From b0e04f0417c6f98ab9138e01f3f72ac5e4845ab0 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 8 Apr 2025 18:03:55 +0000 Subject: [PATCH] Auto-Update: 2025-04-08T18:00:20.362308+00:00 --- CVE-2020/CVE-2020-06xx/CVE-2020-0638.json | 76 ++- CVE-2020/CVE-2020-06xx/CVE-2020-0674.json | 97 +++- CVE-2022/CVE-2022-33xx/CVE-2022-3341.json | 22 +- CVE-2022/CVE-2022-35xx/CVE-2022-3514.json | 19 +- CVE-2022/CVE-2022-35xx/CVE-2022-3515.json | 32 +- CVE-2022/CVE-2022-35xx/CVE-2022-3573.json | 19 +- CVE-2022/CVE-2022-35xx/CVE-2022-3592.json | 22 +- CVE-2022/CVE-2022-36xx/CVE-2022-3613.json | 12 +- CVE-2022/CVE-2022-40xx/CVE-2022-4037.json | 12 +- CVE-2022/CVE-2022-41xx/CVE-2022-4131.json | 12 +- CVE-2022/CVE-2022-41xx/CVE-2022-4167.json | 12 +- CVE-2022/CVE-2022-43xx/CVE-2022-4345.json | 12 +- CVE-2022/CVE-2022-457xx/CVE-2022-45728.json | 32 +- CVE-2022/CVE-2022-457xx/CVE-2022-45729.json | 32 +- CVE-2022/CVE-2022-479xx/CVE-2022-47927.json | 32 +- CVE-2023/CVE-2023-341xx/CVE-2023-34124.json | 22 +- CVE-2023/CVE-2023-514xx/CVE-2023-51409.json | 52 +- CVE-2024/CVE-2024-17xx/CVE-2024-1712.json | 34 +- CVE-2024/CVE-2024-290xx/CVE-2024-29090.json | 70 ++- CVE-2024/CVE-2024-291xx/CVE-2024-29100.json | 52 +- CVE-2024/CVE-2024-301xx/CVE-2024-30194.json | 52 +- CVE-2024/CVE-2024-302xx/CVE-2024-30221.json | 52 +- CVE-2024/CVE-2024-302xx/CVE-2024-30224.json | 52 +- CVE-2024/CVE-2024-302xx/CVE-2024-30230.json | 52 +- CVE-2024/CVE-2024-302xx/CVE-2024-30236.json | 52 +- CVE-2024/CVE-2024-304xx/CVE-2024-30483.json | 52 +- CVE-2024/CVE-2024-304xx/CVE-2024-30488.json | 52 +- CVE-2024/CVE-2024-305xx/CVE-2024-30503.json | 52 +- CVE-2024/CVE-2024-305xx/CVE-2024-30519.json | 52 +- CVE-2024/CVE-2024-305xx/CVE-2024-30520.json | 52 +- CVE-2024/CVE-2024-312xx/CVE-2024-31240.json | 52 +- CVE-2024/CVE-2024-312xx/CVE-2024-31245.json | 52 +- CVE-2024/CVE-2024-312xx/CVE-2024-31247.json | 52 +- CVE-2024/CVE-2024-312xx/CVE-2024-31249.json | 52 +- CVE-2024/CVE-2024-312xx/CVE-2024-31253.json | 52 +- CVE-2024/CVE-2024-312xx/CVE-2024-31254.json | 52 +- CVE-2024/CVE-2024-36xx/CVE-2024-3685.json | 87 +++- CVE-2024/CVE-2024-36xx/CVE-2024-3686.json | 97 +++- CVE-2024/CVE-2024-37xx/CVE-2024-3767.json | 89 +++- CVE-2024/CVE-2024-37xx/CVE-2024-3768.json | 101 +++- CVE-2024/CVE-2024-37xx/CVE-2024-3775.json | 66 ++- CVE-2024/CVE-2024-37xx/CVE-2024-3776.json | 51 +- CVE-2024/CVE-2024-37xx/CVE-2024-3777.json | 51 +- CVE-2024/CVE-2024-37xx/CVE-2024-3778.json | 51 +- CVE-2024/CVE-2024-488xx/CVE-2024-48887.json | 56 ++ CVE-2024/CVE-2024-529xx/CVE-2024-52974.json | 56 ++ CVE-2024/CVE-2024-529xx/CVE-2024-52980.json | 56 ++ CVE-2024/CVE-2024-529xx/CVE-2024-52981.json | 56 ++ CVE-2024/CVE-2024-578xx/CVE-2024-57835.json | 52 +- CVE-2024/CVE-2024-581xx/CVE-2024-58131.json | 63 ++- CVE-2025/CVE-2025-10xx/CVE-2025-1095.json | 56 ++ CVE-2025/CVE-2025-22xx/CVE-2025-2285.json | 78 +++ CVE-2025/CVE-2025-22xx/CVE-2025-2286.json | 78 +++ CVE-2025/CVE-2025-22xx/CVE-2025-2287.json | 78 +++ CVE-2025/CVE-2025-22xx/CVE-2025-2288.json | 78 +++ CVE-2025/CVE-2025-22xx/CVE-2025-2293.json | 78 +++ CVE-2025/CVE-2025-252xx/CVE-2025-25226.json | 33 ++ CVE-2025/CVE-2025-252xx/CVE-2025-25227.json | 33 ++ CVE-2025/CVE-2025-270xx/CVE-2025-27078.json | 56 ++ CVE-2025/CVE-2025-270xx/CVE-2025-27079.json | 56 ++ CVE-2025/CVE-2025-270xx/CVE-2025-27082.json | 44 ++ CVE-2025/CVE-2025-270xx/CVE-2025-27083.json | 44 ++ CVE-2025/CVE-2025-270xx/CVE-2025-27084.json | 44 ++ CVE-2025/CVE-2025-270xx/CVE-2025-27085.json | 44 ++ CVE-2025/CVE-2025-274xx/CVE-2025-27441.json | 56 ++ CVE-2025/CVE-2025-274xx/CVE-2025-27442.json | 56 ++ CVE-2025/CVE-2025-274xx/CVE-2025-27443.json | 56 ++ CVE-2025/CVE-2025-284xx/CVE-2025-28413.json | 47 +- CVE-2025/CVE-2025-28xx/CVE-2025-2829.json | 78 +++ CVE-2025/CVE-2025-304xx/CVE-2025-30401.json | 39 +- CVE-2025/CVE-2025-306xx/CVE-2025-30670.json | 56 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30671.json | 56 ++ CVE-2025/CVE-2025-320xx/CVE-2025-32017.json | 64 +++ CVE-2025/CVE-2025-320xx/CVE-2025-32018.json | 56 ++ CVE-2025/CVE-2025-320xx/CVE-2025-32024.json | 82 +++ CVE-2025/CVE-2025-320xx/CVE-2025-32025.json | 82 +++ CVE-2025/CVE-2025-320xx/CVE-2025-32026.json | 56 ++ CVE-2025/CVE-2025-320xx/CVE-2025-32028.json | 56 ++ CVE-2025/CVE-2025-321xx/CVE-2025-32117.json | 56 ++ CVE-2025/CVE-2025-321xx/CVE-2025-32164.json | 56 ++ CVE-2025/CVE-2025-322xx/CVE-2025-32211.json | 56 ++ CVE-2025/CVE-2025-322xx/CVE-2025-32279.json | 56 ++ CVE-2025/CVE-2025-323xx/CVE-2025-32369.json | 63 ++- CVE-2025/CVE-2025-324xx/CVE-2025-32409.json | 10 +- CVE-2025/CVE-2025-32xx/CVE-2025-3206.json | 86 +++- CVE-2025/CVE-2025-32xx/CVE-2025-3207.json | 86 +++- CVE-2025/CVE-2025-32xx/CVE-2025-3208.json | 86 +++- CVE-2025/CVE-2025-32xx/CVE-2025-3210.json | 86 +++- CVE-2025/CVE-2025-32xx/CVE-2025-3285.json | 78 +++ CVE-2025/CVE-2025-32xx/CVE-2025-3286.json | 78 +++ CVE-2025/CVE-2025-32xx/CVE-2025-3287.json | 78 +++ CVE-2025/CVE-2025-32xx/CVE-2025-3288.json | 78 +++ CVE-2025/CVE-2025-32xx/CVE-2025-3289.json | 66 +++ CVE-2025/CVE-2025-32xx/CVE-2025-3296.json | 54 +- CVE-2025/CVE-2025-32xx/CVE-2025-3297.json | 54 +- CVE-2025/CVE-2025-32xx/CVE-2025-3298.json | 54 +- CVE-2025/CVE-2025-32xx/CVE-2025-3299.json | 56 +- CVE-2025/CVE-2025-33xx/CVE-2025-3305.json | 49 +- CVE-2025/CVE-2025-33xx/CVE-2025-3308.json | 89 +++- CVE-2025/CVE-2025-33xx/CVE-2025-3381.json | 14 +- CVE-2025/CVE-2025-33xx/CVE-2025-3382.json | 14 +- CVE-2025/CVE-2025-33xx/CVE-2025-3383.json | 14 +- CVE-2025/CVE-2025-33xx/CVE-2025-3384.json | 14 +- CVE-2025/CVE-2025-33xx/CVE-2025-3385.json | 14 +- CVE-2025/CVE-2025-33xx/CVE-2025-3386.json | 14 +- CVE-2025/CVE-2025-33xx/CVE-2025-3392.json | 14 +- CVE-2025/CVE-2025-33xx/CVE-2025-3399.json | 14 +- CVE-2025/CVE-2025-34xx/CVE-2025-3400.json | 14 +- CVE-2025/CVE-2025-34xx/CVE-2025-3408.json | 14 +- CVE-2025/CVE-2025-34xx/CVE-2025-3410.json | 14 +- CVE-2025/CVE-2025-34xx/CVE-2025-3411.json | 14 +- CVE-2025/CVE-2025-34xx/CVE-2025-3412.json | 14 +- CVE-2025/CVE-2025-34xx/CVE-2025-3413.json | 14 +- README.md | 106 ++-- _state.csv | 539 +++++++++++--------- 115 files changed, 5662 insertions(+), 631 deletions(-) create mode 100644 CVE-2024/CVE-2024-488xx/CVE-2024-48887.json create mode 100644 CVE-2024/CVE-2024-529xx/CVE-2024-52974.json create mode 100644 CVE-2024/CVE-2024-529xx/CVE-2024-52980.json create mode 100644 CVE-2024/CVE-2024-529xx/CVE-2024-52981.json create mode 100644 CVE-2025/CVE-2025-10xx/CVE-2025-1095.json create mode 100644 CVE-2025/CVE-2025-22xx/CVE-2025-2285.json create mode 100644 CVE-2025/CVE-2025-22xx/CVE-2025-2286.json create mode 100644 CVE-2025/CVE-2025-22xx/CVE-2025-2287.json create mode 100644 CVE-2025/CVE-2025-22xx/CVE-2025-2288.json create mode 100644 CVE-2025/CVE-2025-22xx/CVE-2025-2293.json create mode 100644 CVE-2025/CVE-2025-252xx/CVE-2025-25226.json create mode 100644 CVE-2025/CVE-2025-252xx/CVE-2025-25227.json create mode 100644 CVE-2025/CVE-2025-270xx/CVE-2025-27078.json create mode 100644 CVE-2025/CVE-2025-270xx/CVE-2025-27079.json create mode 100644 CVE-2025/CVE-2025-270xx/CVE-2025-27082.json create mode 100644 CVE-2025/CVE-2025-270xx/CVE-2025-27083.json create mode 100644 CVE-2025/CVE-2025-270xx/CVE-2025-27084.json create mode 100644 CVE-2025/CVE-2025-270xx/CVE-2025-27085.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27441.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27442.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27443.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2829.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30670.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30671.json create mode 100644 CVE-2025/CVE-2025-320xx/CVE-2025-32017.json create mode 100644 CVE-2025/CVE-2025-320xx/CVE-2025-32018.json create mode 100644 CVE-2025/CVE-2025-320xx/CVE-2025-32024.json create mode 100644 CVE-2025/CVE-2025-320xx/CVE-2025-32025.json create mode 100644 CVE-2025/CVE-2025-320xx/CVE-2025-32026.json create mode 100644 CVE-2025/CVE-2025-320xx/CVE-2025-32028.json create mode 100644 CVE-2025/CVE-2025-321xx/CVE-2025-32117.json create mode 100644 CVE-2025/CVE-2025-321xx/CVE-2025-32164.json create mode 100644 CVE-2025/CVE-2025-322xx/CVE-2025-32211.json create mode 100644 CVE-2025/CVE-2025-322xx/CVE-2025-32279.json create mode 100644 CVE-2025/CVE-2025-32xx/CVE-2025-3285.json create mode 100644 CVE-2025/CVE-2025-32xx/CVE-2025-3286.json create mode 100644 CVE-2025/CVE-2025-32xx/CVE-2025-3287.json create mode 100644 CVE-2025/CVE-2025-32xx/CVE-2025-3288.json create mode 100644 CVE-2025/CVE-2025-32xx/CVE-2025-3289.json diff --git a/CVE-2020/CVE-2020-06xx/CVE-2020-0638.json b/CVE-2020/CVE-2020-06xx/CVE-2020-0638.json index 82d9caf0302..048e416ff72 100644 --- a/CVE-2020/CVE-2020-06xx/CVE-2020-0638.json +++ b/CVE-2020/CVE-2020-06xx/CVE-2020-0638.json @@ -2,8 +2,8 @@ "id": "CVE-2020-0638", "sourceIdentifier": "secure@microsoft.com", "published": "2020-01-14T23:15:32.503", - "lastModified": "2025-02-07T16:15:31.030", - "vulnStatus": "Modified", + "lastModified": "2025-04-08T16:00:35.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -119,43 +119,83 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF" + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "C253A63F-03AB-41CB-A03A-B2674DEA98AA" + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9285A9B5-4759-43E7-9589-CDBCA7100605" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "1A6FC9EE-D486-4AFE-A20E-4278468A1779" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37097C39-D588-4018-B94D-5EB87B1E3D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:*", + "matchCriteriaId": "530DF8C9-467C-4F4F-9FCA-CDD934BADF3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE7E7B1-64AC-4986-A50B-0918A42C05BB" }, { "vulnerable": true, diff --git a/CVE-2020/CVE-2020-06xx/CVE-2020-0674.json b/CVE-2020/CVE-2020-06xx/CVE-2020-0674.json index 9c212b2b5f8..719116ab248 100644 --- a/CVE-2020/CVE-2020-06xx/CVE-2020-0674.json +++ b/CVE-2020/CVE-2020-06xx/CVE-2020-0674.json @@ -2,8 +2,8 @@ "id": "CVE-2020-0674", "sourceIdentifier": "secure@microsoft.com", "published": "2020-02-11T22:15:14.883", - "lastModified": "2025-02-07T16:15:31.490", - "vulnStatus": "Modified", + "lastModified": "2025-04-08T16:00:10.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -185,38 +185,98 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9285A9B5-4759-43E7-9589-CDBCA7100605" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "1A6FC9EE-D486-4AFE-A20E-4278468A1779" }, { "vulnerable": false, @@ -248,6 +308,11 @@ "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, { "vulnerable": false, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", diff --git a/CVE-2022/CVE-2022-33xx/CVE-2022-3341.json b/CVE-2022/CVE-2022-33xx/CVE-2022-3341.json index 7839a61837b..dd00d90a87f 100644 --- a/CVE-2022/CVE-2022-33xx/CVE-2022-3341.json +++ b/CVE-2022/CVE-2022-33xx/CVE-2022-3341.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3341", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-01-12T15:15:10.007", - "lastModified": "2024-11-21T07:19:19.960", + "lastModified": "2025-04-08T16:15:19.387", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-35xx/CVE-2022-3514.json b/CVE-2022/CVE-2022-35xx/CVE-2022-3514.json index 4b495a4a6b4..09332b620f5 100644 --- a/CVE-2022/CVE-2022-35xx/CVE-2022-3514.json +++ b/CVE-2022/CVE-2022-35xx/CVE-2022-3514.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3514", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-12T04:15:08.717", - "lastModified": "2024-11-21T07:19:41.183", + "lastModified": "2025-04-08T16:15:19.627", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-1333" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] } ], "configurations": [ @@ -169,6 +179,13 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/377978", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-35xx/CVE-2022-3515.json b/CVE-2022/CVE-2022-35xx/CVE-2022-3515.json index 8f92f800f95..7446caf0344 100644 --- a/CVE-2022/CVE-2022-35xx/CVE-2022-3515.json +++ b/CVE-2022/CVE-2022-35xx/CVE-2022-3515.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3515", "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-12T15:15:10.187", - "lastModified": "2024-11-21T07:19:41.320", + "lastModified": "2025-04-08T16:15:19.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-35xx/CVE-2022-3573.json b/CVE-2022/CVE-2022-35xx/CVE-2022-3573.json index 673f85b8912..416db54ccf8 100644 --- a/CVE-2022/CVE-2022-35xx/CVE-2022-3573.json +++ b/CVE-2022/CVE-2022-35xx/CVE-2022-3573.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3573", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-12T04:15:08.803", - "lastModified": "2024-11-21T07:19:47.797", + "lastModified": "2025-04-08T16:15:22.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ @@ -191,6 +201,13 @@ "Permissions Required", "Third Party Advisory" ] + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/378216", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-35xx/CVE-2022-3592.json b/CVE-2022/CVE-2022-35xx/CVE-2022-3592.json index 75cf3efd4c9..fb0b1f90a63 100644 --- a/CVE-2022/CVE-2022-35xx/CVE-2022-3592.json +++ b/CVE-2022/CVE-2022-35xx/CVE-2022-3592.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3592", "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-12T15:15:10.273", - "lastModified": "2024-11-21T07:19:50.197", + "lastModified": "2025-04-08T16:15:23.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3613.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3613.json index df68194f77a..85ca5149aa9 100644 --- a/CVE-2022/CVE-2022-36xx/CVE-2022-3613.json +++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3613.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3613", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-12T04:15:08.883", - "lastModified": "2024-11-21T07:19:52.917", + "lastModified": "2025-04-08T16:15:23.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4037.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4037.json index eebd194ae63..0bc65fa6f88 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4037.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4037.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4037", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-12T04:15:09.910", - "lastModified": "2024-11-21T07:34:29.540", + "lastModified": "2025-04-08T17:15:32.497", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4131.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4131.json index b53ce7951ed..48b43fc0daf 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4131.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4131.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4131", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-12T04:15:10.107", - "lastModified": "2024-11-21T07:34:38.210", + "lastModified": "2025-04-08T17:15:33.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-1333" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4167.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4167.json index 1321f8826db..14abf102373 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4167.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4167.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4167", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-12T04:15:10.327", - "lastModified": "2024-11-21T07:34:42.363", + "lastModified": "2025-04-08T17:15:33.827", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4345.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4345.json index 19649f6bbe1..e7e0d082b38 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4345.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4345.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4345", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-12T04:15:10.663", - "lastModified": "2024-11-21T07:35:05.870", + "lastModified": "2025-04-08T17:15:34.117", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-835" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-457xx/CVE-2022-45728.json b/CVE-2022/CVE-2022-457xx/CVE-2022-45728.json index b9b834bfe0c..cd96531cd3f 100644 --- a/CVE-2022/CVE-2022-457xx/CVE-2022-45728.json +++ b/CVE-2022/CVE-2022-457xx/CVE-2022-45728.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45728", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-12T22:15:09.407", - "lastModified": "2024-11-21T07:29:39.407", + "lastModified": "2025-04-08T16:15:23.770", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-457xx/CVE-2022-45729.json b/CVE-2022/CVE-2022-457xx/CVE-2022-45729.json index 22f4d8d5bf3..1371d99317c 100644 --- a/CVE-2022/CVE-2022-457xx/CVE-2022-45729.json +++ b/CVE-2022/CVE-2022-457xx/CVE-2022-45729.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45729", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-12T22:15:09.463", - "lastModified": "2024-11-21T07:29:39.560", + "lastModified": "2025-04-08T16:15:24.010", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47927.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47927.json index 005917ab1e7..06c6001fb62 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47927.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47927.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47927", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-12T06:15:08.167", - "lastModified": "2024-11-21T07:32:32.463", + "lastModified": "2025-04-08T16:15:24.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34124.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34124.json index 50bf29a925a..e60c0d1e32c 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34124.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34124.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34124", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2023-07-13T01:15:08.723", - "lastModified": "2025-02-13T17:16:34.607", + "lastModified": "2025-04-08T16:15:24.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51409.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51409.json index ac8c44cbea3..7356d684c06 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51409.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51409.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51409", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-12T14:15:07.370", - "lastModified": "2024-11-21T08:38:03.200", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:29:05.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.99", + "matchCriteriaId": "4242BDD1-173B-4657-B0CF-DFBD7192E348" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ai-engine/wordpress-ai-engine-plugin-1-9-98-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/ai-engine/wordpress-ai-engine-plugin-1-9-98-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1712.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1712.json index fb6c25db93e..7f4256c52d2 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1712.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1712.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1712", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:14.950", - "lastModified": "2024-11-25T21:15:12.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:31:49.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:majeedraza:carousel_slider:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.7", + "matchCriteriaId": "32AEB3CA-3FDB-4940-A871-1CE7E82A642B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/23805a61-9fcd-4744-a60d-05c8cb43ee01/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/23805a61-9fcd-4744-a60d-05c8cb43ee01/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29090.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29090.json index 72183d06552..a94348ddac3 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29090.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29090.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29090", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-28T06:15:12.447", - "lastModified": "2025-02-13T18:17:49.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:38:50.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 } ] }, @@ -51,26 +71,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.5", + "matchCriteriaId": "ADA8F266-6205-4D20-9F8C-E2282248E843" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ai-engine/wordpress-ai-engine-plugin-2-1-4-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/chaos-in-the-ai-zoo-exploiting-cve-2024-29090-authenticated-ssrf-in-ai-engine-plugin-by-jordy-meow", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/ai-engine/wordpress-ai-engine-plugin-2-1-4-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/chaos-in-the-ai-zoo-exploiting-cve-2024-29090-authenticated-ssrf-in-ai-engine-plugin-by-jordy-meow", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.vicarius.io/vsociety/posts/decoding-the-unseen-threat-exploiting-cve-2024-29090-authenticated-ssrf-in-ai-engine-by-jordy-meow-wordpress-plugin", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29100.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29100.json index 36cfde08679..df81ad73a30 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29100.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29100.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29100", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-28T06:15:13.223", - "lastModified": "2024-11-21T09:07:33.233", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:40:26.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.5", + "matchCriteriaId": "ADA8F266-6205-4D20-9F8C-E2282248E843" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ai-engine/wordpress-ai-engine-plugin-2-1-4-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/ai-engine/wordpress-ai-engine-plugin-2-1-4-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30194.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30194.json index 4c6203a2753..42a79b4748e 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30194.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30194.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30194", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T07:15:55.217", - "lastModified": "2024-11-21T09:11:24.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:40:00.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sunshinephotocart:sunshine_photo_cart:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.2", + "matchCriteriaId": "9BC47AC7-6C53-4DF2-959B-B81097A16A84" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/sunshine-photo-cart/wordpress-sunshine-photo-cart-plugin-3-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/sunshine-photo-cart/wordpress-sunshine-photo-cart-plugin-3-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30221.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30221.json index efbd603bfe9..653b08a2042 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30221.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30221.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30221", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-28T06:15:14.783", - "lastModified": "2024-11-21T09:11:28.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:40:47.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sunshinephotocart:sunshine_photo_cart:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.2", + "matchCriteriaId": "9BC47AC7-6C53-4DF2-959B-B81097A16A84" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/sunshine-photo-cart/wordpress-sunshine-photo-cart-plugin-3-1-1-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/sunshine-photo-cart/wordpress-sunshine-photo-cart-plugin-3-1-1-php-object-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30224.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30224.json index c1423a192db..3768a9eb19f 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30224.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30224.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30224", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-28T05:15:50.323", - "lastModified": "2024-11-21T09:11:29.103", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:39:44.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpxpo:wholesalex:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "413DFEA7-FC68-41D6-B2F7-588BFA38F51F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wholesalex/wordpress-wholesalex-plugin-1-3-2-unauthenticated-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wholesalex/wordpress-wholesalex-plugin-1-3-2-unauthenticated-php-object-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30230.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30230.json index 16ff883bcca..70f1e8a82eb 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30230.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30230.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30230", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-28T05:15:51.500", - "lastModified": "2024-11-21T09:11:29.843", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:39:31.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acowebs:pdf_invoices_and_packing_slips_for_woocommerce:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "1.3.8", + "matchCriteriaId": "6EDE7F8C-E849-4058-BE61-FBEEFA4F0316" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/pdf-invoices-and-packing-slips-for-woocommerce/wordpress-pdf-invoices-and-packing-slips-for-woocommerce-plugin-1-3-7-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/pdf-invoices-and-packing-slips-for-woocommerce/wordpress-pdf-invoices-and-packing-slips-for-woocommerce-plugin-1-3-7-php-object-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30236.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30236.json index 96b92b1aaed..7e4d5f6be65 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30236.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30236.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30236", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-28T05:15:51.687", - "lastModified": "2024-11-21T09:11:30.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:39:14.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "21.3.5", + "matchCriteriaId": "8893A281-7B94-4AD2-A87C-905949FD332C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/contest-gallery/wordpress-contest-gallery-plugin-21-3-4-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/contest-gallery/wordpress-contest-gallery-plugin-21-3-4-sql-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30483.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30483.json index d2c027f43ff..52704ac5374 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30483.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30483.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30483", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T13:15:14.940", - "lastModified": "2024-11-21T09:12:00.800", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T17:05:11.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpsimplesponsorships:simple_sponsorship:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.5.1", + "matchCriteriaId": "442CD134-08CF-423E-8E44-3CD3DC478463" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-sponsors/wordpress-sponsors-plugin-3-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-sponsors/wordpress-sponsors-plugin-3-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30488.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30488.json index b68027a2cf0..ea3faff9f8a 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30488.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30488.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30488", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T14:15:11.247", - "lastModified": "2024-11-21T09:12:01.450", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T17:01:49.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:katieseaborn:zotpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.3.8", + "matchCriteriaId": "C96DE61F-EA12-41CD-9772-4C613E6F4E8D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/zotpress/wordpress-zotpress-plugin-7-3-7-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/zotpress/wordpress-zotpress-plugin-7-3-7-sql-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30503.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30503.json index aa3b837da6c..91a61511c51 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30503.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30503.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30503", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T13:15:15.163", - "lastModified": "2024-11-21T09:12:03.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T17:04:31.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mailster:mailster:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.0.7", + "matchCriteriaId": "09A82B17-81FF-4371-9721-0AE7A1710D42" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/mailster/wordpress-mailster-plugin-4-0-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/mailster/wordpress-mailster-plugin-4-0-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30519.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30519.json index 37d83f66a57..8fc671bec45 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30519.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30519", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T13:15:15.353", - "lastModified": "2024-11-21T09:12:05.373", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T17:03:57.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lordicon:lordicon_animated_icons:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.1", + "matchCriteriaId": "4B923312-DEDA-4876-AA7F-FE06BF8415C9" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/lordicon-interactive-icons/wordpress-lordicon-animated-icons-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/lordicon-interactive-icons/wordpress-lordicon-animated-icons-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30520.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30520.json index 47601af4388..934b6e3deba 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30520.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30520.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30520", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T13:15:15.597", - "lastModified": "2024-11-21T09:12:05.497", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T17:03:29.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webdevocean:carousel_anything:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1", + "matchCriteriaId": "19718317-DBC5-40B6-BA1E-5E1A112D39B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/carousel-anything/wordpress-carousel-anything-for-wpbakery-page-builder-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/carousel-anything/wordpress-carousel-anything-for-wpbakery-page-builder-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31240.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31240.json index 9316b025233..6337c8bf06f 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31240.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31240.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31240", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-10T16:15:12.047", - "lastModified": "2024-11-21T09:13:06.373", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:34:32.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infotheme:wp_poll_maker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4", + "matchCriteriaId": "4CDD1BD5-9FD2-49F9-998E-A25CEA5DFE4C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/epoll-wp-voting/wordpress-wp-poll-maker-plugin-3-1-subscriber-arbitrary-file-deletion-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/epoll-wp-voting/wordpress-wp-poll-maker-plugin-3-1-subscriber-arbitrary-file-deletion-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31245.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31245.json index d6b5c1eefca..fe2364f6de4 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31245.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31245.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31245", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-10T16:15:12.257", - "lastModified": "2024-11-21T09:13:06.973", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:35:33.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:convertkit:convertkit_-_email_marketing\\,_email_newsletter_and_landing_pages:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.6", + "matchCriteriaId": "235F587D-FEAE-42F9-9FDE-5E9C1AB48E01" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/convertkit/wordpress-convertkit-plugin-2-4-5-email-disclosure-in-log-file-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/convertkit/wordpress-convertkit-plugin-2-4-5-email-disclosure-in-log-file-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31247.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31247.json index 59dbcfc97b2..1174215de14 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31247.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31247.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31247", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-10T16:15:12.470", - "lastModified": "2024-11-21T09:13:07.353", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:36:09.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fredericgilles:fg_drupal:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.71.0", + "matchCriteriaId": "037D5104-6126-4950-BADE-8C72AD299C8B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/fg-drupal-to-wp/wordpress-fg-drupal-to-wordpress-plugin-3-70-3-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/fg-drupal-to-wp/wordpress-fg-drupal-to-wordpress-plugin-3-70-3-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31249.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31249.json index 70fe34e879f..a6c538a870e 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31249.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31249.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31249", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-10T16:15:12.670", - "lastModified": "2024-11-21T09:13:07.600", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:36:41.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpkube:subscribe_to_comments_reloaded:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "240119", + "matchCriteriaId": "31A32E78-8332-4B20-B597-0A34E48353DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/subscribe-to-comments-reloaded/wordpress-subscribe-to-comments-reloaded-plugin-220725-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/subscribe-to-comments-reloaded/wordpress-subscribe-to-comments-reloaded-plugin-220725-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31253.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31253.json index 3f6fde4289f..9d0f5bc5358 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31253.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31253.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31253", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-10T16:15:12.867", - "lastModified": "2024-11-21T09:13:08.120", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:37:25.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-oauth:wp_oauth_server:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.4.0", + "matchCriteriaId": "F9E4A526-839D-49D9-8FDD-4ACBCE57E886" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/oauth2-provider/wordpress-wp-oauth-server-oauth-authentication-plugin-4-3-3-open-redirection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/oauth2-provider/wordpress-wp-oauth-server-oauth-authentication-plugin-4-3-3-open-redirection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31254.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31254.json index cc91b3a26be..61623e7c645 100644 --- a/CVE-2024/CVE-2024-312xx/CVE-2024-31254.json +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31254.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31254", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-10T16:15:13.073", - "lastModified": "2024-11-21T09:13:08.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:37:46.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webtoffee:backup_and_migration:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.8", + "matchCriteriaId": "F81E07B6-25F9-49FE-977D-4495334178CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-migration-duplicator/wordpress-wordpress-backup-migration-plugin-1-4-7-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/wp-migration-duplicator/wordpress-wordpress-backup-migration-plugin-1-4-7-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3685.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3685.json index c9abbeabe16..4819dd68f3b 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3685.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3685.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3685", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-12T13:15:20.653", - "lastModified": "2024-11-21T09:30:10.530", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:38:03.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7.112:*:*:*:*:*:*:*", + "matchCriteriaId": "A03BA3DE-8692-483B-AD78-AC288D0250DD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Echosssy/CVE/blob/main/Dedecms%E6%9C%80%E6%96%B0%E7%89%88SQL%E6%B3%A8%E5%85%A5.docx", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260472", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260472", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.309447", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Echosssy/CVE/blob/main/Dedecms%E6%9C%80%E6%96%B0%E7%89%88SQL%E6%B3%A8%E5%85%A5.docx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.260472", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260472", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.309447", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3686.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3686.json index ff0ae98611c..d1ecef5a417 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3686.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3686.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3686", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-12T14:15:08.003", - "lastModified": "2024-11-21T09:30:10.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:29:52.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,40 +94,97 @@ "value": "CWE-24" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7.112:*:*:*:*:*:*:*", + "matchCriteriaId": "A03BA3DE-8692-483B-AD78-AC288D0250DD" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Echosssy/CVE/blob/main/Dedecms%E6%9C%80%E6%96%B0%E7%89%88%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4%E7%BB%95%E8%BF%87.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.260473", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260473", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.309454", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Echosssy/CVE/blob/main/Dedecms%E6%9C%80%E6%96%B0%E7%89%88%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4%E7%BB%95%E8%BF%87.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.260473", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260473", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.309454", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3767.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3767.json index d57f3364b9c..5de9a9e2ab8 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3767.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3767.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3767", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-15T04:15:15.340", - "lastModified": "2024-11-21T09:30:21.423", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:30:20.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:news_portal_project:4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C7A22B1B-0F21-4439-BCFD-81EAB5F70C3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%203.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260614", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260614", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.316290", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%203.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260614", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260614", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.316290", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3768.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3768.json index 42b314cdd35..056240fe999 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3768.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3768.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3768", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-15T04:15:15.673", - "lastModified": "2024-11-21T09:30:21.563", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:30:31.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -120,46 +140,103 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:news_portal_project:4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C7A22B1B-0F21-4439-BCFD-81EAB5F70C3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%204.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/L1OudFd8cl09/CVE/blob/main/25_07_2024_b.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260615", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260615", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.316291", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%204.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/L1OudFd8cl09/CVE/blob/main/25_07_2024_b.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.260615", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.260615", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.316291", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3775.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3775.json index a563736844d..cc6e0566f19 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3775.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3775", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-04-15T04:15:16.137", - "lastModified": "2024-11-21T09:30:22.403", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:30:51.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,14 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aenrich:a\\+hrd:6.8:*:*:*:*:*:*:*", + "matchCriteriaId": "CFF0E4AE-57D2-4778-8E19-77F585F85EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aenrich:a\\+hrd:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E60AA81B-7D96-4771-902A-FACF58130D97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aenrich:a\\+hrd:7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D47A8A-1486-4C86-84D0-6966CB015A79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aenrich:a\\+hrd:7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AFC4DCEB-8D0A-4836-B7F3-5DD18BBF4441" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7726-e5f70-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-7726-e5f70-1.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3776.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3776.json index f3e625e3a46..92948917616 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3776.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3776.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3776", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-04-15T04:15:16.340", - "lastModified": "2024-11-21T09:30:22.537", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:31:04.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netvision:airpass:2.9.0.231006:*:*:*:*:*:*:*", + "matchCriteriaId": "630BC49B-896E-4876-8A5F-53A85983D25E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7730-584e3-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-7730-584e3-1.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3777.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3777.json index 14da06b0500..381c4c257f2 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3777.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3777.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3777", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-04-15T04:15:16.553", - "lastModified": "2024-11-21T09:30:22.660", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:31:20.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ai3:qbibot:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57AA182A-EAE2-4304-803F-AF9A061002AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7732-9a54e-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-7732-9a54e-1.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3778.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3778.json index 60439048419..cfba214b3e6 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3778.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3778.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3778", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-04-15T04:15:16.747", - "lastModified": "2024-11-21T09:30:22.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T16:31:34.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ai3:qbibot:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57AA182A-EAE2-4304-803F-AF9A061002AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/tw/cp-132-7732-9a54e-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-7732-9a54e-1.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48887.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48887.json new file mode 100644 index 00000000000..c32e80877f0 --- /dev/null +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48887.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48887", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2025-04-08T17:15:34.440", + "lastModified": "2025-04-08T17:15:34.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-620" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-435", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52974.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52974.json new file mode 100644 index 00000000000..ceb9b1204ad --- /dev/null +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52974.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52974", + "sourceIdentifier": "bressers@elastic.co", + "published": "2025-04-08T17:15:34.653", + "lastModified": "2025-04-08T17:15:34.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue has been identified where a specially crafted request sent to an Observability API could cause the kibana server to crash.\n\nA successful attack requires a malicious user to have read permissions for Observability assigned to them." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.elastic.co/t/kibana-7-17-23-and-8-15-1-security-update-esa-2024-36/376923", + "source": "bressers@elastic.co" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52980.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52980.json new file mode 100644 index 00000000000..3c3115bac56 --- /dev/null +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52980.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52980", + "sourceIdentifier": "bressers@elastic.co", + "published": "2025-04-08T17:15:34.880", + "lastModified": "2025-04-08T17:15:34.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A flaw was discovered in Elasticsearch, where a large recursion using the innerForbidCircularReferences function of the PatternBank class could cause the Elasticsearch node to crash.\n\nA successful attack requires a malicious user to have read_pipeline Elasticsearch cluster privilege assigned to them." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.elastic.co/t/elasticsearch-8-15-1-security-update-esa-2024-34/376919", + "source": "bressers@elastic.co" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52981.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52981.json new file mode 100644 index 00000000000..3c4d1046122 --- /dev/null +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52981.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52981", + "sourceIdentifier": "bressers@elastic.co", + "published": "2025-04-08T17:15:35.187", + "lastModified": "2025-04-08T17:15:35.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Elasticsearch, where a large recursion using the Well-KnownText formatted string with nested GeometryCollection objects could cause a stackoverflow." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "bressers@elastic.co", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.elastic.co/t/elasticsearch-7-17-24-and-8-15-1-security-update-esa-2024-37/376924", + "source": "bressers@elastic.co" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57835.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57835.json index 84caefa28b7..d6560aa12dd 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57835.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57835.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57835", "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "published": "2025-04-05T16:15:32.143", - "lastModified": "2025-04-07T19:15:54.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:48:07.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,24 +49,64 @@ "value": "CWE-338" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-338" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nipotan:line_integration_for_amon2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.04", + "matchCriteriaId": "111E0891-2A13-4EFB-BFA7-24C832E4594F" + } + ] + } + ] } ], "references": [ { "url": "https://metacpan.org/release/SHLOMIF/String-Random-0.32/source/lib/String/Random.pm#L377", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Product" + ] }, { "url": "https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L235", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Product" + ] }, { "url": "https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L255", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Product" + ] }, { "url": "https://security.metacpan.org/docs/guides/random-data-for-security.html", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-581xx/CVE-2024-58131.json b/CVE-2024/CVE-2024-581xx/CVE-2024-58131.json index 2cd77cf5b66..dd9d969bf8f 100644 --- a/CVE-2024/CVE-2024-581xx/CVE-2024-58131.json +++ b/CVE-2024/CVE-2024-581xx/CVE-2024-58131.json @@ -2,8 +2,8 @@ "id": "CVE-2024-58131", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-06T03:15:13.967", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:45:17.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-821" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-662" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fisco-bcos:fisco-bcos:3.11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F3B2555C-B485-46AF-B5F2-926798817527" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/FISCO-BCOS/FISCO-BCOS/issues/4656", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/FISCO-BCOS/FISCO-BCOS/issues/4656", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1095.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1095.json new file mode 100644 index 00000000000..8bae2c4c82d --- /dev/null +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1095.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-1095", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-04-08T16:15:24.910", + "lastModified": "2025-04-08T16:15:24.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Personal Communications v14 and v15 include a Windows service that is vulnerable to local privilege escalation (LPE). The vulnerability allows any interactively logged in users on the target computer to run commands with full privileges in the context of NT AUTHORITY\\SYSTEM. This allows for a low privileged attacker to escalate their privileges. This vulnerability is due to an incomplete fix for CVE-2024-25029." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7230335", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2285.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2285.json new file mode 100644 index 00000000000..faa3d998c47 --- /dev/null +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2285.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2285", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-04-08T16:15:26.303", + "lastModified": "2025-04-08T16:15:26.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae \u00a0due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-457" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2286.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2286.json new file mode 100644 index 00000000000..65757f24f31 --- /dev/null +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2286.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2286", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-04-08T16:15:26.480", + "lastModified": "2025-04-08T16:15:26.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae \u00a0due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-457" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2287.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2287.json new file mode 100644 index 00000000000..8396b0c22fc --- /dev/null +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2287.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2287", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-04-08T16:15:26.620", + "lastModified": "2025-04-08T16:15:26.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae \u00a0due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-457" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2288.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2288.json new file mode 100644 index 00000000000..412cf25109f --- /dev/null +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2288.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2288", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-04-08T16:15:26.750", + "lastModified": "2025-04-08T16:15:26.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2293.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2293.json new file mode 100644 index 00000000000..b618fef7cd7 --- /dev/null +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2293.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2293", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-04-08T16:15:26.887", + "lastModified": "2025-04-08T16:15:26.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25226.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25226.json new file mode 100644 index 00000000000..904cd7346c1 --- /dev/null +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25226.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-25226", + "sourceIdentifier": "security@joomla.org", + "published": "2025-04-08T17:15:35.453", + "lastModified": "2025-04-08T17:15:35.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://developer.joomla.org/security-centre/963-20250401-framework-sql-injection-vulnerability-in-quotenamestr-method-of-database-package.html", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25227.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25227.json new file mode 100644 index 00000000000..d1080904dc1 --- /dev/null +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25227.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-25227", + "sourceIdentifier": "security@joomla.org", + "published": "2025-04-08T17:15:35.610", + "lastModified": "2025-04-08T17:15:35.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient state checks lead to a vector that allows to bypass 2FA checks." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://developer.joomla.org/security-centre/964-20250402-core-mfa-authentication-bypass.html", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27078.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27078.json new file mode 100644 index 00000000000..e0d676c7e2b --- /dev/null +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27078.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27078", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-04-08T16:15:25.683", + "lastModified": "2025-04-08T17:15:35.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in a system binary of AOS-8 Instant and AOS-10 AP could allow an authenticated remote attacker to inject commands into the underlying operating system while using the CLI. Successful exploitation could lead to complete system compromise." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04844en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27079.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27079.json new file mode 100644 index 00000000000..fe700916aec --- /dev/null +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27079.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27079", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-04-08T16:15:25.837", + "lastModified": "2025-04-08T17:15:35.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the file creation process on the command line interface of AOS-8 Instant and AOS-10 AP could allow an authenticated remote attacker to perform remote code execution (RCE). Successful exploitation could allow an attacker to execute arbitrary operating system commands on the underlying operating system leading to potential system compromise." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04844en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27082.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27082.json new file mode 100644 index 00000000000..d524ee1121e --- /dev/null +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27082.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-27082", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-04-08T17:15:36.233", + "lastModified": "2025-04-08T17:15:36.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Arbitrary File Write vulnerabilities exist in the web-based management interface of both the AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an Authenticated attacker to upload arbitrary files and execute arbitrary commands on the underlying host operating system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04845en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27083.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27083.json new file mode 100644 index 00000000000..44a9c2a3f44 --- /dev/null +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27083.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-27083", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-04-08T17:15:36.500", + "lastModified": "2025-04-08T17:15:36.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authenticated command injection vulnerabilities exist in the AOS-10 GW and AOS-8 Controller/Mobility Conductor web-based management interface. Successful exploitation of these vulnerabilities allows an Authenticated attacker to execute arbitrary commands as a privileged user on the underlying operating system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04845en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27084.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27084.json new file mode 100644 index 00000000000..6ccadf4266d --- /dev/null +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27084.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-27084", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-04-08T17:15:36.700", + "lastModified": "2025-04-08T17:15:36.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Captive Portal of an AOS-10 GW and AOS-8 Controller/Mobility Conductor could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack. Successful exploitation could enable the attacker to execute arbitrary script code in the victim's browser within the context of the affected interface." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04845en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27085.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27085.json new file mode 100644 index 00000000000..ba140b886ea --- /dev/null +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27085.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-27085", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-04-08T17:15:36.887", + "lastModified": "2025-04-08T17:15:36.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple vulnerabilities exist in the web-based management interface of AOS-10 GW and AOS-8 Controller/Mobility Conductor. Successful exploitation of these vulnerabilities could allow an authenticated, remote attacker to download arbitrary files from the filesystem of an affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04845en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27441.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27441.json new file mode 100644 index 00000000000..029577a6f8c --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27441.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27441", + "sourceIdentifier": "security@zoom.us", + "published": "2025-04-08T17:15:37.080", + "lastModified": "2025-04-08T17:15:37.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25013", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27442.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27442.json new file mode 100644 index 00000000000..981412c735c --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27442.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27442", + "sourceIdentifier": "security@zoom.us", + "published": "2025-04-08T17:15:37.487", + "lastModified": "2025-04-08T17:15:37.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross site scripting in some Zoom Workplace Apps may allow an unauthenticated user to conduct a loss of integrity via adjacent network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25013", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27443.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27443.json new file mode 100644 index 00000000000..1df71ba1eaf --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27443.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27443", + "sourceIdentifier": "security@zoom.us", + "published": "2025-04-08T17:15:38.113", + "lastModified": "2025-04-08T17:15:38.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure default variable initialization in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a loss of integrity via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.8, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25014", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-284xx/CVE-2025-28413.json b/CVE-2025/CVE-2025-284xx/CVE-2025-28413.json index 39f786467d3..8af8d2c2d8c 100644 --- a/CVE-2025/CVE-2025-284xx/CVE-2025-28413.json +++ b/CVE-2025/CVE-2025-284xx/CVE-2025-28413.json @@ -2,16 +2,55 @@ "id": "CVE-2025-28413", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T16:15:25.543", - "lastModified": "2025-04-07T16:15:25.543", + "lastModified": "2025-04-08T16:15:25.983", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the SysDictTypeController component" + }, + { + "lang": "es", + "value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del componente SysDictTypeController" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28413.md", @@ -20,6 +59,10 @@ { "url": "https://github.com/yangzongzhuan/RuoYi", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28413.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2829.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2829.json new file mode 100644 index 00000000000..d6354fe6c25 --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2829.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-2829", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-04-08T16:15:27.133", + "lastModified": "2025-04-08T16:15:27.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30401.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30401.json index c0803a07cf2..946883c1b3e 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30401.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30401.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30401", "sourceIdentifier": "cve-assign@fb.com", "published": "2025-04-05T12:15:14.540", - "lastModified": "2025-04-07T19:15:56.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:48:26.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "2.2450.6", + "matchCriteriaId": "2A3F57F6-8A7D-4EF5-9473-A36DF09278D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.facebook.com/security/advisories/cve-2025-30401", - "source": "cve-assign@fb.com" + "source": "cve-assign@fb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30670.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30670.json new file mode 100644 index 00000000000..a7a13710eea --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30670.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30670", + "sourceIdentifier": "security@zoom.us", + "published": "2025-04-08T17:15:38.413", + "lastModified": "2025-04-08T17:15:38.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25015", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30671.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30671.json new file mode 100644 index 00000000000..86ffc8d9c5e --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30671.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-30671", + "sourceIdentifier": "security@zoom.us", + "published": "2025-04-08T17:15:38.607", + "lastModified": "2025-04-08T17:15:38.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Null pointer dereference in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-25015", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32017.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32017.json new file mode 100644 index 00000000000..a4839ed135c --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32017.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-32017", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-08T16:15:27.320", + "lastModified": "2025-04-08T16:15:27.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Umbraco is a free and open source .NET content management system. Authenticated users to the Umbraco backoffice are able to craft management API request that exploit a path traversal vulnerability to upload files into a incorrect location. The issue affects Umbraco 14+ and is patched in 14.3.4 and 15.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/umbraco/Umbraco-CMS/commit/06a2a500b358ce15b1e228391eb60bd517c6e833", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/umbraco/Umbraco-CMS/commit/d3c1443b14b1076faf13d1bcecc42860fdf5fad8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-q62r-8ppj-xvf4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32018.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32018.json new file mode 100644 index 00000000000..ee5c729392c --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32018.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32018", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-08T16:15:27.487", + "lastModified": "2025-04-08T16:15:27.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cursor is a code editor built for programming with AI. In versions 0.45.0 through 0.48.6, the Cursor app introduced a regression affecting the set of file paths the Cursor Agent is permitted to modify automatically. Under specific conditions, the agent could be prompted, either directly by the user or via maliciously crafted context, to automatically write to files outside of the opened workspace. This behavior required deliberate prompting, making successful exploitation highly impractical in real-world scenarios. Furthermore, the edited file was still displayed in the UI as usual for user review, making it unlikely for the edit to go unnoticed by the user. This vulnerability is fixed in 0.48.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/getcursor/cursor/security/advisories/GHSA-qjh8-mh96-fc86", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32024.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32024.json new file mode 100644 index 00000000000..77bd8a38f1c --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32024.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-32024", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-08T16:15:27.703", + "lastModified": "2025-04-08T16:15:27.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "bep/imagemeta is a Go library for reading EXIF, IPTC and XMP image meta data from JPEG, TIFF, PNG, and WebP files. The EXIF data format allows for defining excessively large data structures in relatively small payloads. Before v0.10.0, If you didn't trust the input images, this could be abused to construct denial-of-service attacks. v0.10.0 added LimitNumTags (default 5000) and LimitTagSize (default 10000) options." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/bep/imagemeta/commit/4fd89616d8bf7f9bb892360d3fb19080ec2b4602", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/bep/imagemeta/security/advisories/GHSA-q7rw-w4cq-2j6w", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32025.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32025.json new file mode 100644 index 00000000000..f86553f40fa --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32025.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-32025", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-08T16:15:27.873", + "lastModified": "2025-04-08T16:15:27.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "bep/imagemeta is a Go library for reading EXIF, IPTC and XMP image meta data from JPEG, TIFF, PNG, and WebP files. The buffer created for parsing metadata for PNG and WebP images was only bounded by their input data type, which could lead to potentially large memory allocation, and unreasonably high for image metadata. Before v0.11.0, If you didn't trust the input images, this could be abused to construct denial-of-service attacks. v0.11.0 added a 10 MB upper limit." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/bep/imagemeta/commit/ee0de9b029f4e82106729f69559f27c9a404229d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/bep/imagemeta/security/advisories/GHSA-fmhh-rw3h-785m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32026.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32026.json new file mode 100644 index 00000000000..1d4fa0040f0 --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32026.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32026", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-08T16:15:28.023", + "lastModified": "2025-04-08T16:15:28.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Element Web is a Matrix web client built using the Matrix React SDK. Element Web, starting from version 1.11.16 up to version 1.11.96, can be configured to load Element Call from an external URL. Under certain conditions, the external page is able to get access to the media encryption keys used for an Element Call call. Version 1.11.97 fixes the problem." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/element-hq/element-web/security/advisories/GHSA-69q3-jg79-cg79", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32028.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32028.json new file mode 100644 index 00000000000..d602fa1f598 --- /dev/null +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32028.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32028", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-08T16:15:28.180", + "lastModified": "2025-04-08T16:15:28.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HAX CMS PHP allows you to manage your microsite universe with PHP backend. Multiple file upload functions within the HAX CMS PHP application call a \u2019save\u2019 function in \u2019HAXCMSFile.php\u2019. This save function uses a denylist to block specific file types from being uploaded to the server. This list is non-exhaustive and only blocks \u2019.php\u2019, \u2019.sh\u2019, \u2019.js\u2019, and \u2019.css\u2019 files. The existing logic causes the system to \"fail open\" rather than \"fail closed.\" This vulnerability is fixed in 10.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-vj5q-3jv2-cg5p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32117.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32117.json new file mode 100644 index 00000000000..272cf3dc736 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32117.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32117", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-08T17:15:38.837", + "lastModified": "2025-04-08T17:15:38.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OTWthemes Widgetize Pages Light allows Reflected XSS. This issue affects Widgetize Pages Light: from n/a through 3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/widgetize-pages-light/vulnerability/wordpress-widgetize-pages-light-plugin-3-0-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32164.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32164.json new file mode 100644 index 00000000000..af41915e25b --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32164.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32164", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-08T17:15:39.143", + "lastModified": "2025-04-08T17:15:39.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in maennchen1.de m1.DownloadList. This issue affects m1.DownloadList: from n/a through 0.21." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/m1downloadlist/vulnerability/wordpress-m1-downloadlist-plugin-0-21-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32211.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32211.json new file mode 100644 index 00000000000..fd2c8aa8453 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32211.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32211", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-08T17:15:39.407", + "lastModified": "2025-04-08T17:15:39.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Broadstreet Broadstreet allows Stored XSS. This issue affects Broadstreet: from n/a through 1.51.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/broadstreet/vulnerability/wordpress-broadstreet-plugin-1-51-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32279.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32279.json new file mode 100644 index 00000000000..9689fbd4ca0 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32279.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32279", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-08T17:15:39.600", + "lastModified": "2025-04-08T17:15:39.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Shahjada Live Forms. This issue affects Live Forms: from n/a through 4.8.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/liveforms/vulnerability/wordpress-live-forms-plugin-4-8-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32369.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32369.json index c18cad4ef13..a53d6899c56 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32369.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32369.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32369", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-06T06:15:15.470", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T17:27:42.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kentico:xperience:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0.181", + "matchCriteriaId": "10B62A1E-3257-4208-8F1F-3E584EF14233" + } + ] + } + ] } ], "references": [ { "url": "https://devnet.kentico.com/download/hotfixes", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://labs.watchtowr.com/xss-to-rce-by-abusing-custom-file-handlers-kentico-xperience-cms-cve-2025-2748/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32409.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32409.json index 1eeca901f12..4f17db5ab55 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32409.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32409.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32409", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T22:15:16.963", - "lastModified": "2025-04-07T22:15:16.963", + "lastModified": "2025-04-08T16:15:28.547", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ratta SuperNote A6 X2 Nomad before December 2024 allows remote code execution because an arbitrary firmware image (signed with debug keys) can be sent to TCP port 60002, and placed into the correct image-update location as a consequence of both directory traversal and unintended handling of concurrency." + }, + { + "lang": "es", + "value": "Ratta SuperNote A6 X2 Nomad antes de diciembre de 2024 permite la ejecuci\u00f3n remota de c\u00f3digo porque se puede enviar una imagen de firmware arbitraria (firmada con claves de depuraci\u00f3n) al puerto TCP 60002 y colocarla en la ubicaci\u00f3n de actualizaci\u00f3n de imagen correcta como consecuencia tanto de directory traversal como de la gesti\u00f3n no intencionado de la simultaneidad." } ], "metrics": { @@ -51,6 +55,10 @@ { "url": "https://www.prizmlabs.io/post/remote-rootkits-uncovering-a-0-click-rce-in-the-supernote-nomad-e-ink-tablet", "source": "cve@mitre.org" + }, + { + "url": "https://www.prizmlabs.io/post/remote-rootkits-uncovering-a-0-click-rce-in-the-supernote-nomad-e-ink-tablet", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3206.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3206.json index 2c5385c1707..2077d1a88bb 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3206.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3206.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3206", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-04T04:15:39.357", - "lastModified": "2025-04-07T14:18:15.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T17:59:46.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B669C3F2-082D-4374-B9E6-FDE5539B20CF" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/19", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303160", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303160", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.545895", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/19", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3207.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3207.json index 944b1967af0..0026908aa98 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3207.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3207.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3207", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-04T04:15:39.603", - "lastModified": "2025-04-07T14:18:15.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T17:56:53.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:patient_record_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3A18F6F3-1FDD-4D63-BFB1-6E520B4EAA45" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/2364490073/cve1/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303161", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303161", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.545934", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/2364490073/cve1/blob/main/README.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3208.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3208.json index 67fb84f1ef8..4ad83aa6ec3 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3208.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3208.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3208", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-04T05:15:46.367", - "lastModified": "2025-04-07T14:18:15.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T17:48:42.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:patient_record_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3A18F6F3-1FDD-4D63-BFB1-6E520B4EAA45" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ZOKEYE/CVE/blob/main/cve2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303162", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303162", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.545960", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/ZOKEYE/CVE/blob/main/cve2.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3210.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3210.json index 4310df8247e..70e77c2851c 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3210.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3210.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3210", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-04T05:15:46.817", - "lastModified": "2025-04-07T14:18:15.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T17:43:12.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:patient_record_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3A18F6F3-1FDD-4D63-BFB1-6E520B4EAA45" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/yujiyuji159/cve/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303164", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303164", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.545962", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/yujiyuji159/cve/blob/main/README.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3285.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3285.json new file mode 100644 index 00000000000..15f421c43a4 --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3285.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-3285", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-04-08T16:15:28.690", + "lastModified": "2025-04-08T16:15:28.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3286.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3286.json new file mode 100644 index 00000000000..3dc8fbd6b1b --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3286.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-3286", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-04-08T16:15:28.840", + "lastModified": "2025-04-08T16:15:28.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3287.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3287.json new file mode 100644 index 00000000000..8258200f561 --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3287.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-3287", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-04-08T16:15:28.980", + "lastModified": "2025-04-08T16:15:28.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3288.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3288.json new file mode 100644 index 00000000000..7c25c4f7dac --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3288.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-3288", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-04-08T16:15:29.120", + "lastModified": "2025-04-08T16:15:29.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae\u00a0due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data. \u00a0If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3289.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3289.json new file mode 100644 index 00000000000..c4678ac576c --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3289.json @@ -0,0 +1,66 @@ +{ + "id": "CVE-2025-3289", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2025-04-08T16:15:29.253", + "lastModified": "2025-04-08T16:15:29.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local code execution vulnerability exists in the Rockwell Automation\u00a0Arena\u00ae due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3296.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3296.json index 61216d41ff6..881d1284995 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3296.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3296.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3296", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-05T08:15:13.787", - "lastModified": "2025-04-07T17:15:38.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:49:21.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/foreverfeifei/cve/blob/main/sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.303491", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303491", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.549932", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/foreverfeifei/cve/blob/main/sql.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3297.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3297.json index 2ddc27ac21a..e11d5502495 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3297.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3297.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3297", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-05T09:15:15.237", - "lastModified": "2025-04-07T17:15:38.387", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:49:12.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/foreverfeifei/cve/blob/main/xss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.303492", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303492", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.549982", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/foreverfeifei/cve/blob/main/xss.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3298.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3298.json index 2cd3e279db2..345ca2ac393 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3298.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3298.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3298", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-05T11:15:40.917", - "lastModified": "2025-04-07T17:15:38.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:49:00.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/foreverfeifei/cve/blob/main/user.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.303493", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303493", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.550010", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/foreverfeifei/cve/blob/main/user.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3299.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3299.json index 833763b3e70..bfe93283782 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3299.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3299.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3299", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-05T11:15:41.180", - "lastModified": "2025-04-07T17:15:38.713", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:48:45.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,30 +124,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:men_salon_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "06009EBA-F4B6-4CC8-8366-72B4A1552FA3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LaneyYu/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.303494", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303494", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.550185", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/LaneyYu/cve/issues/1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3305.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3305.json index 25721efc755..97eb5a918d3 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3305.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3305.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3305", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-05T23:15:41.780", - "lastModified": "2025-04-07T16:15:26.767", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-08T16:46:55.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -124,26 +124,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1902756969:ikun_library:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A42A18EC-38D0-4A4D-A9BD-015B951BBAEB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/IKUN_Library-authority.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.303502", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303502", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.550186", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/buluorifu/Vulnerability-recurrence/blob/main/Refer/IKUN_Library-authority.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3308.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3308.json index 80403b86f8b..c624c71c8ce 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3308.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3308.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3308", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-06T04:15:15.887", - "lastModified": "2025-04-07T15:15:45.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-08T17:38:09.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,85 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4F53F723-1E87-4190-A902-24A47378C80B" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/p1026/CVE/issues/25", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.303505", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303505", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.550193", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/p1026/CVE/issues/25", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3381.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3381.json index 1ebdb562249..78f43ed25d7 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3381.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3381.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3381", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T20:15:21.760", - "lastModified": "2025-04-07T20:15:21.760", + "lastModified": "2025-04-08T16:15:29.563", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in zhangyanbo2007 youkefu 4.2.0. This affects an unknown part of the file WebIMController.java of the component File Upload. The manipulation of the argument ID leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en zhangyanbo2007 youkefu 4.2.0. Esta afecta a una parte desconocida del archivo WebIMController.java del componente File Upload. La manipulaci\u00f3n del ID del argumento provoca un cruce de rutas. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?submit.552369", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/mapl3miss/uckefuVul/blob/main/uckefu-upload.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3382.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3382.json index 602fbc4253b..d7c04db91a7 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3382.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3382.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3382", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T20:15:21.943", - "lastModified": "2025-04-07T20:15:21.943", + "lastModified": "2025-04-08T16:15:29.780", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in joey-zhou xiaozhi-esp32-server-java up to a14fe8115842ee42ab5c7a51706b8a85db5200b7 and classified as critical. This vulnerability affects the function update of the file /api/user/update. The manipulation of the argument state leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en joey-zhou xiaozhi-esp32-server-java hasta a14fe8115842ee42ab5c7a51706b8a85db5200b7, clasificada como cr\u00edtica. Esta vulnerabilidad afecta la funci\u00f3n de actualizaci\u00f3n del archivo /api/user/update. La manipulaci\u00f3n del estado del argumento provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza una versi\u00f3n continua para garantizar una distribuci\u00f3n continua. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las actualizadas." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.552387", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/exp3n5ive/Vul/blob/main/xiaozhi-sqli/xiaozhi-sqli.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3383.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3383.json index 9e673386d9d..112745045c5 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3383.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3383.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3383", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T21:15:43.850", - "lastModified": "2025-04-07T21:15:43.850", + "lastModified": "2025-04-08T16:15:29.913", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Web-based Pharmacy Product Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /search/search_sales.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Web-based Pharmacy Product Management System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /search/search_sales.php. La manipulaci\u00f3n del argumento \"Nombre\" provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.sourcecodester.com/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Colorado-all/cve/blob/main/Web-based%20Pharmacy%20Product%20Management%20System/SQL-1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3384.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3384.json index 2f24e854d8b..e7fe9f64cdc 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3384.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3384.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3384", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T21:15:44.053", - "lastModified": "2025-04-07T21:15:44.053", + "lastModified": "2025-04-08T16:15:30.047", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in 1000 Projects Human Resource Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /controller/employee.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en 1000 Projects Human Resource Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /controller/employee.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.552447", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/onupset/CVE/issues/7", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3385.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3385.json index 1d681c054d8..37894bc92ef 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3385.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3385.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3385", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T22:15:17.137", - "lastModified": "2025-04-07T22:15:17.137", + "lastModified": "2025-04-08T16:15:30.180", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in LinZhaoguan pb-cms 2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Classification Management Page. The manipulation of the argument Classification name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en LinZhaoguan pb-cms 2.0. Se ha declarado problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del componente P\u00e1gina de Gesti\u00f3n de Clasificaci\u00f3n. La manipulaci\u00f3n del argumento \"Nombre de la clasificaci\u00f3n\" provoca ataques de cross site scripting. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?id.303631", "source": "cna@vuldb.com" + }, + { + "url": "https://gitee.com/LinZhaoguan/pb-cms/issues/IBN3S0", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3386.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3386.json index 39cc705eb5d..b3350561a1a 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3386.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3386.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3386", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T22:15:17.337", - "lastModified": "2025-04-07T22:15:17.337", + "lastModified": "2025-04-08T16:15:30.307", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in LinZhaoguan pb-cms 2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin#links of the component Friendship Link Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en LinZhaoguan pb-cms 2.0. Se ha clasificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /admin#links del componente Friendship Link Handler. Esta manipulaci\u00f3n provoca Cross-Site Scripting. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?id.303632", "source": "cna@vuldb.com" + }, + { + "url": "https://gitee.com/LinZhaoguan/pb-cms/issues/IBN3MW", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3392.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3392.json index 57befb6d8de..6bb864d9c3a 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3392.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3392.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3392", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T02:15:21.227", - "lastModified": "2025-04-08T02:15:21.227", + "lastModified": "2025-04-08T16:15:30.430", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in hailey888 oa_system up to 2025.01.01 and classified as problematic. Affected by this issue is the function Save of the file cn/gson/oasys/controller/mail/MailController.java of the component Backend. The manipulation of the argument MailNumberId leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una vulnerabilidad en hailey888 oa_system hasta la versi\u00f3n 2025.01.01, clasificada como problem\u00e1tica. Este problema afecta a la funci\u00f3n \"Guardar\" del archivo cn/gson/oasys/controller/mail/MailController.java del componente Backend. La manipulaci\u00f3n del argumento MailNumberId provoca ataques de cross site scripting. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto utiliza la entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de versiones actualizadas." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?id.303638", "source": "cna@vuldb.com" + }, + { + "url": "https://gitee.com/hailey888/oa_system/issues/IBRQZ9", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3399.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3399.json index 735a8a9d1cf..ffa2dcb9fd9 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3399.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3399.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3399", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T02:15:21.980", - "lastModified": "2025-04-08T02:15:21.980", + "lastModified": "2025-04-08T16:15:30.563", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in ESAFENET CDG 5.6.3.154.205_20250114. Affected by this issue is some unknown functionality of the file /pubinfo/updateNotice.jsp. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 5.6.3.154.205_20250114. Este problema afecta a una funcionalidad desconocida del archivo /pubinfo/updateNotice.jsp. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.525610", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/MTA%3D.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3400.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3400.json index 4a7318f4a7e..6a5d0c66972 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3400.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3400.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3400", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T02:15:22.167", - "lastModified": "2025-04-08T02:15:22.167", + "lastModified": "2025-04-08T16:15:30.730", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in ESAFENET CDG 5.6.3.154.205_20250114. This affects an unknown part of the file /client/UnChkMailApplication.jsp. The manipulation of the argument typename leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en ESAFENET CDG 5.6.3.154.205_20250114. Esta afecta a una parte desconocida del archivo /client/UnChkMailApplication.jsp. La manipulaci\u00f3n del argumento typename provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.525611", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/NA%3D%3D.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3408.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3408.json index 1efc0b47218..cc245700f18 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3408.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3408.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3408", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T04:15:32.077", - "lastModified": "2025-04-08T04:15:32.077", + "lastModified": "2025-04-08T16:15:30.873", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Nothings stb up to f056911. It has been rated as critical. Affected by this issue is the function stb_dupreplace. The manipulation leads to integer overflow. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Nothings stb hasta f056911. Se ha clasificado como cr\u00edtica. Este problema afecta a la funci\u00f3n stb_dupreplace. La manipulaci\u00f3n provoca un desbordamiento de enteros. El ataque puede ejecutarse remotamente. Este producto utiliza un sistema de entrega continua con versiones progresivas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?submit.544230", "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.544230", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3410.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3410.json index 3b50c7291c5..d34ec70b52a 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3410.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3410.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3410", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T05:15:40.243", - "lastModified": "2025-04-08T05:15:40.243", + "lastModified": "2025-04-08T16:15:31.110", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in mymagicpower AIAS 20250308. This vulnerability affects unknown code of the file training_platform/train-platform/src/main/java/top/aias/training/controller/LocalStorageController.java. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en mymagicpower AIAS 20250308. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo training_platform/train-platform/src/main/java/top/aias/training/controller/LocalStorageController.java. La manipulaci\u00f3n del argumento \"File\" permite la carga sin restricciones. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.544243", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Tr0e/CVE_Hunter/blob/main/AIAS/AIAS_RCE.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3411.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3411.json index e80a9e595df..457cb01d9fd 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3411.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3411.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3411", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T05:15:40.423", - "lastModified": "2025-04-08T05:15:40.423", + "lastModified": "2025-04-08T16:15:31.250", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in mymagicpower AIAS 20250308. This issue affects some unknown processing of the file 3_api_platform/api-platform/src/main/java/top/aias/platform/controller/AsrController.java. The manipulation of the argument url leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en mymagicpower AIAS 20250308. Este problema afecta a un procesamiento desconocido del archivo 3_api_platform/api-platform/src/main/java/top/aias/platform/controller/AsrController.java. La manipulaci\u00f3n del argumento URL provoca server-side request forgery. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?submit.544288", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Tr0e/CVE_Hunter/blob/main/AIAS/AIAS_SSRF1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3412.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3412.json index 548b70b0c58..b9e0c26d466 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3412.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3412.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3412", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T06:15:44.970", - "lastModified": "2025-04-08T06:15:44.970", + "lastModified": "2025-04-08T16:15:31.370", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in mymagicpower AIAS 20250308. Affected is an unknown function of the file 2_training_platform/train-platform/src/main/java/top/aias/training/controller/InferController.java. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en mymagicpower AIAS 20250308. Se ve afectada una funci\u00f3n desconocida del archivo 2_training_platform/train-platform/src/main/java/top/aias/training/controller/InferController.java. La manipulaci\u00f3n del argumento URL provoca server-side request forgery. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?submit.544289", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Tr0e/CVE_Hunter/blob/main/AIAS/AIAS_SSRF2.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3413.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3413.json index 251022c8957..d547bf033e2 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3413.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3413.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3413", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-08T06:15:45.333", - "lastModified": "2025-04-08T06:15:45.333", + "lastModified": "2025-04-08T16:15:31.493", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in opplus springboot-admin up to a2d5310f44fd46780a8686456cf2f9001ab8f024 and classified as critical. Affected by this vulnerability is the function code of the file SysGeneratorController.java. The manipulation of the argument Tables leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en opplus springboot-admin hasta a2d5310f44fd46780a8686456cf2f9001ab8f024, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo de funci\u00f3n del archivo SysGeneratorController.java. La manipulaci\u00f3n del argumento \"Tables\" provoca la deserializaci\u00f3n. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Este producto no utiliza control de versiones. Por ello, no hay informaci\u00f3n disponible sobre las versiones afectadas y no afectadas. Se contact\u00f3 al proveedor con antelaci\u00f3n para informarle sobre esta divulgaci\u00f3n, pero no respondi\u00f3." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.545374", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/mapl3miss/Vul/blob/main/Vul.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 15e9e9923b4..93c4f8a443c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-08T16:00:20.493833+00:00 +2025-04-08T18:00:20.362308+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-08T15:59:36.357000+00:00 +2025-04-08T17:59:46.877000+00:00 ``` ### Last Data Feed Release @@ -33,65 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -289037 +289076 ``` ### CVEs added in the last Commit -Recently added CVEs: `21` +Recently added CVEs: `39` -- [CVE-2023-37930](CVE-2023/CVE-2023-379xx/CVE-2023-37930.json) (`2025-04-08T14:15:30.653`) -- [CVE-2024-26013](CVE-2024/CVE-2024-260xx/CVE-2024-26013.json) (`2025-04-08T14:15:30.863`) -- [CVE-2024-32122](CVE-2024/CVE-2024-321xx/CVE-2024-32122.json) (`2025-04-08T14:15:31.040`) -- [CVE-2024-46671](CVE-2024/CVE-2024-466xx/CVE-2024-46671.json) (`2025-04-08T14:15:31.740`) -- [CVE-2024-50565](CVE-2024/CVE-2024-505xx/CVE-2024-50565.json) (`2025-04-08T14:15:31.920`) -- [CVE-2024-52962](CVE-2024/CVE-2024-529xx/CVE-2024-52962.json) (`2025-04-08T14:15:32.097`) -- [CVE-2024-54024](CVE-2024/CVE-2024-540xx/CVE-2024-54024.json) (`2025-04-08T14:15:32.303`) -- [CVE-2024-54025](CVE-2024/CVE-2024-540xx/CVE-2024-54025.json) (`2025-04-08T14:15:32.463`) -- [CVE-2025-22458](CVE-2025/CVE-2025-224xx/CVE-2025-22458.json) (`2025-04-08T15:15:48.857`) -- [CVE-2025-22459](CVE-2025/CVE-2025-224xx/CVE-2025-22459.json) (`2025-04-08T15:15:49.020`) -- [CVE-2025-22461](CVE-2025/CVE-2025-224xx/CVE-2025-22461.json) (`2025-04-08T15:15:49.167`) -- [CVE-2025-22464](CVE-2025/CVE-2025-224xx/CVE-2025-22464.json) (`2025-04-08T15:15:49.310`) -- [CVE-2025-22465](CVE-2025/CVE-2025-224xx/CVE-2025-22465.json) (`2025-04-08T15:15:49.473`) -- [CVE-2025-22466](CVE-2025/CVE-2025-224xx/CVE-2025-22466.json) (`2025-04-08T15:15:49.620`) -- [CVE-2025-22855](CVE-2025/CVE-2025-228xx/CVE-2025-22855.json) (`2025-04-08T14:15:32.690`) -- [CVE-2025-25254](CVE-2025/CVE-2025-252xx/CVE-2025-25254.json) (`2025-04-08T14:15:32.857`) -- [CVE-2025-30150](CVE-2025/CVE-2025-301xx/CVE-2025-30150.json) (`2025-04-08T14:15:34.540`) -- [CVE-2025-30151](CVE-2025/CVE-2025-301xx/CVE-2025-30151.json) (`2025-04-08T14:15:34.737`) -- [CVE-2025-31498](CVE-2025/CVE-2025-314xx/CVE-2025-31498.json) (`2025-04-08T14:15:35.293`) -- [CVE-2025-32020](CVE-2025/CVE-2025-320xx/CVE-2025-32020.json) (`2025-04-08T15:15:50.430`) -- [CVE-2025-32406](CVE-2025/CVE-2025-324xx/CVE-2025-32406.json) (`2025-04-08T15:15:50.677`) +- [CVE-2025-27082](CVE-2025/CVE-2025-270xx/CVE-2025-27082.json) (`2025-04-08T17:15:36.233`) +- [CVE-2025-27083](CVE-2025/CVE-2025-270xx/CVE-2025-27083.json) (`2025-04-08T17:15:36.500`) +- [CVE-2025-27084](CVE-2025/CVE-2025-270xx/CVE-2025-27084.json) (`2025-04-08T17:15:36.700`) +- [CVE-2025-27085](CVE-2025/CVE-2025-270xx/CVE-2025-27085.json) (`2025-04-08T17:15:36.887`) +- [CVE-2025-27441](CVE-2025/CVE-2025-274xx/CVE-2025-27441.json) (`2025-04-08T17:15:37.080`) +- [CVE-2025-27442](CVE-2025/CVE-2025-274xx/CVE-2025-27442.json) (`2025-04-08T17:15:37.487`) +- [CVE-2025-27443](CVE-2025/CVE-2025-274xx/CVE-2025-27443.json) (`2025-04-08T17:15:38.113`) +- [CVE-2025-2829](CVE-2025/CVE-2025-28xx/CVE-2025-2829.json) (`2025-04-08T16:15:27.133`) +- [CVE-2025-30670](CVE-2025/CVE-2025-306xx/CVE-2025-30670.json) (`2025-04-08T17:15:38.413`) +- [CVE-2025-30671](CVE-2025/CVE-2025-306xx/CVE-2025-30671.json) (`2025-04-08T17:15:38.607`) +- [CVE-2025-32017](CVE-2025/CVE-2025-320xx/CVE-2025-32017.json) (`2025-04-08T16:15:27.320`) +- [CVE-2025-32018](CVE-2025/CVE-2025-320xx/CVE-2025-32018.json) (`2025-04-08T16:15:27.487`) +- [CVE-2025-32024](CVE-2025/CVE-2025-320xx/CVE-2025-32024.json) (`2025-04-08T16:15:27.703`) +- [CVE-2025-32025](CVE-2025/CVE-2025-320xx/CVE-2025-32025.json) (`2025-04-08T16:15:27.873`) +- [CVE-2025-32026](CVE-2025/CVE-2025-320xx/CVE-2025-32026.json) (`2025-04-08T16:15:28.023`) +- [CVE-2025-32028](CVE-2025/CVE-2025-320xx/CVE-2025-32028.json) (`2025-04-08T16:15:28.180`) +- [CVE-2025-32117](CVE-2025/CVE-2025-321xx/CVE-2025-32117.json) (`2025-04-08T17:15:38.837`) +- [CVE-2025-32164](CVE-2025/CVE-2025-321xx/CVE-2025-32164.json) (`2025-04-08T17:15:39.143`) +- [CVE-2025-32211](CVE-2025/CVE-2025-322xx/CVE-2025-32211.json) (`2025-04-08T17:15:39.407`) +- [CVE-2025-32279](CVE-2025/CVE-2025-322xx/CVE-2025-32279.json) (`2025-04-08T17:15:39.600`) +- [CVE-2025-3285](CVE-2025/CVE-2025-32xx/CVE-2025-3285.json) (`2025-04-08T16:15:28.690`) +- [CVE-2025-3286](CVE-2025/CVE-2025-32xx/CVE-2025-3286.json) (`2025-04-08T16:15:28.840`) +- [CVE-2025-3287](CVE-2025/CVE-2025-32xx/CVE-2025-3287.json) (`2025-04-08T16:15:28.980`) +- [CVE-2025-3288](CVE-2025/CVE-2025-32xx/CVE-2025-3288.json) (`2025-04-08T16:15:29.120`) +- [CVE-2025-3289](CVE-2025/CVE-2025-32xx/CVE-2025-3289.json) (`2025-04-08T16:15:29.253`) ### CVEs modified in the last Commit -Recently modified CVEs: `155` +Recently modified CVEs: `74` -- [CVE-2024-3285](CVE-2024/CVE-2024-32xx/CVE-2024-3285.json) (`2025-04-08T15:19:43.580`) -- [CVE-2024-3668](CVE-2024/CVE-2024-36xx/CVE-2024-3668.json) (`2025-04-08T14:04:49.950`) -- [CVE-2025-20934](CVE-2025/CVE-2025-209xx/CVE-2025-20934.json) (`2025-04-08T15:15:48.457`) -- [CVE-2025-21893](CVE-2025/CVE-2025-218xx/CVE-2025-21893.json) (`2025-04-08T15:48:59.010`) -- [CVE-2025-21999](CVE-2025/CVE-2025-219xx/CVE-2025-21999.json) (`2025-04-08T15:49:48.200`) -- [CVE-2025-22004](CVE-2025/CVE-2025-220xx/CVE-2025-22004.json) (`2025-04-08T15:48:27.060`) -- [CVE-2025-24279](CVE-2025/CVE-2025-242xx/CVE-2025-24279.json) (`2025-04-08T14:06:35.790`) -- [CVE-2025-29087](CVE-2025/CVE-2025-290xx/CVE-2025-29087.json) (`2025-04-08T14:15:33.240`) -- [CVE-2025-29478](CVE-2025/CVE-2025-294xx/CVE-2025-29478.json) (`2025-04-08T14:15:33.417`) -- [CVE-2025-29480](CVE-2025/CVE-2025-294xx/CVE-2025-29480.json) (`2025-04-08T14:15:33.590`) -- [CVE-2025-29594](CVE-2025/CVE-2025-295xx/CVE-2025-29594.json) (`2025-04-08T14:15:33.767`) -- [CVE-2025-29927](CVE-2025/CVE-2025-299xx/CVE-2025-29927.json) (`2025-04-08T14:15:33.973`) -- [CVE-2025-2993](CVE-2025/CVE-2025-29xx/CVE-2025-2993.json) (`2025-04-08T14:00:57.463`) -- [CVE-2025-3067](CVE-2025/CVE-2025-30xx/CVE-2025-3067.json) (`2025-04-08T14:03:21.997`) -- [CVE-2025-31161](CVE-2025/CVE-2025-311xx/CVE-2025-31161.json) (`2025-04-08T15:30:22.440`) -- [CVE-2025-31481](CVE-2025/CVE-2025-314xx/CVE-2025-31481.json) (`2025-04-08T14:15:35.067`) -- [CVE-2025-31485](CVE-2025/CVE-2025-314xx/CVE-2025-31485.json) (`2025-04-08T14:15:35.180`) -- [CVE-2025-3303](CVE-2025/CVE-2025-33xx/CVE-2025-3303.json) (`2025-04-08T15:02:36.210`) -- [CVE-2025-3306](CVE-2025/CVE-2025-33xx/CVE-2025-3306.json) (`2025-04-08T14:54:03.220`) -- [CVE-2025-3307](CVE-2025/CVE-2025-33xx/CVE-2025-3307.json) (`2025-04-08T14:59:43.193`) -- [CVE-2025-3390](CVE-2025/CVE-2025-33xx/CVE-2025-3390.json) (`2025-04-08T14:15:35.717`) -- [CVE-2025-3391](CVE-2025/CVE-2025-33xx/CVE-2025-3391.json) (`2025-04-08T15:15:51.127`) -- [CVE-2025-3393](CVE-2025/CVE-2025-33xx/CVE-2025-3393.json) (`2025-04-08T15:15:51.250`) -- [CVE-2025-3397](CVE-2025/CVE-2025-33xx/CVE-2025-3397.json) (`2025-04-08T15:15:51.383`) -- [CVE-2025-3401](CVE-2025/CVE-2025-34xx/CVE-2025-3401.json) (`2025-04-08T15:15:52.110`) +- [CVE-2025-3207](CVE-2025/CVE-2025-32xx/CVE-2025-3207.json) (`2025-04-08T17:56:53.623`) +- [CVE-2025-3208](CVE-2025/CVE-2025-32xx/CVE-2025-3208.json) (`2025-04-08T17:48:42.087`) +- [CVE-2025-3210](CVE-2025/CVE-2025-32xx/CVE-2025-3210.json) (`2025-04-08T17:43:12.840`) +- [CVE-2025-32369](CVE-2025/CVE-2025-323xx/CVE-2025-32369.json) (`2025-04-08T17:27:42.950`) +- [CVE-2025-32409](CVE-2025/CVE-2025-324xx/CVE-2025-32409.json) (`2025-04-08T16:15:28.547`) +- [CVE-2025-3296](CVE-2025/CVE-2025-32xx/CVE-2025-3296.json) (`2025-04-08T16:49:21.037`) +- [CVE-2025-3297](CVE-2025/CVE-2025-32xx/CVE-2025-3297.json) (`2025-04-08T16:49:12.910`) +- [CVE-2025-3298](CVE-2025/CVE-2025-32xx/CVE-2025-3298.json) (`2025-04-08T16:49:00.290`) +- [CVE-2025-3299](CVE-2025/CVE-2025-32xx/CVE-2025-3299.json) (`2025-04-08T16:48:45.137`) +- [CVE-2025-3305](CVE-2025/CVE-2025-33xx/CVE-2025-3305.json) (`2025-04-08T16:46:55.203`) +- [CVE-2025-3308](CVE-2025/CVE-2025-33xx/CVE-2025-3308.json) (`2025-04-08T17:38:09.607`) +- [CVE-2025-3381](CVE-2025/CVE-2025-33xx/CVE-2025-3381.json) (`2025-04-08T16:15:29.563`) +- [CVE-2025-3382](CVE-2025/CVE-2025-33xx/CVE-2025-3382.json) (`2025-04-08T16:15:29.780`) +- [CVE-2025-3383](CVE-2025/CVE-2025-33xx/CVE-2025-3383.json) (`2025-04-08T16:15:29.913`) +- [CVE-2025-3384](CVE-2025/CVE-2025-33xx/CVE-2025-3384.json) (`2025-04-08T16:15:30.047`) +- [CVE-2025-3385](CVE-2025/CVE-2025-33xx/CVE-2025-3385.json) (`2025-04-08T16:15:30.180`) +- [CVE-2025-3386](CVE-2025/CVE-2025-33xx/CVE-2025-3386.json) (`2025-04-08T16:15:30.307`) +- [CVE-2025-3392](CVE-2025/CVE-2025-33xx/CVE-2025-3392.json) (`2025-04-08T16:15:30.430`) +- [CVE-2025-3399](CVE-2025/CVE-2025-33xx/CVE-2025-3399.json) (`2025-04-08T16:15:30.563`) +- [CVE-2025-3400](CVE-2025/CVE-2025-34xx/CVE-2025-3400.json) (`2025-04-08T16:15:30.730`) +- [CVE-2025-3408](CVE-2025/CVE-2025-34xx/CVE-2025-3408.json) (`2025-04-08T16:15:30.873`) +- [CVE-2025-3410](CVE-2025/CVE-2025-34xx/CVE-2025-3410.json) (`2025-04-08T16:15:31.110`) +- [CVE-2025-3411](CVE-2025/CVE-2025-34xx/CVE-2025-3411.json) (`2025-04-08T16:15:31.250`) +- [CVE-2025-3412](CVE-2025/CVE-2025-34xx/CVE-2025-3412.json) (`2025-04-08T16:15:31.370`) +- [CVE-2025-3413](CVE-2025/CVE-2025-34xx/CVE-2025-3413.json) (`2025-04-08T16:15:31.493`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2d735ecdeea..46b8409c91a 100644 --- a/_state.csv +++ b/_state.csv @@ -105625,7 +105625,7 @@ CVE-2017-5238,0,0,c3159b39be3eca3ee7d888a84232221f81f0c7c44212de53c08b5dc663261f CVE-2017-5239,0,0,a0d12aa4dbe35db148fb938e2659b5ee891afccdfd1f1a2e4af38484c5ef7ac6,2024-11-21T03:27:20.950000 CVE-2017-5240,0,0,e3b423c5867c3808e819d498830d11842ef2b37def891e1f141895827bc511ef,2024-11-21T03:27:21.070000 CVE-2017-5241,0,0,ebcc77b085e32c5ac7bb0c178c27473ac7c55ff65011d9b406d762ad48a94cac,2024-11-21T03:27:21.183000 -CVE-2017-5242,0,1,a21f42ae9c1f33da978f45c1bf3246e226560ef0f760accc144cec532acd5cc7,2025-04-08T15:15:45.170000 +CVE-2017-5242,0,0,a21f42ae9c1f33da978f45c1bf3246e226560ef0f760accc144cec532acd5cc7,2025-04-08T15:15:45.170000 CVE-2017-5243,0,0,767b82faa9db830eb024fb0b0a4938719c640186dc178970d969a0016dc4c901,2024-11-21T03:27:21.440000 CVE-2017-5244,0,0,1310e4277174cb0cbc8032c088184ef15d42b238d4d13f76c3600d27d9246b29,2024-11-21T03:27:21.553000 CVE-2017-5245,0,0,8333b496218ff6d4dfb3ce25cd45dc3e274704676d0a220adec679a88cc37955,2023-11-07T02:49:23.280000 @@ -108396,7 +108396,7 @@ CVE-2017-8460,0,0,9df1f0724972943d36750be3b5a4dd393b0cc2762ddc2ac9197b6ddbc64143 CVE-2017-8461,0,0,7c240c22c2b92ce55b8413148c572ea04e98660dfc7d5f35663d7858bda477dd,2024-11-21T03:34:03.870000 CVE-2017-8462,0,0,4646efaae849113b72fa394983548617b48cb37887ae6c1edec9995eb40cd62a,2024-11-21T03:34:03.993000 CVE-2017-8463,0,0,d0ad30d59d48506a9845f79e5c59d318a2b2f9b707fc9f3e5790be7d70ebf322,2024-11-21T03:34:04.110000 -CVE-2017-8464,0,1,a42edda88c13ceea4e39ba099baa682b696ce26b313d16b0474c7774c07590a7,2025-04-08T15:41:03.607000 +CVE-2017-8464,0,0,a42edda88c13ceea4e39ba099baa682b696ce26b313d16b0474c7774c07590a7,2025-04-08T15:41:03.607000 CVE-2017-8465,0,0,b17e87208cdeeca1ca90f3bb9f54e470a651c97e8df78c95e95889489c60088e,2024-11-21T03:34:04.367000 CVE-2017-8466,0,0,8faa959fdf96543997bbf6d7e9fd69ea26820446a5a13baec8d338dd93e4d0f7,2024-11-21T03:34:04.480000 CVE-2017-8467,0,0,c14ea53d8fa0f0e136b4bdc3543e5420ba8e5159aadfb324515e80484dc6e0f5,2024-11-21T03:34:04.607000 @@ -126067,7 +126067,7 @@ CVE-2018-8170,0,0,e634540d571c7211f44b22cffe9f49455070e9cc73e7e7e2b58831986a1671 CVE-2018-8171,0,0,45b830696b9e8ad9a520b63ab5a35d26ae4db16b645f924119d6a4fe90fd9e7a,2024-11-21T04:13:23.863000 CVE-2018-8172,0,0,ad65de19022e77a897c6f498ac444941453614b561818857145e90bc02a79544,2024-11-21T04:13:23.997000 CVE-2018-8173,0,0,6390c37b314fdf34f474f416c868d0172fdf48be0836eecf3dddb16d381f51dd,2024-11-21T04:13:24.120000 -CVE-2018-8174,0,1,f89768dbca41914810a6c761b83c68bdf6f37b083996c35a208d95e67a6b3912,2025-04-08T15:54:21.930000 +CVE-2018-8174,0,0,f89768dbca41914810a6c761b83c68bdf6f37b083996c35a208d95e67a6b3912,2025-04-08T15:54:21.930000 CVE-2018-8175,0,0,d06da55c193c0b15813bbdc16c42a7b6b0346e762f991fa057cbe3478b573515,2024-11-21T04:13:24.377000 CVE-2018-8176,0,0,3c9f053adebe4eb3da1257d48a2470eec66b69391285bfe5b3cf6c08be34c342,2024-11-21T04:13:24.503000 CVE-2018-8177,0,0,0e7cf8886ca69ec438d4d04a9c2025e3c1ee36effa45ac1f9f01625160816df7,2024-11-21T04:13:24.620000 @@ -126208,7 +126208,7 @@ CVE-2018-8367,0,0,f89d822a84802ef9fb82019ccdfa8ddbacb7f74d882d7c96304839fbc29cb4 CVE-2018-8370,0,0,5d3e2aa45017403cbb7c1df79eb46bfc18cf7e72890d3bb8eb3b14c2ff357d9b,2024-11-21T04:13:41.583000 CVE-2018-8371,0,0,6340564217d38e17140d982535e5306fbab92a00c3799b64627367d439b397ef,2024-11-21T04:13:41.720000 CVE-2018-8372,0,0,af41a6afd7459ef59a0d054d6e9a59e7f68dea9a6bca7e87096031678f2be72c,2024-11-21T04:13:41.860000 -CVE-2018-8373,0,1,247e6ee8acb504fb3bf508f60bcc39f7b8e2ca06e6c6527574dee6c60be42849,2025-04-08T15:50:02.530000 +CVE-2018-8373,0,0,247e6ee8acb504fb3bf508f60bcc39f7b8e2ca06e6c6527574dee6c60be42849,2025-04-08T15:50:02.530000 CVE-2018-8374,0,0,f06305f023dd2a1a74e95f2f7b3d23127f8b2b51b62d46d96352e71bd1c6d40e,2024-11-21T04:13:42.130000 CVE-2018-8375,0,0,0b3e4b32bc29599cde7b2c921a90998985d49165922f06a674d7a303d63bfb36,2024-11-21T04:13:42.257000 CVE-2018-8376,0,0,912dbb9c484727d67cacda81b60b868b738475da8a7d43aca64e0a31bad98b0e,2024-11-21T04:13:42.377000 @@ -126271,7 +126271,7 @@ CVE-2018-8436,0,0,a7265532018bdb9996e111fb857f0983704587a8de18700ec40b04a4b73848 CVE-2018-8437,0,0,7b3f4d3d9a95a92be547160e74d51ebb8cadcb43880c00f6d05badaee325b56d,2024-11-21T04:13:49.580000 CVE-2018-8438,0,0,d06a099db7ac62137b7e77cc464e1b21bd7230e09ccf1214a0804b790a558f28,2024-11-21T04:13:49.707000 CVE-2018-8439,0,0,7382941939dbc2ca5226d650a28331fe500a3c006debe8fe640c630ed7a9e731,2024-11-21T04:13:49.857000 -CVE-2018-8440,0,1,5b7ccfce0d90cf698547951dc68f37d71a7377ac011773a90749b876ff0756fc,2025-04-08T15:42:23.577000 +CVE-2018-8440,0,0,5b7ccfce0d90cf698547951dc68f37d71a7377ac011773a90749b876ff0756fc,2025-04-08T15:42:23.577000 CVE-2018-8441,0,0,3e9c0dd09d00e9f6d62a48824e83c2722036cd43f70c841e111d194e7c04aeaf,2024-11-21T04:13:50.143000 CVE-2018-8442,0,0,393a70adefa3942aa1617a4d74c28ffdbea173ad613f3e4625feb6094c2fc9ce,2024-11-21T04:13:50.257000 CVE-2018-8443,0,0,c44488470d6f90324c1a2e64f0ff821b494bd2b00639aee8fed3f2950ba258cd,2024-11-21T04:13:50.390000 @@ -126406,7 +126406,7 @@ CVE-2018-8606,0,0,8284d8059ae792c25429cf2c63ef198090a69169e5e60d661e040e6d59c925 CVE-2018-8607,0,0,6bf70e1932f573dbd92e3ece6e0b6e939230e6e908838cd91b3e798f566d6a49,2024-11-21T04:14:06.980000 CVE-2018-8608,0,0,382a8c5550a644cfcf7af5e1eadc92367706f48dc0194b69cfcde9e8fcebfa35,2024-11-21T04:14:07.087000 CVE-2018-8609,0,0,224dbb9a5ba45abf1f1ccfef58b9c9a53db006e47c4410c25c87222f2fb72bc5,2024-11-21T04:14:07.193000 -CVE-2018-8611,0,1,17d173686ce23551e74570fb4e9bf7fd31bf851dbcc568210714acade6508db7,2025-04-08T15:44:59.763000 +CVE-2018-8611,0,0,17d173686ce23551e74570fb4e9bf7fd31bf851dbcc568210714acade6508db7,2025-04-08T15:44:59.763000 CVE-2018-8612,0,0,5f1cd24a8969e1481153bc7988b8225ada3decf39ee9f7afdbed152d989b260a,2024-11-21T04:14:07.437000 CVE-2018-8617,0,0,5d0dc81ba19bdd993f618df5d3cffb893a77f46cdec1ce9648c5f27136b8d65a,2024-11-21T04:14:07.560000 CVE-2018-8618,0,0,ed054e8414db0c15cb3433c5ec0ce878027a94b59216144033a27c458c4391ff,2024-11-21T04:14:07.683000 @@ -127789,7 +127789,7 @@ CVE-2019-0699,0,0,5cdd94a8277b0499354fc7116c895b09210b3ff38e27d49e1841025f08b9a3 CVE-2019-0700,0,0,df4617a7f9cf63b61a4faf196c38dd0c259939cc648e109db6c8b4dfba7fe7ba,2023-11-07T03:01:59.220000 CVE-2019-0701,0,0,64aaa8294b5f6e3f93a7bdf806a7ea984a1abd843e24bdc93f17f791738748b8,2024-11-21T04:17:07.897000 CVE-2019-0702,0,0,3faec7cccae45f62490276a1c6d4b9b08a497240c2193694730536ec7dd2172f,2024-11-21T04:17:08.007000 -CVE-2019-0703,0,1,093ed7db133ec7064f026a8522bfc8db5f28dfd6a8bd620726e4599048b0deb0,2025-04-08T15:59:20.227000 +CVE-2019-0703,0,0,093ed7db133ec7064f026a8522bfc8db5f28dfd6a8bd620726e4599048b0deb0,2025-04-08T15:59:20.227000 CVE-2019-0704,0,0,6eb0e97661a92aacffa526f241faf955d24dde8cb8f750ef9bc345c97757fa7f,2024-11-21T04:17:08.230000 CVE-2019-0705,0,0,b641d29fa3ee6e51add602d57290db31e1158c4df07cf80f62876394e7c764e4,2023-11-07T03:01:59.500000 CVE-2019-0706,0,0,989359194e9c4b740182fb426d52576c77ae6a8834be180f4f4876ea6fec9bb3,2023-11-07T03:01:59.717000 @@ -127838,7 +127838,7 @@ CVE-2019-0748,0,0,56c82837f9bd86449bc2ebe53a0df118f5040520e64652d0ffb4bbf1dcfe87 CVE-2019-0749,0,0,736f3784b1672f6c11e9f8e8070ed9e861432f86db53c5d51c7aae86780747dc,2023-11-07T03:02:01.780000 CVE-2019-0750,0,0,0ddf1de80523e76980d543020d78adf36e0181a47c0e337a27bb6f3f4d800ad7,2023-11-07T03:02:02.017000 CVE-2019-0751,0,0,1c189842646f946da825d95c83fe96a0b378addaac16856fe42a7cbe2bae988a,2023-11-07T03:02:02.250000 -CVE-2019-0752,0,1,0e4dff02a5a7ac381dcf529755da341120072801fe9ae4fe6cc479b191eb5de1,2025-04-08T15:45:33.653000 +CVE-2019-0752,0,0,0e4dff02a5a7ac381dcf529755da341120072801fe9ae4fe6cc479b191eb5de1,2025-04-08T15:45:33.653000 CVE-2019-0753,0,0,74c3943fe0514103fd73d76e6102ba8addfcaa4a15093a8b624cc201ed9c78d8,2024-11-21T04:17:13.397000 CVE-2019-0754,0,0,da6966c786f3af0b7b78f90c3023e37e33b2ef92b3ab35f827fa90c393ad2b3a,2024-11-21T04:17:13.513000 CVE-2019-0755,0,0,610f0c9dece3ff7f1f318cb3c1615cb6e628a937a1ffef22a1c11858765a2656,2024-11-21T04:17:13.630000 @@ -127883,7 +127883,7 @@ CVE-2019-0793,0,0,db417649b64bb4992943cdfb6f9309b717453875f2548dcf1e3e8ed8b01bf9 CVE-2019-0794,0,0,3d8e7e5017175da140d91362159bc9d5194b7f9448597ac7f61cfe6fdb996896,2024-11-21T04:17:17.757000 CVE-2019-0795,0,0,66cb02b721b0d53c71ca363a8e6474775b01d12d5ddfafb25a4b227ea25c36bf,2024-11-21T04:17:17.870000 CVE-2019-0796,0,0,f4607e6b917d266a1fcca875dabc9bd48a8ca9ec7f49a7ee9782532693f36223,2024-11-21T04:17:17.990000 -CVE-2019-0797,0,1,ac5cf510e5ba3bedf9370c2ba0c41f370f482741df8b142bffd2068ac6af2b34,2025-04-08T15:59:36.357000 +CVE-2019-0797,0,0,ac5cf510e5ba3bedf9370c2ba0c41f370f482741df8b142bffd2068ac6af2b34,2025-04-08T15:59:36.357000 CVE-2019-0798,0,0,d5d2ee67fc49b1b3931222b055634accc0b0cc2cb81aa0ebeccb483f34c904e0,2024-11-21T04:17:18.220000 CVE-2019-0799,0,0,58d0091d1eb1bf7ebf21939f57a3b245ed7b0a5615e185cb0feac7ce0ba696bb,2023-11-07T03:02:03.580000 CVE-2019-0800,0,0,e7284af79f2a0eff3975a9cb2cbe55a301dd7241880d9083c972ae1a61e219eb,2023-11-07T03:02:03.790000 @@ -131358,7 +131358,7 @@ CVE-2019-13146,0,0,4a9947f6c0e1d5cd22fdb3d878fca81a13653f3a2536b0bbc59f28f203fbf CVE-2019-13147,0,0,79b41a297339cf8549d677568f92337dde4ba5852f6550ff20745fb63f628321,2024-11-21T04:24:17.530000 CVE-2019-13148,0,0,68687e4779a3133eaac92875d96b5033d101dc07fcfa66f55db4bd85414f570f,2024-11-21T04:24:18.247000 CVE-2019-13149,0,0,725deb6cedeee26e50f22442409911680ee4fa72197dcdb1f5d02c11d49a52ea,2024-11-21T04:24:18.390000 -CVE-2019-1315,0,1,c88d5afe502f740eceba6d98897a3479d01280c974201501e71455fed819ce25,2025-04-08T15:44:44.283000 +CVE-2019-1315,0,0,c88d5afe502f740eceba6d98897a3479d01280c974201501e71455fed819ce25,2025-04-08T15:44:44.283000 CVE-2019-13150,0,0,78108be28fbb4dd10852495dc93386350cfe0ba2d9de27d31d5d7ac34c6ccfba,2024-11-21T04:24:18.527000 CVE-2019-13151,0,0,bb189856a81332901bf5e9dd25ca01c9e0cb10a2f980c78e7eca6a8190640df8,2024-11-21T04:24:18.660000 CVE-2019-13152,0,0,18e84df47004d4952e14c27e00113a8902f9c4f66d4caad04622561caa2dc765,2024-11-21T04:24:18.800000 @@ -131840,7 +131840,7 @@ CVE-2019-13666,0,0,6c090faa70db6a84064c555f3a00d4fcb186b01b0bbc627fa1c8ba8bf5cd9 CVE-2019-13667,0,0,c6c25abf41edf6fa903a9aeaaa92e6c16fec2eb552eebe09d46eaca8cfb4abff,2024-11-21T04:25:28.433000 CVE-2019-13668,0,0,9fee9aa66788ae5ed4c2b45b5e143721d0b39cd90765798d21a3cade318a281c,2024-11-21T04:25:28.550000 CVE-2019-13669,0,0,70cb27bf7d73b3a538250ebe15e1d9fcf3ccbf065a8c5ee39afc491386e78d01,2024-11-21T04:25:28.657000 -CVE-2019-1367,0,1,1c160390d6ca2c5f7ad23e64f1110f8d672bdadc2b047a3831b8b81b8826e58e,2025-04-08T15:43:47.437000 +CVE-2019-1367,0,0,1c160390d6ca2c5f7ad23e64f1110f8d672bdadc2b047a3831b8b81b8826e58e,2025-04-08T15:43:47.437000 CVE-2019-13670,0,0,d5e69bfcf36bc756ed3ae7b5c08261d126f27339739b34b81569407e293a09ff,2024-11-21T04:25:28.763000 CVE-2019-13671,0,0,a5208b984aa5a6db5ac8d43e973d3b643d96d17b7e41e45c120d1b69e76042be,2024-11-21T04:25:28.863000 CVE-2019-13672,0,0,48a0194850e051af5bfba5c3939df408701ffc196d2f9e52c5374c33625bc9f9,2024-11-21T04:25:28.967000 @@ -131954,7 +131954,7 @@ CVE-2019-1381,0,0,c38d3111d1b8770fff0a07d3134ee2ec670339cbd5285f8f29808968ad0308 CVE-2019-1382,0,0,7d6422c6be6611b2e1f596a7ed639cee99a23ada0a7e881bfdaafd6396fed77c,2024-11-21T04:36:35.870000 CVE-2019-1383,0,0,907d719237856610293f7afa13342711444bc519f2897028513990643fb67670,2024-11-21T04:36:35.990000 CVE-2019-1384,0,0,b24a488ffacc2807fdada3deefdde5a39c83546fd952c458482f7f38cfd1a693,2024-11-21T04:36:36.107000 -CVE-2019-1385,0,1,d23aaf969c9abd2a3a2363c44e799399ec6c8215ef73d01e9420081c949cf087,2025-04-08T15:43:31.330000 +CVE-2019-1385,0,0,d23aaf969c9abd2a3a2363c44e799399ec6c8215ef73d01e9420081c949cf087,2025-04-08T15:43:31.330000 CVE-2019-1386,0,0,45c8fd8a350abbdfd4adbef90efc871ddb7c532ac9a49fcfb42304dab39af60d,2023-11-07T03:08:05.490000 CVE-2019-1387,0,0,d25dacd31dcfc862a4c687d332ac916608fb07ceaf355782c9580ca1cdc30d8e,2024-11-21T04:36:36.370000 CVE-2019-1388,0,0,87c8036e768b217a9138e8e3b177c3847baf3b4eff8d26d538f3ae5e052f88fe,2025-02-07T17:15:19.817000 @@ -132612,7 +132612,7 @@ CVE-2019-14576,0,0,103db1159b5a09671f476524fd1aeed1aad78b7c80ece8a0cf6ec59523076 CVE-2019-14577,0,0,3a1d97151aac54582dcc640fdd4425e789c6b930cae0705b76e39797e61761be,2023-11-07T03:05:03.730000 CVE-2019-14578,0,0,13c5d1099d2886946f0e88b04127e1ea4a1f71d0bd1bfac009bd85481a2f8517,2023-11-07T03:05:04.080000 CVE-2019-14579,0,0,015909fb2dbe82771c493f1118f80257670621842233dabba661214c2c9a3beb,2023-11-07T03:05:04.423000 -CVE-2019-1458,0,1,9ab929c5d6aefce3a4724e6af876b32c04a14a915bea3adc00b562eb85ded3a2,2025-04-08T15:38:28.047000 +CVE-2019-1458,0,0,9ab929c5d6aefce3a4724e6af876b32c04a14a915bea3adc00b562eb85ded3a2,2025-04-08T15:38:28.047000 CVE-2019-14580,0,0,ef43c2c6d8723b6de991add84ece84195c58c626a95b5842673d906e7417d823,2023-11-07T03:05:04.787000 CVE-2019-14581,0,0,66758388c4d3a47f50d988ec1a43cf4f0c3549787686b43d8a18040978185f42,2023-11-07T03:05:05.200000 CVE-2019-14582,0,0,39207621dde820e12e1f73d98a9fda880e608f95a01c92a2143d870265ea8e13,2023-11-07T03:05:05.540000 @@ -144935,7 +144935,7 @@ CVE-2020-0634,0,0,ed7acc9364b8e9889f3b506bb5b8af25863347dc298ea6543e45d716daa2f1 CVE-2020-0635,0,0,66d672bb02f4dd8b0df8440108082f96c2f66a053b722dd3c88485db96bc0460,2024-11-21T04:53:54.060000 CVE-2020-0636,0,0,87f40cd68a1fa810c98739ba50b05ac9bd0c6eb88970f39158df96f933de4b28,2024-11-21T04:53:54.180000 CVE-2020-0637,0,0,374db80798fcb9a8b24a45eb7c5266483183b975efcef4cd1a6b37ec87584f4d,2024-11-21T04:53:54.283000 -CVE-2020-0638,0,0,3196737e49170e5488a003273e3cab3685fdcc26271ee144199f21a84cfae7ed,2025-02-07T16:15:31.030000 +CVE-2020-0638,0,1,9c3f9b8bf436d53457f9ab39163535c9955a08f3a9567fdf1e4fe5c3a375a9ba,2025-04-08T16:00:35.440000 CVE-2020-0639,0,0,145a4d04acc253fc198bb93d8d6917ff86c92ac4c9c4246bacfd1c5775a99308,2024-11-21T04:53:54.503000 CVE-2020-0640,0,0,1b61e51eeafb5b5cdfab364ff8f50e4f8b178612eefeac4dd8f2134b59069776,2024-11-21T04:53:54.623000 CVE-2020-0641,0,0,4c199c277db5181d014f961c2e0813ac5b5bcec247c0a512bf694b8179e4bb2e,2024-11-21T04:53:54.740000 @@ -144970,7 +144970,7 @@ CVE-2020-0670,0,0,7c1a63adc3f1490430bd023ee691c198243d1129cd875502f6de7ec9a8586d CVE-2020-0671,0,0,f1f82776b93fa9b22837865fd38527b3088b19abdbf94f10808dc75649bc539b,2024-11-21T04:53:58.253000 CVE-2020-0672,0,0,57579f674d275435818a0f8c80719393de8002ef25725d18d74b8e4a9bdbe604,2024-11-21T04:53:58.373000 CVE-2020-0673,0,0,4e1e64e83613c3c7f501ca3f5e71e7467adbdf633d983118b7a2650a9abdf8c2,2024-11-21T04:53:58.497000 -CVE-2020-0674,0,0,d0e03d0e9bcfa4d814c23813b69087d99def7e38f3709316c2b2b772e821f688,2025-02-07T16:15:31.490000 +CVE-2020-0674,0,1,c603fcc5bc6035d1c1edb17d224cf04485cde4f48dc83f0e722cd8aad7878138,2025-04-08T16:00:10.390000 CVE-2020-0675,0,0,62aba8b198bff250b53f2be2b9de581521c7acc7513d2800314032b90749e725,2024-11-21T04:53:58.773000 CVE-2020-0676,0,0,642a0fc4450329cd5b8c36b4dd4f89bcc61120012bde09f1aa3a1728220cbff0,2024-11-21T04:53:58.910000 CVE-2020-0677,0,0,d1bf2c6ff2a95fbb182d2e33def74c444a234a67f9523ffbc2a51b8f2338ee09,2024-11-21T04:53:59.037000 @@ -145259,7 +145259,7 @@ CVE-2020-0964,0,0,e3e3c10c580b04e2189e5b0cc35eb46793ce903c073fbade5eeff063ad36ac CVE-2020-0965,0,0,1d0cb1cbcba6fb83ab567247d4ec56755294fa457f8e64962f4b664e0c778abc,2024-11-21T04:54:33.427000 CVE-2020-0966,0,0,dedd71ebeb38e0d868dd98dcd1277b76b5878f74e0dfcb37b918c206b531c582,2024-11-21T04:54:33.570000 CVE-2020-0967,0,0,d40813cc0791f09977ba5e4cab1c5b142f4ae502b4785361d15c3f43b2282c7f,2024-11-21T04:54:33.707000 -CVE-2020-0968,0,1,d67be6eb4ca349b4a5374e3e253c622797a19b99786a79955b82907a8dbd652e,2025-04-08T15:54:09.047000 +CVE-2020-0968,0,0,d67be6eb4ca349b4a5374e3e253c622797a19b99786a79955b82907a8dbd652e,2025-04-08T15:54:09.047000 CVE-2020-0969,0,0,305dff45dad5edb067fb145265c7c279a8515319d3ea119f1365f17ec833fcba,2024-11-21T04:54:33.950000 CVE-2020-0970,0,0,dcd238d5ed6a07262a1af1841cf52b8cd1e1ad25eb66d1c935c2cb624a868a7a,2024-11-21T04:54:34.077000 CVE-2020-0971,0,0,caab7228a0e604bae512e12a0e27f0e870f7f5ac48a3efecd36daf07a177b286,2024-11-21T04:54:34.200000 @@ -145530,7 +145530,7 @@ CVE-2020-10266,0,0,23279d5e249bc36fbf9717a2ad69de8c108068dcbbe3326a46861d76506c9 CVE-2020-10267,0,0,02f77f4889534bdfe1be7f5b3cb81f5166d16d4239738bf2b9c674bfbfe7deac,2024-11-21T04:55:06.010000 CVE-2020-10268,0,0,d33c74804eb0c5b8a08fa215389a089d68f5c52a9e836f42c4dca195bebc8493,2024-11-21T04:55:06.133000 CVE-2020-10269,0,0,d25788e9711aadf577e735aa69b2bda2dde5f4bd0f44a11f308e77d69b945eba,2024-11-21T04:55:06.257000 -CVE-2020-1027,0,1,e5c3a4335f99380c32249cb60c323eddeea350810c1684fb346c509f805fcc71,2025-04-08T15:53:11.710000 +CVE-2020-1027,0,0,e5c3a4335f99380c32249cb60c323eddeea350810c1684fb346c509f805fcc71,2025-04-08T15:53:11.710000 CVE-2020-10270,0,0,91e5c9b9b75395d39df0c55ec4cb8ae92fe76c7b648692f322d83590780593b1,2024-11-21T04:55:06.397000 CVE-2020-10271,0,0,df134cc172ae431f382e1bc2772441cee70b660336bf1115edeccc49c501d332,2024-11-21T04:55:06.540000 CVE-2020-10272,0,0,10eab77405a5b36308ebb5796970e3b04ac7b63207b185b79d6caee4446abde4,2024-11-21T04:55:06.683000 @@ -148542,7 +148542,7 @@ CVE-2020-13496,0,0,3d95a2f2af2a006183c99823ac4dca0ee6e986e96b60ee4e6cc6449e11f43 CVE-2020-13497,0,0,2eb73beddd98fc40e8142edfdb17f2cc350389178a3dfb00569618fcf328ecba,2024-11-21T05:01:22.830000 CVE-2020-13498,0,0,13f6f85171b35934873cf63cd91c4d234f4e82164d9accc539e7ccf1d0461a45,2024-11-21T05:01:22.960000 CVE-2020-13499,0,0,d6a794c7bf4dbdefac8234044bed784040e725ac74661b7dfb890215b1e7bda8,2024-11-21T05:01:23.087000 -CVE-2020-1350,0,1,7cc1dd076adbfa2489d52d65e4cdb0b0709019ef530f0748f96b822cad6d7529,2025-04-08T15:43:17.903000 +CVE-2020-1350,0,0,7cc1dd076adbfa2489d52d65e4cdb0b0709019ef530f0748f96b822cad6d7529,2025-04-08T15:43:17.903000 CVE-2020-13500,0,0,b7f6ee3026a7de00392ea8e03198ea1fe59e23b6cc353f13d4bbfd53b62d5f22,2024-11-21T05:01:23.213000 CVE-2020-13501,0,0,2007417767db6335b3d4f915c9508340cf0786d42107036841a78a4946207644,2024-11-21T05:01:23.350000 CVE-2020-13502,0,0,c62ded3d69ef5005feb7302a8ab8ee092a3e12764633d9013d42a436f4b5fd58,2023-11-07T03:16:41.043000 @@ -187361,11 +187361,11 @@ CVE-2021-47056,0,0,3898e09931dd4c82468e78a5a5900a62f3af74c6e42d523259186c3f5e994 CVE-2021-47057,0,0,14eaf8424deb9d4935780f6903041d7ecb1278072d45fe37ab5ccdd99d6c055e,2025-03-19T15:57:47.157000 CVE-2021-47058,0,0,f68b4024523ee8f9f466f08f30806589b0a7135e0b16ab04a4fee7c86f058115,2024-12-10T17:54:27.030000 CVE-2021-47059,0,0,a664ea42011c0452352bed32e885f8cb9c8cd1afe839c9a6c06920f303467b00,2024-12-10T16:58:51.723000 -CVE-2021-47060,0,1,a291e1a3a695e6a53ff3695b1f94a3d15deba0a9d0a834a61d5707ddb1f7acb4,2025-04-08T15:01:31.187000 +CVE-2021-47060,0,0,a291e1a3a695e6a53ff3695b1f94a3d15deba0a9d0a834a61d5707ddb1f7acb4,2025-04-08T15:01:31.187000 CVE-2021-47061,0,0,53666218467a1d00b98ac61663e19c8dc4e0b9ea72d30e7f636b30732a04cbfa,2024-12-10T16:55:15.017000 CVE-2021-47062,0,0,f0b7e311d8422dbd8d0f94c9f5873b7807ac1a99ffea8e65bcb222c05c2cd4a1,2024-12-10T16:43:41.337000 CVE-2021-47063,0,0,62517a898085ac87c1d4c363ee690679f3fd071c9bad633f6e658828ec25f8ea,2024-12-10T16:43:29.307000 -CVE-2021-47064,0,1,d069b6eb7ff542bfc83f426c64b28089d2db078d2dfdcdbe91e3c251f7c34a7d,2025-04-08T15:10:02.877000 +CVE-2021-47064,0,0,d069b6eb7ff542bfc83f426c64b28089d2db078d2dfdcdbe91e3c251f7c34a7d,2025-04-08T15:10:02.877000 CVE-2021-47065,0,0,ccbad5bde72572b0cedb79689aa5e03efef443c56720d7aff976c615bc24e71f,2024-12-10T17:54:50.497000 CVE-2021-47066,0,0,7787c10d7c1c1dd114bccb842965669a19eb3eccb239caeb8356e230879c15db,2025-01-09T19:44:50.610000 CVE-2021-47067,0,0,9df5b0005af4045c4050adb25d4d0a3c7ed0af17ec105b20f7776b61c08f0157,2024-12-10T19:50:32.683000 @@ -187395,12 +187395,12 @@ CVE-2021-47090,0,0,f0566b1abe72f2b70a272678994d61c7dd4f65781ac145a39ee0bd31883be CVE-2021-47091,0,0,efbeee9ac4a070f7c66218be3276705643cc8230c5872f22ea416a0c1b027a73,2025-02-03T13:42:00.400000 CVE-2021-47092,0,0,7a87f2bd2857613c1abd5490dd19eb36e03dec106a88ec6f9ef133e17e781475,2025-02-14T14:49:18.660000 CVE-2021-47093,0,0,8c86f132e48c7ae0c8a813b0881f34bc3f4fef27c7ea0f854e16c78d88daf499,2025-01-14T15:39:17.157000 -CVE-2021-47094,0,1,2967cbd5ed9dda4e61d3c7f0367781b3684f09811f83082674423bd80297ac53,2025-04-08T15:03:23.360000 +CVE-2021-47094,0,0,2967cbd5ed9dda4e61d3c7f0367781b3684f09811f83082674423bd80297ac53,2025-04-08T15:03:23.360000 CVE-2021-47095,0,0,f1325d2319a8e87982889ff7e5d6ba5a22acc09a0f6caf76a80eb14b35abca9c,2025-01-07T20:15:00.280000 -CVE-2021-47096,0,1,30fd1d5d44cdb6312ccbaccfa85bb741943b9673b8f8e4af7bdc906cc1970a47,2025-04-08T15:03:08.677000 +CVE-2021-47096,0,0,30fd1d5d44cdb6312ccbaccfa85bb741943b9673b8f8e4af7bdc906cc1970a47,2025-04-08T15:03:08.677000 CVE-2021-47097,0,0,d87e96b59811d0daf540e61621bffe66dba632888d0fabb069d9558ba2e3188d,2025-02-14T14:52:13.387000 CVE-2021-47098,0,0,cd9f021cee989f82426216619c90ea84dcc947abea3a8e202822c2cf2543de91,2025-02-03T13:49:30.867000 -CVE-2021-47099,0,1,1501868e6bf559f28de5f2417522b6667f0ae728a2fb778fbd8dbe6effa5ba4d,2025-04-08T15:02:45.893000 +CVE-2021-47099,0,0,1501868e6bf559f28de5f2417522b6667f0ae728a2fb778fbd8dbe6effa5ba4d,2025-04-08T15:02:45.893000 CVE-2021-47100,0,0,8194feacb46324f3e5be3ab5253c95460b417d0a4e05733f9cd9aa9a457524d1,2025-02-03T13:51:24.110000 CVE-2021-47101,0,0,de8fca709e54b370dde0ccee459a8070abf3ddba20b482ec049ee46d239f5948,2025-02-03T14:02:18.480000 CVE-2021-47102,0,0,51ab38dcd50653d138cea85167c1b1f45f8dddd08a89af56dd795d8c8fdaac70,2025-02-14T14:54:40.247000 @@ -194561,8 +194561,8 @@ CVE-2022-25020,0,0,e242055b3ddb769a18b6a425e06bdf68cfc72cfddfe44b10b6c53f8e0fe38 CVE-2022-25022,0,0,8f33a2348d2d96768f372da022d730fcc326be150f588e0f1e36f468156c62a4,2024-11-21T06:51:33.403000 CVE-2022-25023,0,0,765275426fda49fff9af949746edc1b9fcf98ed60a42945d2d75d3661d4a2d67,2024-11-21T06:51:33.563000 CVE-2022-25024,0,0,5bb99c0919714cec0f61347af938d83dc1aaa9f4085bfdb54390965145316637,2024-11-21T06:51:33.707000 -CVE-2022-25026,0,1,a22affd419172b6396721d68d1757fabcfea7b58b71e31e37a3c6a1328c909b5,2025-04-08T15:15:45.463000 -CVE-2022-25027,0,1,ef3daa6393b8ced5faa73217486a70d61b9fe9c8c24a22c84fd762349b041fed,2025-04-08T15:15:45.700000 +CVE-2022-25026,0,0,a22affd419172b6396721d68d1757fabcfea7b58b71e31e37a3c6a1328c909b5,2025-04-08T15:15:45.463000 +CVE-2022-25027,0,0,ef3daa6393b8ced5faa73217486a70d61b9fe9c8c24a22c84fd762349b041fed,2025-04-08T15:15:45.700000 CVE-2022-25028,0,0,e683ad64b0ae2f555168c11057a545e836b42dd8feada1922860a4d610cb7f17,2024-11-21T06:51:34.100000 CVE-2022-25029,0,0,4f5ebeabd557699e2691548f246212aabc28faeeb68ba1ce26e296cf83025c35,2023-11-07T03:44:43.777000 CVE-2022-2503,0,0,89c0aa91826debaea8af4904fa18770ec9d597135003359a3f9cde9300f961ef,2024-11-21T07:01:07.873000 @@ -199800,7 +199800,7 @@ CVE-2022-3143,0,0,a08a0989a85ada4443e43a3ececbe5e7842cc71141378b536312bc6b285707 CVE-2022-3144,0,0,a4934506b409ba55d944071fc0f0766a19528102cb2ff3b5158fafe4757c136e,2024-11-21T07:18:55.117000 CVE-2022-31446,0,0,ad440ba2416e67468b2c64b58ca2a9cfef9a27c8e5a22ef6a9c22b28ee1e82e6,2024-11-21T07:04:28.257000 CVE-2022-31447,0,0,804764f7d3644c3ecc07944fae6393ea7b0aa281d947f0d9a9550773fb514c39,2024-11-21T07:04:28.430000 -CVE-2022-3145,0,1,c42949729f71a9da455348136fba4b70894043ab2abbea7b99ef7072a36df8e8,2025-04-08T14:15:28.280000 +CVE-2022-3145,0,0,c42949729f71a9da455348136fba4b70894043ab2abbea7b99ef7072a36df8e8,2025-04-08T14:15:28.280000 CVE-2022-31454,0,0,48de138c6c210ec59f6e0fd0520d36a16fba69300f404b9cde7311f7367f75ec,2024-11-21T07:04:28.580000 CVE-2022-31455,0,0,1bb3a3e7f35f88814de528cb1879c0f4e7f4fe8935451595b028c9752dd20491,2024-11-21T07:04:28.730000 CVE-2022-31456,0,0,764e05f25ac2bfbee964d3f29623b8a141dc8bed5f8659ba40e85bb0110cd82d,2024-11-21T07:04:28.907000 @@ -201454,7 +201454,7 @@ CVE-2022-3337,0,0,b8b8018f10fa7252e9e34d4463034ecf4f1ec882bb95aef9f6771c1a48acfc CVE-2022-3338,0,0,23d03f4e1333d230671ded29ceac962c46fd09c965c4589fbe1e58e69735ea5a,2024-11-21T07:19:19.557000 CVE-2022-3339,0,0,cbffe13fb6b0e87f46c669e1b9447ed44fe8afa7993f51a3a517ffb01a6e3f6f,2024-11-21T07:19:19.710000 CVE-2022-3340,0,0,1c0131f8ae7619409c9e22441b92c203624074cc66c5b69cd8e66b27f5cacf57,2024-11-21T07:19:19.833000 -CVE-2022-3341,0,0,0ba264a2b6ae644209a3612c1e6e47a211287aaf5d867b1fa315f8bb33b45e4a,2024-11-21T07:19:19.960000 +CVE-2022-3341,0,1,8b7f9d51a7c8e27555a9e1820dec79396da4e5045f1bd113de7eea34663a0963,2025-04-08T16:15:19.387000 CVE-2022-3342,0,0,6af9bb7fff5a44d311a195e4c8ab1ced801e074dcdba3c126856f176e1a38eb8,2024-11-21T07:19:20.087000 CVE-2022-3343,0,0,ce4c17e5e846f02260324dacba72981d42dc1b147c9fe2b12acc6d4528128cba,2024-11-21T07:19:20.230000 CVE-2022-3344,0,0,fa8bc78ec543a940b711eaf64472386a0dae2fb0ddadc01f14718e0de068a088,2024-11-21T07:19:20.367000 @@ -202727,13 +202727,13 @@ CVE-2022-35134,0,0,6fd2b07296c663669660c914151f59618176f7ff46676de2f0f99f009a6a5 CVE-2022-35135,0,0,fb342196c8306e6d202c170ddcd72cbe8df032108b89c0f808ad3bbf2e841657,2024-11-21T07:10:48.210000 CVE-2022-35136,0,0,ed11c71144a73f8c046714c3d7754efc52089c9bd0a66a7bb8a2cda1b09c01af,2024-11-21T07:10:48.347000 CVE-2022-35137,0,0,cdc8106ce62fa5dbc32dc63e485e3fec32e06215505886d7b6a8bc2f4fbb7549,2024-11-21T07:10:48.507000 -CVE-2022-3514,0,0,e0681ec409b5c087ed8af443c487f47d19260602a0a3fc9f87dff86ce8e9ef3b,2024-11-21T07:19:41.183000 +CVE-2022-3514,0,1,e6f302b56e086c1c9589f0c59933315faed928e4a67aba48de82033f76da4ff8,2025-04-08T16:15:19.627000 CVE-2022-35142,0,0,91025d7dc17c0f7d87e471cc8af3f379507dcbcefda8b3bf6e5c42f3dcec70fe,2024-11-21T07:10:48.643000 CVE-2022-35143,0,0,1553629ae18f0c657f9fa9ac98d27b2d630498b8bf771f7a2702ca88d8531e8f,2024-11-21T07:10:48.797000 CVE-2022-35144,0,0,c2e2c44390160f8c514e019170974381c3fb5c7444b56f8555c3df390b0c9cd1,2024-11-21T07:10:48.940000 CVE-2022-35147,0,0,2e51f664a8b59053d9e9811070ef8b7910691769becd7052f7a5c78a808c065a,2024-11-21T07:10:49.097000 CVE-2022-35148,0,0,74633bcd27ec47ddb8d77d06e27462640af4cb8eb6b86f4a418df69c1a2f7c40,2024-11-21T07:10:49.233000 -CVE-2022-3515,0,0,1caf42e94d585d55762748c5b71bb3d7b0641b52183c2161831f7892d19b73fb,2024-11-21T07:19:41.320000 +CVE-2022-3515,0,1,e4490dae54008fae27183f5dc5bff7e9791b348f532b0d17a8898094a1f72ba6,2025-04-08T16:15:19.830000 CVE-2022-35150,0,0,60ad7e9dfe349b280fb7d4196d796933a0ecf49340126db5f4e6e1b6b7d09f19,2024-11-21T07:10:49.377000 CVE-2022-35151,0,0,40f847b3919576a94651627c46e78983b62784afdfac6c87213b8bee4364cb20,2024-11-21T07:10:49.520000 CVE-2022-35153,0,0,980455a345155255b1049b17baa49369f1d9fba1e65c16582b7c21d3836b07a9,2024-11-21T07:10:49.667000 @@ -203202,7 +203202,7 @@ CVE-2022-35725,0,0,ed4ebcbbbddfd1d6cb7e69093d321bf9bc61dbc26bddf13fc699383c64275 CVE-2022-35726,0,0,e03b89baa6bd0160b24ebe4c28c29a3f718a47968b76a6f0f14f41d671418949,2025-02-20T21:15:23.280000 CVE-2022-35728,0,0,2d9a29150e8c54f594a3bf63931edbc6643e80515a0b49e3b32b06136d135aea,2024-11-21T07:11:33.717000 CVE-2022-35729,0,0,002bd4e7c3948d1a5d2c15807a0aef795eb516b47f3517204eaeee3b153252f6,2024-11-21T07:11:33.860000 -CVE-2022-3573,0,0,80e5b282f507fba292c667cd8c68c37f5027fd44f3bf13e714129daa2e23882f,2024-11-21T07:19:47.797000 +CVE-2022-3573,0,1,6378fd544862d478d1ca3345c0d3bb6b1ce26d610d6527d6d204c33145f4683e,2025-04-08T16:15:22.300000 CVE-2022-35730,0,0,77b7411230bc55473fe5eb8bb30abc5693ce15371522700edcd2822d949e11e9,2024-11-21T07:11:33.983000 CVE-2022-35733,0,0,d9e706a545d6b14ec70fae17a27fdc313d8d44fb24dd44c198fa040b55716ee4,2024-11-21T07:11:34.117000 CVE-2022-35734,0,0,83b44310055eecd0d6b8ca69ce2323794a34d814d09d552bd36042e67f919953,2024-11-21T07:11:34.257000 @@ -203391,7 +203391,7 @@ CVE-2022-35916,0,0,9af87e09731f27efc95196b424b67dd321aa236a2082bf5ebbbcb2d730080 CVE-2022-35917,0,0,7e238076ca80dfe65eff9f389b38bd22676dbbcca323966feafdf40cc77142c4,2024-11-21T07:11:57.457000 CVE-2022-35918,0,0,348da3a4e52b678556db8aa666304ff01ae18bad0468d6aa194a6b02348748a0,2024-11-21T07:11:57.603000 CVE-2022-35919,0,0,4e7c608037bb19f763d38902d14367b1e7a702647e7c42e0e90f78ed6a8de183,2024-11-21T07:11:57.743000 -CVE-2022-3592,0,0,1bd5a449db32c53f06abc72e160c6ea861b416ed6c20b21aa6c34f28da10c1ed,2024-11-21T07:19:50.197000 +CVE-2022-3592,0,1,e5d2f1a5394a71b992dcc7c7b1a4df60e3eb564620778cfb67916bdae0ac5786,2025-04-08T16:15:23.333000 CVE-2022-35920,0,0,1070136de31948ebb38a74cfa1ba31ca0ce6b6dc26b374768ac283a31ffa26f6,2024-11-21T07:11:57.880000 CVE-2022-35921,0,0,29c3d1183c4ccda43803da839eb4c0d4bdc7d73d681ae0801d9b7af17b7876b0,2024-11-21T07:11:58.017000 CVE-2022-35922,0,0,3b2b21c6fb4c740f1509023e1add11f8f3803c83a84f44e80c890a1b9700ee90,2024-11-21T07:11:58.143000 @@ -203617,7 +203617,7 @@ CVE-2022-36125,0,0,d5df59b13465e3be2db409a61402d9c630be1cee79368c6655b8c28626ca0 CVE-2022-36126,0,0,8841116aeefe5d5ac230ad7295d19f5afd1ee2887af9a2d92ce9a022336fc253,2024-11-21T07:12:27.163000 CVE-2022-36127,0,0,8526a2e7974aa96d31db0a9182f6ba1c311f6255f24b023cff47d132691f321e,2024-11-21T07:12:27.360000 CVE-2022-36129,0,0,646c01cd1216604cb685ab0bff87fb4f808d312ac35261cabf5ff5e4da679ac0,2024-11-21T07:12:27.497000 -CVE-2022-3613,0,0,4adf80c5300b78a30659e883e03321350e479b181dce3d803730017e6db9eec8,2024-11-21T07:19:52.917000 +CVE-2022-3613,0,1,df8f8f98c56bf9fe01bec37941a8c2d4b227ea26f2ec007e657ec3e6f1019fc7,2025-04-08T16:15:23.557000 CVE-2022-36130,0,0,f4e11023ff6a59b7cde6ab523f5c204ef615371979da1e9523a1e3d3d7a3850c,2024-11-21T07:12:27.663000 CVE-2022-36131,0,0,50572ab64b8cc42fad6645c745005ae7986f76bb701e85c25648d9e83b3e8e5b,2024-11-21T07:12:27.817000 CVE-2022-36133,0,0,e9859aad9ae4062117d37ddeb7823ed57b9e94b6e7bcae929874b58e61d8ef09,2024-11-21T07:12:27.977000 @@ -203716,7 +203716,7 @@ CVE-2022-36276,0,0,72385be5cb17db605011d3e9be9fccaa7fc7b37050f5e6a74bb5262fc5a2b CVE-2022-36277,0,0,8978da5d2bc71086615491626b6819ef107e3ed9965cb05a854a701ee4a3f08a,2024-11-21T07:12:42.387000 CVE-2022-36278,0,0,21a2a45265adc27f985aa292400289d4291af7b5d4672f978330fd9af899317a,2024-11-21T07:12:42.523000 CVE-2022-36279,0,0,a66d4c57197f2c5a6b7912884c0fc755ca0c71d64040cc75aa18b04e4f7ee32a,2024-11-21T07:12:42.647000 -CVE-2022-3628,0,1,5e05cd7afcd02636754d7b86a235628d7924423615fe69314337bc15dcbfac74,2025-04-08T15:15:45.937000 +CVE-2022-3628,0,0,5e05cd7afcd02636754d7b86a235628d7924423615fe69314337bc15dcbfac74,2025-04-08T15:15:45.937000 CVE-2022-36280,0,0,1df104a0af1ea0a83e849519e9a6344e09407dac1e8a4ee39260313492969f3d,2024-11-21T07:12:42.790000 CVE-2022-36282,0,0,9265b8c9ebfb1d664e20fc8a404a9239767662818f8dc301300e9a4492e91271,2024-11-21T07:12:42.947000 CVE-2022-36284,0,0,0c35b15f332c66ff62dbf233904400b8fbb2836060edbc9c563b5a6630226d14,2025-02-20T21:15:23.537000 @@ -205960,11 +205960,11 @@ CVE-2022-39179,0,0,dba393d0b633a880ae7b086d06b9054c8693dbd662f3d54c5cfd9e97fb152 CVE-2022-3918,0,0,6453aff972f1aca064a92b1f99a9d2b522a74082e470a1516f4e67a069aaaaa6,2025-04-02T16:15:21.630000 CVE-2022-39180,0,0,a29240cf57d8d3817321ee684a00788cac49a6b7c728a6badc5d82b88d36eba2,2024-11-21T07:17:43.780000 CVE-2022-39181,0,0,c225746ba6c70413b3871f24b53a358d52356b266e9077d6a038b1016e5d55e6,2024-11-21T07:17:43.903000 -CVE-2022-39182,0,1,8044cd18796fe064de5fc1c21484589174533260bb494183919d66e38cb9fda6,2025-04-08T14:15:26.880000 +CVE-2022-39182,0,0,8044cd18796fe064de5fc1c21484589174533260bb494183919d66e38cb9fda6,2025-04-08T14:15:26.880000 CVE-2022-39183,0,0,6e3b34bb3b158d61295011e096e8159ef55daad2bfaf6c92350a62eff1bd922a,2024-11-21T07:17:44.160000 -CVE-2022-39184,0,1,a8f36b2a1805409f0a9f4e0065e67b09d54d681abbe6f5fc4ad37e132e579044,2025-04-08T14:15:27.723000 -CVE-2022-39185,0,1,103a6d18fa2469b0f560a3dd070021f3146cd168aaef2f1d1af672296cb68fbc,2025-04-08T14:15:27.893000 -CVE-2022-39186,0,1,b805ad8d45068084a4254f674393bb5cb7e86aea77d534a0b3a23061da961b45,2025-04-08T14:15:28.060000 +CVE-2022-39184,0,0,a8f36b2a1805409f0a9f4e0065e67b09d54d681abbe6f5fc4ad37e132e579044,2025-04-08T14:15:27.723000 +CVE-2022-39185,0,0,103a6d18fa2469b0f560a3dd070021f3146cd168aaef2f1d1af672296cb68fbc,2025-04-08T14:15:27.893000 +CVE-2022-39186,0,0,b805ad8d45068084a4254f674393bb5cb7e86aea77d534a0b3a23061da961b45,2025-04-08T14:15:28.060000 CVE-2022-39187,0,0,b5f1b7966bb90a1aa419561f959fede63329920de80365ca966f3e2daa44a930,2024-11-21T07:17:44.687000 CVE-2022-39188,0,0,5b4e2ad23c1bc7d895a22f4bed7ff540dbbb27d4dff7392f9960fd083798054e,2024-11-21T07:17:44.817000 CVE-2022-39189,0,0,a50cac57b23778fa0cac2b5a5317f54862ed8ca0cd2dc4ba2b24db7e15fcba1f,2024-11-21T07:17:45.003000 @@ -206740,7 +206740,7 @@ CVE-2022-4036,0,0,115831242908d4be1ab19f46aa39460a1926637174ba1ad971369ab78af698 CVE-2022-40361,0,0,70b3932ea511598c0d3d7069a689e6718f9d25542c71c50c253b29eaedca1d89,2024-11-21T07:21:21.140000 CVE-2022-40363,0,0,422700ae8c0846f0e2b4307545f4849a654496d2b3003f74d9b1f07cf14fc648,2024-11-21T07:21:21.300000 CVE-2022-40365,0,0,11248d09b53c311f4c945e2c845b9980aea90ed2e5ff3c8cf85f8d767dae1a02,2024-11-21T07:21:21.453000 -CVE-2022-4037,0,0,0702b789d4f114eda976a6476d178e8286b7bcfffab7a7c3989fb44c0b9a7665,2024-11-21T07:34:29.540000 +CVE-2022-4037,0,1,124ac240cf09eb9d7d675e42462f1aa0d9f92965ba6a825538e829ff2b863cbb,2025-04-08T17:15:32.497000 CVE-2022-40373,0,0,dd911887846dc0144c7761d09a553781ac5dcf3f235e396618f053d02563171f,2024-11-21T07:21:21.600000 CVE-2022-4038,0,0,658fb7af30700ae89494d993bb6c362c23f5ff6bc5f8e3e97e6116b51c14faf2,2024-07-29T20:15:03.317000 CVE-2022-4039,0,0,0f3d55aaf1fdb66122933b67a2edfdbbf803b60f8753899bcf6b7e56a0d6c89c,2024-11-21T07:34:29.670000 @@ -207527,7 +207527,7 @@ CVE-2022-41306,0,0,d28849fc012f0f16cae44ccbd9894f4d3c0752fb3d61482f7ae3d70dc5b31 CVE-2022-41307,0,0,72d678d8d90b53e7ad5d5c3c07b3d22ae888e74c9b39ee89e00ce1f744844638,2024-11-21T07:23:00.770000 CVE-2022-41308,0,0,fc06984e604cd3917ff83f1aa2442b4354c8512c4df5bd0258dd754e5d9b000c,2024-11-21T07:23:00.870000 CVE-2022-41309,0,0,d1891854449b0503e1d97545a51c49f3e0f13aa905b96adf78f0a34e26066007,2024-11-21T07:23:01.003000 -CVE-2022-4131,0,0,ce6ad41c0a9c1a21704a500089b5f96547a9c732d46c3e2f1eaaf802b45b1c45,2024-11-21T07:34:38.210000 +CVE-2022-4131,0,1,30101d6aec56d1e02d03064a9c36cae444977c3702f614f80636a174a1bf066a,2025-04-08T17:15:33.520000 CVE-2022-41310,0,0,ac833b14041a9c3f00786a70ff63c34d419d4ecc0348bc8d6b88349d78d7b745,2024-11-21T07:23:01.147000 CVE-2022-41311,0,0,062eb7fcf6f81d992cef91116983ddd71762554160a58dcc79b44d3d19916208,2024-11-21T07:23:01.267000 CVE-2022-41312,0,0,9eee7a666c92e5a7ed474ebe66e9cf7368f6e72ba5df1427cbbe3e4ea92f7ec5,2024-11-21T07:23:01.400000 @@ -207819,7 +207819,7 @@ CVE-2022-41666,0,0,d44424892e9e8d071520710dde865dafee9da5d4af2e6525b0b6343dda5b3 CVE-2022-41667,0,0,0d8938202f49ea4a0f6c364c83822cd12c0ad02d1d867272a4e0a443d20ee74f,2024-11-21T07:23:36.180000 CVE-2022-41668,0,0,bca54e3b55cbff5cbfb5f29205bcc252baec4b1ea5b8e9dc6cde60b7b0dd290c,2024-11-21T07:23:36.310000 CVE-2022-41669,0,0,024447291089265be7e1913cc7de0e2ac5cf755ba4e956aad0b34e2b0ccd9d90,2024-11-21T07:23:36.437000 -CVE-2022-4167,0,0,5ed8b2fe4b6f2c78a11db1cf21cb7a39ca570aeb3cab346fcf99848e1ef33252,2024-11-21T07:34:42.363000 +CVE-2022-4167,0,1,74810c1025e5ebdf099fef6dbc2e751f95449318d102a29cd96a622e4e1f24c8,2025-04-08T17:15:33.827000 CVE-2022-41670,0,0,cf8c0f22d9bc8472de729600957fade27a412610b031140b8db6b8f60ee9fc6a,2024-11-21T07:23:36.567000 CVE-2022-41671,0,0,823c179b6fcede429b468efcaaa4cbd942322820a0fcd1311dc181d7afefb65c,2024-11-21T07:23:36.693000 CVE-2022-41672,0,0,188bc523046f55bd017e4ad72bd8246d438aab1a6d37969c11e2f442b0313e23,2024-11-21T07:23:36.813000 @@ -209197,7 +209197,7 @@ CVE-2022-43443,0,0,71c9b61f564b64cdde9106e1121ab6bbe64db292750bbb2951ccda390fa1c CVE-2022-43447,0,0,4cec51b45994c962aa7ad64df34427ffa601d6d4fb59ffcc6a09b25585e8bf27,2024-11-21T07:26:30.160000 CVE-2022-43448,0,0,f546420a99557b1ce7bbfc8e81500c4e34a3664f6714347b5732dee7d2067000,2024-11-21T07:26:30.310000 CVE-2022-43449,0,0,f0b066899da1ce8299cb386e353d72a56aaf08b082cdda3c007310f8d3d35331,2024-11-21T07:26:30.443000 -CVE-2022-4345,0,0,2e9d10b2ebfa9d735d56cd2fd3226067a2fb3e602e1d27af9b2b8fb51bcb6e22,2024-11-21T07:35:05.870000 +CVE-2022-4345,0,1,4b4abc1b70ae4e79e484e7350fca8edac6f5ae5d7c4f5f16c1d166a83977ba47,2025-04-08T17:15:34.117000 CVE-2022-43450,0,0,ff11065ab1878411c86e121c204774be230efb1199a088374b23eb411b4ff08b,2024-11-21T07:26:30.573000 CVE-2022-43451,0,0,55c3f35c43cae6bb1ee37ca66ffdbe18c8660044f95b78328f16c704dbc3f474,2024-11-21T07:26:30.713000 CVE-2022-43452,0,0,c78276254f5f2218b7c77331235d9e2be37d8823bb5fc2252dcd20f8a5f4e515,2024-11-21T07:26:30.860000 @@ -209398,7 +209398,7 @@ CVE-2022-43646,0,0,4f4f0725b2568c246ad1b3301c2545eb40847dc6cd7f5c14809f62108f11e CVE-2022-43647,0,0,4f2db7c8f91cc226f546b18e1e9ae07446c50cedfa91f1ef118a2bd38451d735,2024-11-21T07:26:58.143000 CVE-2022-43648,0,0,4f55cc10a8bcfe071a6d9694893e52a9df515e58ee85f2de0905baa626d91aef,2024-11-21T07:26:58.283000 CVE-2022-43649,0,0,e2f98421b16713243bb888f234091901d1e8f5e4fdb41f5ae03f79e0d91bfcb9,2024-11-21T07:26:58.417000 -CVE-2022-4365,0,1,0a9ea4706843ea6cee5a2945860841f00b018ce97b2d3b002046078f9f2b3ef2,2025-04-08T14:15:29.727000 +CVE-2022-4365,0,0,0a9ea4706843ea6cee5a2945860841f00b018ce97b2d3b002046078f9f2b3ef2,2025-04-08T14:15:29.727000 CVE-2022-43650,0,0,1c2817046c8683ce0a85255ba1689c59ad4e66c09e67df839bc2c3da9eb1bc77,2024-11-21T07:26:58.553000 CVE-2022-43651,0,0,da1538f15eeb9af619e77bea9f55081907230a39092b09e7d6aca880d586d237,2024-11-21T07:26:58.687000 CVE-2022-43652,0,0,e6e83933745c63c5900f53b7ffb1ee02ba023067d996286b07d5beebecff907f,2024-11-21T07:26:58.827000 @@ -210803,8 +210803,8 @@ CVE-2022-45721,0,0,e739b1f1d0f4749f5e91d3dab2e936e8314e60304fb4a2e1d21bfe1ff4820 CVE-2022-45722,0,0,6527e6e793046331226252180f51133fdb61de3fc4b4c49b4fcf754f42cc8b3d,2024-11-21T07:29:38.940000 CVE-2022-45724,0,0,06183cd5ff07a6d04785f159aa52d073ed5adc0bb5da6c457b81e7a9b5c12d0c,2025-03-24T18:15:15.837000 CVE-2022-45725,0,0,10475023800e350d15ffdb5683afb3dcad60ac82c8c42f2ec7fcd2c0472ccc3d,2025-03-24T18:15:16.020000 -CVE-2022-45728,0,0,80b9da06d6c779ad0c9e3c753153433dae8714ef646476dc1406121915f83df8,2024-11-21T07:29:39.407000 -CVE-2022-45729,0,0,1d9c7cd4afccf16d1edf030cd249c5e84fce2f814402f282425ec72a8d426781,2024-11-21T07:29:39.560000 +CVE-2022-45728,0,1,7275a5c3659bae879f0556d95579f54bb356894e9af46d5593ac709353fe139f,2025-04-08T16:15:23.770000 +CVE-2022-45729,0,1,135ae7554fe22d24688a9b3594b2ff5b4ad15e56c0ab610f47f38e7c1888e26f,2025-04-08T16:15:24.010000 CVE-2022-4573,0,0,c8e704616c5ed81df2ca6bc3974afec377bd1ef775bb99f5b5a099348c49b0a8,2024-11-21T07:35:31.190000 CVE-2022-45730,0,0,914b8c352394e986b5dce2204fe6201d92139e47777f0cf0e098bb0b10e801d5,2025-04-01T16:15:17.310000 CVE-2022-4574,0,0,c4bd7a68d6d40a00a34e01f201fe51a749afe08d86dfe9f6145f0a62aab3c9f9,2024-11-21T07:35:31.330000 @@ -211273,9 +211273,9 @@ CVE-2022-46367,0,0,286e3428ff7fcaad8f6a809b1ff608eb4e66ae8548b5beeca32bd9fab4e7c CVE-2022-46368,0,0,cb8cdc08285b08d466a176eb8b29f1f24be6987749d9e17e02dc5bb56ed605f1,2024-11-21T07:30:28.673000 CVE-2022-46369,0,0,f7a8886b9e68a99e56daf6afa7cd1ffa73918828f46acd7f6a6aa565b78da232,2024-11-21T07:30:28.800000 CVE-2022-4637,0,0,a4e94cca4e703007e697818c3a57481f1b59034f182d52af3ebf217b3313d14d,2024-11-21T07:35:38.627000 -CVE-2022-46370,0,1,69b7a3a76f6b12d384d9e081aa4179462baa147955b3fac04ec33de0457d1272,2025-04-08T15:15:46.250000 +CVE-2022-46370,0,0,69b7a3a76f6b12d384d9e081aa4179462baa147955b3fac04ec33de0457d1272,2025-04-08T15:15:46.250000 CVE-2022-46371,0,0,510f3a9173efe0139c102498cfa0428552f12fcf04fcd46d91f1623d40a6a95b,2024-11-21T07:30:29.047000 -CVE-2022-46372,0,1,3434786e7d9d128428693875c4c031d27d92744cabb0f3d1b255b00eaa65766b,2025-04-08T14:15:28.723000 +CVE-2022-46372,0,0,3434786e7d9d128428693875c4c031d27d92744cabb0f3d1b255b00eaa65766b,2025-04-08T14:15:28.723000 CVE-2022-46377,0,0,7f258f11854d0e6249897caec0c1673632adad0764264972d143aa135e804236,2024-11-21T07:30:29.293000 CVE-2022-46378,0,0,3addbf38a9985a8a7f8bd9f5a12ab3c2ace117d5902ca83582c61d9ba28795a6,2024-11-21T07:30:29.413000 CVE-2022-4638,0,0,e3a5a50e7ac2ac39012753b769aea11ea0793f9f98c14bbcfb811f189710174b,2024-11-21T07:35:38.760000 @@ -211321,7 +211321,7 @@ CVE-2022-46430,0,0,2dad006c1cf91598f0f220e63bbb5831435ab5fb2c5d6b874391720856e15 CVE-2022-46432,0,0,4ab96aead4e3d2093399f336c21f9c02cba934bb2258cded302c7bbb45c95a6a,2024-11-21T07:30:35.003000 CVE-2022-46434,0,0,b348d609a9df9840a36087426c84f22a7fb1ff8ee9c48cb45f8c31448319610d,2024-11-21T07:30:35.163000 CVE-2022-46435,0,0,80bb1abca93f3e8d81ad8d9eeaaf8d11f47a928a99333852cfc6e6e370f0b069,2024-11-21T07:30:35.337000 -CVE-2022-46438,0,1,bb35f3e66bb2bc4405f6635683d45618ed53434af44aab782321cc74ba84f9d2,2025-04-08T14:15:28.913000 +CVE-2022-46438,0,0,bb35f3e66bb2bc4405f6635683d45618ed53434af44aab782321cc74ba84f9d2,2025-04-08T14:15:28.913000 CVE-2022-4644,0,0,7dfe02c37bac2353c0e860315551e7136ea0c14949d1852241c80b14909ffb69,2024-11-21T07:35:39.593000 CVE-2022-46440,0,0,5e9f025b62b475de280b45d71c727fff77b65691cda61d6d9fb615377c4e7b76,2025-03-12T16:15:17.650000 CVE-2022-46442,0,0,5607e0afd5331d7d18da25088ff7c3720f45c51f8cff9a7f36738e37e0436985,2024-11-21T07:30:35.803000 @@ -211331,11 +211331,11 @@ CVE-2022-4645,0,0,485d685e6a64431bd6c5d2670b1b80d1289850bd50fc74fcd90ccbbac4ff28 CVE-2022-46456,0,0,2c2c6fedbb9b02ae9da118c17ec4ed4a526bfee03e61073666ea235c56438c9e,2024-11-21T07:30:36.237000 CVE-2022-46457,0,0,f45c84fe84be1205789d0d0b58f9696dbb0dc771ad9963c01d279a314b91f9a3,2024-11-21T07:30:36.390000 CVE-2022-4646,0,0,32360f8f79849a91095b93ecff3a7dbe390ee1ff4655dabde3d1ec6a359e9583,2024-11-21T07:35:39.850000 -CVE-2022-46463,0,1,f0e34f6a5bb63c15c08f10bb05f1c4258d17fbf05449da21035cec6a926954a5,2025-04-08T14:15:29.297000 +CVE-2022-46463,0,0,f0e34f6a5bb63c15c08f10bb05f1c4258d17fbf05449da21035cec6a926954a5,2025-04-08T14:15:29.297000 CVE-2022-46464,0,0,f4dd1136be4f96665c913cdfaaf3ad48a50fba82192250c2983bbb0c11a2791f,2023-11-07T03:55:39.620000 CVE-2022-4647,0,0,1300a129c49c857a590f5abae71a2e3ba1ec20cf6cebaccaee5536d9b100ce21,2024-11-21T07:35:39.977000 CVE-2022-46471,0,0,f62c3631ac4d0502e52720e135a37aa1b44fe9f53864c62f40ddae3cf273c673,2025-04-07T19:15:44.540000 -CVE-2022-46472,0,1,b3c2377793900ea507c55ed30e35eef421c026988eb0c17e526fb6caed51fdc6,2025-04-08T15:15:46.423000 +CVE-2022-46472,0,0,b3c2377793900ea507c55ed30e35eef421c026988eb0c17e526fb6caed51fdc6,2025-04-08T15:15:46.423000 CVE-2022-46475,0,0,1a090a7272b94fad37937664a8d5bb8e6a6794d03dc6ad0e82200accb49c838e,2025-04-03T19:15:37.930000 CVE-2022-46476,0,0,9092d65e7c4f507d87cc109d04a60e79698130a12bb81af27ad85287642f4ddd,2025-04-03T19:15:38.140000 CVE-2022-46478,0,0,28f8bc9047b41a7e650589cc5057244dfaf34566d900cf43d059d36f860b3f11,2025-04-07T19:15:44.780000 @@ -211358,7 +211358,7 @@ CVE-2022-46499,0,0,967512e7baa1ce0422e471f5b5fe2c5ebec8b54caeafc622177bd20b0a235 CVE-2022-4650,0,0,7d43cf721d800643ae000c3d706cf10df6cbb33605f26e3c995ca189ce2c58ae,2025-04-03T20:15:18.753000 CVE-2022-46501,0,0,03f537aba9f94c12bcf5173f65b5ae70341e80c8d82f602181bd0b99943f5882,2024-11-21T07:30:39.750000 CVE-2022-46502,0,0,de72d16f2926ed608afdad70098b1b1597ec0c6e37f52d76cbfcfb3e0905af0c,2025-04-07T19:15:45.033000 -CVE-2022-46503,0,1,f44a008f16ce9f28075e666608e9410e13f8f5995cf604c5453fbf91b497a994,2025-04-08T15:15:46.653000 +CVE-2022-46503,0,0,f44a008f16ce9f28075e666608e9410e13f8f5995cf604c5453fbf91b497a994,2025-04-08T15:15:46.653000 CVE-2022-46505,0,0,556f68f80f426556fa441caaf3ece3247d1f844d1ca10adaa553eb4ec2d51de9,2025-04-04T17:15:47.240000 CVE-2022-4651,0,0,e7cf4a70afca20f66b5af34080804c6864be6d29e3a2f96826c8a4a51fcc2990,2025-03-27T16:15:17.703000 CVE-2022-4652,0,0,1095194f9f154259f49411f7dbb93d1a6c03863c10e1a5c3e3727f220f6e9465,2025-02-27T21:15:16.310000 @@ -211429,8 +211429,8 @@ CVE-2022-46610,0,0,3210e6aa239ffa309767742c0f43b352e1f7cf8f886460962d0004b772c37 CVE-2022-4662,0,0,cdc2f466a3092771151738e6a6afc831c079456815cff7cd4e5a1876b8f3712e,2024-11-21T07:35:41.410000 CVE-2022-46620,0,0,82ae0fa3f9545ae840ed1e8cfa871c0304352c04c5027028d19da993adb477e6,2023-11-07T03:55:42.210000 CVE-2022-46621,0,0,a45b5ba63c93874e741df3d6d041a2f2d089ae923b13515f82da788937f60f21,2023-11-07T03:55:42.330000 -CVE-2022-46622,0,1,9cfe0b8b815e2c19a392cf79da33f11068101c28cdfe88d1a3b68a8e75b32c9f,2025-04-08T15:15:46.890000 -CVE-2022-46623,0,1,ed30c1295bad798f95bb9adb26a06bcbf3b85c5f204aff3c14e4234e510c32ee,2025-04-08T15:15:47.120000 +CVE-2022-46622,0,0,9cfe0b8b815e2c19a392cf79da33f11068101c28cdfe88d1a3b68a8e75b32c9f,2025-04-08T15:15:46.890000 +CVE-2022-46623,0,0,ed30c1295bad798f95bb9adb26a06bcbf3b85c5f204aff3c14e4234e510c32ee,2025-04-08T15:15:47.120000 CVE-2022-46624,0,0,d360f63da190a2be1b2abf479fc7dc5ff5cecd323efba91bcbb7ab38c6f2798d,2025-04-01T16:15:17.553000 CVE-2022-4663,0,0,569973116472f7ed53f2f258dfc32b934af6dff10c588ff046de4025087878ef,2024-11-21T07:35:41.520000 CVE-2022-46631,0,0,6b49edc0f5f441a18c234a95c8253895b676439e709d89c4def6a29063fc6fb1,2024-11-21T07:30:49.730000 @@ -211780,7 +211780,7 @@ CVE-2022-47094,0,0,f7815f4b01e0d5dab305843107a3b618799b167cd80fddad4ed3ecf0dc71e CVE-2022-47095,0,0,9cc22a8217c2d37f2cb816c52a4a7e1ae6207859ece43af26a5e35a2e17b5a2f,2024-11-21T07:31:30.073000 CVE-2022-4710,0,0,7dfd8457b8ce63842c06d5f5362ebfc8ce962651da0ac74a31956bda48b86c98,2024-11-21T07:35:46.840000 CVE-2022-47100,0,0,61b44eddee8762a6a2fbc5232dfffae3bd5197feb64fe25ae2c561a5d6e94999,2025-04-02T16:15:22.980000 -CVE-2022-47102,0,1,78778a4bb3d94b5726f0458f84ce7ac19358c59edaa2cb53c716b499e18add36,2025-04-08T14:15:29.520000 +CVE-2022-47102,0,0,78778a4bb3d94b5726f0458f84ce7ac19358c59edaa2cb53c716b499e18add36,2025-04-08T14:15:29.520000 CVE-2022-47105,0,0,4d8abb3976b42044e1cb75fcac19fe6d6678b243b2b256309ddf6fa4769b4153,2024-11-21T07:31:30.547000 CVE-2022-4711,0,0,43cdf83f4bff51294766f1a74dd3e9d5b0faa7b2bae15729eb7bb4ef4af41e08,2024-11-21T07:35:46.953000 CVE-2022-47115,0,0,434cff53e2e904e2b59e57eee798ea6ad0b859836944a844f1fac9ef55809272,2024-11-21T07:31:30.693000 @@ -212007,7 +212007,7 @@ CVE-2022-47426,0,0,c1779814179cd3127da2595ab6d1efa9619f8477d9339c06d3bafc876aa68 CVE-2022-47427,0,0,0725396d80962056a98acf25420af7526f3b7343f725c2ad47202e5fd54e8997,2024-11-21T07:31:56.370000 CVE-2022-47428,0,0,cc95f27f8bfd7ed53a11010351eb173189e354d5fdad3ff5134bc5f8457d87e7,2024-11-21T07:31:56.490000 CVE-2022-47429,0,0,7cc1cae3b77fdbefa77e645deb3b20911c5e205bd41912bbc1d0c595dd4ac220,2024-12-13T15:15:10.330000 -CVE-2022-4743,0,1,9fa1eb772287fc8c875b83603fffd5ca13b5bd288dd4999234378e8a98f2dff6,2025-04-08T14:15:29.920000 +CVE-2022-4743,0,0,9fa1eb772287fc8c875b83603fffd5ca13b5bd288dd4999234378e8a98f2dff6,2025-04-08T14:15:29.920000 CVE-2022-47430,0,0,d8481267af06dfb8569aed8d1429b568fbbece9280274b2543c6d8491a13258b,2024-11-21T07:31:56.650000 CVE-2022-47431,0,0,03f325fac26cb75a152e574b428b2797302e21feedcff0cef09d1237929f9703,2024-11-21T07:31:56.763000 CVE-2022-47432,0,0,d9827a4821d9218b142b10865e79d2a7e922eb108dd59e1f67940f3ac9c294c5,2024-11-21T07:31:56.883000 @@ -212291,7 +212291,7 @@ CVE-2022-4792,0,0,8a68b7e39c2bc7081c1e5785899083df37df9ed2dc29c07e463ede969ceefd CVE-2022-47924,0,0,c376096147afc4276748c64a5358831d282c0e13aa1e9627b371fb823fb32a20,2024-11-21T07:32:31.850000 CVE-2022-47925,0,0,3c4aa65890b2d4b2655588fba8d970251832319df447501dee67e1c780551a67,2024-11-21T07:32:32.057000 CVE-2022-47926,0,0,6fb9eeaf9bce7c0718734ae3534265d12ffcd4adf936dec7fd38521c5d5e583e,2024-11-21T07:32:32.243000 -CVE-2022-47927,0,0,dae418bbe446bfb302132c725462cbf389cffc32bc8aed5619c8b790dd1df9d3,2024-11-21T07:32:32.463000 +CVE-2022-47927,0,1,39f547271cd0d64cb35097a56d787ab799e6d3347ecf234ab7de6585693292e0,2025-04-08T16:15:24.250000 CVE-2022-47928,0,0,bb1f9509023e24d36d79fffee2d16ac8507bcf41ac832c4875a26f9520273dc1,2024-11-21T07:32:32.790000 CVE-2022-47929,0,0,8029fd6ef83b6a0a40287e582ba4e131f5d3f771ef0c8489c1e7a8519b0e3c11,2025-04-04T18:15:43.927000 CVE-2022-4793,0,0,6d1e9f792a7838bd1432d3121154a424b060cc0460b4dd4afad72cec1a43b138,2025-03-27T21:15:41.340000 @@ -212611,7 +212611,7 @@ CVE-2022-48391,0,0,f0df4ac89a14bd04b2e3255027b9378110b488fdd508ecb0d7b41f885e40b CVE-2022-48392,0,0,b9fe3ba20fbbdfc5d1b9633d462e670d9b83c0269326581c320b3af6ba985f83,2025-01-08T16:15:27.267000 CVE-2022-4840,0,0,8593d435f1bfe4de06d5751803d143b53df092b88164a311eec3d96d433c7a2a,2024-11-21T07:36:03.047000 CVE-2022-4841,0,0,aa0be02bc0f514a14ceab97461cd0599b9d6992ea08fddafb73f57498c188781,2024-11-21T07:36:03.167000 -CVE-2022-4842,0,1,59db9ab30460788a354d7e0bf46cd4437b13ff0f311ab4a5e6896c72e85775f2,2025-04-08T14:15:30.157000 +CVE-2022-4842,0,0,59db9ab30460788a354d7e0bf46cd4437b13ff0f311ab4a5e6896c72e85775f2,2025-04-08T14:15:30.157000 CVE-2022-48422,0,0,21280efffd732310e96aab7ce559416bfc11e676f2fac7503fda3c38abd1c1c0,2025-02-27T17:15:13.490000 CVE-2022-48423,0,0,9a382a8f9283e9cc20387d0ba6add00de2aff03f57ee8431397c94b87413c240,2025-02-27T17:15:14.530000 CVE-2022-48424,0,0,9da47869864ec90be63e396d6253bb25acaf19379b79f5fbbeffac650f050c1b,2025-02-27T17:15:14.697000 @@ -212854,9 +212854,9 @@ CVE-2022-48692,0,0,9888804f4f14553a5388d5f8c7c31b0858633c6eb19feb117f85e2aace3dd CVE-2022-48693,0,0,a5cb23bc8dbe30b42ce8b5450d769c31a3c351129d9b6f4a2a5684e927a3d2f5,2024-11-21T07:33:47.997000 CVE-2022-48694,0,0,6109007c3549971f73d63f60b4cf54a412c2e2f3e92a6523eb10a76b885dc916,2024-11-21T07:33:48.130000 CVE-2022-48695,0,0,7eaf630bd87d7a6400d51678bcc821e9dc1e5454976b70a020ecc4628a3da64e,2024-12-26T20:38:14.673000 -CVE-2022-48696,0,1,68e25522fe29f37aa72e9a2c004ae16202dab0fc2e9ee3595ad6900f2a5ff236,2025-04-08T15:50:44.037000 -CVE-2022-48697,0,1,6636b54ba1c8b024630808b7dd69632a9402ffc37298c73df17f9020e7399ce3,2025-04-08T15:47:37.553000 -CVE-2022-48698,0,1,757b9d8e85f2f60517a233e4330b21bea480184a2d3da1442abac1a77c637a44,2025-04-08T15:46:37.950000 +CVE-2022-48696,0,0,68e25522fe29f37aa72e9a2c004ae16202dab0fc2e9ee3595ad6900f2a5ff236,2025-04-08T15:50:44.037000 +CVE-2022-48697,0,0,6636b54ba1c8b024630808b7dd69632a9402ffc37298c73df17f9020e7399ce3,2025-04-08T15:47:37.553000 +CVE-2022-48698,0,0,757b9d8e85f2f60517a233e4330b21bea480184a2d3da1442abac1a77c637a44,2025-04-08T15:46:37.950000 CVE-2022-48699,0,0,4a65b916873eacb0ff3e3e320e4042125dd7b4593e08989ea9e1bb3148422bc9,2024-11-21T07:33:48.920000 CVE-2022-4870,0,0,cf8eabe70441156e718239f55dd4a96c27111e9045e8fc7245a71a9a53fcb5be,2025-01-21T21:15:08.203000 CVE-2022-48700,0,0,df92ed3f7cac2bfbad90002c2f19832292b50de0d525a7db006f3a2f0869ac18,2024-12-19T11:15:30.050000 @@ -214056,7 +214056,7 @@ CVE-2023-0038,0,0,2a3f65455134a94c91cd26d281c710445fbb9fcd889aa612cded8dff6f21cd CVE-2023-0039,0,0,d8fc5a260515ca8bf2d6438e2d24484997e6b69319da7eb48b0fdfda98763774,2023-11-07T03:59:29.950000 CVE-2023-0040,0,0,9dbfdbb9e6cb7dee092c750709e3eeaa1da4523d1bca2312d2cad8b1a08654b4,2025-04-03T20:15:19.573000 CVE-2023-0041,0,0,d5260d420f1cd6c78adae2a5f84b81d66b97bb4962628ebb0c02b41c604a1529,2024-11-21T07:36:26.710000 -CVE-2023-0042,0,1,8da9d6acf2ad91620c945a76999d0c1695032c91d50273ee89e6dd49645ebf99,2025-04-08T14:15:30.350000 +CVE-2023-0042,0,0,8da9d6acf2ad91620c945a76999d0c1695032c91d50273ee89e6dd49645ebf99,2025-04-08T14:15:30.350000 CVE-2023-0043,0,0,031c84811692a82611008aac09f88dda83efce96895b6668da129b218ebcdc29,2025-03-10T19:15:36.813000 CVE-2023-0044,0,0,5e0b3bc76f4e520dfb3a7d3f8757c01f27c22cbe64833773e8a4716039c15539,2024-11-21T07:36:27.050000 CVE-2023-0045,0,0,0b3fb0f7f170c454540ecd2b56095b147720cad9a83cc54301e4003eb4127273,2025-02-13T17:15:52.813000 @@ -220095,8 +220095,8 @@ CVE-2023-24932,0,0,e8a46cb1a1efe6585d0924bde867a63f0e2815879b41600f60665d01530ae CVE-2023-24934,0,0,b063256a223adfefb231bf44cf66744c128745708e070ccb4c8cf146c607f43b,2024-11-21T07:48:47.787000 CVE-2023-24935,0,0,8614e0b6fbe2f08c0b431b27c8e1fe123ed66ddc777242e7c09ee082c7bf41f3,2025-02-28T20:15:41.810000 CVE-2023-24936,0,0,505bcf4b6a5f58019032a1d5b6159bf29aaa4d730ba53d1a3bb4919bbceffcb1,2024-11-21T07:48:48.003000 -CVE-2023-24937,0,1,df4dc5a3f04779042d9ce255492550af25cc4ed2736e4afa5fe9fe8c2bb1c1c7,2025-04-08T14:14:18.553000 -CVE-2023-24938,0,1,6eb011b39efea5370ac8ab8a8db89a80b5f8f83518790ad08278bb5c5907fa71,2025-04-08T14:14:05.310000 +CVE-2023-24937,0,0,df4dc5a3f04779042d9ce255492550af25cc4ed2736e4afa5fe9fe8c2bb1c1c7,2025-04-08T14:14:18.553000 +CVE-2023-24938,0,0,6eb011b39efea5370ac8ab8a8db89a80b5f8f83518790ad08278bb5c5907fa71,2025-04-08T14:14:05.310000 CVE-2023-24939,0,0,82b2cf48dbd2c88e9a59665c9c753d6ab549aaa9f48226e64f56c97fb9bb1b57,2024-11-21T07:48:48.457000 CVE-2023-2494,0,0,0ba18749941907064301180692bd261d9a8c0d1b36dfb6bc8c8c1fa7fb6d6fdd,2024-11-21T07:58:43.353000 CVE-2023-24940,0,0,d93d7abf88811c537649c0b3bf70a0464fae31c113d860086c9d9a8178df4577,2024-11-21T07:48:48.590000 @@ -223829,37 +223829,37 @@ CVE-2023-29341,0,0,1b699b9ad2eb804877376073e76ece4b61190c4d50727cb158d1eaeb5f735 CVE-2023-29343,0,0,cfc81706f22482b588ec8d4d8f313a6c58dedf406801f4ffbd4237aa891636ab,2024-11-21T07:56:53.787000 CVE-2023-29344,0,0,aa9a273c7d2a522ac37d5ad0cdbeaae05813b658602af8017f63cb8a17b4fcde,2024-11-21T07:56:53.887000 CVE-2023-29345,0,0,3e6f767c3a559321f7adb5c3177c5c494d0b29138bf9d6b87cd3926904a7c64b,2025-01-01T02:15:33.550000 -CVE-2023-29346,0,1,1f7530d333310362cef944d280c360dbc4b2338492bad588103a70d6e419962d,2025-04-08T14:13:46.450000 +CVE-2023-29346,0,0,1f7530d333310362cef944d280c360dbc4b2338492bad588103a70d6e419962d,2025-04-08T14:13:46.450000 CVE-2023-29347,0,0,7540a8b8428988d01d75207c6801c8a4498852058d52dd035965bc8e2062d910,2024-11-21T07:56:54.247000 CVE-2023-29348,0,0,cde6c9d0d1c4a590530eacdeaf218fbd357f360dae86b83faf7599fdfa227cbf,2024-12-12T01:19:43.200000 CVE-2023-29349,0,0,68f1fee57235f288caf20ce8e4d0f85f5f33cf9c2891304252a1903ff58cce8f,2024-11-21T07:56:54.493000 CVE-2023-2935,0,0,a1f830d805349a093c6cdeb2502a942677ce9d486e83c5e09da994318fabaf74,2024-11-21T07:59:36.050000 CVE-2023-29350,0,0,2ed5d40d921be07f53bcb7b5ee007eec52d63d5dc0e2ea404264ac6c6796fb1f,2025-02-28T21:15:22.160000 -CVE-2023-29351,0,1,3ef813b7e4787c30492e495c2d83c8d1af7d43e4081d9de35ffd0a5e5c4fc8fe,2025-04-08T14:13:17.930000 -CVE-2023-29352,0,1,87f3f9bb4b949fc1a7582044e7a53e511ffc2622bff2c15ea117b734dcf2bfd2,2025-04-08T14:12:48.513000 +CVE-2023-29351,0,0,3ef813b7e4787c30492e495c2d83c8d1af7d43e4081d9de35ffd0a5e5c4fc8fe,2025-04-08T14:13:17.930000 +CVE-2023-29352,0,0,87f3f9bb4b949fc1a7582044e7a53e511ffc2622bff2c15ea117b734dcf2bfd2,2025-04-08T14:12:48.513000 CVE-2023-29353,0,0,e45da25f220130fb5cb22b2ad186a54f698750c2df7dce2298e1cb7352ee3695,2024-11-21T07:56:54.950000 CVE-2023-29354,0,0,6e6e6f6e09c384de89c89ff717c6b28e221fec8335db9a1d673dc1093d4c046a,2025-02-28T20:15:43.080000 CVE-2023-29355,0,0,37a7c5aee10b1e24a3440064cdb291401fd0f225379840c469ffc476bc6e1e48,2024-11-21T07:56:55.157000 CVE-2023-29356,0,0,60935bcd3b095359e91882913cbcf4abe11e68728d0771cac0006d94e9e34dd9,2024-11-21T07:56:55.277000 CVE-2023-29357,0,0,2c1fa6c58bc572203ae6535480a4b7f815939c544a1d5e39f99a5a2706c59038,2025-03-10T20:44:31.630000 -CVE-2023-29358,0,1,b092d3ea3eb6a5500b5d0d0c94c7f047a8c70a42c4c689638dd57129c42cb8da,2025-04-08T14:12:20.847000 -CVE-2023-29359,0,1,f1db5c4eaa974747a20fe4cd3329e6b945518a61f8a2cd9421977b37b4999709,2025-04-08T14:09:29.970000 +CVE-2023-29358,0,0,b092d3ea3eb6a5500b5d0d0c94c7f047a8c70a42c4c689638dd57129c42cb8da,2025-04-08T14:12:20.847000 +CVE-2023-29359,0,0,f1db5c4eaa974747a20fe4cd3329e6b945518a61f8a2cd9421977b37b4999709,2025-04-08T14:09:29.970000 CVE-2023-2936,0,0,35f1cc12fb7af17c48afd6aa8328fec33f868fc27aead065fec431992c565531,2024-11-21T07:59:36.180000 CVE-2023-29360,0,0,7dda314c37d413a4e0c11f57585df00e028c2ceb7e1fe8d64dba24e3c35c9c4d,2025-03-10T20:45:37.843000 -CVE-2023-29361,0,1,ef178c299854d3aee0b02a8952f2ea0aa496b70a0522e77966fc6b15711fb624,2025-04-08T14:06:13.757000 -CVE-2023-29362,0,1,30987f5a784ecd0548d3efa3f9812a7b2a8d60b2f5bbe061483854683106415d,2025-04-08T14:02:08.773000 -CVE-2023-29363,0,1,2e20419eba40a44f5ace970764f923cbb7b54bd1f8abf4acb0e2c7991e9dcd83,2025-04-08T14:01:14.263000 -CVE-2023-29364,0,1,2632cf38d7670e21afb5214550d4c7f223792dfb2310ad57a2b2a042a8783914,2025-04-08T14:20:05.853000 -CVE-2023-29365,0,1,93d8757e575a24a8989a42f7e6b15b874f1601fa72398754d8abd661dbfb0bc7,2025-04-08T14:19:49.750000 +CVE-2023-29361,0,0,ef178c299854d3aee0b02a8952f2ea0aa496b70a0522e77966fc6b15711fb624,2025-04-08T14:06:13.757000 +CVE-2023-29362,0,0,30987f5a784ecd0548d3efa3f9812a7b2a8d60b2f5bbe061483854683106415d,2025-04-08T14:02:08.773000 +CVE-2023-29363,0,0,2e20419eba40a44f5ace970764f923cbb7b54bd1f8abf4acb0e2c7991e9dcd83,2025-04-08T14:01:14.263000 +CVE-2023-29364,0,0,2632cf38d7670e21afb5214550d4c7f223792dfb2310ad57a2b2a042a8783914,2025-04-08T14:20:05.853000 +CVE-2023-29365,0,0,93d8757e575a24a8989a42f7e6b15b874f1601fa72398754d8abd661dbfb0bc7,2025-04-08T14:19:49.750000 CVE-2023-29366,0,0,3efed68d33a4ae1a17338ba261e03adef17a82981a155ca0db57a1c6401f59da,2024-11-21T07:56:56.530000 CVE-2023-29367,0,0,23c40728404323e849f595204253bd7a6fd6f5ea5e9c120bf0de4f71469c062e,2024-11-21T07:56:56.630000 -CVE-2023-29368,0,1,7057d794e418c7ad9298533b13c7eff050fa74c860004d22af2f69336bc325ed,2025-04-08T14:19:22.037000 +CVE-2023-29368,0,0,7057d794e418c7ad9298533b13c7eff050fa74c860004d22af2f69336bc325ed,2025-04-08T14:19:22.037000 CVE-2023-29369,0,0,bca25ce565153219d1f64d4ddee39f94d6e725abf989120af706b83272f6994c,2024-11-21T07:56:56.870000 CVE-2023-2937,0,0,e72269418f373c17997c4da73690e403c1b65ec44aaa6a03289eba474eb30b23,2025-03-11T18:15:29.073000 -CVE-2023-29370,0,1,96633e57d0a9ab05dbe2546728994e123961096e658190238ba1829ccada53ef,2025-04-08T14:19:06.270000 -CVE-2023-29371,0,1,c4aa77d12d5a31dfa696120c6dd40c7922264ef460e18dbb9865e247a24caeb3,2025-04-08T14:18:49.567000 -CVE-2023-29372,0,1,c665d6ab1d2be620525a849eee4b3f5cc9c48cd80cabbf3feb9cb0e8ebfdc0eb,2025-04-08T14:18:27.493000 -CVE-2023-29373,0,1,970f2aaadee597fbd1e335c20bca11874731488df36dec0c441e6ca9a36963c2,2025-04-08T14:18:10.067000 +CVE-2023-29370,0,0,96633e57d0a9ab05dbe2546728994e123961096e658190238ba1829ccada53ef,2025-04-08T14:19:06.270000 +CVE-2023-29371,0,0,c4aa77d12d5a31dfa696120c6dd40c7922264ef460e18dbb9865e247a24caeb3,2025-04-08T14:18:49.567000 +CVE-2023-29372,0,0,c665d6ab1d2be620525a849eee4b3f5cc9c48cd80cabbf3feb9cb0e8ebfdc0eb,2025-04-08T14:18:27.493000 +CVE-2023-29373,0,0,970f2aaadee597fbd1e335c20bca11874731488df36dec0c441e6ca9a36963c2,2025-04-08T14:18:10.067000 CVE-2023-29374,0,0,05d9e7e4f9a15a1d0bedeea80fd7b3b538c7a3c199bea8839e3893e83404870f,2025-02-12T17:15:18.260000 CVE-2023-29375,0,0,c36a87ce03fed844189ada2f3d0d0b6776ce936ef348695cd06b1bb92f6222f0,2025-02-12T15:15:11.883000 CVE-2023-29376,0,0,ad99879985d5998c49f5d61784393df470a8be95a8f9d2de7f2e1321481e5789,2025-02-11T16:15:38.160000 @@ -225645,19 +225645,19 @@ CVE-2023-32004,0,0,cbbaa092062a4f5510a61e528f98f6b50fa674934ad1ed60d751841c90d43 CVE-2023-32005,0,0,6d4155b2672f33e3bf5b22ec572249b8c49a4805bfa01f83395becc1d3c4a3a7,2024-11-21T08:02:30.747000 CVE-2023-32006,0,0,d210f7ae470fbe6e4f3a8c259718564743c91cb71fa2e515e00cd5c340e22f37,2024-11-21T08:02:30.857000 CVE-2023-32007,0,0,a7f4defaf6106504b5e4467886e0f94b050ca341bdafacdbf0d17720699bcd3e,2025-02-13T17:16:29.410000 -CVE-2023-32008,0,1,ce2c47932dbd9cd7e200b1ead822f30561332dd76259fcb9af4c00c2ee6998ba,2025-04-08T14:17:29.320000 +CVE-2023-32008,0,0,ce2c47932dbd9cd7e200b1ead822f30561332dd76259fcb9af4c00c2ee6998ba,2025-04-08T14:17:29.320000 CVE-2023-32009,0,0,093d7270e11b425dcc3e32a3222cf78fa35f53123ce63b99b2238f276585fbe7,2024-11-21T08:02:31.280000 CVE-2023-3201,0,0,a0eccca55192dd81f5c66cb7e12ff089b38056e691d02336b0d4a03db1609306,2024-11-21T08:16:41.083000 CVE-2023-32010,0,0,a8c8cccfe48b7b5ff23a554c084b3a58ac7e8735ec3b16e535ff839b3f0ce6e4,2024-11-21T08:02:31.410000 -CVE-2023-32011,0,1,2dd61c291f3b40ba4deac1609152d1bb225188e4037a2f8be1ad89cf0ee94d3c,2025-04-08T14:16:55.833000 +CVE-2023-32011,0,0,2dd61c291f3b40ba4deac1609152d1bb225188e4037a2f8be1ad89cf0ee94d3c,2025-04-08T14:16:55.833000 CVE-2023-32012,0,0,2e97e814048d2e97b6ea9d089aa2a8af45ab878bd8634179a04c953c9730dacf,2024-11-21T08:02:31.710000 CVE-2023-32013,0,0,b5e5b23994cc70188ce1518bd3f12d9bed9ac9c2ac2b8362f3f57273e617608d,2024-11-21T08:02:31.857000 -CVE-2023-32014,0,1,7a4b75646c46918015ea207c19931f89fa095e639d93a3fe24c44b3c2ba96dea,2025-04-08T14:16:17.183000 -CVE-2023-32015,0,1,d5cd823693b94826e6d458ed809115cdb58476e268f9b1fa5808574515850c1f,2025-04-08T14:33:07.337000 -CVE-2023-32016,0,1,ce1b1ecd1e621acf7b3ca468f6f91157dcf5db1601b64833dbb68454d7c43fc4,2025-04-08T14:32:52.117000 -CVE-2023-32017,0,1,2b785a91045a5e90f492742672077b7339176bcc184f8e2c8b3efc4a13a0d289,2025-04-08T14:32:38.020000 +CVE-2023-32014,0,0,7a4b75646c46918015ea207c19931f89fa095e639d93a3fe24c44b3c2ba96dea,2025-04-08T14:16:17.183000 +CVE-2023-32015,0,0,d5cd823693b94826e6d458ed809115cdb58476e268f9b1fa5808574515850c1f,2025-04-08T14:33:07.337000 +CVE-2023-32016,0,0,ce1b1ecd1e621acf7b3ca468f6f91157dcf5db1601b64833dbb68454d7c43fc4,2025-04-08T14:32:52.117000 +CVE-2023-32017,0,0,2b785a91045a5e90f492742672077b7339176bcc184f8e2c8b3efc4a13a0d289,2025-04-08T14:32:38.020000 CVE-2023-32018,0,0,65fcb92a6ca1d51c17b687f0c38811a9947463a3ab115c45354c594b56113980,2024-11-21T08:02:32.610000 -CVE-2023-32019,0,1,36fbcf8cd09418956a7e3c5f32523690c3e30b90b463651b9e89273baa3332e3,2025-04-08T14:32:28.637000 +CVE-2023-32019,0,0,36fbcf8cd09418956a7e3c5f32523690c3e30b90b463651b9e89273baa3332e3,2025-04-08T14:32:28.637000 CVE-2023-3202,0,0,0ab1ff700226b8564645469fcc0896872eff87e4a741c7777fcb42b454da0792,2024-11-21T08:16:41.210000 CVE-2023-32020,0,0,346041a1e74009042b5f758f2ff4a27e17af90e7fc3267142f8ff874809b38a5,2024-11-21T08:02:32.887000 CVE-2023-32021,0,0,11591a8d4f8a93f3cfa0af2db8430632ed4ca9e32b24598d85f0904de041fc32,2024-11-21T08:02:33.027000 @@ -227491,7 +227491,7 @@ CVE-2023-34120,0,0,f656e181bafc2d2961a70ea48fa9c78c0a620ac9ae0a0b3a92a91f375470a CVE-2023-34121,0,0,972d452d763b0b0879cf757c8d51bedcde4020e9bf8488b9a820e18c09e38e7a,2024-11-21T08:06:35.540000 CVE-2023-34122,0,0,f585e4332bb8bfbbab2b3607d749ecaf3551ff5d2da712c1ba0736863bada1bc,2024-09-04T19:15:29.087000 CVE-2023-34123,0,0,a736ba4d3d7fcefeae653e424292cabfbaf0efbc05dc55df966b21a6c9356869,2024-11-21T08:06:35.690000 -CVE-2023-34124,0,0,18b8e4610f6b5650ca7ae56c5ccba612c72dc5efcaea77a3edb67db50e73f728,2025-02-13T17:16:34.607000 +CVE-2023-34124,0,1,f554cfed73018f460eb6939825dc9e2da8c3939862c8c51683d16dc7cca07bed,2025-04-08T16:15:24.530000 CVE-2023-34125,0,0,a3b84ad182997fe5309c2c5ce7534a26453fddd9a7f49e5442abc6877bc59332,2024-11-21T08:06:35.997000 CVE-2023-34126,0,0,55ba82460c707fa30e10b55c7b6e930a7bf0e71527716191017a6327c4b04101,2024-11-21T08:06:36.143000 CVE-2023-34127,0,0,54f272a150d5a7f9e08cd2746bf69d1776b07018fe98a6a283aa9ca1c015a855,2024-11-21T08:06:36.273000 @@ -228334,7 +228334,7 @@ CVE-2023-35350,0,0,197d77a640c3b886dcb3cd00f7593e0f1fa9eb73a57875f78f619d785091b CVE-2023-35351,0,0,498b890a10fe8ac1ebb2c66e2aba0bcfa6ff095c06efec9dc31f9f5c91abc4c1,2024-11-21T08:08:16.227000 CVE-2023-35352,0,0,5870686c2798bfd0432256f5a77219f5ff72c4d5fba6b9838440df5e87e3907f,2024-11-21T08:08:16.390000 CVE-2023-35353,0,0,67fef8e375a85677a2c9657d0e2ee5c68cdb3508ea03fc7637e39667be566a73,2024-11-21T08:08:17.167000 -CVE-2023-35355,0,1,1698edf69de7f2da45b964183bacca440e94fdeea1ac2947184d2ff4d47c0c20,2025-04-08T14:32:16.743000 +CVE-2023-35355,0,0,1698edf69de7f2da45b964183bacca440e94fdeea1ac2947184d2ff4d47c0c20,2025-04-08T14:32:16.743000 CVE-2023-35356,0,0,1cf3972afb2e35ecb1789cabe9b3ebc020e48435861ccaaebc1a97576b9c3c7b,2025-01-01T02:15:58.307000 CVE-2023-35357,0,0,c9a38160ad85f8ea1f814e6c29247c92f2815e37a29d1001ad47c14354cd9c9d,2025-01-01T02:15:58.433000 CVE-2023-35358,0,0,d6a23960f6f1adb4f49000920c92582dc4a7fcb7fd2e835e6e251f93c70b9740,2025-01-01T02:15:58.583000 @@ -229386,7 +229386,7 @@ CVE-2023-36801,0,0,2237963e3b90a59e82b4735fbe74f2c87e02c908d268d3908b857f8fb1af6 CVE-2023-36802,0,0,d1233ac8e0303e8ce4e8cced68eacaf4ed35efe75eb7186705fe0b95955fe0d4,2025-01-23T18:12:28.613000 CVE-2023-36803,0,0,2479d4889cca1eb8dbd61a47f7cdd147dfb4ccfacdad9b8770b2bcfbb11ee0b5,2025-01-01T02:16:20.597000 CVE-2023-36804,0,0,3fa6041d1a0d6460c95c8adffd7cd1cdd9fe3018852a2e4774f59de2d276ddfd,2024-11-21T08:10:37.770000 -CVE-2023-36805,0,1,10a080e6cf1330e1359ae2288ec39badc36a60c9065e3c6939bb30955c7105cd,2025-04-08T14:32:00.083000 +CVE-2023-36805,0,0,10a080e6cf1330e1359ae2288ec39badc36a60c9065e3c6939bb30955c7105cd,2025-04-08T14:32:00.083000 CVE-2023-36806,0,0,c824511455c079aff82167dcee86f0056ca29b9f30e44c7c71c8032bbd65c635,2024-11-21T08:10:38.097000 CVE-2023-36807,0,0,33b8f0464952474f69988d3b1306bdf16091bd32bddaff31207d884164a46290,2024-11-21T08:10:38.247000 CVE-2023-36808,0,0,6b360670610b0fa229affa03ced63e1cdcac4e66d360dfde74c12293cd09272a,2024-11-21T08:10:38.380000 @@ -230263,7 +230263,7 @@ CVE-2023-37927,0,0,91c985b74b4cf0c20cf9ee2e34abb6e9d5e5bc09f1967cdc6aacd97f6165b CVE-2023-37928,0,0,dec776d364ef37b6e291aec9a18f90850b125ef62937fdd2b294a62c2fd46954,2024-11-21T08:12:29.503000 CVE-2023-37929,0,0,4095396c6fb48583172ab2f6692b90080e3afde295fcb5a19cf8d9f8e85d9718,2025-01-22T22:55:02.317000 CVE-2023-3793,0,0,e9ede59406bf67af7b0914c618fd7187696ca61b0cb1dc2d5985173c262f0733,2024-11-21T08:18:04.660000 -CVE-2023-37930,1,1,fb43cbad0eb288f1baa25fd1dbaca71b2ebd76310ca8a825d5612a7e604b375a,2025-04-08T14:15:30.653000 +CVE-2023-37930,0,0,fb43cbad0eb288f1baa25fd1dbaca71b2ebd76310ca8a825d5612a7e604b375a,2025-04-08T14:15:30.653000 CVE-2023-37931,0,0,a0b40b55eb2247b05e0ceeef5e9f955a4a55dda449f703f6bca219262f750a7a,2025-02-18T22:15:09.843000 CVE-2023-37932,0,0,f0df6819630bb22aa824d7b6acf6b4dd3a2036be6cce60c742b53c8d1d382fd2,2024-11-21T08:12:29.797000 CVE-2023-37933,0,0,2f1bd770acf60f6c7e800508cf362e293531d59e8eb1b0ce483ebb596350a679,2025-03-11T15:15:38.480000 @@ -230476,17 +230476,17 @@ CVE-2023-38135,0,0,a9eca0d1487abab7057a92f32328b56c514faa78c668f86dc1cd7bba91171 CVE-2023-38136,0,0,cc4955f78f48feea52a8ff9bece7ccf895118e79124cbc89767e10212b3e4ba9,2024-12-12T14:26:18.893000 CVE-2023-38137,0,0,1cec05d7be20edcda40f67c7c6ac8d770b26a8316863ab68482af52d2669688c,2024-02-14T18:15:45.880000 CVE-2023-38138,0,0,265118541aedab6ba410564980d475efb6b1cc3413d9a0d65fd07fdd99402bf9,2024-11-21T08:12:56.123000 -CVE-2023-38139,0,1,5c4c3e6531df3ef0be32cf66dbbb6f7cca2e7294d2febe96f5d3a7918e5133c9,2025-04-08T14:31:45.837000 +CVE-2023-38139,0,0,5c4c3e6531df3ef0be32cf66dbbb6f7cca2e7294d2febe96f5d3a7918e5133c9,2025-04-08T14:31:45.837000 CVE-2023-3814,0,0,50c8b1f6ff11b5c3809021368f87eeb1fa75ea2568cbc65a64c1135349534f2c,2025-03-06T16:15:42.640000 -CVE-2023-38140,0,1,6f5c2399b74203910039d8f7d1d103fccc254c09f1878778061d25b2890a546b,2025-04-08T14:31:32.003000 -CVE-2023-38141,0,1,25f959588251bc905cdee8a2d377835e8cb2da447fc35c983bdc559966dfdf6d,2025-04-08T14:31:20.450000 -CVE-2023-38142,0,1,3393a21f1e4170a79bb08fe97a74634664b9e0bcce692ddf6a6535e76813b058,2025-04-08T14:31:05.450000 -CVE-2023-38143,0,1,7b1e93b9601a4a5f6de3ccab3385f246d35cc36d663813adc8a6af30bb5bae0f,2025-04-08T14:30:53.563000 -CVE-2023-38144,0,1,bbe6f8b1bc507422ae15e77ecb6c819983865ddd9947df06d75c7c71fd9d8543,2025-04-08T14:30:39.213000 +CVE-2023-38140,0,0,6f5c2399b74203910039d8f7d1d103fccc254c09f1878778061d25b2890a546b,2025-04-08T14:31:32.003000 +CVE-2023-38141,0,0,25f959588251bc905cdee8a2d377835e8cb2da447fc35c983bdc559966dfdf6d,2025-04-08T14:31:20.450000 +CVE-2023-38142,0,0,3393a21f1e4170a79bb08fe97a74634664b9e0bcce692ddf6a6535e76813b058,2025-04-08T14:31:05.450000 +CVE-2023-38143,0,0,7b1e93b9601a4a5f6de3ccab3385f246d35cc36d663813adc8a6af30bb5bae0f,2025-04-08T14:30:53.563000 +CVE-2023-38144,0,0,bbe6f8b1bc507422ae15e77ecb6c819983865ddd9947df06d75c7c71fd9d8543,2025-04-08T14:30:39.213000 CVE-2023-38146,0,0,789d8d30273960ba331e83008afddef98fc3ea87c905e76b86b35c1189c7d612,2025-01-01T02:16:27.247000 -CVE-2023-38147,0,1,28f71f2b9c0bf0febfeca432a3ce1beecadce5acaeeda19bde19cd7169145c4b,2025-04-08T14:30:24.657000 -CVE-2023-38148,0,1,538f71ffe9cb75fee28f15f5e96ab38dd6a9a9f6a24e4ca36914641774233570,2025-04-08T14:29:52.907000 -CVE-2023-38149,0,1,7dada51067e69f420bf225a98ce9245bc20359af87c8546e09070d99493dc1a6,2025-04-08T14:28:52.580000 +CVE-2023-38147,0,0,28f71f2b9c0bf0febfeca432a3ce1beecadce5acaeeda19bde19cd7169145c4b,2025-04-08T14:30:24.657000 +CVE-2023-38148,0,0,538f71ffe9cb75fee28f15f5e96ab38dd6a9a9f6a24e4ca36914641774233570,2025-04-08T14:29:52.907000 +CVE-2023-38149,0,0,7dada51067e69f420bf225a98ce9245bc20359af87c8546e09070d99493dc1a6,2025-04-08T14:28:52.580000 CVE-2023-3815,0,0,14c7828562e9c1b8d9652eb75cd10f9819d1d4d8f65787dd7645effe18612ca5,2024-11-21T08:18:08.007000 CVE-2023-38150,0,0,3b4ba243388f5bcdf27fc22944e3eaf3474f4ac12da017d4305bed9d90e6f329,2024-11-21T08:12:57.853000 CVE-2023-38151,0,0,bba41dc3121033acbfa77bd8da20a21d63ee60d2f36dea18640b942004979df1,2024-11-21T08:12:57.997000 @@ -230497,7 +230497,7 @@ CVE-2023-38156,0,0,51bacb16165725150d7179f1c6ba7a60857387d8947da33ad3d4fed359aae CVE-2023-38157,0,0,6ff6edb86c6bf3b73c12a3f979d74b2c9ee822b9ecdcab29e69ce33f5965562a,2025-02-28T20:15:45.603000 CVE-2023-38158,0,0,b271c1b3bc3d1329a1c6c74a9a37746e978b4329a6fc4378a70ebb39e4f8de07,2025-02-28T20:15:45.757000 CVE-2023-38159,0,0,98e8cc2dacb18fb1b614f0b8b0817da70f2eb30b0c255fcc084552daa2f0110c,2024-11-21T08:12:58.960000 -CVE-2023-38160,0,1,d60ad194d7f1e5939e772122bb35e2515a5d80f8f81834508cbb0a1275e793fa,2025-04-08T14:28:33.697000 +CVE-2023-38160,0,0,d60ad194d7f1e5939e772122bb35e2515a5d80f8f81834508cbb0a1275e793fa,2025-04-08T14:28:33.697000 CVE-2023-38161,0,0,425bbff8bdf397140af80aa5a1ca7762fa0f59e5f74436e3b4eac764ce24ca07,2024-11-21T08:12:59.270000 CVE-2023-38162,0,0,fe50348239a5f74b25c79f82627d637e93bf11b77d23357d3ccd95d34c00f743,2024-11-21T08:12:59.427000 CVE-2023-38163,0,0,363da4136b84e8e1abe889a9428310beef7b10519fb606bc68ad161a82ed409b,2024-11-21T08:12:59.580000 @@ -234876,7 +234876,7 @@ CVE-2023-43765,0,0,99004e8e128e46fab6a6d13270675ec46d3126287f743f55fcca60d037b5a CVE-2023-43766,0,0,1874f5bb733291888446fa8e6899fc86b101332f133975cc5c47954254b77f89,2024-11-21T08:24:44.703000 CVE-2023-43767,0,0,71262d6ff27787aa37a9ccff291ff315f630e05676576edeb71c5c04a91a7cf7,2024-11-21T08:24:44.860000 CVE-2023-43768,0,0,f5e6b86fff28d5fbf8ecd9b88f177624082dded6d31ce2200cd91661bd8d2363,2024-11-21T08:24:45.010000 -CVE-2023-43769,0,1,7ca2250dcf38732e531a1484ef7131f603a53b893c835735491ef0a9877ccb4f,2025-04-08T14:53:42.047000 +CVE-2023-43769,0,0,7ca2250dcf38732e531a1484ef7131f603a53b893c835735491ef0a9877ccb4f,2025-04-08T14:53:42.047000 CVE-2023-43770,0,0,cdff146a566e12a04d6a3f422def399e9bda5cf5176e2678a567e58ef2db315b,2024-12-20T17:40:26.160000 CVE-2023-43771,0,0,6eb1f0ca5129e4601acf0473c7b9e92e5cddadc9a4e24dc03aed5645d8b80a26,2024-11-21T08:24:45.577000 CVE-2023-43775,0,0,54c6bf3cb2bdce0279ba011963bbb56a47cfae73d52d4b60331f30063fd846a0,2024-11-21T08:24:45.740000 @@ -239186,7 +239186,7 @@ CVE-2023-49734,0,0,a22a8067eaa4f61f80a0e61afe23750c71a3b8153c8b16eb203f1a1fb478e CVE-2023-49735,0,0,228b0380afd67ef7cf5bbd42bfc07aaa1241e6c039a2f3486c1e515fcfaa7819,2024-11-21T08:33:45.020000 CVE-2023-49736,0,0,383e539d145b5b0a89273b88ed563b8e1ad49804bf886b578d51b51d052ac258,2025-02-13T18:15:45.373000 CVE-2023-49738,0,0,2b12e3e8524ea15692abd9b16822c9089589b5e93d98b79711f485178de7842f,2024-11-21T08:33:45.263000 -CVE-2023-49739,0,1,600943502d09183cf2c54df2dd6ce85518cba8d74e1314f8ee0eb64d5908dbe3,2025-04-08T14:06:01.383000 +CVE-2023-49739,0,0,600943502d09183cf2c54df2dd6ce85518cba8d74e1314f8ee0eb64d5908dbe3,2025-04-08T14:06:01.383000 CVE-2023-4974,0,0,0ce0386712441b5f233ddd860cbcdcd9b5856259baf65218a755acb96abcb10f,2024-11-21T08:36:22.890000 CVE-2023-49740,0,0,5dba4d54a4b00ad8b48d6bf02488137865c89a66c8894ac81ce3572d3b8cfec9,2025-01-16T15:44:50.793000 CVE-2023-49741,0,0,ffc969bec8c5c782ad8a88845ecde3f669dc839bea1c91530bb073d28ec3bbe0,2024-11-21T08:33:45.633000 @@ -239352,8 +239352,8 @@ CVE-2023-49927,0,0,82081beee4061cffd34ef78d24cb99766202a0680d9634397ead28fc1aa57 CVE-2023-49928,0,0,82ea9a4a554f64be0f803001236700d4005765edb3e3d68735cc84f142a81ad7,2024-11-21T08:34:01.323000 CVE-2023-4993,0,0,e5c430012213b9825781e760c6627345c173270597fd8a35599826800c33c336,2025-01-23T16:56:18.263000 CVE-2023-49930,0,0,e65d885af3d1a83df581ba96e91fd42bce9b98eec275850df2baaa418d05d402,2025-03-28T19:15:17.270000 -CVE-2023-49931,0,1,d98a4a0d45e646128ae227434ba4084d4d15b545fe5d7079c5a2c54eb954be3e,2025-04-08T14:56:31.610000 -CVE-2023-49932,0,1,1a1d3f364a42f7f4bfc0b0d656d58c318590529e521079fe9caafd35b77467cf,2025-04-08T14:57:25.510000 +CVE-2023-49931,0,0,d98a4a0d45e646128ae227434ba4084d4d15b545fe5d7079c5a2c54eb954be3e,2025-04-08T14:56:31.610000 +CVE-2023-49932,0,0,1a1d3f364a42f7f4bfc0b0d656d58c318590529e521079fe9caafd35b77467cf,2025-04-08T14:57:25.510000 CVE-2023-49933,0,0,380576266da2660051c830dfdffd8713d801d89840f9f0651766c2f04622739d,2024-11-21T08:34:02.130000 CVE-2023-49934,0,0,369457b79dd21a6354ab815a0ae9ad3f8f015d01e99e83b3365d6f1ba3bbb11b,2024-11-21T08:34:02.300000 CVE-2023-49935,0,0,c9b15692b292ef0b7f9c5c193c5307c6b6aed18439e844e0bbc1f346273e9c96,2024-11-21T08:34:02.460000 @@ -239696,8 +239696,8 @@ CVE-2023-50431,0,0,26a2917848ca09a1a8b36e26e108b3f62d61d9e13059cfc4b598a72b7e132 CVE-2023-50432,0,0,ebaf665d1abf4010474043e6568dcaa44329dc11a65d0ecb03a2f10dc6ca2d87,2024-11-21T08:36:58.597000 CVE-2023-50433,0,0,18ac7d08fb2399b2a8acc54bb5e68e9008c477bc925269b876fbae35a91f29ea,2024-11-21T08:36:58.810000 CVE-2023-50434,0,0,8c14bbb5ddaae34e4ea1f978a87820f19129ad0850c9f9fcc5655a48ab50b166,2024-11-21T08:36:59.020000 -CVE-2023-50436,0,1,6d689c5db758786dc18d932378f481aa9cefe0e32a180fa33c49f707b470ed01,2025-04-08T14:57:53.390000 -CVE-2023-50437,0,1,79207b25246f96dfe395d6eeeeda3f56498ab321fd452e1226798a9a9e1974d7,2025-04-08T14:59:29.210000 +CVE-2023-50436,0,0,6d689c5db758786dc18d932378f481aa9cefe0e32a180fa33c49f707b470ed01,2025-04-08T14:57:53.390000 +CVE-2023-50437,0,0,79207b25246f96dfe395d6eeeeda3f56498ab321fd452e1226798a9a9e1974d7,2025-04-08T14:59:29.210000 CVE-2023-50439,0,0,b9333a48792e694ecb429826240aa9e8549a615bafdaa24f546dc83d888a1801,2024-11-21T08:36:59.663000 CVE-2023-5044,0,0,8b654baabac3a3b7d6bb2712ab47175087f213bbee40e147356d5fb760e520d2,2025-02-13T18:15:54.743000 CVE-2023-50440,0,0,5e15d6e64ed867cc390df43bc190dfe74e9d14c2e3db9a4ebba6d61e77ba7f3d,2024-11-21T08:36:59.820000 @@ -240263,7 +240263,7 @@ CVE-2023-51405,0,0,7be27b93dd3ef0d20e84faebeded39670d294017db3352a2031d81ff77dae CVE-2023-51406,0,0,4c46add111b8f29e7264975661197582d14d2829e85eb7ca707de7439cae69a8,2024-11-21T08:38:02.733000 CVE-2023-51407,0,0,6bf9e6656f6a7072e563f0103201ec4c7f8d4e5c6010a5bad1b25b421115041e,2025-02-27T03:34:02.640000 CVE-2023-51408,0,0,607add0970381eca751c9e3cc19850d2192da7bdc676cef9ca4b61bd01424698,2024-11-21T08:38:03.027000 -CVE-2023-51409,0,0,7314ab2e56e1e495880ee2e7baefbb54d1dfc54a41552c8a77b4b4b6d9eb5ad1,2024-11-21T08:38:03.200000 +CVE-2023-51409,0,1,77ba5a699d4e5f1a1cd87bed762faea703cb2ef548e0678ded5c7c2196fe1b09,2025-04-08T16:29:05.930000 CVE-2023-5141,0,0,8a8f4aa44abb772350191ec0669f68b87f92aee5e05fef39e08d7ed28974e9fc,2024-11-21T08:41:08.730000 CVE-2023-51410,0,0,3fd46a1d2cdcc7e095c3bae89edfbfc71aee69434a2f5141e5dba583e17bbaac,2024-11-21T08:38:03.337000 CVE-2023-51411,0,0,354aca64560031240b5c859da270d7370e48be73069f6ed21db996641f3ceb39,2024-11-21T08:38:03.483000 @@ -241227,23 +241227,23 @@ CVE-2023-52558,0,0,79680456f3117e5c28c62f76fc61c399e91cab56f37a1e79dfeac8000c81d CVE-2023-52559,0,0,d19b9ab292d63ef7322e1b7ec06597d9cfc233c4b8c403c3fc71c495ddc8d016,2025-01-16T16:59:39.197000 CVE-2023-5256,0,0,f25b36e2d6816d15ae13d24827e811b1ce1bdb4f814d5704d120858d960e9cb7,2024-11-21T08:41:23.240000 CVE-2023-52560,0,0,8101dc5e12b61978499f3c1f952560bbf0c85a42b7e572f0d17179ed35ab4ed2,2024-12-11T15:24:15.463000 -CVE-2023-52561,0,1,d147d69f61ef7e2e8ab351fbe2b54778b71c6b50cdc2a9dbc8c7d644238419c1,2025-04-08T15:09:34.487000 +CVE-2023-52561,0,0,d147d69f61ef7e2e8ab351fbe2b54778b71c6b50cdc2a9dbc8c7d644238419c1,2025-04-08T15:09:34.487000 CVE-2023-52562,0,0,4890184f51d6e74542818e9c65fc90069fa0340b4f94300644651b70efd1e96e,2025-01-16T17:02:14.957000 CVE-2023-52563,0,0,01157a06c1bdeb4c4102bca50ef9a48709c1400e6898d82272f45549e1856933,2024-12-11T15:23:23.317000 CVE-2023-52564,0,0,368c7f05707add455dbe5f5abcb8ce9056a0b45ef412d168e0c72b5fa5d229e4,2025-01-07T17:34:18.947000 CVE-2023-52565,0,0,573eae026add44222db4dcfafdb299400ef2ab79702c7319794326b052947218,2024-12-11T15:22:29.917000 -CVE-2023-52566,0,1,4a45e53e899c4c8e03aa80fb0793adc54a3cf1171b058b92566f227166dfee91,2025-04-08T15:08:55.437000 +CVE-2023-52566,0,0,4a45e53e899c4c8e03aa80fb0793adc54a3cf1171b058b92566f227166dfee91,2025-04-08T15:08:55.437000 CVE-2023-52567,0,0,18cd831f228d03b1e3290afd2f881bf52bd296c7921d05278f526558565ace57,2024-12-11T16:26:16.023000 CVE-2023-52568,0,0,8d17d4f43096b1e8e2ac821253ed4d8309c3179fdcc64f1f4e718167b321b031,2024-12-11T16:23:49.080000 CVE-2023-52569,0,0,acae99d79ce34dd4ff6e2aa23bdd3e8e5bfff8c20e53119da007b1ed6daf44c2,2025-01-16T17:08:05.613000 CVE-2023-5257,0,0,3ce640126c4032ba9918a5e5e037c470517d8bf27f41acbde20ca80717bf2d95,2024-11-21T08:41:23.437000 CVE-2023-52570,0,0,c7a973afb4874bbc0a4a26ff210f16ddeefd555596f88f99c2b297604732223f,2024-12-11T15:21:44.063000 -CVE-2023-52571,0,1,0530f604f4af36e2992e1f7440b11a88707cbaea887a6a55bb83acc474872973,2025-04-08T15:05:00.363000 +CVE-2023-52571,0,0,0530f604f4af36e2992e1f7440b11a88707cbaea887a6a55bb83acc474872973,2025-04-08T15:05:00.363000 CVE-2023-52572,0,0,f702508896ee515ee89db0a1e822fe9026cc584aabcbb6db64d0c9f0272f6b5c,2024-12-11T16:22:46.453000 CVE-2023-52573,0,0,ff8d78f642527d7a857c65b835a6abb27dea3bb756def1084064834d8863ee74,2024-12-11T15:20:48.023000 CVE-2023-52574,0,0,8323bac1d9b1547c4da987d85886bb3baf8f9d838d025c7c0a11cea296a4919d,2024-12-11T15:30:26.120000 CVE-2023-52575,0,0,a5b1456e1f4f3168b96ec99b70713689f039d7b9a7af7c035fa313f136ce995a,2024-04-25T06:15:52.767000 -CVE-2023-52576,0,1,96cbd9ada3e2612f28c541de1ade929f392b8bf2bb554c52ec18af68778128f3,2025-04-08T15:04:03.760000 +CVE-2023-52576,0,0,96cbd9ada3e2612f28c541de1ade929f392b8bf2bb554c52ec18af68778128f3,2025-04-08T15:04:03.760000 CVE-2023-52577,0,0,5bd6982550137aea20a2ecd267614d20749b25811f7f7f8a84e7c7b156c3f5b0,2024-12-11T16:21:49.573000 CVE-2023-52578,0,0,7fde1fb5cbbb0a2937bb0b665d1b0debdfecb0d6288e6b5ff0d4a3ae6d5040d9,2024-12-11T17:44:23.533000 CVE-2023-52579,0,0,46d3719ad784e436d8f68041c52fb234bc85c10006dd0f7ac61db478c13665bf,2024-03-04T16:15:49.340000 @@ -241284,11 +241284,11 @@ CVE-2023-5261,0,0,12a347f49e473c2171e63989f079cf4aa858b311ce4aa7919b57ad843edc66 CVE-2023-52610,0,0,9f4281b9a83758073777e3bbb75233b3ed21906358804968d79d920daa93f058,2025-03-10T15:39:09.893000 CVE-2023-52611,0,0,8943634ad03cb42f494621cc3e0f64753b9d498f28b5742a1e3ec46b4dd9c349,2025-03-10T15:54:04.750000 CVE-2023-52612,0,0,1fc08c0ee598f98ecd915bc34db1a70691d92c8f227db86942efd7747e29b8b9,2025-02-27T03:23:29.450000 -CVE-2023-52613,0,1,46153cda34a4760b7e7f2ab286168cf4d5b409bfed9fe7193dd553bfe3e1fa50,2025-04-08T15:26:08.390000 +CVE-2023-52613,0,0,46153cda34a4760b7e7f2ab286168cf4d5b409bfed9fe7193dd553bfe3e1fa50,2025-04-08T15:26:08.390000 CVE-2023-52614,0,0,52c94d505914b26a7b25e71d5a23d26488e4516b2dcce84229cb69170bc5bf85,2024-12-12T15:20:02.283000 CVE-2023-52615,0,0,d8d6425893b09196f356165ccca56dc5d14626c565c3defa9edaa655ca205929,2024-12-12T15:20:12.140000 CVE-2023-52616,0,0,21eb9859434b7c6e92ef05b0f4aacd3cbb15ee4dfdbcc697fefad0ffc6e20466,2025-03-10T15:50:52.807000 -CVE-2023-52617,0,1,9335fa962c5ee9b291b55bc80c51eb7258b577e0a94c49a0a5b4d0af3719aba2,2025-04-08T15:26:38.597000 +CVE-2023-52617,0,0,9335fa962c5ee9b291b55bc80c51eb7258b577e0a94c49a0a5b4d0af3719aba2,2025-04-08T15:26:38.597000 CVE-2023-52618,0,0,a928b6788f86ded10532d5dfecafe22640afc5603945bed7cdec348582ed7340,2025-04-04T14:51:32.453000 CVE-2023-52619,0,0,0d5348273b1dd6132d59d6103b7e85c4edb4275673ae4b525ade634b5ec8c2e8,2025-03-10T15:48:56.520000 CVE-2023-5262,0,0,f12d27a611a8ec27e96df2726c8954646b355ec2142282b02264062a900d1e58,2024-11-21T08:41:24.097000 @@ -248654,7 +248654,7 @@ CVE-2024-1708,0,0,9046bf6df7b5407027e6526b317a707fb0e597c8a478298cf2e268d00d5efe CVE-2024-1709,0,0,f75e75be5b68325f5e70652bc5e84a1c7f6bf9317747292f6c8f81b5bf5aa7a7,2025-01-27T21:48:25.323000 CVE-2024-1710,0,0,03b0301c04615fd11703e265ee09a925b1e771019388661955ff9ca3056da38d,2025-02-27T22:13:12.060000 CVE-2024-1711,0,0,c4463fec9e05b1118ee1bfddd76265d4a13e64e908000c805957c19574204370,2024-11-21T08:51:08.610000 -CVE-2024-1712,0,0,bdb3e0c816aad12a5ffb83e96d47614474081689b77384ea123451ea94b467f7,2024-11-25T21:15:12.783000 +CVE-2024-1712,0,1,fdebbcb1d7b1c7ec991ba78bfd8ed7eed39b0c0d983fd7e0a307d27d960b06a6,2025-04-08T16:31:49.733000 CVE-2024-1713,0,0,2c4b0a7ec23a0438b0f7f0a179c6acb91b550ffcb40b7c7185413e8a48111cad,2025-01-23T19:18:07.843000 CVE-2024-1714,0,0,b234b1c111e954137cd5c21e719e75973e2b1876898036fcaf67defabe0a2443,2024-12-18T18:15:07.087000 CVE-2024-1715,0,0,a39c7238a47641a1559a03eccfc580fec09edf9e40fae3465f0a89c38d32e634,2024-08-02T15:16:31.550000 @@ -250152,7 +250152,7 @@ CVE-2024-21366,0,0,ccac692c534c7a2c2adee37976d8ff4017b5d6f29ed30ff31277024073e29 CVE-2024-21367,0,0,f35c4e5401e1af949b9a15ddd27fadffbb28ec2b7a59c8588a81549a5392170e,2024-11-21T08:54:12.693000 CVE-2024-21368,0,0,272dcc70745e37e59c98f1aecc36e24c304ab1950f01e5aa276df3009456b628,2024-11-21T08:54:12.843000 CVE-2024-21369,0,0,4e41e3b9c0b8af32a496db7bd8f73dfd60fffdeea20a0932ec94dfe1a80c374c,2024-11-21T08:54:13.023000 -CVE-2024-2137,0,1,aed2def3783b6f84ec3fba2d57b14ce93e3c11765243ae3cbfd70cc7d510e37d,2025-04-08T15:21:17.320000 +CVE-2024-2137,0,0,aed2def3783b6f84ec3fba2d57b14ce93e3c11765243ae3cbfd70cc7d510e37d,2025-04-08T15:21:17.320000 CVE-2024-21370,0,0,3d7c4dd05a16bd938e38514b5badbaf55dc1b0c4db7f452b9e33bfdf0c6d09e6,2024-11-21T08:54:13.170000 CVE-2024-21371,0,0,5b15c89f5820daa171eade2e3f31abdccd363068fac83c9a46a8941f67ae2b99,2024-11-21T08:54:13.323000 CVE-2024-21372,0,0,ba4d9bf85cfc38863e13b8c3371551762e5f9cead88275b92a0db40eb1a28212,2024-11-21T08:54:13.470000 @@ -251196,8 +251196,8 @@ CVE-2024-2253,0,0,fcaa54d611112bbef2bb576728350004bcfdf9fe077edec443da7f473b69b2 CVE-2024-22532,0,0,1c6436316789202f8619d489d8ac37de493f2ae61269f6a36961da9e079cf332,2024-11-21T08:56:24.933000 CVE-2024-22533,0,0,5103c8569310cce602bdd9c2fb596174835a1b3141133217054fc95f31d140fe,2024-11-21T08:56:25.177000 CVE-2024-2254,0,0,156e422dd0111a66d9220d123185b3910ba66ffac4d50ed4595b56b3d5d0cb5a,2024-09-26T22:36:20.803000 -CVE-2024-22543,0,1,c2f2470fbb228b72d3dd746a2eebda28219c960f97fd57b7d45ac949003fdb46,2025-04-08T14:41:22.843000 -CVE-2024-22544,0,1,5c859c6b12795b2200448f24ca9a6011d7687074cfe2e34dadb24dd7fd5449bc,2025-04-08T14:42:14.787000 +CVE-2024-22543,0,0,c2f2470fbb228b72d3dd746a2eebda28219c960f97fd57b7d45ac949003fdb46,2025-04-08T14:41:22.843000 +CVE-2024-22544,0,0,5c859c6b12795b2200448f24ca9a6011d7687074cfe2e34dadb24dd7fd5449bc,2025-04-08T14:42:14.787000 CVE-2024-22545,0,0,320c2d4f74cacf1001909a9e9a1cda8b96d3feac193b88c9dc43e3f914c5640a,2024-11-21T08:56:25.843000 CVE-2024-22546,0,0,be29c28c6404f6f71a65e07123518d4aecb0cb37d40fde4951cc800e0a944e3e,2025-04-01T15:11:17.547000 CVE-2024-22547,0,0,50185b74401353c45761c13ff093e3fabf9462fb2d8944ab8c9616c3856a71e0,2025-04-03T13:18:29.913000 @@ -251264,13 +251264,13 @@ CVE-2024-22705,0,0,b5730313ce283f0037a29d05fbf12407fd5741147a3640022b0e10c6bc4e4 CVE-2024-2271,0,0,4db8a47b8173de9214eb8ceec91175982a50723c590a10b220067bbb8385cb67,2025-03-12T13:26:56.810000 CVE-2024-22714,0,0,c08439a236fabe497c8389fd5cf0d8de9b6527f84554fd4b8514bc0317cffc35,2024-11-21T08:56:33.897000 CVE-2024-22715,0,0,a62dd12530e52d082771420b10f6ecb20c91466147bdb97f25e53c1d1365afca,2024-11-21T08:56:34.070000 -CVE-2024-22717,0,1,a7b151c6e31c95a4df5fc44b6dbdcf1029b8439937cd6cbe8d9f63db9fc26f7a,2025-04-08T15:20:24.270000 -CVE-2024-22718,0,1,5cd08764483bc730ff3f8f4ddec0daf7c4e39ed239b45833708f6c21b588af25,2025-04-08T15:20:32.500000 -CVE-2024-22719,0,1,1db638ed526c73068c95686bec7db79a61b88aebc0e4e0ff15fdb90f445a6f66,2025-04-08T15:20:41.183000 +CVE-2024-22717,0,0,a7b151c6e31c95a4df5fc44b6dbdcf1029b8439937cd6cbe8d9f63db9fc26f7a,2025-04-08T15:20:24.270000 +CVE-2024-22718,0,0,5cd08764483bc730ff3f8f4ddec0daf7c4e39ed239b45833708f6c21b588af25,2025-04-08T15:20:32.500000 +CVE-2024-22719,0,0,1db638ed526c73068c95686bec7db79a61b88aebc0e4e0ff15fdb90f445a6f66,2025-04-08T15:20:41.183000 CVE-2024-2272,0,0,43367df530a487894a93e5f6136a364a8d65aa80ad2cb2b0c7a182466dd67f52,2025-03-12T13:26:32.857000 CVE-2024-22720,0,0,14b4404c334256c979a3bd5df3287e31b1ac3acd511744ae220fffc5b237200f,2024-11-21T08:56:34.797000 -CVE-2024-22721,0,1,d65e8b48a2b38e89fb21cd524e004ad80ee473c585bc71d76ab768f65ebe62a2,2025-04-08T15:20:50.123000 -CVE-2024-22722,0,1,b52b3ea4f13cfa5524c524b96d16ace3a07bc5602ec4988ddb0bfba4fde7c250,2025-04-08T15:20:57.363000 +CVE-2024-22721,0,0,d65e8b48a2b38e89fb21cd524e004ad80ee473c585bc71d76ab768f65ebe62a2,2025-04-08T15:20:50.123000 +CVE-2024-22722,0,0,b52b3ea4f13cfa5524c524b96d16ace3a07bc5602ec4988ddb0bfba4fde7c250,2025-04-08T15:20:57.363000 CVE-2024-22723,0,0,590504d6ddbcfe59132e37aee995b9e0b4e9718bb7fbd1999a65e80b0cef714a,2025-01-21T18:31:46.820000 CVE-2024-22724,0,0,3a01194172a7704aa0a2e9eba3a40f97fe0e459b77ede1bf851b722b6900375b,2024-11-21T08:56:35.627000 CVE-2024-22725,0,0,f3c66fe21fa0686d520ce28cf104cbf28c6a187228d2d8f44f244acf03a208ee,2024-11-21T08:56:35.860000 @@ -253088,7 +253088,7 @@ CVE-2024-25247,0,0,8f27432758a2853eba1d5c1a91c7da083827266e4e63e595dc12f3b358565 CVE-2024-25248,0,0,d65faff10eac258b331d9c2cb9cd5b148102f3b8b2f26c280c3571f12af4f866,2025-03-27T21:15:46.483000 CVE-2024-25249,0,0,280776b2f87571caab1ffbeab421fc1acf6e14a5a49622226509bdb85c6c8891,2025-03-27T20:15:24.083000 CVE-2024-2525,0,0,99775d6d72012c94577ecba939cdf3eab5f27167b4c491987d659d8d12c4d8a2,2025-03-03T16:58:56.110000 -CVE-2024-25250,0,1,36292ad2f5db1792ce479d383f28521fb85ae5121d9d273257ac4dbcfd9047b9,2025-04-08T15:14:52.357000 +CVE-2024-25250,0,0,36292ad2f5db1792ce479d383f28521fb85ae5121d9d273257ac4dbcfd9047b9,2025-04-08T15:14:52.357000 CVE-2024-25251,0,0,f739fdc08a7387eef85ed951929f4c99d80990c3ea5952b1dc25f50ff31d62d3,2025-04-02T20:20:43.033000 CVE-2024-25253,0,0,48e99cce2b2802e3aeef59d20e7058849d1e4e7be86482650a3710ee00ff024a,2024-11-19T17:35:11.063000 CVE-2024-25254,0,0,0339a82eef9bc1a7a8bb28fefdcad83242ffe04648f59e10cecbad0da67cea19,2024-11-19T19:35:13.453000 @@ -253270,7 +253270,7 @@ CVE-2024-25568,0,0,333fdb1a883138fafe3ec5ef5628a51adf91d816de772be7c9870a36d4af4 CVE-2024-25569,0,0,b037d1dac321d0fad4f682820302460ba3789c0955cd0c11614e35160f41fd7d,2024-11-21T09:01:00.260000 CVE-2024-2557,0,0,f782fc7c61caba772f066dacd05c7d9792bc6a9ddb532d625edc1e524606fbdd,2024-11-21T09:10:00.307000 CVE-2024-25571,0,0,8a68e54b2e23ebcb2672041b2be0c0d79b94a807b69a2bcde573f17191362239,2025-02-12T22:15:31.667000 -CVE-2024-25572,0,1,cbed3561a996d8fc0913552e9f85910773571a0e0f73b275ef35dc4399b8665b,2025-04-08T15:17:15.773000 +CVE-2024-25572,0,0,cbed3561a996d8fc0913552e9f85910773571a0e0f73b275ef35dc4399b8665b,2025-04-08T15:17:15.773000 CVE-2024-25574,0,0,3a6d003e6549d6e7e9bf748f59f234891c4a95854309550ae4079efeefd3444d,2025-02-27T15:03:31.583000 CVE-2024-25575,0,0,1018bd05e409a13236c5dcb2237c77906e7f23238c36cbe4ff25ea1f8323e117,2024-11-21T09:01:00.773000 CVE-2024-25576,0,0,8c96953d02c3ecec70b0880ceff32ab69ff1846b5ba0dbd1e89bf62fd8ac88d6,2024-09-06T20:17:14.003000 @@ -253613,12 +253613,12 @@ CVE-2024-26007,0,0,5566a1952f2701dd4149a375a6c93e3c6434006ebc54211b6a50bcacb2b01 CVE-2024-26010,0,0,aa94400b6d9b88521b847077f70baf8416af93283c6afed0d9452bca0e3c5cd0,2024-12-11T19:54:35.323000 CVE-2024-26011,0,0,c11541fdad772e94b22af8e91bceb09116d56319f79d2943860d22ca66673a67,2024-12-12T19:33:58.833000 CVE-2024-26012,0,0,8aa28068116e469ce60689bd893aa21d2c14e5bdc62c5fcdabf85329f80fa7f9,2025-01-31T17:25:06.157000 -CVE-2024-26013,1,1,bb11d51c2216468f0ebd7cc3c031195555023da837666df1a61bd2223079aef2,2025-04-08T14:15:30.863000 +CVE-2024-26013,0,0,bb11d51c2216468f0ebd7cc3c031195555023da837666df1a61bd2223079aef2,2025-04-08T14:15:30.863000 CVE-2024-26015,0,0,61e1ee285e159a140490fe9bac1615210ace2b02df5e5f1a9d7b48836125a67e,2024-11-21T09:01:45.940000 CVE-2024-26016,0,0,551548e94ceebe327cd043d6da7726194f348087a0883cfb1f63a672494915fd,2025-02-13T18:17:17.677000 CVE-2024-26017,0,0,04cda222e539a12656e61a62aaaa957af91c2a3bf44edf8b04502b71224b59af,2024-11-15T14:00:09.720000 CVE-2024-26018,0,0,2ce937190f1a3d6a5b32ac3dc44844a76544d21abc3c13edb30e7e9f1ae3e868,2024-11-21T09:01:46.343000 -CVE-2024-26019,0,1,aba06db76e5206c883feb931a43400c70c9222981e15b0b89cf3bacf1945bf6d,2025-04-08T15:17:37.193000 +CVE-2024-26019,0,0,aba06db76e5206c883feb931a43400c70c9222981e15b0b89cf3bacf1945bf6d,2025-04-08T15:17:37.193000 CVE-2024-2602,0,0,b857460336cfaac03a8a27b20498855f2d404a18cc4025919d0ba50a6e4b42f9,2024-11-21T09:10:05.910000 CVE-2024-26020,0,0,c98643c2f54952d5dbaf94e38093f64912c8ba6dd48c8f46422b5568790b1c7e,2024-11-21T09:01:46.630000 CVE-2024-26021,0,0,3fe5ecc9ee9868a8cca0f01c282c183a24620f32421f640675193d03b500dcb8,2025-02-12T22:15:31.830000 @@ -253980,9 +253980,9 @@ CVE-2024-26473,0,0,00fce609accad83d07750bd45b1342c1c6ea4b9d7793b3dfa144586b59ed3 CVE-2024-26475,0,0,0f1810c6617624f2a0dcf47bbae4bf6fd1fc6081a293a20f9dd895633a730f64,2025-03-27T20:15:24.743000 CVE-2024-26476,0,0,8d9df15e765bbf5a9750f7a0d9952d7d99b32a5699906b57f431687265856ba9,2024-11-21T09:02:29.043000 CVE-2024-2648,0,0,fd75622a3bc55c9dc91d2a9870fe12b1e82fa9ee0edd8a43c661dad7ea4c7d6e,2025-01-30T14:45:12.507000 -CVE-2024-26481,0,1,dd8e70eabedc499024d9c4ae8e9b52a406cc5ba8dab3c18d462f42904a1eb746,2025-04-08T14:14:12.487000 +CVE-2024-26481,0,0,dd8e70eabedc499024d9c4ae8e9b52a406cc5ba8dab3c18d462f42904a1eb746,2025-04-08T14:14:12.487000 CVE-2024-26482,0,0,d5197da6409ecd6e992ef12cae051a9fa963c093a6102783a8853c0f5a5a7603,2024-11-21T09:02:29.480000 -CVE-2024-26483,0,1,f6f710d43916282aee44ea4e28001bd2c00ff8a1b6a3a4739a08722880117a51,2025-04-08T14:35:43.470000 +CVE-2024-26483,0,0,f6f710d43916282aee44ea4e28001bd2c00ff8a1b6a3a4739a08722880117a51,2025-04-08T14:35:43.470000 CVE-2024-26484,0,0,64a21bd08323ab7879d0b6b9b7d5f94dfd1a274690483cc7221c08a4f0e267ba,2024-11-21T09:02:29.907000 CVE-2024-26489,0,0,b127a5502ece69341c946b6a9d6aa3bf0b40d00811e22152c0c36a08059f0703,2025-03-13T18:15:38.117000 CVE-2024-2649,0,0,77f70ebdc0752d4d3437f2d95a139d2a65e002b6ccfb37c95ab3be952878c49a,2025-01-30T14:35:30.467000 @@ -254132,13 +254132,13 @@ CVE-2024-26681,0,0,f6fd43d9d810bcbedd5d5f114855f701843937beab93c0ac68767c8859d7a CVE-2024-26682,0,0,030fff2679b76fce46cbe5c544615ba73fcff070fef0a62ab47ea7306579e50e,2025-03-17T15:41:17.197000 CVE-2024-26683,0,0,5b9da7f24476579a5375710ed030f96880538de52b6be055b18b5d1c035aff35,2025-03-17T15:41:11.497000 CVE-2024-26684,0,0,60d09b08f02d8aaa55d386250b8b217a118ae0cf452e99a148f77af140b5bbac,2025-03-17T15:41:04.173000 -CVE-2024-26685,0,1,93e9f4c3073654b478522f128341569b2af3d9fccbf48277685075606c75b615,2025-04-08T15:35:33.103000 +CVE-2024-26685,0,0,93e9f4c3073654b478522f128341569b2af3d9fccbf48277685075606c75b615,2025-04-08T15:35:33.103000 CVE-2024-26686,0,0,de428591b4945ad7918a04ab0959610e4b78905669739ee149a47f5daa83040c,2025-03-17T15:40:11.513000 CVE-2024-26687,0,0,fbec56e1bf7296f58fa0e599377259dab52a691902ca82a6722bccf8578785c6,2025-03-17T15:39:03.150000 CVE-2024-26688,0,0,a0933753ecf706512391da968c1bf6e01179d03229619ccebb51447535c3b458,2025-01-07T21:12:29.727000 CVE-2024-26689,0,0,45aef623305996e79be3f7e9accf7726333231f3f2e12fd9e4b9fa27d10e7a24,2025-01-14T17:26:26.393000 CVE-2024-2669,0,0,f3a883257f235a66bb3dc09f4829b2abbbfb1b1a0840a84101a75abdbc8c1f41,2025-02-21T15:14:07.237000 -CVE-2024-26690,0,1,648bc64672755d902f47393aac1fd49284179491bb0cfe22386079c4b8db94f8,2025-04-08T15:32:55.320000 +CVE-2024-26690,0,0,648bc64672755d902f47393aac1fd49284179491bb0cfe22386079c4b8db94f8,2025-04-08T15:32:55.320000 CVE-2024-26691,0,0,22d1e95d522495580a46cba49f03206b1fd1c00b94457c3ee5323f64f2257acc,2025-02-27T14:42:41.257000 CVE-2024-26692,0,0,c86e4cbddbb5120ed88b11b3ce658826880933d9e82aa8cde8089462a4d704ee,2025-03-17T15:38:32.037000 CVE-2024-26693,0,0,00f562b0f48f3bcb4c140bdf3380c0317e74478062b7f96c6d6374499eaeb210,2025-03-17T15:37:25.507000 @@ -254151,18 +254151,18 @@ CVE-2024-26699,0,0,c3786cb3ee2f974c5262c14cc1cea6d35ad33ef5ed2ef9bac47a2b686a5c8 CVE-2024-2670,0,0,99b219bd80e67f4a431d83f2cd3c4e6108bce3c0c8ffbab0744c31abdf28f57a,2025-02-21T15:15:55.763000 CVE-2024-26700,0,0,d340b64f76c76c9e47b3fd93523ba35bc98d09d990c5461e898e1d4216e0399a,2025-01-07T20:26:40.460000 CVE-2024-26701,0,0,b03e1ce32248050afb32bc7948ab24791df0affca83332817771b6e5cd8267b8,2024-04-03T17:15:50.720000 -CVE-2024-26702,0,1,09d949e5a1daef50d309f0794d1e19fba9d5ae3e55521506e08479d6ca2554ec,2025-04-08T15:32:26.257000 +CVE-2024-26702,0,0,09d949e5a1daef50d309f0794d1e19fba9d5ae3e55521506e08479d6ca2554ec,2025-04-08T15:32:26.257000 CVE-2024-26703,0,0,48d9fe7105c1e15a2876442bef8d713d66393b820ebbecfd55a730936d80e728,2025-02-27T22:02:32.530000 CVE-2024-26704,0,0,3a0b52ff86450ce1fb82ebf5e7a18392c0d6deb9daec30492482410a94698921,2025-01-14T15:37:59.677000 CVE-2024-26705,0,0,110f9b3bcafc6ad0bc16a9054a0aef3c212a8eca0bc96a2248708081e1ca2a92,2025-03-17T15:36:41.633000 CVE-2024-26706,0,0,6608689aa1cb1a883a201595f93b0d08ddb0bb15770ebae732176e4663c83eca,2025-03-17T15:36:31.360000 CVE-2024-26707,0,0,1c758f00ff80d3ca5b813ab085c0f9ff555bb1b0aa5a49dbcb6e9068a2759dbc,2025-03-17T15:36:22.873000 -CVE-2024-26708,0,1,bdc17ef7e58087066d3e85b0859e722e8ac059d7967114ad28115d9b3375b4ae,2025-04-08T15:31:23.777000 +CVE-2024-26708,0,0,bdc17ef7e58087066d3e85b0859e722e8ac059d7967114ad28115d9b3375b4ae,2025-04-08T15:31:23.777000 CVE-2024-26709,0,0,84265dc256d943df4540d48ae1b11a8d0310b66ecceaef365d267322aba660bc,2025-01-13T20:03:28.797000 CVE-2024-2671,0,0,bd5a320ab3401036156189ab4d3c6361e3a5116b660dfa0e919103b068f0300e,2025-02-21T15:22:57.597000 CVE-2024-26710,0,0,b738c95ced70807b461356e09fa92db1949c85f5c05571b831087b4afd6fe717,2025-03-17T15:36:11.620000 CVE-2024-26711,0,0,0eae4e2158a4f5f40ae27d5bba561e392d6ae7c39cea29b54b5701a7557592f2,2025-02-27T22:02:24.350000 -CVE-2024-26712,0,1,3eabb06e3f183090db18d9de2e74b41b5b40f04fc54674544de28e3b74739392,2025-04-08T15:30:20.373000 +CVE-2024-26712,0,0,3eabb06e3f183090db18d9de2e74b41b5b40f04fc54674544de28e3b74739392,2025-04-08T15:30:20.373000 CVE-2024-26713,0,0,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000 CVE-2024-26714,0,0,ff28b0d279d42011501ac5d5a07332218c152d41bc35cc88815a5ff7f7909f7a,2025-03-17T15:36:01.447000 CVE-2024-26715,0,0,5ae11c6f26422b5fce76497cbf0825dce861f7ce3314d6efe4d1a3f4e53e909c,2025-01-07T20:25:50.327000 @@ -254894,9 +254894,9 @@ CVE-2024-27401,0,0,85871a9d45a55e18d4ca18c5ebed4d206be6cc002d9e11ff2be4b7959c24b CVE-2024-27402,0,0,190cdd08ad455906e7d04c1f2280a8a7ba3d28d2b725b003f3eb1f299acdda57,2024-11-21T09:04:32.527000 CVE-2024-27403,0,0,4e932ae33a10e7f7c2f2bc6b1fe7a71d3f2807398a02a6f2edd5fe9c98baf97a,2024-11-21T09:04:32.720000 CVE-2024-27404,0,0,92724c94a0495d5d87ea6617db70963494acd8cdc3acf0e89f0cf18eede37754,2024-11-21T09:04:32.840000 -CVE-2024-27405,0,1,6f99a9669fa88f2c478db2c299328ea0d766ddbeb0ddb8bb7be866183a1a8220,2025-04-08T15:53:55.357000 +CVE-2024-27405,0,0,6f99a9669fa88f2c478db2c299328ea0d766ddbeb0ddb8bb7be866183a1a8220,2025-04-08T15:53:55.357000 CVE-2024-27406,0,0,b47e77a825fc3a24ab243efa54f7a02ad34e9d5ae0f82597e17dd25ef0b7e7ac,2024-11-21T09:04:33.187000 -CVE-2024-27407,0,1,dc07c9bf4f777f0e957ab25dab31a13cbbf2678e72e3a590e12482cccd0beb26,2025-04-08T15:52:15.370000 +CVE-2024-27407,0,0,dc07c9bf4f777f0e957ab25dab31a13cbbf2678e72e3a590e12482cccd0beb26,2025-04-08T15:52:15.370000 CVE-2024-27408,0,0,98c8b30837a43afd080646bbf037ed81aeb11ea466e7a3ed6819c36cd81c8836,2024-11-21T09:04:33.527000 CVE-2024-27409,0,0,bc22652d032818f4fca14079fcd7842d612c3718de3699320e494dfa7ee8a5c1,2024-11-21T09:04:33.653000 CVE-2024-2741,0,0,30b99159ddaffefc3023664c691b9ef3588e2d3200502b3b66f4719c657f05c7,2024-11-21T09:10:24.803000 @@ -254953,9 +254953,9 @@ CVE-2024-27460,0,0,4ee2b83ff90214518740d5d80a5b9effdaa84f0b6f61ca322ca4ecf291889 CVE-2024-27461,0,0,32e1a2c91db5358004a7c5d394fe411c7b39fcaa9cf8ed2122d921d6ceeeff11,2024-09-06T18:45:47.773000 CVE-2024-27462,0,0,2177b080bf16597b1d3af90d404590cae7bb441b9367c276a25f840d3e6c7f9f,2024-04-14T23:15:45.830000 CVE-2024-2747,0,0,1ea5f107566be54e8ec41969280f4e8503be4d6d2b9d4e06224b1c8a34c6d36e,2024-11-21T09:10:25.580000 -CVE-2024-27474,0,1,7d6527be49165a2f1e9a1a55ae0b5f50e758bff4c1758826f2292be8829567a0,2025-04-08T15:22:10.327000 -CVE-2024-27476,0,1,76722ef390c8acca7b7cfb7e1e45afe9a536e0c1707b6571d5e3cbaa7e4dfa28,2025-04-08T15:22:00.250000 -CVE-2024-27477,0,1,36173b5e9ed35b1f75b77e9c5a1389bddee1b62ee65fc889b68f7fa29a436472,2025-04-08T15:21:48.610000 +CVE-2024-27474,0,0,7d6527be49165a2f1e9a1a55ae0b5f50e758bff4c1758826f2292be8829567a0,2025-04-08T15:22:10.327000 +CVE-2024-27476,0,0,76722ef390c8acca7b7cfb7e1e45afe9a536e0c1707b6571d5e3cbaa7e4dfa28,2025-04-08T15:22:00.250000 +CVE-2024-27477,0,0,36173b5e9ed35b1f75b77e9c5a1389bddee1b62ee65fc889b68f7fa29a436472,2025-04-08T15:21:48.610000 CVE-2024-2748,0,0,81ac4eacdbdacc04b7fe111ed5d4746e52367963774e6db669519a5e5c8822f9,2024-11-21T09:10:25.717000 CVE-2024-27488,0,0,5320e2fdfc5da3ad09c401d0637f295f862172d42e9a14aa4b307c0ce61bc3d7,2024-11-21T09:04:40.187000 CVE-2024-27489,0,0,5336dca041954d1e26e4b3d0955394288c5270412febd061bddb236f9fc7126f,2025-03-27T16:15:23.117000 @@ -254971,7 +254971,7 @@ CVE-2024-27516,0,0,6be3a269b6245193a6844f91cd544cf56f6cc248ac9c97a44a0b76c9d09a6 CVE-2024-27517,0,0,61bba897ef6c7df8c717bde8dddefddaaf590b57ddb936696ecbce893483c7aa,2024-12-16T19:26:43.387000 CVE-2024-27518,0,0,ffa086f895acef0377a6ec9aa3cbe7a6b2b9559a416120e3c86afef2ec482fed,2024-11-21T09:04:42.103000 CVE-2024-2752,0,0,1f7714ada47fc7931ee6a67e875d2c4fdb54e92f9d913058237e77be6166a18a,2024-11-21T09:10:26.270000 -CVE-2024-27521,0,1,42151c27fc3105af0ff83038ea4f9d2283fe5171d6adbe08e364bfedd4a534ff,2025-04-08T15:27:09.643000 +CVE-2024-27521,0,0,42151c27fc3105af0ff83038ea4f9d2283fe5171d6adbe08e364bfedd4a534ff,2025-04-08T15:27:09.643000 CVE-2024-27524,0,0,3aeb27090841eee4f56ff4c92161cd06bcc07df602e1ee8db972af5dd1b0b71e,2024-11-04T20:35:04.913000 CVE-2024-27525,0,0,f898500b022d31ae07649a8b808297d7beed5978a53e21aebc33b7b9f0c7a842,2024-11-04T20:35:05.800000 CVE-2024-27527,0,0,2fe196d803bc448f27a0cf8897c275f58d14cbf34dcf92ff4d973650baebc171,2024-11-13T21:35:05.767000 @@ -255051,8 +255051,8 @@ CVE-2024-27692,0,0,482b2ba8b1ff0d0cb0360c392cb51ab93e1109f90456f6b1fac8e0ba94bfd CVE-2024-27694,0,0,65be1510c627f1b7ae975b30c061f7f32000663aae7cc739ce3905e521a11919,2024-11-21T09:04:54.060000 CVE-2024-27698,0,0,d2be8f7c8e71227d00832ec4e65de145e12c9d05abf2103ca0b08b325e7399ca,2024-03-09T23:15:49.403000 CVE-2024-2770,0,0,3f6008441da6d69045e35ea63e198a61ecd8d8390a77a7c959223aeab31092e1,2025-02-21T17:27:26.197000 -CVE-2024-27703,0,1,7704b04c39214a7d299f7b0172930d6602a294fa55f3331e8bd269cfb28c40fd,2025-04-08T15:22:27.807000 -CVE-2024-27705,0,1,67f2cf718a87806d49c111fd749058c10a0dcd6e85f7d998f98d1ea8f99e1350,2025-04-08T15:22:19.083000 +CVE-2024-27703,0,0,7704b04c39214a7d299f7b0172930d6602a294fa55f3331e8bd269cfb28c40fd,2025-04-08T15:22:27.807000 +CVE-2024-27705,0,0,67f2cf718a87806d49c111fd749058c10a0dcd6e85f7d998f98d1ea8f99e1350,2025-04-08T15:22:19.083000 CVE-2024-27706,0,0,09be5dff0dff62897d4b671897beea1323154b3e00d34465281c351db1a9a829,2024-11-21T09:04:54.783000 CVE-2024-27707,0,0,4a3147229ae75fdd871763049e313de06f4e4ab116ff888bbcd9fcfca501d9b3,2024-11-21T09:04:55.010000 CVE-2024-27709,0,0,0dc8a00434a9bdc593d8c809bc45f53ca009c10107690ba39b988794ca398a66,2024-11-21T09:04:55.230000 @@ -255623,9 +255623,9 @@ CVE-2024-28396,0,0,a9b920310b189713faaee0f6833442602f782d8326fdb8c04904df3344895 CVE-2024-28397,0,0,856f600076688d17f155d0b3de70eb9262cbb77397683a630edc0c5a3e4d66ec,2024-11-21T09:06:16.863000 CVE-2024-2840,0,0,a7ffe5d042ec7962cc81a2b23f8b42cf3a001089fe1f305bad6b8b30e2ca44e0,2024-11-21T09:10:39.107000 CVE-2024-28401,0,0,826cf616629645fbd1a84822aab899008c5c378ac0b171dafbb050c000cd2f35,2025-03-28T19:15:21.033000 -CVE-2024-28402,0,1,cd299d7e7012bda8aca87ce2fc4a222cd2bb1ffc2be2ed7627461a1d2a2faaf8,2025-04-08T15:13:20.180000 +CVE-2024-28402,0,0,cd299d7e7012bda8aca87ce2fc4a222cd2bb1ffc2be2ed7627461a1d2a2faaf8,2025-04-08T15:13:20.180000 CVE-2024-28403,0,0,a680e4fcc0b3590082231d9bd740544c53f47fb277147ba8b47928e50594e54c,2025-03-27T20:15:25.140000 -CVE-2024-28404,0,1,5e70b64f91cf658c35ddd17483083e3ea0addf7f4349a549bbbdc9755dbe0007,2025-04-08T15:23:01.407000 +CVE-2024-28404,0,0,5e70b64f91cf658c35ddd17483083e3ea0addf7f4349a549bbbdc9755dbe0007,2025-04-08T15:23:01.407000 CVE-2024-28405,0,0,be1a68abd0fde8742125f069c3d8af2dcb32ec3db1fa8b6c7da87e9025cba384,2025-04-04T16:32:01.270000 CVE-2024-2841,0,0,2754de63b6cb01395935c9f4c03638ff20eb3e9e94e2e947e9011287acdc7fbc,2025-01-23T19:26:46.283000 CVE-2024-28417,0,0,8cf18a472bc749edf5fdd921344ea347bb06123bd3954c21ee901fe6b54dc489,2024-11-21T09:06:18.310000 @@ -256089,7 +256089,7 @@ CVE-2024-29085,0,0,cc32c798ca94a9c499b922c9e141198212cadbc18a78905f260f607c30202 CVE-2024-29086,0,0,f8386da3f0d52a7567801d019c815cf7bf90221d72c043ef9d5776f1b876a101,2025-01-02T19:12:16.077000 CVE-2024-29089,0,0,30aa9ca77c70df19d13f418cb49ccc92807a86af53902c3476abc26c74f9f9b1,2024-11-21T09:07:31.810000 CVE-2024-2909,0,0,212d6092864ea8ef0ce591560bd67457e3ce8a4501b23e595c5fa210644143e5,2024-11-21T09:10:48.840000 -CVE-2024-29090,0,0,9eb8e4ee28585fa28af6ab62beac7adb4c4d1d0fb857f2f9220f73f2e115d4f8,2025-02-13T18:17:49.383000 +CVE-2024-29090,0,1,235abeb49b0597a8271d519e21ffe177ebf671c29a3b84525140058a8dc2be59,2025-04-08T16:38:50.373000 CVE-2024-29091,0,0,001d79447f1fd937da20fef3e5028a795193f99a6f4e8301650bafcff28f24ac,2024-11-21T09:07:32.063000 CVE-2024-29092,0,0,fa448aa280a8a7df8fb2f21f502a9b3a0a3f09f91b2b699f093310eaab34a315,2025-02-05T15:38:53.443000 CVE-2024-29093,0,0,5e85ebe8afa5c7bbdc30ad2504cebdc2a8ad5bf8cc4008892cc1938c37a3dd06,2024-11-21T09:07:32.320000 @@ -256100,7 +256100,7 @@ CVE-2024-29097,0,0,875b77e2230e2e26de4a929ee2fe27956bef590824050f669e1da3fc89b9a CVE-2024-29098,0,0,9b1008b83cbe94703d043bfdf5904f8bef4f3123ac6a8137d811039c2b1c46f9,2024-11-21T09:07:32.980000 CVE-2024-29099,0,0,dfb287214effd2633f11d81c1ead997426bc5dc5ea4f7cfee32a840922e9d9ff,2025-02-27T03:38:50.780000 CVE-2024-2910,0,0,bbc5651269bc757d63b4a047fd6f50531f9ae2606d9c89885eef5674cb9b94c0,2024-11-21T09:10:48.977000 -CVE-2024-29100,0,0,4b4ea50e8b1a5f3add3c62cc09873ccb1c0bad3dcfd266a73de4fe697a412abf,2024-11-21T09:07:33.233000 +CVE-2024-29100,0,1,7153277e36c5e72266fda5e7d9c5d08d4e3d6805c1eaf1454b0830389c8c5652,2025-04-08T16:40:26.640000 CVE-2024-29101,0,0,d68c9d48094a200a599355cfec1d238de1c4829e96d7df1fac520bec91454f40,2025-01-27T16:21:01.500000 CVE-2024-29102,0,0,ed935bbc4f82c0c84be43e4d1a7b61d5ebce7f3fd54cf950c79feff7a35ac46f,2024-11-21T09:07:33.500000 CVE-2024-29103,0,0,d41735cb9da95e849a5b45306d53d28ce564494ecee17e60023a3cbe91f78521,2024-11-21T09:07:33.623000 @@ -256226,7 +256226,7 @@ CVE-2024-29217,0,0,4ea4b901287d41ebffbcf3f192058b6981ed122912e836284758bb50f222c CVE-2024-29218,0,0,9e4364ce4bc745c52f6e10d1dfd286b775a082464333374a868d692177ef8579,2024-11-21T09:07:50.550000 CVE-2024-29219,0,0,6cb3862cf8e230d62963f8de8034eafbf8d60054c65832a91b376f342bd42762,2024-11-21T09:07:50.743000 CVE-2024-2922,0,0,83a5afc25d53992abc547c7cb27befd6cb6f77e10eac60e242613cf364f65aa9,2024-11-21T09:10:50.853000 -CVE-2024-29220,0,1,3d515fa20232e220df12a47ffebae66782d17df1a70b371648f19f0b7c51d695,2025-04-08T15:19:15.483000 +CVE-2024-29220,0,0,3d515fa20232e220df12a47ffebae66782d17df1a70b371648f19f0b7c51d695,2025-04-08T15:19:15.483000 CVE-2024-29221,0,0,719f02c93cb7da40e2b1e83286b78d24631abaf4b186686cd86793f230a27b56,2024-12-13T16:21:08.447000 CVE-2024-29223,0,0,4727067d0160fa817bf05389d9d077f4503a87a90b03a79ed32cfe7d23e8e3d6,2025-02-12T22:15:32.433000 CVE-2024-29224,0,0,51a97a451d23c0ecf1555d53913f72b7a59110c340a56174e31f0dd604a53a88,2024-12-17T22:20:34.167000 @@ -256872,7 +256872,7 @@ CVE-2024-30190,0,0,c1ee3f7c4079fcf440af04688987ea8a94b49f1ead7bea8a3a7ef5bc4308b CVE-2024-30191,0,0,c192831d1340a1f8de92872fcc669bc9702371340b6b6b256ee07c52924679d9,2024-11-21T09:11:24.210000 CVE-2024-30192,0,0,e673df472551d6b8fd5a2fe775fa5577daf8d1ee842b7399431ac6fed73462f2,2024-11-21T09:11:24.383000 CVE-2024-30193,0,0,539a44b67c38ec937205474e13699fb45c3f8c333f396c7fc353f02ec24e5112,2024-11-21T09:11:24.607000 -CVE-2024-30194,0,0,d40a14a10cc7715e13ade616c79e7076822582a6afab71f0b9cd9f7b061efe2f,2024-11-21T09:11:24.730000 +CVE-2024-30194,0,1,3ee35f816df53a9d0571182a12cff5a95063002a5adca1f19d2311012c883661,2025-04-08T16:40:00.357000 CVE-2024-30195,0,0,56183fe1e8139f559e25d722c7b1a365fd5350df897212f1adb0b3a204b7eab9,2024-11-21T09:11:24.857000 CVE-2024-30196,0,0,37be30bbc04d77f14cce9a07c248621d1cd4a4dc4f56535aaf4096fb66ce57f8,2024-11-21T09:11:24.983000 CVE-2024-30197,0,0,e4c8f54b9d1294e8beac84ba32593d03defa4833d8073d2c84e97f457ebe0ddc,2024-11-21T09:11:25.110000 @@ -256902,23 +256902,23 @@ CVE-2024-30218,0,0,62ab1357959cfbcc7eb28f53243d1a18228ff767f9cfec29cd8382365b686 CVE-2024-30219,0,0,f7577199718dbaf17326d5228f5760508fb82afcbb46147d1ae70fe6299db123,2025-02-26T13:15:38.863000 CVE-2024-3022,0,0,c0b2ab18f4ddf27bd1888310fcf31460b206066adf8181fccf29aff5b55609b6,2025-03-13T01:38:18.387000 CVE-2024-30220,0,0,8b203f55b5baa8765b4143b55effdb05037bf59c6d794356b2325067ebd4a9b6,2025-02-26T13:15:39.090000 -CVE-2024-30221,0,0,6b1389d4797f5e363faa3ef1c88bf956df9e73d1a57ea29f555bfbca83ee9b75,2024-11-21T09:11:28.727000 +CVE-2024-30221,0,1,d9b634f88748560963a3caa74a8b7b488592530658c74021a660a5b1a6abb2af,2025-04-08T16:40:47.867000 CVE-2024-30222,0,0,69800e6e6fc24088c6652503225b53f822421e5230f06bed4052b12efed4f108,2024-11-21T09:11:28.853000 CVE-2024-30223,0,0,3fc25919f1667d5a00c5c550c3492c7182dc8b60b8795a9bd0cdee538c5f3fab,2024-11-21T09:11:28.977000 -CVE-2024-30224,0,0,cb2916d4b117aa23b0f185c640885ceff4183953926af7eb9180f5d0290a4ee7,2024-11-21T09:11:29.103000 +CVE-2024-30224,0,1,b0e2f0004affcad892d1afbabd7d164deda90b711091610eb140c13691381789,2025-04-08T16:39:44.773000 CVE-2024-30225,0,0,650fab7b2e4c40c41c55f51f874e8c7d66eeb8bcf6eaa1b4d37d85ba802a69b6,2024-11-21T09:11:29.223000 CVE-2024-30226,0,0,50741aa468112dcaaea07d32c9e54bc6afbc372d8c0c5a51fcfab49fce8acef3,2024-11-21T09:11:29.350000 CVE-2024-30227,0,0,9c173945495eda2d9981763fd57ee34c67e315f1a5e59aea1f45e77e72875702,2024-11-21T09:11:29.470000 CVE-2024-30228,0,0,bae82ddc8fd5dc1643cab86dfb0675ea4a30b8239df3eaeed916854313d32bc9,2024-11-21T09:11:29.600000 CVE-2024-30229,0,0,a6bfc413ec8cdd153b81f6fa52c3949324a68cebd2a18280012ebd4a7c98bf29,2025-02-27T14:02:47.410000 CVE-2024-3023,0,0,263153a293163fa286e9c101f6bafff3237bb13b48d4d071321a37d0a1fdd8bd,2024-11-21T09:28:42.340000 -CVE-2024-30230,0,0,9ae9ce9e1df99b9edb0b3840d298f6742d8d81c2fa9cbc5be63ce42438c755d5,2024-11-21T09:11:29.843000 +CVE-2024-30230,0,1,c4d63a9ec2b13d7e523cb94b9af957fb163aa6d005d2a1bbd7bf87a6b194de77,2025-04-08T16:39:31.563000 CVE-2024-30231,0,0,f4c70af931c4a7dd93f57db08c46f6b181ba6718fd21c7de416dedb13c635394,2025-03-10T17:06:14.653000 CVE-2024-30232,0,0,504c2d526557d8455aaf3a0b19dae7a38c7019be0b80d9ec9ce07532d067d424,2025-03-05T21:15:01.303000 CVE-2024-30233,0,0,81d1f117bd3bababefee9fd012d7f155f07ab08571fe314121e0b75e3dc908dc,2025-03-27T18:56:07.040000 CVE-2024-30234,0,0,f25d5a0ad1ee024d43f2f2bb40e62db19507e57dac819fc5e44392e4f34e6603,2025-03-27T19:25:19.060000 CVE-2024-30235,0,0,b2c4f57b4563c0044433cc89cae813d48dc16e7df7e1220a14d67430afee5c8f,2025-02-07T16:54:26.067000 -CVE-2024-30236,0,0,402c6598f926ac926a886cdf244ebae292b9293a6f096e880a3ed2db8e268ed9,2024-11-21T09:11:30.580000 +CVE-2024-30236,0,1,81db04902ed1a9159e9727f2ba6771872127105845fe38bbd7a440953b16d761,2025-04-08T16:39:14.740000 CVE-2024-30237,0,0,939a8bcadb7b63965cb9f5b533e4dc6d69106e1beaad0c41f1e0e0db25e59f5d,2024-11-21T09:11:30.693000 CVE-2024-30238,0,0,ddc7f88fa97c9acddcbdd95b3238ad3310c0604e68d74437ff79fd24a67bd420,2025-04-01T18:32:27.370000 CVE-2024-30239,0,0,9132f8dff38c94a9158c4e428fa5fb533b78831229696aae31c2cfd1e8f955f6,2024-11-21T09:11:30.943000 @@ -257165,12 +257165,12 @@ CVE-2024-3048,0,0,b45859794096e9789b16af327bbbaf4ffd55ea7d3fdff52dc4d2a53dcaa166 CVE-2024-30480,0,0,2e15e0231151aa8e84d8885d70d7113ba628105d9affd7bdb295edcc9c141e57,2024-11-21T09:12:00.427000 CVE-2024-30481,0,0,8631cbb9c51a50d99523b794faa2947095770ff7160a8a0de8a87dffb815cc03,2025-03-14T17:15:43.727000 CVE-2024-30482,0,0,f16efce3b0eed7fab2fe9a35a331c3bbafdeb8eda41efff6fe45ca866003c709,2024-11-21T09:12:00.690000 -CVE-2024-30483,0,0,661c22d177ce8f03a03a73b0b567b9361a8176441c1c30244c51eb845e1f4341,2024-11-21T09:12:00.800000 +CVE-2024-30483,0,1,77901ef91c5ac3a21f7e5b31c77894523145af0ee84fa46e93b8cba650cba3b5,2025-04-08T17:05:11.560000 CVE-2024-30484,0,0,1fdba9dc6ba163c6ba4b9414dc5d5c3d692e31129a19f55068cab57903ac52c7,2024-11-21T09:12:00.917000 CVE-2024-30485,0,0,959873beb181fc032ad160c5aa64db18502af2ec0b5777f048b062bd1212809c,2024-11-21T09:12:01.057000 CVE-2024-30486,0,0,2636b7ca72fcc83ab76e46ed85ccf7083244ca1fc5ae3da9251ea650daeb7e77,2025-03-13T02:00:09.523000 CVE-2024-30487,0,0,44e76078517893bf1cc3851df2c3f60079ad355c29fc120ead15ea5e778782be,2025-01-31T19:41:37.667000 -CVE-2024-30488,0,0,1a9cd221fa93881e17f9dde3f22ec43ca67cce6e4b694debb7b2567971cdad8a,2024-11-21T09:12:01.450000 +CVE-2024-30488,0,1,a5479c9bd75c370bd37aba09250aac06edbcce2d13aed0aaa23b57f8a641ddc0,2025-04-08T17:01:49.073000 CVE-2024-30489,0,0,746eb42c1d4701f5dab7993ae5fc87612143a868b6199455ec72c55bae79c78e,2024-11-21T09:12:01.587000 CVE-2024-3049,0,0,20f7e76b72edf5855d588d0316ed10874b8207f2f3b8002bded49efc30fa22c0,2024-11-21T09:28:45.870000 CVE-2024-30490,0,0,d6134cbb402eab81b5496c3a10a0b1901817c22ea2db064481c9735634f40605,2025-02-04T20:23:23.073000 @@ -257187,7 +257187,7 @@ CVE-2024-3050,0,0,ea924fda60ac78bc036804edbc9b66e637782ae6170917108b2ab388bedf65 CVE-2024-30500,0,0,ebbc220b29457284d6343a3a88149de5ed0626b4e53d1a718766d5d0560c53dd,2025-02-27T15:02:02.463000 CVE-2024-30501,0,0,63ac070e9a183a2262922c8de0e1a6e7c0fe95b00506f818528d0454b84f3213,2025-02-27T15:02:30.103000 CVE-2024-30502,0,0,6c7a4d1ff2edb20874f219fd9b7c44e3e14fe4033e0c9c5135980248a75ca2f4,2025-02-11T16:18:02.843000 -CVE-2024-30503,0,0,1a0ca4044a12a8ac95b168200cb408003d4bb88e73ef0f9d92e16a379ed76010,2024-11-21T09:12:03.510000 +CVE-2024-30503,0,1,543661ba6083ca1da1ec1f903c023e311fa64067ac78bdef767d0d99a15af80c,2025-04-08T17:04:31.510000 CVE-2024-30504,0,0,bd7910bf5f2abbbd558fb097face388120af35e91e6eb8b12ebe3e5ef85c4604,2025-02-11T16:14:45.497000 CVE-2024-30505,0,0,f9026e289963482a6587574e759fff6e0772d212b0db48c13bb8282f9428e114,2024-11-21T09:12:03.753000 CVE-2024-30506,0,0,e4dd31cca694016d91cc4dca8a4c030fd19512f39a15e39026ded55acdb9cf22,2024-11-21T09:12:03.877000 @@ -257203,9 +257203,9 @@ CVE-2024-30514,0,0,151dc5562eacf9a933cf7b7ab6688b8e2f46a9b29673d47cc8f20f9090f6d CVE-2024-30515,0,0,d593087dabbf867f89abb76998f0b05f17dd9e50f155c6b94ac5af7a7758a9f0,2024-11-21T09:12:04.980000 CVE-2024-30517,0,0,c945c7432ed17fadda71d7753be36634f87e8241879eca01374c3f0fe2ec42fa,2024-11-21T09:12:05.113000 CVE-2024-30518,0,0,ae16f241f5dceea19e699966b2c7e4204258ca7aa15dfe26a101feb3d1917f25,2024-11-21T09:12:05.247000 -CVE-2024-30519,0,0,88d9e5c8fb6368227d126fb47a7cd106864db1321655d3368b8a48f77fac7685,2024-11-21T09:12:05.373000 +CVE-2024-30519,0,1,f3c2f24683841470055cee15c4b4abbaa30be6eb74bbf58c92e633778317ff48,2025-04-08T17:03:57.723000 CVE-2024-3052,0,0,03a7ddee8267abdaae07cc425774e73ff521a926c5c29b864030eff6db01bca4,2025-02-05T22:15:29.877000 -CVE-2024-30520,0,0,79ed5f9649f63a4ec3d8c9f110211ecd5a495ccf08ff234ac30191d204b27685,2024-11-21T09:12:05.497000 +CVE-2024-30520,0,1,92eb630ecc77bbde3fad3f2fbf08957f1461ebdb19279af80d8a6ca53e1dee33,2025-04-08T17:03:29.167000 CVE-2024-30521,0,0,1eb685d42547bf11776c8b1ed8d645a40f10ecef9007ee2ea3bc82f28ae0c33c,2024-11-21T09:12:05.630000 CVE-2024-30522,0,0,6def4b4ac703232a13b936756d6bfa5e570bc5920335f26baa9aeb77449e0f79,2024-11-21T09:12:05.753000 CVE-2024-30523,0,0,c8766a4f29f8f835459bee11a13309f429d32a5fc0101461c72c19c354291320,2024-11-21T09:12:05.887000 @@ -257288,7 +257288,7 @@ CVE-2024-30606,0,0,f52c10c8b7e533ce0e0b6a98e57ce61d6cde544ccfe54c7bede771a716b4b CVE-2024-30607,0,0,84c3d9c3166ee7d437f534467f6cd60825c7bba9e0d7bc4d89b477ef09237c87,2025-03-13T21:10:36.017000 CVE-2024-3061,0,0,1259480b9dea28facb7d5e76401d1a90ba7bc3e57be5bc78ff1a0731906b75ce,2025-03-13T02:08:38.823000 CVE-2024-30612,0,0,a6c6607fbecd066c363150271bfa1b80a64a1d27406520f64e7875b3d1f30bee,2025-03-17T14:21:36.410000 -CVE-2024-30613,0,1,23207552b946762b81052308c7a8fc7037d2edf886c9a56cfb716f1b99b0bef9,2025-04-08T15:27:30.520000 +CVE-2024-30613,0,0,23207552b946762b81052308c7a8fc7037d2edf886c9a56cfb716f1b99b0bef9,2025-04-08T15:27:30.520000 CVE-2024-30614,0,0,eb7d95778c8418d12e6779237f302edb17d3e329e21d70d6f7d816f139f150a3,2025-03-27T21:15:48.323000 CVE-2024-30616,0,0,4b015292af8508f3d2e0fce4d18d9fb2a626b7d54f1e7875fa72aceb60528a18,2024-11-05T19:36:11.770000 CVE-2024-30617,0,0,1b7a40956a8c5351972a7fab47bd34ec38cb805375ed86bedbc8c427efd4c8a6,2024-11-05T19:36:12.623000 @@ -257316,7 +257316,7 @@ CVE-2024-30637,0,0,c5619df7c22a2a308637c2db1d9f2bc6720882961d5a7ee97b1d421a7c465 CVE-2024-30638,0,0,b5a3d7da58d8ed5d441390d865869295fa1cce66ccb55fe9fd87c99edc4ed53d,2025-03-13T21:25:55.883000 CVE-2024-30639,0,0,cd4f1db6fad92fa81974e3560056f17017017db95269c11e0168ca3e43ca9b6c,2025-03-13T21:25:45.667000 CVE-2024-3064,0,0,bdb5030747b7d619eaad2dcee71c5b5210814bd3d2f52fcd69a7dd8ec9caf0e9,2024-11-21T09:28:49.217000 -CVE-2024-30645,0,1,ed177ede0255dcf34e6a04f6b1aafae0f2b4bc0de93bec448d502ec5e6d81a16,2025-04-08T15:27:52.807000 +CVE-2024-30645,0,0,ed177ede0255dcf34e6a04f6b1aafae0f2b4bc0de93bec448d502ec5e6d81a16,2025-04-08T15:27:52.807000 CVE-2024-3065,0,0,51cfeef3b7342b870d7bb9826de2a612ee8b755f59f33932dcacaef1a4501c6c,2024-11-21T09:28:49.337000 CVE-2024-30656,0,0,f16d6d41ebfe34ec7be8f5d5b1d7f1f20db5869f40e957ab9480f2822e749a47,2024-11-21T09:12:24.060000 CVE-2024-30657,0,0,aafd37252d8cd76cc88d27e5c06a74ee401323bfc2559b7fbd8004e3865b18d4,2024-05-27T00:15:08.743000 @@ -257431,7 +257431,7 @@ CVE-2024-30872,0,0,eaf4099421d4bece2f8af2c9074753da8480aa3cec8e93a53c5d0e45f7fbd CVE-2024-30875,0,0,aa70dfc3a5cf989aa103c4c393d46a36570372e91b9e7b13ef4f2499add71461,2024-10-25T16:15:09.693000 CVE-2024-30878,0,0,94f464e4387ae557812cc9ee5246036b23cfbb575bc705a5b33b9ca5a1ecc969,2024-11-21T09:12:31.500000 CVE-2024-30879,0,0,649da1a1b40e77c5fdf518b79d12ad501d786a69603441f9b70f6acd4720d3d8,2024-11-21T09:12:31.723000 -CVE-2024-3088,0,1,be1ea970969521f95ed249c0afff625102ad0857ca933a1cc11cb8dc936c71ce,2025-04-08T15:28:13.260000 +CVE-2024-3088,0,0,be1ea970969521f95ed249c0afff625102ad0857ca933a1cc11cb8dc936c71ce,2025-04-08T15:28:13.260000 CVE-2024-30880,0,0,2c1b854ce6d4d89c29e3fdcbad748cacc5bd5766e9945453d398c5ad6afab10f,2024-11-21T09:12:31.957000 CVE-2024-30883,0,0,5396b1d3742ef96aa8c87f02a7f3afc87db44c190243a6d440615383351e5e0b,2024-11-21T09:12:32.170000 CVE-2024-30884,0,0,fa8e22289d30e7ab9def2b7d7c024d4ff2a844c26b12860766e33f05732a9636,2024-11-21T09:12:32.397000 @@ -257493,7 +257493,7 @@ CVE-2024-30988,0,0,98fe79b5b4b40366d8bf44556cde94e9937c8a3eb3ee0de1c9c1a8dbcf732 CVE-2024-30989,0,0,5193014e1d857ee868fd656f536465155811fbb26dc5ad4dfe2d1c61b0f8454b,2025-03-14T17:15:44.497000 CVE-2024-3099,0,0,59d22247c570b34ac1d76d0f25cbd06d81f3cabd618a3d6d6de947af2738f741,2024-11-21T09:28:53.953000 CVE-2024-30990,0,0,cfab82707056b4296a40c38caae7406dc6f7ad2bafe5f6596c78a1f412f3e82d,2024-11-21T09:12:41.300000 -CVE-2024-30998,0,1,ee14d4bbce0b6cee67c6c36f47dddf408b70af147e3b49b4056891b8b3933cf3,2025-04-08T15:43:57.400000 +CVE-2024-30998,0,0,ee14d4bbce0b6cee67c6c36f47dddf408b70af147e3b49b4056891b8b3933cf3,2025-04-08T15:43:57.400000 CVE-2024-3100,0,0,cdfcae3d66ab799d842695f2227f5d408503e80fef0c63776bbe5bbd6058f69a,2024-09-14T11:47:14.677000 CVE-2024-31002,0,0,0b751597f2635484358fb7771a6c157a811fbace97b874ec2f8f9f5018e0c2c4,2024-11-21T09:12:41.733000 CVE-2024-31003,0,0,2ede0565228fe03f9df0f46a90d1284b9151cd2fbfa2e2d791c2e52eaf19425e,2025-03-25T17:15:54.137000 @@ -257696,27 +257696,27 @@ CVE-2024-31237,0,0,66bfa9e4dadc57180a229dfe2ccba2695c9bcc4fff41697828ab41aa905d5 CVE-2024-31238,0,0,b5bc5bc7dcbc3950ea45cd4c90f95133fcc9f0db0ea5a2f46ff19751709ec871,2025-02-10T19:11:09.237000 CVE-2024-31239,0,0,5db5a8dec6862679e5e5ef2b043410a1073eaeb51a99cc29fbd99418a0892955,2024-11-21T09:13:06.253000 CVE-2024-3124,0,0,5505888a3472c1095f1c94f8f2bc93d9c3aaf6b82e918553fe0b64044ecbccd7,2024-11-21T09:28:57.220000 -CVE-2024-31240,0,0,2f008009e3a8def5b65e238af75b6e4f323fedcdeb75b85abaae13ee97f03c47,2024-11-21T09:13:06.373000 +CVE-2024-31240,0,1,8bcd54e76fa7f4e1ed10df6d6fb5983bce32bd233f1672fdba5f3f0e416b56bc,2025-04-08T16:34:32.620000 CVE-2024-31241,0,0,4172090e1e89638c7b7593653b6b9c6a38bd7a847bc05969a3b30ecd52c329ed,2024-11-21T09:13:06.487000 CVE-2024-31242,0,0,f59f45139f3a0148b942cf67ea5fe1ede2c54b7195bfc0dd4eac9c46f204f851,2024-11-21T09:13:06.600000 CVE-2024-31243,0,0,ce650227a189d49600b591b471031bc307ebb1f370bbd7c530e8afc60005353a,2024-11-21T09:13:06.720000 CVE-2024-31244,0,0,186a3cce9a3c1b36edc08b9d5634e4ea5a8b00dfa66cba5d6ca3fcb375d2b4bd,2024-11-21T09:13:06.850000 -CVE-2024-31245,0,0,7c68f00d5cbb15caf9beaeb78143c79eec3c1097905802487674632daba8f811,2024-11-21T09:13:06.973000 +CVE-2024-31245,0,1,ae3f638fd38ba3f07e81cef275b9356595561268a9f2b5a60ec980bc338110d2,2025-04-08T16:35:33.887000 CVE-2024-31246,0,0,28d5ffca01dfd63278f95b86051691a2b760849a58196db04dca9bb30d41e001,2024-11-21T09:13:07.127000 -CVE-2024-31247,0,0,4c14503349bf505a6af44a382961c692b0cb7b8d96e2f93e819c2831a5060289,2024-11-21T09:13:07.353000 +CVE-2024-31247,0,1,c719b6212ac9c80f4152d7bdd7bd05b729caf98b3ee49983993ba216e14c6465,2025-04-08T16:36:09.910000 CVE-2024-31248,0,0,35c4ff92ec1293103b8bb3508537e3a529b4243b00dd90d275a8ad72983ebe8c,2024-12-02T14:03:36.677000 -CVE-2024-31249,0,0,8bf0a8f8cb046c2588d461bf5274756b8d6e2ded95ae58c0b2df29a8e6a88013,2024-11-21T09:13:07.600000 +CVE-2024-31249,0,1,2e16b57f153ebbb052222fae33d019a337041248db4a9eef780cb12d72b750ca,2025-04-08T16:36:41.943000 CVE-2024-3125,0,0,3311924d8913110721bd2e60bdab66546735977675130e3f0ca7f671743d033e,2024-11-21T09:28:57.370000 CVE-2024-31250,0,0,b8215080c21b803e176e82ee282c290d355f58d584b4fb19c27193db6ca11b54,2024-11-21T09:13:07.723000 CVE-2024-31251,0,0,d1d83ba4ba6bfe0e3380dd113312648dd3113ffdb6c92a48f517eec9b336e830,2024-11-21T09:13:07.850000 CVE-2024-31252,0,0,a65ae82b8947c952cb272177942aba0b25cd96578b5d11450c7de29633459d06,2024-11-26T16:03:54.233000 -CVE-2024-31253,0,0,e75c9c6d3961900518edc09361a110a3e43f7495208e8765843a3465f0abffd3,2024-11-21T09:13:08.120000 -CVE-2024-31254,0,0,a5032325fe761deb96d8beaa799573832fa3a0bf2332d74b215d25b97789a64a,2024-11-21T09:13:08.240000 +CVE-2024-31253,0,1,2c95214647e2723ae2994cf4508d0c8902bc680a13c9cdf3a124b38483bdce6c,2025-04-08T16:37:25.197000 +CVE-2024-31254,0,1,150816a482da8a016ee64c733fc9c694cacf95bfda65465f460e0ffd0453edb2,2025-04-08T16:37:46.997000 CVE-2024-31255,0,0,fe0c90c57a0a1c01f406b1c62362b7182fdb7c107c786ba6af472c0f66062b8a,2024-11-21T09:13:08.360000 CVE-2024-31256,0,0,592139096ac6eb09b1b90bd15d1594575bcc431d14fc5a331bf8509d765dfed5,2024-11-21T09:13:08.480000 CVE-2024-31257,0,0,2c6e4aa23b14797a7f60b7345ce1f46d2483b7df1db43515a016a63fcdab16c7,2024-11-21T09:13:08.600000 CVE-2024-31258,0,0,cc466215b36ef6ed283f064b8d1d6324482af4fb2281bfe3c773173225c55069,2024-11-21T09:13:08.710000 -CVE-2024-31259,0,1,9a1871706ae54c18c3a05c7ea8d5149aa4cc49294b7257b3e92d5a7de56c9501,2025-04-08T14:43:39.133000 +CVE-2024-31259,0,0,9a1871706ae54c18c3a05c7ea8d5149aa4cc49294b7257b3e92d5a7de56c9501,2025-04-08T14:43:39.133000 CVE-2024-3126,0,0,f2079187410f93764702958da80c3ca8048c6819f4802e1c0cd40854d67b4bb7,2024-11-21T09:28:57.510000 CVE-2024-31260,0,0,36b10777c4731890f00fa34c5315a1661327014554333de6381780911e9f3044,2025-02-07T19:04:19.687000 CVE-2024-31261,0,0,9a557f085fbf839854a0ecbae20545aee16945f812e1e3ca7c6c369a470e77e6,2024-11-26T15:53:19.327000 @@ -257742,7 +257742,7 @@ CVE-2024-31279,0,0,16a55e529ed250ac76d344173827479c8f2cac77638f8283079e02fa4fe06 CVE-2024-3128,0,0,46b5587a872f168c648cb7a3c6ada38713e0882244c03e7e95817243a3a4322f,2024-11-21T09:28:57.730000 CVE-2024-31280,0,0,c712c230f8566109c39c7508bcc86d7852e7811ab184534606df9f66377cdc9c,2024-11-21T09:13:11.217000 CVE-2024-31281,0,0,36f5359582735815ee3a1e11b4c00c423c179d115bf93bd3fe55ea32b5f8aee8,2024-11-21T09:13:11.330000 -CVE-2024-31282,0,1,265482ac880f62b27e552cf8fc0f73334d541ba0dc7e9e64f0de8f338796c78a,2025-04-08T15:05:10.437000 +CVE-2024-31282,0,0,265482ac880f62b27e552cf8fc0f73334d541ba0dc7e9e64f0de8f338796c78a,2025-04-08T15:05:10.437000 CVE-2024-31283,0,0,f39e178affedfc9604bee93a4223dc87d0c991ae916b526c51917be7da3c4aba,2024-11-21T09:13:11.567000 CVE-2024-31284,0,0,fc1d346fe0a05cc825611a54b425909ae68024e5861a06baca53d21f923125d0,2024-11-21T09:13:11.693000 CVE-2024-31285,0,0,c27c65574d94fc417b8324cd897f4f3729f75fe45074a3f672b3e8a214ec12a2,2024-11-21T09:13:11.823000 @@ -257759,7 +257759,7 @@ CVE-2024-31294,0,0,5ed5372a360b624a446e22a07eb2be5cf527e32b35d5c2864187588206647 CVE-2024-31295,0,0,92ada23cfd6b9ecf1c9856a40c55ed02ad211edfe8a7aad41b745ec36391491c,2024-11-21T09:13:13.067000 CVE-2024-31296,0,0,4b98196e8a482dd177eef76c99fc33b1ffc94589f146e866b4fe06d74ff7a463,2025-03-20T11:23:10.463000 CVE-2024-31297,0,0,41a2a7cc11a2b46cd5dfbe67c847e7fd89574a5f0a1e6d68280acff006f8cd6b,2025-03-24T17:01:46.660000 -CVE-2024-31298,0,1,0ab299c6b1074f9a53cd68dcc9466764171d1aa9ae2a2b6dd1549617684a8291,2025-04-08T15:07:49.990000 +CVE-2024-31298,0,0,0ab299c6b1074f9a53cd68dcc9466764171d1aa9ae2a2b6dd1549617684a8291,2025-04-08T15:07:49.990000 CVE-2024-31299,0,0,ec5b4321e0a7ff9d16e5bf5531f41c6769ab3cd1532edef61e0876574b7dabcb,2024-11-21T09:13:13.567000 CVE-2024-3130,0,0,19c2adf1791d0525b71ec4e715c75f31311c6a68619f9ce01a24907ad4a5e6d7,2025-03-12T17:15:42.110000 CVE-2024-31300,0,0,40e2559d907a3d99bd9272e686304f6e39846a6081028a8bdb0a68c286f5a072,2024-11-21T09:13:13.683000 @@ -258040,7 +258040,7 @@ CVE-2024-31669,0,0,e67157c072d6472b13e8463ea23f9b22948945715ffb2a3485fbc46118d6e CVE-2024-3167,0,0,b0bdf42e92bad376276c8af48f28639bc7025690df7bfcbc255509f46b757355,2024-11-21T09:29:03.290000 CVE-2024-31670,0,0,485c6b39a9c06c65b704780df5587d61e2c68aff13a9abfb705a544147e51149,2024-12-13T18:15:20.167000 CVE-2024-31673,0,0,f5d82eef8a6a6a5f02d31e69364f00d960617ec82b7aae090ab611618d0279d9,2024-11-21T09:13:48.477000 -CVE-2024-31678,0,1,4d44fd7de319bb3c3e3ca325e023129ab6329704291ba3ed2bd041396946b733,2025-04-08T15:20:02.083000 +CVE-2024-31678,0,0,4d44fd7de319bb3c3e3ca325e023129ab6329704291ba3ed2bd041396946b733,2025-04-08T15:20:02.083000 CVE-2024-3168,0,0,877aaf095d6020a88ac424b786e5481114bcabd626ac29a10ba6589de92c2016,2025-03-13T14:15:29.337000 CVE-2024-31680,0,0,1d8afa08aacd4452af060ce38af7363253c000fc0951d9c1ffe97fb1b965709a,2024-11-21T09:13:48.890000 CVE-2024-31682,0,0,6269ea5053ebb52a52505258bbf08bf048c39bebb3865a7abe87371ffa9363fd,2024-11-21T09:13:49.127000 @@ -258365,7 +258365,7 @@ CVE-2024-32115,0,0,ec0a8d5a4cbbd5113ad9a80a0c093985a380b14a1c6ef996f4aba1017c578 CVE-2024-32116,0,0,140b66d8b58d23b0fe567501dcd986adbe9732a7da9e43b727de51e69eac6a7d,2025-01-21T22:19:07.690000 CVE-2024-32117,0,0,bd78be4c7fc18e4c6cdf647393be0c96c39e14b7e7c17f1e39dba267511a48ce,2025-01-21T22:19:39.353000 CVE-2024-32118,0,0,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000 -CVE-2024-32122,1,1,98c36ba3f75a8c9791fd75fc11b497f98dd4f3c91a48be22a1613de1ffce51b3,2025-04-08T14:15:31.040000 +CVE-2024-32122,0,0,98c36ba3f75a8c9791fd75fc11b497f98dd4f3c91a48be22a1613de1ffce51b3,2025-04-08T14:15:31.040000 CVE-2024-32123,0,0,60129c37069c23661983217154006f556b580f62559adb1b35a9e1f56364af41,2025-03-11T15:15:41.353000 CVE-2024-32125,0,0,d36ac7f8a17677d938b5bf6c12b9c868ee2ece6d692e8f1181aa5a94b725cccb,2025-03-12T18:52:52.640000 CVE-2024-32126,0,0,45af23cb6fd016f363f996b64e239b35d3f7c25ac6138e901c5aa8f136e4359a,2024-11-21T09:14:30.620000 @@ -258944,7 +258944,7 @@ CVE-2024-32846,0,0,34cb1f9f114e5ff0833f7598777e92928926384cf853193f017f8a60e8160 CVE-2024-32847,0,0,af444d5582813a408bf6769e0d3b3cfdfb4ccdc2bb3973101a41f4b12b8903fd,2024-11-13T17:01:16.850000 CVE-2024-32848,0,0,dc94adbfb6370b7661cd3a72f32b64f32d63b9212f3e2e3bec3a67df50792329,2024-09-12T22:35:05.437000 CVE-2024-32849,0,0,250acdc50746f97b12a619cfe800abfc52ca80e7c28af639d7bd26349ac4c030,2024-11-21T09:15:51.033000 -CVE-2024-3285,0,1,941fc564e0e589b1a9d9580089e3b570eab49b02f445d70b28f2137d897a4999,2025-04-08T15:19:43.580000 +CVE-2024-3285,0,0,941fc564e0e589b1a9d9580089e3b570eab49b02f445d70b28f2137d897a4999,2025-04-08T15:19:43.580000 CVE-2024-32850,0,0,749da3b0a722ed2f458c375151bcc3ce95e9faa297b8d250a79312612dd2184a,2024-11-21T09:15:51.173000 CVE-2024-32852,0,0,d47d22f375037000d1a07db097ab83d256dbd6226a88090f611f805560fc2580,2024-11-21T09:15:51.370000 CVE-2024-32853,0,0,effd6fa43bf9056006164b26cc0b73392131e39794a497618cbb79c53628e5ca,2024-11-21T09:15:51.543000 @@ -261910,7 +261910,7 @@ CVE-2024-36676,0,0,187d748f093757fee8e12d3ec4f2ce0a9d52137d259c96d6ef65bb6357857 CVE-2024-36677,0,0,4c7d97da29eea54b0fc22aab1675aead99e52cfd2634ca0a02a7143ef1324656,2024-11-21T09:22:31.300000 CVE-2024-36678,0,0,bef6cc0538fb463019d1377598e73f52b10c8465b46e3915e6cb2ee9904f7f55,2024-11-21T09:22:31.520000 CVE-2024-36679,0,0,1c80297ccb815167e84433b043579841d5c5119084877bfdfa7868faf9f9bccc,2024-11-21T09:22:31.757000 -CVE-2024-3668,0,1,ce27d82f905345da0d8c94456b4a36ee3c85997b88481302c89a9ab9707152d2,2025-04-08T14:04:49.950000 +CVE-2024-3668,0,0,ce27d82f905345da0d8c94456b4a36ee3c85997b88481302c89a9ab9707152d2,2025-04-08T14:04:49.950000 CVE-2024-36680,0,0,33dfc2b0e71c84a85c2a504e7834acba465b614b57fc3cfa7f9d4805e93c490b,2024-11-21T09:22:31.987000 CVE-2024-36681,0,0,96c1846f583101f7866c8fadfdf3a33b81ffcf4e96d0387c413dba15329c6669,2024-11-21T09:22:32.187000 CVE-2024-36682,0,0,cb2995f0242062cfca7bdf65500013048768a2b6d65b1c25e30172054d0e0139,2024-11-21T09:22:32.397000 @@ -261980,11 +261980,11 @@ CVE-2024-36840,0,0,df76986cf4b78b412b0f52e824699180a22287010c032e08a5b788b4993c8 CVE-2024-36843,0,0,0dd88625e4c7927017ac2ccd743026dc0bf8dec364e7370ed4476d6c15f67003,2024-11-21T09:22:41.673000 CVE-2024-36844,0,0,0db2c3d462d7ef694fdfe2f6888312c32e020055907b6f4c8aa2c7f269d2f9ce,2024-11-21T09:22:41.893000 CVE-2024-36845,0,0,529960ecea926e798a44b8fbaf67e53a1386a02af542112cc5cbae429ea7b091,2024-11-21T09:22:42.107000 -CVE-2024-3685,0,0,81c4a0308b9e061d66a969870e31dd5c48c7828a7c74198fdb1a63a9985000f3,2024-11-21T09:30:10.530000 +CVE-2024-3685,0,1,85506102da98379f96d772f857f6637d959cdd2fc3b3ce6cdd7dde65d11e9030,2025-04-08T16:38:03.363000 CVE-2024-36856,0,0,c2c9e2a071273475ffd67fbc7ae98736ae7165895044bbeace0e5f5f79ae55cb,2024-11-21T09:22:42.327000 CVE-2024-36857,0,0,a42a68bedad76e5c1728ea90940ecf278487ee7de40ccce95e0e9777fcf5387e,2024-11-21T09:22:42.543000 CVE-2024-36858,0,0,afa948293518f0752cc62d2bf43b0cfb1c3f7b920d5daed6b10a4ee77102f44b,2024-11-21T09:22:42.760000 -CVE-2024-3686,0,0,34bb1e91a28bb2929f20f23ab2a35ebf0e5632cf7e15690e77c6dde018d3a595,2024-11-21T09:30:10.667000 +CVE-2024-3686,0,1,a7a5ab3fdb5354caea09ab3facd04bb81edcd53748923c947303168620eaa872,2025-04-08T16:29:52.190000 CVE-2024-3687,0,0,3144cd6195f2a60e3dc246d7e03e15444ec25255fb99baf8ad471bd2ca4c2861,2024-11-21T09:30:10.800000 CVE-2024-36877,0,0,7d7a55465df3dc9c8e1110e6a18c73bc9a91c4947d40446d91f09eadecdd33ce,2025-03-13T20:15:21.020000 CVE-2024-3688,0,0,052feb44b8d1ec6863ef819b37585d4a5f02c3beff5aab7ac941103dd336982e,2024-11-21T09:30:10.927000 @@ -262743,7 +262743,7 @@ CVE-2024-37662,0,0,88a4c2147c30ea5a0fae26e20d528c30a4f04b1f060a201d4e0094a477f8a CVE-2024-37663,0,0,fed344a0d61f1e567327514f6a8e91ad3162275e1c47738bf38d3802a419ffbb,2024-11-22T16:15:24.273000 CVE-2024-37664,0,0,ec10d2a017c572696a305d5984bbbc6e09db1615173526af4be64eee6d7ed665,2024-11-22T16:15:24.463000 CVE-2024-37665,0,0,1eb587434ded45d2e868af7abc77840ba8d1cc348193e8d80a8fd746774e5a12,2024-11-21T09:24:12.510000 -CVE-2024-3767,0,0,3cd735089af7cc6faf03d4b1b141263522d69f3f7f057181ac9c174f56e67797,2024-11-21T09:30:21.423000 +CVE-2024-3767,0,1,fe27424bc8470ecab4d1301b87244ae7dad3d92605d8bdc49938855cd182ba57,2025-04-08T16:30:20.067000 CVE-2024-37671,0,0,63a7bb054b9783dd1c7933bd57d4a8f7e2cfd8dd008993792ee8177e6854a803,2025-03-14T16:15:32.600000 CVE-2024-37672,0,0,e44dfa3a5448c7ddc8be3e7358264cb6292a7fdffc27b2a73e33c9a81cd357fa,2024-11-21T09:24:12.893000 CVE-2024-37673,0,0,4948f447146a2f01fa61fd5402a993016f9583881e815929a457af264ecd9e35,2024-11-21T09:24:13.130000 @@ -262753,7 +262753,7 @@ CVE-2024-37676,0,0,415ada6299f7cd143b15bc431799ef76592986b2443e085c31e97cb8bf3da CVE-2024-37677,0,0,914b27f644b99c23fa73430b334c2012f02e568866d02ad51d6528274c4668e8,2024-11-21T09:24:13.930000 CVE-2024-37678,0,0,66d3748cd4e3715edd5f08d3f6dd1ace38fe5a2e775763ef129c478b46751a2f,2024-11-21T09:24:14.140000 CVE-2024-37679,0,0,53f415d3ff7d91648c94d1a02a752ae8c3f351b627771ec2bbaa0843079ebc94,2024-11-21T09:24:14.340000 -CVE-2024-3768,0,0,9a72be3b5867a4fccb0e6db221b59f78c524ce19b79c41ccdd3920225a8af4c5,2024-11-21T09:30:21.563000 +CVE-2024-3768,0,1,cc791d46f44c243e9e431053290b1ee671af45cbbc0d8d75988b58a76702e702,2025-04-08T16:30:31.517000 CVE-2024-37680,0,0,f3f65d8393338162e88a1d73632657ff003dd480fe9f850aaa195a5bfecc1b29,2025-03-27T15:15:52.847000 CVE-2024-37681,0,0,4538c23271fd70e9a553f554f30bda76981c93c8606f42dfb4717cd2fcbf2110,2024-11-21T09:24:14.790000 CVE-2024-3769,0,0,928316cfd22b3b5bb0c6e5393e21abc27b9387bc9389c9d6fc448a034e2de86f,2025-02-28T18:23:29.187000 @@ -262769,10 +262769,10 @@ CVE-2024-37734,0,0,c29b7305eb3a656f6b393634d560813e85405c30b1d082e6cb5c8e32de8d8 CVE-2024-3774,0,0,7a7a597b589690c12f919940345595f31743063972f70d8b4f9ea657d33a59e6,2024-11-21T09:30:22.263000 CVE-2024-37741,0,0,cdea71c096b6020452f86c61c722c71d411c4901d61352f541581e27bedfb10b,2024-11-21T09:24:16.130000 CVE-2024-37742,0,0,7c57418640c4a372993ae3363ea2c4e93948b308f1c699d6cb68e3e245b5578a,2024-11-21T09:24:16.373000 -CVE-2024-3775,0,0,615de9d52bac703b6c8aa057dd6b1870dc30709c37c1aeb5e18d3bfce7856203,2024-11-21T09:30:22.403000 +CVE-2024-3775,0,1,c451ed115577e5a89890b5a38fa397c5a305bf219558d71c71ace7abcecbe94e,2025-04-08T16:30:51.500000 CVE-2024-37758,0,0,6aad1ab20925aeaf835ed115698dffcd6067c2af6f08e49e2fb33789c105b9ec,2024-12-20T20:15:22.937000 CVE-2024-37759,0,0,18b1e88dc7a3b7f932762ee7014dce51b56c599cd2ee7466ac0b38dc37564402,2024-11-21T09:24:16.593000 -CVE-2024-3776,0,0,4bcaab49a93fa2c8754ad9f305317130f78c46afe2b068cde52e4c059cb068b0,2024-11-21T09:30:22.537000 +CVE-2024-3776,0,1,0f6327386a7c6173c59bd7cdf6f2c885168397a8b8eeee3a16a2d41ffe84c4a1,2025-04-08T16:31:04.280000 CVE-2024-37762,0,0,f73bf4c4d5b076a67c41dc17aaf07f5b5021aedfe4f7bfded7c4e50f0cbcd240,2024-11-21T09:24:16.827000 CVE-2024-37763,0,0,bdd39afd4bae4e6cd2046ada3a9056ec24f8f980a8ed747d49b20204a1c75637,2024-11-21T09:24:17.070000 CVE-2024-37764,0,0,b70be141044f1a5ba9d64bb9a7469b942bffd6682353af5d9069f566c6a60adb,2024-11-21T09:24:17.290000 @@ -262780,14 +262780,14 @@ CVE-2024-37765,0,0,e398f7942398aeca5102dc2e8daef204a77221fb91c023468b8cac65c292d CVE-2024-37767,0,0,58a85c325101746390b58f934ab900468240b96d335a9904d63295638f00e941,2024-11-21T09:24:17.733000 CVE-2024-37768,0,0,50094b0f1db8404ad9bfd9bc5a559978e0dd5a7ad1bf07217a58688f10b9ae46,2025-03-13T18:15:41.653000 CVE-2024-37769,0,0,ebb9ba49fb51ffaaf91f9ff8b56894aba69c0664bde10d7ebfe9dd5080822c95,2024-11-21T09:24:18.103000 -CVE-2024-3777,0,0,930f15308f1aeabc57bfcc0dd92c5fc1d35e91297d07bf9f06f0a8df7b2bfeec,2024-11-21T09:30:22.660000 +CVE-2024-3777,0,1,0aea65dc8a0a7cd63d575c62da6f1aff0e206395199e5031ba055906f2c2fcf9,2025-04-08T16:31:20.500000 CVE-2024-37770,0,0,3ae1b26b08d620f39fd2fc9b0f3e94aeedfe3c4571e06714b0c443b19a9d4c82,2024-11-21T09:24:18.330000 CVE-2024-37773,0,0,2e017074765151e5ff695c0297fa00e3f03e86b1bfb2dff271743421377148ee,2024-12-17T16:15:25.580000 CVE-2024-37774,0,0,2ab42b0c0633061036f05297b975d97fe83d08d18d378d73ce77bd2cc921027b,2024-12-17T15:15:14.210000 CVE-2024-37775,0,0,d5fbd8966422b87b56ffba076c5e4680a0b14972527b1e66a09cef04e7bc291f,2024-12-17T15:15:14.637000 CVE-2024-37776,0,0,de5c8cc05842c77980e33d8cdd148d0ad3cf21489418fb1fe97fa440cc336d05,2024-12-17T17:15:09.047000 CVE-2024-37779,0,0,0aba20750978da4733349dadb1ca63b8044cf1d1605f2dd296fab6c62fcf39fd,2024-09-27T14:35:03.517000 -CVE-2024-3778,0,0,dbc7d25bf10209f200fd6bcc2fb0f2a3f58bee7418defdd3b4bdad4318bcf4d1,2024-11-21T09:30:22.783000 +CVE-2024-3778,0,1,ad152e70970eac62723ac2513e656d71bf3815cbcd7954d8e5bc658741b746ce,2025-04-08T16:31:34.400000 CVE-2024-37782,0,0,e9f210e7f42c046d75d0b9f25adae39b4e1c61a1f888965bb1e0dfce89ee0e10,2024-11-27T17:15:11.320000 CVE-2024-37783,0,0,37775a282d48f40592657111afedd1d875da3d2a0df4266c2542dec5f23c341a,2024-11-22T19:15:06.653000 CVE-2024-3779,0,0,48f0f58ffc20a968f031c537d19ef4714b6de5a5c8cbcdf1d811266c880c2565,2024-11-21T09:30:22.927000 @@ -269364,7 +269364,7 @@ CVE-2024-46668,0,0,92978c4aa13b62f29de9eb65197784fc4f6bdd9165d1d91b822132ada935f CVE-2024-46669,0,0,556fb44d48a2d1617893e813f90d3344679c0b14f9451ea92282d16149a97525,2025-01-31T16:11:27.577000 CVE-2024-4667,0,0,0ba4feb9061227f326b9f44983ec481dee587f64e4899bf77e538f69f9f74063,2024-11-21T09:43:20.190000 CVE-2024-46670,0,0,75ccf01e37b9b8c5ff22f079d1f2a636cf187d1c3561208c729c3716dba92382,2025-01-31T16:12:16.597000 -CVE-2024-46671,1,1,0cff02e27fd230680aae3afc91dd194709cba992be6e0ec99760a016d4102adb,2025-04-08T14:15:31.740000 +CVE-2024-46671,0,0,0cff02e27fd230680aae3afc91dd194709cba992be6e0ec99760a016d4102adb,2025-04-08T14:15:31.740000 CVE-2024-46672,0,0,bc507e64d04ea5640093bd9a3ca6fe7f0c7a71643b79e70f9ab8ae27db60ca75,2024-09-13T16:29:17.123000 CVE-2024-46673,0,0,3f51c09e700b38d12ae33fe015bc01f6f75ee9c1181458b7ce2541d901e5897e,2024-09-13T16:51:39.117000 CVE-2024-46674,0,0,658c5615ef5104d2b41abc83d32329287f71abd731b08493051a521ab04d6ebc,2024-09-13T16:51:45.103000 @@ -271008,6 +271008,7 @@ CVE-2024-48883,0,0,adb8229ac61a0cf6e127a4ecda67bdf63ebce96100cad9493a388f5cd0c90 CVE-2024-48884,0,0,5fd0bb45d4daca6fec84e3590a2c87e5a7fdfd8e521218f0c75f216ace5f8df1,2025-02-03T22:18:16.507000 CVE-2024-48885,0,0,f1a5e74246adb6d7bd8e325564baa4055ce18f2e80eed587565e5479d790b2f4,2025-02-03T21:11:41.750000 CVE-2024-48886,0,0,0c43c603ad0a80f9c21978b3b5043d329abd064d0a00462c64b3fb5285dce5fd,2025-02-03T22:16:04.733000 +CVE-2024-48887,1,1,a5f806b56fa28cc568d47ee92d9a06ac41abb44d77d676f6fa39d0aefb319f8c,2025-04-08T17:15:34.440000 CVE-2024-48889,0,0,b91146ff80af9e0a70e60d177059514309aa07d3d1ed7c0d2244bb40847957f1,2024-12-18T15:15:11.713000 CVE-2024-4889,0,0,54e41cd985dde0162870a1a62b42a9fd40bf90446677bc64ce2d3dd7fe90e1b1,2024-11-21T09:43:47.970000 CVE-2024-48890,0,0,e4c2ca148242c15d7451f4a3f4325a96e3aaa804db1c474d5b5964d77366de86,2025-02-03T22:13:42.850000 @@ -272524,7 +272525,7 @@ CVE-2024-50560,0,0,e5560d8e099bbdb75ebe3a313d5a07fb60056609d630bea2b282b04cbeaa1 CVE-2024-50561,0,0,51d6a6886183d861209a55cd82d08c7368f7ca6eecb96cadd88bb86e0f75077f,2025-02-11T11:15:14.037000 CVE-2024-50563,0,0,b5495e4d9248024f07eadfb97b72f88f39265d3dc21b8de2fb9485f4a9fc5cd8,2025-02-03T21:54:17.977000 CVE-2024-50564,0,0,9f92111f34b8a3f04643692b4b87512c1b9c808d088ae5cb493fe5eba0ae69cd,2025-02-03T22:11:08.317000 -CVE-2024-50565,1,1,40a9ac9d988319b61a916c83882019fb44453d796d40fa457cfd6e13c33c89a5,2025-04-08T14:15:31.920000 +CVE-2024-50565,0,0,40a9ac9d988319b61a916c83882019fb44453d796d40fa457cfd6e13c33c89a5,2025-04-08T14:15:31.920000 CVE-2024-50566,0,0,73abc3a7ec0e89e7710714feab3590ac47ec6fd819b92c2c02e99292bb887750,2025-02-03T22:09:31.510000 CVE-2024-50567,0,0,fb2bfcdd677b57b5f254c8ba8bdb8b89df3eceeb887ef580d5f0711d99cce207,2025-02-11T17:15:22.980000 CVE-2024-50569,0,0,f395ce0ea2e4326ce9a1a0e799e0fd9e0f0f63be0581b485aece38df723835fc,2025-02-11T17:15:23.123000 @@ -274112,7 +274113,7 @@ CVE-2024-52959,0,0,ab868f6da3782d67cb53183f2f781a21b6375778bdbc1b7f5893121d76931 CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000 CVE-2024-52960,0,0,fae4551d6f5890cd1cc0118af23473ce9c16850a8f8d27eba0836b043bfb643a,2025-03-11T15:15:42.813000 CVE-2024-52961,0,0,dea18f81475188c7e018159200e77f633cf269c0485ba3fe6589eb2b7c40b189,2025-03-11T15:15:42.960000 -CVE-2024-52962,1,1,8d4452100c3278f3d1227501e6bc5c672eb7540c12da8cace02e7940f5b7c2da,2025-04-08T14:15:32.097000 +CVE-2024-52962,0,0,8d4452100c3278f3d1227501e6bc5c672eb7540c12da8cace02e7940f5b7c2da,2025-04-08T14:15:32.097000 CVE-2024-52963,0,0,ae3a3bc3ff79384440030ff505ca2ca370b023f5f8023877a92497503fa052d6,2025-02-03T21:56:00.043000 CVE-2024-52966,0,0,45e610534e7771fede3fd74a53db786846838aed2a0896cbe74153f4c82676d4,2025-02-11T17:15:23.260000 CVE-2024-52967,0,0,ff0457e9e50f167599374bf92a5654bd830b20e000ec1663543d1e47a49cfb63,2025-02-03T21:59:09.277000 @@ -274121,8 +274122,11 @@ CVE-2024-52969,0,0,7b7c31017bc020d55866c3b3fcc971134d3b96354f2debd63a54ecbb55729 CVE-2024-5297,0,0,4e7f74d9629bbb9b864fb76b28bd5d406dd3be0c174577372182a6d0a600d934,2024-11-21T09:47:22.990000 CVE-2024-52972,0,0,bd1952b84c87773d87a7a628c33b82c04f120ab1b040d082ef990417beebf08b,2025-01-23T07:15:08.700000 CVE-2024-52973,0,0,4b0162dbe0cc84ae90dcd59a5862af8efd2e82fdabf32f87ed28473f7456d193,2025-01-21T11:15:10.200000 +CVE-2024-52974,1,1,ad3ac1aa3dd6ee3d8d620ec668c9451a0d635f636ecb89f75ad17ad377e33304,2025-04-08T17:15:34.653000 CVE-2024-52975,0,0,087fe0fde0ceab7286a929c06c2ac45f511973f6a98162a3e6dc355fe877ca5e,2025-01-23T08:15:16.990000 CVE-2024-5298,0,0,329feabae44ccd7ff86530cac1ce0ba86c416ea44126377af7ea7290b6d65a10,2024-11-21T09:47:23.103000 +CVE-2024-52980,1,1,5cd5a60939e030bba2ad1bc1468d4820734066d9a809ccf50920701c90c52ea6,2025-04-08T17:15:34.880000 +CVE-2024-52981,1,1,0339da76fda50065e8b5542faaa4cbf2adec039cda928fcc46bd82c166b131aa,2025-04-08T17:15:35.187000 CVE-2024-52982,0,0,87ddbec0fddbec6a4eb61fd0607c77d31103b1dd9283c5a13ec4d5a36a8ccef0,2024-12-18T18:22:52.637000 CVE-2024-52983,0,0,6cf30a09aaa853464d214fc07b1d213f931e08bd912522971a9cefc2fb965c45,2024-12-18T18:23:06.273000 CVE-2024-52984,0,0,11fbf459d3485030a8f786e9a22df0fcdca9965df622457357e14148db310355,2024-12-18T18:23:18.347000 @@ -274898,8 +274902,8 @@ CVE-2024-54016,0,0,639aa106bb3e1987e1e073164a35006658ec1d494dc571ebf11ee73a840c8 CVE-2024-54018,0,0,cad6d12f1a14e927d37238581f95d0e8ab02634a89452232f8dadfac53c033d6,2025-03-11T15:15:43.113000 CVE-2024-5402,0,0,8a48be9314b3c9a679ac7b7baef4e61d2577cdb21f0001defb98f97ce31ab9a7,2024-11-21T09:47:34.947000 CVE-2024-54021,0,0,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000 -CVE-2024-54024,1,1,1154152694e5ae96326215fc537e200d146b1fd6f22f18060566a03143a6de43,2025-04-08T14:15:32.303000 -CVE-2024-54025,1,1,4945cfa92917c8cbb96ccabe5dc92b6ccd9bd7917e15f781e155f14c1f11306d,2025-04-08T14:15:32.463000 +CVE-2024-54024,0,0,1154152694e5ae96326215fc537e200d146b1fd6f22f18060566a03143a6de43,2025-04-08T14:15:32.303000 +CVE-2024-54025,0,0,4945cfa92917c8cbb96ccabe5dc92b6ccd9bd7917e15f781e155f14c1f11306d,2025-04-08T14:15:32.463000 CVE-2024-54026,0,0,723fec38eab4317b0780c9816dd56e900186889e5e56922795660677a81a6c2f,2025-03-11T15:15:43.307000 CVE-2024-54027,0,0,7544813701dc95fd0c5530c62bca74c9e14470944bfaab3455d456f59c4e66ad,2025-03-17T14:15:19.613000 CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000 @@ -277065,7 +277069,7 @@ CVE-2024-57822,0,0,43973cb11c0d7745a76972fd2125c40dd56918f079243999a6a248fd7bb74 CVE-2024-57823,0,0,5ca581226a27965f69cc1b47d8d6ed60ad65266a2e4a0de113585f678075fc75,2025-01-10T14:15:29.583000 CVE-2024-5783,0,0,457a67b18c53addb8fb271e75294a5e3a7e25c57923089dcfbdfc7dbab590f38,2024-06-12T08:15:51.480000 CVE-2024-57834,0,0,5a87b39773bde7ec95e0cc89e1090b2151e71493eb99b3d3e2c7fa1942b6bb7b,2025-03-13T13:15:42.243000 -CVE-2024-57835,0,0,1ed45c82cfdc53a9181994043038f57684b503f4280258c460eac497ac971758,2025-04-07T19:15:54.490000 +CVE-2024-57835,0,1,8fef5a61b0668ebf94e5daa6fadb90839e31d09aacd032554c43f144b8a5f3f4,2025-04-08T16:48:07.570000 CVE-2024-57838,0,0,7205305ae1088ef41361b6511691e021bab207c0c324bab7b09b17a8c1a06218,2025-01-11T14:15:25.940000 CVE-2024-57839,0,0,5656e2417e5685f2e1ff410b1767104ed6341a8132fd402fbef4fd6f8615e85a,2025-01-11T15:15:07.050000 CVE-2024-5784,0,0,f27ecf8abffd9e6c282a3d3ca16cce2ce0cb1c19ecd7f5c543f166278a4d8c33,2024-09-03T14:48:19.570000 @@ -277327,7 +277331,7 @@ CVE-2024-58128,0,0,2f080faeec9b7abd005e501afed73e7df0c396dabb6a1e25bf77fc72ecfac CVE-2024-58129,0,0,11e98106a59e025e34ac181bdadb4c8348e20bba976912e51d2c9c8ef8d2204d,2025-04-01T20:26:30.593000 CVE-2024-5813,0,0,53a768ef9b74ee03be1393dbcc310c528fc37406ef9a9107d27a6d2a3860c95b,2025-02-11T21:36:40.947000 CVE-2024-58130,0,0,b1da61426890522f6374bed5d854c2d8adfdac7556fa6282fde3bf2122dc7cb0,2025-04-01T20:26:30.593000 -CVE-2024-58131,0,0,a83f97c155e755b05ebd5ea26fc6580c4f97340aac1b61096f99964f3bd79e2f,2025-04-07T14:17:50.220000 +CVE-2024-58131,0,1,bc4908e979254be0dc1e1176cc36e7e2691904c3630b2abae16ce8f2a4516d81,2025-04-08T16:45:17.107000 CVE-2024-58132,0,0,87fc99e96492ae47f7ae88aebc39cca10a37119d96d5c66e6cef7cf588ab7762,2025-04-07T14:17:50.220000 CVE-2024-58133,0,0,4511afb6f4930bee53375abc516811f9928c158d8decf5ac029097e07f67929b,2025-04-07T14:17:50.220000 CVE-2024-5814,0,0,409f119643711fe465e9fd028af3caf838fd31e85495ee2ac73938edab3d7b3e,2024-08-28T12:57:39.090000 @@ -281903,6 +281907,7 @@ CVE-2025-1085,0,0,240f000b2a2196559d3c93131a0f7508a4e94aebf865be36c2ffd695012f0f CVE-2025-1086,0,0,a69d2558168bf2a8aaa109750d1ed5860f8baf2bb5bad3b2b8e78234f1d8c631,2025-02-07T02:15:30.523000 CVE-2025-1091,0,0,41f3aeac640c3e0e17c6b04948a8dcf1ae635325d94a919fd15d739e41c450e8,2025-02-26T00:15:11.250000 CVE-2025-1094,0,0,dca1378d2e11e054a0baff76bda52bd172b0e41af32ad66e0ce66e679989e2ec,2025-02-21T18:15:20.033000 +CVE-2025-1095,1,1,e99a2f31419478e782bbf47f72838b3b2dc9030e3e931d14067584edae0a688e,2025-04-08T16:15:24.910000 CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000 CVE-2025-1097,0,0,2202b89d343208abc4d734355b4c7ffd6f25bdeae0a3549fe1a1a5c18a5619b5,2025-03-27T16:45:46.410000 CVE-2025-1098,0,0,5e273d1d4e3b115282c7c75a71d4085bca65fed73fce8f6abccd6dd2ec5272b4,2025-03-27T16:45:46.410000 @@ -282784,7 +282789,7 @@ CVE-2025-20930,0,0,8ebf2a99b4c5c1c6b9cb7982c9aa1b34757800a21756457108aa20434e8a0 CVE-2025-20931,0,0,80628cf5e237017e565c2f85d2589faf869404232ef52d4d52e902c75a7308cc,2025-03-06T05:15:21.210000 CVE-2025-20932,0,0,452645591f250cefeb8364705b9184285f7f0ca711860108c9bef7228f459595,2025-03-06T05:15:21.440000 CVE-2025-20933,0,0,36c279b2571a17b64e8cd3a3ca4b95866bac192f6369be55dbc7be562f44587e,2025-03-06T05:15:21.607000 -CVE-2025-20934,0,1,bd25b42cc435f2d9c5469da78b49c3cd8f53630d6a0a718da989cc89c34a60a5,2025-04-08T15:15:48.457000 +CVE-2025-20934,0,0,bd25b42cc435f2d9c5469da78b49c3cd8f53630d6a0a718da989cc89c34a60a5,2025-04-08T15:15:48.457000 CVE-2025-20935,0,0,eaad810eb8cb61fb7619ef5ad02b395364a1d6ab2034ae6bab74e160702c1e86,2025-04-08T05:15:37.923000 CVE-2025-20936,0,0,95ed8eccbce294bf19d08ec77c2714105691119c48dc9afcaa662702794e4511,2025-04-08T05:15:38.043000 CVE-2025-20938,0,0,c4b448b78a9f5674497541de07e4f39ffb20d14445ee30727f93595ea3b15a18,2025-04-08T05:15:38.170000 @@ -283535,7 +283540,7 @@ CVE-2025-2189,0,0,21362a35b576822cdfa735714de3fa8c2b76316e693eaa457f9b76275fa21b CVE-2025-21890,0,0,3e452c883c787bf57ab5be0b0e5aa90feed93eaffae235cb89507607056595a5,2025-03-27T16:45:12.210000 CVE-2025-21891,0,0,a253456cafaa3a78ec959ae9d1e060c416fbd075d583d9a377a6f3a26384270e,2025-03-27T16:45:12.210000 CVE-2025-21892,0,0,8c98329172bed9a8b6c22457d316cbe2e25dcbfb066893d9b84a9f2d473cdf83,2025-03-27T16:45:12.210000 -CVE-2025-21893,0,1,77af67f7ba022fe2f0a850b03c8fb5214a9efbab3a359cf8e731a18457c95188,2025-04-08T15:48:59.010000 +CVE-2025-21893,0,0,77af67f7ba022fe2f0a850b03c8fb5214a9efbab3a359cf8e731a18457c95188,2025-04-08T15:48:59.010000 CVE-2025-21894,0,0,3518ad87830776ee5c456f2bcf0334909724e246cb0814f7b9f796f00f6b5953,2025-04-01T20:26:01.990000 CVE-2025-21895,0,0,ecdcd68f96a27358be9b473e4f7dbeace23e71a535e86e1f922cc6e013fd6800,2025-04-01T20:26:01.990000 CVE-2025-21896,0,0,6ce209f987b7643981187449403e84261f70a59c8693a0bc69e1616d860bd91d,2025-04-01T20:26:01.990000 @@ -283650,13 +283655,13 @@ CVE-2025-21995,0,0,39cd5a3684b1268074ce5543ed4e1145926df1a1efe6a4230d26e4ca94fe5 CVE-2025-21996,0,0,87f534beee0d8dd0fa3dadba16f120da9abd9632919fbc7de7ab0cf56a50fdde,2025-04-07T14:18:34.453000 CVE-2025-21997,0,0,eee4a513ef8e5dfb7b07fdbef713dcabb27c25039ea5704a9aaa15bda20acf31,2025-04-07T14:18:34.453000 CVE-2025-21998,0,0,159795d3cd482f4893b30d42942b4b57a39974cf5007492bbf74917b5664adf3,2025-04-07T14:18:34.453000 -CVE-2025-21999,0,1,eb3945e0a8581d3f11d329c04183989c747e3c4252a55283c2078b023f017786,2025-04-08T15:49:48.200000 +CVE-2025-21999,0,0,eb3945e0a8581d3f11d329c04183989c747e3c4252a55283c2078b023f017786,2025-04-08T15:49:48.200000 CVE-2025-2200,0,0,21deda7203fc92111d87559693dc915b258e0e0cc7d6dd852915de5a18e9eb3e,2025-03-18T16:15:28.347000 CVE-2025-22000,0,0,3f2ee99f8e22de85bca39cb4e485228ea9cc9ee4417028533c7dc6982b1cde5a,2025-04-07T14:18:34.453000 CVE-2025-22001,0,0,cbc3bb1c89f6487fbe056c082bd296ca39d25ba5532d66090467e74cd62e6335,2025-04-07T14:18:34.453000 CVE-2025-22002,0,0,c319a343d94f6b1787154174a9e452b0184e5505963c349d50abf5cf4a1d5d24,2025-04-07T14:18:34.453000 CVE-2025-22003,0,0,1e3ec526103cc2ecaeca5a0d8aa1ee3f71ef85fae629633a5c2e4d1d2941233f,2025-04-07T14:18:34.453000 -CVE-2025-22004,0,1,ec7d83042ff612f0c21b4758b3cd2e0f14c38a7a425cc15b58893f0b86b05f1a,2025-04-08T15:48:27.060000 +CVE-2025-22004,0,0,ec7d83042ff612f0c21b4758b3cd2e0f14c38a7a425cc15b58893f0b86b05f1a,2025-04-08T15:48:27.060000 CVE-2025-22005,0,0,4cd51e496a9f3454848e95f5f6a05c13a69bece8dea5c169e93cded54562bc5f,2025-04-07T14:18:34.453000 CVE-2025-22006,0,0,3ae2f25725b261486943b919fae821476183fa3ab460047898f00af25ca11479,2025-04-07T14:18:34.453000 CVE-2025-22007,0,0,3d5542812aeb3ea12efdc811fa913b4e1456a9295a5ddae09e69426d5bbac28c,2025-04-07T14:18:34.453000 @@ -283877,12 +283882,12 @@ CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e CVE-2025-22452,0,0,ff338c2acc92abbef6e1d867487b0bd2693a0084a4ebaee6adef7d21d7f92aea,2025-04-07T14:17:50.220000 CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000 CVE-2025-22457,0,0,06854130f0059ca72764b9c6e13d7893e783ab5e6f2271d978b176c2139c91f1,2025-04-08T13:39:05.933000 -CVE-2025-22458,1,1,47a2addc8b510b3fe3252e495aedc9eb645d35d040e49ecde9015998ef20a6cb,2025-04-08T15:15:48.857000 -CVE-2025-22459,1,1,69bf93ab13e189d6effecfe1215a4249c855325a7ac92e79e5cd80a61b903e7f,2025-04-08T15:15:49.020000 -CVE-2025-22461,1,1,8be46fe1731f13bb01544ee07cdf0a21aa6ca271a87b80f716a628fe5f58964c,2025-04-08T15:15:49.167000 -CVE-2025-22464,1,1,166aabf9eacb7945a3df0168172a9a84981addd3c0499df0e11e86cf377f5fa1,2025-04-08T15:15:49.310000 -CVE-2025-22465,1,1,c4835292a5f37fe997eb8d0a4585aa649d7c9c20ccd6fd8f8e61998fd0d9b5f2,2025-04-08T15:15:49.473000 -CVE-2025-22466,1,1,108560b9cb4cd2dc265caaa97e41de822f975ded5b128c4e7c4b363e67e95d2c,2025-04-08T15:15:49.620000 +CVE-2025-22458,0,0,47a2addc8b510b3fe3252e495aedc9eb645d35d040e49ecde9015998ef20a6cb,2025-04-08T15:15:48.857000 +CVE-2025-22459,0,0,69bf93ab13e189d6effecfe1215a4249c855325a7ac92e79e5cd80a61b903e7f,2025-04-08T15:15:49.020000 +CVE-2025-22461,0,0,8be46fe1731f13bb01544ee07cdf0a21aa6ca271a87b80f716a628fe5f58964c,2025-04-08T15:15:49.167000 +CVE-2025-22464,0,0,166aabf9eacb7945a3df0168172a9a84981addd3c0499df0e11e86cf377f5fa1,2025-04-08T15:15:49.310000 +CVE-2025-22465,0,0,c4835292a5f37fe997eb8d0a4585aa649d7c9c20ccd6fd8f8e61998fd0d9b5f2,2025-04-08T15:15:49.473000 +CVE-2025-22466,0,0,108560b9cb4cd2dc265caaa97e41de822f975ded5b128c4e7c4b363e67e95d2c,2025-04-08T15:15:49.620000 CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000 CVE-2025-22472,0,0,da7c2c2731a1940c60b4ae6c1edcbbf175ca5a2d3964a03701282be7a86cbe41,2025-03-17T18:15:20.930000 CVE-2025-22473,0,0,24aeaee52dbfb2b3f71ea7cd4512b20455b60139bbfda5acf051e65598986ddc,2025-03-17T18:15:21.077000 @@ -284228,14 +284233,18 @@ CVE-2025-22841,0,0,c5bade831fbfcc0c448601d2e5123f6502d61bdcc4812c545d0acde86b73c CVE-2025-22842,0,0,faf6c920f460eaed5c71db376945195f25e95dd8f0b0b07a1be494ceccdfcf06,2025-04-07T14:17:50.220000 CVE-2025-22846,0,0,ccaf4947a08c20d6717ec860a31060641d37d75a3b98ee7b0493f2b2542b18e8,2025-02-05T18:15:31 CVE-2025-22847,0,0,0de483179c1066e1dcd28554acee3e5fb1b273a7c68d4f167ad861a991a595e2,2025-03-04T17:39:25.643000 +CVE-2025-2285,1,1,4ac3afb65754a35555c9a44e11d9e37ef95c30acda8fbfec9f3436fd3590140a,2025-04-08T16:15:26.303000 CVE-2025-22851,0,0,f2a6332c8e5e9b9a1e6161891c357461c7bb64ff86725b50b37556c69f8a4a26,2025-04-07T14:17:50.220000 -CVE-2025-22855,1,1,abd1ac2de4144955d16a272ea7690676b17acd8daca801ba0924e98487b9a7bf,2025-04-08T14:15:32.690000 +CVE-2025-22855,0,0,abd1ac2de4144955d16a272ea7690676b17acd8daca801ba0924e98487b9a7bf,2025-04-08T14:15:32.690000 +CVE-2025-2286,1,1,bdf31803a1c7fe5b730665d3e039018874581b1255f6940ae8421518eb44bc76,2025-04-08T16:15:26.480000 CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000 CVE-2025-22866,0,0,c708175c229fdd910b5da4acb829b622112b0d84eed2186edc0f9bf19e465443,2025-02-21T18:15:32.243000 CVE-2025-22867,0,0,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000 CVE-2025-22868,0,0,e60277ea4cd9e8b52a0bc5998998d4b70d591016f1b5f98965efe1007387aa98,2025-02-26T15:15:24.993000 CVE-2025-22869,0,0,5fcceae088032b557e3959982bed74e41a764f7c84c3726bffbbd6756b1cca25,2025-02-26T15:15:25.160000 +CVE-2025-2287,1,1,5a1241d3b19414ec4ad736c2ff5223f45480fb4d9d547bec6788c90c23223f77,2025-04-08T16:15:26.620000 CVE-2025-22870,0,0,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000 +CVE-2025-2288,1,1,c8da406fac5ad897244c92316782ac1a176e7b01f7b5cd5ccfa8103c29e18aec,2025-04-08T16:15:26.750000 CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000 CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000 CVE-2025-22888,0,0,8715446d28ee196d4b5c9f7b0ea6743f100a7fae140bfca4a55cb2369c02c83f,2025-02-19T06:15:21.687000 @@ -284266,6 +284275,7 @@ CVE-2025-22926,0,0,4154f936cdf39d4699ab6e53977f618e941380c599a7e883c52aab255fa1a CVE-2025-22927,0,0,88bf50b75a659bbab243a76f03ae8c557d1d6e8ca7f2e974e1743b02183cb5d8,2025-04-07T14:18:34.453000 CVE-2025-22928,0,0,4c964912abb95b29dbe026003f54c71c7874669cb5c0ddbb2b51bc75c13be164,2025-04-07T14:18:34.453000 CVE-2025-22929,0,0,1452b8a2fff94532d0fed1efabb09a58f398245a55704e8724aa3e5034629857,2025-04-07T14:18:34.453000 +CVE-2025-2293,1,1,dc901be6198d1c33a6412d3b7d322d93f940e7cec6bb58c13e7475f38e68ba54,2025-04-08T16:15:26.887000 CVE-2025-22930,0,0,9f037cce0cbbdbb57ebcef79426c72c5c553146b35be0ba75c142417aafe25fa,2025-04-07T14:18:34.453000 CVE-2025-22931,0,0,7040cbf9d7877251b12ddaa03bb535fb63f9768d1a2571d19941499e73bb1b90,2025-04-07T14:18:34.453000 CVE-2025-22936,0,0,d81f6f27c0c4b19886d50175e4767c83ad84386da04b2ebc81be17b6a19a6c20,2025-02-12T14:15:33.187000 @@ -285305,7 +285315,7 @@ CVE-2025-24273,0,0,4144dcc57d90af0c4fc9cfe7b291ef335e8fa02c2dcf1264ce7a0cb6612ce CVE-2025-24276,0,0,fde5a43e6a43beb7fe59dae57cb8ecb0f0a1a3fa00423e5c472094f29e181e82,2025-04-07T13:34:18.970000 CVE-2025-24277,0,0,7689e916ab1daf1bd3b71f7ef5284681f9c9f49bd75eaa1a34b5098f93a9668a,2025-04-04T19:49:08.933000 CVE-2025-24278,0,0,6e2eacf3052e7cbc2055495d37c9c6d7068989be97cae8da3a79685df107e734,2025-04-04T19:47:33.687000 -CVE-2025-24279,0,1,0b9c72da4caee87f8fd8c314aa29cc6ed2a830707dc31fb81464f31c75c70c65,2025-04-08T14:06:35.790000 +CVE-2025-24279,0,0,0b9c72da4caee87f8fd8c314aa29cc6ed2a830707dc31fb81464f31c75c70c65,2025-04-08T14:06:35.790000 CVE-2025-24280,0,0,7e6318ddeec3c45683c18b4a04b0c338f2389b9346d93c786d9c6752b668d52a,2025-04-04T19:46:03.987000 CVE-2025-24281,0,0,76b9011c7783c871ef865a80caf1ae08e485f8d8810428515769f6f44737d638,2025-04-04T18:22:19.983000 CVE-2025-24282,0,0,92059d5a241b5d96ef7593ded7e2abc281079ec5ed3a524fa050c614e5194214,2025-04-04T18:23:23.340000 @@ -285964,6 +285974,8 @@ CVE-2025-25222,0,0,c2ca7e3dc29f3574e03139c7399b4994d988797dae7ad6db23b85350baa3d CVE-2025-25223,0,0,a49bb693ef5024209af2cdf099d01934d199df8e6379e744ca5e733fcd788f54,2025-02-18T01:15:09.347000 CVE-2025-25224,0,0,a4f44e8389415111624e6d3b431cded203f069a8e58de6c5b5f4eb5c08d09e30,2025-02-18T01:15:09.473000 CVE-2025-25225,0,0,50e1db0214d749384eee9692d10836c10107d4550447d640f020938a4553ed14,2025-03-18T17:15:45.920000 +CVE-2025-25226,1,1,8e39c60963b84894060b765fa1edd02c01f5d8039fd120d427c9bfe40910c5a5,2025-04-08T17:15:35.453000 +CVE-2025-25227,1,1,5879aa4a1f60f5222de751f4a47e73b8a2db3f64d359f80273b083e1ceb25f49,2025-04-08T17:15:35.610000 CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000 CVE-2025-25242,0,0,9434714e72888d1a52e5bad48430408baa107619f6e4dcba8f508d71d8cfd58f,2025-03-11T01:15:34.777000 CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000 @@ -285972,7 +285984,7 @@ CVE-2025-25245,0,0,9553bdb2bbba17800d10d6fb307dc38303cc249115fd509a4ca397b2ef8f3 CVE-2025-25246,0,0,f4be18dcc4810edd797ab4348573a1992ac7758447b43b4ac7e677cc18ccb145,2025-02-05T05:15:11.663000 CVE-2025-25247,0,0,45a7686ea5976edcbc598e01fb577ca50507f74bc11b7b7bfc3045e83b294c70,2025-02-10T15:15:13.333000 CVE-2025-2525,0,0,0994e3c2e24585cd5008c660b4b50b3cf67b8598aa0c7ecb45d831be89499ca6,2025-04-08T02:15:20.363000 -CVE-2025-25254,1,1,dce9fca4daf2546c7d78ae6c8248b9fc774f1681b8999537f93e27525a72b511,2025-04-08T14:15:32.857000 +CVE-2025-25254,0,0,dce9fca4daf2546c7d78ae6c8248b9fc774f1681b8999537f93e27525a72b511,2025-04-08T14:15:32.857000 CVE-2025-2526,0,0,247948e96f9305547baa31ada19db6ed824206eca005b3144d83206016536644,2025-04-08T02:15:20.523000 CVE-2025-25266,0,0,14fc4214833d5ffeb8f363743939de320f9169af46798b63b6da510cc3dfff47,2025-03-11T10:15:17.850000 CVE-2025-25267,0,0,327b2100edff4cbf9fdcfe1321dc00713a82279b4ead6a7ccdc62b6f97970ac6,2025-03-11T10:15:18.030000 @@ -286777,8 +286789,14 @@ CVE-2025-2704,0,0,f50441ffd3f3109d4071899808281b529314ab4de08ae18179b1bf16c0996e CVE-2025-2705,0,0,d7cf085971e80ff2f3017b9a76ca7e7c021414ba6b4da520921b330deccd7930,2025-03-27T16:45:46.410000 CVE-2025-2706,0,0,b7301874e71862c2693f8002ec404483a315cca246767eff2f97ca78b31281f9,2025-03-27T16:45:46.410000 CVE-2025-2707,0,0,f3d66cc3dc4dc05eca1164cc031bb281faa912ba2aa015da55a5b17439ea5a04,2025-03-27T16:45:46.410000 +CVE-2025-27078,1,1,15f22fb51cb18c2a8963f17db932120de4dafe83b8a9875a13451681b676e0b3,2025-04-08T17:15:35.767000 +CVE-2025-27079,1,1,78c1cb3cdf7b53b59a81d42528f99d41a08c67368ec8576f61bbed8b5846837f,2025-04-08T17:15:35.970000 CVE-2025-2708,0,0,035f6de4f231540df9d0a6b0f6672e128ae938a5bee1f8e3912f75b08cd18d96,2025-03-27T16:45:46.410000 CVE-2025-27080,0,0,42e0a7d70009a70996fc58eb7f4ee4c8d798d6b5d13faea5a93ec59abf435a8f,2025-03-18T20:15:26.300000 +CVE-2025-27082,1,1,12e2af2cbfd98326ddf9e4e833f440d4fa3244554123dc0b0feeb9ae2ca3be2c,2025-04-08T17:15:36.233000 +CVE-2025-27083,1,1,039b60b71ae96731b51e6ccc43c76a5172c74b62542eff07df959a75bb6f7f79,2025-04-08T17:15:36.500000 +CVE-2025-27084,1,1,73e36f7eea828b1ffe30452accd60e40ad73ee29ff7b6bc60aab1fae91c11e27,2025-04-08T17:15:36.700000 +CVE-2025-27085,1,1,28c32c2386529fa35cef9fd2dc58f2403ced06a2e1ed5aa4f59f7943c5c848eb,2025-04-08T17:15:36.887000 CVE-2025-27088,0,0,fbdc36eed3cad3a0ad2022cbe7aca458560a9c5f707fbc00203d874cefc235d6,2025-02-21T22:15:13.673000 CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000 CVE-2025-2709,0,0,d6cc52b54cf9fe42db12e08a6931ac595590cbc41e2b6527b80a4b65b7cd7d63,2025-03-27T16:45:46.410000 @@ -287008,6 +287026,9 @@ CVE-2025-27438,0,0,aa271b66950b27900a45ff14fb7ffa30a34f109c554f6e3ef42a2a6604aa6 CVE-2025-27439,0,0,0adb16bdd8175e50b2012f79d28e4b0f799da16ee6499b9aa741287f255e0365,2025-03-11T18:15:36.510000 CVE-2025-2744,0,0,70019c1a1354272236c9eec45caf986c8b60cd8d3eddcfb250ce564a0fe4e958,2025-03-27T16:45:46.410000 CVE-2025-27440,0,0,86277272131892140b431c748dacaa4d43e60fedf1d6315607fc09340bd3b7ff,2025-03-11T18:15:36.653000 +CVE-2025-27441,1,1,c81af3d956cc688c6a4a768321bde91f6587e37b4f0486d9eeabf291bc759ef8,2025-04-08T17:15:37.080000 +CVE-2025-27442,1,1,6ac6f35a008e0f0ede7a5330ae8abb3acf4f3d4f73145df77b75159a41b43d4a,2025-04-08T17:15:37.487000 +CVE-2025-27443,1,1,89a84d34de6c8b22c78adb0c6d7cbffdf810e646416a8b4a0fc8f30660302952,2025-04-08T17:15:38.113000 CVE-2025-2746,0,0,71c2d17f9a5c716435e405e404de90f26a63b0f3426fd27a8f85b67d8ccfbefe,2025-03-27T16:45:46.410000 CVE-2025-2747,0,0,893662fb5676d31ead9a58cd136c261bd2570bf64bfceca741f28b6354fadd24,2025-03-27T16:45:46.410000 CVE-2025-2748,0,0,ebc7389a6b5f06bc936b869752f476de54bd76de60953f756ced1aea5c0e21b8,2025-03-27T16:45:46.410000 @@ -287250,6 +287271,7 @@ CVE-2025-2825,0,0,1348b20aa0e099976065c5f501f6dcf6a498c894986b887d248ad2c9caac70 CVE-2025-28253,0,0,0f48ac5a4456a4d9cddb64e8619772b132895c7269a2c8d0b95ac55f00e8e388,2025-04-07T20:15:20.173000 CVE-2025-28254,0,0,c097372640e42ad56d3f680e0895f3984d33f75010de2acc8d7dea3b37a08a9e,2025-04-07T14:42:18 CVE-2025-28256,0,0,b63d6b95334cfc627eaa3f9ee9948e650cb545bc12e96a49e4c25681e746d651,2025-04-01T20:26:30.593000 +CVE-2025-2829,1,1,d9be9d9cd986deff3d9773c86780322a0cbb580f28797e63eb6c5565528c796d,2025-04-08T16:15:27.133000 CVE-2025-2831,0,0,1ae81597715ce516aca81a4f719c74684bee390c094eaf6c3092e19f96d27ebc,2025-03-27T16:45:27.850000 CVE-2025-2832,0,0,9ba849558861453fef9ac84ebe5df211359e27bc420cd4cffb0300d913dc6662,2025-03-27T16:45:27.850000 CVE-2025-2833,0,0,5ee1553047443311af90b172ce83a898e2802ed44b7f8cedda9626fc88ddfee1,2025-04-01T15:43:23.657000 @@ -287273,7 +287295,7 @@ CVE-2025-28409,0,0,af255d94c53f02bcc7c44f3eb3d3149dbc8da42a91816dcb4d28e5d2092e8 CVE-2025-28410,0,0,deca7b61d15581fa04062b253bfeed3eeca3ec4447a55aa05224d328de10378c,2025-04-07T16:15:25.170000 CVE-2025-28411,0,0,ce94bbb2cfe2592fa165fc47f6c19172c117cc62297fef441dbf155143a46e8c,2025-04-07T16:15:25.300000 CVE-2025-28412,0,0,aceca59ce36b4bebccc6a04e4ae8272d44fe2b6e72e5b5745ff3da7bc0c09681,2025-04-07T16:15:25.433000 -CVE-2025-28413,0,0,a77e1ed07c1e44eec7bf7cd44ba0cfe90a21836b7dceba8a5a4052069c83a62d,2025-04-07T16:15:25.543000 +CVE-2025-28413,0,1,321d7d386d099070a81fba8c4036f916c7aac428205d2959a89f5fc687b796b7,2025-04-08T16:15:25.983000 CVE-2025-2842,0,0,47b6fed0afeb8764a2eae2f8cabf83dc45e6430c2005f12d42ece8f2faf4ea8d,2025-04-04T14:15:22.517000 CVE-2025-2846,0,0,3b5287c806e8bc80973f9baaf0ea026d933f9fa8ff940c7a3667c18ec778e524,2025-03-27T16:45:12.210000 CVE-2025-2847,0,0,432b048d8c8afdfd4c92ac64bc4ec034bc3baee4250e2624e5d27f22cf3fe391,2025-03-27T16:45:12.210000 @@ -287412,7 +287434,7 @@ CVE-2025-29070,0,0,24569788487d0400d538146d963f6020db8a44ab6999b4d9aa33cc8736405 CVE-2025-29072,0,0,49c945210f3f78e56e41b3df1156a5372b970d771a90cb3e84f3b7747252dacb,2025-03-28T16:15:29.640000 CVE-2025-2908,0,0,041eb1fa89a8461da19bf701f06a30feb1f340b875a2b47541929394f018f7d6,2025-03-28T18:11:40.180000 CVE-2025-29085,0,0,f3b0229b2dbdb0918b1860c20c86a23a202aa8fd27b32fb25e3773ee78d284c2,2025-04-07T14:18:34.453000 -CVE-2025-29087,0,1,e301aa4e80f242ecb029dbb91c9332175482c546df9437efd128be68a3d9d04a,2025-04-08T14:15:33.240000 +CVE-2025-29087,0,0,e301aa4e80f242ecb029dbb91c9332175482c546df9437efd128be68a3d9d04a,2025-04-08T14:15:33.240000 CVE-2025-2909,0,0,97c0fe7ab6ec975ef24a907a995721890d6b9e4b583a692182e886d15cd6b91b,2025-03-28T18:11:40.180000 CVE-2025-2910,0,0,63b1776a3174c1a360045ac9eb5899920566d03dfd18cf1878580a96741c5eb9,2025-03-28T18:11:40.180000 CVE-2025-29100,0,0,03e4a9cc3df0d3df440cd5953f31e0b258dcc8840a20f25006f01137c8594a87,2025-04-01T20:06:53.017000 @@ -287487,9 +287509,9 @@ CVE-2025-2946,0,0,d1b6bc216dd9866fedcefbedd5d27e2a55560ea3e179cb5e876100bee6cdba CVE-2025-29462,0,0,2dbf51a848bf77ad433e707ac24330b357114ddd7a825b863e5708fee007dbfd,2025-04-07T15:15:43.373000 CVE-2025-29476,0,0,3010ae735c879d92a342e7748811b3946ae8287c6c80f89374bb498690e8bd18,2025-04-07T19:15:55.790000 CVE-2025-29477,0,0,2b1c163b57b7284c39b710b65fa772d27c2dfad0127610dec2abcbdeeac4b145,2025-04-07T19:15:55.950000 -CVE-2025-29478,0,1,e1fa15f399b4fd91c965b658571344e78a8e0df9f2c58703d12dd09b160b45d7,2025-04-08T14:15:33.417000 +CVE-2025-29478,0,0,e1fa15f399b4fd91c965b658571344e78a8e0df9f2c58703d12dd09b160b45d7,2025-04-08T14:15:33.417000 CVE-2025-29479,0,0,886e36646f97f4ec7e2f3f1e63119ca20dbf8967ca479553fd6c7e6965456d7d,2025-04-07T20:15:20.490000 -CVE-2025-29480,0,1,48aff45bffc4845cef589163edf9e0ea4329e08c7fd836289d300333f8a326f6,2025-04-08T14:15:33.590000 +CVE-2025-29480,0,0,48aff45bffc4845cef589163edf9e0ea4329e08c7fd836289d300333f8a326f6,2025-04-08T14:15:33.590000 CVE-2025-29481,0,0,264c2ebf93bf9f6a2f276a874ddabf409fbeda9af33e5518a36dad5d0a79aa12,2025-04-07T20:15:20.720000 CVE-2025-29482,0,0,5aa47d8c253bbdab99dd7d1f00bcadd9e091a6d37750d9c095c4e45dd82f1971,2025-04-07T20:15:20.847000 CVE-2025-29483,0,0,a44df1db1a75ca4ccf8a0bab57f388d77d71341421d00a01658dce0d1318836c,2025-04-01T16:08:17.700000 @@ -287517,7 +287539,7 @@ CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf0 CVE-2025-29570,0,0,ce09831559b48fe479ba4c5f9b34d0db4bbbbbf20068eb3ed4fe546923ebfe0f,2025-04-07T15:15:43.543000 CVE-2025-2958,0,0,9728ea5d0e1e0ffe03d484b47c7dc7d2f752fe0ff3a0cf460614ef3d0b6ffb41,2025-04-01T20:26:30.593000 CVE-2025-2959,0,0,1e1c625f609a10be5a0b8a23aebaf67e7ab0d18811ee0ee5bccb17420006f738,2025-04-01T20:26:30.593000 -CVE-2025-29594,0,1,853a65c84e3f449ef6203f6fa9db2847ae25e6db77574ec93fb2fd77b22c0fee,2025-04-08T14:15:33.767000 +CVE-2025-29594,0,0,853a65c84e3f449ef6203f6fa9db2847ae25e6db77574ec93fb2fd77b22c0fee,2025-04-08T14:15:33.767000 CVE-2025-2960,0,0,c08819bedf646cc171f0258b0a94c3a41e46867e1b14a737b82467d2de4f87fc,2025-04-01T20:26:30.593000 CVE-2025-2961,0,0,99a9282acf76e32af58efa1bac54403a0a08178dfa00cc28168e32b8a53d8a08,2025-04-01T20:26:30.593000 CVE-2025-2963,0,0,84d2c4a858a789275648d5c139e966fa3d1f94dab800d93bbe623441c26249a9,2025-04-03T23:15:38.103000 @@ -287596,10 +287618,10 @@ CVE-2025-29923,0,0,89bab0cfc368a6ef6eb66f57c2b9e15b441c30032ed6f96b7591687487c7f CVE-2025-29924,0,0,33ff2ffe448b023fe20ba1aebf83c3931032be11ba9e01550609a234d855b785,2025-03-19T20:15:19.873000 CVE-2025-29925,0,0,53b6adff79028a26a70908208cd05b264ecb017e2af474d23bebc859334f4bdc,2025-03-19T20:15:19.987000 CVE-2025-29926,0,0,40b05deb93101dbe75086a11818b59b57b6a814b20f271aa3698b66c8a60145c,2025-03-19T18:15:25.770000 -CVE-2025-29927,0,1,9fe894281a445dc82cf58faae8c30ef1547051185123f2b9469125b69f8ac336,2025-04-08T14:15:33.973000 +CVE-2025-29927,0,0,9fe894281a445dc82cf58faae8c30ef1547051185123f2b9469125b69f8ac336,2025-04-08T14:15:33.973000 CVE-2025-29928,0,0,a8d214b86a591a9a4539038c0623d4202e473916c9bd03bcdaaf6e157b8bec53,2025-03-28T18:11:40.180000 CVE-2025-29929,0,0,25d530e1688b0222548f72f700e2cd59c64c8adda5f90b1907d220f762d09909,2025-04-01T20:26:22.890000 -CVE-2025-2993,0,1,f1e29c0453dca825aef2d68be3449f02117216671238524fb942bc1ad682ad72,2025-04-08T14:00:57.463000 +CVE-2025-2993,0,0,f1e29c0453dca825aef2d68be3449f02117216671238524fb942bc1ad682ad72,2025-04-08T14:00:57.463000 CVE-2025-29930,0,0,5c209ec60ca4eeb14d225cb677e5ddb09384395f274bc0cae2e3304b0a41e066,2025-03-18T19:15:51.340000 CVE-2025-29932,0,0,4b9314c077daab23a79ad834ada6389de74731b87a8def4d7d8999f0fd1a08b1,2025-03-27T16:45:46.410000 CVE-2025-2994,0,0,3998d75b7f0f42041f2d8938e2e7cae9fc19fcfd6624d2244213d422cfb3dff5,2025-04-07T14:38:29.277000 @@ -287685,8 +287707,8 @@ CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbf CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000 CVE-2025-30149,0,0,9d45b14f7ce1c383888c38736f5cf3ea63c5e434e58881699105d1fe3c5316e1,2025-04-01T20:26:22.890000 CVE-2025-3015,0,0,099717fc51ac180e71d1a26e8b38cd7df3f75ab75884b374ba09343d9b7ef833,2025-04-01T20:26:22.890000 -CVE-2025-30150,1,1,4e848504d4b6b16c7014e06ed400c7be32a67f9c3224aef2439785015ae43443,2025-04-08T14:15:34.540000 -CVE-2025-30151,1,1,43ef84afe3b5f99d283c8017097c4777b37f98b75d2033a8740563a67b55ab38,2025-04-08T14:15:34.737000 +CVE-2025-30150,0,0,4e848504d4b6b16c7014e06ed400c7be32a67f9c3224aef2439785015ae43443,2025-04-08T14:15:34.540000 +CVE-2025-30151,0,0,43ef84afe3b5f99d283c8017097c4777b37f98b75d2033a8740563a67b55ab38,2025-04-08T14:15:34.737000 CVE-2025-30152,0,0,fb7d8b36a0a9757a199a4cf8f9b4b43b19a772c330ea1d3bb0186654fc6f920c,2025-03-19T16:15:33.313000 CVE-2025-30153,0,0,da47524558affc65b6874f9bef3637406802e7d0a047ff83de555cab022828e8,2025-03-19T16:15:33.607000 CVE-2025-30154,0,0,f4c8f04ec10c8608001f5ee4aec87a1247d8c3c0588d5bdb69da7f038e16b9a7,2025-03-29T01:00:02.337000 @@ -287781,7 +287803,7 @@ CVE-2025-30373,0,0,a5110d56497869d0689dd6b8d6b1b5d8657b86284ae0cad7b228249265682 CVE-2025-3038,0,0,22534a6e99d8435c0e3640274e43279290c0824de864795a486909ffa65e03da,2025-04-01T20:26:11.547000 CVE-2025-3039,0,0,8412b53044798e7429c2f1e43b2eaff144fc88ee266808028d00fb7035e9ff90,2025-04-01T20:26:11.547000 CVE-2025-3040,0,0,274892af91b4ed207c6fb8d845fb283c63d995b076d284b90cfd8062dbb59a9e,2025-04-01T20:26:11.547000 -CVE-2025-30401,0,0,504518259c32bae7e253c515f39210cf1dc2f0838926fe013f5cc3a55b8f0413,2025-04-07T19:15:56.223000 +CVE-2025-30401,0,1,8e6bcb19135314057f4c0e4e05c81963f90b21469fe6d07aa9c9f6cb9400b29a,2025-04-08T16:48:26.703000 CVE-2025-30406,0,0,f351aeea06e5f96599007e5f69eaf797f1a8422f126f2300d35fae3c1967d53f,2025-04-07T14:18:34.453000 CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000 CVE-2025-3041,0,0,d9fe1e53f2cdd91c8975c5476eceec361ea81e0c3d05a42ad90016292a4f1e02,2025-04-01T20:26:11.547000 @@ -287942,7 +287964,9 @@ CVE-2025-30623,0,0,a8e0620fa0eff69e53f34c91bac6562d90d04f91188fb9d1c9bfa47d4c96d CVE-2025-3063,0,0,2e45f7e85b76c34e4c90c66b657feb85dadfe8fb2002194cf56059b20b804015,2025-04-02T14:58:07.527000 CVE-2025-3064,0,0,1d25beab72f42677239e09478a00b8915ce297d152397fa70a1f57f4261ba7a8,2025-04-08T09:15:28.140000 CVE-2025-3066,0,0,4036e1c523f4d168ee49a384a6c587b88b052f12af15ef61935538c6b06fefb9,2025-04-07T13:30:17.320000 -CVE-2025-3067,0,1,7d3b2e645511578005abbbeacbec82fc74b74b6c63aa21cac1f18b360c60a63c,2025-04-08T14:03:21.997000 +CVE-2025-3067,0,0,7d3b2e645511578005abbbeacbec82fc74b74b6c63aa21cac1f18b360c60a63c,2025-04-08T14:03:21.997000 +CVE-2025-30670,1,1,417ec1bc986f1f95e1ee07f52e561d83091fc3d45665c08ac5dc8ca23680b858,2025-04-08T17:15:38.413000 +CVE-2025-30671,1,1,5c0715f47c6c3e417589ddac805ae9cfd9aa533ab166c2cbcf207398a2e61579,2025-04-08T17:15:38.607000 CVE-2025-30672,0,0,3ded266990ba9009f55577f3f5d04302a5c6b8450014b92c80b83398ad23d15e,2025-04-01T20:26:11.547000 CVE-2025-30673,0,0,1cf76211fcfa10ad4c1393e8c6dafbf3bed92def83ca793b34e5eea95c528365,2025-04-01T20:26:11.547000 CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc884a,2025-04-02T22:15:20.260000 @@ -288201,7 +288225,7 @@ CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000 CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000 CVE-2025-31160,0,0,c6ed6d0cefcf860ce239e0955556eee41726f134fd4b83b02d780bf30460df3c,2025-03-31T13:15:46.050000 -CVE-2025-31161,0,1,a5cff012c6715e6d7cdf36222e1d08dbc62300c22c1d4fecfefc68e4ec1dd101,2025-04-08T15:30:22.440000 +CVE-2025-31161,0,0,a5cff012c6715e6d7cdf36222e1d08dbc62300c22c1d4fecfefc68e4ec1dd101,2025-04-08T15:30:22.440000 CVE-2025-31162,0,0,cfeafc9944d79e10529164231b0943be3a87194c4053baabeebe9b961989cbf3,2025-04-01T20:26:39.627000 CVE-2025-31163,0,0,0d23fc46a79319324af9251b76f99e828668eada4156c0f4488a35318beebb85,2025-04-01T20:26:39.627000 CVE-2025-31164,0,0,4b001c140896288467c92c772e2ebf8f58e53bdc0e31f0e36dc064cef4c67cc1,2025-04-01T20:26:39.627000 @@ -288338,10 +288362,10 @@ CVE-2025-31477,0,0,54285781555488a3668d04893deec45a9e20dfdee4ab1c462d402e7283dfc CVE-2025-31479,0,0,2697cc1817114968aab8eafa22f3d26b926cb32529ad7873759be5d99c686601,2025-04-07T14:18:34.453000 CVE-2025-3148,0,0,b333acfda68d66ad1bae1483d9c733fd29bd9303bc53eccbc0d0767f3d1c789f,2025-04-07T14:18:34.453000 CVE-2025-31480,0,0,dfb43594bbbdcf12c97680368525c0c40e65f0938db26f1a8caa293eb7101deb,2025-04-07T14:18:15.560000 -CVE-2025-31481,0,1,2a654a97cd194518c5c8218a7e77636711efd835cb458c39a7df0ac2b0fc55a1,2025-04-08T14:15:35.067000 +CVE-2025-31481,0,0,2a654a97cd194518c5c8218a7e77636711efd835cb458c39a7df0ac2b0fc55a1,2025-04-08T14:15:35.067000 CVE-2025-31483,0,0,b7db38314e44f699751b00d18141af236f8d3be9dc356047a84f7eebaa0be3be,2025-04-07T14:18:34.453000 CVE-2025-31484,0,0,d42a0cdbb7bdd71f06562c98bc57bb03a18189c0e6b7233c986424e4726f19e2,2025-04-07T14:18:34.453000 -CVE-2025-31485,0,1,f4245d88e6ae24d3287b749556ab4130f7e037aabb654f7972adc36a922f8fcf,2025-04-08T14:15:35.180000 +CVE-2025-31485,0,0,f4245d88e6ae24d3287b749556ab4130f7e037aabb654f7972adc36a922f8fcf,2025-04-08T14:15:35.180000 CVE-2025-31486,0,0,ee574553ac85a5f67dbbd47e1292c223093387fb2a3eedc84cd6a05d174784bb,2025-04-07T14:18:34.453000 CVE-2025-31487,0,0,b82f95e4ce12b67bc4c5d4168a317e50698188e3e02053101fd5378a82a78af5,2025-04-07T14:18:34.453000 CVE-2025-31488,0,0,41eabe2a806d521b5b533a51fb5b17aa17d50bd34ad511fec1512904c0a777c0,2025-04-07T14:17:50.220000 @@ -288349,7 +288373,7 @@ CVE-2025-31489,0,0,86b687749f556cb33a8356498a01d508d0da05ad595a76560944268496b2b CVE-2025-3149,0,0,61479a4dbdbba6ab59d1ae99d855a79e55a52858fd9b2654fa6a6f9d8eddf660,2025-04-07T14:18:34.453000 CVE-2025-31492,0,0,c3a8af2b78a6ecf7a731e5159a73f99e4e0787364701aa4aef00fbbfc177b209,2025-04-07T14:17:50.220000 CVE-2025-31496,0,0,5d205436871d710e38af2038c923c60e408fc550e87ec590f080b1cc870bd837,2025-04-07T21:15:42.720000 -CVE-2025-31498,1,1,533d9be5a90ca58e967a5b631f2944fb1b017a00a89804355466289fac2fcb4b,2025-04-08T15:15:50.310000 +CVE-2025-31498,0,0,533d9be5a90ca58e967a5b631f2944fb1b017a00a89804355466289fac2fcb4b,2025-04-08T15:15:50.310000 CVE-2025-3150,0,0,a30a7688ae10248ab6f92b08d529b33559f00224524ffa44e9f5b1d925f39cc6,2025-04-07T14:18:34.453000 CVE-2025-3151,0,0,fc53025e57933c63ffd27d66baa971840e395a51a52617b1c48843e916fa986d,2025-04-07T14:18:34.453000 CVE-2025-31515,0,0,65e0cceff3005eb000d81df9c13b2b61bcc11ce5d49244e52c4f8300da4f784d,2025-04-01T03:15:17.700000 @@ -288729,8 +288753,14 @@ CVE-2025-3198,0,0,9ea9a8c586fb27cd4141f26bc5f53c6d47512dda4a6f8f32123c47190f4934 CVE-2025-3199,0,0,b2c8a0f552e5c66b559702403ed11bd1140ca56173e2c4b53e84f8a9895b6f6e,2025-04-07T14:18:15.560000 CVE-2025-32013,0,0,c2a630586e3eb8d59df4073f809ec2e7f81c5bc7cc9d9bbbdf8f221f6d3abe12,2025-04-07T14:17:50.220000 CVE-2025-32014,0,0,56762cbef9e5296f371a227e3d5a52cd9e157a1f840b6fd7cbb75f28d1fdeb59,2025-04-07T15:15:44.593000 +CVE-2025-32017,1,1,30216120aaf00b2bf106b05a05d2d321bfa7de3343d40799877f2214a4de4d28,2025-04-08T16:15:27.320000 +CVE-2025-32018,1,1,db286dcfba0ceb32ba10721305798746db835ba82f716c38bf53de31b88d0c3d,2025-04-08T16:15:27.487000 CVE-2025-3202,0,0,b5df9a4f10b6a094526640bce151f74d263fe1512b1e3334f9249ec0e5e39a5f,2025-04-07T14:18:15.560000 -CVE-2025-32020,1,1,e843f7bc67d92c798da8c15cce89b2b98356a9464aea9df043eb243852dbbeb8,2025-04-08T15:15:50.430000 +CVE-2025-32020,0,0,e843f7bc67d92c798da8c15cce89b2b98356a9464aea9df043eb243852dbbeb8,2025-04-08T15:15:50.430000 +CVE-2025-32024,1,1,7a40b5e979c2f5f538ac9653c7f7a4c98ce502368908a4e04a0cdb51ed3cbaaa,2025-04-08T16:15:27.703000 +CVE-2025-32025,1,1,d3f422f8ef63735b59167b0eefa7f05eac9e66f0888ada74b6e4237e904683fa,2025-04-08T16:15:27.873000 +CVE-2025-32026,1,1,159b91556d89120b2e46d1b48fad22558fe29f4bdcb318785bef7891cdf3edb1,2025-04-08T16:15:28.023000 +CVE-2025-32028,1,1,5aae4a1d30c5144aecd201102967fde5ff23a9012fe10ae61218f6ec4f4f2735,2025-04-08T16:15:28.180000 CVE-2025-32029,0,0,8d9488255e68c0b28514f596d0e50e6d91cda4981696c0a5900811d7c043f680,2025-04-07T21:15:42.880000 CVE-2025-3203,0,0,78b57c278226d9f3a2b475550553a6fb17775b43c46bacbb60b11f6ff85b8c2e,2025-04-08T13:41:35.810000 CVE-2025-32030,0,0,6501cbda6f1602cfd9282e8257ed63760701f2685f6445d31ec8f27cc31c7ac2,2025-04-07T21:15:43.037000 @@ -288746,15 +288776,16 @@ CVE-2025-32051,0,0,ec8f7453e973b08ac0eea1b4a57f89489650f736d06ebe52f1def5e9918a3 CVE-2025-32052,0,0,6116901b373eabf1a12f464e61c73150b05b477e86d57bd2242dea845380e213,2025-04-07T14:18:34.453000 CVE-2025-32053,0,0,60f5d2252d9b47d90be71a91241fe823e174198ba60194538808a8aa0b6ddc25,2025-04-07T14:18:34.453000 CVE-2025-32054,0,0,75e4d347927079956a9bc5ad92137deea99b9b15ced411f0baaff24ce0928a82,2025-04-07T14:18:34.453000 -CVE-2025-3206,0,0,77ad4e5bf5f4734f581b433dc1b80141c464efd551f2e616ef7b958bad7612b6,2025-04-07T14:18:15.560000 -CVE-2025-3207,0,0,bb90a246a1a6ec28f62723a918e86f7d4b7ff592efc3f8e3fb77b2ad825b67e5,2025-04-07T14:18:15.560000 -CVE-2025-3208,0,0,9c1f73da97ec8318b8a9ff4bbab2ec89efa32d1b7df17afdfcc124c173abe7d1,2025-04-07T14:18:15.560000 +CVE-2025-3206,0,1,42d59949bcfd70f3ffd69cd102c160f0c7c28fb29a1f31fa69a71eb901f00492,2025-04-08T17:59:46.877000 +CVE-2025-3207,0,1,8c4a43b2a497a8aa9c548fe0056155548a5ad115021163d0bb4670d8373f6166,2025-04-08T17:56:53.623000 +CVE-2025-3208,0,1,467c67ee8369e3212684108818f80d158b2f4485a63647368e73220138caff6d,2025-04-08T17:48:42.087000 CVE-2025-3209,0,0,efaeccbde8dfc66e8697afeb5d539c2f695606dff80d7c548cff76ae6514c4e4,2025-04-07T14:18:15.560000 -CVE-2025-3210,0,0,3cddf999019f3d69f73a6eddc8cf285023b03d021388e526246bd3bb26397dbe,2025-04-07T14:18:15.560000 +CVE-2025-3210,0,1,e3a6c98204c21b98a0522091394112cf3856887b7b64633cf1e308a0cb6727df,2025-04-08T17:43:12.840000 CVE-2025-3211,0,0,e2eebcc8ba292d8d3d123757d4623f49a37b0c48559fde3713cb0f540bc6af19,2025-04-07T14:18:15.560000 CVE-2025-32111,0,0,4216c6506d31334c8d23317eabe3bae930691d012b7febaea26a4964764ff3bb,2025-04-07T14:18:15.560000 CVE-2025-32112,0,0,29850bd9ee8dba8b635f085816eb647aeb59b0cfc0a9b386d683b23018a1f144,2025-04-07T14:18:15.560000 CVE-2025-32113,0,0,e7db690820e60516e7c6d486df6b4a9cb3e0deb6e179d05676b0064d8d011abf,2025-04-07T14:18:15.560000 +CVE-2025-32117,1,1,54e8cedcf832a17db09fa684ca5b2144479e7297752d16662a3a308dcc57e983,2025-04-08T17:15:38.837000 CVE-2025-32118,0,0,8f0374a38abacc2da6332a1f76a9f5b8bd3a7b7fff2011293f9ae6b670f53f78,2025-04-07T14:18:15.560000 CVE-2025-32120,0,0,01d2b20382bdb828f787840ea9e1e3056675c528b77efb1580c1f6fa8893bf9e,2025-04-07T14:18:15.560000 CVE-2025-32121,0,0,232df9e163b0eec7e19130c423a6ab3bdf0e0dcd6188a5cdfd0116793669d2f3,2025-04-07T14:18:15.560000 @@ -288795,6 +288826,7 @@ CVE-2025-3216,0,0,edc9fd13d764092ca431bc6ceef74d3b3374bfa6ae13aaef7e8e2e94e9be53 CVE-2025-32161,0,0,9f369787356e75d953d09b35cf63430e5c96f379da3051f0dd353c65846a9eff,2025-04-07T14:18:15.560000 CVE-2025-32162,0,0,3f31d378fd232f88d11090e5787f7832a879d2a60d3a8f94219b359fabd09969,2025-04-07T14:18:15.560000 CVE-2025-32163,0,0,8ed2955d51a0bce692043782e954ddfe3fe0894e130dbcdb7e2f953e2f499edc,2025-04-07T14:18:15.560000 +CVE-2025-32164,1,1,55ee478c82e2a2dd2c3e196bd07bfcdf6379703a2b2f8930134edd8d06e492b2,2025-04-08T17:15:39.143000 CVE-2025-32165,0,0,d1d497853aa0436f0422acfab7eea0ac1c50388efe047ce13e43e232de75e3e5,2025-04-07T14:18:15.560000 CVE-2025-32166,0,0,e28a64c3736c6121faba78540c859b9f0ac75ebb87722f3c9e0b9a192f2f6acb,2025-04-07T14:18:15.560000 CVE-2025-32167,0,0,a7011f0720bd874049366903b84f623bab33217f15f862346f3cb6f81e2efe33,2025-04-07T14:18:15.560000 @@ -288835,6 +288867,7 @@ CVE-2025-32201,0,0,c30dde8a770665eecb97510bd235216757d92d8b32e9ebc803312276adc6d CVE-2025-32203,0,0,ccab89d569b75f5768d43417a599956989a9fbbb3877e27459871c8e919b0be4,2025-04-07T14:18:15.560000 CVE-2025-32204,0,0,f0a103b22091698324c1fdb7e6e79b9efa8329d5e768eaf870d6ccc8c84acae3,2025-04-07T14:18:15.560000 CVE-2025-32207,0,0,eb72e016d55b2976a29a6912bfeda1ec133bcea7c0b3d85d9579f149b9503d17,2025-04-07T14:18:15.560000 +CVE-2025-32211,1,1,38e57a4951bccd8a2cb648fcafa1002c6cfa3536a004a5ee47a139fd376938b6,2025-04-08T17:15:39.407000 CVE-2025-32217,0,0,46363fd6a2946a29feeda941a40a1c06c260911e96046cb4bd9eed1f0015127d,2025-04-07T14:18:15.560000 CVE-2025-32218,0,0,50ea87bab640c7d8e6f7a6701aeb7dea043447a00977822fd6aa28de44b55fb6,2025-04-07T14:18:15.560000 CVE-2025-32219,0,0,5178f7d1f0eec6d329438940fcca9e62e3cbae62e09bfd6e58598ad17b1ab0f4,2025-04-07T14:18:15.560000 @@ -288882,6 +288915,7 @@ CVE-2025-32274,0,0,0eca68fbad040b4858c60bf1e368b1919e5128143f7bda40b1bca9fd3149e CVE-2025-32276,0,0,2d58307e46b7067efedf11f095121f96b501a153603912c43d4654278d1c5d86,2025-04-07T14:17:50.220000 CVE-2025-32277,0,0,4c5beb804b84b7552a54d4404f6c409936619f520f5ab7f2060d18f52aa242ee,2025-04-07T14:17:50.220000 CVE-2025-32278,0,0,211d6ed6ada58eb335634d812d6f25038c2a3c7f1bf1fde12b2879747a714849,2025-04-07T14:17:50.220000 +CVE-2025-32279,1,1,d8b232f67895d20aed0f3c830326d1c4c4da8cbcfd04a8c8ae77a8ee3909d351,2025-04-08T17:15:39.600000 CVE-2025-32280,0,0,c65c58425b7a3fadf6b57f68c3cc7b1aef290df02db7468737d1aecd5fc2343e,2025-04-07T14:17:50.220000 CVE-2025-3229,0,0,601e3d3bbee98b6c8d411bef361231118b9ba6394db4f244736698e0ae8f6293,2025-04-07T14:18:15.560000 CVE-2025-3231,0,0,e195c9aab4993647d4ae533ad8c6eda5a754cea40d4facd1ebd44795fa6d7640,2025-04-07T14:18:15.560000 @@ -288895,14 +288929,14 @@ CVE-2025-32360,0,0,9b4631aa9212cd8ff436558b652207dfc563895faae222463ae0d243f1512 CVE-2025-32364,0,0,e894db5f7d73d7313223c296f4a47feb8ad50e78e5cf8ff87fc79232ef635220,2025-04-07T14:17:50.220000 CVE-2025-32365,0,0,ade41b47e186b36ef3a8ffb90bcc36f39e4b9fcb4f5e42cad9936ea94190fde8,2025-04-07T14:17:50.220000 CVE-2025-32366,0,0,3fc866e724427b581d8cf53af242eabcde3cd158e37af4ae19225f3e0a4ffbf6,2025-04-07T14:17:50.220000 -CVE-2025-32369,0,0,bcd675f59ffc23aa4ed6140e3576a49a1271b7401404757ab5e59b97166afaf9,2025-04-07T14:17:50.220000 +CVE-2025-32369,0,1,96d402924571180f1e04aec6a92f212002710a79eaea9c3eabbe3a90881f80a2,2025-04-08T17:27:42.950000 CVE-2025-3237,0,0,5eb23ae150e778d4e0e8512099269eb9b19a07bb05f106ae634562ab1cde60d7,2025-04-07T14:18:15.560000 CVE-2025-32370,0,0,d778c242ab00bacbdd7c203b155734432e980d6c8dbe2374a06bea20044364de,2025-04-07T14:17:50.220000 CVE-2025-3238,0,0,273f0c8b3980a53c04674d23c4dc81b848f12a18d8a02a7425c58d0764474f6e,2025-04-07T14:18:15.560000 CVE-2025-3239,0,0,d82817b34dd7b66d6aa65a93073be6dc4033b0ef23e651c8d1c7428dd5441e76,2025-04-07T14:18:15.560000 CVE-2025-3240,0,0,fd4ee2fdb38ac17ffaee2ac6e70f3a2f5dcccf28e2968d4be2b86fe7dc62212e,2025-04-07T14:18:15.560000 -CVE-2025-32406,1,1,e609727330bd84cd0cacb304454415280dd70ad80cc64a593bcf5153f402e31b,2025-04-08T15:15:50.677000 -CVE-2025-32409,0,0,b457b3fe21d35f954a6de6c9d6656ac2ce35689db19ead2a2e2d7ab9a25f1d6f,2025-04-07T22:15:16.963000 +CVE-2025-32406,0,0,e609727330bd84cd0cacb304454415280dd70ad80cc64a593bcf5153f402e31b,2025-04-08T15:15:50.677000 +CVE-2025-32409,0,1,85c3d1fe0971ac5edaf86ee4a7f32a1e7050da31a4a1795cae3edaf7996a37ac,2025-04-08T16:15:28.547000 CVE-2025-3241,0,0,594a540ab13070f27db4ae33cd1a92be4d81e360e241a5ce3cde519f3dcc5218,2025-04-07T14:18:15.560000 CVE-2025-32413,0,0,50323dfb94f5bab4f3253d470ec9373ba17768fd308ebea99d55c9be35d361db,2025-04-08T03:15:14.723000 CVE-2025-32414,0,0,14613c1caf18ed5eca317541a9e6ae92a32268c1ad3bfcecfd2776c1861d8ecb,2025-04-08T03:15:15.940000 @@ -288926,16 +288960,21 @@ CVE-2025-3265,0,0,1b08405cf7862a0d70f0211001bee004fe3d504e775eb888b6c2102dc0c554 CVE-2025-3266,0,0,72c61d5f89eeb94b30f634ae19d189745b893dd05829140f6047e84fafa81bf8,2025-04-07T18:18:56.247000 CVE-2025-3267,0,0,5957e45c3f258189da3aec49a626cf5736069fd66df3c72b04267cdc97a2b74c,2025-04-07T18:18:41.523000 CVE-2025-3268,0,0,13ebb75f155606fc18a6c469dfd2e1dc92481b7d2a4b4f437c20095a77a45083,2025-04-07T16:15:26.430000 -CVE-2025-3296,0,0,6daeb6761ca81ab67bf3ef8d861367d8c466ccc485fa7d0d4fd678db38133c05,2025-04-07T17:15:38.227000 -CVE-2025-3297,0,0,73c6dd8bf16489d0367906542a293c2ba5f47de0905e454cd834d15192df297f,2025-04-07T17:15:38.387000 -CVE-2025-3298,0,0,38670475c720578ba2dfbbb1e0dd7f0e6369f3c7741aed1895038931f1e94a13,2025-04-07T17:15:38.550000 -CVE-2025-3299,0,0,0706ad1073ca38abd0d975df1892e91db069aed3f9489048411c349a1739e929,2025-04-07T17:15:38.713000 -CVE-2025-3303,0,1,a88559a89b09c7db23c32ee2c85028152291b57ba44bc3a0730626f1d4cddeda,2025-04-08T15:02:36.210000 +CVE-2025-3285,1,1,deb3c789ff956da04b3ff5a8da95d4f4dbdccba91055707d5355d74cabd5c186,2025-04-08T16:15:28.690000 +CVE-2025-3286,1,1,f9b1fef870a603219cb6c0a7900180d738c44d6aba108ca246fc8f5b4753e61e,2025-04-08T16:15:28.840000 +CVE-2025-3287,1,1,7df4ba4fd67acf69f507d93bdb1408f7d8f0ef1c27ac4c7835671c063f2d94c8,2025-04-08T16:15:28.980000 +CVE-2025-3288,1,1,2d3c043e01e599b0ef6b1e2770590024688458ada642ce4a7b0655a541d29811,2025-04-08T16:15:29.120000 +CVE-2025-3289,1,1,4e7449d5539986a81cec19b097170807712f142a729a995301eb33bd8e99fb7f,2025-04-08T16:15:29.253000 +CVE-2025-3296,0,1,604544c60030717a0b7298a4216c2cee6c0b09dc746101c73c6d715c2da17326,2025-04-08T16:49:21.037000 +CVE-2025-3297,0,1,450f027df383ac012c0d670b8246ab459ec83da0d22f33695d8eb8051ee5200e,2025-04-08T16:49:12.910000 +CVE-2025-3298,0,1,289613560130dabe199eea55128a1bdfe9eecd882e62238f3674c43e858ef0bc,2025-04-08T16:49:00.290000 +CVE-2025-3299,0,1,1ecd0bb3145f0c6f50b4ad5e92205fbf9ac7cbde82394cd28e5dab2186389f15,2025-04-08T16:48:45.137000 +CVE-2025-3303,0,0,a88559a89b09c7db23c32ee2c85028152291b57ba44bc3a0730626f1d4cddeda,2025-04-08T15:02:36.210000 CVE-2025-3304,0,0,2ec25b3b916c9e696963707dba4544ab011813ba6a5064128b7ade1c94bf65f1,2025-04-07T14:17:50.220000 -CVE-2025-3305,0,0,3338b34b016e2a8c42542d8143e4642e86084d2690a0a10e5d9bea7e3133f3b1,2025-04-07T16:15:26.767000 -CVE-2025-3306,0,1,116c94def1d4a2e814002f4948b93b65daa72c17537f71098e725bdf140a908b,2025-04-08T14:54:03.220000 -CVE-2025-3307,0,1,764533eb55c36b857743124d26869569dc2e30546eb2b26c9f7f85b2c9a577e7,2025-04-08T14:59:43.193000 -CVE-2025-3308,0,0,021f5e8d429aac33f6bb572148d0b3d03b43147590ec8f5679ea6f2e1a09b31b,2025-04-07T15:15:45.040000 +CVE-2025-3305,0,1,dc66bf91b2f6e196955f9173f9c137f77852eb10ef0394de20bd1afdd72a0b74,2025-04-08T16:46:55.203000 +CVE-2025-3306,0,0,116c94def1d4a2e814002f4948b93b65daa72c17537f71098e725bdf140a908b,2025-04-08T14:54:03.220000 +CVE-2025-3307,0,0,764533eb55c36b857743124d26869569dc2e30546eb2b26c9f7f85b2c9a577e7,2025-04-08T14:59:43.193000 +CVE-2025-3308,0,1,4b8d71911211f133728a91e073b25c990ecfbff65585df599965a7e80c999bcc,2025-04-08T17:38:09.607000 CVE-2025-3309,0,0,3f9f270cc97eee1e0f0ce3a000736519afbb257b767b0a041d6523b7954d83cc,2025-04-07T14:17:50.220000 CVE-2025-3310,0,0,1316ea3a1c20aef7515b9b3e1e77a063bf7af0586d907a8400fc4510b8ede419,2025-04-07T14:17:50.220000 CVE-2025-3311,0,0,bbaed44de3593ef49e3d8df0f1e68c62d488107337bd0eb84e88befc789c022b,2025-04-07T14:17:50.220000 @@ -288995,35 +289034,35 @@ CVE-2025-3377,0,0,f15e9f2a12603592a901539197b9cf1900609b90580b6f29669ce5d408d865 CVE-2025-3378,0,0,b41c1e92ea39358a2a37e0afa4ea8efa6b253ddbd8fbb05da6b6a2995f98f3b7,2025-04-07T19:15:57.413000 CVE-2025-3379,0,0,f23a9a261bdf918c1530330bd248a1a00eebcc5072f6dca448d66fd6289126e2,2025-04-07T19:15:57.533000 CVE-2025-3380,0,0,1cad7baa07636cdce6da6565ea53507eecacf0a1bff169a2551a7e05749702ae,2025-04-07T20:15:21.640000 -CVE-2025-3381,0,0,af785b908e9c0ce493f12db519f4f8f0773f105e1dbd23842159e9e63665068d,2025-04-07T20:15:21.760000 -CVE-2025-3382,0,0,a2ab3668eea05a9ffc20e2a3317a0de1cbdf8f9493bd4455300b8dd1748bf438,2025-04-07T20:15:21.943000 -CVE-2025-3383,0,0,ceae518148d96f61a518bd0d8f5ee1c69600970da12b6b6208a6b56c3fc6648d,2025-04-07T21:15:43.850000 -CVE-2025-3384,0,0,3063aa55a343fcb7cf74e5a093d79228dc6bad58bf3ad688e0b9dc5137c9c4f7,2025-04-07T21:15:44.053000 -CVE-2025-3385,0,0,1910af3da9bbe755ce53979f74cfaaab2a0b24f146fc08b49f9399a3e06f22b6,2025-04-07T22:15:17.137000 -CVE-2025-3386,0,0,bcb9affa469bc5aa0e4f5c7db9a92e48523c41e46f9d7ff29ee13940c32f8a63,2025-04-07T22:15:17.337000 +CVE-2025-3381,0,1,617253e1437b111c82b1e4f812c227ee5c8ab245c388e2e82f361534ca43f0d5,2025-04-08T16:15:29.563000 +CVE-2025-3382,0,1,90065b48bac79256a4079ddccf88bdb83899c71f350259d6c1c3c4b2566de423,2025-04-08T16:15:29.780000 +CVE-2025-3383,0,1,dba32d91a7c770a0613f794ade98bc1f4ecbfcf6ec1e693324dd64cdd4886380,2025-04-08T16:15:29.913000 +CVE-2025-3384,0,1,3d251291010deff040de185095c3a960872bb23ad620acd043d5eee0c0eed3fd,2025-04-08T16:15:30.047000 +CVE-2025-3385,0,1,b0297574c19347669f2951416ccd950dd916b3993c39f40c55301cd4584ca47d,2025-04-08T16:15:30.180000 +CVE-2025-3386,0,1,77d8567af7c20cc91368633536c6ffcc2b3e0a2bd992069af835609400e381cd,2025-04-08T16:15:30.307000 CVE-2025-3387,0,0,109216d2024cbc549c478141af7f937c3a5ffb542c64b6d4d9e3338cc30248cb,2025-04-07T23:15:43.530000 CVE-2025-3388,0,0,e08032fbdd0416394687f327741f2f97a9e40f4e29c06995464229eade0e0728,2025-04-07T23:15:44.033000 CVE-2025-3389,0,0,93f3db4d16adc7186c92ae6d0057a3a9a8d6ca481fde76d105db0fa5d733284f,2025-04-08T00:15:15.793000 -CVE-2025-3390,0,1,4c3eeaa45289c2fbd2ae2197139db2beaa64832b48e7db06c403d8df9f4f8435,2025-04-08T14:15:35.717000 -CVE-2025-3391,0,1,601a624868b38f220aefc41a487e3fc0637476d549c07e097ff1b175c11bec32,2025-04-08T15:15:51.127000 -CVE-2025-3392,0,0,edcaacdffbec01236d323b1096e190539be2ec91ec579a2b79adcb8117aa9cee,2025-04-08T02:15:21.227000 -CVE-2025-3393,0,1,975f6e04602e720746d8ae18d538623e060fd858627208470509836109875586,2025-04-08T15:15:51.250000 -CVE-2025-3397,0,1,7da588be7381757c900cbb8fd58238db4524483526bd8d9b5a632cc046fea5c2,2025-04-08T15:15:51.383000 +CVE-2025-3390,0,0,4c3eeaa45289c2fbd2ae2197139db2beaa64832b48e7db06c403d8df9f4f8435,2025-04-08T14:15:35.717000 +CVE-2025-3391,0,0,601a624868b38f220aefc41a487e3fc0637476d549c07e097ff1b175c11bec32,2025-04-08T15:15:51.127000 +CVE-2025-3392,0,1,6a7828a37dda06d32d2aae476e1b9a0398a7f9a61e546a5be95874a86ee48ef0,2025-04-08T16:15:30.430000 +CVE-2025-3393,0,0,975f6e04602e720746d8ae18d538623e060fd858627208470509836109875586,2025-04-08T15:15:51.250000 +CVE-2025-3397,0,0,7da588be7381757c900cbb8fd58238db4524483526bd8d9b5a632cc046fea5c2,2025-04-08T15:15:51.383000 CVE-2025-3398,0,0,d9f95e6a3cebbc2ea9f9db8d2c8320ee269b787d01cb618537b11ac183e78ad5,2025-04-08T02:15:21.780000 -CVE-2025-3399,0,0,07f54e53610e822593270d9c6e4542feefbe086bf7b9f064db012e3e8c08cc29,2025-04-08T02:15:21.980000 -CVE-2025-3400,0,0,40d24bbc3563c47e16472c01e286bef51fce1a1c0af397d279cf8afb801bb526,2025-04-08T02:15:22.167000 -CVE-2025-3401,0,1,519d7cf7b29f499c997a6a458805be85dbdfa7f7f16dbf8bb92f6b6d8a66f3ad,2025-04-08T15:15:52.110000 +CVE-2025-3399,0,1,91ac1532589886846881e94a04ee007db6ac1b164d98e8d243768bbf93699ef0,2025-04-08T16:15:30.563000 +CVE-2025-3400,0,1,b4c484ed24b37a3f3e6fabe47a491722d24eaa4c635e538e5150ed28f40dffb9,2025-04-08T16:15:30.730000 +CVE-2025-3401,0,0,519d7cf7b29f499c997a6a458805be85dbdfa7f7f16dbf8bb92f6b6d8a66f3ad,2025-04-08T15:15:52.110000 CVE-2025-3402,0,0,fbd2b094c2b24668b3f40172e9b003f65a18c6bcc92a94147f3742946f540634,2025-04-08T03:15:16.463000 CVE-2025-3403,0,0,b46f602816252c11b21a610177f8f77740ecaa643652158318cc5847c4ab6a4c,2025-04-08T03:15:16.670000 CVE-2025-3405,0,0,30a5b4720c4c1de75e49d78086f9e4d94c355b847071f9fe56de3d99ee1a5706,2025-04-08T04:15:31.400000 CVE-2025-3406,0,0,ce7339178ebf8d652607b8c34e79d29206738ac0dcbc86aca04c568cb9ec5dc1,2025-04-08T04:15:31.647000 CVE-2025-3407,0,0,91453288f516f44cee3c00d3d0d95324444a0677ae9903b32a01adf81e3d56dc,2025-04-08T04:15:31.877000 -CVE-2025-3408,0,0,e280499e482677db9ed67bae48ec56bda95a2aa8b5a2b1aef2034552663724ea,2025-04-08T04:15:32.077000 +CVE-2025-3408,0,1,22df4d1da68cca78197ee12641c7cec146c840e9864e72387b9f0a6f7ee453e7,2025-04-08T16:15:30.873000 CVE-2025-3409,0,0,7e6c369f665f5cacb993009efd062e0fcb1ef1e93aa5eaac2f105df1a6aca67b,2025-04-08T05:15:40.050000 -CVE-2025-3410,0,0,1460b18467eb6ba99e2769c7be09aa3edefed8692a6f8fb8e968417dcd40558e,2025-04-08T05:15:40.243000 -CVE-2025-3411,0,0,5753ce54de79ff0bd44fd3fe48da092e857f5f3f13f51efe35640c23425c7d3d,2025-04-08T05:15:40.423000 -CVE-2025-3412,0,0,d5dc6d47992307d85d2cbd8c8a7ef20f9cafcd2285ab41a03a025cd99df5b1a2,2025-04-08T06:15:44.970000 -CVE-2025-3413,0,0,ee3f3525385f62dab06c73f0c3e63456024078737ae33792bbeb3b89e957703a,2025-04-08T06:15:45.333000 +CVE-2025-3410,0,1,506eb4ec2533a52229bdd48d66b5c88c6293472858f0105d17dd0c7bbf4a5d56,2025-04-08T16:15:31.110000 +CVE-2025-3411,0,1,055f14ef0edbc4ecd0eb42054fbfeb1ef180f7b34b383bc35fe1e56aa92597cf,2025-04-08T16:15:31.250000 +CVE-2025-3412,0,1,fa2a685d40e2f3ae5b3cefc3c9ae3f9486d0640a4ad30b023f6621cda20e7680,2025-04-08T16:15:31.370000 +CVE-2025-3413,0,1,b0605baec125ecc86083231bc5a0d6d2131e86f04f4a215f0c27c0336a80aa9d,2025-04-08T16:15:31.493000 CVE-2025-3424,0,0,be0fe6f8406eda3536331ded14e2f6be10ec512141cedd16fb1a1f0fe02bf768,2025-04-07T16:15:27.703000 CVE-2025-3425,0,0,9396f0e72f97b1c5b17d6a193f82e00c0d3f258bd16686092e11de9ff192286c,2025-04-07T16:15:27.963000 CVE-2025-3426,0,0,bc136ddbc855578300039b703456513a80b7a9e221e0139f4084d1b3f0db77d4,2025-04-07T17:15:40.073000