From d1342cd785d404b34cdaeda880111ad4816c08f4 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 31 Mar 2025 22:04:02 +0000 Subject: [PATCH] Auto-Update: 2025-03-31T22:00:19.882734+00:00 --- CVE-2018/CVE-2018-08xx/CVE-2018-0824.json | 4 +- CVE-2019/CVE-2019-10xx/CVE-2019-1069.json | 4 +- CVE-2024/CVE-2024-244xx/CVE-2024-24452.json | 30 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24453.json | 30 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24454.json | 30 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24455.json | 30 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24456.json | 44 ++++++ CVE-2024/CVE-2024-244xx/CVE-2024-24457.json | 30 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24458.json | 30 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24459.json | 30 +++- CVE-2024/CVE-2024-548xx/CVE-2024-54802.json | 28 ++++ CVE-2024/CVE-2024-548xx/CVE-2024-54803.json | 28 ++++ CVE-2024/CVE-2024-548xx/CVE-2024-54804.json | 28 ++++ CVE-2024/CVE-2024-548xx/CVE-2024-54805.json | 28 ++++ CVE-2024/CVE-2024-548xx/CVE-2024-54806.json | 28 ++++ CVE-2024/CVE-2024-548xx/CVE-2024-54807.json | 28 ++++ CVE-2024/CVE-2024-548xx/CVE-2024-54808.json | 28 ++++ CVE-2024/CVE-2024-548xx/CVE-2024-54809.json | 28 ++++ CVE-2025/CVE-2025-218xx/CVE-2025-21893.json | 64 ++++++++ CVE-2025/CVE-2025-271xx/CVE-2025-27167.json | 52 ++++++- CVE-2025/CVE-2025-271xx/CVE-2025-27168.json | 62 +++++++- CVE-2025/CVE-2025-271xx/CVE-2025-27170.json | 52 ++++++- CVE-2025/CVE-2025-280xx/CVE-2025-28087.json | 47 +++++- CVE-2025/CVE-2025-280xx/CVE-2025-28089.json | 47 +++++- CVE-2025/CVE-2025-280xx/CVE-2025-28090.json | 47 +++++- CVE-2025/CVE-2025-280xx/CVE-2025-28091.json | 47 +++++- CVE-2025/CVE-2025-280xx/CVE-2025-28092.json | 47 +++++- CVE-2025/CVE-2025-280xx/CVE-2025-28093.json | 47 +++++- CVE-2025/CVE-2025-300xx/CVE-2025-30095.json | 4 +- CVE-2025/CVE-2025-30xx/CVE-2025-3009.json | 141 ++++++++++++++++++ CVE-2025/CVE-2025-30xx/CVE-2025-3010.json | 145 +++++++++++++++++++ CVE-2025/CVE-2025-30xx/CVE-2025-3015.json | 153 ++++++++++++++++++++ CVE-2025/CVE-2025-30xx/CVE-2025-3016.json | 149 +++++++++++++++++++ CVE-2025/CVE-2025-311xx/CVE-2025-31123.json | 96 ++++++++++++ CVE-2025/CVE-2025-311xx/CVE-2025-31124.json | 104 +++++++++++++ README.md | 77 +++++----- _state.csv | 132 +++++++++-------- 37 files changed, 1856 insertions(+), 143 deletions(-) create mode 100644 CVE-2024/CVE-2024-244xx/CVE-2024-24456.json create mode 100644 CVE-2024/CVE-2024-548xx/CVE-2024-54802.json create mode 100644 CVE-2024/CVE-2024-548xx/CVE-2024-54803.json create mode 100644 CVE-2024/CVE-2024-548xx/CVE-2024-54804.json create mode 100644 CVE-2024/CVE-2024-548xx/CVE-2024-54805.json create mode 100644 CVE-2024/CVE-2024-548xx/CVE-2024-54806.json create mode 100644 CVE-2024/CVE-2024-548xx/CVE-2024-54807.json create mode 100644 CVE-2024/CVE-2024-548xx/CVE-2024-54808.json create mode 100644 CVE-2024/CVE-2024-548xx/CVE-2024-54809.json create mode 100644 CVE-2025/CVE-2025-218xx/CVE-2025-21893.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3009.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3010.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3015.json create mode 100644 CVE-2025/CVE-2025-30xx/CVE-2025-3016.json create mode 100644 CVE-2025/CVE-2025-311xx/CVE-2025-31123.json create mode 100644 CVE-2025/CVE-2025-311xx/CVE-2025-31124.json diff --git a/CVE-2018/CVE-2018-08xx/CVE-2018-0824.json b/CVE-2018/CVE-2018-08xx/CVE-2018-0824.json index ca6b6142de4..79ba94f6e83 100644 --- a/CVE-2018/CVE-2018-08xx/CVE-2018-0824.json +++ b/CVE-2018/CVE-2018-08xx/CVE-2018-0824.json @@ -2,8 +2,8 @@ "id": "CVE-2018-0824", "sourceIdentifier": "secure@microsoft.com", "published": "2018-05-09T19:29:00.370", - "lastModified": "2024-11-21T03:39:01.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-31T21:03:30.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json b/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json index 8210be9994a..8ce10c0cb84 100644 --- a/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json +++ b/CVE-2019/CVE-2019-10xx/CVE-2019-1069.json @@ -2,8 +2,8 @@ "id": "CVE-2019-1069", "sourceIdentifier": "secure@microsoft.com", "published": "2019-06-12T14:29:04.337", - "lastModified": "2024-11-21T04:35:57.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-31T21:03:16.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24452.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24452.json index d63580d03c3..3cca4b38b3b 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24452.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24452.json @@ -1,14 +1,14 @@ { "id": "CVE-2024-24452", - "sourceIdentifier": "cve@mitre.org", + "sourceIdentifier": "security-alert@hpe.com", "published": "2024-11-15T20:15:19.117", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2025-03-31T21:15:43.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Release Indication messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." + "value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB Release Indication messages in Athonet vEPC MME v11.4.0\u00a0allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -52,6 +72,10 @@ } ], "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + }, { "url": "http://athonet.com", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24453.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24453.json index 9dd99a5a371..8f7cac2d6f9 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24453.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24453.json @@ -1,14 +1,14 @@ { "id": "CVE-2024-24453", - "sourceIdentifier": "cve@mitre.org", + "sourceIdentifier": "security-alert@hpe.com", "published": "2024-11-15T20:15:19.203", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2025-03-31T21:15:43.683", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB NotToBeModifiedBearerModInd information element in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." + "value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB NotToBeModifiedBearerModInd information element in\u00a0Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of\u00a0Service (DoS) to the cellular network by repeatedly initiating\u00a0connections and sending a crafted payload." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -52,6 +72,10 @@ } ], "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + }, { "url": "http://athonet.com", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24454.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24454.json index 268d8b855e9..298dd430b0e 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24454.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24454.json @@ -1,14 +1,14 @@ { "id": "CVE-2024-24454", - "sourceIdentifier": "cve@mitre.org", + "sourceIdentifier": "security-alert@hpe.com", "published": "2024-11-15T20:15:19.300", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2025-03-31T21:15:43.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Modify Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." + "value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0E-RAB Modify Request messages in Athonet vEPC MME v11.4.0\u00a0allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -52,6 +72,10 @@ } ], "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + }, { "url": "http://athonet.com", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24455.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24455.json index 3a55084aa55..60548627335 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24455.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24455.json @@ -1,14 +1,14 @@ { "id": "CVE-2024-24455", - "sourceIdentifier": "cve@mitre.org", + "sourceIdentifier": "security-alert@hpe.com", "published": "2024-11-15T20:15:19.403", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2025-03-31T21:15:44.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An invalid memory access when handling a UE Context Release message containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." + "value": "An invalid memory access when handling a UE Context Release message\u00a0containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network\u00a0by repeatedly initiating connections and sending a crafted payload." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -52,6 +72,10 @@ } ], "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + }, { "url": "http://athonet.com", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24456.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24456.json new file mode 100644 index 00000000000..c9789852456 --- /dev/null +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24456.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-24456", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-03-31T21:15:44.513", + "lastModified": "2025-03-31T21:15:44.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An E-RAB Release Command packet containing a malformed NAS PDU\u00a0will cause the Athonet MME to immediately crash, potentially due to a\u00a0buffer overflow." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24457.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24457.json index 0029a8fc2dc..b5b345d4afa 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24457.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24457.json @@ -1,14 +1,14 @@ { "id": "CVE-2024-24457", - "sourceIdentifier": "cve@mitre.org", + "sourceIdentifier": "security-alert@hpe.com", "published": "2024-11-15T20:15:19.510", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2025-03-31T21:15:44.697", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Setup List Context SURes messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." + "value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB\u00a0Setup List Context SURes messages in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network by\u00a0repeatedly initiating connections and sending a crafted payload." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -52,6 +72,10 @@ } ], "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + }, { "url": "http://athonet.com", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24458.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24458.json index 8d26c95f545..6be01dd6125 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24458.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24458.json @@ -1,14 +1,14 @@ { "id": "CVE-2024-24458", - "sourceIdentifier": "cve@mitre.org", + "sourceIdentifier": "security-alert@hpe.com", "published": "2024-11-15T20:15:19.610", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2025-03-31T21:15:44.957", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An invalid memory access when handling the ENB Configuration Transfer messages containing invalid PLMN Identities in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." + "value": "An invalid memory access when handling the ENB Configuration Transfer\u00a0messages containing invalid PLMN Identities in Athonet vEPC MME\u00a0v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular\u00a0network by repeatedly initiating connections and sending a crafted\u00a0payload." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -52,6 +72,10 @@ } ], "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + }, { "url": "http://athonet.com", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24459.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24459.json index 9763f99cf82..69d03682d3b 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24459.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24459.json @@ -1,14 +1,14 @@ { "id": "CVE-2024-24459", - "sourceIdentifier": "cve@mitre.org", + "sourceIdentifier": "security-alert@hpe.com", "published": "2024-11-15T20:15:19.703", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2025-03-31T21:15:46.887", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An invalid memory access when handling the ProtocolIE_ID field of S1Setup Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." + "value": "An invalid memory access when handling the ProtocolIE_ID field of\u00a0S1Setup Request messages in Athonet vEPC MME v11.4.0 allows\u00a0attackers to cause a Denial of Service (DoS) to the cellular network by\u00a0repeatedly initiating connections and sending a crafted payload." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -52,6 +72,10 @@ } ], "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04780en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + }, { "url": "http://athonet.com", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54802.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54802.json new file mode 100644 index 00000000000..027fdd81741 --- /dev/null +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54802.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-54802", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-31T21:15:47.203", + "lastModified": "2025-03-31T21:15:47.203", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "In Netgear WNR854T 1.5.2 (North America), the UPNP service (/usr/sbin/upnp) is vulnerable to stack-based buffer overflow in the M-SEARCH Host header." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#802", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54803.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54803.json new file mode 100644 index 00000000000..a5b2b0f7b7b --- /dev/null +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54803.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-54803", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-31T21:15:47.377", + "lastModified": "2025-03-31T21:15:47.377", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter pppoe_peer_mac and forcing a reboot. This will result in command injection." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#803", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54804.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54804.json new file mode 100644 index 00000000000..31e97a214b9 --- /dev/null +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54804.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-54804", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-31T21:15:47.560", + "lastModified": "2025-03-31T21:15:47.560", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter wan_hostname and forcing a reboot. This will result in command injection." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#804", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54805.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54805.json new file mode 100644 index 00000000000..1a8c6b7f735 --- /dev/null +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54805.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-54805", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-31T21:15:47.737", + "lastModified": "2025-03-31T21:15:47.737", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter get_email. After which, they can visit the send_log.cgi endpoint which uses the parameter in a system call to achieve command execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#805", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54806.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54806.json new file mode 100644 index 00000000000..fbb07e6c25e --- /dev/null +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54806.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-54806", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-31T21:15:47.923", + "lastModified": "2025-03-31T21:15:47.923", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Netgear WNR854T 1.5.2 (North America) is vulnerable to Arbitrary command execution in cmd.cgi which allows for the execution of system commands via the web interface." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#806", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54807.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54807.json new file mode 100644 index 00000000000..0feeae87790 --- /dev/null +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54807.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-54807", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-31T21:15:48.090", + "lastModified": "2025-03-31T21:15:48.090", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#807", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54808.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54808.json new file mode 100644 index 00000000000..53adba5ad21 --- /dev/null +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54808.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-54808", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-31T21:15:48.310", + "lastModified": "2025-03-31T21:15:48.310", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Netgear WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the SetDefaultConnectionService function due to an unconstrained use of sscanf. The vulnerability allows for control of the program counter and can be utilized to achieve arbitrary code execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#808", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54809.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54809.json new file mode 100644 index 00000000000..f36dd7d25cd --- /dev/null +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54809.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-54809", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-31T21:15:48.527", + "lastModified": "2025-03-31T21:15:48.527", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#809", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-218xx/CVE-2025-21893.json b/CVE-2025/CVE-2025-218xx/CVE-2025-21893.json new file mode 100644 index 00000000000..d0bb4444edd --- /dev/null +++ b/CVE-2025/CVE-2025-218xx/CVE-2025-21893.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-21893", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-03-31T20:15:14.613", + "lastModified": "2025-03-31T21:15:49.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix UAF in key_put()\n\nOnce a key's reference count has been reduced to 0, the garbage collector\nthread may destroy it at any time and so key_put() is not allowed to touch\nthe key after that point. The most key_put() is normally allowed to do is\nto touch key_gc_work as that's a static global variable.\n\nHowever, in an effort to speed up the reclamation of quota, this is now\ndone in key_put() once the key's usage is reduced to 0 - but now the code\nis looking at the key after the deadline, which is forbidden.\n\nFix this by using a flag to indicate that a key can be gc'd now rather than\nlooking at the key's refcount in the garbage collector." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://git.kernel.org/stable/c/6afe2ea2daec156bd94ad2c5a6f4f4c48240dcd3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/75845c6c1a64483e9985302793dbf0dfa5f71e32", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/f6a3cf833188e897c97028cd7b926e3f2cb1a8c0", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27167.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27167.json index 418d1779715..0776397737e 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27167.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27167.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27167", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:34.730", - "lastModified": "2025-03-11T18:15:34.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-31T20:06:44.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.7.5", + "matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "29.0", + "versionEndExcluding": "29.3", + "matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27168.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27168.json index de926c8a505..c83fea2ecc0 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27168.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27168.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27168", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:34.893", - "lastModified": "2025-03-11T18:15:34.893", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-31T20:06:08.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,68 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.7.5", + "matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "29.0", + "versionEndExcluding": "29.3", + "matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27170.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27170.json index 63cfff8d341..a7428fcc46b 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27170.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27170.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27170", "sourceIdentifier": "psirt@adobe.com", "published": "2025-03-11T18:15:35.227", - "lastModified": "2025-03-11T18:15:35.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-31T20:02:08.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "28.0", + "versionEndExcluding": "28.7.5", + "matchCriteriaId": "F721B1E0-416E-446E-B55F-01A15D77D6BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionStartIncluding": "29.0", + "versionEndExcluding": "29.3", + "matchCriteriaId": "2B4680F1-0165-4F2D-9795-63C18C7AFE38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb25-17.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28087.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28087.json index d8279d11e42..704420e33b1 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28087.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28087.json @@ -2,20 +2,63 @@ "id": "CVE-2025-28087", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T22:15:17.717", - "lastModified": "2025-03-28T22:15:17.717", + "lastModified": "2025-03-31T21:15:52.970", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sourcecodester Online Exam System 1.0 is vulnerable to SQL Injection via dash.php." + }, + { + "lang": "es", + "value": "Sourcecodester Online Exam System 1.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de dash.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.yuque.com/morysummer/vx41bz/vxhdpdeavzvtvdqq", "source": "cve@mitre.org" + }, + { + "url": "https://www.yuque.com/morysummer/vx41bz/vxhdpdeavzvtvdqq", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28089.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28089.json index bc945da97d8..080781565af 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28089.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28089.json @@ -2,16 +2,55 @@ "id": "CVE-2025-28089", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T22:15:17.847", - "lastModified": "2025-03-28T22:15:17.847", + "lastModified": "2025-03-31T21:15:53.133", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) via the Scheduled Task function." + }, + { + "lang": "es", + "value": "maccms10 v2025.1000.4047 es vulnerable a Server-Side Request Forgery (SSRF) a trav\u00e9s de la funci\u00f3n de tarea programada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/magicblack/maccms10/releases/tag/v2025.1000.4047", @@ -20,6 +59,10 @@ { "url": "https://www.yuque.com/morysummer/vx41bz/wzer7qxh0vwrf6zq", "source": "cve@mitre.org" + }, + { + "url": "https://www.yuque.com/morysummer/vx41bz/wzer7qxh0vwrf6zq", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28090.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28090.json index 17aa6ece7ef..97f677c1aa7 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28090.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28090.json @@ -2,20 +2,63 @@ "id": "CVE-2025-28090", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T22:15:17.980", - "lastModified": "2025-03-28T22:15:17.980", + "lastModified": "2025-03-31T20:15:14.967", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "maccms10 v2025.1000.4047 is vulnerable to Server-Side Request Forgery (SSRF) in the Collection Custom Interface feature." + }, + { + "lang": "es", + "value": "maccms10 v2025.1000.4047 es vulnerable a Server-Side Request Forgery (SSRF) en la funci\u00f3n de interfaz personalizada de colecci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex", "source": "cve@mitre.org" + }, + { + "url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28091.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28091.json index 688787949e1..71e1d7ef2e0 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28091.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28091.json @@ -2,20 +2,63 @@ "id": "CVE-2025-28091", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T22:15:18.107", - "lastModified": "2025-03-28T22:15:18.107", + "lastModified": "2025-03-31T21:15:53.287", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "maccms10 v2025.1000.4047 has a Server-Side Request Forgery (SSRF) vulnerability via Add Article." + }, + { + "lang": "es", + "value": "maccms10 v2025.1000.4047 tiene una vulnerabilidad de Server-Side Request Forgery (SSRF) a trav\u00e9s de agregar art\u00edculo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.yuque.com/morysummer/vx41bz/ax55rxv4u3our1ic", "source": "cve@mitre.org" + }, + { + "url": "https://www.yuque.com/morysummer/vx41bz/xo5w1euakvtgenex", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28092.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28092.json index 5861e460208..5bd4849f631 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28092.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28092.json @@ -2,20 +2,63 @@ "id": "CVE-2025-28092", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T22:15:18.237", - "lastModified": "2025-03-28T22:15:18.237", + "lastModified": "2025-03-31T20:15:15.203", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) via image upload function." + }, + { + "lang": "es", + "value": "ShopXO v6.4.0 es vulnerable a Server-Side Request Forgery (SSRF) a trav\u00e9s de la funci\u00f3n de carga de im\u00e1genes." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.yuque.com/morysummer/vx41bz/stggvmlxs9ewqlvu", "source": "cve@mitre.org" + }, + { + "url": "https://www.yuque.com/morysummer/vx41bz/stggvmlxs9ewqlvu", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-280xx/CVE-2025-28093.json b/CVE-2025/CVE-2025-280xx/CVE-2025-28093.json index 083fd6cdd8d..7bbdf48eafb 100644 --- a/CVE-2025/CVE-2025-280xx/CVE-2025-28093.json +++ b/CVE-2025/CVE-2025-280xx/CVE-2025-28093.json @@ -2,20 +2,63 @@ "id": "CVE-2025-28093", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-28T22:15:18.410", - "lastModified": "2025-03-28T22:15:18.410", + "lastModified": "2025-03-31T20:15:15.363", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ShopXO v6.4.0 is vulnerable to Server-Side Request Forgery (SSRF) in Email Settings." + }, + { + "lang": "es", + "value": "ShopXO v6.4.0 es vulnerable a Server-Side Request Forgery (SSRF) en la configuraci\u00f3n de correo electr\u00f3nico." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.yuque.com/morysummer/vx41bz/he2hb8ic8an8h07f", "source": "cve@mitre.org" + }, + { + "url": "https://www.yuque.com/morysummer/vx41bz/he2hb8ic8an8h07f", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-300xx/CVE-2025-30095.json b/CVE-2025/CVE-2025-300xx/CVE-2025-30095.json index 74ed43af1ca..43882b43b8d 100644 --- a/CVE-2025/CVE-2025-300xx/CVE-2025-30095.json +++ b/CVE-2025/CVE-2025-300xx/CVE-2025-30095.json @@ -2,13 +2,13 @@ "id": "CVE-2025-30095", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-31T15:15:44.843", - "lastModified": "2025-03-31T15:15:44.843", + "lastModified": "2025-03-31T21:15:53.653", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "VyOS 1.3 through 1.5 or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Thus, an attacker can conduct active man-in-the-middle attacks against SSH connections if Dropbear is enabled as the SSH daemon. I n VyOS, this is not the default configuration for the system SSH daemon, but is for the console service. To mitigate this, one can run \"rm -f /etc/dropbear/*key*\" and/or \"rm -f /etc/dropbear-initramfs/*key*\" and then dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key and reload the service or reboot the system before using Dropbear as the SSH daemon (this clears out all keys mistakenly built into the release image) or update to the latest version of VyOS 1.4 or 1.5. Note that this vulnerability is not unique to VyOS and may appear in any Debian-based Linux distribution that uses Dropbear in combination with live-build, which has a safeguard against this behavior in OpenSSH but no equivalent one for Dropbear." + "value": "VyOS 1.3 through 1.5 (fixed in 1.4.2) or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Thus, an attacker can conduct active man-in-the-middle attacks against SSH connections if Dropbear is enabled as the SSH daemon. I n VyOS, this is not the default configuration for the system SSH daemon, but is for the console service. To mitigate this, one can run \"rm -f /etc/dropbear/*key*\" and/or \"rm -f /etc/dropbear-initramfs/*key*\" and then dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key and reload the service or reboot the system before using Dropbear as the SSH daemon (this clears out all keys mistakenly built into the release image) or update to the latest version of VyOS 1.4 or 1.5. Note that this vulnerability is not unique to VyOS and may appear in any Debian-based Linux distribution that uses Dropbear in combination with live-build, which has a safeguard against this behavior in OpenSSH but no equivalent one for Dropbear." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3009.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3009.json new file mode 100644 index 00000000000..90845ca2425 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3009.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-3009", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-31T20:15:15.850", + "lastModified": "2025-03-31T20:15:15.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Jinher Network OA C6. Affected by this vulnerability is an unknown functionality of the file /C6/JHSoft.Web.NetDisk/NetDiskProperty.aspx. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Myoung-SA/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.302059", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.302059", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.524554", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3010.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3010.json new file mode 100644 index 00000000000..c7455792d71 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3010.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-3010", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-31T20:15:16.023", + "lastModified": "2025-03-31T20:15:16.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in Khronos Group glslang 15.1.0. Affected by this issue is the function glslang::TIntermediate::isConversionAllowed of the file glslang/MachineIndependent/Intermediate.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", + "baseScore": 1.7, + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/KhronosGroup/glslang/issues/3903", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/KhronosGroup/glslang/issues/3903#issue-2927492534", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.302060", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.302060", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.524561", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3015.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3015.json new file mode 100644 index 00000000000..44fb22b9149 --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3015.json @@ -0,0 +1,153 @@ +{ + "id": "CVE-2025-3015", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-31T21:15:53.757", + "lastModified": "2025-03-31T21:15:53.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASEImporter::BuildUniqueRepresentation of the file code/AssetLib/ASE/ASELoader.cpp of the component ASE File Handler. The manipulation of the argument mIndices leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0 is able to address this issue. The patch is named 7c705fde418d68cca4e8eff56be01b2617b0d6fe. It is recommended to apply a patch to fix this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/assimp/assimp/commit/7c705fde418d68cca4e8eff56be01b2617b0d6fe", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/assimp/assimp/issues/6021", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/assimp/assimp/issues/6021#issue-2877378829", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/assimp/assimp/pull/6045", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.302067", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.302067", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.524589", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-30xx/CVE-2025-3016.json b/CVE-2025/CVE-2025-30xx/CVE-2025-3016.json new file mode 100644 index 00000000000..62902bf373c --- /dev/null +++ b/CVE-2025/CVE-2025-30xx/CVE-2025-3016.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-3016", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-03-31T21:15:53.940", + "lastModified": "2025-03-31T21:15:53.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::MDLImporter::ParseTextureColorData of the file code/AssetLib/MDL/MDLMaterialLoader.cpp of the component MDL File Handler. The manipulation of the argument mWidth/mHeight leads to resource consumption. The attack can be initiated remotely. Upgrading to version 6.0 is able to address this issue. The name of the patch is 5d2a7482312db2e866439a8c05a07ce1e718bed1. It is recommended to apply a patch to fix this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/assimp/assimp/commit/5d2a7482312db2e866439a8c05a07ce1e718bed1", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/assimp/assimp/issues/6022", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/assimp/assimp/pull/6046", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.302068", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.302068", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.524593", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31123.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31123.json new file mode 100644 index 00000000000..b4b0ba1546c --- /dev/null +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31123.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2025-31123", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-31T20:15:15.547", + "lastModified": "2025-03-31T20:15:15.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zitadel is open-source identity infrastructure software. A vulnerability existed where expired keys can be used to retrieve tokens. Specifically, ZITADEL fails to properly check the expiration date of the JWT key when used for Authorization Grants. This allows an attacker with an expired key to obtain valid access tokens. This vulnerability does not affect the use of JWT Profile for OAuth 2.0 Client Authentication on the Token and Introspection endpoints, which correctly reject expired keys. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-324" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zitadel/zitadel/commit/315503beabd679f2e6aec0c004f0f9d2f5b53ed3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.63.9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.64.6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.65.7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.66.16", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.67.13", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.68.9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.69.9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.70.8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.71.6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-h3q7-347g-qwhf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31124.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31124.json new file mode 100644 index 00000000000..5be2ee56064 --- /dev/null +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31124.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-31124", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-31T20:15:15.707", + "lastModified": "2025-03-31T20:15:15.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zitadel is open-source identity infrastructure software. ZITADEL administrators can enable a setting called \"Ignoring unknown usernames\" which helps mitigate attacks that try to guess/enumerate usernames. If enabled, ZITADEL will show the password prompt even if the user doesn't exist and report \"Username or Password invalid\". While the setting was correctly respected during the login flow, the user's username was normalized leading to a disclosure of the user's existence. This vulnerability is fixed in 2.71.6, 2.70.8, 2.69.9, 2.68.9, 2.67.13, 2.66.16, 2.65.7, 2.64.6, and 2.63.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-203" + }, + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zitadel/zitadel/commit/14de8ecac2afafee4975ed7ac26f3ca4a2b0f82c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.63.9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.64.6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.65.7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.66.16", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.67.13", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.68.9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.69.9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.70.8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/releases/tag/v2.71.6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-67m4-8g4w-633q", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index fa9dc952ac1..c1050b3bd27 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-31T20:00:19.638931+00:00 +2025-03-31T22:00:19.882734+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-31T19:58:57.527000+00:00 +2025-03-31T21:15:53.940000+00:00 ``` ### Last Data Feed Release @@ -33,51 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -287527 +287543 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `16` -- [CVE-2025-29908](CVE-2025/CVE-2025-299xx/CVE-2025-29908.json) (`2025-03-31T19:15:40.367`) -- [CVE-2025-3005](CVE-2025/CVE-2025-30xx/CVE-2025-3005.json) (`2025-03-31T18:15:34.180`) -- [CVE-2025-3006](CVE-2025/CVE-2025-30xx/CVE-2025-3006.json) (`2025-03-31T18:15:34.413`) -- [CVE-2025-3007](CVE-2025/CVE-2025-30xx/CVE-2025-3007.json) (`2025-03-31T19:15:43.860`) -- [CVE-2025-3008](CVE-2025/CVE-2025-30xx/CVE-2025-3008.json) (`2025-03-31T19:15:44.060`) -- [CVE-2025-31128](CVE-2025/CVE-2025-311xx/CVE-2025-31128.json) (`2025-03-31T19:15:42.883`) -- [CVE-2025-31129](CVE-2025/CVE-2025-311xx/CVE-2025-31129.json) (`2025-03-31T19:15:43.023`) +- [CVE-2024-24456](CVE-2024/CVE-2024-244xx/CVE-2024-24456.json) (`2025-03-31T21:15:44.513`) +- [CVE-2024-54802](CVE-2024/CVE-2024-548xx/CVE-2024-54802.json) (`2025-03-31T21:15:47.203`) +- [CVE-2024-54803](CVE-2024/CVE-2024-548xx/CVE-2024-54803.json) (`2025-03-31T21:15:47.377`) +- [CVE-2024-54804](CVE-2024/CVE-2024-548xx/CVE-2024-54804.json) (`2025-03-31T21:15:47.560`) +- [CVE-2024-54805](CVE-2024/CVE-2024-548xx/CVE-2024-54805.json) (`2025-03-31T21:15:47.737`) +- [CVE-2024-54806](CVE-2024/CVE-2024-548xx/CVE-2024-54806.json) (`2025-03-31T21:15:47.923`) +- [CVE-2024-54807](CVE-2024/CVE-2024-548xx/CVE-2024-54807.json) (`2025-03-31T21:15:48.090`) +- [CVE-2024-54808](CVE-2024/CVE-2024-548xx/CVE-2024-54808.json) (`2025-03-31T21:15:48.310`) +- [CVE-2024-54809](CVE-2024/CVE-2024-548xx/CVE-2024-54809.json) (`2025-03-31T21:15:48.527`) +- [CVE-2025-21893](CVE-2025/CVE-2025-218xx/CVE-2025-21893.json) (`2025-03-31T20:15:14.613`) +- [CVE-2025-3009](CVE-2025/CVE-2025-30xx/CVE-2025-3009.json) (`2025-03-31T20:15:15.850`) +- [CVE-2025-3010](CVE-2025/CVE-2025-30xx/CVE-2025-3010.json) (`2025-03-31T20:15:16.023`) +- [CVE-2025-3015](CVE-2025/CVE-2025-30xx/CVE-2025-3015.json) (`2025-03-31T21:15:53.757`) +- [CVE-2025-3016](CVE-2025/CVE-2025-30xx/CVE-2025-3016.json) (`2025-03-31T21:15:53.940`) +- [CVE-2025-31123](CVE-2025/CVE-2025-311xx/CVE-2025-31123.json) (`2025-03-31T20:15:15.547`) +- [CVE-2025-31124](CVE-2025/CVE-2025-311xx/CVE-2025-31124.json) (`2025-03-31T20:15:15.707`) ### CVEs modified in the last Commit -Recently modified CVEs: `32` +Recently modified CVEs: `19` -- [CVE-2024-42636](CVE-2024/CVE-2024-426xx/CVE-2024-42636.json) (`2025-03-31T18:49:02.283`) -- [CVE-2024-45528](CVE-2024/CVE-2024-455xx/CVE-2024-45528.json) (`2025-03-31T18:53:04.780`) -- [CVE-2024-46241](CVE-2024/CVE-2024-462xx/CVE-2024-46241.json) (`2025-03-31T19:20:33.810`) -- [CVE-2024-46373](CVE-2024/CVE-2024-463xx/CVE-2024-46373.json) (`2025-03-31T18:53:55.610`) -- [CVE-2024-46470](CVE-2024/CVE-2024-464xx/CVE-2024-46470.json) (`2025-03-31T19:19:17.120`) -- [CVE-2024-46471](CVE-2024/CVE-2024-464xx/CVE-2024-46471.json) (`2025-03-31T19:07:09.867`) -- [CVE-2024-46472](CVE-2024/CVE-2024-464xx/CVE-2024-46472.json) (`2025-03-31T19:02:48.263`) -- [CVE-2024-48807](CVE-2024/CVE-2024-488xx/CVE-2024-48807.json) (`2025-03-31T19:24:10.313`) -- [CVE-2024-49682](CVE-2024/CVE-2024-496xx/CVE-2024-49682.json) (`2025-03-31T18:13:05.940`) -- [CVE-2024-51063](CVE-2024/CVE-2024-510xx/CVE-2024-51063.json) (`2025-03-31T19:26:46.460`) -- [CVE-2024-51064](CVE-2024/CVE-2024-510xx/CVE-2024-51064.json) (`2025-03-31T19:29:12.110`) -- [CVE-2024-51065](CVE-2024/CVE-2024-510xx/CVE-2024-51065.json) (`2025-03-31T19:29:35.613`) -- [CVE-2024-51209](CVE-2024/CVE-2024-512xx/CVE-2024-51209.json) (`2025-03-31T19:32:18.943`) -- [CVE-2024-51938](CVE-2024/CVE-2024-519xx/CVE-2024-51938.json) (`2025-03-31T19:36:04.583`) -- [CVE-2024-6628](CVE-2024/CVE-2024-66xx/CVE-2024-6628.json) (`2025-03-31T19:58:57.527`) -- [CVE-2024-7054](CVE-2024/CVE-2024-70xx/CVE-2024-7054.json) (`2025-03-31T18:27:47.530`) -- [CVE-2024-9037](CVE-2024/CVE-2024-90xx/CVE-2024-9037.json) (`2025-03-31T18:55:16.680`) -- [CVE-2025-25579](CVE-2025/CVE-2025-255xx/CVE-2025-25579.json) (`2025-03-31T18:15:32.783`) -- [CVE-2025-28094](CVE-2025/CVE-2025-280xx/CVE-2025-28094.json) (`2025-03-31T18:15:33.010`) -- [CVE-2025-3002](CVE-2025/CVE-2025-30xx/CVE-2025-3002.json) (`2025-03-31T19:15:43.390`) -- [CVE-2025-3004](CVE-2025/CVE-2025-30xx/CVE-2025-3004.json) (`2025-03-31T19:15:43.613`) -- [CVE-2025-30149](CVE-2025/CVE-2025-301xx/CVE-2025-30149.json) (`2025-03-31T18:15:33.847`) -- [CVE-2025-31116](CVE-2025/CVE-2025-311xx/CVE-2025-31116.json) (`2025-03-31T19:15:42.300`) -- [CVE-2025-31117](CVE-2025/CVE-2025-311xx/CVE-2025-31117.json) (`2025-03-31T18:15:33.957`) -- [CVE-2025-31125](CVE-2025/CVE-2025-311xx/CVE-2025-31125.json) (`2025-03-31T18:15:34.070`) +- [CVE-2018-0824](CVE-2018/CVE-2018-08xx/CVE-2018-0824.json) (`2025-03-31T21:03:30.687`) +- [CVE-2019-1069](CVE-2019/CVE-2019-10xx/CVE-2019-1069.json) (`2025-03-31T21:03:16.547`) +- [CVE-2024-24452](CVE-2024/CVE-2024-244xx/CVE-2024-24452.json) (`2025-03-31T21:15:43.370`) +- [CVE-2024-24453](CVE-2024/CVE-2024-244xx/CVE-2024-24453.json) (`2025-03-31T21:15:43.683`) +- [CVE-2024-24454](CVE-2024/CVE-2024-244xx/CVE-2024-24454.json) (`2025-03-31T21:15:43.950`) +- [CVE-2024-24455](CVE-2024/CVE-2024-244xx/CVE-2024-24455.json) (`2025-03-31T21:15:44.193`) +- [CVE-2024-24457](CVE-2024/CVE-2024-244xx/CVE-2024-24457.json) (`2025-03-31T21:15:44.697`) +- [CVE-2024-24458](CVE-2024/CVE-2024-244xx/CVE-2024-24458.json) (`2025-03-31T21:15:44.957`) +- [CVE-2024-24459](CVE-2024/CVE-2024-244xx/CVE-2024-24459.json) (`2025-03-31T21:15:46.887`) +- [CVE-2025-27167](CVE-2025/CVE-2025-271xx/CVE-2025-27167.json) (`2025-03-31T20:06:44.963`) +- [CVE-2025-27168](CVE-2025/CVE-2025-271xx/CVE-2025-27168.json) (`2025-03-31T20:06:08.030`) +- [CVE-2025-27170](CVE-2025/CVE-2025-271xx/CVE-2025-27170.json) (`2025-03-31T20:02:08.903`) +- [CVE-2025-28087](CVE-2025/CVE-2025-280xx/CVE-2025-28087.json) (`2025-03-31T21:15:52.970`) +- [CVE-2025-28089](CVE-2025/CVE-2025-280xx/CVE-2025-28089.json) (`2025-03-31T21:15:53.133`) +- [CVE-2025-28090](CVE-2025/CVE-2025-280xx/CVE-2025-28090.json) (`2025-03-31T20:15:14.967`) +- [CVE-2025-28091](CVE-2025/CVE-2025-280xx/CVE-2025-28091.json) (`2025-03-31T21:15:53.287`) +- [CVE-2025-28092](CVE-2025/CVE-2025-280xx/CVE-2025-28092.json) (`2025-03-31T20:15:15.203`) +- [CVE-2025-28093](CVE-2025/CVE-2025-280xx/CVE-2025-28093.json) (`2025-03-31T20:15:15.363`) +- [CVE-2025-30095](CVE-2025/CVE-2025-300xx/CVE-2025-30095.json) (`2025-03-31T21:15:53.653`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ac28924971f..4b35f349c23 100644 --- a/_state.csv +++ b/_state.csv @@ -110564,7 +110564,7 @@ CVE-2018-0820,0,0,0d28d246602159bbae69441a9f356fa161f12b9bb30a06db8e6a396e670389 CVE-2018-0821,0,0,9da5b8c5855d35a3774ba7acfe9c4f267a603c2005d06527ca1c0d305854f26a,2024-11-21T03:39:01.413000 CVE-2018-0822,0,0,4e8a53739e7f732491bfacba0f989f78cfb2074ef938f03f34c70cb053934f10,2024-11-21T03:39:01.550000 CVE-2018-0823,0,0,a62e9539342440d4b1b221afd7aa1d8f538ad152a377cf869212dad4bfb180fa,2024-11-21T03:39:01.687000 -CVE-2018-0824,0,0,444ddbb02a2bcdc5d188f482af5887385603ab531d6d3ae85b92d3adb551df38,2024-11-21T03:39:01.810000 +CVE-2018-0824,0,1,67599506a21e58acf1fe4acef5c1f1ab3bbcb1dccf722c19bbfc9c2417e71e10,2025-03-31T21:03:30.687000 CVE-2018-0825,0,0,c9f1e3ccb9565229fd469bfc786df855c57c05d27edf7b79f090d0916fb2210e,2024-11-21T03:39:02.050000 CVE-2018-0826,0,0,4a5dc634985608590a17dc664fbda049ad4f93710ba694368ed2a4eb57af83ad,2024-11-21T03:39:02.170000 CVE-2018-0827,0,0,7534672b064dd544978b70aa3d672015d7ec12be6b3072ef2b883ca3a03c11f5,2024-11-21T03:39:02.293000 @@ -129105,7 +129105,7 @@ CVE-2019-10686,0,0,8891fb7d0b26811d37e7099d3dcc0099d0e61349158441258419819237670 CVE-2019-10687,0,0,b3a83fd6b88d2188e97fea98f0303467be6b1d1183032c66dc18bda02996a01a,2024-11-21T04:19:45.183000 CVE-2019-10688,0,0,49777a8daa483f4f0587226832268b3a1578614d91b416b0cc352c84b13576a5,2024-11-21T04:19:45.347000 CVE-2019-10689,0,0,1498546decf9b31d102807ecf39e650c4630594e9ed54d965a53c4a5e405f2e7,2024-11-21T04:19:45.497000 -CVE-2019-1069,0,0,9ee89fbc77543b58add425149c59550fcadffbc523c351e17ea578a56da55599,2024-11-21T04:35:57.170000 +CVE-2019-1069,0,1,adaeeb6547dcebc4b3928f59368a19e9d0e32be95afc963248929c1f577a5e71,2025-03-31T21:03:16.547000 CVE-2019-10691,0,0,3f7279d8ee8a3dd85cb122aafda3e40085f4a346c59e7433b9f7f62478239c9b,2024-11-21T04:19:45.653000 CVE-2019-10692,0,0,155d0d82eae9a535c3f6c9585be8eecd2e8c658a757a20098a44283328d01d5b,2024-11-21T04:19:45.820000 CVE-2019-10694,0,0,7c79e338cae117eccf25d5c1d8d05413cccc71f35e923c4c7f43c44deb203409,2024-11-21T04:19:45.973000 @@ -209825,8 +209825,8 @@ CVE-2022-4426,0,0,a3ca9724a11ccc28519507e8204ca711b4d9ece2f4bb42e6e31dc72ebccf3d CVE-2022-44260,0,0,1c4c1cc0940e46fec25a6723e5be439eb2f38d024fd9df23b3785ecf3176cf49,2024-11-21T07:27:48.263000 CVE-2022-44261,0,0,139de1fca3833524bd36dddfe32a4a9f9bbdc1d973a74d769923015d514359e4,2025-03-24T18:15:15.220000 CVE-2022-44262,0,0,df27ede15d999ecbf37f3b9915aa80f3e7bc90d6c7a750dfcb57bab9d6626612,2024-11-21T07:27:48.563000 -CVE-2022-44263,0,1,db470b797c55b2f6778b267d53686402da2348f8111a6ee7a6828f348777d328,2025-03-31T18:15:31.403000 -CVE-2022-44264,0,1,779dfdbf78c6db3f6a7e766f6d480440efaae96a6243d69ef9dde97872dd6408,2025-03-31T18:15:32.120000 +CVE-2022-44263,0,0,db470b797c55b2f6778b267d53686402da2348f8111a6ee7a6828f348777d328,2025-03-31T18:15:31.403000 +CVE-2022-44264,0,0,779dfdbf78c6db3f6a7e766f6d480440efaae96a6243d69ef9dde97872dd6408,2025-03-31T18:15:32.120000 CVE-2022-44267,0,0,6a22eca4fc53a59b875002724e8ca628ee1225845b255410b7dc64d1dec8a6a7,2025-03-26T15:15:40.483000 CVE-2022-44268,0,0,86770817170268b0a887cfc272f7da52b49cec04a13993803745dc916220b476,2025-03-26T15:15:40.750000 CVE-2022-4427,0,0,82b0a1c58b5dd3ffe303de84aa02a3ea240cbfc72b927c3086bf0c900a159f18,2025-02-13T17:15:50.667000 @@ -209845,7 +209845,7 @@ CVE-2022-44291,0,0,9d44a52c0685eb10cd09eb5b4a4bf46a64acf311680ee93d8ff00dae5d22c CVE-2022-44294,0,0,fbcc7bad653c47067cd2250119a45f329a299e47e13ee007fce37d3922b0301d,2024-11-21T07:27:50.893000 CVE-2022-44295,0,0,dd91142188732e917945f2d36e80ce804150e337345a896a8870b3253337b9ca,2024-11-21T07:27:51.037000 CVE-2022-44296,0,0,7649a4fa26d775b1f335af01076e6fd037e2e30d459c85beba18d63ea728e5a1,2024-11-21T07:27:51.180000 -CVE-2022-44297,0,1,714bd75efbc7ed32a384c2a9a61ddee8e01257597043f794fe8a7326c79b21f2,2025-03-31T18:15:32.340000 +CVE-2022-44297,0,0,714bd75efbc7ed32a384c2a9a61ddee8e01257597043f794fe8a7326c79b21f2,2025-03-31T18:15:32.340000 CVE-2022-44298,0,0,69edc3dce983df3c9b5e495ef31c54ebf4e519fcc6525f1ed747f9af4e6eaf26,2025-03-28T15:15:42.390000 CVE-2022-44299,0,0,5adbf77681e09b8399532a96a6a9d4ae34eead786fe1c0029300fa2d65f72929,2025-03-19T15:15:41.873000 CVE-2022-44303,0,0,d9191fcb3c264206571cc2273401cd659061e66b5b01af1a0d6f1bcc3f8d893f,2024-11-21T07:27:51.750000 @@ -210816,7 +210816,7 @@ CVE-2022-45766,0,0,72c36f29c35874580c535822342cd020836969f971dd723babdaa8c49bbc8 CVE-2022-45768,0,0,5a7e71b10745f7171b546446b7eb1beeca8e54d2bd161b17d6d1ae2a2af3a55f,2025-03-25T15:15:16.277000 CVE-2022-45769,0,0,1e8f47f2d9403072669e2f933abb158f13fef15333df9238a51a36c60ca747fe,2024-11-21T07:29:41.063000 CVE-2022-4577,0,0,0ee64bdcd89d460efc049aed42aba77caafdf317c23948db93ad4449cf4198e2,2025-03-26T14:15:25.800000 -CVE-2022-45770,0,1,8c5a7a8c2aa10a10529c3afa32edfc0cf29620d9a30ac85ce666d9550489805b,2025-03-31T19:15:39.220000 +CVE-2022-45770,0,0,8c5a7a8c2aa10a10529c3afa32edfc0cf29620d9a30ac85ce666d9550489805b,2025-03-31T19:15:39.220000 CVE-2022-45771,0,0,187d8b7379b23beda0c4ec7f844878da04db33c0b9e71fb3308e9216031fa00e,2024-11-21T07:29:41.360000 CVE-2022-45778,0,0,ba2c0e56310856b947c1011dc3c1bb60c6e63585e41ef402feb38046d5722fc0,2024-11-21T07:29:41.500000 CVE-2022-4578,0,0,d7acb6c771f7a789d19f6484a24a188e3f6503cc9345077d8e8dad2ae76e5701,2024-11-21T07:35:31.883000 @@ -244960,7 +244960,7 @@ CVE-2024-1051,0,0,47e83543cdb00e91b0b2e6dfcb71fb878c597c188c0668b9ed609335433c9d CVE-2024-10510,0,0,1a1b225dc371f891ed5076d52ce3977c9397cc1b9a9aecca92726347c481951f,2024-11-29T16:15:08.733000 CVE-2024-10511,0,0,5e411f234441d712e134066c0fb752802b5b0a3f0734c4d32360f037e4b5a3aa,2024-12-11T09:15:05.293000 CVE-2024-10513,0,0,101dcfdb0daebc1898491c44833014dafb9860a3d1daf4cd8931e7be27303eeb,2025-03-20T10:15:17.140000 -CVE-2024-10515,0,1,70e4b8a115d447d9e5de069185152143410d2b26272dd3213172f4c642a76ca3,2025-03-31T19:33:29.490000 +CVE-2024-10515,0,0,70e4b8a115d447d9e5de069185152143410d2b26272dd3213172f4c642a76ca3,2025-03-31T19:33:29.490000 CVE-2024-10516,0,0,2ebd9272720b07a5cf79c9a9ceb37a855be1402b37d213d1f22547ec3a1c9ddf,2024-12-06T14:15:19.667000 CVE-2024-10517,0,0,ec874f706d612987436415b14947527e0ec4826e3f1f3a52572b8d2041a7e176,2024-12-12T16:15:10.483000 CVE-2024-10518,0,0,9b672e9ec0f2ce289c42bf794385cc1499fe101df107e5b1e23b7eac5052f943,2024-12-12T16:15:10.890000 @@ -249325,7 +249325,7 @@ CVE-2024-20482,0,0,91c065c5ae8268289342d832aa225585cff358d487a277492c0f30ad7fadd CVE-2024-20483,0,0,dd75006a4b8378f9a9fb04ae844db2b682dee979eaed8461ca1ae896a3344cd6,2024-10-03T01:44:17.827000 CVE-2024-20484,0,0,6b6707e10852e13633700ba01618bcd1e8ced80c7c9f83e2b3f114bf128939f6,2024-11-06T18:17:17.287000 CVE-2024-20485,0,0,4bad42c478a01f00d273ab8662a0d6beb1a29cef37718efc29530f0725b7110b,2024-11-01T19:50:11.107000 -CVE-2024-20486,0,1,125fccffe06e3967c8f3666e5a0a779870a3e9c6cd485fa1df233aa67fbb99ea,2025-03-31T18:20:38.103000 +CVE-2024-20486,0,0,125fccffe06e3967c8f3666e5a0a779870a3e9c6cd485fa1df233aa67fbb99ea,2025-03-31T18:20:38.103000 CVE-2024-20487,0,0,90a43a4226fc2a3a08656cd3b727e32adf773edd1ff69cf850e5d113d82153c1,2024-11-06T18:17:17.287000 CVE-2024-20488,0,0,3eba64ac5c64e3a05ab3229d3a319f5d11c1176e28d49e535d0362c8cf9be279,2024-09-06T17:18:11.813000 CVE-2024-20489,0,0,c515a7131b885c709ec34ee863eb206793a1025f593d2aba1eec899a42a269a8,2024-10-03T01:40:11.637000 @@ -252467,13 +252467,14 @@ CVE-2024-24449,0,0,cb429ffc1f73fa46512b04b6b6b7262785b1e5e3d056a09b6c1ac751016dc CVE-2024-2445,0,0,caebbca57e6dc905fece28cfd8e27fbd318000c7101a9c9ad5d052cb37da5e31,2024-12-13T17:15:49.207000 CVE-2024-24450,0,0,bfdf5a51b70b0375ac650a265388caa7ba6f2b773803891c0563ccf75c951b15,2024-11-18T17:11:56.587000 CVE-2024-24451,0,0,2047230038706a6ea449594aac339b5a79a1ce23f8545e56ac9ddd4465baf12d,2025-01-24T20:15:32.263000 -CVE-2024-24452,0,0,9b35057c4f8238c71060c4a3362de0c41210e1bb46a2fdae5c8c842b460d1809,2024-11-18T17:11:56.587000 -CVE-2024-24453,0,0,7dbe40dab6b44347c4e5eb5b29ed5a220fbd48ca061b2817d1f080948c6c4725,2024-11-18T17:11:56.587000 -CVE-2024-24454,0,0,16fe1707e5b6500467b31b614258ea3c9d6830f97969cc4c9d7fb698042d7182,2024-11-18T17:11:56.587000 -CVE-2024-24455,0,0,bf34919ca18efc343fa332f515b04d4eef692b470371474f2b29a7fce41546b7,2024-11-18T17:11:56.587000 -CVE-2024-24457,0,0,b7bbb2b5a810c1fadde3472c6ef27ef7a83a2fcac2d1955d127019f7529ac816,2024-11-18T17:11:56.587000 -CVE-2024-24458,0,0,ea6d0c7194c84aafdf27031e8442770fc2b8ba09fa460fb6ddecbbd88a347c2f,2024-11-18T17:11:56.587000 -CVE-2024-24459,0,0,3dfc7e14cb29b50f38f109078f5cb39635a43ed4b26fc1dfc7678b12ee1f40a1,2024-11-18T17:11:56.587000 +CVE-2024-24452,0,1,9aa3205d78f1b8367d050ac692b4d7b2d2a817bbe6be31e8eee694911f917dd0,2025-03-31T21:15:43.370000 +CVE-2024-24453,0,1,07ce55fb9f095045ad95fb21b47b54148065f631b3fd0d8f468d663dd94cfda8,2025-03-31T21:15:43.683000 +CVE-2024-24454,0,1,5c2bd54ad8fc2f1543c60195e4dbb3af2c70d2e8d29fea1e0c443c2f494a0a4f,2025-03-31T21:15:43.950000 +CVE-2024-24455,0,1,502d4dd8b46c6151371bd5e943048eb0545d554441e272079a097510fb13b6e1,2025-03-31T21:15:44.193000 +CVE-2024-24456,1,1,23859e18334d311069bd2883cb0529381eb7240f1b5b7afa923ed46511ae2078,2025-03-31T21:15:44.513000 +CVE-2024-24457,0,1,d2e8d373f9d57bd477032938d24f522c47b66f04dea00a8e69a47432d7e011ba,2025-03-31T21:15:44.697000 +CVE-2024-24458,0,1,a5484b0fe42741bb8d668d79927c6e7c3ee357596180e82a5cf95201bf23335c,2025-03-31T21:15:44.957000 +CVE-2024-24459,0,1,71db539dc29bad108be9fb9402dcdbfd179a3be0ce3ce40b183975a79316afe6,2025-03-31T21:15:46.887000 CVE-2024-2446,0,0,43217bdd586fe0adfbce35dce1a075395c2a23d609c9f19c21f34e2c598fb7e4,2024-12-13T16:39:51.233000 CVE-2024-24468,0,0,ef2f46bc00e60b0046ac3fa8a85a5d2843a4126050811a264748033c1f6c0bfa,2024-11-21T08:59:18.197000 CVE-2024-24469,0,0,f5bdfa2b37924c81cf855da4fc554fb14c8183e30574a75cfd35962e7d0ac2c1,2024-11-21T08:59:18.353000 @@ -264342,7 +264343,7 @@ CVE-2024-39655,0,0,995dc9c1c7c96fb0fc03e66270fab2cb1ffcf8a4397ddb365981e39389c67 CVE-2024-39656,0,0,c84c39d5a0694c7d1c872fcafc2d435755839df103c210d90013e7441c34bda1,2024-08-02T12:59:43.990000 CVE-2024-39657,0,0,2bf07190211ec64f7bfc9e8a96ee124b8611e75c850679013b89e79b547f6896,2024-09-18T16:25:32.703000 CVE-2024-39658,0,0,766eb85a1304afebac868b111e71876df3cfe7453afe0f78210d30bdcb174f44,2024-09-13T21:04:24.760000 -CVE-2024-39659,0,1,eb277be69da7ae63c72d03b1700b1623310358a8537a25ae64fc0cec58e225c5,2025-03-31T18:22:48.390000 +CVE-2024-39659,0,0,eb277be69da7ae63c72d03b1700b1623310358a8537a25ae64fc0cec58e225c5,2025-03-31T18:22:48.390000 CVE-2024-3966,0,0,063645d8989e4cabc49b793f8b061eb0fa5ef40aff4317a82395a925db517939,2024-11-21T09:30:47.557000 CVE-2024-39660,0,0,f3ac8304b1d224b0071a3a78df5d2888502abdabd1c64183297a33de85b58c9a,2024-08-02T12:59:43.990000 CVE-2024-39661,0,0,2412d25c8e1b3b5f410f5c79baa180c712b7da235f8a4069d0bcbeb29ba3f2d1,2024-08-02T12:59:43.990000 @@ -266503,7 +266504,7 @@ CVE-2024-42631,0,0,ed9e80e71e882419c98f1936732fdd035ca311ef33bc2ac9cb2a1a67c40af CVE-2024-42632,0,0,29fbd74151313f5b4a9b1372c595b1fee99cc3a87d35047777c8872345464e5c,2024-08-13T15:35:23.410000 CVE-2024-42633,0,0,3cf92e5e6df7470ec76959fa70236d85e9e9942650bdcd767e84cd8dbdc27aee,2024-08-20T16:18:24.300000 CVE-2024-42634,0,0,e316dd50ac7dd29fbd6d3ac410c9dd2e383d0fa3a5124d95a220d9396a05eb2a,2024-08-19T13:00:23.117000 -CVE-2024-42636,0,1,444e64fac4a624fc737f489868061b86775d9e59f0cfa512926ca33905ecdabe,2025-03-31T18:49:02.283000 +CVE-2024-42636,0,0,444e64fac4a624fc737f489868061b86775d9e59f0cfa512926ca33905ecdabe,2025-03-31T18:49:02.283000 CVE-2024-42637,0,0,7ab579a16c75673edf60ac8a3c57e5d93e8a15ee1bb0faf828bd0c37998bf12d,2024-08-19T13:00:23.117000 CVE-2024-42638,0,0,2c1b857f0b965ac40814489cb21be9b393c58462d1ddf36b59e226e27acdcc88,2025-03-17T15:15:41.303000 CVE-2024-42639,0,0,7ae4bb182bb632802f21a7f071d6ecf69b498e4a7b1d31bfaeb90705ae0f6221,2025-03-20T14:15:20.170000 @@ -268698,7 +268699,7 @@ CVE-2024-45522,0,0,09ceef78cc5f057be786bb183a479b765b1739f0b7ce2fbf1b1d3c524b7ab CVE-2024-45523,0,0,78921820db852b485259b411f9a0300a9a0274594719508f8ffa7f118abb2798,2024-09-20T14:35:11.523000 CVE-2024-45526,0,0,5a2809434001f8fa7518dd39e1d76ce252063ceb0c771a1023d6ee67c4c4a925,2024-10-23T19:35:10.713000 CVE-2024-45527,0,0,5b520308e8c1543ba589bbb7fb99705b7715af5ae5704181f6c1c8d8f972f51c,2024-09-03T15:35:13.673000 -CVE-2024-45528,0,1,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0cffe,2025-03-31T18:53:04.780000 +CVE-2024-45528,0,0,2b62a46ad6721df273bf579b352dfc41d4b63f87803bbdffe8980da05bd0cffe,2025-03-31T18:53:04.780000 CVE-2024-4553,0,0,fb93ea8b9b15d40065d6ae14704246d0707e85e61c82926c0504e92275e39cb7,2025-01-24T14:42:56.390000 CVE-2024-45537,0,0,e4991fccb3abdc03f0d41abc273d14fb886e4c1626430be204dd2dbbe1a63e8d,2025-03-14T15:15:42.430000 CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000 @@ -269073,7 +269074,7 @@ CVE-2024-46238,0,0,fd4831862db3e74117454bdc4a0bfbcd296d65ce950e55d96b45ec27cf047 CVE-2024-46239,0,0,a2e0203fe405dc3797841252c2430cf2c4e2c3b10af81b0193959b83c529ddd1,2025-03-31T17:52:58.943000 CVE-2024-4624,0,0,18970f9a313d13160da6e0af938d898396349890d09a8f8861dd5be486e648a9,2025-01-15T18:00:53.760000 CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8af69,2024-10-25T19:00:20.737000 -CVE-2024-46241,0,1,65a068281839d70d77856026e22ffe1b7df2d3ec55dc4b9009edbb9990408570,2025-03-31T19:20:33.810000 +CVE-2024-46241,0,0,65a068281839d70d77856026e22ffe1b7df2d3ec55dc4b9009edbb9990408570,2025-03-31T19:20:33.810000 CVE-2024-46242,0,0,278c5d74ca553d7a6ee7eea1c9d6c6283b4a956d21df9f54eec439967fafe153,2025-01-07T21:15:11.783000 CVE-2024-4625,0,0,aad46a28d2c2f49a77b5936172e43c0dde451e0472cbbc7daa3b8775fd5ff0b1,2025-02-11T02:15:35.090000 CVE-2024-46256,0,0,e8ff1292d6b21c7ae8cc6b0452346dfd4818ec086d9a14227767a4b9e342f7b1,2024-10-24T17:15:16.690000 @@ -269121,7 +269122,7 @@ CVE-2024-46366,0,0,d617ffae88cb828c6e7151f2341d1f71470550fda14e8fcb6482b905bda24 CVE-2024-46367,0,0,989a85d08e8653df07e4eae1f4f794bd57485ed7719e4f75ea7a012b27c892b7,2024-09-30T12:45:57.823000 CVE-2024-4637,0,0,93f87c1fc2bbd96796cfb083c4131106f07be323f4ade6a9313776a7f9a8739b,2025-01-27T18:22:19.963000 CVE-2024-46372,0,0,64e69d8d7d4508ebfd1e3370be60554c61b02f56bb1b126b7d6932b73c4bd8b4,2025-03-25T17:16:10.433000 -CVE-2024-46373,0,1,a07e5ed04eabb8b296855fe8ef81409c9a84dee991735b3ba28d11997413b1db,2025-03-31T18:53:55.610000 +CVE-2024-46373,0,0,a07e5ed04eabb8b296855fe8ef81409c9a84dee991735b3ba28d11997413b1db,2025-03-31T18:53:55.610000 CVE-2024-46374,0,0,49c9abdfd23a3c7b397e5069ae4701ce6b671bb400b51adb0be2528c878db0de,2024-09-20T12:30:17.483000 CVE-2024-46375,0,0,251c5c224cd39f4fe15f3a9045f8fa195e4dd35b1c8aeb90a1494c5706870ceb,2024-09-20T12:30:17.483000 CVE-2024-46376,0,0,44f3c1706e60f5bd7bbcaa0829495448a78c5a8ae7d0d5596087882889678073,2024-09-20T12:30:17.483000 @@ -269167,9 +269168,9 @@ CVE-2024-46466,0,0,05f240dba70d063ab9d7ed20681eedb762fbba20cc02e0363e22d4808d27c CVE-2024-46467,0,0,73f0f26e819634cb625c5f23b0aee6baa6651d870b71db2a09d09f42a1c60f90,2024-11-25T20:15:09.170000 CVE-2024-46468,0,0,bfaaa209cfbab67a97fdbb03a6d72f15cdef7f2e107fbbe0bd40bea4fa9e260b,2024-10-15T18:35:14.680000 CVE-2024-4647,0,0,ecc1578f1607d877ec09ef9a154e3163dc45f1d50cf87949c0a4d645b7b7eaf9,2025-02-19T18:04:19.093000 -CVE-2024-46470,0,1,ccd900df91568f37aaaf8beaddb896f7b1bf9ff01c6bf3d8989063329ed3c1e7,2025-03-31T19:19:17.120000 -CVE-2024-46471,0,1,95b680df6f7ac557262e9483a5a0b48e0997cd8bfadfc2bd86c9ad1edd8cade7,2025-03-31T19:07:09.867000 -CVE-2024-46472,0,1,98034addb2dd3db31543176eec90b3d6be943e239cb4afda9c52b024f5b4c496,2025-03-31T19:02:48.263000 +CVE-2024-46470,0,0,ccd900df91568f37aaaf8beaddb896f7b1bf9ff01c6bf3d8989063329ed3c1e7,2025-03-31T19:19:17.120000 +CVE-2024-46471,0,0,95b680df6f7ac557262e9483a5a0b48e0997cd8bfadfc2bd86c9ad1edd8cade7,2025-03-31T19:07:09.867000 +CVE-2024-46472,0,0,98034addb2dd3db31543176eec90b3d6be943e239cb4afda9c52b024f5b4c496,2025-03-31T19:02:48.263000 CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000 CVE-2024-46478,0,0,f70f3b5c1ce34e91e4141e4b2cfc565865d5d214d85b67dd8586cdb93782907f,2024-10-25T20:35:09.710000 CVE-2024-46479,0,0,d3dcd1fb5238b07184a4925343df44d4e6e159f370a4f241b86afa356047b5d1,2025-01-13T18:15:18.003000 @@ -270865,7 +270866,7 @@ CVE-2024-48798,0,0,75f45576dc36face7290312bd25d8139caf8bd952fb64803e744a3ae6e924 CVE-2024-48799,0,0,1b7764cd349b8845e947ef033fa31339932e6c95b96b723a19e36094142fff50,2025-03-24T17:15:18.960000 CVE-2024-4880,0,0,0cc985577bb7f14539feddc231097b9e719890ea446692f0e1ab269d57e2a39c,2025-02-11T02:15:35.143000 CVE-2024-48806,0,0,c426ca49ad75210c4d73c5b573e2dd3e119056b8e0f3da40ade3d13a5fdaf0d5,2025-01-16T19:15:28.320000 -CVE-2024-48807,0,1,8a88a75c275ba7d848707c49505be930f471d4f3e024973e5d06d59680ee7a1a,2025-03-31T19:24:10.313000 +CVE-2024-48807,0,0,8a88a75c275ba7d848707c49505be930f471d4f3e024973e5d06d59680ee7a1a,2025-03-31T19:24:10.313000 CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000 CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000 CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000 @@ -271564,7 +271565,7 @@ CVE-2024-49679,0,0,69366457d136ea54a3b6926990a6003dde86feed848c00d8b78be39be0d98 CVE-2024-4968,0,0,84fb7654272f609db67556b1bbee00c1c6101a0c21765453fbdfc009a9be8a0a,2025-02-10T13:42:36.187000 CVE-2024-49680,0,0,0744c3301274ac63d10bef9c834e7e6120c33d012ef4df460932bd9e268c305e,2024-11-19T21:57:32.967000 CVE-2024-49681,0,0,8c5bef0a7111e608e574a08de0a110bd80fd63fe70a3435156e2c27580ccfca2,2024-10-25T12:56:07.750000 -CVE-2024-49682,0,1,078bc643574c07133c2a6c67de5ef98e1df80f7b816ed0205f76ede1996f5e82,2025-03-31T18:13:05.940000 +CVE-2024-49682,0,0,078bc643574c07133c2a6c67de5ef98e1df80f7b816ed0205f76ede1996f5e82,2025-03-31T18:13:05.940000 CVE-2024-49683,0,0,7be9ea3f510dbaa7fe885cdcb7745560fbc269f7e9bd22850dce90772b3593dd,2024-10-25T12:56:07.750000 CVE-2024-49684,0,0,36531d7cf4c7a4e38f6860bda9ec7c0d48195d2fcc27ad0578736763df8ccca2,2024-10-25T12:56:36.827000 CVE-2024-49685,0,0,f305b32b568edf91e7bf9c3e098c8b0e617926446f188349b4087b101823778f,2025-02-05T14:51:00.297000 @@ -272703,9 +272704,9 @@ CVE-2024-51055,0,0,8c557950a9a065601e8c6c8dceb6fdc953c2a7292e6455f04da0193339cab CVE-2024-51058,0,0,66da7488618e7bfd544082f0a7ca5f5b213beafff66d93fe5b2dca66727647f7,2024-11-26T20:15:33.253000 CVE-2024-5106,0,0,b32baeddd5d7517902783f8698c8ddf8d7704de9303360c6ce08bd697c855461,2025-03-05T16:18:39.727000 CVE-2024-51060,0,0,de7bf14fdaea8b78c02e0c6fade9921621bf0bad2bf2c2ffc485512c883062ec,2024-11-01T17:35:08.443000 -CVE-2024-51063,0,1,baaa401f76f83c10a16a16ac2300c7ff206c0294cf7e048885c9427fd5cc3d20,2025-03-31T19:26:46.460000 -CVE-2024-51064,0,1,8c98c114e76bc1bd024a1bc62e5d3e352526cdd76914057f4ebcb0ef5f381d29,2025-03-31T19:29:12.110000 -CVE-2024-51065,0,1,3b3e6650157f1931a47712b62fd9a2e7477a5d52ec6634effed03cb5c0e92c45,2025-03-31T19:29:35.613000 +CVE-2024-51063,0,0,baaa401f76f83c10a16a16ac2300c7ff206c0294cf7e048885c9427fd5cc3d20,2025-03-31T19:26:46.460000 +CVE-2024-51064,0,0,8c98c114e76bc1bd024a1bc62e5d3e352526cdd76914057f4ebcb0ef5f381d29,2025-03-31T19:29:12.110000 +CVE-2024-51065,0,0,3b3e6650157f1931a47712b62fd9a2e7477a5d52ec6634effed03cb5c0e92c45,2025-03-31T19:29:35.613000 CVE-2024-51066,0,0,be8d42488560dde278907528220628acd7b9c959e1434a1bf1dbead4fac8fcb1,2024-11-01T21:35:05.747000 CVE-2024-5107,0,0,2f055a04ccbd78b9c8df18cf46dc307764a3b6508de2a8d7063f4779b98b5648,2025-02-21T21:18:28.707000 CVE-2024-51072,0,0,e3822fe995b8ac5db401be8bd0f5c664092585f4b74280cebfb9be6c17c2b406,2025-01-10T15:15:15.173000 @@ -272764,7 +272765,7 @@ CVE-2024-5119,0,0,91893ccf3d5267b72a6b8ed10d2ba4560a7ea2a4bdb6a9260fec1e0619fdc1 CVE-2024-51190,0,0,42252f42d57e549237c1e65576645654fa8f454c06ed81783464129f893b6230,2024-11-12T13:55:21.227000 CVE-2024-5120,0,0,aa0bc8f3e284072bee9ea1e53af4826838bcd5e6353dff9b260a6c50ff30ddbc,2025-02-10T14:33:42.463000 CVE-2024-51208,0,0,a59d692cb343382c726f4c6a51e70064bfbd58c7b1c1ae68bcfdeee9f98e2032,2025-03-13T17:15:33.210000 -CVE-2024-51209,0,1,2acbc3e3e25af92d55848830d8628123b058e9a1fdf83b5e7f3e04674f33868a,2025-03-31T19:32:18.943000 +CVE-2024-51209,0,0,2acbc3e3e25af92d55848830d8628123b058e9a1fdf83b5e7f3e04674f33868a,2025-03-31T19:32:18.943000 CVE-2024-5121,0,0,f13a957054662226d9f30e7797cd699fbbc4fb099f0a6c1363eaca0808d26e93,2025-02-10T14:33:01.420000 CVE-2024-51210,0,0,1dfb5793bbd38593e70df49e07cd7ee951e3036bdad9fedc179912099b41ccff,2024-12-05T18:15:22.090000 CVE-2024-51211,0,0,5bbcb137b1680696c02324cbd64119e5698f5bb8e272467c42227679b2a82406,2024-11-21T17:15:22.410000 @@ -273358,7 +273359,7 @@ CVE-2024-51934,0,0,efe96cb8fc68640b083cbe9be334ef1c2ebccacaa81f9de9e0dd9bb0982e2 CVE-2024-51935,0,0,fb50d58711b2904c9889235a06a099f964a5dc2d960855b72c8c5020e8cc7467,2024-11-19T21:56:45.533000 CVE-2024-51936,0,0,01ed82394fa093ff4d3b03b9d8dca58deb9d6f0168256baf25f9ae6ed15ae66d,2024-11-19T21:56:45.533000 CVE-2024-51937,0,0,40f9bcab077c80d2c70e8068655769a90e334e94a3b2252e9eefae5aa1c7cf3f,2024-11-19T21:56:45.533000 -CVE-2024-51938,0,1,7f531483548183d746950131a91938a8eaa342b0a7690b882b3a3f83d4d6a283,2025-03-31T19:36:04.583000 +CVE-2024-51938,0,0,7f531483548183d746950131a91938a8eaa342b0a7690b882b3a3f83d4d6a283,2025-03-31T19:36:04.583000 CVE-2024-51939,0,0,20d7c044823f2dbd5a93ccbf1e62122469f38a0e0e61d27f0eead27fdd2e22c5,2024-11-19T21:57:32.967000 CVE-2024-5194,0,0,8d46b9bc1f0e922d7415f01b9e20c3241c30409b16aacd585324be8545f4e31e,2024-11-21T09:47:09.967000 CVE-2024-51940,0,0,eea7140ef8e6920e3e5dd47ba7cd4d003e663b87564e69e84f825f175f7f9241,2024-11-19T21:57:32.967000 @@ -275357,6 +275358,14 @@ CVE-2024-54792,0,0,98468856aeeedfaaa62e1fc26bc1fac81265f3b59cbbffb650074881345ba CVE-2024-54794,0,0,c49ffe9b769b5cd233f7d6bd6f86fb56ddf647e4b0a80553364112532cd337f3,2025-01-21T19:15:11.243000 CVE-2024-54795,0,0,189377580c088768ee02d63dd643544c9e329d819648f0ba84334338aef4e9e3,2025-01-21T19:15:11.407000 CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000 +CVE-2024-54802,1,1,3a4102a7c0b6c4258870e143dca9a56c73080cc779032a88035f11e358fc1ca8,2025-03-31T21:15:47.203000 +CVE-2024-54803,1,1,192193603a5ebe46711b4e83a4bcb956f7781970a1dc4a31466e95cc44190532,2025-03-31T21:15:47.377000 +CVE-2024-54804,1,1,af2de00afb414e1889120d5577cb01186c8c976bf5a04b1c87e0ebfdd9d92249,2025-03-31T21:15:47.560000 +CVE-2024-54805,1,1,5408c1dbb379ed12ed0d05a63b489762204909515ac58e7c7c0fff6f2fe52925,2025-03-31T21:15:47.737000 +CVE-2024-54806,1,1,702336dd48eeff3593dd350dbacfa5f362a1a00a9dc2c7f5eaafefb7ffc2c01e,2025-03-31T21:15:47.923000 +CVE-2024-54807,1,1,1bc8e591f4370077ab227b516ceb005453d45fc6ec62e61feffece8184ca988e,2025-03-31T21:15:48.090000 +CVE-2024-54808,1,1,508e5d76c1f49651c6875f8083cbf64a337b83d81086dd089faff099fb56b7d3,2025-03-31T21:15:48.310000 +CVE-2024-54809,1,1,d63d8ba3b33563d57fd43edfe1b118d91737ff7f45d096d6bfd7931bcefdd13d,2025-03-31T21:15:48.527000 CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000 CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000 CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000 @@ -277962,7 +277971,7 @@ CVE-2024-6624,0,0,552d36257e8bfaa4330013290315eab120066dcc2d886a9d94d7a9269b76a4 CVE-2024-6625,0,0,1b1c39349f634a560833a8b14095d12391f881dda66986404d732704553d9c8a,2024-11-21T09:50:01.480000 CVE-2024-6626,0,0,249866bf2ce6f0742e7ebbb55a39f819e02fa1bb5ce90e67c70e877b0a80889f,2024-11-08T21:18:44.400000 CVE-2024-6627,0,0,46c1b50f2f4fc4f4915a5d60c7232a25ef2d8e7212d2215183cdea5ab45a44d0,2025-02-06T17:40:50.280000 -CVE-2024-6628,0,1,8d496fa7bba218fa6816b17098bcf8cd1de8a287cedeed63670cc804578db4fe,2025-03-31T19:58:57.527000 +CVE-2024-6628,0,0,8d496fa7bba218fa6816b17098bcf8cd1de8a287cedeed63670cc804578db4fe,2025-03-31T19:58:57.527000 CVE-2024-6629,0,0,a527624ccafa4d4e16277a177029cdaa056a5fd7eb7a8772535daaafb91b33a4,2024-11-21T09:50:01.973000 CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000 CVE-2024-6631,0,0,6814ab0364b6ced1872d70e3966a7eb63a524daa89dd6b575b0ac22e27afca55,2024-09-12T20:39:22.493000 @@ -278353,7 +278362,7 @@ CVE-2024-7050,0,0,06f451073f052c5171cdc858230f8ac0bfc1cd03261b82c9e4025ffcee809a CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000 CVE-2024-7052,0,0,b869d4be8a9ef05b526f5074ec778788ff68c0dc06586eacf01aecd8a404162d,2025-02-14T17:15:18.480000 CVE-2024-7053,0,0,7720c82c430e328b75c680ca5e5d109c9bc5d455075089b23f69681b09912d0e,2025-03-20T14:15:21.553000 -CVE-2024-7054,0,1,7df23b9647e9776ce9f3d05a4e54f924a44fe3a231ecd255041316cf38333e70,2025-03-31T18:27:47.530000 +CVE-2024-7054,0,0,7df23b9647e9776ce9f3d05a4e54f924a44fe3a231ecd255041316cf38333e70,2025-03-31T18:27:47.530000 CVE-2024-7055,0,0,9935f1de2cee66b07954ad120fe6ce5f54f36d3188fd3d2bc5c8e7d48d543152,2024-08-06T16:30:24.547000 CVE-2024-7056,0,0,ec08ae131187a52a9d1409d290e6919fd556ee74677249d587bb18cc1ea21e30,2024-11-25T14:15:07.457000 CVE-2024-7057,0,0,3c6ad5d4517bec5901108debd01a08995bd05bb08470aa05a322d034ebbe1d3e,2024-11-21T09:50:48.570000 @@ -280174,7 +280183,7 @@ CVE-2024-9033,0,0,c9ce8f3f22810e314a9b6a7070f369471d9e5df9eced517c322686d35f96ab CVE-2024-9034,0,0,90bd5bffc39325b9c6cc2c7df19844bf0675ae9032a75556de19fb8cc5e5a6ba,2024-09-26T13:32:55.343000 CVE-2024-9035,0,0,c836add5f9ea0f6ba01095ded6458386ae8fd2f11d68cb367cc7ade58ddaa024,2024-09-26T13:32:55.343000 CVE-2024-9036,0,0,3bbbfc98a85d5f78d43560ecd3c231db4288c62659683b5c35ebd015a776ac19,2024-09-26T13:32:55.343000 -CVE-2024-9037,0,1,61d7d575e9833b1f71caeb12a0ed3faa0ea60057248b15da1a13008ecf46898b,2025-03-31T18:55:16.680000 +CVE-2024-9037,0,0,61d7d575e9833b1f71caeb12a0ed3faa0ea60057248b15da1a13008ecf46898b,2025-03-31T18:55:16.680000 CVE-2024-9038,0,0,902b50c6d930b124e106a40fd3471c27a76d7b215b07dd7cda1cc7b7441c1dbd,2024-09-27T16:11:37.710000 CVE-2024-9039,0,0,c2deaade23da482813d66248554a49a9e73a2b63627babab6e443384d154782e,2024-09-27T15:58:22.493000 CVE-2024-9040,0,0,be63bc9a723d2aaddace773ab8ae6f6ce5897ce1c02995f8071d9bda756dd77c,2024-09-27T15:53:28.333000 @@ -283312,6 +283321,7 @@ CVE-2025-2189,0,0,21362a35b576822cdfa735714de3fa8c2b76316e693eaa457f9b76275fa21b CVE-2025-21890,0,0,3e452c883c787bf57ab5be0b0e5aa90feed93eaffae235cb89507607056595a5,2025-03-27T16:45:12.210000 CVE-2025-21891,0,0,a253456cafaa3a78ec959ae9d1e060c416fbd075d583d9a377a6f3a26384270e,2025-03-27T16:45:12.210000 CVE-2025-21892,0,0,8c98329172bed9a8b6c22457d316cbe2e25dcbfb066893d9b84a9f2d473cdf83,2025-03-27T16:45:12.210000 +CVE-2025-21893,1,1,4a7f56dfa32cca5916bdfdd25b8f2f0cf25de87af7a79afe4879360d1a287b49,2025-03-31T21:15:49.307000 CVE-2025-2190,0,0,2ad046c01e8fde47102d510f1e691e56d4505e286b09d0c88b5a5f7442f2c96e,2025-03-11T14:15:27.163000 CVE-2025-2191,0,0,435c67fbe91d200be556fa2bda480273212858b72f473ce6d41f73706042d56e,2025-03-11T12:15:12.277000 CVE-2025-2192,0,0,154f3902bcd5e64a72bf0ae06aa3f84eb0e5031d75ead63c96aedd6785aca290,2025-03-11T14:15:27.443000 @@ -285613,7 +285623,7 @@ CVE-2025-25567,0,0,0e3c48ab6a4496288811058f80eb7d29339ca7638242416df9fb706fe2ad4 CVE-2025-25568,0,0,dcddcadc1916e01c6212aad8a0f1d787a9f9a493dfbdbc2db4d93a5e91a64889,2025-03-19T19:15:44.790000 CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d869265076,2025-03-20T19:15:38.220000 CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000 -CVE-2025-25579,0,1,5d939121eb276c7ecee1a29df62e11fe223cac6be7be94a5d22d93cbcd0562dd,2025-03-31T18:15:32.783000 +CVE-2025-25579,0,0,5d939121eb276c7ecee1a29df62e11fe223cac6be7be94a5d22d93cbcd0562dd,2025-03-31T18:15:32.783000 CVE-2025-25580,0,0,981db6fd6e3e758c95a7a3f18e0cb48f5883f5e68031cb88007741a3d3ada90e,2025-03-19T19:15:44.917000 CVE-2025-25582,0,0,71a429a4688f0b98eba65a76fc9404b2639d529bc96a639c12359f9c6efb4809,2025-03-19T19:15:45.050000 CVE-2025-25585,0,0,aa4f3350849e7a6d1d328ba035f3acd3940e4357ca726a2c6819200e720715c1,2025-03-19T19:15:45.203000 @@ -286339,11 +286349,11 @@ CVE-2025-27162,0,0,c8a873ec2f347494d3d41f4d6681990bc645e58bd3c39e33b011e49921441 CVE-2025-27163,0,0,be9f753c41485f106d11ef9915fc4e361a052626e525b314de4c44cc95c404c0,2025-03-12T14:15:16.447000 CVE-2025-27164,0,0,03f0ef0c440ec2fdb9d4dc234d5039887fd3a0dc69a422dcc0d797b26efec6e3,2025-03-12T14:15:16.557000 CVE-2025-27166,0,0,b79788c4fdccc241a4bf7f90619735b442ab253b044d6be62992503f1b3e47a6,2025-03-11T18:15:34.580000 -CVE-2025-27167,0,0,482f29e987878fe25988a572ce45a267c50ddf32167f67d5c354d3bbaff05d77,2025-03-11T18:15:34.730000 -CVE-2025-27168,0,0,807af9ba36e5529c822db751bf81df9cf34521f5f9d52647f44b26e4df0d5dd0,2025-03-11T18:15:34.893000 +CVE-2025-27167,0,1,9fc03919f99441cc6e5924699f0b5c87cd969352015206acd2e76f4d0a20cd30,2025-03-31T20:06:44.963000 +CVE-2025-27168,0,1,c854660c04ae74863042de804529bb7219f13c8265d2faffac9e2184be17e3fe,2025-03-31T20:06:08.030000 CVE-2025-27169,0,0,d5608e0c74c50f0a7a42281f3fdcdcaa1a3d612052706dc929ba06e7701adb33,2025-03-11T18:15:35.077000 CVE-2025-2717,0,0,a2a688c228e7eb03eb19b61a2532f80168264fd17e51134150518690e88bab28,2025-03-27T16:45:46.410000 -CVE-2025-27170,0,0,b96e4ffaebc56916f484b466d583f7d3b36625d540473ebe18865b2b793f41b3,2025-03-11T18:15:35.227000 +CVE-2025-27170,0,1,4798b678d1edbc7dfece125d548cec25bb6248e6edea565df19aaaea350e970e,2025-03-31T20:02:08.903000 CVE-2025-27171,0,0,11bfabbfe795ecd5b004555bf156a1f2031ec4849cea31dc93fa58c4a625d087,2025-03-11T18:15:35.377000 CVE-2025-27172,0,0,1fbf8b09dd6176ac8d843dcc615a1bf482be9a0380a5c5839de3ae8abc924dc0,2025-03-11T17:16:44.420000 CVE-2025-27173,0,0,d2957505941740af6a42c6319581f72d9d2dd8e1c5b9f1c7029eb0863a6e0c67,2025-03-11T21:15:42.307000 @@ -286698,13 +286708,13 @@ CVE-2025-28011,0,0,fdcb5591ea26e059e8d35048712169c6e42fd9f817189e1097ee50f0c5ccd CVE-2025-28015,0,0,2ec3b03d6a2c5b451e55cb244fde2066264789b2e32a98f716bffd5d4cc31009,2025-03-28T19:49:16.520000 CVE-2025-2803,0,0,aea0c457978a84bf5185af25a34152b6f525228f24aa7933021e5368f307da22,2025-03-29T07:15:18.770000 CVE-2025-2804,0,0,920f730e5efd8732e0e5abb52416672a1a115bcae2eab5cbf394b4b15549c65b,2025-03-28T18:11:40.180000 -CVE-2025-28087,0,0,a083116acf70a088348013bdd27f52f04c87f16d9dd7398d42c6f7120e98d2af,2025-03-28T22:15:17.717000 -CVE-2025-28089,0,0,55f44d2427798bd3e256ca55bca62ba0a32c851325aedfb0df89721b1e121c5f,2025-03-28T22:15:17.847000 -CVE-2025-28090,0,0,6f9f220ae0185a93de530a112ef6866e689dfdcdd268a4483e27c677f80b8df8,2025-03-28T22:15:17.980000 -CVE-2025-28091,0,0,e9eb73da16a1e1ebd7ccc9c4de8f5a66b42f4596b5cfb86129d2dfa324680177,2025-03-28T22:15:18.107000 -CVE-2025-28092,0,0,67281ba6ae9fe6b82cabba74a4b589f6e13899072cae60ba58e4096063bd9fce,2025-03-28T22:15:18.237000 -CVE-2025-28093,0,0,0f75d6032cdd86e0fdfd7eb67c7196f1d5298411cf0156c82964fa444bc3986c,2025-03-28T22:15:18.410000 -CVE-2025-28094,0,1,ca6bedfa8e464efc37dc706e258708723d2ac1c1298ac529e150b4cdda83f083,2025-03-31T18:15:33.010000 +CVE-2025-28087,0,1,99ff68793ff561c53991516e6858da6f9fb2ba20569700be50a56f72c6c94e8c,2025-03-31T21:15:52.970000 +CVE-2025-28089,0,1,18f3d3abab164a0919170c1bf1ca2024f9a0c6def48cc9e42a79859b62355583,2025-03-31T21:15:53.133000 +CVE-2025-28090,0,1,460ab53b1e36837aca74081864b1733eb6fef90892f911c9f9bf809cb11369a5,2025-03-31T20:15:14.967000 +CVE-2025-28091,0,1,733d641f537c0daa2763e825a3541d600d1b34d5d840a65ee2cce378da0172de,2025-03-31T21:15:53.287000 +CVE-2025-28092,0,1,ce2fc65993a7770d015575705c8546f2b5d9b1a3206d36ccd201861e6650a0b0,2025-03-31T20:15:15.203000 +CVE-2025-28093,0,1,0db5efaab21895470fe1bf42a856b01d320239c4d837e7ccab2e9e129e18f465,2025-03-31T20:15:15.363000 +CVE-2025-28094,0,0,ca6bedfa8e464efc37dc706e258708723d2ac1c1298ac529e150b4cdda83f083,2025-03-31T18:15:33.010000 CVE-2025-28096,0,0,16d024745a7aef83121952f4fe39c64486ee7ed76aa52fcde001a2a6410e237e,2025-03-31T17:15:40.403000 CVE-2025-28097,0,0,7b978a840b839efdbb92782b35164535e64ad57d5c7c1ac6787e57af8db77906,2025-03-28T22:15:18.827000 CVE-2025-28135,0,0,ce5da46c9ae66e075cac4fbd39873077e479e00a68bacb4de079df96e23d166b,2025-03-28T17:15:28.550000 @@ -286994,7 +287004,7 @@ CVE-2025-2990,0,0,9e58b2fa7f0db839eeed13ac974d5dc271117bb2e9ce130153ef40d31c37cc CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000 CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000 CVE-2025-29907,0,0,630761e684cdf47ad290db608dea22d61cb6820178858ded042fbee7359f058b,2025-03-18T19:15:51.197000 -CVE-2025-29908,1,1,0d1c357cefb5d4d044e0ce372f570977795acdddd7899e18a82b0735522a38bd,2025-03-31T19:15:40.367000 +CVE-2025-29908,0,0,0d1c357cefb5d4d044e0ce372f570977795acdddd7899e18a82b0735522a38bd,2025-03-31T19:15:40.367000 CVE-2025-29909,0,0,63c6e761924bf096ec7d819f389c28c4b1d7a8c4b34a3508047a025be39f7788,2025-03-18T14:15:43.803000 CVE-2025-2991,0,0,cf6d69e7615143d5a585d26b547b3530c6beb880a98c9a55d6170ec976c1b8f2,2025-03-31T11:15:39.160000 CVE-2025-29910,0,0,17418d93c360088fb66ebccca58b51ead2474e70341b6b176cd0d5acb2eed2d6,2025-03-18T14:15:43.913000 @@ -287032,25 +287042,27 @@ CVE-2025-30004,0,0,1364d107bb6c7f41c95a057bca66f2aa1afe5de34c484fea06ad70bb85a67 CVE-2025-30005,0,0,16505715170d88cde58145933126fb581063c9cbd194515fa6e178a97b7eb38f,2025-03-31T17:15:41.880000 CVE-2025-30006,0,0,94dbaa3c46ffedfc3603ead204fb6ce24795883ef875e52a66e81cb24e1573ed,2025-03-31T17:15:42.020000 CVE-2025-3001,0,0,6783170e18f794e5e0220e82172d0170aca6943d1ee9cf4188f46e9839779a5a,2025-03-31T16:15:27.277000 -CVE-2025-3002,0,1,31254f82336e62811d3675fbc17d806beda70782dc6467cfa7c14849ff699d05,2025-03-31T19:15:43.390000 +CVE-2025-3002,0,0,31254f82336e62811d3675fbc17d806beda70782dc6467cfa7c14849ff699d05,2025-03-31T19:15:43.390000 CVE-2025-30022,0,0,c29865dc2c1c53a7dddbda80ab65c0b183de989ceaa003da3dfe172b934c1c01,2025-03-19T19:15:50.703000 CVE-2025-3003,0,0,fae928727d58bdd1e791ffc9c9e860a745865a854a222942833fd71e698ef09d,2025-03-31T17:15:43.557000 -CVE-2025-3004,0,1,1b1a33d3221a15bb48ac0f67bb6e59953f99b6c918e266711e7564b830656b2f,2025-03-31T19:15:43.613000 -CVE-2025-3005,1,1,e8d18a39da8bec5bfe9835be84291d8cf2a7d3c6835d8a510fc7c4892e6b278a,2025-03-31T18:15:34.180000 -CVE-2025-3006,1,1,2d33ee538d0bbe357b92b9a59900f1f8aa3ec564493ed3f392da23820ed4350b,2025-03-31T18:15:34.413000 +CVE-2025-3004,0,0,1b1a33d3221a15bb48ac0f67bb6e59953f99b6c918e266711e7564b830656b2f,2025-03-31T19:15:43.613000 +CVE-2025-3005,0,0,e8d18a39da8bec5bfe9835be84291d8cf2a7d3c6835d8a510fc7c4892e6b278a,2025-03-31T18:15:34.180000 +CVE-2025-3006,0,0,2d33ee538d0bbe357b92b9a59900f1f8aa3ec564493ed3f392da23820ed4350b,2025-03-31T18:15:34.413000 CVE-2025-30066,0,0,7f23398934e792b1c90dbe88228c40d734b32c51332b192223c783ade90f06e4,2025-03-29T01:00:02.337000 CVE-2025-30067,0,0,63d999ebc0b33c0cceea6e046469ec2f368e6f60354a2b2a24d59bf06e6b7bef,2025-03-27T18:17:36.267000 -CVE-2025-3007,1,1,600ae9144fe6b576066fa764c55adc3b9ad15d8bf179e66f0114aa1fe8496eb3,2025-03-31T19:15:43.860000 +CVE-2025-3007,0,0,600ae9144fe6b576066fa764c55adc3b9ad15d8bf179e66f0114aa1fe8496eb3,2025-03-31T19:15:43.860000 CVE-2025-30073,0,0,34725e2ee66a680252fcf6be47611a992f4a93cad025a76602eb6cbba6a5215b,2025-03-27T16:45:27.850000 CVE-2025-30074,0,0,c994f8833240724dd3b207dc3daf9a3403659cb85de62da850d9ebebe8cf0f27,2025-03-16T03:15:39.117000 CVE-2025-30076,0,0,ae70a6cce406a05e108d38c82fa058b5f2fc46a32f1bafe789b6ecdef84b3c03,2025-03-17T16:15:28.220000 CVE-2025-30077,0,0,3552a491790a6839d39471705d681d0b56a0da48a2daaa633f419312864c12e5,2025-03-17T16:15:28.360000 -CVE-2025-3008,1,1,a039dd199d432daa0649a2bf01f67d9e9353b33e21ee900eb9843641001ac6ea,2025-03-31T19:15:44.060000 +CVE-2025-3008,0,0,a039dd199d432daa0649a2bf01f67d9e9353b33e21ee900eb9843641001ac6ea,2025-03-31T19:15:44.060000 CVE-2025-30089,0,0,94fa5ca45d8355546d9ceb129470f63603acc7f5a96fbd0d387c59c0d7484c0e,2025-03-17T16:15:28.507000 +CVE-2025-3009,1,1,4f85d1e7e08b0ed48fca7ac201b457402e7371fffd1a072fc4da4be6d359b5b1,2025-03-31T20:15:15.850000 CVE-2025-30091,0,0,39538125ede0e29a71cad30eeddad6386506108313b0620cfdbf5d936f5285c5,2025-03-27T16:45:46.410000 CVE-2025-30092,0,0,81be76bd5e4d358e5e497793b136a481ab98791f4e442314445db080e37b822d,2025-03-24T14:15:20.007000 CVE-2025-30093,0,0,655931c237d66508239faf3d38e961694a438293c2ddfd8c753f3093a3e9d18e,2025-03-28T18:11:40.180000 -CVE-2025-30095,0,0,b9f53d0615109fa8a40a64e91748d4558a1f7b46ead0706de16c5ce66b014a08,2025-03-31T15:15:44.843000 +CVE-2025-30095,0,1,961f91ea6e39b3b6dbb8556a6976c468608b0031b978e5f73b127b8f2e65064d,2025-03-31T21:15:53.653000 +CVE-2025-3010,1,1,f723b3e2db26da254387f80fa5fe1ab59324981dd2dd4ccd0c3a29fdf242986b,2025-03-31T20:15:16.023000 CVE-2025-30106,0,0,d0ec2fed531a791fcdb7e275c6cc676f11c96b4c23a970884370a41e87a3b6a0,2025-03-21T17:15:40.227000 CVE-2025-30107,0,0,7ae7d3e2db9a3bcfc7100b14968701083bbe2237ed720df55c99fa3bf4e70491,2025-03-24T22:15:14.450000 CVE-2025-30109,0,0,c697d3ced89db3fb240ff33efe8653842b736020e748d3eead592e6135cb99ac,2025-03-21T17:15:40.447000 @@ -287077,12 +287089,14 @@ CVE-2025-30141,0,0,4828215ddc551f721f9119cc66fd0b6301157a9edecaa8b1bbaf43bada37f CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000 CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000 CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000 -CVE-2025-30149,0,1,c2ba50a8e7fcbfc5cf76c24f8b9200b3aa74b80685d3e0787e18421f001cdd0c,2025-03-31T18:15:33.847000 +CVE-2025-30149,0,0,c2ba50a8e7fcbfc5cf76c24f8b9200b3aa74b80685d3e0787e18421f001cdd0c,2025-03-31T18:15:33.847000 +CVE-2025-3015,1,1,1ec4abe6ca9685caa91be7781559ad04bca71965f78a710b93168620aa3e9844,2025-03-31T21:15:53.757000 CVE-2025-30152,0,0,fb7d8b36a0a9757a199a4cf8f9b4b43b19a772c330ea1d3bb0186654fc6f920c,2025-03-19T16:15:33.313000 CVE-2025-30153,0,0,da47524558affc65b6874f9bef3637406802e7d0a047ff83de555cab022828e8,2025-03-19T16:15:33.607000 CVE-2025-30154,0,0,f4c8f04ec10c8608001f5ee4aec87a1247d8c3c0588d5bdb69da7f038e16b9a7,2025-03-29T01:00:02.337000 CVE-2025-30155,0,0,ce9991316faec2414fb0a11e64d60f00b90c2addae9a6a86c74d235d6c0c7f76,2025-03-31T16:15:25.187000 CVE-2025-30157,0,0,b7d565fa042efeea73d550fb215fb58640989cdcd04813767e503c6d1f6d08fe,2025-03-21T16:15:19.767000 +CVE-2025-3016,1,1,d17e6f6e24307c3e04fedc601a315663d76d400d1c2a3cdfc9509d651d2a7c64,2025-03-31T21:15:53.940000 CVE-2025-30160,0,0,25be472787022894833e0e3357865514f4516e8d537c62073ee43066a681f12b,2025-03-20T19:15:38.383000 CVE-2025-30161,0,0,4ef401440b9ae76c291cb5599321f65dce6026d9a737cbde8025803161077f04,2025-03-31T16:15:25.333000 CVE-2025-30162,0,0,8641e47d280f65cb3bb61486e9cfbaa56cd67a484749372cb3bbdafe7ce809ee,2025-03-27T16:45:46.410000 @@ -287385,12 +287399,14 @@ CVE-2025-31110,0,0,9c1e095e916574b5bad3dc98545645eb35bcfc3a15748b26a91c424286375 CVE-2025-31111,0,0,708ed17ed7ca590b80cc7bf7efff771b88139eb264b9a4c93912c661b895b119,2025-03-27T04:15:29.310000 CVE-2025-31112,0,0,19710893cdeca6b79e6ed61173b8773b8204171d0fa597c5282b3a5c8595c248,2025-03-27T04:15:29.427000 CVE-2025-31113,0,0,e197f9731c7d6bd9e53ba8f025a3a8ac307f507846eecfd137f3c958a7e0d19f,2025-03-27T04:15:29.493000 -CVE-2025-31116,0,1,4dc37202ba5cfc688675486793efbc376cb6720b795658ab674573a1a487e976,2025-03-31T19:15:42.300000 -CVE-2025-31117,0,1,a341ea634906413f5449e7fc5b04d4e7dd1445d72f8402c95d9d9551d604471a,2025-03-31T18:15:33.957000 +CVE-2025-31116,0,0,4dc37202ba5cfc688675486793efbc376cb6720b795658ab674573a1a487e976,2025-03-31T19:15:42.300000 +CVE-2025-31117,0,0,a341ea634906413f5449e7fc5b04d4e7dd1445d72f8402c95d9d9551d604471a,2025-03-31T18:15:33.957000 CVE-2025-31122,0,0,b8c01e9f1f9dbc740fffeb9cedbc00b2fb56d1c193bda8eacfaf89659abfd347,2025-03-31T17:15:42.997000 -CVE-2025-31125,0,1,4f24719a409f1c71fb4356091c2ef8c13936da376c5b3c37899a2aa8d1e00a54,2025-03-31T18:15:34.070000 -CVE-2025-31128,1,1,40d1078ce7b3be9014af04296fe4f0f6918a4957b1af7ce145e0df724a2fbf7e,2025-03-31T19:15:42.883000 -CVE-2025-31129,1,1,afc3d6039e1ba3f50fedc504a1975daea8f0d0c314f23d884355292a999ea830,2025-03-31T19:15:43.023000 +CVE-2025-31123,1,1,a6d1d8d5bdd67a19a035f82d179dbb1c83a1582e59d5b7125fb816b7c2eaa9af,2025-03-31T20:15:15.547000 +CVE-2025-31124,1,1,d866a6df4a48afbef1d9d2b6ed84930ed340ef6c5aaf014355825f2f9a296b29,2025-03-31T20:15:15.707000 +CVE-2025-31125,0,0,4f24719a409f1c71fb4356091c2ef8c13936da376c5b3c37899a2aa8d1e00a54,2025-03-31T18:15:34.070000 +CVE-2025-31128,0,0,40d1078ce7b3be9014af04296fe4f0f6918a4957b1af7ce145e0df724a2fbf7e,2025-03-31T19:15:42.883000 +CVE-2025-31129,0,0,afc3d6039e1ba3f50fedc504a1975daea8f0d0c314f23d884355292a999ea830,2025-03-31T19:15:43.023000 CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000 CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000 CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000