diff --git a/CVE-2020/CVE-2020-211xx/CVE-2020-21152.json b/CVE-2020/CVE-2020-211xx/CVE-2020-21152.json index f07c9331f1c..15466601b15 100644 --- a/CVE-2020/CVE-2020-211xx/CVE-2020-21152.json +++ b/CVE-2020/CVE-2020-211xx/CVE-2020-21152.json @@ -2,7 +2,7 @@ "id": "CVE-2020-21152", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:12.477", - "lastModified": "2024-11-21T05:12:28.280", + "lastModified": "2025-04-03T13:15:39.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36659.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36659.json index 0123ee58a9c..c896dda60c9 100644 --- a/CVE-2020/CVE-2020-366xx/CVE-2020-36659.json +++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36659.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36659", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-27T05:15:17.380", - "lastModified": "2024-11-21T05:30:02.363", + "lastModified": "2025-04-03T13:15:40.943", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-293xx/CVE-2021-29368.json b/CVE-2021/CVE-2021-293xx/CVE-2021-29368.json index c46036b5d42..21fe3e3884c 100644 --- a/CVE-2021/CVE-2021-293xx/CVE-2021-29368.json +++ b/CVE-2021/CVE-2021-293xx/CVE-2021-29368.json @@ -2,7 +2,7 @@ "id": "CVE-2021-29368", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:13.250", - "lastModified": "2024-11-21T06:01:00.383", + "lastModified": "2025-04-03T13:15:41.163", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-384" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-374xx/CVE-2021-37498.json b/CVE-2021/CVE-2021-374xx/CVE-2021-37498.json index eb30e8fa9a6..876b40b9dd1 100644 --- a/CVE-2021/CVE-2021-374xx/CVE-2021-37498.json +++ b/CVE-2021/CVE-2021-374xx/CVE-2021-37498.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37498", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T12:15:10.143", - "lastModified": "2024-11-21T06:15:16.767", + "lastModified": "2025-04-03T13:15:41.377", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-253xx/CVE-2022-25377.json b/CVE-2022/CVE-2022-253xx/CVE-2022-25377.json index d685389414f..0003f9843b1 100644 --- a/CVE-2022/CVE-2022-253xx/CVE-2022-25377.json +++ b/CVE-2022/CVE-2022-253xx/CVE-2022-25377.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25377", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T22:15:47.170", - "lastModified": "2024-11-21T06:52:06.480", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:17:44.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,81 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:appwrite:appwrite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.5.0", + "versionEndExcluding": "0.12.2", + "matchCriteriaId": "E5B08D8C-5305-4B0A-8CDF-644AE6D40485" + } + ] + } + ] + } + ], "references": [ { "url": "https://dubell.io/unauthenticated-lfi-in-appwrite-0.5.0-0.12.1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/appwrite/appwrite/blob/0.12.0/app/controllers/general.php#L539", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/appwrite/appwrite/pull/2780", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/appwrite/appwrite/releases/tag/0.12.2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://dubell.io/unauthenticated-lfi-in-appwrite-0.5.0-0.12.1/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/appwrite/appwrite/blob/0.12.0/app/controllers/general.php#L539", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/appwrite/appwrite/pull/2780", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/appwrite/appwrite/releases/tag/0.12.2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4745.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4745.json index 346c355f746..6b94d06227b 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4745.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4745.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4745", "sourceIdentifier": "contact@wpscan.com", "published": "2023-02-13T15:15:19.780", - "lastModified": "2024-11-21T07:35:51.627", + "lastModified": "2025-04-03T13:15:41.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4751.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4751.json index 00fdad28130..90dfc47b937 100644 --- a/CVE-2022/CVE-2022-47xx/CVE-2022-4751.json +++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4751.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4751", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-23T15:15:17.377", - "lastModified": "2024-11-21T07:35:52.270", + "lastModified": "2025-04-03T13:15:42.123", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0958.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0958.json index bf18037cd92..96e35591547 100644 --- a/CVE-2023/CVE-2023-09xx/CVE-2023-0958.json +++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0958.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0958", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-28T05:15:09.597", - "lastModified": "2024-11-21T07:38:10.983", + "lastModified": "2025-04-03T12:44:20.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,6 +80,12 @@ "versionEndExcluding": "1.4.0", "matchCriteriaId": "770C6157-3ED4-4D47-8180-F4B1C743AE93" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inisev:enhanced_text_widget:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.8", + "matchCriteriaId": "111AAFB7-CC9B-4E16-8049-D07794A2BA0D" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:inisev:redirection:*:*:*:*:*:wordpress:*:*", @@ -98,6 +104,12 @@ "versionEndExcluding": "3.2.4", "matchCriteriaId": "9A2623B9-EE90-41CA-9D77-41F6A69E3131" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inisev:ultimate_posts_widget:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.5", + "matchCriteriaId": "EF43E87C-BE3A-48FD-8F93-7A9392925FE2" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mypopups:pop-up:*:*:*:*:*:wordpress:*:*", @@ -110,18 +122,6 @@ "versionEndExcluding": "3.5.8", "matchCriteriaId": "567F3DA7-794F-4DB0-B041-6C54D7633D02" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:themecheck:enhanced_text_widget:*:*:*:*:*:wordpress:*:*", - "versionEndExcluding": "1.5.8", - "matchCriteriaId": "D254C14C-C0A6-45DD-8A5F-041D0F6C0B71" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:themecheck:ultimate_posts_widget:*:*:*:*:*:wordpress:*:*", - "versionEndExcluding": "2.2.5", - "matchCriteriaId": "30DAA0C1-7E10-412A-A5BE-7145274933CA" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:ultimatelysocial:social_media_share_buttons_\\&_social_sharing_icons:*:*:*:*:*:wordpress:*:*", diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3977.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3977.json index 7a2f160e5f2..686439023c8 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3977.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3977.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3977", "sourceIdentifier": "security@wordfence.com", "published": "2023-07-28T05:15:11.200", - "lastModified": "2024-11-21T08:18:26.543", + "lastModified": "2025-04-03T12:44:20.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,6 +80,12 @@ "versionEndExcluding": "1.4.0", "matchCriteriaId": "770C6157-3ED4-4D47-8180-F4B1C743AE93" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inisev:enhanced_text_widget:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.8", + "matchCriteriaId": "111AAFB7-CC9B-4E16-8049-D07794A2BA0D" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:inisev:redirection:*:*:*:*:*:wordpress:*:*", @@ -98,24 +104,18 @@ "versionEndExcluding": "3.2.4", "matchCriteriaId": "9A2623B9-EE90-41CA-9D77-41F6A69E3131" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inisev:ultimate_posts_widget:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.5", + "matchCriteriaId": "EF43E87C-BE3A-48FD-8F93-7A9392925FE2" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:mypopups:pop-up:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.2.0", "matchCriteriaId": "424C4B95-E7D2-47DD-B151-C7A3B9E8C443" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:themecheck:enhanced_text_widget:*:*:*:*:*:wordpress:*:*", - "versionEndExcluding": "1.5.8", - "matchCriteriaId": "D254C14C-C0A6-45DD-8A5F-041D0F6C0B71" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:themecheck:ultimate_posts_widget:*:*:*:*:*:wordpress:*:*", - "versionEndExcluding": "2.2.5", - "matchCriteriaId": "30DAA0C1-7E10-412A-A5BE-7145274933CA" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:ultimatelysocial:social_media_share_buttons_\\&_social_sharing_icons:*:*:*:*:*:wordpress:*:*", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41015.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41015.json index 8e38316f235..c62ef10ca59 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41015.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41015.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41015", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-07T09:15:38.200", - "lastModified": "2024-11-21T08:20:24.363", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:16:57.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_job_portal:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "813E6A85-AC44-455D-966D-E4356801B868" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2023-41015/blob/main/CVE-27", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2023-41015/blob/main/CVE-27", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-423xx/CVE-2023-42308.json b/CVE-2023/CVE-2023-423xx/CVE-2023-42308.json index e7427cd24d7..b89eb0f3ab6 100644 --- a/CVE-2023/CVE-2023-423xx/CVE-2023-42308.json +++ b/CVE-2023/CVE-2023-423xx/CVE-2023-42308.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42308", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T21:15:55.787", - "lastModified": "2024-11-21T08:22:25.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:15:50.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:exam_form_submission:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "57FA1715-F94F-4997-83B1-128C0283E460" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2023-42308/blob/main/CVE-7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2023-42308/blob/main/CVE-7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json index 54f19500843..ff5f74d2139 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6957", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:09.517", - "lastModified": "2024-11-21T08:44:55.140", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-03T13:14:07.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 1.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmanageninja:fluent_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1.10", + "matchCriteriaId": "A1B0A40A-ADA9-4465-88DC-6885206007C7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3041316%40fluentform%2Ftrunk&old=3025740%40fluentform%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f4050403-6b8c-4023-b170-39f3cb68583e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3041316%40fluentform%2Ftrunk&old=3025740%40fluentform%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f4050403-6b8c-4023-b170-39f3cb68583e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11692.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11692.json index 0826fb8835f..5e5d1871d3e 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11692.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11692.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11692", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:18.743", - "lastModified": "2024-11-27T16:15:12.530", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:31:37.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,79 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.5.0", + "matchCriteriaId": "883C5169-FA69-4478-BE73-4F36AB746D39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "F82571FC-4DDE-4C63-BD2B-8CF2FFEA28A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.5", + "matchCriteriaId": "6D8EB724-B91E-46E5-97D5-369C1AD92D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "133.0", + "matchCriteriaId": "809C8F59-3AAB-49E8-9F18-6884EC6E4E92" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909535", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11693.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11693.json index c678eca607e..83b8e55c910 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11693.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11693.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11693", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:18.847", - "lastModified": "2024-11-27T16:15:12.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:31:28.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,26 +39,91 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.5.0", + "matchCriteriaId": "883C5169-FA69-4478-BE73-4F36AB746D39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "F82571FC-4DDE-4C63-BD2B-8CF2FFEA28A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.5.0", + "matchCriteriaId": "9C047DD2-FCBA-4474-8AAE-DBB9A5142E4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "133.0", + "matchCriteriaId": "809C8F59-3AAB-49E8-9F18-6884EC6E4E92" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1921458", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11695.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11695.json index d92072d507d..ff5d0675fbb 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11695.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11695.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11695", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.040", - "lastModified": "2024-11-27T17:15:09.867", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:31:44.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.5.0", + "matchCriteriaId": "883C5169-FA69-4478-BE73-4F36AB746D39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "F82571FC-4DDE-4C63-BD2B-8CF2FFEA28A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.5.0", + "matchCriteriaId": "9C047DD2-FCBA-4474-8AAE-DBB9A5142E4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "133.0", + "matchCriteriaId": "809C8F59-3AAB-49E8-9F18-6884EC6E4E92" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925496", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11697.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11697.json index 48678f3d289..6c8ced7cc70 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11697.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11697", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.243", - "lastModified": "2024-11-27T16:15:12.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:31:49.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.5.0", + "matchCriteriaId": "883C5169-FA69-4478-BE73-4F36AB746D39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "F82571FC-4DDE-4C63-BD2B-8CF2FFEA28A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.5.0", + "matchCriteriaId": "9C047DD2-FCBA-4474-8AAE-DBB9A5142E4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "133.0", + "matchCriteriaId": "809C8F59-3AAB-49E8-9F18-6884EC6E4E92" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842187", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11699.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11699.json index 054abfc8a73..b6ad27b2163 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11699.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11699.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11699", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.427", - "lastModified": "2024-11-27T15:15:24.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:31:55.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.5.0", + "matchCriteriaId": "883C5169-FA69-4478-BE73-4F36AB746D39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "F82571FC-4DDE-4C63-BD2B-8CF2FFEA28A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.5", + "matchCriteriaId": "6D8EB724-B91E-46E5-97D5-369C1AD92D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "133.0", + "matchCriteriaId": "809C8F59-3AAB-49E8-9F18-6884EC6E4E92" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11700.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11700.json index 741e99718a7..a9b2387372a 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11700.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11700.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11700", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.523", - "lastModified": "2024-12-02T15:15:10.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:32:01.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "F82571FC-4DDE-4C63-BD2B-8CF2FFEA28A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "75D1724C-A89A-46A9-988C-09A4019D9956" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1836921", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12963.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12963.json index dbe685a85d1..ea31d437b93 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12963.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12963.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12963", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T20:15:20.853", - "lastModified": "2024-12-27T17:15:07.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:35:16.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD4E42A-EE42-42BC-84AF-080C93AED8A4" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/UnrealdDei/cve/blob/main/sql6.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289328", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289328", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.468922", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/UnrealdDei/cve/blob/main/sql6.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12966.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12966.json index e597595f65a..801983456b7 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12966.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12966.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12966", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T21:15:06.570", - "lastModified": "2024-12-27T17:15:07.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:29:35.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD4E42A-EE42-42BC-84AF-080C93AED8A4" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Viper0617/cve/blob/main/sql-viper.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289331", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289331", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469000", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Viper0617/cve/blob/main/sql-viper.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12967.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12967.json index 9dbd98b3b82..d5868210ee5 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12967.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12967.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12967", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T22:15:09.487", - "lastModified": "2024-12-30T15:15:08.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:26:49.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD4E42A-EE42-42BC-84AF-080C93AED8A4" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/glqt/CVE/blob/main/sql-glqt.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289332", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289332", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469002", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/glqt/CVE/blob/main/sql-glqt.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12968.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12968.json index 3c9c92be46f..d6ae58f4a0d 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12968.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12968.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12968", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-26T22:15:11.557", - "lastModified": "2024-12-27T17:15:07.867", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:21:37.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:job_recruitment:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD4E42A-EE42-42BC-84AF-080C93AED8A4" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/705298066/cve/blob/main/sql-1-kzk.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.289333", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289333", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469021", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/705298066/cve/blob/main/sql-1-kzk.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12977.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12977.json index df31ddbe26e..71ceb0455d6 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12977.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12977", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-27T02:15:07.130", - "lastModified": "2024-12-27T19:15:08.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:19:13.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*", + "matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/AngrySheep2003/cve/blob/main/Complaint_Management_System_SQL_Injection.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289353", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289353", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469112", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/AngrySheep2003/cve/blob/main/Complaint_Management_System_SQL_Injection.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-129xx/CVE-2024-12982.json b/CVE-2024/CVE-2024-129xx/CVE-2024-12982.json index 3035f3624fd..af4a6b469db 100644 --- a/CVE-2024/CVE-2024-129xx/CVE-2024-12982.json +++ b/CVE-2024/CVE-2024-129xx/CVE-2024-12982.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12982", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-27T06:15:23.680", - "lastModified": "2024-12-27T16:15:23.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:08:37.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,74 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:blood_bank_\\&_donor_management_system:2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D2D03BA7-7711-48A2-AE8E-FF252DC4EAA5" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289358", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289358", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469202", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469202", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13001.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13001.json index 16e5b762b5b..f0b120d3764 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13001.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13001.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13001", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-29T03:15:07.477", - "lastModified": "2024-12-31T18:15:25.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T12:35:17.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,28 +142,73 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:small_crm:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "161FD34C-EF5E-4B12-942C-6B374BE487E2" + } + ] + } + ] } ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.289662", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.289662", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469317", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://phpgurukul.com/small-crm-php/#google_vignette", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1489.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1489.json index 0c20c95631a..491670b6f5a 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1489.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1489.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1489", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:23.377", - "lastModified": "2024-11-21T08:50:41.657", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-03T13:13:02.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cozyvision:sms_alert_order_notifications:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.7.0", + "matchCriteriaId": "C8E99725-5996-4C7C-8517-83FBA21DC340" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039989%40sms-alert%2Ftrunk&old=3032487%40sms-alert%2Ftrunk&sfp_email=&sfph_mail=#file19", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7a28382-facb-43a7-892a-8ca9e7f0f62b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039989%40sms-alert%2Ftrunk&old=3032487%40sms-alert%2Ftrunk&sfp_email=&sfph_mail=#file19", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7a28382-facb-43a7-892a-8ca9e7f0f62b?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1640.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1640.json index 34c141c7e6f..10042c6e925 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1640.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1640.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1640", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:24.957", - "lastModified": "2024-11-21T08:50:59.030", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-03T13:12:35.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bitapps:contact_form_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.10.2", + "matchCriteriaId": "8F5C603F-9284-463F-80D6-7F57F8213455" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3048523/bit-form/trunk/includes/Frontend/Ajax/FrontendAjax.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/49ed7d6a-4a65-4efc-90e5-ffa5470d4011?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3048523/bit-form/trunk/includes/Frontend/Ajax/FrontendAjax.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/49ed7d6a-4a65-4efc-90e5-ffa5470d4011?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1642.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1642.json index 43af6334e5b..7d4c83fa04c 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1642.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1642.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1642", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:25.127", - "lastModified": "2024-11-21T08:50:59.280", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-03T13:11:53.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mainwp:mainwp_dashboard:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.0", + "matchCriteriaId": "EA202A50-A83F-4173-9EB3-5A9D6C9B7C31" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/mainwp/tags/4.6.0.1/pages/page-mainwp-post-page-handler.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3042125/mainwp/trunk/pages/page-mainwp-post-page-handler.php?old=3017011&old_path=mainwp/trunk/pages/page-mainwp-post-page-handler.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2c2d9569-a551-46f5-8581-464b9f35b71c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/mainwp/tags/4.6.0.1/pages/page-mainwp-post-page-handler.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3042125/mainwp/trunk/pages/page-mainwp-post-page-handler.php?old=3017011&old_path=mainwp/trunk/pages/page-mainwp-post-page-handler.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2c2d9569-a551-46f5-8581-464b9f35b71c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1772.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1772.json index f6d7a617350..d4876604e4e 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1772.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1772", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:27.040", - "lastModified": "2024-11-21T08:51:16.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-03T13:11:01.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hammadh:play.ht:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.6.4", + "matchCriteriaId": "4392A740-4FCA-4174-B266-A3F2BAB9DD14" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php#L138", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/83a595b7-379c-4202-abdd-d8ba4a30c6a4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/play-ht/trunk/includes/class-ajax-handler.php#L138", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/83a595b7-379c-4202-abdd-d8ba4a30c6a4?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1843.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1843.json index 11f18fdac9b..21a2f439948 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1843.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1843.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1843", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:27.550", - "lastModified": "2024-11-21T08:51:26.237", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-03T12:57:43.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flamescorpion:auto_affiliate_links:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.4.3.1", + "matchCriteriaId": "2ABCABAF-7B96-4CD9-B2DB-36FCF0008A1D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-auto-affiliate-links/trunk/aal_ajax.php#L79", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3044067%40wp-auto-affiliate-links&new=3044067%40wp-auto-affiliate-links&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/09e5aa34-ab28-4349-ac5f-6a0479e641e5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-auto-affiliate-links/trunk/aal_ajax.php#L79", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3044067%40wp-auto-affiliate-links&new=3044067%40wp-auto-affiliate-links&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/09e5aa34-ab28-4349-ac5f-6a0479e641e5?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1862.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1862.json index f577c4c9e76..4b47d44aa91 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1862.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1862.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1862", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:27.893", - "lastModified": "2024-11-21T08:51:28.833", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-03T12:56:32.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:renventura:woocommerce_add_to_cart_custom_redirect:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.14", + "matchCriteriaId": "6124BE9E-348A-4243-99CF-2133EC4555BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/woocommerce-add-to-cart-custom-redirect/tags/1.2.13/woocommerce-custom-redirect.php#L204", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/woocommerce-add-to-cart-custom-redirect/tags/1.2.13&old=3047408&new_path=/woocommerce-add-to-cart-custom-redirect/tags/1.2.14&new=3047408&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/36c6a116-37cc-4ade-b601-5f9d6aaf9217?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/woocommerce-add-to-cart-custom-redirect/tags/1.2.13/woocommerce-custom-redirect.php#L204", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/woocommerce-add-to-cart-custom-redirect/tags/1.2.13&old=3047408&new_path=/woocommerce-add-to-cart-custom-redirect/tags/1.2.14&new=3047408&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/36c6a116-37cc-4ade-b601-5f9d6aaf9217?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2130.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2130.json index dc765c33427..2b1ea70da9e 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2130.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2130.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2130", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-12T20:15:08.853", - "lastModified": "2024-11-21T09:09:05.613", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-03T13:16:35.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codeworkweb:cww_companion:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.8", + "matchCriteriaId": "98097EFC-7D10-4611-914C-F5765F8EC071" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3049008%40cww-companion&new=3049008%40cww-companion&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d82d43b9-4c70-4525-88ba-eec7c81a62c1?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3049008%40cww-companion&new=3049008%40cww-companion&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d82d43b9-4c70-4525-88ba-eec7c81a62c1?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22547.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22547.json index 33108836852..03b1ee60dd9 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22547.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22547.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22547", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T19:15:08.547", - "lastModified": "2024-11-21T08:56:26.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:18:29.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wayos:ibr-7150_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.06.23", + "matchCriteriaId": "25AFA096-5093-4B11-8F99-D9CC9D28802F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wayos:ibr-7150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF20E66E-4BEA-4A97-8ADC-CEE98EAB2685" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/WarmBrew/web_vul/blob/main/wayos/wayos.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/WarmBrew/web_vul/blob/main/wayos/wayos.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24092.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24092.json index df3c10ec152..8bfa0863842 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24092.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24092.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24092", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T21:15:58.217", - "lastModified": "2024-11-21T08:58:53.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:15:37.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:scholars_tracking_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "783EDAF4-121E-47D5-9791-C5BB0CE2B50A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2024-24092/blob/main/CVE-9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2024-24092/blob/main/CVE-9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24093.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24093.json index fbb555a01c2..2dbd384e50b 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24093.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24093.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24093", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T21:15:58.370", - "lastModified": "2024-11-21T08:58:54.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:15:28.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:scholars_tracking_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "783EDAF4-121E-47D5-9791-C5BB0CE2B50A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2024-24093/blob/main/CVE-10", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2024-24093/blob/main/CVE-10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24095.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24095.json index 821f1d47dc6..3f7e13adba6 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24095.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24095.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24095", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T02:15:06.587", - "lastModified": "2024-11-21T08:58:54.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:17:25.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:simple_stock_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D739FAFF-7194-4C60-8ACD-8B76CF047636" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2024-24095/blob/main/CVE-21", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2024-24095/blob/main/CVE-21", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24096.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24096.json index 92327f710fa..3e4ba7a9374 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24096.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24096.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24096", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T02:15:06.630", - "lastModified": "2024-11-21T08:58:54.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:17:13.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:computer_book_store:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B0ED63B2-B87D-4609-929C-B8AF30183BCA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2024-24096/blob/main/CVE-20", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2024-24096/blob/main/CVE-20", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24097.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24097.json index 3393c9d08f3..01f3c26a013 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24097.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24097.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24097", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T21:15:58.497", - "lastModified": "2024-11-21T08:58:54.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:15:11.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:scholars_tracking_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "783EDAF4-121E-47D5-9791-C5BB0CE2B50A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2024-24097/blob/main/CVE-12", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2024-24097/blob/main/CVE-12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24099.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24099.json index d28a9703156..324063191aa 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24099.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24099.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24099", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-27T02:15:06.677", - "lastModified": "2024-11-21T08:58:55.073", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:17:06.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:scholars_tracking_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "783EDAF4-121E-47D5-9791-C5BB0CE2B50A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2024-24099/blob/main/CVE-19", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/ASR511-OO7/CVE-2024-24099/blob/main/CVE-19", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25369.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25369.json index 436578c1e4c..7191830caa8 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25369.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25369.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25369", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T20:15:56.880", - "lastModified": "2024-11-21T09:00:41.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:17:55.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E3A44312-83D2-4421-9A35-3FD048EA578A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/liyako/vulnerability/blob/main/POC/FUEL%20CMS%20Reflected%20Cross-Site%20Scripting%20%28XSS%29.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/liyako/vulnerability/blob/main/POC/FUEL%20CMS%20Reflected%20Cross-Site%20Scripting%20%28XSS%29.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25385.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25385.json index 9b391a97c51..7daed5cf251 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25385.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25385.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25385", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T19:15:09.037", - "lastModified": "2024-11-21T09:00:42.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:18:18.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flvmeta:flvmeta:1.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "713E2B34-66E5-4192-9AFC-F2D714CB92F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hanxuer/crashes/blob/main/flvmeta/01/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/noirotm/flvmeta/issues/23", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/hanxuer/crashes/blob/main/flvmeta/01/readme.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/noirotm/flvmeta/issues/23", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25828.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25828.json index 367349958f7..8fd78c20dae 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25828.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25828.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25828", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T16:15:54.100", - "lastModified": "2024-11-21T09:01:23.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:18:40.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C47FE864-5B8E-428F-80DC-AA29EDB454DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/sec-Kode/cve", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/sec-Kode/cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25850.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25850.json index 4414ee36828..218ecf1a9b6 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25850.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25850.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25850", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T15:15:08.540", - "lastModified": "2024-11-21T09:01:26.870", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:18:56.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,63 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netis-systems:wf2780_firmware:2.1.40144:*:*:*:*:*:*:*", + "matchCriteriaId": "019F91E3-9285-4AF3-BA4F-B71792F077FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netis-systems:wf2780:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97B8E231-D7D6-4667-9B55-D8B00860B2CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://www.netis-systems.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/no1rr/Vulnerability/blob/master/netis/igd_wps_set_wps_ap_ssid5g.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://www.netis-systems.com/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25851.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25851.json index 1044bffee4e..fbffe494728 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25851.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25851.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25851", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T15:15:08.590", - "lastModified": "2024-11-21T09:01:27.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:18:49.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,63 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netis-systems:wf2780_firmware:2.1.40144:*:*:*:*:*:*:*", + "matchCriteriaId": "019F91E3-9285-4AF3-BA4F-B71792F077FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netis-systems:wf2780:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97B8E231-D7D6-4667-9B55-D8B00860B2CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/no1rr/Vulnerability/blob/master/netis/other_para_config_sequence.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://www.netis-systems.com/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/no1rr/Vulnerability/blob/master/netis/other_para_config_sequence.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://www.netis-systems.com/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28338.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28338.json index f5581e35255..93e1e236b47 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28338.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28338.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28338", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T17:15:59.047", - "lastModified": "2024-11-21T09:06:12.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:16:47.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a8000ru_firmware:7.1cu.643_b20200521:*:*:*:*:*:*:*", + "matchCriteriaId": "87C53C12-572D-440A-AA3D-340DC43605A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a8000ru:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85118A3E-742A-4B1E-A7CF-F8F8E8A86462" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A8000RU/TOTOlink%20A8000RU%20login%20bypass.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9416.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9416.json new file mode 100644 index 00000000000..d1b721114f2 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9416.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9416", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-03T13:15:42.530", + "lastModified": "2025-04-03T13:15:42.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Modula Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's bundled FancyBox JavaScript library (versions <= 5.0.36) due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3160235/modula-best-grid-gallery", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1954040c-2188-48b7-9f21-9a0c851c9165?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0295.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0295.json index d6281943e4a..3e8ea180609 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0295.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0295.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0295", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T15:15:12.320", - "lastModified": "2025-01-07T16:15:39.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:59:53.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -154,26 +154,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_book_shop:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C567189-6EDC-4587-9420-EC3A0B41D996" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/th4s1s/19d21e7fdbaf3512fccfd75df3080657", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.290444", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.290444", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.475134", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0296.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0296.json index 123a0d92ed6..37a6bccb86e 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0296.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0296.json @@ -2,8 +2,8 @@ "id": "CVE-2025-0296", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-07T15:15:12.530", - "lastModified": "2025-01-07T16:15:39.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:52:49.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -81,6 +81,26 @@ "exploitabilityScore": 2.8, "impactScore": 3.4 }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -143,6 +163,16 @@ } ] }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -154,26 +184,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_book_shop:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C567189-6EDC-4587-9420-EC3A0B41D996" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/th4s1s/4ebf1c60bbec213119f2eaac9cd29118", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.290445", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.290445", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.475135", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1931.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1931.json index 29b15095cba..787cea4e79e 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1931.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1931.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1931", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:37.963", - "lastModified": "2025-03-26T20:15:21.467", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:29:22.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.21.0", + "matchCriteriaId": "68BC8333-E840-48AF-A5A1-44D7D74F244A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "136.0", + "matchCriteriaId": "7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "4F666780-2794-46E3-86C5-3C0406FB2B34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "D3C5A2B6-C7B5-4888-B0A7-9DA0C3024C71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "136.0", + "matchCriteriaId": "93C81C9D-FC2E-4D7D-A97F-8DB97ED92192" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1944126", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-15/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json index 403f6bb6964..74c3808631a 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1933.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1933", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.170", - "lastModified": "2025-03-25T14:15:27.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:29:37.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,104 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.21.0", + "matchCriteriaId": "68BC8333-E840-48AF-A5A1-44D7D74F244A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "136.0", + "matchCriteriaId": "7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "4F666780-2794-46E3-86C5-3C0406FB2B34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.8", + "matchCriteriaId": "575A7E02-486F-44C5-B419-620852B67267" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "136.0", + "matchCriteriaId": "93C81C9D-FC2E-4D7D-A97F-8DB97ED92192" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1946004", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-15/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json index 14686835d18..29112711392 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1934.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1934", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.273", - "lastModified": "2025-03-25T15:15:24.463", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:29:50.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,26 +39,91 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "51A0498A-4BF8-4166-A347-78023C0A6B33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "136.0", + "matchCriteriaId": "7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "D3C5A2B6-C7B5-4888-B0A7-9DA0C3024C71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "136.0", + "matchCriteriaId": "93C81C9D-FC2E-4D7D-A97F-8DB97ED92192" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1942881", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json index 2c2fd7b585c..049472baec0 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1935.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1935", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.390", - "lastModified": "2025-03-25T14:15:28.063", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:30:01.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "51A0498A-4BF8-4166-A347-78023C0A6B33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "136.0", + "matchCriteriaId": "7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "D3C5A2B6-C7B5-4888-B0A7-9DA0C3024C71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "136.0", + "matchCriteriaId": "93C81C9D-FC2E-4D7D-A97F-8DB97ED92192" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1866661", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1937.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1937.json index 74ecfd35cae..2d2609f2ccd 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1937.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1937.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1937", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.610", - "lastModified": "2025-03-12T22:15:34.743", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:30:07.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,34 +51,98 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.21.0", + "matchCriteriaId": "68BC8333-E840-48AF-A5A1-44D7D74F244A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "51A0498A-4BF8-4166-A347-78023C0A6B33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "BADF1FB6-FA36-4AD1-B176-0DD893E0CD9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "D3C5A2B6-C7B5-4888-B0A7-9DA0C3024C71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "136.0", + "matchCriteriaId": "93C81C9D-FC2E-4D7D-A97F-8DB97ED92192" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1938471%2C1940716", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Exploit" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-15/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/03/10/6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1938.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1938.json index 18922d906aa..e4db16cde4a 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1938.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1938.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1938", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.730", - "lastModified": "2025-03-05T00:15:37.097", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:30:13.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "B1B11C09-3033-44F5-ACC7-591196075CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "BADF1FB6-FA36-4AD1-B176-0DD893E0CD9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "1E4B98F4-AC9B-402A-B7D2-829373BFBD66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "135.0", + "matchCriteriaId": "5E83B28A-FF6A-4C0A-B5BD-1CE5DEC24C64" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1922889%2C1935004%2C1943586%2C1943912%2C1948111", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1939.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1939.json index 4df88cd790d..0be311588aa 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1939.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1939.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1939", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.837", - "lastModified": "2025-03-05T19:15:37.870", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:30:20.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "136.0", + "matchCriteriaId": "7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1928334", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json index 725b668201a..908cc91e62d 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1940.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1940", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.950", - "lastModified": "2025-03-04T16:15:38.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:30:26.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "136.0", + "matchCriteriaId": "7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1908488", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1943.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1943.json index 62ab740efd3..c7127f158f1 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1943.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1943.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1943", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:39.260", - "lastModified": "2025-03-05T00:15:37.400", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:30:58.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "136.0", + "matchCriteriaId": "7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "136.0", + "matchCriteriaId": "43A02EBD-58CF-4057-A3D7-3828B599D954" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1869650%2C1938451%2C1940326%2C1944052%2C1944063%2C1947281", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1952.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1952.json index afbf04d2710..0e9d70887fe 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1952.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1952.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1952", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T19:15:38.117", - "lastModified": "2025-03-04T20:15:37.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:31:17.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,30 +144,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "02963BE3-61BC-41D5-82BA-71B773AA8FA0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zrlianc/CVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.298542", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298542", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.509955", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/zrlianc/CVE/issues/1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1956.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1956.json index 389f6bf168e..79b6df65942 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1956.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1956.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1956", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T22:15:39.867", - "lastModified": "2025-03-05T17:15:13.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:32:25.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,86 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:shopping_portal:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "404962F0-30AC-403D-91B4-B7E5C623DE99" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://hexotion.notion.site/Shopping-Portal-in-PHP-has-Stored-SQL-injection-vulnerability-in-admin-index-php-1a7bb766cf3280e8bb81eaa59c4c2b74", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.298557", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298557", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.510696", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://hexotion.notion.site/Shopping-Portal-in-PHP-has-Stored-SQL-injection-vulnerability-in-admin-index-php-1a7bb766cf3280e8bb81eaa59c4c2b74", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1957.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1957.json index db8358dc433..e3997e01a0b 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1957.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1957.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1957", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T22:15:40.040", - "lastModified": "2025-03-05T17:15:13.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:32:30.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Corgile/cve/blob/main/cve.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.298558", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298558", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.510705", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Corgile/cve/blob/main/cve.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1959.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1959.json index 2af14f333c9..3d3099643d8 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1959.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1959.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1959", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-04T23:15:10.507", - "lastModified": "2025-04-02T21:15:31.927", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-03T13:32:36.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8609E306-3171-4B5D-AD7A-5E95C463E015" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CContinueee/CVE/blob/main/CVE_1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.298560", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298560", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.510782", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/CContinueee/CVE/blob/main/CVE_1.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json index 32413eec9c5..cb4d51d5b05 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1967.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1967", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-05T02:15:36.320", - "lastModified": "2025-03-05T15:15:17.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:32:47.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blood_bank_management_system_project:blood_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "506334D0-D072-4FCE-BE01-AA50874CC88A" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/intercpt/XSS1/blob/main/XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.298568", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298568", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.512163", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/intercpt/XSS1/blob/main/XSS.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2047.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2047.json index 4753daef687..06dc932491e 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2047.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2047.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2047", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-06T23:15:12.343", - "lastModified": "2025-03-07T20:15:39.300", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:32:55.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:art_gallery_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CE7F7EC5-D077-4052-9013-D37C2F794796" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/chenyihao-cyber/CVE/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.298797", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298797", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.514015", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/chenyihao-cyber/CVE/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2049.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2049.json index 29d399eb599..9734341b580 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2049.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2049.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2049", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-06T23:15:12.523", - "lastModified": "2025-03-07T20:15:39.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:33:00.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ABC-YOLO/cve/blob/main/xss45.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.298800", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298800", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.514089", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/ABC-YOLO/cve/blob/main/xss45.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2090.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2090.json index 24de39c6016..f8d8ec07e4f 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2090.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2090.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2090", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-07T15:15:15.220", - "lastModified": "2025-03-07T20:15:39.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:33:07.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -122,32 +122,84 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:pre-school_enrollment_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA2ED32-BA35-4D09-A99F-13998D3C19CF" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/SECWG/cve/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.298904", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298904", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.515017", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/SECWG/cve/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2093.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2093.json index edfa42d33e8..9cf1973a833 100644 --- a/CVE-2025/CVE-2025-20xx/CVE-2025-2093.json +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2093.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2093", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-07T22:15:38.680", - "lastModified": "2025-03-07T23:15:15.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:33:14.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -120,30 +120,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_library_management_system:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9B09C43C-9210-49F3-908F-63C39DA11868" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/SECWG/cve/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.298951", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298951", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.515207", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/SECWG/cve/issues/4", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22927.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22927.json new file mode 100644 index 00000000000..4268c62b79a --- /dev/null +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22927.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-22927", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-03T13:15:42.773", + "lastModified": "2025-04-03T13:15:42.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in OS4ED openSIS v8.0 through v9.1 allows attackers to execute a directory traversal by sending a crafted POST request to /Modules.php?modname=messaging/Inbox.php&modfunc=save&filename." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/OS4ED/openSIS-Classic", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/esusalla/vulnerability-research/tree/main/CVE-2025-22927", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22928.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22928.json new file mode 100644 index 00000000000..e38ab6bb6c3 --- /dev/null +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22928.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-22928", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-03T13:15:42.883", + "lastModified": "2025-04-03T13:15:42.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OS4ED openSIS v7.0 to v9.1 was discovered to contain a SQL injection vulnerability via the cp_id parameter at /modules/messages/Inbox.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/OS4ED/openSIS-Classic", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/esusalla/vulnerability-research/tree/main/CVE-2025-22928", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2299.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2299.json new file mode 100644 index 00000000000..b1998a0b877 --- /dev/null +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2299.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-2299", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-03T12:15:14.920", + "lastModified": "2025-04-03T12:15:14.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The LuckyWP Table of Contents plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.10. This is due to missing or incorrect nonce validation on the 'ajaxEdit' function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/luckywp-table-of-contents/trunk/admin/controllers/EditorBlockController.php#L30", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/luckywp-table-of-contents/trunk/admin/widgets/customizeSuccess/views/widget.php#L12", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3265169/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/82df5b2e-4c4a-402f-99c9-694fa710009b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26695.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26695.json index c84a2bcd776..ec6fb408964 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26695.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26695.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26695", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-10T19:15:40.567", - "lastModified": "2025-03-12T19:15:40.450", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:30:39.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,18 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "D3C5A2B6-C7B5-4888-B0A7-9DA0C3024C71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "136.0", + "matchCriteriaId": "93C81C9D-FC2E-4D7D-A97F-8DB97ED92192" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883039", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26696.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26696.json index 50844b8dd4a..9c8fc950548 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26696.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26696.json @@ -2,8 +2,8 @@ "id": "CVE-2025-26696", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-10T19:15:40.670", - "lastModified": "2025-03-11T20:15:17.523", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:30:33.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "D3C5A2B6-C7B5-4888-B0A7-9DA0C3024C71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "136.0", + "matchCriteriaId": "93C81C9D-FC2E-4D7D-A97F-8DB97ED92192" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1864205", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json index 59027fc7327..5dc31957c2a 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27425.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27425", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:39.493", - "lastModified": "2025-03-04T16:15:40.797", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:31:06.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "136.0", + "matchCriteriaId": "7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1941525", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-13/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27426.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27426.json index 14109472715..e532582ddba 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27426.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27426.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27426", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:39.593", - "lastModified": "2025-03-04T16:15:40.933", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-03T13:30:49.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "136.0", + "matchCriteriaId": "7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933079", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-13/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2945.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2945.json new file mode 100644 index 00000000000..2c0fe616635 --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2945.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-2945", + "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", + "published": "2025-04-03T13:15:43.240", + "lastModified": "2025-04-03T13:15:43.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Remote Code Execution security vulnerability in pgAdmin 4 (Query Tool and Cloud Deployment modules).\n\nThe vulnerability is associated with the 2 POST endpoints;\u00a0/sqleditor/query_tool/download, where the query_commited parameter and\u00a0/cloud/deploy endpoint, where the high_availability parameter is\u00a0unsafely passed to the Python eval() function, allowing arbitrary code execution.\n\n\nThis issue affects pgAdmin 4: before 9.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://github.com/pgadmin-org/pgadmin4/issues/8603", + "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2946.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2946.json new file mode 100644 index 00000000000..26431d78a53 --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2946.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-2946", + "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", + "published": "2025-04-03T13:15:43.377", + "lastModified": "2025-04-03T13:15:43.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "pgAdmin <= 9.1 is affected by a security vulnerability with Cross-Site Scripting(XSS). If attackers\u00a0execute any arbitrary HTML/JavaScript in a user's browser through query result rendering, then HTML/JavaScript runs on the browser." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.3 + } + ] + }, + "references": [ + { + "url": "https://github.com/pgadmin-org/pgadmin4/issues/8602", + "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30349.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30349.json index 8c5021a8cd5..927c47cc6ec 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30349.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30349.json @@ -2,7 +2,7 @@ "id": "CVE-2025-30349", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-21T17:15:40.853", - "lastModified": "2025-03-28T01:15:16.323", + "lastModified": "2025-04-03T12:15:16.210", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -103,6 +103,10 @@ { "url": "https://www.horde.org/download/horde", "source": "cve@mitre.org" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00008.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3140.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3140.json index 4d99325c40d..3e861d047fa 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3140.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3140.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3140", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T05:15:40.777", - "lastModified": "2025-04-03T05:15:40.777", + "lastModified": "2025-04-03T13:15:44.010", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Online Medicine Ordering System 1.0. It has been classified as critical. This affects an unknown part of the file /view_category.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Online Medicine Ordering System 1.0. Se ha clasificado como cr\u00edtica. Afecta una parte desconocida del archivo /view_category.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Lena-lyy/SQL/blob/main/SQL1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3141.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3141.json index 4ad24ad8bf6..b4d9d76b7dc 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3141.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3141.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3141", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T05:15:42.363", - "lastModified": "2025-04-03T05:15:42.363", + "lastModified": "2025-04-03T13:15:44.157", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Online Medicine Ordering System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /manage_category.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Online Medicine Ordering System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /manage_category.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Lena-lyy/SQL/blob/main/SQL2.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 9c8cf438dce..da8e498e653 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-03T12:00:23.426037+00:00 +2025-04-03T14:00:20.370130+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-03T11:15:40.703000+00:00 +2025-04-03T13:59:53.160000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -288308 +288314 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `6` +- [CVE-2024-9416](CVE-2024/CVE-2024-94xx/CVE-2024-9416.json) (`2025-04-03T13:15:42.530`) +- [CVE-2025-22927](CVE-2025/CVE-2025-229xx/CVE-2025-22927.json) (`2025-04-03T13:15:42.773`) +- [CVE-2025-22928](CVE-2025/CVE-2025-229xx/CVE-2025-22928.json) (`2025-04-03T13:15:42.883`) +- [CVE-2025-2299](CVE-2025/CVE-2025-22xx/CVE-2025-2299.json) (`2025-04-03T12:15:14.920`) +- [CVE-2025-2945](CVE-2025/CVE-2025-29xx/CVE-2025-2945.json) (`2025-04-03T13:15:43.240`) +- [CVE-2025-2946](CVE-2025/CVE-2025-29xx/CVE-2025-2946.json) (`2025-04-03T13:15:43.377`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `72` -- [CVE-2024-10559](CVE-2024/CVE-2024-105xx/CVE-2024-10559.json) (`2025-04-03T11:15:40.150`) -- [CVE-2024-53868](CVE-2024/CVE-2024-538xx/CVE-2024-53868.json) (`2025-04-03T09:15:15.780`) -- [CVE-2024-8676](CVE-2024/CVE-2024-86xx/CVE-2024-8676.json) (`2025-04-03T11:15:40.703`) -- [CVE-2025-0624](CVE-2025/CVE-2025-06xx/CVE-2025-0624.json) (`2025-04-03T10:15:19.267`) +- [CVE-2025-1931](CVE-2025/CVE-2025-19xx/CVE-2025-1931.json) (`2025-04-03T13:29:22.950`) +- [CVE-2025-1933](CVE-2025/CVE-2025-19xx/CVE-2025-1933.json) (`2025-04-03T13:29:37.270`) +- [CVE-2025-1934](CVE-2025/CVE-2025-19xx/CVE-2025-1934.json) (`2025-04-03T13:29:50.427`) +- [CVE-2025-1935](CVE-2025/CVE-2025-19xx/CVE-2025-1935.json) (`2025-04-03T13:30:01.180`) +- [CVE-2025-1937](CVE-2025/CVE-2025-19xx/CVE-2025-1937.json) (`2025-04-03T13:30:07.160`) +- [CVE-2025-1938](CVE-2025/CVE-2025-19xx/CVE-2025-1938.json) (`2025-04-03T13:30:13.343`) +- [CVE-2025-1939](CVE-2025/CVE-2025-19xx/CVE-2025-1939.json) (`2025-04-03T13:30:20.860`) +- [CVE-2025-1940](CVE-2025/CVE-2025-19xx/CVE-2025-1940.json) (`2025-04-03T13:30:26.597`) +- [CVE-2025-1943](CVE-2025/CVE-2025-19xx/CVE-2025-1943.json) (`2025-04-03T13:30:58.727`) +- [CVE-2025-1952](CVE-2025/CVE-2025-19xx/CVE-2025-1952.json) (`2025-04-03T13:31:17.857`) +- [CVE-2025-1956](CVE-2025/CVE-2025-19xx/CVE-2025-1956.json) (`2025-04-03T13:32:25.373`) +- [CVE-2025-1957](CVE-2025/CVE-2025-19xx/CVE-2025-1957.json) (`2025-04-03T13:32:30.633`) +- [CVE-2025-1959](CVE-2025/CVE-2025-19xx/CVE-2025-1959.json) (`2025-04-03T13:32:36.457`) +- [CVE-2025-1967](CVE-2025/CVE-2025-19xx/CVE-2025-1967.json) (`2025-04-03T13:32:47.553`) +- [CVE-2025-2047](CVE-2025/CVE-2025-20xx/CVE-2025-2047.json) (`2025-04-03T13:32:55.893`) +- [CVE-2025-2049](CVE-2025/CVE-2025-20xx/CVE-2025-2049.json) (`2025-04-03T13:33:00.487`) +- [CVE-2025-2090](CVE-2025/CVE-2025-20xx/CVE-2025-2090.json) (`2025-04-03T13:33:07.950`) +- [CVE-2025-2093](CVE-2025/CVE-2025-20xx/CVE-2025-2093.json) (`2025-04-03T13:33:14.790`) +- [CVE-2025-26695](CVE-2025/CVE-2025-266xx/CVE-2025-26695.json) (`2025-04-03T13:30:39.037`) +- [CVE-2025-26696](CVE-2025/CVE-2025-266xx/CVE-2025-26696.json) (`2025-04-03T13:30:33.593`) +- [CVE-2025-27425](CVE-2025/CVE-2025-274xx/CVE-2025-27425.json) (`2025-04-03T13:31:06.323`) +- [CVE-2025-27426](CVE-2025/CVE-2025-274xx/CVE-2025-27426.json) (`2025-04-03T13:30:49.883`) +- [CVE-2025-30349](CVE-2025/CVE-2025-303xx/CVE-2025-30349.json) (`2025-04-03T12:15:16.210`) +- [CVE-2025-3140](CVE-2025/CVE-2025-31xx/CVE-2025-3140.json) (`2025-04-03T13:15:44.010`) +- [CVE-2025-3141](CVE-2025/CVE-2025-31xx/CVE-2025-3141.json) (`2025-04-03T13:15:44.157`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 3d0b7f4d45e..a335132c1f5 100644 --- a/_state.csv +++ b/_state.csv @@ -153067,7 +153067,7 @@ CVE-2020-21142,0,0,805abbc7efa4d1b15f1a6ae7536ad6ef999fa55be2ba3aeec436c6ce14091 CVE-2020-21146,0,0,470c88f75e6b10d19d289ddf3889a9815b334668f58962389175f00026b2d0a1,2024-11-21T05:12:28.007000 CVE-2020-21147,0,0,30c430c7b7b91dbd63f2b8765b80c7fa2e7a006cd8f52a9ba7bc86df8b96f1b4,2024-11-21T05:12:28.140000 CVE-2020-2115,0,0,fc0af5c0e232c6f21e5673d3ad348ee92c7d2c09947bb2d8117641b2c034defe,2024-11-21T05:24:41.210000 -CVE-2020-21152,0,0,0970e407ab92e729153325a28a7a201afb233dd2e9873f008ab9d66c152ec028,2024-11-21T05:12:28.280000 +CVE-2020-21152,0,1,14bfb39d3841f28a92b86d169593213ec6520b4b4386b7a6d6baf480e15e0a42,2025-04-03T13:15:39.680000 CVE-2020-2116,0,0,60ba4bef75587c8c0150da8be03f7f2c6e9c8dc375d700806577cf6adfc7502a,2024-11-21T05:24:41.570000 CVE-2020-21161,0,0,4f41fdce83f5ad93ed6f61f767985ea0c47b4b0f7dc7112e4606dadad102d1c4,2024-11-21T05:12:28.437000 CVE-2020-2117,0,0,bbc9add4d9b9af62f8f2e927546e566741a07320396bc2640032433d0999f522,2024-11-21T05:24:41.767000 @@ -159466,7 +159466,7 @@ CVE-2020-36655,0,0,d44eb807f675ee89132cf33524893bd669aa5800ae363e10b31d2baa31be8 CVE-2020-36656,0,0,b7b6e09146a103deff3224911324714d134ca1bd85e7b51fda0ac44dd2d81b98,2024-11-21T05:30:01.727000 CVE-2020-36657,0,0,dad07b3c8ebcdf4e9deeb3311464fac196af5a63bdf3e3c55a7b8859113ad418,2025-04-01T21:15:41.543000 CVE-2020-36658,0,0,3cb70fe5657ed7f4486f4bdbfe93f751a275e156ddde6bfe7c8a2bf7fde1f8bd,2025-03-28T18:15:15.120000 -CVE-2020-36659,0,0,c4deb7bc1678cd7af524758731bfbc993786adce5eadb2d9ffd15888b5865ffc,2024-11-21T05:30:02.363000 +CVE-2020-36659,0,1,af617ea56079b80d4ff0ac731d3fb15ae8cb5bf54ec688a2110b2434ab682131,2025-04-03T13:15:40.943000 CVE-2020-3666,0,0,d26400f97e69df266992c43389c24c338597850c57274cc43e7da892528c5e18,2024-11-21T05:31:32.020000 CVE-2020-36660,0,0,5c5da2d16b7c24fa645c42975e12a0df4893f0d6b023776383957ffe8fd13011,2024-11-21T05:30:02.553000 CVE-2020-36661,0,0,3ca76981e815a00b24630a7e8da5b8cb19947329e0ab19e82ff560a9965d47c5,2024-11-21T05:30:02.790000 @@ -174080,7 +174080,7 @@ CVE-2021-29364,0,0,d5ee2b032ad620f4d437d1301de67419a6f933671cdb900717698bc7a8cc4 CVE-2021-29365,0,0,2b29bcbb187e1d79304228191e362b8758ff02969208efd0607a654aa3fad784,2024-11-21T06:00:59.967000 CVE-2021-29366,0,0,c8213d843dac87a0a5b90b1696ad3cbdc946c50df9de8e8f7c065a74303145eb,2024-11-21T06:01:00.110000 CVE-2021-29367,0,0,3fe9bd14b6b733903aa268e21f18fe68f188eaee87fcf6f394c1e4cc615a7fd5,2024-11-21T06:01:00.250000 -CVE-2021-29368,0,0,481987d5de8c875fa460570c50a6f4a7e3b13233d22b1f4dca01600e8eafcb6a,2024-11-21T06:01:00.383000 +CVE-2021-29368,0,1,2fd0ff59dfdf021b361500afc769e44988a3db1f6dd5b7d883d9fe9f65f7f878,2025-04-03T13:15:41.163000 CVE-2021-29369,0,0,1e2d491256b479daf23213252f4ea03f70373b780e8934e32bb5669b2fc1b411,2024-11-21T06:01:00.523000 CVE-2021-29370,0,0,f61726f0780e33dbb84d9e3675b86ca44213b6eb96708325605270f9469a7099,2024-11-21T06:01:00.660000 CVE-2021-29376,0,0,3436c683c2b5a5d60ed2f098f2f3caa8b21c1c8f778cbdff9cfad28c33cb596c,2024-11-21T06:01:00.790000 @@ -180249,7 +180249,7 @@ CVE-2021-3749,0,0,485930f777929a3788c4e7ce2de18ae619eeaa65c1f263b61a31dcdc25179c CVE-2021-37491,0,0,ced1b15ad1bdb1909f4fa5473ccd573b00ae60a36c840ef307c971491eb16d57,2025-03-25T18:15:28.270000 CVE-2021-37492,0,0,7312241f9e5e64be51f6b5ab29c0276c46549726fbae81b979135b6a41edf528,2025-03-25T18:15:28.467000 CVE-2021-37497,0,0,284ab8b201cc95ca38c1b4838828794f688a4f2ae2ec968c39d50f9ee515d0a0,2024-11-21T06:15:16.513000 -CVE-2021-37498,0,0,e4e4068ed77ff1ff45b871e04f8dee328df4d9f81f473013fb9488f046bf5be6,2024-11-21T06:15:16.767000 +CVE-2021-37498,0,1,4009653a16117397e65e2f9922487b1abfec2d95718695f92847bd9f2d98868d,2025-04-03T13:15:41.377000 CVE-2021-37499,0,0,b70434bddb1bfaee1f037b44b15c525dbcdd70dc5c38a6c8c19f47161ccf531d,2024-11-21T06:15:16.960000 CVE-2021-3750,0,0,925490973b974b80d70ba3e05bfa74ffe77ea5e279323940671b0de27b976367,2024-11-21T06:22:20.063000 CVE-2021-37500,0,0,d70f7a8e98e088476c138834a7537785c65af45eb26f9f4416c0ea44a789fc0f,2024-11-21T06:15:17.140000 @@ -194851,7 +194851,7 @@ CVE-2022-25372,0,0,64b6f74278c50ee07f9da598dd47f28c166dfbf7c767fab9a194e0d7184d1 CVE-2022-25373,0,0,f0f48ce97833b1d33fbe2e29608129595525de29dc3ab706eb25774f60b31934,2024-11-21T06:52:06.013000 CVE-2022-25374,0,0,b8c7918b3c971de550af23d593772201aa44eb2e0f7a9236975cc45fb88e63a5,2024-11-21T06:52:06.170000 CVE-2022-25375,0,0,79e132b24e61c8522f5824b7f017daf92745df61d54b28dd32ef35c358bbf07a,2024-11-21T06:52:06.323000 -CVE-2022-25377,0,0,7f797e44c3ecb8e1c12eded27ba24fa4eab6ac641fb7c8b84f09e9b5d673ad77,2024-11-21T06:52:06.480000 +CVE-2022-25377,0,1,1ae7816d06428539193f5441c43dcee41d4e3f63c3e14b94d1949aca68d62b6b,2025-04-03T13:17:44.300000 CVE-2022-2538,0,0,0697afcea4f59458755d412cdcdc5fca29bbe6ae718103bf0cdf4569e61ddd92,2024-11-21T07:01:12.830000 CVE-2022-25389,0,0,4d4c79cc38e65cbbef10907e72e69cfdb54891d1d1fac27bb752578f41016fb6,2024-11-21T06:52:06.687000 CVE-2022-2539,0,0,e6b494f36e72a2a8b4088d9f8738c31bc08528bfda023a0e178b9cafc48555a2,2024-11-21T07:01:12.943000 @@ -212027,7 +212027,7 @@ CVE-2022-47446,0,0,3f73f944c0eae24a62419832e839494cbd546d8a861023684feb77ce9016e CVE-2022-47447,0,0,11a28d2e1701bb7cad0bc532819476f8a2eb23961c67a067f535ec4e3ac38527,2024-11-21T07:31:58.840000 CVE-2022-47448,0,0,bcf4a762103a4389d26cdb315fe4643ade837572a2910a00f4afcd97e9d1dfe5,2024-11-21T07:31:58.967000 CVE-2022-47449,0,0,cc50b6ae48af7d02d6dd04daa7e7790ccc23f748f67344294a359e7883feebcd,2024-11-21T07:31:59.087000 -CVE-2022-4745,0,0,e01e0a62109bd4ef8e5f97d29b95ffae6191f45de6a32d7af67013476f6b6e2c,2024-11-21T07:35:51.627000 +CVE-2022-4745,0,1,a7404e228802fe2bc605b15262151fe863b1f93186177aeea2a373dde4df53e7,2025-04-03T13:15:41.913000 CVE-2022-47450,0,0,e96af68ae0f53cda52efd3d8be2832a8da6f41b963db0791a2818273409eb7d8,2025-03-26T19:15:20.017000 CVE-2022-47451,0,0,d21767685c9e1c48a8f641e6f36b2ecf5b4aec2ebd1b394de1f03253e03895f3,2025-03-25T21:15:38.490000 CVE-2022-47452,0,0,e58db3a26b36e58e9bbee3a6f857db617877571ea407f71bc52f55ec1c8a7001,2025-03-26T14:15:25.120000 @@ -212093,7 +212093,7 @@ CVE-2022-47506,0,0,098e4a93d3d0116e0d0be1ca8dcfa19fcdf489be2f31fa44f386c46a34a9f CVE-2022-47507,0,0,a2212a8685fb3c1649e65bfdcea67a112dbc535f0cc2efcc2a0762af47157cf4,2024-11-21T07:32:06.543000 CVE-2022-47508,0,0,af193de2eadb39fb88d6d0fd7a08e2d7177373e96ee7d7f487e4bc7fb8a95b5a,2024-11-21T07:32:06.707000 CVE-2022-47509,0,0,5eddac783b82ee07f860e64ca0d4bc7788ff1a7c5c3af2bc0d0fbe8ebac94430,2024-11-21T07:32:06.850000 -CVE-2022-4751,0,0,fb8db9ab1cc11fda7cf92da5b09a3a07a204205cca8a0794d2ef1aca6bd5f9fb,2024-11-21T07:35:52.270000 +CVE-2022-4751,0,1,b9b5162c0e556ec0f4c2e03cbc38b309040c7943a524bb26e28e863eedb913bc,2025-04-03T13:15:42.123000 CVE-2022-47512,0,0,e0cce48898f3104e221cce4ed20ed250821a9c37894ff7ef63c26c2cea69d412,2024-11-21T07:32:06.990000 CVE-2022-47514,0,0,0e4af83224a07ff712db912c3500091eabf96b63fbf29a1872fe8ee316e076f4,2024-11-21T07:32:07.153000 CVE-2022-47515,0,0,cbfe4c843a861f3816cd56a88ac8ca5db8586ef1c18d04bcfe50b6a2fe4ef26f,2024-11-21T07:32:07.307000 @@ -214939,7 +214939,7 @@ CVE-2023-0954,0,0,1d565a8d24902a388b48e10de59aa475b06f01eebc5925cd8a5366eb7473d7 CVE-2023-0955,0,0,ef6afa37080432ef5d2445dc63695e3be3a004b2586046b1538581e08cfa3b56,2025-02-19T20:15:34.453000 CVE-2023-0956,0,0,b21cad265d767412f48ca5927ccc81727aff63c98c215a259dd00f20a7b810e6,2024-11-21T07:38:10.727000 CVE-2023-0957,0,0,65db409fb2f032788daa2ddcc164af225a6dc9ba303c66b5a33ea597fd5e78d3,2024-11-21T07:38:10.850000 -CVE-2023-0958,0,0,6a3e5ef7f957f0c96bc70ece7dae161ad3e7eeaf766261b3bb2b9edfaf5f54d3,2024-11-21T07:38:10.983000 +CVE-2023-0958,0,1,d12439788126da0fb790782edc2ee0541d93ed959e8ad3411af9226456a10c97,2025-04-03T12:44:20.660000 CVE-2023-0959,0,0,63693b2364844f635e9d694076d590b863cd9148d0e2d75b3de9849ae0dadfa9,2025-02-13T19:15:12.833000 CVE-2023-0960,0,0,d712a48fe7a4186d134aa8552c29c93d96e5e2128ade226f4fdb892e8340ee3f,2024-11-21T07:38:11.273000 CVE-2023-0961,0,0,92b07490de05e419fbf2ff7dcb7723a1995f3da79bc6ac167d5a78db1d38bd5c,2024-11-21T07:38:11.400000 @@ -231835,7 +231835,7 @@ CVE-2023-39749,0,0,7451a66a3e7311caffe0c9865ff72a4a5c0f4993826241898b20c089a8159 CVE-2023-3975,0,0,91501007307a784938139fa3be5ff72465b7511edbb8d9921ebbf41c0ee7d8eb,2024-11-21T08:18:26.410000 CVE-2023-39750,0,0,4eb2e46cebda661cbcb15d1776f0b57053da2dfc7b91c5ceffb7b43a12675e33,2024-11-21T08:15:55.387000 CVE-2023-39751,0,0,d7677b0d420a68b46339a6f8c2586aeb50a54263374e2403daf6db3989e1c3c5,2024-11-21T08:15:55.547000 -CVE-2023-3977,0,0,2df3dfef7720e7a0fb69e68f2c4d258e61dd5a0b89f56f0a187f80400576e426,2024-11-21T08:18:26.543000 +CVE-2023-3977,0,1,84902e819982af0b9f065234a0836a81763e8b0f2e4e907e1bbbe68d767e813b,2025-04-03T12:44:20.660000 CVE-2023-39776,0,0,9b60b215af8c2d67e87c6d5b391a0df3e7a6b70a40e3e4b39dc5a5ea32f92ba1,2024-11-21T08:15:55.693000 CVE-2023-39777,0,0,9dfd7018882af2d3838b8e1f388c9f433b085bd7ce4432cda211f24935c024c7,2024-11-21T08:15:55.840000 CVE-2023-3978,0,0,b7e7bb1677040677e1bec81f12358ded6ce067b6554a2a9c8d6bc2995d761ab4,2024-11-21T08:18:27.680000 @@ -232833,7 +232833,7 @@ CVE-2023-41011,0,0,5e21c1d6737888dd72b98a17bd26ae01d6230d6104b5485afc5abfb39b484 CVE-2023-41012,0,0,612acd5b0ff1a52097e4c43f79804cca44d70f63587b7d734bb90c5d958a145c,2024-11-21T08:20:23.870000 CVE-2023-41013,0,0,72b4b9804956232da397c35cc32ca1703e532b792488c1be8559d117aa77a85e,2024-11-21T08:20:24.033000 CVE-2023-41014,0,0,c165f110b3c0bdbe6db43d9241100f54dfb234f0ef51baa17c2f5aeb135d5434,2025-03-26T21:15:19.003000 -CVE-2023-41015,0,0,9c81daa213188fb41d2221d8ed1fb600bb4e67920983b398cc11ecede252ac34,2024-11-21T08:20:24.363000 +CVE-2023-41015,0,1,e71548afa73108f54cb7f48c1f39123b1b9e2a69d2870db186d3b9b2d3265baa,2025-04-03T13:16:57.370000 CVE-2023-4102,0,0,1000fe31d845b508d35d2add201da8bb4165bf7a0138224284c54de0bf7d4b41,2024-11-21T08:34:23.777000 CVE-2023-41027,0,0,1f9a34c913a562d295baf751bf2d4f560b0bbb0813decf1b693c6f5cf88f0f17,2024-11-21T08:20:24.590000 CVE-2023-41028,0,0,c2a3d9ca3ca19283f8b761324dea72fdc4baf81cd319e6a25fef58d9210e0843,2024-11-21T08:20:24.740000 @@ -233851,7 +233851,7 @@ CVE-2023-42298,0,0,12a46d213e32df690be0aaadda6c8295bef1ce681653af4999fa64c565cfc CVE-2023-42299,0,0,42e6d0e90217ebd6897af35060870a789eeb3f84316d086cdc1d68c50431992c,2024-11-21T08:22:25.097000 CVE-2023-4230,0,0,9534782230cd0029822ce45f05cf5c34e400f785e0d37fc88e451b5d0ffb5aa0,2024-11-21T08:34:40.460000 CVE-2023-42307,0,0,5abc8c2d768d30c304c016e53b5d9a49a6a92df0f5a6c59253e4f2c34e9253ea,2025-03-20T20:15:29.993000 -CVE-2023-42308,0,0,5779b47b0b3c03d47a2d139bd688f9b5b10b3cfcfb042139000d5ced50d75bb1,2024-11-21T08:22:25.383000 +CVE-2023-42308,0,1,2a12991d3729c2c8f53830a690ff7d832270d3599d124626773eac5ec690187c,2025-04-03T13:15:50.117000 CVE-2023-4231,0,0,d8a5cd6afa3860ab1c78883cf8bf20eccd0d6d00cd46736814e11d4097787654,2024-11-21T08:34:40.597000 CVE-2023-42319,0,0,80b696e6d91a3f59e80d731c4538ea95a74347144234efd042f13fab4e1d33a7,2024-11-21T08:22:25.583000 CVE-2023-4232,0,0,12c4623b80e881ce5fc08db42f31a05ff9eb5f9215fac14e098e67ffa5174bc9,2024-11-21T08:34:40.727000 @@ -243235,7 +243235,7 @@ CVE-2023-6953,0,0,e3148f54ace7102cc1d1855a57ee7588a45b42a9470f40348979b8e5a6fa72 CVE-2023-6954,0,0,87eec9d8a7d1d4f7a21fe0bbd97c710f1708d0f75d7960a297d83c4cc61eb89c,2025-03-21T19:16:22.783000 CVE-2023-6955,0,0,b511e736eb1492e80ab280a40a08f55d678952ba2370b7bb1d7689f096e2ea91,2024-11-21T08:44:54.833000 CVE-2023-6956,0,0,5a2b668004fecf802df77f05304bc63d47f9be8a32adf14edea244199bcfda67,2024-11-21T08:44:54.980000 -CVE-2023-6957,0,0,ae6e32578d5d74ff3fcf0c3bd27b964f39c4fb55015f001a374a6328ffc6420f,2024-11-21T08:44:55.140000 +CVE-2023-6957,0,1,4a70d2b280d76593aa90398c3d69d29cb542f233091e840880d30ab46e9c851b,2025-04-03T13:14:07.387000 CVE-2023-6958,0,0,8eff2e5006ddc42d34f29662a93cea1b72db9351fc15f0bfc55007f882f03985,2024-11-21T08:44:55.267000 CVE-2023-6959,0,0,8ec838b66e35b19352010350b88da588492a0c4f4f1036ef3700c0fbdd552184,2024-11-25T16:47:33.943000 CVE-2023-6960,0,0,b6026c981573a00251f1c36bc13ef75af794522e5812fd8eff4aa7e26dc6a2ca,2024-11-21T08:44:55.563000 @@ -245012,7 +245012,7 @@ CVE-2024-10555,0,0,c0c41d706222adae224343df415ec56327197387e8b3f526c30bed44f7659 CVE-2024-10556,0,0,04893ef6555133c7fb4a065ad7ee40a556bb83716f5e6bb1e4354bd00fe9ad00,2024-11-01T20:51:35.617000 CVE-2024-10557,0,0,b747d74cc2db5316ba1b28eca3b4e6b47e90682d5ab526a26512f546950fed33,2024-11-01T20:48:56.980000 CVE-2024-10558,0,0,ad1847fc477a2fe4318758523abf754a4468336577af91283111954adc8d0880,2025-03-24T18:15:18.403000 -CVE-2024-10559,0,1,3df68a401f94f372cc0644e814846c232e3d36534e5337d5a3ca74316065d1f2,2025-04-03T11:15:40.150000 +CVE-2024-10559,0,0,3df68a401f94f372cc0644e814846c232e3d36534e5337d5a3ca74316065d1f2,2025-04-03T11:15:40.150000 CVE-2024-1056,0,0,af182e17efd4af1cb9d6458d1d7d67974a36b702d2e517ba61380bf6c671d68a,2024-09-19T22:06:32.340000 CVE-2024-10560,0,0,baa29b68417cfab9a4bad63d972ceb0224f02d44c50dea8783c63bde7503531d,2025-03-27T16:45:46.410000 CVE-2024-10561,0,0,8bc2c05db76aa376d335351430f1359bc8af3088a8d507bfe4a1e2db13ccce63,2024-11-01T20:42:12.303000 @@ -246151,16 +246151,16 @@ CVE-2024-11689,0,0,083793777007e12786b393e59e70bbd36f5df589b4b26e2949eb5844a08ab CVE-2024-1169,0,0,d0e835c06bb4865716246ae011c1a97825e74d4108a8baf2dfaf39013a222917,2025-01-21T16:59:48.077000 CVE-2024-11690,0,0,36f949c7291ee937d7c462de6404610bf5fd12a14d132776feceaec4091ad912,2025-01-07T05:15:13.677000 CVE-2024-11691,0,0,36fe8b3d1feccd057ef27ddd17979a52004da0a9606d16fdfdb44bd6d5656bc4,2025-01-06T18:15:18.373000 -CVE-2024-11692,0,0,9269d1047de5ccf3bbe848f7300e55c4147a58cfd139cb6b7f723bc7b81e3d4c,2024-11-27T16:15:12.530000 -CVE-2024-11693,0,0,e0fdce984dc3054eba0934c78141d5d7d4f14af64b3544f5156b2322b39ad19d,2024-11-27T16:15:12.753000 +CVE-2024-11692,0,1,3906d1fbe7a6981a0b83ce49778d3f38ae961e2d2e47c611f2b61bdfcd6bf36e,2025-04-03T13:31:37.263000 +CVE-2024-11693,0,1,ba215220ac22b912f1f5dfd77add067325c5481e7e38821cacb852c1efbad49a,2025-04-03T13:31:28.403000 CVE-2024-11694,0,0,356c3325ca9c4e874474b3cd33360d575197817877416f4f7f19070e37ade8d9,2024-12-13T17:15:05.960000 -CVE-2024-11695,0,0,35b54f717d0be96208c34eb47c6fef69d2a93cd17f38ac12074dc88482ecc415,2024-11-27T17:15:09.867000 +CVE-2024-11695,0,1,603e31fcb1c24b86bcc7c77f0355575d9d3afd45a4ac5b702f5f4ae2f1537ce0,2025-04-03T13:31:44.460000 CVE-2024-11696,0,0,6fcfecbe72d27221f13c4de456321c16ca5bff79e421c45b458ad11293158d8f,2024-12-02T18:15:08.253000 -CVE-2024-11697,0,0,031d7df0dfb1ff2b19cbd36a900d70b7e44f6b02ba77063a3d6968aa272edc04,2024-11-27T16:15:12.927000 +CVE-2024-11697,0,1,9a3dbb49ba127252d40a8c24c532d14d61e409758d6cceef1386beae5c8436fc,2025-04-03T13:31:49.997000 CVE-2024-11698,0,0,177bfd9d19615200c8e5399dceeed9e4f2df493f7a5fb371c3b3bff8ef5f7d90,2024-11-27T16:15:13.130000 -CVE-2024-11699,0,0,2255ca84fcfd2424cade9ded6acbfc13cc6912c47cc2835dfbfa673a8ddf4164,2024-11-27T15:15:24.600000 +CVE-2024-11699,0,1,960307a2527490f1e604846ae0147273dc503f0996409a0d2dbd0756e25b75a8,2025-04-03T13:31:55.513000 CVE-2024-1170,0,0,23da02961ee2e8cf225b35104ccb43e539fbf93446d052ae9645caf24d980dd5,2025-01-21T16:58:56.397000 -CVE-2024-11700,0,0,bc2be5af2b84b6516d161a848a53862ea2fabd715864fcabb126a0f4a490319e,2024-12-02T15:15:10.557000 +CVE-2024-11700,0,1,4ac05c714affba1de0567334034c6733d4fbd8855bca94dcfca8d8ce429594f4,2025-04-03T13:32:01.157000 CVE-2024-11701,0,0,c825848705d456c74824a186f3a702976bbd1db3104a2cd1c202a595c80d93b4,2024-11-27T16:15:13.470000 CVE-2024-11702,0,0,e280c66930279c933ba67473303c53b6d6772276abccd746d35e492c09179838,2024-11-27T16:15:13.660000 CVE-2024-11703,0,0,066d1bf191b3c715a9f0e76133a16cb73e57cb6df71926665b900ef9b350c267,2024-12-04T15:15:09.437000 @@ -247398,25 +247398,25 @@ CVE-2024-1296,0,0,bc7ff5b77e78e698d15576309eb7ce4c3d0e54ba3e687f3aa36d053363066c CVE-2024-12960,0,0,21e253544ce10be5a1e2ec6818aa6cbe498e0edc1ae4e89d7640bf0c4f8d219b,2025-02-28T23:14:17.290000 CVE-2024-12961,0,0,258d4ef8fb961ccafed75d69f1fc7307c7a8816df190c0ac8d84ac77fd69b53e,2024-12-26T19:15:07.563000 CVE-2024-12962,0,0,4380fe386ab6593003338fc07db5ce6bccf435d15cc000d0075a74562f4a4b02,2025-02-18T18:51:27.840000 -CVE-2024-12963,0,0,e33340ae48cca34a3a51f7ff8758eca8ef5cad6b9af2189fa862511636728578,2024-12-27T17:15:07.317000 +CVE-2024-12963,0,1,365b38dfb2138c20c56515af98bb65de5279d5316367e7321482d4b1320b3003,2025-04-03T13:35:16.403000 CVE-2024-12964,0,0,dbdd090c5fd59ecffdfe4261b10d51097e2896ede42db594112c42c0d0e62538,2024-12-27T17:15:07.477000 CVE-2024-12965,0,0,da8c6ab28cc2b34137be07155a862e7bf1f082dc2ba9f4a6760e921794d4930d,2024-12-27T17:15:07.593000 -CVE-2024-12966,0,0,c2b788294439f0bd0f3bb8909eb1d3a1c2116e47ff310cc9b143408ca5228aef,2024-12-27T17:15:07.733000 -CVE-2024-12967,0,0,5895d3ef9d4ecd62d5689ac4ca7745f936872ccc81d8e05395b0655899467c3b,2024-12-30T15:15:08.143000 -CVE-2024-12968,0,0,352f3215ed40719a7a3c8fe635fe1584f3733d062304c5ff3d490633f369371a,2024-12-27T17:15:07.867000 +CVE-2024-12966,0,1,02ae5806502ede0f1c25011ff26333d563ecd74237dd0ee3a6a4d4ecc82eb92d,2025-04-03T13:29:35.940000 +CVE-2024-12967,0,1,4bd9bef3b5873571b98c18cbcad95c48c85d49db2323d06157e09be11af31d53,2025-04-03T13:26:49.747000 +CVE-2024-12968,0,1,7af498e2c861e3a14adbc7117c3c881564ff7353c7ac8e674d0983bb98941501,2025-04-03T13:21:37.250000 CVE-2024-12969,0,0,1f11b9374a66d1fb16358186560d12b2caedd2691b31d066e1c4e0c7097ca3c7,2025-03-28T16:59:21.010000 CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000 CVE-2024-12970,0,0,268b1d4c941e5f6dcc50831164f6567c6c310551116a8aea4012d7694acc0deb,2025-01-06T12:15:06.573000 CVE-2024-12971,0,0,c2c5c3fe38e87deb07976a7e25dd1dc1fe90714181112bc7a4543d9c7913a870,2025-03-17T10:15:14.797000 CVE-2024-12975,0,0,d2fcfd8a6ee09a057f1e63cdb3bd18d308081cd2bf8b6a1de24fe3b24c862cd2,2025-03-07T17:15:18.263000 CVE-2024-12976,0,0,d338d7730077b4e2e2cb08ffc6b8698552ff9ed3642a985c41ffc4b5f2d8ab94,2025-03-28T16:46:04.210000 -CVE-2024-12977,0,0,a3d393b71af82518afafbd1c679660f25331ee3d2ea0704ebcda5ffbe8610a8d,2024-12-27T19:15:08.130000 +CVE-2024-12977,0,1,f2784cf886f1a9a98412bd301827cb607acf57019e9dd06bd3f9bdd5f99fac22,2025-04-03T13:19:13.477000 CVE-2024-12978,0,0,a57fc57c39e39b3e2e9f07ed3579b2b4266af54eccd20365f8ad7c22021fa3fc,2025-02-18T18:51:08.940000 CVE-2024-12979,0,0,ae24db0e4f2a66f4e1de36af93143ab82962ea0c4d3e66e74916a1e08a75a73b,2025-02-18T18:50:22.963000 CVE-2024-1298,0,0,0071f245b4c3dcfe4cd2c1a3c0fb04eecaf156fffcc1dcce4f925fa8cede47e4,2025-03-07T01:15:11.353000 CVE-2024-12980,0,0,6000ffa079d16649502ca9127ef4a551b968e4d7369085deb6f16c832355001b,2025-02-18T18:49:54.517000 CVE-2024-12981,0,0,ffddc97766707b80fc85f7b3ff8a42f8a8881f710bf091525d28a760073377ad,2025-03-05T18:42:42.580000 -CVE-2024-12982,0,0,e7fb56a3ab6559658c6d7a80dd35f9732df0dd37c08bc66d7cc5ed7d2da0d409,2024-12-27T16:15:23.540000 +CVE-2024-12982,0,1,e8cb868610682664b6b702b2439c73c7fc817faa0eeebcc6bc4ba9a0a0e46c24,2025-04-03T13:08:37.513000 CVE-2024-12983,0,0,272d21ff0bd7ad31920b0f5a1f365cd5611020b94feab759e6e545e22128323a,2025-03-28T17:04:21.773000 CVE-2024-12984,0,0,2f1f6d47358f5bf062b046e597be4abadb2d2163986aa69703e28be2bc64f2f0,2024-12-27T15:15:11.957000 CVE-2024-12985,0,0,d4a76a2362f1758d86bddad7f928601739b4725522b1084e160f0600dff7746c,2024-12-27T16:15:23.807000 @@ -247437,7 +247437,7 @@ CVE-2024-12998,0,0,31357e01f1191e07d00a50dece0d163a584f695bf3ba10fd476b75d9277ae CVE-2024-12999,0,0,cef46f50781baf217473f51d55cd419e9cb6a34f142f75461329fcd7fecc83f9,2025-02-18T19:03:01.740000 CVE-2024-1300,0,0,cd5e94fcfe97597e01cd14e77d002316d1f6043211ecf00bfd2ed45a32b95c9e,2024-11-25T03:15:10.053000 CVE-2024-13000,0,0,bc161add052684ff88735e2b18fbd0186cf4b5d7e82bd795e40644a35f7cfe8c,2025-02-18T19:02:13.137000 -CVE-2024-13001,0,0,010f40b62ec28cea03ab6bff561e40d6190a637e7819f3ec9b21dc829c096774,2024-12-31T18:15:25.487000 +CVE-2024-13001,0,1,e6dcab3a6ec0085a27cb2844da6ba288f835eca90218958dd587871b99e9809a,2025-04-03T12:35:17.997000 CVE-2024-13002,0,0,73f802eb9f8b9e1d720b28d5d5fec7836df95b40b314e093b6ac0ef85aa4689b,2024-12-31T17:15:07.460000 CVE-2024-13003,0,0,8ea4a997164608756dd4ca16f93d14ecebb42d80183088df88f6df822d4c84d1,2024-12-31T17:15:07.870000 CVE-2024-13004,0,0,d9296ebcaec17706ed90f78b84cadbb2b745cc88e840577bd0fd14881b6dd0cc,2025-03-03T16:10:56.670000 @@ -248439,7 +248439,7 @@ CVE-2024-1485,0,0,a1102d636093aae5526e62d4563fc2a331d4ec97c0bcd4b7a9835d6f29d544 CVE-2024-1486,0,0,94a421c2203bd3bbfc3e3f87675332dfca46e0ee2e1454f84651bf7b647d4382,2024-11-21T08:50:41.247000 CVE-2024-1487,0,0,aebdd5f3f1083df308828b055ff6cb7e14b71d622cdcc0aee79f8a72bcf90984,2025-04-01T15:44:13.063000 CVE-2024-1488,0,0,87b67663f673aa06e31f51e3daf989abdb6c485653633f988a8d4b2028a2524e,2025-01-30T22:15:09.037000 -CVE-2024-1489,0,0,b9bf7b72ef3e483ed2375af9b7d91bd5be4152eeeeec860ec026e04a08044a20,2024-11-21T08:50:41.657000 +CVE-2024-1489,0,1,9abfdee93e5295c3172f9f07a55698703bc777f666e4cafe6273a737c79fcb62,2025-04-03T13:13:02.067000 CVE-2024-1491,0,0,d70967d622773fff19c9093c078311d0c0317938407098534f36b503281d0d6b,2024-11-21T08:50:41.773000 CVE-2024-1492,0,0,05895c37c815f6c11820fd0c8c555e7a68233c1283a69a827b947259a78ef8d7,2025-03-05T15:57:17.980000 CVE-2024-1493,0,0,951758bed46ad6e985cb8d3e1e537f9ab8062a6daa78beef2a278abf219edefe,2024-11-21T08:50:42.043000 @@ -248571,9 +248571,9 @@ CVE-2024-1636,0,0,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba65 CVE-2024-1637,0,0,b7437c704fbfb1b3fca1af15d0ef06f6ecbdc8f18471c8100476373d9e2e55cd,2024-11-21T08:50:58.600000 CVE-2024-1638,0,0,3645fc3fd5a53c71cfa58f98ad075d1348bbc5dcf758960e5203009589cfd13a,2025-01-17T16:26:03.767000 CVE-2024-1639,0,0,de447f38a3507556188a654289532a72df4270ff11bdecd8ce53d967434870bc,2024-11-21T08:50:58.857000 -CVE-2024-1640,0,0,8f5449084cf690be4b2753bc059c6d84cd5f059e2c7c4578fafada6072a2d936,2024-11-21T08:50:59.030000 +CVE-2024-1640,0,1,fb4fdf314d7814cb633ba1828f5f20820152a009524ecff40bc85689d7d55e5a,2025-04-03T13:12:35.300000 CVE-2024-1641,0,0,b0df7adf6fe0b4743c932c7cebd3b80c6d328f692d983d1d9ad69f21762a38a0,2024-11-21T08:50:59.157000 -CVE-2024-1642,0,0,fd6547e49025098ea70d446e35e22648f4690ae4cea30a365ba5873a94086963,2024-11-21T08:50:59.280000 +CVE-2024-1642,0,1,5c60770c56776d98db3cb0c4200736ac332b1e4e39243af2306279f1b640019d,2025-04-03T13:11:53.950000 CVE-2024-1643,0,0,23a51e500cbbb14eb0edb6213fdbe45992476107d29301a7ac00c541a3990120,2024-11-21T08:50:59.403000 CVE-2024-1644,0,0,2a0c9bedb7077c42744b0cff4622252c578909ba72cfa38faa02c26586371ff9,2024-12-31T14:30:42.993000 CVE-2024-1645,0,0,03699ee0a8ad7836aa080c25f42b206191e3cf9bd749532c452b30589acf9403,2025-01-21T21:12:54.303000 @@ -248699,7 +248699,7 @@ CVE-2024-1768,0,0,084ea6e85b6e0db23c5de56c4e455942100ac7c25c4612406b0ed1fa01484f CVE-2024-1769,0,0,ff77fc668bdbec6d05987f2f81bab9ea4e80c812689056057cde0b607f3fa566,2024-12-23T17:21:56.777000 CVE-2024-1770,0,0,be7f84c853421e443cf5ae22747f87bd5c1fa8ecada9be24081bdcc6cc4bfe2f,2024-11-21T08:51:16.457000 CVE-2024-1771,0,0,3ea2f5226776062012b591b88fae846979789fdefd15944d103f97583a853f0a,2025-03-11T16:42:28.580000 -CVE-2024-1772,0,0,5cc0a94c06d2dda361e259f0ad9b98151fe114de7cd39cf21e360d7a958f4b03,2024-11-21T08:51:16.703000 +CVE-2024-1772,0,1,f71a0cdf01c8b7d4b3375fc88c817160eec9180b1dd7dfc323f2b999fb6470f2,2025-04-03T13:11:01.240000 CVE-2024-1773,0,0,8c65223f5516c06a2296cf03b178bcc4f946b8107a149044c776ecc9d166fc1e,2025-02-07T19:25:53.603000 CVE-2024-1774,0,0,efbf233830d48bc327722f1b9ca6dd8e89c31b3681155704940a2eada3524c1a,2024-11-21T08:51:16.943000 CVE-2024-1775,0,0,b8c203919e47126bb6c2af66dc4bbb6f7b785958b0e56ffc05a0a4a6fa9fb683,2025-01-16T18:39:46.423000 @@ -248766,7 +248766,7 @@ CVE-2024-1839,0,0,f0da7bf185d38fd773c850a3daf150e18d5d5ae2a4b2d076062d74bab85b97 CVE-2024-1840,0,0,2e6d7672faccf941673a79a75aacce54ff693ecbc0604990f24bf8316ac34cbb,2024-11-21T08:51:25.860000 CVE-2024-1841,0,0,43b70891ba463678ded40c1ad4a5e726dafb046b65a65b59e71173a224d57da8,2024-11-21T08:51:25.987000 CVE-2024-1842,0,0,0d335cbd14c341d4744c39c691d44bcb46948e790aa4b1e294e30df857d55f88,2024-11-21T08:51:26.113000 -CVE-2024-1843,0,0,b47d561aac125a3f407d3710fe746cc535f4dbf4777a90002b9e88eb72fe78fd,2024-11-21T08:51:26.237000 +CVE-2024-1843,0,1,a76e034da396f7505219e1d278db49bc33e2902c245c09bc0784a0a5ee44b1fa,2025-04-03T12:57:43.613000 CVE-2024-1844,0,0,63d73d8c0dc981d90a8a5642e9bafd84801f8e29cef61b3806812a30d28ff6cd,2024-11-21T08:51:26.370000 CVE-2024-1845,0,0,5ad32a93a39ee3c1ad04088537a909b22750fc076779f4791b0dda34383f6d29,2024-11-21T08:51:26.497000 CVE-2024-1846,0,0,9ccd95edd5e452dd2dbc4f35f1db593ca186fc01930678a694837dcbc91417e5,2025-03-14T02:15:12.983000 @@ -248785,7 +248785,7 @@ CVE-2024-1858,0,0,37ac7b6ae641e6c33c9b784bc122314ccc3244d9e54ac1ed1c1eb9ce927225 CVE-2024-1859,0,0,e7db7892a4f780b00fb0507670060b52139c586af22e7717d3596c7a15aa34cd,2025-03-12T13:27:42.447000 CVE-2024-1860,0,0,7b0deacacf99aa7d7474e0c0210eb7e74b9ed21346c23f5f4d960600eb719893,2025-02-11T20:12:01.223000 CVE-2024-1861,0,0,f9221b8803668f3156a3a924885cb5cdf3c8e16f88144b04409bfc4ff609bbf7,2025-01-27T17:45:40.267000 -CVE-2024-1862,0,0,b275c41e62be94042e0bd078b16883cc8b1a587994ec6e8f07d20a5726a629fa,2024-11-21T08:51:28.833000 +CVE-2024-1862,0,1,cb9ee2fcfc8d84b01af5e352d49f1a6baa87e4128a7e325a892a2eb25c84c5c3,2025-04-03T12:56:32.720000 CVE-2024-1863,0,0,2458870e577036f8a527ffe6fedc1f5705014e9e40ac75930eea1e073fcc83fa,2024-11-21T08:51:28.963000 CVE-2024-1864,0,0,7540eb10c79c4178ff1d3d38ada50b4803bad985e5def6b198e727bc83e258b4,2024-02-27T22:15:14.807000 CVE-2024-1865,0,0,f956c1fb13f7d8ccb79f0523d8afbbb427264aa98fd91d26d435a4ac5b2b57df,2024-02-27T22:15:14.847000 @@ -250064,7 +250064,7 @@ CVE-2024-21285,0,0,a1ec9f288fb5f18291b7e0762fb19e3f3a36ad8582b697d5efe457fe2d2e3 CVE-2024-21286,0,0,23f960553de8d34e69d2eac1c509849233da3d5190d5796e4c6dbf827df8e2a2,2024-10-21T16:16:31.867000 CVE-2024-21287,0,0,3fa403c22f24e1ef1d9572ad7971727eefad394ffd6de14f7fc63427216eda73,2024-11-29T15:26:04.440000 CVE-2024-2129,0,0,535bba87193f9024b8b920d00dbd96c68441ad6cf1fabc72f39261f36d50dc4c,2025-02-27T17:55:58.107000 -CVE-2024-2130,0,0,ca2592d609e877772edf0e2bf7ab0e095ba017c77b31393db5c27e4394467864,2024-11-21T09:09:05.613000 +CVE-2024-2130,0,1,1acea7d83b419b97d59e9a1594184489d93edf39c2d2a457c387d6ee5a06d88a,2025-04-03T13:16:35.503000 CVE-2024-21302,0,0,99170d4461509b4476f68009296eec1eecf35f205102a78f57ed67fe24f3518b,2024-09-18T00:15:03.243000 CVE-2024-21303,0,0,c2b97f22277fd7f2adc61a9f320c0092bc77d5664c2c382fa7ef4bfdcac581c9,2024-11-21T08:54:03.757000 CVE-2024-21304,0,0,607ca2506e8d6e07e5506f7ccdc160849bc37d9535ae11f25cc67878336998fa,2024-11-21T08:54:03.903000 @@ -251186,7 +251186,7 @@ CVE-2024-22543,0,0,1097416a9aee938a3914a26bc3e397270892c4ea698590bde82a463cbb35b CVE-2024-22544,0,0,4f6fd5e88cc8a65cce25ddd3f2183cd37f18c1275b7622c6cb4ac7360be30e5c,2024-11-21T08:56:25.623000 CVE-2024-22545,0,0,320c2d4f74cacf1001909a9e9a1cda8b96d3feac193b88c9dc43e3f914c5640a,2024-11-21T08:56:25.843000 CVE-2024-22546,0,0,be29c28c6404f6f71a65e07123518d4aecb0cb37d40fde4951cc800e0a944e3e,2025-04-01T15:11:17.547000 -CVE-2024-22547,0,0,0133090a54f8606cef07626b9e620f96367b93c79f99ca3bc075b2ce0712def3,2024-11-21T08:56:26.220000 +CVE-2024-22547,0,1,50185b74401353c45761c13ff093e3fabf9462fb2d8944ab8c9616c3856a71e0,2025-04-03T13:18:29.913000 CVE-2024-22548,0,0,3bddf409ca88fc0749d327d45cb0d00ca337c1ce8636699dfaa665651c15c3fd,2024-11-21T08:56:26.440000 CVE-2024-22549,0,0,675ffdd8f168a9762f5a79b4cbe36a992bd2d143f3ddef6a0f310cd9c0117265,2024-11-21T08:56:26.580000 CVE-2024-2255,0,0,c38a1053c701220d5e01bbcf68bc70dfa4b5faf3090ba50a446a2c7b031db66d,2025-01-27T15:26:09.810000 @@ -252299,13 +252299,13 @@ CVE-2024-24062,0,0,d3cdf223be8020055c4207e039bf97e140dcf6cc437e7b4ae7acaaca5d068 CVE-2024-2408,0,0,5e9dcaa4d1adf56975540387f3f60f16e53707aa3a1ec17433f2284f305b09fc,2025-03-21T18:15:32.457000 CVE-2024-2409,0,0,77d5c2883cdd5dbd6edc65df7d11494763b07409c810ab6debf5b40e86f36c09,2025-02-13T17:00:33.790000 CVE-2024-24091,0,0,ab544d8586eff97d50440c6aee00588f4dadfd440f573585f5d79c9b1b92e18e,2024-11-21T08:58:53.610000 -CVE-2024-24092,0,0,42612e9d4b67369b95e4f784bad7b4f3ce9b376ecaf3980484ef440bfbfb510d,2024-11-21T08:58:53.847000 -CVE-2024-24093,0,0,d01cfd200da021b3379ec9bea10950f044fa309e1e43c1c0570f4c10f2933dc4,2024-11-21T08:58:54.060000 -CVE-2024-24095,0,0,bcbbfb2f8b45c42623b1b88bc5c9a5b6c9ff6d2b0f2f0be85fd281aea27ca850,2024-11-21T08:58:54.267000 -CVE-2024-24096,0,0,71694b1fd291a79317d4582ff5cf8e4b2a3d9771e0a95aafc09460732ce3267a,2024-11-21T08:58:54.470000 -CVE-2024-24097,0,0,401527f02a7343f3bdbcf297a1060f82ed7e18ba10784960e883fda54d9ff3e2,2024-11-21T08:58:54.670000 +CVE-2024-24092,0,1,ed5d677a03a8bc9c64339fafc471f56d9e43d64a5132494ec50324a05fd16467,2025-04-03T13:15:37.767000 +CVE-2024-24093,0,1,bc39013ad580afcfd317f22fab60e346d077ab506e4fb05a517dff433b8684f1,2025-04-03T13:15:28.003000 +CVE-2024-24095,0,1,ab5e716f2ec3fefc486a459c41fa19edf506360e40d3bf09610fde50edb40f7b,2025-04-03T13:17:25.350000 +CVE-2024-24096,0,1,59600dbbb0830968f8e7f55f2c79e3c1c007d14d5fd78b7692cb3a5f7dc1f68f,2025-04-03T13:17:13.943000 +CVE-2024-24097,0,1,f70074944cf3cff1096084ff14b000eb5520d6b60888cc28913273272d54fb77,2025-04-03T13:15:11.240000 CVE-2024-24098,0,0,8e13363e4e09e1493a5d55427f95804d39c8799860c1a5cf7a571b32d79dd472,2025-01-21T15:07:45.900000 -CVE-2024-24099,0,0,4b668ecaad05d276a2b0054855eb68c0aef970c2685ad8df476e53deb1482b76,2024-11-21T08:58:55.073000 +CVE-2024-24099,0,1,93ca64336836c6b554fb68521d9e99be3650246c053413fd7aee4928ce8fc0ed,2025-04-03T13:17:06.300000 CVE-2024-2410,0,0,3be5ca8a66a5bd9557281be3e70bc0a40d70cbb2d20f1abc90621dbc68baf023,2024-11-21T09:09:41.717000 CVE-2024-24100,0,0,34264a072f2004b323a7d058a42a90facb09cc54d00a117671a0894f9e48f909,2025-03-25T16:15:18.483000 CVE-2024-24101,0,0,8c8c5d78f74164f6c55dbd2d7ee4be4970b1a59ee1d4279b7a0532aeb6a8d129,2025-03-13T17:15:28.980000 @@ -253136,14 +253136,14 @@ CVE-2024-25359,0,0,a336a7bea75b7e6c501988a4997083c1321152adb9115b9ab0d654839ea54 CVE-2024-2536,0,0,34714028d3070baf2ff1ad4c72d71c418ed304ce870351669a86ec15b5067ff5,2024-11-21T09:09:57.987000 CVE-2024-25360,0,0,e089036b5b01d137197b9a6e98d6b65bdfd97c49cd47a370e756821b6a4c19fd,2024-11-21T09:00:40.877000 CVE-2024-25366,0,0,81f42def24e0dad489549c5b3d854c716158eda254125d88487ea07e4ab06493,2025-04-02T20:20:16.947000 -CVE-2024-25369,0,0,1a5279686e5277f0474570d04c1907565b1c826db6e265d9d5232bbf5aaaad58,2024-11-21T09:00:41.330000 +CVE-2024-25369,0,1,199e91821040b959a8636a637f70d73f22b245bcd46feb60a55c81c82e65b0dc,2025-04-03T13:17:55.910000 CVE-2024-2537,0,0,505a879a53be885f8bbcd33c6681a0944f521d79da27aff348d7719baef47230,2024-11-21T09:09:58.103000 CVE-2024-25371,0,0,02370958f1fcb5a2b09fff3d567983d7c7d1e4ab210b6dca6193d9dd108edb58,2025-01-14T15:15:14.490000 CVE-2024-25373,0,0,7b7b80a8cb77575152c9f7edc570948e009ae5d3022e274086c434c646019061,2025-03-17T14:21:00.250000 CVE-2024-25376,0,0,b66e11cfe673f41884597e344a827fbb7b61ee47c6a56b5a6c4b95f40fe2899b,2025-03-13T21:15:38.583000 CVE-2024-2538,0,0,b85aea9765c05329fd4e9b8025754899d55685165e7227e89329268047059847,2025-02-05T18:15:22.620000 CVE-2024-25381,0,0,41718fab1364a06f6dcb130d239d6764dc030d3199b449114ae1d63e5d3a6ef8,2024-11-21T09:00:42 -CVE-2024-25385,0,0,59ac22d49f2fad863547dec5a90c0c7a9b9f0475e0a1175434939147054bace5,2024-11-21T09:00:42.210000 +CVE-2024-25385,0,1,f1a96c945aaf7d235f7f153d73e89ab654975b82cac4b45a28593868f6530629,2025-04-03T13:18:18.087000 CVE-2024-25386,0,0,56406e6fb98d0483e199e75526abcdd166cb1bbc8af5cb6a4a3846bb8e4462df,2024-11-21T09:00:42.437000 CVE-2024-25388,0,0,d6e57a4ae8cf2758cb02e2bff996a06728f2a007c0c76d23c807db1db9644ae1,2024-11-21T09:00:42.660000 CVE-2024-25389,0,0,c2b0698b0bd4f31a02466ca55b61acffcf8581a14c7d0397412e907bbbf1dd53,2024-11-21T09:00:42.890000 @@ -253431,7 +253431,7 @@ CVE-2024-2581,0,0,524e7162ba8902ffd159f0321288102d68de4ec5f9b57785f939855fe68915 CVE-2024-25811,0,0,5bc7e32c6557d5f422fcc385a2dd3185eccb3c42436a0ef942c3353dead89142,2024-11-21T09:01:22.550000 CVE-2024-25817,0,0,24fb9fa88c35098258f5c3f08547ebdab9fa05429aca7f1384875ff62d1c8191,2025-01-15T16:49:06.050000 CVE-2024-25825,0,0,0ffb769a5b15104308a542a8126cf407f088d0f85637998c3ea573ab17a15826,2024-10-11T21:36:24.583000 -CVE-2024-25828,0,0,7704101df7974df2553e5c114fc3996ab2b2d0f7ce43c80fca5b36cf4a93a54d,2024-11-21T09:01:23.217000 +CVE-2024-25828,0,1,6c0bb5940de5e96f5ca16393f1d0a516655bbac4099e03e4a759fc54dedd226e,2025-04-03T13:18:40.520000 CVE-2024-2583,0,0,a2a2389968f4a8b3c048254b843037350c90c5fb2732f8795c088c446c672bdb,2024-11-21T09:10:03.747000 CVE-2024-25830,0,0,48f111b9df759d41453a93b4045c2ff567a72cf519523820b0bdb3651b1197ce,2024-11-21T09:01:23.427000 CVE-2024-25831,0,0,bd8cc628942f0cfec3cd605617d2c1225f2d77c4bfbb5c43b8cabd63ea5984ac,2025-01-16T17:50:46.660000 @@ -253451,8 +253451,8 @@ CVE-2024-25847,0,0,f8cb76c7e5cff1c422ae5c1e74e8d8e012e5cb4d2465db8ddbfb94b841426 CVE-2024-25848,0,0,da8ab744f7e053f2d4b25a6add8955f2ba29a6a3c30f16fce58f174bb4752a74,2024-11-21T09:01:26.427000 CVE-2024-25849,0,0,098caf13d6f2d164bbafe70249d20ff79f96a6616cdc1821d31a83f282c60e57,2024-11-21T09:01:26.647000 CVE-2024-2585,0,0,50144b1d3dd97c13f96cca4907fda85fa00ce60c94d731acf778acedd7f8e173,2025-03-24T13:26:33.507000 -CVE-2024-25850,0,0,4673176ecee34dcc78af9600d014f3dd902b7b63e9c85bc9670c420773e42318,2024-11-21T09:01:26.870000 -CVE-2024-25851,0,0,92477e80faa4859fa2111695793059bae73f5a11f7ff8ed9bd0450f255996b8c,2024-11-21T09:01:27.100000 +CVE-2024-25850,0,1,55179944fddc433c0323293658753090900ae504a85ed3315876dc507f4364e9,2025-04-03T13:18:56.597000 +CVE-2024-25851,0,1,1b5997130a1972ee6380cdffd7d0b86375452f194e58ed3021fd3f9770919e9a,2025-04-03T13:18:49.410000 CVE-2024-25852,0,0,5168a334b2b38e4578bd25dcc0cf32bd39c16c5efd9deeb1d0d54f814df180b1,2024-11-21T09:01:27.317000 CVE-2024-25854,0,0,686a7b03cad9de1c1d99d567cba7c4b572b04e11530dbfbd0ce774f89ebdc2cd,2024-11-21T09:01:27.533000 CVE-2024-25858,0,0,685d86bdc0e60e67aba92b13f4ecb066f0797838f800c9dddc63ef3418739afc,2025-03-29T00:15:19.037000 @@ -255579,7 +255579,7 @@ CVE-2024-28327,0,0,1360bb692019a7ed2321e173175aa263e8cbe1c8a295b26b0cc70a6baaa74 CVE-2024-28328,0,0,3d9a6b8d42a538362e64f311f5c93eb07142a313db6510d418a4b48150139e7c,2024-11-21T09:06:12.097000 CVE-2024-2833,0,0,24c794fc062187c195b61585378db81ce72b907ae2c6d0ccdaca7950f265bab9,2025-02-28T15:02:35.613000 CVE-2024-28335,0,0,60d3d10b79578b4cd9269c182f8b37ca951c370202f357335490f83d72157c3d,2024-11-21T09:06:12.310000 -CVE-2024-28338,0,0,5c66cb73174a9deb522e0710bd16de161594f5caed8544d91f8b5fbf8bb68edf,2024-11-21T09:06:12.560000 +CVE-2024-28338,0,1,d4db5d5a64699d8f88ceffe20bf376b6875d0ba97d5e93e524247417cbfc9093,2025-04-03T13:16:47.727000 CVE-2024-28339,0,0,c9f61e2c36b8ab7431a0bb4b150faa587c65bcb546a5c5f13ef23c8626c1f66e,2024-11-21T09:06:12.807000 CVE-2024-2834,0,0,5e673f0f8ca1894537efcf9c404cf06d9d577967fe0e55ffc862b3287efa9cf0,2024-11-21T09:10:38.290000 CVE-2024-28340,0,0,ab757fd37b499a59b5b33e461ec8dfd619c3870a8016c48e76c7ddcf712e3211,2024-11-21T09:06:13.060000 @@ -274718,7 +274718,7 @@ CVE-2024-53864,0,0,46480891b92af97a49124f9e133f8c81cb60ee64ac9d0e0b1d5411b8f3219 CVE-2024-53865,0,0,a18046e71c3fb51aa2c81b35eb6a164fa64a64b921f1fbdce471657bafca3131,2024-11-29T19:15:09.710000 CVE-2024-53866,0,0,7c26df18b8eefa13ad0ad0c6ecd46053a064a42903d2aa3ee2848acf96dacab1,2024-12-10T18:15:42.160000 CVE-2024-53867,0,0,72e506c917a884d4217cf064e51169da2e7b7e498f38ccd1a1ee0446ccb5b2b1,2024-12-03T17:15:12.787000 -CVE-2024-53868,0,1,75af96010e1c9a244eaa1898ab6e649a71a34a9b0b57c6a502bf9b8b68c46926,2025-04-03T09:15:15.780000 +CVE-2024-53868,0,0,75af96010e1c9a244eaa1898ab6e649a71a34a9b0b57c6a502bf9b8b68c46926,2025-04-03T09:15:15.780000 CVE-2024-53869,0,0,c1261311436db2434e8425ca6c3b255cdf8ad346c162ecff4729cd3488762e70,2025-01-28T04:15:10.023000 CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000 CVE-2024-53870,0,0,2c7303e4c47509b62c1bd8938d6254e945f1f0fcb6b744c9ceb7775a7bf75591,2025-02-25T21:15:15.943000 @@ -279888,7 +279888,7 @@ CVE-2024-8671,0,0,a99020099b190237ec4ed79dd02fe23a02e4fa3467857b7d700af772ffd6ad CVE-2024-8672,0,0,a15444b342cb51704c6035355a8239e8b1581fa22931a6c667330f1628aeb3b2,2024-11-28T10:15:08.870000 CVE-2024-8674,0,0,346b5859dd79895a03165d24e9b602a990cf40990eacbe9188550aceade5c799,2025-02-11T02:15:36.413000 CVE-2024-8675,0,0,d4603b0787f1359762182dfd0b6464a7217287d096015439ee3a45da5ea12b68,2024-10-04T13:51:25.567000 -CVE-2024-8676,0,1,a929327da233d97e298201804199b5ae1c1f4cc3b39d231f38a34e6c92ff773a,2025-04-03T11:15:40.703000 +CVE-2024-8676,0,0,a929327da233d97e298201804199b5ae1c1f4cc3b39d231f38a34e6c92ff773a,2025-04-03T11:15:40.703000 CVE-2024-8677,0,0,60f0fdd7af95bdac2c0e1884d42dbe76c9ab4cea5844c97ea5bb9aa452948afc,2025-02-11T02:15:36.463000 CVE-2024-8678,0,0,c9f19131bded613da0c19c1444b8e8a8b9cc51fc5c1cf15447ee67809c6ea12c,2024-10-02T19:06:48.983000 CVE-2024-8679,0,0,2b814e408085282aa43a44f419617020b8c9c8c614fcd1f864e869f9853d89cd,2024-12-07T02:15:19.457000 @@ -280563,6 +280563,7 @@ CVE-2024-9412,0,0,62d5f11e883b52ba67a3774578a1602d5fbaa6d2a0b74b0a819413a9087732 CVE-2024-9413,0,0,a06de6835130fe994a1b9f10a16e4d390bb61a1bb02ceb9b43d0f4e1eeae3597,2024-11-27T16:15:15.180000 CVE-2024-9414,0,0,28b4d804de099daf579ab2fd5fec400392baeae39fdd0cb7db100bd296872243,2024-10-18T12:52:33.507000 CVE-2024-9415,0,0,18a62aab61a08220ab2bf7d5e6b24d318cc5d0242714f05d0c224ad5a885e7a6,2025-03-20T10:15:48.580000 +CVE-2024-9416,1,1,cbaed918d37577f1f36dbc66c70b322b9beafdb674e959a418291c003f0bfc34,2025-04-03T13:15:42.530000 CVE-2024-9417,0,0,113738de0274dbe5558b72d78b832ab99955305dfb224c0e5de28be6db863ee3,2025-02-27T19:58:41.700000 CVE-2024-9418,0,0,43435b9836f4f0a05e21cd95871922643b61618d6b88dd45c549527a231e96cc,2025-03-20T10:15:48.703000 CVE-2024-9419,0,0,75c2ffcece6c8d9641e61b7d83db859a8f0c6a3be035496f4eedc8e263459f13,2024-11-01T12:57:03.417000 @@ -281235,8 +281236,8 @@ CVE-2025-0289,0,0,5d53dae19dff83cf1df2c164a36c905782ca321b425abf33116f4ab2cbddc1 CVE-2025-0290,0,0,1b0af77f22124c7fd21050a24684089c59772f145263e66a578112620b4a0b4d,2025-01-28T09:15:09.363000 CVE-2025-0291,0,0,c1c3893d4e09f9e0204fc40192dba70b3c3378a020c5622ef22757e5df4fb545,2025-02-11T15:16:03.447000 CVE-2025-0294,0,0,c9b2fc3087b74017273fe9485890135d0ff2bb52c4c2bc9ab42cdccd09c8f44c,2025-01-07T15:15:12.113000 -CVE-2025-0295,0,0,c0859a572db0cee7a28ca70ff910cba289287ce611e62bb2e96ff203ad311f68,2025-01-07T16:15:39.460000 -CVE-2025-0296,0,0,5e47344ada770570292a516cf6e52136f863d117f80bd0d505db6dd051de6255,2025-01-07T16:15:39.673000 +CVE-2025-0295,0,1,8ef86c549eec2b5ffd9e1320d65baf37ec53485f9073e7f04af13fa0f3c739c3,2025-04-03T13:59:53.160000 +CVE-2025-0296,0,1,c782693853a11898b58d76d23ac8965ff3188ac4567aa39925ee5fcc9d9eb651,2025-04-03T13:52:49.223000 CVE-2025-0297,0,0,9ee4047b5f8004a8f4973594a78ceb0a8f3d79680da16a92421b1d1d06b91da1,2025-01-07T16:15:39.887000 CVE-2025-0298,0,0,39278bc77c75ddbeb9bab1345ccfe48cf3a40429e8e90bf5b79ebf52311817d6,2025-01-07T17:15:31.770000 CVE-2025-0299,0,0,484b5d4368ead50977e1e505f59fbdb78e1558148e431f1a746db5cf1e488d1a,2025-01-07T19:15:34.743000 @@ -281493,7 +281494,7 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000 CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 -CVE-2025-0624,0,1,498c3dd04f7c8817f159ff97f1fdf563db472658390d615fb66cd7173da94c40,2025-04-03T10:15:19.267000 +CVE-2025-0624,0,0,498c3dd04f7c8817f159ff97f1fdf563db472658390d615fb66cd7173da94c40,2025-04-03T10:15:19.267000 CVE-2025-0625,0,0,328c89607f451b43b59c7441ff870515136d8dcd178527014c9e23beca2d6c94,2025-03-28T19:14:20.063000 CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000 CVE-2025-0628,0,0,570695b374c4ed87e2ed44b4722d7e35e02627e97784a5b85708accd345030c2,2025-03-20T10:15:53.407000 @@ -282382,32 +282383,32 @@ CVE-2025-1923,0,0,aa9c030f5e961d239c4345067c1b4a0d550dd67e489ffa0fa0f3ca827b804b CVE-2025-1925,0,0,3e8907474d671021f30053a1ffd66ae023a939cac3cf5a1804936aeffd5df0f0,2025-03-04T14:15:36.717000 CVE-2025-1926,0,0,053259318e8c088e0be087d38c64d0aaa1c161500e55de2a4152c1a78cf9cda4,2025-03-10T05:15:35.347000 CVE-2025-1930,0,0,ad50a296ebcdb4d3733b2b7ba83fcfa00c21ac62aa009da1c2f098278db76ea0,2025-03-05T17:15:13.583000 -CVE-2025-1931,0,0,767846a9649a1a2298527970782a086fe7c0e2bb850fd2984167290340c7c5fc,2025-03-26T20:15:21.467000 +CVE-2025-1931,0,1,af8164fe526ea731987cc7549eea9e98de73d45458537b9e7803f34ece876fe1,2025-04-03T13:29:22.950000 CVE-2025-1932,0,0,06875f8291d41f0669a4d6f88c95d5b79106646ee2db9ae9041af3355bd1baa7,2025-03-28T20:09:58.490000 -CVE-2025-1933,0,0,b19e57d5f4532b3ba1a97a5303c5110e494334af7b67faa33a9c80bbd914ca32,2025-03-25T14:15:27.927000 -CVE-2025-1934,0,0,eb6ef07f6928f3d0efa5e49c3aa1c4028e4f9c77074e9e82ed0087f98cf5d1e1,2025-03-25T15:15:24.463000 -CVE-2025-1935,0,0,c99008e411c894001e3170f96cc853fdabf1a7a770f7d74eedfbe2e4545727c9,2025-03-25T14:15:28.063000 +CVE-2025-1933,0,1,991ae8f8122c11392ee1b899ec3e3f285080e08e18917cab29b52f51259016c6,2025-04-03T13:29:37.270000 +CVE-2025-1934,0,1,99b04b167c1dcea7ed8415de2ce1752cf0a4ce2ee728536a397c8549e89d8b6a,2025-04-03T13:29:50.427000 +CVE-2025-1935,0,1,e21ca1468a5c1eb0a8bfcf1c9d8dd60ecc55b7f06c791b7ba0fbde18881ba3b6,2025-04-03T13:30:01.180000 CVE-2025-1936,0,0,7b2af893b25fc9afdcfa8c7e3b112c92a107e022133f5b760e0e8c89a8e575ed,2025-03-26T17:15:25.527000 -CVE-2025-1937,0,0,3d4cd1fadbe4eb26bdcd91022f6043cf3d83b522e53bf6f97ae78d35e0b68f16,2025-03-12T22:15:34.743000 -CVE-2025-1938,0,0,bb92331e2a34eac4cfd62e355701ce91e26c2aae22a34cf432a769ae3d5a68b9,2025-03-05T00:15:37.097000 -CVE-2025-1939,0,0,ee2f8041ae5dd5d29c4a3eff5f8a5f8959c7782f2e3fa387f3398a3b96ffb358,2025-03-05T19:15:37.870000 -CVE-2025-1940,0,0,059e1e9f81e108e7f46869f7db378bf700a0a9986fe2aefa2c75d333b9394829,2025-03-04T16:15:38.310000 +CVE-2025-1937,0,1,463e0507d3361f120f8d83e271291872cfaf3dcfd842eabe780e6f6cf47f2128,2025-04-03T13:30:07.160000 +CVE-2025-1938,0,1,35afc6c2083dbc762b2825e141ccfce97482e9b0d6acf570ae5665fc4a445f0a,2025-04-03T13:30:13.343000 +CVE-2025-1939,0,1,04ede41fe5050ddd691436ccd2fa93415ba85a4c401660ce4df1c63ad2fa9e26,2025-04-03T13:30:20.860000 +CVE-2025-1940,0,1,7d47e0d8a90cfd82556c37151da2f8c19219903ea56691872684983dea7e0f04,2025-04-03T13:30:26.597000 CVE-2025-1941,0,0,432f99603719bd0b8ef8f554512cd0f42e27ee96abe54ecfba76fd9ee3b22e5a,2025-03-28T20:10:22.923000 CVE-2025-1942,0,0,616b6a24087364cb67646fea3bff166a6d27705194eb4c00ae18fa7d9e5d0111,2025-03-28T20:10:49.257000 -CVE-2025-1943,0,0,b93fb1916d4caca5434b089dc2e05061c26735a9fde5dede236186f75742eeef,2025-03-05T00:15:37.400000 +CVE-2025-1943,0,1,48952c8d8e7e811b936913e1d20a69bc39fcf29efc7aa3f4b9b416b1f1fa2734,2025-04-03T13:30:58.727000 CVE-2025-1944,0,0,2d7e72fceff04ac6d15a92163f4bf039c1fd22696617ec5915b62d6c8555dcdb,2025-03-19T16:11:29.113000 CVE-2025-1945,0,0,e75968144da97cf2313873c290abf618c508b1b9324a1cbe8ce723766acce375,2025-03-19T16:14:37.237000 CVE-2025-1946,0,0,25b5b8ea2ed00f65cfbf2fb57d2f7790b7c60f3c475c46923e654a729da72363,2025-03-04T19:15:37.583000 CVE-2025-1947,0,0,c93c63c6c02c21bf1500c6259ec75111daf7c25f75d402b9c87402b2d8cf463e,2025-03-04T19:15:37.760000 CVE-2025-1949,0,0,a5d6f04ba5dd72f47050611b0d11a784085f9d08ba3d9a07dc23d3d9e20a1224,2025-03-04T20:15:37.410000 -CVE-2025-1952,0,0,a7b872ce9f45cdf2645679299f96eb598eb42d144d4308261e8b75a7a6eba206,2025-03-04T20:15:37.533000 +CVE-2025-1952,0,1,1e4be6d31b5674e84a24da9c85bb523f8394987da3d70e4ae81829d32893dfe6,2025-04-03T13:31:17.857000 CVE-2025-1953,0,0,2c90b159f704d80556f6fbd39c129612beee1a10d98b5c1d8e7852c91636b6e4,2025-03-04T20:15:37.657000 CVE-2025-1954,0,0,c31420522446cbd87e78e89f94bfd090ab61f2c9cdb686294f425c5995d64ad2,2025-03-04T21:15:12.750000 CVE-2025-1955,0,0,79413dad66499c63916d0ee98ac7b6b5481d2fcf29cdcb221ba79aa1c4b98bb0,2025-03-04T21:15:12.940000 -CVE-2025-1956,0,0,64628c4a7f8d879d805a81c410fe3320f13296633848eb5ab0b5273a362f3541,2025-03-05T17:15:13.737000 -CVE-2025-1957,0,0,a4389d62bc91567c21c81bfbfbbf4d66cc84e463e6182fa371f406359d9ce09b,2025-03-05T17:15:13.860000 +CVE-2025-1956,0,1,2bf02b02edbffa09a20d39ab24ac5d77306ff5541b26adcc35d8b80e7c39822d,2025-04-03T13:32:25.373000 +CVE-2025-1957,0,1,4be8a4f3ddc19d5e78a56e54c85b6d0971c6e4633c6689c9190ff1a86425b2b2,2025-04-03T13:32:30.633000 CVE-2025-1958,0,0,bcb1c0f9f921d2945fb3c18ad14ba54e023ee613791e4353242ad75faf6b45e5,2025-03-05T17:15:13.980000 -CVE-2025-1959,0,0,ebf0cc1d67db9330acc307ce4772a9b7f3f925dcaa543ef5c3f660c378fb2f48,2025-04-02T21:15:31.927000 +CVE-2025-1959,0,1,1cc63783343cbc4a7c82d239eecb33b32077da6546f174ec01365a82f0d56e8e,2025-04-03T13:32:36.457000 CVE-2025-1960,0,0,381f23a43636598e3f47e9d259a5c7b38a7841aa1c066388ca8380182afafcbf,2025-03-13T19:15:50.627000 CVE-2025-1961,0,0,09b337a338f184e947ce31dcd19e262e82b501bb84605d5f35f40e54f625ff8d,2025-03-05T17:15:14.220000 CVE-2025-1962,0,0,594bfe8627e5ac63596312e0e11cc2510a0bd61244dd64dfdf7f8de06c5a23b8,2025-04-02T18:24:43.310000 @@ -282415,7 +282416,7 @@ CVE-2025-1963,0,0,908db7c1cde98e320d1a787c648b3ed076eac178762f12c58f5af8ffaf0940 CVE-2025-1964,0,0,f3200eed952b3d7931f5b0fd0f11005bcbc09bae5c7fe934cfb0e9c7d91d2e66,2025-03-05T01:15:10.020000 CVE-2025-1965,0,0,0bd3ee25b34ff10ec0343650056b235e91923f04d47a256a8d005445273d6545,2025-04-02T18:32:15.230000 CVE-2025-1966,0,0,60351edbd712a588bb5881e51b130671c2f34922067bedba86f618a830ee71d2,2025-04-02T18:22:05.807000 -CVE-2025-1967,0,0,f0d59c4ed441992299da9f393860b37f43033720577e761dda371f9ecd7295bf,2025-03-05T15:15:17.410000 +CVE-2025-1967,0,1,3387296b9cefdd13f619d7dc051be15c030caaf40c015f755b6d694f53e6ce80,2025-04-03T13:32:47.553000 CVE-2025-1969,0,0,00a186c236826ccc3fef0cf6a93be58578d3139f3a01ea0f0842aa271ed48f15,2025-03-04T19:15:38.290000 CVE-2025-1970,0,0,c01adcaf18acac016f78895b73f7486093810b323ebc7285186e86ab961aee74,2025-03-22T12:15:25.797000 CVE-2025-1971,0,0,4a2b8144dd19911475cb202ad5b0fc41816e2274b0457fd660842d87000a8960,2025-03-22T12:15:26.250000 @@ -282553,9 +282554,9 @@ CVE-2025-2043,0,0,fac59d80658b228012d94ccbe5d1628dceb6942d5036787b2ee07b2485bf5c CVE-2025-2044,0,0,b5399414596c43702ddc2a8c52eba998eda416119500a6d6557fd296c2a6a353,2025-03-06T22:15:35.957000 CVE-2025-2045,0,0,e7dfa297dca7fb018c24f5920e9d43f3c4da5bff799bbae66fef4cf3564b466b,2025-03-06T13:15:12.553000 CVE-2025-2046,0,0,fc783c2849819e55fbcb9d95feee8e8553a57d70a2b0c5494f1655edee0d3bf6,2025-03-07T20:15:39.177000 -CVE-2025-2047,0,0,3f84e94655d6d418e4f4070afd0b9a418e7fa70834cf4c6d9812f554309fce98,2025-03-07T20:15:39.300000 +CVE-2025-2047,0,1,d203237e5a2d58d2c407b7e2eaaa355f19802daf9e329a1835cfada430c7f425,2025-04-03T13:32:55.893000 CVE-2025-2048,0,0,5e87e2ef7731f3ba8024f15fb76f8c4b1d1ee6d1e895cc363fcf5b4763fd50ed,2025-04-01T20:26:11.547000 -CVE-2025-2049,0,0,8cc6abca03b34d5ffd21a44553018e9cfbc00c9b4f7a0a2c3f6a639c583600e5,2025-03-07T20:15:39.427000 +CVE-2025-2049,0,1,de0829182efaacc7a69451bc000f70ebd55d6f3178f3a36f265e011ba9221274,2025-04-03T13:33:00.487000 CVE-2025-2050,0,0,1dabc68feb4fc6975568c6b480483336ce5f3f6e18fec80b6a834440c9160070,2025-03-07T00:15:35.243000 CVE-2025-2051,0,0,39762f6a6ab838c9c7c8c7045b5c898cc8c8adf302ea2b672648686c9da9546e,2025-03-07T01:15:12.963000 CVE-2025-2052,0,0,e83c7aa2eccb3016f6fe6ee1219a19fb4c9c5f3abb951310ecbb9877f369a143,2025-03-07T01:15:13.173000 @@ -282637,7 +282638,7 @@ CVE-2025-20896,0,0,db8b5e76e05673e4957f3331f51a5ae0f253c3313d4dd61e1aa47a3c5e7e9 CVE-2025-20897,0,0,9b524c1605b324d44b6281caac004f52def0710ed37ed73236b1fa3aa4910a97,2025-02-04T08:15:31.123000 CVE-2025-20898,0,0,7d423720afd4f3d7d879f1088e2f7968fe092aaa03a0fcc2c802c6891b458235,2025-02-04T08:15:31.270000 CVE-2025-20899,0,0,37e552d621ddc6dc1641fe22a67e7855bbb90df3935b8b7bcae06f629e861656,2025-02-04T08:15:31.407000 -CVE-2025-2090,0,0,ba110c67f884f04334687e405284a6d54f607b34429b3632844bf7d9faf3f3c9,2025-03-07T20:15:39.670000 +CVE-2025-2090,0,1,ee76b7ed8644d49ad7d61f8acf09dc4b8382a51986fcc1aef0e6eff4037de19b,2025-04-03T13:33:07.950000 CVE-2025-20900,0,0,cdbfe12fadb6b1daef1b5df096ec18e9fbbc9e22b5f7855c559a75859f21009e,2025-02-04T08:15:31.573000 CVE-2025-20901,0,0,1cd5be79ef23e55fe6145042cb5a2419ef341bfead0310c40602ee7c827f70ed,2025-02-04T08:15:31.707000 CVE-2025-20902,0,0,8013f469fd8000f4a72f5eaf9c7432ead63aa4009d5e5a41230ef22aa8a9bad7,2025-02-04T08:15:31.857000 @@ -282668,7 +282669,7 @@ CVE-2025-20926,0,0,6c5aaa3b43af821de761602876c14f7891fac1040e084b8c9b4c44e8b5408 CVE-2025-20927,0,0,5d73d714eac14121ab71a13e0a9a386ffcb92164352e93925d8776cdff5874c4,2025-03-06T05:15:20.547000 CVE-2025-20928,0,0,8f0f2cabeabe9094370c5dd0d986f85c78628f170e2d7a43974c9e9d6a0620a0,2025-03-06T05:15:20.703000 CVE-2025-20929,0,0,d3400075f8f46115d6e7ef18995b03cfb8e1bc59f468b019570dba4a7f024bec,2025-03-06T05:15:20.900000 -CVE-2025-2093,0,0,370c8f324468fee0946b6c8c854e9f432aa4990d560aaa60e0c3642f127c0e0e,2025-03-07T23:15:15.747000 +CVE-2025-2093,0,1,6eb51f18351fb90f1933e52a63f0d14838726820135c7bc2ea95db0cd1fa5de5,2025-04-03T13:33:14.790000 CVE-2025-20930,0,0,8ebf2a99b4c5c1c6b9cb7982c9aa1b34757800a21756457108aa20434e8a07ea,2025-03-06T05:15:21.063000 CVE-2025-20931,0,0,80628cf5e237017e565c2f85d2589faf869404232ef52d4d52e902c75a7308cc,2025-03-06T05:15:21.210000 CVE-2025-20932,0,0,452645591f250cefeb8364705b9184285f7f0ca711860108c9bef7228f459595,2025-03-06T05:15:21.440000 @@ -284082,6 +284083,8 @@ CVE-2025-22921,0,0,fc4d8d5f4bc002d31a8eab55216be4cd1b637344934aafdd7df2486b97620 CVE-2025-22923,0,0,cf7835242a830b69c5bbdcca9f428b922cf359009a82110d3de36804e8bbc41d,2025-04-02T21:15:32.100000 CVE-2025-22924,0,0,ced97f25df60d6d8c15486f97a020160b652279795562bb39d8c9a27f6f35d58,2025-04-02T21:15:32.230000 CVE-2025-22925,0,0,82f8e021afcc2f80d54bfca57becef30294c139eea499e9e09ede51a14acd081,2025-04-02T21:15:32.340000 +CVE-2025-22927,1,1,56aeb6bd9da063af73960d9556190aa7bc2e207ecb1f70945e3bb4b9bf8b6304,2025-04-03T13:15:42.773000 +CVE-2025-22928,1,1,a1387b28a2ce8df4f6bb4a8ce4589c7e9865e888a0d64cc496edd06d7d80e8b4,2025-04-03T13:15:42.883000 CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000 CVE-2025-22937,0,0,a1f68aff808d4cd1fe386fa0863a8d4ad13e3d819b5c4fd08d5e98d043f82ae7,2025-04-01T20:26:30.593000 CVE-2025-22938,0,0,959260441b4c98f3ac8c8ebe3ba026cec0c40beb0b460ca2b1e2ebfb41bb7f40,2025-04-01T20:26:22.890000 @@ -284109,6 +284112,7 @@ CVE-2025-22978,0,0,fc5fcf58c4e702608b423ebabadfcaeec74a25a8d688d69960a7fd8462f67 CVE-2025-22980,0,0,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000 CVE-2025-22983,0,0,3f91e33a7409029e8feb1969bf0fd19dc254a37fe16ab3c9358513b3c91fd751,2025-01-23T17:15:26.577000 CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c59767f,2025-01-23T17:15:26.780000 +CVE-2025-2299,1,1,740362164a6b3b64c597660331b986016bfe1e0ed02c89977d41ad4da4415e70,2025-04-03T12:15:14.920000 CVE-2025-22992,0,0,9c2224e338558ccc5fdf942d723bafbe861c5e19d73a3269c58858cc57989795,2025-02-06T21:15:23.317000 CVE-2025-22994,0,0,d9527179d5c850c6866754d31e77f1c2fd06d9e1a13bd3d3f0bd861c8c0f83ff,2025-03-19T15:15:53.990000 CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000 @@ -286365,8 +286369,8 @@ CVE-2025-26660,0,0,b711a00f5dfa32959fd3c766aaf7ba4ea22e4bae0e839f8f050152da069fc CVE-2025-26661,0,0,6b07aa7e41ed32b21c57e51684aeb9e36856ccd243be242f1a25b61ed08c5995,2025-03-11T01:15:35.993000 CVE-2025-26683,0,0,87988a6d4c6dbe800d3c42a8efc2bd51a6c5fb95b5257787759fe32f886bbf37,2025-04-01T20:26:22.890000 CVE-2025-26689,0,0,dec5b99891737ae6a49560338e391a9fd35d35000ff58423c3aa4180c66c711d,2025-04-01T20:26:30.593000 -CVE-2025-26695,0,0,e239201bb929150b03ad07ffb8d312f400377d1f1cfc7d0e42902c7137896acf,2025-03-12T19:15:40.450000 -CVE-2025-26696,0,0,c788dec0a12ae5bdd6b81aed962f6239947be4d264a5b176d5302dfebc47d49c,2025-03-11T20:15:17.523000 +CVE-2025-26695,0,1,f077e716806e3aa11572737cbb762272530f7e8504d9bb6d9406f576cc783416,2025-04-03T13:30:39.037000 +CVE-2025-26696,0,1,b9658e1d3c0f3dd4003407283a716267ae4de824c8808025c4c0cd47206d44f0,2025-04-03T13:30:33.593000 CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000 CVE-2025-26699,0,0,3d07dd4adaf6ec2081703756468d2a6a16a920644c974700ce9ab8caf4058eba,2025-03-19T20:15:19.543000 CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000 @@ -286781,8 +286785,8 @@ CVE-2025-27421,0,0,d05fea08a71a3936a2f096f07356bdc55c206f7da4ad4a6502a071cb1952b CVE-2025-27422,0,0,cce8795dfe16ac096ec644088df76a3fc7ab0f6058c93abaa8f18c6deb644b95,2025-03-03T17:15:15.787000 CVE-2025-27423,0,0,76136ac7a97f6b3b77c306faa15fa09b7bae261cd8dfd81b49033906f60d3d0d,2025-03-03T17:15:15.943000 CVE-2025-27424,0,0,adf668e3c9da25d6988b65719ab3ae75e8ad4e12b749c578b26687f0998aff87,2025-03-28T20:11:15.007000 -CVE-2025-27425,0,0,eefa8de598cb14b10db9fda893507ccbe08d3f46d7345c6568f153f085ae9419,2025-03-04T16:15:40.797000 -CVE-2025-27426,0,0,265e1042156a6e72609e420079ebda71f3f2436cf1969deb71bd21f2f87de83e,2025-03-04T16:15:40.933000 +CVE-2025-27425,0,1,c54e7d57183b35696ef02157ace5e7fd42481ebab040d62abf3070bfa84b558b,2025-04-03T13:31:06.323000 +CVE-2025-27426,0,1,9e747dc870c0998abb3ea7b3f3a4eaa73dd29484d0d06dd5ec65096667269572,2025-04-03T13:30:49.883000 CVE-2025-27427,0,0,d565503dda339161e0c992bbf6fbe87052f992922e0285903e51c88162194d98,2025-04-02T22:15:19.083000 CVE-2025-2743,0,0,8741e8ac5692905097a5a8e28797893f3dce794ca5823d56efd29770d2cd5a77,2025-03-27T16:45:46.410000 CVE-2025-27430,0,0,c8635f0b92dae7bf8e99c5e4e8dabb23fa1cb6267b38122c26d97fb0aff537e6,2025-03-11T01:15:36.157000 @@ -287236,6 +287240,8 @@ CVE-2025-29427,0,0,07ee5814d6003bbfc3b892dff3a3b805bdda22bdc2e2b5147b08dff3b1ac0 CVE-2025-29429,0,0,70ed76e22abf856ea286be6fccfd66e6102b6f8a8d8567a46ea60e2a92631a4a,2025-03-25T18:46:50.230000 CVE-2025-29430,0,0,9c1050f2b9fcf4b29fb9e6c2c3c05dd42d239ca5737cbb0e54747be1037b283a,2025-03-25T18:44:43.817000 CVE-2025-29431,0,0,d467a56b9c5c57e54c01aff6a53ffdd59b78e3e6577e8a72af651975cfade5e5,2025-04-02T12:30:59.763000 +CVE-2025-2945,1,1,aeab53c3097a47ef4fba09ce37d4ecf9262a972b2b42e68df6ad4c6dfaf8faf3,2025-04-03T13:15:43.240000 +CVE-2025-2946,1,1,b38a61b4e5af741f551d00a3eaf92b83dafb7f45a091aff5d590aff35ca06a0c,2025-04-03T13:15:43.377000 CVE-2025-29483,0,0,a44df1db1a75ca4ccf8a0bab57f388d77d71341421d00a01658dce0d1318836c,2025-04-01T16:08:17.700000 CVE-2025-29484,0,0,24b91db5e49838949bb21585890c30ebf131a4e7d93b1fa565238059473a3194,2025-04-01T16:07:37.140000 CVE-2025-29485,0,0,76a43926d5d32780e223e5d4ded19c1f1dead02fcfd0661c16775c712330ced9,2025-04-01T16:07:18.737000 @@ -287475,7 +287481,7 @@ CVE-2025-30345,0,0,c3f3d2079e86f560009e577dbbb7cf71db1e2d75b7b8e784dc39ddf33b7b5 CVE-2025-30346,0,0,c406f26a6d5e86f9605358f371c0731991af9645cd15fe0065dbd940074e7d07,2025-04-02T22:15:20.097000 CVE-2025-30347,0,0,ed9763d5b530026684262273e310ca4c964268ef0ffc4c726547353dbc6770db,2025-03-24T14:19:23.963000 CVE-2025-30348,0,0,0fb0e9fd503e8730c9a3857e63ee0ac5611b8bb7632a64f763dd19e4ff36427c,2025-03-24T14:08:36.513000 -CVE-2025-30349,0,0,526c950cc64a333e84d55e644a88fdd602691a361484b453eb0de28202e3ad5c,2025-03-28T01:15:16.323000 +CVE-2025-30349,0,1,d863fcdacafbcc4265f861b9a5ca8402397ade3d5ede94aef0450f050ac91a50,2025-04-03T12:15:16.210000 CVE-2025-3035,0,0,f9c6db52c90368773d764fdee35779911e867f4e57b7d79d0dfecd9e19237364,2025-04-01T20:26:11.547000 CVE-2025-30350,0,0,769aed62b7c52c7efff0910786b1540702d43c431a2629a37c544cf6ab27d2c0,2025-03-27T16:45:27.850000 CVE-2025-30351,0,0,41323de04c59da9296c71c6a7df779e6c0c767b4bcb8b455ab5524ba6b0475be,2025-03-27T16:45:27.850000 @@ -287947,11 +287953,11 @@ CVE-2025-3138,0,0,de78ebf42f0bfa538b3736d4d683541e6c1b32395e045ff2be2d7bdc619a9e CVE-2025-31386,0,0,42df843cc2ac2bb87523fa10c4b86c9cfeca984ee6e6907b70f825251fac8592,2025-04-01T20:26:30.593000 CVE-2025-31387,0,0,efeeafd47dcaa2c1fe833b1f78eecd6f90d244213e2c3fd9dadef428bb8988f8,2025-04-01T20:26:30.593000 CVE-2025-3139,0,0,38102b143991772fa8965f269a5c5d3a7a1954a7edba1619271b901bddba3680,2025-04-03T04:15:39.940000 -CVE-2025-3140,0,0,ef0cac805617f2a84e59a3dfd08137631212c01f79707ef599c2a7633c0a6e4a,2025-04-03T05:15:40.777000 +CVE-2025-3140,0,1,a5bf40a01ec6c69e24b0678c2fe98fe9a4f96bb51d9095f86b625cc37e3cf52b,2025-04-03T13:15:44.010000 CVE-2025-31406,0,0,5912a412471ff3d877945941ec5dfa793f9b328130992797be8d7429384326a2,2025-04-01T20:26:30.593000 CVE-2025-31408,0,0,4bce0889fff07e9d2af0109421fe58b7234ee5ebf9fa6560ab95ff15e16d923e,2025-04-01T20:26:11.547000 CVE-2025-31409,0,0,82dbb111649d8cf9e26a4c460fca8cf167c66dfbe7749d633be5ad71c1f22147,2025-04-01T20:26:11.547000 -CVE-2025-3141,0,0,29059e08783bef3bbfe68d9a87c4635884da13d315c6f1c3e0044ca33eb4cf56,2025-04-03T05:15:42.363000 +CVE-2025-3141,0,1,2a6d9a3bf2a1433967eedb4fb11f21c399e8991ef06c9d06dff60030c097d7b4,2025-04-03T13:15:44.157000 CVE-2025-31410,0,0,d2744125929669a0550251c0ca1a9221dc78cee85634e7974f1b02dfdfbfe3ca,2025-04-01T20:26:30.593000 CVE-2025-31412,0,0,f2a3a75101b5fbb687e484fbb151373c9b65c031636af9fa6343c10e46f352fd,2025-04-01T20:26:30.593000 CVE-2025-31414,0,0,c7c8b152028249fcda3808d41ed059a882fd165da9cc6176d922213c7f3b4129,2025-04-01T20:26:30.593000