153000 CVE-2025-23366,0,0,19d3d492f06020aadbd27d64e622d5ed1c347260739b5074a05d263b32a748da,2025-01-14T18:16:06.290000 -CVE-2025-23367,0,0,7754a5b5a7ef7b20fc4ec39ada85296b1a92f1ca2476a6564c884bf68763656c,2025-01-31T21:15:13.613000 +CVE-2025-23367,0,1,7ac8ae847fdcafee193b5e9900f7ab7848ded8672b304c5f6c90b48f80701747,2025-04-01T13:15:40.327000 CVE-2025-23368,0,0,3fba7751170fbf245919938130180b8631c2c01153566e23c5e60aa4599df312,2025-03-04T16:15:39.270000 CVE-2025-23369,0,0,74f04427c8261f575e3b46a10e2c572c85dddb2e090b01cedc0f322610f8f68b,2025-02-05T19:15:45.747000 CVE-2025-2337,0,0,7d9e5607ad2b02dfc242a3305f849e66226e5392d822e3a7a605b0e9bacb542e,2025-03-17T15:15:44.983000 @@ -286967,6 +286973,7 @@ CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000 CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000 CVE-2025-29032,0,0,de0e6dba36725e7eb376f4f499583a9ba773e23f18ca4062299593c1211d4783,2025-03-19T19:15:48.083000 +CVE-2025-2906,1,1,1b052d092c19d31c189404b137fbab69d51e261d2d1ec9663958a817333720e4,2025-04-01T12:15:15.580000 CVE-2025-29072,0,0,49c945210f3f78e56e41b3df1156a5372b970d771a90cb3e84f3b7747252dacb,2025-03-28T16:15:29.640000 CVE-2025-2908,0,0,041eb1fa89a8461da19bf701f06a30feb1f340b875a2b47541929394f018f7d6,2025-03-28T18:11:40.180000 CVE-2025-2909,0,0,97c0fe7ab6ec975ef24a907a995721890d6b9e4b583a692182e886d15cd6b91b,2025-03-28T18:11:40.180000 @@ -287217,6 +287224,7 @@ CVE-2025-30163,0,0,655322787d885aa61d50ea5e7ecff74dc9237e2c1710cc57eaf106a5eadfb CVE-2025-30164,0,0,c838231ddadd650538b91334381739f0e5f84496049f4ab61b98fedaf2408f7b,2025-03-27T16:45:27.850000 CVE-2025-30168,0,0,650d771cf97916a28afc5f172eb3b832385c1c5e1b844b714aca8ef5a55b9cbc,2025-03-21T15:15:43.440000 CVE-2025-3017,0,0,083378d5c52a6935f1814e6fc98f820b5479d558d92d618c62143e49c5cbcf53,2025-03-31T22:15:22.807000 +CVE-2025-30177,1,1,c0fcceb133765dada6eccd5558df60320f3f3ef30ac7f883249c4e8d25ed724e,2025-04-01T12:15:15.747000 CVE-2025-30179,0,0,e6188b5cfe41efd4be24afd0a9be97fe3cad7c2aaaf7dc5206b7ef410f616059,2025-03-27T14:45:47.520000 CVE-2025-3018,0,0,00344f460929f0982b2461abe2875f6b9e8536bc87aca06ccb922f2dfcd90499,2025-03-31T22:15:22.993000 CVE-2025-3019,0,0,9b9c69522dd584e9fa82131200a6442717b6558a8bb9867e6a05476c0b32a39e,2025-03-31T07:15:19.133000 @@ -287248,7 +287256,14 @@ CVE-2025-30258,0,0,cc431d0d4fe6a8b6881434ff2ad3ef316269606a3845b529c54a958324c9a CVE-2025-30259,0,0,e7ad748a07d97a3ed7d8fd479d0bd66cf98f38cbfee97910d52cd90aa0d3bed9,2025-03-20T00:15:13.780000 CVE-2025-3026,0,0,fb11ad07ceb162c9bd05d34d2f12da6e9d8c7f6a617203df1de3172900425d8d,2025-03-31T11:15:40.127000 CVE-2025-3027,0,0,5f4724b184d1d897e1bfc60266adcc89adf8febf9fb0fa6c8ae1b826171629c0,2025-03-31T11:15:40.273000 +CVE-2025-3028,1,1,178947b9cb2a616c5fdb1fd875901d8b67246ff02e47b187eaf42e5e0ea3d11c,2025-04-01T13:15:41.190000 +CVE-2025-3029,1,1,c84282acea475047d658940b01207c9a5f9997201f15e8012ffc5efa6bd5ca75,2025-04-01T13:15:41.290000 +CVE-2025-3030,1,1,aa29bb3b9a4d9ba962918fae9d16a0da5ccaf30a87f66ff09579a7942116e0ea,2025-04-01T13:15:41.390000 +CVE-2025-3031,1,1,84ca20236dc951f22f876a60da076220f55d0e1e05e3e6082942a749c1303324,2025-04-01T13:15:41.493000 +CVE-2025-3032,1,1,791e585182f0c6b5f5269913b4a4f6ec3ffb885971f020dd8aa31d49ef4aa729,2025-04-01T13:15:41.587000 +CVE-2025-3033,1,1,c0beb2439a9bcbbae11fc26a26f9d530daeb9290cd3a523fcdd0f489ebdc1e39,2025-04-01T13:15:41.697000 CVE-2025-30334,0,0,caf534fd1627734422d4cc985cab7fc3cb378766099fee597920edabdedb5eb9,2025-03-20T22:15:14.453000 +CVE-2025-3034,1,1,424a78f7ebf23cd551602839abb51c87d94110c5b9a745d808de3d9e013e21a3,2025-04-01T13:15:41.790000 CVE-2025-30342,0,0,a82c09d47a90d84f34fb1e813a5c0fac2da3bb3c52e4eebc7be6b04000e23625,2025-03-27T13:35:33.940000 CVE-2025-30343,0,0,e985bd70edeba16d72f3a97a5b4503ce537b67f2c8ec7141c78018584bb14ff6,2025-03-27T14:00:35.087000 CVE-2025-30344,0,0,eee318218de480648fe7936077da37cc5a3c42a31c295bcaccd5481a9b270c1b,2025-03-27T14:40:42.177000 @@ -287257,6 +287272,7 @@ CVE-2025-30346,0,0,a5ab4f3d9ba1cce34693c27771a45fbf120b9b80a448e75dfe49bd2a7ac1a CVE-2025-30347,0,0,ed9763d5b530026684262273e310ca4c964268ef0ffc4c726547353dbc6770db,2025-03-24T14:19:23.963000 CVE-2025-30348,0,0,0fb0e9fd503e8730c9a3857e63ee0ac5611b8bb7632a64f763dd19e4ff36427c,2025-03-24T14:08:36.513000 CVE-2025-30349,0,0,526c950cc64a333e84d55e644a88fdd602691a361484b453eb0de28202e3ad5c,2025-03-28T01:15:16.323000 +CVE-2025-3035,1,1,0029389ce37d1068c431299d6f47e6f4b4d8795d941d2b6c930361c8090f4c8a,2025-04-01T13:15:41.893000 CVE-2025-30350,0,0,769aed62b7c52c7efff0910786b1540702d43c431a2629a37c544cf6ab27d2c0,2025-03-27T16:45:27.850000 CVE-2025-30351,0,0,41323de04c59da9296c71c6a7df779e6c0c767b4bcb8b455ab5524ba6b0475be,2025-03-27T16:45:27.850000 CVE-2025-30352,0,0,2de13b7ea6496a9753fe04c1b9f1d1f6040e23740e41cd04836f25b10e4f3884,2025-03-27T16:45:27.850000 @@ -287285,7 +287301,7 @@ CVE-2025-3042,0,0,5da867943f344ea897444a858f0a4772d61216fb9db5d54bf0de06c700ec7e CVE-2025-30424,0,0,7e2724cad9826458f33af5386b5a1a4f9c6861b32027c20d5cb6e25ba7c7ee8a,2025-03-31T23:15:24.757000 CVE-2025-30425,0,0,60b572fb89ec688717379e9ebbcd135d9b23ce86ee894f11cf2922fc6df79751,2025-03-31T23:15:24.847000 CVE-2025-30426,0,0,581c97aeab2c16be5f0b7176d14da4dc8d887128ad4b58171c92c2a12140ed20,2025-04-01T05:15:47.587000 -CVE-2025-30427,0,0,d81f96d8e241afc042a49c4b425517dea411054f34eee47c3d4ada118dd1399e,2025-04-01T04:15:48.400000 +CVE-2025-30427,0,1,985c6e703f96835d501436fced6bcf126a04f6dc0eaba98a83160f8cc940e1e8,2025-04-01T13:15:40.463000 CVE-2025-30428,0,0,14851a55adbe0f2bcf519aabf203dccdad5a72bcd67d424690cf1f6ee71a64ab,2025-03-31T23:15:25.133000 CVE-2025-30429,0,0,b3ad0928a2ea60c1b24c5bf13e88cf4cf1c8660ad08680137252f3f759d7f523,2025-03-31T23:15:25.220000 CVE-2025-3043,0,0,e2927b24baedd66813c8c968fa2b997b52bd8633c607924521c6abb353badd6b,2025-04-01T01:15:21.073000 @@ -287321,7 +287337,7 @@ CVE-2025-30465,0,0,e2b7a8ca55e53a28282e292780413c1f4acbe7742c4181526f89cdab8df96 CVE-2025-30467,0,0,f5b3243e6d32e26be0bd1758fbefd7d1f139d3cbc767b74bf87669426cb44025,2025-03-31T23:15:27.967000 CVE-2025-30469,0,0,81b27913828079d5c20985511e114b5a456ba132a627f467e29a63fed3445481,2025-03-31T23:15:28.107000 CVE-2025-3047,0,0,e0ce3b6e746fdadd6a211e2a7875b834c4eeb4396cc6bf0028a03eb50c077df9,2025-03-31T17:15:43.953000 -CVE-2025-30470,0,0,6c33644c19be078c35df3d5d698cdbe6a2037eb50a37400e4c77501a8a48ef5b,2025-04-01T04:15:48.907000 +CVE-2025-30470,0,1,0f872e41f6b142c6410b764c405a8d2b285855fe3a245880ea54ccff74e1f1fa,2025-04-01T13:15:40.650000 CVE-2025-30471,0,0,b9cce8b42291c21b8a7b4b6f0edb79f1b88ac267cdc529699a0a1c9465f48233,2025-03-31T23:15:28.347000 CVE-2025-30472,0,0,2ebab4b860069e7704c45b0afdbc37111cef0ce9e224a566e03ddd40410e1a00,2025-03-25T16:15:27.337000 CVE-2025-30474,0,0,1e288c28c7a9253d8007962ed83d55ed1c6a50132909d1d77f3fa1d8a9ee1e62,2025-03-23T19:15:14.973000 @@ -287487,7 +287503,7 @@ CVE-2025-30816,0,0,86aa62d22d26c1677b8fbc2d5a26ff69334a638d0cbfc8a040d084b98bf55 CVE-2025-30817,0,0,8c68dd2359bc8b223264bcaf130261b6d50fa50dce54e42de4a27d598222577c,2025-03-27T16:45:12.210000 CVE-2025-30818,0,0,7f151ca2e67c18f616fc2b6e730a099fa2d6c72d321d27dddb7e52dc62180bc2,2025-03-27T16:45:12.210000 CVE-2025-30819,0,0,c839e0d4cc216303e77cb7edd2f52d654e10b42f866c0977df833188fb042da7,2025-03-27T16:45:12.210000 -CVE-2025-3082,1,1,aaa8fb1f0776222cd9c881ef16a5448fbeafa7c5821dbfe26da3b3cd5a654cb6,2025-04-01T11:15:39.517000 +CVE-2025-3082,0,0,aaa8fb1f0776222cd9c881ef16a5448fbeafa7c5821dbfe26da3b3cd5a654cb6,2025-04-01T11:15:39.517000 CVE-2025-30820,0,0,cfaf7e7f7d246bbb9c6ee13438bde2745fbdfcc3d7cca50ed220e792b3e82478,2025-03-27T16:45:12.210000 CVE-2025-30821,0,0,31ae51095c59dfaf0eed02ba626cb6b09bad176ab8cebd93fc6a5a1e0e640269,2025-03-27T16:45:12.210000 CVE-2025-30822,0,0,2207bcc8796316ad3958896a7f3e7034d296ff6fa4db22429bec71d22783cbfa,2025-03-27T16:45:12.210000 @@ -287497,6 +287513,7 @@ CVE-2025-30826,0,0,75257443e76f09bc6627b81604675fc61a36199453aa13dd9dc8031e1e683 CVE-2025-30827,0,0,f3cff7138735ca3258e66a7dea50f5659bd66a2ae694ae2fddd37d05a3e2169a,2025-04-01T06:15:52.220000 CVE-2025-30828,0,0,13165c8a3d6127400e5dc61cd3acbdd0c00ff2da92174ed76ef5b12c0fb111b2,2025-03-27T16:45:12.210000 CVE-2025-30829,0,0,d778319af23c16bef5b797ee777aa1f3cf2ab5ec8837ae52469c3024592e73c0,2025-03-27T16:45:12.210000 +CVE-2025-3083,1,1,8b5b60b008755174030596a8371acdd4bdffb9a68ff6774697b9e7a9ae4c87af,2025-04-01T12:15:15.883000 CVE-2025-30830,0,0,757146686939893abbafce7567881d6582c1c8891bb29b2eb8a3e312165fff05,2025-03-27T16:45:12.210000 CVE-2025-30831,0,0,58d6659c79961b1bd4ecff4586ae2944853bee5fcbb0265f99091764205fbfcf,2025-03-27T16:45:12.210000 CVE-2025-30832,0,0,872225febe12961ed121a80db974e1743a077eecf1159ceea59c5ee8994e141c,2025-03-27T16:45:12.210000 @@ -287507,6 +287524,7 @@ CVE-2025-30836,0,0,6504eb324a1ec096686c876af4abf58ae341b41fb408f47abc7dd4fc1ed7b CVE-2025-30837,0,0,57db230ad23c0670ac7752a0ca67441da205d0eb5b463502fe20545911bf87bb,2025-04-01T06:15:52.563000 CVE-2025-30838,0,0,c8224637914836764520188e48d3be333661d703c0aec303d3408c4a2082d067,2025-03-27T16:45:12.210000 CVE-2025-30839,0,0,7f84e9cce6914ca3519aebb5888dab9272dcac0726c7c6911a57af687fe3a8b5,2025-03-27T16:45:12.210000 +CVE-2025-3084,1,1,50c0c9dedd9aeb8b6bb598ba4c6b9a4afac34183ca0fc7e34f523091d2120040,2025-04-01T12:15:16.037000 CVE-2025-30840,0,0,efa4ce5954239af2e53cc52ec7800b40a58b22e5edf4791d4029dd3cd6d4bdb5,2025-04-01T06:15:52.733000 CVE-2025-30842,0,0,93eb0fde9f95676ed20551d6eae16bb95a1afd32e8be327515370b50c4c34a12,2025-03-27T16:45:12.210000 CVE-2025-30843,0,0,817ee1e3c6dba384583fac96ece79c5548c0e04c4c65dd836b1a65d52b79eab1,2025-03-27T16:45:12.210000 @@ -287515,6 +287533,7 @@ CVE-2025-30846,0,0,1f57df704f5b7b54a04e45d88dc76b7d3db79fd5b263d95d056743b064a78 CVE-2025-30847,0,0,fc961a502cdbb5e3e70606a6f8d637679f8552339c8080ad8895748b861656dd,2025-03-27T16:45:12.210000 CVE-2025-30848,0,0,e6bfad8b887e8d6e9a84720e896870d6e856639b805053a0313373d0d28f178a,2025-04-01T06:15:52.907000 CVE-2025-30849,0,0,b2ea72491b37b05de2f460f11025818cc477eb4fe4ba2c81735852fb8cea82bf,2025-04-01T06:15:53.063000 +CVE-2025-3085,1,1,6c7dda5108fb6a4e92d06dbd7af88690225a9035edeef3301e7432bf272cc06d,2025-04-01T12:15:16.187000 CVE-2025-30850,0,0,760a1d8de33f40d499c33ff5bcfd7dc023a854aa3c9dd3ed4b3e1e844b1c5114,2025-03-27T16:45:12.210000 CVE-2025-30851,0,0,f31de6d06feb28cbb6d2ae0384a043c45d36984af50b98b70a1d34611d3389bf,2025-03-27T16:45:12.210000 CVE-2025-30854,0,0,49883421d6e5d7495d5181f7f5d3f9d094e10890825ab2510b96e7c898c09b58,2025-03-27T16:45:12.210000 @@ -287661,6 +287680,7 @@ CVE-2025-31376,0,0,5d62da0cfe6b7435f71c655d217e6a75ce4a0a595484860a4e7e1f5bb1ff7 CVE-2025-31386,0,0,048c3505cf885b167c96d5bf95237b0045305d453ce992679e22ecd91082b5fe,2025-03-31T10:15:16.733000 CVE-2025-31387,0,0,3841e4b5f54acc054c2ceaf19088553e0ecb932d7404adff78288f7d2e95e424,2025-03-31T06:15:30.990000 CVE-2025-31406,0,0,40121456e359323fae5399657864763e75bc8a1475964af89f5af2b320c34e86,2025-03-31T09:15:17.143000 +CVE-2025-31408,1,1,87a20ebbc28fc01a11d0e83f2c6b4e4553dc4d19342293483d557ec21599cdec,2025-04-01T13:15:41.037000 CVE-2025-31409,0,0,f62ba2971bd5b4f14c31faf8c83a5ed6291da2be1a8743c6af0048d344174f14,2025-04-01T06:15:56.730000 CVE-2025-31410,0,0,8ce1db5b18a0ba333461b5e8fbd6becd92780c874f64956192c5fcb2f1aa018e,2025-03-31T09:15:17.297000 CVE-2025-31412,0,0,68905eddf189835df947aca9eb7e8ddc2513cb1fb1efc35f69ef4b2ecd8c238e,2025-03-31T06:15:31.147000