diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13604.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13604.json new file mode 100644 index 00000000000..0e0e06d94be --- /dev/null +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13604.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-13604", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-05T02:15:14.497", + "lastModified": "2025-04-05T02:15:14.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The KB Support \u2013 Customer Support Ticket & Helpdesk Plugin, Knowledge Base Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.7.4 via the 'kbs' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/kbs directory which can contain file attachments included in support tickets. The vulnerability was partially patched in version 1.7.3.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/kb-support/trunk/includes/files.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3231596/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3a058d6-ca9e-4241-b6dd-307efa7689ab?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0810.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0810.json new file mode 100644 index 00000000000..d39f929e30f --- /dev/null +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0810.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-0810", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-05T02:15:15.140", + "lastModified": "2025-04-05T02:15:15.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Read More & Accordion plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.4.5. This is due to missing or incorrect nonce validation on the addNewButtons() function. This makes it possible for unauthenticated attackers to include and execute arbitrary PHP files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMoreInit.php#L122", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMorePages.php#L59", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMorePages.php#L82", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a963cd9b-9f8f-4bd2-92cd-74c5e85e1d96?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-25xx/CVE-2025-2544.json b/CVE-2025/CVE-2025-25xx/CVE-2025-2544.json new file mode 100644 index 00000000000..b3439e2abda --- /dev/null +++ b/CVE-2025/CVE-2025-25xx/CVE-2025-2544.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-2544", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-05T02:15:15.307", + "lastModified": "2025-04-05T02:15:15.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The AI Content Pipelines plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/ai-content-pipelines/tags/1.6/includes/generate-scheduled-content.php#L42", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ai-content-pipelines/tags/1.6/includes/generate-scheduled-content.php#L44", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ai-content-pipelines/tags/1.6/includes/generate-scheduled-content.php#L47", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/ai-content-pipelines/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b93214ec-5738-4f10-b48c-1d74aad52acb?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-29xx/CVE-2025-2933.json b/CVE-2025/CVE-2025-29xx/CVE-2025-2933.json new file mode 100644 index 00000000000..91778f04c07 --- /dev/null +++ b/CVE-2025/CVE-2025-29xx/CVE-2025-2933.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-2933", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-05T02:15:15.477", + "lastModified": "2025-04-05T02:15:15.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Email Notifications for Updates plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the awun_import_settings() function in all versions up to, and including, 1.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3265589%40wp-update-mail-notification&new=3265589%40wp-update-mail-notification", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d52e644b-a58f-4e09-9e53-e9cbef75e34f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31161.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31161.json index 7635010786e..f26b88901f1 100644 --- a/CVE-2025/CVE-2025-311xx/CVE-2025-31161.json +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31161.json @@ -2,7 +2,7 @@ "id": "CVE-2025-31161", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T20:15:25.373", - "lastModified": "2025-04-03T20:15:25.373", + "lastModified": "2025-04-05T01:15:42.360", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -63,6 +63,10 @@ { "url": "https://projectdiscovery.io/blog/crushftp-authentication-bypass", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.darkreading.com/vulnerabilities-threats/disclosure-drama-clouds-crushftp-vulnerability-exploitation", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 40182c14e04..a7dfc5f78d0 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-05T02:00:30.682267+00:00 +2025-04-05T04:00:19.639815+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-05T01:15:42+00:00 +2025-04-05T02:15:15.477000+00:00 ``` ### Last Data Feed Release @@ -33,31 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -288673 +288677 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `4` -- [CVE-2025-1500](CVE-2025/CVE-2025-15xx/CVE-2025-1500.json) (`2025-04-05T01:15:42.000`) -- [CVE-2025-2889](CVE-2025/CVE-2025-28xx/CVE-2025-2889.json) (`2025-04-05T00:15:15.287`) +- [CVE-2024-13604](CVE-2024/CVE-2024-136xx/CVE-2024-13604.json) (`2025-04-05T02:15:14.497`) +- [CVE-2025-0810](CVE-2025/CVE-2025-08xx/CVE-2025-0810.json) (`2025-04-05T02:15:15.140`) +- [CVE-2025-2544](CVE-2025/CVE-2025-25xx/CVE-2025-2544.json) (`2025-04-05T02:15:15.307`) +- [CVE-2025-2933](CVE-2025/CVE-2025-29xx/CVE-2025-2933.json) (`2025-04-05T02:15:15.477`) ### CVEs modified in the last Commit -Recently modified CVEs: `10` +Recently modified CVEs: `1` -- [CVE-2024-11088](CVE-2024/CVE-2024-110xx/CVE-2024-11088.json) (`2024-11-21T15:15:21.097`) -- [CVE-2024-11701](CVE-2024/CVE-2024-117xx/CVE-2024-11701.json) (`2024-11-27T16:15:13.470`) -- [CVE-2024-11702](CVE-2024/CVE-2024-117xx/CVE-2024-11702.json) (`2024-11-27T16:15:13.660`) -- [CVE-2024-11703](CVE-2024/CVE-2024-117xx/CVE-2024-11703.json) (`2024-12-04T15:15:09.437`) -- [CVE-2024-39090](CVE-2024/CVE-2024-390xx/CVE-2024-39090.json) (`2024-11-21T09:27:11.500`) -- [CVE-2024-4455](CVE-2024/CVE-2024-44xx/CVE-2024-4455.json) (`2024-11-21T09:42:51.933`) -- [CVE-2024-5276](CVE-2024/CVE-2024-52xx/CVE-2024-5276.json) (`2024-11-21T09:47:20.107`) -- [CVE-2024-6497](CVE-2024/CVE-2024-64xx/CVE-2024-6497.json) (`2024-11-21T09:49:45.437`) -- [CVE-2025-22457](CVE-2025/CVE-2025-224xx/CVE-2025-22457.json) (`2025-04-03T16:15:35.370`) -- [CVE-2025-31161](CVE-2025/CVE-2025-311xx/CVE-2025-31161.json) (`2025-04-03T20:15:25.373`) +- [CVE-2025-31161](CVE-2025/CVE-2025-311xx/CVE-2025-31161.json) (`2025-04-05T01:15:42.360`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 61f40e237f2..5e645156a96 100644 --- a/_state.csv +++ b/_state.csv @@ -245547,7 +245547,7 @@ CVE-2024-11083,0,0,8060d1be07c2085add29a68ce088e46bf1b117fbd5e8fe231b842cd4d2355 CVE-2024-11085,0,0,997988ac78259b1ae8db8c6e9651c22f46fbbaea4f307171e6fff12e9b424710,2024-11-18T17:11:17.393000 CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000 CVE-2024-11087,0,0,e2fe7093d86622f551b217e3b2fb07f9de32adec7e3dcf2388d9405a65f8c4e6,2025-03-13T13:09:46.483000 -CVE-2024-11088,0,1,dead4289dbb25e5663328a93f5f34cd1a5c6083eba2a8eda97da7209d5a9c049,2024-11-21T15:15:21.097000 +CVE-2024-11088,0,0,dead4289dbb25e5663328a93f5f34cd1a5c6083eba2a8eda97da7209d5a9c049,2024-11-21T15:15:21.097000 CVE-2024-11089,0,0,0f46a9a629be88f215b4a7ad0d79575a4e3b0caab898de683427fa2e5561e411,2024-11-21T15:15:21.500000 CVE-2024-1109,0,0,a7b1e71489d6774ecfe851782646b725fb9b27ab957ae0f8b7f311d63d7950f6,2024-11-21T08:49:48.980000 CVE-2024-11090,0,0,c176ccf3141a40259cf6c4995f025e29b8341ceb796ecba9c85f772827fb28cf,2025-02-04T20:03:08.833000 @@ -246163,9 +246163,9 @@ CVE-2024-11698,0,0,177bfd9d19615200c8e5399dceeed9e4f2df493f7a5fb371c3b3bff8ef5f7 CVE-2024-11699,0,0,960307a2527490f1e604846ae0147273dc503f0996409a0d2dbd0756e25b75a8,2025-04-03T13:31:55.513000 CVE-2024-1170,0,0,23da02961ee2e8cf225b35104ccb43e539fbf93446d052ae9645caf24d980dd5,2025-01-21T16:58:56.397000 CVE-2024-11700,0,0,4ac05c714affba1de0567334034c6733d4fbd8855bca94dcfca8d8ce429594f4,2025-04-03T13:32:01.157000 -CVE-2024-11701,0,1,c6c4cb5168067a8056364ec1103bc35b79a53964f148274bee6be4bf3dfec175,2024-11-27T16:15:13.470000 -CVE-2024-11702,0,1,8e136c37f460e52a7289e1b2d82bbda84c6585b495c044e7bfe62cb935766236,2024-11-27T16:15:13.660000 -CVE-2024-11703,0,1,e395d8f8b5af225e21413aedc8819a3d7f24a8a283a17a7781c1cfd963575f93,2024-12-04T15:15:09.437000 +CVE-2024-11701,0,0,c6c4cb5168067a8056364ec1103bc35b79a53964f148274bee6be4bf3dfec175,2024-11-27T16:15:13.470000 +CVE-2024-11702,0,0,8e136c37f460e52a7289e1b2d82bbda84c6585b495c044e7bfe62cb935766236,2024-11-27T16:15:13.660000 +CVE-2024-11703,0,0,e395d8f8b5af225e21413aedc8819a3d7f24a8a283a17a7781c1cfd963575f93,2024-12-04T15:15:09.437000 CVE-2024-11704,0,0,7c1cac98f692d41cdc5b96fd88b8dd9b5ffb5022fab2697a92f4d4b10ff729c0,2025-02-04T14:15:30.700000 CVE-2024-11705,0,0,0e1596de8042e8e852c6e998c00c8b73e87ddca14f366899c4d0d5766c7acb40,2024-11-27T16:15:14 CVE-2024-11706,0,0,d7aa48664fd3a99ff8ecdb1c5e606d3e6a16c2b68f26185023438aa20fdce0e6,2024-11-26T17:15:23.010000 @@ -248049,6 +248049,7 @@ CVE-2024-13600,0,0,484c9129acb282fae32ab7c653ddfde69cea1c6dd837845606bbf7ace7ea9 CVE-2024-13601,0,0,ce9d6d51221b1f7bfe13b94be0c882b344de68bb5f35f70de286ecadc3834f44,2025-02-18T21:31:43.250000 CVE-2024-13602,0,0,668a7c024e53e2fe8cff8603230bbbed795e1449bece0c1fdfb0cf7e8cc00f99,2025-03-17T16:15:20.623000 CVE-2024-13603,0,0,fc202802068da8bc55cd46c39e4a97a0db9f2a327bd5fc1b7575fa3aa107cf47,2025-02-19T14:15:29.070000 +CVE-2024-13604,1,1,25598cfe5dd7a53965079415fbd2bc566acf4cd2f526dc3236c0c6852af09d18,2025-04-05T02:15:14.497000 CVE-2024-13605,0,0,c1e9596b2279389a7bb72258053b1d4f5a9128f48e9acd3ebaabb715a0ba3f54,2025-02-24T12:15:11.047000 CVE-2024-13606,0,0,3678a6b8c1379d0e1b01e3251fb76bf1b3c0d7e3ee42e4cf605940cc5ab858d5,2025-02-18T18:46:05.887000 CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e5527f8,2025-02-04T07:15:12.973000 @@ -263908,7 +263909,7 @@ CVE-2024-39072,0,0,7c7576a6aaa8d080d42e8873fa54dabc8fa57d12eb24e8fb3b3b37f2c1e5a CVE-2024-3908,0,0,32cc26b53789ac42f9085c7424d4e7e5e1385983e1e04bf11b22f248840a758b,2025-01-17T21:16:07.327000 CVE-2024-39081,0,0,1ea98431957362ab56a3af379eeef002d3bbd99853a222b010a3be68bd797b7b,2025-03-17T15:15:40.787000 CVE-2024-3909,0,0,d5574f4925d57273c75b63e724e2aae982f973388b6e621ddd87893b5d997ccf,2025-02-07T01:57:01.643000 -CVE-2024-39090,0,1,b36aca9db8932ca77066889a2428544f89222d0d808274ca8552d97abe1d66d3,2024-11-21T09:27:11.500000 +CVE-2024-39090,0,0,b36aca9db8932ca77066889a2428544f89222d0d808274ca8552d97abe1d66d3,2024-11-21T09:27:11.500000 CVE-2024-39091,0,0,c140294e78a78cd7474377e032af5887e358fd95402a58bcd7abb93d413219ea,2024-08-13T21:35:02.617000 CVE-2024-39094,0,0,3489f753e4de88b28bdf0c4a0934830757dd9bc356968fa920ba404447b0e998,2025-03-13T16:15:20.363000 CVE-2024-39097,0,0,2ffe2246b6dcf8095996d63654e4d34504f5907f265a5a3acdcc049adc39575e,2024-08-27T16:35:13.930000 @@ -268027,7 +268028,7 @@ CVE-2024-44541,0,0,360d36038a09153826fdb7f75c9d2e58a990ae541d7e417f9aef6615b41fd CVE-2024-44542,0,0,69649467d837964ae89a10ea879537e85831463615e76c2141ca248d248803a6,2024-09-20T12:30:17.483000 CVE-2024-44546,0,0,e2c66d94fd13e792ad683596bcac74d7412b12faf579386ee0b995b81a04d1c6,2024-11-19T20:35:24.240000 CVE-2024-44549,0,0,a5aaecd9ba75cc32cf841f25e868951de8e2b2b047d881486d13d5755c1993c4,2024-08-27T14:28:55.157000 -CVE-2024-4455,0,1,8b4be7246c38deed675b65400e7f461fcf195a587cb1f84c7464cdbdf62f60ac,2024-11-21T09:42:51.933000 +CVE-2024-4455,0,0,8b4be7246c38deed675b65400e7f461fcf195a587cb1f84c7464cdbdf62f60ac,2024-11-21T09:42:51.933000 CVE-2024-44550,0,0,6e5e7c90073553915c6cbf84e10c6c9591a0626baa58af3865b7686a30be241b,2024-08-27T14:29:02.370000 CVE-2024-44551,0,0,491acb9f04edacb91a77c381669fbbb0354d22a271035ec891cb7e6dae2aedd9,2025-03-26T21:15:22.887000 CVE-2024-44552,0,0,a087d6467b3cb42f42c6e6b84dd6f027e5da09823e0cbf8267d22b995bc21428,2025-03-18T20:15:23.460000 @@ -273910,7 +273911,7 @@ CVE-2024-52754,0,0,48cc5ef43bab6bce1fa386028923c49e7c0923b15806ef09a5c3018ee7e7d CVE-2024-52755,0,0,de05a221f5f303a3571b07e9ee4904991bf517e05068473d4c58937000dd6d05,2024-11-22T17:15:09.970000 CVE-2024-52757,0,0,7f8fc8be0915a027b31c09e256572b3c7a9077292f6f9e0c888cfd25a0470d57,2024-11-22T17:15:10.150000 CVE-2024-52759,0,0,8e96e54d579bea017f42ee64add5580e7ddfbb0696f13a1d140017fedbef2f3c,2024-11-22T17:15:10.323000 -CVE-2024-5276,0,1,d654d8d8aec1737b61adbcdd3de94d3570927b4774326d8a1c8ba7e6d550d70f,2024-11-21T09:47:20.107000 +CVE-2024-5276,0,0,d654d8d8aec1737b61adbcdd3de94d3570927b4774326d8a1c8ba7e6d550d70f,2024-11-21T09:47:20.107000 CVE-2024-52762,0,0,0ba93538cdcceffbc2ce711add8a68aa6535f792ec7a07bfa4c816b008d21953,2024-11-29T21:00:39.843000 CVE-2024-52763,0,0,bf728b5a47dd0413d8210dc0bce8f5be7122657bdb084f64d14e2b08f6408d30,2024-11-29T21:00:47.937000 CVE-2024-52765,0,0,476b03c829577e5243ce6135d79398720058b5846d4e6fe9a1bdd7ebaa31e9c4,2025-03-13T14:15:33.100000 @@ -277908,7 +277909,7 @@ CVE-2024-6493,0,0,4219f4b7c8428bff689274f5093f622cc568e20fe62d456fac3f7e44bff162 CVE-2024-6494,0,0,64483ea7ffdda997831852a5abbd9b9d09bae88699ea984e8a030b6b1f227144,2024-08-07T15:17:46.717000 CVE-2024-6495,0,0,552714992ade7df369704ec5a67abc29783969349a6aa7efbf61b2aacecb1af3,2025-01-15T17:37:12.707000 CVE-2024-6496,0,0,8ee0438cf6f5aca09ea72030714574ba710a867e64257498ed88d82c0fbc800e,2024-08-07T14:35:07.403000 -CVE-2024-6497,0,1,77ee0cfa9483135ecf5ea6890d78b2b438383160a5fd660f286f7b2c79175e01,2024-11-21T09:49:45.437000 +CVE-2024-6497,0,0,77ee0cfa9483135ecf5ea6890d78b2b438383160a5fd660f286f7b2c79175e01,2024-11-21T09:49:45.437000 CVE-2024-6498,0,0,d6615d703509a8a6bb0fec23352394e0db77972d8a99657bf636fa92bfdaa089,2024-09-06T17:35:19.293000 CVE-2024-6499,0,0,35c38f947633fe6fdfe909156ebfa6cfdc8e69372314f896d5eab4274f10b227,2024-09-26T22:07:50.040000 CVE-2024-6500,0,0,fd0ae55a5b49a6356709e92760fc530e49b2c4c056147200f16a6a1f57743bcc,2024-08-19T13:00:23.117000 @@ -281641,6 +281642,7 @@ CVE-2025-0806,0,0,63789275155e2cb6d61f78901228ddd7e3f84f850b2c23e9990e2498d31506 CVE-2025-0807,0,0,b2b4a656f12e3489fcf4f75fde2be79c69ec60017aed129cff51589f1fe4b103,2025-03-22T07:15:24.260000 CVE-2025-0808,0,0,34819144543e17250a94a4955db1783a3aae066b6eee10149bf1493d78d1e0ba,2025-02-25T03:55:57.003000 CVE-2025-0809,0,0,886fb9b396d2aad5cff53c02349fc0fee570a4920d4c4e68da65e25a660a34b2,2025-01-31T06:15:29.933000 +CVE-2025-0810,1,1,f2f4d1e082015ea51ac9b54c4df8a63ee3baf576db1349ac0c5b5d0ec8d27098,2025-04-05T02:15:15.140000 CVE-2025-0811,0,0,3759c7e52916198b124afd7e526b63fb0d2f310290219135bcf2e8fb2a87bc53,2025-03-27T16:45:12.210000 CVE-2025-0813,0,0,2db4834d418da2e868d6f469a207de037cce3d1cf22a140eda0d89a2b4da14df,2025-03-12T16:15:20.183000 CVE-2025-0814,0,0,275433a2e2c23056d581480e8763e8e9197d76ff67d734aa21e397b5cac2bf6a,2025-02-13T07:15:10.973000 @@ -282102,7 +282104,7 @@ CVE-2025-1491,0,0,2c68d92a6f55bf529fa37ef19f65078661a466e3bd99edb0dd7d2a7b0419f2 CVE-2025-1492,0,0,b9223b4db500ae771be5ddc029bc738cd0c9e1261ad47ff66314ecd9bf92d1b3,2025-02-20T02:15:38.553000 CVE-2025-1496,0,0,00b701fe7bc2e4f39ec7ac2812437dabb31dde7416d14a43308b75ca4d34e495,2025-03-20T14:15:22.920000 CVE-2025-1497,0,0,7d02ef7499053e50d8ad89d76099a7d293753bcfe1045929e1a08d34bb3acdae,2025-03-24T18:46:13.367000 -CVE-2025-1500,1,1,dcd5011d60876332630bb48dff1042eb265608cd51b2d8c03e8e8bb9695b5a52,2025-04-05T01:15:42 +CVE-2025-1500,0,0,dcd5011d60876332630bb48dff1042eb265608cd51b2d8c03e8e8bb9695b5a52,2025-04-05T01:15:42 CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000 CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9d3,2025-03-13T05:15:24.917000 CVE-2025-1504,0,0,63c59f8b26cf8b21f0390a21fa6fac2c1c23d38ed0b94a4990b2f1de80d8483e,2025-03-24T18:27:10.747000 @@ -283745,7 +283747,7 @@ CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3 CVE-2025-2245,0,0,a9ff9699ae5a41975d2184fc91caaffa9dfd762f8ebe8ce30741f7eef46a88f6,2025-04-04T10:15:16.740000 CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000 CVE-2025-22454,0,0,04f15e88e5a975efe8c2b32608cedcfad6c31392d1260fbd49043c6c8c78ea98,2025-03-11T15:15:44.737000 -CVE-2025-22457,0,1,43cc3b0988fd78cd00211e228df2e73a7b4a75544cecc0bddfcf8b3ddb9bdddf,2025-04-03T16:15:35.370000 +CVE-2025-22457,0,0,43cc3b0988fd78cd00211e228df2e73a7b4a75544cecc0bddfcf8b3ddb9bdddf,2025-04-03T16:15:35.370000 CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000 CVE-2025-22472,0,0,da7c2c2731a1940c60b4ae6c1edcbbf175ca5a2d3964a03701282be7a86cbe41,2025-03-17T18:15:20.930000 CVE-2025-22473,0,0,24aeaee52dbfb2b3f71ea7cd4512b20455b60139bbfda5acf051e65598986ddc,2025-03-17T18:15:21.077000 @@ -285896,6 +285898,7 @@ CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0ed CVE-2025-25429,0,0,a95bef6ecb2c9e9037f1ebf79f87a2b0c7101933c3f64e22cf3f921f022ed0ed,2025-02-28T23:15:10.903000 CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000 CVE-2025-25431,0,0,b394e7042bdaf0befa6d619f673ec987ef0e6b97c7a283213fbe60ffc2fa9133,2025-03-04T16:15:39.917000 +CVE-2025-2544,1,1,d8b534f6a9de64f11363eac4b250720e17ee9cf0a6782994020db6148051f5c9,2025-04-05T02:15:15.307000 CVE-2025-25450,0,0,e3ddffa39d860b594bb74ab98ef16e7416f14ecc887f5721e7943e1b1d73ce80,2025-03-07T17:15:21.640000 CVE-2025-25451,0,0,4c60686324e8dfbebc3bac09932f9dca9715cd901e8b055c1d7eb1acd46fa78d,2025-03-07T17:15:21.803000 CVE-2025-25452,0,0,f8ac00e705c69600b7bd756ffd6640407ab44891503ee6108f0e991980324498,2025-03-07T17:15:21.947000 @@ -287157,7 +287160,7 @@ CVE-2025-28885,0,0,bcaf9c42e10ccff4d56f81fc7722ea247bf8a733f08f824c9662923ba239a CVE-2025-28886,0,0,8829096276344aa5296745d321667067925dd057c12550ef0a399cb1c9566caa,2025-03-11T21:15:46.113000 CVE-2025-28887,0,0,57bd8f01d02ed8afd5599ea32c65ee4847f50f38cef546351412e6715f07165d,2025-03-11T21:15:46.270000 CVE-2025-28889,0,0,732c22dbcd124786284c91a1d934fea11c90f1310342dd8b73b00ffff26c19da,2025-03-27T16:45:27.850000 -CVE-2025-2889,1,1,2b8634441a09b229c7a1d292815f332ea11180a684b0f330efc2fbed9fe63456,2025-04-05T00:15:15.287000 +CVE-2025-2889,0,0,2b8634441a09b229c7a1d292815f332ea11180a684b0f330efc2fbed9fe63456,2025-04-05T00:15:15.287000 CVE-2025-28890,0,0,4a332fde3e2ea608ea5eb36fa4d3f0981ec81767d5f2cf4ce855cdc2b6daff5f,2025-03-27T16:45:27.850000 CVE-2025-28891,0,0,a1b5bb5f2f1783066a2dc188201e0fee55eed7b8b66d4a435f23c2884b26ac7b,2025-03-11T21:15:46.420000 CVE-2025-28892,0,0,8aa9cbc46d03648f41dcf59189028804e3b767a8c273cd789a68b3e54bc7fd91,2025-03-11T21:15:46.570000 @@ -287275,6 +287278,7 @@ CVE-2025-29313,0,0,36b5dfbaccdc259f2b52ceac76431ece1292ff6ced8c88ea82c0057012874 CVE-2025-29314,0,0,68cd136edb649d9eb6aec698b8b31c836ad747d7f35cb5e1d05f8aa177ad8f88,2025-03-27T16:45:46.410000 CVE-2025-29315,0,0,f907f053863754eafc89ac11a469f54443f6b549eee8182288b1596f75ccbd29,2025-03-27T16:45:46.410000 CVE-2025-29322,0,0,49a1d4b12734a52d0fc52efc2251e56869705778ed4bdca3f12b7fdef8a41f85,2025-03-27T16:45:27.850000 +CVE-2025-2933,1,1,800ebeae8689c0d094efe612a5bd9c532ad416735da85f7540537dee6c383426,2025-04-05T02:15:15.477000 CVE-2025-29357,0,0,eb014a723aa009227f0255b17dfaab32ae69c018e0a2e5c6777057d80a0cac3f,2025-04-02T20:33:45.110000 CVE-2025-29358,0,0,610f6132677edbf66dfcad4906cefbaf7edab86ba5e1c4ae5ea8eda11e0df66d,2025-04-02T20:33:25.387000 CVE-2025-29359,0,0,bc55d7beb5c2520d4a35b3c9d88ad54b81653c8af5ca4e66e75dd78808d6a6dd,2025-04-02T20:33:36.983000 @@ -287989,7 +287993,7 @@ CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000 CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000 CVE-2025-31160,0,0,c6ed6d0cefcf860ce239e0955556eee41726f134fd4b83b02d780bf30460df3c,2025-03-31T13:15:46.050000 -CVE-2025-31161,0,1,31ce1d1c0f1506c2c2dddc897b8bc45aea29e21aeae54f317466f0652eacf801,2025-04-03T20:15:25.373000 +CVE-2025-31161,0,1,7b55c3b1b2723a8e32f14165a4514c66bc148c5ca047222c08e6f157d1d4a6e4,2025-04-05T01:15:42.360000 CVE-2025-31162,0,0,cfeafc9944d79e10529164231b0943be3a87194c4053baabeebe9b961989cbf3,2025-04-01T20:26:39.627000 CVE-2025-31163,0,0,0d23fc46a79319324af9251b76f99e828668eada4156c0f4488a35318beebb85,2025-04-01T20:26:39.627000 CVE-2025-31164,0,0,4b001c140896288467c92c772e2ebf8f58e53bdc0e31f0e36dc064cef4c67cc1,2025-04-01T20:26:39.627000