diff --git a/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json b/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json index a8a3a11dd9f..508b79247e5 100644 --- a/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json +++ b/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json @@ -2,8 +2,8 @@ "id": "CVE-2010-0232", "sourceIdentifier": "secure@microsoft.com", "published": "2010-01-21T19:30:00.900", - "lastModified": "2025-02-04T19:15:19.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:30:45.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -237,7 +237,6 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55742", "source": "secure@microsoft.com", "tags": [ - "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -353,7 +352,6 @@ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55742", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2013/CVE-2013-13xx/CVE-2013-1347.json b/CVE-2013/CVE-2013-13xx/CVE-2013-1347.json index d2e18b80c1f..bc7ea5e0226 100644 --- a/CVE-2013/CVE-2013-13xx/CVE-2013-1347.json +++ b/CVE-2013/CVE-2013-13xx/CVE-2013-1347.json @@ -2,8 +2,8 @@ "id": "CVE-2013-1347", "sourceIdentifier": "secure@microsoft.com", "published": "2013-05-05T11:07:00.527", - "lastModified": "2025-02-04T19:15:20.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:31:06.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json index 550531dc705..9b85c8a205d 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json @@ -2,8 +2,8 @@ "id": "CVE-2015-1642", "sourceIdentifier": "secure@microsoft.com", "published": "2015-08-15T00:59:00.110", - "lastModified": "2025-02-10T18:15:21.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:43:54.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json index caece9a3555..f30c304f07d 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1770.json @@ -2,8 +2,8 @@ "id": "CVE-2015-1770", "sourceIdentifier": "secure@microsoft.com", "published": "2015-06-10T01:59:36.483", - "lastModified": "2025-02-10T18:15:22.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:43:43.803", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json index 5b5619006ae..ab9320a32f1 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2545", "sourceIdentifier": "secure@microsoft.com", "published": "2015-09-09T00:59:52.190", - "lastModified": "2025-02-10T18:15:22.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:32:14.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -129,8 +129,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", - "matchCriteriaId": "E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A" + "criteria": "cpe:2.3:a:microsoft:office:2016:*:-:*:-:*:-:*", + "matchCriteriaId": "DC9D0A78-9F16-41E0-910E-E93269DB9B30" } ] } diff --git a/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json b/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json index 00effdd094e..744dbb96bd1 100644 --- a/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json +++ b/CVE-2016/CVE-2016-00xx/CVE-2016-0040.json @@ -2,8 +2,8 @@ "id": "CVE-2016-0040", "sourceIdentifier": "secure@microsoft.com", "published": "2016-02-10T11:59:06.440", - "lastModified": "2025-02-10T17:15:09.997", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:51:38.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-00xx/CVE-2017-0001.json b/CVE-2017/CVE-2017-00xx/CVE-2017-0001.json index 62f9c51fe90..f43eedeadfb 100644 --- a/CVE-2017/CVE-2017-00xx/CVE-2017-0001.json +++ b/CVE-2017/CVE-2017-00xx/CVE-2017-0001.json @@ -2,8 +2,8 @@ "id": "CVE-2017-0001", "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:00.167", - "lastModified": "2025-02-10T16:15:28.983", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:46:39.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -109,18 +109,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", - "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", - "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "13B310CD-2A3A-4B89-AAB4-60622FB8EC03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-00xx/CVE-2017-0005.json b/CVE-2017/CVE-2017-00xx/CVE-2017-0005.json index 7fc435dd8aa..a31a6b80d87 100644 --- a/CVE-2017/CVE-2017-00xx/CVE-2017-0005.json +++ b/CVE-2017/CVE-2017-00xx/CVE-2017-0005.json @@ -2,8 +2,8 @@ "id": "CVE-2017-0005", "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:00.197", - "lastModified": "2025-02-10T16:15:29.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:46:54.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -109,18 +109,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", - "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", - "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "13B310CD-2A3A-4B89-AAB4-60622FB8EC03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": true, diff --git a/CVE-2017/CVE-2017-00xx/CVE-2017-0022.json b/CVE-2017/CVE-2017-00xx/CVE-2017-0022.json index e795397be98..d2bb13133bd 100644 --- a/CVE-2017/CVE-2017-00xx/CVE-2017-0022.json +++ b/CVE-2017/CVE-2017-00xx/CVE-2017-0022.json @@ -2,8 +2,8 @@ "id": "CVE-2017-0022", "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:00.680", - "lastModified": "2025-02-10T16:15:29.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:47:13.730", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -131,18 +131,33 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", - "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", - "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "13B310CD-2A3A-4B89-AAB4-60622FB8EC03" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": false, diff --git a/CVE-2017/CVE-2017-00xx/CVE-2017-0059.json b/CVE-2017/CVE-2017-00xx/CVE-2017-0059.json index a598ed97573..ff0c122cc6a 100644 --- a/CVE-2017/CVE-2017-00xx/CVE-2017-0059.json +++ b/CVE-2017/CVE-2017-00xx/CVE-2017-0059.json @@ -2,8 +2,8 @@ "id": "CVE-2017-0059", "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:01.523", - "lastModified": "2025-02-10T16:15:30.207", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:49:53.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-01xx/CVE-2017-0101.json b/CVE-2017/CVE-2017-01xx/CVE-2017-0101.json index 36fd7e24a52..27764caa313 100644 --- a/CVE-2017/CVE-2017-01xx/CVE-2017-0101.json +++ b/CVE-2017/CVE-2017-01xx/CVE-2017-0101.json @@ -2,8 +2,8 @@ "id": "CVE-2017-0101", "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:02.743", - "lastModified": "2025-02-10T16:15:30.407", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:50:36.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-01xx/CVE-2017-0143.json b/CVE-2017/CVE-2017-01xx/CVE-2017-0143.json index f3505879379..c0845276bb7 100644 --- a/CVE-2017/CVE-2017-01xx/CVE-2017-0143.json +++ b/CVE-2017/CVE-2017-01xx/CVE-2017-0143.json @@ -2,8 +2,8 @@ "id": "CVE-2017-0143", "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:03.977", - "lastModified": "2025-02-10T16:15:30.603", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:50:46.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -121,18 +121,33 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", - "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", - "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "13B310CD-2A3A-4B89-AAB4-60622FB8EC03" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": false, diff --git a/CVE-2017/CVE-2017-01xx/CVE-2017-0144.json b/CVE-2017/CVE-2017-01xx/CVE-2017-0144.json index 3c8dfea56f8..28e0040d0e5 100644 --- a/CVE-2017/CVE-2017-01xx/CVE-2017-0144.json +++ b/CVE-2017/CVE-2017-01xx/CVE-2017-0144.json @@ -2,8 +2,8 @@ "id": "CVE-2017-0144", "sourceIdentifier": "secure@microsoft.com", "published": "2017-03-17T00:59:04.010", - "lastModified": "2025-02-10T16:15:30.853", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:51:00.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -121,18 +121,33 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", - "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", - "matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", - "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "13B310CD-2A3A-4B89-AAB4-60622FB8EC03" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": false, diff --git a/CVE-2017/CVE-2017-85xx/CVE-2017-8570.json b/CVE-2017/CVE-2017-85xx/CVE-2017-8570.json index e13bdd43735..d08ad633e38 100644 --- a/CVE-2017/CVE-2017-85xx/CVE-2017-8570.json +++ b/CVE-2017/CVE-2017-85xx/CVE-2017-8570.json @@ -2,8 +2,8 @@ "id": "CVE-2017-8570", "sourceIdentifier": "secure@microsoft.com", "published": "2017-07-11T21:29:01.267", - "lastModified": "2025-02-10T15:15:10.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:46:27.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", @@ -131,8 +129,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", - "matchCriteriaId": "E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A" + "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*", + "matchCriteriaId": "72324216-4EB3-4243-A007-FEF3133C7DF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*", + "matchCriteriaId": "0FBB0E61-7997-4F26-9C07-54912D3F1C10" } ] } @@ -144,6 +147,7 @@ "url": "http://www.securityfocus.com/bid/99445", "source": "secure@microsoft.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -183,6 +187,7 @@ "url": "http://www.securityfocus.com/bid/99445", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2019/CVE-2019-12xx/CVE-2019-1214.json b/CVE-2019/CVE-2019-12xx/CVE-2019-1214.json index 76ac00568dd..0c185b551af 100644 --- a/CVE-2019/CVE-2019-12xx/CVE-2019-1214.json +++ b/CVE-2019/CVE-2019-12xx/CVE-2019-1214.json @@ -2,8 +2,8 @@ "id": "CVE-2019-1214", "sourceIdentifier": "secure@microsoft.com", "published": "2019-09-11T22:15:14.523", - "lastModified": "2025-02-07T17:15:18.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:52:48.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -119,38 +119,93 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", - "matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "8733BF37-7BF2-409D-9452-DA8A92DA1124" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA" }, { "vulnerable": true, @@ -167,6 +222,16 @@ "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", @@ -197,16 +262,6 @@ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", diff --git a/CVE-2019/CVE-2019-14xx/CVE-2019-1405.json b/CVE-2019/CVE-2019-14xx/CVE-2019-1405.json index 253ca7dba0a..a3e112d3b64 100644 --- a/CVE-2019/CVE-2019-14xx/CVE-2019-1405.json +++ b/CVE-2019/CVE-2019-14xx/CVE-2019-1405.json @@ -2,8 +2,8 @@ "id": "CVE-2019-1405", "sourceIdentifier": "secure@microsoft.com", "published": "2019-11-12T19:15:13.410", - "lastModified": "2025-02-07T16:15:30.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:30:16.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -119,49 +119,114 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", - "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "7FE8B00B-4F39-4755-A323-8AD71F5E3EBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*", + "matchCriteriaId": "06BBFA69-94E2-4BAB-AFD3-BC434B11D106" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "DF8ABB14-84CF-4BBC-99C9-DA6C0F7A0619" }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", @@ -192,16 +257,6 @@ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", diff --git a/CVE-2020/CVE-2020-06xx/CVE-2020-0688.json b/CVE-2020/CVE-2020-06xx/CVE-2020-0688.json index 1d7353acf4b..d66ba27cc19 100644 --- a/CVE-2020/CVE-2020-06xx/CVE-2020-0688.json +++ b/CVE-2020/CVE-2020-06xx/CVE-2020-0688.json @@ -2,8 +2,8 @@ "id": "CVE-2020-0688", "sourceIdentifier": "secure@microsoft.com", "published": "2020-02-11T22:15:15.900", - "lastModified": "2025-02-04T19:15:22.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:31:36.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2020/CVE-2020-09xx/CVE-2020-0938.json b/CVE-2020/CVE-2020-09xx/CVE-2020-0938.json index 966318c156a..56a74c493d2 100644 --- a/CVE-2020/CVE-2020-09xx/CVE-2020-0938.json +++ b/CVE-2020/CVE-2020-09xx/CVE-2020-0938.json @@ -2,8 +2,8 @@ "id": "CVE-2020-0938", "sourceIdentifier": "secure@microsoft.com", "published": "2020-04-15T15:15:16.573", - "lastModified": "2025-02-04T19:15:22.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:31:55.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -119,38 +119,98 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9285A9B5-4759-43E7-9589-CDBCA7100605" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "1A6FC9EE-D486-4AFE-A20E-4278468A1779" }, { "vulnerable": true, @@ -167,6 +227,21 @@ "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "11E7F8F0-4FA8-4AA6-92A5-860E77AC933D" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", @@ -197,21 +272,6 @@ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "C253A63F-03AB-41CB-A03A-B2674DEA98AA" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", diff --git a/CVE-2020/CVE-2020-09xx/CVE-2020-0986.json b/CVE-2020/CVE-2020-09xx/CVE-2020-0986.json index 293a2700126..ae07a64ea64 100644 --- a/CVE-2020/CVE-2020-09xx/CVE-2020-0986.json +++ b/CVE-2020/CVE-2020-09xx/CVE-2020-0986.json @@ -2,8 +2,8 @@ "id": "CVE-2020-0986", "sourceIdentifier": "secure@microsoft.com", "published": "2020-06-09T20:15:12.177", - "lastModified": "2025-02-07T15:15:15.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T19:30:27.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -119,43 +119,113 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", - "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", - "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", - "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", - "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "555C22C7-356D-4DA7-8CED-DA7423BBC6CF" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "3FB5CDAE-C713-4D9D-9D6A-2C2E8924A4BB" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "E9273B95-20ED-4547-B0A8-95AD15B30372" + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "D76003FB-EE99-4D8E-B6A0-B13C2041E5A0" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", - "matchCriteriaId": "AAE74AF3-C559-4645-A6C0-25C3D647AAC8" + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "40151476-C0FD-4336-8194-039E8827B7C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "C1CFB53B-B17B-47BD-BAC1-C6C5D168FFB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "73D24713-D897-408D-893B-77A61982597D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9E1ED169-6F03-4BD5-B227-5FA54DB40AD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "B6A0DB01-49CB-4445-AFE8-57C2186857BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "9285A9B5-4759-43E7-9589-CDBCA7100605" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "1A6FC9EE-D486-4AFE-A20E-4278468A1779" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "8D21FB17-CF35-45BA-9DC8-AA9563CBF1BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "3A020D9F-0FD1-45F2-89C2-3234CFD8E37C" }, { "vulnerable": true, @@ -167,6 +237,26 @@ "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FD3218D1-BE39-4CEB-A88F-E715B722862B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "FFE3495D-291C-46B6-B758-23E16A53A7C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "11E7F8F0-4FA8-4AA6-92A5-860E77AC933D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "AA4C2C8A-3E66-494A-A2F4-B7DFDFFF2075" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", @@ -182,26 +272,6 @@ "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", - "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", - "matchCriteriaId": "5B921FDB-8E7D-427E-82BE-4432585080CF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", - "matchCriteriaId": "C253A63F-03AB-41CB-A03A-B2674DEA98AA" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", - "matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11023.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11023.json index 2f15c2d01ab..fee3d79c006 100644 --- a/CVE-2020/CVE-2020-110xx/CVE-2020-11023.json +++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11023.json @@ -2,8 +2,8 @@ "id": "CVE-2020-11023", "sourceIdentifier": "security-advisories@github.com", "published": "2020-04-29T21:15:11.743", - "lastModified": "2025-01-24T02:00:02.453", - "vulnStatus": "Modified", + "lastModified": "2025-04-04T19:53:43.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -230,6 +230,17 @@ "versionEndIncluding": "2.10.0", "matchCriteriaId": "3625D477-1338-46CB-90B1-7291D617DC39" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.1.2", + "matchCriteriaId": "D0DBC938-A782-433F-8BF1-CA250C332AA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2ECE8F5F-4417-4412-B857-F1ACDEED4FC2" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*", @@ -709,6 +720,36 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", + "matchCriteriaId": "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*", + "matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", + "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B199052-5732-4726-B06B-A12C70DFB891" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C93821CF-3117-4763-8163-DD49F6D2CA8E" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:netapp:max_data:-:*:*:*:*:*:*:*", @@ -815,151 +856,299 @@ }, { "url": "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c%40%3Ccommits.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9%40%3Ccommits.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67%40%3Cdev.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9%40%3Cissues.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679%40%3Ccommits.nifi.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2%40%3Cissues.flink.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817%40%3Cdev.felix.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93%40%3Cgitbox.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248%40%3Cdev.hive.apache.org%3E", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html", @@ -971,23 +1160,43 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202007-03", @@ -1007,7 +1216,8 @@ "url": "https://www.debian.org/security/2020/dsa-4693", "source": "security-advisories@github.com", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "Mailing List" ] }, { @@ -1141,7 +1351,10 @@ }, { "url": "https://github.com/github/advisory-database/blob/99afa6fdeaf5d1d23e1021ff915a5e5dbc82c1f1/advisories/github-reviewed/2020/04/GHSA-jpcq-cgw6-v4j6/GHSA-jpcq-cgw6-v4j6.json#L20-L37", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6", @@ -1160,151 +1373,299 @@ }, { "url": "https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r0593393ca1e97b1e7e098fe69d414d6bd0a467148e9138d07e86ebbb%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r07ab379471fb15644bf7a92e4a98cbc7df3cf4e736abae0cc7625fe6%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r094f435595582f6b5b24b66fedf80543aa8b1d57a3688fbcc21f06ec%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r1fed19c860a0d470f2a3eded12795772c8651ff583ef951ddac4918c%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r2c85121a47442036c7f8353a3724aa04f8ecdfda1819d311ba4f5330%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r3702ede0ff83a29ba3eb418f6f11c473d6e3736baba981a8dbd9c9ef%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r4aadb98086ca72ed75391f54167522d91489a0d0ae25b12baa8fc7c5%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r4dba67be3239b34861f1b9cfdf9dfb3a90272585dcce374112ed6e16%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r55f5e066cc7301e3630ce90bbbf8d28c82212ae1f2d4871012141494%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r6c4df3b33e625a44471009a172dabe6865faec8d8f21cac2303463b1%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r6e97b37963926f6059ecc1e417721608723a807a76af41d4e9dbed49%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9006ad2abf81d02a0ef2126bab5177987e59095b7194a487c4ea247c%40%3Ccommits.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9c5fda81e4bca8daee305b4c03283dddb383ab8428a151d4cb0b3b15%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/r9e0bd31b7da9e7403478d22652b8760c946861f8ebd7bd750844898e%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra32c7103ded9041c7c1cb8c12c8d125a6b2f3f3270e2937ef8417fac%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra374bb0299b4aa3e04edde01ebc03ed6f90cf614dad40dd428ce8f72%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra3c9219fcb0b289e18e9ec5a5ebeaa5c17d6b79a201667675af6721c%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ra406b3adfcffcb5ce8707013bdb7c35e3ffc2776a8a99022f15274c6%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rab82dd040f302018c85bd07d33f5604113573514895ada523c3401d9%40%3Ccommits.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/radcb2aa874a79647789f3563fcbbceaf1045a029ee8806b59812a8ea%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rb25c3bc7418ae75cba07988dafe1b6912f76a9dd7d94757878320d61%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rb69b7d8217c1a6a2100247a5d06ce610836b31e3f5d73fc113ded8e7%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67%40%3Cdev.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rd38b4185a797b324c8dd940d9213cf99fcdc2dbf1fc5a63ba7dee8c9%40%3Cissues.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679%40%3Ccommits.nifi.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2%40%3Cissues.flink.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf0f8939596081d84be1ae6a91d6248b96a02d8388898c372ac807817%40%3Cdev.felix.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf1ba79e564fe7efc56aef7c986106f1cf67a3427d08e997e088e7a93%40%3Cgitbox.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread.html/rf661a90a15da8da5922ba6127b3f5f8194d4ebec8855d60a0dd13248%40%3Cdev.hive.apache.org%3E", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html", @@ -1316,23 +1677,43 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202007-03", @@ -1352,7 +1733,8 @@ "url": "https://www.debian.org/security/2020/dsa-4693", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "Mailing List" ] }, { diff --git a/CVE-2020/CVE-2020-220xx/CVE-2020-22007.json b/CVE-2020/CVE-2020-220xx/CVE-2020-22007.json index 137379011d5..5fa02713c19 100644 --- a/CVE-2020/CVE-2020-220xx/CVE-2020-22007.json +++ b/CVE-2020/CVE-2020-220xx/CVE-2020-22007.json @@ -2,7 +2,7 @@ "id": "CVE-2020-22007", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T13:15:12.047", - "lastModified": "2024-11-21T05:13:00.530", + "lastModified": "2025-04-04T18:15:40.523", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-353xx/CVE-2020-35326.json b/CVE-2020/CVE-2020-353xx/CVE-2020-35326.json index cb4c2b66bcc..0ce56d9e7f6 100644 --- a/CVE-2020/CVE-2020-353xx/CVE-2020-35326.json +++ b/CVE-2020/CVE-2020-353xx/CVE-2020-35326.json @@ -2,7 +2,7 @@ "id": "CVE-2020-35326", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T19:15:10.727", - "lastModified": "2024-11-21T05:27:10.473", + "lastModified": "2025-04-04T18:15:41.263", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-09xx/CVE-2021-0920.json b/CVE-2021/CVE-2021-09xx/CVE-2021-0920.json index b29a229f9bc..a9d0a5081c3 100644 --- a/CVE-2021/CVE-2021-09xx/CVE-2021-0920.json +++ b/CVE-2021/CVE-2021-09xx/CVE-2021-0920.json @@ -2,8 +2,8 @@ "id": "CVE-2021-0920", "sourceIdentifier": "security@android.com", "published": "2021-12-15T19:15:11.017", - "lastModified": "2025-02-04T19:15:23.463", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T17:34:25.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -123,8 +123,39 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", - "matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.13", + "matchCriteriaId": "427127D4-0234-4F80-B486-3D7564BD965F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "71268287-21A8-4488-AA4F-23C473153131" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*", + "matchCriteriaId": "23B9E5C6-FAB5-4A02-9E39-27C8787B0991" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc3:*:*:*:*:*:*", + "matchCriteriaId": "D185CF67-7E4A-4154-93DB-CE379C67DB56" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" } ] } diff --git a/CVE-2021/CVE-2021-339xx/CVE-2021-33959.json b/CVE-2021/CVE-2021-339xx/CVE-2021-33959.json index 8fa7b03b681..78f3182a240 100644 --- a/CVE-2021/CVE-2021-339xx/CVE-2021-33959.json +++ b/CVE-2021/CVE-2021-339xx/CVE-2021-33959.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33959", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T14:15:10.707", - "lastModified": "2024-11-21T06:09:48.277", + "lastModified": "2025-04-04T18:15:41.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-346" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-366xx/CVE-2021-36630.json b/CVE-2021/CVE-2021-366xx/CVE-2021-36630.json index fb9bd1ed3a8..62c2e07ccb4 100644 --- a/CVE-2021/CVE-2021-366xx/CVE-2021-36630.json +++ b/CVE-2021/CVE-2021-366xx/CVE-2021-36630.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36630", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T13:15:12.167", - "lastModified": "2024-11-21T06:13:53.480", + "lastModified": "2025-04-04T16:15:15.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-770" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-377xx/CVE-2021-37774.json b/CVE-2021/CVE-2021-377xx/CVE-2021-37774.json index be4087549b5..a228f36288f 100644 --- a/CVE-2021/CVE-2021-377xx/CVE-2021-37774.json +++ b/CVE-2021/CVE-2021-377xx/CVE-2021-37774.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37774", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-19T13:15:13.747", - "lastModified": "2024-11-21T06:15:53.407", + "lastModified": "2025-04-04T16:15:15.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-265xx/CVE-2022-26501.json b/CVE-2022/CVE-2022-265xx/CVE-2022-26501.json index 47046ed9e68..9f35a03e83e 100644 --- a/CVE-2022/CVE-2022-265xx/CVE-2022-26501.json +++ b/CVE-2022/CVE-2022-265xx/CVE-2022-26501.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26501", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-17T21:15:08.233", - "lastModified": "2025-02-03T16:15:32.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T17:53:23.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-29xx/CVE-2022-2907.json b/CVE-2022/CVE-2022-29xx/CVE-2022-2907.json index 1f7e6e2f73b..c82353d04a1 100644 --- a/CVE-2022/CVE-2022-29xx/CVE-2022-2907.json +++ b/CVE-2022/CVE-2022-29xx/CVE-2022-2907.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2907", "sourceIdentifier": "cve@gitlab.com", "published": "2023-01-17T21:15:12.683", - "lastModified": "2024-11-21T07:01:54.580", + "lastModified": "2025-04-04T18:15:41.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,6 +56,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -69,6 +89,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json b/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json index f16290879b8..0b91e891385 100644 --- a/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json +++ b/CVE-2022/CVE-2022-301xx/CVE-2022-30190.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30190", "sourceIdentifier": "secure@microsoft.com", "published": "2022-06-01T20:15:07.983", - "lastModified": "2025-01-02T19:16:22.317", - "vulnStatus": "Modified", + "lastModified": "2025-04-04T19:53:19.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -95,7 +95,7 @@ "description": [ { "lang": "en", - "value": "CWE-610" + "value": "NVD-CWE-noinfo" } ] } @@ -164,11 +164,6 @@ "criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", - "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", @@ -216,7 +211,10 @@ "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30190", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://packetstormsecurity.com/files/167438/Microsoft-Office-Word-MSDTJS-Code-Execution.html", diff --git a/CVE-2022/CVE-2022-367xx/CVE-2022-36760.json b/CVE-2022/CVE-2022-367xx/CVE-2022-36760.json index faf6d8e2be1..ea20eee1928 100644 --- a/CVE-2022/CVE-2022-367xx/CVE-2022-36760.json +++ b/CVE-2022/CVE-2022-367xx/CVE-2022-36760.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36760", "sourceIdentifier": "security@apache.org", "published": "2023-01-17T20:15:11.580", - "lastModified": "2024-11-21T07:13:39.360", + "lastModified": "2025-04-04T18:15:41.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-444" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-374xx/CVE-2022-37436.json b/CVE-2022/CVE-2022-374xx/CVE-2022-37436.json index 511f177c8a4..e66c1a8a1b6 100644 --- a/CVE-2022/CVE-2022-374xx/CVE-2022-37436.json +++ b/CVE-2022/CVE-2022-374xx/CVE-2022-37436.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37436", "sourceIdentifier": "security@apache.org", "published": "2023-01-17T20:15:11.670", - "lastModified": "2024-11-21T07:14:59.487", + "lastModified": "2025-04-04T18:15:42.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -59,6 +79,16 @@ "value": "CWE-436" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-113" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-391xx/CVE-2022-39195.json b/CVE-2022/CVE-2022-391xx/CVE-2022-39195.json index c764edde3ec..3275f04ac0f 100644 --- a/CVE-2022/CVE-2022-391xx/CVE-2022-39195.json +++ b/CVE-2022/CVE-2022-391xx/CVE-2022-39195.json @@ -2,7 +2,7 @@ "id": "CVE-2022-39195", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-17T21:15:13.023", - "lastModified": "2024-11-21T07:17:45.673", + "lastModified": "2025-04-04T16:15:16.213", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4060.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4060.json index 91d910eeb07..90b9ba9894b 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4060.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4060.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4060", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:11.000", - "lastModified": "2024-11-21T07:34:31.790", + "lastModified": "2025-04-04T18:15:44.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4101.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4101.json index 5d3b1020463..52fd8ee9849 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4101.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4101.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4101", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:11.070", - "lastModified": "2024-11-21T07:34:35.147", + "lastModified": "2025-04-04T19:15:42.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4121.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4121.json index a1d0ad1ab18..b481ab2bb67 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4121.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4121.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4121", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-01-17T18:15:11.583", - "lastModified": "2024-11-21T07:34:37.097", + "lastModified": "2025-04-04T18:15:44.327", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4199.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4199.json index db081d7c88a..5b90b47f89b 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4199.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4199.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4199", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:11.143", - "lastModified": "2024-11-21T07:34:46.013", + "lastModified": "2025-04-04T19:15:42.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4320.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4320.json index b2284b1545e..7300a0e1efe 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4320.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4320.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4320", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:11.430", - "lastModified": "2024-11-21T07:35:01.773", + "lastModified": "2025-04-04T19:15:42.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44626.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44626.json index cacc4712f10..c7539c359d5 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44626.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44626.json @@ -2,8 +2,8 @@ "id": "CVE-2022-44626", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-25T12:15:08.227", - "lastModified": "2024-11-21T07:28:13.380", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:05:15.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:squirrly:seo_plugin_by_squirrly_seo:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "12.1.21", + "matchCriteriaId": "72B31669-C0EB-417D-8891-6E250CA603B3" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/squirrly-seo/wordpress-squirrly-seo-peaks-plugin-12-1-20-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/squirrly-seo/wordpress-squirrly-seo-peaks-plugin-12-1-20-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4442.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4442.json index 58a992f237a..f1dca0ebf5a 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4442.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4442.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4442", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:11.737", - "lastModified": "2024-11-21T07:35:16.250", + "lastModified": "2025-04-04T19:15:43.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4451.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4451.json index 6a95595d143..af36f188b34 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4451.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4451.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4451", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:11.960", - "lastModified": "2024-11-21T07:35:17.343", + "lastModified": "2025-04-04T18:15:44.550", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4460.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4460.json index 098d3e859a6..882351d7b7d 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4460.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4460.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4460", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:12.097", - "lastModified": "2024-11-21T07:35:18.607", + "lastModified": "2025-04-04T18:15:44.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4476.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4476.json index eeaba876e61..a93fbdc6b7b 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4476.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4476.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4476", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:12.367", - "lastModified": "2025-03-21T16:07:09.227", + "lastModified": "2025-04-04T18:15:44.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4477.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4477.json index e1e12fc130b..bd7f83f8bf4 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4477.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4477.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4477", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:12.443", - "lastModified": "2024-11-21T07:35:20.510", + "lastModified": "2025-04-04T18:15:45.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4480.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4480.json index bba75c933cb..23fc38013b0 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4480.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4480.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4480", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:12.577", - "lastModified": "2024-11-21T07:35:20.877", + "lastModified": "2025-04-04T19:15:43.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4482.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4482.json index 2b9e3d84da7..1668c5223e9 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4482.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4482.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4482", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:12.717", - "lastModified": "2024-11-21T07:35:21.123", + "lastModified": "2025-04-04T19:15:43.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4483.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4483.json index 7f39e2ab53e..21b7844b91d 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4483.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4483.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4483", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:12.817", - "lastModified": "2024-11-21T07:35:21.250", + "lastModified": "2025-04-04T18:15:45.227", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-456xx/CVE-2022-45613.json b/CVE-2022/CVE-2022-456xx/CVE-2022-45613.json index 761aa40ba8b..9050ab7d14b 100644 --- a/CVE-2022/CVE-2022-456xx/CVE-2022-45613.json +++ b/CVE-2022/CVE-2022-456xx/CVE-2022-45613.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45613", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T18:15:10.497", - "lastModified": "2024-11-21T07:29:29.183", + "lastModified": "2025-04-04T18:15:42.353", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45922.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45922.json index 755666b8753..2b0e4625897 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45922.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45922.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45922", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T21:15:10.763", - "lastModified": "2024-11-21T07:29:57.787", + "lastModified": "2025-04-04T18:15:42.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45923.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45923.json index cf5c1d42863..1d8ded29c42 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45923.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45923.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45923", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T22:15:10.407", - "lastModified": "2024-11-21T07:29:57.940", + "lastModified": "2025-04-04T18:15:42.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45924.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45924.json index 6d4f844f6be..870208384ec 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45924.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45924.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45924", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T21:15:10.830", - "lastModified": "2024-11-21T07:29:58.080", + "lastModified": "2025-04-04T18:15:43.017", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45925.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45925.json index 25a0c459ef9..ca95dd0c844 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45925.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45925.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45925", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T21:15:10.897", - "lastModified": "2024-11-21T07:29:58.230", + "lastModified": "2025-04-04T18:15:43.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45926.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45926.json index eb44c6d4462..eafcf8d0faf 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45926.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45926.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45926", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T21:15:10.963", - "lastModified": "2024-11-21T07:29:58.377", + "lastModified": "2025-04-04T18:15:43.443", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45927.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45927.json index 453af6411d0..8768b628032 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45927.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45927.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45927", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T22:15:10.473", - "lastModified": "2024-11-21T07:29:58.530", + "lastModified": "2025-04-04T17:15:45.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-639" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45928.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45928.json index 008a3798c6e..934fe8538ab 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45928.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45928.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45928", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T21:15:11.027", - "lastModified": "2024-11-21T07:29:58.680", + "lastModified": "2025-04-04T17:15:47.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4507.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4507.json index 5eb8331593a..4489a3e92d3 100644 --- a/CVE-2022/CVE-2022-45xx/CVE-2022-4507.json +++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4507.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4507", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:13.097", - "lastModified": "2024-11-21T07:35:24.090", + "lastModified": "2025-04-04T19:15:43.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4508.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4508.json index 2e50960015e..b3596b3239a 100644 --- a/CVE-2022/CVE-2022-45xx/CVE-2022-4508.json +++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4508.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4508", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:13.160", - "lastModified": "2024-11-21T07:35:24.193", + "lastModified": "2025-04-04T18:15:45.387", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4544.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4544.json index 1cffa907dfd..1ab0141cc0d 100644 --- a/CVE-2022/CVE-2022-45xx/CVE-2022-4544.json +++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4544.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4544", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:13.223", - "lastModified": "2024-11-21T07:35:27.620", + "lastModified": "2025-04-04T18:15:45.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4547.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4547.json index 6c789a36ab9..22e48530087 100644 --- a/CVE-2022/CVE-2022-45xx/CVE-2022-4547.json +++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4547.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4547", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:13.290", - "lastModified": "2024-11-21T07:35:27.947", + "lastModified": "2025-04-04T19:15:43.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4549.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4549.json index dfc1758ec03..b9f9c222c66 100644 --- a/CVE-2022/CVE-2022-45xx/CVE-2022-4549.json +++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4549.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4549", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:13.357", - "lastModified": "2024-11-21T07:35:28.170", + "lastModified": "2025-04-04T18:15:45.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4571.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4571.json index 5a5d2b28730..27df2e3c978 100644 --- a/CVE-2022/CVE-2022-45xx/CVE-2022-4571.json +++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4571.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4571", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:13.437", - "lastModified": "2024-11-21T07:35:30.977", + "lastModified": "2025-04-04T19:15:43.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-465xx/CVE-2022-46505.json b/CVE-2022/CVE-2022-465xx/CVE-2022-46505.json index b2be42fd4f8..7fb805f5312 100644 --- a/CVE-2022/CVE-2022-465xx/CVE-2022-46505.json +++ b/CVE-2022/CVE-2022-465xx/CVE-2022-46505.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46505", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T16:15:11.320", - "lastModified": "2024-11-21T07:30:40.183", + "lastModified": "2025-04-04T17:15:47.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-665" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-466xx/CVE-2022-46648.json b/CVE-2022/CVE-2022-466xx/CVE-2022-46648.json index dda85a53cd2..6da677b0427 100644 --- a/CVE-2022/CVE-2022-466xx/CVE-2022-46648.json +++ b/CVE-2022/CVE-2022-466xx/CVE-2022-46648.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46648", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-17T10:15:11.147", - "lastModified": "2024-11-21T07:30:51.207", + "lastModified": "2025-04-04T19:15:41.777", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4655.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4655.json index e680e89f6e7..fb327f6f86a 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4655.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4655.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4655", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-16T16:15:13.707", - "lastModified": "2025-02-20T18:34:50.990", + "lastModified": "2025-04-04T19:15:44.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47318.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47318.json index 6a4dd568f7a..bf690f215e1 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47318.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47318.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47318", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-17T10:15:11.250", - "lastModified": "2024-11-21T07:31:42.667", + "lastModified": "2025-04-04T16:15:16.423", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-478xx/CVE-2022-47853.json b/CVE-2022/CVE-2022-478xx/CVE-2022-47853.json index 10d06335a34..ac6b1b0964c 100644 --- a/CVE-2022/CVE-2022-478xx/CVE-2022-47853.json +++ b/CVE-2022/CVE-2022-478xx/CVE-2022-47853.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47853", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-17T19:15:11.607", - "lastModified": "2024-11-21T07:32:24.897", + "lastModified": "2025-04-04T18:15:43.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47929.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47929.json index 68cf7a6d1e6..93c3659fe0c 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47929.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47929.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47929", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-17T21:15:14.590", - "lastModified": "2024-11-21T07:32:33.047", + "lastModified": "2025-04-04T18:15:43.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47950.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47950.json index 35070aacedc..a3fca37db16 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47950.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47950.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47950", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T17:15:10.290", - "lastModified": "2024-11-21T07:32:37.363", + "lastModified": "2025-04-04T16:15:16.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-552" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0122.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0122.json index e62f2c08ea8..1cc265a7dea 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0122.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0122.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0122", "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-17T21:15:14.853", - "lastModified": "2024-11-21T07:36:35.837", + "lastModified": "2025-04-04T19:15:44.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0158.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0158.json index 8fff8f95a0a..1a287a76198 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0158.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0158.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0158", "sourceIdentifier": "sep@nlnetlabs.nl", "published": "2023-01-17T17:15:11.837", - "lastModified": "2024-11-21T07:36:39.690", + "lastModified": "2025-04-04T19:15:44.493", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0296.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0296.json index c962b3cd056..15bd9ecc25c 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0296.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0296.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0296", "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-17T21:15:15.273", - "lastModified": "2024-11-21T07:36:55.047", + "lastModified": "2025-04-04T19:15:44.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-222xx/CVE-2023-22278.json b/CVE-2023/CVE-2023-222xx/CVE-2023-22278.json index 836c7f797a1..3417a89dd68 100644 --- a/CVE-2023/CVE-2023-222xx/CVE-2023-22278.json +++ b/CVE-2023/CVE-2023-222xx/CVE-2023-22278.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22278", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-17T10:15:11.333", - "lastModified": "2024-11-21T07:44:26.783", + "lastModified": "2025-04-04T19:15:45.007", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-222xx/CVE-2023-22279.json b/CVE-2023/CVE-2023-222xx/CVE-2023-22279.json index 15ad922b616..c19b85df947 100644 --- a/CVE-2023/CVE-2023-222xx/CVE-2023-22279.json +++ b/CVE-2023/CVE-2023-222xx/CVE-2023-22279.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22279", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-17T10:15:11.400", - "lastModified": "2024-11-21T07:44:26.883", + "lastModified": "2025-04-04T19:15:45.177", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-222xx/CVE-2023-22280.json b/CVE-2023/CVE-2023-222xx/CVE-2023-22280.json index 3b2b84004be..95d4dee22a7 100644 --- a/CVE-2023/CVE-2023-222xx/CVE-2023-22280.json +++ b/CVE-2023/CVE-2023-222xx/CVE-2023-22280.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22280", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-17T10:15:11.477", - "lastModified": "2024-11-21T07:44:27.000", + "lastModified": "2025-04-04T18:15:45.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-222xx/CVE-2023-22286.json b/CVE-2023/CVE-2023-222xx/CVE-2023-22286.json index cfb7574ed8c..bf53bdec91a 100644 --- a/CVE-2023/CVE-2023-222xx/CVE-2023-22286.json +++ b/CVE-2023/CVE-2023-222xx/CVE-2023-22286.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22286", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-17T10:15:11.537", - "lastModified": "2024-11-21T07:44:27.597", + "lastModified": "2025-04-04T18:15:46.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-222xx/CVE-2023-22296.json b/CVE-2023/CVE-2023-222xx/CVE-2023-22296.json index a594be46b46..66c93754fdf 100644 --- a/CVE-2023/CVE-2023-222xx/CVE-2023-22296.json +++ b/CVE-2023/CVE-2023-222xx/CVE-2023-22296.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22296", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-17T10:15:11.597", - "lastModified": "2024-11-21T07:44:28.607", + "lastModified": "2025-04-04T18:15:46.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22303.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22303.json index 95e5907897d..3c8d99b625c 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22303.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22303.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22303", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-17T10:15:11.713", - "lastModified": "2024-11-21T07:44:29.373", + "lastModified": "2025-04-04T18:15:46.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22304.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22304.json index 1eb65787b8e..3d4ac759d61 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22304.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22304.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22304", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-17T10:15:11.767", - "lastModified": "2024-11-21T07:44:29.480", + "lastModified": "2025-04-04T18:15:46.943", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22316.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22316.json index 25cf4e90551..e70e87dd191 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22316.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22316.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22316", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-17T10:15:11.823", - "lastModified": "2024-11-21T07:44:30.940", + "lastModified": "2025-04-04T18:15:47.120", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-912" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22357.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22357.json index db4d532d57d..843c5c900d3 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22357.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22357.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22357", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-01-17T10:15:11.887", - "lastModified": "2024-11-21T07:44:37.583", + "lastModified": "2025-04-04T18:15:47.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-489" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22624.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22624.json index 30b2d861605..1c266a6d586 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22624.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22624.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22624", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-17T20:15:11.927", - "lastModified": "2024-11-21T07:45:04.890", + "lastModified": "2025-04-04T18:15:47.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22809.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22809.json index 48f69f41d7b..8595f3fcb34 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22809.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22809.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22809", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T17:15:10.353", - "lastModified": "2024-11-21T07:45:27.753", + "lastModified": "2025-04-04T16:15:16.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23637.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23637.json index 9f494847ded..4fec11ddd6f 100644 --- a/CVE-2023/CVE-2023-236xx/CVE-2023-23637.json +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23637.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23637", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-17T21:15:17.080", - "lastModified": "2024-11-21T07:46:35.183", + "lastModified": "2025-04-04T18:15:47.737", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36361.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36361.json index d0cbe0caf13..02ab389184b 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36361.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36361.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36361", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-05T16:15:07.567", - "lastModified": "2025-01-09T20:15:33.733", + "lastModified": "2025-04-04T19:15:45.423", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ @@ -114,6 +144,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2023-36361", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json index 6e943902f7d..4db6c8d9c8d 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4540.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4540", "sourceIdentifier": "cvd@cert.pl", "published": "2023-09-05T08:15:40.017", - "lastModified": "2025-03-14T16:15:28.097", + "lastModified": "2025-04-04T19:15:45.653", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0893.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0893.json index f59e76a03ba..813e940f1b9 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0893.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0893.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0893", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T07:15:09.387", - "lastModified": "2024-11-21T08:47:38.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T18:20:59.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:schemaapp:schema_app_structured_data:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.1", + "matchCriteriaId": "D76EC18E-4F87-45E4-94EE-811217DF1A5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/schema-app-structured-data-for-schemaorg/trunk/lib/SchemaEditor.php#L327", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1089ab17-b780-4840-8dcd-c50258513634?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/schema-app-structured-data-for-schemaorg/trunk/lib/SchemaEditor.php#L327", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1089ab17-b780-4840-8dcd-c50258513634?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11235.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11235.json new file mode 100644 index 00000000000..32b0e0911fd --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11235.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-11235", + "sourceIdentifier": "security@php.net", + "published": "2025-04-04T18:15:48.020", + "lastModified": "2025-04-04T18:15:48.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=\u00a0\u00a0operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@php.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Amber", + "baseScore": 9.2, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@php.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/php/php-src/security/advisories/GHSA-rwp7-7vc6-8477", + "source": "security@php.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11708.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11708.json index 0757af99c1d..b4c4d8105c1 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11708.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11708.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11708", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:20.173", - "lastModified": "2024-11-27T15:15:24.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:27:07.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "F82571FC-4DDE-4C63-BD2B-8CF2FFEA28A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "75D1724C-A89A-46A9-988C-09A4019D9956" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1922912", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1134.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1134.json index d3bd5979bab..946b2393657 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1134.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1134.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1134", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T06:15:08.667", - "lastModified": "2024-11-21T08:49:52.330", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T18:22:20.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seopress:seopress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.6", + "matchCriteriaId": "9AE9B794-8137-4F8A-A37C-F6EF8BEA88E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3056025%40wp-seopress%2Ftrunk&old=3047913%40wp-seopress%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bc3910e4-649f-45ab-876a-a4b04afac8d2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3056025%40wp-seopress%2Ftrunk&old=3047913%40wp-seopress%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bc3910e4-649f-45ab-876a-a4b04afac8d2?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json index bb5f4894343..9d5a2c4befa 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13193", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-08T23:15:09.220", - "lastModified": "2025-01-09T17:15:11.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:59:31.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -122,28 +142,78 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sem-cms:semcms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.8", + "matchCriteriaId": "1EF70439-0D9A-4C47-A3E3-CB05E7C84B4E" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Upgradeextension/SEMCMS/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link", + "Exploit", + "Technical Description" + ] }, { "url": "https://vuldb.com/?ctiid.290785", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.290785", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.469563", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/Upgradeextension/SEMCMS/blob/main/README.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Broken Link", + "Exploit", + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1332.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1332.json index dfcabe8335e..ec9b5b36ff5 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1332.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1332", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T07:15:09.733", - "lastModified": "2024-11-21T08:50:21.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T18:12:44.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:custom_fonts:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.5", + "matchCriteriaId": "7042FD3E-004F-4EE3-8727-0B420DC75DB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3074871%40custom-fonts%2Ftrunk&old=3062686%40custom-fonts%2Ftrunk&sfp_email=&sfph_mail=#file4", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/98536242-64c7-4e02-aa00-a3efbf5c90d8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3074871%40custom-fonts%2Ftrunk&old=3062686%40custom-fonts%2Ftrunk&sfp_email=&sfph_mail=#file4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/98536242-64c7-4e02-aa00-a3efbf5c90d8?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1376.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1376.json index 78ef1b9268f..5c9265eafe2 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1376.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1376.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1376", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T07:15:10.057", - "lastModified": "2024-11-21T08:50:26.737", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T18:08:49.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:avecnous:event_post:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.9.5", + "matchCriteriaId": "18898A45-B13B-4E8C-AE0D-7BBA0C136E08" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3086840/event-post/trunk/eventpost.php?old=3060317&old_path=event-post%2Ftrunk%2Feventpost.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/926c09d5-3824-4745-99f6-50d9c945d252?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3086840/event-post/trunk/eventpost.php?old=3060317&old_path=event-post%2Ftrunk%2Feventpost.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/926c09d5-3824-4745-99f6-50d9c945d252?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json index 887094a7b0f..cfacc0ba1df 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20476.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20476", "sourceIdentifier": "psirt@cisco.com", "published": "2024-11-06T17:15:15.337", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T17:19:47.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,12 +69,148 @@ "value": "CWE-602" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1", + "matchCriteriaId": "742B3761-9FD6-4E67-BDDD-D4DD2C3111D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7A789B44-7E6C-4FE9-BD40-702A871AB8AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "93920663-445E-4456-A905-81CEC6CA1833" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "33DA5BB8-4CFE-44BD-9CEB-BC26577E8477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "D3AEFA85-66B5-4145-A4AD-96D1FF86B46D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "7A6A0697-6A9E-48EF-82D8-36C75E0CDFDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "E939B65A-7912-4C36-8799-03A1526D7BD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "833B438F-0869-4C0D-9952-750C00702E8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*", + "matchCriteriaId": "E8B2588D-01F9-450B-B2E3-ADC4125E354E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*", + "matchCriteriaId": "E41016C0-19E6-4BCC-A8DD-F6C9A2B0003E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*", + "matchCriteriaId": "654E946A-07C5-4036-BC54-85EF42B808DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "7932D5D5-83E1-4BEF-845A-D0783D4BB750" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "1B818846-4A6E-4256-B344-281E8C786C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "A44858A2-922A-425A-8B38-0C47DB911A3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "53484A32-757B-42F8-B655-554C34222060" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*", + "matchCriteriaId": "0CCAC61F-C273-49B3-A631-31D3AE3EB148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*", + "matchCriteriaId": "51AEFCE6-FB4A-4B1C-A23D-83CC3CF3FBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*", + "matchCriteriaId": "B452B4F0-8510-475E-9AE8-B48FABB4D7D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "F1B9C2C1-59A4-49A0-9B74-83CCB063E55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*", + "matchCriteriaId": "DFD29A0B-0D75-4EAB-BCE0-79450EC75DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*", + "matchCriteriaId": "E6C94CC4-CC08-4DAF-A606-FDAFC92720A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*", + "matchCriteriaId": "BB069EA3-7B8C-42B5-8035-2EE5ED3F56E4" + } + ] + } + ] } ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-vulns-AF544ED5", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json index 58f95ba8025..4a159e6e06b 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20484.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20484", "sourceIdentifier": "psirt@cisco.com", "published": "2024-11-06T17:15:15.580", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T17:14:45.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,50 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.5(1)es9", + "matchCriteriaId": "5AD496A5-370D-4D6B-8B7C-189F4071764E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.6(1)", + "versionEndExcluding": "12.6(1)es9", + "matchCriteriaId": "5CFB6250-725E-41C1-9669-FCA236D1D1DC" + } + ] + } + ] } ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-Oqb9uFEv", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-226xx/CVE-2024-22611.json b/CVE-2024/CVE-2024-226xx/CVE-2024-22611.json index 42cd8b32964..eecc2e05e6f 100644 --- a/CVE-2024/CVE-2024-226xx/CVE-2024-22611.json +++ b/CVE-2024/CVE-2024-226xx/CVE-2024-22611.json @@ -2,16 +2,55 @@ "id": "CVE-2024-22611", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T19:15:39.260", - "lastModified": "2025-04-03T19:15:39.260", + "lastModified": "2025-04-04T16:15:17.163", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenEMR 7.0.2 is vulnerable to SQL Injection via \\openemr\\library\\classes\\Pharmacy.class.php, \\controllers\\C_Pharmacy.class.php and \\openemr\\controller.php." + }, + { + "lang": "es", + "value": "OpenEMR 7.0.2 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de \\openemr\\library\\classes\\Pharmacy.class.php, \\controllers\\C_Pharmacy.class.php y \\openemr\\controller.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/baolqinfosec/CVE-Reseach/blob/main/OpenERM_CVE-2024-22611.md", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26289.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26289.json index 865a2a03a5d..a751412ff6e 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26289.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26289", "sourceIdentifier": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", "published": "2024-05-27T07:15:08.807", - "lastModified": "2024-11-21T09:02:18.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:39:47.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,24 +69,79 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sigb:pmb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3.1", + "versionEndExcluding": "7.3.18", + "matchCriteriaId": "F1B8DE5B-25FD-4597-9593-CBA4D002C3EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sigb:pmb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.1", + "versionEndExcluding": "7.4.9", + "matchCriteriaId": "DD281040-EE29-4128-847E-D7AC0396B713" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sigb:pmb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.5.1", + "versionEndExcluding": "7.5.6-2", + "matchCriteriaId": "EC312B4B-5755-495F-A057-E9923865EF71" + } + ] + } + ] } ], "references": [ { "url": "https://forge.sigb.net/projects/pmb/files", - "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158" + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", + "tags": [ + "Product" + ] }, { "url": "https://github.com/enisaeu/CNW/blob/main/advisories/2024/CNW-2024-A-12.md", - "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158" + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://forge.sigb.net/projects/pmb/files", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/enisaeu/CNW/blob/main/advisories/2024/CNW-2024-A-12.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-284xx/CVE-2024-28405.json b/CVE-2024/CVE-2024-284xx/CVE-2024-28405.json index 85b25b04989..cef8ce6de54 100644 --- a/CVE-2024/CVE-2024-284xx/CVE-2024-28405.json +++ b/CVE-2024/CVE-2024-284xx/CVE-2024-28405.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28405", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-29T15:15:11.123", - "lastModified": "2024-11-21T09:06:17.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:32:01.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sem-cms:semcms:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "BD382DC4-F472-49F5-AA7E-939EC76D4E8F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/turabiaslan/semcms", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/turabiaslan/semcms/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/turabiaslan/semcms", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/turabiaslan/semcms/blob/main/README.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2863.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2863.json index bb0810e172d..99a33ffd95c 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2863.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2863.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2863", "sourceIdentifier": "product.security@lge.com", "published": "2024-03-25T07:15:51.030", - "lastModified": "2024-11-21T09:10:42.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:48:07.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,49 @@ "value": "CWE-35" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lg:lg_led_assistant:2.1.65:*:*:*:*:*:*:*", + "matchCriteriaId": "7A4BEF80-AB53-4A59-99C4-C5D8E271E372" + } + ] + } + ] } ], "references": [ { "url": "https://lgsecurity.lge.com/bulletins/idproducts#updateDetails", - "source": "product.security@lge.com" + "source": "product.security@lge.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://lgsecurity.lge.com/bulletins/idproducts#updateDetails", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30568.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30568.json index 2b2fc533ccd..da031a149cd 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30568.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30568", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T13:16:02.443", - "lastModified": "2024-11-21T09:12:11.660", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:32:27.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:r6850_firmware:1.1.0.88:*:*:*:*:*:*:*", + "matchCriteriaId": "990FAC64-1F0C-4285-967F-A59BBB3A1E77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "598B48C5-4706-4431-8C5A-DA496DD1052F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection%28ping_test%29.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection%28ping_test%29.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30569.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30569.json index 426eaa2d3b5..75c99aefd40 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30569.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30569.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30569", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T13:16:02.503", - "lastModified": "2024-11-21T09:12:11.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:32:22.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:r6850_firmware:1.1.0.88:*:*:*:*:*:*:*", + "matchCriteriaId": "990FAC64-1F0C-4285-967F-A59BBB3A1E77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "598B48C5-4706-4431-8C5A-DA496DD1052F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Info%20Leak%20in%20Netgear-R6850%EF%BC%88currentsetting.htm%EF%BC%89.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Info%20Leak%20in%20Netgear-R6850%EF%BC%88currentsetting.htm%EF%BC%89.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json index 13bac16bd3c..8212dc34649 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30570", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T13:16:02.563", - "lastModified": "2024-11-21T09:12:12.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:32:17.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:r6850_firmware:1.1.0.88:*:*:*:*:*:*:*", + "matchCriteriaId": "990FAC64-1F0C-4285-967F-A59BBB3A1E77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "598B48C5-4706-4431-8C5A-DA496DD1052F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Info%20Leak%20in%20Netgear-R6850%EF%BC%88debuginfo.htm%EF%BC%89.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Info%20Leak%20in%20Netgear-R6850%EF%BC%88debuginfo.htm%EF%BC%89.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30571.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30571.json index 63436999973..f631222e770 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30571.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30571", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T13:16:02.620", - "lastModified": "2025-03-28T19:15:21.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:32:11.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:r6850_firmware:1.1.0.88:*:*:*:*:*:*:*", + "matchCriteriaId": "990FAC64-1F0C-4285-967F-A59BBB3A1E77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "598B48C5-4706-4431-8C5A-DA496DD1052F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Info%20Leak%20in%20Netgear-R6850%EF%BC%88BRS_top.html%EF%BC%89.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Info%20Leak%20in%20Netgear-R6850%EF%BC%88BRS_top.html%EF%BC%89.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30572.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30572.json index 8c535c2a30e..8410560b020 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30572.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30572", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T13:16:02.680", - "lastModified": "2025-03-13T18:15:39.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:32:07.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:r6850_firmware:1.1.0.88:*:*:*:*:*:*:*", + "matchCriteriaId": "990FAC64-1F0C-4285-967F-A59BBB3A1E77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:r6850:-:*:*:*:*:*:*:*", + "matchCriteriaId": "598B48C5-4706-4431-8C5A-DA496DD1052F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection%28ntp_server%29.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Netgear-R6850%20V1.1.0.88%20Command%20Injection%28ntp_server%29.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.netgear.com/about/security/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31009.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31009.json index 431534cdfd1..df8a8fcf7fe 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31009.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31009", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T04:15:12.403", - "lastModified": "2024-11-21T09:12:42.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:31:54.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sem-cms:semcms:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "BD382DC4-F472-49F5-AA7E-939EC76D4E8F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ss122-0ss/semcms/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ss122-0ss/semcms/blob/main/README.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31010.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31010.json index 7af21c2509c..17cd3171ad5 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31010.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31010.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31010", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T04:15:12.653", - "lastModified": "2024-11-21T09:12:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:31:46.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sem-cms:semcms:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "BD382DC4-F472-49F5-AA7E-939EC76D4E8F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ss122-0ss/semcms/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ss122-0ss/semcms/blob/main/README.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3118.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3118.json index bef358ce606..5445d5066ab 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3118.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3118.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3118", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-31T05:15:07.427", - "lastModified": "2024-11-21T09:28:56.433", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:35:06.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,98 @@ "value": "CWE-275" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.1.3", + "matchCriteriaId": "750BEC92-4A47-48DF-B0F4-FB7A4444FB65" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/sweatxi/BugHub/blob/main/dreamer_Excessive_authority.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.258779", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258779", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.303196", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/sweatxi/BugHub/blob/main/dreamer_Excessive_authority.pdf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.258779", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258779", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.303196", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3202.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3202.json index 93c8485d729..487ff61135b 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3202.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3202", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T22:15:09.643", - "lastModified": "2024-11-21T09:29:08.450", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:58:57.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -76,38 +96,88 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codelyfe:stupid_simple_cms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.4", + "matchCriteriaId": "700DA84E-DA65-4B87-B847-E4C61E24F5D1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lcg-22266/cms/blob/main/2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259049", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259049", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.303941", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/lcg-22266/cms/blob/main/2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259049", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259049", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.303941", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3311.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3311.json index 82a3d142bd6..d14ed6dd8a6 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3311.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3311", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-04T21:15:16.957", - "lastModified": "2024-11-21T09:29:22.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:35:34.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,48 +94,114 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.1.3.1", + "matchCriteriaId": "7583BC5D-02BC-44C6-9204-60D4047C01F4" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/iteachyou/dreamer_cms/releases/tag/Latest_Stable_Release_4.1.3.1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://gitee.com/y1336247431/poc-public/issues/I9BA5R", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259369", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259369", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.303874", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://gitee.com/iteachyou/dreamer_cms/releases/tag/Latest_Stable_Release_4.1.3.1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://gitee.com/y1336247431/poc-public/issues/I9BA5R", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.259369", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259369", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.303874", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35387.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35387.json index f7a6702808a..2364e550d72 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35387.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35387.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35387", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-24T18:15:08.363", - "lastModified": "2024-11-21T09:20:14.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:03:41.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:lr350_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:*", + "matchCriteriaId": "6E7C618F-D415-4075-96A5-45E44B52FB62" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:lr350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CA0663B-3F55-44EF-AF32-F83AB0411748" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/loginAuth_http_host/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/loginAuth_http_host/README.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36783.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36783.json index 568cc20d5b3..1314ca2ca70 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36783.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36783.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36783", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T20:15:09.370", - "lastModified": "2024-11-21T09:22:37.627", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:32:22.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:lr350_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:*", + "matchCriteriaId": "6E7C618F-D415-4075-96A5-45E44B52FB62" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:lr350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CA0663B-3F55-44EF-AF32-F83AB0411748" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/NTPSyncWithHost/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/NTPSyncWithHost/README.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38748.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38748.json index e6e9ce3f71f..d336f142d22 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38748.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38748.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38748", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:34.497", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T17:43:43.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,12 +69,43 @@ "value": "CWE-862" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:theinnovs:eleforms:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.9.9.9", + "matchCriteriaId": "EF5D0F9D-4B72-4D75-8C4F-B2802257DF09" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/all-contact-form-integration-for-elementor/wordpress-eleforms-plugin-2-9-9-9-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38791.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38791.json index 77e660c1082..dc7d642b3ea 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38791.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38791.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38791", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-01T21:15:28.580", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:45:25.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.8", + "matchCriteriaId": "8ACB959C-9C30-4D30-A6A2-F7792139BFB7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ai-engine/wordpress-ai-engine-plugin-2-4-7-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40864.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40864.json index 83ceae25a56..a01d7ee2c3b 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40864.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40864.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40864", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:15.157", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:19:30.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved handling of protocols. This issue is fixed in macOS Ventura 13.7.5, macOS Sonoma 14.7.5. An attacker in a privileged network position can track a user's activity." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de protocolos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5 y macOS Sonoma 14.7.5. Un atacante con una posici\u00f3n privilegiada en la red puede rastrear la actividad de un usuario." } ], "metrics": { @@ -47,14 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4037.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4037.json index d986850b54e..c28737c5360 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4037.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4037.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4037", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T09:15:08.873", - "lastModified": "2024-11-21T09:42:04.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T17:52:02.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,115 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wppa:wp_photo_album_plus:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.7.00.004", + "matchCriteriaId": "07F51D9B-E1D6-4466-8C6D-5744849F07CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-photo-album-plus/trunk/wppa-ajax.php#L1138", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078746%40wp-photo-album-plus&new=3078746%40wp-photo-album-plus&sfp_email=&sfph_mail=#file3", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3079831%40wp-photo-album-plus&new=3079831%40wp-photo-album-plus&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3d6b95ee-0a0d-49f7-83b1-4716eec3b863?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-photo-album-plus/trunk/wppa-ajax.php#L1138", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3078746%40wp-photo-album-plus&new=3078746%40wp-photo-album-plus&sfp_email=&sfph_mail=#file3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3079831%40wp-photo-album-plus&new=3079831%40wp-photo-album-plus&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3d6b95ee-0a0d-49f7-83b1-4716eec3b863?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43136.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43136.json index 1d2e7d369fe..14b85174eca 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43136.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43136.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43136", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:38.873", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:41:05.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sunshinephotocart:sunshine_photo_cart:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.2", + "matchCriteriaId": "29F67E51-36A8-4B16-9010-1DFA4AC8991B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/sunshine-photo-cart/wordpress-sunshine-photo-cart-plugin-3-2-1-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43142.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43142.json index f54ac7f7a77..77a03f694db 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43142.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43142.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43142", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:39.127", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:42:30.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.7.4", + "matchCriteriaId": "F13BA7B7-32C3-4AB7-A112-387E356A1DCB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-7-3-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45198.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45198.json index 68db8ccf4ca..c402b0b0328 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45198.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45198.json @@ -2,16 +2,55 @@ "id": "CVE-2024-45198", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T20:15:23.363", - "lastModified": "2025-04-03T20:15:23.363", + "lastModified": "2025-04-04T16:15:17.340", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "insightsoftware Spark JDBC 2.6.21 has a remote code execution vulnerability. Attackers can inject malicious parameters into the JDBC URL, triggering JNDI injection during the process when the JDBC Driver uses this URL to connect to the database. This can further lead to remote code execution." + }, + { + "lang": "es", + "value": "Insightsoftware Spark JDBC 2.6.21 presenta una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. Los atacantes pueden inyectar par\u00e1metros maliciosos en la URL de JDBC, lo que activa la inyecci\u00f3n JNDI durante el proceso cuando el controlador JDBC utiliza esta URL para conectarse a la base de datos. Esto puede provocar la ejecuci\u00f3n remota de c\u00f3digo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/azraelxuemo/ef11311ae0633cbd3d794f73c64e3877", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45199.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45199.json index 08cac591158..9b05584e8fa 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45199.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45199.json @@ -2,16 +2,55 @@ "id": "CVE-2024-45199", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T21:15:38.400", - "lastModified": "2025-04-03T21:15:38.400", + "lastModified": "2025-04-04T16:15:17.523", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "insightsoftware Hive JDBC through 2.6.13 has a remote code execution vulnerability. Attackers can inject malicious parameters into the JDBC URL, triggering JNDI injection during the process when the JDBC Driver uses this URL to connect to the database. This can further lead to remote code execution." + }, + { + "lang": "es", + "value": "Insightsoftware Hive JDBC hasta la versi\u00f3n 2.6.13 presenta una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo. Los atacantes pueden inyectar par\u00e1metros maliciosos en la URL de JDBC, lo que desencadena la inyecci\u00f3n de JNDI durante el proceso cuando el controlador JDBC utiliza esta URL para conectarse a la base de datos. Esto puede provocar la ejecuci\u00f3n remota de c\u00f3digo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/azraelxuemo/d019ad079d540ef28870dbd9552a7c62", diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4595.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4595.json index c5dd7cfabf7..0e0016874dc 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4595.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4595.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4595", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T15:15:10.273", - "lastModified": "2024-11-21T09:43:10.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:01:06.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,40 +94,100 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sem-cms:semcms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.8", + "matchCriteriaId": "1EF70439-0D9A-4C47-A3E3-CB05E7C84B4E" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/gatsby2003/Semcms/blob/main/semcms0-sqlinjection.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.263317", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263317", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.326715", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/gatsby2003/Semcms/blob/main/semcms0-sqlinjection.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.263317", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263317", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.326715", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47212.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47212.json index 22542077bb3..a91290efe1a 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47212.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47212.json @@ -2,16 +2,55 @@ "id": "CVE-2024-47212", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T21:15:38.523", - "lastModified": "2025-04-03T21:15:38.523", + "lastModified": "2025-04-04T16:15:17.697", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Iglu Server 0.13.0 and below. It involves sending very large payloads to a particular API endpoint of Iglu Server and can render it completely unresponsive. If the operation of Iglu Server is not restored, event processing in the pipeline would eventually halt." + }, + { + "lang": "es", + "value": "Se detect\u00f3 un problema en Iglu Server 0.13.0 y versiones anteriores. Este problema implica el env\u00edo de payloads muy grandes a un endpoint de API espec\u00edfico de Iglu Server, lo que puede dejarlo completamente inoperante. Si no se restablece el funcionamiento de Iglu Server, el procesamiento de eventos en la canalizaci\u00f3n podr\u00eda detenerse." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users", diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4858.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4858.json index 297e5e48c9a..232b6f2ac8e 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4858.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4858.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4858", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-25T03:15:08.150", - "lastModified": "2024-11-21T09:43:44.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T16:55:05.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:uapp:testimonial_carousel_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "10.2.1", + "matchCriteriaId": "B730680F-E49B-4040-8182-30E6863A7C12" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/testimonials-carousel-elementor/trunk/class-testimonials-carousel-elementor.php#L126", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3092154/testimonials-carousel-elementor/trunk/class-testimonials-carousel-elementor.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1f589345-a081-4d27-ac4a-6edc44b96f91?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/testimonials-carousel-elementor/trunk/class-testimonials-carousel-elementor.php#L126", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3092154/testimonials-carousel-elementor/trunk/class-testimonials-carousel-elementor.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1f589345-a081-4d27-ac4a-6edc44b96f91?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5060.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5060.json index 8cbe7beac80..3381ea52956 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5060.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5060", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T07:15:10.967", - "lastModified": "2024-11-21T09:46:52.847", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T18:07:39.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kapasias:lottiefiles:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.10.10", + "matchCriteriaId": "97D47F9F-AD07-4A61-BDE9-51855462AF62" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/include-lottie-animation-for-elementor/tags/1.10.9/include/jbafe-json-anim-widget.php#L1180", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3089058%40include-lottie-animation-for-elementor%2Ftags%2F1.10.9&new=3089058%40include-lottie-animation-for-elementor%2Ftags%2F1.10.10", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/74f59ee0-19dd-4cc9-ab24-22f26d71d248?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/include-lottie-animation-for-elementor/tags/1.10.9/include/jbafe-json-anim-widget.php#L1180", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3089058%40include-lottie-animation-for-elementor%2Ftags%2F1.10.9&new=3089058%40include-lottie-animation-for-elementor%2Ftags%2F1.10.10", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/74f59ee0-19dd-4cc9-ab24-22f26d71d248?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5220.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5220.json index 6d1de29915c..7c06c418e1b 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5220.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5220.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5220", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-25T02:15:41.053", - "lastModified": "2024-11-21T09:47:12.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T17:02:08.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nicdark:nd_shortcodes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.6", + "matchCriteriaId": "23B6F297-4B1C-4EA3-AB14-2F0D2AEC9469" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/nd-shortcodes/tags/7.3/nd-shortcodes.php#L63", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3091778/nd-shortcodes/trunk/nd-shortcodes.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5cbd6040-0446-41fe-8fef-c9065beeaa3a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/nd-shortcodes/tags/7.3/nd-shortcodes.php#L63", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3091778/nd-shortcodes/trunk/nd-shortcodes.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5cbd6040-0446-41fe-8fef-c9065beeaa3a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5229.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5229.json index 96957d811de..45aa2cf0322 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5229.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5229.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5229", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-25T03:15:08.377", - "lastModified": "2024-11-21T09:47:13.807", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T16:46:09.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,94 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nicheaddons:primary_addon_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.6", + "matchCriteriaId": "757CADF6-94AB-4512-9734-1EEDF46884FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/primary-addon-for-elementor/trunk/elementor/widgets/basic/nabasic-pricing-table.php#L775", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3092073/#file366", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3092073/primary-addon-for-elementor/trunk/elementor/widgets/basic/nabasic-pricing-table.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/primary-addon-for-elementor/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6ea95b5-9e1c-41b1-9bc5-5fd5cecef65d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/primary-addon-for-elementor/trunk/elementor/widgets/basic/nabasic-pricing-table.php#L775", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3092073/#file366", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3092073/primary-addon-for-elementor/trunk/elementor/widgets/basic/nabasic-pricing-table.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/primary-addon-for-elementor/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6ea95b5-9e1c-41b1-9bc5-5fd5cecef65d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53975.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53975.json index 373bb1262eb..c8fccb9d5d3 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53975.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53975.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53975", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:21.497", - "lastModified": "2024-11-27T15:15:26.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:19:53.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,51 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "155541E6-7496-41FE-BA8D-17DDE9D0F3A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843467", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-66/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53976.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53976.json index 37435e4d5e5..7fdfaba93a7 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53976.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53976", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:21.587", - "lastModified": "2024-11-26T16:15:21.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:15:43.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "133.0", + "matchCriteriaId": "155541E6-7496-41FE-BA8D-17DDE9D0F3A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1905749", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-66/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json index 811330ec425..74dd0bcb8b6 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54530.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54530", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:13.753", - "lastModified": "2025-03-18T21:15:31.120", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T18:14:14.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,80 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.2", + "matchCriteriaId": "3750AD63-B023-44CE-B44D-A90F98E3A8C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2", + "matchCriteriaId": "16F83EAF-2879-4515-BC44-6AE5006D35EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.2", + "matchCriteriaId": "8C446885-2BC5-454D-88A1-146B17C051C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121837", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121843", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121845", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54533.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54533.json index 16fe3e47405..7d36503c9a9 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54533.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54533.json @@ -2,13 +2,17 @@ "id": "CVE-2024-54533", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:16.027", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:19:26.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sonoma 14.7.5. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales en el entorno aislado. Este problema se solucion\u00f3 en macOS Ventura 13.7.5 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { @@ -47,14 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json index 78cc17128be..123715f8fd3 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54547.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54547", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.400", - "lastModified": "2025-03-24T18:15:20.940", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:13:51.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.2", + "matchCriteriaId": "30D66414-3769-4793-A9BF-A39E8CAB31D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.2", + "matchCriteriaId": "617CA14A-5EA4-4112-A564-DB1A5109A066" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.2", + "matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121840", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121842", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json b/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json index b5766a9913c..6a2f90351b2 100644 --- a/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json +++ b/CVE-2024/CVE-2024-545xx/CVE-2024-54550.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54550", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.580", - "lastModified": "2025-03-19T19:15:42.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T18:19:54.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.2", + "matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.2", + "matchCriteriaId": "3750AD63-B023-44CE-B44D-A90F98E3A8C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121837", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121839", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5699.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5699.json index 8a79f8f0224..3805be9adf6 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5699.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5699.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5699", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:51.333", - "lastModified": "2024-11-21T09:48:11.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:30:29.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "127.0", + "matchCriteriaId": "4CF5E7C8-8673-4B56-AF92-44C08B086E02" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891349", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Exploit" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891349", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Exploit" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0468.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0468.json new file mode 100644 index 00000000000..5071c342fe3 --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0468.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-0468", + "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", + "published": "2025-04-04T16:15:17.873", + "lastModified": "2025-04-04T16:15:17.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to subvert GPU HW to write to arbitrary physical memory pages.\n\nUnder certain circumstances this exploit could be used to corrupt data pages not allocated by the GPU driver but memory pages in use by the kernel and drivers running on the platform altering their behaviour." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-280" + } + ] + } + ], + "references": [ + { + "url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/", + "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json b/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json index becbccaa7ef..c84aa5a73b3 100644 --- a/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json +++ b/CVE-2025/CVE-2025-09xx/CVE-2025-0998.json @@ -2,63 +2,15 @@ "id": "CVE-2025-0998", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-02-15T02:15:09.483", - "lastModified": "2025-02-19T15:15:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:15:18.013", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Out of bounds memory access in V8 in Google Chrome prior to 133.0.6943.98 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)" - }, - { - "lang": "es", - "value": "El acceso a la memoria fuera de los l\u00edmites en la versi\u00f3n 8 de Google Chrome anterior a la versi\u00f3n 133.0.6943.98 permiti\u00f3 que un atacante remoto ejecutara c\u00f3digo arbitrario dentro de un entorno protegido a trav\u00e9s de una p\u00e1gina HTML manipulada espec\u00edficamente. (Gravedad de seguridad de Chromium: alta)" + "value": "Rejected reason: Not exploitable" } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", - "baseScore": 9.6, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "CHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.8, - "impactScore": 6.0 - } - ] - }, - "weaknesses": [ - { - "source": "chrome-cve-admin@google.com", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-125" - } - ] - } - ], - "references": [ - { - "url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html", - "source": "chrome-cve-admin@google.com" - }, - { - "url": "https://issues.chromium.org/issues/386857213", - "source": "chrome-cve-admin@google.com" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1543.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1543.json index e514c1d06f9..070a396ccc6 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1543.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1543.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1543", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-21T16:15:32.787", - "lastModified": "2025-02-21T16:15:32.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:36:37.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -118,24 +118,67 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/dreamercms/PathTraversal-UeditorResource.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.296489", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296489", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.497329", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1548.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1548.json index 300dac04501..c4de97254c4 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1548.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1548.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1548", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-21T17:15:13.897", - "lastModified": "2025-02-21T17:15:13.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T16:40:52.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 } ], "cvssMetricV2": [ @@ -122,24 +142,67 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/dreamercms/RemoteFileInclusion-ArticleEditorImageUpload.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.296494", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.296494", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.497602", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24097.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24097.json index 879fa15b117..6ba644ddce1 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24097.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24097.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24097", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:16.213", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:19:20.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to read arbitrary file metadata." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sonoma 14.7.5, iOS 18.4 y iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda leer metadatos de archivos arbitrarios." } ], "metrics": { @@ -47,22 +51,80 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "4574F5B9-8508-4E60-9B09-E6E467A34C1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "8C61CCC2-87D3-4A3A-837B-63C48299A7AD" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122377", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json index 0062318532f..fd26c61462f 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24102.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24102", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:15.807", - "lastModified": "2025-03-19T18:15:24.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T18:19:45.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,77 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.4", + "matchCriteriaId": "27995710-C1F5-4919-8168-E2B59D7F698C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.3", + "matchCriteriaId": "916A9F06-E2B9-496C-A99D-F6509192DFE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.3", + "matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.3", + "matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122067", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122069", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122070", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24148.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24148.json index f8586d298a8..1667b87b1b8 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24148.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24148.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24148", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:16.300", - "lastModified": "2025-04-02T16:17:40.870", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:19:08.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24157.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24157.json index cf18131083b..34ae76f84ab 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24157.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24157.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24157", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:16.397", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:19:04.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination or corrupt kernel memory." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de desbordamiento de b\u00fafer mejorando la gesti\u00f3n de memoria. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda provocar la finalizaci\u00f3n inesperada del sistema o da\u00f1ar la memoria del kernel." } ], "metrics": { @@ -47,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24164.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24164.json index cc023b422fb..4957e93688b 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24164.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24164.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24164", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:16.487", - "lastModified": "2025-04-03T14:15:30.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:19:00.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24167.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24167.json index d5286cbd34a..e59fb6bce0b 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24167.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24167.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24167", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:16.583", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:18:54.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A download's origin may be incorrectly associated." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n del estado. Este problema est\u00e1 corregido en Safari 18.4, iOS 18.4, iPadOS 18.4 y macOS Sequoia 15.4. El origen de una descarga podr\u00eda estar asociado incorrectamente." } ], "metrics": { @@ -35,18 +39,72 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "45D15738-9AE3-4CB5-8755-A67F6E09EAC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122379", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24170.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24170.json index 8ae0a0a563a..72263eddf13 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24170.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24170.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24170", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:16.677", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:18:43.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logic issue was addressed with improved file handling. This issue is fixed in macOS Ventura 13.7.5, macOS Sonoma 14.7.5. An app may be able to gain root privileges." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema l\u00f3gico mejorando la gesti\u00f3n de archivos. Este problema se solucion\u00f3 en macOS Ventura 13.7.5 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n obtenga privilegios de root." } ], "metrics": { @@ -47,14 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24172.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24172.json index 095572f4be9..c982bf67c1a 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24172.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24172.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24172", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:16.773", - "lastModified": "2025-04-02T14:16:04.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:18:26.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24173.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24173.json index 2482c8b4893..e4e9eaa2d4f 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24173.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24173.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24173", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:16.880", - "lastModified": "2025-04-02T16:17:41.033", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:18:17.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,34 +51,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.6", + "matchCriteriaId": "687E67E4-136D-4154-BA6F-5ACA16254023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.4", + "matchCriteriaId": "BAAF5169-C6A9-449A-B41F-2CB1801EBA4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "8C61CCC2-87D3-4A3A-837B-63C48299A7AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4", + "matchCriteriaId": "E82603D7-A630-4B9B-9C51-880667F05EC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122372", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122377", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122378", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24178.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24178.json index ad5968c2d75..4566c98db60 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24178.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24178.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24178", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:16.983", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:17:22.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n del estado. Est\u00e1 corregido en macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas." } ], "metrics": { @@ -35,30 +39,123 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.6", + "matchCriteriaId": "687E67E4-136D-4154-BA6F-5ACA16254023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.4", + "matchCriteriaId": "BAAF5169-C6A9-449A-B41F-2CB1801EBA4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "8C61CCC2-87D3-4A3A-837B-63C48299A7AD" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122372", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122377", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24191.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24191.json index bdd196af6c7..3b89a76bbda 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24191.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24191.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24191", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:17.470", - "lastModified": "2025-04-03T14:15:30.767", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:24:52.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24204.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24204.json index cad4558aaae..24378cd2a2c 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24204.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24204.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24204", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:18.483", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:20:38.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4. An app may be able to access protected user data." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos protegidos del usuario." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24226.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24226.json index e0483f65338..aa1d972ad08 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24226.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24226.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24226", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:19.990", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:21:46.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in Xcode 16.3. A malicious app may be able to access private information." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema se solucion\u00f3 en Xcode 16.3. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a informaci\u00f3n privada." } ], "metrics": { @@ -47,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.3", + "matchCriteriaId": "EBF1CF04-EF61-4499-90E6-EAF48F313E0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122380", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24236.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24236.json index 7fcc2216b9d..01b5463a977 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24236.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24236.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24236", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:20.867", - "lastModified": "2025-04-02T16:17:41.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:11:53.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,48 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24237.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24237.json index e61085800e3..18f4339dd7d 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24237.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24237.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24237", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:20.957", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:11:50.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un desbordamiento de b\u00fafer mejorando la comprobaci\u00f3n de los l\u00edmites. Este problema se solucion\u00f3 en visionOS 2.4, macOS Ventura 13.7.5, iOS 18.4 y iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda provocar el cierre inesperado del sistema." } ], "metrics": { @@ -47,30 +51,106 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.6", + "matchCriteriaId": "687E67E4-136D-4154-BA6F-5ACA16254023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.4", + "matchCriteriaId": "BAAF5169-C6A9-449A-B41F-2CB1801EBA4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "FAFA86AE-8EE9-414C-9FD2-C8551FF2A5CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4", + "matchCriteriaId": "E82603D7-A630-4B9B-9C51-880667F05EC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122372", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122378", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24238.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24238.json index 27ae264b525..e5e731502b7 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24238.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24238.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24238", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:21.060", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:12:14.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain elevated privileges." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema l\u00f3gico mejorando las comprobaciones. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda obtener privilegios elevados." } ], "metrics": { @@ -47,26 +51,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "FAFA86AE-8EE9-414C-9FD2-C8551FF2A5CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "8C61CCC2-87D3-4A3A-837B-63C48299A7AD" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122377", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24239.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24239.json index 19da898ee09..42004573ce2 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24239.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24239.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24239", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:21.157", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:12:32.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A downgrade issue was addressed with additional code-signing restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to access protected user data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de degradaci\u00f3n con restricciones adicionales para la firma de c\u00f3digo. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos protegidos del usuario." } ], "metrics": { @@ -47,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24240.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24240.json index 0a4cc501c8a..44c0f1eea5e 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24240.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24240.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24240", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:21.247", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:12:40.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 una condici\u00f3n de ejecuci\u00f3n con una validaci\u00f3n adicional. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { @@ -47,18 +51,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "FAFA86AE-8EE9-414C-9FD2-C8551FF2A5CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24241.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24241.json index 3a65ca4c48a..26ae1f625ab 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24241.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24241.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24241", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:21.337", - "lastModified": "2025-04-02T14:16:04.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:12:47.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to trick a user into copying sensitive data to the pasteboard." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de configuraci\u00f3n con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda enga\u00f1ar al usuario para que copie datos confidenciales al portapapeles." } ], "metrics": { @@ -47,18 +51,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "FAFA86AE-8EE9-414C-9FD2-C8551FF2A5CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24242.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24242.json index 99053db2535..9ff3cd21262 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24242.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24242.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24242", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:21.433", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:13:00.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.4. An app with root privileges may be able to access private information." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n de enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n con privilegios de root podr\u00eda acceder a informaci\u00f3n privada." } ], "metrics": { @@ -47,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24243.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24243.json index bcc774e280c..e50158802cf 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24243.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24243.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24243", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:21.520", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T17:13:15.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted file may lead to arbitrary code execution." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema est\u00e1 corregido en visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Procesar un archivo malintencionado puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { @@ -47,34 +51,119 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.6", + "matchCriteriaId": "687E67E4-136D-4154-BA6F-5ACA16254023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.4", + "matchCriteriaId": "BAAF5169-C6A9-449A-B41F-2CB1801EBA4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "FAFA86AE-8EE9-414C-9FD2-C8551FF2A5CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "8C61CCC2-87D3-4A3A-837B-63C48299A7AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4", + "matchCriteriaId": "E82603D7-A630-4B9B-9C51-880667F05EC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122372", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122377", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122378", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24245.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24245.json index ff49b1d1ffe..b1486f064e5 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24245.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24245.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24245", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:21.720", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:24:35.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed by adding a delay between verification code attempts. This issue is fixed in macOS Sequoia 15.4. A malicious app may be able to access a user's saved passwords." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 a\u00f1adiendo un retraso entre los intentos de verificaci\u00f3n del c\u00f3digo. Este problema est\u00e1 corregido en macOS Sequoia 15.4. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a las contrase\u00f1as guardadas de un usuario." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24248.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24248.json index c3b813b20e6..47d6b4b6c6b 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24248.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24248.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24248", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:21.993", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:24:20.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to enumerate devices that have signed into the user's Apple Account." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda enumerar los dispositivos que han iniciado sesi\u00f3n en la cuenta Apple del usuario." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24262.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24262.json index 1beee087d19..95d6d7416f7 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24262.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24262.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24262", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:23.150", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:24:08.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15.4. A sandboxed app may be able to access sensitive user data in system logs." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n en un entorno aislado podr\u00eda acceder a datos confidenciales del usuario en los registros del sistema." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24263.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24263.json index fabbfa9f702..292ced31502 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24263.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24263.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24263", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:23.247", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:23:52.100", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed in macOS Sequoia 15.4. An app may be able to observe unprotected user data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de privacidad moviendo datos confidenciales a una ubicaci\u00f3n protegida. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda observar datos de usuario sin protecci\u00f3n." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24264.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24264.json index d915373bc8b..aa2fd591403 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24264.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24264.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24264", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:23.337", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T19:00:46.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema est\u00e1 corregido en visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y Safari 18.4. El procesamiento de contenido web malintencionado puede provocar un bloqueo inesperado de Safari." } ], "metrics": { @@ -47,30 +51,104 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "45D15738-9AE3-4CB5-8755-A67F6E09EAC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.6", + "matchCriteriaId": "687E67E4-136D-4154-BA6F-5ACA16254023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.4", + "matchCriteriaId": "BAAF5169-C6A9-449A-B41F-2CB1801EBA4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "8C61CCC2-87D3-4A3A-837B-63C48299A7AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4", + "matchCriteriaId": "E82603D7-A630-4B9B-9C51-880667F05EC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122372", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122377", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122378", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122379", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24265.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24265.json index bbf04a5dec1..f53690a1c4f 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24265.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24265.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24265", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:23.437", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:58:54.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 una lectura fuera de los l\u00edmites mejorando la comprobaci\u00f3n de los l\u00edmites. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda provocar el cierre inesperado del sistema." } ], "metrics": { @@ -47,18 +51,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "FAFA86AE-8EE9-414C-9FD2-C8551FF2A5CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24266.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24266.json index 0b78438d156..15d3ba191e8 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24266.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24266.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24266", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:23.530", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:55:25.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to cause unexpected system termination." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un desbordamiento de b\u00fafer mejorando la comprobaci\u00f3n de los l\u00edmites. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda provocar el cierre inesperado del sistema." } ], "metrics": { @@ -47,18 +51,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "FAFA86AE-8EE9-414C-9FD2-C8551FF2A5CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24267.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24267.json index 8170c95cf0a..cdeb8cc787c 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24267.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24267.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24267", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:23.623", - "lastModified": "2025-04-02T14:16:05.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:53:03.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n obtenga privilegios de root." } ], "metrics": { @@ -47,18 +51,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "FAFA86AE-8EE9-414C-9FD2-C8551FF2A5CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24269.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24269.json index cd60c5fe625..a158f8a908b 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24269.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24269.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24269", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:23.717", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:23:37.283", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.4. An app may be able to cause unexpected system termination." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda provocar el cierre inesperado del sistema." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24277.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24277.json index 16560d437c6..344411ec2c2 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24277.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24277.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24277", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:24.103", - "lastModified": "2025-04-02T14:16:05.260", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T19:49:08.933", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de an\u00e1lisis en el manejo de rutas de directorio mejorando la validaci\u00f3n de rutas. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda obtener privilegios de root." } ], "metrics": { @@ -47,18 +51,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "FAFA86AE-8EE9-414C-9FD2-C8551FF2A5CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24278.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24278.json index f73e92973a4..d9dcbd3f612 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24278.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24278.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24278", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:24.197", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T19:47:33.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la validaci\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos protegidos del usuario." } ], "metrics": { @@ -47,18 +51,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "FAFA86AE-8EE9-414C-9FD2-C8551FF2A5CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24280.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24280.json index fd00b7708af..62f922f45e8 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24280.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24280.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24280", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:24.383", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T19:46:03.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access user-sensitive data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de acceso con restricciones adicionales en el entorno aislado. Este problema se solucion\u00f3 en macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { @@ -47,14 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24281.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24281.json index 255788b62c2..77f213438e7 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24281.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24281.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24281", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:24.477", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:22:19.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved data protection. This issue is fixed in macOS Sequoia 15.4. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la protecci\u00f3n de datos. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24282.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24282.json index 88288fe638a..03f5550036b 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24282.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24282.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24282", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:24.577", - "lastModified": "2025-04-03T14:15:31.340", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:23:23.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-251xx/CVE-2025-25178.json b/CVE-2025/CVE-2025-251xx/CVE-2025-25178.json new file mode 100644 index 00000000000..2de0d31dbce --- /dev/null +++ b/CVE-2025/CVE-2025-251xx/CVE-2025-25178.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-25178", + "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", + "published": "2025-04-04T16:15:18.170", + "lastModified": "2025-04-04T16:15:18.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to cause kernel system memory corruption." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] + } + ], + "references": [ + { + "url": "https://www.imaginationtech.com/gpu-driver-vulnerabilities/", + "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26817.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26817.json index e66be277644..2fb89f48daa 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26817.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26817.json @@ -2,16 +2,55 @@ "id": "CVE-2025-26817", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T20:15:23.837", - "lastModified": "2025-04-03T20:15:23.837", + "lastModified": "2025-04-04T16:15:18.297", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Netwrix Password Secure 9.2.0.32454 allows OS command injection." + }, + { + "lang": "es", + "value": "Netwrix Password Secure 9.2.0.32454 permite la inyecci\u00f3n de comandos del sistema operativo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://helpcenter.netwrix.com/bundle/PasswordSecure_9.2_ReleaseNotes/resource/Netwrix_PasswordSecure_9.2_BugFixList.pdf", diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26818.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26818.json index 7abafb919eb..1591cb2b369 100644 --- a/CVE-2025/CVE-2025-268xx/CVE-2025-26818.json +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26818.json @@ -2,16 +2,55 @@ "id": "CVE-2025-26818", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T20:15:23.980", - "lastModified": "2025-04-03T20:15:23.980", + "lastModified": "2025-04-04T16:15:18.470", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Netwrix Password Secure through 9.2 allows command injection." + }, + { + "lang": "es", + "value": "Netwrix Password Secure hasta la versi\u00f3n 9.2 permite la inyecci\u00f3n de comandos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://helpcenter.netwrix.com/bundle/PasswordSecure_9.2_ReleaseNotes/resource/Netwrix_PasswordSecure_9.2_BugFixList.pdf", diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29476.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29476.json new file mode 100644 index 00000000000..2690320ffe4 --- /dev/null +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29476.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-29476", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-04T18:15:48.263", + "lastModified": "2025-04-04T18:15:48.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability in compress_chunk_fuzzer with oss-fuzz on commit 16450518afddcb3139de627157208e49bfef6987 in c-blosc2 v.2.17.0 and before." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Blosc/c-blosc2/issues/656", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/lmarch2/poc/blob/main/c-blosk2/c-blosk2.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-294xx/CVE-2025-29477.json b/CVE-2025/CVE-2025-294xx/CVE-2025-29477.json new file mode 100644 index 00000000000..c6557f6ac7a --- /dev/null +++ b/CVE-2025/CVE-2025-294xx/CVE-2025-29477.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29477", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-04T18:15:48.387", + "lastModified": "2025-04-04T18:15:48.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in fluent-bit v.3.7.2 allows a local attacker to cause a denial of service via the function consume_event." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/lmarch2/poc/blob/main/fluent-bit/fluent-bit.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-295xx/CVE-2025-29504.json b/CVE-2025/CVE-2025-295xx/CVE-2025-29504.json index 0958d061179..82943c9a522 100644 --- a/CVE-2025/CVE-2025-295xx/CVE-2025-29504.json +++ b/CVE-2025/CVE-2025-295xx/CVE-2025-29504.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29504", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T20:15:24.560", - "lastModified": "2025-04-03T20:15:24.560", + "lastModified": "2025-04-04T16:15:18.670", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure Permission vulnerability in student-manage 1 allows a local attacker to escalate privileges via the Unsafe permission verification." + }, + { + "lang": "es", + "value": "La vulnerabilidad de permiso inseguro en student-manage 1 permite a un atacante local escalar privilegios a trav\u00e9s de la verificaci\u00f3n de permiso inseguro." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gitee.com/huang-yk/student-manage/issues/IBQ14H", diff --git a/CVE-2025/CVE-2025-296xx/CVE-2025-29647.json b/CVE-2025/CVE-2025-296xx/CVE-2025-29647.json index f26447a5b9c..eb6b437d2f0 100644 --- a/CVE-2025/CVE-2025-296xx/CVE-2025-29647.json +++ b/CVE-2025/CVE-2025-296xx/CVE-2025-29647.json @@ -2,16 +2,55 @@ "id": "CVE-2025-29647", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T19:15:39.580", - "lastModified": "2025-04-03T19:15:39.580", + "lastModified": "2025-04-04T16:15:18.853", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SeaCMS v13.3 has a SQL injection vulnerability in the component admin_tempvideo.php." + }, + { + "lang": "es", + "value": "SeaCMS v13.3 tiene una vulnerabilidad de inyecci\u00f3n SQL en el componente admin_tempvideo.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gitee.com/B00W_NSD/poc/blob/master/seacms13.3-sql/poc.md", diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30370.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30370.json index 88720f4eb97..5ce49812d38 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30370.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30370.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30370", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-03T22:15:21.190", - "lastModified": "2025-04-03T22:15:21.190", + "lastModified": "2025-04-04T19:15:46.557", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "jupyterlab-git is a JupyterLab extension for version control using Git. On many platforms, a third party can create a Git repository under a name that includes a shell command substitution string in the syntax $(). These directory names are allowed in macOS and a majority of Linux distributions. If a user starts jupyter-lab in a parent directory of this inappropriately-named Git repository, opens it, and clicks \"Git > Open Git Repository in Terminal\" from the menu bar, then the injected command is run in the user's shell without the user's permission. This issue is occurring because when that menu entry is clicked, jupyterlab-git opens the terminal and runs cd through the shell to set the current directory. Doing so runs any command substitution strings present in the directory name, which leads to the command injection issue described here. A previous patch provided an incomplete fix. This vulnerability is fixed in 0.51.1." + }, + { + "lang": "es", + "value": "jupyterlab-git es una extensi\u00f3n de JupyterLab para el control de versiones mediante Git. En muchas plataformas, un tercero puede crear un repositorio Git con un nombre que incluya una cadena de sustituci\u00f3n de comandos de shell en la sintaxis $(). Estos nombres de directorio est\u00e1n permitidos en macOS y la mayor\u00eda de las distribuciones de Linux. Si un usuario inicia jupyter-lab en un directorio principal de este repositorio Git con un nombre inapropiado, lo abre y hace clic en \"Git > Abrir repositorio Git en la terminal\" en la barra de men\u00fa, el comando inyectado se ejecuta en la shell del usuario sin su permiso. Este problema se produce porque, al hacer clic en esa entrada del men\u00fa, jupyterlab-git abre la terminal y ejecuta cd en la shell para establecer el directorio actual. Al hacerlo, se ejecuta cualquier cadena de sustituci\u00f3n de comandos presente en el nombre del directorio, lo que provoca el problema de inyecci\u00f3n de comandos descrito aqu\u00ed. Un parche anterior proporcion\u00f3 una soluci\u00f3n incompleta. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 0.51.1. " } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -63,6 +67,10 @@ { "url": "https://github.com/jupyterlab/jupyterlab-git/security/advisories/GHSA-cj5w-8mjf-r5f8", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jupyterlab/jupyterlab-git/security/advisories/GHSA-cj5w-8mjf-r5f8", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30435.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30435.json index eb686f76154..44e7f2f1f6e 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30435.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30435.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30435", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:25.687", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T19:28:07.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.4. A sandboxed app may be able to access sensitive user data in system logs." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la redacci\u00f3n de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n en un entorno aislado podr\u00eda acceder a datos confidenciales del usuario en los registros del sistema." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30437.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30437.json index c757cc34754..50ff2e9f99b 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30437.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30437.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30437", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:25.783", - "lastModified": "2025-04-01T20:26:22.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T19:33:46.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.4. An app may be able to corrupt coprocessor memory." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando las comprobaciones de los l\u00edmites. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda da\u00f1ar la memoria del coprocesador." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30441.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30441.json index cec99fc040f..de5c4317f2e 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30441.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30441.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30441", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:26.083", - "lastModified": "2025-04-01T21:15:44.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T19:40:24.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in Xcode 16.3. An app may be able to overwrite arbitrary files." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n del estado. Se solucion\u00f3 en Xcode 16.3. Una aplicaci\u00f3n podr\u00eda sobrescribir archivos arbitrarios." } ], "metrics": { @@ -47,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.3", + "matchCriteriaId": "EBF1CF04-EF61-4499-90E6-EAF48F313E0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122380", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30451.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30451.json index 8bb0361dc01..30bfece6c46 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30451.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30451.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30451", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:26.743", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T19:41:29.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Sequoia 15.4. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la redacci\u00f3n de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30456.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30456.json index 1e9dc326783..8beaabd0ac7 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30456.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30456.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30456", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:27.120", - "lastModified": "2025-04-03T18:15:45.543", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T18:13:02.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30457.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30457.json index db9cc40a30a..6b919bf2689 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30457.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30457.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30457", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:27.213", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:12:47.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to create symlinks to protected regions of the disk." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la validaci\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n maliciosa podr\u00eda crear enlaces simb\u00f3licos a regiones protegidas del disco." } ], "metrics": { @@ -47,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30458.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30458.json index f0e8e836ef3..b4d7ed8c334 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30458.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30458.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30458", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:27.300", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:12:42.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.4. An app may be able to read files outside of its sandbox." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda leer archivos fuera de su entorno de pruebas." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30460.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30460.json index 67edc4d3191..71722d75d00 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30460.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30460.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30460", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:27.397", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:12:36.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access protected user data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos eliminando c\u00f3digo vulnerable y a\u00f1adiendo comprobaciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos protegidos del usuario." } ], "metrics": { @@ -47,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30461.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30461.json index ad2a6315abd..90176bbecc3 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30461.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30461.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30461", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:27.493", - "lastModified": "2025-04-01T21:15:44.307", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:12:32.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access issue was addressed with additional sandbox restrictions on the system pasteboards. This issue is fixed in macOS Sequoia 15.4. An app may be able to access protected user data." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de acceso con restricciones adicionales de la sandbox en los portapapeles del sistema. Este problema se solucion\u00f3 en macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos protegidos del usuario." } ], "metrics": { @@ -47,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30462.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30462.json index bea7f7fee22..a3411149004 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30462.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30462.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30462", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:27.583", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:12:28.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A library injection issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Apps that appear to use App Sandbox may be able to launch without restrictions." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de inyecci\u00f3n de librer\u00edas con restricciones adicionales. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Las apps que aparentemente usan App Sandbox podr\u00edan iniciarse sin restricciones." } ], "metrics": { @@ -47,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30463.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30463.json index c4211ae43a1..72c87c5c4a3 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30463.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30463.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30463", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:27.687", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:12:18.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved restriction of data container access. This issue is fixed in iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando la restricci\u00f3n del acceso al contenedor de datos. Este problema est\u00e1 corregido en iOS 18.4, iPadOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { @@ -47,14 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30464.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30464.json index d42bcdd065c..f5491844d3b 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30464.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30464.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30464", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:27.777", - "lastModified": "2025-04-03T14:15:33.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:16:18.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30465.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30465.json index 57f709ec600..94168fb4c95 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30465.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30465.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30465", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:27.873", - "lastModified": "2025-04-02T15:15:58.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:16:13.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A permissions issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A shortcut may be able to access files that are normally inaccessible to the Shortcuts app." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de permisos mejorando la validaci\u00f3n. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un acceso directo podr\u00eda acceder a archivos que normalmente no son accesibles desde la app Accesos directos." } ], "metrics": { @@ -47,22 +51,76 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.6", + "matchCriteriaId": "687E67E4-136D-4154-BA6F-5ACA16254023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122372", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30467.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30467.json index 9aec6dab684..e56657257da 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30467.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30467.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30467", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:27.967", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:15:47.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Visiting a malicious website may lead to address bar spoofing." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando las comprobaciones. Este problema est\u00e1 corregido en Safari 18.4, iOS 18.4, iPadOS 18.4 y macOS Sequoia 15.4. Visitar un sitio web malicioso puede provocar la suplantaci\u00f3n de la barra de direcciones." } ], "metrics": { @@ -47,18 +51,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "45D15738-9AE3-4CB5-8755-A67F6E09EAC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4", + "matchCriteriaId": "E3BD0A90-23F1-430A-8119-E14055F7E621" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122379", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30469.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30469.json index cd064fdf9a9..c48631e2351 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30469.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30469.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30469", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:28.107", - "lastModified": "2025-04-02T14:16:13.593", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:15:42.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in iOS 18.4 and iPadOS 18.4. A person with physical access to an iOS device may be able to access photos from the lock screen." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n del estado. Este problema se solucion\u00f3 en iOS 18.4 y iPadOS 18.4. Una persona con acceso f\u00edsico a un dispositivo iOS podr\u00eda acceder a las fotos desde la pantalla de bloqueo." } ], "metrics": { @@ -47,10 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30470.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30470.json index a555efb35e5..8c8c238faff 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30470.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30470.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30470", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:28.247", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:15:36.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path handling issue was addressed with improved logic. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to read sensitive location information." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de gesti\u00f3n de rutas mejorando la l\u00f3gica. Este problema se solucion\u00f3 en visionOS 2.4, macOS Ventura 13.7.5, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial de ubicaci\u00f3n." } ], "metrics": { @@ -47,26 +51,96 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4", + "matchCriteriaId": "E82603D7-A630-4B9B-9C51-880667F05EC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122378", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-304xx/CVE-2025-30471.json b/CVE-2025/CVE-2025-304xx/CVE-2025-30471.json index 86a595777a5..7ff064a9290 100644 --- a/CVE-2025/CVE-2025-304xx/CVE-2025-30471.json +++ b/CVE-2025/CVE-2025-304xx/CVE-2025-30471.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30471", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:28.347", - "lastModified": "2025-04-02T16:17:43.113", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:15:26.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,34 +51,117 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "4574F5B9-8508-4E60-9B09-E6E467A34C1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "8C61CCC2-87D3-4A3A-837B-63C48299A7AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4", + "matchCriteriaId": "E82603D7-A630-4B9B-9C51-880667F05EC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122372", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122377", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122378", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31182.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31182.json index 35ef90e5c2b..de393590a43 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31182.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31182.json @@ -2,13 +2,17 @@ "id": "CVE-2025-31182", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:28.650", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:14:52.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed with improved handling of symlinks. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to delete files for which it does not have permission." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n de enlaces simb\u00f3licos. Este problema est\u00e1 corregido en visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Es posible que una aplicaci\u00f3n pueda eliminar archivos para los que no tiene permiso." } ], "metrics": { @@ -47,30 +51,103 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "8C61CCC2-87D3-4A3A-837B-63C48299A7AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4", + "matchCriteriaId": "E82603D7-A630-4B9B-9C51-880667F05EC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122377", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122378", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31183.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31183.json index 0358c7f5979..3cc709d8e01 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31183.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31183.json @@ -2,13 +2,17 @@ "id": "CVE-2025-31183", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:28.740", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:14:46.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando la restricci\u00f3n del acceso al contenedor de datos. Este problema est\u00e1 corregido en macOS Sonoma 14.7.5, iOS 18.4 y iPadOS 18.4, tvOS 18.4 y macOS Sequoia 15.4. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { @@ -47,22 +51,81 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "4574F5B9-8508-4E60-9B09-E6E467A34C1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "8C61CCC2-87D3-4A3A-837B-63C48299A7AD" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122377", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31187.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31187.json index d6179297a47..1d785d1f413 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31187.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31187.json @@ -2,13 +2,17 @@ "id": "CVE-2025-31187", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:28.943", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:14:40.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to modify protected parts of the file system." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 eliminando el c\u00f3digo vulnerable. Este problema est\u00e1 corregido en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda modificar partes protegidas del sistema de archivos." } ], "metrics": { @@ -47,18 +51,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31191.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31191.json index 90dc0da0d42..307776c80d4 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31191.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31191.json @@ -2,13 +2,17 @@ "id": "CVE-2025-31191", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:29.130", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:14:34.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This issue was addressed through improved state management. This issue is fixed in macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 mejorando la gesti\u00f3n del estado. Est\u00e1 corregido en macOS Ventura 13.7.5, tvOS 18.4, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Una aplicaci\u00f3n podr\u00eda acceder a datos confidenciales del usuario." } ], "metrics": { @@ -47,26 +51,96 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "6B3450F7-7B4A-46CE-A6E0-BBE6569F2EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.4", + "matchCriteriaId": "8C61CCC2-87D3-4A3A-837B-63C48299A7AD" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122371", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122377", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31194.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31194.json index a9944d14b09..a1edaa41d0c 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31194.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31194.json @@ -2,13 +2,17 @@ "id": "CVE-2025-31194", "sourceIdentifier": "product-security@apple.com", "published": "2025-03-31T23:15:29.350", - "lastModified": "2025-04-01T20:26:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T18:14:27.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authentication issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A Shortcut may run with admin privileges without authentication." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de autenticaci\u00f3n mejorando la gesti\u00f3n del estado. Este problema se solucion\u00f3 en macOS Ventura 13.7.5, macOS Sequoia 15.4 y macOS Sonoma 14.7.5. Un acceso directo puede ejecutarse con privilegios de administrador sin autenticaci\u00f3n." } ], "metrics": { @@ -47,18 +51,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.5", + "matchCriteriaId": "345CC17A-CCA4-4B82-A645-A5226A8DAEBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.5", + "matchCriteriaId": "D05DCA25-A1A0-4AEA-9F31-952803114EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.4", + "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122373", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/122374", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] }, { "url": "https://support.apple.com/en-us/122375", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory", + "Release Notes" + ] } - ] + ], + "evaluatorComment": "ept the " } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3184.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3184.json index 29138463bde..1d6abfa2820 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3184.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3184.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3184", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T23:15:38.170", - "lastModified": "2025-04-03T23:15:38.170", + "lastModified": "2025-04-04T18:15:48.497", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in projectworlds Online Doctor Appointment Booking System 1.0 and classified as critical. This issue affects some unknown processing of the file /patient/profile.php?patientId=1. The manipulation of the argument patientFirstName leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en projectworlds Online Doctor Appointment Booking System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /patient/profile.php?patientId=1. La manipulaci\u00f3n del argumento patientFirstName provoca una inyecci\u00f3n SQL. El ataque puede iniciarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.543844", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/p1026/CVE/issues/18", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3185.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3185.json index 1fff6ae8cd6..900c5951319 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3185.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3185.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3185", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T23:15:38.350", - "lastModified": "2025-04-03T23:15:38.350", + "lastModified": "2025-04-04T18:15:48.630", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in projectworlds Online Doctor Appointment Booking System 1.0. It has been classified as critical. Affected is an unknown function of the file /patient/patientupdateprofile.php. The manipulation of the argument patientFirstName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en projectworlds Online Doctor Appointment Booking System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /patient/patientupdateprofile.php. La manipulaci\u00f3n del argumento patientFirstName provoca una inyecci\u00f3n SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Otros par\u00e1metros tambi\u00e9n podr\u00edan verse afectados." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.543845", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/p1026/CVE/issues/19", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3186.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3186.json index de16a4674de..35ef26e13ea 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3186.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3186.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3186", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-04T00:15:15.347", - "lastModified": "2025-04-04T00:15:15.347", + "lastModified": "2025-04-04T18:15:48.747", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in projectworlds Online Doctor Appointment Booking System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /patient/invoice.php. The manipulation of the argument appid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en projectworlds Online Doctor Appointment Booking System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /patient/invoice.php. La manipulaci\u00f3n del argumento appid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.543846", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/p1026/CVE/issues/20", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32112.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32112.json new file mode 100644 index 00000000000..3cb56b90729 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32112.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32112", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:19.123", + "lastModified": "2025-04-04T16:15:19.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in OTWthemes Sidebar Manager Light allows Cross Site Request Forgery. This issue affects Sidebar Manager Light: from n/a through 1.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sidebar-manager-light/vulnerability/wordpress-sidebar-manager-light-plugin-1-1-8-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32113.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32113.json new file mode 100644 index 00000000000..c1afe5f6855 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32113.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32113", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:19.270", + "lastModified": "2025-04-04T16:15:19.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Renzo Tejada Libro de Reclamaciones y Quejas allows Cross Site Request Forgery. This issue affects Libro de Reclamaciones y Quejas: from n/a through 0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/libro-de-reclamaciones-y-quejas/vulnerability/wordpress-libro-de-reclamaciones-y-quejas-plugin-0-9-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32118.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32118.json new file mode 100644 index 00000000000..d42ad20d80e --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32118.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32118", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:19.413", + "lastModified": "2025-04-04T16:15:19.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in NiteoThemes CMP \u2013 Coming Soon & Maintenance allows Using Malicious Files. This issue affects CMP \u2013 Coming Soon & Maintenance: from n/a through 4.1.13." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cmp-coming-soon-maintenance/vulnerability/wordpress-cmp-coming-soon-maintenance-plugin-4-1-13-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32120.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32120.json new file mode 100644 index 00000000000..39838bd08e7 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32120.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32120", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:19.567", + "lastModified": "2025-04-04T16:15:19.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Erick Danzer Easy Query \u2013 WP Query Builder allows Blind SQL Injection. This issue affects Easy Query \u2013 WP Query Builder: from n/a through 2.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-query/vulnerability/wordpress-easy-query-wp-query-builder-2-0-4-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32121.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32121.json new file mode 100644 index 00000000000..a70fa838ad2 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32121.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32121", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:19.710", + "lastModified": "2025-04-04T16:15:19.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SuitePlugins Video & Photo Gallery for Ultimate Member allows SQL Injection. This issue affects Video & Photo Gallery for Ultimate Member: from n/a through 1.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gallery-for-ultimate-member/vulnerability/wordpress-video-photo-gallery-for-ultimate-member-plugin-1-1-3-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32122.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32122.json new file mode 100644 index 00000000000..78538d59d52 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32122.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32122", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:19.873", + "lastModified": "2025-04-04T16:15:19.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Stylemix uListing allows Blind SQL Injection. This issue affects uListing: from n/a through 2.1.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ulisting/vulnerability/wordpress-ulisting-plugin-2-1-9-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32124.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32124.json new file mode 100644 index 00000000000..934d621b900 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32124.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32124", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:20.027", + "lastModified": "2025-04-04T16:15:20.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in eleopard Behance Portfolio Manager allows Blind SQL Injection. This issue affects Behance Portfolio Manager: from n/a through 1.7.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/portfolio-manager-powered-by-behance/vulnerability/wordpress-behance-portfolio-manager-plugin-1-7-4-sql-injection-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32125.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32125.json new file mode 100644 index 00000000000..215faa5c31d --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32125.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32125", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:20.177", + "lastModified": "2025-04-04T16:15:20.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in silvasoft Silvasoft boekhouden allows SQL Injection. This issue affects Silvasoft boekhouden: from n/a through 3.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/silvasoft-boekhouden/vulnerability/wordpress-silvasoft-boekhouden-plugin-3-0-1-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32126.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32126.json new file mode 100644 index 00000000000..da54c79ddb3 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32126.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32126", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:20.323", + "lastModified": "2025-04-04T16:15:20.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in cmsMinds Pay with Contact Form 7 allows SQL Injection. This issue affects Pay with Contact Form 7: from n/a through 1.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pay-with-contact-form-7/vulnerability/wordpress-pay-with-contact-form-7-plugin-1-0-4-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32127.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32127.json new file mode 100644 index 00000000000..8f9ede54299 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32127.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32127", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:20.483", + "lastModified": "2025-04-04T16:15:20.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in onOffice GmbH onOffice for WP-Websites allows SQL Injection. This issue affects onOffice for WP-Websites: from n/a through 5.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/onoffice-for-wp-websites/vulnerability/wordpress-onoffice-for-wp-websites-plugin-5-7-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32129.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32129.json new file mode 100644 index 00000000000..a54d3d306c2 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32129.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32129", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:20.633", + "lastModified": "2025-04-04T16:15:20.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Data443 Risk Migitation, Inc. Welcome Bar allows Stored XSS. This issue affects Welcome Bar: from n/a through 2.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/intelly-welcome-bar/vulnerability/wordpress-welcome-bar-plugin-2-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32130.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32130.json new file mode 100644 index 00000000000..7e9025b3f43 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32130.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32130", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:20.783", + "lastModified": "2025-04-04T16:15:20.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Data443 Risk Migitation, Inc. Posts Footer Manager allows Stored XSS. This issue affects Posts Footer Manager: from n/a through 2.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/intelly-posts-footer-manager/vulnerability/wordpress-posts-footer-manager-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32131.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32131.json new file mode 100644 index 00000000000..3a8a7a160ba --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32131.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32131", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:20.940", + "lastModified": "2025-04-04T16:15:20.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in socialintents Social Intents allows Stored XSS. This issue affects Social Intents: from n/a through 1.6.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/live-chat-support-by-social-intents/vulnerability/wordpress-social-intents-plugin-1-6-14-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32132.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32132.json new file mode 100644 index 00000000000..76fcfe57844 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32132.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32132", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:21.100", + "lastModified": "2025-04-04T16:15:21.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FunnelCockpit FunnelCockpit allows Stored XSS. This issue affects FunnelCockpit: from n/a through 1.4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/funnelcockpit/vulnerability/wordpress-funnelcockpit-plugin-1-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32133.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32133.json new file mode 100644 index 00000000000..1132cb2e927 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32133.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32133", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:21.270", + "lastModified": "2025-04-04T16:15:21.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ays Pro Secure Copy Content Protection and Content Locking allows Stored XSS. This issue affects Secure Copy Content Protection and Content Locking: from n/a through 4.5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/secure-copy-content-protection/vulnerability/wordpress-secure-copy-content-protection-and-content-locking-plugin-4-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32134.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32134.json new file mode 100644 index 00000000000..7d2f5517141 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32134.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32134", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:21.417", + "lastModified": "2025-04-04T16:15:21.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in KaizenCoders URL Shortify allows Stored XSS. This issue affects URL Shortify: from n/a through 1.10.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/url-shortify/vulnerability/wordpress-url-shortify-plugin-1-10-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32135.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32135.json new file mode 100644 index 00000000000..139c7b0215f --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32135.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32135", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:21.573", + "lastModified": "2025-04-04T16:15:21.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in rocketelements Split Test For Elementor allows Stored XSS. This issue affects Split Test For Elementor: from n/a through 1.8.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/split-test-for-elementor/vulnerability/wordpress-split-test-for-elementor-plugin-1-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32136.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32136.json new file mode 100644 index 00000000000..d2befd9f218 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32136.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32136", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:21.723", + "lastModified": "2025-04-04T16:15:21.723", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in activecampaign ActiveCampaign allows Stored XSS. This issue affects ActiveCampaign: from n/a through 8.1.16." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/activecampaign-subscription-forms/vulnerability/wordpress-activecampaign-plugin-8-1-16-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32137.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32137.json new file mode 100644 index 00000000000..09aa4968e65 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32137.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32137", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:21.883", + "lastModified": "2025-04-04T16:15:21.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Relative Path Traversal vulnerability in Cristi\u00e1n L\u00e1vaque s2Member allows Path Traversal. This issue affects s2Member: from n/a through 250214." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/s2member/vulnerability/wordpress-s2member-plugin-250214-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32138.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32138.json new file mode 100644 index 00000000000..ae68412d56e --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32138.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32138", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:22.060", + "lastModified": "2025-04-04T16:15:22.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Restriction of XML External Entity Reference vulnerability in supsystic Easy Google Maps allows XML Injection. This issue affects Easy Google Maps: from n/a through 1.11.17." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/google-maps-easy/vulnerability/wordpress-easy-google-maps-plugin-1-11-17-xml-external-entity-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32141.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32141.json new file mode 100644 index 00000000000..90a718a3fde --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32141.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32141", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:22.223", + "lastModified": "2025-04-04T16:15:22.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Stylemix MasterStudy LMS allows PHP Local File Inclusion. This issue affects MasterStudy LMS: from n/a through 3.5.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/masterstudy-lms-learning-management-system/vulnerability/wordpress-masterstudy-lms-plugin-3-5-23-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32142.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32142.json new file mode 100644 index 00000000000..83d7e7978c5 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32142.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32142", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:22.403", + "lastModified": "2025-04-04T16:15:22.403", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Stylemix Motors allows PHP Local File Inclusion. This issue affects Motors: from n/a through 1.4.65." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/motors-car-dealership-classified-listings/vulnerability/wordpress-motors-plugin-1-4-65-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32146.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32146.json new file mode 100644 index 00000000000..7f79c58bcab --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32146.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32146", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:22.573", + "lastModified": "2025-04-04T16:15:22.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky JS Job Manager allows PHP Local File Inclusion. This issue affects JS Job Manager: from n/a through 2.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/js-jobs/vulnerability/wordpress-js-job-manager-plugin-2-0-2-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32147.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32147.json new file mode 100644 index 00000000000..13215fb3178 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32147.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32147", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:22.740", + "lastModified": "2025-04-04T16:15:22.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in coothemes Easy WP Optimizer allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Easy WP Optimizer: from n/a through 1.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-wp-optimizer/vulnerability/wordpress-easy-wp-optimizer-plugin-1-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32148.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32148.json new file mode 100644 index 00000000000..731c8c8c40e --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32148.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32148", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:22.900", + "lastModified": "2025-04-04T16:15:22.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Daisycon Daisycon prijsvergelijkers allows SQL Injection. This issue affects Daisycon prijsvergelijkers: from n/a through 4.8.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/daisycon/vulnerability/wordpress-daisycon-prijsvergelijkers-plugin-4-8-4-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32149.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32149.json new file mode 100644 index 00000000000..5ad500708e2 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32149.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32149", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:23.057", + "lastModified": "2025-04-04T16:15:23.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in winkm89 teachPress allows SQL Injection. This issue affects teachPress: from n/a through 9.0.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/teachpress/vulnerability/wordpress-teachpress-plugin-9-0-11-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32150.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32150.json new file mode 100644 index 00000000000..5e83f026f90 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32150.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32150", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:23.213", + "lastModified": "2025-04-04T16:15:23.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Rameez Iqbal Real Estate Manager allows PHP Local File Inclusion. This issue affects Real Estate Manager: from n/a through 7.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/real-estate-manager/vulnerability/wordpress-real-estate-manager-plugin-7-3-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32151.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32151.json new file mode 100644 index 00000000000..dd723be7e0d --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32151.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32151", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:23.370", + "lastModified": "2025-04-04T16:15:23.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Sven Lehnert BuddyForms allows PHP Local File Inclusion. This issue affects BuddyForms: from n/a through 2.8.15." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/buddyforms/vulnerability/wordpress-buddyforms-plugin-2-8-15-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32152.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32152.json new file mode 100644 index 00000000000..5f58b182a81 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32152.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32152", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:23.533", + "lastModified": "2025-04-04T16:15:23.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Essential Plugins by WP OnlineSupport Slider a SlidersPack allows PHP Local File Inclusion. This issue affects Slider a SlidersPack: from n/a through 2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sliderspack-all-in-one-image-sliders/vulnerability/wordpress-slider-a-sliderspack-plugin-2-3-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32153.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32153.json new file mode 100644 index 00000000000..7a790c81565 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32153.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32153", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:23.687", + "lastModified": "2025-04-04T16:15:23.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in vinagecko VG WooCarousel allows PHP Local File Inclusion. This issue affects VG WooCarousel: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/vg-woocarousel/vulnerability/wordpress-vg-woocarousel-plugin-1-3-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32154.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32154.json new file mode 100644 index 00000000000..6ee8e233d1a --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32154.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32154", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:23.833", + "lastModified": "2025-04-04T16:15:23.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Catch Themes Catch Dark Mode allows PHP Local File Inclusion. This issue affects Catch Dark Mode: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/catch-dark-mode/vulnerability/wordpress-catch-dark-mode-plugin-1-2-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32155.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32155.json new file mode 100644 index 00000000000..1524c08f9a9 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32155.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32155", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:23.997", + "lastModified": "2025-04-04T16:15:23.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in markkinchin Beds24 Online Booking allows PHP Local File Inclusion. This issue affects Beds24 Online Booking: from n/a through 2.0.26." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/beds24-online-booking/vulnerability/wordpress-beds24-online-booking-plugin-2-0-26-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32156.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32156.json new file mode 100644 index 00000000000..6219fa62259 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32156.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32156", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:24.147", + "lastModified": "2025-04-04T16:15:24.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Alex Prokopenko / JustCoded Just Post Preview Widget allows PHP Local File Inclusion. This issue affects Just Post Preview Widget: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/just-post-preview/vulnerability/wordpress-just-post-preview-widget-plugin-1-1-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32157.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32157.json new file mode 100644 index 00000000000..1ea0f79412b --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32157.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32157", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:24.300", + "lastModified": "2025-04-04T16:15:24.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Jakub Glos Sparkle Elementor Kit allows PHP Local File Inclusion. This issue affects Sparkle Elementor Kit: from n/a through 2.0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sparkle-elementor-kit/vulnerability/wordpress-sparkle-elementor-kit-plugin-2-0-9-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32159.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32159.json new file mode 100644 index 00000000000..e062a60ce8d --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32159.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32159", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:24.457", + "lastModified": "2025-04-04T16:15:24.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Radius Blocks allows PHP Local File Inclusion. This issue affects Radius Blocks: from n/a through 2.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/radius-blocks/vulnerability/wordpress-radius-blocks-plugin-2-2-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32161.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32161.json new file mode 100644 index 00000000000..ddfbe3d0ba6 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32161.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32161", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:24.603", + "lastModified": "2025-04-04T16:15:24.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ryo Arkhe Blocks allows Stored XSS. This issue affects Arkhe Blocks: from n/a through 2.27.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/arkhe-blocks/vulnerability/wordpress-arkhe-blocks-2-27-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32162.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32162.json new file mode 100644 index 00000000000..0e262e47d65 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32162.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32162", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:24.760", + "lastModified": "2025-04-04T16:15:24.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Morgan Kay Chamber Dashboard Business Directory allows DOM-Based XSS. This issue affects Chamber Dashboard Business Directory: from n/a through 3.3.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/chamber-dashboard-business-directory/vulnerability/wordpress-chamber-dashboard-business-directory-plugin-3-3-11-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32163.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32163.json new file mode 100644 index 00000000000..cb24ed50225 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32163.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32163", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:24.917", + "lastModified": "2025-04-04T16:15:24.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xpro Xpro Elementor Addons allows Stored XSS. This issue affects Xpro Elementor Addons: from n/a through 1.4.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/xpro-elementor-addons/vulnerability/wordpress-xpro-elementor-addons-plugin-1-4-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32165.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32165.json new file mode 100644 index 00000000000..51b30af53f1 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32165.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32165", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:25.070", + "lastModified": "2025-04-04T16:15:25.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fromdoppler Doppler Forms allows Stored XSS. This issue affects Doppler Forms: from n/a through 2.4.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/doppler-form/vulnerability/wordpress-doppler-forms-plugin-2-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32166.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32166.json new file mode 100644 index 00000000000..2f5cf5d7469 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32166.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32166", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:25.217", + "lastModified": "2025-04-04T16:15:25.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in John Housholder Emma for WordPress allows Stored XSS. This issue affects Emma for WordPress: from n/a through 1.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/emma-emarketing-plugin/vulnerability/wordpress-emma-for-wordpress-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32167.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32167.json new file mode 100644 index 00000000000..7a0f6850981 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32167.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32167", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:25.370", + "lastModified": "2025-04-04T16:15:25.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in devsoftbaltic SurveyJS allows Stored XSS. This issue affects SurveyJS: from n/a through 1.12.20." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/surveyjs/vulnerability/wordpress-surveyjs-plugin-1-12-20-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32168.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32168.json new file mode 100644 index 00000000000..248fa7ba7ed --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32168.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32168", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:25.527", + "lastModified": "2025-04-04T16:15:25.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeYatri Gutenify allows Stored XSS. This issue affects Gutenify: from n/a through 1.4.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gutenify/vulnerability/wordpress-gutenify-plugin-1-4-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32169.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32169.json new file mode 100644 index 00000000000..dc6b6e5ea9a --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32169.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32169", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:25.683", + "lastModified": "2025-04-04T16:15:25.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Suresh Prasad Showeblogin Social allows DOM-Based XSS. This issue affects Showeblogin Social: from n/a through 7.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/showeblogin-facebook-page-like-box/vulnerability/wordpress-showeblogin-social-plugin-7-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32170.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32170.json new file mode 100644 index 00000000000..a54dd5bc907 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32170.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32170", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:25.847", + "lastModified": "2025-04-04T16:15:25.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stylemix Motors allows Stored XSS. This issue affects Motors: from n/a through 1.4.65." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/motors-car-dealership-classified-listings/vulnerability/wordpress-motors-plugin-1-4-65-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32171.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32171.json new file mode 100644 index 00000000000..d9eccb3b820 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32171.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32171", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:26.017", + "lastModified": "2025-04-04T16:15:26.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Imtiaz Rayhan Table Block by Tableberg allows Stored XSS. This issue affects Table Block by Tableberg: from n/a through 0.6.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/tableberg/vulnerability/wordpress-table-block-by-tableberg-best-wordpress-table-plugin-plugin-0-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32172.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32172.json new file mode 100644 index 00000000000..abf1132df10 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32172.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32172", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:26.173", + "lastModified": "2025-04-04T16:15:26.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yuri Baranov YaMaps for WordPress allows Stored XSS. This issue affects YaMaps for WordPress: from n/a through 0.6.31." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/yamaps/vulnerability/wordpress-yamaps-for-wordpress-plugin-0-6-31-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32173.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32173.json new file mode 100644 index 00000000000..433abe7bcc2 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32173.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32173", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:26.343", + "lastModified": "2025-04-04T16:15:26.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins B Blocks - The ultimate block collection allows Stored XSS. This issue affects B Blocks - The ultimate block collection: from n/a through 2.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/b-blocks/vulnerability/wordpress-b-blocks-the-ultimate-block-collection-plugin-2-0-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32174.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32174.json new file mode 100644 index 00000000000..131e06ec1f4 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32174.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32174", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:26.500", + "lastModified": "2025-04-04T16:15:26.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tockify Tockify Events Calendar allows DOM-Based XSS. This issue affects Tockify Events Calendar: from n/a through 2.2.13." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/tockify-events-calendar/vulnerability/wordpress-tockify-events-calendar-plugin-2-2-13-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32175.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32175.json new file mode 100644 index 00000000000..688da99ea2a --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32175.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32175", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:26.660", + "lastModified": "2025-04-04T16:15:26.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vektor,Inc. VK Filter Search allows Stored XSS. This issue affects VK Filter Search: from n/a through 2.14.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/vk-filter-search/vulnerability/wordpress-vk-filter-search-plugin-2-14-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32176.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32176.json new file mode 100644 index 00000000000..d449c0db994 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32176.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32176", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:26.817", + "lastModified": "2025-04-04T16:15:26.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GalleryCreator Gallery Blocks with Lightbox allows Stored XSS. This issue affects Gallery Blocks with Lightbox: from n/a through 3.2.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simply-gallery-block/vulnerability/wordpress-gallery-blocks-with-lightbox-plugin-3-2-5-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32177.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32177.json new file mode 100644 index 00000000000..e10cd1b62a9 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32177.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32177", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:26.993", + "lastModified": "2025-04-04T16:15:26.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in pgn4web Embed Chessboard allows Stored XSS. This issue affects Embed Chessboard: from n/a through 3.07.00." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/embed-chessboard/vulnerability/wordpress-embed-chessboard-plugin-3-07-00-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32178.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32178.json new file mode 100644 index 00000000000..6f69dab6642 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32178.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32178", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:27.173", + "lastModified": "2025-04-04T16:15:27.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in 6Storage 6Storage Rentals allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects 6Storage Rentals: from n/a through 2.18.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/6storage-rentals/vulnerability/wordpress-6storage-rentals-plugin-2-18-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32179.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32179.json new file mode 100644 index 00000000000..4cf33dae15e --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32179.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32179", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:27.327", + "lastModified": "2025-04-04T16:15:27.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in icopydoc Maps for WP allows Stored XSS. This issue affects Maps for WP: from n/a through 1.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/maps-for-wp/vulnerability/wordpress-maps-for-wp-plugin-1-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32181.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32181.json new file mode 100644 index 00000000000..f0a1c30d75e --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32181.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32181", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:27.477", + "lastModified": "2025-04-04T16:15:27.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fast Simon Search, Filters & Merchandising for WooCommerce allows Stored XSS. This issue affects Search, Filters & Merchandising for WooCommerce: from n/a through 3.0.57." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/instantsearch-for-woocommerce/vulnerability/wordpress-search-filters-merchandising-for-woocommerce-plugin-3-0-57-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32182.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32182.json new file mode 100644 index 00000000000..8175f25d1c8 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32182.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32182", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:27.623", + "lastModified": "2025-04-04T16:15:27.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Spider Themes Spider Elements \u2013 Addons for Elementor allows Stored XSS. This issue affects Spider Elements \u2013 Addons for Elementor: from n/a through 1.6.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/spider-elements/vulnerability/wordpress-spider-elements-addons-for-elementor-plugin-1-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32183.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32183.json new file mode 100644 index 00000000000..318dc2a5564 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32183.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32183", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:27.770", + "lastModified": "2025-04-04T16:15:27.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Galaxy Weblinks Video Playlist For YouTube allows Stored XSS. This issue affects Video Playlist For YouTube: from n/a through 6.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/video-playlist-for-youtube/vulnerability/wordpress-video-playlist-for-youtube-plugin-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32184.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32184.json new file mode 100644 index 00000000000..baf388c8cba --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32184.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32184", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:27.930", + "lastModified": "2025-04-04T16:15:27.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bdthemes Ultimate Store Kit Elementor Addons allows Stored XSS. This issue affects Ultimate Store Kit Elementor Addons: from n/a through 2.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ultimate-store-kit/vulnerability/wordpress-ultimate-store-kit-elementor-addons-plugin-2-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32185.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32185.json new file mode 100644 index 00000000000..ad4865748e2 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32185.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32185", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:28.083", + "lastModified": "2025-04-04T16:15:28.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Extend Themes Colibri Page Builder allows Stored XSS. This issue affects Colibri Page Builder: from n/a through 1.0.319." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/colibri-page-builder/vulnerability/wordpress-colibri-page-builder-plugin-1-0-319-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32186.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32186.json new file mode 100644 index 00000000000..9a78e485c27 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32186.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32186", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:28.243", + "lastModified": "2025-04-04T16:15:28.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Turbo Addons Turbo Addons for Elementor allows DOM-Based XSS. This issue affects Turbo Addons for Elementor: from n/a through 1.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/turbo-addons-elementor/vulnerability/wordpress-turbo-addons-for-elementor-plugin-1-7-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32187.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32187.json new file mode 100644 index 00000000000..1f3e8eddecf --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32187.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32187", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:28.407", + "lastModified": "2025-04-04T16:15:28.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Qu\u00fd L\u00ea 91 Administrator Z allows DOM-Based XSS. This issue affects Administrator Z: from n/a through 2025.03.04." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/administrator-z/vulnerability/wordpress-administrator-z-plugin-2025-03-04-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32188.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32188.json new file mode 100644 index 00000000000..1ff98670035 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32188.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32188", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:28.557", + "lastModified": "2025-04-04T16:15:28.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ILLID Advanced Woo Labels allows Stored XSS. This issue affects Advanced Woo Labels: from n/a through 2.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/advanced-woo-labels/vulnerability/wordpress-advanced-woo-labels-plugin-2-14-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32189.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32189.json new file mode 100644 index 00000000000..dae3159866b --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32189.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32189", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:28.717", + "lastModified": "2025-04-04T16:15:28.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Best WP Developer BWD Elementor Addons allows DOM-Based XSS. This issue affects BWD Elementor Addons: from n/a through 4.3.20." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bwd-elementor-addons/vulnerability/wordpress-bwd-elementor-addons-plugin-4-3-20-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32190.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32190.json new file mode 100644 index 00000000000..dbd5952383f --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32190.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32190", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:28.897", + "lastModified": "2025-04-04T16:15:28.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in smartwpress Musician's Pack for Elementor allows DOM-Based XSS. This issue affects Musician's Pack for Elementor: from n/a through 1.8.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/music-pack-for-elementor/vulnerability/wordpress-musician-s-pack-for-elementor-plugin-1-8-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32191.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32191.json new file mode 100644 index 00000000000..37e091b8d4f --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32191.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32191", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:29.040", + "lastModified": "2025-04-04T16:15:29.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webangon News Element Elementor Blog Magazine allows DOM-Based XSS. This issue affects News Element Elementor Blog Magazine: from n/a through 1.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/news-element/vulnerability/wordpress-news-element-elementor-blog-magazine-plugin-1-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32192.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32192.json new file mode 100644 index 00000000000..ea52429775a --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32192.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32192", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:29.187", + "lastModified": "2025-04-04T16:15:29.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in UltraPress Ultra Addons Lite for Elementor allows Stored XSS. This issue affects Ultra Addons Lite for Elementor: from n/a through 1.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ut-elementor-addons-lite/vulnerability/wordpress-ultra-addons-lite-for-elementor-plugin-1-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32193.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32193.json new file mode 100644 index 00000000000..7ebfb63b6ec --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32193.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32193", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:29.343", + "lastModified": "2025-04-04T16:15:29.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMinds Simple WP Events allows Stored XSS. This issue affects Simple WP Events: from n/a through 1.8.17." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-wp-events/vulnerability/wordpress-simple-wp-events-plugin-1-8-17-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32194.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32194.json new file mode 100644 index 00000000000..5392a218729 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32194.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32194", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:29.490", + "lastModified": "2025-04-04T16:15:29.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LA-Studio LA-Studio Element Kit for Elementor allows Stored XSS. This issue affects LA-Studio Element Kit for Elementor: from n/a through 1.4.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/lastudio-element-kit/vulnerability/wordpress-la-studio-element-kit-for-elementor-plugin-1-4-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32195.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32195.json new file mode 100644 index 00000000000..1ec04b53b84 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32195.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32195", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:29.640", + "lastModified": "2025-04-04T16:15:29.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ecwid by Lightspeed Ecommerce Shopping Cart Ecwid Shopping Cart allows Stored XSS. This issue affects Ecwid Shopping Cart: from n/a through 7.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ecwid-shopping-cart/vulnerability/wordpress-ecwid-shopping-cart-plugin-7-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32196.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32196.json new file mode 100644 index 00000000000..3907ede5d21 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32196.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32196", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:29.790", + "lastModified": "2025-04-04T16:15:29.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in blazethemes News Kit Elementor Addons allows Stored XSS. This issue affects News Kit Elementor Addons: from n/a through 1.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/news-kit-elementor-addons/vulnerability/wordpress-news-kit-elementor-addons-plugin-1-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-321xx/CVE-2025-32197.json b/CVE-2025/CVE-2025-321xx/CVE-2025-32197.json new file mode 100644 index 00000000000..686b15f1b75 --- /dev/null +++ b/CVE-2025/CVE-2025-321xx/CVE-2025-32197.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32197", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:29.953", + "lastModified": "2025-04-04T16:15:29.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in piotnetdotcom Piotnet Addons For Elementor allows Stored XSS. This issue affects Piotnet Addons For Elementor: from n/a through 2.4.34." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/piotnet-addons-for-elementor/vulnerability/wordpress-piotnet-addons-for-elementor-plugin-2-4-34-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32200.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32200.json new file mode 100644 index 00000000000..e173821d834 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32200.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32200", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:30.107", + "lastModified": "2025-04-04T16:15:30.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Nikita Advanced WordPress Backgrounds allows Code Injection. This issue affects Advanced WordPress Backgrounds: from n/a through 1.12.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/advanced-backgrounds/vulnerability/wordpress-advanced-wordpress-backgrounds-plugin-1-12-4-content-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32201.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32201.json new file mode 100644 index 00000000000..b636f3d9935 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32201.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32201", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:30.253", + "lastModified": "2025-04-04T16:15:30.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Xpro Xpro Theme Builder allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Xpro Theme Builder: from n/a through 1.2.8.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/xpro-theme-builder/vulnerability/wordpress-xpro-theme-builder-plugin-1-2-8-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32203.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32203.json new file mode 100644 index 00000000000..7e35e31ee7b --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32203.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32203", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:30.407", + "lastModified": "2025-04-04T16:15:30.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in manu225 Falling things allows SQL Injection. This issue affects Falling things: from n/a through 1.08." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/falling-things/vulnerability/wordpress-falling-things-plugin-1-08-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32204.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32204.json new file mode 100644 index 00000000000..221c562123f --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32204.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32204", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:30.560", + "lastModified": "2025-04-04T16:15:30.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in rocketelements Split Test For Elementor allows SQL Injection. This issue affects Split Test For Elementor: from n/a through 1.8.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/split-test-for-elementor/vulnerability/wordpress-split-test-for-elementor-plugin-1-8-2-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32207.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32207.json new file mode 100644 index 00000000000..8c4a9798413 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32207.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32207", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:30.713", + "lastModified": "2025-04-04T16:15:30.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Anzar Ahmed Ni WooCommerce Cost Of Goods allows Stored XSS. This issue affects Ni WooCommerce Cost Of Goods: from n/a through 3.2.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ni-woocommerce-cost-of-goods/vulnerability/wordpress-ni-woocommerce-cost-of-goods-plugin-3-2-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32217.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32217.json new file mode 100644 index 00000000000..751639a025c --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32217.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32217", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:30.873", + "lastModified": "2025-04-04T16:15:30.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WP Messiah Ai Image Alt Text Generator for WP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ai Image Alt Text Generator for WP: from n/a through 1.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ai-image-alt-text-generator-for-wp/vulnerability/wordpress-ai-image-alt-text-generator-for-wp-plugin-1-0-8-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32218.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32218.json new file mode 100644 index 00000000000..b945bb1e845 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32218.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32218", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:31.043", + "lastModified": "2025-04-04T16:15:31.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in RealMag777 TableOn \u2013 WordPress Posts Table Filterable allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects TableOn \u2013 WordPress Posts Table Filterable: from n/a through 1.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/posts-table-filterable/vulnerability/wordpress-tableon-wordpress-posts-table-filterable-plugin-1-0-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32219.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32219.json new file mode 100644 index 00000000000..d5054e61902 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32219.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32219", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:31.200", + "lastModified": "2025-04-04T16:15:31.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Syntactics, Inc. eaSYNC allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects eaSYNC: from n/a through 1.3.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easync-booking/vulnerability/wordpress-easync-plugin-1-3-19-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32220.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32220.json new file mode 100644 index 00000000000..78cbb8e6c2b --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32220.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32220", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:31.357", + "lastModified": "2025-04-04T16:15:31.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Dimitri Grassi Salon booking system allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Salon booking system: from n/a through 10.10.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/salon-booking-system/vulnerability/wordpress-salon-booking-system-plugin-10-10-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32224.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32224.json new file mode 100644 index 00000000000..4fdadf9525a --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32224.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32224", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:31.530", + "lastModified": "2025-04-04T16:15:31.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in shivammani Privyr CRM allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Privyr CRM: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/privy-crm-integration/vulnerability/wordpress-privyr-crm-plugin-1-0-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32225.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32225.json new file mode 100644 index 00000000000..50d211f7a90 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32225.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32225", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:31.703", + "lastModified": "2025-04-04T16:15:31.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WP Event Manager WP Event Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Event Manager: from n/a through 3.1.47." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-event-manager/vulnerability/wordpress-wp-event-manager-plugin-3-1-47-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32226.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32226.json new file mode 100644 index 00000000000..7a0056ae4d9 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32226.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32226", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:31.863", + "lastModified": "2025-04-04T16:15:31.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Anzar Ahmed Display product variations dropdown on shop page allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Display product variations dropdown on shop page: from n/a through 1.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/display-product-variations-dropdown-on-shop-page/vulnerability/wordpress-display-product-variations-dropdown-on-shop-page-plugin-1-1-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32229.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32229.json new file mode 100644 index 00000000000..f1b0e99c6ee --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32229.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32229", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:32.040", + "lastModified": "2025-04-04T16:15:32.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Bowo Variable Inspector allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Variable Inspector: from n/a through 2.6.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/variable-inspector/vulnerability/wordpress-variable-inspector-plugin-2-6-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32231.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32231.json new file mode 100644 index 00000000000..9b45ecc7b7f --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32231.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32231", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:32.223", + "lastModified": "2025-04-04T16:15:32.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Bookingor Bookingor allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Bookingor: from n/a through 1.0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bookingor/vulnerability/wordpress-bookingor-plugin-1-0-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32232.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32232.json new file mode 100644 index 00000000000..2426646de96 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32232.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32232", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:32.397", + "lastModified": "2025-04-04T16:15:32.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ERA404 StaffList allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects StaffList: from n/a through 3.2.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/stafflist/vulnerability/wordpress-stafflist-plugin-3-2-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32233.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32233.json new file mode 100644 index 00000000000..0278b8f07fc --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32233.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32233", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:32.617", + "lastModified": "2025-04-04T16:15:32.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WP Chill Revive.so \u2013 Bulk Rewrite and Republish Blog Posts allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Revive.so \u2013 Bulk Rewrite and Republish Blog Posts: from n/a through 2.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/revive-so/vulnerability/wordpress-revive-so-2-0-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32234.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32234.json new file mode 100644 index 00000000000..0c06cf0bf0b --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32234.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32234", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:32.760", + "lastModified": "2025-04-04T16:15:32.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in aleswebs AdMail \u2013 Multilingual Back in-Stock Notifier for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects AdMail \u2013 Multilingual Back in-Stock Notifier for WooCommerce: from n/a through 1.7.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/admail/vulnerability/wordpress-admail-plugin-1-7-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32235.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32235.json new file mode 100644 index 00000000000..b06384e681b --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32235.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32235", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:32.917", + "lastModified": "2025-04-04T16:15:32.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in sonaar MP3 Audio Player for Music, Radio & Podcast by Sonaar allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MP3 Audio Player for Music, Radio & Podcast by Sonaar: from n/a through 5.9.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mp3-music-player-by-sonaar/vulnerability/wordpress-mp3-audio-player-music-player-podcast-player-radio-by-sonaar-plugin-5-9-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32237.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32237.json new file mode 100644 index 00000000000..ae8600a030f --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32237.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32237", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:33.077", + "lastModified": "2025-04-04T16:15:33.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Stylemix MasterStudy LMS allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MasterStudy LMS: from n/a through 3.5.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/masterstudy-lms-learning-management-system/vulnerability/wordpress-masterstudy-lms-plugin-3-5-23-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32238.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32238.json new file mode 100644 index 00000000000..d0f2b17ec4c --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32238.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32238", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:33.233", + "lastModified": "2025-04-04T16:15:33.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Generation of Error Message Containing Sensitive Information vulnerability in vcita Online Booking & Scheduling Calendar for WordPress by vcita allows Retrieve Embedded Sensitive Data. This issue affects Online Booking & Scheduling Calendar for WordPress by vcita: from n/a through 4.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/meeting-scheduler-by-vcita/vulnerability/wordpress-online-booking-scheduling-calendar-for-wordpress-by-vcita-plugin-4-5-2-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32239.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32239.json new file mode 100644 index 00000000000..619c2284ccf --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32239.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32239", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:33.383", + "lastModified": "2025-04-04T16:15:33.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Joao Romao Social Share Buttons & Analytics Plugin \u2013 GetSocial.io allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Social Share Buttons & Analytics Plugin \u2013 GetSocial.io: from n/a through 4.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-share-buttons-analytics-by-getsocial/vulnerability/wordpress-social-share-buttons-analytics-plugin-plugin-4-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32241.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32241.json new file mode 100644 index 00000000000..3e77f7ef7c7 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32241.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32241", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:33.530", + "lastModified": "2025-04-04T16:15:33.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in CleverReach\u00ae Official CleverReach Plugin for WooCommerce allows Cross Site Request Forgery. This issue affects Official CleverReach Plugin for WooCommerce: from n/a through 3.4.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cleverreach-wc/vulnerability/wordpress-official-cleverreach-woocommerce-integration-plugin-3-4-3-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32246.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32246.json new file mode 100644 index 00000000000..d449ba2c716 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32246.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32246", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:33.673", + "lastModified": "2025-04-04T16:15:33.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Tim Nguyen 1-Click Backup & Restore Database allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects 1-Click Backup & Restore Database: from n/a through 1.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/1-click-backup-restore-database-by-sunbytes/vulnerability/wordpress-1-click-backup-restore-database-1-0-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32247.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32247.json new file mode 100644 index 00000000000..adaf012ee65 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32247.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32247", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:33.820", + "lastModified": "2025-04-04T16:15:33.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ABCdatos AI Content Creator allows Cross Site Request Forgery. This issue affects AI Content Creator: from n/a through 1.2.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ai-content-creator/vulnerability/wordpress-ai-content-creator-plugin-1-2-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32248.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32248.json new file mode 100644 index 00000000000..43575edec1f --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32248.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32248", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:33.973", + "lastModified": "2025-04-04T16:15:33.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SwiftXR SwiftXR (3D/AR/VR) Viewer allows Cross Site Request Forgery. This issue affects SwiftXR (3D/AR/VR) Viewer: from n/a through 1.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/swiftxr-3darvr-viewer/vulnerability/wordpress-swiftxr-3d-ar-vr-viewer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32249.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32249.json new file mode 100644 index 00000000000..00b30380766 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32249.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32249", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:34.123", + "lastModified": "2025-04-04T16:15:34.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in designinvento DirectoryPress allows Cross Site Request Forgery. This issue affects DirectoryPress: from n/a through 3.6.19." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/directorypress/vulnerability/wordpress-directorypress-business-directory-and-classified-ad-listing-plugin-3-6-19-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32250.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32250.json new file mode 100644 index 00000000000..79f40afa5b1 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32250.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32250", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:34.273", + "lastModified": "2025-04-04T16:15:34.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in rollbar Rollbar allows Cross Site Request Forgery. This issue affects Rollbar: from n/a through 2.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rollbar/vulnerability/wordpress-rollbar-plugin-2-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32251.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32251.json new file mode 100644 index 00000000000..5dafc4e03fa --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32251.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32251", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:34.423", + "lastModified": "2025-04-04T16:15:34.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in J. Tyler Wiest Jetpack Feedback Exporter allows Retrieve Embedded Sensitive Data. This issue affects Jetpack Feedback Exporter: from n/a through 1.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/jetpack-feedback-exporter/vulnerability/wordpress-jetpack-feedback-exporter-1-23-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32252.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32252.json new file mode 100644 index 00000000000..9a1dcc6a30a --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32252.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32252", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:34.573", + "lastModified": "2025-04-04T16:15:34.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in blackandwhitedigital WP Genealogy \u2013 Your Family History Website allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Genealogy \u2013 Your Family History Website: from n/a through 0.1.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpgenealogy/vulnerability/wordpress-wp-genealogy-plugin-0-1-9-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32253.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32253.json new file mode 100644 index 00000000000..9345f1b2545 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32253.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32253", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:34.720", + "lastModified": "2025-04-04T16:15:34.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ComMotion Course Booking System allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Course Booking System: from n/a through 6.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/course-booking-system/vulnerability/wordpress-course-booking-system-plugin-6-0-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32254.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32254.json new file mode 100644 index 00000000000..6a46eedd3d6 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32254.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32254", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:34.887", + "lastModified": "2025-04-04T16:15:34.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Iqonic Design WPBookit allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects WPBookit: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpbookit/vulnerability/wordpress-wpbookit-plugin-1-0-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32255.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32255.json new file mode 100644 index 00000000000..8eda2247ea6 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32255.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32255", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:35.047", + "lastModified": "2025-04-04T16:15:35.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ERA404 StaffList allows Retrieve Embedded Sensitive Data. This issue affects StaffList: from n/a through 3.2.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/stafflist/vulnerability/wordpress-stafflist-plugin-3-2-6-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32256.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32256.json new file mode 100644 index 00000000000..ec08d604371 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32256.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32256", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:35.190", + "lastModified": "2025-04-04T16:15:35.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in devsoftbaltic SurveyJS allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects SurveyJS: from n/a through 1.12.20." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/surveyjs/vulnerability/wordpress-surveyjs-plugin-1-12-20-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32257.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32257.json new file mode 100644 index 00000000000..8a7b5937d55 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32257.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32257", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:35.343", + "lastModified": "2025-04-04T16:15:35.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive System Information Due to Uncleared Debug Information vulnerability in 1clickmigration 1 Click WordPress Migration allows Retrieve Embedded Sensitive Data. This issue affects 1 Click WordPress Migration: from n/a through 2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1258" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/1-click-migration/vulnerability/wordpress-1-click-wordpress-migration-plugin-2-1-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32258.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32258.json new file mode 100644 index 00000000000..4d307a829d6 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32258.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32258", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:36.573", + "lastModified": "2025-04-04T16:15:36.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in InfoGiants Simple Website Logo allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Simple Website Logo: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-website-logo/vulnerability/wordpress-simple-website-logo-plugin-1-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32261.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32261.json new file mode 100644 index 00000000000..48fbb545844 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32261.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32261", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:36.720", + "lastModified": "2025-04-04T16:15:36.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Kuppuraj Advanced All in One Admin Search by WP Spotlight allows Cross Site Request Forgery. This issue affects Advanced All in One Admin Search by WP Spotlight: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-spotlight-search/vulnerability/wordpress-advanced-all-in-one-admin-search-by-wp-spotlight-1-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32262.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32262.json new file mode 100644 index 00000000000..9d3a47b1ca7 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32262.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32262", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:36.887", + "lastModified": "2025-04-04T16:15:36.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Robert D Payne RDP Wiki Embed allows Cross Site Request Forgery. This issue affects RDP Wiki Embed: from n/a through 1.2.20." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rdp-wiki-embed/vulnerability/wordpress-rdp-wiki-embed-plugin-1-2-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32263.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32263.json new file mode 100644 index 00000000000..178466f85cd --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32263.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32263", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:37.060", + "lastModified": "2025-04-04T16:15:37.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in BeRocket Sequential Order Numbers for WooCommerce allows Cross Site Request Forgery. This issue affects Sequential Order Numbers for WooCommerce: from n/a through 3.6.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sequential-order-numbers-for-woocommerce/vulnerability/wordpress-sequential-order-numbers-for-woocommerce-plugin-3-6-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32264.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32264.json new file mode 100644 index 00000000000..fcb92cd085e --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32264.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32264", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:37.230", + "lastModified": "2025-04-04T16:15:37.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Saiful Islam UltraAddons Elementor Lite allows Cross Site Request Forgery. This issue affects UltraAddons Elementor Lite: from n/a through 2.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ultraaddons-elementor-lite/vulnerability/wordpress-ultraaddons-elementor-addons-plugin-2-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32265.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32265.json new file mode 100644 index 00000000000..2d75fe418a6 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32265.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32265", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:37.410", + "lastModified": "2025-04-04T16:15:37.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Hossni Mubarak JobWP allows Cross Site Request Forgery. This issue affects JobWP: from n/a through 2.3.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/jobwp/vulnerability/wordpress-jobwp-plugin-2-3-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32266.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32266.json new file mode 100644 index 00000000000..57c8fcc7a19 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32266.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32266", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:37.560", + "lastModified": "2025-04-04T16:15:37.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in wp-buy 404 Image Redirection (Replace Broken Images) allows Cross Site Request Forgery. This issue affects 404 Image Redirection (Replace Broken Images): from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/broken-images-redirection/vulnerability/wordpress-404-image-redirection-replace-broken-images-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32267.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32267.json new file mode 100644 index 00000000000..9fb2c75c0f7 --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32267.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32267", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:37.713", + "lastModified": "2025-04-04T16:15:37.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in wpzinc Post to Social Media \u2013 WordPress to Hootsuite allows Cross Site Request Forgery. This issue affects Post to Social Media \u2013 WordPress to Hootsuite: from n/a through 1.5.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-to-hootsuite/vulnerability/wordpress-wp-to-hootsuite-plugin-1-5-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32268.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32268.json new file mode 100644 index 00000000000..932dcdc380d --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32268.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32268", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:37.870", + "lastModified": "2025-04-04T16:15:37.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in www.15.to QR Code Tag for WC allows Cross Site Request Forgery. This issue affects QR Code Tag for WC: from n/a through 1.9.36." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/qr-code-tag-for-wc-from-goaskle-com/vulnerability/wordpress-qr-code-tag-for-wc-plugin-1-9-35-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32269.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32269.json new file mode 100644 index 00000000000..49e6ce1046a --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32269.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32269", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:38.060", + "lastModified": "2025-04-04T16:15:38.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks WP Zendesk for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms allows Cross Site Request Forgery. This issue affects WP Zendesk for Contact Form 7, WPForms, Elementor, Formidable and Ninja Forms: from n/a through 1.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cf7-zendesk/vulnerability/wordpress-wp-zendesk-for-contact-form-7-wpforms-elementor-formidable-and-ninja-forms-plugin-1-1-3-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32270.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32270.json new file mode 100644 index 00000000000..8d616e4b2be --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32270.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32270", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:38.213", + "lastModified": "2025-04-04T16:15:38.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Broadstreet Broadstreet allows Cross Site Request Forgery. This issue affects Broadstreet: from n/a through 1.51.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/broadstreet/vulnerability/wordpress-broadstreet-plugin-1-51-1-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32271.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32271.json new file mode 100644 index 00000000000..dc9ed476b4e --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32271.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32271", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:38.370", + "lastModified": "2025-04-04T16:15:38.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ablancodev Woocommerce Role Pricing allows Cross Site Request Forgery. This issue affects Woocommerce Role Pricing: from n/a through 3.5.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woocommerce-role-pricing/vulnerability/wordpress-woocommerce-role-pricing-plugin-3-5-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32272.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32272.json new file mode 100644 index 00000000000..3ec6e44908a --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32272.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32272", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:38.530", + "lastModified": "2025-04-04T16:15:38.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in PickPlugins Wishlist allows Cross Site Request Forgery. This issue affects Wishlist: from n/a through 1.0.44." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wishlist/vulnerability/wordpress-wishlist-plugin-1-0-41-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32273.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32273.json new file mode 100644 index 00000000000..40487157ccf --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32273.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32273", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:38.677", + "lastModified": "2025-04-04T16:15:38.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in freetobook Freetobook Responsive Widget allows Cross Site Request Forgery. This issue affects Freetobook Responsive Widget: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/freetobook-responsive-widget/vulnerability/wordpress-freetobook-responsive-widget-plugin-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32274.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32274.json new file mode 100644 index 00000000000..d1cfbbf1a7d --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32274.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32274", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:38.820", + "lastModified": "2025-04-04T16:15:38.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in axew3 WP w3all phpBB allows Cross Site Request Forgery. This issue affects WP w3all phpBB: from n/a through 2.9.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-w3all-phpbb-integration/vulnerability/wordpress-w3all-phpbb-integration-plugin-2-9-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32276.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32276.json new file mode 100644 index 00000000000..25cb48c685f --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32276.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32276", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:39.007", + "lastModified": "2025-04-04T16:15:39.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Qu\u00fd L\u00ea 91 Administrator Z allows Cross Site Request Forgery. This issue affects Administrator Z: from n/a through 2025.03.04." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/administrator-z/vulnerability/wordpress-administrator-z-plugin-2025-03-04-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32277.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32277.json new file mode 100644 index 00000000000..fc8ad40ff7e --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32277.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32277", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:39.170", + "lastModified": "2025-04-04T16:15:39.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Ateeq Rafeeq RepairBuddy allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects RepairBuddy: from n/a through 3.8211." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/computer-repair-shop/vulnerability/wordpress-repairbuddy-plugin-3-8211-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32278.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32278.json new file mode 100644 index 00000000000..5322972cdde --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32278.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32278", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:39.307", + "lastModified": "2025-04-04T16:15:39.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in wprio Table Block by RioVizual allows Cross Site Request Forgery. This issue affects Table Block by RioVizual: from n/a through 2.1.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/riovizual/vulnerability/wordpress-table-block-by-riovizual-plugin-2-1-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-322xx/CVE-2025-32280.json b/CVE-2025/CVE-2025-322xx/CVE-2025-32280.json new file mode 100644 index 00000000000..fa6039700fd --- /dev/null +++ b/CVE-2025/CVE-2025-322xx/CVE-2025-32280.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-32280", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T16:15:39.453", + "lastModified": "2025-04-04T16:15:39.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in weDevs WP Project Manager allows Cross Site Request Forgery. This issue affects WP Project Manager: from n/a through 2.6.22." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wedevs-project-manager/vulnerability/wordpress-wp-project-manager-plugin-2-6-22-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3202.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3202.json index caa163fa4c6..06e22415160 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3202.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3202.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3202", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-04T03:15:13.997", - "lastModified": "2025-04-04T03:15:13.997", + "lastModified": "2025-04-04T16:15:39.600", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in ageerle ruoyi-ai up to 2.0.0. Affected is an unknown function of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysNoticeController.java. The manipulation leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is 6382e177bf90cc56ff70521842409e35c50df32d. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad cr\u00edtica en ageerle ruoyi-ai hasta la versi\u00f3n 2.0.0. La vulnerabilidad afecta a una funci\u00f3n desconocida del archivo ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysNoticeController.java. La manipulaci\u00f3n da lugar a una autorizaci\u00f3n indebida. Es posible ejecutar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Actualizar a la versi\u00f3n 2.0.1 puede solucionar este problema. El parche se llama 6382e177bf90cc56ff70521842409e35c50df32d. Se recomienda actualizar el componente afectado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -148,6 +152,10 @@ { "url": "https://vuldb.com/?submit.545866", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Tr0e/CVE_Hunter/blob/main/ruoyi-ai/ruoyi-ai_UnauthorizedAccess_02.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3203.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3203.json index 169e9bdaed7..346aee4b98a 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3203.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3203.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3203", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-04T03:15:14.207", - "lastModified": "2025-04-04T03:15:14.207", + "lastModified": "2025-04-04T16:15:39.753", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Tenda W18E 16.01.0.11. Affected by this vulnerability is the function formSetAccountList of the file /goform/setModules. The manipulation of the argument Password leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en Tenda W18E 16.01.0.11. Esta vulnerabilidad afecta a la funci\u00f3n formSetAccountList del archivo /goform/setModules. La manipulaci\u00f3n del argumento Password provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://www.tenda.com.cn/", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ZIKH26/tmp_store_reports/blob/main/tenda-w18e.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3204.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3204.json index 479f718bb41..c2ae717e4a6 100644 --- a/CVE-2025/CVE-2025-32xx/CVE-2025-3204.json +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3204.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3204", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-04T03:15:14.413", - "lastModified": "2025-04-04T03:15:14.413", + "lastModified": "2025-04-04T16:15:39.893", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in CodeAstro Car Rental System 1.0. Affected by this issue is some unknown functionality of the file /returncar.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en CodeAstro Car Rental System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /returncar.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse remotamente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.545893", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Lanxiy7th/lx_CVE_report-/issues/21", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3252.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3252.json new file mode 100644 index 00000000000..6c34e09da7e --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3252.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3252", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-04T16:15:40.180", + "lastModified": "2025-04-04T16:15:40.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in xujiangfei admintwo 1.0 and classified as problematic. This vulnerability affects unknown code of the file /resource/add. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/admintwo/XSS2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303322", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303322", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.548976", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3253.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3253.json new file mode 100644 index 00000000000..faf1256e82c --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3253.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3253", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-04T16:15:40.390", + "lastModified": "2025-04-04T16:15:40.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in xujiangfei admintwo 1.0 and classified as problematic. This issue affects some unknown processing of the file /ztree/insertTree. The manipulation of the argument Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/admintwo/XSS3.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303323", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303323", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.548978", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3254.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3254.json new file mode 100644 index 00000000000..8218e5fdbd0 --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3254.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2025-3254", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-04T16:15:40.607", + "lastModified": "2025-04-04T16:15:40.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in xujiangfei admintwo 1.0. It has been classified as critical. Affected is an unknown function of the file /resource/add. The manipulation of the argument description leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/admintwo/SSRF.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303324", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303324", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.548979", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3255.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3255.json new file mode 100644 index 00000000000..d05fe6747df --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3255.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3255", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-04T16:15:40.807", + "lastModified": "2025-04-04T16:15:40.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in xujiangfei admintwo 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /user/home. The manipulation of the argument ID leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/admintwo/%E6%9C%AA%E6%8E%88%E6%9D%83%E7%94%A8%E6%88%B7%E4%BF%A1%E6%81%AF%E9%81%8D%E5%8E%86.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303325", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303325", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.548986", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3256.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3256.json new file mode 100644 index 00000000000..1d5e29f047b --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3256.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3256", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-04T17:15:47.500", + "lastModified": "2025-04-04T17:15:47.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in xujiangfei admintwo 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /user/updateSet. The manipulation of the argument email leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/admintwo/%E6%B0%B4%E5%B9%B3%E8%B6%8A%E6%9D%83.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303326", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303326", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.549009", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3257.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3257.json new file mode 100644 index 00000000000..0a74b1570c6 --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3257.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3257", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-04T17:15:47.740", + "lastModified": "2025-04-04T17:15:47.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in xujiangfei admintwo 1.0. This affects an unknown part of the file /user/updateSet. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caigo8/CVE-md/blob/main/admintwo/CSRF.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303327", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303327", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.549011", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3258.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3258.json new file mode 100644 index 00000000000..3a32a7917b1 --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3258.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3258", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-04T17:15:47.977", + "lastModified": "2025-04-04T17:15:47.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in PHPGurukul Old Age Home Management System 1.0. This vulnerability affects unknown code of the file /search.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/404heihei/CVE/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303328", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303328", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.549186", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-32xx/CVE-2025-3259.json b/CVE-2025/CVE-2025-32xx/CVE-2025-3259.json new file mode 100644 index 00000000000..2e645dcd577 --- /dev/null +++ b/CVE-2025/CVE-2025-32xx/CVE-2025-3259.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-3259", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-04T18:15:49.137", + "lastModified": "2025-04-04T19:15:48.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Tenda RX3 16.03.13.11. This issue affects the function formSetDeviceName of the file /goform/SetOnlineDevName. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://sixth-action-50e.notion.site/Tenda-RX3-Buffer-Overflow-1c9f6468377380a2977cd6c3a81f453c?pvs=4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.303329", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.303329", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.549199", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tenda.com.cn/", + "source": "cna@vuldb.com" + }, + { + "url": "https://sixth-action-50e.notion.site/Tenda-RX3-Buffer-Overflow-1c9f6468377380a2977cd6c3a81f453c", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3220e6af0e6..f99a4af959d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-04T16:00:20.619394+00:00 +2025-04-04T20:00:20.665997+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-04T15:50:24.237000+00:00 +2025-04-04T19:53:43.140000+00:00 ``` ### Last Data Feed Release @@ -33,63 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -288531 +288667 ``` ### CVEs added in the last Commit -Recently added CVEs: `19` +Recently added CVEs: `136` -- [CVE-2024-51800](CVE-2024/CVE-2024-518xx/CVE-2024-51800.json) (`2025-04-04T14:15:21.140`) -- [CVE-2025-22281](CVE-2025/CVE-2025-222xx/CVE-2025-22281.json) (`2025-04-04T14:15:21.297`) -- [CVE-2025-22285](CVE-2025/CVE-2025-222xx/CVE-2025-22285.json) (`2025-04-04T14:15:21.460`) -- [CVE-2025-27520](CVE-2025/CVE-2025-275xx/CVE-2025-27520.json) (`2025-04-04T15:15:47.927`) -- [CVE-2025-2798](CVE-2025/CVE-2025-27xx/CVE-2025-2798.json) (`2025-04-04T14:15:22.293`) -- [CVE-2025-28146](CVE-2025/CVE-2025-281xx/CVE-2025-28146.json) (`2025-04-04T14:15:21.603`) -- [CVE-2025-31130](CVE-2025/CVE-2025-311xx/CVE-2025-31130.json) (`2025-04-04T15:15:48.320`) -- [CVE-2025-31381](CVE-2025/CVE-2025-313xx/CVE-2025-31381.json) (`2025-04-04T14:15:22.630`) -- [CVE-2025-31384](CVE-2025/CVE-2025-313xx/CVE-2025-31384.json) (`2025-04-04T14:15:22.780`) -- [CVE-2025-31389](CVE-2025/CVE-2025-313xx/CVE-2025-31389.json) (`2025-04-04T14:15:22.940`) -- [CVE-2025-31403](CVE-2025/CVE-2025-314xx/CVE-2025-31403.json) (`2025-04-04T14:15:23.090`) -- [CVE-2025-31405](CVE-2025/CVE-2025-314xx/CVE-2025-31405.json) (`2025-04-04T14:15:23.253`) -- [CVE-2025-31407](CVE-2025/CVE-2025-314xx/CVE-2025-31407.json) (`2025-04-04T14:15:23.427`) -- [CVE-2025-31416](CVE-2025/CVE-2025-314xx/CVE-2025-31416.json) (`2025-04-04T14:15:23.887`) -- [CVE-2025-31418](CVE-2025/CVE-2025-314xx/CVE-2025-31418.json) (`2025-04-04T14:15:24.053`) -- [CVE-2025-31480](CVE-2025/CVE-2025-314xx/CVE-2025-31480.json) (`2025-04-04T15:15:48.820`) -- [CVE-2025-3249](CVE-2025/CVE-2025-32xx/CVE-2025-3249.json) (`2025-04-04T14:15:25.453`) -- [CVE-2025-3250](CVE-2025/CVE-2025-32xx/CVE-2025-3250.json) (`2025-04-04T15:15:51.340`) -- [CVE-2025-3251](CVE-2025/CVE-2025-32xx/CVE-2025-3251.json) (`2025-04-04T15:15:51.580`) +- [CVE-2025-32262](CVE-2025/CVE-2025-322xx/CVE-2025-32262.json) (`2025-04-04T16:15:36.887`) +- [CVE-2025-32263](CVE-2025/CVE-2025-322xx/CVE-2025-32263.json) (`2025-04-04T16:15:37.060`) +- [CVE-2025-32264](CVE-2025/CVE-2025-322xx/CVE-2025-32264.json) (`2025-04-04T16:15:37.230`) +- [CVE-2025-32265](CVE-2025/CVE-2025-322xx/CVE-2025-32265.json) (`2025-04-04T16:15:37.410`) +- [CVE-2025-32266](CVE-2025/CVE-2025-322xx/CVE-2025-32266.json) (`2025-04-04T16:15:37.560`) +- [CVE-2025-32267](CVE-2025/CVE-2025-322xx/CVE-2025-32267.json) (`2025-04-04T16:15:37.713`) +- [CVE-2025-32268](CVE-2025/CVE-2025-322xx/CVE-2025-32268.json) (`2025-04-04T16:15:37.870`) +- [CVE-2025-32269](CVE-2025/CVE-2025-322xx/CVE-2025-32269.json) (`2025-04-04T16:15:38.060`) +- [CVE-2025-32270](CVE-2025/CVE-2025-322xx/CVE-2025-32270.json) (`2025-04-04T16:15:38.213`) +- [CVE-2025-32271](CVE-2025/CVE-2025-322xx/CVE-2025-32271.json) (`2025-04-04T16:15:38.370`) +- [CVE-2025-32272](CVE-2025/CVE-2025-322xx/CVE-2025-32272.json) (`2025-04-04T16:15:38.530`) +- [CVE-2025-32273](CVE-2025/CVE-2025-322xx/CVE-2025-32273.json) (`2025-04-04T16:15:38.677`) +- [CVE-2025-32274](CVE-2025/CVE-2025-322xx/CVE-2025-32274.json) (`2025-04-04T16:15:38.820`) +- [CVE-2025-32276](CVE-2025/CVE-2025-322xx/CVE-2025-32276.json) (`2025-04-04T16:15:39.007`) +- [CVE-2025-32277](CVE-2025/CVE-2025-322xx/CVE-2025-32277.json) (`2025-04-04T16:15:39.170`) +- [CVE-2025-32278](CVE-2025/CVE-2025-322xx/CVE-2025-32278.json) (`2025-04-04T16:15:39.307`) +- [CVE-2025-32280](CVE-2025/CVE-2025-322xx/CVE-2025-32280.json) (`2025-04-04T16:15:39.453`) +- [CVE-2025-3252](CVE-2025/CVE-2025-32xx/CVE-2025-3252.json) (`2025-04-04T16:15:40.180`) +- [CVE-2025-3253](CVE-2025/CVE-2025-32xx/CVE-2025-3253.json) (`2025-04-04T16:15:40.390`) +- [CVE-2025-3254](CVE-2025/CVE-2025-32xx/CVE-2025-3254.json) (`2025-04-04T16:15:40.607`) +- [CVE-2025-3255](CVE-2025/CVE-2025-32xx/CVE-2025-3255.json) (`2025-04-04T16:15:40.807`) +- [CVE-2025-3256](CVE-2025/CVE-2025-32xx/CVE-2025-3256.json) (`2025-04-04T17:15:47.500`) +- [CVE-2025-3257](CVE-2025/CVE-2025-32xx/CVE-2025-3257.json) (`2025-04-04T17:15:47.740`) +- [CVE-2025-3258](CVE-2025/CVE-2025-32xx/CVE-2025-3258.json) (`2025-04-04T17:15:47.977`) +- [CVE-2025-3259](CVE-2025/CVE-2025-32xx/CVE-2025-3259.json) (`2025-04-04T18:15:49.137`) ### CVEs modified in the last Commit -Recently modified CVEs: `208` +Recently modified CVEs: `200` -- [CVE-2024-9396](CVE-2024/CVE-2024-93xx/CVE-2024-9396.json) (`2025-04-04T14:39:01.967`) -- [CVE-2024-9400](CVE-2024/CVE-2024-94xx/CVE-2024-9400.json) (`2025-04-04T14:38:55.730`) -- [CVE-2024-9401](CVE-2024/CVE-2024-94xx/CVE-2024-9401.json) (`2025-04-04T14:38:37.670`) -- [CVE-2024-9402](CVE-2024/CVE-2024-94xx/CVE-2024-9402.json) (`2025-04-04T14:38:30.770`) -- [CVE-2024-9997](CVE-2024/CVE-2024-99xx/CVE-2024-9997.json) (`2025-04-04T15:15:46.203`) -- [CVE-2025-1428](CVE-2025/CVE-2025-14xx/CVE-2025-1428.json) (`2025-04-04T15:15:46.457`) -- [CVE-2025-1430](CVE-2025/CVE-2025-14xx/CVE-2025-1430.json) (`2025-04-04T15:15:46.697`) -- [CVE-2025-1431](CVE-2025/CVE-2025-14xx/CVE-2025-1431.json) (`2025-04-04T15:15:46.800`) -- [CVE-2025-1850](CVE-2025/CVE-2025-18xx/CVE-2025-1850.json) (`2025-04-04T15:19:58.300`) -- [CVE-2025-1930](CVE-2025/CVE-2025-19xx/CVE-2025-1930.json) (`2025-04-04T15:16:09.610`) -- [CVE-2025-2279](CVE-2025/CVE-2025-22xx/CVE-2025-2279.json) (`2025-04-04T14:15:21.837`) -- [CVE-2025-24654](CVE-2025/CVE-2025-246xx/CVE-2025-24654.json) (`2025-04-04T14:48:15.770`) -- [CVE-2025-25604](CVE-2025/CVE-2025-256xx/CVE-2025-25604.json) (`2025-04-04T15:30:47.660`) -- [CVE-2025-25605](CVE-2025/CVE-2025-256xx/CVE-2025-25605.json) (`2025-04-04T15:29:44.367`) -- [CVE-2025-25768](CVE-2025/CVE-2025-257xx/CVE-2025-25768.json) (`2025-04-04T15:26:56.353`) -- [CVE-2025-2786](CVE-2025/CVE-2025-27xx/CVE-2025-2786.json) (`2025-04-04T14:15:22.113`) -- [CVE-2025-2842](CVE-2025/CVE-2025-28xx/CVE-2025-2842.json) (`2025-04-04T14:15:22.517`) -- [CVE-2025-3191](CVE-2025/CVE-2025-31xx/CVE-2025-3191.json) (`2025-04-04T15:15:49.177`) -- [CVE-2025-3192](CVE-2025/CVE-2025-31xx/CVE-2025-3192.json) (`2025-04-04T15:15:49.323`) -- [CVE-2025-3194](CVE-2025/CVE-2025-31xx/CVE-2025-3194.json) (`2025-04-04T15:15:49.473`) -- [CVE-2025-3197](CVE-2025/CVE-2025-31xx/CVE-2025-3197.json) (`2025-04-04T15:15:49.640`) -- [CVE-2025-3205](CVE-2025/CVE-2025-32xx/CVE-2025-3205.json) (`2025-04-04T15:15:49.910`) -- [CVE-2025-3208](CVE-2025/CVE-2025-32xx/CVE-2025-3208.json) (`2025-04-04T15:15:50.240`) -- [CVE-2025-3210](CVE-2025/CVE-2025-32xx/CVE-2025-3210.json) (`2025-04-04T14:15:24.387`) -- [CVE-2025-3245](CVE-2025/CVE-2025-32xx/CVE-2025-3245.json) (`2025-04-04T14:15:25.283`) +- [CVE-2025-30451](CVE-2025/CVE-2025-304xx/CVE-2025-30451.json) (`2025-04-04T19:41:29.893`) +- [CVE-2025-30456](CVE-2025/CVE-2025-304xx/CVE-2025-30456.json) (`2025-04-04T18:13:02.067`) +- [CVE-2025-30457](CVE-2025/CVE-2025-304xx/CVE-2025-30457.json) (`2025-04-04T18:12:47.103`) +- [CVE-2025-30458](CVE-2025/CVE-2025-304xx/CVE-2025-30458.json) (`2025-04-04T18:12:42.757`) +- [CVE-2025-30460](CVE-2025/CVE-2025-304xx/CVE-2025-30460.json) (`2025-04-04T18:12:36.290`) +- [CVE-2025-30461](CVE-2025/CVE-2025-304xx/CVE-2025-30461.json) (`2025-04-04T18:12:32.693`) +- [CVE-2025-30462](CVE-2025/CVE-2025-304xx/CVE-2025-30462.json) (`2025-04-04T18:12:28.400`) +- [CVE-2025-30463](CVE-2025/CVE-2025-304xx/CVE-2025-30463.json) (`2025-04-04T18:12:18.250`) +- [CVE-2025-30464](CVE-2025/CVE-2025-304xx/CVE-2025-30464.json) (`2025-04-04T18:16:18.353`) +- [CVE-2025-30465](CVE-2025/CVE-2025-304xx/CVE-2025-30465.json) (`2025-04-04T18:16:13.317`) +- [CVE-2025-30467](CVE-2025/CVE-2025-304xx/CVE-2025-30467.json) (`2025-04-04T18:15:47.390`) +- [CVE-2025-30469](CVE-2025/CVE-2025-304xx/CVE-2025-30469.json) (`2025-04-04T18:15:42.680`) +- [CVE-2025-30470](CVE-2025/CVE-2025-304xx/CVE-2025-30470.json) (`2025-04-04T18:15:36.720`) +- [CVE-2025-30471](CVE-2025/CVE-2025-304xx/CVE-2025-30471.json) (`2025-04-04T18:15:26.537`) +- [CVE-2025-31182](CVE-2025/CVE-2025-311xx/CVE-2025-31182.json) (`2025-04-04T18:14:52.887`) +- [CVE-2025-31183](CVE-2025/CVE-2025-311xx/CVE-2025-31183.json) (`2025-04-04T18:14:46.857`) +- [CVE-2025-31187](CVE-2025/CVE-2025-311xx/CVE-2025-31187.json) (`2025-04-04T18:14:40.860`) +- [CVE-2025-31191](CVE-2025/CVE-2025-311xx/CVE-2025-31191.json) (`2025-04-04T18:14:34.590`) +- [CVE-2025-31194](CVE-2025/CVE-2025-311xx/CVE-2025-31194.json) (`2025-04-04T18:14:27.780`) +- [CVE-2025-3184](CVE-2025/CVE-2025-31xx/CVE-2025-3184.json) (`2025-04-04T18:15:48.497`) +- [CVE-2025-3185](CVE-2025/CVE-2025-31xx/CVE-2025-3185.json) (`2025-04-04T18:15:48.630`) +- [CVE-2025-3186](CVE-2025/CVE-2025-31xx/CVE-2025-3186.json) (`2025-04-04T18:15:48.747`) +- [CVE-2025-3202](CVE-2025/CVE-2025-32xx/CVE-2025-3202.json) (`2025-04-04T16:15:39.600`) +- [CVE-2025-3203](CVE-2025/CVE-2025-32xx/CVE-2025-3203.json) (`2025-04-04T16:15:39.753`) +- [CVE-2025-3204](CVE-2025/CVE-2025-32xx/CVE-2025-3204.json) (`2025-04-04T16:15:39.893`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 61421d24bdb..8ec6c0ec30e 100644 --- a/_state.csv +++ b/_state.csv @@ -41961,7 +41961,7 @@ CVE-2010-0228,0,0,5877de212603510a2640cc816cb7d713ad98733e52f454098927dec8d47b16 CVE-2010-0229,0,0,d4d11a34275ca813b91387b0ed7d0c2a145a9fdab4826b2795a5956a104bedc0,2024-11-21T01:11:48.370000 CVE-2010-0230,0,0,569e994745de5e46d52faf0a328cd8c2fcca399f5c4a6a4e5d013ed0e9c2ed39,2024-11-21T01:11:48.510000 CVE-2010-0231,0,0,a2b5f696ead645ce177d3f75089302b9506b834d8f1ea18026b943a391bf1658,2024-11-21T01:11:48.643000 -CVE-2010-0232,0,0,f92594199d363607c9a42a47afbe6221511418a5387969a563341e7106cb20a8,2025-02-04T19:15:19.730000 +CVE-2010-0232,0,1,3d2e6a5abc0b481bc764cae1e3aba69b095af0c2d4d74de396ca174781d40bb6,2025-04-04T19:30:45.213000 CVE-2010-0233,0,0,1c3a6603a7b718759c9e3e8a80c6e789d2fdcc46fa3c3acf87c1a06f83bff33d,2024-11-21T01:11:48.893000 CVE-2010-0234,0,0,3b1577fcbb783180a2fc3c9b55a102b366b4f9788553e484ca557ce30ef611d7,2024-11-21T01:11:49.003000 CVE-2010-0235,0,0,b710c1c5e05787345711e2cd45aa6778b3033858c1039bdaa3414bedd1fdcbd4,2024-11-21T01:11:49.117000 @@ -48772,7 +48772,7 @@ CVE-2011-2001,0,0,3bbd163b6868de3dff6faeba5634c236647bfce9a34d5e5a49955e622926f0 CVE-2011-2002,0,0,396d416a091378def62d10739d567a14e9ca3bfddf6cdd6b8e0ea10e510f6d2d,2024-11-21T01:27:27.923000 CVE-2011-2003,0,0,73d35567751c6a0bd3b8fe9348e98bf39cd2adb3add9a643364bb984f742b628,2024-11-21T01:27:28.037000 CVE-2011-2004,0,0,a1b7e379ab2633af06e3ed47a99b84667ac50498c1c8531e38308b40e4578f52,2024-11-21T01:27:28.147000 -CVE-2011-2005,0,1,4b1ae1dca1443141696c71993eb3bfd91ca2e3b1bba0fbe05644c5e0dd482af6,2025-04-04T14:12:04.927000 +CVE-2011-2005,0,0,4b1ae1dca1443141696c71993eb3bfd91ca2e3b1bba0fbe05644c5e0dd482af6,2025-04-04T14:12:04.927000 CVE-2011-2006,0,0,7735556bfa19b55ad9273f7f4b99b49944d6e7dfd78fd879b832e6f0a75a39df,2023-11-07T02:07:19.323000 CVE-2011-2007,0,0,2fce2bba6ecb79bcfad7ce04fb149e7b1c06f03ccc7aaef952de4174e3c60c50,2024-11-21T01:27:28.390000 CVE-2011-2008,0,0,20985c4bacd3524e23ed915cb3c019e0509a8b7c0f84323f08579c52662414ef,2024-11-21T01:27:28.497000 @@ -51970,7 +51970,7 @@ CVE-2012-0154,0,0,f865d81aa0442de964d5532961642d91816dc7c8a91c7e4c93c805e49177a6 CVE-2012-0155,0,0,815bf50e74766a74ac74edbfa63fddadf3fcf0173ecb4fd8348fe0ccfb9afb7a,2024-11-21T01:34:29.213000 CVE-2012-0156,0,0,5f84a57ddd6cf0ad8f458eb5c0b25351cc67ffbd66732f1c9bcc0dbfab6258ab,2024-11-21T01:34:29.323000 CVE-2012-0157,0,0,e66217d3f8540208543c9e7558028e6cb994ca3cd79d7152f5c8251ba1bbd7c2,2024-11-21T01:34:29.427000 -CVE-2012-0158,0,1,3b35703c954e7d47a74730cc61bfe7b2f3577d8e6ab1f3067606380503325bbc,2025-04-04T15:21:41.613000 +CVE-2012-0158,0,0,3b35703c954e7d47a74730cc61bfe7b2f3577d8e6ab1f3067606380503325bbc,2025-04-04T15:21:41.613000 CVE-2012-0159,0,0,b79bdd715d763d65e02e59f5d73368681b52426a8ee9a83b2279b91bc753007e,2024-11-21T01:34:29.723000 CVE-2012-0160,0,0,57b1522b2ab079684e0296765b9e56002ec685cb2a7a50a1fb3b6e5696185470,2024-11-21T01:34:29.843000 CVE-2012-0161,0,0,971da5e11b3da429493c6b967c33f09e4fb9ac3d336fbbacc9a8a016f00de07e,2024-11-21T01:34:29.950000 @@ -58987,7 +58987,7 @@ CVE-2013-1327,0,0,807bbe0d0f3bc9dc8276da3b04a6dfe8e099511fe326f1563e1202eebd6765 CVE-2013-1328,0,0,f0a1d0cfab433afa57ee3aeaf7cd217d216bc6d9452e954d1f702391c14c2e2e,2024-11-21T01:49:22.190000 CVE-2013-1329,0,0,b41130dedb7ba610eb0243ac67ef876860cd1fda1b1ca33695dc7af45abb89f6,2024-11-21T01:49:22.300000 CVE-2013-1330,0,0,30473dd8cb2c3b14dc701f431a17262fc354de6ea3d580d69d9ee726c90c4e73,2024-11-21T01:49:22.413000 -CVE-2013-1331,0,1,3c45e27b362a67394d0b03efda9512da5c1cfbb1e4f38ec16d464a4a37f6f97c,2025-04-04T15:24:27.863000 +CVE-2013-1331,0,0,3c45e27b362a67394d0b03efda9512da5c1cfbb1e4f38ec16d464a4a37f6f97c,2025-04-04T15:24:27.863000 CVE-2013-1332,0,0,f50ff8f781a88d64a7b5e3123cde728132d2229f13c5984cea3937bc96dcb8bb,2024-11-21T01:49:22.647000 CVE-2013-1333,0,0,4275704594276fe04b17302599c15f0326e9712084152b87b9dd92b15331ad46,2024-11-21T01:49:22.773000 CVE-2013-1334,0,0,58a5c31a8d19b353178478a2ef316aba9b97dda195e7dc58c8231a7b0391401a,2024-11-21T01:49:22.887000 @@ -59003,7 +59003,7 @@ CVE-2013-1343,0,0,4ca8635acbe745b39f185befc23d7e53c9be9526cd96a68aa7fb5d52b28c1f CVE-2013-1344,0,0,48d6553a1a0126ea2ec1dce6dd1ae21544fae4bdc8ff547f4d1b08f75a183375,2024-11-21T01:49:24.150000 CVE-2013-1345,0,0,1636a80bd51341c7715e5f4a1a7a7eab21456107dd9d99826a91c6cc1d9a5f46,2024-11-21T01:49:24.260000 CVE-2013-1346,0,0,00f42ca7f6371015a32a91eda3f35d9ff27917ca99052868d5a952f2eb5cc0e9,2024-11-21T01:49:24.373000 -CVE-2013-1347,0,0,2b2e1cdbd69d344db6ca250bfc0e39ac4f63b0a6c5fbd9b15a4a5983f4d361e7,2025-02-04T19:15:20.470000 +CVE-2013-1347,0,1,3d17da4bfdb83d3effbf9ac51018157419d8fc605ac0489a1fc6b24966142fa3,2025-04-04T19:31:06.470000 CVE-2013-1348,0,0,855d8c6cb28f1f1ee7641943c938b4cd8fbffe39a3ec78e6a7aabad3147d92f2,2024-11-21T01:49:24.600000 CVE-2013-1349,0,0,e470e8cc5a89bf041cdc17556fac4bd8aa97a580cb18e131c7e17654febfb10e,2024-11-21T01:49:24.743000 CVE-2013-1350,0,0,5c8a3c3c691f41739936e29c2553b9bef09fac81bf1b2cb6b827f3c9fc8de903,2024-11-21T01:49:24.907000 @@ -61304,7 +61304,7 @@ CVE-2013-3896,0,0,9a2f297baa807dce3033f95d168ae2f361acacb4c62b59d9118368b0aacd73 CVE-2013-3897,0,0,4d5f18046628f772114647bc2e87b6f68d20f181c11ad2b3f209bd501b48edbc,2025-02-10T20:15:35.077000 CVE-2013-3898,0,0,4001bc12078e48316fd3702cc157dba0b5051507f95b6e3e7fc2523b40acf50d,2024-11-21T01:54:30.203000 CVE-2013-3899,0,0,b203fcb7b7f954c5c53f099033f3627c7f45bc118b6b43a856d83b3807c750b5,2024-11-21T01:54:30.323000 -CVE-2013-3900,0,1,2c6de7159793a5796848c7afdf4ae30d41756a1912e84cbd8a7dcbc66d19fff7,2025-04-04T15:24:55.300000 +CVE-2013-3900,0,0,2c6de7159793a5796848c7afdf4ae30d41756a1912e84cbd8a7dcbc66d19fff7,2025-04-04T15:24:55.300000 CVE-2013-3901,0,0,909726abe80e061ae6e2dd321fecfa4d619bac1c32ab43350c89c79f858d262c,2023-11-07T02:16:04.560000 CVE-2013-3902,0,0,afbb46c14a2a8e1d241a4e7e29c6adedd4b2b0b00cd005689dabdd1906c4b22c,2024-11-21T01:54:30.603000 CVE-2013-3903,0,0,e9d3a91ef46bd5f6620142601468a79651a22995de21afe2c8e9f924b37fb04c,2024-11-21T01:54:30.730000 @@ -75130,7 +75130,7 @@ CVE-2015-1638,0,0,daef968245a5d8fd79d931ce1ffd08b3f2e1d88478095e206dc2c85022015b CVE-2015-1639,0,0,34505230ce09a0015f32d75857dbd4437155d53d3a8d301d593db632ff0e6063,2024-11-21T02:25:50.263000 CVE-2015-1640,0,0,801ae17082793204d46bf77801ffd5de8c9c829afdb3530ebef3b0a19f191653,2024-11-21T02:25:50.390000 CVE-2015-1641,0,0,109231f2237f0a8fc9e810e5685b95a1ca48051f6fae248648471f38f7d16792,2025-02-10T20:15:37.820000 -CVE-2015-1642,0,0,380b119dee875c5b3e6047af114aa5e44faa404b038f3ff39f3c0a803df4bec5,2025-02-10T18:15:21.377000 +CVE-2015-1642,0,1,206e12c4ec98b558f4136d013706904987a4f72460e816e661234ffc15458eae,2025-04-04T19:43:54.700000 CVE-2015-1643,0,0,35965b865ae4a0fe7d80f230f483ebd1ed4164b7f19a9ddda1fca4ecbbcd5c1a,2024-11-21T02:25:50.753000 CVE-2015-1644,0,0,a460657ddeb2cebbe863b19e4913930868d68bdff8abc83394f5f8a8c15788d1,2024-11-21T02:25:50.873000 CVE-2015-1645,0,0,8cb7107b2c6b144164ea8cd42a107617cf9ba3326c21773f955c39867f026fb0,2024-11-21T02:25:51 @@ -75258,7 +75258,7 @@ CVE-2015-1766,0,0,3f00a70e44f7fa95c26bd5cb8bcf5b39076875377af9edefc257bc0d9d230c CVE-2015-1767,0,0,292b1f56789470d2933eef9d582c7832d8d18f0b3d4658197d1dc427c079f87e,2024-11-21T02:26:05.267000 CVE-2015-1768,0,0,b2fc6680ee97b1d0858e4bb59d759f45ec5d75cf1c3839c62cbe9f26046551ab,2024-11-21T02:26:05.380000 CVE-2015-1769,0,0,314ce413d4947d84818aa8ff4e211823ffd343ce4539dc6599ced1aa2f05c84f,2025-02-10T21:15:12.377000 -CVE-2015-1770,0,0,881ebd5a10a53270f17e7394ed1f1b9c2efd242966009e18a03190e07ca8f036,2025-02-10T18:15:22.347000 +CVE-2015-1770,0,1,368ce63b2f504d8205819188a3235b36d6af4e9a9f4805b45f27d9b1fc1c7a91,2025-04-04T19:43:43.803000 CVE-2015-1771,0,0,a44961f133acd00d46d9847eec99f2955a76b6125ced31ae1d283f363776ed0c,2024-11-21T02:26:05.747000 CVE-2015-1772,0,0,26826297cb83f5add3d9515dbab903d2b96da4af06792c133c24c3386ce750e3,2024-11-21T02:26:05.867000 CVE-2015-1773,0,0,fd832b300fcebda30714577992c0dfc0547751b17ec68289f32185de9303ed35,2024-11-21T02:26:05.997000 @@ -75973,7 +75973,7 @@ CVE-2015-2541,0,0,b4ad359df8ea3d6ce59de1ec9aea5fc3f9b5a7972b8730a22c8a33204924b5 CVE-2015-2542,0,0,e858356d88869dfc32fc0a5db3f8ff2e6c58c20d9b80f3e051aa3022452eec21,2024-11-21T02:27:34.567000 CVE-2015-2543,0,0,d2981f278e391c30162d239a8c90ece25d994ee78f79bc50898095faf6471efc,2024-11-21T02:27:34.680000 CVE-2015-2544,0,0,4e5b0730ad2054e505576a69c1345f1cb6192323f7c2e99a172295e5997e6f06,2024-11-21T02:27:34.787000 -CVE-2015-2545,0,0,02c7ae7661fdaa2bce80a592889d915fd51ebeb77f1501cb86889d9a98c4bd66,2025-02-10T18:15:22.913000 +CVE-2015-2545,0,1,58353f0408c9cc148698ebae83e3be21f1de8c040a2e8f9cacc27292b0a064c8,2025-04-04T19:32:14.177000 CVE-2015-2546,0,0,3f297f35412ce4393dfa481ae02a7c64b25d4167832004bb97b9c41cce193be6,2025-02-10T21:15:12.980000 CVE-2015-2547,0,0,71327887aaaf05c12c1ea748b54de15f5859e1d66eadec6ddd3af104078d9d44,2023-11-07T02:25:22.523000 CVE-2015-2548,0,0,479e31aacc15b060afbe8ad07e34024eff90df53ca8ea1778dba1c3ec3a3391a,2024-11-21T02:27:35.150000 @@ -82249,13 +82249,13 @@ CVE-2016-0030,0,0,b84d0768c035c71726bc0c7b07ea9cac07a91f0f85744d87e10f1a4bce9984 CVE-2016-0031,0,0,a31f4be4156cd94427780304c5b8d48fea8166417158ede788fda033eb6368be,2024-11-21T02:40:57.727000 CVE-2016-0032,0,0,0e019f9566a3edc72c3d0fd73e67bdf9d3cc420c61f8754bb665d7575764fde1,2024-11-21T02:40:57.840000 CVE-2016-0033,0,0,08ce8af26aea2e0b3403ba68547870f33b0f1acd130a6f52042233792d2d1031,2024-11-21T02:40:57.960000 -CVE-2016-0034,0,1,21c154889024259d04d867873a57000b98223f10fbc138a59685ff6078b3e6d1,2025-04-04T15:27:03.110000 +CVE-2016-0034,0,0,21c154889024259d04d867873a57000b98223f10fbc138a59685ff6078b3e6d1,2025-04-04T15:27:03.110000 CVE-2016-0035,0,0,e32092299e2ce8c2adcba6d535c921c478de969e8313004b5472467c7acec2c2,2024-11-21T02:40:58.197000 CVE-2016-0036,0,0,733ecda21a89c56f308e7ef1394bf35ba207f2669b506b24077cf48d0a8d43fd,2024-11-21T02:40:58.317000 CVE-2016-0037,0,0,acc79b40aeb0697ca00416d2ed1bc31ed06fad3f29c20d69b54fd9de1b02f048,2024-11-21T02:40:58.440000 CVE-2016-0038,0,0,5caff9750a9fc84cffbc27f69d1c34c5fd35f985c72e0e49c405f89a9b9de6b1,2024-11-21T02:40:58.560000 CVE-2016-0039,0,0,1f34a5d22d40effe55d48a316508fb902f40185f5c7f5e7f35b2a55b43d219f5,2024-11-21T02:40:58.677000 -CVE-2016-0040,0,0,aebb7a870d66cd2eb438294187f26d2d1b6bddbc4c9f06492ff4dcb4304ccf39,2025-02-10T17:15:09.997000 +CVE-2016-0040,0,1,435c763f5b9b2e34c36750991acdd5150be478849b5de4381c5177d0bb21c366,2025-04-04T19:51:38.990000 CVE-2016-0041,0,0,cc67a9ab27d8b71eb861fbf14cdc3699f018be2a1e4698ca4957d4159c513b3d,2024-11-21T02:40:58.903000 CVE-2016-0042,0,0,e8dbd7526f4296c07e49bd7907baf48bd279819ed9efaffb14dfd8766b3a8f52,2024-11-21T02:40:59.007000 CVE-2016-0043,0,0,53b2276908342bbdd6826ad14d9c7e573590a6732280285a7945f21b3041c480,2023-11-07T02:29:01.650000 @@ -92771,11 +92771,11 @@ CVE-2016-9995,0,0,e156e5087d5651c2f963db51e0f239cf224c543687b933dac36801dda966e2 CVE-2016-9996,0,0,6453258d4706747e1d9a6ba664dbc3795ff081936b9854874ceded6c65be7af5,2023-11-07T02:37:40.873000 CVE-2016-9997,0,0,59f36902f9fdea88cd8efbe0d360132d251d5795313595d71937d96a268c2d74,2024-11-21T03:02:09.083000 CVE-2016-9998,0,0,16fd92ae810550b131a8dbe36a6e74206f20590c74de05334bf5a0b72dbdbe25,2024-11-21T03:02:09.227000 -CVE-2017-0001,0,0,44035443d08fd44997fa91b83ab0185cb2c0ffa2360e8f9793683f2f139719f4,2025-02-10T16:15:28.983000 +CVE-2017-0001,0,1,e7f6f895c528fc2953f9243b0b194253c146e51577666318da593ebe3849cccd,2025-04-04T19:46:39.950000 CVE-2017-0002,0,0,2b91cdfb64777c3fd260d18be138f855c9bab3575ee0eb7c1d87ea1071cdf130,2024-11-21T03:02:09.503000 CVE-2017-0003,0,0,a53c30f86c059c6fb4d418f8ca0abf90a96e4584a4b8208153f5957b4466a8f5,2024-11-21T03:02:09.613000 CVE-2017-0004,0,0,d42c56247d7670c692216eb8391c9b5dd826f020c5e87aa8eec93f5a38a93b02,2024-11-21T03:02:09.727000 -CVE-2017-0005,0,0,7c76781ca894e1a26f3bc48fbfeb01734e04dab7f18a578cec18e93c01b17c7e,2025-02-10T16:15:29.783000 +CVE-2017-0005,0,1,58ad11c011a4c18a094b6d56e86ee1ca9bc6923fe2bc9e2bc9fcf02aef3e3b38,2025-04-04T19:46:54.100000 CVE-2017-0006,0,0,62a7f726b9bafe3ac291d3a21ba911b11d1320f7094d68086d44bdf7821aaed3,2024-11-21T03:02:09.960000 CVE-2017-0007,0,0,5bb2fe163c2dcc30892a9bb6c1bf46a17e17c3ab5ec970de7bf3a6465ffd5923,2024-11-21T03:02:10.080000 CVE-2017-0008,0,0,ec38a362adaa15fae7831b81c998d3d3d4ccd022cedea364e34b088a5a99e4d0,2024-11-21T03:02:10.203000 @@ -92791,7 +92791,7 @@ CVE-2017-0018,0,0,cc77344f82c9a805187c289d996cda1b529562eaf18f226d9055177998423e CVE-2017-0019,0,0,1aa64d32bfdcfeff6db8d5cc27258163e106f174799356431af7863e6cce2551,2024-11-21T03:02:11.443000 CVE-2017-0020,0,0,35bd77b08b85bbced0a77c30f0ac2f67015ddfb5e1d10b41bf8d1aade8f1b1a2,2024-11-21T03:02:11.570000 CVE-2017-0021,0,0,12e4c5e5eea5e444f3e4ab9087b42714beba685fce8606dba120ab4c553ee2cb,2024-11-21T03:02:11.677000 -CVE-2017-0022,0,0,704927cd07fd84513df82d75ae4f731293a6a9fb2d46e3ea4dcd48101af18450,2025-02-10T16:15:29.970000 +CVE-2017-0022,0,1,862c4e24274419b8db45f6f92f050ba330a63300c5b5c2fa5841bd13b9178334,2025-04-04T19:47:13.730000 CVE-2017-0023,0,0,ac178d2a8c9334424ffc478c36ec1596a820ab745453d74a9efcf77a4245452b,2024-11-21T03:02:11.923000 CVE-2017-0024,0,0,1542f77827ab3af0336dc759b265cc4b238c03a5f9ea960495e3b15ce3d13085,2024-11-21T03:02:12.050000 CVE-2017-0025,0,0,3d8828ca0b05e2af5e68081f64dbb09a4c22bf18f15214094eebf5ac2aee7eb1,2024-11-21T03:02:12.193000 @@ -92822,7 +92822,7 @@ CVE-2017-0055,0,0,867553751bedf95f8726044ef9a39107642aa18a6a318f44e05a2c23c20542 CVE-2017-0056,0,0,4d16352439d5a274c1bcc7882d81b83083f6d92d5d5ae7f69e4b1a8c2441cf75,2024-11-21T03:02:15.120000 CVE-2017-0057,0,0,28eb85c4b7ff950189b862ba5fce772c0543439c38b4104b48ec7e7a8bcda8b0,2024-11-21T03:02:15.230000 CVE-2017-0058,0,0,75ab69ce5354f77c8fffee99f4b8311d62a128306816eb1931d90efab45f480d,2024-11-21T03:02:15.350000 -CVE-2017-0059,0,0,9104658bc5af0ded8d42ec61f7fadc9de3b101ca210016f9ec966b58ae2dea33,2025-02-10T16:15:30.207000 +CVE-2017-0059,0,1,17c6925d003fe2f80ea6fa8aaf9ff5cce215e2470e4e5c6aa25c263e7975f5db,2025-04-04T19:49:53.860000 CVE-2017-0060,0,0,530b887dc4cb5fcb5c7fcc5430a47df5248a5214c6c6ba958defaa406877f3ba,2024-11-21T03:02:15.583000 CVE-2017-0061,0,0,8b59da235a0034621e23077643b483f916ad36f58452921904fbbf8b6e4189b8,2024-11-21T03:02:15.723000 CVE-2017-0062,0,0,669a80013e0f1f26b62a946d10586a4e12654249322f9c33a580d6b8ab3bc4dd,2024-11-21T03:02:15.843000 @@ -92864,7 +92864,7 @@ CVE-2017-0097,0,0,e9caeb59cd7b10f27c089fe34f09cdf6f6616a4c4b631166dbdc34e17269fe CVE-2017-0098,0,0,c66b0f0f6870de8e05fce027a748e4583e94f631b2374a0f3964dcd9f7945c4c,2024-11-21T03:02:20.193000 CVE-2017-0099,0,0,86fcffd97eadaba39a9ba3a6d35d1bae05451a6e7beff4430666b94ee1ac8892,2024-11-21T03:02:20.320000 CVE-2017-0100,0,0,93e06858c6bc202a8faa8d1af2784b93f194f82f62fd177bf42919b64e6b1f04,2024-11-21T03:02:20.447000 -CVE-2017-0101,0,0,7c57ea8123779afccc3b98e5e3a035762a83401817eb53d6b6eb3bb54576651f,2025-02-10T16:15:30.407000 +CVE-2017-0101,0,1,d36797415946db1f1ae1762e3c9fab0734f14897645899905e2fb5605112ca5f,2025-04-04T19:50:36.317000 CVE-2017-0102,0,0,35d23cf3e5ae77b57d7bfa933fdbe1e694e2cb742b418ca9a55dab793f9cf0f0,2024-11-21T03:02:20.710000 CVE-2017-0103,0,0,b3e3b8c0c162fc1cae58badc21c9b1a6fdff091d64ebd099a4cef591459e3669,2024-11-21T03:02:20.840000 CVE-2017-0104,0,0,9ea12278c311958f6d00b987adfb08c2c9fc8f24c929007d2e6c1494555189ed,2024-11-21T03:02:20.953000 @@ -92904,8 +92904,8 @@ CVE-2017-0137,0,0,40ba756a7aea0725b82fcb80f8bf935f528e7804872cc2d9654de809bb0fff CVE-2017-0138,0,0,f63a656b8ef38b03622a5219443ff3a3ae2429a293b7806495f73889c3d439a1,2024-11-21T03:02:25.040000 CVE-2017-0140,0,0,5704f0d7c1b08cdcd432fb7297176c3900a32de32e71ef15b95c9baa86237584,2024-11-21T03:02:25.153000 CVE-2017-0141,0,0,5d50cc2a91ff21ac9aac2ec8596a4247d2dde09d04b2faaba6a35d682bad1651,2024-11-21T03:02:25.267000 -CVE-2017-0143,0,0,ef0f39e723d7d3da3382c4b0e324c6c7f20ba3bbda0eb8ca0e4f1a9843085db5,2025-02-10T16:15:30.603000 -CVE-2017-0144,0,0,f2c79900bce794656718feee23bdebb760a11b64b0035db0464151e6c35adf6c,2025-02-10T16:15:30.853000 +CVE-2017-0143,0,1,34fa566aa74eacbf2ab2a1a100a7bb53519c18777b579fb8685d57a72ccb913f,2025-04-04T19:50:46.183000 +CVE-2017-0144,0,1,d39476374f52147c76a864c6471e7a15b60d4e5e60f4e314f41312b9d18b043e,2025-04-04T19:51:00.227000 CVE-2017-0145,0,0,aec731337803913d47b3f8e0e3e29d1ad1c8db6439a31e22c34dffe16026a543,2025-02-11T17:02:01.967000 CVE-2017-0146,0,0,6de48034ca92bb038717d56fa7d1e3d20b53d9b88bc0b10c4e345e9ef70a2f8d,2025-02-04T15:15:09.857000 CVE-2017-0147,0,0,df39a846c64e28b683f81ea1bb3ec9a9f7f0ae8b1bd555acdc69c07c710b7fec,2025-02-11T17:01:56.383000 @@ -108496,7 +108496,7 @@ CVE-2017-8565,0,0,a88763026da101c80d2fbbe0e6010aec2ca17be455b82d54cdf78c880b28fd CVE-2017-8566,0,0,68b3d671258e269c0f5e3b1123c06a76a9cc966721d32d2288af5a53add6e41f,2024-11-21T03:34:16.367000 CVE-2017-8567,0,0,ae1c69d8b2a712edf896c5548141d58da952d8476dc190535d7abc60a4f4a2b2,2024-11-21T03:34:16.490000 CVE-2017-8569,0,0,9dd87e96666c19f4e0058b2bf0fc912c33669302c683a0dd6d176e6c77dac2e1,2024-11-21T03:34:16.610000 -CVE-2017-8570,0,0,81e7fb90147723330d43805bdc54804f38c967dde50ef4f01540f609e3c4e975,2025-02-10T15:15:10.437000 +CVE-2017-8570,0,1,55dec2032ebbb4ed91936a692183cf717c0e10d32d705495e77fd60a9376a189,2025-04-04T19:46:27.583000 CVE-2017-8571,0,0,0d5f0dc18f4d2f813f96a5a5258dde06d03c4dfce92ac314767084e602111470,2024-11-21T03:34:16.860000 CVE-2017-8572,0,0,e03d079a9da7488f0b4715ed8d3fc26caa1d0cfc89b4167cd6602f06bd669169,2024-11-21T03:34:16.983000 CVE-2017-8573,0,0,493dcb8622762f9ef3d5454d9467119a960f9ff16e4b5b9a899b1a805fc7843e,2024-11-21T03:34:17.100000 @@ -126149,7 +126149,7 @@ CVE-2018-8292,0,0,c2c6841aa6a5dc4de736de2583451449a68da777cee879303b34f37e3943e3 CVE-2018-8294,0,0,fb10ae061c2b0f4027a3831fa13af8f170727377837f833aff36db61bb07c8e6,2024-11-21T04:13:34.050000 CVE-2018-8296,0,0,eb16700bc09eff5a6673a33d7e634a87a498a963a3878823796ace6c6f9f9f94,2024-11-21T04:13:34.173000 CVE-2018-8297,0,0,058bc67e1599846c08a45ea537ad6e1cc2da213e13402f6c8f150de1acc36636,2024-11-21T04:13:34.307000 -CVE-2018-8298,0,1,413318e6e1a4e0184afeebcdcd2b3274876b520b348a130111c9fb8be07bdf3e,2025-04-04T15:32:27.460000 +CVE-2018-8298,0,0,413318e6e1a4e0184afeebcdcd2b3274876b520b348a130111c9fb8be07bdf3e,2025-04-04T15:32:27.460000 CVE-2018-8299,0,0,475239165d4202d5227dd5a176ac70b77d0451241c77f0e55cb949f6adc468e2,2024-11-21T04:13:34.573000 CVE-2018-8300,0,0,76604568025b4c0d7fd7d921d66a1bf7fe81a7cd756a0043bf9a6240ff011e84,2024-11-21T04:13:34.693000 CVE-2018-8301,0,0,482250c44c5ee3fda7557bb944e992d7119af83e4cde082c60800ee92a5f16b6,2024-11-21T04:13:34.820000 @@ -126391,7 +126391,7 @@ CVE-2018-8583,0,0,3e8b2518c174e5fd6b22b8afdb3708d6b23bc783be1b23267d194a7154d64b CVE-2018-8584,0,0,c58a6adf8bf131feb510df0cfce4b001b46f4e75023bc31c2a34bf87491d5e68,2024-11-21T04:14:05.160000 CVE-2018-8587,0,0,3ed7e8e74dacfeff6fa84c70b531e5b23b1df244cc1376fc5e2c1c84d3325a39,2024-11-21T04:14:05.303000 CVE-2018-8588,0,0,c35bed4abc6e77f1950409bd49590d035cd8fc5670413be5edbc8a8b57ed6b9b,2024-11-21T04:14:05.420000 -CVE-2018-8589,0,1,27125ce08269d34a6992b0dc91992f507c78976015f27609e532246a2ad96e90,2025-04-04T15:32:36.710000 +CVE-2018-8589,0,0,27125ce08269d34a6992b0dc91992f507c78976015f27609e532246a2ad96e90,2025-04-04T15:32:36.710000 CVE-2018-8592,0,0,cad7b22536287407e03f531418dcb198482efac60bd41257e7019d1a00d6216e,2024-11-21T04:14:05.653000 CVE-2018-8595,0,0,6e6643ab561ffb20bc5586297517d0898e7c87678be01d6b9027a68304a8be56,2024-11-21T04:14:05.770000 CVE-2018-8596,0,0,924f6e3ab024c1b657f07aafd08f0476d6359eeb3061c2325109e4270c5b9b3c,2024-11-21T04:14:05.897000 @@ -127476,7 +127476,7 @@ CVE-2019-0207,0,0,1d274320dc3cfcdd3e6843ad8499871aa7aab2b96146ed945bffa6de677aee CVE-2019-0208,0,0,47fa72fb1491e2eddd007ac660c2013a428a55186223ef7595fd512160713322,2023-11-07T03:01:49.670000 CVE-2019-0209,0,0,8a63648f5ca6170017076fde6d74e61036a2724c0ceca47b3baed4431df839de,2023-11-07T03:01:49.940000 CVE-2019-0210,0,0,465a5af179711f2606e97e9f1456c95d28adb8e3023e78b326e4835282594988,2024-11-21T04:16:29.503000 -CVE-2019-0211,0,1,cd3a367a60b0923fe27e6685e5514f7c219b00181b2c7a0a66dc5e349f57b235,2025-04-04T15:34:11.407000 +CVE-2019-0211,0,0,cd3a367a60b0923fe27e6685e5514f7c219b00181b2c7a0a66dc5e349f57b235,2025-04-04T15:34:11.407000 CVE-2019-0212,0,0,570d4d5b1a58fb419f2a8fed0d2f1d94057425b51e2fa4b12437cb677e606217,2024-11-21T04:16:29.913000 CVE-2019-0213,0,0,e97ed4030c72ecb0980c1c110d4ddc8ef279b7f36fa864d93896f600ace0b728,2024-11-21T04:16:30.047000 CVE-2019-0214,0,0,65bb13f93d9d445dbbe948ee48fd9a13c87b8b5973a7faa5c46a51e78bbd4da9,2024-11-21T04:16:30.190000 @@ -127690,7 +127690,7 @@ CVE-2019-0600,0,0,00fb1dcd17c10f7b885a638061d4a77282934ff38a5448b4b531997279acb3 CVE-2019-0601,0,0,16e50c444b7facc090fbab26c45bf2f648ac15ce21a64686e0f450801f4a3791,2024-11-21T04:16:56.397000 CVE-2019-0602,0,0,259785d4220704e946effefc2bcae2bbe72f34ba6b5996e34a226a18e05e06fc,2024-11-21T04:16:56.530000 CVE-2019-0603,0,0,9a501a90cffa7f359638fb836c133f809552729cd86534eaa704cbdf716a1b9f,2024-11-21T04:16:56.657000 -CVE-2019-0604,0,1,b99ee33b67d86cb93a7dc1b37232a1109741f9ed8f7529350e06669ef295531f,2025-04-04T15:33:58.093000 +CVE-2019-0604,0,0,b99ee33b67d86cb93a7dc1b37232a1109741f9ed8f7529350e06669ef295531f,2025-04-04T15:33:58.093000 CVE-2019-0605,0,0,6f1cfa37ff29a4cd92d026dfd8f20e8e9bbd1efbf911cef592b0e1e2fe8d84fd,2024-11-21T04:16:56.903000 CVE-2019-0606,0,0,cc74a6cd753d7a4aa732f53b37b5e67712b3b53bc2557155d28ae79c0757d213,2024-11-21T04:16:57.030000 CVE-2019-0607,0,0,b660808a7c3d295cd0f993f38abc74f164c3da452ab93c2d1ebcfaa87e8e11bb,2024-11-21T04:16:57.150000 @@ -127927,7 +127927,7 @@ CVE-2019-0837,0,0,158c8725f38c6dd9ea485d197598a91d24cdad9705c406686d66a2b9a25f3c CVE-2019-0838,0,0,326ee721cc32034963836020cf57515ba8d94d5a7adad3bf7efc6bb4c3e46928,2024-11-21T04:17:21.933000 CVE-2019-0839,0,0,59bd5df2c7fa4f471ef61e6bcc025086eb80e6c840e965b27153afa37745c506,2024-11-21T04:17:22.050000 CVE-2019-0840,0,0,e93c2499b67d43bdc4776d8f3c202609dfe55f30f92c6f161efe2c13bce40ed7,2024-11-21T04:17:22.160000 -CVE-2019-0841,0,1,90ed19274f252f6f1c747cb80fb9a888ad75044892429ac94f4e22e21db6616d,2025-04-04T15:34:20.640000 +CVE-2019-0841,0,0,90ed19274f252f6f1c747cb80fb9a888ad75044892429ac94f4e22e21db6616d,2025-04-04T15:34:20.640000 CVE-2019-0842,0,0,b127b9eb1e83414cdfea44ddc262f7c326cb8120d101eba8136f52316bd6faa2,2024-11-21T04:17:22.383000 CVE-2019-0843,0,0,539ccfee42b591227a00067189bb1e6f998c654f1b804c3ce7a809d71ba8d95b,2023-11-07T03:02:05.437000 CVE-2019-0844,0,0,7f482c2b28c07a0122739110fc2ea2fe11e899bb2f5974400d31d2893a29e32d,2024-11-21T04:17:22.510000 @@ -130454,7 +130454,7 @@ CVE-2019-12136,0,0,6301d3aa86884961118ea4c762af5dcb30effba4b67dfd7a0a012631bbe07 CVE-2019-12137,0,0,d107bfd91450fd190cc99ece226704adc5137d6cc06076b8a432ee082859c67f,2024-11-21T04:22:17.710000 CVE-2019-12138,0,0,ecd59c0334b5e6e79392f7df04626f56404ed789f8814fcfecef5da1d5facb35,2024-11-21T04:22:17.850000 CVE-2019-12139,0,0,90b19cd415a22c08cd00694420c3772d1b82c552d70399c5e7287a8313e4ac9a,2024-11-21T04:22:17.997000 -CVE-2019-1214,0,0,5eeca377c7dea0b420896fb47bdcaa43d241cd4f951326170b1472108f78ef03,2025-02-07T17:15:18.117000 +CVE-2019-1214,0,1,beb1560d28b82980f10a3928df67d2b09092b537f3d6edebab73c4fc1e04f113,2025-04-04T19:52:48.600000 CVE-2019-12143,0,0,1d7f19f9f2e019474ecc8301397b4ddf3e34a59c40cefb7677e87202f514a85d,2024-11-21T04:22:18.140000 CVE-2019-12144,0,0,c28059f83e5656bfd1f2c0d9dec91b65242aa89e16b4cc8c801cb97b0a06e067,2024-11-21T04:22:18.287000 CVE-2019-12145,0,0,753eade7730208bc039e05e0aff24ffb3976b26c47e73834b7b811b03c246e6b,2024-11-21T04:22:18.427000 @@ -132098,7 +132098,7 @@ CVE-2019-14046,0,0,86975a67ccb4b34725d1811b72883b29c5f245b04f808a777462758a87af5 CVE-2019-14047,0,0,d76305cdc6a7d79c676f8debeebae5dfde0d4526bab1f71b255bcced8adc8b68,2024-11-21T04:25:58.643000 CVE-2019-14048,0,0,5084c1c7e7bdfbd61d778578cfc26d42edcbe595d240e5077f4dbf2f38effad5,2024-11-21T04:25:58.773000 CVE-2019-14049,0,0,71b0ffe0d3b407783fa9b076f38fa79276877ec23bf4c09de3294a2b79814c5c,2024-11-21T04:25:58.890000 -CVE-2019-1405,0,0,a307378f4fb1628d2a082c0c23444650f7e4a27063f8d6a282fde2138b06239d,2025-02-07T16:15:30.290000 +CVE-2019-1405,0,1,5666689b7f7e39e1c82e3c9199a8be6e65fe0382f4d851d2a2329414dffc25d6,2025-04-04T19:30:16.860000 CVE-2019-14050,0,0,753036db0149e43fbd77b5cad3d8e15dc7a77c95d655e3ee2073edc7322d18f9,2024-11-21T04:25:59.020000 CVE-2019-14051,0,0,ad4acd0aafd6da7c930309bda911db304f33c0ff43f2afb5e5e9edc5685a5eb2,2024-11-21T04:25:59.160000 CVE-2019-14052,0,0,3dfa614b2de8b8fded95928808a9650f78f942e9aa485deed41098887fb973fe,2024-11-21T04:25:59.270000 @@ -138164,7 +138164,7 @@ CVE-2019-2211,0,0,2608473af17c421fcd554476dce50b35c6363b5b4b22a951ab699048e55a9e CVE-2019-2212,0,0,a20debe4b7f1e99c8eab04e14ee0b110b6f003967a45bf05d502359c8d6848bb,2024-11-21T04:40:26.693000 CVE-2019-2213,0,0,5635b096df95e889de03debfe59376523777aa9c1d91724f729cf1dda5fdd3da,2024-11-21T04:40:26.807000 CVE-2019-2214,0,0,ba9a3dceb05f2cc4eb8524391475a1a294a0a775fc540956ecb4085f0168c564,2024-11-21T04:40:26.917000 -CVE-2019-2215,0,1,c45550185c21f2dd2479154848592b5599e8c81d51680fd18aa900d24ea24d2f,2025-04-04T15:40:44.233000 +CVE-2019-2215,0,0,c45550185c21f2dd2479154848592b5599e8c81d51680fd18aa900d24ea24d2f,2025-04-04T15:40:44.233000 CVE-2019-2216,0,0,8b02f1c902d165d9a09a6b68a5a07dce9a6f8f806e99499a37a55dab6a5ede6d,2024-11-21T04:40:27.250000 CVE-2019-2217,0,0,2b01b16dd59cb5d6c26e701150093b71a73bcd22bc80d52c047f7c8852763a0f,2024-11-21T04:40:27.367000 CVE-2019-2218,0,0,97526fe1dc01e04b988ef2ce0b3ef09b2c4d30c90d44c9c9861d893464b1f069,2024-11-21T04:40:27.473000 @@ -144215,8 +144215,8 @@ CVE-2019-9870,0,0,062347afaead72fa94abc21c33a5861fb0027ef274aac86f640300ed7ac52d CVE-2019-9871,0,0,ecbf9a2a46bdc0f0799295372974f7e4fb138b086b11240520c5e86a9feb2c22,2024-11-21T04:52:28.770000 CVE-2019-9872,0,0,69dc93bfc540144bf7909b63e971badc086b537b667706e81f569fb276514791,2024-11-21T04:52:28.907000 CVE-2019-9873,0,0,af140e2a7d17703fab34c4880c5a574af4e50539c38e7eb27174aef7f9fc441b,2024-11-21T04:52:29.043000 -CVE-2019-9874,0,1,f6963b70075e0397c287ec542ebc1e1105849b0f4b4a04255cb3d4c438c19054,2025-04-04T15:38:31.630000 -CVE-2019-9875,0,1,2bd8284320a98f3640a91d8979d1d78152a9b2ab6ecd37f71ac8282d47cddcf8,2025-04-04T15:39:25.383000 +CVE-2019-9874,0,0,f6963b70075e0397c287ec542ebc1e1105849b0f4b4a04255cb3d4c438c19054,2025-04-04T15:38:31.630000 +CVE-2019-9875,0,0,2bd8284320a98f3640a91d8979d1d78152a9b2ab6ecd37f71ac8282d47cddcf8,2025-04-04T15:39:25.383000 CVE-2019-9877,0,0,d70a742f8560436a6bad08feb159e670d666fe63a3e521d5e75ac5bb80ac8ee7,2024-11-21T04:52:29.453000 CVE-2019-9878,0,0,92bf0deac9abf1727596d30937bb1d1dae4e81d73f4d0b1a0f322a153d61e024,2024-11-21T04:52:29.583000 CVE-2019-9879,0,0,3bacaf9b0b5d86c2556ab398cef4a166e3cd91d22d54e6a93d8cb3b250b49a89,2024-11-21T04:52:29.720000 @@ -144942,7 +144942,7 @@ CVE-2020-0642,0,0,1f2e6768426f1fcbb820f3d24f09beab93017454c5d527ed7fb93eb12e5a0a CVE-2020-0643,0,0,54660f9511d9cd4715bb32475bf30a76e3c75fb968bf877b5bb4c2a94ad03e6e,2024-11-21T04:53:54.973000 CVE-2020-0644,0,0,de0e5c855ad5573d85e1c911b8e204348cfeaec8d8fed9fe30694822b3d1dc34,2024-11-21T04:53:55.090000 CVE-2020-0645,0,0,447c3a80f8615dab05a6a69c4bcca46dd794786c0ff9c9b77ca01e37b5a974da,2024-11-21T04:53:55.207000 -CVE-2020-0646,0,1,1d25fec9b9b1392aa9071eadd22caedad9c0fb65243aa88e1d874908b2130336,2025-04-04T15:40:53.703000 +CVE-2020-0646,0,0,1d25fec9b9b1392aa9071eadd22caedad9c0fb65243aa88e1d874908b2130336,2025-04-04T15:40:53.703000 CVE-2020-0647,0,0,226c27aeb6eb727cb3b739f43c6672b67569cfc6f5b89a8d2fbd488eba9f27aa,2024-11-21T04:53:55.520000 CVE-2020-0648,0,0,84b7267652b5709dd2b918a4a4cb3f29492423172161f383053663514e2ebe52,2024-11-21T04:53:55.620000 CVE-2020-0650,0,0,61a15ca9b92530eec34c8c929db2e29f50cd887895ea77cca8dfb50a58cda66d,2024-11-21T04:53:55.773000 @@ -144983,7 +144983,7 @@ CVE-2020-0684,0,0,f1b5dc81705e7962ff08a0490fb64f26119a20f9934fd7bcb4a92de44bea6e CVE-2020-0685,0,0,bca62808172f06a840151d77703fee45e6817d7c3415566d93203b92831b65f2,2024-11-21T04:54:00.050000 CVE-2020-0686,0,0,51ed2c17d000d3a03fed23dc872365ee4f8ecbab706f7a53aebce23e0e73eae7,2024-11-21T04:54:00.173000 CVE-2020-0687,0,0,e64021ed1926b0c1a86ea89cf71b224763dee0a2a14f94b742f33589a03c4d9d,2024-11-21T04:54:00.300000 -CVE-2020-0688,0,0,d6184a3a1e6da81380337f818315b0e4c5d77c77b55bde61b456c74ad247d1cb,2025-02-04T19:15:22.067000 +CVE-2020-0688,0,1,26331b1879343d63fd9468d70e2cb3a78a6dbfa01f64703f557bc4043d113775,2025-04-04T19:31:36.613000 CVE-2020-0689,0,0,7c2a3dc900592aa8d96ac01f87f89a22ce17c48df17e6d3b52cb48b968800625,2024-11-21T04:54:00.573000 CVE-2020-0690,0,0,86be8a81a4e8de8538936a174e6935babf841c76d1f72a21fb365507e01fe66c,2024-11-21T04:54:00.697000 CVE-2020-0691,0,0,293748ee48a5c4e56576ded4f7c9b7c8e6dc739fbee6dce7ac9855ef56087bcd,2024-11-21T04:54:00.810000 @@ -145228,7 +145228,7 @@ CVE-2020-0934,0,0,60222148c86837f7d40fabcd04dbefcbf5f7dde9a6fbc4d13a3b98eed3e68d CVE-2020-0935,0,0,7b4ac052beded506a1cd9401759b26d9d148a3d283953c3a5a61d22e51653573,2024-11-21T04:54:29.660000 CVE-2020-0936,0,0,5077168c173f3d7b5021176d13f07133fb4f0d737e31d71445a49a6933ec66f6,2024-11-21T04:54:29.767000 CVE-2020-0937,0,0,886832eb93679ef84a17eaa883fcbbf519616c5d31bbd04cfc37cef64aed204d,2024-11-21T04:54:29.880000 -CVE-2020-0938,0,0,0a26aae978997b5c707992ea73add75ee972f8759dedc57970089e60f2d9a49f,2025-02-04T19:15:22.510000 +CVE-2020-0938,0,1,0f051e9b550c79f0a98a21c6ffd60f810b65f51e2ed99e1a55758f60b5436deb,2025-04-04T19:31:55.443000 CVE-2020-0939,0,0,108fc2ce9864dbfb41be6506265e26c635f0bbe9d675fa6c46dd2fc33ca0e688,2024-11-21T04:54:30.123000 CVE-2020-0940,0,0,b979ffab10ed6708fc32b34ae3dfe56e9c813852469aaeead7f12de20d22ae4d,2024-11-21T04:54:30.233000 CVE-2020-0941,0,0,17c2593d076793cda7742906361c226bb5fbee9794fd479e819f72749c7d3498,2024-11-21T04:54:30.357000 @@ -145276,7 +145276,7 @@ CVE-2020-0982,0,0,d5bc2b7ba47a9b70d168880343f21525a7d28f8e90f0b870efa0fddea868fb CVE-2020-0983,0,0,ae2332f61f455ea5a30fd9b8aa65daef2f274bb4e3082a713e2c99c4241ea6f0,2024-11-21T04:54:35.570000 CVE-2020-0984,0,0,d3c5278676aca3e1615c91e2487dd466b55da9947e007c82c1f9dfd065f3d971,2024-11-21T04:54:35.690000 CVE-2020-0985,0,0,91d0d0e913ef46555adbb12ed396a4ab8319939b4a684380abb73348e1049780,2024-11-21T04:54:35.800000 -CVE-2020-0986,0,0,7b084fa8e6fdd655c4b4dc3e1f435da741d5de2227c373d0badf37a1705525d8,2025-02-07T15:15:15.383000 +CVE-2020-0986,0,1,8fa2ac34d932930e1b4b89402d0c2eda052c1926f0505bb85f8e092f4bd6dd61,2025-04-04T19:30:27.673000 CVE-2020-0987,0,0,cb4852bd031393ddc5d68882cc3515c021680be78ff3901bd0b2ce67cd633206,2024-11-21T04:54:36.067000 CVE-2020-0988,0,0,276f892d65399cf2cb7009ed4450c6baa25b7a1e0a80fe34f8d00a45efdae274,2024-11-21T04:54:36.203000 CVE-2020-0989,0,0,be83f20c16fcf2bfbdb2cbc3e01a2dc978f1c372b94ebe21c0bca12185da82fb,2024-11-21T04:54:36.330000 @@ -146232,7 +146232,7 @@ CVE-2020-1102,0,0,beb55d980417bd8b6d1ce31e3a0727b369b5062516d21b175570c1b1aee391 CVE-2020-11020,0,0,a0d36a559ebe7f953236588db302bbdd420d19b4ac6cb48d12345feacaed921c,2024-11-21T04:56:35.843000 CVE-2020-11021,0,0,c19a191fbddcb3f9a17a7591bedcd6fc94ddcd9ad61bf21f8bba572829211e6f,2024-11-21T04:56:35.970000 CVE-2020-11022,0,0,b9af85a8c30b617cd88d73a72bfd445ea341c37ec58205246aade7d3a64a8e02,2024-11-21T04:56:36.110000 -CVE-2020-11023,0,0,5f0094b33b2f96d78cf226481d9a865508d0990b70f201e263508564da3e7a8d,2025-01-24T02:00:02.453000 +CVE-2020-11023,0,1,faf49ab730f77626881212c8e927e0e664a6e8f9ebf81e6c820df4feba017683,2025-04-04T19:53:43.140000 CVE-2020-11024,0,0,35d884b343f59a576a889d1f0a1e58df1211a54ba4869f675bb373afbcf25f85,2024-11-21T04:56:36.803000 CVE-2020-11025,0,0,02e56c0d9fe23dd773712d5f3331b73b0d5cba4fd9ea3a26495134cd48189d2b,2024-11-21T04:56:36.933000 CVE-2020-11026,0,0,6af682f657377c77c2e378246407611faae42b9f229818a297da012ae87ff400,2024-11-21T04:56:37.070000 @@ -153373,7 +153373,7 @@ CVE-2020-2200,0,0,157c2f857a31fa97a9c12bd2b14ff34eee91510892e404eb44e7a635286ece CVE-2020-22000,0,0,1442fa6e4707a6760030cf225b293637b7f567cd9adf01c6e1444c6bcd695e47,2024-11-21T05:13:00.100000 CVE-2020-22001,0,0,8c1f5435f9ff4b1b42a1726280aa144b429725e1c50901c757cbb8c1d29984a1,2024-11-21T05:13:00.243000 CVE-2020-22002,0,0,dab5acbb169e699cfa2da2b13b7f6838c96c6efc79a9367c4ba1558ac02ba94d,2024-11-21T05:13:00.383000 -CVE-2020-22007,0,0,9059f30a68c79e1774cf983e21aafe7f8bf329ea218cc4efb7fd4a9a420db48b,2024-11-21T05:13:00.530000 +CVE-2020-22007,0,1,03b0fc9a14b2897c775ef937959f13f8c52ed22a5bf0ed8faef9ab8996b820dc,2025-04-04T18:15:40.523000 CVE-2020-2201,0,0,d4a0e00af751d9cf781a4c3141497e8af4fb222cd47636fbcb2936a56d8f6899,2024-11-21T05:24:56.490000 CVE-2020-22015,0,0,8ecafb3cb6c42d8646c876182d331f50b74aeec6cf75676fe2a0477bc32213af,2024-11-21T05:13:00.670000 CVE-2020-22016,0,0,9fef5202a7848aebd18216a24d0efae30e22929c4e1bace46e009a48afa23825,2024-11-21T05:13:00.823000 @@ -158396,7 +158396,7 @@ CVE-2020-35310,0,0,1d2d893793cc2e3fc93b8251bfa436dba6d8953efb49989492dd75cb5b7e1 CVE-2020-35313,0,0,0a14aa7e6308f898b02a5fa2aad822adc39945d9804d675bce8686927de59cd3,2024-11-21T05:27:10.090000 CVE-2020-35314,0,0,57951e08f56c4d0bde38930ede663a668cdfb5d8361f352f2f1d812a7503f090,2024-11-21T05:27:10.300000 CVE-2020-3532,0,0,b9e1cc6b9ca47d60f39dfab759eff6b5b85c1871fe939784ec5d0a1a98ca16db,2024-11-18T17:11:17.393000 -CVE-2020-35326,0,0,50346ea1a4fcb0817bec4bf9ceca858801548d31756e80c403ba87244288db6f,2024-11-21T05:27:10.473000 +CVE-2020-35326,0,1,b327081c4f9a6868db3f1cb9b363b08fa9e08d5ea32d15e4ae0e8b17660c42ce,2025-04-04T18:15:41.263000 CVE-2020-35327,0,0,22022c8a3177a426d9ce17ad5212e84b10d278ce0592c22e0ac33520baf94c64,2024-11-21T05:27:10.697000 CVE-2020-35328,0,0,fb3087ea88c8ceab32a806508484c2a1a597fcc81fb212264d511cd1b23643ac,2024-11-21T05:27:10.920000 CVE-2020-35329,0,0,df72a4e25de70e0e73e4fcec57137a0408e72c3941c4d2683e91509e523cdc59,2024-11-21T05:27:11.087000 @@ -165623,7 +165623,7 @@ CVE-2021-0903,0,0,2fad86bd7bb2ac187d6960d2ae32c47a2aa0f38627884e581bb95490224a95 CVE-2021-0904,0,0,55d27736010076f30ce7706f17749280a0c10b8d46190625ab020d8220fbb006,2024-11-21T05:43:14.660000 CVE-2021-0918,0,0,c5d272b348a0822dcc116d12528489740849798441550448b7aa37a5800abc77,2024-11-21T05:43:14.760000 CVE-2021-0919,0,0,21d3978daad9f253b977127327d3a2de7ba56892e9190df93ec9a45ec4f323c2,2024-11-21T05:43:14.853000 -CVE-2021-0920,0,0,0e272730b0124ebb6720563467d76cf6a033bbafca2489a121b403a122ce77ad,2025-02-04T19:15:23.463000 +CVE-2021-0920,0,1,1123caa414a1366acf6c61ba9593532d0cbfff669c12c13cb54f803769676b70,2025-04-04T17:34:25.457000 CVE-2021-0921,0,0,dd9b1f6a0111c998dff0730a18b38e6d68442c4803eb66d1f97fcd127bd4e63b,2024-11-21T05:43:15.060000 CVE-2021-0922,0,0,e021aca4d24ac81904d5fb153216ca63f879a23784e7bde99639ad6ec8ca554d,2024-11-21T05:43:15.157000 CVE-2021-0923,0,0,245f0c342b0708074db5287e81fdc5c6f434122534fc5b96bc65587c822d1670,2024-11-21T05:43:15.270000 @@ -177698,7 +177698,7 @@ CVE-2021-33948,0,0,5128df0fd4ae7e48bd8645b40b752f4223f95ae28703a2628ab278a18d281 CVE-2021-33949,0,0,d2d79d7484c3de384acb9724006901320c6d8a655a934ff80f89da980ddd5cc2,2025-03-18T19:15:40 CVE-2021-3395,0,0,530bc40971a9ab46eff78d9d9e312912779de37b7102dd3d0686b19073239a5c,2024-11-21T06:21:24.537000 CVE-2021-33950,0,0,d2ee920a1cc643c7fb92c5453fe8e200fb126c6c3d145884225e25452bc037c4,2025-03-18T19:15:40.160000 -CVE-2021-33959,0,0,a622cbcde3dbe31fac69d4430135ce898b16a59f3c6955fce6dd91afbc9a5f8b,2024-11-21T06:09:48.277000 +CVE-2021-33959,0,1,c8049501a1b404f926835d0025d125ece7045070f3da07ff9a9fabca236052ad,2025-04-04T18:15:41.477000 CVE-2021-3396,0,0,90698fa326d5fdd8e8dc54e1e7bcb6d1e581f1ba3ffca20d3b993bf72ccd11f7,2024-11-21T06:21:24.703000 CVE-2021-33961,0,0,9927d3d7c06766828cb94a032d3f024741359810fc41a936de207d05e198bd97,2024-11-21T06:09:48.443000 CVE-2021-33962,0,0,21ccb51748b36f6b57c520ed5dd79d0b110c06be25a787a7f4522b25924e9762,2024-11-21T06:09:48.607000 @@ -179565,7 +179565,7 @@ CVE-2021-36624,0,0,f2c6b90bd921ed2bbbb151f4c4360271fb500723458f16574f6af305f4c61 CVE-2021-36625,0,0,9fbad187c7aa315bb51b54336cd939ad48070d150d3d9d714fcebdfdad3ecc74,2024-11-21T06:13:53.303000 CVE-2021-36628,0,0,12b5f61931f62c22ca7c9f0e8e93b73257aa8b268546957d8a2eb5e0a5b2e082,2023-11-07T03:36:46.600000 CVE-2021-3663,0,0,33a634768e6d1fdab04227dd002e876f24ceb85ab07aacd6f636a6935991d212,2024-11-21T06:22:06.313000 -CVE-2021-36630,0,0,137707dfd6fbb9b467288a4ac4912198c0243f8c54d7e4ee2b256aeb55188b28,2024-11-21T06:13:53.480000 +CVE-2021-36630,0,1,28c2f55e501d7cb6f86591cb6970908becaef5b15e786c41ecb7c31dec47e1b7,2025-04-04T16:15:15.663000 CVE-2021-36631,0,0,99903e4fab044b81f9519373ce081ba76f8dcb4c1f421b7fdc10dea8185db327,2024-11-21T06:13:53.643000 CVE-2021-3664,0,0,a577ae5ef543ddb2f39f257c7f0d932344fcfd86ce36b07023a15b5dc376ec79,2024-11-21T06:22:06.470000 CVE-2021-36646,0,0,72cba61e46b156ea6c81041d83d1cd63c2e8db79eb91392a512b25c80672512c,2024-11-21T06:13:53.790000 @@ -180496,7 +180496,7 @@ CVE-2021-37762,0,0,26561167c519f6f0e4d416c49b094a062e280524c267948986567c5b2ad3a CVE-2021-37764,0,0,84bad0ea60ace083da0392f211978eb109304c1308950fd2e736021dc305afb5,2024-11-21T06:15:53.030000 CVE-2021-3777,0,0,e1e17eebb4d576773fc8290b6277eae0769c710e1f5420a43cb78cfb1378b04f,2024-11-21T06:22:24.220000 CVE-2021-37770,0,0,4490c0dbe5d3b0ecdf0bf9c779581e5604d7014c50dfee9662620af87749efac,2024-11-21T06:15:53.220000 -CVE-2021-37774,0,0,ded8d22c1c5107deec10f341345c5b356ae1b34489c3190991c3f85d0befc3f2,2024-11-21T06:15:53.407000 +CVE-2021-37774,0,1,595a2c35e0b72fd9111cdbe7017a1f2b6a8ae9aac2370c5644475c5b8873e235,2025-04-04T16:15:15.990000 CVE-2021-37777,0,0,766aa40f883076daf1bb1f5dcf486d3d0211e2fad1d2c1077cab191b54f42b50,2024-11-21T06:15:53.590000 CVE-2021-37778,0,0,abc122a1bf68ef667b75b32a8bcf615bd72351c23603e2f586deb93be9a372fc,2024-11-21T06:15:53.767000 CVE-2021-3778,0,0,31b91296c008a3eb07c28de26839b02372ae57db8322cb05cda0d0fe92b60529,2024-11-21T06:22:24.373000 @@ -184568,7 +184568,7 @@ CVE-2021-43080,0,0,d962ce73c99227f6b965565633a443156698ab2725bc8d45fa281c93e592d CVE-2021-43081,0,0,9d349d6fac3c063f7e8be3835c7f60b9e92dc60cde7d55c89155da291897a9d6,2024-11-21T06:28:39.330000 CVE-2021-43082,0,0,48067304118b177a52056a074cddb09b92c5db6111172e8cbfb39fc0e942e70b,2024-11-21T06:28:39.443000 CVE-2021-43083,0,0,8984200c98715b4f5cac0e84ea8d0d31e66106585dd566115dddee264205e308,2024-11-21T06:28:39.557000 -CVE-2021-43084,0,1,146d10f08c740aecbcf1a8b9e941f6c60fb447a2245a39d7828e74d67df46672,2025-04-04T15:15:06.847000 +CVE-2021-43084,0,0,146d10f08c740aecbcf1a8b9e941f6c60fb447a2245a39d7828e74d67df46672,2025-04-04T15:15:06.847000 CVE-2021-43085,0,0,61c434b9000a15cb88702311e1170a4fd1d9f7dbb3802fbb396971f008707b12,2023-11-07T03:39:18.247000 CVE-2021-43086,0,0,bc64ba99e6f3150e2ad2b398324ac8d282c2adae334f2297ae4a38a1fca98422,2024-11-21T06:28:39.823000 CVE-2021-4309,0,0,49b78aea55636ca07fc699373be4356b79af5fa489969557411effc3f80a8d64,2024-11-21T06:37:22.830000 @@ -187389,7 +187389,7 @@ CVE-2021-47085,0,0,99425eb67a70567219ce9050998d710c23af03d38c7b64b5ce0c488c80c15 CVE-2021-47086,0,0,97374726f4d81b13e3e0fcd0fd950d498979b52d832f8136792be62734d99a87,2025-01-16T17:13:09.150000 CVE-2021-47087,0,0,25c97ac4fda2e561b2af6c8de0608f442e35153284faacd0793809b281ff7b19,2025-01-16T17:19:57.450000 CVE-2021-47088,0,0,76bfcd61b1680f7de367b3e8bdf24a6e4259682774fc43d1348d11d3a1fcb41e,2025-01-16T17:20:45.687000 -CVE-2021-47089,0,1,322a3c2dbc9e832b692836387268e5ba566e42941e167bc866d164b541522a7b,2025-04-04T14:41:46.367000 +CVE-2021-47089,0,0,322a3c2dbc9e832b692836387268e5ba566e42941e167bc866d164b541522a7b,2025-04-04T14:41:46.367000 CVE-2021-47090,0,0,f0566b1abe72f2b70a272678994d61c7dd4f65781ac145a39ee0bd31883befb8,2025-02-14T14:31:43.180000 CVE-2021-47091,0,0,efbeee9ac4a070f7c66218be3276705643cc8230c5872f22ea416a0c1b027a73,2025-02-03T13:42:00.400000 CVE-2021-47092,0,0,7a87f2bd2857613c1abd5490dd19eb36e03dec106a88ec6f9ef133e17e781475,2025-02-14T14:49:18.660000 @@ -187414,7 +187414,7 @@ CVE-2021-47110,0,0,cb86bb81302bc40090d4817577b77c3f7ce70fc4d008e93959037ce7e0b99 CVE-2021-47111,0,0,7853d7e123f2f740e36875caf615c0fbd8b5c160e12a785e4af5b89d8dd20d96,2025-02-27T03:23:04.663000 CVE-2021-47112,0,0,53ddad30b701a494bdc1f4de57dd54f390166e2cd6864341609d12a0c3b79093,2025-03-13T19:36:08.147000 CVE-2021-47113,0,0,a1fc7277120088335d8fc7060cbad4bdcd6649bbcad7ea4e328c174aa2082b70,2025-03-13T19:36:00.290000 -CVE-2021-47114,0,1,5fbcc5724fbeea0f46b43befe77e6815ae227f395225c76cbb52d4b838d85b43,2025-04-04T14:39:41.120000 +CVE-2021-47114,0,0,5fbcc5724fbeea0f46b43befe77e6815ae227f395225c76cbb52d4b838d85b43,2025-04-04T14:39:41.120000 CVE-2021-47115,0,0,f255399fb89ea4ffe6096e6f82439a37de26ac16dd3a923a8b2fb3dcb7c27662,2024-03-18T11:15:07.400000 CVE-2021-47116,0,0,02298962ea00799ddb41fef923f3717f23807aae52ca815ef460897f366279e2,2025-01-07T17:31:32.993000 CVE-2021-47117,0,0,92ad9c35c5aef91ffca969d07291796af685275ea5081abcd42ef3bdc76e41aa,2025-02-27T03:22:46.053000 @@ -187426,11 +187426,11 @@ CVE-2021-47122,0,0,9ed5437e226d5c2adada117d14bc702c320b44fe8e911e47dbe54e2d10713 CVE-2021-47123,0,0,c052c0f2e6e65c564bd573cc9f227818cc21c575ed6c1f6259f905965df056cb,2025-01-14T15:02:28.120000 CVE-2021-47124,0,0,3ecadf59750399c6db3e0804b5e76a5002587789cc805018453724df81731635,2025-03-13T19:35:51.843000 CVE-2021-47125,0,0,0c24e7c9f662e9f81dde4975d7878b1f80e26ba4dfaf797617d164908767a28a,2025-01-07T18:00:04.453000 -CVE-2021-47126,0,1,780ae5e60b8bf995b2ce2c08cfd33c352814a156b603cc29030b43be2245bd48,2025-04-04T14:48:08.527000 +CVE-2021-47126,0,0,780ae5e60b8bf995b2ce2c08cfd33c352814a156b603cc29030b43be2245bd48,2025-04-04T14:48:08.527000 CVE-2021-47127,0,0,ebe5d9e2681d9a417cb235248fa90255c41e030db394f5c355acffab8c09fe6e,2025-01-07T17:59:07.007000 CVE-2021-47128,0,0,dae14e67a0decf7757f41dd343911fd6754fe80af8d68f6781bfa13a87f74d14,2025-03-13T21:24:38.587000 -CVE-2021-47129,0,1,6006c6ae733c0582c8b36855648b3d40620a419a6613c95e2e0fbdf2eea78295,2025-04-04T14:47:56.107000 -CVE-2021-47130,0,1,9bf14ee32b963a8766e95591742955ef572b10400903bc54557259dc2fe46a16,2025-04-04T14:48:17.330000 +CVE-2021-47129,0,0,6006c6ae733c0582c8b36855648b3d40620a419a6613c95e2e0fbdf2eea78295,2025-04-04T14:47:56.107000 +CVE-2021-47130,0,0,9bf14ee32b963a8766e95591742955ef572b10400903bc54557259dc2fe46a16,2025-04-04T14:48:17.330000 CVE-2021-47131,0,0,6843a4177268e27bc2d42c274ea978461e2edb836553dbeac1d7e7508d608978,2025-02-27T03:22:12.870000 CVE-2021-47132,0,0,a4d10c74a9defcc1742e96e61b524cd8c46373ea908130cac0e571b45c1ee7a1,2025-03-13T21:24:27.137000 CVE-2021-47133,0,0,15f5446e43fa356d120f2d868f662208753386cbd9bfc3e70c007ae433610c0f,2025-01-07T17:30:18.143000 @@ -187524,27 +187524,27 @@ CVE-2021-47220,0,0,3b5282a5a78ae38dd9afefd942320359b1e71d1f67c1eff9fa622a893f6cd CVE-2021-47221,0,0,7afbe582defa95f34b58ec3b4d10fc6db91ded7409ab2f1fde46bee521aabd80,2024-11-21T06:35:39.267000 CVE-2021-47222,0,0,f0d76d0e2cdb314b19f8094ddd09a2b1cda77d6c5b61bbba0f92f2b58298fbb9,2024-11-21T06:35:39.383000 CVE-2021-47223,0,0,ee55a5c583baeb5d19b1f17a5fef9758100be306fbb75e1d2068efb4af89c588,2025-02-03T16:11:14.527000 -CVE-2021-47224,0,1,41c5745a8d6c9e9f9109630173332c8aebd7d32da5478a97bac31d9712e084f2,2025-04-04T14:32:24.247000 -CVE-2021-47225,0,1,1b7df927df61b01088aa3b2518228df0e2e1d8d45219d366971335637d46aec2,2025-04-04T14:31:52.047000 +CVE-2021-47224,0,0,41c5745a8d6c9e9f9109630173332c8aebd7d32da5478a97bac31d9712e084f2,2025-04-04T14:32:24.247000 +CVE-2021-47225,0,0,1b7df927df61b01088aa3b2518228df0e2e1d8d45219d366971335637d46aec2,2025-04-04T14:31:52.047000 CVE-2021-47226,0,0,f30b9d87a6a7d557b277d4806b13c6513a498660be0416059b5be5b74e30a49e,2024-11-21T06:35:39.977000 CVE-2021-47227,0,0,a996429321467fe01689843f15ca4e3a2b5480e0a7bc092dcc5d1e5eb8862a1c,2024-11-21T06:35:40.087000 CVE-2021-47228,0,0,23c74a2cbc379a427962cdb29bc670329efb60a4d07d6a3abae77ecd15841f63,2024-11-21T06:35:40.190000 CVE-2021-47229,0,0,7eaf4c4dfd8a0b01ff059e9e140d1f30b6435b38480e86920eedf73b5f29c12c,2024-11-21T06:35:40.363000 -CVE-2021-47230,0,1,2789114f77abd775957b84a83dd9d9f4dabd860f8d518b27baa487f3a576182d,2025-04-04T14:31:41.360000 -CVE-2021-47231,0,1,7e273dd72f3ee2b5b12508096d193da03270fae7eb4b5db0dc1e98349a68649c,2025-04-04T14:31:28.430000 -CVE-2021-47232,0,1,271dc2f7a1a16535b9d84acb7dda51a32c1eff791a1f21db202e0ed29f34d8c2,2025-04-04T14:31:13.503000 +CVE-2021-47230,0,0,2789114f77abd775957b84a83dd9d9f4dabd860f8d518b27baa487f3a576182d,2025-04-04T14:31:41.360000 +CVE-2021-47231,0,0,7e273dd72f3ee2b5b12508096d193da03270fae7eb4b5db0dc1e98349a68649c,2025-04-04T14:31:28.430000 +CVE-2021-47232,0,0,271dc2f7a1a16535b9d84acb7dda51a32c1eff791a1f21db202e0ed29f34d8c2,2025-04-04T14:31:13.503000 CVE-2021-47233,0,0,49bd84981d757bdeb030b5d808f06c049b1dc1bf9565f1010d44de6f30baa449,2024-12-30T19:51:12.613000 CVE-2021-47234,0,0,273d7ee3f66e04272422c623c3f10a6131b83f867533db8cd4feea3001cff253,2024-11-21T06:35:41.203000 CVE-2021-47235,0,0,8b53251b18ef7a00638c8566452347f25d3f12a1756e9c95ca2b9ee9d09320d4,2024-12-30T19:06:05.170000 CVE-2021-47236,0,0,b87ff6e7bbebf51be21d4b4f1bddb0b9e9f26bf1b1f348eef469192eeef1e5fe,2024-11-21T06:35:41.480000 CVE-2021-47237,0,0,21a5b46828785b47344dfa5d33d76cb4f95f34c264877088c08c9f3183bb0375,2024-12-30T19:05:28.320000 -CVE-2021-47238,0,1,ecefa626d382990cb31da0c7a4d6b9054d7d5cf136eeda16be42a49ac9a0f69a,2025-04-04T14:31:03.253000 +CVE-2021-47238,0,0,ecefa626d382990cb31da0c7a4d6b9054d7d5cf136eeda16be42a49ac9a0f69a,2025-04-04T14:31:03.253000 CVE-2021-47239,0,0,426aab874d3868aa4677b22537307b93d5214463451278a00c2a583e2a8b5c7b,2024-12-30T19:05:15.167000 CVE-2021-47240,0,0,7d569215feef44a17dae0b0b3463f2bc32c191ad3939d0983404aab4d26d862a,2024-12-30T19:04:58.760000 -CVE-2021-47241,0,1,0ea3c7dd76c6ccb843e0165dc2798781e79370bd29c76ef4adddf4ec8847db34,2025-04-04T14:30:41.063000 -CVE-2021-47242,0,1,a3ccc6be3463ca45c0d81ad6962dc9c44b58064e6393b651fd86692274376229,2025-04-04T14:30:32.843000 +CVE-2021-47241,0,0,0ea3c7dd76c6ccb843e0165dc2798781e79370bd29c76ef4adddf4ec8847db34,2025-04-04T14:30:41.063000 +CVE-2021-47242,0,0,a3ccc6be3463ca45c0d81ad6962dc9c44b58064e6393b651fd86692274376229,2025-04-04T14:30:32.843000 CVE-2021-47243,0,0,f3ce19b96978056d91cf0a2bc489aea47b0aa209106c9ae341645d6e0a65d4c0,2024-12-30T19:04:26.770000 -CVE-2021-47244,0,1,b66d044a83e59f75875eadae88b0ee07100402065cec11a916dc7f6f17841c07,2025-04-04T14:30:24.850000 +CVE-2021-47244,0,0,b66d044a83e59f75875eadae88b0ee07100402065cec11a916dc7f6f17841c07,2025-04-04T14:30:24.850000 CVE-2021-47245,0,0,4b0fd78442e693c8c9ad1c36bf34d80eb49c87d890eb02e4e5da728a0703b468,2024-12-30T19:03:58.273000 CVE-2021-47246,0,0,9f782402bd919affe114e8e45d84ed93cdf78270af91f3168742be0308c7f0f6,2024-11-21T06:35:42.950000 CVE-2021-47247,0,0,cf90397ea9a0d803e299cc12d5f4b86d634ea5464c7c4e150ba6bab1f935c450,2024-12-30T19:03:42.583000 @@ -187557,9 +187557,9 @@ CVE-2021-47253,0,0,9bc677a4b5d13cd8fd06f4b9374a9aa62a3778e7b12c1d5302b8dc1a583e0 CVE-2021-47254,0,0,8ad5e1955743b8c3f06c84a200072a25601d6c4b3267d5b5db59a4daa0deeb02,2024-12-30T19:50:58.543000 CVE-2021-47255,0,0,ab70f22d16c8786e854f11454b2eea8afe54254c834b2d2bd6063c66081a9479,2024-11-21T06:35:44.037000 CVE-2021-47256,0,0,0f51de379b692c2d0a857a25782e52c1e5499b2d759e9b9b493c9ede6fbb425a,2024-11-21T06:35:44.143000 -CVE-2021-47257,0,1,4b2ca160667ba35f82809e8bcdbf9da0dee4c2ac8ff284def180e47cc31485d9,2025-04-04T14:30:16.270000 +CVE-2021-47257,0,0,4b2ca160667ba35f82809e8bcdbf9da0dee4c2ac8ff284def180e47cc31485d9,2025-04-04T14:30:16.270000 CVE-2021-47258,0,0,4f4a1b110d061f9673aadaa4c56bdd1be27db2e710cd72471ea9130817d04f49,2024-11-21T06:35:44.460000 -CVE-2021-47259,0,1,9c2be4f657bb13540b70d0921f9256991628baba34117236ba73f87dd79d3c4f,2025-04-04T14:30:09.120000 +CVE-2021-47259,0,0,9c2be4f657bb13540b70d0921f9256991628baba34117236ba73f87dd79d3c4f,2025-04-04T14:30:09.120000 CVE-2021-47260,0,0,de274856a3b7f8e1f610fc2a4bb8c9f374b43bf7a91582bdc883aad46edd7aa3,2024-12-24T16:35:01.477000 CVE-2021-47261,0,0,084fc9509ee193d5a7bc1452c8c4e9638fc55f422c0fdcba5f460a2a51edfab6,2024-11-21T06:35:44.887000 CVE-2021-47262,0,0,461d2312c88f5c3d90b68aeac4255bd5721c21df1555b4eaef5e703311044b06,2024-11-21T06:35:45 @@ -187567,14 +187567,14 @@ CVE-2021-47263,0,0,dcefe631c466b35e0f40540ba2b98e1ec31fbbaf55744f2fa7ba06315fc7b CVE-2021-47264,0,0,ca0befb3f2cfeab4dd46a812016c35d2cc4743784a96a99ddec4e72f3ad432ae,2024-12-24T16:34:16.977000 CVE-2021-47265,0,0,30e7ca1b9773cb91789e3a60b13ecb7cec823e9a9924c6b30e3f34f498c2886d,2024-11-21T06:35:45.380000 CVE-2021-47266,0,0,8fe22556c970090a48c2d282192a952d7718c0b55583c4da380c25ceaddf3afa,2024-12-26T20:41:25.273000 -CVE-2021-47267,0,1,6dcbda73eb25a692018319c860316593e409b5b710bb410c2e43720a439d8033,2025-04-04T14:30:02.130000 +CVE-2021-47267,0,0,6dcbda73eb25a692018319c860316593e409b5b710bb410c2e43720a439d8033,2025-04-04T14:30:02.130000 CVE-2021-47268,0,0,c96a764ea61abe21b4dca87e4ec7590da2cd04480f8a40417548714fc05c32e9,2024-12-26T20:42:00.700000 CVE-2021-47269,0,0,4f34e7fdaf8069233f091ee4d570e2e19ca836c2f25897723ed1ff765446df2c,2024-12-24T16:33:36.863000 CVE-2021-47270,0,0,c225feecb56e43fc5dbc2007585ca168570d4e33bb3e9e3172076816604c85fc,2024-12-24T16:32:36.987000 -CVE-2021-47271,0,1,d9346b55778edf12a487f56d16b46df43a6eb384225e026b1ab86edd026e7bed,2025-04-04T14:29:54.180000 +CVE-2021-47271,0,0,d9346b55778edf12a487f56d16b46df43a6eb384225e026b1ab86edd026e7bed,2025-04-04T14:29:54.180000 CVE-2021-47272,0,0,c69eb2be8fce6d6565e5cc4d65c854c3be154d237268aa1e8cd3b803b2dfb1db,2024-11-21T06:35:46.283000 CVE-2021-47273,0,0,62aeef2b5f4a04d548c1cdb3808d0b3c755fbb7fdeec2f7d272fe5851d81110d,2024-12-26T20:48:47.207000 -CVE-2021-47274,0,1,abd5118b2c1421cfb276c676cd6020fcd786354ced7e4059ee79fd4712bfbae9,2025-04-04T14:29:40.560000 +CVE-2021-47274,0,0,abd5118b2c1421cfb276c676cd6020fcd786354ced7e4059ee79fd4712bfbae9,2025-04-04T14:29:40.560000 CVE-2021-47275,0,0,ba8f23f46e5f9c8a8196ced2309dd609ba17bbed5666b23650763bf7e676fd4d,2024-11-21T06:35:46.750000 CVE-2021-47276,0,0,4ac47ce93ef1167f4ed4314455eee89eff59b1a95f594d66693d87bab1dd295c,2024-11-21T06:35:46.860000 CVE-2021-47277,0,0,8690d7a30f6cb1d12af1b6c72d1e9e505e72994dacdc75c1965f64f8c7cb82a2,2024-11-21T06:35:46.993000 @@ -190954,7 +190954,7 @@ CVE-2022-21187,0,0,1d135f648ebbdd180bd8fb6f5e0091a95d4e1cf0f4d5afbeb9e91d8e78dd6 CVE-2022-21189,0,0,820bd922287b217cc3c5780caf1c8c6b90f47feae26ffd1b3701790151030e02,2024-11-21T06:44:03.913000 CVE-2022-2119,0,0,8eb0b937a72e140af2277ed237924c2980bb1f02ceb7ff56f3e0e22492913d42,2024-11-21T07:00:21.070000 CVE-2022-21190,0,0,62dff27c937eb7922e01099a3cec8102a2d847cad8ccd5883b7e4e95be234bdb,2024-11-21T06:44:04.020000 -CVE-2022-21191,0,1,87356cf4ebee1a0357f01ffc26e1d8a2f25af896a1b56e91935881ca8f149001,2025-04-04T15:15:42.860000 +CVE-2022-21191,0,0,87356cf4ebee1a0357f01ffc26e1d8a2f25af896a1b56e91935881ca8f149001,2025-04-04T15:15:42.860000 CVE-2022-21192,0,0,4fae1bd1b474af3227ec449de7be58179f5f8929a722d7a550c1c2ea0eb4f315,2025-04-01T15:15:49.623000 CVE-2022-21193,0,0,da971b183644d69bbac108c9bbc7812bec44dc44ad6ec6bc84dd1df46c07771b,2024-11-21T06:44:04.347000 CVE-2022-21194,0,0,7cdd50940e536c067f08e30cbee59d0bad89a942ab7b851854438fdb695b0fc8,2024-11-21T06:44:04.440000 @@ -195761,7 +195761,7 @@ CVE-2022-26498,0,0,d2750e69b7333cc4706d967c8f23457f8fa244b6e22975d12bfe7e12c9a76 CVE-2022-26499,0,0,1cdd26ed5e58ef882097d39560623abfd13bc779978ecbef055cf41ed30280dd,2024-11-21T06:54:03.990000 CVE-2022-2650,0,0,fb3e72c943eb1a0dc41cfb047109fab6bd0b8ffe7172b953f46301d46ba9ea14,2024-11-21T07:01:26.543000 CVE-2022-26500,0,0,56e552a80ead70b9947db397f9c93ec295e32096cc4e0d71499d6f8c4bcad811,2025-04-03T18:54:21.040000 -CVE-2022-26501,0,0,b8451dc91a4ba54c1319cf0145437ffc3d1564d09873d559a343b5ad75e9764b,2025-02-03T16:15:32.400000 +CVE-2022-26501,0,1,a277dc5632ba0282f9870d6d1da74734c0e67bc8f684c009d4c12233848c31b0,2025-04-04T17:53:23.537000 CVE-2022-26502,0,0,6c158b8e48bf872c03bb18028f17fab16559471e51c2521d21752938c095d52f,2023-11-07T03:45:02.353000 CVE-2022-26503,0,0,2d1300f968191f57942ae01395e753014d7c629d7547fa46d2c4f92c69a7bd82,2024-11-21T06:54:04.463000 CVE-2022-26504,0,0,b4fc3183f9a15f60690cb5f2124f0967ace998f90ba54fc0c97d66552ae17095,2024-11-21T06:54:04.620000 @@ -197813,7 +197813,7 @@ CVE-2022-29060,0,0,517312e06383b03d6422b1a06f8e527b095367c8feddac93c183d42bc2736 CVE-2022-29061,0,0,b022657f5e407e356c8f0bfc75ae7446ddaf6197cf90072b074acc396baa0578,2024-11-21T06:58:25.810000 CVE-2022-29062,0,0,082bedb404e279143e8220cf51db4548f3ea791c9e1cf5e032085ca92a1ac9ca,2024-11-21T06:58:25.937000 CVE-2022-29063,0,0,3ad24b28f1107a539d1ecaa2f1bba3f0f3999f9cb698136b73b0c95cef769295,2024-11-21T06:58:26.067000 -CVE-2022-2907,0,0,47ed9a31f06ec421e0729fa6a84386361cf19704c0ababba3c8e25650620fe74,2024-11-21T07:01:54.580000 +CVE-2022-2907,0,1,8efdb895a4ed469983e2c528fa370b4d7f2729decd28dfd2943719fa485be8d8,2025-04-04T18:15:41.687000 CVE-2022-29071,0,0,8eb18863803a28309cedad08183725d23c1d57c06f4181f8ac48b88673757ab3,2024-11-21T06:58:26.187000 CVE-2022-29072,0,0,7b426963dcf6654120f69b16e53d396ba81857c25dafec342ce1c8a1c709720c,2024-11-21T06:58:26.320000 CVE-2022-29077,0,0,aeaaaf5e3cc8be351f9a0639ea6fc32da38443f0e91f2319a22ca87822ea7533,2024-11-21T06:58:26.567000 @@ -198745,7 +198745,7 @@ CVE-2022-30187,0,0,607501c778be3bc5fa6c061564ec771fb1c2e5b83fbd551538ed55c8ae29f CVE-2022-30188,0,0,a0c743b3654516de00b971a72bafa2b41635bed46aff12fadc9168b8bf5de200,2025-01-02T19:16:22.083000 CVE-2022-30189,0,0,be04064b3ad5b3a61777506296101d3f2b4c2ab93a2314c9119d43cc77b86c28,2025-01-02T19:16:22.197000 CVE-2022-3019,0,0,699aa72743ebef964bd50c3b949d73c946ed800706a74517bc948b67f928f914,2024-11-21T07:18:39 -CVE-2022-30190,0,0,eeaa0f947b59033791abccb441b7941d66dec591b908eb5b9fd0bed1174b0b4f,2025-01-02T19:16:22.317000 +CVE-2022-30190,0,1,08f5866aed3a78222767864a40caedb7a6f80a63e932833896b1289b1baf0ebd,2025-04-04T19:53:19.093000 CVE-2022-30192,0,0,d0fa3f703c3532d2882a3ffa92d6ac8f74486d22b3b21d3b4689701d5ae7a39e,2025-01-02T19:16:22.460000 CVE-2022-30193,0,0,e1012bdeb2f7d44c596c9dd5b6f2695bb91fc936b857957cfbe4a94cfcf3bd11,2025-01-02T19:16:22.607000 CVE-2022-30194,0,0,0f02841c3d18f663a3b092e71d1216fb48b288beb8580df1e48bd2877b0bf8cd,2024-11-21T07:02:20.577000 @@ -200191,7 +200191,7 @@ CVE-2022-31890,0,0,0265474ae73516ba39374fd36e0aa764d833beba2c251bfd2fc87b8933b7b CVE-2022-31897,0,0,a461f02f9809dc1857ed2e240c74a8fa727acdb230c95747b738747c4fc9ff57,2024-11-21T07:05:27.433000 CVE-2022-31898,0,0,71bd4c2dac1e95822832ce61eeb7a5b66d613c6a34a707a2e697cc6fab61e97c,2024-11-21T07:05:27.607000 CVE-2022-3190,0,0,7d0f3facd9bc8a4c590d667205eff627cb38dec6165c3d15e1140d1436d0ed9b,2024-11-21T07:19:00.663000 -CVE-2022-31901,0,1,714645dded905e9907894a07d8b3d867d623e74b29f989c613cf86bcd43750b0,2025-04-04T15:15:43.120000 +CVE-2022-31901,0,0,714645dded905e9907894a07d8b3d867d623e74b29f989c613cf86bcd43750b0,2025-04-04T15:15:43.120000 CVE-2022-31902,0,0,184c2985f505fe74ba4c70aa104a7219dba41395df79704531935d5c54ce0339,2025-03-27T17:15:36.997000 CVE-2022-31904,0,0,142d7277f90ba1c012fdfe3652697f99d1337e84fa128855121cadfd88f615c5,2024-11-21T07:05:28.067000 CVE-2022-31906,0,0,421001b487d5e4df7924229d9e2d98878f2bed28b5ec1537ad5f76e14809be9a,2024-11-21T07:05:28.220000 @@ -204131,7 +204131,7 @@ CVE-2022-36756,0,0,54dff35854a57fa8ac38231d612c2e37d8a8c8d0f1472b62ff6ae28996d7b CVE-2022-36757,0,0,53c4dba27115fada1982838f7214a8bc085f21a0e965378d7c8be68d4a011241,2023-11-07T03:49:40.613000 CVE-2022-36759,0,0,527d051aa8285d1be263be86ae5acd4be46d4c5bdf87fc1d8d26a49fd6e41572,2024-11-21T07:13:39.207000 CVE-2022-3676,0,0,1c348eee653edcead0ccfe1919b4e1f0f7e73bd2b8fe131e915882596d368bf4,2024-11-21T07:20:00.730000 -CVE-2022-36760,0,0,5a23ff0e4727eadfdce8b2bd4662a636099c11ac8fffa880b3c87c18a069e167,2024-11-21T07:13:39.360000 +CVE-2022-36760,0,1,9a3b1cb8e7b921f5184b6e3f12b3f949851e3486f5fccd20b9a1e1dbcaf39188,2025-04-04T18:15:41.907000 CVE-2022-36763,0,0,fd38b8912ad101f0cbd79dc341cf9a052de50cd1c5c9d3f479c325b96ccaaf8a,2025-02-13T17:15:41.607000 CVE-2022-36764,0,0,25e254b0943c7b1f6cdbc2da08c3db091ce9710b9f3fd72c040facb5ae26e4d9,2025-02-13T17:15:41.763000 CVE-2022-36765,0,0,5069aeb0623fe94e4faa3e254885d316db8b08a5e269ac6f1ecb3a6cdb8f7abf,2025-02-13T17:15:41.883000 @@ -204693,7 +204693,7 @@ CVE-2022-37430,0,0,b712b7324b4c5580b116779aa6edde4e3cda42ed340fe181e575a363ea445 CVE-2022-37431,0,0,288eb7c15a50de8385b06ad21a7c09009c78a5fc4f3b772d7147496f88a36d4c,2024-11-21T07:14:58.917000 CVE-2022-37434,0,0,7e9d4507813341bae6a1d234897faa8d825eaf192793876cea776670edba8ae6,2024-11-21T07:14:59.070000 CVE-2022-37435,0,0,f7f764d395db1059f1fefb777df38872ab6d3d6be767094d1c1d4dedea985c9d,2024-11-21T07:14:59.333000 -CVE-2022-37436,0,0,e7e2e578f7a08b380c9936a1d4fcb12f8c96e2d3bafc25f24cf313c1bf6ea2ff,2024-11-21T07:14:59.487000 +CVE-2022-37436,0,1,5d6dedf8b45d479a1176ae066b5d3a80da81a86cb9902820a3548835cd340cc1,2025-04-04T18:15:42.127000 CVE-2022-37437,0,0,726e8ca933c62fc8a503ff4c253a97f2294b39523c1ea595af02bb42e1ef4e32,2024-11-21T07:14:59.620000 CVE-2022-37438,0,0,77836eaba2cd3112b241961e80b5d0d28a04a083039932e1ad55aaf19f6cf818,2024-11-21T07:14:59.743000 CVE-2022-37439,0,0,434fd3eb8cbfd22e0899e278fd360206993d3b28126618718a9ebe5d54b3a10d,2024-11-21T07:14:59.880000 @@ -205970,7 +205970,7 @@ CVE-2022-3919,0,0,2f20f4155e2e20c7018e9d601630dce9aeca056fb36dc50afd5b1164bd67aa CVE-2022-39190,0,0,6cb35d67691510584c4bd6888823b5ed35dd2078c318a9a2f94bd5691c19f37f,2024-11-21T07:17:45.207000 CVE-2022-39193,0,0,58085b8bb1a3b1a064ec3d426063e7410eb24c27e02f6facc9371fb82b8a2b62,2025-04-03T16:15:23.657000 CVE-2022-39194,0,0,46c8a570d410731976d04ee364f2f8e06f9ddaea94b4c2cf8db59b17e6c55d40,2024-11-21T07:17:45.533000 -CVE-2022-39195,0,0,3a732f5cb026dddd584d4856f05e2b8f9d2cab78675cc49ceb96174e66c7c2da,2024-11-21T07:17:45.673000 +CVE-2022-39195,0,1,67f3a0637efa7760486974ff90ab26cf24c90e091d1ca6d77675abb5d673abeb,2025-04-04T16:15:16.213000 CVE-2022-39196,0,0,74e906816e427af75641cb8c15fa5b5efcd016e7b224094c75d1351a79c991e8,2024-11-21T07:17:45.830000 CVE-2022-39197,0,0,fa6ebb795ba9dea41184de6ad0e7bc724baac4aada75af5e2ea32f74d7d9428b,2025-02-07T12:43:45.963000 CVE-2022-39198,0,0,14067e2e95e31a9b37acb04ef28242a7c83d84ec7fdc3fd3e6dc62428025ac1d,2024-11-21T07:17:46.130000 @@ -206897,7 +206897,7 @@ CVE-2022-40596,0,0,d4e5fff88375cb6a2c6ebb65f06ca865f1ef6a19cd0368e41487d99a20852 CVE-2022-40597,0,0,46ab07fca2fa8070c19bdee827b293eaf21d2be467f28e4586315b068b45938c,2023-11-07T03:52:30.813000 CVE-2022-40598,0,0,b2abb4d612c3b3ca1804185012740f41cfede91ead46c0edd1be35dca2e19db2,2023-11-07T03:52:31.057000 CVE-2022-40599,0,0,fe063e8eb3a7887a08229ec5806fc1869fcbd068a74ce297906c034365f83410,2023-11-07T03:52:31.303000 -CVE-2022-4060,0,0,c542b3518cf6f01fd6bb26572f0bdea967473c67b83a28dce7f45e287931a990,2024-11-21T07:34:31.790000 +CVE-2022-4060,0,1,2c366d15f375ba364981d5447f7366738afb31026ad6604fcc354db33eded332,2025-04-04T18:15:44.157000 CVE-2022-40600,0,0,353b247bcd635f6a3ece51c439e894aedd448f8834aef73d7eb32f761112dfad,2023-11-07T03:52:31.563000 CVE-2022-40601,0,0,2d211d828bad4a4d19a0e2f0695fdbc87bc5d1abecfb48e63968cb5605774409,2023-11-07T03:52:31.807000 CVE-2022-40602,0,0,040f22b42e17591a18d6df1b8cad3bd1be6eacd92b4081cbd8e644726847af9e,2024-11-21T07:21:42.040000 @@ -207240,7 +207240,7 @@ CVE-2022-41006,0,0,6f42554cf68eff7cba15d7fb7fec84aedf3e9d04d01b9867cd0304a40c019 CVE-2022-41007,0,0,738ce30398f893fda2a3f88c319bc4565c1ad5b176ea8bad6dd22263bb720864,2024-11-21T07:22:25.970000 CVE-2022-41008,0,0,cfd89c3fff5e43e2443fce764fed0474f578103a0e7008f5fc0514842852757a,2024-11-21T07:22:26.090000 CVE-2022-41009,0,0,662e752078eca72e874b9bf02bb2bb5288876bcb59ff0c6281e82f7d2b8eff37,2024-11-21T07:22:26.207000 -CVE-2022-4101,0,0,3612de4b5605a1fd70efc2c3fc5be3e7360d412010d2737a7b758072a63476ec,2024-11-21T07:34:35.147000 +CVE-2022-4101,0,1,ff07a42dbce14c42d8fcd3040be08d6affa011e3c3204a9d048e0697466e2bbd,2025-04-04T19:15:42.527000 CVE-2022-41010,0,0,dfc027d38ea5dd1c5a7981e1b9240beeb3a7cf5728fcfbfc9d5e9b13f7e87427,2024-11-21T07:22:26.330000 CVE-2022-41011,0,0,e71bcba445e29f62ea82244636af4412c04ba21bc7ce79321e635128b74fee0f,2024-11-21T07:22:26.450000 CVE-2022-41012,0,0,e99d7b89eefa556036929f261e10491a9f221698d43c23e22ad67c2634a5ee06,2024-11-21T07:22:26.563000 @@ -207430,7 +207430,7 @@ CVE-2022-41206,0,0,462b56acc9f58f665f6371ec0944c547f2fe570ee4f3a613fdebf56de37ad CVE-2022-41207,0,0,62a0451529e43beab2ede66126753dfb88be927ed47b01d7494c637f15c583b7,2024-11-21T07:22:49.737000 CVE-2022-41208,0,0,9c494d4c5378380c4c737436ce60dd721f9e2b6977fa197e36b5c142da4a2261,2024-11-21T07:22:49.870000 CVE-2022-41209,0,0,029518dd7b54ed490734939d8934456d86490ba400ab8b5b490d7dffba224898,2024-11-21T07:22:50.017000 -CVE-2022-4121,0,0,6dfe39dd83733c793193c92044a4cfedb048143bb41a6257ba1be09a359f3ff6,2024-11-21T07:34:37.097000 +CVE-2022-4121,0,1,6ba6363d34b21d330d92a7932717a32893f0acadbba15d4d4ac85f04c2dae131,2025-04-04T18:15:44.327000 CVE-2022-41210,0,0,69e6f29338dcfcc05e2c2be83cb86ee2159a63d21450bb0bff7c99c3efa71938,2024-11-21T07:22:50.157000 CVE-2022-41211,0,0,812f9684bea4455a57382c28306d28fbfe990a075bf9729485c93c11c61a881c,2024-11-21T07:22:50.293000 CVE-2022-41212,0,0,e34d57829fc28983588a7e26bfd097eb3795c07f974334cd2578b0974c74dc72,2024-11-21T07:22:50.457000 @@ -207871,7 +207871,7 @@ CVE-2022-41718,0,0,ede4edf1910fc09ee7773999b62e824282ceda5088eab3fd9bae27fdceb8b CVE-2022-41719,0,0,cccf3bdb9fa07a25ad1c0144570bbfa54d917fc962c47342552336a993c12547,2024-11-21T07:23:43.917000 CVE-2022-4172,0,0,2cb47956b89e299f1df10599ce8475055accea782cd8c798098a771ae9e979f7,2024-11-21T07:34:42.873000 CVE-2022-41720,0,0,5bcfcc00915c50717394d7d3984812777c51ef9f89baddec6b83df38b66b6095,2024-11-21T07:23:44.050000 -CVE-2022-41721,0,1,2e8bd4573f0dd62fcea2f7048390dbb028e010c1c9869b5f1ee617a97a53ecd3,2025-04-04T15:15:43.490000 +CVE-2022-41721,0,0,2e8bd4573f0dd62fcea2f7048390dbb028e010c1c9869b5f1ee617a97a53ecd3,2025-04-04T15:15:43.490000 CVE-2022-41722,0,0,21edb3cda67287dfd0ffc979054d906f188d50029c0f926116230a80d10169b7,2024-11-21T07:23:44.303000 CVE-2022-41723,0,0,cf9cb94d15885bd7ea9ff7c8384190144755095780eea95482d8cb72654b97da,2024-11-21T07:23:44.433000 CVE-2022-41724,0,0,5d9077e26aba233bf85ca2aa9f7dff639241c991da10a0083d4b9cae432b2eee,2024-11-21T07:23:44.603000 @@ -208126,7 +208126,7 @@ CVE-2022-41986,0,0,cf79a91ce6b76b22e957def869ad0fc5a4bef50063daa1521777b47441741 CVE-2022-41987,0,0,7de0a58779be51514e5212fa515bc3f54ac9264b75ea4d2523064fa2cec6305b,2024-11-21T07:24:13.267000 CVE-2022-41988,0,0,353c638890854382c4b7034a38fde16e9c502b7f38dd6597be65cca7d71b556e,2024-11-21T07:24:13.393000 CVE-2022-41989,0,0,339a4b90488b10eb350385d5726ba24eecab8f76ba033e149cb02cbce8dc9a03,2024-11-21T07:24:13.533000 -CVE-2022-4199,0,0,efe47adf26ea7025b56c91c7b5881bdb5fb2f98569c680f4c18c98dd6e6a5b62,2024-11-21T07:34:46.013000 +CVE-2022-4199,0,1,8b8cb6f26913146eae8f4d383a7199fd571a97aa9421e484ed9ac74cb04901e8,2025-04-04T19:15:42.767000 CVE-2022-41990,0,0,bfa1a664966e687b1b7d9c1a7112089c069a86283470e17769f3db13cf03e02f,2024-11-21T07:24:13.673000 CVE-2022-41991,0,0,e4ea4badcae344ac3deba47ad7f1c2c52bdd96180e60fbc09ee63244e40f2377,2024-11-21T07:24:13.800000 CVE-2022-41992,0,0,9af5debdbb8547495eb35771bdcc53c9cf3d19aebfd0a9a3fe4bdb74f12874ee,2024-11-21T07:24:13.920000 @@ -209000,7 +209000,7 @@ CVE-2022-43184,0,0,16e81c01274e9b757aa5044d6011ac631b77d16cd6dc7525b14bc8b21cd6a CVE-2022-43185,0,0,c7e068b381f7cefff3e0c90b6430726ab92b680dde480143582234e7f6c623a0,2024-11-21T07:26:02.537000 CVE-2022-43192,0,0,87f862f5f065aa042eb9f1bf960507b1da1f9cae0a0e3a2a34c62d4bf60293f1,2024-11-21T07:26:02.720000 CVE-2022-43196,0,0,1d6e90ed214f74fa6689ea90976202f5599fc74d1227aa5b5d2a58415bc3e35d,2024-11-21T07:26:02.893000 -CVE-2022-4320,0,0,4b16d0b9aaa0438d2c786a238952bf489a1e1e9d5b6de09a2502767fcb0aaae0,2024-11-21T07:35:01.773000 +CVE-2022-4320,0,1,9b081f913f5eb4a2ca106bf7d0c28a39065b49b49d8418d172f5b052de33da5c,2025-04-04T19:15:42.950000 CVE-2022-4321,0,0,53cca62a0435d9a9909d1296bdaa42a8cdcbc9a693ab7d58ff9d1dc3b5edf5e3,2025-03-26T19:15:21.120000 CVE-2022-43212,0,0,dc155cee00413a472ab9f884a5c06c4dc02ebdf9b031f6cbdf1ec267c538c2b3,2024-11-21T07:26:03.093000 CVE-2022-43213,0,0,ddee0ae0c82cbf5d0bb69d5d9ded5c9b3866e8469735f67558035140e4da6182,2024-11-21T07:26:03.267000 @@ -209457,7 +209457,7 @@ CVE-2022-43711,0,0,3388522575c0ccf2bccefcbbb1411b6bdb22c68304b95d949ee1660416a07 CVE-2022-43712,0,0,ca7c420e263beb4d5b336327e8edbbd9130860d9e56d6598ca52b309d4190910,2024-11-21T07:27:06.840000 CVE-2022-43713,0,0,4a91a0b7bd53c23258682ea23bff06299a6e175ad27c7077a2b6b927fcab5582,2024-11-21T07:27:06.990000 CVE-2022-43716,0,0,dc706e66e13258e669faaae8c3d8041c9a79ed2f082fdbfa2b1590b80a535492,2024-11-21T07:27:07.160000 -CVE-2022-43717,0,1,c68d17e520d63f61541d356fe695a522a2a890e427f406ca2af8d3853d77b72f,2025-04-04T14:15:19.013000 +CVE-2022-43717,0,0,c68d17e520d63f61541d356fe695a522a2a890e427f406ca2af8d3853d77b72f,2025-04-04T14:15:19.013000 CVE-2022-43718,0,0,eac9bbd084230c003cc6e95fa4f274a66d3ce62fa3f067ca2f660d3c463f7d93,2024-11-21T07:27:07.510000 CVE-2022-43719,0,0,370312c111b96441528587453137949dc66bc5374aebd6390e087d660cd03d93,2024-11-21T07:27:07.657000 CVE-2022-4372,0,0,1dff3b9eeb994dbb535107865c5feb4e514431545f00147f5c3338ef6397b735,2024-11-21T07:35:09.147000 @@ -209913,7 +209913,7 @@ CVE-2022-44413,0,0,6a62ebb5d24cd2de0996250fc6339c605c998d176b623742dab65c51155c6 CVE-2022-44414,0,0,b71d6403569be8c16e0e037b382af26d2dc1abe034d965988ece41662b9159a3,2024-11-21T07:27:58.900000 CVE-2022-44415,0,0,178d0be67a325f02fd2c67522d81dd1b7826c40d5252346c500ba9bcbd749950,2024-11-21T07:27:59.040000 CVE-2022-44419,0,0,6a727dab633571fe6481c53cd72e4e8c2203bb1cfca28817af1e0d0544a9e61b,2025-01-28T17:15:08.797000 -CVE-2022-4442,0,0,1740a9780118523d10de3216fec549482d7a9aa79f033a181f84593f69dc3bde,2024-11-21T07:35:16.250000 +CVE-2022-4442,0,1,420168bcc0a0834b5bb3cbee4401713f23ea4c408f19aeb110bcd2a8d0bb0946,2025-04-04T19:15:43.110000 CVE-2022-44420,0,0,a85fc762ee45f344cf3503d11aa65ca22215f5cf4f451fd29b0f7ac3ae73574e,2025-01-28T17:15:09.023000 CVE-2022-44421,0,0,8f936955fea35848be3acbfe4bdb9e042f8d824ea4e66f27d9a2593de35a5a62,2025-03-26T19:15:18.707000 CVE-2022-44422,0,0,67f4d09da2513cf7e8f2d61f9b02da3a46aa7b25fcdcfbca799bf120bdede910,2024-11-21T07:27:59.550000 @@ -209972,7 +209972,7 @@ CVE-2022-44499,0,0,8770ebef5c50092f8e4dbe21ee06b0f338a902c810b6e3a20ddf7755eaf3d CVE-2022-4450,0,0,2daa233fea478e1e683e7c1bf04139533db6fca171b5f8365220aeff1f55a1de,2025-02-13T17:15:50.823000 CVE-2022-44500,0,0,b21789a06c67e872d5d73daab04f115073f5faa5e6ec649e0d7f940af0d83165,2024-11-21T07:28:04.970000 CVE-2022-44502,0,0,b5562c7b8267cf67bf0ad6ca70179251fa1596a66e437cdd39ac0d59e88570fa,2024-11-21T07:28:05.083000 -CVE-2022-4451,0,0,71bd0c76cc1206fc647acf97e23ac3111e5623c6dfa8588b7cd098d39f11a0f8,2024-11-21T07:35:17.343000 +CVE-2022-4451,0,1,94fbfeffdb5465b35b24c18a5b7f9c64c88d26ede433a21654630bae1cefe843,2025-04-04T18:15:44.550000 CVE-2022-44510,0,0,25c4d0e9515b57632bcb3ae200f1085ef683d9e98b07dbc882d3305076a893b5,2024-11-21T07:28:05.197000 CVE-2022-44512,0,0,43f4e241cc8b703ceac411c19cd4d7c842322086847b0281c360ef59d25eb6a8,2025-02-06T18:19:26.530000 CVE-2022-44513,0,0,e3e2f49bfcd0b9b1436ecc66c933735e22e67eb9a4aa92e897c2b432b665c954,2025-02-06T18:19:01.817000 @@ -210050,7 +210050,7 @@ CVE-2022-44591,0,0,c847c79694e4ea0add459ff62a58817005ae0ba77ef3c55979619aef08bd2 CVE-2022-44593,0,0,90f8ad45672b1e43741913eaec2f22fe4107cda8646e72a10d74cce24b42f4d1,2024-11-21T07:28:11.120000 CVE-2022-44594,0,0,3797627f5d9a7951679266893bd3b9e56dfea89d1537aef29a76d6259b20dd89,2024-11-21T07:28:11.253000 CVE-2022-44595,0,0,f6edec7b746eadd6b80ddc08b85bd3174a58e64c71edc46fa6aa704293243982,2025-03-19T10:16:58.517000 -CVE-2022-4460,0,0,5d416431f18d1983565581f213317edee4176c1705777f42be098b34a9819d28,2024-11-21T07:35:18.607000 +CVE-2022-4460,0,1,c620fc889589ad2a4cbcbec086d6f5613754a5e2f226bc0066ea4bfeebe18b3a,2025-04-04T18:15:44.720000 CVE-2022-44606,0,0,2ccd26fd5b50f4804b17f1c50f3dc9bbf076fa560859eebce0d574433978d320,2024-11-21T07:28:11.490000 CVE-2022-44608,0,0,ad65aee2635b2f9ff93e46fb7d8cb8cacaf9b74447958429b04124cd4700ade4,2024-11-21T07:28:11.590000 CVE-2022-44610,0,0,cda13df8aee1e4054b0e8db128902fd2cb971ecbd170a048e5073e1bb3dae885,2024-11-21T07:28:11.710000 @@ -210065,7 +210065,7 @@ CVE-2022-44622,0,0,9bdb8fac7b34730223f6cfbaa9a430811767c66020040e89b44b4deb9b6cd CVE-2022-44623,0,0,6f87e64127353215e2610cc419c9a004dd2e3345072c4f859f5409bf6e85d7ee,2024-11-21T07:28:13.013000 CVE-2022-44624,0,0,fdc82fe478c654770a76eeee82c91554b0640be0b4bbb39a0031ac8fd88f7cc1,2024-11-21T07:28:13.137000 CVE-2022-44625,0,0,bd4e1318c1c320239916c87c83f90267c5ae3a6cfc4687b9c085bcf3495f2345,2024-11-21T07:28:13.257000 -CVE-2022-44626,0,0,dd2df4e133567169be68b9e8014d29bba002e1103942dd4236bbab15d279e8b2,2024-11-21T07:28:13.380000 +CVE-2022-44626,0,1,ddd11b4ea08fd7702c13a71cbc6375cf6a0c563e7d36b1ec7495b4612c8fe6e9,2025-04-04T17:05:15.060000 CVE-2022-44627,0,0,96ad517e2eef887423b11abe7fa234278be03432606f3d9cc5605e4ff0e4c0e8,2024-11-21T07:28:13.500000 CVE-2022-44628,0,0,ab83ff8456c4c6aabbf395ae1a814ccd07d78fc3286f8550b6a87a086513abaa,2024-11-21T07:28:13.620000 CVE-2022-44629,0,0,76ad5380113de382dc4c3ccfd01c538e1082578f1535cc58ab9fc3a8da6d2c04,2024-11-21T07:28:13.760000 @@ -210181,8 +210181,8 @@ CVE-2022-44755,0,0,74f03050e308dcb6a29eac1fb0f6089c2c095a30bc14a1a88d962e16a33a8 CVE-2022-44756,0,0,258ec21cab9c07f2fe3b8f839af3830910c35ad5ec9141e6591eedd6a1e8b64f,2024-11-21T07:28:26.313000 CVE-2022-44757,0,0,6b570b672d1d9bfe44c45c0bb24adac244645df35c4fdcf8a62ac1d537d14b56,2024-11-21T07:28:26.430000 CVE-2022-44758,0,0,6739bafbdcba12503a739f5dc296c878ab8377bde595c0009a0a4de1be4b6b1d,2024-11-21T07:28:26.567000 -CVE-2022-4476,0,0,cf211802cc2c46442d25240208a07f166ea31caf66788a654e40fcfc16296077,2025-03-21T16:07:09.227000 -CVE-2022-4477,0,0,1b3ba0fe74fb0356d6b9cf3c1108ac06330f65f069641afff74661bc6cb09efb,2024-11-21T07:35:20.510000 +CVE-2022-4476,0,1,467789df039b3f4275ebd3d97e22e25f068e3e55e3f6f7767a7b3e51cf0e33da,2025-04-04T18:15:44.883000 +CVE-2022-4477,0,1,fa9cba1594aeeaf90cc1ad03c46fb13b02b004d2cd24183c4a9e6f95e00f35b7,2025-04-04T18:15:45.060000 CVE-2022-4478,0,0,fb96e960061248561323f5d42f28e80cbfe355d86d135ff7f9ee1b4ac4eab1c4,2024-11-21T07:35:20.630000 CVE-2022-44784,0,0,0c464445f0cd2c7e0afa5910515a5ba673f7784d934a612545a0c6c74631f407,2024-11-21T07:28:26.683000 CVE-2022-44785,0,0,ad6d217cabf59b8cbc95d0b5132592855d6f40d6291511556782273d3b4b0f65,2024-11-21T07:28:26.823000 @@ -210198,16 +210198,16 @@ CVE-2022-44794,0,0,dae146d913ca5007c3ed48023c527ddd105c245d06f76af539eab439d1072 CVE-2022-44795,0,0,4e9fc84c7fc093d109644b489a9d1ef246d47a27e2a663de516cc43709ab2f5b,2024-11-21T07:28:28.097000 CVE-2022-44796,0,0,fabe7ae18d724c9cc72cecb6a04533ba97d3ca005b0a708d8a649021ab1b03b9,2024-11-21T07:28:28.227000 CVE-2022-44797,0,0,bee760686d211f3c6e6e5658ef83b88f726413109481c22e3242cfc01f37084b,2024-11-21T07:28:28.360000 -CVE-2022-4480,0,0,64e80a3a920396965c158b373e9e722d204ca4df56aaf694be78af2699025026,2024-11-21T07:35:20.877000 +CVE-2022-4480,0,1,b80cbe11ddae958d960ce897aef7cdda3990ad0ad077a3ea287b1ff069a448a1,2025-04-04T19:15:43.277000 CVE-2022-44801,0,0,00b3b15217d05d15e9942378eca1842f0469b9d76377dce4e65e60a5a3973991,2024-11-21T07:28:28.503000 CVE-2022-44804,0,0,0b5271b1ad7f1c9550566af5c3d2547481f41a6482fa6e5e3ba8c3de90009b3d,2024-11-21T07:28:28.667000 CVE-2022-44806,0,0,973de7817179be3b93a7701ba4c36f23f3c1130897baf56af1f7b72952951b03,2024-11-21T07:28:28.817000 CVE-2022-44807,0,0,e3277e96961404031d95179ff291c3e99d342999e7260792925c8ceee019c66b,2024-11-21T07:28:28.963000 CVE-2022-44808,0,0,673685988667c201fe05c640d40301441f22ddabd81c549b3e23b937ddd545c9,2024-11-21T07:28:29.110000 CVE-2022-4481,0,0,1faf2666d7ee0b1ba6bc9de8e22ff3192c526adda918dee19a4fc8da7107bb1c,2024-11-21T07:35:21.013000 -CVE-2022-4482,0,0,a94f5638659d70ba34833edcaf56d6b75b2129805cce1966bbfe7b742822b358,2024-11-21T07:35:21.123000 +CVE-2022-4482,0,1,148453268811ff6a98c89dbada4ca5bd175fac48f4a07e6ea20e99c247b188d1,2025-04-04T19:15:43.437000 CVE-2022-44820,0,0,983eb0c0c9ef3521386c511e70613a1e6fc2530624b8e7447286ca7ceb4c9aea,2024-11-21T07:28:29.283000 -CVE-2022-4483,0,0,97779365209fd123f3a9585c855f76f14c4b8dba636538cd713a7b1f7129bd6c,2024-11-21T07:35:21.250000 +CVE-2022-4483,0,1,7551eba602b372786f7ade92fc3e8f29917a2fb615a80923df06a0f85c40bac2,2025-04-04T18:15:45.227000 CVE-2022-44830,0,0,713a5276c1031baaf2867b5b7e234d0191e47e04fd0d7ab864719d90ba8f3450,2024-11-21T07:28:29.423000 CVE-2022-44832,0,0,4bf59a2795763225cf9ec0e31a3243dc96c265e2e8ec7feae4ddfccf9bb64a6f,2024-11-21T07:28:29.550000 CVE-2022-44838,0,0,3139ee0aa0a8d41cd56ffe02169565648b91606bc49997b68062760672554cbf,2024-11-21T07:28:29.703000 @@ -210322,7 +210322,7 @@ CVE-2022-45066,0,0,3a5f15f57f42eda080a2888a3f7880f3abe7246bc0dc95b2834d7bf959e29 CVE-2022-45067,0,0,e2895a1f219722bd7d8e458690731d98f48a0b0e12c7af783d3995b745f09884,2024-11-21T07:28:43.030000 CVE-2022-45068,0,0,8785e9709a1d9c7ba6044056a8c0e5860600f6efdb5e8828a0fa51aeb9ce98a0,2024-11-21T07:28:43.150000 CVE-2022-45069,0,0,fbf618a6d8ef7b73403d387b1ecdd7bff6b2dbb70b037a226340fdcb0ff28d26,2024-11-21T07:28:43.277000 -CVE-2022-4507,0,0,1fb4fcba2ae921a63c7d2c5d9b4d26c51b53c1d06ca14ddb0036ce9c5808977e,2024-11-21T07:35:24.090000 +CVE-2022-4507,0,1,81b9085ff5957e7de0de00a97b4323efb84c9cd2559be5a15507f9e9e5cca0e8,2025-04-04T19:15:43.590000 CVE-2022-45070,0,0,7fdbc074b1f7b8078ad6df9737e14ba8ce6b4c6e2ddd4fbea0441c45cd653fff,2024-11-21T07:28:43.393000 CVE-2022-45071,0,0,e04df6911d51fe7f77bdaf9c2098a6b2b24b1193494adecc3bce7c4b687a9ffd,2024-11-21T07:28:43.510000 CVE-2022-45072,0,0,82b9c3f70fd9f09a9a4601f70615209b975e4514389fe4bdde3fd0747fe5953e,2024-11-21T07:28:43.633000 @@ -210332,7 +210332,7 @@ CVE-2022-45076,0,0,3aaf7134f98bd3fa3fe7ef61171d32c42bc6f3964367f5cd7e3320ae04176 CVE-2022-45077,0,0,9bd2f9f4ff6837ffeeba35d19b4f0d970726243904c03831fd7feec103cd555a,2025-02-20T20:15:44.120000 CVE-2022-45078,0,0,406f64d7f878be2dd47674f92e61a9bb9f9231ccffe069a2fc8995da9a4eefa0,2024-11-21T07:28:44.240000 CVE-2022-45079,0,0,96834fa5aa596d9496a9511ca6cefe5b9376a3299d9e7e76858d274485eb1b89,2024-11-21T07:28:44.370000 -CVE-2022-4508,0,0,827af45b7212b1c23fdfb1e21283e0579e0832630ba512971e22d558fbcc89d0,2024-11-21T07:35:24.193000 +CVE-2022-4508,0,1,061d318bc5fd2daaadf8e41b8dc4baa903b6923a41c81e33655562c3adbeab99,2025-04-04T18:15:45.387000 CVE-2022-45080,0,0,08a0bc70af83c26672941b470d35d3acbdd066811d8701882833a776f74a4111,2024-11-21T07:28:44.493000 CVE-2022-45082,0,0,92d10dd211b115f3c7aec1c8b16f3cf99058d5dec217cfd19833d8f0f6a93701,2024-11-21T07:28:44.633000 CVE-2022-45083,0,0,2eb854dca059d9f005cb80a355298f816b69b0fc4dd54f49b769e51568404c27,2024-11-21T07:28:44.777000 @@ -210601,7 +210601,7 @@ CVE-2022-45436,0,0,26478b4b3221d62b5a88c2cfb3350a1361d84d348bc36416cf7023808d336 CVE-2022-45437,0,0,37f67dea4683e962f10bf4a33833df214a4a8ed4981967791f260672153c1514,2024-11-21T07:29:15.567000 CVE-2022-45438,0,0,296c2ae67bd49221fc96de7890fd47943a442fd4ae1e4e053dee247c2e047314,2024-11-21T07:29:15.673000 CVE-2022-45439,0,0,660d82d88de49529d1bb4fdd5e4bdcc9eff6042525cfb408cbeeaedaaced1a3c,2024-12-06T07:15:04.680000 -CVE-2022-4544,0,0,aa6bdc01d43f050ff7b75238303b390fcdae1d31cfd957ce1c884de2edd2c375,2024-11-21T07:35:27.620000 +CVE-2022-4544,0,1,598f02dffcd12ddd1fabdb05a5cf515c3419e056c64cbc303a1f30f1e32b285d,2025-04-04T18:15:45.557000 CVE-2022-45440,0,0,2f938447e207527d7ebc5853c18e01dbaa8c9d2f47301da6ec03afce44b109ba,2024-11-21T07:29:15.870000 CVE-2022-45441,0,0,d8274b8f5f70778ac2a239a4f45eded09c9f1d72c00e3911f6e732c43a3bdfd1,2024-12-06T07:15:05.190000 CVE-2022-45442,0,0,2411e795a7482bdc540e98a831e7ba2e6d482c8ab7eb534b95100a7b025ad592,2024-11-21T07:29:16.083000 @@ -210626,7 +210626,7 @@ CVE-2022-45461,0,0,56f2b787c69deca86bd3b5d6242a910782e4836cc155b584a001e8e770eb3 CVE-2022-45462,0,0,32a35c19ff603662093585c37e6728cd478d853de03e2f1a86a26cb05e496a4b,2024-11-21T07:29:18.100000 CVE-2022-45468,0,0,a712a69482b987f1fd3ae2b2fbc6f4961ecf8e05c39ea4dc0a2d3fcaed8af41a,2025-01-17T22:15:26.927000 CVE-2022-45469,0,0,10bf55fb9ce7b61a18b792fad66711157265be7d37c9751a18b547b87ea10df4,2024-11-21T07:29:18.303000 -CVE-2022-4547,0,0,51ee15e64287577a8049b1f42132b37d58fea2f22fa687791795f3c930f6d263,2024-11-21T07:35:27.947000 +CVE-2022-4547,0,1,07613f52bc490b06815bd631c31a1325f69c8bbd4a4c6629d352538c8682ef73,2025-04-04T19:15:43.767000 CVE-2022-45470,0,0,7a0272577430809ad451c7cc2786bf7c96e8f498b5c4453652c56de828914865,2024-11-21T07:29:18.417000 CVE-2022-45471,0,0,559a6e87408c334e4456c48307db55502b98bc2d1450613e64712caf20994238,2024-11-21T07:29:18.520000 CVE-2022-45472,0,0,6384a1ca4bf781a6f4d00fb1178d93ea3809b4609f24adaa3a30d222a0e51513,2024-11-21T07:29:18.640000 @@ -210643,7 +210643,7 @@ CVE-2022-45481,0,0,f7bc9a7d35d0afa5c5fffb3c3b9a63f3ef5a79b7f866219bad8ae2530c50c CVE-2022-45482,0,0,3bc70020a1f858d865730882dea6d17f020e9d08125e10a568c20ee06debd5d9,2024-11-21T07:29:19.757000 CVE-2022-45483,0,0,3eea7ece07d4ba43ee789e8237040aa6122698d837bbba5d6b30c1888daaec46,2024-11-21T07:29:19.860000 CVE-2022-45484,0,0,67f1d45fd6b41475ced73639bb99901b627533f2536de5b9588d0644622c2786,2024-11-21T07:29:19.957000 -CVE-2022-4549,0,0,29a77c828f103b00373068334fe812fb343c6e19b5d4cd3519a61082451b0941,2024-11-21T07:35:28.170000 +CVE-2022-4549,0,1,6787c269a0a991598d25a098e49bbbb173e09e342e8f215f9b18c7ebc2770a18,2025-04-04T18:15:45.720000 CVE-2022-45491,0,0,4e624a14be160f7b9ac37bf9996037a7edd6d1e4ede0039a653385e6ca66671d,2025-03-26T19:15:18.880000 CVE-2022-45492,0,0,be61a73bebc11dc54d2ce18380eae1e1f4a3a0f74e909c36e1621302822298e7,2024-11-21T07:29:20.193000 CVE-2022-45493,0,0,88355351e568c54fca58a7d3eb129da7a9bbac3b38822108e44035efba5db975,2024-11-21T07:29:20.327000 @@ -210722,7 +210722,7 @@ CVE-2022-45600,0,0,99231a92a00df74c331415b49861375d3afaf6ac2bcfaf7f632e00a83dcbd CVE-2022-45608,0,0,7166df0ab73bff25f68021172b375d2bd2b01295da078185dfd752ed4c67eda9,2025-03-07T18:15:36.600000 CVE-2022-4561,0,0,bf468782691054d6d44934e6fbf08b309101dce74edfd907332b90b8b681d475,2024-11-21T07:35:29.687000 CVE-2022-45611,0,0,443385561b6532c714a472c9950b68b27d18afa8516d9013dda794d040a5d678,2024-11-21T07:29:29.017000 -CVE-2022-45613,0,0,788ed998768a6ce492ffa28a04fefa8906093e7e113f6e1463ea5c78c6884a9e,2024-11-21T07:29:29.183000 +CVE-2022-45613,0,1,94f7ad39cf51e48f55106250adfab3592e78ef83e26e745b706d4045dcae4f3d,2025-04-04T18:15:42.353000 CVE-2022-45614,0,0,7424394622e79f4eeca38a29b4fd1082414df065bf41f2662739f54666e33270,2023-11-07T03:54:45.677000 CVE-2022-4562,0,0,27eedf65d489fe4df1833226bfbd48459b22768fc3ff33e2ff15cb503bf7c96c,2025-03-20T21:15:15.073000 CVE-2022-4563,0,0,559857fd7e7ce55075c6ca477e41968e965f645a2f7e4534b2996fd1b7653c4e,2024-11-21T07:35:29.937000 @@ -210785,7 +210785,7 @@ CVE-2022-45706,0,0,0f2f1efa6247634c2abacee8ddcf6e2ac9fe25a66a6804f810c1ebaeb6c87 CVE-2022-45707,0,0,8cdfe2f7dd47fa126f7f3381854276ff4135433fa0fe4a64ab9ce7c7306ef838,2024-11-21T07:29:36.900000 CVE-2022-45708,0,0,0f6ccfb5bbc7e757b00e675ff1fb1bdd2072f2e0f923e0d548a3a33f5edf6d2e,2024-11-21T07:29:37.070000 CVE-2022-45709,0,0,bda6e06095277c4c2c507842b5f05a74c47d92df3652c3dd7b7ebaf768bd2e15,2024-11-21T07:29:37.217000 -CVE-2022-4571,0,0,7220a91a29a946e5098d0a4763aa415f7280317549f55ef88417aa7b0ab0f9b9,2024-11-21T07:35:30.977000 +CVE-2022-4571,0,1,d01d952a51e9a587389d778b120d9feba862566c94477167e1664d5b7adde745,2025-04-04T19:15:43.940000 CVE-2022-45710,0,0,9b706d3876646d4356ceb23e733992ae81149ecf2e197dc3550a64e2747633a8,2024-11-21T07:29:37.360000 CVE-2022-45711,0,0,2fb3242dd15cdb4d01f907add7b62a3c9e7f3ef85ac0770459bd4f4a192149d7,2024-11-21T07:29:37.500000 CVE-2022-45712,0,0,18bea2fd58e13e63cc46d9d63ee3554a47b321aff53538d00fecf7f222d48789,2024-11-21T07:29:37.650000 @@ -210955,13 +210955,13 @@ CVE-2022-45919,0,0,0c19f1a9554393728606817d11c069f5da29184158492d4b43ca7815f147b CVE-2022-4592,0,0,404e87b7653646dba1896d156abca81bb5ed2618fd48b76716b7768a0ebf5e1c,2024-11-21T07:35:33.447000 CVE-2022-45920,0,0,4c69f677cc3b463a8e012b95fa3a0d2fd17eace3c45cd4d31ae36f9a6a2ee235,2025-04-01T15:15:56.383000 CVE-2022-45921,0,0,6c71c936463cf5832a0ef334a4c55a521881c7eefd795fba16d74005136ebc22,2024-11-21T07:29:57.640000 -CVE-2022-45922,0,0,7e2cf031de0d8fec66969324aa6a2a29997a9e0b4143bd307918dd0042a55076,2024-11-21T07:29:57.787000 -CVE-2022-45923,0,0,31cfe5b83c2d391207059a6e5986e6b7e2ae37ce0c91f9fbdebb7e87f02b9acc,2024-11-21T07:29:57.940000 -CVE-2022-45924,0,0,798f180bd384c6db19c51b8abfe2c420b1dc68d1974603f4d4e8ba979cc2f004,2024-11-21T07:29:58.080000 -CVE-2022-45925,0,0,398dc673587b9bc67d99739c1ca770d27c28c5beda8c0c582902253fd9fbf1ad,2024-11-21T07:29:58.230000 -CVE-2022-45926,0,0,d8fe5cc66dfbf12a424f9e9de3a6e47074708598af4aaf917df5b77deb0bad9f,2024-11-21T07:29:58.377000 -CVE-2022-45927,0,0,25d703efafc0ed159cbb39d669d1d761460b2ca91a1a84d82180de0e38e37f89,2024-11-21T07:29:58.530000 -CVE-2022-45928,0,0,9f9bc2f368f907a29165ac5577c5c53f222231fbf96dc6f2413caaaea4597701,2024-11-21T07:29:58.680000 +CVE-2022-45922,0,1,b2be5982118c0f0c352620039ddf1180d0216de39d680021079ced36f9aba38c,2025-04-04T18:15:42.563000 +CVE-2022-45923,0,1,d9c231a276ccb83fbbe0aeee3fc9db31df51ab15ae25cb1cf0fbb77981e1d78b,2025-04-04T18:15:42.750000 +CVE-2022-45924,0,1,1e5ee7fcbfdaf3b3402bac1bb985f18fe788359f5f8571549066f33d27fe55b9,2025-04-04T18:15:43.017000 +CVE-2022-45925,0,1,dc9ac0a4fd0b11bf955ef3d240be20575e68382751d5099263249dc478b1095c,2025-04-04T18:15:43.210000 +CVE-2022-45926,0,1,dbc31b8a64744ecec8e40dbe7ce03e19ae51e69da3c63058c0732ba9fbe7c28f,2025-04-04T18:15:43.443000 +CVE-2022-45927,0,1,876f2c5e585b624fc7636d76bba1c50b08d6b4a10fe1cf3fc6ead607cb228460,2025-04-04T17:15:45.247000 +CVE-2022-45928,0,1,b194c40b2ee30cc551cd43ec4106011cc870562c53cd2b964268f1ab785e42ad,2025-04-04T17:15:47.020000 CVE-2022-45929,0,0,96eb99e3e503cce590888bd3f01ad7a008635c0e2cd400e8177558b508ec7f82,2024-11-21T07:29:58.833000 CVE-2022-4593,0,0,19756c1c2068c55bd5942e6c3a34fb6b5a56b3a4b4dabac4fcba02473ddf8866,2024-11-21T07:35:33.560000 CVE-2022-45930,0,0,3492858fccaa8d76453e6e54993f976fe8ea18e0b3bed4019ffa1615a6eab5b9,2024-11-21T07:29:59.050000 @@ -211357,7 +211357,7 @@ CVE-2022-4650,0,0,7d43cf721d800643ae000c3d706cf10df6cbb33605f26e3c995ca189ce2c58 CVE-2022-46501,0,0,03f537aba9f94c12bcf5173f65b5ae70341e80c8d82f602181bd0b99943f5882,2024-11-21T07:30:39.750000 CVE-2022-46502,0,0,0503bf2864a1799c5fbe5d7612cd6cf54c71bbdcf21a8bd9a55963d6aa6e4e05,2024-11-21T07:30:39.900000 CVE-2022-46503,0,0,54e0f2d83e0e4b3d7826a82e78a212a204c306b595aae21c52a9499c6736b1f8,2024-11-21T07:30:40.043000 -CVE-2022-46505,0,0,211a2bd04095aab9dc7b252bb4e5eeb5a6cadd8572e3b64dda0d44ab8fab8a17,2024-11-21T07:30:40.183000 +CVE-2022-46505,0,1,556f68f80f426556fa441caaf3ece3247d1f844d1ca10adaa553eb4ec2d51de9,2025-04-04T17:15:47.240000 CVE-2022-4651,0,0,e7cf4a70afca20f66b5af34080804c6864be6d29e3a2f96826c8a4a51fcc2990,2025-03-27T16:15:17.703000 CVE-2022-4652,0,0,1095194f9f154259f49411f7dbb93d1a6c03863c10e1a5c3e3727f220f6e9465,2025-02-27T21:15:16.310000 CVE-2022-46527,0,0,d02de0aae02127d126346be665f04f296ca7c58b711b92b26e017819accbd88f,2024-11-21T07:30:40.330000 @@ -211383,7 +211383,7 @@ CVE-2022-46546,0,0,953644dfd7dcd1310feb2dbe1d7a04c8526f3ce60b1b5ecaa5c986d56a8df CVE-2022-46547,0,0,3e51b6c07353ce94b24542c0786764142a1771ff60791a20bb3ceccb1b8b537c,2024-11-21T07:30:43.473000 CVE-2022-46548,0,0,64248efcbf88dc92f8a09b35f80b85ee763643b73b2fa8350dbeca987304cfb2,2024-11-21T07:30:43.620000 CVE-2022-46549,0,0,7fe60d3b6858bbe191f518a4420ad0be9069dc69b8ef585b00ab7e20c7ebd7a8,2024-11-21T07:30:43.753000 -CVE-2022-4655,0,0,bd8d686155af4c551bf4bd1177c6f87f9389e165a383504576a9b00d293e085a,2025-02-20T18:34:50.990000 +CVE-2022-4655,0,1,35d2ad8f9c2e1e5a9da7e08a6ab863d182db7a7a5695f25f6ddfed823811df5f,2025-04-04T19:15:44.110000 CVE-2022-46550,0,0,bc5cc20200b63bba7cc7ce99207ee2a9f136ccba8514010e03709f485b043f79,2024-11-21T07:30:43.890000 CVE-2022-46551,0,0,779c0f14d348f2840326905acd59932a8ebbf1f2102078c30f0d03da86fdd8b8,2024-11-21T07:30:44.033000 CVE-2022-46552,0,0,23ecb8587e6ea9ea00c0ce5004cecbe276451e17c97b7a72412c846d021d5e9c,2025-03-27T14:15:19.657000 @@ -211442,7 +211442,7 @@ CVE-2022-46642,0,0,3b944a4c29bf1132e63cc0dd2a0f4efdbee162e6d278263673bacac56e45b CVE-2022-46645,0,0,40eb5ed6eb67d6522b9cb67a75203c7fd066df7bd4cea40ec9727605e235e9c8,2024-11-21T07:30:50.810000 CVE-2022-46646,0,0,7ba839cf38711d0ee262bd5e2f1e9125206af5b543e06f6b262e115c2936da21,2024-11-21T07:30:50.940000 CVE-2022-46647,0,0,8f63228b624d4771cafeafb77c7fcb65b37e89900008f0f1caa8df8032400374,2024-11-21T07:30:51.077000 -CVE-2022-46648,0,0,70c43941dec800f1ee4bc0339802835e751ce9614fb7b82fb4470373f2900ae9,2024-11-21T07:30:51.207000 +CVE-2022-46648,0,1,7a6839609ca9e7641edd211e87d37bcc8d564d495e88d12a5dc7c220842a0814,2025-04-04T19:15:41.777000 CVE-2022-46649,0,0,fd73273d35f5f5818170bf132cc0b21a1526568db7869435b5cf9de7e02c1e41,2025-03-24T16:15:16.837000 CVE-2022-4665,0,0,7f452fc928e2dfb7d836b455f9885fa9e6658b4be56d31ee1fc2aa402b1bcf45,2024-11-21T07:35:41.750000 CVE-2022-46650,0,0,e96eea5994a32bb181200b22b79bf0b5642cb5d97ba1b97780decfb6177f4d9c,2025-03-24T17:15:13.783000 @@ -211887,7 +211887,7 @@ CVE-2022-4730,0,0,27368cfdb142c0277c2946c9e4db669271972e65ba5f448cea75dba9e6d099 CVE-2022-4731,0,0,bf9ab550d58abb54954bc812287c566474fdc4ba42567d499ea97cfca2d2f6e8,2024-11-21T07:35:49.833000 CVE-2022-47311,0,0,d894f3212f38d2281fc96bb363cbb11271a6548d222257fceab9a1569003c37a,2024-11-21T07:31:42.380000 CVE-2022-47317,0,0,d9724359768c15574132313c4a84b168e35c7343bca9dcbfa87b74d2e26fcfbf,2024-11-21T07:31:42.540000 -CVE-2022-47318,0,0,6af24138340e04880329b9f14f40723787d0603024b12cd139a68d8481f6e4bd,2024-11-21T07:31:42.667000 +CVE-2022-47318,0,1,4fe3a598a825cdb281da424ce5a2d872f8e757d22bf0512035e68029141c8be2,2025-04-04T16:15:16.423000 CVE-2022-4732,0,0,d61af37a48fcd1f254824b115234b3b8f90d333756f2dbed0b10c4d23f4be705,2024-11-21T07:35:49.963000 CVE-2022-47320,0,0,cc1f62cb6ccfb756737fc0b3dfb4985e2c045a2b2a52c0b7e3b779e1d9facda3,2024-11-21T07:31:42.807000 CVE-2022-47322,0,0,c6e436b4d9b68288a79447794fa91a3f532ba5f281a6032c7dae12567817e5dd,2025-03-26T15:15:41.373000 @@ -212223,8 +212223,8 @@ CVE-2022-4772,0,0,730e483c22c61da336b37dd32e10e5991c467f8d7ca222a91f04f3bcae98af CVE-2022-4773,0,0,d71d9c11ef26958859bdc996cdd5ceb71a76cdc08567d5ba47ca78e464e3e164,2024-11-21T07:35:54.880000 CVE-2022-47732,0,0,057965ec07bc7e51445f9e0f843077aeeb4d48b8dea2f05d205bc65d253e11c6,2025-04-03T16:15:29.730000 CVE-2022-4774,0,0,0076dcfebca623c736132619105dc2985b7b4e4e83c7f73bbf0d06d5c7f6088d,2025-01-24T22:15:32.183000 -CVE-2022-47740,0,1,4e400aa8f5e4262617d71c6e18bc949a5d9f7a11cd1f53332558baff4df47304,2025-04-04T14:15:20.173000 -CVE-2022-47745,0,1,e0dc8cc846266649120bdfcac5f87bc70bf1dcb9a7231b26a791e329e716bce3,2025-04-04T14:15:20.397000 +CVE-2022-47740,0,0,4e400aa8f5e4262617d71c6e18bc949a5d9f7a11cd1f53332558baff4df47304,2025-04-04T14:15:20.173000 +CVE-2022-47745,0,0,e0dc8cc846266649120bdfcac5f87bc70bf1dcb9a7231b26a791e329e716bce3,2025-04-04T14:15:20.397000 CVE-2022-47747,0,0,1bfa016419214efd4734f7139bce6908e508516401ed3bb4f8b889c9845d01d6,2025-04-03T16:15:29.967000 CVE-2022-4775,0,0,2009335a21039737dcfa6209661e5bc66603fff76e8fb2d8373605adecbac5f5,2025-04-03T20:15:19.420000 CVE-2022-47757,0,0,4903a03437750951ce1d4fcc01dd1c47204f157cec0a9a5a334395a7e0ce28db,2024-11-21T07:32:23.040000 @@ -212248,7 +212248,7 @@ CVE-2022-4783,0,0,5a542e603e23265bc5d6004d940f07bdb6732298fd75da3537e980a9b66785 CVE-2022-4784,0,0,71b057faaeeae94ceb446adbeeed78f94c564a1dace10f0747ffb6cc5bd193d5,2025-03-14T14:15:12.687000 CVE-2022-47848,0,0,37d91542a280217dc4dae0e99433b2fe5ff92e7a9bd5344829bebfce3526c7ed,2024-11-21T07:32:24.743000 CVE-2022-4785,0,0,4cf8c85d9e1f8184b846411147dc14d002255a5dd522ef07188dd858748b0a5b,2025-03-14T19:15:40.560000 -CVE-2022-47853,0,0,a5adce8f8f4bcc6956d04550b4f1086084ba68e50eb6284325311b80fcf47f43,2024-11-21T07:32:24.897000 +CVE-2022-47853,0,1,7f21dd3c8355fddd41d234b050ef4477371d4186dfb7e9972ae684781275c027,2025-04-04T18:15:43.687000 CVE-2022-47854,0,0,a967424102a676b4b4639aa9106d28e8a41d7ba21cffccd500e9a2cc00d062e2,2025-03-27T18:17:16.797000 CVE-2022-47859,0,0,848e92cb8e5c6256deaa245edefa09fbefa624db536867d6c032bf5c7f0ddbef,2024-11-21T07:32:25.197000 CVE-2022-4786,0,0,ac55ca47f5a66d8674d5d26b998dbc57277543415572d6df1ab095a2caf65ed2,2025-03-13T20:15:14.160000 @@ -212270,7 +212270,7 @@ CVE-2022-47878,0,0,a7952d6ecc8a2edaecb9f97d906a906fb5d9204d6ecf5083fd86b30c19b9d CVE-2022-47879,0,0,e171eb85302c2db35aabd0617a1925f41a68d1f3980643b9d1c66f3e17099e71,2025-01-24T16:15:28.653000 CVE-2022-4788,0,0,78e9f956fcf7ccf6fab3eb40dc09a0ff8ddb3085ab1eea3bfbf1e4b0534b0bc2,2025-03-11T03:15:36.760000 CVE-2022-47880,0,0,6912960d6442fdd7ed92092a03e4fe22fbfc3cd1e68d8e2a73464e9293478ab9,2025-01-27T17:15:10.117000 -CVE-2022-47881,0,1,04f895c9d1f87c89eb4cd1b89733346bc4d86fd95b879510cdc2665513e5bb27,2025-04-04T15:15:43.720000 +CVE-2022-47881,0,0,04f895c9d1f87c89eb4cd1b89733346bc4d86fd95b879510cdc2665513e5bb27,2025-04-04T15:15:43.720000 CVE-2022-4789,0,0,666d514e5a13ae7a62ec9e8cacc8078b663453259e976db52a6c5ed8af31e966,2025-04-02T16:15:29.703000 CVE-2022-47891,0,0,2f47c6b847a20229910a5de68a3507a4706502db4587eb25ec3e6a2c92cc8336,2024-11-21T07:32:28.007000 CVE-2022-47892,0,0,fa33bc395405adce2d71e2c3c83901a37edd3ee953f8a5e42cedd8d25ec3270b,2024-11-21T07:32:29.170000 @@ -212291,7 +212291,7 @@ CVE-2022-47925,0,0,3c4aa65890b2d4b2655588fba8d970251832319df447501dee67e1c780551 CVE-2022-47926,0,0,6fb9eeaf9bce7c0718734ae3534265d12ffcd4adf936dec7fd38521c5d5e583e,2024-11-21T07:32:32.243000 CVE-2022-47927,0,0,dae418bbe446bfb302132c725462cbf389cffc32bc8aed5619c8b790dd1df9d3,2024-11-21T07:32:32.463000 CVE-2022-47928,0,0,bb1f9509023e24d36d79fffee2d16ac8507bcf41ac832c4875a26f9520273dc1,2024-11-21T07:32:32.790000 -CVE-2022-47929,0,0,c105528129c1ad3adf3ef95655112a0b94c7c2f1052bf2658939ef1f14203edc,2024-11-21T07:32:33.047000 +CVE-2022-47929,0,1,8029fd6ef83b6a0a40287e582ba4e131f5d3f771ef0c8489c1e7a8519b0e3c11,2025-04-04T18:15:43.927000 CVE-2022-4793,0,0,6d1e9f792a7838bd1432d3121154a424b060cc0460b4dd4afad72cec1a43b138,2025-03-27T21:15:41.340000 CVE-2022-47930,0,0,e03c019ed7e8773170fcede93134398df90255663b9481165646fa65240a5bfe,2025-02-05T15:15:15.867000 CVE-2022-47931,0,0,cbed6b57082cfcf48b426e4fbaadc4b3cc5aadef9d07d5df31e008cf13647219,2024-11-21T07:32:33.570000 @@ -212312,7 +212312,7 @@ CVE-2022-47945,0,0,57405884bdcd1ba6eb1c80919085ce13225e24da51371e79eb0b976df43e4 CVE-2022-47946,0,0,512ed265f5f8e2053f93c8b548e53ea74178f3bdd6c19af0a1fcbc931faca672,2024-11-21T07:32:36.927000 CVE-2022-47949,0,0,490a763e6d17ab1fc8c624b1038948c1372fdf786573e9cb1855d758b34eda63,2024-11-21T07:32:37.143000 CVE-2022-4795,0,0,ed27ef11464e6f253a296b2a64c7406c8080be0dbb66b0e082bcd0dd311616ed,2025-03-10T18:15:24.950000 -CVE-2022-47950,0,0,003354ded967d7f0656182efcdefcb02844991e48622def15771f5148d7f730b,2024-11-21T07:32:37.363000 +CVE-2022-47950,0,1,d86eb39f92fb5bda3bf1a962b161785879bb3fbd0fc5f465bbe17df343f3e500,2025-04-04T16:15:16.630000 CVE-2022-47951,0,0,e2d996ac11f4531610b951008a6011dd374a562e27e6c5266b3be479b0d71509,2025-03-31T17:15:39.117000 CVE-2022-47952,0,0,2f28f68ee06c7145a4aa6bad466be343ed19ade0a3002280dd2cc93acd595e0e,2024-11-21T07:32:37.827000 CVE-2022-4796,0,0,56d14c71fffb78b2873b1d8a825236ed65f48496e5c8739756b40cba27fa5ead,2024-11-21T07:35:57.490000 @@ -214134,7 +214134,7 @@ CVE-2023-0118,0,0,aa0b661d40d0ecffa7edc28fcea63c3d1e6716f461081ff2b068a1c61f148b CVE-2023-0119,0,0,db8b4bb6e60810391071fecb8352baf3f21408c3c45bfe947c091d19a61eb005,2024-11-21T07:36:35.410000 CVE-2023-0120,0,0,13869732abdfabb700ffbaf147e2c3e4fa590d46bc9b1f6ba275c936f0defe72,2024-11-21T07:36:35.567000 CVE-2023-0121,0,0,05b01d522be2062fb81270ad11161f94652f5f502dfeef0a71d912cf44555e1e,2025-01-07T17:15:11.040000 -CVE-2023-0122,0,0,b16e3c5f26806b8c2deeb87ed9816ff662c7345f493bb5edcd882c5467ff7758,2024-11-21T07:36:35.837000 +CVE-2023-0122,0,1,715456026a97885d8c043720e964c246ff4d0034933dc7384e265e48b55fb9e7,2025-04-04T19:15:44.283000 CVE-2023-0123,0,0,050d9fd610b886c7a718f7b46f264e216d04e5cc3c8bb5b7bd45ada2027e04eb,2024-11-21T07:36:35.957000 CVE-2023-0124,0,0,c85156ba1cefba43c1069a4756da8bac9a088ad0823a2eb094f480cd7fd4ca14,2024-11-21T07:36:36.070000 CVE-2023-0125,0,0,631a6b3b05c5f982d08473a326d0236132083bc62fb50382742e89c5c6e53332,2024-11-21T07:36:36.183000 @@ -214170,7 +214170,7 @@ CVE-2023-0154,0,0,7f9f8d28aaf42b7fd3a83e0e95e2beb61b3c2df5f15d608877728bf26751e9 CVE-2023-0155,0,0,317ad537de9d4713c8c5a7a72ff81169070410b9a09eba2e714ba46f93e23815,2024-11-21T07:36:39.400000 CVE-2023-0156,0,0,0de7f2a4c4e483803c015e5297e247df045d9c0d20384552c0f376747beb3e6f,2025-02-11T15:15:15.740000 CVE-2023-0157,0,0,ef36c947a2a9ad456abf4bd4ab7e4f337c0495623cf78691a0f63561a2d384d8,2025-02-11T22:15:24.310000 -CVE-2023-0158,0,0,7a02ed9df418edbb8f1796c465524f1e0e7931da1fbd8a91032c6cea476bfecb,2024-11-21T07:36:39.690000 +CVE-2023-0158,0,1,c903a53ecb4bd9d052c5a92370a930c4d07834ead8d57b9aa7a5cd0eaef109f4,2025-04-04T19:15:44.493000 CVE-2023-0159,0,0,be314ef5aa5d6fe5e2a9a965178a683b681016eae69b9aa5cbf14e8d759032c4,2024-11-21T07:36:39.793000 CVE-2023-0160,0,0,b87ae04e245fbf6ae8ff201e082eae9e27d16738e543e492c5d883d5fdc7dd59,2024-11-21T07:36:39.893000 CVE-2023-0161,0,0,2d565afc2a392d75d863e5fdf784db6696b2ebade8f447f4c56c766437755f79,2023-11-07T03:59:46.593000 @@ -214303,7 +214303,7 @@ CVE-2023-0292,0,0,417ffa87f88f02a0c6a98185eb81a89f096eca84f3d9ff43e4b0607a42eb27 CVE-2023-0293,0,0,d9231f3fee2b26c8d8ec9884fac8263aac7b410639357ae18a88d6ac4b44aace,2024-11-21T07:36:54.707000 CVE-2023-0294,0,0,74ab803e977a345d5b6632986cbe5f6170e4198526e728646e41474437e18f5e,2024-11-21T07:36:54.817000 CVE-2023-0295,0,0,238a0e3d5fa405e38370946edb29a61395a75ed3f8287707703c64700df5d50c,2024-11-21T07:36:54.930000 -CVE-2023-0296,0,0,39584483b8b10c6bc14e2236615dc346fc4997678d4a9fefae0555b81b5f57fd,2024-11-21T07:36:55.047000 +CVE-2023-0296,0,1,5f853522451bbf4bd915abc26044cbfcc5a23a84cc1d046f2908834bab39dc47,2025-04-04T19:15:44.687000 CVE-2023-0297,0,0,662c36d9038152d378792227e1406596bcd67794dcf78dc85b342401688ca4f0,2024-11-21T07:36:55.160000 CVE-2023-0298,0,0,dd9751bd06943bf665eb0f74bf707ebbf096f73aa8539056b2ba67b2466d1796,2024-11-21T07:36:55.287000 CVE-2023-0299,0,0,fc8cb61d9a1070014d3c1935467a0f6e94e12e1dbda43d75e11fb94452ca972f,2024-11-21T07:36:55.420000 @@ -214510,7 +214510,7 @@ CVE-2023-0508,0,0,3633feae8b122f41d68594b44da27848f4f97caa8fd0978e248c5755fdd1b9 CVE-2023-0509,0,0,13c7cf1b9e7c848dafa6de2985329c806b5364b54521b16ff548b5f19a1d82b8,2024-11-21T07:37:18.937000 CVE-2023-0511,0,0,519cdf5faaf7a9befdcfea0647da47e3612d475d128ecb936230af8799a78288,2024-11-21T07:37:19.050000 CVE-2023-0512,0,0,ef0dea17e984a58cd9ac76ceb00b4b97241e3976fed7f0cf7813f28df25cc1ec,2024-11-21T07:37:19.170000 -CVE-2023-0513,0,1,53eb28bf9f942f890492e659c3abf77f7e462de38e9a2782ec413280dba9c75e,2025-04-04T15:16:10.910000 +CVE-2023-0513,0,0,53eb28bf9f942f890492e659c3abf77f7e462de38e9a2782ec413280dba9c75e,2025-04-04T15:16:10.910000 CVE-2023-0514,0,0,8be048e41c71e892a1450001c4b06935a74d01b42c6b6ecd09bd66f9618a3793,2025-02-04T21:15:22.337000 CVE-2023-0515,0,0,d5227435fb2d692596ff87ee57f4ec566fee8b5fd5cc750886322bf5b267da44,2024-11-21T07:37:19.557000 CVE-2023-0516,0,0,3e34952394df10b4a789941184a8d1d23b2d95ece0fdb5e1b12a499b56b6d127,2024-11-21T07:37:19.690000 @@ -215686,7 +215686,7 @@ CVE-2023-1742,0,0,d1c37baf7aad4dd573c06643384f5294d1120612d56b37715c8fd3df565968 CVE-2023-1743,0,0,4ce9bd3fafad1ba0a0cb517c400d8f3747d67d24b3ced1acea063c4ada6ab9a1,2024-11-21T07:39:48.773000 CVE-2023-1744,0,0,a979db9f9628fbc26a8e4e500a0bcd31f0d5b488f2c39db3ed1e2929b88d10dc,2024-11-21T07:39:48.910000 CVE-2023-1745,0,0,303710ef24433edbb2ece8428f0fae3689641c1de991423144a715a529417def,2024-11-21T07:39:49.023000 -CVE-2023-1746,0,1,6dd11b035162f1f427d98269c654087f3cc12c8440fba4933e99d49d5b8db2b3,2025-04-04T15:15:06.847000 +CVE-2023-1746,0,0,6dd11b035162f1f427d98269c654087f3cc12c8440fba4933e99d49d5b8db2b3,2025-04-04T15:15:06.847000 CVE-2023-1747,0,0,2c1015801da0f316ae1a80df47f3ad721187dabe2f6fcc2d172288de69eb3e30,2024-11-21T07:39:49.253000 CVE-2023-1748,0,0,c32dfaf77b7092362c9bbc39ac67e80d5b07b7d0855ca0bc1be3294ab6ca897b,2024-11-21T07:39:49.367000 CVE-2023-1749,0,0,c149003559e27aa66efc3bc1402169d6e72c926549dd4d05a0c39ec9f1514321,2024-11-21T07:39:49.490000 @@ -217950,16 +217950,16 @@ CVE-2023-22274,0,0,0d13c82d7e8928e52dd61a52f192b8095fd8400313331dfc78c319789ac47 CVE-2023-22275,0,0,b0574eb9ca3576f9f70ce410bec86f6b0e372aa92d00ba01345488d8481a6c12,2024-11-21T07:44:26.443000 CVE-2023-22276,0,0,282487dae241068fa1c1eba372cbca3c2551daf488d7a7bf8f41c2e74b8a3bdc,2024-11-21T07:44:26.550000 CVE-2023-22277,0,0,de9d556992bcae384676c24f3649ea76d6406d01a3e3eaec4efd3bbe2556320e,2024-11-21T07:44:26.673000 -CVE-2023-22278,0,0,331755ba902be4f4ec8ad4222eea23a6d28a53088b9335080e2c5d55f75e7f8f,2024-11-21T07:44:26.783000 -CVE-2023-22279,0,0,472f336fb3bd9d4e3dafcc8b813d7e67374c4cbe3d48f59874a83451344fdf8e,2024-11-21T07:44:26.883000 +CVE-2023-22278,0,1,d76152d76f7fd94896abf5219370721960a2bc4808dfe158a1f92fd724e241a4,2025-04-04T19:15:45.007000 +CVE-2023-22279,0,1,882f94efbda66d11ed44b10271d52f238a11b494b699dfd224eab05eee0f6d9c,2025-04-04T19:15:45.177000 CVE-2023-2228,0,0,510067a03e8a08d8952d9da6187aff29df287c2be0b54f0a9aaab29ee0cdc545,2024-11-21T07:58:11.820000 -CVE-2023-22280,0,0,8fa5e4043acde971ceedaf8e0c9e4665ec1c4706bde5aa45ed5a85065ca8cdb9,2024-11-21T07:44:27 +CVE-2023-22280,0,1,d77b16a38366ec6514f3f0ef18b34fadaaa39f7b2cad869b1bdc87354d8091c4,2025-04-04T18:15:45.883000 CVE-2023-22281,0,0,a1a64683058ec6039240c413db8317cff862b3b9a379c2bf3d7e2cd6a5905830,2024-11-21T07:44:27.117000 CVE-2023-22282,0,0,10e10c14435016b9e9ce3a0a7d0b5f126747a98dc5d7638b2106f553ed5b2aa1,2025-02-11T18:15:21.353000 CVE-2023-22283,0,0,876e61d0e39af20acb19ba3fce9bf5be07305bb2f1e87f06dd9c8b7b66646247,2024-11-21T07:44:27.347000 CVE-2023-22284,0,0,4f1dc5430a9573bd60f0cf907cebd8a5550fcb5ee1117fc1a596275d812a400b,2023-11-07T04:06:48.653000 CVE-2023-22285,0,0,bdf09e85075096ec88ead2edf6718f6557f2efdee853b54a4db3ea52c249117e,2024-11-21T07:44:27.470000 -CVE-2023-22286,0,0,55b7fb4907e3c16d87537000a6fc95d6c08eb5350dd9bebd96621fb000a5c236,2024-11-21T07:44:27.597000 +CVE-2023-22286,0,1,329067105063b741043f9b6506b2c8a62420ee63252feaebda36a4c742a32b58,2025-04-04T18:15:46.083000 CVE-2023-22287,0,0,a5db39d676e3d282de8d054745ed1eb493b80934448db1cc78f73d1264d7e845,2023-11-07T04:06:48.953000 CVE-2023-22288,0,0,87923408cf21c895a0cee018eaff5df2120b09e3554557e13c3a3a51fbb2aaa6,2024-11-21T07:44:27.717000 CVE-2023-2229,0,0,c6a5aa44430fd94e0e763843007800ffc232d811f7b4df9979bcaf137684d5b5,2024-11-21T07:58:11.943000 @@ -217969,7 +217969,7 @@ CVE-2023-22292,0,0,c136e161aa3b8cb581fec6a96911c1a4ac69ef1cf296f0bbd23424196f9cd CVE-2023-22293,0,0,a7589d6d91a9847510ceadfea4a8b15e43f13a2ffbeb1c6ce8bd8090ada4d76d,2024-11-21T07:44:28.207000 CVE-2023-22294,0,0,e63c253fb82735ed71f2472deed5038b062536fd986b3e5849e775af5efac931,2024-11-21T07:44:28.370000 CVE-2023-22295,0,0,080573c1487c2906a2a149688a6fe9721db8a960fe65097f1e9acb1a6a94e5a7,2024-11-21T07:44:28.483000 -CVE-2023-22296,0,0,ace96801c1bd38ecefeb94f1c8cc56a96a773744b6dbce760ece5cd4401584e3,2024-11-21T07:44:28.607000 +CVE-2023-22296,0,1,7e1c5ca05f0808d3b17dcfc7b8f77b46015c38ab1670cf62229fb057bc6dfc32,2025-04-04T18:15:46.500000 CVE-2023-22297,0,0,e2cfb145db1e3ffb902651a518ec98e6141d79673ccfed77db7cf2dbcc633789,2024-11-21T07:44:28.717000 CVE-2023-22298,0,0,cde54f277095e177b9de9c18a3b3bf65c86faf3d51762a2558f15f97a1022e9f,2025-04-03T16:15:31.440000 CVE-2023-22299,0,0,84693ef0c7bb509df895e8bac855b156e0a311fd0ff082f7e19ad8e321dcec41,2024-11-21T07:44:28.933000 @@ -217977,8 +217977,8 @@ CVE-2023-2230,0,0,2376b593af6286fafded76ff5926b1e2b7d1ae9ecbf888641f9486885a8dfa CVE-2023-22300,0,0,dbcdd932d1d304d05b27d88d5f52e3ef46ee88dd096a5519f2d41c93013439bc,2025-01-17T18:15:19.947000 CVE-2023-22301,0,0,0a10a6dd91105447bae548de98a8ea94a99eaf9991d4047f34aab0e2b29db3a4,2024-11-21T07:44:29.147000 CVE-2023-22302,0,0,ff5426583dc64cb2c6b21518546068fd3e471ffa8da3386dd10671de652a67d5,2024-11-21T07:44:29.253000 -CVE-2023-22303,0,0,61c82bc74511e23b43e9e302a9d93cbbbc62e7ebeb9f7c7eff0d77d6380a2b1e,2024-11-21T07:44:29.373000 -CVE-2023-22304,0,0,2e7be18c32fe07086ebee9fa4a2b66994bb2b79456d309f933475a0ea869b83d,2024-11-21T07:44:29.480000 +CVE-2023-22303,0,1,da04b219fb6264ffd419f09ffa697a68ce8d25083566260d6a6f0510f844739a,2025-04-04T18:15:46.750000 +CVE-2023-22304,0,1,dcb1ebe409535f6bfec7d73d44f7c195305824f2a5568d1ec9fe78141a13c6ac,2025-04-04T18:15:46.943000 CVE-2023-22305,0,0,5e363c457fd5f9dc028de33390bfe3b78e1bd74914dec48d887d4b9bbae89ce1,2024-11-21T07:44:29.580000 CVE-2023-22306,0,0,1fbabebb959b1a28e5ce48b10b367f6c37347529138a1ae8518bc2ab582cf7d0,2024-11-21T07:44:29.717000 CVE-2023-22307,0,0,a1bb3ad09e40c4676573851bcfff3f8f7028a3b4a65891982c4dac55543da168,2024-11-21T07:44:29.833000 @@ -217991,7 +217991,7 @@ CVE-2023-22312,0,0,8f16bf32172036bbf9d1043ae97ca6b0cb5e5a789a3dbfc9b22e7ce5eaaa7 CVE-2023-22313,0,0,13cb67bb3f4d7e26a2fe173a2a963218db5dc4219566bf32470782958642ea07,2024-11-21T07:44:30.573000 CVE-2023-22314,0,0,bee80a2df35df35d1b61930267b541e9f11caf7a46751f021047134245f44a3d,2024-11-21T07:44:30.700000 CVE-2023-22315,0,0,ee76616ece1d8bbec2457763d701817be722484fef24d9228944a94b2757ccc6,2024-11-21T07:44:30.813000 -CVE-2023-22316,0,0,4b625ee161a39cb89e23de90ec1ebb154a24c0e804384b0d0618627a7d76c06c,2024-11-21T07:44:30.940000 +CVE-2023-22316,0,1,4cbb10f585d852cb95e052ebcf1e32bf334b20b8ea8a12f0002f67fe8b8a7b52,2025-04-04T18:15:47.120000 CVE-2023-22317,0,0,e1c5a0efd09bb0137faeec71d579ab2c48bde3b249bce5fee54cd393ebbc24a5,2024-11-21T07:44:31.057000 CVE-2023-22318,0,0,6d806957d3a23d75a6559fef28640b2c7af91b3910f7f71c58b6eace4d9d1912,2024-11-21T07:44:31.167000 CVE-2023-22319,0,0,f9dc12dbcea0f7dd031b848dd22cf831216224b2927968b4b9926439cb620191,2024-11-21T07:44:31.287000 @@ -218033,7 +218033,7 @@ CVE-2023-22353,0,0,cf641e04250d37970b02b4629512b0d33063b5c422554ab3fb66bdc5b8c9c CVE-2023-22354,0,0,1351451b9c555767b561e7f34196d8e7e81e036244ba4ff53e09adeca059f376,2024-11-21T07:44:37.027000 CVE-2023-22355,0,0,3b4d157eb6e9a73eab0e894efafc7656e81f006d5477b655a36f9452dc55d7e0,2024-11-21T07:44:37.140000 CVE-2023-22356,0,0,310041c8a19614e091295491bc9f151c7c3f1c01c7070b4485f1bee7bedda547,2024-11-21T07:44:37.263000 -CVE-2023-22357,0,0,4b18d906c7d52165ecbc3b383e0448a84406f25928584e430f5b2ab899e0f814,2024-11-21T07:44:37.583000 +CVE-2023-22357,0,1,e6eedaf058d4eeaec49de92558990c0f9ee10046d7954f6de17ed2018b001d32,2025-04-04T18:15:47.297000 CVE-2023-22358,0,0,09ff79227052928b381e631d0f489785ad692293414de7e2e8eb67f1f3794a7e,2024-11-21T07:44:37.690000 CVE-2023-22359,0,0,58d1dc33c81d8bd629482ca7b7450932882d318efd86a7b0c1d4e5d00f2e46e8,2024-11-21T07:44:37.807000 CVE-2023-2236,0,0,caa82656021a1814838da459747126e73da85bb70c080195b3f4480b5bb6d326,2025-02-13T17:16:20.363000 @@ -218261,7 +218261,7 @@ CVE-2023-2262,0,0,ec622ebfe089834b1c61666067a562ba092ba9d70bfc8c67615a8352ebbc68 CVE-2023-22620,0,0,3ba2d305fbee0583f45eb6ea87a4d1547ac57c043a10caae1e154d998f583aff,2025-02-10T17:15:16.413000 CVE-2023-22621,0,0,e8c8c1e803b8252841fe0eaac24b1cbb73d7a7f9337303685f3045e933b312b6,2025-02-05T17:15:13.307000 CVE-2023-22622,0,0,63091ffaad64110b30d1a167d41d1f756220d9afd5902fcf0592cb35628ba53a,2024-11-21T07:45:04.733000 -CVE-2023-22624,0,0,c5b01fbf8ae8da46f0e627cb98295a9cd9a8217ee685d28866e5b595fcf745e1,2024-11-21T07:45:04.890000 +CVE-2023-22624,0,1,75473759b35957741f37f0f6933f799168025a68e72461d3324fbec392751703,2025-04-04T18:15:47.473000 CVE-2023-22626,0,0,754ebc8c5e03d79b8e1fa237fb4bb8960aed67d212ae5a00131f35c2f1f18a45,2024-11-21T07:45:05.063000 CVE-2023-22629,0,0,7d65d886058dbd74b6fb4c85b7bb9d2d4e0be6c103e39c16adfb876ea7eb73c9,2025-03-20T21:15:17.687000 CVE-2023-2263,0,0,43c743aeadc26f699a007cd380c29e40f53157f3f4da4c160f2176b3edc1323a,2024-11-21T07:58:15.953000 @@ -218448,7 +218448,7 @@ CVE-2023-22805,0,0,d841b818620914c008e19b64182af4653a0de854b44cd131bba1bef348010 CVE-2023-22806,0,0,28dda3796d976355d75b20961b4c2999219514b78f604131cea1b2336330bc8b,2024-11-21T07:45:27.383000 CVE-2023-22807,0,0,056e3c60152aba63a36d99266e975bd638bedadc2ff13f92357d5c59e98677e4,2024-11-21T07:45:27.497000 CVE-2023-22808,0,0,ae126ba7a8d5c3fcbb3999481b70c92c6c49eb5281ea562fa9faba51d533cb57,2025-02-11T21:15:11.070000 -CVE-2023-22809,0,0,1fbe64ea992a1a237af092b0668135b95b17ea617da3d402a05ced77e776e4cf,2024-11-21T07:45:27.753000 +CVE-2023-22809,0,1,5dec41793a90054c951e2dff50a1ff2f7b45f5346750292ead4419daa6914b82,2025-04-04T16:15:16.850000 CVE-2023-2281,0,0,6b627cf19e54886879813057a1b758172f6e8d091294ad98481d19c4dbfd076d,2024-11-21T07:58:18.110000 CVE-2023-22812,0,0,b686de5b9946ebe685e0f54f31e21658f2c7614b44160d4d2491e40d08fb6d8e,2024-11-21T07:45:27.943000 CVE-2023-22813,0,0,f19eac4d5fd52c733428f1c3358ea8489b7db73795b05881c103489ecc4d7adc,2024-11-21T07:45:28.070000 @@ -218480,7 +218480,7 @@ CVE-2023-22848,0,0,3f961db3a5863de2ea6f2808366686b131b7c82f64d6f20a39867776a1a63 CVE-2023-22849,0,0,14b83b666fe4d20cced41cfe2e3015aaf6226ae202249db40ec6a421c45e6171,2025-03-25T19:15:41.267000 CVE-2023-2285,0,0,429610ee7b9031eadcf24b669b6be2efc2d895f5ad52396c22959801e4441d14,2024-11-21T07:58:18.600000 CVE-2023-22850,0,0,6eef9115f1a6c263f2da88cc942082002b0f648fdb40f57979b1c22bec45b565,2024-11-21T07:45:31.287000 -CVE-2023-22851,0,1,7a8884b1f70eab82c5e6f787599f5f9660f1eff46ce44937f103cc2813e2c13d,2025-04-04T15:15:44.667000 +CVE-2023-22851,0,0,7a8884b1f70eab82c5e6f787599f5f9660f1eff46ce44937f103cc2813e2c13d,2025-04-04T15:15:44.667000 CVE-2023-22852,0,0,66108b315d0eca11a213165e3737878a45c9d34ae9abe7c3d18fc36632f0c225,2024-11-21T07:45:31.590000 CVE-2023-22853,0,0,1f7186860aea35784cc219965fd0801bae1636171471f0c06416d0be23f0d9ac,2024-11-21T07:45:31.753000 CVE-2023-22854,0,0,919d0232f29b617ede5c7062d2f8e9fbb941832ef72829288f85ceeb4412cb18,2025-03-21T19:15:44.523000 @@ -218611,7 +218611,7 @@ CVE-2023-23011,0,0,232da3a9fe1bf4a560216e989a62097122c48ba2350772747d85add99233e CVE-2023-23012,0,0,2b9237987ffd683d471baade28dd527c354dbf66efaffacf677de261d3a62404,2025-04-03T15:15:45.717000 CVE-2023-23014,0,0,6673d179cb81556c761cbad2c3f6552f1111a0375091750ee87b9941538aaa00,2025-04-03T15:15:45.893000 CVE-2023-23015,0,0,0fc24882df0cfc58718cfc8e9468445a51320e8c73e27ea37d7c48bacade065c,2025-04-03T15:15:46.070000 -CVE-2023-23019,0,1,cc12cb25873eac1ecf649ff86e2b8dfdb6f9c08343bbd4da64f65d5abcedce1f,2025-04-04T14:21:22.300000 +CVE-2023-23019,0,0,cc12cb25873eac1ecf649ff86e2b8dfdb6f9c08343bbd4da64f65d5abcedce1f,2025-04-04T14:21:22.300000 CVE-2023-2302,0,0,34ef982b498e7430ee832284943c8a861cec9e7cabdf617316655fb267a14723,2024-11-21T07:58:20.680000 CVE-2023-23021,0,0,de796f515282cac2f3c80318876a1fc888c5c6b9fd9235d041bc60c7ca86bac4,2025-03-27T21:15:41.857000 CVE-2023-23022,0,0,8d160fd47bc2d83557961bce73412bfc4fd56a6cb0dc5f780f17d7483ed39a5a,2025-03-26T21:15:18.500000 @@ -219015,7 +219015,7 @@ CVE-2023-23632,0,0,f693253ba44df44e5f7854cb5a9b6d0a6b7a4f7f6a08ebd9f14535a4c5639 CVE-2023-23634,0,0,fc8e12dc28ee8a4ea63c1d3ad048902826f133eb96aaed0163036fdba506ad6d,2024-11-21T07:46:34.737000 CVE-2023-23635,0,0,b3c9e3912e35a4e69b65b862b94478cdc797e0b23669610dff1c6b10d04ab9bf,2025-03-26T19:15:22.990000 CVE-2023-23636,0,0,5efb2f138f796eb1b52569114af7c5bd82457ab2b538969793799d9ec1324363,2025-03-26T19:15:23.177000 -CVE-2023-23637,0,0,c2c4c4e52e4d74778185bf31511455992e129a9a0b5dd05ffe802ad3b4b24ee1,2024-11-21T07:46:35.183000 +CVE-2023-23637,0,1,308f7cdb7be077a460202ddf09a662fb049d97c710eb55a4e7630b26e0fb05b6,2025-04-04T18:15:47.737000 CVE-2023-23638,0,0,65756de2620dfab064205a8de95484fcfe3ba1a08b12c85485f470580e8bfaec,2024-11-21T07:46:35.343000 CVE-2023-23639,0,0,da05b2260544e92f503961f223c12f1af223a122d92f14422f185279a3c45090,2024-11-21T07:46:35.467000 CVE-2023-2364,0,0,b450820688b6fc33337b4240337f3aaa42fb5af83aa1c41a34bc14c0cf70b0bb,2024-11-21T07:58:27.837000 @@ -219915,7 +219915,7 @@ CVE-2023-24724,0,0,05a88cd95e33a4726ae4f06c87ceb395258f4b7f4993ae98d8cca6d83f32f CVE-2023-24726,0,0,50947bf9030f1be550b36be9e40cf29480ad3420c4490b8a419b75411ce1452f,2024-11-21T07:48:20.050000 CVE-2023-24728,0,0,78f9f3fd11f088d15e352f0731d33cd001c053f50bcad2715a6ad0f3de54c7a8,2024-11-21T07:48:20.197000 CVE-2023-24729,0,0,4c489d287c9812b2fd170bc5a0633aff9d1e8593ae8341a0ee1391c7ee6a9e06,2024-11-21T07:48:20.353000 -CVE-2023-2473,0,1,3f52f44849e670ec887b37e327f30b2cba41eac2f7f5765ee95f4ea0d98d1058,2025-04-04T15:16:10.910000 +CVE-2023-2473,0,0,3f52f44849e670ec887b37e327f30b2cba41eac2f7f5765ee95f4ea0d98d1058,2025-04-04T15:16:10.910000 CVE-2023-24730,0,0,f41f7ce60b87186a36c799b291e39c363ae59e5aaa71806b34570d06e1757d83,2024-11-21T07:48:20.500000 CVE-2023-24731,0,0,8fa5455f55f7771c5580cf6e6cc163bbe6deadec98f097e1e136a45ddc4c91f5,2024-11-21T07:48:20.640000 CVE-2023-24732,0,0,ac333993770ae4c975ad2f5e9cc596c859fb3cd3c16fc2f4f786c38ed5ffd9bd,2024-11-21T07:48:20.780000 @@ -221791,7 +221791,7 @@ CVE-2023-27079,0,0,3424624d7a95b45838c57eaa50f4fc7e1272960da167aa737942bced0f83e CVE-2023-2708,0,0,927cc15b614161ccce8ec471f4cc9f6f96cea08c81294781e5c5e03c9a572be5,2024-11-21T07:59:07.890000 CVE-2023-27082,0,0,2c40f95e8d41178b94dd847ebecb5d6ca70900da105b9be54ff9bd9eda4c6c0e,2024-11-21T07:52:17.313000 CVE-2023-27083,0,0,f52240e94afb722f2a0c557f9dfb89c9e41d5209858d5fe1be554d2aa3a26983,2024-11-21T07:52:17.457000 -CVE-2023-27084,0,1,ca72e74823c3a0c0cb0354471fa424b03aaf674dc6c2e309d3044f9133b0df82,2025-04-04T15:15:06.847000 +CVE-2023-27084,0,0,ca72e74823c3a0c0cb0354471fa424b03aaf674dc6c2e309d3044f9133b0df82,2025-04-04T15:15:06.847000 CVE-2023-27087,0,0,13db924c9808b9c4671f5e5a124311e49f06005723090df2ee6d54267087f848,2025-02-26T19:15:17.373000 CVE-2023-27088,0,0,31bf376c7872a9aefb094ed31a97ebb580636e7f887c5d71b665d0297453325b,2025-03-05T19:15:32.583000 CVE-2023-27089,0,0,7b2c8bdddfb2317066cff5c96a764d30bb910711b4e8d6bb04ba7efb74dfbf43,2025-02-14T17:15:13.770000 @@ -228972,7 +228972,7 @@ CVE-2023-36358,0,0,ded194e7b200adb441b4fa709d63c99e2eef0e06835442964ff220e3502b3 CVE-2023-36359,0,0,f1cfdda5960f8b568ffa1ef340bf74059ceff420da4bb55dede3794d35432533,2024-12-10T21:15:14.750000 CVE-2023-3636,0,0,f79ef9ecae829c199359798b63f24fb8a51eecaca990fa8998937337744d6ca2,2024-11-21T08:17:43.370000 CVE-2023-36360,0,0,03f8e99b08fd657ff41dfd2813e153f5a284df5fa1c76bf6a8d43cc2dedb5354,2023-11-07T04:16:33.320000 -CVE-2023-36361,0,0,549db09fc10c400be590b6da20d8de1535f8d9fc28aff802e2996a3c6a3cef62,2025-01-09T20:15:33.733000 +CVE-2023-36361,0,1,11c51d229e5e8b7fa287a2144b07b1c2e9d780cbdf318569833ecef639ea1a81,2025-04-04T19:15:45.423000 CVE-2023-36362,0,0,f35c3800a748c3ee5be3b3e58969fbaf55a70542449ac51524b5ca585852fba7,2024-12-02T17:15:06.610000 CVE-2023-36363,0,0,5443faca0d1d39bf7b26b052750b5043f604c34bc823d55c9ec6a30569cc723e,2024-12-02T17:15:06.740000 CVE-2023-36364,0,0,65cecffdfff980a49716cdbcd7c8173de3b98782362afa0be07cc7b2496b5b11,2024-12-02T17:15:06.850000 @@ -234942,8 +234942,8 @@ CVE-2023-43849,0,0,cbe0932bd7f85d0e50434c6538afbc2a43672e762f308e3ab85b9e5026700 CVE-2023-4385,0,0,651b47d9b510c0a2bda1b759e47b7d009e2cd378a07932979b0865965adb2231,2024-11-21T08:34:58.953000 CVE-2023-43850,0,0,b48ea3d02d13ae35d5398edd3fe6706d5e7847724a8254787975b3bad9093d8f,2025-03-18T19:15:42.163000 CVE-2023-43851,0,0,03ca69ff19b0ef9dcd7bf74c0d9de932b636210386a8111c5b45b97a8dd753d9,2023-12-26T18:15:07.987000 -CVE-2023-43856,0,1,cb761112c7c4f68ed30a2462a80603cf112989c24c8bc01f5ca1d738e29d7b07,2025-04-04T15:15:06.847000 -CVE-2023-43857,0,1,8f63d06eb8232a4e502049736f0c6154afb0b1487a573c2e9cb8eca3da188583,2025-04-04T15:15:06.847000 +CVE-2023-43856,0,0,cb761112c7c4f68ed30a2462a80603cf112989c24c8bc01f5ca1d738e29d7b07,2025-04-04T15:15:06.847000 +CVE-2023-43857,0,0,8f63d06eb8232a4e502049736f0c6154afb0b1487a573c2e9cb8eca3da188583,2025-04-04T15:15:06.847000 CVE-2023-4386,0,0,9d233fd1299370e2547c855fac8677d1bb88c35983a850ed5184f201d1ccaafb,2024-11-21T08:35:02.407000 CVE-2023-43860,0,0,1ade3fcd4df3c7a8cb1a066b552eda109c6c514e1065f17d61d7b0cc792d8f63,2024-11-21T08:24:54.243000 CVE-2023-43861,0,0,b799e6b819bb1115c4c73505af5fe348d9d352280347b82b4af4a2fa33f23786,2024-11-21T08:24:54.410000 @@ -235933,7 +235933,7 @@ CVE-2023-45391,0,0,3a36370d2e7fba95c28c2237cf1d2c95b6609ca8dd8d8a899e038a40705c8 CVE-2023-45393,0,0,88b4c6b55e297aaeb54c07f30d808753600277b0d8f9bd95225d2a495bbf1932,2024-11-21T08:26:53.270000 CVE-2023-45394,0,0,12bd4dfefbd456960736c1e6de7b5ece89860e7a078dd84cddd3d7bc90600eba,2024-11-21T08:26:53.407000 CVE-2023-45396,0,0,37d4dca1a7e41ab31cc4126ab590af4b6dc789b13db28de94cad7833eda58c8a,2024-11-21T08:26:53.547000 -CVE-2023-4540,0,0,147c8a28ab42c9f999782dc2163f80ce4a117b50d69b2adb6c1ab8e9cf8fd99d,2025-03-14T16:15:28.097000 +CVE-2023-4540,0,1,fc58055d78e91b3db7acbd3de60d0c3a7b982bde583f1c1aaacd3e11e5c7ca69,2025-04-04T19:15:45.653000 CVE-2023-4541,0,0,75fe83efad0bd1d50dbf1809eb21a3da2cc9fe6d8f82f7efcdd3080518d19dd6,2024-11-21T08:35:22.767000 CVE-2023-4542,0,0,5854cfc430907f3d94d31a3c41190b35b5f6922a41d82118964c1466102ee5f2,2024-11-21T08:35:22.903000 CVE-2023-4543,0,0,89627b26bda6a1bcdaee46d8fe937ee6742ccbe9144b677d5af282462d2ac653,2024-11-21T08:35:23.050000 @@ -236285,13 +236285,13 @@ CVE-2023-45897,0,0,faa8fa863cbb8a3df0b16f702e5bf414a79ba0375c914b80b5eef0716f820 CVE-2023-45898,0,0,c8906771a10ff0d35d6a638762fef09cae8ae9f166e307bf158bf5e8ea33b4e9,2024-11-21T08:27:35.133000 CVE-2023-45899,0,0,4eaa89e132088135a262a155b9a208a643fa1600b346e15873d17b01faf07afd,2024-11-21T08:27:35.317000 CVE-2023-4590,0,0,12e804ec09e6e1f6a16ea46910457bff376fad8cfae1b0e7f548a19cb0522174,2024-11-21T08:35:29.910000 -CVE-2023-45901,0,1,29d93ad7c5fc5601cc1a9b42d54ae0ac500ae2d55bc27f4e201173ee1b57b9ae,2025-04-04T15:15:06.847000 -CVE-2023-45902,0,1,1f0e33712b5b51708bced8ac5762b82f871fcf86aa4fd6855a0471a244010f29,2025-04-04T15:15:06.847000 -CVE-2023-45903,0,1,142bf9376f9d01e1e4f6f873b521431de0bd7c51a08de6758b41e08ba0ff5f3b,2025-04-04T15:15:06.847000 -CVE-2023-45904,0,1,20d6f3c3c916bd6f8eb51f66ad07bad1e442c5801c50768d57d805a9c61475b6,2025-04-04T15:15:06.847000 -CVE-2023-45905,0,1,710090a5f8a36b7ba4fa9b3cf199b7a481430176065ea72784fff7d43b55451c,2025-04-04T15:15:06.847000 -CVE-2023-45906,0,1,a5208b087be81289e7d30cf210362ff97f1981850fc9509f63296d6d4145f9a7,2025-04-04T15:15:06.847000 -CVE-2023-45907,0,1,473440292ae0a26b850424018092461c29d9d1473d1e42ca76c7a005e3820600,2025-04-04T15:15:06.847000 +CVE-2023-45901,0,0,29d93ad7c5fc5601cc1a9b42d54ae0ac500ae2d55bc27f4e201173ee1b57b9ae,2025-04-04T15:15:06.847000 +CVE-2023-45902,0,0,1f0e33712b5b51708bced8ac5762b82f871fcf86aa4fd6855a0471a244010f29,2025-04-04T15:15:06.847000 +CVE-2023-45903,0,0,142bf9376f9d01e1e4f6f873b521431de0bd7c51a08de6758b41e08ba0ff5f3b,2025-04-04T15:15:06.847000 +CVE-2023-45904,0,0,20d6f3c3c916bd6f8eb51f66ad07bad1e442c5801c50768d57d805a9c61475b6,2025-04-04T15:15:06.847000 +CVE-2023-45905,0,0,710090a5f8a36b7ba4fa9b3cf199b7a481430176065ea72784fff7d43b55451c,2025-04-04T15:15:06.847000 +CVE-2023-45906,0,0,a5208b087be81289e7d30cf210362ff97f1981850fc9509f63296d6d4145f9a7,2025-04-04T15:15:06.847000 +CVE-2023-45907,0,0,473440292ae0a26b850424018092461c29d9d1473d1e42ca76c7a005e3820600,2025-04-04T15:15:06.847000 CVE-2023-45908,0,0,cb20f33fd2c89a34b7e68bd5875a52f91203faeb6314cace267102365c8763a2,2025-01-21T20:15:30.607000 CVE-2023-45909,0,0,7a6f6c7ffcc444e3dd0f2d61b446410f185da28b1966be5cf2b89bf9c5b416d3,2024-11-21T08:27:36.603000 CVE-2023-4591,0,0,3d0884727bd3f602eced12e2167bdcf876daa1650bb6cfae9f8cf781bedd9897,2024-11-21T08:35:30.037000 @@ -237075,8 +237075,8 @@ CVE-2023-4687,0,0,356352524a0e7e73692e17b74c66f124ccfc9d1973ecc3a39032e08a59fdfb CVE-2023-46870,0,0,8a56aea6b9a04208883499a12aca08af27fd925f9ba60f223e7187d91aebc0fb,2024-11-21T08:29:27.497000 CVE-2023-46871,0,0,7204ee92c5b15d17217f26196f6a235f539f6043780dab6af6f4c4c7d7c9bc6e,2024-11-21T08:29:27.707000 CVE-2023-4688,0,0,b684a7612546b37fa3d4c55e336de068f38912164cd27bd2b6bed8e5ab841c6e,2024-11-21T08:35:41.403000 -CVE-2023-46886,0,1,dcc7d8cbd84f435c5b5c535393359bfaad9320b3d18f64148dfda1d8ad283ff1,2025-04-04T15:15:06.847000 -CVE-2023-46887,0,1,aaef0257ea2c0c528c5822152ba1dc24cfedff16ab1ddd358ea49735874cb561,2025-04-04T15:15:06.847000 +CVE-2023-46886,0,0,dcc7d8cbd84f435c5b5c535393359bfaad9320b3d18f64148dfda1d8ad283ff1,2025-04-04T15:15:06.847000 +CVE-2023-46887,0,0,aaef0257ea2c0c528c5822152ba1dc24cfedff16ab1ddd358ea49735874cb561,2025-04-04T15:15:06.847000 CVE-2023-46889,0,0,d7dfa509b530b5090985e3b02a89e01095268a5feec032a14cc8c4debc1263a8,2024-11-21T08:29:28.203000 CVE-2023-4689,0,0,c3cebdbf0d8bd8871f41ad6be3ce66cb345abb77235c1d0377c6b7578a763e58,2024-11-21T08:35:41.557000 CVE-2023-46892,0,0,7e31ef020d463a278d2db6fb4d5ba6ec6a28b8921b0038f3566a2bb2c83a861b,2024-11-21T08:29:28.360000 @@ -237445,7 +237445,7 @@ CVE-2023-47417,0,0,2d0f0dcfa716c586a4d148104ad512169facfc5d69689bb854027c4ecacd0 CVE-2023-47418,0,0,3eb4f7d2b99354859901e4843d9fa8dd56a39c9ec87f45ce106ad4ce6dce3fca,2024-11-21T08:30:15.097000 CVE-2023-4742,0,0,cab742d16661c5afc85191bfa33e172665ff2f36d5a1bb0823a4f49fea033cef,2024-11-21T08:35:52.697000 CVE-2023-47422,0,0,3d74356a5d773000771956bcf998ac60976624a559ce17581ba27aab969f6272,2024-11-21T08:30:15.367000 -CVE-2023-4743,0,1,3e752e66a25050618c0260ef4a5eda0c910e7bd2ee67a109317f4e367d0a2396,2025-04-04T15:16:10.910000 +CVE-2023-4743,0,0,3e752e66a25050618c0260ef4a5eda0c910e7bd2ee67a109317f4e367d0a2396,2025-04-04T15:16:10.910000 CVE-2023-47430,0,0,26f5847944c0acfd5c99b97098d2b046e02510867cd4a7c0ebeed5d2e9650870,2024-11-21T08:30:15.713000 CVE-2023-47435,0,0,5ccdcabe2a0b9ba96189023d36cc07e7ef47f391b565e278468ee475ca2b31c0,2024-11-21T08:30:16.070000 CVE-2023-47437,0,0,0f704243d66d9166465cf21e4ac8df0922263a64ca732d3c3042d430d0912420,2024-11-21T08:30:16.410000 @@ -237851,7 +237851,7 @@ CVE-2023-48011,0,0,d20184241bb926727b4fe3e3fcbd6b9c8788828c5bc07320d1129553260a8 CVE-2023-48013,0,0,5aa1cf92e1179d877001a7df378fe61d75436daaceda5d5b308bd8cfcc524ae5,2024-11-21T08:30:59.433000 CVE-2023-48014,0,0,4afcb211b6efbc049f2be7285e924ca939af0bc564c0c4609ff82f8f7bc44369,2024-11-21T08:30:59.577000 CVE-2023-48016,0,0,84034be767234809dc8fd4905fb723c4831c56bfc210802a871ecfa6c169e532,2024-11-21T08:30:59.730000 -CVE-2023-48017,0,1,6b2682c980481240a5cc888b6b8997c293549ccf70e0be0d49d9db2cda85878e,2025-04-04T15:15:06.847000 +CVE-2023-48017,0,0,6b2682c980481240a5cc888b6b8997c293549ccf70e0be0d49d9db2cda85878e,2025-04-04T15:15:06.847000 CVE-2023-4802,0,0,742992230a6bccce5a6b862d6365dcf133ec37f88f76c4cc3f17879932ea01a2,2024-11-21T08:35:59.847000 CVE-2023-48020,0,0,1ae5eab15a1aae1947b4a16345a5db5e9233e756e3e060a3a45415172807a1de,2024-11-21T08:31:00.027000 CVE-2023-48021,0,0,450f72df6aa777c6729ebec6000beb877bdb10c9468f7236aa37c8029726f4b4,2024-11-21T08:31:00.183000 @@ -237876,10 +237876,10 @@ CVE-2023-48053,0,0,8233f3eb59fc283f0a6fbecd7b47ef4bf30ba9e432eacd8a25ca672d76185 CVE-2023-48054,0,0,6548d54216812d00a9920c90e0644528ef24cab10f5dda4c137338ca32a3bd30,2024-11-21T08:31:02.987000 CVE-2023-48055,0,0,a8af3e111645b8c6485c2a089c4081e9c5b18651289c5a7704129f50cb5ac34c,2024-11-21T08:31:03.133000 CVE-2023-48056,0,0,c295230111cea2d7587390af12078fbccdba22b08d36a5a30e469f81148922d2,2024-11-21T08:31:03.290000 -CVE-2023-48058,0,1,950e7b52d61ebc117f014333fd84004c63e32be0ec38df3b278d3b89e483b548,2025-04-04T15:15:06.847000 +CVE-2023-48058,0,0,950e7b52d61ebc117f014333fd84004c63e32be0ec38df3b278d3b89e483b548,2025-04-04T15:15:06.847000 CVE-2023-4806,0,0,b00e51c6c3dae60b20f60a604efcf2b8109f756905a44ac943ec5da21109c930,2024-11-21T08:36:00.433000 -CVE-2023-48060,0,1,39a3c225474d944325d347c783f64e75f9fc02b1f7c0f2e0430501d17dc15cec,2025-04-04T15:15:06.847000 -CVE-2023-48063,0,1,90fd1393ffce796f0bd9b73df226dcdd3268db3f0387d557b261251a8062168f,2025-04-04T15:15:06.847000 +CVE-2023-48060,0,0,39a3c225474d944325d347c783f64e75f9fc02b1f7c0f2e0430501d17dc15cec,2025-04-04T15:15:06.847000 +CVE-2023-48063,0,0,90fd1393ffce796f0bd9b73df226dcdd3268db3f0387d557b261251a8062168f,2025-04-04T15:15:06.847000 CVE-2023-48068,0,0,9925cf1603cbf765c65e72a2a850403dfd97ecc36b2289682be1a9c50b44ce0d,2024-11-21T08:31:04.080000 CVE-2023-4807,0,0,620b132307db3f6f2bb7e18d5353c627ec97616d5132b4d5ab5c7049ee765f56,2024-11-21T08:36:00.613000 CVE-2023-48078,0,0,c00a34b2155b03134fcb71a136a573c4ca124e70fd5c11ad7c6b0156e7d076eb,2024-11-21T08:31:04.257000 @@ -241136,7 +241136,7 @@ CVE-2023-52477,0,0,eb5822d237396c41c04f52728d9bf515c950801aef4f539b7f08b45f3cf87 CVE-2023-52478,0,0,9e05b88e7feb0641b6ca4e17d4a850f7ec536a2d854a57f1537b6f6a4af9b80f,2025-01-10T18:27:26.213000 CVE-2023-52479,0,0,3488782e4ea554d50277ac919e531f82506383bfcd894ea2660b8bea5230eb80,2025-03-19T15:51:23.407000 CVE-2023-52480,0,0,d2e7b47e19154d214380376bad33b378aaf81d0a77e7753c5aa4424a4aa22f37,2025-01-13T17:05:39.887000 -CVE-2023-52481,0,1,e5e35c143c189a4dc99b0b3fafb8274ab1c5ce374e30b0f8ff24b74d9c7a3f58,2025-04-04T14:59:11.650000 +CVE-2023-52481,0,0,e5e35c143c189a4dc99b0b3fafb8274ab1c5ce374e30b0f8ff24b74d9c7a3f58,2025-04-04T14:59:11.650000 CVE-2023-52482,0,0,0550d5295ece82b13a420ca7a1fc263c818f23bd27e72e085a819f217f4c7cc8,2025-01-13T18:27:10.853000 CVE-2023-52483,0,0,ab0109ac100464d057315dfb0c304712e2e9816b3ac72ec181570b14f6298ec8,2025-01-13T17:53:05.157000 CVE-2023-52484,0,0,688b7461214e279f98589a82904a607b59c917943fab1d733720294c9192c231,2024-12-10T19:49:58.407000 @@ -241148,7 +241148,7 @@ CVE-2023-52489,0,0,c5788fea0d34ec1718c9b87947d8508d8c4df89ffa3cc63dae0cf9ae06472 CVE-2023-5249,0,0,66795859b94115699a1a33c2c476e77d83b1313b38a4d4dd71029c0ce4694430,2024-11-21T08:41:22.310000 CVE-2023-52490,0,0,ac0645c6d93b992f3c60098d66e2a3b8bd3e99c282442be872cc6bbd165e3480,2025-01-07T15:44:33.343000 CVE-2023-52491,0,0,033c3717ec0e3c1ff278f67e39cabcd6c9f75e93df8df5930180e00b807e6f9f,2024-12-12T17:32:00.693000 -CVE-2023-52492,0,1,ced302faeea7409d20597a9594ab59f448fdaa0ed56822e6cad74fb0ee0e6931,2025-04-04T14:41:10.300000 +CVE-2023-52492,0,0,ced302faeea7409d20597a9594ab59f448fdaa0ed56822e6cad74fb0ee0e6931,2025-04-04T14:41:10.300000 CVE-2023-52493,0,0,226a91067fa9e733403ac59e421c8bf19e75585ed93a94075b47dc216a3235f1,2024-12-12T15:57:46.703000 CVE-2023-52494,0,0,b6da525d0dd89e6e639105d328e499bef6b8e5bd820d5654178b266b65c780b5,2025-02-14T16:41:13.837000 CVE-2023-52495,0,0,20867b9697f122459d47382d8b5b2419e2a239fc21def7b74a41a26bc6e6086b,2025-02-14T16:39:14.523000 @@ -241246,7 +241246,7 @@ CVE-2023-52578,0,0,7fde1fb5cbbb0a2937bb0b665d1b0debdfecb0d6288e6b5ff0d4a3ae6d504 CVE-2023-52579,0,0,46d3719ad784e436d8f68041c52fb234bc85c10006dd0f7ac61db478c13665bf,2024-03-04T16:15:49.340000 CVE-2023-5258,0,0,e7de433a5f8b0381668aa81c56f5663c687e057bf10b9164f07834413eaf9c06,2024-11-21T08:41:23.570000 CVE-2023-52580,0,0,be0a0e06ead2361ae48d45b0aa80d77f09800c6568f6ac2725bd6b1b9aefbeb8,2025-01-16T17:43:05.203000 -CVE-2023-52581,0,1,b3d8fe18891232324c485922f17030a4c5efae080ca88d12066ae426bce9250c,2025-04-04T14:46:52.070000 +CVE-2023-52581,0,0,b3d8fe18891232324c485922f17030a4c5efae080ca88d12066ae426bce9250c,2025-04-04T14:46:52.070000 CVE-2023-52582,0,0,f412b70c6b5d57415fcdb6864c794b98a72ed689a3f46467eda4aa933ef09985,2025-01-16T17:33:18.490000 CVE-2023-52583,0,0,e46a4554888ecc302b9234bbffc66d09b6f50262b0a49874d8de91ef5fc33ea2,2025-02-03T14:18:13.147000 CVE-2023-52584,0,0,767f02374d5c471ddc8dab891ae7592cabf6e3c350282d5fd1bea4aeb1ca29ce,2025-03-14T18:58:42.940000 @@ -241286,7 +241286,7 @@ CVE-2023-52614,0,0,52c94d505914b26a7b25e71d5a23d26488e4516b2dcce84229cb69170bc5b CVE-2023-52615,0,0,d8d6425893b09196f356165ccca56dc5d14626c565c3defa9edaa655ca205929,2024-12-12T15:20:12.140000 CVE-2023-52616,0,0,21eb9859434b7c6e92ef05b0f4aacd3cbb15ee4dfdbcc697fefad0ffc6e20466,2025-03-10T15:50:52.807000 CVE-2023-52617,0,0,43a6c3b54c97e95c95b1a3b856ce894a04e8e0998a4a6b1e4b1c3f666122ec07,2024-11-21T08:40:12.540000 -CVE-2023-52618,0,1,a928b6788f86ded10532d5dfecafe22640afc5603945bed7cdec348582ed7340,2025-04-04T14:51:32.453000 +CVE-2023-52618,0,0,a928b6788f86ded10532d5dfecafe22640afc5603945bed7cdec348582ed7340,2025-04-04T14:51:32.453000 CVE-2023-52619,0,0,0d5348273b1dd6132d59d6103b7e85c4edb4275673ae4b525ade634b5ec8c2e8,2025-03-10T15:48:56.520000 CVE-2023-5262,0,0,f12d27a611a8ec27e96df2726c8954646b355ec2142282b02264062a900d1e58,2024-11-21T08:41:24.097000 CVE-2023-52620,0,0,0eb70ac132507784a8c1da368ec59135c0ed7eca192468960b398b7bcc9d56b1,2024-11-21T08:40:13.067000 @@ -241375,7 +241375,7 @@ CVE-2023-52695,0,0,984f4b76a47d115f881e67e7241000ffb845ebded2afbe77d441750f57146 CVE-2023-52696,0,0,8d3c619e6b67aec84c360870ab51a63b72bf0f1f73bd1e08fb04785342ca53c8,2024-11-21T08:40:22.877000 CVE-2023-52697,0,0,671a7cb490453caa76b4ef84f02213be4f065b94138442feda1943d5df1ac542,2024-11-21T08:40:23.073000 CVE-2023-52698,0,0,dc918e5419de6d571c6117f3cfa5beafb8c09e338285110139e171aa94e0afd7,2025-01-07T20:18:13.340000 -CVE-2023-52699,0,1,64bbc408a264d5101a7c7df7613bfb4854993313e855bddea59f65e03ba3ffa0,2025-04-04T14:24:16.360000 +CVE-2023-52699,0,0,64bbc408a264d5101a7c7df7613bfb4854993313e855bddea59f65e03ba3ffa0,2025-04-04T14:24:16.360000 CVE-2023-5270,0,0,028b3369e4393aaac4eae433175a5edbad7b5425254bbb3b4903c56b3f73ee7f,2024-12-23T15:18:44.853000 CVE-2023-52700,0,0,941df9df38105cf470545869077a5e89f909e73a5596a4472b2ed873ccfca7ff,2024-11-21T08:40:23.517000 CVE-2023-52701,0,0,7f81e122a350018a2ab348c350be394ecfcd330fc6f122c5986cf26edb66103f,2024-11-21T08:40:23.707000 @@ -243236,7 +243236,7 @@ CVE-2023-6953,0,0,e3148f54ace7102cc1d1855a57ee7588a45b42a9470f40348979b8e5a6fa72 CVE-2023-6954,0,0,87eec9d8a7d1d4f7a21fe0bbd97c710f1708d0f75d7960a297d83c4cc61eb89c,2025-03-21T19:16:22.783000 CVE-2023-6955,0,0,b511e736eb1492e80ab280a40a08f55d678952ba2370b7bb1d7689f096e2ea91,2024-11-21T08:44:54.833000 CVE-2023-6956,0,0,5a2b668004fecf802df77f05304bc63d47f9be8a32adf14edea244199bcfda67,2024-11-21T08:44:54.980000 -CVE-2023-6957,0,1,cb1ff440e5334bce772d063adf3231a9100fbe70520d0f63d8b214d93c538fde,2025-04-04T15:45:18.910000 +CVE-2023-6957,0,0,cb1ff440e5334bce772d063adf3231a9100fbe70520d0f63d8b214d93c538fde,2025-04-04T15:45:18.910000 CVE-2023-6958,0,0,8eff2e5006ddc42d34f29662a93cea1b72db9351fc15f0bfc55007f882f03985,2024-11-21T08:44:55.267000 CVE-2023-6959,0,0,8ec838b66e35b19352010350b88da588492a0c4f4f1036ef3700c0fbdd552184,2024-11-25T16:47:33.943000 CVE-2023-6960,0,0,b6026c981573a00251f1c36bc13ef75af794522e5812fd8eff4aa7e26dc6a2ca,2024-11-21T08:44:55.563000 @@ -244373,7 +244373,7 @@ CVE-2024-0889,0,0,b6611c77f4e2d796077e441226203f8c7b8f4da600f201f833daef8bfdc456 CVE-2024-0890,0,0,1e8631b2ed4b6edde9925197249e0dab6307a02c02a9a40824a567aa47926f73,2024-11-21T08:47:37.640000 CVE-2024-0891,0,0,efa678123273b70afe03668459199c6345392b631b3f2738a2db9dcd1535a1e5,2024-11-21T08:47:37.833000 CVE-2024-0892,0,0,a2ee3a1ce7989ceb5331b2d8b81cc2caf3d1418527d55a134e003eb92efdf6d0,2024-11-21T08:47:38.033000 -CVE-2024-0893,0,0,8a6511cbb96eb0cf9a74b95b5a6ace70ace4b87dd5bee7be61ad4d9f69ee6848,2024-11-21T08:47:38.243000 +CVE-2024-0893,0,1,601e0497cfd7c72e03f189dd86d1085b0ebe3d8e9d562627ed3eca1410bbb049,2025-04-04T18:20:59.957000 CVE-2024-0895,0,0,58c1bfbdedc7520b1b4b816bdf4e4c17ad39e5dd3321c15ae1cfdf8d5f2cfc42,2024-11-21T08:47:38.400000 CVE-2024-0896,0,0,50bc494bccf14a5e7be91859c9b4550fa927c34acf01e96b6deb15e4d86525ed,2025-01-02T17:15:39.220000 CVE-2024-0897,0,0,72a30bc0c93e8d051fe6ef3a2130ed86d55a5842537e30205f254ddfcbc1de65,2025-01-02T17:15:24.673000 @@ -244478,7 +244478,7 @@ CVE-2024-10000,0,0,5e9faf3a8582966d0617ff0bfc738adf353e4bf143cb2e221a315b99482bb CVE-2024-10001,0,0,ac35d4329714e32b3533f7a1883d6fb833b180cba95e8a100e4ff8b3d0d33c34,2025-01-29T19:15:18.360000 CVE-2024-10002,0,0,5c691c4a49203474796aabd6e9efcaabae6ff9dc1c736726998728d7e8cf645f,2024-10-25T21:20:39.167000 CVE-2024-10003,0,0,8b9c472d9982deca9020bf02b2566867a0fbcfbb043b63feef8aaf6db3c162f7,2024-10-25T21:19:19.743000 -CVE-2024-10004,0,1,2800a13d43bb6fef07922a0e23f8465b70bb754ac72d244c0164bee6476a9c4e,2025-04-04T14:36:06.857000 +CVE-2024-10004,0,0,2800a13d43bb6fef07922a0e23f8465b70bb754ac72d244c0164bee6476a9c4e,2025-04-04T14:36:06.857000 CVE-2024-10005,0,0,78ffba26a833e534d1e625308e59cb7c869e5dd5e6d7d6bc50d06a38f40a9d8d,2025-01-10T13:15:08.223000 CVE-2024-10006,0,0,2fffefdb7dd7179eb39d6f0b72be9bdde10944b1e2aaf06c528994dab68c5860,2025-01-10T13:15:08.440000 CVE-2024-10007,0,0,10955020ee863bfd449165e4d3bf73ec65f861b9bf16f49d808624432328d9ae,2024-11-08T19:01:03.880000 @@ -245689,6 +245689,7 @@ CVE-2024-11230,0,0,ee6b424c7a62c2691d2e24ab602c5868e66ba8265c75f0a0b856862cef6c8 CVE-2024-11231,0,0,1babaa8434f0dabb897e61577b0db39dc3dbee760a24a16a5980940fb44c99a3,2024-11-23T12:15:19.387000 CVE-2024-11233,0,0,f693569babb39b28690250bf399e234d5652aa087fc09c6fa53135c369c0e730,2024-11-26T18:26:37.783000 CVE-2024-11234,0,0,76a20d0b5df369c7dd2c3a2819b7721a96e80c779172c74c627d64ef7ab10b79,2024-11-26T19:06:10.243000 +CVE-2024-11235,1,1,9a694ea8c4b0c074e0f0e12eb35a772f5dc2958a429540659e2f2cfa58b09fe4,2025-04-04T18:15:48.020000 CVE-2024-11236,0,0,550d85bfafd1434d8d927c6d8dee8c7c226d05255dec5cf2f93f8237a1b74e8c,2024-11-26T18:29:05.820000 CVE-2024-11237,0,0,de4b0c93111594271f3574c60310eb4518047fb2381a2c266dca474551175054,2024-11-19T19:04:14.987000 CVE-2024-11238,0,0,7d478dbeadef28535e9a7c50bb22caed101ca81139b3f9fe5fe042fbc5528146,2024-11-19T19:01:13.060000 @@ -245795,7 +245796,7 @@ CVE-2024-11336,0,0,f6d676d5a427fada73f852223dfd1f8d78278266b2c8c37478ab18b05a16f CVE-2024-11337,0,0,b01b2d91cb611a25f6f6c6a23755d6fd83423220b4845fa1731e3136f57cb3af,2025-01-07T05:15:11.320000 CVE-2024-11338,0,0,16b8e4df470f18ecee94a466e04ad75959cffb7412dbd289584a85008e652ba5,2025-01-07T05:15:11.520000 CVE-2024-11339,0,0,79f980d1c213f37a017402750a78ab5a89012c4a7d884549e17aee2fe1c2fbb1,2024-12-06T09:15:06.497000 -CVE-2024-1134,0,0,4657e44dad83294fcf3fc6833752c04e863a79c42ff1f110230a3efb0e4f2136,2024-11-21T08:49:52.330000 +CVE-2024-1134,0,1,7fd5445e734f287a09c2c84094ea5b57a83f4ad269480e491407fd9d789435d1,2025-04-04T18:22:20.100000 CVE-2024-11341,0,0,fe8cd85d684fa85647e91e6c807d0d3948596661a708a57f08c30a79715842f3,2024-12-05T10:31:39.520000 CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000 CVE-2024-11343,0,0,0dea2b47b283270f545dc4d65cb8a901bdaddbda32b223ea4da3672ecc136cc4,2025-02-20T20:39:16.737000 @@ -246169,7 +246170,7 @@ CVE-2024-11704,0,0,7c1cac98f692d41cdc5b96fd88b8dd9b5ffb5022fab2697a92f4d4b10ff72 CVE-2024-11705,0,0,0e1596de8042e8e852c6e998c00c8b73e87ddca14f366899c4d0d5766c7acb40,2024-11-27T16:15:14 CVE-2024-11706,0,0,d7aa48664fd3a99ff8ecdb1c5e606d3e6a16c2b68f26185023438aa20fdce0e6,2024-11-26T17:15:23.010000 CVE-2024-11707,0,0,c14d0723c12588788ccbd8bb2e9951ac0d18f4bf2138ffa0507ec2dce1fcd9c9,2024-12-03T08:15:06.223000 -CVE-2024-11708,0,0,46bf8dcd9e0a994fe6b91558c4bac72ea601d2749b0be7bd469a9ad7ee077e45,2024-11-27T15:15:24.747000 +CVE-2024-11708,0,1,030e5c6df3649eaf2e5eddac64ccba107408ecd59574c9bbd3ff3367385df7d2,2025-04-04T16:27:07.540000 CVE-2024-11709,0,0,c7d4cd410df5a04f3cf8d9ea3dda9b5544a86774d871c2cb08cc1e1a83cccda9,2024-12-12T05:15:08.900000 CVE-2024-1171,0,0,101c744a2f7af2365151823715903a457cb246b48958e5e6d93d02d77acde0de,2025-01-08T19:07:55.783000 CVE-2024-11710,0,0,bfd1e5c32dce0918e1d3e307f709b2d7d8ea65d4cb991eb82b0d7ae028220e09,2025-02-05T15:21:02.823000 @@ -247625,7 +247626,7 @@ CVE-2024-1319,0,0,9afacc92210946a709af9d3701a36ef296f30bb6680e4cc64d57ad331fbec1 CVE-2024-13190,0,0,ee48fcb8370dfe5bdd3e0e59033d930db3dd1bfee1b55444a21f3aea6a2911a6,2025-01-08T21:15:12.303000 CVE-2024-13191,0,0,96cb16871a3f66a662afdd31cfb443839c41c3cf1514b8fc2cf6b6bf4b24af70,2025-01-09T17:15:11.267000 CVE-2024-13192,0,0,714b42e9ed2e2c7af1fdca18ad4dc5cf8e224f51f7d2a74bf52a34d91004a8db,2025-01-09T17:15:11.420000 -CVE-2024-13193,0,0,580a6d3594d79ee8262bdb23fecc8aab80af9c8a0a57ccb2acb8bec5f2e79b8d,2025-01-09T17:15:11.553000 +CVE-2024-13193,0,1,d32b08d959174c43b1fe3441ba026097abfa1bfe9b57e9f9418723438179a2c7,2025-04-04T16:59:31.217000 CVE-2024-13194,0,0,e369ec1a611af8aaa837f5724fa1590477c9812c8fc0a73eed11a0252a618fba,2025-01-09T17:15:11.690000 CVE-2024-13195,0,0,d99bb77228f5b8439ced2df5cb9ba3e79a4e4c6d15cc632d4d5f2a7481ac8986,2025-01-09T17:15:11.827000 CVE-2024-13196,0,0,d1f1d5b45343ce572f2e5d279b42d1fb45fc7100a597fee19e22248ff242186d,2025-01-09T17:15:11.957000 @@ -247759,7 +247760,7 @@ CVE-2024-13316,0,0,25d5ed6e5d616a5feaaead62ba45936d1b7cd3d51545edb9bef6427ff89c1 CVE-2024-13317,0,0,bf6e98353834aadd569c32731a32e07929f7d2ec68ca0c813c445806410cf741,2025-01-18T07:15:08.290000 CVE-2024-13318,0,0,234665f0f68f8330142422de1967c3be9edc8bd894792fcd281141ced7359a2a,2025-02-25T16:49:28.007000 CVE-2024-13319,0,0,7991c2dfb6aefea7f96696a61d541e78c477eeff53b34652065a2f9dce798e51,2025-01-24T21:06:34.310000 -CVE-2024-1332,0,0,ba695ffa36cbb4a49136e56278e5eee91dd1cc923b874ab42163e850c54cf8ae,2024-11-21T08:50:21.220000 +CVE-2024-1332,0,1,fbca029923764071a879f708c13dcefac112b536a029880b5fea7dff12520e27,2025-04-04T18:12:44.650000 CVE-2024-13320,0,0,9810c781f4174c2f400826478acd70a32a6ed84108ce30c79fb48863cb9a655a,2025-03-07T07:15:22.963000 CVE-2024-13321,0,0,d95c3997d67ec0a232b3190e85750897cb7af8c3f3e610f13acad3898789281a,2025-03-21T14:47:58.847000 CVE-2024-13323,0,0,efd40c86d011875eb32911cd9900428905ab90bbe91720def3e774b362e547ea,2025-01-14T06:15:15.480000 @@ -248201,7 +248202,7 @@ CVE-2024-13752,0,0,58abec1a9c719742a0301542b70a1d6e3b887ea15505a7f86a0c807e31da0 CVE-2024-13753,0,0,35689cdd5b64ee3991abd63fa8ef5f0b529fd8b40e65045b74e26e44ce0a06bd,2025-02-25T20:55:58.420000 CVE-2024-13757,0,0,ccb7a6dd11d4f3a00241b911576f2d2b0b833a36cb6cbd17683d86a523afe1f4,2025-03-05T10:15:14.923000 CVE-2024-13758,0,0,2e4bd9fb3fef024cef02d2b8f2dacb7555196f6b2dc915351eaf15ff5ed3368d,2025-01-31T20:28:53.477000 -CVE-2024-1376,0,0,fdfc1cd3fe28e3548c452900973616a15f71191ac0fd71189dd6c34eee75d9b7,2024-11-21T08:50:26.737000 +CVE-2024-1376,0,1,f3bef9ed04fa637a76758b7b63eb5f91e0612d4cafba79a88ae6f6e89404ed7f,2025-04-04T18:08:49.257000 CVE-2024-13767,0,0,5e2a432b5514ebb28e43fc58238979fb079695a503a95ef3a2bddb1da15dea7c,2025-01-31T03:15:10.693000 CVE-2024-13768,0,0,65f9efb98da5492354189d6fbc823165fa39f9d576ed31c97572c09ab668b478,2025-03-22T07:15:23.743000 CVE-2024-13769,0,0,6fa2e289d8cf3e90cab0c96a01fffe9940909434acbdd1bee567bf2a5e72cf56,2025-02-24T15:54:05.167000 @@ -249331,7 +249332,7 @@ CVE-2024-20472,0,0,563a7032cb9745269362e7783d2bafcc885fad11cea1ddfaff8607daf21d3 CVE-2024-20473,0,0,564e06fccff44b15f0b5b085034a3f6ae150b5303843abf15ca1fab5bf61daed,2024-11-01T18:09:35.813000 CVE-2024-20474,0,0,3ed2b2d9b42a15521f090ddaae07f09bb402d4af6fc73de4ea9b0d3ce966d202,2024-11-01T18:14:56.790000 CVE-2024-20475,0,0,8fcde44e2c1f776207075b6fe0bac803033d12f7cd3a4638550fbb63b58c8645,2024-10-03T17:49:17.797000 -CVE-2024-20476,0,0,c488133091614ee527581bd0c768dc7b6c0432b29c7ef1c4d40ee80c6b2f1b8e,2024-11-06T18:17:17.287000 +CVE-2024-20476,0,1,22ca52f36512e87ac591ebc8b90efd3eefaec20df03e80bb53e39065650701bf,2025-04-04T17:19:47.780000 CVE-2024-20477,0,0,d70e7dd6ace9a7d0b7731d8aaafb30869546729ac7402131e58bea13b4957924,2024-10-08T16:00:30.167000 CVE-2024-20478,0,0,09b622dc44d569947b3e4fa228b7a40ba4cb58b0fda618c6d4396251cfa1ee3e,2024-08-29T13:25:27.537000 CVE-2024-20479,0,0,c42cf74f3e66a1a3756abd4c284b8f801fadfa0622f41bdc4219ce8609cfe51b,2024-08-23T15:14:45.913000 @@ -249340,7 +249341,7 @@ CVE-2024-20480,0,0,3c25a79e3da341334decc2e042e92c1e3e90b95c69a15c6bdd4405eea7125 CVE-2024-20481,0,0,0ea4556e8f3ca55f15a6b93e371efc8f93f8d20a6de75c06874d9ad18d96e2be,2024-10-29T17:47:44.083000 CVE-2024-20482,0,0,91c065c5ae8268289342d832aa225585cff358d487a277492c0f30ad7fadda37,2024-11-01T19:49:21.493000 CVE-2024-20483,0,0,dd75006a4b8378f9a9fb04ae844db2b682dee979eaed8461ca1ae896a3344cd6,2024-10-03T01:44:17.827000 -CVE-2024-20484,0,0,6b6707e10852e13633700ba01618bcd1e8ced80c7c9f83e2b3f114bf128939f6,2024-11-06T18:17:17.287000 +CVE-2024-20484,0,1,13ad9117c3d7c1ec1721de2acfb9420d4020c8bcfe181ff7139cdfa705d20bc6,2025-04-04T17:14:45.353000 CVE-2024-20485,0,0,4bad42c478a01f00d273ab8662a0d6beb1a29cef37718efc29530f0725b7110b,2024-11-01T19:50:11.107000 CVE-2024-20486,0,0,125fccffe06e3967c8f3666e5a0a779870a3e9c6cd485fa1df233aa67fbb99ea,2025-03-31T18:20:38.103000 CVE-2024-20487,0,0,90a43a4226fc2a3a08656cd3b727e32adf773edd1ff69cf850e5d113d82153c1,2024-11-06T18:17:17.287000 @@ -251217,7 +251218,7 @@ CVE-2024-2260,0,0,557e62dd3060217b0084e567e565db30fe7862de7972b16e3c4c75768c8d09 CVE-2024-22601,0,0,911fc06c53591b52a66c4d8b85d7ec2c09891cf909bb76b2114fd8c5524918d1,2024-11-21T08:56:29.163000 CVE-2024-22603,0,0,5c9726a11a96b0648c53639b35fdd408a890f7fc7c068b8dcae9441c85f8ab89,2024-11-21T08:56:29.310000 CVE-2024-2261,0,0,4f6d5c9fdf0e5875b684235a52067972acad631b950e5c276c5014b4f1a0e5a5,2024-11-21T09:09:22.330000 -CVE-2024-22611,0,0,6e58a4e884f570c664be6fecde0d13ffedc59a64ea5adc499cbe059746f1b6ae,2025-04-03T19:15:39.260000 +CVE-2024-22611,0,1,416b88bd2a50017b46c60318f97ce26e402ec5b3d808fc38643ec99800e092a2,2025-04-04T16:15:17.163000 CVE-2024-2262,0,0,06b525fb4df9576ff5c6be1b96bd47642171cee5cf1ec268c105a0c48bd2a76c,2024-11-21T09:09:22.457000 CVE-2024-22625,0,0,e40c7af372734e7fd588c91efb37baf3ec49974b1ef11e9e0beacdf59c2b2727,2024-11-21T08:56:29.560000 CVE-2024-22626,0,0,e25ff7e845993ee385c6ed43ba41ac1fcea55ef865f54873502ed32b00376e06,2024-11-21T08:56:29.730000 @@ -253434,7 +253435,7 @@ CVE-2024-25802,0,0,efbcc597ddce5bb06614ed107ca9d9ca2ae4e54150d84786e469843363f27 CVE-2024-25807,0,0,878f62a4098025b1352876641763ce23a3a9fc00f16f84d372a72055d263d901,2024-11-21T09:01:22.093000 CVE-2024-25808,0,0,e7107e502af714fde13b5314ac17bedd5501104f8976aca532b23b042cd471f6,2024-11-21T09:01:22.323000 CVE-2024-2581,0,0,524e7162ba8902ffd159f0321288102d68de4ec5f9b57785f939855fe6891543,2025-01-22T17:50:55.987000 -CVE-2024-25811,0,1,1ab8f44be24cd7d97b93c4fcc82a45a481f0a536e2f90cdd017d96603e52230a,2025-04-04T15:12:45.133000 +CVE-2024-25811,0,0,1ab8f44be24cd7d97b93c4fcc82a45a481f0a536e2f90cdd017d96603e52230a,2025-04-04T15:12:45.133000 CVE-2024-25817,0,0,24fb9fa88c35098258f5c3f08547ebdab9fa05429aca7f1384875ff62d1c8191,2025-01-15T16:49:06.050000 CVE-2024-25825,0,0,0ffb769a5b15104308a542a8126cf407f088d0f85637998c3ea573ab17a15826,2024-10-11T21:36:24.583000 CVE-2024-25828,0,0,6c0bb5940de5e96f5ca16393f1d0a516655bbac4099e03e4a759fc54dedd226e,2025-04-03T13:18:40.520000 @@ -253890,7 +253891,7 @@ CVE-2024-26283,0,0,83d15b0ce1b03a5d5ab372d1bfe8c847cb8f78a4d239d197ff39f04299214 CVE-2024-26284,0,0,f730d3106b02ee35303d7ebc1ee13bbae6bb3100361493a1a898a52fa6a5b67e,2025-03-28T19:15:19.807000 CVE-2024-26287,0,0,a6aa5e3005a08ad2bdeb88cca399334d57123c9b3cf8d04b234e0711a3fc2654,2024-02-22T12:15:46.420000 CVE-2024-26288,0,0,57036a84873af90a20230cade7759404ae42d8caf1369165c9554bb1e05c2b7a,2025-01-23T18:51:10.803000 -CVE-2024-26289,0,0,48a7a7a5fafdfa8d5f7dbc61909a6d99dc01723526113e644f30f0e41ba2dc35,2024-11-21T09:02:18.637000 +CVE-2024-26289,0,1,4736b7aee03c938a268493f6defcf98f894edce749ecc6673b93b2be51a2c774,2025-04-04T16:39:47.977000 CVE-2024-2629,0,0,d8f9dbab5bebd60d4b73b5d0eb5bc9a6f693c4d0a71ad24c646b70cba1372f8a,2025-03-13T19:15:44.390000 CVE-2024-26290,0,0,eac8b4123bad52d751a5c770d07d4d517ef4b7e81d9c76ac175a1491d9b58df4,2025-03-12T20:15:15.233000 CVE-2024-26294,0,0,1be23984189d643944b8ba76488bf4e03c60b8b9f0073ddb4a77be57b362d0a9,2025-03-27T15:04:47.140000 @@ -254065,7 +254066,7 @@ CVE-2024-2663,0,0,c22f0e7b5ed31e3585ae04604569739fcb5bd35aa21e256ad3298c060be800 CVE-2024-26630,0,0,435567819353feb6e9fd75aec3992aa276301c59d735e8ba98ba56f805149a7b,2025-03-13T19:36:45.610000 CVE-2024-26631,0,0,e434229e3dfe4957916a111b66d7525619499309febd0eb1837928a23887f329,2025-03-10T15:46:45.123000 CVE-2024-26632,0,0,43254b80a96e129111da580d92beb2cc1ca84b48f7dc16424fb8f576bf8a303b,2025-03-03T17:47:23.243000 -CVE-2024-26633,0,1,33f195750b883a118c47ca858b6eb514b28712635db7aee1f8b528ed69f320ee,2025-04-04T14:49:01.373000 +CVE-2024-26633,0,0,33f195750b883a118c47ca858b6eb514b28712635db7aee1f8b528ed69f320ee,2025-04-04T14:49:01.373000 CVE-2024-26634,0,0,014977ea292eed4f488692d37a43becd9788f8f35b2d1747fb8faa157edef3fd,2025-03-10T15:44:00.747000 CVE-2024-26635,0,0,12c1e07b99b4d1aa49a94b0045f6ab20da1750755e008b69de1f8c113f9d4f78,2025-03-10T17:06:20.737000 CVE-2024-26636,0,0,2b2b3ee862f313dfda730e110aad8c7ea0486e55fe61090e487896ec21904a27,2025-03-10T17:04:27.757000 @@ -254164,7 +254165,7 @@ CVE-2024-2672,0,0,ead1fa5e5dc2d285edcf03f29167380744f66057c620b5fd903d306254a3a0 CVE-2024-26720,0,0,1ca9f5c1cf45272d711bbb341b9a3a3e8a66cb323b330efba47b2d4d73910e9a,2024-12-19T12:15:06.417000 CVE-2024-26721,0,0,91eca3282c2c5fae3d2e53fc117c1d7d8985fcde88aa457f17183c5f93a89c78,2025-03-17T16:01:40.143000 CVE-2024-26722,0,0,12d674d56dcf1067f7c24e779fb92b06855d0b7019ccfecfbfdcc292981abf0d,2025-01-07T17:35:32.710000 -CVE-2024-26723,0,1,6fd99a4a9ecdfc2d82c38512c8cc8b8746a4cd462b8039e875f6f2710cba1622,2025-04-04T15:04:57.577000 +CVE-2024-26723,0,0,6fd99a4a9ecdfc2d82c38512c8cc8b8746a4cd462b8039e875f6f2710cba1622,2025-04-04T15:04:57.577000 CVE-2024-26724,0,0,19f7151406ef2f5c5b1cd459b98c958e0a845b85e8a1773b285bc393595645c2,2025-02-27T14:41:48.253000 CVE-2024-26725,0,0,e9fe20a5c5e5470547a40a8d97f1401a07214b8c6c4b76fbce65efa947d2335c,2025-01-07T17:28:15.293000 CVE-2024-26726,0,0,ebcbd1f97ac925ffacccd1ba4596d61a2a069cfd3a44d0d8f42d599084efe791,2025-03-17T16:01:56.210000 @@ -254179,7 +254180,7 @@ CVE-2024-26733,0,0,9347556dca79da5f4e5f4696d6999fc0ff34eae58e1f046990cd6cafc20b7 CVE-2024-26734,0,0,03f25116197f27b888005564a660d6eab1968d4dee38a6141c97d50d1126d43c,2025-01-14T17:26:43.583000 CVE-2024-26735,0,0,8376bf8aaf5bbfc4470da7adce5f6b9f58511b72d51065a9b6f0cc0b6f24b224,2025-03-17T16:05:01.547000 CVE-2024-26736,0,0,db0f3e358d9b2b4371e86aaebd5993fe0654a1caf1496c0ee4b3fb7c3fb7202e,2025-03-17T16:03:20.093000 -CVE-2024-26737,0,1,1e375a2e88d5e32bd5b245a244a9d24910111579d7949bfc48934858d7e0f987,2025-04-04T14:34:28.903000 +CVE-2024-26737,0,0,1e375a2e88d5e32bd5b245a244a9d24910111579d7949bfc48934858d7e0f987,2025-04-04T14:34:28.903000 CVE-2024-26738,0,0,7401dc8ccba47014fc09b50b349b2fbe5d1a660cb458a9c717c4b0bf3e62c9a2,2025-01-07T21:13:43.273000 CVE-2024-26739,0,0,3e91524254897924d33159faf525041742412059c301b8791dc3047a5453f1e7,2025-01-07T17:28:37.057000 CVE-2024-2674,0,0,a6ed79cbc8b2ace847fd9f602eec2818f488e9ac296cda6cc9fe140ff8b05647,2025-02-21T15:49:25.710000 @@ -254187,10 +254188,10 @@ CVE-2024-26740,0,0,bae4c9fac49600181f08052e69cc7a5f5528d382c6bacb471dff4c717a962 CVE-2024-26741,0,0,2c4de59648952a2362ede4380ae9b072da084628051e21ba83d372b54102be86,2025-03-17T16:03:52.647000 CVE-2024-26742,0,0,97fe5254fde21c5c42c0b34b715d464fd3f3a8c67ae978db2d115a5ad87be309,2025-03-17T16:04:16.513000 CVE-2024-26743,0,0,3ab52901b4f3295b59ffce3d32c81c40e12919de468adcccba2335902ceca63d,2025-03-17T15:44:46.180000 -CVE-2024-26744,0,1,a7f8f5de18b7dd2094498808184a5de765c8d4cc66bcbe6d9076ab8ed6501789,2025-04-04T14:33:24.960000 -CVE-2024-26745,0,1,a7f5457b539e3997fec74e986ddf9d40e67892ff199f30cf75d1960338823f13,2025-04-04T14:12:28.833000 +CVE-2024-26744,0,0,a7f8f5de18b7dd2094498808184a5de765c8d4cc66bcbe6d9076ab8ed6501789,2025-04-04T14:33:24.960000 +CVE-2024-26745,0,0,a7f5457b539e3997fec74e986ddf9d40e67892ff199f30cf75d1960338823f13,2025-04-04T14:12:28.833000 CVE-2024-26746,0,0,4e73ce7316452082e5a175700bbc863b03d4f10de6dba9a206faee8051759a4b,2025-03-18T16:45:08.557000 -CVE-2024-26747,0,1,355002f9325814be2312f0821a46e8a3b77a4523dbb423eee16698cd26af3f83,2025-04-04T14:32:01.163000 +CVE-2024-26747,0,0,355002f9325814be2312f0821a46e8a3b77a4523dbb423eee16698cd26af3f83,2025-04-04T14:32:01.163000 CVE-2024-26748,0,0,de80e1b40a25ded51f067fff844d8e2ac1ed0e390911ce7796a7ad960020e65b,2025-01-14T17:27:49.057000 CVE-2024-26749,0,0,aa7e7096104dbac75ed8cd854b66b0ce094be82817161ad941c47ae83e7cde08,2025-01-14T17:28:07.793000 CVE-2024-2675,0,0,e9b3789d22f2fcec90f2bc82f460b34bf6c3b6dc4f4710822d8c47fdf2be23f1,2025-02-21T15:52:43.843000 @@ -254199,10 +254200,10 @@ CVE-2024-26751,0,0,2b857b3fa9b45ad36c14e1b8198bd7fed9f385dbc0df9988b27d23100a873 CVE-2024-26752,0,0,608ccfb4d7a8b8693d3731112e07e20428505e38a79f4c705a81d2d2794e1ed5,2025-03-17T16:57:11.283000 CVE-2024-26753,0,0,54bc9dc40e514e7212847ab36dae49d8dc3504887ffcc5dcbb1e839b6fcecf7b,2025-02-27T22:00:28.967000 CVE-2024-26754,0,0,175be97ba4873a77188833236c6ae06bc719c11b1be4fb508248fd70bc0f47e4,2025-01-07T21:13:04.700000 -CVE-2024-26755,0,1,f1180f8f889c40db84807ca1a72deebd3e9ab1df54d3239939d40ffd716e78fe,2025-04-04T14:30:49.433000 +CVE-2024-26755,0,0,f1180f8f889c40db84807ca1a72deebd3e9ab1df54d3239939d40ffd716e78fe,2025-04-04T14:30:49.433000 CVE-2024-26756,0,0,33c353e086c76d3ddced4ee6e4835d00b5fca5c121d28048cad6d1902ce970d5,2025-03-17T16:56:57.017000 -CVE-2024-26757,0,1,c6330dd815c31736ac5fe6a8238fde8417e157d817679392a44b80e757c3b136,2025-04-04T14:30:42.910000 -CVE-2024-26758,0,1,79b668a9eeb858c13651e6c51c343a0e1c7fe79e74b6411938f1808ebca62fa8,2025-04-04T14:30:16.437000 +CVE-2024-26757,0,0,c6330dd815c31736ac5fe6a8238fde8417e157d817679392a44b80e757c3b136,2025-04-04T14:30:42.910000 +CVE-2024-26758,0,0,79b668a9eeb858c13651e6c51c343a0e1c7fe79e74b6411938f1808ebca62fa8,2025-04-04T14:30:16.437000 CVE-2024-26759,0,0,4149d7c7033643511b1f9d0e90b6322498fff207ba3a277aedae496842f0c8ef,2025-03-17T16:56:49.890000 CVE-2024-2676,0,0,f899136f2f031dad4f1df425d24ca9b3b9c2b55017ac806bbf373a4b3337b0e3,2025-02-21T16:06:24.990000 CVE-2024-26760,0,0,d446397ffceb7399af2d0770a591678d71834fbac6c4a5c29ba8551476b58a48,2025-03-03T17:34:59.137000 @@ -254213,41 +254214,41 @@ CVE-2024-26764,0,0,a9a5f6f39678f71d7f03e7c3a20c8e40d0ebb254dcb02bfd9af8c747760aa CVE-2024-26765,0,0,9e540ea8f4d1d00edbbf8773d21c68fcb08ac8321c60ba6e6ed837063cdab015,2025-03-18T16:43:01.350000 CVE-2024-26766,0,0,5b0b0547d260200bc4ebc2eb81fed548f6a4648d11b21f4f25bbac67d8fa40eb,2025-02-27T22:00:45.430000 CVE-2024-26767,0,0,5772b82c429246618f54341350bcba6909fc1b320104e1434b760823236efcdb,2025-03-07T18:15:40.147000 -CVE-2024-26768,0,1,c2e0cd3b528f745d4923bc6ec6a5461e4cf493d541f366d651dee5a56d3640b7,2025-04-04T14:19:41.900000 -CVE-2024-26769,0,1,54ec83fdaf282676837e7d0d4420fb3d46a0895801ae047da4d41c6160cf7c1e,2025-04-04T14:17:18.470000 +CVE-2024-26768,0,0,c2e0cd3b528f745d4923bc6ec6a5461e4cf493d541f366d651dee5a56d3640b7,2025-04-04T14:19:41.900000 +CVE-2024-26769,0,0,54ec83fdaf282676837e7d0d4420fb3d46a0895801ae047da4d41c6160cf7c1e,2025-04-04T14:17:18.470000 CVE-2024-2677,0,0,422b880149af08a494082fcb5ce0eda1d35b671b5723bd2eb4d76a8901f6049b,2025-02-21T16:16:38.053000 CVE-2024-26770,0,0,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c490ac,2025-01-27T14:58:19.130000 CVE-2024-26771,0,0,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000 -CVE-2024-26772,0,1,c15abffc72b52c1a80253e130b87503f54d4bae2e6cddf19576aab0699a1611a,2025-04-04T14:16:47.867000 +CVE-2024-26772,0,0,c15abffc72b52c1a80253e130b87503f54d4bae2e6cddf19576aab0699a1611a,2025-04-04T14:16:47.867000 CVE-2024-26773,0,0,1d4a42bde597efed855450dd0aa8a8e904f698a7797b2eeeaff9bc97aa6ee818,2025-03-18T16:47:14.460000 CVE-2024-26774,0,0,1356b93fc761b0852a7c80176290616f9269a68e3fa4bb6d27677f517a92f70a,2025-02-27T14:37:32.300000 CVE-2024-26775,0,0,285e0acd81a3ae287fc503b023988af78322228ca5a120edc7cd1b3b8dae3d03,2025-01-07T17:29:01.727000 CVE-2024-26776,0,0,1bba81b8a8e72ec7c95ffb5d3e7b333d1413cd97a166084740a9af418cac677d,2025-02-27T14:37:18.470000 CVE-2024-26777,0,0,daa8d9f58a531907703c73a4675a28b328f6bf2537032c88b428620832a46d69,2025-02-27T14:36:46.680000 CVE-2024-26778,0,0,c128e84a577d26a64c1849f152170f9fd9186f967e7aa9c52b800d540182886f,2025-02-27T14:36:27.373000 -CVE-2024-26779,0,1,0e32ffcda451419f136f9e8ceee2ae013f998b1913c599b864c03a94c3cf3c29,2025-04-04T14:15:05.257000 +CVE-2024-26779,0,0,0e32ffcda451419f136f9e8ceee2ae013f998b1913c599b864c03a94c3cf3c29,2025-04-04T14:15:05.257000 CVE-2024-2678,0,0,f75a8ad2261959d1269e24c9a26c35a77c56410bff260e11638f74b5bc5f10ad,2025-02-21T16:19:14.340000 CVE-2024-26780,0,0,a462a7ae5db36bf841edbc60dcf47f57865a887078f425fb3cbfb5e01765e9ba,2025-03-18T16:52:16.970000 CVE-2024-26781,0,0,8363890f5e40c49be0f36bf4bb23c5384620993df3f14b874ae1a4280c959004,2025-01-07T17:11:31.483000 CVE-2024-26782,0,0,55ed570f6e1cef5c54e218da555ee7a45ff77501097bebd5d3acda607a85eb10,2025-01-10T17:44:44.130000 CVE-2024-26783,0,0,f682acf18dce3fa63c06899cfa9f12237f55c3a339426cd32d2639a18b998095,2025-03-18T16:53:41.060000 CVE-2024-26784,0,0,5821b81a5ef90036edef0036b32f90e3136a3fea2205d46ae75dbe8e20d91a20,2024-12-20T13:57:21.897000 -CVE-2024-26785,0,1,e494e426f0ac6122e1db92a805cc76f5ed979d79642dbe8c5e9b10f5fe6f9515,2025-04-04T14:04:07.890000 -CVE-2024-26786,0,1,91292ce9d1bf8b63eeba4c650a7193d0108cd395a39ad32671dfdab9825090a3,2025-04-04T14:29:50.400000 +CVE-2024-26785,0,0,e494e426f0ac6122e1db92a805cc76f5ed979d79642dbe8c5e9b10f5fe6f9515,2025-04-04T14:04:07.890000 +CVE-2024-26786,0,0,91292ce9d1bf8b63eeba4c650a7193d0108cd395a39ad32671dfdab9825090a3,2025-04-04T14:29:50.400000 CVE-2024-26787,0,0,3b334f4d1e8b0c7366709584b18c0e0cc1b86ce6577d0c5fe78ac8b94c97d71a,2025-03-20T10:39:37.020000 CVE-2024-26788,0,0,b7e8865b76ef831717b6c7497e24eca5d34699bd5ebca61b44e019d10eaa42f6,2025-04-01T20:35:20.977000 -CVE-2024-26789,0,1,a5137324d86a8e957268d08db12c91e56fa8954e7bdcedf92462c6e125549f78,2025-04-04T14:29:32.797000 +CVE-2024-26789,0,0,a5137324d86a8e957268d08db12c91e56fa8954e7bdcedf92462c6e125549f78,2025-04-04T14:29:32.797000 CVE-2024-2679,0,0,f3a2441b1bb3d55db13b8e884f55ff162198f3686d9b22758f89abcdd57bf40b,2025-02-19T18:16:36.597000 CVE-2024-26790,0,0,5463bc9022c9b57f2cc29f3ff33710079052365296d5827a1e6f1cf1c56d194f,2025-02-27T22:01:53.177000 CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f0f6,2024-12-20T14:35:01.250000 CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000 CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000 -CVE-2024-26794,0,1,9eb986e013bbdcdde88cd1768aa2e78889ba25afb64fca3198a883c6aab795c3,2025-04-04T14:28:38.927000 +CVE-2024-26794,0,0,9eb986e013bbdcdde88cd1768aa2e78889ba25afb64fca3198a883c6aab795c3,2025-04-04T14:28:38.927000 CVE-2024-26795,0,0,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000 CVE-2024-26796,0,0,740b63b874106b1735e661fa59a152bb86da8899659de0c6c2baad5e3560a4e5,2025-02-27T14:42:59.307000 -CVE-2024-26797,0,1,7fcfec66278f984b39928c78bd306ae2d1a962abb25765fcb783613999da1ac4,2025-04-04T14:28:24.440000 +CVE-2024-26797,0,0,7fcfec66278f984b39928c78bd306ae2d1a962abb25765fcb783613999da1ac4,2025-04-04T14:28:24.440000 CVE-2024-26798,0,0,34c1899faf03fc56bc6cf1a81be1f9c3f78c9df080f2180e93b14f3edb7c8786,2025-04-01T20:35:32.650000 -CVE-2024-26799,0,1,c35e2e308d39ca33beebf0cc0148df2dc5c2adbf857dc2bbe6860c360061c688,2025-04-04T14:28:13.790000 +CVE-2024-26799,0,0,c35e2e308d39ca33beebf0cc0148df2dc5c2adbf857dc2bbe6860c360061c688,2025-04-04T14:28:13.790000 CVE-2024-2680,0,0,01c8822f13b0d4104843a1ff8956f4fac8943213e08997e996110106315647d9,2025-02-19T18:16:52.490000 CVE-2024-26800,0,0,21821a08cda79c884ec2e1ae4fc1b66372e32a178fc1e8080d5eb083e9184139,2024-12-20T15:55:10.150000 CVE-2024-26801,0,0,d616c47816b367b14619cbeef905892d5b398628baa089c4b9bb3e31bba83957,2024-12-20T15:52:36.293000 @@ -254257,7 +254258,7 @@ CVE-2024-26804,0,0,90c29bca0add61f216e7402553f0bd0d19eeb58a95157f3891806f7bae1b7 CVE-2024-26805,0,0,79cb532ec4298c5c0bba2b9044190557f61a8afd9bc0a9ca7e0ea7842c75f1e4,2025-02-27T14:36:02.417000 CVE-2024-26806,0,0,579c2e5324ce50542c7555728d2532d90229381de0c2df2f7edbc01c0580c27d,2025-03-27T21:30:21.837000 CVE-2024-26807,0,0,51524658cc01dd1e361a08df9d4605239bbfd0a93db5e3b5c528b738151901dc,2025-03-27T21:35:59.447000 -CVE-2024-26808,0,1,45e1911707e2ce798bae29d3102741e23c8b168e11638aad40a06add2af3f08a,2025-04-04T14:21:16.990000 +CVE-2024-26808,0,0,45e1911707e2ce798bae29d3102741e23c8b168e11638aad40a06add2af3f08a,2025-04-04T14:21:16.990000 CVE-2024-26809,0,0,bbd3925ce680832ff739963d7071fb5f911c8e070b89e06a876adb017e20c048,2025-03-19T16:19:56.507000 CVE-2024-2681,0,0,09637121fb785cf682a8dd0ecf80a1c8447b09396e0be9cf76bee7528ea996ef,2025-02-19T18:17:19.687000 CVE-2024-26810,0,0,5b78c798ab699830f25c706791bc5869344bd655b9540ce5b00869b839745e17,2024-11-21T09:03:07.600000 @@ -255616,7 +255617,7 @@ CVE-2024-28401,0,0,826cf616629645fbd1a84822aab899008c5c378ac0b171dafbb050c000cd2 CVE-2024-28402,0,0,e4c461d02368e4a31332b9277c7c7cfb13c17d92de94a00db2a5800e4b1e5806,2024-11-21T09:06:17.250000 CVE-2024-28403,0,0,a680e4fcc0b3590082231d9bd740544c53f47fb277147ba8b47928e50594e54c,2025-03-27T20:15:25.140000 CVE-2024-28404,0,0,d99e3ddfc43b88c6fd1b7fe400872ee4df4414379558c27f27e655b6a93ecbb2,2024-11-21T09:06:17.620000 -CVE-2024-28405,0,0,37d5f19105b16a999a639ddd3ec5ffb2d785831e507091c0e23a8c30aeff75d5,2024-11-21T09:06:17.937000 +CVE-2024-28405,0,1,be1a68abd0fde8742125f069c3d8af2dcb32ec3db1fa8b6c7da87e9025cba384,2025-04-04T16:32:01.270000 CVE-2024-2841,0,0,2754de63b6cb01395935c9f4c03638ff20eb3e9e94e2e947e9011287acdc7fbc,2025-01-23T19:26:46.283000 CVE-2024-28417,0,0,8cf18a472bc749edf5fdd921344ea347bb06123bd3954c21ee901fe6b54dc489,2024-11-21T09:06:18.310000 CVE-2024-28418,0,0,684ffff5e80214517b809e3190eee74f2e988c620cec3de4fcd01d22f22781cb,2024-11-21T09:06:18.650000 @@ -255704,7 +255705,7 @@ CVE-2024-28613,0,0,302294bf7bca6b3dfd487e785bd70f7706357a0865f57f45cb47b969e4c04 CVE-2024-2862,0,0,de64a0a4bc271c289ad8432a80b906776b0e02689be888bdd8bcfeaa8f184e6b,2025-04-01T17:08:43.637000 CVE-2024-28623,0,0,6b592373ccc058b15c8f7db49b78bfd3e2635e462da34d22a443dc2b487224fa,2024-11-21T09:06:41.870000 CVE-2024-28627,0,0,9277a6897abe880727737fbbbaaaf027c984f569a532468350bff5d977a1bf19,2024-11-21T09:06:42.143000 -CVE-2024-2863,0,0,a5b592af60b81b1b665877763bf56c5ec2758267e95bafeacc6ae0c7642054e8,2024-11-21T09:10:42.503000 +CVE-2024-2863,0,1,cb802aec2f5670a2db50b65a9ba985518f35a86ec8069dd3385b56752f9cc0f2,2025-04-04T16:48:07.247000 CVE-2024-28635,0,0,c36a286d2efa57f8f3dd16aa9309abc49ed3e74dfced2793f6c7b8905b7e167f,2024-11-21T09:06:42.367000 CVE-2024-28639,0,0,e7a0e0b3ab0a4c3b57de2dc0a84196d1068993c21df426fe3caa9e5c75427b24,2025-03-26T15:15:49.150000 CVE-2024-2864,0,0,3c502f13e25ec0d6338270f38aa63b5e89435a030dae1785f088aeae83e8039f,2024-11-21T09:10:42.620000 @@ -257243,12 +257244,12 @@ CVE-2024-30561,0,0,ac7e0304f31638e780a2d720d189c314381f988fd2e6f5eb3ed2071500f77 CVE-2024-30564,0,0,b20ff337c9f1037b2e952029ea8bdf19426b12dd02e41f2275aa126ef8bb1798,2024-11-21T09:12:11.007000 CVE-2024-30565,0,0,fed5348d7a25dfad7ba408e22e1df26a888cfa70ec82dfdec6da97c387e5ca81,2025-03-28T16:52:54.670000 CVE-2024-30567,0,0,56d321622fe54066281ae3f4c3e57cc485754758b6b7eac706a1b8d07c9db2f8,2024-11-21T09:12:11.443000 -CVE-2024-30568,0,0,2f2974e4f43eb513d22f486c8b5e262c042a4e7b166d459a8d8058619c7643f0,2024-11-21T09:12:11.660000 -CVE-2024-30569,0,0,af716782dfdbdd6300d40d892f04bd4f48102bcc5dac712ef7ce5d499c07c5fb,2024-11-21T09:12:11.920000 +CVE-2024-30568,0,1,cabf2ef11a14da0a425e2af03affb62731eb1278afc4c4c251f479717ab75389,2025-04-04T16:32:27.800000 +CVE-2024-30569,0,1,6b135a1487878d4101808b2480b8f42546bdeff18651dab553da2161ba0611fa,2025-04-04T16:32:22.770000 CVE-2024-3057,0,0,6d5d67976b2e72ac15fd94c5d2608201aab17003df55c29552a9ad428196d8e3,2024-10-10T12:56:30.817000 -CVE-2024-30570,0,0,e18bbaabf970935ea5a932942556c823c3a0744ea6a0a46e3811da004d3ba079,2024-11-21T09:12:12.167000 -CVE-2024-30571,0,0,36775551c6de014422bc200ae096c013f9737b959a8846ee1f354643516f2f7c,2025-03-28T19:15:21.440000 -CVE-2024-30572,0,0,4c1cadbbb3fb55978b42f7d8b2b0af0458161b8aaf1ca44b38efe25a57212a6c,2025-03-13T18:15:39.693000 +CVE-2024-30570,0,1,506bdbc49f6ac44a3b219f2e779112ff7de2ee82ad3596da5a23eb73b97022f5,2025-04-04T16:32:17.887000 +CVE-2024-30571,0,1,d9526701426ea7f9d53596da44e3926046c358170a7ed6ed5f10d05a991a27c4,2025-04-04T16:32:11.720000 +CVE-2024-30572,0,1,5de6f728ab843533fc578843e2c3b4806d297e461c76fdabedea98cdce9d7001,2025-04-04T16:32:07.767000 CVE-2024-3058,0,0,8494043e1c9135d6a106fd5d541165a2665a4edd8365fee8c81cbafb17302a66,2024-11-21T09:28:48.420000 CVE-2024-30583,0,0,ba5e57c2a9d51bb2cf0234265b8861e26d51b44bfeacfa44daedc5ce2627ae1e,2025-03-13T17:41:06.023000 CVE-2024-30584,0,0,7063f9eb1abd5e86d03e76b9e7c3b84a5c91caacb9d76be491953106cc3629f3,2025-03-13T17:41:12.167000 @@ -257402,22 +257403,22 @@ CVE-2024-30849,0,0,41bab1c02c7222db096edb20488f06d8338703ebeb64fa7e20c9e09b1cc9f CVE-2024-3085,0,0,b0343416332362deb163c60304ecd88f4bac9d033fd1e5f003060f03428998a5,2025-02-14T19:22:32.327000 CVE-2024-30850,0,0,30f2c4f2d3ace0111b29d7bbcde469f2e77caba3bc89deec069723f95ae09fec,2024-11-21T09:12:27.960000 CVE-2024-30851,0,0,4480d1b7faeda725e619f016cdb0fd853eeb3c41e15a3fb499b65699de4b965e,2024-11-25T16:15:12.930000 -CVE-2024-30858,0,1,6b71ea45545bf3bbc2c41504325ae4dfbf823aafc1b977d046594eb60dfc2c90,2025-04-04T15:45:58.113000 -CVE-2024-30859,0,1,8592244c6832359a85380898c69050a5e3e804893f3ea3e399719714c587a9dd,2025-04-04T15:45:54.193000 +CVE-2024-30858,0,0,6b71ea45545bf3bbc2c41504325ae4dfbf823aafc1b977d046594eb60dfc2c90,2025-04-04T15:45:58.113000 +CVE-2024-30859,0,0,8592244c6832359a85380898c69050a5e3e804893f3ea3e399719714c587a9dd,2025-04-04T15:45:54.193000 CVE-2024-3086,0,0,2afe25e171688c3cb63b1a47b49d54507020a88147c654b2781c0caaf8586e10,2025-02-14T19:31:38.957000 -CVE-2024-30860,0,1,854ad11facc7e3a465b95023a42af03d4d8f4718aceffc9c3cf95531e3745ff4,2025-04-04T15:46:05.710000 -CVE-2024-30861,0,1,2432918beda1a9b781d8bb87810586a390beb53d8025fa3e6d73b1621e6146ce,2025-04-04T15:46:01.493000 -CVE-2024-30862,0,1,88c6e013d8054477547b051e83078e692fb7abe64f6962aa1d39abc80cddd207,2025-04-04T15:45:49.483000 -CVE-2024-30863,0,1,e5d1497607f638bf23d659430dff1ba74d3f7fc1fdb926192c8876d5d44bd277,2025-04-04T15:45:45.647000 -CVE-2024-30864,0,1,4acf9990fbbb02aa0a4be803ab1f53d118656fa5c00b2ae713544fa04812827f,2025-04-04T15:00:37.953000 -CVE-2024-30865,0,1,eeec0125fbf37c06a1c67edeeb440ee2911a4ca24c0af07b91cb8aa2e50dd416,2025-04-04T15:00:28.290000 -CVE-2024-30866,0,1,749e630504fbf3cd069686cae94c313d834ead6d49d89a62b1b5d60ddcd97666,2025-04-04T15:00:11.637000 -CVE-2024-30867,0,1,a44c0ef9349ee3fb9e1040db7748f123e3996008b4adb5e4a5e0575cc3d8f566,2025-04-04T15:45:41.450000 -CVE-2024-30868,0,1,e6666e979e76351d007659e1879a09a5cfccdd65f82ebfa532756e36115d475c,2025-04-04T15:01:18.190000 +CVE-2024-30860,0,0,854ad11facc7e3a465b95023a42af03d4d8f4718aceffc9c3cf95531e3745ff4,2025-04-04T15:46:05.710000 +CVE-2024-30861,0,0,2432918beda1a9b781d8bb87810586a390beb53d8025fa3e6d73b1621e6146ce,2025-04-04T15:46:01.493000 +CVE-2024-30862,0,0,88c6e013d8054477547b051e83078e692fb7abe64f6962aa1d39abc80cddd207,2025-04-04T15:45:49.483000 +CVE-2024-30863,0,0,e5d1497607f638bf23d659430dff1ba74d3f7fc1fdb926192c8876d5d44bd277,2025-04-04T15:45:45.647000 +CVE-2024-30864,0,0,4acf9990fbbb02aa0a4be803ab1f53d118656fa5c00b2ae713544fa04812827f,2025-04-04T15:00:37.953000 +CVE-2024-30865,0,0,eeec0125fbf37c06a1c67edeeb440ee2911a4ca24c0af07b91cb8aa2e50dd416,2025-04-04T15:00:28.290000 +CVE-2024-30866,0,0,749e630504fbf3cd069686cae94c313d834ead6d49d89a62b1b5d60ddcd97666,2025-04-04T15:00:11.637000 +CVE-2024-30867,0,0,a44c0ef9349ee3fb9e1040db7748f123e3996008b4adb5e4a5e0575cc3d8f566,2025-04-04T15:45:41.450000 +CVE-2024-30868,0,0,e6666e979e76351d007659e1879a09a5cfccdd65f82ebfa532756e36115d475c,2025-04-04T15:01:18.190000 CVE-2024-3087,0,0,4d22b9498bb620de913453c4dde5d3c589856b7175f30dee75388b0e8f78c1bf,2025-02-14T19:21:40.207000 -CVE-2024-30870,0,1,a7d88c8cfe1fb92868d75f878a162e95c58a072bda2e31056defe310aa85a159,2025-04-04T15:01:12.570000 -CVE-2024-30871,0,1,c12a81b7d5c54f87b023b8142835a6e1c0c14ce8091376e81e5ec327b75b420a,2025-04-04T15:01:05.823000 -CVE-2024-30872,0,1,eaf4099421d4bece2f8af2c9074753da8480aa3cec8e93a53c5d0e45f7fbd802,2025-04-04T15:01:01.170000 +CVE-2024-30870,0,0,a7d88c8cfe1fb92868d75f878a162e95c58a072bda2e31056defe310aa85a159,2025-04-04T15:01:12.570000 +CVE-2024-30871,0,0,c12a81b7d5c54f87b023b8142835a6e1c0c14ce8091376e81e5ec327b75b420a,2025-04-04T15:01:05.823000 +CVE-2024-30872,0,0,eaf4099421d4bece2f8af2c9074753da8480aa3cec8e93a53c5d0e45f7fbd802,2025-04-04T15:01:01.170000 CVE-2024-30875,0,0,aa70dfc3a5cf989aa103c4c393d46a36570372e91b9e7b13ef4f2499add71461,2024-10-25T16:15:09.693000 CVE-2024-30878,0,0,94f464e4387ae557812cc9ee5246036b23cfbb575bc705a5b33b9ca5a1ecc969,2024-11-21T09:12:31.500000 CVE-2024-30879,0,0,649da1a1b40e77c5fdf518b79d12ad501d786a69603441f9b70f6acd4720d3d8,2024-11-21T09:12:31.723000 @@ -257491,11 +257492,11 @@ CVE-2024-31004,0,0,38418add1086a2549e57a481ad2506252682ccceeda2f445bf3440f89c253 CVE-2024-31005,0,0,25eb911d867616bd3988b56c8ba2b0377f58739f7511762bf6fb3335e422227c,2025-03-13T17:15:30.650000 CVE-2024-31007,0,0,4c0a859b37e4845601b0d3eab4478f21b4a146a0f1413632b63310d7a22ba059,2024-10-23T15:12:34.673000 CVE-2024-31008,0,0,e7e94289c0d70f11986b60bcd28cf23cfc8f6abcbb4fc90eab7137198514a6d7,2024-11-21T09:12:42.713000 -CVE-2024-31009,0,0,130b28d687f1389e66dbf472fc6be6c995810fee40cda80cee3f8706fba33b2c,2024-11-21T09:12:42.943000 +CVE-2024-31009,0,1,e4b78fc12d57f0229971a640580b02f417815a5813d3bdb41dfea61d11831a96,2025-04-04T16:31:54.840000 CVE-2024-3101,0,0,b43a9a65b8dd96b574d88a97c97263dded7de7cc0c3f0a55bcbdc8a92c066a11,2024-11-21T09:28:54.283000 -CVE-2024-31010,0,0,bff7902cb97f72f80deefafdf7684bc53fe71be184809cbc5ae6efbd05f4e8cf,2024-11-21T09:12:43.170000 +CVE-2024-31010,0,1,0b7313de80070fac2f916c379350f99d1722550266fcd7ba61df1f5dcf1681fd,2025-04-04T16:31:46.253000 CVE-2024-31011,0,0,24b6b4b4d911bb44d7c9f667d95c31c2327e63da8572762d344d3e3e7da6b6a9,2024-11-21T09:12:43.390000 -CVE-2024-31012,0,1,d5ae84c7329c4f393c728c5d6d85bb69767e6e8081880813cb0948691be7d260,2025-04-04T15:50:24.237000 +CVE-2024-31012,0,0,d5ae84c7329c4f393c728c5d6d85bb69767e6e8081880813cb0948691be7d260,2025-04-04T15:50:24.237000 CVE-2024-31013,0,0,01d61c602b8e92c3361daf4356e39b3ab9f29a666d0e5bc89ee8873e6fa392ba,2025-03-17T16:15:21.610000 CVE-2024-3102,0,0,21789bb35ca485f7acde593041e201a50941c14df197110842a770f0c2af0902,2024-11-21T09:28:54.413000 CVE-2024-31022,0,0,aebbffc3e18bdbc5da138d73aac1a11ede1641612c93cb3f86d64007284660bd,2024-11-21T09:12:44.073000 @@ -257620,7 +257621,7 @@ CVE-2024-31176,0,0,d008ac138b78f386538647be0ef424b00f004da793050f0c97f437597bdc9 CVE-2024-31177,0,0,8d930ea7cb1335ba98b59487747f25abbdc049beafe9999d15e28864adc5e2aa,2024-09-20T19:02:56.717000 CVE-2024-31178,0,0,4485e214eff6c1c7a280038048828ac443341b75da8db39bd54ad4c302954b7c,2024-09-20T19:03:04.717000 CVE-2024-31179,0,0,4e08fe13bd5e65701f9a856c18535de3874ce9c8398204dc3b311bf3be8af500,2024-09-20T19:03:12.957000 -CVE-2024-3118,0,0,9dc062fea29d82c55136b5709353b56143e9a845e56ff0996d7b4d05713739ab,2024-11-21T09:28:56.433000 +CVE-2024-3118,0,1,f88e620b317e3653d24e063ad7afe4133616cdfc80b7c60bf695a3b47e8524ad,2025-04-04T16:35:06.160000 CVE-2024-31180,0,0,ef2fb25aa78d5b605886f1ce54cf113291c90762629bf61e2c307d2063ed94b1,2024-09-20T18:41:14.657000 CVE-2024-31181,0,0,6203fdaab118e7a076069368a616ca228bfb9eaf7f85649d8441b2b914185dad,2024-09-20T18:41:43.753000 CVE-2024-31182,0,0,e81f836b749af7b5890ba9a812d64ffe7b70e762104636cfb6c5ed1cd89ceefa,2024-09-20T18:42:15.857000 @@ -257994,7 +257995,7 @@ CVE-2024-3160,0,0,849ad0357856c42e6ffd8656d38bd88af464b4f26c01b1e7dd0dd2944051d9 CVE-2024-31601,0,0,0ae15c6eb9db3be1b4ba800e8bc2a16c717b63405317f7527b673949d63acaaf,2024-11-21T09:13:44.693000 CVE-2024-31609,0,0,d615c1b0f062c484fa8888ca3e2163e385a1a8409020bec473097550275335c9,2024-11-21T09:13:44.927000 CVE-2024-3161,0,0,7ff2082f6351ede04bcaee458485774bc296f65d182897eb72643563eb3d12a2,2025-01-15T18:09:36.977000 -CVE-2024-31610,0,1,4c6b6dc6d800562d34453d1236b542d5c9b28b5e80099dade9f215221da4dfa3,2025-04-04T14:39:00.233000 +CVE-2024-31610,0,0,4c6b6dc6d800562d34453d1236b542d5c9b28b5e80099dade9f215221da4dfa3,2025-04-04T14:39:00.233000 CVE-2024-31611,0,0,d6f3916293f769d89e5742cac6baba324d007ac090647f4cd7a68157e23c229d,2025-03-13T18:15:39.873000 CVE-2024-31612,0,0,e21e87a0350dc1dc4c0062c07acc797b1f129606b80779537140509864823f0b,2024-11-21T09:13:45.513000 CVE-2024-31613,0,0,8529aaba53cef39837e08da4d416a9a7517ff6599fa9309021dc8bc85d085dbe,2024-11-21T09:13:45.743000 @@ -258264,7 +258265,7 @@ CVE-2024-3201,0,0,668efb17259a09755d1a0415a9e560e54201d184e13d68536fe89d672e5b29 CVE-2024-32017,0,0,2c67a7eb69b146d7eea4eafe98c73b8655db24b6d917e6ebc64639078f11c61c,2024-11-21T09:14:20.203000 CVE-2024-32018,0,0,7cc3595cf36f9a30c42101fc2c6b0675f3bd077b745e2955e81d613db9afb54a,2024-11-21T09:14:20.327000 CVE-2024-32019,0,0,cbcd6ecaf3a8cb1acf7cfabe6f845425b90fe05bb5264a08b4dfe5bd22fbd23e,2024-11-21T09:14:20.453000 -CVE-2024-3202,0,0,67bc3b503c45f0ad559bc4a3680db72af54450fa2faaff8a8e3e61f32140ab9d,2024-11-21T09:29:08.450000 +CVE-2024-3202,0,1,877167929e49d887109b948a4147e3f4dd82c249d78004a8a36b117d6b09f8ee,2025-04-04T16:58:57.450000 CVE-2024-32020,0,0,980f4987e5471754db56278be5fba0e82e6c29213e922f747c23838722a09113,2024-11-21T09:14:20.570000 CVE-2024-32021,0,0,4e08737b24b6d841bef4be8a69c9dbbcf6fd5f08e878d08318d9eb62c537786d,2024-11-21T09:14:20.700000 CVE-2024-32022,0,0,66b0ca28c484d72c9c397c9d885f3f84cac6f9eee45292b99ae643551413a345,2024-11-21T09:14:20.817000 @@ -258472,14 +258473,14 @@ CVE-2024-32342,0,0,f07515bc0d7c8e0685e80fe04d99530e72ae4834ff0b99e582346f3a714bd CVE-2024-32343,0,0,bcf9a71ab3c28b3683eff870fe90b807a41f0eec589c3534d36d529674f6310f,2024-11-21T09:14:47.843000 CVE-2024-32344,0,0,dafeb226b358cb46f6164ef9822651e8e5eceb2b52d97a073f426cfef2e024a9,2024-11-21T09:14:48.060000 CVE-2024-32345,0,0,313eff7486d74de73aeaabd4f4ac1da3b18e34414a57ec23b64790a88c9293ac,2024-11-22T15:15:07.127000 -CVE-2024-32349,0,1,811da35f6f4571013cc5d2b26e825fae3820122258417ae118938684a862e5fd,2025-04-04T14:28:31.007000 +CVE-2024-32349,0,0,811da35f6f4571013cc5d2b26e825fae3820122258417ae118938684a862e5fd,2025-04-04T14:28:31.007000 CVE-2024-3235,0,0,ce269ae613ef166b72024b8c7ac7cedf75d40b76ce0cb17ab030d54828c071ab,2024-11-21T09:29:12.670000 -CVE-2024-32350,0,1,494bbe62761115367286e164c0b9e5a91edb96e4767a2e91a2f0fb57ce468acc,2025-04-04T14:28:22.133000 -CVE-2024-32351,0,1,3d9be5588c951c34030ef8bbd53d4503321ac4e921208614ba6e5936bbe30662,2025-04-04T14:28:12.620000 -CVE-2024-32352,0,1,9e0b54507f9b9eb3d2ad7ddb5423ec4fda2fac97ff0a5ce7a681ecfc6468d523,2025-04-04T14:28:01.343000 -CVE-2024-32353,0,1,620267c47e5f46c980fa54c20fbc922c145b966dc5ffe4ee45be2e25cec8e165,2025-04-04T14:27:54.030000 -CVE-2024-32354,0,1,a1e5084b4d833613ad9c6c5bbaac4456ec4b139350bf43e48bab709d35e2a067,2025-04-04T14:27:44.107000 -CVE-2024-32355,0,1,9fa0e3279bec3777869df2c40c2c766fc99b6c0cf067e0545d21d5fcde2a4280,2025-04-04T14:27:30.180000 +CVE-2024-32350,0,0,494bbe62761115367286e164c0b9e5a91edb96e4767a2e91a2f0fb57ce468acc,2025-04-04T14:28:22.133000 +CVE-2024-32351,0,0,3d9be5588c951c34030ef8bbd53d4503321ac4e921208614ba6e5936bbe30662,2025-04-04T14:28:12.620000 +CVE-2024-32352,0,0,9e0b54507f9b9eb3d2ad7ddb5423ec4fda2fac97ff0a5ce7a681ecfc6468d523,2025-04-04T14:28:01.343000 +CVE-2024-32353,0,0,620267c47e5f46c980fa54c20fbc922c145b966dc5ffe4ee45be2e25cec8e165,2025-04-04T14:27:54.030000 +CVE-2024-32354,0,0,a1e5084b4d833613ad9c6c5bbaac4456ec4b139350bf43e48bab709d35e2a067,2025-04-04T14:27:44.107000 +CVE-2024-32355,0,0,9fa0e3279bec3777869df2c40c2c766fc99b6c0cf067e0545d21d5fcde2a4280,2025-04-04T14:27:30.180000 CVE-2024-32358,0,0,b4e77577e6f1b9b06b8d41e0e38bbf9c93da74b0b6b944595c765b19e61aeb27,2024-11-21T09:14:50.107000 CVE-2024-32359,0,0,ef4c262a9b41e8b1ee8c7d6c0a007e5a9d60fc4e1c81af267581106864b95657,2024-11-21T09:14:50.353000 CVE-2024-3236,0,0,976e7a3b7704fa3491f12405739953cceb9cd8a8629980399ddfc63dccccf425,2024-11-21T09:29:12.813000 @@ -259171,7 +259172,7 @@ CVE-2024-33101,0,0,060d2f20cd090be3be4b153edf45165363fd6d1d8c8d6968335cdbba1b546 CVE-2024-33102,0,0,4953918f2cf07b479b9dc9d307ae24825f1d3a4cdfd759416b7c167da4c7fd50,2024-11-21T09:16:31.010000 CVE-2024-33103,0,0,8e358b701d1f75fcd166c9ed8cee8e40c06eacab0459b279ad0a15af14fd67d5,2024-11-21T09:16:31.230000 CVE-2024-33109,0,0,9d310e44a0938cb912ac0cdae9f92408fe4443679d6f4d813b944e47d0499fea,2024-09-25T14:47:54.217000 -CVE-2024-3311,0,0,0cc6270b4f73bad689e9891a3010e0e7852f6ddbd6eb5f8215a1f2c452ee3fd0,2024-11-21T09:29:22.130000 +CVE-2024-3311,0,1,e8c56c0bd7fb02eaf3dabe1c1a4c1e221b18f2ed2a3be71ca96f8c6846410e32,2025-04-04T16:35:34.023000 CVE-2024-33110,0,0,91c17feea0b419df1889446da137532b61005e84ac93a83ccedda0afa0de832e,2024-11-21T09:16:31.670000 CVE-2024-33111,0,0,c1d8be00d7f61b5bdcc0c48e627d932a7917444a52c29780b3e05685d045ae60,2025-03-13T18:15:40.687000 CVE-2024-33112,0,0,e076d0e5e8f72d13a2ccb800f3a3dba68805667556d37629dbb313c4b22a8bdb,2025-01-06T15:15:13.940000 @@ -259955,8 +259956,8 @@ CVE-2024-34212,0,0,f932dcb31169cf40186f594cc95fc35ae4efb6b9b581f9f5bcd98eca1d85c CVE-2024-34213,0,0,f66b8127c81c3d5cdd2ada9c4b7cf44553f87eb49ba35ae4c2f01923fb3bcdad,2024-11-21T09:18:17.990000 CVE-2024-34215,0,0,e6cddb986c9b85172cf3b1fa1cc572977eefc052534144ada951fb8e0fa4a7d8,2024-11-21T09:18:18.220000 CVE-2024-34217,0,0,e75b7e7eac7040fd4961b5eeb39d860bff29689de9e80a56b29cd2f45991c310,2024-11-21T09:18:18.453000 -CVE-2024-34218,0,1,46a334072b58f6d2957330281c5946763f0e7da0af166e7dde2bbff4411425c1,2025-04-04T14:47:14.257000 -CVE-2024-34219,0,1,2ef4c4c5eec469a2886ab64a3efd4a025b7ab80deead52ea76db06361e6b31ac,2025-04-04T14:47:06.027000 +CVE-2024-34218,0,0,46a334072b58f6d2957330281c5946763f0e7da0af166e7dde2bbff4411425c1,2025-04-04T14:47:14.257000 +CVE-2024-34219,0,0,2ef4c4c5eec469a2886ab64a3efd4a025b7ab80deead52ea76db06361e6b31ac,2025-04-04T14:47:06.027000 CVE-2024-3422,0,0,434fb9c9cfe5518133005ce717f81780c4454820277f8ab99226a12e34954442,2025-01-17T15:18:05.700000 CVE-2024-34220,0,0,ea3b638a0ad7e7b5b21e6837c13d51fd0282a71ba173fdb7f01e6006ada82a85,2024-11-21T09:18:19.117000 CVE-2024-34221,0,0,5bdb0fc79cd75e9a7f818a361c57194b1225b8358331fcf3592024f663afd166,2024-11-21T09:18:19.333000 @@ -259991,7 +259992,7 @@ CVE-2024-34274,0,0,15fd2109f2bacc33eb25ace43e53125aefa94083620124221c093ea116908 CVE-2024-3428,0,0,e58cfffb7777a5ce5e76448b83f91a5cc1107c64a49963413c8aa9f05d0a5941,2025-01-17T13:44:10.790000 CVE-2024-3429,0,0,ae27030771f4157bb0f5804b3f3a740da74d187a54022bfbf307325e46b9d879,2024-11-21T09:29:35.220000 CVE-2024-3430,0,0,5632903ad163690783d085ac973e91d5a5599ace8ab6d861aaf37e25a9d19e43,2024-11-21T09:29:35.360000 -CVE-2024-34308,0,1,b49edd1187bb5011050602f283f3eca6c613991038f6e9eb55b0fd69e579087c,2025-04-04T14:46:54.697000 +CVE-2024-34308,0,0,b49edd1187bb5011050602f283f3eca6c613991038f6e9eb55b0fd69e579087c,2025-04-04T14:46:54.697000 CVE-2024-3431,0,0,bb0f9fee675ed2a26cd668610400c1b77161a57f06978cd64464c171e1536ac1,2024-11-21T09:29:35.497000 CVE-2024-34310,0,0,82972b4a7271d7f072b904c774870b602afbf4962a5b24f811801ca0d72ef255,2024-11-21T09:18:25.067000 CVE-2024-34312,0,0,8f4176c7f4d8ad4d83b2238c464790461eb54a022b55d50cdda7a07c2d2107a9,2025-03-25T17:15:56.280000 @@ -260111,7 +260112,7 @@ CVE-2024-34436,0,0,4ed41a1b8a3693bef229e7c2f9a0cb122ee0c441109a0bb8a6053ffb4b0fa CVE-2024-34437,0,0,2a7776ed8512c534ed146e03bc1650e549f2fa80d419c0c5a48eae406e962c5b,2025-03-06T16:24:16.733000 CVE-2024-34439,0,0,8bf72eb97a6e69b453f23e87ee82ca6fc9532df8484fd5cd256dac500553c8d3,2024-11-21T09:18:40.420000 CVE-2024-3444,0,0,79f2ebb769a6827995b9d43382e26cc0bd732a05010677443f7fecc2eea6ca58,2024-11-21T09:29:37.283000 -CVE-2024-34440,0,1,d1cc831c8be72022233c96f194c76600a3c6f63bb8cae53babb660150e6ac6cc,2025-04-04T14:46:40.223000 +CVE-2024-34440,0,0,d1cc831c8be72022233c96f194c76600a3c6f63bb8cae53babb660150e6ac6cc,2025-04-04T14:46:40.223000 CVE-2024-34441,0,0,94dd88853e360a016ad326ff62dd661681f00298f624f5a76e447eaaa34f755e,2024-11-21T09:18:40.663000 CVE-2024-34442,0,0,680b440b68d835b7324c128d859cd0968079735129e45f69d0499f7a8e852b7f,2024-11-21T09:18:40.777000 CVE-2024-34443,0,0,5b9baa6cec14c8026b07e62429cfda558b9dc0d4a87372176248e3e0814e9156,2024-11-21T09:18:40.900000 @@ -260516,7 +260517,7 @@ CVE-2024-34913,0,0,df7b2f13fde0d0aa4b463b27ea1c9352a9521f1cc7e3d600e1ac6c80e5776 CVE-2024-34914,0,0,68026547b55bbe413b96299afcc458bb073af755f000e8bafcbcbbe64198b02c,2024-11-21T09:19:32.253000 CVE-2024-34919,0,0,8128c88090f31edb7d13eb07109305a5271d278f002fecb288ab4aa127eaac37,2024-11-21T09:19:32.477000 CVE-2024-3492,0,0,4761291c845f4bf592add0f1a24998a5b26c26b90a749f595b3ab17c9fc4045f,2025-01-15T17:33:15.423000 -CVE-2024-34921,0,1,16b5d748ed984b9ca1cb23a4f17ce78d2e7526e1257d3dd00b3fc0a6cdb7a8fc,2025-04-04T14:46:13.353000 +CVE-2024-34921,0,0,16b5d748ed984b9ca1cb23a4f17ce78d2e7526e1257d3dd00b3fc0a6cdb7a8fc,2025-04-04T14:46:13.353000 CVE-2024-34923,0,0,05cd7d2d2454a132b33b02c0e02a3677ce1d0fe62e9e1abd5aa2838641d5eb94,2024-12-02T18:15:09.617000 CVE-2024-34927,0,0,07e02dfb4bfa84f838252aa5476a27444d056ece07d16588da0cc5284c900aa0,2025-03-25T17:20:04.570000 CVE-2024-34928,0,0,622df7ae80f8dc8a08d462361687a52d6a86ced74f8a20c607be76bd1c508f25,2025-03-25T17:20:01.637000 @@ -260530,11 +260531,11 @@ CVE-2024-34934,0,0,a372c3606d6fcebb77b2453603ae5a70606750153bd261bbfc18516a4955a CVE-2024-34935,0,0,ff47c3b090a33b4ff4b9055b109b635a46d9cb5cc53d211658f01fab7002e2d6,2025-03-25T17:19:25.137000 CVE-2024-34936,0,0,9f89f2c32f49186056158380c9adae642be23f2c1957369addddd143a2d443e3,2025-03-25T17:19:20.710000 CVE-2024-3494,0,0,c8575f099debc455354920b5f86a3dc5f4140511fc2eb020ae83eac1cb117c09,2024-11-21T09:29:43.440000 -CVE-2024-34942,0,1,6ae4cae7c646e7c926a7a9e9363c8aa30e679f79e0dfb66b149a82b42dbc2c53,2025-04-04T14:46:04.167000 -CVE-2024-34943,0,1,d19592dad8e3b107c7c4f0b3585a8df546426eec089617e2e1a339244aa59ddc,2025-04-04T14:45:54.580000 -CVE-2024-34944,0,1,bda4a16cfa53156dc9be8fafb9879d4092e390b395f3607f840f5a7d3265c5be,2025-04-04T14:45:40.283000 -CVE-2024-34945,0,1,1f72ba185765edafd0f75b1fa37f47be6cd574c660615d9f87b7a9d43ffe29fe,2025-04-04T14:29:20.540000 -CVE-2024-34946,0,1,646d1f8658c6933e5a11d77f85547ec3f49352a283a6b765a4e46d077ba1d887,2025-04-04T14:29:08.997000 +CVE-2024-34942,0,0,6ae4cae7c646e7c926a7a9e9363c8aa30e679f79e0dfb66b149a82b42dbc2c53,2025-04-04T14:46:04.167000 +CVE-2024-34943,0,0,d19592dad8e3b107c7c4f0b3585a8df546426eec089617e2e1a339244aa59ddc,2025-04-04T14:45:54.580000 +CVE-2024-34944,0,0,bda4a16cfa53156dc9be8fafb9879d4092e390b395f3607f840f5a7d3265c5be,2025-04-04T14:45:40.283000 +CVE-2024-34945,0,0,1f72ba185765edafd0f75b1fa37f47be6cd574c660615d9f87b7a9d43ffe29fe,2025-04-04T14:29:20.540000 +CVE-2024-34946,0,0,646d1f8658c6933e5a11d77f85547ec3f49352a283a6b765a4e46d077ba1d887,2025-04-04T14:29:08.997000 CVE-2024-34947,0,0,d71da53311f378a50f279ba533f809437661e390d7f913efc4df893b6bab219c,2025-03-25T16:15:21.420000 CVE-2024-34948,0,0,49bda64427407ecb2180b4b1b7b2e9653684a7b457eb15865cb81d1a7a2be1a6,2024-11-21T09:19:36.550000 CVE-2024-34949,0,0,b071e3a6c100e9a327bd79bacd5f4de547f0a047eed909ca9f420db03fa2e8c4,2024-11-21T09:19:36.760000 @@ -260542,8 +260543,8 @@ CVE-2024-3495,0,0,3fb1c314cfd57cb18d26d7cef17b997e0ca6bdd9b2251ef3488472e3c5f602 CVE-2024-34950,0,0,a6b126d64aa0ba456ecd616d45f62074a5406fa93e0daab388c44de3be35d7cc,2024-11-21T09:19:37.233000 CVE-2024-34952,0,0,714ced0a477a50c4477397d464fcf76c2900d64e8398efd585991120c91f7ac3,2025-03-27T20:15:26.297000 CVE-2024-34953,0,0,39e1673dd79aa740ac449bee0990185e133e2cdfb359047cbaf9f24df0c042d4,2024-11-21T09:19:37.610000 -CVE-2024-34954,0,1,069cc0997160dbea9bc19a47b3b4714194d21adb413db5b5be732c3218c105f9,2025-04-04T14:26:05.893000 -CVE-2024-34955,0,1,a8ce73f1c2d422ff59e944ebd6e499cc493213d00f36ba51b5f664c5fc1b4a52,2025-04-04T14:25:53.027000 +CVE-2024-34954,0,0,069cc0997160dbea9bc19a47b3b4714194d21adb413db5b5be732c3218c105f9,2025-04-04T14:26:05.893000 +CVE-2024-34955,0,0,a8ce73f1c2d422ff59e944ebd6e499cc493213d00f36ba51b5f664c5fc1b4a52,2025-04-04T14:25:53.027000 CVE-2024-34957,0,0,155cc9490999556896e1142bd78c7545f2b89173e987fa9a013996fde6a9bc88,2024-11-21T09:19:38.250000 CVE-2024-34958,0,0,5e861cbc1168ecefa878eb227b4ed45568602ecceb1ede6547cf9ed55d5a518f,2024-11-21T09:19:38.467000 CVE-2024-34959,0,0,0be4637545b6024fa0356f29bbf6d2c65d49b564ad55462e315f8cc97d5d3bc0,2025-04-01T18:05:25.397000 @@ -260831,7 +260832,7 @@ CVE-2024-3538,0,0,f9085328d3641db4852851bac8f6772b68244406d157d6e79d2469ff9aab69 CVE-2024-35384,0,0,42abaea844422bfba7ccd36f4eaff11bd2995432a203c00a494cdf71c26e4312,2025-03-13T20:15:20.317000 CVE-2024-35385,0,0,5ba54b94821266bcbbc8bb78493576dc7e5ca816823a0b55b1a7a8ad8ce72707,2024-11-21T09:20:14.260000 CVE-2024-35386,0,0,36602424fdb95f456357c7e3cffbb754639a08df4a5d93ca4f5e0c03dd26890e,2024-11-21T09:20:14.470000 -CVE-2024-35387,0,0,6fc9ab8f9ffb0a681bd8daabb6239e509e8e726a03d9f08fca8563ffc9ce2ed9,2024-11-21T09:20:14.683000 +CVE-2024-35387,0,1,a1a3da46a8291031d64b26dd9b32f82d2698ac638f3f44f66c77e0649bbf1e52,2025-04-04T17:03:41.183000 CVE-2024-35388,0,0,7cf8e34a470621680423585add066825300d692183d7bd67d21ad6a2546fbcdf,2024-11-21T09:20:14.903000 CVE-2024-3539,0,0,4482f13d748add12da9edffdb1dc7d6addca5a4e01c6c6b1be9a76a892b93cec,2025-02-27T20:02:57.097000 CVE-2024-35395,0,0,4474c80f523478d0c6d3b5bb6b0e6d79266ba7e390feb3cdbdf836c820394afe,2025-04-03T15:45:47.767000 @@ -261251,10 +261252,10 @@ CVE-2024-35912,0,0,a87c6f7d2d114883e7c3b02968350ed5f93146fcd0181066e79e480a7ea0e CVE-2024-35913,0,0,9ca63902c707fa7fe832b081dcfceb508a4ba71ca928b6035b65725057ec056c,2024-11-21T09:21:11.403000 CVE-2024-35914,0,0,d7383e2ed28ddddae4cf696d0ec4ae103022a2a593ff5fdded4b9fa18b0a5e89,2024-11-21T09:21:11.597000 CVE-2024-35915,0,0,a970066dbdf1775c6488907881ae830f1b522c25091d9bd6b9ee53f60ffbcaf4,2025-02-03T16:09:55.723000 -CVE-2024-35916,0,1,f55dbbba28ef4d4f07eb3a7dba36bd977d488a1f359ba0ebd4bd645ed8d2841c,2025-04-04T14:24:30.477000 +CVE-2024-35916,0,0,f55dbbba28ef4d4f07eb3a7dba36bd977d488a1f359ba0ebd4bd645ed8d2841c,2025-04-04T14:24:30.477000 CVE-2024-35917,0,0,eab93a0817c66f8a05ad2445d597c153a9b9d84611133e2a6e712f3292d1bfaa,2024-11-21T09:21:12.103000 CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedbcb8,2024-07-30T05:15:09.763000 -CVE-2024-35919,0,1,99858bae1982db77d7f5cf462658b3ce01ff94846b48ed357015ff74837c7630,2025-04-04T14:23:50.547000 +CVE-2024-35919,0,0,99858bae1982db77d7f5cf462658b3ce01ff94846b48ed357015ff74837c7630,2025-04-04T14:23:50.547000 CVE-2024-3592,0,0,ff5147fd52698b783751119964844ea2247003cb656728005bbdc75700fd6e1d,2024-11-21T09:29:56.610000 CVE-2024-35920,0,0,0ec0b5449e7c1fbab9160ce7ba917247db93f0404680970a5bcce653878ff168,2025-03-04T16:48:45.790000 CVE-2024-35921,0,0,4526cc1ba7186dbcecaca88016f42ddd8138d3cd50124e674014b54b22fb74d3,2024-12-30T19:35:04.897000 @@ -261278,15 +261279,15 @@ CVE-2024-35937,0,0,20787b5ab1b729218c6f7e48793441c785c51814f8922ce266d448a8a4100 CVE-2024-35938,0,0,2efeaa65672def64c85e39f960d3d01dbf5533390de3d3f54f180152cb69f5c5,2024-11-21T09:21:14.773000 CVE-2024-35939,0,0,b275ecea9c74fd7d5d66bfdbd96bb842e1b97b53f548850ac73334b3c0feb367,2024-11-21T09:21:14.910000 CVE-2024-3594,0,0,fac65e3c9a1ec4d365c0ad855597ab4f608d5c24a71b09853c3e37d677810290,2025-03-20T19:15:29.977000 -CVE-2024-35940,0,1,b6770219e41ff88ca81c6741fd1ef10bc7975cf60b9bb14e888cfba2bf5a0972,2025-04-04T14:23:41.257000 +CVE-2024-35940,0,0,b6770219e41ff88ca81c6741fd1ef10bc7975cf60b9bb14e888cfba2bf5a0972,2025-04-04T14:23:41.257000 CVE-2024-35941,0,0,ba407971e3e616405717173ba5f7515a688bcbca7a950312e8dced7df30c0709,2024-06-04T13:15:52.613000 CVE-2024-35942,0,0,7b996200c19ab3a598e5c796589ca577e75a77d2fc1be95b3d93a8b884efad3e,2024-11-21T09:21:15.287000 CVE-2024-35943,0,0,81f69d696ece6afd4983aec3689a1073cabc000fb692a47eec7f58ec34a93b2c,2024-11-21T09:21:15.413000 CVE-2024-35944,0,0,ce49f5b3d57917ae0fbcd2452c7e1c0458f5bc9a5f4f2ae390af1e6a990f39b2,2024-11-21T09:21:15.537000 CVE-2024-35945,0,0,8fa88b560cec38302a838aef898e5baa1dae10698602b321c86676d445f99126,2025-01-31T15:01:01.190000 CVE-2024-35946,0,0,bdc48baa7a2291997f9b791946b657604b013e0c653c13d8a3e40bb71c2c62f0,2025-01-31T15:02:04.300000 -CVE-2024-35947,0,1,3fa8ecf8f00e3ae31ae44e95e8968619b89ddff27b00f8103223bab7a29a3617,2025-04-04T14:23:31.930000 -CVE-2024-35948,0,1,7fd916ff7ffaee6909505f53a547f5f3ef10a485c6be9d1156f4ca6fff61249f,2025-04-04T14:23:17.593000 +CVE-2024-35947,0,0,3fa8ecf8f00e3ae31ae44e95e8968619b89ddff27b00f8103223bab7a29a3617,2025-04-04T14:23:31.930000 +CVE-2024-35948,0,0,7fd916ff7ffaee6909505f53a547f5f3ef10a485c6be9d1156f4ca6fff61249f,2025-04-04T14:23:17.593000 CVE-2024-35949,0,0,b27c52fe5f3d0047bde57c2134e40c8c1b651fb87a91cd1070708f862ed139c8,2025-03-28T22:15:16.637000 CVE-2024-3595,0,0,299f219cd8929463949e6012be628526df16bc0b75976798ed8df15f665be518,2024-11-21T09:29:57.020000 CVE-2024-35950,0,0,ef079ede60c6c9326dca631d7f2fe485843c48efdf1d2a19a2dc54ee921138e4,2024-11-21T09:21:16.493000 @@ -261294,13 +261295,13 @@ CVE-2024-35951,0,0,2d5b5c467639e009ede1e6990ff54fde09b903b47b307d1450eac9b52b502 CVE-2024-35952,0,0,7e1230de99cd6e0ef4828e0aa17edf69431e43a75171aae4948881ed93086ebc,2024-11-21T09:21:16.750000 CVE-2024-35953,0,0,33abfe23421b351d0515548ec4d13b459eb151d37ce4da44fa67c72a29b72a04,2025-01-10T18:11:53.623000 CVE-2024-35954,0,0,821738f041773a9a3f9bb235884c025738336a7f259bad712ef0753e124fd3ba,2025-03-04T17:05:52.587000 -CVE-2024-35955,0,1,529921a5b747be30b617bef99771252677e65cb670794e4efa421f54ec58b919,2025-04-04T14:23:00.177000 +CVE-2024-35955,0,0,529921a5b747be30b617bef99771252677e65cb670794e4efa421f54ec58b919,2025-04-04T14:23:00.177000 CVE-2024-35956,0,0,a2df20ee828a684480220f597be9391b4a50d33880f1470bf6aeca6acac4f402,2024-12-14T21:15:18.477000 CVE-2024-35957,0,0,63f1ef216f981899f739038c72e590e5dc7a92a6cab95efc5de09be8bad6816d,2024-11-21T09:21:17.513000 CVE-2024-35958,0,0,dea59fdb3b17c08467afba7fa0588c1d2e5cd5eb65fea4ada743f1bfb3c216a3,2024-11-21T09:21:17.707000 CVE-2024-35959,0,0,53f6e1bb6d9d49084925276b5c45c193850da3a7ac9cb385334abc5f14e36dbd,2024-11-21T09:21:17.913000 CVE-2024-3596,0,0,4246a2c2dc908d228b50ffca493329c9a7b02d6ef3b25fd6c58c4a1c29c8d4de,2025-03-18T16:15:22.140000 -CVE-2024-35960,0,1,dcdc0c7f7e6dfcfafc79e0e92834cdf5a89f6ea0c614ebc18150504b001f6476,2025-04-04T14:22:45.537000 +CVE-2024-35960,0,0,dcdc0c7f7e6dfcfafc79e0e92834cdf5a89f6ea0c614ebc18150504b001f6476,2025-04-04T14:22:45.537000 CVE-2024-35961,0,0,d8bede3118f3213f6531e3d4764ee351899ee3c652f6f84602e33285303dd68f,2024-11-21T09:21:18.270000 CVE-2024-35962,0,0,f360f85bc8ef52af04a2c558b97f52575478fb0db43fb8c16bc09d6f51c8dcff,2024-11-21T09:21:18.400000 CVE-2024-35963,0,0,9254b8c05852180a05bfc4de11aaa78dd255bf8332d5a7d6e635f3dc55244997,2024-11-21T09:21:18.527000 @@ -261309,15 +261310,15 @@ CVE-2024-35965,0,0,cb355b9530201a0044356deee31fbe40daec64a92cd3106a492602304c2e8 CVE-2024-35966,0,0,e92657b793392c47fae14a14402fb7692f5a1523007cc7fefb0f475a5eb143e4,2025-02-02T11:15:07.630000 CVE-2024-35967,0,0,d37735ea3b6465b3b7e35ad3b56c28542e70fc1e34633c9d27692eb98dec68d9,2025-02-02T11:15:08.777000 CVE-2024-35968,0,0,e78a949ee38e30bb945ea2f4ffb3a9d4de43a584980b899a912693da08777de5,2025-01-14T14:41:00.457000 -CVE-2024-35969,0,1,6d425ccaf56c91dfc12c33315d79cd5c3149c391882946aa1c29e550b59998b9,2025-04-04T14:45:29.297000 +CVE-2024-35969,0,0,6d425ccaf56c91dfc12c33315d79cd5c3149c391882946aa1c29e550b59998b9,2025-04-04T14:45:29.297000 CVE-2024-3597,0,0,a7dc7cebce835d8c3ee68919fe17093c31b17b7ea549be292a4206aaf18b81c1,2024-11-21T09:29:57.300000 -CVE-2024-35970,0,1,fa6b16c71e024354d5837da32cd9e613b5945bdc7d1e79ec6d786d8400624558,2025-04-04T14:45:14.893000 +CVE-2024-35970,0,0,fa6b16c71e024354d5837da32cd9e613b5945bdc7d1e79ec6d786d8400624558,2025-04-04T14:45:14.893000 CVE-2024-35971,0,0,82af6e1b42b1a4dc263c44d7428cb023096411f2f6b6142c94f897d5fa11f0ed,2024-11-21T09:21:19.700000 CVE-2024-35972,0,0,c6932c092b05c1a3815b9d9486ddbdfd33e61a2a4ae777bdea3fdddede873256,2024-11-21T09:21:19.830000 -CVE-2024-35973,0,1,8888f05a64051df40c15b74cc1185c7209c9bb3ac0bf3fb5c071d19439d0562c,2025-04-04T14:33:42.407000 +CVE-2024-35973,0,0,8888f05a64051df40c15b74cc1185c7209c9bb3ac0bf3fb5c071d19439d0562c,2025-04-04T14:33:42.407000 CVE-2024-35974,0,0,b8b253124dff1749ba26f45b62ff04d5f962afce63d9233fa0767e7d51f7a373,2024-11-21T09:21:20.167000 CVE-2024-35975,0,0,e9a7d5e3c12f42b9ed0c47c23a7df2158e32eaf3d2698f481136ab5a772355bc,2025-01-14T16:38:39.367000 -CVE-2024-35976,0,1,cd55876510b151a0041764753c66e64d1983b5c9659cf80590a3c82a3d768fd3,2025-04-04T14:33:21.837000 +CVE-2024-35976,0,0,cd55876510b151a0041764753c66e64d1983b5c9659cf80590a3c82a3d768fd3,2025-04-04T14:33:21.837000 CVE-2024-35977,0,0,a446100538552b0ac8619b2d5ff8dee209e0fc8980e14c7e2f863ee391ff1ef3,2025-01-14T16:36:51.467000 CVE-2024-35978,0,0,454b5f38fcf94da8a14587a7c8869850b14e624b1555e8c5359f80cfaf7c7c5c,2024-11-21T09:21:20.740000 CVE-2024-35979,0,0,ff355c28a062e46d39e43896daaf00268a65dffde89d511abdde3cd46755464a,2025-01-14T17:28:20.793000 @@ -261328,10 +261329,10 @@ CVE-2024-35982,0,0,ffc0591ff45e47ac4517cfe2ad4e5279acd4b701b9862173d0d4a17749d98 CVE-2024-35983,0,0,e984518d9b7d576d5068f7c7f488ac95189cdb72c5ebc6040b189098fa4845d3,2025-01-16T17:22:28.740000 CVE-2024-35984,0,0,bf26a53c916bc290686411572af86b5c948d99c52a4fff4fa3fa9f741b4a8c76,2024-11-21T09:21:21.677000 CVE-2024-35985,0,0,813ee7a10b86bc19ed2c5eb541b2e7b7ab313531e54d6d9f0b050ded02e6c2f9,2025-01-16T16:43:59.487000 -CVE-2024-35986,0,1,549154e95dc30ebd7013cb973b974b34401887bd77312c63de2c0df5111d67d0,2025-04-04T14:33:00.843000 +CVE-2024-35986,0,0,549154e95dc30ebd7013cb973b974b34401887bd77312c63de2c0df5111d67d0,2025-04-04T14:33:00.843000 CVE-2024-35987,0,0,d3d03fd4d380aa562fc5312ab0636a065d6b376959fc8c803e432aab5bcb4990,2024-11-21T09:21:22.200000 CVE-2024-35988,0,0,1f909ca2d5f9686c6fef5f46bb24b76a2c9984ce0eb8f7f555b16d10b8fa7a61,2024-11-21T09:21:22.337000 -CVE-2024-35989,0,1,ce9b52637f4365bcb4b40cec7e4c8db298cbd67c688f758b5cd5dd7502460e3d,2025-04-04T14:32:40.430000 +CVE-2024-35989,0,0,ce9b52637f4365bcb4b40cec7e4c8db298cbd67c688f758b5cd5dd7502460e3d,2025-04-04T14:32:40.430000 CVE-2024-3599,0,0,10eaa2073bf4876dc6ce7a3b6caf6a6ffad93fc58bd811300550bf374057bde5,2024-11-21T09:29:57.573000 CVE-2024-35990,0,0,3e0ace3cb19d03d21b4134830ada9a3a9c638247a80144a9ece7ea3cefab4097,2024-11-21T09:21:22.667000 CVE-2024-35991,0,0,e0023617065fc6765387efe6164edb62b49cf60b15228846cbcdf1b9ebe00378,2024-11-21T09:21:22.833000 @@ -261342,7 +261343,7 @@ CVE-2024-35995,0,0,ae0f8c909a8564a625fbf71718d334962c0ebfd15c0e8945ee50dbebfde18 CVE-2024-35996,0,0,a13038760306c3b9a1782c7a096c6830b6a7c18e69a72b02346120583ee4f780,2024-11-21T09:21:23.480000 CVE-2024-35997,0,0,54bb78c20a7d36c25a4fa0a0731a01d5a6be6d1d88ff50f6dfa8cc7bf2ee119f,2025-01-16T21:15:15.603000 CVE-2024-35998,0,0,73b2fdecdb97facc7eba42971cd617fe0100b4ccdfc7142094bbd0d48c338c30,2025-01-10T18:12:11.843000 -CVE-2024-35999,0,1,8292eb98ffbf55f9d28693b5ac4fdda92085750419810dd16309c8b6536817af,2025-04-04T14:32:31.883000 +CVE-2024-35999,0,0,8292eb98ffbf55f9d28693b5ac4fdda92085750419810dd16309c8b6536817af,2025-04-04T14:32:31.883000 CVE-2024-3600,0,0,7487ed8045b52f9ca0f528c0b921198c20704e67529c1c2f1e0db9eca0ce6f37,2024-11-21T09:29:57.707000 CVE-2024-36000,0,0,62c7336e28cea8761d6810a8bc9260a1ffb3a626a0d454037167222827a7b99d,2024-11-21T09:21:24.170000 CVE-2024-36001,0,0,14abbb4c1e2875579804c1d309cc9a3b12540930a881df435bb9718b0d948975,2024-11-21T09:21:24.297000 @@ -261939,7 +261940,7 @@ CVE-2024-36775,0,0,9c5203ba4d01dd58c698c43fa9ab55048fd0df881d0bfbb8a503c2e1b7b7c CVE-2024-36779,0,0,7b739c64beff2893672a25690e434112c970c164936289bca787190bcc91135a,2024-11-21T09:22:37.190000 CVE-2024-3678,0,0,22154e119c8d9281c276e72618f61f0522a22cac0293c0339bd6830b5c754eb4,2024-11-21T09:30:09.810000 CVE-2024-36782,0,0,00eb055049508cf187e6bc0ece14d8822efb15dba3f95ef4f5a5199a79fbdf2d,2024-11-21T09:22:37.413000 -CVE-2024-36783,0,0,429c5f52f3845b13130c14cec0e4cc5f0757ed3429f7075392ec7ce161292e3f,2024-11-21T09:22:37.627000 +CVE-2024-36783,0,1,10929950000d43c4efc9d498cd5b448d2b6c5e0ce86ab7146ad00df643ea0e20,2025-04-04T16:32:22.820000 CVE-2024-36787,0,0,e845cb494779fc7ea9d44341329d09cb7790bd0bd08be878d0295ccae79f4647,2025-03-13T17:15:32.177000 CVE-2024-36788,0,0,dcbb2ef67389a6b501ed9de90476b77ca8c672ec28dc72a1597e79b656538d2b,2024-11-21T09:22:38.030000 CVE-2024-36789,0,0,c071c77c3e552f8f7ad2ad9b2b6a08dbce2eef6a06e31657e30feb423eb6db89,2024-11-21T09:22:38.570000 @@ -263521,7 +263522,7 @@ CVE-2024-38583,0,0,512132823d787f9a3a0fa4101eff15ecd030a65ee3d788d2a03a9ac27c0ea CVE-2024-38584,0,0,bbe52463596782df26cbe8abc28612dfafbb0daa774992fd51d31f39e58dd866,2024-11-21T09:26:24.690000 CVE-2024-38585,0,0,b38439f4451c3f6522fc61aa16ff526ae899436f5b924609ce020687d227481f,2024-11-21T09:26:24.840000 CVE-2024-38586,0,0,be1333eaf20ed1d562084c36d66b036e9b982d55810180b1fcad59ef4df80d2b,2024-11-21T09:26:24.963000 -CVE-2024-38587,0,1,9182949d798ec718896ff6dcc24de4c6abdc43ad7586c8223db4ca228bede5df,2025-04-04T14:44:28.900000 +CVE-2024-38587,0,0,9182949d798ec718896ff6dcc24de4c6abdc43ad7586c8223db4ca228bede5df,2025-04-04T14:44:28.900000 CVE-2024-38588,0,0,0eab40a620e5d3a3915d6e2b8127f6b154697638843abb40e092106a91df0f30,2024-11-21T09:26:25.347000 CVE-2024-38589,0,0,c6dc89b1202ecf49c8b4dcf3e0f75cc2765c48604bd4312f984a520e7ca6b993,2025-01-10T18:18:16.900000 CVE-2024-3859,0,0,0c144d144d73f7bf3376832e2e8d6ad4cec7c885a02ef5189f7d2a05b4879f6a,2025-04-01T14:22:25.647000 @@ -263696,7 +263697,7 @@ CVE-2024-38744,0,0,c0edd07adb34a8fcfc607f310ab0243151282a32eac77b791493e882d8426 CVE-2024-38745,0,0,c68aa7de8eff85b8cdb759adc90912ba935bdfd44a36124105a13eac610c6db0,2024-11-01T20:24:53.730000 CVE-2024-38746,0,0,34e8f06026a30fcba1f2a4b7d2fab4e9fac068f3df4ee3d29d85717e37ce0604,2024-08-02T12:59:43.990000 CVE-2024-38747,0,0,9417f9dce18a2a48fa84358d319e1b7409afd0f0ccec02b607923b94ce85595c,2024-08-13T12:58:25.437000 -CVE-2024-38748,0,0,50c3d121fe0e929cda9c76aec7dabf1d995d57ed5bcfe456e9f2b4c90a396314,2024-11-01T20:24:53.730000 +CVE-2024-38748,0,1,48e3ac7a17a43b75ae3c1d844f69909d144a4990a90a3db4bf0b74f59d9d3ec5,2025-04-04T17:43:43.163000 CVE-2024-38749,0,0,9cac44bd60a189328f8a96d4e9a4cc173a1d715533e0c5ebcab85c3cf2df8979,2024-08-13T12:58:25.437000 CVE-2024-3875,0,0,6b922ac84a65545ed842641f1c23a0444506b12ccaee6f1abb7c34f0ee37c64a,2025-01-21T16:44:42.840000 CVE-2024-38750,0,0,f3d180e8c9a537e3f35b0a267bb1076590b0494a5b3a159f9756f13046728710,2024-11-21T09:26:45.343000 @@ -263743,7 +263744,7 @@ CVE-2024-38788,0,0,3b35408d3a24d65f413e2071d9e6ff186341b76a67f561c74fad26cddceb0 CVE-2024-38789,0,0,616de834d0980fad84dd5d262c2a5a5c3ff6ad2da413d7a0377141b71b3dbc26,2025-01-02T12:15:23.633000 CVE-2024-3879,0,0,074bc3e4972b3513101e0e678069b78f6c106732c850ff6e35dd0948fcaffd97,2025-01-27T16:24:40.757000 CVE-2024-38790,0,0,405d212e30fbe17293eda7c0b0455d1fb06eb6a3f764318aeaba7963c03a8eb1,2025-01-02T12:15:23.763000 -CVE-2024-38791,0,0,7eb8f94e68bf3536fdb2800ab03bca013d555a84b835d5cdd5aafe7b3cf9aade,2024-08-02T12:59:43.990000 +CVE-2024-38791,0,1,422db81a78de1a1deee8af17680026d02acdabebbd7a9799b397e813bdf1372a,2025-04-04T17:45:25.140000 CVE-2024-38792,0,0,e62ad1d58d17db35f23147b02103d010f9465e0c2ed86e9d15a60072344a696f,2024-11-01T20:24:53.730000 CVE-2024-38793,0,0,3abb4fadd98983f9c8a3f71f42811284ca10c92d1b43b534ec7aa2558a41abe1,2024-09-13T20:57:16.150000 CVE-2024-38794,0,0,0e611d7d55b2e6c94eee9312ed11241297f8a473362db39470b8ea85723f38b2,2024-11-01T20:24:53.730000 @@ -264727,7 +264728,7 @@ CVE-2024-40347,0,0,5c4f900c27a79a65c2c1950bebc45a10727f89a6cff7435d7eeeb5c0e73aa CVE-2024-40348,0,0,a58e6a47358e956246c4dcc36efd0ca5ef95a667f1cb47a658c76971b3dc1ffb,2024-11-21T09:31:01.867000 CVE-2024-4035,0,0,f76d80111e81f9edad4b19e9027b1d70e9b8c1241f56329bd5838cbdf02e9566,2024-11-21T09:42:04.440000 CVE-2024-4036,0,0,7aded61cfc52a62565b948ab8633b838a5ee4d72bb993ac0cbd5158ad07150eb,2025-02-20T19:52:28.110000 -CVE-2024-4037,0,0,78184db7cbb8148e3be42a928c9f628f629ea53f6b519d339b5efa579c422e5e,2024-11-21T09:42:04.667000 +CVE-2024-4037,0,1,7b51c55a35ef4682d923aae85eb8140bed047a666910995f8679da9cc7471053,2025-04-04T17:52:02.887000 CVE-2024-4038,0,0,569d358c6bfa348b9210b115f5928b1fde5041b5579f5485157a9cfdb142b163,2024-11-21T09:42:04.797000 CVE-2024-4039,0,0,c3aaf5874fe7003d1596a329b05f85f247b5e2632c127fe1794ae2f532f05959,2024-11-21T09:42:04.913000 CVE-2024-40391,0,0,cbd9b0d424ed91ca3ee4ca4e36de30c2faa4e7dbce8c14db1ebc2cfb4a2106b3,2024-12-03T22:15:04.740000 @@ -265094,7 +265095,7 @@ CVE-2024-40860,0,0,0ee8b9aff53699d0bd89fc7f5e626b86846c4721c26a74ee2c81f0592fae4 CVE-2024-40861,0,0,348c9f24e1110833a0ff2ebcc8e193e00fdb71c3f5ba3c9f7e2798ddc124239f,2024-12-12T15:23:40.167000 CVE-2024-40862,0,0,4e9663a5266f3fdc1d0389c6081d591ddca5dee0155a6488f7db45f5297e16f0,2024-12-12T15:13:59.497000 CVE-2024-40863,0,0,8cb3caafebac8882c9ee3af7c4b66324ef0f54e5e43611969666ac6ec6e5c401,2025-03-17T17:15:28.297000 -CVE-2024-40864,0,0,28c089d9cc7b20de99bae398209e8c39228742414381bf34a888b6b728ba7b7e,2025-04-01T20:26:22.890000 +CVE-2024-40864,0,1,0f1546c3190fc0a1337a93c6cee44902a760926eeaba764852f63eaa89ac8aff,2025-04-04T18:19:30.590000 CVE-2024-40865,0,0,616358e5a7da829ab34ba658d9550f2e98117d6557487d6353ce5139832f8870,2025-03-14T16:15:34.170000 CVE-2024-40866,0,0,687552975113bbd162846a0306973666543cf22220471324bc538368e44e9b96,2025-03-25T17:16:03.567000 CVE-2024-40867,0,0,8601cb8b0c811f09acfb455bf7c1672afe97c43c8dc9da2ce2d48e4ae43c9eb8,2024-10-29T20:35:26.040000 @@ -266565,12 +266566,12 @@ CVE-2024-4271,0,0,e065884abd13d8703fdf835666ca9f47ea6581e787d0dfa6603568b9675ea1 CVE-2024-4272,0,0,c1b1d26587c061d52e11bbbc0453ffa7c1fd935bd8f85aa4d100c5e80dd23497,2024-11-21T09:42:31.353000 CVE-2024-4273,0,0,347cc3730c3defd1ec37ea8bf1fe1c4fac9170b2ca0876d0ff5de387107219aa,2024-11-21T09:42:31.527000 CVE-2024-42733,0,0,9360a59cf686fb21d414bcff3b95ceaac84334cd9396a6a0fa770a87432b3bde,2025-03-10T17:15:34.673000 -CVE-2024-42736,0,1,79420ae6879b0a74160640155333f342406cd01d8230dfa9cda42cb0a164dc98,2025-04-04T14:35:31.433000 +CVE-2024-42736,0,0,79420ae6879b0a74160640155333f342406cd01d8230dfa9cda42cb0a164dc98,2025-04-04T14:35:31.433000 CVE-2024-42737,0,0,006d79e3bf2eda54b979ed88cd81814d58a98170e7ee0605965755ba8d3f8e02,2024-08-13T18:35:07.950000 CVE-2024-42738,0,0,5603a4c92bb9fdfceffe4d70e44004fa4c908e1daba49cef169637c9eca20050,2024-08-14T16:35:16.850000 CVE-2024-42739,0,0,c2dedde4a6a4a77eafc7209712aea29cd293d2d03e6f2b10814e8bc488a1c0b1,2024-08-14T15:35:13.153000 CVE-2024-4274,0,0,ef279c1031b23a4491d2ecc453c16310b249d232378b86f6222906d19246becd,2024-11-21T09:42:31.640000 -CVE-2024-42740,0,1,3e4794cba1ad6c98e2998f068fed0ba285e4fd9ed1284aba8da788418b8afa37,2025-04-04T14:35:41.613000 +CVE-2024-42740,0,0,3e4794cba1ad6c98e2998f068fed0ba285e4fd9ed1284aba8da788418b8afa37,2025-04-04T14:35:41.613000 CVE-2024-42741,0,0,8a066402c5de9a93507d10529adf43f95d0cb57177327f7210dd0f92e3c12ee3,2024-08-13T17:35:02.867000 CVE-2024-42742,0,0,e0798d319ca33e4c7b390baba589dae63b6b8ea361c61dc521fbca1ee00526c8,2024-08-13T20:35:14.063000 CVE-2024-42743,0,0,fbbe91de55095d7c617abdd35f4173b91d7ae8b7d74903dca391cb67281ab2ad,2024-08-13T19:35:12.963000 @@ -266814,14 +266815,14 @@ CVE-2024-43132,0,0,a7e41eb29c7b0038ae266f989e98ee8056ba3594c845a171ae27ce3541312 CVE-2024-43133,0,0,bf45d1ea6a825629419394dee88d2f7eafba700ef5037a87bdf12fc01eb2dc53,2025-03-07T17:51:16.833000 CVE-2024-43134,0,0,e697a5405745c13967c582276615fed22c7922a3bed422fc074db4155fec68f1,2024-11-01T20:24:53.730000 CVE-2024-43135,0,0,a0469d70766a9d4d4a709a18b34213e7343b06f9f8a4b5b19c9b4341aa7968ba,2024-09-12T21:18:15.773000 -CVE-2024-43136,0,0,1582518c745838c877399638da3c98ad2cdac482e1c2cf80f200ccc232862960,2024-11-01T20:24:53.730000 +CVE-2024-43136,0,1,1ebdd2a5219b7f678d64eb370d3ab12ef25e6d8281ad1b652227e484e995baa6,2025-04-04T17:41:05.567000 CVE-2024-43137,0,0,7d2f454beeef77e65a2e86d655b7dffdab32510ab1f25a45a9bd31fd99decf68,2024-08-13T12:58:25.437000 CVE-2024-43138,0,0,8114584da43de06b6b8d397bff33c216130d78999e0de249c72405310332ae0b,2024-09-12T21:11:23.463000 CVE-2024-43139,0,0,4664cab09e1ef1cf31ac8c790bf69bcaa006bb095909d613e72a3ccc092e2d13,2024-08-13T12:58:25.437000 CVE-2024-4314,0,0,1915401b7054eb9cbe7809c970656d04dda1a2f5d6188d2c06ea7b75f5425466,2024-11-21T09:42:36.470000 CVE-2024-43140,0,0,838ad239b19b98c3fb31944d3f69cc07a52756387f725d80b8a24370f0e8fd78,2024-08-29T16:04:30.370000 CVE-2024-43141,0,0,3600a578be9d0182eb0990221668ee16183e95533139140fc281af9f9d90daf6,2024-08-13T12:58:25.437000 -CVE-2024-43142,0,0,8949fe5fe0061cdcb11da81862e5112f7302c9fbae547996fa9dc7889ad597c9,2024-11-01T20:24:53.730000 +CVE-2024-43142,0,1,ab1c88fbc723e06e45ef07e18935d0edc62760f83cd62d82ef5353c23e598fa1,2025-04-04T17:42:30.060000 CVE-2024-43143,0,0,46a899c093bfcc81fbb84f7cef88fca912b3ec1ce138dc0e17193b5e70852779,2024-11-01T20:24:53.730000 CVE-2024-43144,0,0,fead8f7aad43864ca3b38e53a7414b524465e471e3950f4348089537b267028e,2024-09-19T21:47:24.613000 CVE-2024-43145,0,0,491354347bffb191b1a011109b7232920c678aefe47f0375ffcb96efed7a4dc4,2025-03-13T14:02:38.190000 @@ -266950,7 +266951,7 @@ CVE-2024-4328,0,0,6165e405bde6f83a11fa6220da74c8526ad170df1c9d2357e3fed8eecfae71 CVE-2024-43280,0,0,792d70a88a88f5b593fd162864acb62122800cd660deb16836607308fda28ac4,2024-08-19T18:36:07.297000 CVE-2024-43281,0,0,4c6bfbeb70a97f7302e329238c13d854e9164bf9ff27f3fd43f589a9a4bfb99f,2024-08-19T18:36:07.297000 CVE-2024-43282,0,0,71e5a07a66cbadfa5f053db7f0a0e228339632fa2c8eeabfbe12adc6e5bd9d19,2025-01-22T21:59:38.210000 -CVE-2024-43283,0,1,49b707b888070ce846ad3eb1274b73b0911342e0bf5fc8df6eb135b3336546a9,2025-04-04T14:36:52.130000 +CVE-2024-43283,0,0,49b707b888070ce846ad3eb1274b73b0911342e0bf5fc8df6eb135b3336546a9,2025-04-04T14:36:52.130000 CVE-2024-43284,0,0,6750e3410b47d0a62cf30e42a256afedf95cbc8eac307ad647642eb181dc62fa,2024-08-19T12:59:59.177000 CVE-2024-43285,0,0,fb373918e776d744404fd70c5a773fba11b22250707469d84d51c3f8bcda5aa0,2024-11-01T20:24:53.730000 CVE-2024-43286,0,0,722847214876212162088b1d2c7186780ddf7dea67eed703f6d1f7c60b32ed30,2025-03-31T15:03:49.690000 @@ -267985,7 +267986,7 @@ CVE-2024-4438,0,0,49876e95eb9df71ac9c7dd3587ab152f573260176409b44ded5748ca1e6660 CVE-2024-44381,0,0,3c86412857ebb67acb5943a51cbfb96a80661d812226c9b7ffbfcc8d631ec073,2024-08-26T13:55:17.583000 CVE-2024-44382,0,0,21a48868750ea6e1329a06b0241ed837e737f998865b6a3d735cf782e0e75315,2024-08-26T13:58:17.047000 CVE-2024-44383,0,0,23a5bf3168a8b9a250b7b9d9ae64aff62eb04ea0eedbd8d76e2399ac24231ede,2024-09-05T17:38:48.020000 -CVE-2024-44386,0,1,a25d5ccf438a1583591dda587d0182128c5a4c8a163593bc97626813b9b2270a,2025-04-04T14:37:57.707000 +CVE-2024-44386,0,0,a25d5ccf438a1583591dda587d0182128c5a4c8a163593bc97626813b9b2270a,2025-04-04T14:37:57.707000 CVE-2024-44387,0,0,50a8c01e6c7c5614c6c17c643a3703838553c560be80642dd272de4bd117b64f,2024-12-13T15:15:24.313000 CVE-2024-4439,0,0,b50df9f41a6dc372fe14200edc9e92eb91ef775dfab0d69a49fd86397569cfde,2024-11-21T09:42:50.027000 CVE-2024-44390,0,0,0aba571c42fe5dff9e4a8f019041755e149383d298023d679608421e5a02cf93,2024-12-13T15:15:13.767000 @@ -268444,8 +268445,8 @@ CVE-2024-45192,0,0,43a7c431a16c707384aad36a7c459b5416237a7f09d05eece76501eccaa0c CVE-2024-45193,0,0,97e23cf5bb2e50a369e95a1523b175851171783613d8e26e1d3a20ce3e5a05bc,2024-09-10T19:35:10.143000 CVE-2024-45194,0,0,39e2c5f5618c81787bf696cee2375dcc2cb2276d4de328350b388d7b61cd41b4,2024-11-21T18:15:07.483000 CVE-2024-45195,0,0,66d7d17610be0ce972b0de44bf228f2798ff0c35e717addb513b69a67e048bdf,2025-03-06T20:29:26.130000 -CVE-2024-45198,0,0,ba16d4843c418f5a50428b683e1a819e42ae14eec1a26639df5844e3baed3ed3,2025-04-03T20:15:23.363000 -CVE-2024-45199,0,0,9ed37497c132323c603083af2c5f0f3afe5c21014ebac8fb92306ec5d55f178a,2025-04-03T21:15:38.400000 +CVE-2024-45198,0,1,e556e2d92ec2c92c0ef1d23653e0e056d30bc99682fd56beec31857a98ab6efe,2025-04-04T16:15:17.340000 +CVE-2024-45199,0,1,35b35c5175c5c666022485fe3423d31ffd53626e3173af9b6f61ddd9b2080556,2025-04-04T16:15:17.523000 CVE-2024-4520,0,0,ee81a89389de5b30bb2a69c5a856e44bc0ce84cd6ef34fd29b4c99337e9f4fec,2024-11-21T09:43:01.267000 CVE-2024-45200,0,0,816959e7602786604e30587a4aecd68df769826aff5588f51b07d55181578adc,2024-09-30T18:35:06.983000 CVE-2024-45201,0,0,1008d923104020063a79ec3ff9863805234d3d78944913eab118b0fc97b0b3b3,2024-11-25T19:15:10.473000 @@ -269024,7 +269025,7 @@ CVE-2024-45932,0,0,d99580c15e1f4253b78fc8eade7af10b7af736f831e0b29b8ba22455d6a4f CVE-2024-45933,0,0,759d6a3e7435330ae5ac65a95fe1b2df4df43c6847bfcdfa4b0f1cc74b85e165,2024-10-08T19:35:19.013000 CVE-2024-4594,0,0,1e0bae218d402758790d783892fb05857e9e543135339a4d4e2269d458fa8f90,2025-01-15T18:53:53.150000 CVE-2024-45944,0,0,6d03dc18ef28caed77231477de7c6077e701a445c58ff0076d2d6f3df9c40ed1,2024-10-21T18:35:12.750000 -CVE-2024-4595,0,0,b231a1aeda499abd5ca6b421976daa8f6f28396a16f8604bfd7dfec0ee9aca83,2024-11-21T09:43:10.880000 +CVE-2024-4595,0,1,79880684a0283469eafd2466d24fee5e4952c9733ee9e30da0b16eb127bbc0e5,2025-04-04T17:01:06.217000 CVE-2024-4596,0,0,d9eb59275f90b642ecdd9ea0d4bcc770e66fe4d7b7c779875bb4504f4aafa9cc,2024-11-21T09:43:11.013000 CVE-2024-45960,0,0,320e00ef4782928a01114d7dff4d2d2f4c376621bdf0bbb2df5a0387aa53e572,2024-10-04T13:50:43.727000 CVE-2024-45962,0,0,32c8768a1ae38ef615b83db851a45e595194a0e3df9d4e9d63b37239e349d7d8,2024-10-04T13:50:43.727000 @@ -269084,7 +269085,7 @@ CVE-2024-4609,0,0,055afe90c9a60dac55a2761dba0676220b76e2bc2c34a4db32d71cd1812cb3 CVE-2024-46097,0,0,81923f5d4d8e5055b162d76d680c8f22ce08e7aa6381b7cf7beec6a443dacf5f,2024-09-30T12:45:57.823000 CVE-2024-4610,0,0,f50600a6c6829b515e589c2ef59552849dc680c9e925131563e15658aa25578f,2024-11-27T19:29:04.697000 CVE-2024-46101,0,0,e753d2c1bb092894837b23e0471205bf34ea95c90d6464840efb9cbd99474750,2024-09-26T13:32:55.343000 -CVE-2024-46103,0,1,846577e342b8c2ce2b236435b45b09787163fef3cdc9c83f60399e2839cbabb0,2025-04-04T14:37:44.533000 +CVE-2024-46103,0,0,846577e342b8c2ce2b236435b45b09787163fef3cdc9c83f60399e2839cbabb0,2025-04-04T14:37:44.533000 CVE-2024-4611,0,0,ed636c8b0a8e01284c12219c46e475d447f79d5f869993df679ee9b132849ae4,2024-11-21T09:43:12.943000 CVE-2024-4612,0,0,b8a6aeb1f3cda3a22aeefe8d9a6a0f4dbf471fce15050f83fe5df63ac5f52cd2,2024-11-21T09:43:13.080000 CVE-2024-4614,0,0,eca609b72f6d0dbdf3e2930a517382c618b783ca5f3bbd2f9a2c62afa1f7de10,2024-05-14T15:44:12.883000 @@ -269228,7 +269229,7 @@ CVE-2024-46511,0,0,3a87227fab118194b35c27ec843f20409610bb66e9a3053a91cfd554e931e CVE-2024-4652,0,0,afb18f578c1b38de8de9ca4ec4f0a864642932b153b72ec5b05cf4b0b8f09a3a,2025-02-19T18:09:24.927000 CVE-2024-46528,0,0,966deb12dddebc5137dae02ab6860999c025751d4180a1ef1379e24312a6e3ea,2024-11-21T09:38:41.650000 CVE-2024-4653,0,0,05a0bd75448bb177be53c40d574503310d9260891386f10103a2ab1e0fb8b86d,2024-11-21T09:43:18.643000 -CVE-2024-46531,0,1,fac5ecf7745ccff6e0e71b7b770d51c18e8ff95108c8bd1f7feaeb31f5fd4df1,2025-04-04T14:35:57.957000 +CVE-2024-46531,0,0,fac5ecf7745ccff6e0e71b7b770d51c18e8ff95108c8bd1f7feaeb31f5fd4df1,2025-04-04T14:35:57.957000 CVE-2024-46532,0,0,fb99bbb875d6e467b1ed3043cedf30d6f1485897b14c4550bd7c98261c85aefd,2024-10-16T18:35:05.480000 CVE-2024-46535,0,0,0db09cdc25f6399278d3de8427309909cfbb4f1a148fef767bc166298eca9e58,2025-03-18T15:15:54.450000 CVE-2024-46538,0,0,36ab03c909d91ed67f1af19450c3d6e48453f6f51660df666d70bd09393db805,2024-10-30T20:45:35.240000 @@ -269835,8 +269836,8 @@ CVE-2024-47208,0,0,5bc7842af09d178c24d95c055c13b33b237ccb6628ceeb20517578a7cc1b0 CVE-2024-4721,0,0,7b2e578af20701a97d300f5059b980c32dd72d226553c4eaa6bfe13653e6297a,2025-02-20T20:50:03.710000 CVE-2024-47210,0,0,7b078d282e49f2a1336ae546c0b723ff3d199712c9c99c4465d9098c519caa6a,2024-09-26T13:32:55.343000 CVE-2024-47211,0,0,7cfbe4caeb9c6d5ba2e34fa790cad31c3986781c114cbdc021a3c5c02b8899bf,2024-11-21T09:39:31.500000 -CVE-2024-47212,0,0,2d8ea5b5f2d118fbfb0f7525ee516a85841aa441f27a4b06001aea6d3138daa7,2025-04-03T21:15:38.523000 -CVE-2024-47213,0,1,71b89d687d65ed58d7784444506e0da9c9824d38ba6d9e6a0d926fed058cdb17,2025-04-04T14:15:20.787000 +CVE-2024-47212,0,1,458c6e903a548d57d7b5c9eb33c5322fa92e83779c124a79118e9db15a6a0dc8,2025-04-04T16:15:17.697000 +CVE-2024-47213,0,0,71b89d687d65ed58d7784444506e0da9c9824d38ba6d9e6a0d926fed058cdb17,2025-04-04T14:15:20.787000 CVE-2024-47214,0,0,63908331a673b5c9dd64538e85bdee738291cf431e6fe70ea85f62771c608fa3,2025-04-03T21:15:38.760000 CVE-2024-47215,0,0,41c32e24c86ff65170b370501e4712d59a62e9b70c92305831b47310dc9164bd,2025-04-03T21:15:38.873000 CVE-2024-47217,0,0,89ecd8c7039e370921f2b74d83cff2f5658d039c3a516550d5a10788cf67d9b5,2025-04-03T21:15:38.983000 @@ -270226,7 +270227,7 @@ CVE-2024-47646,0,0,2617ebb59953371d8761b1aaf8c57bff2de2d71d8efc67334ca19e36008ee CVE-2024-47647,0,0,1d1f24ef61efd4aa16f0cb7293c82469ba5018bc406ba1e11f4ffcd39c244a64,2024-10-07T17:47:48.410000 CVE-2024-47648,0,0,e1abe3cc5d585f58e76a41c98c4df11a36a777ee123f32fcdd1169e9d32b05cb,2024-11-14T01:53:55.837000 CVE-2024-47649,0,0,836719e2735bb9da7c63faf54ed00c51a26b9f17ba31bf3caddf2e41633fc607,2024-10-16T16:38:14.557000 -CVE-2024-4765,0,1,8ebd55c5995dfb56f1cfdd48067b07dcf7e015ce50af6dd5f22270abdf10d4a7,2025-04-04T14:27:03.673000 +CVE-2024-4765,0,0,8ebd55c5995dfb56f1cfdd48067b07dcf7e015ce50af6dd5f22270abdf10d4a7,2025-04-04T14:27:03.673000 CVE-2024-47650,0,0,88a8d4e6f5307274ee14d9499c3c64ca3a046d23e14878a1adf1dd75dea313e9,2024-10-07T17:47:48.410000 CVE-2024-47651,0,0,3ee9c091c040abe62accbf28b61a3f3c61ffcf2e76c659debb6787869208938f,2024-10-10T21:01:39.413000 CVE-2024-47652,0,0,1d2d5fe3ea159d939f39a1753ea5c7442f77191ca32666596d799106ca77e84e,2024-10-16T14:12:06.307000 @@ -270237,7 +270238,7 @@ CVE-2024-47656,0,0,e4195d49c1579db2a00554d993c763b4f27cc6566523dbd1e911961a996d3 CVE-2024-47657,0,0,604e3df353a3aa1582522ffbd171cd66dca4910a35c478fe04481cb0c3e54d21,2024-10-16T15:44:16.807000 CVE-2024-47658,0,0,c3d66234257f86434a7178e3080cca2f1305273668378ce1b994358f5b4571da,2024-10-23T16:14:46.213000 CVE-2024-47659,0,0,b65e1f8879a2eb75728c5fe5e388ad71a057da4c3b97b571222c8ad802ab119a,2024-10-23T16:29:14.800000 -CVE-2024-4766,0,1,0e495c24036c9a231ea37d7844bfd4b528eec4070143010d5e0c1d8c44eb0000,2025-04-04T14:26:43.530000 +CVE-2024-4766,0,0,0e495c24036c9a231ea37d7844bfd4b528eec4070143010d5e0c1d8c44eb0000,2025-04-04T14:26:43.530000 CVE-2024-47660,0,0,c809cab395d4a3a97b6c624c7d13a9adc80e04f5c807d319223e59de8499347d,2024-10-23T17:00:47.747000 CVE-2024-47661,0,0,e5058cad92f984db746aa84802d1291b53b65c3fc1ce67fdfa99f337a511d541,2024-10-15T16:03:29.260000 CVE-2024-47662,0,0,bfa2fd54a033fe29cd1e6716367acfb362bbc29ee66af3cdc7716c35faae085a,2024-10-23T16:53:12.973000 @@ -270314,7 +270315,7 @@ CVE-2024-47726,0,0,23042c2e605965cc128b7b85d8ea85641b7a7449aa61d207b1e50326c5491 CVE-2024-47727,0,0,3196861812a33ff4255dd1448fcb4aa149876dd4b4c056bd70146e25a6f1734c,2024-10-23T20:32:53.743000 CVE-2024-47728,0,0,7cb3d81e3c38eaa169308dc5b0c05b8df992b74b7ca28b8189228d77e1f616a4,2024-10-23T20:36:52.367000 CVE-2024-47729,0,0,fb9a3faae532a190b209638889d4832a1d191c04842bce7afb041141eec369cb,2024-10-23T20:40:24.640000 -CVE-2024-4773,0,1,c88fcfb8d640980d832df1cf5b676bf39ca6d5e55514e83e57245e27f9946e0c,2025-04-04T14:26:28.713000 +CVE-2024-4773,0,0,c88fcfb8d640980d832df1cf5b676bf39ca6d5e55514e83e57245e27f9946e0c,2025-04-04T14:26:28.713000 CVE-2024-47730,0,0,b8ab69565811f96183150dac4d5714a96a841ef26cbac4bc65539534dc14daa6,2025-03-13T13:15:41.593000 CVE-2024-47731,0,0,2756673f447be2086c764fb0084779dae2a0a2504478f334b1544eccc1563c5d,2024-10-23T17:06:14.323000 CVE-2024-47732,0,0,05bbc804c4a0c0d9d685cce21a450e0245c74d19ed4566d6c1d9947b0a7b8a56,2024-12-20T15:44:01.303000 @@ -270369,7 +270370,7 @@ CVE-2024-47776,0,0,ebc69c066f78b5df59a8c04c3f55466a58fec64a9c2c7a21973d30e06d3f0 CVE-2024-47777,0,0,2a29e78cc4ca1940f2b2a056a1c142af892d96123c7ee6479ec3e72abefaab87,2024-12-18T19:40:54.580000 CVE-2024-47778,0,0,2c0b53628bbbeb9f7755c68335a3e4a5b76ad850cb4342d00de4e3f441a9fddd,2024-12-18T19:34:23.850000 CVE-2024-47779,0,0,cc1fe94fa7360af2d2da1cf080b73af65c7e078527e70d09b955c8c00441ae84,2024-11-12T17:15:08.037000 -CVE-2024-4778,0,1,ee1fad08b82bbd100540dcfbb398440891fa3733bd697579d868345a20434f27,2025-04-04T14:26:15.660000 +CVE-2024-4778,0,0,ee1fad08b82bbd100540dcfbb398440891fa3733bd697579d868345a20434f27,2025-04-04T14:26:15.660000 CVE-2024-47780,0,0,7663ff45af636c13b030ae6fb174e9903ff436d33bf119a27c44ca85ee88de6b,2024-10-10T12:56:30.817000 CVE-2024-47781,0,0,b57385e6a990efab2995a44de3e433000586444bbd22ef349017ab8044f3bcfd,2024-11-14T18:19:28.180000 CVE-2024-47782,0,0,aea12cd12b139670528cb559076d430b505402dadabc98ae5bd0b14d0824b1de,2024-11-14T18:19:34.127000 @@ -270470,7 +270471,7 @@ CVE-2024-47896,0,0,ac5033b7967d89a6dc45f6be553bc426bd15426b07612c8d75a85a0162c10 CVE-2024-47897,0,0,43de61f3d9732c029298f61d67d2b56903f91c6fc88a72bdb868652d4446e1a4,2025-01-13T18:15:19.310000 CVE-2024-47898,0,0,513482fd388d7327fd69873664f5aeed45e54fea8a34bebe01a6fc557331fed5,2025-03-20T15:15:43.130000 CVE-2024-47899,0,0,77555423d1a2e6f3dc46df22e1b7f8b4f26ffdde5e87cd053f7d661d963d8c0d,2025-03-18T20:15:24.170000 -CVE-2024-4790,0,1,d4317a424cc47a8c81c2375f4faaac12e4bb48da0ff9dd3b4ae3bf9fb5340746,2025-04-04T14:28:44.907000 +CVE-2024-4790,0,0,d4317a424cc47a8c81c2375f4faaac12e4bb48da0ff9dd3b4ae3bf9fb5340746,2025-04-04T14:28:44.907000 CVE-2024-47900,0,0,54591eb3493a239f1dd6368b680394b611719eddac2cfef182f3e53a1dd5831d,2025-03-14T16:15:36.403000 CVE-2024-47901,0,0,bc6e68f4100c7fc7c2489e2b59be40a485aac52b0fd7227f9cd6752d9648a1e0,2024-10-30T15:39:47.430000 CVE-2024-47902,0,0,5847538487762fb6b84add44ea56e06c5a9e7fa9b930bee7079edcb3b40993d4,2024-10-30T15:48:39.207000 @@ -270697,7 +270698,7 @@ CVE-2024-48278,0,0,809b76f1153de7810326cf668dcd28c7e3645b99c11b47ecf4bb4d9ed523f CVE-2024-48279,0,0,78d52871c8d5081ec92507e368e8935dd7472beb937433183ca09aa82a1cedc4,2025-03-31T17:19:22.290000 CVE-2024-48280,0,0,adcf291220a50a17ee9e62ca57acfd894f81d1920dc855db25c190a8f1957fc3,2025-03-31T17:18:48.330000 CVE-2024-48282,0,0,857895f3b579ee3c7817f1f1ae932b57ea8e93e9891d2d40c41472e0b9e3de8a,2025-03-31T17:12:33.610000 -CVE-2024-48283,0,1,f9813da5f07adf5eb0b828cacb908c1409eccc65eadc9e494240da0cf6bec055,2025-04-04T14:36:27.653000 +CVE-2024-48283,0,0,f9813da5f07adf5eb0b828cacb908c1409eccc65eadc9e494240da0cf6bec055,2025-04-04T14:36:27.653000 CVE-2024-48284,0,0,24131b37e3503d0f88373eeb49e74a1db93f0d1406d2b59ea2afec5f898f0a92,2024-11-19T15:45:55.450000 CVE-2024-48286,0,0,a2ee2817026e105eca7578f1a1a8fb654da208c74bd3dbf196d7d8b7a43390e8,2024-11-21T21:15:22.483000 CVE-2024-48288,0,0,b52abc73f5b8ed557e65603321e0a02188dc824bd7269c8ce602220f2a6ac1f5,2025-03-13T14:15:32.297000 @@ -270802,7 +270803,7 @@ CVE-2024-48570,0,0,3435b97fed6be571814415d23490ac0110cb83030a16079bb75dc360800ff CVE-2024-48572,0,0,6d5785fce72ca2ddd42db373b794484e78d96ef19eea2eeb6a6e88e8d5c5acca,2025-03-14T17:15:47.973000 CVE-2024-48573,0,0,319c010359dc52550434a4c4f15fac57ece69fd003ab76af3c926ec42850a31d,2024-11-01T12:57:35.843000 CVE-2024-48579,0,0,dee7c78d0702c64a8f39cc4036ed6080e70421fd088c94b956bf94e50f9f0a08,2024-10-28T13:58:09.230000 -CVE-2024-4858,0,0,a38cde05751dd48d794627be03be7ec23e1f86d4fc59d67419e28a011457e333,2024-11-21T09:43:44.713000 +CVE-2024-4858,0,1,1548d35291b51ac1157133f3a9dd324ad3bf46f6b71adfad39b5e88bc9095fb0,2025-04-04T16:55:05.810000 CVE-2024-48580,0,0,e540b5d156a186615d240d0f099de52f053b3a0dab4d95b774286d8b7357b132,2024-10-28T13:58:09.230000 CVE-2024-48581,0,0,d36eaf42a8c013f5398a1310ef6b2089c8383aae1cbd0f696279268a4ee67822,2024-10-28T13:58:09.230000 CVE-2024-48589,0,0,da15b9606dfd0e77f375ffad72377af01dd4bccbaa88f234dfa1d5b761376490,2025-02-11T15:15:17.637000 @@ -270876,7 +270877,7 @@ CVE-2024-48760,0,0,2c515de9d3808545a7fdee77c025d0a4f76a44cfac1a6b1790d2a3a6eabc5 CVE-2024-48761,0,0,8192a1d746e586fb347fede8858deb4679e9f58ebe16044c76f02b9ce1da5a65,2025-04-03T15:15:47.360000 CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000 CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000 -CVE-2024-4877,0,1,4c402d77c5b879a7101db1d591c1c3560317abf57e24b9532acb313311b9083a,2025-04-04T14:15:20.973000 +CVE-2024-4877,0,0,4c402d77c5b879a7101db1d591c1c3560317abf57e24b9532acb313311b9083a,2025-04-04T14:15:20.973000 CVE-2024-48770,0,0,3e66352e1521b9d6543412a56ab61f680bed31dc0a12a74770aeefc4f0bcda78,2024-10-15T17:35:07.440000 CVE-2024-48771,0,0,ef084eca4dbd5d4b7e58c7464a6053da196bbe2d27f396e5e5a98bab4e847c3d,2024-10-15T21:35:33.747000 CVE-2024-48772,0,0,5154e4eb5ade804c923c90daed58ff1878c3b3640c66dd4cd99806ab82fae85c,2024-10-15T19:35:40.267000 @@ -272124,7 +272125,7 @@ CVE-2024-50216,0,0,173c858fca904c6b8ae3808e39fe7eb2abffc64106c67c7401645a4703374 CVE-2024-50217,0,0,b147ad2d6076701e61433d5b83df01df4acbb73e8afe3b2afa817dd4b2f55698,2024-12-11T15:15:13.550000 CVE-2024-50218,0,0,0fb6d6d645b3a2c6757f1c38779b956e24c411c7561ebff1cb364f4755c7ba07,2024-11-12T13:56:24.513000 CVE-2024-50219,0,0,57ca6b6c0667d0c6ff47560f6866cfa36318c7798583ecd36bd30e6bd0856676,2024-11-11T14:15:15.210000 -CVE-2024-5022,0,1,5de64aac4585fd059094559c23d3bd22dabb2bb36a7ccc04d6ca05fd3dab3f7e,2025-04-04T14:25:28.007000 +CVE-2024-5022,0,0,5de64aac4585fd059094559c23d3bd22dabb2bb36a7ccc04d6ca05fd3dab3f7e,2025-04-04T14:25:28.007000 CVE-2024-50220,0,0,2f5b08a8a976fb59cd4153656c002fe303de6f26af5c2fe468160ef65aaab472,2024-12-09T22:15:22.400000 CVE-2024-50221,0,0,774a827bf061d12bcb20367dd091f01ce7a3e3dbe5b9d33442f46fae674c45af,2024-12-11T16:15:12.310000 CVE-2024-50222,0,0,e48bbe4f4c32f317caa534e65c9c030211f66bfc035d024a84693bf51e94c68b,2024-11-13T19:23:10.880000 @@ -272517,7 +272518,7 @@ CVE-2024-50595,0,0,18d5b49dc14afc3d88e25155540dbc46c9a0ae26ee70ee67ea7b78cfe1e74 CVE-2024-50596,0,0,a6a5bf2944df51a87c0080ce83da746ec8ca68f90440def6aa1a522797555cd9,2025-04-02T14:58:07.527000 CVE-2024-50597,0,0,97b9069e5db742f4e7cb258e4530299c275bf9ea7cdf2d9f6c7d4f6f8891b14c,2025-04-02T14:58:07.527000 CVE-2024-50599,0,0,99b41d9153a383085a781f702eda5c5b6c0a4c09361c5d793d58b32c7c8c4b07,2024-11-08T19:01:03.880000 -CVE-2024-5060,0,0,845038e4a95f0bd53ec44e2979a91c4fae965491e7a64988d969832e7a36495b,2024-11-21T09:46:52.847000 +CVE-2024-5060,0,1,9259331461b85b218344bae9506c1ccc79a5eb7cd745e49fb425d4b8636feb8f,2025-04-04T18:07:39.117000 CVE-2024-50600,0,0,1f18a87c7801886bd3cde354ace808a7f14db6d1a9a3674ff94ef2cb61a86901,2025-03-07T15:15:13.750000 CVE-2024-50601,0,0,f1ed1f41be3342c5f62bc0e6c95ce90f7003505883e3692b4481b9f4c5037234,2024-11-12T16:35:22.810000 CVE-2024-50602,0,0,4b4971c64777a836fd26303daa5582edc7318e926eac34f5212c388d763a3479,2024-10-30T18:35:16.237000 @@ -272754,7 +272755,7 @@ CVE-2024-51060,0,0,de7bf14fdaea8b78c02e0c6fade9921621bf0bad2bf2c2ffc485512c88306 CVE-2024-51063,0,0,baaa401f76f83c10a16a16ac2300c7ff206c0294cf7e048885c9427fd5cc3d20,2025-03-31T19:26:46.460000 CVE-2024-51064,0,0,8c98c114e76bc1bd024a1bc62e5d3e352526cdd76914057f4ebcb0ef5f381d29,2025-03-31T19:29:12.110000 CVE-2024-51065,0,0,3b3e6650157f1931a47712b62fd9a2e7477a5d52ec6634effed03cb5c0e92c45,2025-03-31T19:29:35.613000 -CVE-2024-51066,0,1,719967463781894a1505f17ba930ddcf40cb6245c8209bd6a3b4310a2e236ce7,2025-04-04T14:35:51.453000 +CVE-2024-51066,0,0,719967463781894a1505f17ba930ddcf40cb6245c8209bd6a3b4310a2e236ce7,2025-04-04T14:35:51.453000 CVE-2024-5107,0,0,2f055a04ccbd78b9c8df18cf46dc307764a3b6508de2a8d7063f4779b98b5648,2025-02-21T21:18:28.707000 CVE-2024-51072,0,0,e3822fe995b8ac5db401be8bd0f5c664092585f4b74280cebfb9be6c17c2b406,2025-01-10T15:15:15.173000 CVE-2024-51073,0,0,52da459c3ef5c9293f67a8ee07e0dcd515c5fbb668c564d0aba68f9572bb2ca3,2025-01-13T15:15:08.727000 @@ -273257,7 +273258,7 @@ CVE-2024-51796,0,0,5e97f37144b83a04f5f53253e93cd39ae175eb97283905961fc6a9177162b CVE-2024-51797,0,0,7f10cf518b86cc5021b377ec8331106e47c33ec4fbf5b6a630b8f5810af030ea,2024-11-19T21:57:32.967000 CVE-2024-51798,0,0,394aeaf44699c10891dc2edc5891496b0dd7ecd97ceb03a57c4e1a07a662f664,2024-11-19T21:57:32.967000 CVE-2024-51799,0,0,cb44169816e55f280f544cb044bcfa85ddd775a97e392457eb1fce5931001515,2024-11-19T21:57:32.967000 -CVE-2024-51800,1,1,237a4df95546c748fb0664811b104979613e1c27b686c680db984e5caa456f51,2025-04-04T14:15:21.140000 +CVE-2024-51800,0,0,237a4df95546c748fb0664811b104979613e1c27b686c680db984e5caa456f51,2025-04-04T14:15:21.140000 CVE-2024-51801,0,0,fa1a5f3656080b844b0f652217b35d925cb497b462eb225a21c780cfa2967b8d,2024-11-19T21:57:32.967000 CVE-2024-51802,0,0,aa95d43369617b3a2ca72b1faa8fb5b75c3a51e670aa2d0620785e1b838cbde6,2024-11-19T21:57:32.967000 CVE-2024-51803,0,0,0d426fd677c36c63a5a1e3745ffd36e3668a58f2c721f23cc0868bc8355393f8,2024-11-19T21:57:32.967000 @@ -273523,7 +273524,7 @@ CVE-2024-5216,0,0,a6cb0d78c97f1833668004bce4e1a3d8ad03ce71671240c1316442591a36a4 CVE-2024-5217,0,0,5b83923523915a13dda717eab3ed5d3c4f18a57392e41e5f9e74c1fc63ef9123,2024-11-27T18:56:05.783000 CVE-2024-5218,0,0,4adcb0c34373dcdf3d317dd8a7e6d0439942258855805a791e5be6a5f3796ff5,2024-11-21T09:47:12.460000 CVE-2024-5219,0,0,7cf0107a9880b75aa136d81f90be88192efdf2375e4d20d4be5680b2efca368e,2024-11-21T09:47:12.590000 -CVE-2024-5220,0,0,67da1dac20cf2db2e51397f6e88efa88a4ac596113cd0bb1fd626b2afca89613,2024-11-21T09:47:12.723000 +CVE-2024-5220,0,1,69da7d115cdf14c9a1bd8a5b7b80149708910b62249c874a012fee063b0a162f,2025-04-04T17:02:08.347000 CVE-2024-5221,0,0,698892eedd10f8713e96fd7316678f2f719bec7d0e9c6ec3f213f32cfd110ce3,2024-11-21T09:47:12.847000 CVE-2024-5222,0,0,765bdbf94274795e0fc1b811fd6f135d689fec521f11dafecd72c01866fec2fb,2024-11-21T09:47:12.967000 CVE-2024-5223,0,0,95f7d2fdf2e33de84dfa41b5e6bd5f7fa2a48058f5fdaa0fdeb029222c73bc3f,2024-11-21T09:47:13.097000 @@ -273549,7 +273550,7 @@ CVE-2024-52286,0,0,099dc10e23bd2388032d09d5b4d1b355b51f601c6e8bd937fd8376c472aec CVE-2024-52287,0,0,200e1cbd5dd57354b477bf1e5ec07db5f1d467b3f5187030e6ea1f20f4478947,2024-11-21T18:15:11.570000 CVE-2024-52288,0,0,8d525251961ea21fa1c11c629cd4e1986e4f5cf4d8798e7e276f2d30c27f2922,2024-11-12T13:55:21.227000 CVE-2024-52289,0,0,a0bee5f59381d5db18f5e7a88c678f15991ab65396ec59ef098e08a7c117ebde,2024-11-21T18:15:12.060000 -CVE-2024-5229,0,0,6e6627cb6c8c0cf2e38d50f10ba8e1d1f0f9ec5ad3ec116e32d415114682c6c8,2024-11-21T09:47:13.807000 +CVE-2024-5229,0,1,f061053c083593483037013a5e9475a1023282c96db9171dc029c25b2b4b140b,2025-04-04T16:46:09.133000 CVE-2024-52291,0,0,67366554fa12fc5f80ea7a37ab4efbcf755b65176915cc467a885e5d178f478a,2024-11-19T18:06:42.973000 CVE-2024-52292,0,0,98ff7782d74c8a880b21aa3925ef392e3d7f9afb5fb086d700b2918ea0d38572,2024-11-19T18:27:21.567000 CVE-2024-52293,0,0,48995c1833d437873320d2a00d4716843128fee61b180655a95bba4546c3a839,2024-11-19T17:51:39.460000 @@ -273898,7 +273899,7 @@ CVE-2024-52714,0,0,d68bd2e6ba70a01a513d32cac86943fd8254d4c3004a24bfd1d27a6a8a932 CVE-2024-5272,0,0,fdbec5333cf64f4ba2599bc33574360d57e60dfadb483e1b524d6c59f71a8f55,2024-11-21T09:47:19.460000 CVE-2024-52723,0,0,5294f4913cfa18e6b4a1234025de78af92fb40d1d3854cca46f94b086127876d,2025-03-13T18:15:45.350000 CVE-2024-52724,0,0,30b8a3d6a9741c46bc5b8b7f06f527180966ee6ba100cd8150e213f1d6a21cd5,2024-12-03T15:15:10.943000 -CVE-2024-52725,0,1,717a7c0afea3bd329ebdf60a8219a2e963ef6fc34dff1a4e50031d8d0b7bcac2,2025-04-04T15:06:47.357000 +CVE-2024-52725,0,0,717a7c0afea3bd329ebdf60a8219a2e963ef6fc34dff1a4e50031d8d0b7bcac2,2025-04-04T15:06:47.357000 CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000 CVE-2024-5273,0,0,f38807e90518b44431e0cfc096b8d017e2d345cb4d93d9e9623d44a767f39524,2024-11-21T09:47:19.577000 CVE-2024-52732,0,0,4ca154eb1f5fd81030336111a38008c8fe0f668bf712f5a43c85e6f662721089,2024-12-03T16:15:23.540000 @@ -274405,9 +274406,9 @@ CVE-2024-53319,0,0,504250b0f69d16a3cc3801c2bbde4ee72d07fdb764bdfafa75eaa85885381 CVE-2024-5332,0,0,1bf02601401a5cfa3a271a75853b96cdcfd3e0b6b58677457c39ef4ba15b4069,2024-11-21T09:47:26.403000 CVE-2024-53320,0,0,c0ab61e5ad040dc2e73e2a9c67587cf91fdaf7884054cb7c117a2b735a98de10,2025-02-03T21:15:13.373000 CVE-2024-5333,0,0,ca365b0ec9b98451e4f093530c18de841de4387827ff042bada205a635c53f76,2024-12-16T17:15:14.070000 -CVE-2024-53333,0,1,3097ce843f1b937ec1a7ef4d76b9980c4dfc7d5e95bead1d317597a1bfa10725,2025-04-04T14:40:24.837000 -CVE-2024-53334,0,1,57617107144566c73705461b4de52fe9589e1438a8e56ea9d201a3c68b0f4f8f,2025-04-04T14:40:03.633000 -CVE-2024-53335,0,1,cf5b481b50b4fd960c52c2b505ef59631d7a8a58b104a08c70ba8f65cc30d6cc,2025-04-04T14:39:54.600000 +CVE-2024-53333,0,0,3097ce843f1b937ec1a7ef4d76b9980c4dfc7d5e95bead1d317597a1bfa10725,2025-04-04T14:40:24.837000 +CVE-2024-53334,0,0,57617107144566c73705461b4de52fe9589e1438a8e56ea9d201a3c68b0f4f8f,2025-04-04T14:40:03.633000 +CVE-2024-53335,0,0,cf5b481b50b4fd960c52c2b505ef59631d7a8a58b104a08c70ba8f65cc30d6cc,2025-04-04T14:39:54.600000 CVE-2024-5334,0,0,cb79190d7e117b2165ef511634fe8d33c9e23cab24dd6ad00dc4efad8b756c7c,2024-11-21T09:47:26.523000 CVE-2024-53345,0,0,f122664bf501aa1be2960db7352db8f065380488d2573ffac2bf7a21da16724b,2025-01-07T20:15:29.923000 CVE-2024-53348,0,0,d6e4fb04c174ced1693c7da7e37d808e1ba05422e9c7a4947111466ae715a147,2025-04-01T20:21:41.540000 @@ -274469,7 +274470,7 @@ CVE-2024-53484,0,0,0fc6633eb0bb323c7c1b56ffa21d5cd5b78570e350e583a38942d8a30f904 CVE-2024-5349,0,0,75911b9a04c41ba625bf561a6fda73d6a6249d16eb1736f313b0d58e1202f17d,2024-11-21T09:47:28.357000 CVE-2024-53490,0,0,229997de596954b948d854ed350eb8461ad79b06939654658f3b483b570ec130,2024-12-11T17:15:19.903000 CVE-2024-5350,0,0,96d11c8e31022561524caa809e0cd78f545854ba6dbf3bb0f9f80968626b9017,2025-03-01T02:41:15.660000 -CVE-2024-53502,0,1,877c583ef29b126aadc317fdb70da023ced288d1cc148d9762da8722dde21234,2025-04-04T15:06:43.840000 +CVE-2024-53502,0,0,877c583ef29b126aadc317fdb70da023ced288d1cc148d9762da8722dde21234,2025-04-04T15:06:43.840000 CVE-2024-53504,0,0,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000 CVE-2024-53505,0,0,429565da56ff3abdf2d5572d186f8d39966f1f694a5c9ddaefd7405363575dd7,2024-12-02T17:15:13.257000 CVE-2024-53506,0,0,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d8db,2024-12-02T17:15:13.497000 @@ -274521,7 +274522,7 @@ CVE-2024-5362,0,0,65cc93fbb06de51acd392fcf91df16bbed3865e6bb98fea60125a3f2dc4dd4 CVE-2024-53620,0,0,0ec00be95852a0998a14f46021597d58d0eefdd89109b46c5f804a1cf687bc07,2024-11-26T20:15:34.050000 CVE-2024-53623,0,0,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d8289e3,2024-12-02T20:15:07.917000 CVE-2024-5363,0,0,1a1d04dd62a3d9ceb936776096c694704c071db758e0c336b93f44ac203c6bde,2025-02-10T14:41:03.540000 -CVE-2024-53635,0,1,7a67e9e0d9d71b612bd6cfd95f53056a7f326cdca18b0bdba544dd72fd3cefe4,2025-04-04T15:39:01.230000 +CVE-2024-53635,0,0,7a67e9e0d9d71b612bd6cfd95f53056a7f326cdca18b0bdba544dd72fd3cefe4,2025-04-04T15:39:01.230000 CVE-2024-5364,0,0,aa5f84f14464447d90ef8caf1f257dc2f279cb9cd3689bc4d8a6e5bed5923442,2025-02-10T14:41:25.130000 CVE-2024-53647,0,0,cfcb346f723938ad054c8fdc72391827a75db16440dc5160efbbab2c409a3044,2024-12-31T16:15:26.437000 CVE-2024-53648,0,0,45c01bfa5a9acb65ae01f03972d763b96e09818681d1d686dc2d5d5e84b1288c,2025-02-11T11:15:14.460000 @@ -274815,8 +274816,8 @@ CVE-2024-53969,0,0,1a08399271b104b41a52a21217b378af82c422b54a908305c9d9a4310dade CVE-2024-5397,0,0,e240e353d0c3a2a1734a4b7c92d19485fc4c6abad443fc8646294b9e529895fe,2025-02-10T16:20:41.830000 CVE-2024-53970,0,0,01ad1c9f6d7624438797fa1c48f22543558b20c1d1e10c1773cd31b7052f0679,2025-03-19T17:15:40.750000 CVE-2024-53974,0,0,52052a572e52b9dbc089a516bde1b3fe92dc22cc036b47b932527a527df79bc8,2025-03-04T14:04:30.393000 -CVE-2024-53975,0,0,1c6eb06597883327a72f325fc0f751cbd0dc5c99b87a33d8b2ef4784e7416fa6,2024-11-27T15:15:26.923000 -CVE-2024-53976,0,0,e0e34654e2920917adcad83ccc486a90e5a6d39da581d67f84c5bbc103fd6b7b,2024-11-26T16:15:21.430000 +CVE-2024-53975,0,1,1ef4582fd4bc5bf12a2226ef1587e7e199747f5394364a72a9c8e29bbaf92b0b,2025-04-04T16:19:53.597000 +CVE-2024-53976,0,1,3c4e290755b1122ca5eef12abc826a22f34cb5f7c1451690e25b02ebe35b73d5,2025-04-04T16:15:43.123000 CVE-2024-53977,0,0,379c288a87ade1ce92aed60d080a9706136a00417615f6a0b567d55784aea895,2025-02-11T11:15:15.063000 CVE-2024-53979,0,0,172b408869a05417a1da8cf6907f79662a75490e703fbb88a760f582875697a1,2024-11-29T19:15:09.847000 CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000 @@ -275322,9 +275323,9 @@ CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332 CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000 CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1a6d,2024-12-20T14:47:44.153000 CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000 -CVE-2024-54530,0,0,9c261072aa622e7a13704294eff6db1932b03f54a5c98bdd5c5ba2f4fe842896,2025-03-18T21:15:31.120000 +CVE-2024-54530,0,1,23638b1eec706eaed2dcf31930775e94252f335f074755fcd069fd8e6d65df92,2025-04-04T18:14:14.273000 CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000 -CVE-2024-54533,0,0,4e871d3ede733c13aec44397d5f8d815276ac334b4f657fe188b8e1ec3bd68c5,2025-04-01T20:26:22.890000 +CVE-2024-54533,0,1,e77b0442bab9e5467f39ffe9edf0ebbe612e0857f5a2de6ba5305e9445f5b8a2,2025-04-04T18:19:26.080000 CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000 CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e790,2025-01-23T22:15:14.160000 CVE-2024-54536,0,0,c98f603f951680ba4768b8a781e9ee4b1b50a2e9974ad3ec2a10b1d650e3b438,2025-01-31T22:15:10.077000 @@ -275336,10 +275337,10 @@ CVE-2024-54541,0,0,f19c7b13045c8627a2b5a1173512bbfb9d625759e2824642b40f1cbcb1e14 CVE-2024-54542,0,0,662a7c4c4af757188b4b981c4e65556e8c00ea70c392f13ee5dbc84e99a3669c,2025-03-24T14:53:26.340000 CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000 CVE-2024-54546,0,0,74d2474bedbfbd0ad3c983a84a08e8278cf35ea05d87ada33d51119288ecc61e,2025-03-14T11:54:22.363000 -CVE-2024-54547,0,0,f0df4a69c2c5a0515a64a227ed85145652baa3928034934a828c236d2acf36ae,2025-03-24T18:15:20.940000 +CVE-2024-54547,0,1,630bceba1218c696ab9f90e43765a5728e73fe7e15b6ca65987163870f2e1e9f,2025-04-04T18:13:51.127000 CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 -CVE-2024-54550,0,0,cb5f640e320b73770998ee626c9b44b663537cf2c840485556eb8cd618714818,2025-03-19T19:15:42.697000 +CVE-2024-54550,0,1,896885be463b80a019b7bf37f52b6cbfc471ab5a6077126c3f2cb090c1b11092,2025-04-04T18:19:54.637000 CVE-2024-54551,0,0,c1d442e2b95c4314a061be15cb2a3adee0edf9c481a85a34152f51fb73f80036,2025-03-24T15:10:00.670000 CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000 CVE-2024-54558,0,0,6df7f918c0bd43abbaf5bd0dbdbfccbd8008cbb005870f82309cc6ed2738032f,2025-03-27T12:15:13.477000 @@ -276609,11 +276610,11 @@ CVE-2024-56972,0,0,98acd6acd98c6f5290bb615c9d8f957523c0a42981f4e179e443761ee06a5 CVE-2024-56973,0,0,12253d0e48ffb1ddb87cfc0c04c4260295d24963d70f90644e9d09df8a4718db,2025-02-28T17:15:15.730000 CVE-2024-56975,0,0,0071cee7474680c346b3b2fad2bfb64294423413b194d68dd676ce33bd94892e,2025-04-01T20:26:30.593000 CVE-2024-5698,0,0,44127f605325468d176f78917e01b48d4267668ec2c2568286216f422611e552,2025-03-14T02:15:15.520000 -CVE-2024-5699,0,0,1f6b745154d0c66e136c94c9cf6848fa0ef03de7ad43314ef7aabc398131e7bc,2024-11-21T09:48:11.727000 +CVE-2024-5699,0,1,1730c9027af76599da8d9065a8791c28c158ddf15d1c6df442aeda60bd4e144e,2025-04-04T16:30:29.173000 CVE-2024-56990,0,0,d73542476af2136f4500771d27d3e44f35a9b22fb9d2fc461dbdfee0bbfd6f0c,2025-02-04T16:15:39.010000 CVE-2024-56997,0,0,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b7e9,2025-01-21T20:15:35.757000 CVE-2024-56998,0,0,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000 -CVE-2024-5700,0,1,74581d1dc6980026887eecb9624ffac50dafc887943244cfba41a9e32a84bebe,2025-04-04T14:41:15.230000 +CVE-2024-5700,0,0,74581d1dc6980026887eecb9624ffac50dafc887943244cfba41a9e32a84bebe,2025-04-04T14:41:15.230000 CVE-2024-57000,0,0,460306b986b7afa4a0ccfcddb0d7bb17c2025a91b33826727edbdf18f762d9e4,2025-02-14T18:15:23.743000 CVE-2024-57004,0,0,33a0b0d1e68381c2f532216bd5b0302915286f3268a0db0f05849b63a54f698f,2025-02-12T20:15:35.330000 CVE-2024-5701,0,0,502df47d2834cfde51efc53aa8d74d099675d02fe58e8212a4ba204424388c51,2025-04-03T00:44:22.550000 @@ -276626,7 +276627,7 @@ CVE-2024-57016,0,0,4e818afddc110462a6d6db922bd76607d22dbbb0370f3a037f99123702528 CVE-2024-57017,0,0,54624e242a7ea72e546dbcbe3522ad91dfa297cefabac8b613307955396e3be0,2025-03-13T15:15:50.090000 CVE-2024-57018,0,0,88513ced169b42c06a35f5f3dad8af71ece115206cec42a161e21a49cc4393f2,2025-03-13T15:15:50.280000 CVE-2024-57019,0,0,51cc8b086b8447cea4ec896f4a4e59d09678a95b81b389fa4b6049d603cd1d19,2025-03-18T20:15:24.637000 -CVE-2024-5702,0,1,46851f1756dd66eea830b3b7d3dc4d6eca2ef05336d8fdc903ddfa1de8f231a5,2025-04-04T14:41:47.353000 +CVE-2024-5702,0,0,46851f1756dd66eea830b3b7d3dc4d6eca2ef05336d8fdc903ddfa1de8f231a5,2025-04-04T14:41:47.353000 CVE-2024-57020,0,0,9454e1c3b56fc45c0cf376ca86b2277ead569dba13637690be836b10ddc0b8da,2025-03-18T19:15:46.330000 CVE-2024-57021,0,0,4e02a1a1bec219ce4f69eb8f189a0e8d3940ae0a17e643c7e16854af9c4e4cd2,2025-03-20T15:15:43.837000 CVE-2024-57022,0,0,c99a0b15c70fa516c5e22b536ddcece1907ef44e69d46228494e189b49dab6e4,2025-03-19T14:15:38.007000 @@ -278002,22 +278003,22 @@ CVE-2024-6595,0,0,708743cb0dd8761b2423f5f4f98b19d1658bea678f21c4d0ddf84d722b1d3b CVE-2024-6596,0,0,18c01b3184394b310a5c001c683f19c2dcf0dc5318f4dc7d14b3c915c86ad759,2024-10-01T12:26:45.967000 CVE-2024-6598,0,0,664cc8f630bed97118df78392d0a215a1df1dc1e425293b118aaf79e7793985e,2024-11-21T09:49:57.550000 CVE-2024-6599,0,0,cdfa5c27e772f02570364145b11dde3af22bdb21f9077ee38e2046e1f7e15167,2024-11-21T09:49:57.677000 -CVE-2024-6600,0,1,64a28c83b6964e6b6c2e89ad79ddf424b7fe5f084ec65031ae0576f96341cb50,2025-04-04T14:43:43.843000 -CVE-2024-6601,0,1,afb9fcfe7f6ea37723537bb16db9bd887cd8581d0da4a4b3b1c01d3aad7570d2,2025-04-04T14:43:32.947000 -CVE-2024-6602,0,1,d6e412df6954e343a4aaf7ff7ff477fb36633262ded46f01ebb31bb7479f35e7,2025-04-04T14:43:23.430000 -CVE-2024-6603,0,1,d66ff42aa6e20fbe6a840d34cb25f5aeb5e04fc6bc4c033ea27a05935da9ff53,2025-04-04T14:43:16.317000 -CVE-2024-6604,0,1,bfca8be9aae2ca31b452dcefe904e825f8623e55a190f66f87e3507965683902,2025-04-04T14:42:46.880000 -CVE-2024-6605,0,1,cd22fab5ee8bfdcacb0242d1929cad5eb7882208fe1ec1f01f13b25f43789ab4,2025-04-04T14:42:37.460000 -CVE-2024-6606,0,1,ca670fc0b060333d0f7d725230b97a7944927b2a73644ab13441cc1da0fe7b5b,2025-04-04T14:42:31.167000 +CVE-2024-6600,0,0,64a28c83b6964e6b6c2e89ad79ddf424b7fe5f084ec65031ae0576f96341cb50,2025-04-04T14:43:43.843000 +CVE-2024-6601,0,0,afb9fcfe7f6ea37723537bb16db9bd887cd8581d0da4a4b3b1c01d3aad7570d2,2025-04-04T14:43:32.947000 +CVE-2024-6602,0,0,d6e412df6954e343a4aaf7ff7ff477fb36633262ded46f01ebb31bb7479f35e7,2025-04-04T14:43:23.430000 +CVE-2024-6603,0,0,d66ff42aa6e20fbe6a840d34cb25f5aeb5e04fc6bc4c033ea27a05935da9ff53,2025-04-04T14:43:16.317000 +CVE-2024-6604,0,0,bfca8be9aae2ca31b452dcefe904e825f8623e55a190f66f87e3507965683902,2025-04-04T14:42:46.880000 +CVE-2024-6605,0,0,cd22fab5ee8bfdcacb0242d1929cad5eb7882208fe1ec1f01f13b25f43789ab4,2025-04-04T14:42:37.460000 +CVE-2024-6606,0,0,ca670fc0b060333d0f7d725230b97a7944927b2a73644ab13441cc1da0fe7b5b,2025-04-04T14:42:31.167000 CVE-2024-6607,0,0,7343f11f44361cdea77b5c968d0ccbefe8f2154574e33d367f1dc4307e1141f5,2024-11-21T09:49:59.050000 CVE-2024-6608,0,0,eb79543db2106dcc04b4b2fe2633c14403a25c43a49c7ac6734b17e10ca2c362,2025-03-25T17:16:12.607000 CVE-2024-6609,0,0,f5e1d110d389906f3e5d7bfb74f9e22bdc269ad3c1301efc6fb7c885bbd30930,2025-03-13T15:15:50.820000 CVE-2024-6610,0,0,ec9a95d49920863d5779754a97927ab1f571b4c8f12feb403f0ca3f1ebe21b36,2025-03-18T21:15:32.297000 -CVE-2024-6611,0,1,b35a12dbbb9f7abd42733b968a7183c9a8fc2c5027adb12eb8719b4934a09786,2025-04-04T14:42:22.100000 -CVE-2024-6612,0,1,ee85e7411d8b5f79fb02f29e19046558e7c158a5cea450cfe74163f1666e5f97,2025-04-04T14:42:13.783000 -CVE-2024-6613,0,1,a32fa3d55720047345620a454c5a43ba0c7db47a60039557a75aeb7fa62b776b,2025-04-04T14:42:07.590000 -CVE-2024-6614,0,1,64fbd72e57f349fa6397ea916df1218cf6a244381344b1ace472d157348c46e8,2025-04-04T14:42:01.330000 -CVE-2024-6615,0,1,56f15b1625af69e76aaee1e9b2d24164768a1b35f46f2f1eb220094b52d7fd21,2025-04-04T14:41:55.703000 +CVE-2024-6611,0,0,b35a12dbbb9f7abd42733b968a7183c9a8fc2c5027adb12eb8719b4934a09786,2025-04-04T14:42:22.100000 +CVE-2024-6612,0,0,ee85e7411d8b5f79fb02f29e19046558e7c158a5cea450cfe74163f1666e5f97,2025-04-04T14:42:13.783000 +CVE-2024-6613,0,0,a32fa3d55720047345620a454c5a43ba0c7db47a60039557a75aeb7fa62b776b,2025-04-04T14:42:07.590000 +CVE-2024-6614,0,0,64fbd72e57f349fa6397ea916df1218cf6a244381344b1ace472d157348c46e8,2025-04-04T14:42:01.330000 +CVE-2024-6615,0,0,56f15b1625af69e76aaee1e9b2d24164768a1b35f46f2f1eb220094b52d7fd21,2025-04-04T14:41:55.703000 CVE-2024-6617,0,0,f528093c572c236cd1d1e54ff153e18db57bd6b26aadf2adc227f9ff60d9a7f9,2024-09-27T21:28:35.543000 CVE-2024-6618,0,0,ce405bede8bee28a96c37263198576a75343d86932af15faa53d7e601e6de77f,2024-08-14T02:07:05.410000 CVE-2024-6619,0,0,0f084494d70281a5b94492aaf63002fb58438f3d1601f3f9db4b953361696a5c,2024-08-14T02:07:05.410000 @@ -278970,7 +278971,7 @@ CVE-2024-7647,0,0,0da56f6c73df35d2a7d51b5a48d8e1fea66c4e08b4639a89c8bc8b39fae125 CVE-2024-7648,0,0,4191bc64ed5bcd5db699232b1fdfb1061666e32a09e9d44d8159fa5d3fea5a07,2024-08-12T13:41:36.517000 CVE-2024-7649,0,0,43c2f00da2a10a191faca752c585abc928fcb55b85485d9b03e4dd0a77632533,2024-08-12T13:41:36.517000 CVE-2024-7651,0,0,f4103fe5e266eb0b16196864d757f58f66ebf7e95022a20e2248cdc27841307c,2024-08-31T03:28:02.947000 -CVE-2024-7652,0,1,ca9a38620fdd9a8f6ff88fcf16ed0702f0cfd066df23fde0e3ba8f730683c502,2025-04-04T14:38:20.540000 +CVE-2024-7652,0,0,ca9a38620fdd9a8f6ff88fcf16ed0702f0cfd066df23fde0e3ba8f730683c502,2025-04-04T14:38:20.540000 CVE-2024-7654,0,0,1f7e712dcef156859faeef0a209d3161628ef51713f854f1dc194529c7f2cc7a,2024-09-05T13:53:16.540000 CVE-2024-7655,0,0,a97d481bcadf11d1e09b2c246f121e70485e8d341cf35d7fef40815e21e5ab94,2024-09-19T18:20:53.617000 CVE-2024-7656,0,0,596f192c76d966ec5319e0f438be93b923ae94e940f6f5a8f6ca16c423186c86,2024-08-26T12:47:20.187000 @@ -280236,8 +280237,8 @@ CVE-2024-9030,0,0,78feab45c35bf9d380107ecc287186e0a3ad362f9e648403c63dc0eecd3d5b CVE-2024-9031,0,0,6965c3417beb239bbcdac503f39630a5b2b6ecb0c8d19360b2384d61352fd077,2024-09-25T16:52:25.327000 CVE-2024-9032,0,0,db412b812677aca225760c66514c98f2114321ea2a955553fa39ac185e979518,2024-09-20T17:04:51.490000 CVE-2024-9033,0,0,c9ce8f3f22810e314a9b6a7070f369471d9e5df9eced517c322686d35f96ab02,2024-09-27T15:56:35.317000 -CVE-2024-9034,0,1,83477657f4c478024a468b60c1ed591537bc193fa91e43c043d2fba1c530e091,2025-04-04T14:37:21.133000 -CVE-2024-9035,0,1,6d89b07dc3c5458bc36ea5fec755f8ed722f72a166febd5b9799b30efe47c9e4,2025-04-04T14:37:30.683000 +CVE-2024-9034,0,0,83477657f4c478024a468b60c1ed591537bc193fa91e43c043d2fba1c530e091,2025-04-04T14:37:21.133000 +CVE-2024-9035,0,0,6d89b07dc3c5458bc36ea5fec755f8ed722f72a166febd5b9799b30efe47c9e4,2025-04-04T14:37:30.683000 CVE-2024-9036,0,0,3bbbfc98a85d5f78d43560ecd3c231db4288c62659683b5c35ebd015a776ac19,2024-09-26T13:32:55.343000 CVE-2024-9037,0,0,61d7d575e9833b1f71caeb12a0ed3faa0ea60057248b15da1a13008ecf46898b,2025-03-31T18:55:16.680000 CVE-2024-9038,0,0,902b50c6d930b124e106a40fd3471c27a76d7b215b07dd7cda1cc7b7441c1dbd,2024-09-27T16:11:37.710000 @@ -280557,18 +280558,18 @@ CVE-2024-9385,0,0,54a6d948bac0786ed036228d65832ecfe873d1db5d56f63b1917a4105742d1 CVE-2024-9386,0,0,40b1e099aced766613386d42a163e901ce3fa54d1f7c244b23685d231017f4e0,2024-11-18T17:11:17.393000 CVE-2024-9387,0,0,23e5a9b00ee68c0d355c0cf0af802e698ca03e82aea8c09da062fb283a81e64f,2024-12-12T12:15:28.727000 CVE-2024-9388,0,0,a384e1a2a5e20f83f3e82e8122300fba57d54de4cc7afabc151230fe8552c0d0,2025-03-24T15:18:47.287000 -CVE-2024-9391,0,1,1ec60edbaba26721ef42ab5671eea929bac0f420ac224747ea458c62434de6f0,2025-04-04T14:39:26.573000 -CVE-2024-9392,0,1,d3533667f60cd07376aeee7c89bdf01c4aca0ab8bdaf8e71f44e2edbac2978c8,2025-04-04T14:39:18.783000 +CVE-2024-9391,0,0,1ec60edbaba26721ef42ab5671eea929bac0f420ac224747ea458c62434de6f0,2025-04-04T14:39:26.573000 +CVE-2024-9392,0,0,d3533667f60cd07376aeee7c89bdf01c4aca0ab8bdaf8e71f44e2edbac2978c8,2025-04-04T14:39:18.783000 CVE-2024-9393,0,0,667033bb1f733528162456e6b641958ce1183e4102095b97e104c792a7b249c9,2025-03-14T16:15:39.030000 CVE-2024-9394,0,0,958ce1f2261ebc7b18d0cf704e326091d699d7faaed1195d3dfa8998ffc30071,2025-03-14T16:15:39.213000 -CVE-2024-9395,0,1,04c2ae09abbf2e826984210bc3bf442882dbf4b681dc893e8787bd1a479f3344,2025-04-04T14:39:09.300000 -CVE-2024-9396,0,1,e08bb61443d412e37108cd39b2fe929608b809a463fd33cd0a9b39e78b5102c1,2025-04-04T14:39:01.967000 +CVE-2024-9395,0,0,04c2ae09abbf2e826984210bc3bf442882dbf4b681dc893e8787bd1a479f3344,2025-04-04T14:39:09.300000 +CVE-2024-9396,0,0,e08bb61443d412e37108cd39b2fe929608b809a463fd33cd0a9b39e78b5102c1,2025-04-04T14:39:01.967000 CVE-2024-9397,0,0,e785e68637a9eb7f98955d1d3605a5e9bd0aa4ae19ce434a28489946af2f3e32,2025-03-18T16:15:26.400000 CVE-2024-9398,0,0,36e3149fe1fdc0528e9410f73ed17f167cbc70551f1fd789ccbf1a7cbb61fe91,2025-03-18T20:15:25.150000 CVE-2024-9399,0,0,d8e406ee1beab284cfa9cbeb45a0d2c953df97248a1bc9b6aef82180ed3da0a2,2025-03-14T16:15:39.400000 -CVE-2024-9400,0,1,378a162b490f2f2889f3214d5cbbae0da5b609b94fd9d0ed6941be28a01fa955,2025-04-04T14:38:55.730000 -CVE-2024-9401,0,1,696167c39b1684c577791ca0426f5c1ba445f9400c3389f6de68323bb29d12c0,2025-04-04T14:38:37.670000 -CVE-2024-9402,0,1,14395e7a747e6cd4107dfa80edf4747cbc47c362541efc4f1347884d3fa9520c,2025-04-04T14:38:30.770000 +CVE-2024-9400,0,0,378a162b490f2f2889f3214d5cbbae0da5b609b94fd9d0ed6941be28a01fa955,2025-04-04T14:38:55.730000 +CVE-2024-9401,0,0,696167c39b1684c577791ca0426f5c1ba445f9400c3389f6de68323bb29d12c0,2025-04-04T14:38:37.670000 +CVE-2024-9402,0,0,14395e7a747e6cd4107dfa80edf4747cbc47c362541efc4f1347884d3fa9520c,2025-04-04T14:38:30.770000 CVE-2024-9403,0,0,e2b388751de7d28f5b3dcc155cbf0eee87876298ee630fc15adeaf8592b8641e,2025-03-31T17:45:09.633000 CVE-2024-9404,0,0,42e12aecb183ff5b0d234b3c0b09beb73cd7c6fba91a9497a94d650a56c0c77d,2025-02-20T02:15:38.303000 CVE-2024-9405,0,0,8642cd3daffd984afd6c8d211f16ccc5e756252d3a00aefbed32c81bc22b44d9,2024-10-04T13:51:25.567000 @@ -281104,7 +281105,7 @@ CVE-2024-9989,0,0,618b83ec3907f65a51fa013819dfb2ad0168aaafe2f1ce04204110fa982580 CVE-2024-9990,0,0,242153fdd1e5955fd6e7a309b2c58cf53a3438553f63cd46d750d9018c4da6a2,2024-11-06T23:11:42.037000 CVE-2024-9991,0,0,d52f7f0e4baa2d457c00639209b566401d8bb298d0ede1bbcb21455e0c81280d,2024-10-28T13:58:09.230000 CVE-2024-9996,0,0,188a485776485f9e8dc9179367e7d7a07cab50fec958b227455a8676b5858255,2025-02-10T21:15:21.700000 -CVE-2024-9997,0,1,51821db7d21cbb0538794082049a61caa9f4a383f155309224dbe8f2cd1118b1,2025-04-04T15:15:46.203000 +CVE-2024-9997,0,0,51821db7d21cbb0538794082049a61caa9f4a383f155309224dbe8f2cd1118b1,2025-04-04T15:15:46.203000 CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000 CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5af,2024-11-13T17:01:58.603000 CVE-2025-0001,0,0,0b53097bff1778de9231713dab9a655e96b466d52a15df3f132fe8a8a77a7f52,2025-02-17T10:15:08.550000 @@ -281391,6 +281392,7 @@ CVE-2025-0463,0,0,4ed981ea896dcf71a48c2c09e72737274c33bfdae5c13459ce01815003275e CVE-2025-0464,0,0,d03e95d8868ae551ebfe743c91a29954286156e5fd7e3c6614a84c0d59d5891b,2025-02-11T14:59:43.043000 CVE-2025-0465,0,0,ac87b8092144ef2d8d1d41ea23b1ff95c3c32177ff08abf13300a7d5c9b19410,2025-01-14T18:15:29.883000 CVE-2025-0466,0,0,9a46a54bec667a669976057bcdf901ab11b6f396748538013cd1a3fe095e1fd1,2025-02-04T19:15:32.587000 +CVE-2025-0468,1,1,f746978e18de30e548ad885bd8d4d37d254cb9e452f31b70d0ce4c26d57d18ea,2025-04-04T16:15:17.873000 CVE-2025-0469,0,0,23e943a358626e0bb51cd71de4b5b382fd5d6568d543329e182c19764211b2fc,2025-03-11T19:57:42.733000 CVE-2025-0470,0,0,f40a32fdbc5ae7b8c32b69b52a058e31320914a0fd6f97992ce5e422a9a061b6,2025-01-31T04:15:09.053000 CVE-2025-0471,0,0,9169e9b54a074f1e0d8f97ed160fc9e64cab0efe853cd7456e368c08c8fa7679,2025-01-16T13:15:06.973000 @@ -281766,7 +281768,7 @@ CVE-2025-0994,0,0,eda51bab1788ff49d0428b581e74a138c45a84d2ffb837b73d45b8cc098d09 CVE-2025-0995,0,0,0a5529eb09e1f54f24a3e7e605d2f8400aae44234054dd248f74781d7e042133,2025-02-19T15:15:16.073000 CVE-2025-0996,0,0,f5bee85fd326d78b72ed64a9f49b28f7be5f9f9202e5d7fbf61706dd2200814c,2025-02-19T15:15:16.243000 CVE-2025-0997,0,0,d60982b4727f69c406a2b69a152e99650b0a7ac4a2979d7c180af9b049e9fee0,2025-02-19T15:15:16.407000 -CVE-2025-0998,0,0,b98f0b713604f6d6debd775ef9a03f9f9afc3c7e8c1e50ee3e2f779bfe4f4608,2025-02-19T15:15:16.563000 +CVE-2025-0998,0,1,7bd42e251687d39d883712104c9eee494ec67b567b03623713d2e55ab05eccd4,2025-04-04T16:15:18.013000 CVE-2025-0999,0,0,166b49d7b2d61d48d7ea1954f6f5aab4508f6556fa77b96626aec99766913261,2025-02-19T20:15:36.007000 CVE-2025-1001,0,0,25822520434c0eee757567b9ac3c60dedccca12f67ad7f4e0649410902d4f3cd,2025-02-21T01:15:09.533000 CVE-2025-1002,0,0,8a0ce274a6014852624cd98f4510a2359e65674ca94a8883697c40c60509bb23,2025-03-03T17:24:28.480000 @@ -282055,10 +282057,10 @@ CVE-2025-1424,0,0,028aeccf06b420fd3ae1e41e07745fbc6608efab9b9570b82ad820d0434865 CVE-2025-1425,0,0,5581bc90886ae6a96bcdd3391932814fcfec4b3e066f6fbd2840021651a3a39d,2025-03-04T16:15:36.803000 CVE-2025-1426,0,0,2876b3a8dca30380599d9579c9abf35d17096290894ef7cda88e0e95c5efa326,2025-02-19T20:15:36.467000 CVE-2025-1427,0,0,b7e473094712eef353836f4dde44e4c76d523f8b97e423856aa00a1873196c89,2025-03-13T17:15:34.743000 -CVE-2025-1428,0,1,b6b5eaf3092f00c2bdcacd835828b86381ad7b2ecc9da08d05c4f8fda60e4711,2025-04-04T15:15:46.457000 +CVE-2025-1428,0,0,b6b5eaf3092f00c2bdcacd835828b86381ad7b2ecc9da08d05c4f8fda60e4711,2025-04-04T15:15:46.457000 CVE-2025-1429,0,0,a48d6ec582d2dad82c65a4daa1cedeefccc3b069798b0ebae06e65b05843be71,2025-03-13T17:15:35.053000 -CVE-2025-1430,0,1,8531120b3666e64a7d867b1bb2bf66d9181094eb6f5b39378bce97fafe3b3952,2025-04-04T15:15:46.697000 -CVE-2025-1431,0,1,6326b988278805c206e8823fc85169a005b7d0544171a7879cf4ac1bdd2c7410,2025-04-04T15:15:46.800000 +CVE-2025-1430,0,0,8531120b3666e64a7d867b1bb2bf66d9181094eb6f5b39378bce97fafe3b3952,2025-04-04T15:15:46.697000 +CVE-2025-1431,0,0,6326b988278805c206e8823fc85169a005b7d0544171a7879cf4ac1bdd2c7410,2025-04-04T15:15:46.800000 CVE-2025-1432,0,0,230507126806f849e3915bac4bc192105fa5d833fd312f680552b0c8cb74cd90,2025-03-13T17:15:35.533000 CVE-2025-1433,0,0,e4257b265cb0fea8237bfb54d6e25ede0c1cfc291c5042720840e13d6e6532c4,2025-03-13T17:15:35.683000 CVE-2025-1434,0,0,a3866a08b633baa47e1218d0ddb17df7ba7c9c2875011d0577de1d45619f3f98,2025-03-11T08:15:11.207000 @@ -282127,10 +282129,10 @@ CVE-2025-1538,0,0,13e428f2e0a70ca29f792d43841bea06ccb32609b695e1ccad7a3e5c918f65 CVE-2025-1539,0,0,5be918eac13b456089d712df20e654187887e4c08708a48e1848fdb356188426,2025-03-03T16:36:49.113000 CVE-2025-1540,0,0,cb4999aaeeb60402765c3628ea219ecf33f2a8090fd69a8d886ff441036aa008,2025-03-06T09:15:26.317000 CVE-2025-1542,0,0,a9111ae1d121858302a425143fcafa1acfd76b2cadd31b091641c132928f8c5e,2025-03-27T16:45:27.850000 -CVE-2025-1543,0,0,dfb74998b01a6403cafc6b46cb4c4c78345f8468d3e985eba5ddcbda95801293,2025-02-21T16:15:32.787000 +CVE-2025-1543,0,1,89adcf79cc26916fe49ba9b7b4fb350e75f3d8f5c3b9371ebbc5a23546775c89,2025-04-04T16:36:37.527000 CVE-2025-1544,0,0,2377ad87743f4fe242650024fb03372701542bc42778ab3d19eda86c524de177,2025-02-21T16:15:32.953000 CVE-2025-1546,0,0,51ef3cbc8ac56bb33fe743735a6d072664b6eb44d4e8fe737f496fc69a6fe775,2025-02-21T18:15:21.523000 -CVE-2025-1548,0,0,c561a3918462f6b591148a53ee4425c5f8190dd5dec137e4a3c6921ec73f5907,2025-02-21T17:15:13.897000 +CVE-2025-1548,0,1,5a037a2812a618e13eb5f5bb377d5941e6e4fd15e8822a71355b52b3d155531e,2025-04-04T16:40:52.380000 CVE-2025-1550,0,0,75c8e2f76fa5dcc08b4c2d337298000f7823f2038d9de13f51ad7331532f5b20,2025-03-11T09:15:25.217000 CVE-2025-1553,0,0,d96596568d35a79921cd22eb566581d3e14afd9146a9b30f63868f2535440701,2025-02-24T17:15:13.540000 CVE-2025-1555,0,0,cf4f7ec4c7f22b94f8768d59c9ac2dc8d623655b78ea6887e44ed58b3a34f68a,2025-02-24T15:15:12.810000 @@ -282336,7 +282338,7 @@ CVE-2025-1846,0,0,a62b0ed535e2a5232c3635ce6629b88ae8acc4efef341d1b110161b231ec1b CVE-2025-1847,0,0,ec0e6a8320e426514c9188308ee4e761c20c9a2d723bf22132b181d1278bf01f,2025-03-03T18:15:36.537000 CVE-2025-1848,0,0,5ab5fd2d0b5fa78c5a97d7cfd5adf624e7bd356e62a20add19ac1bed4fd36c3c,2025-03-03T18:15:36.720000 CVE-2025-1849,0,0,6cbdc0c1a27398724a4a1e8bdcd861e48e0b12f2e0ceb284ec86f592081f9271,2025-03-03T18:15:36.893000 -CVE-2025-1850,0,1,c5aabb4e7ad18759f40a74311fc84c935b8643d1545c186439667dee81bcaae2,2025-04-04T15:19:58.300000 +CVE-2025-1850,0,0,c5aabb4e7ad18759f40a74311fc84c935b8643d1545c186439667dee81bcaae2,2025-04-04T15:19:58.300000 CVE-2025-1851,0,0,21bb6ce5ae51442f18eb0cd84c8788b0eb252ebb94f0d62e136bbc46266f0de7,2025-03-03T18:15:37.277000 CVE-2025-1852,0,0,2b16d071c2b09c94cb51f2257b9169c6423888f4e9a8d14aea7b98b089086c3a,2025-04-03T15:33:51.953000 CVE-2025-1853,0,0,45de6ca124be386cb9fc9357f37516f9bc597196fcf8094e317ca6b001165da8,2025-03-05T21:28:00.130000 @@ -282403,7 +282405,7 @@ CVE-2025-1922,0,0,1fdbfcd12d94a5ad57b30f52de16ed5db0ff53c847fe37289cb3586ffd99e1 CVE-2025-1923,0,0,aa9c030f5e961d239c4345067c1b4a0d550dd67e489ffa0fa0f3ca827b804be3,2025-04-01T20:41:40.067000 CVE-2025-1925,0,0,3e8907474d671021f30053a1ffd66ae023a939cac3cf5a1804936aeffd5df0f0,2025-03-04T14:15:36.717000 CVE-2025-1926,0,0,053259318e8c088e0be087d38c64d0aaa1c161500e55de2a4152c1a78cf9cda4,2025-03-10T05:15:35.347000 -CVE-2025-1930,0,1,e27d05864f3d9f6ebafc49ef3fedf20597ddb9434fbbf0c2cd1b8fbc38c09f10,2025-04-04T15:16:09.610000 +CVE-2025-1930,0,0,e27d05864f3d9f6ebafc49ef3fedf20597ddb9434fbbf0c2cd1b8fbc38c09f10,2025-04-04T15:16:09.610000 CVE-2025-1931,0,0,af8164fe526ea731987cc7549eea9e98de73d45458537b9e7803f34ece876fe1,2025-04-03T13:29:22.950000 CVE-2025-1932,0,0,06875f8291d41f0669a4d6f88c95d5b79106646ee2db9ae9041af3355bd1baa7,2025-03-28T20:09:58.490000 CVE-2025-1933,0,0,991ae8f8122c11392ee1b899ec3e3f285080e08e18917cab29b52f51259016c6,2025-04-03T13:29:37.270000 @@ -283622,11 +283624,11 @@ CVE-2025-22277,0,0,d3953de33b0251c415d71264a93a8d08d09a60d984824c8d1bfdf7718d25e CVE-2025-22278,0,0,cc8f354bce230092658929ccab2063a437175395281c0a62d02df7bef8385557,2025-03-27T16:45:12.210000 CVE-2025-2228,0,0,b8e082346d4d2d148e6a99881a0d1d5f06a659dc8972867638956a785b9cdf28,2025-03-27T16:45:27.850000 CVE-2025-22280,0,0,7e887d74f1380d8cf0e36667690a3957b0ae26b7cf636de27c1eae24280ecf11,2025-02-27T14:15:36.033000 -CVE-2025-22281,1,1,5c966c885a523fe3a57d7713b5fe419f583ff977afbffd497c7b5e45d5ca9dcc,2025-04-04T14:15:21.297000 +CVE-2025-22281,0,0,5c966c885a523fe3a57d7713b5fe419f583ff977afbffd497c7b5e45d5ca9dcc,2025-04-04T14:15:21.297000 CVE-2025-22282,0,0,bd66d4b687544e2b13caf35aff6698f43fd54fd66dfa60396ba9b69f61c2d4e8,2025-04-04T11:15:39.680000 CVE-2025-22283,0,0,c6e0038bc1265de2aebb3206299f123b1602ed0ab9f0a11ae0639273d1681a40,2025-03-27T16:45:27.850000 CVE-2025-22284,0,0,141756b91553288d6d3b7a6baecfb796de636cfa27171ddd3204c869f7233bc2,2025-02-16T23:15:09.280000 -CVE-2025-22285,1,1,c91626565829e2ff08610cbb72aeeb3afcd1a8f26b9b3887380743889862a5b7,2025-04-04T14:15:21.460000 +CVE-2025-22285,0,0,c91626565829e2ff08610cbb72aeeb3afcd1a8f26b9b3887380743889862a5b7,2025-04-04T14:15:21.460000 CVE-2025-22286,0,0,a057abc87f895feda50fc222dd31de7ff11581af126698bf58f0b63b8d8dc92a,2025-02-16T23:15:09.427000 CVE-2025-22289,0,0,c3fff7c693f7011a88fe12ae53f3272daabbb7eaba44f91bdfbd8cb84b6200ee,2025-02-16T23:15:09.567000 CVE-2025-2229,0,0,482979d1faf791f2049ffbe2e9adb63bb2b94b34c6b9bc8011b78d7c44c36eca,2025-03-13T19:15:52.523000 @@ -284040,7 +284042,7 @@ CVE-2025-22785,0,0,aa4353d5806fe5723076a35c33b8891ff3a61998eca5d33194fb5785a62e2 CVE-2025-22786,0,0,b91ca87977dc2162388a9c52b3e5d7929f67ae175cfbed6e892a70ae5f6c7bfc,2025-03-06T19:37:02.493000 CVE-2025-22787,0,0,123539ec0f563d41af7ca03da6e6f99109a8200bc75541fbc478fac310c97242,2025-02-25T15:41:08.223000 CVE-2025-22788,0,0,af55bbe385e5ad19db90f54f67dcad4a6458802599e6dbb5e4a7878a0103b5e0,2025-01-15T16:15:41.750000 -CVE-2025-2279,0,1,b609f46e1965f264bba7a82ab8e445aef21c9e4e08d39e668de0dd468697cf14,2025-04-04T14:15:21.837000 +CVE-2025-2279,0,0,b609f46e1965f264bba7a82ab8e445aef21c9e4e08d39e668de0dd468697cf14,2025-04-04T14:15:21.837000 CVE-2025-22793,0,0,1e0903441186396148f438dd4c5bf609b6c2892614e2b8eb44fcfefd5125737c,2025-01-15T16:15:41.897000 CVE-2025-22794,0,0,29518117e4a1792c4e052772321e6d0937ed1ba46c8e343f64999407bc634a6a,2025-02-18T19:15:26.560000 CVE-2025-22795,0,0,6ef875d457c8e19bcf577814595be38d790143627f91775ea895c88416ac9b7c,2025-01-15T16:15:42.053000 @@ -285013,11 +285015,11 @@ CVE-2025-24093,0,0,428559a708ad1a85c3c179f9b46c53383858d91239d755fba2db0791cb090 CVE-2025-24094,0,0,86d262f71f2e67892faf4dbf8f0a50eff9cb9026771b88386373f113d46381a8,2025-02-04T21:15:28.227000 CVE-2025-24095,0,0,4ff2310f64e89db20614bf0ada154728b121605491519fa12ea398b081f5f64a,2025-04-03T21:15:39.227000 CVE-2025-24096,0,0,ac69c9566c3d48cc557b26bc2ed716878d8206500a277eb4956f75bd231dad30,2025-02-05T16:15:41.840000 -CVE-2025-24097,0,0,a05ba62e34c3619e458c767535bf54f6a7813b71cc4f8f30761b7fcd74e5673e,2025-04-01T20:26:22.890000 +CVE-2025-24097,0,1,30a61200adbdc649a9cb161d641ba2055d9063b398e22e17d5287ab5b1556616,2025-04-04T18:19:20.507000 CVE-2025-24099,0,0,1b1ce59a5a4469ee6cf51c42ed296968523d0f5e14bd69e6e7e9c3f9c98c6d0b,2025-03-24T14:59:36.260000 CVE-2025-24100,0,0,2eb1be595e647c553152fa6178e0b240d2a4c9e18148941d2c792cbf709c2b81,2025-02-05T15:15:22.070000 CVE-2025-24101,0,0,5de59a541b049a07cf4cf8647eb22085e2d572c64eef6b5bd856ddba1404700c,2025-03-24T14:52:32.450000 -CVE-2025-24102,0,0,b5cfc7b1838de2f08624eed5825f5af665597fa426821ba937adbf9a4e3c8fa2,2025-03-19T18:15:24.580000 +CVE-2025-24102,0,1,86fe3a024a8685ce177a618a9e8bc07780273d2a12e90bd350ab5729f0c00d86,2025-04-04T18:19:45.700000 CVE-2025-24103,0,0,9d77a1391acd11970f5b83f9a3163a0cc44f6475e53e33ea770a58444256625e,2025-03-18T15:15:59.120000 CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e1da,2025-02-05T15:15:22.223000 CVE-2025-24106,0,0,d9d80e6c8cc4fe0e348a76df60dfbe5150ed37d25dbc9a6981f8a36eab26875d,2025-03-19T21:15:38.327000 @@ -285053,7 +285055,7 @@ CVE-2025-24141,0,0,7fc396b14c28529aacc4a130c180a099971b0a3329c75121f4e1cc3751488 CVE-2025-24143,0,0,d6b0dc9e7b05ff53033a444fff93575e464a6a2b7f6b588a53bde953edb8e039,2025-02-04T22:15:42.697000 CVE-2025-24145,0,0,b130f3a7f34dacbf8f60160fa62ed4f9e3a7c741eee662787d15d39ded800009,2025-02-04T22:15:42.877000 CVE-2025-24146,0,0,ef71565d199ef2878b0577104c621a2c7f654cc11b7290333f0a9c3fef67e8c4,2025-03-24T15:01:34.487000 -CVE-2025-24148,0,0,b6fdf0c07877a53a10f2150c795cb5c9d60317cf17981505d299d3203336eaea,2025-04-02T16:17:40.870000 +CVE-2025-24148,0,1,e784e3c7352917c4987976a578830649e534205a201da82855038b21f7fd9eba,2025-04-04T18:19:08.687000 CVE-2025-24149,0,0,9f7b214b4e90edb4cad21734d8bc07a96e8680c79cec78df268df11a9b19b2c2,2025-03-24T18:15:23.173000 CVE-2025-24150,0,0,b57965dad8218b33eb0f705e2c70a2d88ee1011a034996083539ca2cb700960b,2025-02-05T16:15:42.517000 CVE-2025-24151,0,0,99208d1276575064b3a15ad40cec432f393d8a0e89f91da2bae0e635f3a97d33,2025-03-13T20:15:25.943000 @@ -285061,31 +285063,31 @@ CVE-2025-24152,0,0,94cf03b83e0d0bbf2e2519ab1fb41ecec660385e6e18386a8bccf1cff0fd2 CVE-2025-24153,0,0,a962e00376d57b532ea670dc465405ba54e446d5423d2019e225758957981f83,2025-02-04T21:15:28.390000 CVE-2025-24154,0,0,2133416aad04106ad04753c0c4ad3643abc6a261600e1250147cb0b1c5f17046,2025-03-18T20:15:25.680000 CVE-2025-24156,0,0,8fa4c1a03f09991e5c2bed2e07959c1558a8892a2864cd53dcb29d166373a914,2025-01-30T16:43:39.593000 -CVE-2025-24157,0,0,790465e7d7dc534a9d35f244eb55b76ec156fe0fcec05e455fef47f276ddb768,2025-04-01T20:26:22.890000 +CVE-2025-24157,0,1,6a6a25cad9c7c097de9282166d2d4992a0bd42e6983bc9aff14c9fe99324fe8f,2025-04-04T18:19:04.203000 CVE-2025-24158,0,0,35070c801a9b11c70eaf663a73a983a0e2a6932451a99df2d1775809dfa38432,2025-03-22T15:15:38.440000 CVE-2025-24159,0,0,5049ee423dfbceaaa990b18ae981888a723164635f4aec7b443286d0a98a6096,2025-03-19T14:15:38.853000 CVE-2025-24160,0,0,9577104d73a48a82862c835290773879e433d1252391c5319468de6564c9b9b6,2025-03-24T15:01:07.757000 CVE-2025-24161,0,0,6d02f0f01530cc9b917612d04abebc1e6d67d88a440e864a6d1a14a27e3f4034,2025-02-04T22:15:43.057000 CVE-2025-24162,0,0,e7182d7278474afcab3466a5bca917be81e38e822e2649153160baaeab126f37,2025-03-18T15:15:59.527000 CVE-2025-24163,0,0,e5dfd7fc25470d49a4e1465851f83d31b328f7f38425488eccdc7978762eee10,2025-03-18T20:15:25.850000 -CVE-2025-24164,0,0,279e900d337212ecdc6076db3d2c7ecb5de67b4db38c1a290eeb46cd92fa7669,2025-04-03T14:15:30.047000 +CVE-2025-24164,0,1,18ff63bcef2e710cd5861ec3ce09837d673e49d5a6fc2749b67ae13ee7f4d732,2025-04-04T18:19:00.317000 CVE-2025-24166,0,0,15edf859d475720db53f3f95ed8d575ade96a95f125f2377032600fe411e75ab,2025-01-28T22:15:17.080000 -CVE-2025-24167,0,0,4012f7a7587d252e7a20757bcf2a549a824a8a5b90f63de87e477e80d934f5ce,2025-04-01T20:26:22.890000 +CVE-2025-24167,0,1,2af757ad1502f1b482dbbf1d0b33ee499f55dcd497e15dc2f655bdde0e0a7d48,2025-04-04T18:18:54.320000 CVE-2025-24169,0,0,dc7fdf5a34ca171f91b452ca483098d6852ee04a0c9927ea185bfbd0220db78b,2025-01-31T22:15:14.117000 -CVE-2025-24170,0,0,a875ee24d92f5a0eb0ee49333e35117b59299c13f537b7800c90a59196aeefb4,2025-04-01T20:26:22.890000 -CVE-2025-24172,0,0,11aace5ac5b8d14cc5757f42ed2d2888b4a79f85cb4b12aba832e050bc4e3edf,2025-04-02T14:16:04.070000 -CVE-2025-24173,0,0,195fd6c806842926f719dc6cb9def970a6a24f89cb1b47e48bd881cf2aed6b9f,2025-04-02T16:17:41.033000 +CVE-2025-24170,0,1,8ef313df0bbe6258cd772a692745b99dfc0d5d3920d1fe679d0e8504c7098069,2025-04-04T18:18:43.530000 +CVE-2025-24172,0,1,791b6392405d8dc009d2de8bf6f7f91a495bb8b87fc3c8cd26e1ad55c30c9457,2025-04-04T18:18:26.550000 +CVE-2025-24173,0,1,bf86d21f826d6e08e8cdeb0f34247a1437b934e783e6273ad8059380ff596051,2025-04-04T18:18:17.250000 CVE-2025-24174,0,0,0904d4c28286c429cd94ca17762197a0f9f9874c511f730b1e00485e49f57ce4,2025-03-18T14:15:43.020000 CVE-2025-24176,0,0,7bc6c29fa68217fbdd8476cc21dc4655eb0116cc1dc71deacded88f5df0a4027,2025-03-24T14:59:58.437000 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 -CVE-2025-24178,0,0,8cbf77a6468dbe99602945a932d3f8861c049f057e686ac7048e909170791ef3,2025-04-01T20:26:22.890000 +CVE-2025-24178,0,1,5f138664154a3f01666dd70581fdc76560b154cb5094b5d8bf07c73a59c2a00c,2025-04-04T18:17:22.270000 CVE-2025-24180,0,0,a76081c4f9f03771c45a6df8d8257d826274220c5a5ddd7bb92bfc1d6441245e,2025-04-01T20:26:22.890000 CVE-2025-24181,0,0,f7f9a2dcc84da97bc05b50f9b8f0f59f97035f009b39b10bbce90d732e60d67b,2025-04-01T20:26:22.890000 CVE-2025-24182,0,0,a6068baf76a3e1f483d2a0594688f33bf9dcb623a9c2189a13ac86887778a5d8,2025-04-01T20:26:22.890000 CVE-2025-24185,0,0,4871c0df3d7d219e1401394d7ec6a4eaa7d737d02980f30e101a34eb820fd62f,2025-03-24T15:11:13.660000 CVE-2025-2419,0,0,153707543e9bc32e5fdb338510a7c29ac05b7b4717e1a9871d5ed8414730714f,2025-03-18T14:15:45.067000 CVE-2025-24190,0,0,909fc3fcab3f56a4a6e43129ca56781207bfb76ef21dcaa28ac91490f6b231a6,2025-04-01T20:26:22.890000 -CVE-2025-24191,0,0,6fb1d0b7464a86a290871e557abf12c6cbc832c4cb10b90ca29164c8c7b1360e,2025-04-03T14:15:30.767000 +CVE-2025-24191,0,1,70b077b59fb6872846684df55d5bb8024ad6bab473a53621155ca2da3a09c8f5,2025-04-04T18:24:52.147000 CVE-2025-24192,0,0,a58f0bd0dcc29dcea121e843f6744c606af12c56b92420490b4424c02e8f81ce,2025-04-01T20:26:22.890000 CVE-2025-24193,0,0,85d86826046c74a3a92df4109acf5fd80a776edd0c5c6152fb7ab85f1ff5ffcc,2025-04-01T20:26:22.890000 CVE-2025-24194,0,0,3d9037f6c65de8bb0f966f71cedc343022bb007d10b1fdc2bf7d155439482ea0,2025-04-02T16:17:41.203000 @@ -285098,7 +285100,7 @@ CVE-2025-24200,0,0,749aa357d1c7f24174764de48a9dbb69fce15ac4bc539d3a8708e99314c39 CVE-2025-24201,0,0,1cb6d0eda651a05a5a43d80c0ce591daf0b58117cc08a1188cab7f3b5f75f28d,2025-04-02T20:33:42.653000 CVE-2025-24202,0,0,2b7cb2221cdb2ba8dece8d61f82f6424a5b42c3021ee727b637bcd14cdeb7863,2025-04-01T20:26:22.890000 CVE-2025-24203,0,0,da3868a701feefefd8c7741ed5d8fc5d414a41762accf68d3589a32766abfc6b,2025-04-01T20:26:22.890000 -CVE-2025-24204,0,0,6a6adaa756446ac0a4f18210a609c6c6700abb13f52f94ba042593d501b3a8ca,2025-04-01T20:26:22.890000 +CVE-2025-24204,0,1,5dcbcc8f0f20f44f386df15e8a1c1dce75589cb456c483a8817eed9932ff4f6e,2025-04-04T18:20:38.460000 CVE-2025-24205,0,0,6fadd3e3676e6553f6aeed265ad38233d9709b8725a61efd3c17bd53e0c0923a,2025-04-02T16:17:41.380000 CVE-2025-24207,0,0,e9d1c8f85e36821a0fb77d6184054c419339063ef36079af9ab74844c3476cd2,2025-04-01T21:15:42.580000 CVE-2025-24208,0,0,3480dece639c840210d6cbb8eb531059de4983c5b4ebef5bbcd8a491c8144454,2025-04-01T21:15:42.757000 @@ -285113,7 +285115,7 @@ CVE-2025-24216,0,0,44b71cf285f8648b2dd5f9805be94e6eb5bb137559fefdfc87774c1520c0e CVE-2025-24217,0,0,5b60946ff61cf2080385fa0b1989e613a251700fbe8f7d875adc4c496ccbe901,2025-04-01T20:26:22.890000 CVE-2025-24218,0,0,1eae9e32ce19500bc6747aae15178826c25f975aae907cf59eb7c346c329b7bd,2025-04-01T20:26:22.890000 CVE-2025-24221,0,0,fe2a7be171b044a18b7aad5da0148fcd4e1fa54fba59f6221bb4404a606c1279,2025-04-02T14:16:04.507000 -CVE-2025-24226,0,0,52e05890670c6b16e8ed31c78c2fa71de75d62301a95a4cf4dbb78c42dfdf520,2025-04-01T20:26:22.890000 +CVE-2025-24226,0,1,b30ef21852bbf23b107ad0db09b90bb3e97ca9a52198eebb15d52a72752f0f26,2025-04-04T18:21:46.567000 CVE-2025-24228,0,0,0682ea9cc8d158874891386ed6f236a448b44a58a7432ca800fb49bba4f8ae66,2025-04-01T20:26:22.890000 CVE-2025-24229,0,0,e80f8313d932b2359cc47d30731c55191722d487b8bc17c5824ac86e7e1af040,2025-04-01T20:26:22.890000 CVE-2025-24230,0,0,c6f238a0a3b7d00915209ed792ddeafea71970bf3b666bc266a73753e585b00c,2025-04-02T14:16:04.680000 @@ -285122,19 +285124,19 @@ CVE-2025-24232,0,0,c930ff70002faf4f8d8359df165f92ec18b3c6c1c258e6463c792b9bb9b34 CVE-2025-24233,0,0,c49a8d10414fb99c6f94c7c63aee6102f698e2c458dcdfe8a93be4bb7447a0ef,2025-04-01T20:26:22.890000 CVE-2025-24234,0,0,00319238de00a6841774394cdb4e95500b63f71cb14160650f343f81875ecbec,2025-04-01T20:26:22.890000 CVE-2025-24235,0,0,6b09348a77477dd81f798405383da8e5e4a0cf914e73d5de207d45c86653a813,2025-04-01T20:26:22.890000 -CVE-2025-24236,0,0,d0968cd0e93e486f14a16dff7c8c1df6a39dceb364d4ddb909d1fa2d2eb88081,2025-04-02T16:17:41.550000 -CVE-2025-24237,0,0,793a2a70798d87beed8ec67c0ec3a6bba202fc3b90c93d65561065ce5aa3ac22,2025-04-01T20:26:22.890000 -CVE-2025-24238,0,0,1d8008eb73b411db2b222d314bcf60564b4297defb105e8b94fe35f08f69f19e,2025-04-01T20:26:22.890000 -CVE-2025-24239,0,0,56b9e2edb4ee38a4b53906bfb2ed5b63266ee212430600dd8e5968106ebb0d65,2025-04-01T20:26:22.890000 -CVE-2025-24240,0,0,2718a42b07e9ecfc2a2bd9389d66582b543a2384140757d6334e266cb279d31b,2025-04-01T20:26:22.890000 -CVE-2025-24241,0,0,89b02bb933c1f105ea684752f87394a6c0ce592b3d4516d1a9d7d64a564ecec8,2025-04-02T14:16:04.873000 -CVE-2025-24242,0,0,32b3f61021576bef86be2647c65472f56fcb650a96945949097ad761580f4695,2025-04-01T20:26:22.890000 -CVE-2025-24243,0,0,d54e4b58f17ce2421359add43f8c6ab3bf90c64e45403df6232af2f78a581f06,2025-04-01T20:26:22.890000 +CVE-2025-24236,0,1,6f35aae8e5b2275b2c69183ab7776a716442e803a5454ae85f2994d6ce98630e,2025-04-04T17:11:53.263000 +CVE-2025-24237,0,1,27bd8aec1cacbdda457d4c54321da7772780a885b84dc379b0850dfb4a03a57f,2025-04-04T17:11:50.760000 +CVE-2025-24238,0,1,eb385efe8cda4bf9f1c35756a77fb4af48f89427c693cc6ce5f1501ae0be4d28,2025-04-04T17:12:14.453000 +CVE-2025-24239,0,1,34160c098216745dbddd9ea66458d406055bc4d5f852b3dbd17c24cb8226d924,2025-04-04T17:12:32.720000 +CVE-2025-24240,0,1,31e1fbc4a9906522b59d5426cc41c13b0cc9baa11bbcd68e50f13950436aaf0f,2025-04-04T17:12:40.510000 +CVE-2025-24241,0,1,a279cf4c641bb9c3ca243836a9cfff64caa6f150180c868bc752ebe35d2580ea,2025-04-04T17:12:47.040000 +CVE-2025-24242,0,1,7198a4ff47a69ba0a9fd45b2c507b49c3ac18f25e906b0f7d0919752e8bf374f,2025-04-04T17:13:00.923000 +CVE-2025-24243,0,1,5bf36f24ae0ea02424f9ce04bcb14c5dbe8f60f4ca7ebf1e755395b0487a5c5e,2025-04-04T17:13:15.023000 CVE-2025-24244,0,0,aa8216b7c526d909646287a678f19eb0a4c74f63dbedb6e3f9816bce9375d8e0,2025-04-02T16:17:41.717000 -CVE-2025-24245,0,0,1f6525594c18043e049e4703f58c3c49a2bbd44237cd051ed7db34f0faed3e4b,2025-04-01T20:26:22.890000 +CVE-2025-24245,0,1,726bb616fd36c53c5e8e1d9a6405098822a15a2e9f18cf06a92a2b835cd77581,2025-04-04T18:24:35.563000 CVE-2025-24246,0,0,4c1c877540723e60e5944458a5aa9e39161e712e8a3a8067e2a1e5e25957ec64,2025-04-01T21:15:43.040000 CVE-2025-24247,0,0,59555ba19abf57fce5ae14db87534c22e381c032a8ea5b1a4f5b2e84c6d6b721,2025-04-01T20:26:22.890000 -CVE-2025-24248,0,0,b268e75ffda3a7d8a6684a6dfb106f0ec1000b6d27c4d0538fcd669137a95f4c,2025-04-01T20:26:22.890000 +CVE-2025-24248,0,1,2888532025229541b660a3aeb97018da3b2d5f4bd38a2cee849343873235a5dc,2025-04-04T18:24:20.717000 CVE-2025-24249,0,0,ef5a9945cb5f5987170c3c49a5b54d37f318974a0224d422b7f0b9154ecd3027,2025-04-01T21:15:43.183000 CVE-2025-24250,0,0,c28f0f56c48215e5b6b839bd92835127561679d27bd6236d3986a54a4fd03d0e,2025-04-01T21:15:43.330000 CVE-2025-24253,0,0,78470b1727e3850c13a71f527dcdf5a48a8655399b205341b702ac31f4ac8e9c,2025-04-01T20:26:22.890000 @@ -285145,22 +285147,22 @@ CVE-2025-24257,0,0,822a2912608e4be54fc31d8140f141172378fcf97c0b590e45b75ba4cf4c8 CVE-2025-24259,0,0,e9e8ae34c0f6727f275f333ca2e4d4790f4b758b0b79515495a7bd7071b86a0b,2025-04-01T20:26:22.890000 CVE-2025-24260,0,0,fc9cd5cbfdc0102679c8bb8134a8ae9e4c7e485c0efafc726e6182386e7de118,2025-04-01T20:26:22.890000 CVE-2025-24261,0,0,afa9c10ebbdee1cca43489bd0f5b742d2cf9b184fd96737bc0185a2d69682a16,2025-04-02T16:17:41.877000 -CVE-2025-24262,0,0,0db9776e0f0ce51cd5fa527a856312ef8ee926635261c423a00445010a2004fe,2025-04-01T20:26:22.890000 -CVE-2025-24263,0,0,79aa74fcc3ce674bd501d58349df4349e62b618b917d831a9889cacb6f7ce002,2025-04-01T20:26:22.890000 -CVE-2025-24264,0,0,a2debe679236e0aca0938a6a9b5b9646d914ba5e0c269f5c8ebed51031fd0833,2025-04-01T20:26:22.890000 -CVE-2025-24265,0,0,70f1b724c3893a58a38d382b17ff8dee3ec07f91779e523259ff4c052aa6b2de,2025-04-01T20:26:22.890000 -CVE-2025-24266,0,0,2e1c9fb09a9b5c578d8f2253b48403a3931a683071de209b905fcd8ed8ec72e2,2025-04-01T20:26:22.890000 -CVE-2025-24267,0,0,52a49dceb6a4bec126ad45c04d99b4c6db562d965d3cdf87c9dc6f21fdf1a7a6,2025-04-02T14:16:05.070000 -CVE-2025-24269,0,0,5eb5514229d8e8eac9b899e30bd78d595ef74000914dd7688efb5af731ac8b0e,2025-04-01T20:26:22.890000 +CVE-2025-24262,0,1,3d76917582097604a5e634bf4f71c6df69377b602f1a36e0845ed48fc225e030,2025-04-04T18:24:08.693000 +CVE-2025-24263,0,1,b22d00ad9123f8055683c07743d9bd481ce65ffc5d5b226b870bbaf0cb77b38d,2025-04-04T18:23:52.100000 +CVE-2025-24264,0,1,48a4bb0d460b0ba3e4c4820397b4c8b4813fe0b28dd3f3b1daa4c999448c1e0d,2025-04-04T19:00:46.457000 +CVE-2025-24265,0,1,69e5233604d5626850611ee64abbaaf7e43306a91789780d2aab9e6168a4ac11,2025-04-04T18:58:54.057000 +CVE-2025-24266,0,1,d850a68869d3e8c7d48709e8220153768350f47108844d206efa6027d68e51c9,2025-04-04T18:55:25.553000 +CVE-2025-24267,0,1,f3504fb660b96f886533b6b2e39b198d92d097550e50f76d44bfd982b4c91cd8,2025-04-04T18:53:03.830000 +CVE-2025-24269,0,1,8938854dd4ab200eefc4b8f05d044fb8e4cd629a1cddad03c13bb26be51b09ca,2025-04-04T18:23:37.283000 CVE-2025-24272,0,0,6e7e1dd0d722c49b12d24c4853bcf8efc9355e71ae39e60c1ddb1f46d2df215d,2025-04-01T20:26:22.890000 CVE-2025-24273,0,0,099ac16a257666b591c09313cf9602fd4bfbc2418df4164aeda80445197c05d9,2025-04-01T20:26:22.890000 CVE-2025-24276,0,0,a6ab3f5ffdac6bf043bc3904fce8c7221c117d06f2a4b22ec361b6029ce1190e,2025-04-02T16:17:42.060000 -CVE-2025-24277,0,0,4888c9ad731545a1c73227af9633e8452ad09486c13f720cf205ff7ff8b911ab,2025-04-02T14:16:05.260000 -CVE-2025-24278,0,0,f6aede1e1ba8c71835a573e497f1398b7f4d48d359576b4f42b3898cc3e41b23,2025-04-01T20:26:22.890000 +CVE-2025-24277,0,1,7689e916ab1daf1bd3b71f7ef5284681f9c9f49bd75eaa1a34b5098f93a9668a,2025-04-04T19:49:08.933000 +CVE-2025-24278,0,1,6e2eacf3052e7cbc2055495d37c9c6d7068989be97cae8da3a79685df107e734,2025-04-04T19:47:33.687000 CVE-2025-24279,0,0,cad0432a42d451ad48511ef95f7a14eb3e143fa7dc7f59c67bedf18885f1ce98,2025-04-01T20:26:22.890000 -CVE-2025-24280,0,0,5282dc7679622a6e177b5f32950349e92f780ded31cc0271a017e51041c01f20,2025-04-01T20:26:22.890000 -CVE-2025-24281,0,0,5b409854ccf7d6b5c34a2cd100cb5c8f771e58109961eb9fd06c0ed2f1e77704,2025-04-01T20:26:22.890000 -CVE-2025-24282,0,0,588b1bf5dccd97aaccfecf0141fc9570c0ee5fb9ee767d6455195df7c3e62e6b,2025-04-03T14:15:31.340000 +CVE-2025-24280,0,1,7e6318ddeec3c45683c18b4a04b0c338f2389b9346d93c786d9c6752b668d52a,2025-04-04T19:46:03.987000 +CVE-2025-24281,0,1,76b9011c7783c871ef865a80caf1ae08e485f8d8810428515769f6f44737d638,2025-04-04T18:22:19.983000 +CVE-2025-24282,0,1,92059d5a241b5d96ef7593ded7e2abc281079ec5ed3a524fa050c614e5194214,2025-04-04T18:23:23.340000 CVE-2025-24283,0,0,121f1ece0c38836070b45b6a7e97dd599c9b8d7607d034861bb57da70cce817d,2025-04-02T16:17:42.263000 CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000 CVE-2025-24306,0,0,73cf37771b6f85cbd5893cb054304bfb4bf15e5622c3cdffb9a2e4a50bd301ae,2025-03-18T09:15:13.570000 @@ -285404,7 +285406,7 @@ CVE-2025-24649,0,0,023d2bd5a44406bd68c3c4645a1c6ced5cfeeb799618a8ff0129cf3c8fd99 CVE-2025-24650,0,0,5c9fc38112d5e5a4629a3f2853c55d07f73189509eb8ba11355a608cb20e8521,2025-01-24T18:15:39.347000 CVE-2025-24652,0,0,125bd9607cb5ca27355c57c1e03dde9d03a473f27327fc2bf3ba8ab8fcc2bcac,2025-01-24T18:15:39.517000 CVE-2025-24653,0,0,98339226f3f5cbf33f9e3597a502d8cd262e3f8166ecb0e8b1f8d1c7b5a57572,2025-01-27T15:15:15.070000 -CVE-2025-24654,0,1,87efa84617357e8a5988b2522876ee6ff65f514979e86e30ff574f8f0953c213,2025-04-04T14:48:15.770000 +CVE-2025-24654,0,0,87efa84617357e8a5988b2522876ee6ff65f514979e86e30ff574f8f0953c213,2025-04-04T14:48:15.770000 CVE-2025-24656,0,0,e3f8f37e20f1a0138b24c493e5230c4d8fc92553c1f4e874e0ae9d9e3d7c636e,2025-02-03T15:15:28.880000 CVE-2025-24657,0,0,a8222e0bd7505ef553e92de5bb8cc85de0450bfc3b5409fc8a3f31db56fdcc0c,2025-01-24T18:15:39.680000 CVE-2025-24658,0,0,998dc8b87f0bb72c992e3106285f00f7037efa9c383eaa222321a76f3e0f2d46,2025-01-24T18:15:39.853000 @@ -285780,6 +285782,7 @@ CVE-2025-25168,0,0,93fb1477ac0fd147322a0beee26e3b74949bd1187f727ff11033ff5c83939 CVE-2025-25169,0,0,b2c2eae9e9728260a10cbcd3cd6ed185b5ee51c8c2c4bd8b669b60e645fe9781,2025-03-03T14:15:54.477000 CVE-2025-25170,0,0,10b2b5d5b1d8e09a883b23033bc8ac75abe37fde2151575888a21edb35483c78,2025-03-03T14:15:54.613000 CVE-2025-25175,0,0,57f52436a99f7fed27112577d2b540c306e155b82b661017f91c9191eec841c4,2025-03-13T09:15:14.123000 +CVE-2025-25178,1,1,dcf2ac358f87f63cbd5ff6e4e52e56b3004347e3a5ef09d2affbfc72ee575440,2025-04-04T16:15:18.170000 CVE-2025-25181,0,0,aebe0b9a6314ff7a9f4a4ab410e1c6b1bc48e96ec20a3daea50dbb87c370c597,2025-03-13T14:31:11.140000 CVE-2025-25182,0,0,6fd347398e5cc83c7bcf9c93dfa3366f2e8e0aced29c81495217dd5d01f504cd,2025-02-12T17:15:23.857000 CVE-2025-25183,0,0,9f610c42840d8f1123d400fa738e85280ed4290b29d92e2aa642daf493197632,2025-02-07T20:15:34.083000 @@ -285958,8 +285961,8 @@ CVE-2025-2559,0,0,368052ccfab7e996bab88139f62864b1a7d12fa00db700d535adeb58589d31 CVE-2025-25590,0,0,3893b0a4da36be48d36967b7837bf6fae4ec31547efd1c3211b9404b64ed4014,2025-03-19T19:15:45.640000 CVE-2025-25595,0,0,fed1db19038d4b73f5895de99c0193dd0437928c86ea4f6762661a5574f5f9ac,2025-04-01T20:38:28.603000 CVE-2025-25598,0,0,97b7c491c3636dfe02438cb323583c05678dcf453afda217f0aaabb9e8d0908a,2025-04-03T16:36:30.420000 -CVE-2025-25604,0,1,0c637c9d94b9d81b522887cf8f7a7bc4df6564c0228527fd87e291ecbec0e7ee,2025-04-04T15:30:47.660000 -CVE-2025-25605,0,1,f30900bd813d031d8be80147a5bcf9a3bf2b0e08d56dacb4986982bce513de9d,2025-04-04T15:29:44.367000 +CVE-2025-25604,0,0,0c637c9d94b9d81b522887cf8f7a7bc4df6564c0228527fd87e291ecbec0e7ee,2025-04-04T15:30:47.660000 +CVE-2025-25605,0,0,f30900bd813d031d8be80147a5bcf9a3bf2b0e08d56dacb4986982bce513de9d,2025-04-04T15:29:44.367000 CVE-2025-25609,0,0,353094876441323d490e83a48523be60d5eb9eb9c98e0de6ee9312f642e87e4a,2025-04-03T15:37:42.047000 CVE-2025-25610,0,0,e0689668b156fca91ef1f105b78072f67038706b216940f4601acf0901e8570f,2025-04-03T15:37:48.043000 CVE-2025-25612,0,0,3d5ba8d95bd4cf5257a75851925a661e44bd5b9835f17ccfa2c4bade6d51d6df,2025-03-17T18:15:21.300000 @@ -286023,7 +286026,7 @@ CVE-2025-25763,0,0,929a22c6e16286b1fdbe20f1a31e0445b855c096791fb0d6f77563158b5a7 CVE-2025-25765,0,0,2923d7915d6035a6850e005111894ae328546ff9c58781e55b22186f59fc7911,2025-03-28T19:10:06.070000 CVE-2025-25766,0,0,86ae21303cb31636d55dd718fcde7383667a9937c3f5476439f2258b675201b5,2025-03-28T18:46:37.557000 CVE-2025-25767,0,0,dfbd9b86591c00c02b0b6c93af6c4513b8035921c944dca23036a1a8ab9e4095,2025-03-03T20:15:46.770000 -CVE-2025-25768,0,1,144de6a82436863c4ea31bb6abbbc08daf5c7c5f8f3b7d077640959e2f240ece,2025-04-04T15:26:56.353000 +CVE-2025-25768,0,0,144de6a82436863c4ea31bb6abbbc08daf5c7c5f8f3b7d077640959e2f240ece,2025-04-04T15:26:56.353000 CVE-2025-25769,0,0,fe50ca46f9d7f1df8c92164ff5c574fd0b6420f9452c06e3d38d027c3dde7d66,2025-03-28T20:08:22.980000 CVE-2025-2577,0,0,929de73a39a3543c29173f273a3d41f338242898e72fad38fbcc81d8274db1d5,2025-03-22T12:15:27.013000 CVE-2025-25770,0,0,97e9cbcf9f5eb368db8f03cd6097bc99f8f3fab4a945a4e034edb2a9ce72dba7,2025-03-28T20:07:33.183000 @@ -286483,8 +286486,8 @@ CVE-2025-2680,0,0,d89af0b1d5f61ae6f7142eb8ca029333ffc853877a743fe92926b40a93040d CVE-2025-26803,0,0,8c486e737c398ad4bd709101648ff92403877558e051d24af9f92cf436430efd,2025-02-28T17:21:55.827000 CVE-2025-2681,0,0,5aff080ddb50ed462d991796421705fb9c2ad0cbecf1825de612f6f23588439d,2025-03-27T18:14:32.930000 CVE-2025-26816,0,0,2e6935052c19cf69ca34f2738a206b36dcd75ba847d4d8c06eefb2c65cc33c63,2025-03-25T13:15:40.623000 -CVE-2025-26817,0,0,a7600f4e9486f3e45df5efce8d64d13c5d1ab84c215f54d5d2cfe00fdf600821,2025-04-03T20:15:23.837000 -CVE-2025-26818,0,0,2a417a46476c1eda6d20c63a6acd961375157efa087d1b87a714832d64dec480,2025-04-03T20:15:23.980000 +CVE-2025-26817,0,1,906940e3d6a7e7794e318e97076320d02089dffb2850f7a7c72ce2b81e2c72c3,2025-04-04T16:15:18.297000 +CVE-2025-26818,0,1,18927afb01ea381ef2281defd8d4ee78efdcd2e1ad3ae9cd2e21ef1766045be0,2025-04-04T16:15:18.470000 CVE-2025-26819,0,0,265b05b0b6b085ef27d0e218dd5a0f79b1864b8a6c0004a23e6fa9575a3cdbeb,2025-02-15T00:15:28.510000 CVE-2025-2682,0,0,1f6afc395b3a492c46c222208c54c66658c9b287b6a7e8da79cfea7bd2f45373,2025-03-25T15:16:47.100000 CVE-2025-2683,0,0,35e10dbc0adb60b558fed104e703a40b41ef7d99c44deb60462ff8d8416b21ca,2025-03-27T18:14:24.227000 @@ -286871,7 +286874,7 @@ CVE-2025-27517,0,0,0c6e1cbd03f08aa0c28a052f1a961fd35d2b58b4844c0e34e3b438f6bc1c8 CVE-2025-27518,0,0,33c2ec7c1e9790b801dd04e89fd77042adb014555e9a900add53790edfc9f15c,2025-03-07T16:15:39.187000 CVE-2025-27519,0,0,ccdb73c39ee93a016094b17abcf363c0c91c0cb8a87d6bd768900a706722d9f7,2025-03-07T16:15:39.623000 CVE-2025-2752,0,0,2f419f61cff45431dc494e5de187ba8801ef12bb80b36cdd91ab6ec55e9d9f14,2025-03-27T16:45:46.410000 -CVE-2025-27520,1,1,9cc55ea965a28dd73ef8916fae00864db44e2354f23a4f9593d7a5b45c32d80e,2025-04-04T15:15:47.927000 +CVE-2025-27520,0,0,9cc55ea965a28dd73ef8916fae00864db44e2354f23a4f9593d7a5b45c32d80e,2025-04-04T15:15:47.927000 CVE-2025-27521,0,0,238fcbb4ddab85c97db2ebf1a5930f855cf28b2ad902f1b11a70a00fedb1566e,2025-03-05T14:00:54.577000 CVE-2025-2753,0,0,e912daa6c2718d8ed3f24e43ec3e9ee9f4a48455fb53e9e67461e5144c99f550,2025-03-27T16:45:46.410000 CVE-2025-2754,0,0,f7d4984908c96f676bcc9696fea1364d56b7dcb9a4ef8bc0bc9ea457aff5131e,2025-03-27T16:45:46.410000 @@ -287033,7 +287036,7 @@ CVE-2025-27837,0,0,198388712cbc69d26c62c3d088f09d0e18143dea1a79e5577fb06110d422e CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000 CVE-2025-2784,0,0,2c58c5c6a92e2c404924fe8c9cb708e6a198e44cfab6f14d88b8098fa8d95aa2,2025-04-03T14:15:32.740000 CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000 -CVE-2025-2786,0,1,c5e8b76a681b9d71929b5a590a805fc5d2deb5979544c619801dad6bbdc020e3,2025-04-04T14:15:22.113000 +CVE-2025-2786,0,0,c5e8b76a681b9d71929b5a590a805fc5d2deb5979544c619801dad6bbdc020e3,2025-04-04T14:15:22.113000 CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000 CVE-2025-2787,0,0,4aa889cfcc070b06e1753e76a9737fc448b22e64e5347c5b1fb406395a105243,2025-03-31T07:15:18.557000 CVE-2025-27888,0,0,8a8aa5b91d5bfb492ad148fbb9efc0a6effab4f3d802fb1b2e446246bda2ee28,2025-03-20T12:15:14.563000 @@ -287051,7 +287054,7 @@ CVE-2025-27932,0,0,036d05ff385938ab4080533cb14ce5447e7754455506217e340766b3e6cee CVE-2025-27933,0,0,93368137a33aa362057a4035ec036f1aedaefb3c8486745a8d93918e46a37c4e,2025-03-27T14:55:25.660000 CVE-2025-2794,0,0,1a96a5e4fced0b738085ab3d0bfc6f597f8a7a2553b0aa413b0b61c07815e82e,2025-04-01T20:26:22.890000 CVE-2025-2797,0,0,12a3119c38a928a91caf8053696fffa03704c7d7340f486852052726c3e51ed1,2025-04-04T07:15:42.380000 -CVE-2025-2798,1,1,dcd50a1acdafb4b6d0cbda9f12da7a64534ecbd13777ce680ac685b981288bde,2025-04-04T14:15:22.293000 +CVE-2025-2798,0,0,dcd50a1acdafb4b6d0cbda9f12da7a64534ecbd13777ce680ac685b981288bde,2025-04-04T14:15:22.293000 CVE-2025-28010,0,0,716afcbc5cebfe3c684dbf7aa12e99a30e3cb54526d7e93ef8e97f615752b08f,2025-04-03T16:42:46.520000 CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccdc59,2025-03-28T20:00:36.220000 CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000 @@ -287070,7 +287073,7 @@ CVE-2025-28131,0,0,653fa13bcc4e8ceeaeec21c6e4d492e3e092a6706cf0197f60166261f5572 CVE-2025-28132,0,0,7002dcf5e8b4d37f87170403fcafb703439b8eee787188e4d9b9a044f6cdb1b4,2025-04-01T20:26:01.990000 CVE-2025-28135,0,0,409c24f9a33167d6ab26724bea77d47a22c47abc6028ee7d88ec45b97d1935c7,2025-04-01T15:45:24.527000 CVE-2025-28138,0,0,8ed5c668c7f04199b0e31f157584391bfd9c3eaae3c411512244bce07afe9a64,2025-04-01T15:41:38.770000 -CVE-2025-28146,1,1,6691f26169205289c67cfe6182f39c228269c3480b928b5fd938dc17264163c7,2025-04-04T14:15:21.603000 +CVE-2025-28146,0,0,6691f26169205289c67cfe6182f39c228269c3480b928b5fd938dc17264163c7,2025-04-04T14:15:21.603000 CVE-2025-2815,0,0,18ebd3e5fe66ef46c3243ce93a88f48d5a0b2f6220e3b1e8f55ada09f216664f,2025-03-28T18:11:40.180000 CVE-2025-2819,0,0,38e9c36ae873a346ecdd7625eb6881a65dff946dea1e4d5fe1469a7230964dac,2025-03-27T16:45:27.850000 CVE-2025-2820,0,0,6cdeb95f9b6504397d792f97c785fc6adf2ecfa6c7ab16f1c8d1d83356fe06c9,2025-03-27T16:45:27.850000 @@ -287092,7 +287095,7 @@ CVE-2025-2838,0,0,ad5519332c14610c417f2ebe0957fac238c08deca06808872c71584919e4df CVE-2025-28395,0,0,9b24ada5a8721e13ff9af0b39c2b2df626c65c0a7a509c73561e1e7818a4c2c8,2025-04-01T20:26:11.547000 CVE-2025-28398,0,0,9e8d60443ba5900bbfd92275cc7544f6fdff9a1aadc815750409231b762f85da,2025-04-01T20:26:11.547000 CVE-2025-2840,0,0,1611919e470b3959ac5f5634b987862e109125e9a8a008183091dc9630f3ea33,2025-04-01T20:26:30.593000 -CVE-2025-2842,0,1,47b6fed0afeb8764a2eae2f8cabf83dc45e6430c2005f12d42ece8f2faf4ea8d,2025-04-04T14:15:22.517000 +CVE-2025-2842,0,0,47b6fed0afeb8764a2eae2f8cabf83dc45e6430c2005f12d42ece8f2faf4ea8d,2025-04-04T14:15:22.517000 CVE-2025-2846,0,0,3b5287c806e8bc80973f9baaf0ea026d933f9fa8ff940c7a3667c18ec778e524,2025-03-27T16:45:12.210000 CVE-2025-2847,0,0,432b048d8c8afdfd4c92ac64bc4ec034bc3baee4250e2624e5d27f22cf3fe391,2025-03-27T16:45:12.210000 CVE-2025-2849,0,0,aab8d1f56c075f21b703da5aa19a56b01d2820e429e86a8a01410d01a8185f9f,2025-03-27T16:45:12.210000 @@ -287296,6 +287299,8 @@ CVE-2025-29431,0,0,d467a56b9c5c57e54c01aff6a53ffdd59b78e3e6577e8a72af651975cfade CVE-2025-2945,0,0,cdc7caa90c37da4c332f146759b4e4916b66a54944f121b822fe522714957050,2025-04-03T18:15:45.093000 CVE-2025-2946,0,0,f2b29b813dc2e4cd8f14a54bbcdf373bcd32582c3c65f7d213844ba7049f6fff,2025-04-03T18:15:45.220000 CVE-2025-29462,0,0,f422113a1051d4aff8b513e1a552beee6daa50548858ff972ff6f4727e094e45,2025-04-03T20:15:24.383000 +CVE-2025-29476,1,1,ec272eb05555a6255298ca12b91386cb9e5adc6181d958d525655a8cc87ff209,2025-04-04T18:15:48.263000 +CVE-2025-29477,1,1,ae3ac14c6dd146c3d9151d691bc18e9ee41a4d3bcf36029f5cd4df385764cbf9,2025-04-04T18:15:48.387000 CVE-2025-29483,0,0,a44df1db1a75ca4ccf8a0bab57f388d77d71341421d00a01658dce0d1318836c,2025-04-01T16:08:17.700000 CVE-2025-29484,0,0,24b91db5e49838949bb21585890c30ebf131a4e7d93b1fa565238059473a3194,2025-04-01T16:07:37.140000 CVE-2025-29485,0,0,76a43926d5d32780e223e5d4ded19c1f1dead02fcfd0661c16775c712330ced9,2025-04-01T16:07:18.737000 @@ -287310,7 +287315,7 @@ CVE-2025-29493,0,0,ce433e12ff6f67070d20d51618679346fee9463a5376a363b288e013cda07 CVE-2025-29494,0,0,37dc6ae3cff76e33477c0d21d9e70a2e17e406dc0fef9f8cf0d74528f1edd9be,2025-04-01T15:46:09.550000 CVE-2025-29496,0,0,1ab18872c422fd3ad83b844719caba98a63d63be68d84ae73e73abccf7b846be,2025-04-01T15:46:19.427000 CVE-2025-29497,0,0,f8eaaaad66a08f36734d69d9f1541fb908a272f91f31ad8a75e2ab1b4e1231c2,2025-04-01T15:45:58.123000 -CVE-2025-29504,0,0,80c44322cbb4ee3ffcc5cbd455b0480e8a5553da26af5e3279b39bcc43b9b8b8,2025-04-03T20:15:24.560000 +CVE-2025-29504,0,1,58b20392114d43fbace360ad50e36710fd59859f04f66f7f163a0e9938ed9a87,2025-04-04T16:15:18.670000 CVE-2025-2951,0,0,5d509308aa434f11a0f0d3bbee83cb550cd1526f2ac9ed20011f9dfe77eb6393,2025-04-01T20:26:30.593000 CVE-2025-2952,0,0,ce06420e464231cf7dbbf04b019fa48dd2b74ede06a26175a9f7fb3d81229a78,2025-04-01T20:26:30.593000 CVE-2025-2953,0,0,55a12a6e28839ed9198d20109be4db37ae417e7825536252a41ecc4cb5173a24,2025-04-01T20:26:30.593000 @@ -287328,7 +287333,7 @@ CVE-2025-29635,0,0,ec72c4a9bc58304e70384a4323071097e434b0be9c6a730e4fb246fc5922f CVE-2025-2964,0,0,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b74,2025-04-04T01:15:39.640000 CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000 CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000 -CVE-2025-29647,0,0,e4f04bbbe875ce7da0c023cd455f13c3d3b5bf507c434d64d650aeffc548fcda,2025-04-03T19:15:39.580000 +CVE-2025-29647,0,1,7c7f379b4b504759a90bfe1ad88b567eb150a9807e72f83273ff329ec1996fc1,2025-04-04T16:15:18.853000 CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000 CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000 CVE-2025-2967,0,0,14b33c1f634d82e0ee8f6eba9d8900eb26f8e5ef6b28fe9846307dc0432895cc,2025-04-04T01:15:39.857000 @@ -287562,7 +287567,7 @@ CVE-2025-30367,0,0,4c58ea6c207970fa821d8fe810dbd28c39dba4b8a1bd4c135404ea3485067 CVE-2025-30368,0,0,b2aca00a233d5e2699292734cb0b923e250cbf1cce34e6b5a6933288f17e45fa,2025-04-01T20:26:22.890000 CVE-2025-30369,0,0,6c31ac6189e648775f6a98e426b393658f570141f22b2bcbcb5abe0d58ddc19a,2025-04-01T20:26:22.890000 CVE-2025-3037,0,0,6a2907c9cfc947d4ec7113a8daddc7fcd9474b61d3079d351d22ef4c304e04d4,2025-04-01T20:26:11.547000 -CVE-2025-30370,0,0,91cf9c8d941b7e21009e821f3cc912c8e4e462100926a773dd30be1ab67d01d8,2025-04-03T22:15:21.190000 +CVE-2025-30370,0,1,d4219424468c274e654bafe698df144ac0688fd3ce6e676815800e9b43eb1939,2025-04-04T19:15:46.557000 CVE-2025-30371,0,0,460a9e9c642c5d00739d5b5e11ddec1f7f2ad086735daa8cc9c39d2d2cc86b2e,2025-03-28T18:11:40.180000 CVE-2025-30372,0,0,e366784170fd69403c95573e66e81140f6ab7eebcee57a3b740e41f187b2c54b,2025-03-28T18:11:40.180000 CVE-2025-3038,0,0,22534a6e99d8435c0e3640274e43279290c0824de864795a486909ffa65e03da,2025-04-01T20:26:11.547000 @@ -287583,11 +287588,11 @@ CVE-2025-30430,0,0,90bd10587c79634c5f1697e23c71b2f842b0458e51e971f8fe60a7d65d4a3 CVE-2025-30432,0,0,50c75e6ede0e33eab987671939e7166fd44f0218fd13584bcff046997a42a161,2025-04-03T21:15:40.470000 CVE-2025-30433,0,0,6f71c17f77a95a33ebb1e94d3dfef9c6f08286c2d2c9237283ca7fab79b9eefc,2025-04-02T14:16:13.013000 CVE-2025-30434,0,0,ebc68e7f01445dc8310b399489dc90a6f8fac5463d58eec28218ed8f44833277,2025-04-01T20:26:22.890000 -CVE-2025-30435,0,0,e670e27a9078ae02d03ae0c34ca966c7a5bfe4c29b16c84855f0d32237a695e5,2025-04-01T20:26:22.890000 -CVE-2025-30437,0,0,c63022fc305bfcd5bec31c9753e212183f9f8c562a4af268bddce175817d4279,2025-04-01T20:26:22.890000 +CVE-2025-30435,0,1,a819fd3bc536b06d31e66f2dba46f170a8a82060c4083d1602e4468ee70f613f,2025-04-04T19:28:07.327000 +CVE-2025-30437,0,1,0c24503326977574ab0f815363d5d51518a36fd46250ca4580863efffe2ff229,2025-04-04T19:33:46.400000 CVE-2025-30438,0,0,5e37b091eda5acd779838ef05fdda74196e7142c912dcdf0eb307fc4f5de6b74,2025-04-02T16:17:42.927000 CVE-2025-30439,0,0,73a82254afce220f4c6d9661a5990bcbdde677704ab0cf77b47fd1c6511d584c,2025-04-01T20:26:22.890000 -CVE-2025-30441,0,0,e8b4088f378c3c652ae64c1ef46d27c20fd329e6d097f06915dda7e99d4ad80e,2025-04-01T21:15:44.167000 +CVE-2025-30441,0,1,0c04a93a6f174bf42d94b9b28150654c6cdebea87baad1c1bed2a17317c45cac,2025-04-04T19:40:24.640000 CVE-2025-30443,0,0,932b3b18ec745c2b2a792c286f1e8af256bc23e89d29fbb215bd590e88ff171d,2025-04-01T20:26:22.890000 CVE-2025-30444,0,0,d34d2c46b7cc42bfd15ee553b3d0a274cd034241b6bbc862e4e516372cd13022,2025-04-02T14:16:13.203000 CVE-2025-30446,0,0,8790b6eb4e57b8db9f3d86b2b6b7d83a1a5104f925a43c9ec939c8c6995882a4,2025-04-01T20:26:22.890000 @@ -287595,24 +287600,24 @@ CVE-2025-30447,0,0,237dbe9402f62a7486f16b1d09b7e4786ec6fdf28414a466fde6c687314bb CVE-2025-30449,0,0,9508fcfb3134f072500474d4eb13734d9ef2b119129d96bcac9b8fac5ebf5a05,2025-04-03T18:15:45.357000 CVE-2025-3045,0,0,d1bb69c29a142292c5068648f022094677578a135ca579006924bfb19a4ea68a,2025-04-01T20:26:11.547000 CVE-2025-30450,0,0,eb6ccf232b67c24883a0d3a839bee58ad5ab048c533d6cb6cd99c6f9851e4aca,2025-04-01T20:26:22.890000 -CVE-2025-30451,0,0,c2c629750fb83f415db8dc3066f122aa08a6c33df5990a5a2a0a7e0988bdf250,2025-04-01T20:26:11.547000 +CVE-2025-30451,0,1,a58165541c3f501bbc882a86fac75fc8ba8f191c9a6326ff9e9bcbfeb1b29f2f,2025-04-04T19:41:29.893000 CVE-2025-30452,0,0,1efd239c821d515f19f352abde330ebff233606e55b12bb9ebf573ccfdc85938,2025-04-02T14:16:13.400000 CVE-2025-30454,0,0,47c09e5bc46b9edf4e1f5c1c4e1e4a1d9da94a40ad41215b663ab07539d05720,2025-04-01T20:26:11.547000 CVE-2025-30455,0,0,c047560985dc14264d844d7220e69242357f952dfe9c411f36f032f55b9ad4be,2025-04-01T20:26:11.547000 -CVE-2025-30456,0,0,c82f86422e287294516b2a860f22514c0ae6ef51325627373d2de61c1320bb45,2025-04-03T18:15:45.543000 -CVE-2025-30457,0,0,a7aacd76a74a3b28a7e913da51fd7198190670f8edc6ec57b383f5ba1c4459f1,2025-04-01T20:26:11.547000 -CVE-2025-30458,0,0,ecfe62441dfc212c0916c4b2e68669ffd56a6b1348bc866bdc74efacb6c6648c,2025-04-01T20:26:11.547000 -CVE-2025-30460,0,0,a915c56af8c2a74077e91202af68f9452cd1b9909a5612dd04ec76f03097bffa,2025-04-01T20:26:11.547000 -CVE-2025-30461,0,0,db55bd1b2ee5afc845a0044aac876bfe449d29a1e98decb41888d82f5e7d5286,2025-04-01T21:15:44.307000 -CVE-2025-30462,0,0,41aff7ceed16024f4647af61f0ac45d6cb29f45c8e7cf36cc86661cb6c6852e2,2025-04-01T20:26:11.547000 -CVE-2025-30463,0,0,77822fe5f8ed58a67f157c9d5ad2965ea2c04409e04426eb25f664908ce28879,2025-04-01T20:26:11.547000 -CVE-2025-30464,0,0,a7068d8930bc0efb6cf7b85d854c677c9d8c6d57e0b54a551871cc6185f3b150,2025-04-03T14:15:33.220000 -CVE-2025-30465,0,0,6ff932d90994a2d83d0eafe90a8a83e07a630bf0119b34afebceb355509afb10,2025-04-02T15:15:58.483000 -CVE-2025-30467,0,0,0b9bc2454dee597e8c38ec34b4492b2c44f605205cd2689db4fcccddeb5848cf,2025-04-01T20:26:11.547000 -CVE-2025-30469,0,0,c7b6820cb3e80fb97905c45a2483da8e4ab82f8701ed71ac1c4df4255976e9b5,2025-04-02T14:16:13.593000 +CVE-2025-30456,0,1,a4adbf3fb3bfda6c1ff7ac3e59f722d6890d88837b4dfbbcb9888cc15a9a477a,2025-04-04T18:13:02.067000 +CVE-2025-30457,0,1,9931b57801603e5171d9b9131e7fbe4120bea818d45e3d4b53b5782cd0d5fd9e,2025-04-04T18:12:47.103000 +CVE-2025-30458,0,1,d44cd0a8f35468ff3b2dcecdff85e9434b31c8f37fa6b8dfb1a82259a2d7a917,2025-04-04T18:12:42.757000 +CVE-2025-30460,0,1,d80e5d42755983a665f916c748c78211e6afa7b0e15e1ebb79456909187cd900,2025-04-04T18:12:36.290000 +CVE-2025-30461,0,1,902c186691796d41fb6442de848f3f6d1e6de072cdbd4e5592409d68df7c6d6d,2025-04-04T18:12:32.693000 +CVE-2025-30462,0,1,4bdec634bf22dfe7000ec2114c1948d8376bfcc7de65e9822131d6f1494f76e3,2025-04-04T18:12:28.400000 +CVE-2025-30463,0,1,05cab9a88b5fe14651fb4091f32724013a6b709979189bb9339db2ad3e72b102,2025-04-04T18:12:18.250000 +CVE-2025-30464,0,1,162cd6362752c0f31ef3dab640c358c1acdde6a03810f6f12a55bd6714d97e42,2025-04-04T18:16:18.353000 +CVE-2025-30465,0,1,6662e5d084f4b08d9b14aed1394c2c5112e2e03c0e03b4486bd615995b89d730,2025-04-04T18:16:13.317000 +CVE-2025-30467,0,1,a719241a9705392d42f30d7c189aba650161488350f36a52aac6c1d3080c65bc,2025-04-04T18:15:47.390000 +CVE-2025-30469,0,1,12dc8780539236a700bd1bfbc0ce6f4be605db998e5fb59430520d0b2b69f417,2025-04-04T18:15:42.680000 CVE-2025-3047,0,0,a30c36369bf3e12cbd7e65026519106518e3e5f822a760b35651157c31c62e14,2025-04-01T20:26:22.890000 -CVE-2025-30470,0,0,4585c03fb2517758578b8922cdbdabea5b86c88e1ce97b9ee1c61a4e8e3ceaad,2025-04-01T20:26:11.547000 -CVE-2025-30471,0,0,1fa123ff5c95e6c8f98b01edf92c14e5731bc4a7b28b13f232e9d72f6db6ff9a,2025-04-02T16:17:43.113000 +CVE-2025-30470,0,1,74bfaf44e0681d163fdd1bb7cb5edf9226008c5405e279c34157c5a94d199b90,2025-04-04T18:15:36.720000 +CVE-2025-30471,0,1,9269044bc98a97554e0c019dea428a665104b61258abc5e9fae7c043683161e9,2025-04-04T18:15:26.537000 CVE-2025-30472,0,0,a9a589c92e85a7dd5dc78fc910cf31729074e91942c97c7d1b5338ab1df8371e,2025-04-01T20:28:02.283000 CVE-2025-30474,0,0,eb6c167d1736e5a0a05d76dda95c9383453e456c61b97e97ddf0c32b61180eb9,2025-04-01T18:15:30.003000 CVE-2025-3048,0,0,8c9d9ed36af65f4d6aa3fb74d6647d88f2ae80886b1a7fcca7e2b0a1fc1e20e2,2025-04-01T20:26:22.890000 @@ -287973,7 +287978,7 @@ CVE-2025-31124,0,0,30e95107f76a0c7b293693c4daf63fddb62b9f77d7b9aeacd29f3f7c88044 CVE-2025-31125,0,0,072ccac32b06397b498203fc00d82b6c97b15bcc7f5cd2abbaaaa468b42585bf,2025-04-01T20:26:22.890000 CVE-2025-31128,0,0,52e006b38e138bd3cfa52eda23e225a5789ea16b27f326a93ad59b1b0e562c14,2025-04-01T20:26:22.890000 CVE-2025-31129,0,0,a6a4a9f484942a82b7b2400d9c67e69c64eabd46827eb84a0adccbba59ac10d1,2025-04-01T20:26:22.890000 -CVE-2025-31130,1,1,1fa071beb979c8dd4fb4962ca180419609b4c60d570f9b60fa93458364300c0b,2025-04-04T15:15:48.320000 +CVE-2025-31130,0,0,1fa071beb979c8dd4fb4962ca180419609b4c60d570f9b60fa93458364300c0b,2025-04-04T15:15:48.320000 CVE-2025-31131,0,0,ffe40251d16a258e4a81f59dcec18bb939bd64bb0cc9817076ba3c26ae95274a,2025-04-01T20:26:11.547000 CVE-2025-31132,0,0,eaf6e55e3fdf39265a487f499946844b88ccfa5eca63cf5dd8b8ef7debd6ca38,2025-04-01T20:26:11.547000 CVE-2025-31135,0,0,c29646479a81ed688aa2c7dba2e194b8b12ec18ec185c562b74cf6cab4701c90,2025-04-02T14:58:07.527000 @@ -287993,15 +287998,15 @@ CVE-2025-31179,0,0,cda1c9467c3475201d82575e129fca6c85eec975e0bfb5c626efdafa30a80 CVE-2025-3118,0,0,1cd33736f819d6555ea5d758498a6aa5c3bf11a6ad5ca0d66e25d3be8b8940ad,2025-04-03T14:15:44.713000 CVE-2025-31180,0,0,96a8b1c900905723c52b2ac8ec7d74d27ca8fc06e172a796b6c77948919bf976,2025-03-27T16:45:12.210000 CVE-2025-31181,0,0,adf787fa7be98612076fa1d074f2dd202915c081eba78290d23e687b246de36d,2025-03-27T16:45:12.210000 -CVE-2025-31182,0,0,44f72e98540dbb3e063f52fb61f523b15c70e95fb4d85b6c0881af54473ebb47,2025-04-01T20:26:11.547000 -CVE-2025-31183,0,0,91c5286cebcc37c08b70519d09359196864ed992ccc9ee27d7825cab364e283c,2025-04-01T20:26:11.547000 +CVE-2025-31182,0,1,8d0dadc7fec7579b3c4ddaef7641311eae65f68d5d8a0686083e15fb44a0e78c,2025-04-04T18:14:52.887000 +CVE-2025-31183,0,1,c73e164beb072dcd317fc78fa989ca1bf3b077c5b2036ca05764e7542a151cbf,2025-04-04T18:14:46.857000 CVE-2025-31184,0,0,bc905d6465c34230b7510e673ef9c726182a0cb6a37b4947bf05562031586fb6,2025-04-01T20:26:11.547000 -CVE-2025-31187,0,0,d566d8aea2fa03a7ec4e30b4b54cfc40f5ca5df9424d72d68e2cd6c1058f950a,2025-04-01T20:26:11.547000 +CVE-2025-31187,0,1,a6105b8146b15b371ec11e675e56d0f333e59f34cafc14af70a8938c57646155,2025-04-04T18:14:40.860000 CVE-2025-31188,0,0,2fb0e110c15582ab5d864f4ce86dbfdd024f43772415d4f0943e5f687dee52d2,2025-04-01T20:26:11.547000 CVE-2025-3119,0,0,c1a8882c407babd47aa6ac07c5d341bee78441b1227c61448a35af71afb68fda,2025-04-03T14:15:44.840000 -CVE-2025-31191,0,0,17e57a74718ab22ded8508dcdada5043930485efdc330e35ed49a9cb696bd50c,2025-04-01T20:26:11.547000 +CVE-2025-31191,0,1,5c887fe6f1a981b5941578aba17f50355dc847fd896dda368980895a9fb92d49,2025-04-04T18:14:34.590000 CVE-2025-31192,0,0,3e73dd7a26b33015ce76fd174b2a3346c3d188eb35507b4e68c2ae4f7c78b869,2025-04-03T21:15:40.627000 -CVE-2025-31194,0,0,5dfd74ce40227f785bef3dddfbf01f84407d5877a19a8b05920f68f3ef41d21b,2025-04-01T20:26:11.547000 +CVE-2025-31194,0,1,03f4d110302543c66a4fd7a7b9480fc20da220403b3309cb642a2155d37d36c6,2025-04-04T18:14:27.780000 CVE-2025-3120,0,0,e50a4b8e9f4394c1a251e1a65f13e688519ceb35f1a621650ebad35571a5f10d,2025-04-02T22:15:21.047000 CVE-2025-3121,0,0,94fccc916e2dadc05e6605b448acb94c41bf58e0b31c3affc5840a6a10c4cb07,2025-04-02T22:15:21.220000 CVE-2025-3122,0,0,368f14a3ad2aaeeb8f90b42d353bae15bc6c1ea04e15a6ebc834cd6e4d1eeca6,2025-04-02T22:15:21.410000 @@ -288029,17 +288034,17 @@ CVE-2025-31373,0,0,f9071278a14d544e1d638810d17e35e9b3cf783fa438c6415cfa720de050a CVE-2025-31374,0,0,a0063074d97edd2d0b6a359f9337f2fbc025fc83f5ab0917de6d943a4c010e45,2025-03-29T04:15:39.340000 CVE-2025-31376,0,0,b701b7ba661f1762215842f01eaab352e5cec0fffbde18b5aedc908f1c5af508,2025-04-01T20:26:30.593000 CVE-2025-3138,0,0,42a265460f4e53876cf21006df575e78e8d84473d2ee382c298336b6fa58c3d9,2025-04-03T14:15:45.660000 -CVE-2025-31381,1,1,31130aa3bc64ddc05f2ef591fcdd34f0792eded027d6767ded231344e62e78fa,2025-04-04T14:15:22.630000 -CVE-2025-31384,1,1,285a9298799336ceb7d9f4095cce0e3302d6f975831b3253bdf2dbb0a586a5ab,2025-04-04T14:15:22.780000 +CVE-2025-31381,0,0,31130aa3bc64ddc05f2ef591fcdd34f0792eded027d6767ded231344e62e78fa,2025-04-04T14:15:22.630000 +CVE-2025-31384,0,0,285a9298799336ceb7d9f4095cce0e3302d6f975831b3253bdf2dbb0a586a5ab,2025-04-04T14:15:22.780000 CVE-2025-31386,0,0,42df843cc2ac2bb87523fa10c4b86c9cfeca984ee6e6907b70f825251fac8592,2025-04-01T20:26:30.593000 CVE-2025-31387,0,0,efeeafd47dcaa2c1fe833b1f78eecd6f90d244213e2c3fd9dadef428bb8988f8,2025-04-01T20:26:30.593000 -CVE-2025-31389,1,1,ce97ff1efcebe6b3517786db12ce3e8ca898fd79305d1670347d36c76d8dc74e,2025-04-04T14:15:22.940000 +CVE-2025-31389,0,0,ce97ff1efcebe6b3517786db12ce3e8ca898fd79305d1670347d36c76d8dc74e,2025-04-04T14:15:22.940000 CVE-2025-3139,0,0,38102b143991772fa8965f269a5c5d3a7a1954a7edba1619271b901bddba3680,2025-04-03T04:15:39.940000 CVE-2025-3140,0,0,a5bf40a01ec6c69e24b0678c2fe98fe9a4f96bb51d9095f86b625cc37e3cf52b,2025-04-03T13:15:44.010000 -CVE-2025-31403,1,1,e40dfceab5fc8cce978fbbd6e741aa647d5f5c751d0f280366d83213b9fc1db9,2025-04-04T14:15:23.090000 -CVE-2025-31405,1,1,64873a6d52ea4a54855c518b1178b4e8880d189c87b704526f917794f963503e,2025-04-04T14:15:23.253000 +CVE-2025-31403,0,0,e40dfceab5fc8cce978fbbd6e741aa647d5f5c751d0f280366d83213b9fc1db9,2025-04-04T14:15:23.090000 +CVE-2025-31405,0,0,64873a6d52ea4a54855c518b1178b4e8880d189c87b704526f917794f963503e,2025-04-04T14:15:23.253000 CVE-2025-31406,0,0,5912a412471ff3d877945941ec5dfa793f9b328130992797be8d7429384326a2,2025-04-01T20:26:30.593000 -CVE-2025-31407,1,1,175faba287702acc14abc3ac9fbce54303cafe6da43fac3665029912e6c8915f,2025-04-04T14:15:23.427000 +CVE-2025-31407,0,0,175faba287702acc14abc3ac9fbce54303cafe6da43fac3665029912e6c8915f,2025-04-04T14:15:23.427000 CVE-2025-31408,0,0,4bce0889fff07e9d2af0109421fe58b7234ee5ebf9fa6560ab95ff15e16d923e,2025-04-01T20:26:11.547000 CVE-2025-31409,0,0,82dbb111649d8cf9e26a4c460fca8cf167c66dfbe7749d633be5ad71c1f22147,2025-04-01T20:26:11.547000 CVE-2025-3141,0,0,2a6d9a3bf2a1433967eedb4fb11f21c399e8991ef06c9d06dff60030c097d7b4,2025-04-03T13:15:44.157000 @@ -288047,9 +288052,9 @@ CVE-2025-31410,0,0,d2744125929669a0550251c0ca1a9221dc78cee85634e7974f1b02dfdfbfe CVE-2025-31412,0,0,f2a3a75101b5fbb687e484fbb151373c9b65c031636af9fa6343c10e46f352fd,2025-04-01T20:26:30.593000 CVE-2025-31414,0,0,c7c8b152028249fcda3808d41ed059a882fd165da9cc6176d922213c7f3b4129,2025-04-01T20:26:30.593000 CVE-2025-31415,0,0,414e63d224a09cd075a83b960b86b86bc2238dd067741c725e74f347156214de,2025-04-01T20:26:11.547000 -CVE-2025-31416,1,1,4db196a1d0516f221bfcc260cfee8aaa3e1816c2f8972e5f499861c3c4cd3b77,2025-04-04T14:15:23.887000 +CVE-2025-31416,0,0,4db196a1d0516f221bfcc260cfee8aaa3e1816c2f8972e5f499861c3c4cd3b77,2025-04-04T14:15:23.887000 CVE-2025-31417,0,0,0d3c1b109fae4b739454cb1a0b8eb7abc566c168fc7a86169fb95a201cbbcd1f,2025-04-01T20:26:30.593000 -CVE-2025-31418,1,1,5c1eddbe939e9e55491e3923dd4f1466958d0fca4ea37a709a7a0cf53aafe180,2025-04-04T14:15:24.053000 +CVE-2025-31418,0,0,5c1eddbe939e9e55491e3923dd4f1466958d0fca4ea37a709a7a0cf53aafe180,2025-04-04T14:15:24.053000 CVE-2025-31419,0,0,86daefd4cfae6cd0bc5dfe16310f6844d1f9e0f956e501ba1300c694a97deb9e,2025-04-01T20:26:30.593000 CVE-2025-3142,0,0,89dad725a78f99af9996b26eb4fd0b6e3130ff2cdf8b39de58f0a92b7681d0ad,2025-04-03T06:15:43.200000 CVE-2025-31420,0,0,b1e62500f59f82b3c0e41319b0be822dd95b1c52c179f4ea3f0c6d3a0c4c9e17,2025-04-04T13:15:46.630000 @@ -288106,7 +288111,7 @@ CVE-2025-31474,0,0,3b178b6034f0ae913924408b2660b0dac0698dd9519ef434ea55136482afe CVE-2025-31477,0,0,0fa94778711cfb9d5348515562c831d95775db02599411e1600de828b8a2ba38,2025-04-03T14:15:36.137000 CVE-2025-31479,0,0,485ec0f7811e62ce1bf9617832c8d4a72441c2dfd15b0ede2a29c3dab4515900,2025-04-02T22:15:20.563000 CVE-2025-3148,0,0,337608d55a900fe3e4ec5261cfec01a9c31886dc12a4f17a7b38d5c53c4dbe53,2025-04-03T07:15:41.927000 -CVE-2025-31480,1,1,3f5d4eef3799210a4d18fa35af675f0fb130d8cdd5f19e512d43fb1cc0869c74,2025-04-04T15:15:48.820000 +CVE-2025-31480,0,0,3f5d4eef3799210a4d18fa35af675f0fb130d8cdd5f19e512d43fb1cc0869c74,2025-04-04T15:15:48.820000 CVE-2025-31481,0,0,e8100e17ecc79ce1883c9ec39093a07bf916ba4ca265a5ed718afec7e0905f6c,2025-04-03T20:15:25.543000 CVE-2025-31484,0,0,dcc45bae9152a2eda779f3ce6fd498af89197d18dcaca27bbfad7d5d40b3c401,2025-04-02T22:15:20.720000 CVE-2025-31485,0,0,3ce57b1a6c12ba06f7b3b66de6a64de00dd26fff1bca804bc7432b5387f8923a,2025-04-03T20:15:25.740000 @@ -288403,7 +288408,7 @@ CVE-2025-31836,0,0,371df5daf093368412bd5b4e10b262be895d83a21b45b98689463139e46c2 CVE-2025-31837,0,0,e257f931bff2fbdfe99da539c380fe0c376b55a768908ebb3f2e8e88c8a0a30b,2025-04-01T20:26:01.990000 CVE-2025-31838,0,0,328d5a58e5fc2af88b0631d8a27a83baf13dd242410b1074f6764b5f9ffec4cd,2025-04-01T20:26:01.990000 CVE-2025-31839,0,0,439381729a895c42b3cacd2a53831096c1d0c7f85d2eaa8bb59faf866e335ecd,2025-04-01T20:26:01.990000 -CVE-2025-3184,0,0,3f886d194cac7ea667af3ac28f7098bf29d8e09fafddac7a51629a2bf24d276a,2025-04-03T23:15:38.170000 +CVE-2025-3184,0,1,3f4fbef54fced72bfd74e488b07ed098f2d36108006be92af390c6402f0d3bcf,2025-04-04T18:15:48.497000 CVE-2025-31840,0,0,584e3beb5f5d5db3c6534fc137f57aa3206829d94efbe7ceb1e6f25d0441d79e,2025-04-01T20:26:01.990000 CVE-2025-31841,0,0,1ca61d5d499fd9351c7fe2614214571b08cce805b32e24c3b1db5002fbec76bf,2025-04-03T14:15:40.720000 CVE-2025-31842,0,0,6522034cba9be2136d01d1820a5552d6998d74a7fdfe2dd8ebcfe07520dfce9f,2025-04-01T20:26:01.990000 @@ -288414,7 +288419,7 @@ CVE-2025-31846,0,0,6d783d90307cca2e9bfa57c94edc95a98f68796f778bf61e5112366927ee0 CVE-2025-31847,0,0,39041ecb7496a3ed10ab6e9e41be6600864b99006d6cbadba9c0160bae245e68,2025-04-01T20:26:01.990000 CVE-2025-31848,0,0,ea21b1e97fc1a68588ca68c3443a4c0d36a41aa6305244d5ab77ee1983715c20,2025-04-01T20:26:01.990000 CVE-2025-31849,0,0,dc5a1d791040267ffa3b264ea0aed3aae827af3223e355dba550b1150ef4805f,2025-04-01T20:26:01.990000 -CVE-2025-3185,0,0,25658ed7520c579481426d996bcec141a5408a2fe4fb5ff46f925f16431a1870,2025-04-03T23:15:38.350000 +CVE-2025-3185,0,1,5fbe26935e30fe3e66a06b97d7fee639930fedfad9fae4c4f893fffa6f1e5b66,2025-04-04T18:15:48.630000 CVE-2025-31850,0,0,946a9eebd294213633b600bfa25a48562b2f9d453539c6bc71a47b29ad982ac4,2025-04-01T20:26:01.990000 CVE-2025-31851,0,0,38d39411a4f2de839c257155e510c1995bc931e73eaec1c515ceb60b788daa45,2025-04-01T20:26:01.990000 CVE-2025-31852,0,0,98902bfe4d67c7a86f91f3a949ca925bd710d5e94a5231f57633af6b63b94748,2025-04-01T20:26:01.990000 @@ -288425,7 +288430,7 @@ CVE-2025-31856,0,0,34c9fc8d24de41c656ac2805eaf617d6f31f2944d882d6642faa0b19204f7 CVE-2025-31857,0,0,0eaa697196a3d1fb849532bc5f963b45750e7713342450c99d75dc836d65e978,2025-04-01T20:26:01.990000 CVE-2025-31858,0,0,c2ec00ea59ebe2663ac1287a618365ce41b1b831a8031b74deaeb9865bfa6ed1,2025-04-03T14:15:41.167000 CVE-2025-31859,0,0,0bd37faf5aa7bed594ef599c665cf9c14b44c1fc24cc20b3b4f8ae748baee81a,2025-04-01T20:26:01.990000 -CVE-2025-3186,0,0,edf2a059ca86a44bf3fa53a9620e01070fab1f9c2996e9150dc21106abd36b73,2025-04-04T00:15:15.347000 +CVE-2025-3186,0,1,c7605b68d10d656411ea74ad439f9d5683bc28f7e3eb6910a441eeb7fd4750ee,2025-04-04T18:15:48.747000 CVE-2025-31860,0,0,a72f34979df5ea0f16f22d6be6f34791499b83fc474deeda184f29d5a3586f16,2025-04-01T20:26:01.990000 CVE-2025-31861,0,0,270394a1ed801f34baac85043a0338629aceb9ea547e96b69925a7871f6f410f,2025-04-01T20:26:01.990000 CVE-2025-31862,0,0,f5e26b03b1c6a9c746787b8f1eae5b285f09d6a5b285db236ae0ab62303f81e8,2025-04-01T20:26:01.990000 @@ -288480,21 +288485,21 @@ CVE-2025-31906,0,0,858ea326679f35199fd193b52e043ef137ef7190828e881910c02e1564073 CVE-2025-31907,0,0,d42241d500728696f9411bad9f6074b9f63ac7eaf81e97702878a9e276105f17,2025-04-03T14:15:42.953000 CVE-2025-31908,0,0,eb42864180a2f3ae29ca7fcb7b1369893cc75fb1cfe5c6047b9b04c7be11c526,2025-04-01T20:26:01.990000 CVE-2025-31909,0,0,81eff332f8808b56a6e7fb4cb9dd28a2a0d39da7b5ec69237fa3a2fbf730de58,2025-04-03T14:15:43.107000 -CVE-2025-3191,0,1,a41968c3e25ed9922d1993e31d600b413eee7247c0df9bf4f8dac7d33c4a0057,2025-04-04T15:15:49.177000 +CVE-2025-3191,0,0,a41968c3e25ed9922d1993e31d600b413eee7247c0df9bf4f8dac7d33c4a0057,2025-04-04T15:15:49.177000 CVE-2025-31910,0,0,b832932727781de50b17852301cd5a5c89392213265492ff6ff074f0ba795d9f,2025-04-01T20:26:01.990000 CVE-2025-31911,0,0,dafd63d68911a812be24e808d99a55a8ceeb5feee73a79d1772176f67f721793,2025-04-03T14:15:43.257000 -CVE-2025-3192,0,1,6ff927ef044ac559280e8463fc777f39dda12a47ee0f271f04d20c7a92ebcf88,2025-04-04T15:15:49.323000 -CVE-2025-3194,0,1,b0f1563ee3fb341c8686e49381af429bac8353fa11f1fbb65e40033d8a3fb34b,2025-04-04T15:15:49.473000 +CVE-2025-3192,0,0,6ff927ef044ac559280e8463fc777f39dda12a47ee0f271f04d20c7a92ebcf88,2025-04-04T15:15:49.323000 +CVE-2025-3194,0,0,b0f1563ee3fb341c8686e49381af429bac8353fa11f1fbb65e40033d8a3fb34b,2025-04-04T15:15:49.473000 CVE-2025-3195,0,0,e308bbc9d3f37a0c8a9faf387891f3285bc40798453437526976c2501eee7c24,2025-04-04T02:15:18.423000 CVE-2025-3196,0,0,0c469902e9c03af3c2770eb5cc31c7d1c31b69b0dd88372a701cee966793608a,2025-04-04T02:15:18.627000 -CVE-2025-3197,0,1,5a556a9ac012adcd51d84fc77560a4f5657c4092158c86aad255d2be783abbb5,2025-04-04T15:15:49.640000 +CVE-2025-3197,0,0,5a556a9ac012adcd51d84fc77560a4f5657c4092158c86aad255d2be783abbb5,2025-04-04T15:15:49.640000 CVE-2025-3198,0,0,5d95a2ea82b745791bf640f9d48bf15646c2f00575cbe9c113a8856b82db0671,2025-04-04T02:15:18.803000 CVE-2025-3199,0,0,3c39a54e77c268763e35ff0806d798e495bbb47478d8118de3630638857b12fa,2025-04-04T02:15:19.013000 -CVE-2025-3202,0,0,7d2271acefbd0aeb4336195e51e318c90694b16ffaeb4c3f403e4e40b17682a9,2025-04-04T03:15:13.997000 -CVE-2025-3203,0,0,919ec0de9ce5860ade794c4c664422a4664c6732dda101b9589a441b4494f02a,2025-04-04T03:15:14.207000 -CVE-2025-3204,0,0,4d1e6c6ff25b45f0c88f0e90b71c7514d44c90d7f8c06f66563eb1f7b4c442db,2025-04-04T03:15:14.413000 +CVE-2025-3202,0,1,558b8c852358ff11061e77a127be2099982b8ad54bbc39d0fa0787770f4378c8,2025-04-04T16:15:39.600000 +CVE-2025-3203,0,1,a5de3d0e4e2c48129754c7a98ad009abad812146aa44cb4bdbd3d73cafc0fc0f,2025-04-04T16:15:39.753000 +CVE-2025-3204,0,1,312cc95228fe73003ec3ebf2ef4e97ce4945abbe3fe9ec6145f4ed560d9816a3,2025-04-04T16:15:39.893000 CVE-2025-32049,0,0,435007e02cdb62387f8cca68a934782de471662e50e804431c640daa69c918ff,2025-04-03T14:15:43.410000 -CVE-2025-3205,0,1,c391235815a6d02e362ab00cb7652ca886981beab938ad575f383cbd12639b5e,2025-04-04T15:15:49.910000 +CVE-2025-3205,0,0,c391235815a6d02e362ab00cb7652ca886981beab938ad575f383cbd12639b5e,2025-04-04T15:15:49.910000 CVE-2025-32050,0,0,4f54b48312cd325a8316d449afd24730a2312b870b9fb45229eadf38b9ccc1c0,2025-04-03T14:15:43.690000 CVE-2025-32051,0,0,589593a5c32fc3f7a2c9e7f401bf3b9d6791113746b52db46878a17a59e4b6ae,2025-04-03T14:15:43.903000 CVE-2025-32052,0,0,93f807bd4245cc5799f1be08815a308eceaa0bb1e8adb95a792899ec2afa2d3d,2025-04-03T15:15:51.933000 @@ -288502,18 +288507,141 @@ CVE-2025-32053,0,0,d520a131e7b01facf20f15232e756d3ec63aa37b267d0001764d8e875c120 CVE-2025-32054,0,0,c7229c2808b9e8a02f9a2719fb481be0ce92ce94e21566b72428d9c00abe0871,2025-04-03T17:15:30.947000 CVE-2025-3206,0,0,9461a858ecbdb40c286c40585f1f296f61c4dd3ce4e76d2f270eac846232eb6d,2025-04-04T04:15:39.357000 CVE-2025-3207,0,0,3472db8b80c3c38b626a489a32005fcd483e835d214256e90e391bca8d00b18b,2025-04-04T04:15:39.603000 -CVE-2025-3208,0,1,572878186f4a32de12db89b170e45669c92b274989dab914bb6e26b51dfeb415,2025-04-04T15:15:50.240000 +CVE-2025-3208,0,0,572878186f4a32de12db89b170e45669c92b274989dab914bb6e26b51dfeb415,2025-04-04T15:15:50.240000 CVE-2025-3209,0,0,62b49ea7164197672367460bafd0c45b13288363a3afc2526bfe72e5f4219256,2025-04-04T05:15:46.600000 -CVE-2025-3210,0,1,c8d24423edd37fed1b718d97d842d50a00442c77bbdb7b2e12a965b8d16300dc,2025-04-04T14:15:24.387000 +CVE-2025-3210,0,0,c8d24423edd37fed1b718d97d842d50a00442c77bbdb7b2e12a965b8d16300dc,2025-04-04T14:15:24.387000 CVE-2025-3211,0,0,901d0e8cc0af47a7a52a66c912e0237d861171b167433649c1cee7a047b46f71,2025-04-04T06:15:41.247000 CVE-2025-32111,0,0,e3f3bc1b4b34ef98fb0364aa81c1af93345c8423f7f5a2bcab6070b4665f246a,2025-04-04T07:15:42.580000 +CVE-2025-32112,1,1,550b509e7ea9f97ca109a9bd4d94015f570d8c3945e63596f7a7a0c52c916943,2025-04-04T16:15:19.123000 +CVE-2025-32113,1,1,bb37c07411976ce1e9f5a51c10ebc742cad9f5db0bb949fe859a0e6102344566,2025-04-04T16:15:19.270000 +CVE-2025-32118,1,1,1bc6bae2762602aea403e1da6cc253ea5e37d86cce18a0d2cca4eb47860262ac,2025-04-04T16:15:19.413000 +CVE-2025-32120,1,1,c586cb10d13624967a36f77b99da2c3b735977ee879de7b74c35e1bc8d0825a4,2025-04-04T16:15:19.567000 +CVE-2025-32121,1,1,a161d6b8e28bea848bc41329c43d87d6dbd31b50d726884b4e486cc9ee5018a4,2025-04-04T16:15:19.710000 +CVE-2025-32122,1,1,b4cbafccfeb22d03434b0a63fcb8cfcd858e7f4ed7c7941b32dc57da3bfeba31,2025-04-04T16:15:19.873000 +CVE-2025-32124,1,1,eb402efa5d7ee59e5a3b6fa94259cc5982f50e2ab8ef4fba7796f6c280a22f59,2025-04-04T16:15:20.027000 +CVE-2025-32125,1,1,82b2924ac92193003d6084252a080e6a4b10ccd9675119db2a6b90857efe4e9c,2025-04-04T16:15:20.177000 +CVE-2025-32126,1,1,596f1689a1123b8886dd9c856d11f88d21fb7b3bd417129823cfde96ae533ef5,2025-04-04T16:15:20.323000 +CVE-2025-32127,1,1,b1eeccf6731e7eabb471fd021b8171f8737c518fd6faaba9608432ca9c006171,2025-04-04T16:15:20.483000 +CVE-2025-32129,1,1,c77deb059e69da60f691cf27d87f36868246d70bec26039730bec1642f5dc74e,2025-04-04T16:15:20.633000 CVE-2025-3213,0,0,9d96e561b551cffe0855bf2b9647f13263d9f4e04e15a0684a1d1e06a49fae26,2025-04-04T06:15:41.480000 +CVE-2025-32130,1,1,4ba77ca18316da592f4a118413bc2ad8ea9ffa6ec964a9f57cf9b512ffe935a0,2025-04-04T16:15:20.783000 +CVE-2025-32131,1,1,f33f1bae428d163feaba1a4b9dc9b2626c3b2f57ddb128b96a33e81ecd918980,2025-04-04T16:15:20.940000 +CVE-2025-32132,1,1,cbc92739f10cc2eb131969d22ac491b6f63108e36764c6174e1577d41c97ced1,2025-04-04T16:15:21.100000 +CVE-2025-32133,1,1,c5dcf2a61d2efbb7252f185ff65bf4e09271c50781c64e2cae3262bf16e5c6b4,2025-04-04T16:15:21.270000 +CVE-2025-32134,1,1,af333ba85dfe2a73203dd73e9c3b72b5641e1a40d4da517cf6f3a23f9924884e,2025-04-04T16:15:21.417000 +CVE-2025-32135,1,1,f3127fb4cb5bd1cfa7e98de6822f1ca7a27c794545fe0b13b2120e7c04a8969b,2025-04-04T16:15:21.573000 +CVE-2025-32136,1,1,5c345c875af2f397e9648933cf448f221e8cba82aa9087358b917680d8c9b513,2025-04-04T16:15:21.723000 +CVE-2025-32137,1,1,f3c490504e1022f7cb61d068a6bd532b8b5090a4a037b6f220d2e5797231a7b1,2025-04-04T16:15:21.883000 +CVE-2025-32138,1,1,b68bd18f45c101dc5010f7982b3844d401ccd43bdb37a72c4388d54c99b6319a,2025-04-04T16:15:22.060000 CVE-2025-3214,0,0,0a9d86013c5f83c623c6504daea66041eff3a79ce66876e9490a500bf3f1dc09,2025-04-04T06:15:41.740000 +CVE-2025-32141,1,1,6c99f2d1566389d21a24a16d5207e094e2efb394a9a0d88fd16b1422c0c8347f,2025-04-04T16:15:22.223000 +CVE-2025-32142,1,1,50180b674b977e6433d7cb4563e5d3d3870618658bad142f69743dd005c8b41a,2025-04-04T16:15:22.403000 +CVE-2025-32146,1,1,835e36550ae668df65ce3631cc7c5b4ed43ccfff9e564582bdf0626f61282be1,2025-04-04T16:15:22.573000 +CVE-2025-32147,1,1,70bfc6e2c68b7e026806b5d7f735d561130c4de31639733d2d04cfe804d83d1a,2025-04-04T16:15:22.740000 +CVE-2025-32148,1,1,5402b0987dc0e51e3f28d40e19ff538f89cf394a1c9cbce56018c5c355e3b549,2025-04-04T16:15:22.900000 +CVE-2025-32149,1,1,452426571b910347b3d81fae118411abfcd6005536e32cf0fbdcf2f9d565bdee,2025-04-04T16:15:23.057000 CVE-2025-3215,0,0,b3a77f349bbe525f135b1274c73d7b20b3840cec1aeec3b3bade0ae456140aba,2025-04-04T07:15:43.143000 +CVE-2025-32150,1,1,a2d9b7d7dd2175b883a0651c324fb51b110a3e9099d95cb3f685731c240d0db0,2025-04-04T16:15:23.213000 +CVE-2025-32151,1,1,02eeb6d085568ca7ef20247652caf2cf4c8cdc4d9653141fa946f75b7850c7a2,2025-04-04T16:15:23.370000 +CVE-2025-32152,1,1,64216ed17d7fd332f1e2a87529bd4998d354329f8b8e05b54eb57709e26a2cbb,2025-04-04T16:15:23.533000 +CVE-2025-32153,1,1,451dc5662be4e6474dc744fe8c338cf1fbc7de4c6b4775a87190eb4310222178,2025-04-04T16:15:23.687000 +CVE-2025-32154,1,1,58e9627957267e60b8f7d6af894bdce510da4e2194c69256358a119aefb19c4f,2025-04-04T16:15:23.833000 +CVE-2025-32155,1,1,c5ef96326e53334153e3c7619e893e809408d5b9376ed4d8a88c4be0fb1b9c53,2025-04-04T16:15:23.997000 +CVE-2025-32156,1,1,c803304db426968a9c05558b2422436e827ffb1901e34142829c89e5d8bfc3a2,2025-04-04T16:15:24.147000 +CVE-2025-32157,1,1,0912b41e70b6693a7e77bed3f04b03308e37370fe092f8f734b71e628a6283dd,2025-04-04T16:15:24.300000 +CVE-2025-32159,1,1,0d2af88d888bdc98b2944e9ae8fabe3f0cd6cf8384f8a9e624accd3b14027c58,2025-04-04T16:15:24.457000 CVE-2025-3216,0,0,15f1863b673497f78a4f23229bea5cca269dcc299849f8cee02dd225b2afbf09,2025-04-04T07:15:43.400000 +CVE-2025-32161,1,1,7a532f7c6a31b122a66594d0ac7563bb6e8225845ea1a95165ca9a0d2c15deb7,2025-04-04T16:15:24.603000 +CVE-2025-32162,1,1,59a79b74fb860b5cf7bbd1e6814316d9185328c869eded6d1de42d93816de26f,2025-04-04T16:15:24.760000 +CVE-2025-32163,1,1,58cd79127c288544941af95568da0a56290f7d9f85d8366628d80677d0c3f043,2025-04-04T16:15:24.917000 +CVE-2025-32165,1,1,6c9b347c7945b52743ecf6be1548e0aacba376a9c01168d606f1abbe919f98a6,2025-04-04T16:15:25.070000 +CVE-2025-32166,1,1,9a211f2205488911b54c66598435ed14f189dd8d519d5f8c0fffe160502430ed,2025-04-04T16:15:25.217000 +CVE-2025-32167,1,1,94ee5ef3abf386822eba3a1832786c235616e83b578722ddb677e967b2fc204e,2025-04-04T16:15:25.370000 +CVE-2025-32168,1,1,154d050d71515a1d4a4272e6559ef35819924e8fec49b7a081867056ba768ba5,2025-04-04T16:15:25.527000 +CVE-2025-32169,1,1,bd6ad69b39037fb9895adfeec93ad15936cdc5316988b27c9ed66907cabe5d9d,2025-04-04T16:15:25.683000 CVE-2025-3217,0,0,a40fb1147322b2e605d2f06652d9fd97bfc430636da25b6d552eb7fa1193e789,2025-04-04T07:15:43.707000 +CVE-2025-32170,1,1,f75c9857605ff760a131eef64ff093a2309b32a1f4a537ed07be357ed7f072c9,2025-04-04T16:15:25.847000 +CVE-2025-32171,1,1,d43fde9fecc4c4669166bb0392d8cc792eaacdcfaea168ce8c99e0da5def561d,2025-04-04T16:15:26.017000 +CVE-2025-32172,1,1,e4b003354eea94a96b780e60701cb668abafbba08f0103660def3604af276d69,2025-04-04T16:15:26.173000 +CVE-2025-32173,1,1,a07e102a9da135266d3c07c124f9c5e2c4decd4efcbc4156bf6a9ce5da6aed4f,2025-04-04T16:15:26.343000 +CVE-2025-32174,1,1,0d7ecec5f455e71257d59a9366fe98d6e040825a44c4ee472f044133b4ecafa2,2025-04-04T16:15:26.500000 +CVE-2025-32175,1,1,facf91ce55806d681abc50f4a55672941796ee02ca38c476c0fd00982d910d4f,2025-04-04T16:15:26.660000 +CVE-2025-32176,1,1,eb3bde30847e3a3b66720348c426c8cb5031da5585cfd054d7194b00acccb260,2025-04-04T16:15:26.817000 +CVE-2025-32177,1,1,c87da839f21d4a96f637c675ecc5c2312515d6d50316404f030f316f85695c53,2025-04-04T16:15:26.993000 +CVE-2025-32178,1,1,e3c52b472e546efeefa1ba3b30c58c2360ae87298f740f40e5979e6c4bb27f91,2025-04-04T16:15:27.173000 +CVE-2025-32179,1,1,a8adeabc2edd75dd61c5311af0eb8d5130567740c5ed64c2a41d294f02650eb1,2025-04-04T16:15:27.327000 +CVE-2025-32181,1,1,3c31344e03f9157fe52fc6d4e7972f46f9b0deb7aaaea1c744eeeb4779fb87c4,2025-04-04T16:15:27.477000 +CVE-2025-32182,1,1,41f0b128117bd85367a3e445e7e0f50a297db9aa99e67b387234de7760c8772d,2025-04-04T16:15:27.623000 +CVE-2025-32183,1,1,4183e238b877ad487e21463ce2fa15ba7f5bd444d7751be17704e2e3419bd3cd,2025-04-04T16:15:27.770000 +CVE-2025-32184,1,1,cf03ba68e92f61f98f4ddae0aa4a34faefaa511db9f3325a83bcf9d27e11dd01,2025-04-04T16:15:27.930000 +CVE-2025-32185,1,1,6d3cf9b39c1961b8d8c377729e6180c9b68394e6d9e91422c31a445382d935d5,2025-04-04T16:15:28.083000 +CVE-2025-32186,1,1,2e99321d5a8290e6dae9124a2acdf579eb1940d85f9b5bdae11aca493abc2379,2025-04-04T16:15:28.243000 +CVE-2025-32187,1,1,1f5b7c437c4f365d624155ba9123ac1f0f324ff4b29eb81eb797370cdff2d4c9,2025-04-04T16:15:28.407000 +CVE-2025-32188,1,1,2be088d9b3af8787d09f15e90bed9ba764775595d5eb5adca25411b2f5f04a03,2025-04-04T16:15:28.557000 +CVE-2025-32189,1,1,d6acb5c02c77efca9ebd10a44978ecac130b7a19cccd1c56748458b2b9ed6f10,2025-04-04T16:15:28.717000 CVE-2025-3219,0,0,dcfa632dff9e94c092f2d73b57763caab9c8b78bb5cc723e30d512c5a10d7868,2025-04-04T08:15:14.543000 +CVE-2025-32190,1,1,31e4ee937b8554bb40d757fc7890c00db7bb796c0e3de64e8fb3826bdeded596,2025-04-04T16:15:28.897000 +CVE-2025-32191,1,1,7062ea4c2848fa83fea19dcd5386b0b309e07a6d5733120ce906b596f05a2417,2025-04-04T16:15:29.040000 +CVE-2025-32192,1,1,29b6610519f8ca10d30c435def2bfbaac5ac31a93d80cce8e93bbbd0283a5ae3,2025-04-04T16:15:29.187000 +CVE-2025-32193,1,1,b80b1f401d2d9808b73d591a30f10a77652a8d5c6227b9f575e42b31e3cb65b2,2025-04-04T16:15:29.343000 +CVE-2025-32194,1,1,c84dc253946d99b5a9d18c487935dcb827d0625c8cd4b663b13e1c87382e98f4,2025-04-04T16:15:29.490000 +CVE-2025-32195,1,1,dc44baabf9cc50933d26b012c9e0d7f5e047a393204f418c8eb944a2334bdb62,2025-04-04T16:15:29.640000 +CVE-2025-32196,1,1,8d5fccb604987b6e380877b564da51d474b51dfe1bd1f376290352f9c5fd9191,2025-04-04T16:15:29.790000 +CVE-2025-32197,1,1,e7ed6e65c9b56c58eb669262f7ade92c5ff9cc2f27b70ca2f8354daf499ffc3a,2025-04-04T16:15:29.953000 CVE-2025-3220,0,0,ba171ffb9f57124578c57e06aaab81ada82d0720d186647156c5c4abaa6f4704,2025-04-04T08:15:14.767000 +CVE-2025-32200,1,1,aaf975115502ab06cab53efaa3e9c996e9161152669a8bc2a83786ba4a600b5f,2025-04-04T16:15:30.107000 +CVE-2025-32201,1,1,a685a3f20176aad2ebc9f7c74a2534d9edb7c312fc8fbdc3626c1ad349c08093,2025-04-04T16:15:30.253000 +CVE-2025-32203,1,1,38b703c94ccd44c2091e6a3b256223abf8f71f8488270f9abe9864de9e67e044,2025-04-04T16:15:30.407000 +CVE-2025-32204,1,1,31e4bcf3b10d8d68cf12b61aaa24fb0fd3ecd988cf1f40a1a9ce7e684926331c,2025-04-04T16:15:30.560000 +CVE-2025-32207,1,1,75e2056391efa82a34ed6b21a4c33eea962979459d9386faa4561ec58e15378c,2025-04-04T16:15:30.713000 +CVE-2025-32217,1,1,e1c7e53ba8b3964453eb0d9088ee252505a6a40b83c74bbe6a945b79a9f5fdad,2025-04-04T16:15:30.873000 +CVE-2025-32218,1,1,1892ad5f4aee260236bb136f6a18ffd93ed366bc2a7178c624cfb6324df760f9,2025-04-04T16:15:31.043000 +CVE-2025-32219,1,1,14ee61a0cbe2af5d0cacd1eac315cfc6b8d264121c59fd579a7c38bc6cade102,2025-04-04T16:15:31.200000 +CVE-2025-32220,1,1,e322cfc352451b16cea841554e9d91cad68ff9ebfe3dbadac49f71c370ffb06e,2025-04-04T16:15:31.357000 +CVE-2025-32224,1,1,e8ef7f1d6a5832c19e01f784b2c72f4466eb5f825096eb1dfe2a8a81969ab6f5,2025-04-04T16:15:31.530000 +CVE-2025-32225,1,1,f8d715c9d80757f649c31df4d446da738146f5bd48886507492e01b0da754aa8,2025-04-04T16:15:31.703000 +CVE-2025-32226,1,1,4389cf62cdacff3fd8a86964a8a33468dcc6d50eec69cf4b8753ac5f697aef5a,2025-04-04T16:15:31.863000 +CVE-2025-32229,1,1,0b79983680936448166d4bc439fba19a260de494b361ee06d602539160c9e4cd,2025-04-04T16:15:32.040000 +CVE-2025-32231,1,1,eeb64ea03baf03d72abcca526fdacd1b546ce0bddc106b891c98f7000312dab9,2025-04-04T16:15:32.223000 +CVE-2025-32232,1,1,7c228a26e649d975de1784e3f3e2f1bbb356c7794b16a160c03a2289d7ed2213,2025-04-04T16:15:32.397000 +CVE-2025-32233,1,1,eb8d64ea88cc87be6a2e7c23ce5eb31549180b78474cf023988f7eebcb6fed25,2025-04-04T16:15:32.617000 +CVE-2025-32234,1,1,755c52b1da07d0cce37288d23e9a03aec654ed4b4f026e823af5486fdca98bd1,2025-04-04T16:15:32.760000 +CVE-2025-32235,1,1,781955c6df5da9425c9e0499ca29ed4ce209c4c3706befcaa3756aedb1f3c894,2025-04-04T16:15:32.917000 +CVE-2025-32237,1,1,55dd1741d9ad0f37020254bd68efdc9b2ef86b69f1ebdf51ad7471b4bb72ea55,2025-04-04T16:15:33.077000 +CVE-2025-32238,1,1,a479d62f0fad0ff4250437da19aae045ae83f016b0c84d77b3f51080cd9ca417,2025-04-04T16:15:33.233000 +CVE-2025-32239,1,1,18cd9eb9061b79ed3e5342dc93c5d0c3ca8e10e4e618555e870ec236d2d8d18a,2025-04-04T16:15:33.383000 +CVE-2025-32241,1,1,b3051eb3c37f5359b25d9ef38d99cab3d2d8cfa037b08a742d1bd50dbc70c5a9,2025-04-04T16:15:33.530000 +CVE-2025-32246,1,1,e056f95f5a22c8f817479156be5a01a8c4a1e79140980d0e624b2a15593ae789,2025-04-04T16:15:33.673000 +CVE-2025-32247,1,1,f5cfa734278aae83b290d8767cad34a36ce793be914753fd5b3e046120a338b2,2025-04-04T16:15:33.820000 +CVE-2025-32248,1,1,bf5ac21099d3cb731b724f7edc3c4be02c6e3cc61497b3fdb5b5736627afa1e5,2025-04-04T16:15:33.973000 +CVE-2025-32249,1,1,cbb9c8e17e866390a6ddcf36f11f005d885bebf1198a89caa53e0240637d85b9,2025-04-04T16:15:34.123000 +CVE-2025-32250,1,1,25d49d2ea06fed883ed12124cfcfdd0d24b84ba9f97394e9038ec67e4e349c0b,2025-04-04T16:15:34.273000 +CVE-2025-32251,1,1,95c3daecec3babe6c13e155a79e835f4c678b053945e21112bc987026f5d568f,2025-04-04T16:15:34.423000 +CVE-2025-32252,1,1,02c57b48af70a7f44d0bca65dd088191f91332c72c90b9ff25c8d20b2c65445f,2025-04-04T16:15:34.573000 +CVE-2025-32253,1,1,532474d34888e452ac12a320eda72b41825c755973143ac27fac40bc6350536b,2025-04-04T16:15:34.720000 +CVE-2025-32254,1,1,db408cab39f3dfd6bbebb20459240506f521070522e19057b14d51b3371e3b4f,2025-04-04T16:15:34.887000 +CVE-2025-32255,1,1,470695736d1065cb97c968ab2e52b7c466a54df1f17ebbaaccc3e2d8da670fe3,2025-04-04T16:15:35.047000 +CVE-2025-32256,1,1,5d785297c0081b44ffc09c153cca71883f9be0c799b5835323adbb4c7c0d0c34,2025-04-04T16:15:35.190000 +CVE-2025-32257,1,1,66cd1d0ab58d11b8e16c929066c620f81adba73e65f335ce9f4b3b7a9963d9ed,2025-04-04T16:15:35.343000 +CVE-2025-32258,1,1,3d3bc15255369d22ddc641760ee3f9feb4770b0c0fcd10be6964852d0ba13451,2025-04-04T16:15:36.573000 +CVE-2025-32261,1,1,39060539ba4e78d3f2c6ad2971b0041aa1de2e77a228f0c58adc0e9ec8f73413,2025-04-04T16:15:36.720000 +CVE-2025-32262,1,1,60a03d61bf0be3409f98551f1cafbde5c11c2d2e85457ce1b9b115c9789ccd1c,2025-04-04T16:15:36.887000 +CVE-2025-32263,1,1,cf1e2443c8c8d0e7e2ecc2036c5434a0a5f60efdcadcbe4fbeab76eedeca82a5,2025-04-04T16:15:37.060000 +CVE-2025-32264,1,1,054ced603c849ce21a8c849104515ebd210f5df6590f21a8753ff2b789d0fc21,2025-04-04T16:15:37.230000 +CVE-2025-32265,1,1,305cf95fa6e619e4e1e0bba0ec427986f42e65142bc31d0486605f63950f9e55,2025-04-04T16:15:37.410000 +CVE-2025-32266,1,1,7e39af8c06028d4cdb80979bef57b639e06a8fdcf8a2f58aacf9fe56b7cbd6b2,2025-04-04T16:15:37.560000 +CVE-2025-32267,1,1,f41c742cd48bef47a7cd0747530b0e71b3098aa001fc72637015b88a66b77df0,2025-04-04T16:15:37.713000 +CVE-2025-32268,1,1,60a3ea56144af22b10c4bab0f789a57f56851aa20169ce0428d85fac33f7205e,2025-04-04T16:15:37.870000 +CVE-2025-32269,1,1,8b489fcce237ddfd60e54a01a56a31d2731df6497004d26d7aa6fc3d97665959,2025-04-04T16:15:38.060000 +CVE-2025-32270,1,1,02bf00581800a9d0867f19bcd67de51a44c2784ba542c7d1573ba38e08634088,2025-04-04T16:15:38.213000 +CVE-2025-32271,1,1,0c683f8988c9a41dea23bf3aa1bf965a392cd72ffb1a040d5c9f8451c62b5547,2025-04-04T16:15:38.370000 +CVE-2025-32272,1,1,adc4c4884c9e44a8934f4dd0c7cba093eb0779ff44a1a2172f1f148d09a008cf,2025-04-04T16:15:38.530000 +CVE-2025-32273,1,1,b1f340f91de99ec36a965a878a97c519eb4b7dddd1d7916eec91dda99224e389,2025-04-04T16:15:38.677000 +CVE-2025-32274,1,1,5253088530512721b01f84000fa772e80dc80aa820377d23bc5685fffd571a9d,2025-04-04T16:15:38.820000 +CVE-2025-32276,1,1,31d194914a3b3fc022cda89dfa4e638d96382a81732a57cc28010dc664227ad3,2025-04-04T16:15:39.007000 +CVE-2025-32277,1,1,b1dc9ec3c67e33a38734cfecffc8d4b6880726270bb2693f50c56b6406fc7fb7,2025-04-04T16:15:39.170000 +CVE-2025-32278,1,1,d1cd528ded21f9e9f51f11230764badd6d782cd0e02a61758708e7caf17a713f,2025-04-04T16:15:39.307000 +CVE-2025-32280,1,1,d476e0ea637ab56145969c302826537350b13f731c646bac3d054d0da04d3c90,2025-04-04T16:15:39.453000 CVE-2025-3229,0,0,09347180a6a7f828e0747f2ed45b00fdd7a1f719f9ab350e19aecf2c1c123a1d,2025-04-04T09:15:17.357000 CVE-2025-3231,0,0,de2ff2a8c76e38c6b06f54c3981a381c63043cd187dc0f869ed608d2e9e7696c,2025-04-04T09:15:17.677000 CVE-2025-3235,0,0,d022d5157edbac8fbfeb9141a3748050787bdf76ed78cf441cd594af050e5131,2025-04-04T10:15:16.900000 @@ -288526,7 +288654,15 @@ CVE-2025-3241,0,0,6109a3416c31e472988921dc354b6985d4f1985e340f34f97f9d234f6989df CVE-2025-3242,0,0,60be5ba649ac775f082baeb48a3ba854460f9aca2f32b24fcfec33ebf86a1f6c,2025-04-04T11:15:40.980000 CVE-2025-3243,0,0,6cc184b6e9c2da2a9036a96f34024776eea63025e8c651f8f4b858c84c5a62f4,2025-04-04T12:15:15.530000 CVE-2025-3244,0,0,f40fcae26782bbc07fea6b0fd93020e8bffc63cfce19c9be4fcd9d216f2366f1,2025-04-04T12:15:16.217000 -CVE-2025-3245,0,1,719463a05c2b972e975033ac8fbee21d345e2dfa69a11b5d3c4d923c7b48331a,2025-04-04T14:15:25.283000 -CVE-2025-3249,1,1,9468a95d636cf95f8d83ac96afbef19c05f3fa32bf9ff611f4f43f0268bfb199,2025-04-04T14:15:25.453000 -CVE-2025-3250,1,1,c6b0a4a5a58b06a05a3aba62106adf5895c7b2d099a3b853bd2803f1dfea0142,2025-04-04T15:15:51.340000 -CVE-2025-3251,1,1,43369d9c13b99be934cf064e0077db7d0a205fec81c28b9b90ff32f250c9654d,2025-04-04T15:15:51.580000 +CVE-2025-3245,0,0,719463a05c2b972e975033ac8fbee21d345e2dfa69a11b5d3c4d923c7b48331a,2025-04-04T14:15:25.283000 +CVE-2025-3249,0,0,9468a95d636cf95f8d83ac96afbef19c05f3fa32bf9ff611f4f43f0268bfb199,2025-04-04T14:15:25.453000 +CVE-2025-3250,0,0,c6b0a4a5a58b06a05a3aba62106adf5895c7b2d099a3b853bd2803f1dfea0142,2025-04-04T15:15:51.340000 +CVE-2025-3251,0,0,43369d9c13b99be934cf064e0077db7d0a205fec81c28b9b90ff32f250c9654d,2025-04-04T15:15:51.580000 +CVE-2025-3252,1,1,be9e20ecbc76460bf8e960fc49484c31c33a29e2bb44ec60ae24b28d0534af22,2025-04-04T16:15:40.180000 +CVE-2025-3253,1,1,b8fb8ada3c90d47625b6ad4ef16a7a2d4ad424ea0868cca2d373e9f9bf0ad658,2025-04-04T16:15:40.390000 +CVE-2025-3254,1,1,d1ba66b7587275a1a2034ed1681af0beb428343f7bcf33b5cae328b2b0baa661,2025-04-04T16:15:40.607000 +CVE-2025-3255,1,1,eae69b564cf473101397335def8a8cb5fef22c20957e600d2610b022b444c769,2025-04-04T16:15:40.807000 +CVE-2025-3256,1,1,4c621231d53771d7f6785460fcba6c29b8cc5f916b53bc859cc28e9e0b922dbb,2025-04-04T17:15:47.500000 +CVE-2025-3257,1,1,5eb768dd83dd9634c0c2065c0e9d51eeda8ee70c91bc5bc83a2d953d8669a1d3,2025-04-04T17:15:47.740000 +CVE-2025-3258,1,1,04bb7f2f268aae8ee6c08acbe806fcb0cf110f1eaacabcca090f01b8ea33d157,2025-04-04T17:15:47.977000 +CVE-2025-3259,1,1,3fdfb77d40d547ee680432efb200487c9e16663caa6810a877e326cf8e69b013,2025-04-04T19:15:48.333000