diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24358.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24358.json index 6f548c7213e..c15b2d6d802 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24358.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24358.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24358", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-15T19:16:07.193", - "lastModified": "2025-04-16T13:25:59.640", + "lastModified": "2025-05-01T11:15:53.613", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -64,7 +64,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -81,6 +81,10 @@ { "url": "https://github.com/gorilla/csrf/security/advisories/GHSA-rq77-p4h8-4crw", "source": "security-advisories@github.com" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00002.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27007.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27007.json new file mode 100644 index 00000000000..2a0ea624c33 --- /dev/null +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27007.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27007", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-05-01T11:15:54.517", + "lastModified": "2025-05-01T11:15:54.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Privilege Assignment vulnerability in Brainstorm Force SureTriggers allows Privilege Escalation.This issue affects SureTriggers: from n/a through 1.0.82." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/suretriggers/vulnerability/wordpress-suretriggers-1-0-82-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4159.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4159.json new file mode 100644 index 00000000000..cd2bfd86c07 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4159.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4159", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T10:15:15.637", + "lastModified": "2025-05-01T10:15:15.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PCMan FTP Server up to 2.0.7. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component GLOB Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://fitoxs.com/exploit/exploit-5d41402abc4b2a76b9719d911017c592.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306691", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306691", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561029", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4160.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4160.json new file mode 100644 index 00000000000..c60e5e8ad0d --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4160.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4160", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T10:15:17.567", + "lastModified": "2025-05-01T10:15:17.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PCMan FTP Server up to 2.0.7. It has been rated as critical. Affected by this issue is some unknown functionality of the component LS Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://fitoxs.com/exploit/exploit-098f6bcd4621d373cade4e832627b4f6.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306692", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306692", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561030", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4161.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4161.json new file mode 100644 index 00000000000..e1da2339897 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4161.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4161", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T11:15:54.740", + "lastModified": "2025-05-01T11:15:54.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in PCMan FTP Server up to 2.0.7. This affects an unknown part of the component VERBOSE Command Handler. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://fitoxs.com/exploit/exploit-45c48cce2e2d7fbdea1afc51c7c6ad26.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306693", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306693", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561033", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4162.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4162.json new file mode 100644 index 00000000000..adf51ff28fa --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4162.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4162", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-05-01T11:15:54.943", + "lastModified": "2025-05-01T11:15:54.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in PCMan FTP Server up to 2.0.7. This vulnerability affects unknown code of the component ASCII Command Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://fitoxs.com/exploit/exploit-03c7c0ace395d80182db07ae2c30f034.txt", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306694", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306694", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.561034", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index deb6088a339..c899446493a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-05-01T10:00:19.224781+00:00 +2025-05-01T12:00:22.426011+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-05-01T09:15:15.720000+00:00 +2025-05-01T11:15:54.943000+00:00 ``` ### Last Data Feed Release @@ -33,26 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -291890 +291895 ``` ### CVEs added in the last Commit Recently added CVEs: `5` -- [CVE-2025-4155](CVE-2025/CVE-2025-41xx/CVE-2025-4155.json) (`2025-05-01T08:15:18.130`) -- [CVE-2025-4156](CVE-2025/CVE-2025-41xx/CVE-2025-4156.json) (`2025-05-01T08:15:18.303`) -- [CVE-2025-4157](CVE-2025/CVE-2025-41xx/CVE-2025-4157.json) (`2025-05-01T09:15:15.513`) -- [CVE-2025-4158](CVE-2025/CVE-2025-41xx/CVE-2025-4158.json) (`2025-05-01T09:15:15.720`) -- [CVE-2025-47154](CVE-2025/CVE-2025-471xx/CVE-2025-47154.json) (`2025-05-01T08:15:17.950`) +- [CVE-2025-27007](CVE-2025/CVE-2025-270xx/CVE-2025-27007.json) (`2025-05-01T11:15:54.517`) +- [CVE-2025-4159](CVE-2025/CVE-2025-41xx/CVE-2025-4159.json) (`2025-05-01T10:15:15.637`) +- [CVE-2025-4160](CVE-2025/CVE-2025-41xx/CVE-2025-4160.json) (`2025-05-01T10:15:17.567`) +- [CVE-2025-4161](CVE-2025/CVE-2025-41xx/CVE-2025-4161.json) (`2025-05-01T11:15:54.740`) +- [CVE-2025-4162](CVE-2025/CVE-2025-41xx/CVE-2025-4162.json) (`2025-05-01T11:15:54.943`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `1` -- [CVE-2024-8676](CVE-2024/CVE-2024-86xx/CVE-2024-8676.json) (`2025-05-01T08:15:16.693`) -- [CVE-2025-47153](CVE-2025/CVE-2025-471xx/CVE-2025-47153.json) (`2025-05-01T08:15:17.807`) +- [CVE-2025-24358](CVE-2025/CVE-2025-243xx/CVE-2025-24358.json) (`2025-05-01T11:15:53.613`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 69bf716cecf..6c730a53582 100644 --- a/_state.csv +++ b/_state.csv @@ -280197,7 +280197,7 @@ CVE-2024-8671,0,0,a99020099b190237ec4ed79dd02fe23a02e4fa3467857b7d700af772ffd6ad CVE-2024-8672,0,0,a15444b342cb51704c6035355a8239e8b1581fa22931a6c667330f1628aeb3b2,2024-11-28T10:15:08.870000 CVE-2024-8674,0,0,346b5859dd79895a03165d24e9b602a990cf40990eacbe9188550aceade5c799,2025-02-11T02:15:36.413000 CVE-2024-8675,0,0,d4603b0787f1359762182dfd0b6464a7217287d096015439ee3a45da5ea12b68,2024-10-04T13:51:25.567000 -CVE-2024-8676,0,1,ea5c627a6f59b47a0514523c89ae44a68f1f6d83badbe10c427a6f3f39e4ba83,2025-05-01T08:15:16.693000 +CVE-2024-8676,0,0,ea5c627a6f59b47a0514523c89ae44a68f1f6d83badbe10c427a6f3f39e4ba83,2025-05-01T08:15:16.693000 CVE-2024-8677,0,0,60f0fdd7af95bdac2c0e1884d42dbe76c9ab4cea5844c97ea5bb9aa452948afc,2025-02-11T02:15:36.463000 CVE-2024-8678,0,0,c9f19131bded613da0c19c1444b8e8a8b9cc51fc5c1cf15447ee67809c6ea12c,2024-10-02T19:06:48.983000 CVE-2024-8679,0,0,2b814e408085282aa43a44f419617020b8c9c8c614fcd1f864e869f9853d89cd,2024-12-07T02:15:19.457000 @@ -285932,7 +285932,7 @@ CVE-2025-24354,0,0,33e96f6ab404cf45f0a4405c77520b82358348aceacdc778687814571e590 CVE-2025-24355,0,0,2b68b163db748dec99ff55b2d4d371492d44a4482a7f15b8973aa6b3a0f994c5,2025-01-24T17:15:16.047000 CVE-2025-24356,0,0,d0b82c0018364f3dc83d637e30ca6c64f4be25093ccf7468d678a6ec3efd7022,2025-01-27T18:15:41.347000 CVE-2025-24357,0,0,33b4b3c939c862c35be8fbd83a4f327fbd80fdaea485d698b2dba1d8e5ecb167,2025-01-27T18:15:41.523000 -CVE-2025-24358,0,0,b83291786fea313d1145b53b30f70b756ad6caabe4590a1a64d27ab42bbd02da,2025-04-16T13:25:59.640000 +CVE-2025-24358,0,1,cb156030162fa2c7bf6dbd49aaf71a23c1384a691e07ea90b834ee6ce37085dc,2025-05-01T11:15:53.613000 CVE-2025-24359,0,0,1ef1d48aa16d3d1524839190f2a92e68f271b7bbb06dbb86c77c3115b6a414ab,2025-01-24T17:15:16.197000 CVE-2025-24360,0,0,9b8d13d61afdc9c82b83c3501ec96029794286adee2fcfad926404556ff5277e,2025-01-25T01:15:24.047000 CVE-2025-24361,0,0,398144fa5fffc1da1e51f93b9cc9373c390b7e27a0bd14059d4987e6ffaf08d7,2025-01-25T01:15:24.193000 @@ -287550,6 +287550,7 @@ CVE-2025-26999,0,0,cdacabf1a660ac6dee9a5685fa630f6b1572dbc44af9dd2498823746cb2cf CVE-2025-2700,0,0,834dcedd7f40ed7b4107c8c13076bfc0c6c6096a854321a45822e8d64deac3c4,2025-04-01T20:47:42.813000 CVE-2025-27000,0,0,1ac554f083699af2e8a7ca7e5b9fee0cf63423d6e7b9eac2cf80407f8bbcfb4d,2025-02-25T15:15:31.853000 CVE-2025-27001,0,0,9549fdac37d52ebf8e1c75331c3601de8f03a77a6f35cd82e54896fef08473b7,2025-03-28T18:11:40.180000 +CVE-2025-27007,1,1,39731e3aed9a4a9818d01e2cabb41193c29a2b325b09e48f69756965059cd8b1,2025-05-01T11:15:54.517000 CVE-2025-27008,0,0,1708de4dfae031876ed7d8e7fae7765e4b7ae93e2aef72116fe164d3c1e29fab,2025-04-16T13:25:37.340000 CVE-2025-27009,0,0,ba7a3973ccfababfdb452ae41b4eb27fe597fd251e088b37a2e2b8e171857c6b,2025-04-15T18:39:27.967000 CVE-2025-2701,0,0,4a00a8c87ae1a8f8d8996e5497fbf475b3761e12c82cf113f0ba83ecc0864e95,2025-03-24T09:15:13.950000 @@ -291574,10 +291575,14 @@ CVE-2025-4151,0,0,fdb623bbf993eceab7e373995dd2fd9fe8246c4a9362877439d94c4f089a3d CVE-2025-4152,0,0,dba6e8cf8f95fe1a697418294d6bc6b7e16ee2c065a0750619f896eb2dc0ff8f,2025-05-01T06:15:35.657000 CVE-2025-4153,0,0,656cf0128cabc0ecd13f51045aad5e741a9f9714fd9979d2d57487a4713d4606,2025-05-01T07:15:58.847000 CVE-2025-4154,0,0,d2dfc7cfcf9e911e3bdab7afd64903d7e8ab5345458e9a4c83f05a90e3fa8746,2025-05-01T07:15:59.153000 -CVE-2025-4155,1,1,234e0aa8d4679a9d8c3c03f103bdd0908b989aee23b2ce329e097330769469e2,2025-05-01T08:15:18.130000 -CVE-2025-4156,1,1,f3cf4c24357db800a8118d2c77fb9a4448dbe59cfe48e408476564c9525e04d5,2025-05-01T08:15:18.303000 -CVE-2025-4157,1,1,c785b85e50eed1e86f831067d0f3756579c2214b3d22d15ba264d29668dc13b5,2025-05-01T09:15:15.513000 -CVE-2025-4158,1,1,e23022f0ebc8947a6e388aba8c58133109e914495c633044cb90fd0dc7df7aa8,2025-05-01T09:15:15.720000 +CVE-2025-4155,0,0,234e0aa8d4679a9d8c3c03f103bdd0908b989aee23b2ce329e097330769469e2,2025-05-01T08:15:18.130000 +CVE-2025-4156,0,0,f3cf4c24357db800a8118d2c77fb9a4448dbe59cfe48e408476564c9525e04d5,2025-05-01T08:15:18.303000 +CVE-2025-4157,0,0,c785b85e50eed1e86f831067d0f3756579c2214b3d22d15ba264d29668dc13b5,2025-05-01T09:15:15.513000 +CVE-2025-4158,0,0,e23022f0ebc8947a6e388aba8c58133109e914495c633044cb90fd0dc7df7aa8,2025-05-01T09:15:15.720000 +CVE-2025-4159,1,1,68f2c5a67e9e0f3b64a99d0c230858983dcf2a0212c8b40f34bb860ee2009c60,2025-05-01T10:15:15.637000 +CVE-2025-4160,1,1,bd3d61dc158005b8eadaad91688c5e6ea77a87757276f97c9e8027f5f300ad1d,2025-05-01T10:15:17.567000 +CVE-2025-4161,1,1,cde5cf15ca28ba2dc4a58adb1509417cc330c89f3e2adf67581e59645e40eecb,2025-05-01T11:15:54.740000 +CVE-2025-4162,1,1,26d7832c6d9aa77cd2e2b0951fcf113f262951d7be491357599a7de418c8861d,2025-05-01T11:15:54.943000 CVE-2025-42598,0,0,4c400d87dc34a2b74819c41bbdd48bd1c3da0af3c35841d82c2177d30b1cb5f5,2025-04-29T13:52:10.697000 CVE-2025-42599,0,0,d39e065342929b05f2b0a2b6fd7615d0e3f6e7c2f605fdbeb3b3bb9e83f12d93,2025-04-29T19:46:44.310000 CVE-2025-42600,0,0,a98a7820b508b5a8b0c7d0f0dd6cbaa5b07d1e37b05a983a49eb79024a0cd435,2025-04-23T14:08:13.383000 @@ -291887,5 +291892,5 @@ CVE-2025-46779,0,0,37c24e5b7e4a0045a4d100f0b48f14bc24b2b68a67fe538c22d10ef701f0d CVE-2025-46780,0,0,5993d506455854cf118c6763aa0e87cfcb5c499499a4d09b9c1fb1cc0884d3f3,2025-04-30T03:15:19.307000 CVE-2025-46781,0,0,e7fe47a74e2ae94a42cb82d6842951a5dd9286ffd4d5d353415d63928d0e29b9,2025-04-30T03:15:19.367000 CVE-2025-46782,0,0,190c817e4f3c09faf97df326ed9cdbea1555cc1850d161b9d9da454d08c1d46e,2025-04-30T03:15:19.430000 -CVE-2025-47153,0,1,f0c250de648eee6c3edaee13377f5db8fda6f5bd0ad134391a657cda076338ba,2025-05-01T08:15:17.807000 -CVE-2025-47154,1,1,99381a8668c0881931c50505b8cc953970f58c6f2cdb541089e18e8a38b63942,2025-05-01T08:15:17.950000 +CVE-2025-47153,0,0,f0c250de648eee6c3edaee13377f5db8fda6f5bd0ad134391a657cda076338ba,2025-05-01T08:15:17.807000 +CVE-2025-47154,0,0,99381a8668c0881931c50505b8cc953970f58c6f2cdb541089e18e8a38b63942,2025-05-01T08:15:17.950000