Auto-Update: 2025-04-08T22:00:20.363570+00:00

This commit is contained in:
cad-safe-bot 2025-04-08 22:03:52 +00:00
parent 5078ea7114
commit b83e55aa49
86 changed files with 3770 additions and 751 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26402",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-01-11T08:15:11.537",
"lastModified": "2024-11-21T05:56:18.433",
"lastModified": "2025-04-08T21:15:42.833",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26403",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-01-11T08:15:11.590",
"lastModified": "2024-11-21T05:56:18.587",
"lastModified": "2025-04-08T21:15:43.530",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26404",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-01-11T08:15:11.647",
"lastModified": "2024-11-21T05:56:18.740",
"lastModified": "2025-04-08T21:15:43.733",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-26407",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-01-11T08:15:11.693",
"lastModified": "2024-11-21T05:56:19.060",
"lastModified": "2025-04-08T21:15:43.920",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-330"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-330"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-36647",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-17T21:15:10.880",
"lastModified": "2024-11-21T06:13:53.947",
"lastModified": "2025-04-08T21:15:44.210",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-327"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-23739",
"sourceIdentifier": "product-cna@github.com",
"published": "2023-01-17T19:15:11.340",
"lastModified": "2024-11-21T06:49:12.860",
"lastModified": "2025-04-08T21:15:44.423",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3904",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-16T16:15:10.783",
"lastModified": "2024-11-21T07:20:30.243",
"lastModified": "2025-04-08T20:15:16.833",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41703",
"sourceIdentifier": "security@apache.org",
"published": "2023-01-16T11:15:10.303",
"lastModified": "2024-11-21T07:23:41.103",
"lastModified": "2025-04-08T21:15:44.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4295",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-16T16:15:11.213",
"lastModified": "2024-11-21T07:34:57.627",
"lastModified": "2025-04-08T21:15:45.300",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4344",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-01-12T00:15:08.797",
"lastModified": "2024-11-21T07:35:05.740",
"lastModified": "2025-04-08T20:15:17.753",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-400"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4447",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-16T16:15:11.817",
"lastModified": "2024-11-21T07:35:16.860",
"lastModified": "2025-04-08T20:15:17.913",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4464",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-16T16:15:12.167",
"lastModified": "2024-11-21T07:35:18.877",
"lastModified": "2025-04-08T20:15:18.080",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4469",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-16T16:15:12.300",
"lastModified": "2024-11-21T07:35:19.520",
"lastModified": "2025-04-08T20:15:18.247",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4484",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-16T16:15:12.887",
"lastModified": "2024-11-21T07:35:21.380",
"lastModified": "2025-04-08T20:15:18.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4487",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-16T16:15:13.027",
"lastModified": "2024-11-21T07:35:21.733",
"lastModified": "2025-04-08T20:15:18.607",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4543",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-01-11T15:15:09.673",
"lastModified": "2024-11-21T07:35:27.500",
"lastModified": "2025-04-08T20:15:18.790",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4578",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-16T16:15:13.510",
"lastModified": "2024-11-21T07:35:31.883",
"lastModified": "2025-04-08T20:15:18.993",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4653",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-16T16:15:13.640",
"lastModified": "2024-11-21T07:35:40.643",
"lastModified": "2025-04-08T20:15:19.183",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47630",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-16T16:15:10.940",
"lastModified": "2024-11-27T20:03:20.203",
"lastModified": "2025-04-08T21:15:44.903",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48252",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-11T02:15:11.483",
"lastModified": "2024-11-21T07:33:03.123",
"lastModified": "2025-04-08T21:15:45.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48253",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-11T03:15:10.020",
"lastModified": "2024-11-21T07:33:03.267",
"lastModified": "2025-04-08T20:15:17.530",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23595",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-15T07:15:08.017",
"lastModified": "2024-11-21T07:46:30.073",
"lastModified": "2025-04-08T21:15:45.467",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-611"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-12556",
"sourceIdentifier": "bressers@elastic.co",
"published": "2025-04-08T20:15:19.420",
"lastModified": "2025-04-08T20:15:19.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Prototype Pollution in Kibana can lead to code injection via unrestricted file upload combined with path traversal."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "bressers@elastic.co",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "bressers@elastic.co",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"references": [
{
"url": "https://discuss.elastic.co/t/kibana-8-16-4-and-8-17-2-security-update-esa-2025-02/376918",
"source": "bressers@elastic.co"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13878",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-20T06:15:22.113",
"lastModified": "2025-03-20T20:15:30.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T21:08:16.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jakehelbig:spotbot:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.1.8",
"matchCriteriaId": "FD20B3B2-66FE-40DC-A240-13991A52B667"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/882b2022-4ed6-4d9e-8b35-f48ea1580884/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13880",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-20T06:15:22.213",
"lastModified": "2025-03-20T20:15:30.667",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T21:03:21.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dropstr:my_quota:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.8",
"matchCriteriaId": "63437EAA-D9A1-4A81-9B4A-4F9FC11542F9"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/bee3b002-e808-4402-8bf6-4375ed7b3807/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13881",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-20T06:15:22.317",
"lastModified": "2025-03-20T20:15:30.790",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T21:00:25.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gunnettmd:linkmyposts:1.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "649AF27D-E58F-434F-980C-C58EADEE9B1D"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/900fa2c6-0cac-4920-aef2-e8b94248b62e/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22611",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T19:15:39.260",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:21:55.530",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-emr:openemr:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1544016-ACCB-4CC7-A241-1D07A8661B06"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/baolqinfosec/CVE-Reseach/blob/main/OpenERM_CVE-2024-22611.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45346",
"sourceIdentifier": "security@xiaomi.com",
"published": "2024-08-28T07:15:08.823",
"lastModified": "2025-03-27T07:15:37.187",
"lastModified": "2025-04-08T21:15:46.533",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -49,16 +49,6 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46494",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-07T20:15:19.950",
"lastModified": "2025-04-08T18:13:53.347",
"lastModified": "2025-04-08T20:15:19.813",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,50 @@
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en Typecho v1.2.1 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Nombre debajo de un comentario de un art\u00edculo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://h40vv3n.github.io/2024/09/05/typecho-xss/",
"source": "cve@mitre.org"
},
{
"url": "https://h40vv3n.github.io/2024/09/05/typecho-xss/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46887",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-10-08T09:15:16.447",
"lastModified": "2025-01-27T18:15:39.660",
"lastModified": "2025-04-08T21:15:46.690",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -80,49 +80,19 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47212",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T21:15:38.523",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:06:27.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:snowplow:iglu_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.13.1",
"matchCriteriaId": "17F959D6-182B-4438-9EC1-490A0758533F"
}
]
}
]
}
],
"references": [
{
"url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0286",
"sourceIdentifier": "cret@cert.org",
"published": "2025-03-03T17:15:13.537",
"lastModified": "2025-03-27T19:15:48.663",
"lastModified": "2025-04-08T21:15:47.133",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,18 +39,6 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21522",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:17.797",
"lastModified": "2025-01-22T19:15:11.577",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:44:06.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "AF091998-B545-474D-A31F-ED2C971AA64A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "B10E8F6D-041F-410A-90BA-461AD19DB569"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "BE5CCDEC-E9CF-4D97-AA17-39DF462918AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21523",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:17.937",
"lastModified": "2025-01-31T21:15:13.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:44:12.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "AF091998-B545-474D-A31F-ED2C971AA64A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "B10E8F6D-041F-410A-90BA-461AD19DB569"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "BE5CCDEC-E9CF-4D97-AA17-39DF462918AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21525",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:18.210",
"lastModified": "2025-01-22T19:15:11.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:44:16.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.39",
"matchCriteriaId": "6C338948-2AAC-47B7-B3CD-C5F10B1AE7ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.2",
"matchCriteriaId": "9AED5FB1-1F21-4D10-904F-3124A719B08A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.0.1",
"matchCriteriaId": "68961D2D-4D0A-4407-87B3-55CD49B84675"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21529",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:18.720",
"lastModified": "2025-03-24T18:15:22.553",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:44:21.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "AF091998-B545-474D-A31F-ED2C971AA64A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "B10E8F6D-041F-410A-90BA-461AD19DB569"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "BE5CCDEC-E9CF-4D97-AA17-39DF462918AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21531",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:18.980",
"lastModified": "2025-01-22T19:15:11.807",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:53:44.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,74 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6.0",
"versionEndIncluding": "7.6.32",
"matchCriteriaId": "4AFAE8F8-2FAD-4A31-9AAD-93DCA1AA990E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "42E28B08-50A1-422B-9181-191B6C40F226"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "075176A9-E7B6-4ED3-8E2D-5F5034853EFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "7D9CBDD9-F240-4C17-9211-E16344DD6B12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "AF091998-B545-474D-A31F-ED2C971AA64A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "B10E8F6D-041F-410A-90BA-461AD19DB569"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "BE5CCDEC-E9CF-4D97-AA17-39DF462918AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21534",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:19.363",
"lastModified": "2025-01-22T19:15:12.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:53:53.383",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.39",
"matchCriteriaId": "6C338948-2AAC-47B7-B3CD-C5F10B1AE7ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.2",
"matchCriteriaId": "9AED5FB1-1F21-4D10-904F-3124A719B08A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.0.1",
"matchCriteriaId": "68961D2D-4D0A-4407-87B3-55CD49B84675"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21536",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:19.613",
"lastModified": "2025-01-22T19:15:12.263",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:53:58.330",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.39",
"matchCriteriaId": "6C338948-2AAC-47B7-B3CD-C5F10B1AE7ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.2",
"matchCriteriaId": "9AED5FB1-1F21-4D10-904F-3124A719B08A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.0.1",
"matchCriteriaId": "68961D2D-4D0A-4407-87B3-55CD49B84675"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21540",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:20.153",
"lastModified": "2025-01-22T19:15:12.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:12:26.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "AF091998-B545-474D-A31F-ED2C971AA64A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "B10E8F6D-041F-410A-90BA-461AD19DB569"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "BE5CCDEC-E9CF-4D97-AA17-39DF462918AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21543",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:20.550",
"lastModified": "2025-01-22T19:15:13.060",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:13:35.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,74 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6.0",
"versionEndIncluding": "7.6.32",
"matchCriteriaId": "4AFAE8F8-2FAD-4A31-9AAD-93DCA1AA990E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "42E28B08-50A1-422B-9181-191B6C40F226"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "075176A9-E7B6-4ED3-8E2D-5F5034853EFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "7D9CBDD9-F240-4C17-9211-E16344DD6B12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "AF091998-B545-474D-A31F-ED2C971AA64A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "B10E8F6D-041F-410A-90BA-461AD19DB569"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "BE5CCDEC-E9CF-4D97-AA17-39DF462918AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21546",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:20.987",
"lastModified": "2025-03-18T14:15:41.940",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:14:45.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "AF091998-B545-474D-A31F-ED2C971AA64A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "B10E8F6D-041F-410A-90BA-461AD19DB569"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "BE5CCDEC-E9CF-4D97-AA17-39DF462918AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21555",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:22.163",
"lastModified": "2025-02-04T16:15:42.037",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:14:54.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "AF091998-B545-474D-A31F-ED2C971AA64A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "B10E8F6D-041F-410A-90BA-461AD19DB569"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "BE5CCDEC-E9CF-4D97-AA17-39DF462918AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21559",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:22.667",
"lastModified": "2025-02-04T16:15:42.407",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:39.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.40",
"matchCriteriaId": "AF091998-B545-474D-A31F-ED2C971AA64A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.4.0",
"versionEndIncluding": "8.4.3",
"matchCriteriaId": "B10E8F6D-041F-410A-90BA-461AD19DB569"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "BE5CCDEC-E9CF-4D97-AA17-39DF462918AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21566",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.590",
"lastModified": "2025-02-04T17:15:21.033",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:16:02.830",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "BE5CCDEC-E9CF-4D97-AA17-39DF462918AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21567",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:23.710",
"lastModified": "2025-02-04T17:15:21.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:16:13.823",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndIncluding": "9.1.0",
"matchCriteriaId": "BE5CCDEC-E9CF-4D97-AA17-39DF462918AB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-22871",
"sourceIdentifier": "security@golang.org",
"published": "2025-04-08T20:15:20.183",
"lastModified": "2025-04-08T21:15:48.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext."
}
],
"metrics": {},
"references": [
{
"url": "https://go.dev/cl/652998",
"source": "security@golang.org"
},
{
"url": "https://go.dev/issue/71988",
"source": "security@golang.org"
},
{
"url": "https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk",
"source": "security@golang.org"
},
{
"url": "https://pkg.go.dev/vuln/GO-2025-3563",
"source": "security@golang.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/04/04/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24446",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:20.417",
"lastModified": "2025-04-08T20:15:20.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-24447",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:20.573",
"lastModified": "2025-04-08T20:15:20.573",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-26818",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T20:15:23.980",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:10:49.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netwrix:password_secure:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.2.2",
"matchCriteriaId": "B6E0D93D-A704-456F-897E-EB7CD4830DDA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpcenter.netwrix.com/bundle/PasswordSecure_9.2_ReleaseNotes/resource/Netwrix_PasswordSecure_9.2_BugFixList.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://security.netwrix.com/advisories/adv-2025-009",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27082",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-04-08T17:15:36.233",
"lastModified": "2025-04-08T18:13:53.347",
"lastModified": "2025-04-08T21:15:50.273",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04845en_us&docLocale=en_US",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27188",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T21:15:50.393",
"lastModified": "2025-04-08T21:15:50.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/magento/apsb25-26.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27189",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T21:15:50.567",
"lastModified": "2025-04-08T21:15:50.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could be exploited to cause a denial-of-service condition. An attacker could trick a logged-in user into submitting a forged request to the vulnerable application, which may disrupt service availability. Exploitation of this issue requires user interaction, typically in the form of clicking a malicious link or visiting an attacker-controlled website."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/magento/apsb25-26.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27190",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T21:15:50.727",
"lastModified": "2025-04-08T21:15:50.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/magento/apsb25-26.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27191",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T21:15:50.883",
"lastModified": "2025-04-08T21:15:50.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/magento/apsb25-26.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27192",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T21:15:51.040",
"lastModified": "2025-04-08T21:15:51.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Insufficiently Protected Credentials vulnerability that could lead to a security feature bypass. A high privileged attacker could exploit this vulnerability to gain unauthorized access to protected resources by obtaining sensitive credential information. Exploitation of this issue does not require user interaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/magento/apsb25-26.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28402",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-07T16:15:24.383",
"lastModified": "2025-04-08T18:14:17.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:23.407",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del par\u00e1metro jobId"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28402.md",
@ -24,6 +59,10 @@
{
"url": "https://github.com/yangzongzhuan/RuoYi",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28402.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28403",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-07T16:15:24.493",
"lastModified": "2025-04-08T18:14:17.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:23.590",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo editSave y no valida correctamente si el usuario solicitante tiene privilegios administrativos antes de permitir modificaciones en la configuraci\u00f3n del sistema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28403.md",
@ -24,6 +59,10 @@
{
"url": "https://github.com/yangzongzhuan/RuoYi",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28403.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28405",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-07T16:15:24.603",
"lastModified": "2025-04-08T18:14:17.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:23.770",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo changeStatus"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28405.md",
@ -24,6 +59,10 @@
{
"url": "https://github.com/yangzongzhuan/RuoYi",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28405.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28406",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-07T16:15:24.710",
"lastModified": "2025-04-08T18:14:17.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:23.950",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del par\u00e1metro jobLogId"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28406.md",
@ -24,6 +59,10 @@
{
"url": "https://github.com/yangzongzhuan/RuoYi",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28406.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28407",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-07T16:15:24.827",
"lastModified": "2025-04-08T18:14:17.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:24.137",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo de edici\u00f3n del endpoint /edit/{dictId} y no valida correctamente si el usuario solicitante tiene permiso para modificar el dictId especificado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28407.md",
@ -24,6 +59,10 @@
{
"url": "https://github.com/yangzongzhuan/RuoYi",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28407.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28408",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-07T16:15:24.947",
"lastModified": "2025-04-08T18:14:17.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:24.320",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo selectDeptTree del endpoint /selectDeptTree/{deptId} no valida correctamente el par\u00e1metro deptId"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28408.md",
@ -24,6 +59,10 @@
{
"url": "https://github.com/yangzongzhuan/RuoYi",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28408.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28409",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-07T16:15:25.057",
"lastModified": "2025-04-08T18:14:17.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:24.500",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo add del endpoint /add/{parentId} y no valida correctamente si el usuario solicitante tiene permiso para agregar un elemento del men\u00fa bajo el parentId especificado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28408.md",
@ -24,6 +59,10 @@
{
"url": "https://github.com/yangzongzhuan/RuoYi",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28408.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28410",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-07T16:15:25.170",
"lastModified": "2025-04-08T18:14:17.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:24.680",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo cancelAuthUserAll y no valida correctamente si el usuario solicitante tiene privilegios administrativos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28409.md",
@ -24,6 +59,10 @@
{
"url": "https://github.com/yangzongzhuan/RuoYi",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28409.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28411",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-07T16:15:25.300",
"lastModified": "2025-04-08T18:14:17.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:24.857",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo editSave en /tool/gen/editSave"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28411.md",
@ -24,6 +59,10 @@
{
"url": "https://github.com/yangzongzhuan/RuoYi",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28411.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-28412",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-07T16:15:25.433",
"lastModified": "2025-04-08T18:14:17.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:25.023",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un problema en RUoYi v.4.8.0 permite que un atacante remoto escale privilegios a trav\u00e9s del m\u00e9todo /editSave en SysNoticeController"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28412.md",
@ -24,6 +59,10 @@
{
"url": "https://github.com/yangzongzhuan/RuoYi",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/20210607/cve_public/blob/main/ruoyi_case/CVE-2025-28412.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-29647",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T19:15:39.580",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:15:30.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seacms:seacms:13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC5F071-F666-4449-AAEF-B1BB62F9905F"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/B00W_NSD/poc/blob/master/seacms13.3-sql/poc.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30281",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:25.670",
"lastModified": "2025-04-08T20:15:25.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify sensitive data without proper authorization. Exploitation of this issue does not require user interaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30282",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:25.820",
"lastModified": "2025-04-08T20:15:25.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Authentication vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to bypass authentication mechanisms and execute code with the privileges of the authenticated user. Exploitation of this issue requires user interaction in that a victim must be coerced into performing actions within the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30284",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:25.980",
"lastModified": "2025-04-08T20:15:25.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30285",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:26.127",
"lastModified": "2025-04-08T20:15:26.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30286",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:26.273",
"lastModified": "2025-04-08T20:15:26.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30287",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:26.430",
"lastModified": "2025-04-08T20:15:26.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Authentication vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to bypass authentication mechanisms and execute code with the privileges of the authenticated user. Exploitation of this issue requires user interaction in that a victim must be coerced into performing actions within the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30288",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:26.583",
"lastModified": "2025-04-08T20:15:26.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30289",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:26.737",
"lastModified": "2025-04-08T20:15:26.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.1,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30290",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:26.883",
"lastModified": "2025-04-08T20:15:26.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security feature bypass. An attacker could exploit this vulnerability to access files and directories that are stored outside the intended restricted directory. Exploitation of this issue requires user interaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30291",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:27.057",
"lastModified": "2025-04-08T20:15:27.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to gain access to sensitive information which could be used to further compromise the system or bypass security mechanisms. Exploitation of this issue does not require user interaction."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30292",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:27.210",
"lastModified": "2025-04-08T20:15:27.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30293",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:27.363",
"lastModified": "2025-04-08T20:15:27.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30294",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-04-08T20:15:27.527",
"lastModified": "2025-04-08T20:15:27.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-15.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-3066",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-04-02T01:15:37.873",
"lastModified": "2025-04-07T13:30:17.320",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-08T20:15:28.200",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Navigations in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
"value": "Use after free in Site Isolation in Google Chrome prior to 135.0.7049.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -52,7 +52,7 @@
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3170",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T18:15:48.360",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:52:02.413",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,36 +142,94 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:online_lawyer_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9AF2CA-6F65-4DCB-869E-4473F7F0A61D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://github.com/p1026/CVE/issues/4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.303129",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.303129",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.543271",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/p1026/CVE/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory",
"Issue Tracking"
]
},
{
"url": "https://github.com/p1026/CVE/issues/4",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-3171",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-04-03T18:15:48.540",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-08T20:43:42.857",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,73 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:online_lawyer_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9AF2CA-6F65-4DCB-869E-4473F7F0A61D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/p1026/CVE/issues/5",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Not Applicable"
]
},
{
"url": "https://vuldb.com/?ctiid.303130",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.303130",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.543273",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/p1026/CVE/issues/5",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-32028",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-08T16:15:28.180",
"lastModified": "2025-04-08T18:13:53.347",
"lastModified": "2025-04-08T20:15:28.090",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -38,7 +38,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,6 +51,10 @@
{
"url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-vj5q-3jv2-cg5p",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/haxtheweb/issues/security/advisories/GHSA-vj5q-3jv2-cg5p",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

107
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-08T20:00:20.464321+00:00
2025-04-08T22:00:20.363570+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-08T19:54:38.830000+00:00
2025-04-08T21:15:51.040000+00:00
```
### Last Data Feed Release
@ -33,69 +33,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
289230
289252
```
### CVEs added in the last Commit
Recently added CVEs: `154`
Recently added CVEs: `22`
- [CVE-2025-29816](CVE-2025/CVE-2025-298xx/CVE-2025-29816.json) (`2025-04-08T18:16:07.370`)
- [CVE-2025-29819](CVE-2025/CVE-2025-298xx/CVE-2025-29819.json) (`2025-04-08T18:16:07.520`)
- [CVE-2025-29820](CVE-2025/CVE-2025-298xx/CVE-2025-29820.json) (`2025-04-08T18:16:07.683`)
- [CVE-2025-29821](CVE-2025/CVE-2025-298xx/CVE-2025-29821.json) (`2025-04-08T18:16:07.867`)
- [CVE-2025-29822](CVE-2025/CVE-2025-298xx/CVE-2025-29822.json) (`2025-04-08T18:16:08.023`)
- [CVE-2025-29823](CVE-2025/CVE-2025-298xx/CVE-2025-29823.json) (`2025-04-08T18:16:08.190`)
- [CVE-2025-29824](CVE-2025/CVE-2025-298xx/CVE-2025-29824.json) (`2025-04-08T18:16:08.340`)
- [CVE-2025-30295](CVE-2025/CVE-2025-302xx/CVE-2025-30295.json) (`2025-04-08T19:15:49.453`)
- [CVE-2025-30296](CVE-2025/CVE-2025-302xx/CVE-2025-30296.json) (`2025-04-08T19:15:49.613`)
- [CVE-2025-30297](CVE-2025/CVE-2025-302xx/CVE-2025-30297.json) (`2025-04-08T19:15:49.770`)
- [CVE-2025-30298](CVE-2025/CVE-2025-302xx/CVE-2025-30298.json) (`2025-04-08T19:15:49.923`)
- [CVE-2025-30299](CVE-2025/CVE-2025-302xx/CVE-2025-30299.json) (`2025-04-08T19:15:50.083`)
- [CVE-2025-30300](CVE-2025/CVE-2025-303xx/CVE-2025-30300.json) (`2025-04-08T19:15:50.240`)
- [CVE-2025-30301](CVE-2025/CVE-2025-303xx/CVE-2025-30301.json) (`2025-04-08T19:15:50.390`)
- [CVE-2025-30302](CVE-2025/CVE-2025-303xx/CVE-2025-30302.json) (`2025-04-08T19:15:50.537`)
- [CVE-2025-30303](CVE-2025/CVE-2025-303xx/CVE-2025-30303.json) (`2025-04-08T19:15:50.693`)
- [CVE-2025-30304](CVE-2025/CVE-2025-303xx/CVE-2025-30304.json) (`2025-04-08T19:15:50.863`)
- [CVE-2025-30305](CVE-2025/CVE-2025-303xx/CVE-2025-30305.json) (`2025-04-08T19:15:51.027`)
- [CVE-2025-30306](CVE-2025/CVE-2025-303xx/CVE-2025-30306.json) (`2025-04-08T19:15:51.197`)
- [CVE-2025-30307](CVE-2025/CVE-2025-303xx/CVE-2025-30307.json) (`2025-04-08T19:15:51.353`)
- [CVE-2025-30308](CVE-2025/CVE-2025-303xx/CVE-2025-30308.json) (`2025-04-08T19:15:51.513`)
- [CVE-2025-30309](CVE-2025/CVE-2025-303xx/CVE-2025-30309.json) (`2025-04-08T19:15:51.670`)
- [CVE-2025-32035](CVE-2025/CVE-2025-320xx/CVE-2025-32035.json) (`2025-04-08T18:16:08.597`)
- [CVE-2025-32036](CVE-2025/CVE-2025-320xx/CVE-2025-32036.json) (`2025-04-08T18:16:08.750`)
- [CVE-2025-3416](CVE-2025/CVE-2025-34xx/CVE-2025-3416.json) (`2025-04-08T19:15:53.717`)
- [CVE-2024-12556](CVE-2024/CVE-2024-125xx/CVE-2024-12556.json) (`2025-04-08T20:15:19.420`)
- [CVE-2025-22871](CVE-2025/CVE-2025-228xx/CVE-2025-22871.json) (`2025-04-08T20:15:20.183`)
- [CVE-2025-24446](CVE-2025/CVE-2025-244xx/CVE-2025-24446.json) (`2025-04-08T20:15:20.417`)
- [CVE-2025-24447](CVE-2025/CVE-2025-244xx/CVE-2025-24447.json) (`2025-04-08T20:15:20.573`)
- [CVE-2025-27188](CVE-2025/CVE-2025-271xx/CVE-2025-27188.json) (`2025-04-08T21:15:50.393`)
- [CVE-2025-27189](CVE-2025/CVE-2025-271xx/CVE-2025-27189.json) (`2025-04-08T21:15:50.567`)
- [CVE-2025-27190](CVE-2025/CVE-2025-271xx/CVE-2025-27190.json) (`2025-04-08T21:15:50.727`)
- [CVE-2025-27191](CVE-2025/CVE-2025-271xx/CVE-2025-27191.json) (`2025-04-08T21:15:50.883`)
- [CVE-2025-27192](CVE-2025/CVE-2025-271xx/CVE-2025-27192.json) (`2025-04-08T21:15:51.040`)
- [CVE-2025-30281](CVE-2025/CVE-2025-302xx/CVE-2025-30281.json) (`2025-04-08T20:15:25.670`)
- [CVE-2025-30282](CVE-2025/CVE-2025-302xx/CVE-2025-30282.json) (`2025-04-08T20:15:25.820`)
- [CVE-2025-30284](CVE-2025/CVE-2025-302xx/CVE-2025-30284.json) (`2025-04-08T20:15:25.980`)
- [CVE-2025-30285](CVE-2025/CVE-2025-302xx/CVE-2025-30285.json) (`2025-04-08T20:15:26.127`)
- [CVE-2025-30286](CVE-2025/CVE-2025-302xx/CVE-2025-30286.json) (`2025-04-08T20:15:26.273`)
- [CVE-2025-30287](CVE-2025/CVE-2025-302xx/CVE-2025-30287.json) (`2025-04-08T20:15:26.430`)
- [CVE-2025-30288](CVE-2025/CVE-2025-302xx/CVE-2025-30288.json) (`2025-04-08T20:15:26.583`)
- [CVE-2025-30289](CVE-2025/CVE-2025-302xx/CVE-2025-30289.json) (`2025-04-08T20:15:26.737`)
- [CVE-2025-30290](CVE-2025/CVE-2025-302xx/CVE-2025-30290.json) (`2025-04-08T20:15:26.883`)
- [CVE-2025-30291](CVE-2025/CVE-2025-302xx/CVE-2025-30291.json) (`2025-04-08T20:15:27.057`)
- [CVE-2025-30292](CVE-2025/CVE-2025-302xx/CVE-2025-30292.json) (`2025-04-08T20:15:27.210`)
- [CVE-2025-30293](CVE-2025/CVE-2025-302xx/CVE-2025-30293.json) (`2025-04-08T20:15:27.363`)
- [CVE-2025-30294](CVE-2025/CVE-2025-302xx/CVE-2025-30294.json) (`2025-04-08T20:15:27.527`)
### CVEs modified in the last Commit
Recently modified CVEs: `295`
Recently modified CVEs: `62`
- [CVE-2025-3400](CVE-2025/CVE-2025-34xx/CVE-2025-3400.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3401](CVE-2025/CVE-2025-34xx/CVE-2025-3401.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3402](CVE-2025/CVE-2025-34xx/CVE-2025-3402.json) (`2025-04-08T19:15:53.267`)
- [CVE-2025-3403](CVE-2025/CVE-2025-34xx/CVE-2025-3403.json) (`2025-04-08T19:15:53.387`)
- [CVE-2025-3405](CVE-2025/CVE-2025-34xx/CVE-2025-3405.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3406](CVE-2025/CVE-2025-34xx/CVE-2025-3406.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3407](CVE-2025/CVE-2025-34xx/CVE-2025-3407.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3408](CVE-2025/CVE-2025-34xx/CVE-2025-3408.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3409](CVE-2025/CVE-2025-34xx/CVE-2025-3409.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3410](CVE-2025/CVE-2025-34xx/CVE-2025-3410.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3411](CVE-2025/CVE-2025-34xx/CVE-2025-3411.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3412](CVE-2025/CVE-2025-34xx/CVE-2025-3412.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3413](CVE-2025/CVE-2025-34xx/CVE-2025-3413.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3424](CVE-2025/CVE-2025-34xx/CVE-2025-3424.json) (`2025-04-08T18:14:17.307`)
- [CVE-2025-3425](CVE-2025/CVE-2025-34xx/CVE-2025-3425.json) (`2025-04-08T18:14:17.307`)
- [CVE-2025-3426](CVE-2025/CVE-2025-34xx/CVE-2025-3426.json) (`2025-04-08T18:14:17.307`)
- [CVE-2025-3427](CVE-2025/CVE-2025-34xx/CVE-2025-3427.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3428](CVE-2025/CVE-2025-34xx/CVE-2025-3428.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3429](CVE-2025/CVE-2025-34xx/CVE-2025-3429.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3430](CVE-2025/CVE-2025-34xx/CVE-2025-3430.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3431](CVE-2025/CVE-2025-34xx/CVE-2025-3431.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3432](CVE-2025/CVE-2025-34xx/CVE-2025-3432.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3433](CVE-2025/CVE-2025-34xx/CVE-2025-3433.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3436](CVE-2025/CVE-2025-34xx/CVE-2025-3436.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-3437](CVE-2025/CVE-2025-34xx/CVE-2025-3437.json) (`2025-04-08T18:13:53.347`)
- [CVE-2025-21536](CVE-2025/CVE-2025-215xx/CVE-2025-21536.json) (`2025-04-08T20:53:58.330`)
- [CVE-2025-21540](CVE-2025/CVE-2025-215xx/CVE-2025-21540.json) (`2025-04-08T20:12:26.263`)
- [CVE-2025-21543](CVE-2025/CVE-2025-215xx/CVE-2025-21543.json) (`2025-04-08T20:13:35.230`)
- [CVE-2025-21546](CVE-2025/CVE-2025-215xx/CVE-2025-21546.json) (`2025-04-08T20:14:45.287`)
- [CVE-2025-21555](CVE-2025/CVE-2025-215xx/CVE-2025-21555.json) (`2025-04-08T20:14:54.380`)
- [CVE-2025-21559](CVE-2025/CVE-2025-215xx/CVE-2025-21559.json) (`2025-04-08T20:15:39.517`)
- [CVE-2025-21566](CVE-2025/CVE-2025-215xx/CVE-2025-21566.json) (`2025-04-08T20:16:02.830`)
- [CVE-2025-21567](CVE-2025/CVE-2025-215xx/CVE-2025-21567.json) (`2025-04-08T20:16:13.823`)
- [CVE-2025-26818](CVE-2025/CVE-2025-268xx/CVE-2025-26818.json) (`2025-04-08T20:10:49.653`)
- [CVE-2025-27082](CVE-2025/CVE-2025-270xx/CVE-2025-27082.json) (`2025-04-08T21:15:50.273`)
- [CVE-2025-28402](CVE-2025/CVE-2025-284xx/CVE-2025-28402.json) (`2025-04-08T20:15:23.407`)
- [CVE-2025-28403](CVE-2025/CVE-2025-284xx/CVE-2025-28403.json) (`2025-04-08T20:15:23.590`)
- [CVE-2025-28405](CVE-2025/CVE-2025-284xx/CVE-2025-28405.json) (`2025-04-08T20:15:23.770`)
- [CVE-2025-28406](CVE-2025/CVE-2025-284xx/CVE-2025-28406.json) (`2025-04-08T20:15:23.950`)
- [CVE-2025-28407](CVE-2025/CVE-2025-284xx/CVE-2025-28407.json) (`2025-04-08T20:15:24.137`)
- [CVE-2025-28408](CVE-2025/CVE-2025-284xx/CVE-2025-28408.json) (`2025-04-08T20:15:24.320`)
- [CVE-2025-28409](CVE-2025/CVE-2025-284xx/CVE-2025-28409.json) (`2025-04-08T20:15:24.500`)
- [CVE-2025-28410](CVE-2025/CVE-2025-284xx/CVE-2025-28410.json) (`2025-04-08T20:15:24.680`)
- [CVE-2025-28411](CVE-2025/CVE-2025-284xx/CVE-2025-28411.json) (`2025-04-08T20:15:24.857`)
- [CVE-2025-28412](CVE-2025/CVE-2025-284xx/CVE-2025-28412.json) (`2025-04-08T20:15:25.023`)
- [CVE-2025-29647](CVE-2025/CVE-2025-296xx/CVE-2025-29647.json) (`2025-04-08T20:15:30.700`)
- [CVE-2025-3066](CVE-2025/CVE-2025-30xx/CVE-2025-3066.json) (`2025-04-08T20:15:28.200`)
- [CVE-2025-3170](CVE-2025/CVE-2025-31xx/CVE-2025-3170.json) (`2025-04-08T20:52:02.413`)
- [CVE-2025-3171](CVE-2025/CVE-2025-31xx/CVE-2025-3171.json) (`2025-04-08T20:43:42.857`)
- [CVE-2025-32028](CVE-2025/CVE-2025-320xx/CVE-2025-32028.json) (`2025-04-08T20:15:28.090`)
## Download and Usage

1018
_state.csv

File diff suppressed because it is too large Load Diff