From d8991c148e8c09becc25aff38014c59c1d093206 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 9 Apr 2025 22:03:57 +0000 Subject: [PATCH] Auto-Update: 2025-04-09T22:00:20.581060+00:00 --- CVE-2017/CVE-2017-201xx/CVE-2017-20197.json | 4 +- CVE-2022/CVE-2022-220xx/CVE-2022-22079.json | 12 +- CVE-2022/CVE-2022-220xx/CVE-2022-22088.json | 12 +- CVE-2022/CVE-2022-257xx/CVE-2022-25715.json | 12 +- CVE-2022/CVE-2022-257xx/CVE-2022-25716.json | 12 +- CVE-2022/CVE-2022-257xx/CVE-2022-25717.json | 12 +- CVE-2022/CVE-2022-257xx/CVE-2022-25721.json | 12 +- CVE-2022/CVE-2022-257xx/CVE-2022-25722.json | 12 +- CVE-2022/CVE-2022-257xx/CVE-2022-25725.json | 12 +- CVE-2022/CVE-2022-257xx/CVE-2022-25746.json | 12 +- CVE-2022/CVE-2022-332xx/CVE-2022-33218.json | 12 +- CVE-2022/CVE-2022-332xx/CVE-2022-33219.json | 12 +- CVE-2022/CVE-2022-332xx/CVE-2022-33252.json | 12 +- CVE-2022/CVE-2022-332xx/CVE-2022-33253.json | 12 +- CVE-2022/CVE-2022-332xx/CVE-2022-33266.json | 12 +- CVE-2022/CVE-2022-332xx/CVE-2022-33274.json | 12 +- CVE-2022/CVE-2022-332xx/CVE-2022-33276.json | 12 +- CVE-2022/CVE-2022-33xx/CVE-2022-3343.json | 22 +- CVE-2022/CVE-2022-34xx/CVE-2022-3416.json | 22 +- CVE-2022/CVE-2022-34xx/CVE-2022-3417.json | 22 +- CVE-2022/CVE-2022-405xx/CVE-2022-40520.json | 12 +- CVE-2022/CVE-2022-40xx/CVE-2022-4043.json | 22 +- CVE-2022/CVE-2022-429xx/CVE-2022-42979.json | 32 +- CVE-2022/CVE-2022-43xx/CVE-2022-4301.json | 22 +- CVE-2022/CVE-2022-43xx/CVE-2022-4310.json | 22 +- CVE-2022/CVE-2022-43xx/CVE-2022-4392.json | 22 +- CVE-2022/CVE-2022-441xx/CVE-2022-44149.json | 32 +- CVE-2022/CVE-2022-448xx/CVE-2022-44870.json | 32 +- CVE-2022/CVE-2022-449xx/CVE-2022-44939.json | 32 +- CVE-2022/CVE-2022-44xx/CVE-2022-4497.json | 22 +- CVE-2022/CVE-2022-457xx/CVE-2022-45787.json | 32 +- CVE-2022/CVE-2022-459xx/CVE-2022-45911.json | 32 +- CVE-2022/CVE-2022-459xx/CVE-2022-45913.json | 32 +- CVE-2022/CVE-2022-467xx/CVE-2022-46761.json | 32 +- CVE-2022/CVE-2022-467xx/CVE-2022-46762.json | 32 +- CVE-2022/CVE-2022-467xx/CVE-2022-46769.json | 24 +- CVE-2022/CVE-2022-470xx/CVE-2022-47095.json | 32 +- CVE-2022/CVE-2022-471xx/CVE-2022-47153.json | 12 +- CVE-2022/CVE-2022-475xx/CVE-2022-47523.json | 32 +- CVE-2022/CVE-2022-476xx/CVE-2022-47656.json | 32 +- CVE-2022/CVE-2022-479xx/CVE-2022-47974.json | 32 +- CVE-2022/CVE-2022-479xx/CVE-2022-47975.json | 32 +- CVE-2022/CVE-2022-479xx/CVE-2022-47976.json | 32 +- CVE-2023/CVE-2023-338xx/CVE-2023-33844.json | 4 +- CVE-2023/CVE-2023-401xx/CVE-2023-40159.json | 172 +--- CVE-2023/CVE-2023-402xx/CVE-2023-40223.json | 172 +--- CVE-2023/CVE-2023-405xx/CVE-2023-40539.json | 162 +-- CVE-2023/CVE-2023-407xx/CVE-2023-40704.json | 34 +- CVE-2023/CVE-2023-455xx/CVE-2023-45594.json | 32 +- CVE-2023/CVE-2023-54xx/CVE-2023-5457.json | 12 +- CVE-2024/CVE-2024-125xx/CVE-2024-12556.json | 8 +- CVE-2024/CVE-2024-311xx/CVE-2024-31108.json | 12 +- CVE-2024/CVE-2024-552xx/CVE-2024-55210.json | 21 + CVE-2024/CVE-2024-553xx/CVE-2024-55354.json | 8 +- CVE-2024/CVE-2024-68xx/CVE-2024-6857.json | 33 +- CVE-2024/CVE-2024-68xx/CVE-2024-6860.json | 33 +- CVE-2024/CVE-2024-82xx/CVE-2024-8243.json | 4 +- CVE-2025/CVE-2025-17xx/CVE-2025-1768.json | 82 +- CVE-2025/CVE-2025-19xx/CVE-2025-1968.json | 4 +- CVE-2025/CVE-2025-209xx/CVE-2025-20952.json | 8 +- CVE-2025/CVE-2025-211xx/CVE-2025-21174.json | 8 +- CVE-2025/CVE-2025-211xx/CVE-2025-21191.json | 8 +- CVE-2025/CVE-2025-211xx/CVE-2025-21197.json | 8 +- CVE-2025/CVE-2025-212xx/CVE-2025-21203.json | 8 +- CVE-2025/CVE-2025-212xx/CVE-2025-21204.json | 8 +- CVE-2025/CVE-2025-212xx/CVE-2025-21205.json | 8 +- CVE-2025/CVE-2025-212xx/CVE-2025-21221.json | 8 +- CVE-2025/CVE-2025-212xx/CVE-2025-21222.json | 8 +- CVE-2025/CVE-2025-215xx/CVE-2025-21591.json | 100 ++ CVE-2025/CVE-2025-215xx/CVE-2025-21594.json | 100 ++ CVE-2025/CVE-2025-215xx/CVE-2025-21595.json | 100 ++ CVE-2025/CVE-2025-215xx/CVE-2025-21597.json | 100 ++ CVE-2025/CVE-2025-216xx/CVE-2025-21601.json | 88 ++ CVE-2025/CVE-2025-21xx/CVE-2025-2193.json | 83 +- CVE-2025/CVE-2025-21xx/CVE-2025-2194.json | 85 +- CVE-2025/CVE-2025-21xx/CVE-2025-2195.json | 85 +- CVE-2025/CVE-2025-21xx/CVE-2025-2196.json | 81 +- CVE-2025/CVE-2025-228xx/CVE-2025-22871.json | 8 +- CVE-2025/CVE-2025-22xx/CVE-2025-2222.json | 4 +- CVE-2025/CVE-2025-22xx/CVE-2025-2223.json | 4 +- CVE-2025/CVE-2025-234xx/CVE-2025-23407.json | 8 +- CVE-2025/CVE-2025-240xx/CVE-2025-24058.json | 8 +- CVE-2025/CVE-2025-240xx/CVE-2025-24060.json | 8 +- CVE-2025/CVE-2025-240xx/CVE-2025-24062.json | 8 +- CVE-2025/CVE-2025-240xx/CVE-2025-24073.json | 8 +- CVE-2025/CVE-2025-240xx/CVE-2025-24074.json | 8 +- CVE-2025/CVE-2025-244xx/CVE-2025-24446.json | 8 +- CVE-2025/CVE-2025-244xx/CVE-2025-24447.json | 8 +- CVE-2025/CVE-2025-24xx/CVE-2025-2440.json | 4 +- CVE-2025/CVE-2025-24xx/CVE-2025-2441.json | 4 +- CVE-2025/CVE-2025-24xx/CVE-2025-2442.json | 4 +- CVE-2025/CVE-2025-250xx/CVE-2025-25002.json | 8 +- CVE-2025/CVE-2025-250xx/CVE-2025-25013.json | 8 +- CVE-2025/CVE-2025-250xx/CVE-2025-25023.json | 4 +- CVE-2025/CVE-2025-250xx/CVE-2025-25053.json | 8 +- CVE-2025/CVE-2025-250xx/CVE-2025-25056.json | 8 +- CVE-2025/CVE-2025-252xx/CVE-2025-25213.json | 8 +- CVE-2025/CVE-2025-256xx/CVE-2025-25632.json | 39 +- CVE-2025/CVE-2025-266xx/CVE-2025-26628.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26635.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26637.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26639.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26640.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26641.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26642.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26644.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26647.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26648.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26649.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26651.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26652.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26663.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26664.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26665.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26666.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26667.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26668.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26669.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26670.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26671.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26672.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26673.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26674.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26675.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26676.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26678.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26679.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26680.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26681.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26682.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26686.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26687.json | 8 +- CVE-2025/CVE-2025-266xx/CVE-2025-26688.json | 8 +- CVE-2025/CVE-2025-268xx/CVE-2025-26888.json | 56 ++ CVE-2025/CVE-2025-269xx/CVE-2025-26901.json | 56 ++ CVE-2025/CVE-2025-269xx/CVE-2025-26902.json | 56 ++ CVE-2025/CVE-2025-26xx/CVE-2025-2629.json | 4 +- CVE-2025/CVE-2025-26xx/CVE-2025-2630.json | 4 +- CVE-2025/CVE-2025-26xx/CVE-2025-2631.json | 100 ++ CVE-2025/CVE-2025-26xx/CVE-2025-2632.json | 100 ++ CVE-2025/CVE-2025-271xx/CVE-2025-27182.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27183.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27184.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27185.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27186.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27187.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27188.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27189.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27190.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27191.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27192.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27193.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27194.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27195.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27196.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27198.json | 8 +- CVE-2025/CVE-2025-271xx/CVE-2025-27199.json | 8 +- CVE-2025/CVE-2025-272xx/CVE-2025-27200.json | 8 +- CVE-2025/CVE-2025-272xx/CVE-2025-27201.json | 8 +- CVE-2025/CVE-2025-272xx/CVE-2025-27202.json | 8 +- CVE-2025/CVE-2025-272xx/CVE-2025-27204.json | 8 +- CVE-2025/CVE-2025-272xx/CVE-2025-27205.json | 8 +- CVE-2025/CVE-2025-273xx/CVE-2025-27391.json | 4 +- CVE-2025/CVE-2025-274xx/CVE-2025-27467.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27469.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27470.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27471.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27472.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27473.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27474.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27475.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27476.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27477.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27478.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27479.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27480.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27481.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27482.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27483.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27484.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27485.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27486.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27487.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27489.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27490.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27491.json | 8 +- CVE-2025/CVE-2025-274xx/CVE-2025-27492.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27722.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27727.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27728.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27729.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27730.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27731.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27732.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27733.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27735.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27736.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27737.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27738.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27739.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27740.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27741.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27742.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27743.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27744.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27745.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27746.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27747.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27748.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27749.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27750.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27751.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27752.json | 8 +- CVE-2025/CVE-2025-277xx/CVE-2025-27797.json | 8 +- CVE-2025/CVE-2025-279xx/CVE-2025-27934.json | 8 +- CVE-2025/CVE-2025-27xx/CVE-2025-2786.json | 6 +- CVE-2025/CVE-2025-28xx/CVE-2025-2842.json | 6 +- CVE-2025/CVE-2025-290xx/CVE-2025-29018.json | 21 + CVE-2025/CVE-2025-291xx/CVE-2025-29189.json | 4 +- CVE-2025/CVE-2025-293xx/CVE-2025-29389.json | 4 +- CVE-2025/CVE-2025-293xx/CVE-2025-29390.json | 4 +- CVE-2025/CVE-2025-293xx/CVE-2025-29391.json | 4 +- CVE-2025/CVE-2025-293xx/CVE-2025-29394.json | 4 +- CVE-2025/CVE-2025-297xx/CVE-2025-29791.json | 8 +- CVE-2025/CVE-2025-297xx/CVE-2025-29792.json | 8 +- CVE-2025/CVE-2025-297xx/CVE-2025-29793.json | 8 +- CVE-2025/CVE-2025-297xx/CVE-2025-29794.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29800.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29801.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29802.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29804.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29805.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29808.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29809.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29810.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29811.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29812.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29816.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29819.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29820.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29821.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29822.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29823.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29824.json | 8 +- CVE-2025/CVE-2025-298xx/CVE-2025-29870.json | 8 +- CVE-2025/CVE-2025-299xx/CVE-2025-29988.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30281.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30282.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30284.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30285.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30286.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30287.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30288.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30289.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30290.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30291.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30292.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30293.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30294.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30295.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30296.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30297.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30298.json | 8 +- CVE-2025/CVE-2025-302xx/CVE-2025-30299.json | 8 +- CVE-2025/CVE-2025-303xx/CVE-2025-30300.json | 8 +- CVE-2025/CVE-2025-303xx/CVE-2025-30301.json | 8 +- CVE-2025/CVE-2025-303xx/CVE-2025-30302.json | 8 +- CVE-2025/CVE-2025-303xx/CVE-2025-30303.json | 8 +- CVE-2025/CVE-2025-303xx/CVE-2025-30304.json | 8 +- CVE-2025/CVE-2025-303xx/CVE-2025-30305.json | 8 +- CVE-2025/CVE-2025-303xx/CVE-2025-30306.json | 8 +- CVE-2025/CVE-2025-303xx/CVE-2025-30307.json | 8 +- CVE-2025/CVE-2025-303xx/CVE-2025-30308.json | 8 +- CVE-2025/CVE-2025-303xx/CVE-2025-30309.json | 8 +- CVE-2025/CVE-2025-306xx/CVE-2025-30644.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30645.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30646.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30647.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30648.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30649.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30651.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30652.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30653.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30654.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30655.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30656.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30657.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30658.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30659.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30660.json | 100 ++ CVE-2025/CVE-2025-306xx/CVE-2025-30677.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31002.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31003.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31004.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31005.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31008.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31009.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31012.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31017.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31020.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31023.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31026.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31032.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31033.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31034.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31035.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31036.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31038.json | 4 +- CVE-2025/CVE-2025-310xx/CVE-2025-31042.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31375.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31377.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31382.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31383.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31385.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31388.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31390.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31391.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31392.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31393.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31394.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31395.json | 4 +- CVE-2025/CVE-2025-313xx/CVE-2025-31399.json | 4 +- CVE-2025/CVE-2025-314xx/CVE-2025-31400.json | 4 +- CVE-2025/CVE-2025-314xx/CVE-2025-31401.json | 4 +- CVE-2025/CVE-2025-314xx/CVE-2025-31402.json | 4 +- CVE-2025/CVE-2025-314xx/CVE-2025-31404.json | 4 +- CVE-2025/CVE-2025-316xx/CVE-2025-31672.json | 4 +- CVE-2025/CVE-2025-31xx/CVE-2025-3100.json | 8 +- CVE-2025/CVE-2025-31xx/CVE-2025-3114.json | 4 +- CVE-2025/CVE-2025-31xx/CVE-2025-3115.json | 4 +- CVE-2025/CVE-2025-31xx/CVE-2025-3119.json | 86 +- CVE-2025/CVE-2025-31xx/CVE-2025-3131.json | 4 +- CVE-2025/CVE-2025-31xx/CVE-2025-3137.json | 88 +- CVE-2025/CVE-2025-31xx/CVE-2025-3138.json | 86 +- CVE-2025/CVE-2025-31xx/CVE-2025-3140.json | 86 +- CVE-2025/CVE-2025-31xx/CVE-2025-3141.json | 86 +- CVE-2025/CVE-2025-320xx/CVE-2025-32016.json | 4 +- CVE-2025/CVE-2025-320xx/CVE-2025-32035.json | 8 +- CVE-2025/CVE-2025-320xx/CVE-2025-32036.json | 8 +- CVE-2025/CVE-2025-323xx/CVE-2025-32371.json | 4 +- CVE-2025/CVE-2025-323xx/CVE-2025-32372.json | 4 +- CVE-2025/CVE-2025-323xx/CVE-2025-32373.json | 4 +- CVE-2025/CVE-2025-323xx/CVE-2025-32374.json | 4 +- CVE-2025/CVE-2025-323xx/CVE-2025-32375.json | 4 +- CVE-2025/CVE-2025-323xx/CVE-2025-32378.json | 4 +- CVE-2025/CVE-2025-323xx/CVE-2025-32379.json | 4 +- CVE-2025/CVE-2025-323xx/CVE-2025-32380.json | 4 +- CVE-2025/CVE-2025-323xx/CVE-2025-32381.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32460.json | 8 +- CVE-2025/CVE-2025-324xx/CVE-2025-32461.json | 8 +- CVE-2025/CVE-2025-324xx/CVE-2025-32464.json | 8 +- CVE-2025/CVE-2025-324xx/CVE-2025-32476.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32477.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32478.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32479.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32480.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32481.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32482.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32483.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32484.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32485.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32487.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32488.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32489.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32492.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32493.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32494.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32495.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32496.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32497.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32498.json | 4 +- CVE-2025/CVE-2025-324xx/CVE-2025-32499.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32500.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32501.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32502.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32503.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32505.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32518.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32543.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32547.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32550.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32555.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32556.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32559.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32563.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32570.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32575.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32576.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32580.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32581.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32584.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32591.json | 4 +- CVE-2025/CVE-2025-325xx/CVE-2025-32597.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32610.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32612.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32616.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32617.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32619.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32621.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32623.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32624.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32640.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32641.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32642.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32644.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32645.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32659.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32661.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32664.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32667.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32669.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32673.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32675.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32676.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32677.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32678.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32679.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32680.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32683.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32684.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32685.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32690.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32691.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32692.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32693.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32694.json | 4 +- CVE-2025/CVE-2025-326xx/CVE-2025-32695.json | 4 +- CVE-2025/CVE-2025-34xx/CVE-2025-3416.json | 8 +- CVE-2025/CVE-2025-34xx/CVE-2025-3442.json | 8 +- CVE-2025/CVE-2025-34xx/CVE-2025-3474.json | 4 +- CVE-2025/CVE-2025-34xx/CVE-2025-3475.json | 4 +- README.md | 92 +- _state.csv | 1004 ++++++++++--------- 433 files changed, 6327 insertions(+), 1852 deletions(-) create mode 100644 CVE-2024/CVE-2024-552xx/CVE-2024-55210.json create mode 100644 CVE-2025/CVE-2025-215xx/CVE-2025-21591.json create mode 100644 CVE-2025/CVE-2025-215xx/CVE-2025-21594.json create mode 100644 CVE-2025/CVE-2025-215xx/CVE-2025-21595.json create mode 100644 CVE-2025/CVE-2025-215xx/CVE-2025-21597.json create mode 100644 CVE-2025/CVE-2025-216xx/CVE-2025-21601.json create mode 100644 CVE-2025/CVE-2025-268xx/CVE-2025-26888.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26901.json create mode 100644 CVE-2025/CVE-2025-269xx/CVE-2025-26902.json create mode 100644 CVE-2025/CVE-2025-26xx/CVE-2025-2631.json create mode 100644 CVE-2025/CVE-2025-26xx/CVE-2025-2632.json create mode 100644 CVE-2025/CVE-2025-290xx/CVE-2025-29018.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30644.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30645.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30646.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30647.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30648.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30649.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30651.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30652.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30653.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30654.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30655.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30656.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30657.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30658.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30659.json create mode 100644 CVE-2025/CVE-2025-306xx/CVE-2025-30660.json diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20197.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20197.json index 0b21444c84f..cdd8cf8ca50 100644 --- a/CVE-2017/CVE-2017-201xx/CVE-2017-20197.json +++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20197.json @@ -2,8 +2,8 @@ "id": "CVE-2017-20197", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-09T11:15:40.433", - "lastModified": "2025-04-09T11:15:40.433", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22079.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22079.json index 26a9fb2bf70..aa68c688b6b 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22079.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22079.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22079", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.053", - "lastModified": "2024-11-21T06:46:05.893", + "lastModified": "2025-04-09T20:15:17.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-220xx/CVE-2022-22088.json b/CVE-2022/CVE-2022-220xx/CVE-2022-22088.json index 27aec0fa747..a4aed8f85b4 100644 --- a/CVE-2022/CVE-2022-220xx/CVE-2022-22088.json +++ b/CVE-2022/CVE-2022-220xx/CVE-2022-22088.json @@ -2,7 +2,7 @@ "id": "CVE-2022-22088", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.143", - "lastModified": "2024-11-21T06:46:08.933", + "lastModified": "2025-04-09T20:15:18.523", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25715.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25715.json index 47b77bc09ba..6de29010799 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25715.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25715.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25715", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.290", - "lastModified": "2024-11-21T06:52:47.767", + "lastModified": "2025-04-09T20:15:18.887", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-704" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-704" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25716.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25716.json index 5256d5c56aa..2c7c1357e7d 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25716.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25716.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25716", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.367", - "lastModified": "2024-11-21T06:52:47.973", + "lastModified": "2025-04-09T20:15:19.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25717.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25717.json index 34af61f0cd2..bd37dbe629d 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25717.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25717.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25717", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.443", - "lastModified": "2024-11-21T06:52:48.150", + "lastModified": "2025-04-09T20:15:19.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-415" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25721.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25721.json index 0c2dd6ed034..c214441e092 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25721.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25721.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25721", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.527", - "lastModified": "2024-11-21T06:52:49.237", + "lastModified": "2025-04-09T21:15:41.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25722.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25722.json index a424e9f651b..0ceb0a5e176 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25722.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25722.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25722", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.597", - "lastModified": "2024-11-21T06:52:49.407", + "lastModified": "2025-04-09T21:15:41.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25725.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25725.json index 6ed8d90437b..43c303b1cf9 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25725.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25725.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25725", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.667", - "lastModified": "2024-11-21T06:52:50.043", + "lastModified": "2025-04-09T21:15:41.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-763" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-763" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25746.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25746.json index 9697f85d4ad..44cc011c3a6 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25746.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25746.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25746", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.730", - "lastModified": "2024-11-21T06:52:54.150", + "lastModified": "2025-04-09T20:15:19.507", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33218.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33218.json index d145c1db4a7..44efb0a1f56 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33218.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33218.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33218", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.807", - "lastModified": "2024-11-21T07:07:45.090", + "lastModified": "2025-04-09T20:15:19.797", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33219.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33219.json index 02eac87b57b..c44d44eb110 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33219.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33219.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33219", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.877", - "lastModified": "2024-11-21T07:07:45.253", + "lastModified": "2025-04-09T20:15:20.273", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33252.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33252.json index e4eef6fe817..475f77b7378 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33252.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33252.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33252", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:11.947", - "lastModified": "2024-11-21T07:07:54.060", + "lastModified": "2025-04-09T20:15:20.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33253.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33253.json index 5995b49a9e8..bdbad8b144d 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33253.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33253.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33253", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:12.023", - "lastModified": "2024-11-21T07:07:54.360", + "lastModified": "2025-04-09T20:15:20.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33266.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33266.json index 03d251f91a8..cc94ca1f312 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33266.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33266.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33266", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:12.230", - "lastModified": "2024-11-21T07:07:57.137", + "lastModified": "2025-04-09T20:15:21.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33274.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33274.json index 2f61e184e91..3c6cf93bc7c 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33274.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33274.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33274", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:12.293", - "lastModified": "2024-11-21T07:07:59.323", + "lastModified": "2025-04-09T20:15:21.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-129" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33276.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33276.json index 74e8c7adb38..0e4f9c47b02 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33276.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33276.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33276", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:12.360", - "lastModified": "2024-11-21T07:07:59.943", + "lastModified": "2025-04-09T20:15:21.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-33xx/CVE-2022-3343.json b/CVE-2022/CVE-2022-33xx/CVE-2022-3343.json index b92d838ef8a..9a9279ea300 100644 --- a/CVE-2022/CVE-2022-33xx/CVE-2022-3343.json +++ b/CVE-2022/CVE-2022-33xx/CVE-2022-3343.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3343", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-09T23:15:26.593", - "lastModified": "2024-11-21T07:19:20.230", + "lastModified": "2025-04-09T20:15:21.827", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3416.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3416.json index baa07c39c3c..c9e4d456624 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3416.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3416.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3416", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-09T23:15:26.677", - "lastModified": "2024-11-21T07:19:28.253", + "lastModified": "2025-04-09T20:15:22.013", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3417.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3417.json index 9561ca4fa54..f059d95e745 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3417.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3417.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3417", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-09T23:15:26.760", - "lastModified": "2024-11-21T07:19:28.367", + "lastModified": "2025-04-09T20:15:22.223", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40520.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40520.json index 92d893a1e28..62c847fb121 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40520.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40520.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40520", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-01-09T08:15:13.230", - "lastModified": "2024-11-21T07:21:34.190", + "lastModified": "2025-04-09T20:15:22.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4043.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4043.json index 8e8ed05623d..fa7258d241a 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4043.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4043.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4043", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-09T23:15:27.143", - "lastModified": "2024-11-21T07:34:30.020", + "lastModified": "2025-04-09T20:15:23.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42979.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42979.json index f94703888db..8ae4316dd84 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42979.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42979.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42979", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-06T04:15:07.977", - "lastModified": "2024-11-21T07:25:43.917", + "lastModified": "2025-04-09T21:15:41.887", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4301.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4301.json index f7d45df32a9..1ca9ab1d146 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4301.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4301.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4301", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-09T23:15:27.497", - "lastModified": "2024-11-21T07:34:58.317", + "lastModified": "2025-04-09T20:15:23.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4310.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4310.json index 428d0a2c5f7..03db407fcae 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4310.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4310.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4310", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-09T23:15:27.573", - "lastModified": "2024-11-21T07:34:59.600", + "lastModified": "2025-04-09T20:15:24.037", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4392.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4392.json index 54b51efb818..5cf204dabd4 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4392.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4392.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4392", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-09T23:15:27.953", - "lastModified": "2024-11-21T07:35:11.077", + "lastModified": "2025-04-09T20:15:24.207", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-441xx/CVE-2022-44149.json b/CVE-2022/CVE-2022-441xx/CVE-2022-44149.json index 19267c0648b..28c106c695d 100644 --- a/CVE-2022/CVE-2022-441xx/CVE-2022-44149.json +++ b/CVE-2022/CVE-2022-441xx/CVE-2022-44149.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44149", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-06T17:15:09.363", - "lastModified": "2024-11-21T07:27:39.617", + "lastModified": "2025-04-09T21:15:42.097", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-448xx/CVE-2022-44870.json b/CVE-2022/CVE-2022-448xx/CVE-2022-44870.json index 20a07c12663..4f058336201 100644 --- a/CVE-2022/CVE-2022-448xx/CVE-2022-44870.json +++ b/CVE-2022/CVE-2022-448xx/CVE-2022-44870.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44870", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-06T03:15:08.143", - "lastModified": "2024-11-21T07:28:30.813", + "lastModified": "2025-04-09T21:15:42.323", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-449xx/CVE-2022-44939.json b/CVE-2022/CVE-2022-449xx/CVE-2022-44939.json index cfb15875a84..ca7b80a9237 100644 --- a/CVE-2022/CVE-2022-449xx/CVE-2022-44939.json +++ b/CVE-2022/CVE-2022-449xx/CVE-2022-44939.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44939", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-06T22:15:09.483", - "lastModified": "2024-11-21T07:28:33.073", + "lastModified": "2025-04-09T21:15:42.533", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4497.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4497.json index e14ca01bc3d..c7dbb7185d1 100644 --- a/CVE-2022/CVE-2022-44xx/CVE-2022-4497.json +++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4497.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4497", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-09T23:15:28.537", - "lastModified": "2024-11-21T07:35:22.937", + "lastModified": "2025-04-09T20:15:24.373", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-457xx/CVE-2022-45787.json b/CVE-2022/CVE-2022-457xx/CVE-2022-45787.json index 299342c4b84..6e183d7a109 100644 --- a/CVE-2022/CVE-2022-457xx/CVE-2022-45787.json +++ b/CVE-2022/CVE-2022-457xx/CVE-2022-45787.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45787", "sourceIdentifier": "security@apache.org", "published": "2023-01-06T10:15:10.383", - "lastModified": "2024-11-21T07:29:42.970", + "lastModified": "2025-04-09T20:15:22.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -59,6 +79,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45911.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45911.json index 5ae1958f6ce..60cf0334573 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45911.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45911.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45911", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-06T23:15:09.673", - "lastModified": "2024-11-21T07:29:56.003", + "lastModified": "2025-04-09T21:15:42.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-459xx/CVE-2022-45913.json b/CVE-2022/CVE-2022-459xx/CVE-2022-45913.json index 15011dbe876..9ff48af1210 100644 --- a/CVE-2022/CVE-2022-459xx/CVE-2022-45913.json +++ b/CVE-2022/CVE-2022-459xx/CVE-2022-45913.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45913", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-06T23:15:09.743", - "lastModified": "2024-11-21T07:29:56.383", + "lastModified": "2025-04-09T21:15:43.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46761.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46761.json index 8b8c9d29234..91ca635b556 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46761.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46761.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46761", "sourceIdentifier": "psirt@huawei.com", "published": "2023-01-06T20:15:09.707", - "lastModified": "2024-11-21T07:31:00.893", + "lastModified": "2025-04-09T21:15:43.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46762.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46762.json index 90f70d6fca9..70b781ade8d 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46762.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46762.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46762", "sourceIdentifier": "psirt@huawei.com", "published": "2023-01-06T20:15:09.773", - "lastModified": "2024-11-21T07:31:01.003", + "lastModified": "2025-04-09T21:15:43.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46769.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46769.json index 3348ca5e0eb..4b57de1016d 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46769.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46769.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46769", "sourceIdentifier": "security@apache.org", "published": "2023-01-09T11:15:10.700", - "lastModified": "2024-11-21T07:31:01.557", + "lastModified": "2025-04-09T20:15:22.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47095.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47095.json index 7cc3d2b620c..1aa9ea5af2d 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47095.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47095.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47095", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T15:15:10.927", - "lastModified": "2024-11-21T07:31:30.073", + "lastModified": "2025-04-09T21:15:43.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47153.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47153.json index 06ac1331767..d2397bba039 100644 --- a/CVE-2022/CVE-2022-471xx/CVE-2022-47153.json +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47153.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47153", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T14:15:08.167", - "lastModified": "2025-03-21T12:09:23.140", + "lastModified": "2025-04-09T20:40:28.720", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-475xx/CVE-2022-47523.json b/CVE-2022/CVE-2022-475xx/CVE-2022-47523.json index 4f2954b4357..f3162c329b3 100644 --- a/CVE-2022/CVE-2022-475xx/CVE-2022-47523.json +++ b/CVE-2022/CVE-2022-475xx/CVE-2022-47523.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47523", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T08:15:08.877", - "lastModified": "2024-11-21T07:32:08.650", + "lastModified": "2025-04-09T21:15:43.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47656.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47656.json index 7372cb5168a..59d96028e3b 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47656.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47656.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47656", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T16:15:10.020", - "lastModified": "2024-11-21T07:32:19.077", + "lastModified": "2025-04-09T21:15:44.070", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47974.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47974.json index 814010c2fc4..d7ebae9e781 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47974.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47974.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47974", "sourceIdentifier": "psirt@huawei.com", "published": "2023-01-06T20:15:09.830", - "lastModified": "2024-11-21T07:32:39.230", + "lastModified": "2025-04-09T20:15:23.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47975.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47975.json index 1fe500ca4b2..44f2f8b453d 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47975.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47975.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47975", "sourceIdentifier": "psirt@huawei.com", "published": "2023-01-06T20:15:09.880", - "lastModified": "2024-11-21T07:32:39.400", + "lastModified": "2025-04-09T20:15:23.343", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-415" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47976.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47976.json index f0326fdc159..70bd13e1f4f 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47976.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47976.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47976", "sourceIdentifier": "psirt@huawei.com", "published": "2023-01-06T20:15:09.937", - "lastModified": "2024-11-21T07:32:39.573", + "lastModified": "2025-04-09T20:15:23.523", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33844.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33844.json index 26419ac4709..cd0f9068cee 100644 --- a/CVE-2023/CVE-2023-338xx/CVE-2023-33844.json +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33844.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33844", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-04-09T14:15:27.527", - "lastModified": "2025-04-09T14:15:27.527", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40159.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40159.json index 1f819c876f0..29a611791f0 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40159.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40159.json @@ -2,177 +2,15 @@ "id": "CVE-2023-40159", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-18T17:15:02.787", - "lastModified": "2024-11-21T08:18:53.850", - "vulnStatus": "Modified", + "lastModified": "2025-04-09T21:15:45.100", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A validated user not explicitly authorized to have access to certain sensitive information could access Philips Vue PACS on the same network to expose that information." - }, - { - "lang": "es", - "value": "Un usuario validado que no est\u00e9 autorizado expl\u00edcitamente para tener acceso a cierta informaci\u00f3n confidencial podr\u00eda acceder a Philips Vue PACS en la misma red para exponer esa informaci\u00f3n." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV40": [ - { - "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", - "cvssData": { - "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 8.8, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "attackRequirements": "NONE", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "vulnConfidentialityImpact": "LOW", - "vulnIntegrityImpact": "HIGH", - "vulnAvailabilityImpact": "NONE", - "subConfidentialityImpact": "NONE", - "subIntegrityImpact": "NONE", - "subAvailabilityImpact": "NONE", - "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirement": "NOT_DEFINED", - "integrityRequirement": "NOT_DEFINED", - "availabilityRequirement": "NOT_DEFINED", - "modifiedAttackVector": "NOT_DEFINED", - "modifiedAttackComplexity": "NOT_DEFINED", - "modifiedAttackRequirements": "NOT_DEFINED", - "modifiedPrivilegesRequired": "NOT_DEFINED", - "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnConfidentialityImpact": "NOT_DEFINED", - "modifiedVulnIntegrityImpact": "NOT_DEFINED", - "modifiedVulnAvailabilityImpact": "NOT_DEFINED", - "modifiedSubConfidentialityImpact": "NOT_DEFINED", - "modifiedSubIntegrityImpact": "NOT_DEFINED", - "modifiedSubAvailabilityImpact": "NOT_DEFINED", - "Safety": "NOT_DEFINED", - "Automatable": "NOT_DEFINED", - "Recovery": "NOT_DEFINED", - "valueDensity": "NOT_DEFINED", - "vulnerabilityResponseEffort": "NOT_DEFINED", - "providerUrgency": "NOT_DEFINED" - } - } - ], - "cvssMetricV31": [ - { - "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", - "baseScore": 8.2, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "HIGH", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 3.9, - "impactScore": 4.2 - }, - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", - "baseScore": 6.5, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-200" - } - ] - }, - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "NVD-CWE-noinfo" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*", - "versionEndExcluding": "12.2.8.410", - "matchCriteriaId": "E3D16037-0684-4486-80A7-8EE98DD4E851" - } - ] - } - ] - } - ], - "references": [ - { - "url": "http://www.philips.com/productsecurity", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "Product" - ] - }, - { - "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] - }, - { - "url": "http://www.philips.com/productsecurity", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Product" - ] - }, - { - "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40223.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40223.json index 76038a410ba..96d8fb26702 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40223.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40223.json @@ -2,177 +2,15 @@ "id": "CVE-2023-40223", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-18T17:15:03.173", - "lastModified": "2024-11-21T08:19:02.073", - "vulnStatus": "Modified", + "lastModified": "2025-04-09T21:16:06.380", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Philips Vue PACS does not properly assign, modify, track, or check actor privileges, creating an unintended sphere of control for that actor." - }, - { - "lang": "es", - "value": "Philips Vue PACS no asigna, modifica, rastrea ni verifica adecuadamente los privilegios de los actores, lo que crea una esfera de control no deseada para ese actor." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV40": [ - { - "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", - "cvssData": { - "version": "4.0", - "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 4.8, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "attackRequirements": "NONE", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "vulnConfidentialityImpact": "LOW", - "vulnIntegrityImpact": "LOW", - "vulnAvailabilityImpact": "NONE", - "subConfidentialityImpact": "NONE", - "subIntegrityImpact": "NONE", - "subAvailabilityImpact": "NONE", - "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirement": "NOT_DEFINED", - "integrityRequirement": "NOT_DEFINED", - "availabilityRequirement": "NOT_DEFINED", - "modifiedAttackVector": "NOT_DEFINED", - "modifiedAttackComplexity": "NOT_DEFINED", - "modifiedAttackRequirements": "NOT_DEFINED", - "modifiedPrivilegesRequired": "NOT_DEFINED", - "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnConfidentialityImpact": "NOT_DEFINED", - "modifiedVulnIntegrityImpact": "NOT_DEFINED", - "modifiedVulnAvailabilityImpact": "NOT_DEFINED", - "modifiedSubConfidentialityImpact": "NOT_DEFINED", - "modifiedSubIntegrityImpact": "NOT_DEFINED", - "modifiedSubAvailabilityImpact": "NOT_DEFINED", - "Safety": "NOT_DEFINED", - "Automatable": "NOT_DEFINED", - "Recovery": "NOT_DEFINED", - "valueDensity": "NOT_DEFINED", - "vulnerabilityResponseEffort": "NOT_DEFINED", - "providerUrgency": "NOT_DEFINED" - } - } - ], - "cvssMetricV31": [ - { - "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", - "baseScore": 4.4, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.8, - "impactScore": 2.5 - }, - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 8.8, - "baseSeverity": "HIGH", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 2.8, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-269" - } - ] - }, - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "NVD-CWE-noinfo" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*", - "versionEndExcluding": "12.2.8.410", - "matchCriteriaId": "E3D16037-0684-4486-80A7-8EE98DD4E851" - } - ] - } - ] - } - ], - "references": [ - { - "url": "http://www.philips.com/productsecurity", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "Product" - ] - }, - { - "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] - }, - { - "url": "http://www.philips.com/productsecurity", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Product" - ] - }, - { - "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40539.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40539.json index 69fd0629c1b..f447e5327d2 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40539.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40539.json @@ -2,167 +2,15 @@ "id": "CVE-2023-40539", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-18T17:15:03.553", - "lastModified": "2024-11-21T08:19:40.533", - "vulnStatus": "Modified", + "lastModified": "2025-04-09T21:16:15.920", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Philips Vue PACS does not require that users have strong passwords, which could make it easier for attackers to compromise user accounts." - }, - { - "lang": "es", - "value": "Philips Vue PACS no requiere que los usuarios tengan contrase\u00f1as seguras, lo que podr\u00eda facilitar que los atacantes comprometan las cuentas de los usuarios." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV40": [ - { - "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", - "cvssData": { - "version": "4.0", - "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 4.8, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "attackRequirements": "NONE", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "vulnConfidentialityImpact": "LOW", - "vulnIntegrityImpact": "LOW", - "vulnAvailabilityImpact": "NONE", - "subConfidentialityImpact": "NONE", - "subIntegrityImpact": "NONE", - "subAvailabilityImpact": "NONE", - "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirement": "NOT_DEFINED", - "integrityRequirement": "NOT_DEFINED", - "availabilityRequirement": "NOT_DEFINED", - "modifiedAttackVector": "NOT_DEFINED", - "modifiedAttackComplexity": "NOT_DEFINED", - "modifiedAttackRequirements": "NOT_DEFINED", - "modifiedPrivilegesRequired": "NOT_DEFINED", - "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnConfidentialityImpact": "NOT_DEFINED", - "modifiedVulnIntegrityImpact": "NOT_DEFINED", - "modifiedVulnAvailabilityImpact": "NOT_DEFINED", - "modifiedSubConfidentialityImpact": "NOT_DEFINED", - "modifiedSubIntegrityImpact": "NOT_DEFINED", - "modifiedSubAvailabilityImpact": "NOT_DEFINED", - "Safety": "NOT_DEFINED", - "Automatable": "NOT_DEFINED", - "Recovery": "NOT_DEFINED", - "valueDensity": "NOT_DEFINED", - "vulnerabilityResponseEffort": "NOT_DEFINED", - "providerUrgency": "NOT_DEFINED" - } - } - ], - "cvssMetricV31": [ - { - "source": "ics-cert@hq.dhs.gov", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", - "baseScore": 4.4, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 1.8, - "impactScore": 2.5 - }, - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", - "baseScore": 5.9, - "baseSeverity": "MEDIUM", - "attackVector": "NETWORK", - "attackComplexity": "HIGH", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE" - }, - "exploitabilityScore": 2.2, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "ics-cert@hq.dhs.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-521" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:philips:vue_pacs:*:*:*:*:*:*:*:*", - "versionEndExcluding": "12.2.8.410", - "matchCriteriaId": "E3D16037-0684-4486-80A7-8EE98DD4E851" - } - ] - } - ] - } - ], - "references": [ - { - "url": "http://www.philips.com/productsecurity", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "Product" - ] - }, - { - "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01", - "source": "ics-cert@hq.dhs.gov", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] - }, - { - "url": "http://www.philips.com/productsecurity", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Product" - ] - }, - { - "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-200-01", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Third Party Advisory", - "US Government Resource" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40704.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40704.json index be601143de8..d0bacd03fb9 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40704.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40704.json @@ -2,13 +2,13 @@ "id": "CVE-2023-40704", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-07-18T17:15:03.897", - "lastModified": "2024-11-21T08:19:59.750", + "lastModified": "2025-04-09T21:16:24.990", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Philips Vue PACS uses default credentials for potentially critical functionality." + "value": "The product does not require unique and complex passwords to be created \nduring installation. Using Philips's default password could jeopardize \nthe PACS system if the password was hacked or leaked. An attacker could \ngain access to the database impacting system availability and data \nintegrity." }, { "lang": "es", @@ -22,17 +22,17 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 8.4, - "baseSeverity": "HIGH", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", "attackRequirements": "NONE", - "privilegesRequired": "LOW", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "vulnConfidentialityImpact": "HIGH", - "vulnIntegrityImpact": "HIGH", - "vulnAvailabilityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "HIGH", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "subAvailabilityImpact": "NONE", @@ -66,20 +66,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", - "baseScore": 7.1, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "NONE" + "availabilityImpact": "HIGH" }, - "exploitabilityScore": 1.8, - "impactScore": 5.2 + "exploitabilityScore": 0.9, + "impactScore": 5.9 }, { "source": "nvd@nist.gov", diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45594.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45594.json index a8ad6137fdc..279065d4f83 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45594.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45594.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45594", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:46.493", - "lastModified": "2025-03-03T22:32:43.430", + "lastModified": "2025-04-09T20:49:05.457", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-552" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5457.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5457.json index b286a30c4e8..2f6229f550c 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5457.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5457.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5457", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2024-03-05T12:15:47.793", - "lastModified": "2025-03-03T22:10:10.990", + "lastModified": "2025-04-09T20:34:52.100", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-1269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12556.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12556.json index 5a75c8fb88d..53361f146fa 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12556.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12556.json @@ -2,13 +2,17 @@ "id": "CVE-2024-12556", "sourceIdentifier": "bressers@elastic.co", "published": "2025-04-08T20:15:19.420", - "lastModified": "2025-04-08T20:15:19.420", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Prototype Pollution in Kibana can lead to code injection via unrestricted file upload combined with path traversal." + }, + { + "lang": "es", + "value": "La contaminaci\u00f3n de prototipos en Kibana puede provocar la inyecci\u00f3n de c\u00f3digo a trav\u00e9s de la carga de archivos sin restricciones combinada con el path traversal." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31108.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31108.json index 1c7b64f49dd..3edd98b5265 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31108.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31108.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31108", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-31T19:15:48.603", - "lastModified": "2025-03-21T18:57:25.717", + "lastModified": "2025-04-09T20:39:24.993", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55210.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55210.json new file mode 100644 index 00000000000..29a5f63f6af --- /dev/null +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55210.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-55210", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-09T20:15:24.633", + "lastModified": "2025-04-09T20:15:24.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in TOTVS Framework (Linha Protheus) 12.1.2310 allows attackers to bypass multi-factor authentication (MFA) via a crafted websocket message." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/c4cnm/CVE-2024-55210/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-553xx/CVE-2024-55354.json b/CVE-2024/CVE-2024-553xx/CVE-2024-55354.json index 6ad97eda94d..7bbc94845d5 100644 --- a/CVE-2024/CVE-2024-553xx/CVE-2024-55354.json +++ b/CVE-2024/CVE-2024-553xx/CVE-2024-55354.json @@ -2,13 +2,17 @@ "id": "CVE-2024-55354", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-08T22:15:14.887", - "lastModified": "2025-04-08T22:15:14.887", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lucee before 5.4.7.3 LTS and 6 before 6.1.1.118, when an attacker can place files on the server, is vulnerable to a protection mechanism failure that can let an attacker run code that would be expected to be blocked and access resources that would be expected to be protected." + }, + { + "lang": "es", + "value": "En Lucee anterior a 5.4.7.3 LTS y 6 anterior a 6.1.1.118, cuando un atacante puede colocar archivos en el servidor, es vulnerable a una falla del mecanismo de protecci\u00f3n que puede permitir que un atacante ejecute c\u00f3digo que se esperar\u00eda que estuviera bloqueado y acceda a recursos que se esperar\u00eda que estuvieran protegidos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6857.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6857.json index 695a0f4ac19..392469b6686 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6857.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6857.json @@ -2,16 +2,43 @@ "id": "CVE-2024-6857", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-09T06:15:39.347", - "lastModified": "2025-04-09T06:15:39.347", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:15:24.753", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP MultiTasking WordPress plugin through 0.1.12 does not have CSRF check when updating its Header, Footer and Body Script Settings, which could allow attackers to make logged admins perform such action via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento WP MultiTasking para WordPress hasta la versi\u00f3n 0.1.12 no tiene verificaci\u00f3n CSRF al actualizar las configuraciones de script de encabezado, pie de p\u00e1gina y cuerpo, lo que podr\u00eda permitir a los atacantes hacer que los administradores registrados realicen dicha acci\u00f3n a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/97636602-2dd0-465b-b6dc-acb42147edb3/", diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6860.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6860.json index bff60566834..226c8c5c746 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6860.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6860.json @@ -2,16 +2,43 @@ "id": "CVE-2024-6860", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-09T06:15:41.177", - "lastModified": "2025-04-09T06:15:41.177", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:15:24.903", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP MultiTasking WordPress plugin through 0.1.12 does not have CSRF check when updating its permalink suffix settings, which could allow attackers to make logged admins perform such action via a CSRF attack" + }, + { + "lang": "es", + "value": "El complemento WP MultiTasking de WordPress hasta la versi\u00f3n 0.1.12 no tiene verificaci\u00f3n CSRF al actualizar la configuraci\u00f3n del sufijo de enlace permanente, lo que podr\u00eda permitir a los atacantes hacer que los administradores registrados realicen dicha acci\u00f3n a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/1d09d3dd-aa49-4ff1-80e7-6d176e378916/", diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8243.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8243.json index a20aa95fba6..11f0614ffe6 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8243.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8243.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8243", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-09T06:15:41.360", - "lastModified": "2025-04-09T19:15:47.270", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1768.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1768.json index 02dfa1fb2de..2ffbb7f8853 100644 --- a/CVE-2025/CVE-2025-17xx/CVE-2025-1768.json +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1768.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1768", "sourceIdentifier": "security@wordfence.com", "published": "2025-03-07T11:15:15.653", - "lastModified": "2025-03-07T11:15:15.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-09T20:52:13.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,54 +51,108 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:squirrly:seo_plugin_by_squirrly_seo:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "12.4.06", + "matchCriteriaId": "5E271EC4-FE17-488D-A60A-6A2AF364C7AA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Assistant.php?rev=3207037#L55", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Audits.php?rev=3207037#L86", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/BulkSeo.php?rev=3207037#L148", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/FocusPages.php?rev=3207037#L107", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Onboarding.php?rev=3207037#L62", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Post.php?rev=3207037#L480", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/models/Snippet.php?rev=3207037#L118", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/models/Snippet.php?rev=3207037#L96", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3248412/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3250395/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/squirrly-seo/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a23ee5c-275f-4d51-8199-1cc2b0086f73?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1968.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1968.json index bd05fd45ae8..89c4c5ed112 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1968.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1968.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1968", "sourceIdentifier": "security@progress.com", "published": "2025-04-09T14:15:27.950", - "lastModified": "2025-04-09T14:15:27.950", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-209xx/CVE-2025-20952.json b/CVE-2025/CVE-2025-209xx/CVE-2025-20952.json index 0b1c81389d4..70b1db22269 100644 --- a/CVE-2025/CVE-2025-209xx/CVE-2025-20952.json +++ b/CVE-2025/CVE-2025-209xx/CVE-2025-20952.json @@ -2,13 +2,17 @@ "id": "CVE-2025-20952", "sourceIdentifier": "mobile.security@samsung.com", "published": "2025-04-09T08:15:16.153", - "lastModified": "2025-04-09T08:15:16.153", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Mdecservice prior to SMR Apr-2025 Release 1 allows local attackers to access arbitrary files with system privilege." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en Mdecservice anterior a SMR Apr-2025 Release 1 permite a atacantes locales acceder a archivos arbitrarios con privilegios del sistema." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json index 3dcd2b0cc7f..ca7ff3f6a37 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21174.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21174", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:44.667", - "lastModified": "2025-04-08T18:15:44.667", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "El consumo descontrolado de recursos en el Servicio de administraci\u00f3n de almacenamiento basado en est\u00e1ndares de Windows permite que un atacante no autorizado deniegue el servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21191.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21191.json index 2636edc3cd8..159cd7cdba3 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21191.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21191.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21191", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:44.857", - "lastModified": "2025-04-08T18:15:44.857", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La condici\u00f3n de ejecuci\u00f3n de tiempo de uso y tiempo de verificaci\u00f3n (toctou) en la Autoridad de seguridad local (LSA) de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21197.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21197.json index 9c2c68027f5..79c27849cea 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21197.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21197.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21197", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:45.020", - "lastModified": "2025-04-08T18:15:45.020", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en Windows NTFS permite que un atacante autorizado divulgue informaci\u00f3n de la ruta de un archivo en una carpeta donde el atacante no tiene permiso para enumerar el contenido." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21203.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21203.json index 7daf1a70737..d2da1b5a731 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21203.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21203.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21203", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:45.190", - "lastModified": "2025-04-08T18:15:45.190", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "La sobrelectura de b\u00fafer en el Servicio de enrutamiento y acceso remoto de Windows (RRAS) permite que un atacante no autorizado divulgue informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21204.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21204.json index 5015176283e..3240b6cec0e 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21204.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21204.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21204", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:45.343", - "lastModified": "2025-04-08T18:15:45.343", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La resoluci\u00f3n incorrecta de un enlace antes del acceso al archivo ('seguimiento de enlace') en Windows Update Stack permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21205.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21205.json index c874a035d55..545817f0d5f 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21205.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21205.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21205", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:45.513", - "lastModified": "2025-04-08T18:15:45.513", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en mont\u00f3n en el Servicio de telefon\u00eda de Windows permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21221.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21221.json index 9779bd09451..d61c0a6b79c 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21221.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21221.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21221", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:45.673", - "lastModified": "2025-04-08T18:15:45.673", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en mont\u00f3n en el Servicio de telefon\u00eda de Windows permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21222.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21222.json index ed9c1e69a47..10caefa4e99 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21222.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21222.json @@ -2,13 +2,17 @@ "id": "CVE-2025-21222", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:45.850", - "lastModified": "2025-04-08T18:15:45.850", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en mont\u00f3n en el Servicio de telefon\u00eda de Windows permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21591.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21591.json new file mode 100644 index 00000000000..3b5e6ddd857 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21591.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21591", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:25.363", + "lastModified": "2025-04-09T20:15:25.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Buffer Access with Incorrect Length Value vulnerability in the jdhcpd daemon of Juniper Networks Junos OS, when DHCP snooping is enabled, allows an unauthenticated, adjacent, attacker to send a DHCP packet with a malformed DHCP option to cause jdhcp to crash creating a Denial of Service (DoS) condition.\n\nContinuous receipt of these DHCP packets using the malformed DHCP Option will create a sustained Denial of Service (DoS) condition.\n\n\nThis issue affects Junos OS:\n\n\n\n * from 23.1R1 before 23.2R2-S3,\n * from 23.4 before 23.4R2-S3,\n * from 24.2 before 24.2R2.\n\n\nThis issue isn't applicable to any versions of Junos OS before 23.1R1. \n\n\n\nThis issue doesn't affect vSRX Series which doesn't support DHCP Snooping. \n\nThis issue doesn't affect Junos OS Evolved.\n\nThere are no indicators of compromise for this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Green", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "YES", + "Recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "GREEN" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-805" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96448", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21594.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21594.json new file mode 100644 index 00000000000..83237347561 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21594.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21594", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:25.620", + "lastModified": "2025-04-09T20:15:25.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the pfe (packet forwarding engine) of Juniper Networks Junos OS on MX Series causes a port within a pool to be blocked leading to Denial of Service (DoS).\n\nIn a DS-Lite (Dual-Stack Lite) and NAT (Network Address Translation) scenario, when crafted IPv6 traffic is received and\u00a0prefix-length is set to 56,\u00a0the ports assigned to the user will not be freed.\u00a0 Eventually, users cannot establish new connections. Affected FPC/PIC need to be manually restarted to recover.\nFollowing is the command to identify the issue:\u00a0\n\n\n\u00a0 \u00a0 user@host> show services nat source port-block\u00a0\n\u2003\u2003\u2003\u2003Host_IP \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 External_IP \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Port_Block\u00a0 \u00a0 \u00a0 Ports_Used/ \u00a0 \u00a0 \u00a0 Block_State/\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Range \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Ports_Total \u00a0 \u00a0 \u00a0 Left_Time(s)\n\u2003\u2003\u2003\u20032001::\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 x.x.x.x\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a058880-59391\u00a0 \u00a0 \u00a0256/256*1\u00a0 \u00a0 \u00a0 \u00a0 \u00a0Active/- \u00a0 \u00a0 \u00a0 >>>>>>>>port still usedThis issue affects Junos OS on MX Series:\u00a0\n\n * from 21.2 before 21.2R3-S8,\u00a0\n * from 21.4 before 21.4R3-S7,\u00a0\n * from 22.1 before 22.1R3-S6,\u00a0\n * from 22.2 before 22.2R3-S4,\u00a0\n * from 22.3 before 22.3R3-S3,\u00a0\n * from 22.4 before 22.4R3-S2,\u00a0\n * from 23.2 before 23.2R2-S1,\u00a0\n * from 23.4 before 23.4R1-S2, 23.4R2.\n\n\nThis issue does not affect versions before 20.2R1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "USER", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96449", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21595.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21595.json new file mode 100644 index 00000000000..32e1d0f94cf --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21595.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21595", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:25.853", + "lastModified": "2025-04-09T20:15:25.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Missing Release of Memory after Effective Lifetime\u00a0vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent, unauthenticated attacker to cause an FPC to crash, leading to Denial of Service (DoS).\n\nOn all Junos OS and Junos OS Evolved platforms, in an EVPN-VXLAN scenario, when specific ARP packets are received on an IPv4 network, or specific NDP packets are received on an IPv6 network, kernel heap memory leaks, which eventually leads to an FPC crash and restart.\n\nThis issue does not affect MX Series platforms.\nHeap size growth on FPC can be seen using below command.\n\n\nuser@host> show chassis fpc\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Temp CPU Utilization (%) CPU Utilization (%) Memory \u00a0 Utilization (%)\nSlot State \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 (C) Total Interrupt \u00a0 \u00a0 1min \u00a0 5min \u00a0 15min \u00a0 DRAM (MB) \u00a0 Heap \u00a0 Buffer\n\u00a0 0 Online \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 45 \u00a0 \u00a0 3 \u00a0 \u00a0 \u00a0 \u00a0 0 \u00a0 \u00a0 \u00a0 2 \u00a0 \u00a0 \u00a0 2 \u00a0 \u00a0 \u00a02 \u00a0 \u00a0 \u00a0 32768 \u00a0 \u00a0 \u00a019\u00a0 \u00a0 \u00a0 \u00a00\u2003<<<<<<< Heap increase in all fPCs\n\n\nThis issue affects Junos OS:\n\n * All versions before 21.2R3-S7,\n * 21.4 versions before 21.4R3-S4,\n * 22.2 versions before 22.2R3-S1,\u00a0\n * 22.3 versions before 22.3R3-S1,\u00a0\n * 22.4 versions before 22.4R2-S2, 22.4R3.\n\n\nand Junos OS Evolved:\n\n * All versions before 21.2R3-S7-EVO,\n * 21.4-EVO versions before 21.4R3-S4-EVO,\n * 22.2-EVO versions before 22.2R3-S1-EVO,\u00a0\n * 22.3-EVO versions before 22.3R3-S1-EVO,\u00a0\n\n * 22.4-EVO versions before 22.4R3-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96450", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21597.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21597.json new file mode 100644 index 00000000000..9b0ac187c53 --- /dev/null +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21597.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21597", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:26.100", + "lastModified": "2025-04-09T20:15:26.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, logically adjacent BGP peer to cause Denial of Service (DoS).\n\nOn all Junos OS and Junos OS Evolved platforms, when BGP rib-sharding and update-threading are configured, and a BGP peer flap is done with specific timing, rpd crashes and restarts. Continuous peer flapping at specific time intervals will result in a sustained Denial of Service (DoS) condition.\n\nThis issue affects eBGP and iBGP, in both IPv4 and IPv6 implementations. This issue requires a remote attacker to have at least one established BGP session. The issue can occur with or without logical-systems enabled.\n\nThis issue affects:\nJunos OS:\n\n\n\n * All versions before 20.4R3-S8,\n * 21.2 versions before 21.2R3-S6,\n\n * 21.3 versions before 21.3R3-S5,\n * 21.4 versions before 21.4R3-S4,\n * 22.1 versions before 22.1R3-S3,\n * 22.2 versions before 22.2R3-S1,\n * 22.3 versions before 22.3R3,\n * 22.4 versions before 22.4R3.\n\n\nJunos OS Evolved:\n\n\n\n * All versions before 21.2R3-S6-EVO,\n * 21.3-EVO versions before 21.3R3-S5-EVO,\n * 21.4-EVO versions before 21.4R3-S4-EVO,\n * 22.1-EVO versions before 22.1R3-S3-EVO,\n * 22.2-EVO versions before :22.2R3-S1-EVO,\n * 22.3-EVO versions before 22.3R3-EVO,\n * 22.4-EVO versions before 22.4R3-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://kb.juniper.net/JSA96451", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21601.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21601.json new file mode 100644 index 00000000000..2af3ece675b --- /dev/null +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21601.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2025-21601", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:26.350", + "lastModified": "2025-04-09T20:15:26.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Following of Specification by Caller vulnerability in web management (J-Web, Captive Portal, 802.1X, Juniper Secure Connect (JSC) of\u00a0Juniper Networks Junos OS on SRX Series, EX Series, MX240, MX480, MX960, QFX5120 Series, allows an\u00a0unauthenticated, network-based attacker, sending genuine traffic targeted to the device to cause the CPU to climb until the device becomes unresponsive. \n\nContinuous receipt of these packets will create a sustained Denial of Service (DoS) condition.\n\n\n\n\nThis issue affects Junos OS:\u00a0\n\n\n\n * All versions before 21.4R3-S9,\n * from 22.2 before 22.2R3-S5,\n * from 22.4 before 22.4R3-S4,\n * from 23.2 before 23.2R2-S3,\n * from 23.4 before 23.4R2-S3,\n * from 24.2 before 24.2R1-S1, 24.2R2.\n\n\nAn indicator of compromise is to review the CPU % of the httpd process in the CLI:\ne.g.\n\u00a0\u00a0show system processes extensive | match httpd\u00a0 PID nobody \u00a0 \u00a0 \u00a0 52 \u00a0 0 \u00a0 20M\u00a0 \u00a0 191M select \u00a0 2 \u00a0 0:01 \u00a0 80.00% httpd{httpd} <<<<< the percentage of httpd usage if high may be an indicator" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:C/RE:M/U:Amber", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "YES", + "Recovery": "AUTOMATIC", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96452", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2193.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2193.json index 3ab8f946fad..45fbea8433c 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2193.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2193.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2193", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-11T13:15:43.997", - "lastModified": "2025-03-11T14:15:27.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-09T20:48:27.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -118,28 +138,77 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mrcms:mrcms:3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "254B64CD-32D5-4E91-8A4C-54C155EA7E0B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/IceFoxH/VULN/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.299218", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.299218", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.511724", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/IceFoxH/VULN/issues/1", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2194.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2194.json index 6787cd7dd3e..1d9c79bd1b1 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2194.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2194.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2194", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-11T14:15:27.753", - "lastModified": "2025-03-11T14:15:27.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-09T20:46:03.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,77 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mrcms:mrcms:3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "254B64CD-32D5-4E91-8A4C-54C155EA7E0B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/IceFoxH/VULN/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.299219", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.299219", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.511732", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/IceFoxH/VULN/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2195.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2195.json index 068a24fef12..5aad1d0e61a 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2195.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2195.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2195", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-11T14:15:27.937", - "lastModified": "2025-03-11T14:15:27.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-09T20:45:17.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,77 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mrcms:mrcms:3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "254B64CD-32D5-4E91-8A4C-54C155EA7E0B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/IceFoxH/VULN/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.299220", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.299220", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.511733", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/IceFoxH/VULN/issues/4", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2196.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2196.json index 7d5d9eb8d90..54af5980fff 100644 --- a/CVE-2025/CVE-2025-21xx/CVE-2025-2196.json +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2196.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2196", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-11T14:15:28.123", - "lastModified": "2025-03-11T15:15:45.820", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-09T20:39:50.180", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -122,28 +142,75 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mrcms:mrcms:3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "254B64CD-32D5-4E91-8A4C-54C155EA7E0B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/IceFoxH/VULN/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.299221", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.299221", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.511735", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/IceFoxH/VULN/issues/5", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22871.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22871.json index ad2896a7cc3..f6544dce6e7 100644 --- a/CVE-2025/CVE-2025-228xx/CVE-2025-22871.json +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22871.json @@ -2,13 +2,17 @@ "id": "CVE-2025-22871", "sourceIdentifier": "security@golang.org", "published": "2025-04-08T20:15:20.183", - "lastModified": "2025-04-08T21:15:48.173", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext." + }, + { + "lang": "es", + "value": "El paquete net/http acepta incorrectamente un LF simple como terminador de l\u00ednea en l\u00edneas de datos fragmentados. Esto puede permitir el contrabando de solicitudes si se utiliza un servidor net/http junto con un servidor que acepta incorrectamente un LF simple como parte de una extensi\u00f3n fragmentada." } ], "metrics": {}, diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2222.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2222.json index 710fb413116..2178fcd4259 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2222.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2222.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2222", "sourceIdentifier": "cybersecurity@se.com", "published": "2025-04-09T11:15:42.063", - "lastModified": "2025-04-09T11:15:42.063", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2223.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2223.json index 5a51e7f6556..1125a2c5934 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2223.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2223.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2223", "sourceIdentifier": "cybersecurity@se.com", "published": "2025-04-09T11:15:42.320", - "lastModified": "2025-04-09T11:15:42.320", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23407.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23407.json index 2019978e694..bb0e1c3cc42 100644 --- a/CVE-2025/CVE-2025-234xx/CVE-2025-23407.json +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23407.json @@ -2,13 +2,17 @@ "id": "CVE-2025-23407", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-04-09T09:15:15.963", - "lastModified": "2025-04-09T09:15:15.963", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect privilege assignment vulnerability in the WEB UI (the setting page) exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a remote attacker who can log in to the product may alter the settings without appropriate privileges." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en la interfaz web (p\u00e1gina de configuraci\u00f3n) en Wi-Fi AP UNIT 'AC-WPS-11ac series'. Si se explota, un atacante remoto que pueda iniciar sesi\u00f3n en el producto podr\u00eda modificar la configuraci\u00f3n sin los privilegios adecuados." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24058.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24058.json index 2417ad3a467..18cb20ddff4 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24058.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24058.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24058", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:46.037", - "lastModified": "2025-04-08T18:15:46.037", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en la librer\u00eda principal DWM de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24060.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24060.json index a9b7b8b220f..5fa91fc5ad3 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24060.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24060.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24060", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:46.193", - "lastModified": "2025-04-08T18:15:46.193", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en la librer\u00eda principal DWM de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24062.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24062.json index 5860bdb55f0..9f7b5714622 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24062.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24062.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24062", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:46.353", - "lastModified": "2025-04-08T18:15:46.353", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en la librer\u00eda principal DWM de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24073.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24073.json index 0ed5ab85ab5..c9679bad619 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24073.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24073.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24073", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:46.543", - "lastModified": "2025-04-08T18:15:46.543", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en la librer\u00eda principal DWM de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24074.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24074.json index baded92dd9a..dd4850b5370 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24074.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24074.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24074", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:46.740", - "lastModified": "2025-04-08T18:15:46.740", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en la librer\u00eda principal DWM de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24446.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24446.json index af37e30c264..165b581c09b 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24446.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24446.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24446", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:20.417", - "lastModified": "2025-04-08T20:15:20.417", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24447.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24447.json index d420928cf22..491786d15dd 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24447.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24447.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24447", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:20.573", - "lastModified": "2025-04-08T20:15:20.573", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de deserializaci\u00f3n de datos no confiables que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2440.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2440.json index 0dbc41506fe..9fe348ca784 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2440.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2440.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2440", "sourceIdentifier": "cybersecurity@se.com", "published": "2025-04-09T11:15:42.507", - "lastModified": "2025-04-09T11:15:42.507", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2441.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2441.json index d3f3e6e7319..ebbf013cc67 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2441.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2441.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2441", "sourceIdentifier": "cybersecurity@se.com", "published": "2025-04-09T11:15:42.730", - "lastModified": "2025-04-09T11:15:42.730", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-24xx/CVE-2025-2442.json b/CVE-2025/CVE-2025-24xx/CVE-2025-2442.json index 0d8082ce64d..7c7afb26b6d 100644 --- a/CVE-2025/CVE-2025-24xx/CVE-2025-2442.json +++ b/CVE-2025/CVE-2025-24xx/CVE-2025-2442.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2442", "sourceIdentifier": "cybersecurity@se.com", "published": "2025-04-09T11:15:42.947", - "lastModified": "2025-04-09T11:15:42.947", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25002.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25002.json index eb8e045048e..32e6189fa42 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25002.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25002.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25002", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:47.030", - "lastModified": "2025-04-08T18:15:47.030", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insertion of sensitive information into log file in Azure Local Cluster allows an authorized attacker to disclose information over an adjacent network." + }, + { + "lang": "es", + "value": "La inserci\u00f3n de informaci\u00f3n confidencial en un archivo de registro en un cl\u00faster local de Azure permite que un atacante autorizado divulgue informaci\u00f3n a trav\u00e9s de una red adyacente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25013.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25013.json index 709eb6ffdb4..3760773d6a9 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25013.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25013.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25013", "sourceIdentifier": "bressers@elastic.co", "published": "2025-04-08T23:15:45.540", - "lastModified": "2025-04-08T23:15:45.540", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper restriction of environment variables in Elastic Defend can lead to exposure of sensitive information such as API keys and tokens via automatic transmission of unfiltered environment variables to the stack." + }, + { + "lang": "es", + "value": "La restricci\u00f3n incorrecta de las variables de entorno en Elastic Defend puede provocar la exposici\u00f3n de informaci\u00f3n confidencial, como claves API y tokens, a trav\u00e9s de la transmisi\u00f3n autom\u00e1tica de variables de entorno sin filtrar a la pila." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25023.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25023.json index 519b80ec4a8..5a332dea8ca 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25023.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25023.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25023", "sourceIdentifier": "psirt@us.ibm.com", "published": "2025-04-09T14:15:28.167", - "lastModified": "2025-04-09T14:15:28.167", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25053.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25053.json index 66917d091ac..5403023dc3e 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25053.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25053.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25053", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-04-09T09:15:16.213", - "lastModified": "2025-04-09T09:15:16.213", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability in the WEB UI (the setting page) exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en la interfaz web (p\u00e1gina de configuraci\u00f3n) de Wi-Fi AP UNIT 'AC-WPS-11ac series'. Si se explota, un atacante remoto podr\u00eda ejecutar un comando arbitrario del sistema operativo al iniciar sesi\u00f3n en el producto." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25056.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25056.json index cb61124c209..6cc967c7862 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25056.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25056.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25056", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-04-09T09:15:16.423", - "lastModified": "2025-04-09T09:15:16.423", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery vulnerability exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If a user views a malicious page while logged in, unintended operations may be performed." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Cross-Site Request Forgery en Wi-Fi AP UNIT 'AC-WPS-11ac series'. Si un usuario accede a una p\u00e1gina maliciosa con la sesi\u00f3n iniciada, podr\u00edan producirse operaciones no deseadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25213.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25213.json index f79d1f72d4f..f00d0187f55 100644 --- a/CVE-2025/CVE-2025-252xx/CVE-2025-25213.json +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25213.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25213", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-04-09T09:15:16.610", - "lastModified": "2025-04-09T09:15:16.610", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper restriction of rendered UI layers or frames issue exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If a user views and clicks on the content on the malicious page while logged in, unintended operations may be performed." + }, + { + "lang": "es", + "value": "Existe un problema de restricci\u00f3n incorrecta de las capas o marcos de la interfaz de usuario renderizados en Wi-Fi AP UNIT 'AC-WPS-11ac series'. Si un usuario visualiza y hace clic en el contenido de la p\u00e1gina maliciosa con la sesi\u00f3n iniciada, podr\u00edan producirse operaciones no deseadas." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json index 06be0e6d702..8b5f78e1e85 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25632.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25632", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-05T21:15:19.890", - "lastModified": "2025-03-06T15:15:17.770", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-09T20:56:55.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac15_firmware:15.03.05.19:*:*:*:*:*:*:*", + "matchCriteriaId": "A14A19EE-FB4E-4371-AC85-1401EB78B16D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B73E7C1C-F121-486A-8B15-E97EA0C219A5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Pr0b1em/IoT/blob/master/TendaAC15v15.03.05.19telnet.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26628.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26628.json index 8f1b2403160..374cc0c4ee1 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26628.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26628.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26628", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:47.180", - "lastModified": "2025-04-08T18:15:47.180", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficiently protected credentials in Azure Local Cluster allows an authorized attacker to disclose information locally." + }, + { + "lang": "es", + "value": "Las credenciales insuficientemente protegidas en el cl\u00faster local de Azure permiten que un atacante autorizado divulgue informaci\u00f3n localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26635.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26635.json index 256c50132e5..cfb4e4a70e9 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26635.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26635.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26635", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:47.337", - "lastModified": "2025-04-08T18:15:47.337", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network." + }, + { + "lang": "es", + "value": "La autenticaci\u00f3n d\u00e9bil en Windows Hello permite que un atacante autorizado eluda una funci\u00f3n de seguridad en una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26637.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26637.json index 42f30871f00..0805210a67d 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26637.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26637.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26637", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:47.490", - "lastModified": "2025-04-08T18:15:47.490", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack." + }, + { + "lang": "es", + "value": "Una falla en el mecanismo de protecci\u00f3n de Windows BitLocker permite que un atacante no autorizado eluda una caracter\u00edstica de seguridad con un ataque f\u00edsico." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26639.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26639.json index 4765644c5d6..4b76edebae0 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26639.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26639.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26639", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:47.657", - "lastModified": "2025-04-08T18:15:47.657", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow or wraparound in Windows USB Print Driver allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "El desbordamiento de enteros o el envoltura en el controlador de impresi\u00f3n USB de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26640.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26640.json index 38762ae59b1..459ab4d7e89 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26640.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26640.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26640", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:47.817", - "lastModified": "2025-04-08T18:15:47.817", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "Use after free en Windows Digital Media permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26641.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26641.json index bc029338839..26c2350eebb 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26641.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26641.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26641", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:47.990", - "lastModified": "2025-04-08T18:15:47.990", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "El consumo descontrolado de recursos en los Servicios criptogr\u00e1ficos de Windows permite que un atacante no autorizado deniegue el servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26642.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26642.json index a84bfc64ed7..db79f4b8c9f 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26642.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26642.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26642", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:48.160", - "lastModified": "2025-04-08T18:15:48.160", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en Microsoft Office permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26644.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26644.json index d12ad9975dc..59aea74ddbf 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26644.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26644.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26644", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:48.347", - "lastModified": "2025-04-08T18:15:48.347", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally." + }, + { + "lang": "es", + "value": "El mecanismo de reconocimiento automatizado con detecci\u00f3n o gesti\u00f3n inadecuada de perturbaciones de entrada adversarias en Windows Hello permite que un atacante no autorizado realice suplantaci\u00f3n de identidad localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26647.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26647.json index 2ce40f1c639..d97d136cfc7 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26647.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26647.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26647", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:48.510", - "lastModified": "2025-04-08T18:15:48.510", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en Windows Kerberos permite que un atacante no autorizado eleve privilegios en una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26648.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26648.json index 23fdca23fa4..5e62683f105 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26648.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26648.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26648", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:48.667", - "lastModified": "2025-04-08T18:15:48.667", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "El almacenamiento de datos confidenciales en una memoria bloqueada incorrectamente en el kernel de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26649.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26649.json index cfe4369cccc..cb9192005d4 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26649.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26649.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26649", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:48.843", - "lastModified": "2025-04-08T18:15:48.843", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La ejecuci\u00f3n concurrente utilizando un recurso compartido con sincronizaci\u00f3n incorrecta ('condici\u00f3n de ejecuci\u00f3n') en Windows Secure Channel permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26651.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26651.json index cd48975f57c..3fb6eb69781 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26651.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26651.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26651", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:49.007", - "lastModified": "2025-04-08T18:15:49.007", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "Un m\u00e9todo o funci\u00f3n peligroso expuesto en el Administrador de sesi\u00f3n local (LSM) de Windows permite a un atacante autorizado denegar servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26652.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26652.json index 7a662967647..7fdc881e389 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26652.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26652.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26652", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:49.157", - "lastModified": "2025-04-08T18:15:49.157", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "El consumo descontrolado de recursos en el Servicio de administraci\u00f3n de almacenamiento basado en est\u00e1ndares de Windows permite que un atacante no autorizado deniegue el servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26663.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26663.json index b0116570053..eed0ee1d814 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26663.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26663.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26663", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:49.337", - "lastModified": "2025-04-08T18:15:49.337", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "Use after free en Windows LDAP: el protocolo ligero de acceso a directorios permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26664.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26664.json index cc90c5c3857..6bde1c9053c 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26664.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26664.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26664", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:49.510", - "lastModified": "2025-04-08T18:15:49.510", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "La sobrelectura de b\u00fafer en el Servicio de enrutamiento y acceso remoto de Windows (RRAS) permite que un atacante no autorizado divulgue informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26665.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26665.json index d5bfc1ca0bc..51ea65f0d35 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26665.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26665.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26665", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:49.670", - "lastModified": "2025-04-08T18:15:49.670", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "El almacenamiento de datos confidenciales en una memoria bloqueada incorrectamente en Windows upnphost.dll permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26666.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26666.json index 2039e117466..dca81213f86 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26666.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26666.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26666", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:49.833", - "lastModified": "2025-04-08T18:15:49.833", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en mont\u00f3n en Windows Media permite que un atacante autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26667.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26667.json index 676217a26fa..7585973a2e4 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26667.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26667.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26667", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:50.000", - "lastModified": "2025-04-08T18:15:50.000", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "La exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en el Servicio de enrutamiento y acceso remoto de Windows (RRAS) permite que un atacante no autorizado divulgue informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json index 4208c9d4a3c..8c3cef356cb 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26668.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26668", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:50.160", - "lastModified": "2025-04-08T18:15:50.160", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en mont\u00f3n en el Servicio de enrutamiento y acceso remoto de Windows (RRAS) permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json index 0aa64f618ac..69decd376dc 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26669.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26669", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:50.347", - "lastModified": "2025-04-08T18:15:50.347", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en el Servicio de enrutamiento y acceso remoto de Windows (RRAS) permite que un atacante no autorizado divulgue informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json index 564df598f84..033fdfcedca 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26670.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26670", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:50.817", - "lastModified": "2025-04-08T18:15:50.817", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "Use after free en Windows LDAP: el protocolo ligero de acceso a directorios permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26671.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26671.json index e80905fec5e..a4dc8526599 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26671.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26671.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26671", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:51.003", - "lastModified": "2025-04-08T18:15:51.003", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "Use after free en los Servicios de Escritorio remoto de Windows permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json index 3a9cd604092..72f908c8790 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26672.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26672", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:51.177", - "lastModified": "2025-04-08T18:15:51.177", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "La sobrelectura de b\u00fafer en el Servicio de enrutamiento y acceso remoto de Windows (RRAS) permite que un atacante no autorizado divulgue informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26673.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26673.json index 5684a9c5c0e..90d4e7e1d4d 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26673.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26673.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26673", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:51.350", - "lastModified": "2025-04-08T18:15:51.350", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "Consumo descontrolado de recursos en Windows LDAP: el protocolo ligero de acceso a directorios permite que un atacante no autorizado deniegue el servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26674.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26674.json index 82421be1287..219fa64ec6d 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26674.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26674.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26674", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:51.553", - "lastModified": "2025-04-08T18:15:51.553", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en mont\u00f3n en Windows Media permite que un atacante autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26675.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26675.json index 5aad4043ee1..7703d2a102c 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26675.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26675.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26675", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:51.757", - "lastModified": "2025-04-08T18:15:51.757", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en el Subsistema de Windows para Linux permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26676.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26676.json index 5f50a5cc349..599f38d210d 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26676.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26676.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26676", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:52.023", - "lastModified": "2025-04-08T18:15:52.023", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "La sobrelectura de b\u00fafer en el Servicio de enrutamiento y acceso remoto de Windows (RRAS) permite que un atacante no autorizado divulgue informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26678.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26678.json index 53ef95446b0..1e73d18e9f9 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26678.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26678.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26678", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:52.303", - "lastModified": "2025-04-08T18:15:52.303", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en el Control de aplicaciones de Windows Defender (WDAC) permite que un atacante no autorizado eluda una funci\u00f3n de seguridad localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26679.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26679.json index e40a41e276e..dadd39c9b55 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26679.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26679.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26679", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:52.463", - "lastModified": "2025-04-08T18:15:52.463", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "Use after free en el servicio RPC Endpoint Mapper permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26680.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26680.json index 427fce82919..61ed0982360 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26680.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26680.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26680", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:52.667", - "lastModified": "2025-04-08T18:15:52.667", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "El consumo descontrolado de recursos en el Servicio de administraci\u00f3n de almacenamiento basado en est\u00e1ndares de Windows permite que un atacante no autorizado deniegue el servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26681.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26681.json index 47d4057ca80..8899d4aa8d7 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26681.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26681.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26681", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:52.863", - "lastModified": "2025-04-08T18:15:52.863", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "Use after free en Windows Win32K: GRFX permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26682.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26682.json index 3be6d3cf16c..babc7aa747d 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26682.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26682.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26682", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:53.033", - "lastModified": "2025-04-08T18:15:53.033", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "La asignaci\u00f3n de recursos sin l\u00edmites ni limitaciones en ASP.NET Core permite que un atacante no autorizado deniegue el servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26686.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26686.json index d9db4ee0650..60d6d95b094 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26686.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26686.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26686", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:53.220", - "lastModified": "2025-04-08T18:15:53.220", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive data storage in improperly locked memory in Windows TCP/IP allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "El almacenamiento de datos confidenciales en una memoria bloqueada incorrectamente en TCP/IP de Windows permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26687.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26687.json index 616849788c4..6dae47051ed 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26687.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26687.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26687", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:53.383", - "lastModified": "2025-04-08T18:15:53.383", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows Win32K - GRFX allows an unauthorized attacker to elevate privileges over a network." + }, + { + "lang": "es", + "value": "Use after free en Windows Win32K: GRFX permite que un atacante no autorizado eleve privilegios en una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-266xx/CVE-2025-26688.json b/CVE-2025/CVE-2025-266xx/CVE-2025-26688.json index 2a62b6e0eb8..a71396f2143 100644 --- a/CVE-2025/CVE-2025-266xx/CVE-2025-26688.json +++ b/CVE-2025/CVE-2025-266xx/CVE-2025-26688.json @@ -2,13 +2,17 @@ "id": "CVE-2025-26688", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:53.550", - "lastModified": "2025-04-08T18:15:53.550", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en pila en Microsoft Virtual Hard Drive permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-268xx/CVE-2025-26888.json b/CVE-2025/CVE-2025-268xx/CVE-2025-26888.json new file mode 100644 index 00000000000..0d50a9a392c --- /dev/null +++ b/CVE-2025/CVE-2025-268xx/CVE-2025-26888.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26888", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-09T20:15:26.607", + "lastModified": "2025-04-09T20:15:26.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in OnTheGoSystems WooCommerce Multilingual & Multicurrency allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WooCommerce Multilingual & Multicurrency: from n/a through 5.3.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woocommerce-multilingual/vulnerability/wordpress-woocommerce-multilingual-multicurrency-plugin-5-3-8-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26901.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26901.json new file mode 100644 index 00000000000..cc4ab56caa5 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26901.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26901", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-09T20:15:26.773", + "lastModified": "2025-04-09T20:15:26.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Brizy Brizy Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Brizy Pro: from n/a through 2.6.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/brizy-pro/vulnerability/wordpress-brizy-pro-plugin-2-6-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-269xx/CVE-2025-26902.json b/CVE-2025/CVE-2025-269xx/CVE-2025-26902.json new file mode 100644 index 00000000000..ac77b889b73 --- /dev/null +++ b/CVE-2025/CVE-2025-269xx/CVE-2025-26902.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26902", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-09T20:15:26.950", + "lastModified": "2025-04-09T20:15:26.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Brizy Brizy Pro allows Cross Site Request Forgery.This issue affects Brizy Pro: from n/a through 2.6.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/brizy-pro/vulnerability/wordpress-brizy-pro-plugin-2-6-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2629.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2629.json index 4ed0ef80cf5..23424573db4 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2629.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2629.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2629", "sourceIdentifier": "security@ni.com", "published": "2025-04-09T19:15:48.320", - "lastModified": "2025-04-09T19:15:48.320", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2630.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2630.json index 8378dd87e9b..4837658cd31 100644 --- a/CVE-2025/CVE-2025-26xx/CVE-2025-2630.json +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2630.json @@ -2,8 +2,8 @@ "id": "CVE-2025-2630", "sourceIdentifier": "security@ni.com", "published": "2025-04-09T19:15:48.490", - "lastModified": "2025-04-09T19:15:48.490", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2631.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2631.json new file mode 100644 index 00000000000..4ce4c418d4c --- /dev/null +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2631.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-2631", + "sourceIdentifier": "security@ni.com", + "published": "2025-04-09T20:15:27.183", + "lastModified": "2025-04-09T20:15:27.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@ni.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-vulnerabilities-in-ni-labview.html", + "source": "security@ni.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-26xx/CVE-2025-2632.json b/CVE-2025/CVE-2025-26xx/CVE-2025-2632.json new file mode 100644 index 00000000000..f775b601737 --- /dev/null +++ b/CVE-2025/CVE-2025-26xx/CVE-2025-2632.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-2632", + "sourceIdentifier": "security@ni.com", + "published": "2025-04-09T20:15:27.350", + "lastModified": "2025-04-09T20:15:27.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW reading CPU info from cache that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@ni.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-vulnerabilities-in-ni-labview.html", + "source": "security@ni.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27182.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27182.json index 90741d93645..01a331abb8b 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27182.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27182.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27182", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:53.740", - "lastModified": "2025-04-08T18:15:53.740", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.1, 24.6.4 y anteriores de After Effects se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27183.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27183.json index 6ca3fea941b..f9779d76140 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27183.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27183.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27183", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:53.937", - "lastModified": "2025-04-08T18:15:53.937", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.1, 24.6.4 y anteriores de After Effects se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27184.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27184.json index d606af6ad1c..8bd72dca0f1 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27184.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27184.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27184", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.090", - "lastModified": "2025-04-08T18:15:54.090", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.1, 24.6.4 y anteriores de After Effects se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27185.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27185.json index 10975726325..f891b001330 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27185.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27185.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27185", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.233", - "lastModified": "2025-04-08T18:15:54.233", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.1, 24.6.4 y anteriores de After Effects se ven afectadas por una vulnerabilidad de desreferencia de puntero nulo que podr\u00eda provocar una denegaci\u00f3n de servicio (DSP) en la aplicaci\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad para bloquear la aplicaci\u00f3n y provocar una DSP. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27186.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27186.json index d0dc8b685a8..3edd669e2c1 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27186.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27186.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27186", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.380", - "lastModified": "2025-04-08T18:15:54.380", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.1, 24.6.4 y anteriores de After Effects se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27187.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27187.json index 52315eee018..5625884dc2c 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27187.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27187.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27187", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.540", - "lastModified": "2025-04-08T18:15:54.540", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.1, 24.6.4 y anteriores de After Effects se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json index e0de7f89f32..d8d3f20dbd6 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27188", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T21:15:50.393", - "lastModified": "2025-04-08T21:15:50.393", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de autorizaci\u00f3n incorrecta que podr\u00eda provocar una escalada de privilegios. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. Para explotar este problema no se requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27189.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27189.json index c9fa6c9d4de..ee21c82fca7 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27189.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27189.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27189", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T21:15:50.567", - "lastModified": "2025-04-08T21:15:50.567", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could be exploited to cause a denial-of-service condition. An attacker could trick a logged-in user into submitting a forged request to the vulnerable application, which may disrupt service availability. Exploitation of this issue requires user interaction, typically in the form of clicking a malicious link or visiting an attacker-controlled website." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Cross-Site Request Forgery (CSRF) que podr\u00eda explotarse para provocar una denegaci\u00f3n de servicio. Un atacante podr\u00eda enga\u00f1ar a un usuario conectado para que env\u00ede una solicitud falsificada a la aplicaci\u00f3n vulnerable, lo que podr\u00eda interrumpir la disponibilidad del servicio. Para explotar este problema, se requiere la interacci\u00f3n del usuario, generalmente haciendo clic en un enlace malicioso o visitando un sitio web controlado por el atacante." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27190.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27190.json index c5632096edd..96050ccc62c 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27190.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27190.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27190", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T21:15:50.727", - "lastModified": "2025-04-08T21:15:50.727", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de funciones de seguridad. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. Para explotar este problema no se requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27191.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27191.json index 1d7b5992c04..81e1f21b584 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27191.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27191.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27191", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T21:15:50.883", - "lastModified": "2025-04-08T21:15:50.883", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de funciones de seguridad. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. Para explotar este problema no se requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27192.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27192.json index b1126937ef2..0dfd379c122 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27192.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27192.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27192", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T21:15:51.040", - "lastModified": "2025-04-08T21:15:51.040", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Insufficiently Protected Credentials vulnerability that could lead to a security feature bypass. A high privileged attacker could exploit this vulnerability to gain unauthorized access to protected resources by obtaining sensitive credential information. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 y anteriores de Adobe Commerce se ven afectadas por una vulnerabilidad de Credenciales Insuficientemente Protegidas que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante con privilegios elevados podr\u00eda explotar esta vulnerabilidad para obtener acceso no autorizado a recursos protegidos mediante la obtenci\u00f3n de informaci\u00f3n confidencial de credenciales. Para explotar este problema, no se requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27193.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27193.json index df7324a3161..90d8a332571 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27193.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27193.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27193", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.687", - "lastModified": "2025-04-08T18:15:54.687", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bridge versions 14.1.5, 15.0.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 14.1.5, 15.0.2 y anteriores de Bridge se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer en el mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27194.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27194.json index 384138e27a4..7766ed6a588 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27194.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27194.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27194", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:54.853", - "lastModified": "2025-04-08T18:15:54.853", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Media Encoder versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.1, 24.6.4 y anteriores de Media Encoder se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27195.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27195.json index 56442e39c01..652e7faa719 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27195.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27195.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27195", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.027", - "lastModified": "2025-04-08T18:15:55.027", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Media Encoder versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.1, 24.6.4 y anteriores de Media Encoder se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer en el mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27196.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27196.json index a43bb35ef44..702aecbf47a 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27196.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27196.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27196", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.170", - "lastModified": "2025-04-08T18:15:55.170", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Premiere Pro versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.1, 24.6.4 y anteriores de Premiere Pro se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer en el mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27198.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27198.json index 7f3ec1c89ec..140e58a87bf 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27198.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27198.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27198", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.323", - "lastModified": "2025-04-08T18:15:55.323", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Photoshop Desktop versions 25.12.1, 26.4.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.12.1, 26.4.1 y anteriores de Photoshop Desktop se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer en mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27199.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27199.json index 6fd82da8522..deb781c222b 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27199.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27199.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27199", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.477", - "lastModified": "2025-04-08T18:15:55.477", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 24.0.7, 23.0.10 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.0.7, 23.0.10 y anteriores de Animate se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer en el mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27200.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27200.json index 88387ccfdf2..0107bf446cd 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27200.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27200.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27200", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.630", - "lastModified": "2025-04-08T18:15:55.630", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 24.0.7, 23.0.10 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.0.7, 23.0.10 y anteriores de Animate se ven afectadas por una vulnerabilidad de Use After Free que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27201.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27201.json index 91807983829..6f62d25a314 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27201.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27201.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27201", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.787", - "lastModified": "2025-04-08T18:15:55.787", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.0.7, 23.0.10 y anteriores de Animate se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27202.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27202.json index d138580ac07..0108f5143cb 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27202.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27202.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27202", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:55.960", - "lastModified": "2025-04-08T18:15:55.960", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Animate versions 24.0.7, 23.0.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 24.0.7, 23.0.10 y anteriores de Animate se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27204.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27204.json index c5cf0ba6bd7..0c0dff4db97 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27204.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27204.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27204", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:56.130", - "lastModified": "2025-04-08T18:15:56.130", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 25.1, 24.6.4 y anteriores de After Effects se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-272xx/CVE-2025-27205.json b/CVE-2025/CVE-2025-272xx/CVE-2025-27205.json index 457ad7c31a2..34a1f566306 100644 --- a/CVE-2025/CVE-2025-272xx/CVE-2025-27205.json +++ b/CVE-2025/CVE-2025-272xx/CVE-2025-27205.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27205", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T18:15:56.290", - "lastModified": "2025-04-08T18:15:56.290", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Experience Manager Screens versions FP11.3 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Exploitation of this issue requires user interaction in that a victim must open a malicious link." + }, + { + "lang": "es", + "value": "Las versiones FP11.3 y anteriores de Adobe Experience Manager Screens se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) almacenado que un atacante con pocos privilegios podr\u00eda aprovechar para inyectar scripts maliciosos en campos de formulario vulnerables. JavaScript malicioso puede ejecutarse en el navegador de la v\u00edctima al acceder a la p\u00e1gina que contiene el campo vulnerable. Para explotar este problema, la v\u00edctima debe abrir un enlace malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-273xx/CVE-2025-27391.json b/CVE-2025/CVE-2025-273xx/CVE-2025-27391.json index 48d8e99e1c4..783b19c55f2 100644 --- a/CVE-2025/CVE-2025-273xx/CVE-2025-27391.json +++ b/CVE-2025/CVE-2025-273xx/CVE-2025-27391.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27391", "sourceIdentifier": "security@apache.org", "published": "2025-04-09T15:16:02.090", - "lastModified": "2025-04-09T17:15:32.473", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27467.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27467.json index 6c638e680a0..a3ecbe3bbac 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27467.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27467.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27467", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:56.453", - "lastModified": "2025-04-08T18:15:56.453", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "Use after free en Windows Digital Media permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27469.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27469.json index 244c668d61c..2d39b1d580d 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27469.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27469.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27469", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:56.613", - "lastModified": "2025-04-08T18:15:56.613", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "Consumo descontrolado de recursos en Windows LDAP: el protocolo ligero de acceso a directorios permite que un atacante no autorizado deniegue el servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27470.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27470.json index 2f2261ed5ae..59ff708e1e0 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27470.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27470.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27470", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:56.797", - "lastModified": "2025-04-08T18:15:56.797", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "El consumo descontrolado de recursos en el Servicio de administraci\u00f3n de almacenamiento basado en est\u00e1ndares de Windows permite que un atacante no autorizado deniegue el servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27471.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27471.json index 99483f5b95f..65aae13eb5e 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27471.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27471.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27471", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:56.970", - "lastModified": "2025-04-08T18:15:56.970", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive data storage in improperly locked memory in Microsoft Streaming Service allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "El almacenamiento de datos confidenciales en una memoria bloqueada incorrectamente en Microsoft Streaming Service permite que un atacante no autorizado deniegue el servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27472.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27472.json index deec57dc285..61a9877cd44 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27472.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27472.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27472", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:57.140", - "lastModified": "2025-04-08T18:15:57.140", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature over a network." + }, + { + "lang": "es", + "value": "Una falla del mecanismo de protecci\u00f3n en Windows Mark of the Web (MOTW) permite que un atacante no autorizado eluda una funci\u00f3n de seguridad a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27473.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27473.json index 3305fbf238f..f1194af2a2b 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27473.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27473.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27473", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:57.290", - "lastModified": "2025-04-08T18:15:57.290", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "El consumo descontrolado de recursos en Windows HTTP.sys permite que un atacante no autorizado deniegue el servicio en una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27474.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27474.json index 9191dc42dfb..c7c941db389 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27474.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27474.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27474", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:57.457", - "lastModified": "2025-04-08T18:15:57.457", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "El uso de recursos no inicializados en el Servicio de enrutamiento y acceso remoto de Windows (RRAS) permite que un atacante no autorizado divulgue informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27475.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27475.json index 6457aa18b74..39783bf7b73 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27475.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27475.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27475", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:57.620", - "lastModified": "2025-04-08T18:15:57.620", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive data storage in improperly locked memory in Windows Update Stack allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "El almacenamiento de datos confidenciales en una memoria bloqueada incorrectamente en Windows Update Stack permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27476.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27476.json index ef0c7e4da4f..8693407586c 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27476.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27476.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27476", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:57.777", - "lastModified": "2025-04-08T18:15:57.777", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "Use after free en Windows Digital Media permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27477.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27477.json index bdf21b4e976..14d4a9d8a65 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27477.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27477.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27477", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:57.947", - "lastModified": "2025-04-08T18:15:57.947", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en mont\u00f3n en el Servicio de telefon\u00eda de Windows permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27478.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27478.json index 20539a1332a..d88de33df11 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27478.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27478.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27478", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:58.120", - "lastModified": "2025-04-08T18:15:58.120", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en mont\u00f3n en la Autoridad de seguridad local (LSA) de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27479.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27479.json index 25985f0924f..e163f57d62e 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27479.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27479.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27479", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:58.287", - "lastModified": "2025-04-08T18:15:58.287", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient resource pool in Windows Kerberos allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "Un grupo de recursos insuficiente en Windows Kerberos permite que un atacante no autorizado deniegue el servicio en una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27480.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27480.json index 64bf630a86a..21c638b77a7 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27480.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27480.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27480", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:58.447", - "lastModified": "2025-04-08T18:15:58.447", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "Use after free en el Servicio de puerta de enlace de Escritorio remoto permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27481.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27481.json index e78442629be..e02dc4e9604 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27481.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27481.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27481", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:58.610", - "lastModified": "2025-04-08T18:15:58.610", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en pila en el Servicio de telefon\u00eda de Windows permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27482.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27482.json index a188f0d1b6d..737014341ef 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27482.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27482.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27482", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:58.773", - "lastModified": "2025-04-08T18:15:58.773", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "El almacenamiento de datos confidenciales en una memoria bloqueada incorrectamente en el Servicio de puerta de enlace de Escritorio remoto permite que un atacante no autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27483.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27483.json index 58dec8ac147..d144f36edf4 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27483.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27483.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27483", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:58.943", - "lastModified": "2025-04-08T18:15:58.943", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en Windows NTFS permite que un atacante no autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27484.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27484.json index 2856d833771..d5e5e96f13f 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27484.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27484.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27484", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:59.130", - "lastModified": "2025-04-08T18:15:59.130", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over a network." + }, + { + "lang": "es", + "value": "El almacenamiento de datos confidenciales en una memoria bloqueada incorrectamente en el host del dispositivo Universal Plug and Play (UPnP) de Windows permite que un atacante autorizado eleve privilegios en una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27485.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27485.json index 25278ebd85c..874380f458a 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27485.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27485.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27485", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:59.300", - "lastModified": "2025-04-08T18:15:59.300", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "El consumo descontrolado de recursos en el Servicio de administraci\u00f3n de almacenamiento basado en est\u00e1ndares de Windows permite que un atacante no autorizado deniegue el servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27486.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27486.json index 8b3b44e8562..e2ea6e3f605 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27486.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27486.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27486", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:59.450", - "lastModified": "2025-04-08T18:15:59.450", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network." + }, + { + "lang": "es", + "value": "El consumo descontrolado de recursos en el Servicio de administraci\u00f3n de almacenamiento basado en est\u00e1ndares de Windows permite que un atacante no autorizado deniegue el servicio a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27487.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27487.json index 5352d5dd5b3..c4d1675474a 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27487.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27487.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27487", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:59.620", - "lastModified": "2025-04-08T18:15:59.620", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en mont\u00f3n en el cliente de Escritorio remoto permite que un atacante autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27489.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27489.json index 4fb0f979ab0..bbb07914437 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27489.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27489.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27489", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:59.787", - "lastModified": "2025-04-08T18:15:59.787", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en Azure Local permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27490.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27490.json index 624d9d07927..c6e1aa9fc5c 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27490.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27490.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27490", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:15:59.953", - "lastModified": "2025-04-08T18:15:59.953", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en mont\u00f3n en el servicio Bluetooth de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json index 2ad629ec2e7..f4eeaf80572 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27491.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27491", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:00.140", - "lastModified": "2025-04-08T18:16:00.140", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows Hyper-V allows an authorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "Use after free en Windows Hyper-V permite que un atacante autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27492.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27492.json index 59df64b53a0..3c0962ab3ec 100644 --- a/CVE-2025/CVE-2025-274xx/CVE-2025-27492.json +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27492.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27492", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:00.313", - "lastModified": "2025-04-08T18:16:00.313", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La ejecuci\u00f3n concurrente utilizando un recurso compartido con sincronizaci\u00f3n incorrecta ('condici\u00f3n de ejecuci\u00f3n') en Windows Secure Channel permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27722.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27722.json index 2d5364c4703..fb1a58a4de2 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27722.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27722.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27722", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-04-09T09:15:16.790", - "lastModified": "2025-04-09T09:15:16.790", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information issue exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a man-in-the-middle attack may allow a remote unauthenticated attacker to eavesdrop the communication and obtain the authentication information." + }, + { + "lang": "es", + "value": "Existe un problema de transmisi\u00f3n de informaci\u00f3n confidencial en texto plano en Wi-Fi AP UNIT 'AC-WPS-11ac series'. Si se explota, un ataque de intermediario podr\u00eda permitir que un atacante remoto no autenticado intercepte la comunicaci\u00f3n y obtenga la informaci\u00f3n de autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json index 6088f56dc4f..90cf6f01632 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27727.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27727", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:00.477", - "lastModified": "2025-04-08T18:16:00.477", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La resoluci\u00f3n incorrecta de un enlace antes del acceso al archivo ('seguimiento de enlace') en Windows Installer permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27728.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27728.json index e11ba42956d..c0426f92580 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27728.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27728.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27728", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:00.653", - "lastModified": "2025-04-08T18:16:00.653", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en los controladores de modo kernel de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27729.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27729.json index 2b32a907b12..ad3390c7244 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27729.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27729.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27729", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:00.813", - "lastModified": "2025-04-08T18:16:00.813", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows Shell allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "Use after free en Windows Shell permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27730.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27730.json index 43a5d6337c8..e6b1c29dfcd 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27730.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27730.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27730", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:00.990", - "lastModified": "2025-04-08T18:16:00.990", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "Use after free en Windows Digital Media permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27731.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27731.json index 6ea290f1f56..0cd915ba86a 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27731.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27731.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27731", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:01.163", - "lastModified": "2025-04-08T18:16:01.163", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in OpenSSH for Windows allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en OpenSSH para Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json index 2f41f4e6b62..f2477e10d11 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27732.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27732", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:01.333", - "lastModified": "2025-04-08T18:16:01.333", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "Almacenamiento de datos confidenciales en una memoria bloqueada incorrectamente en Windows Win32K: GRFX permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27733.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27733.json index 1811359af12..15afa1b15da 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27733.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27733.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27733", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:01.517", - "lastModified": "2025-04-08T18:16:01.517", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en Windows NTFS permite que un atacante no autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27735.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27735.json index cced3784f34..7d1b42a3549 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27735.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27735.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27735", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:01.697", - "lastModified": "2025-04-08T18:16:01.697", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient verification of data authenticity in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally." + }, + { + "lang": "es", + "value": "La verificaci\u00f3n insuficiente de la autenticidad de los datos en Windows Virtualization-Based Security (VBS) Enclave permite que un atacante autorizado eluda una funci\u00f3n de seguridad localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27736.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27736.json index dd182135ccc..f63ad851949 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27736.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27736.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27736", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:01.913", - "lastModified": "2025-04-08T18:16:01.913", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of sensitive information to an unauthorized actor in Windows Power Dependency Coordinator allows an authorized attacker to disclose information locally." + }, + { + "lang": "es", + "value": "La exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en Windows Power Dependency Coordinator permite que un atacante autorizado divulgue informaci\u00f3n localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27737.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27737.json index cdb80489c66..1aeabe1f1a7 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27737.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27737.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27737", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:02.097", - "lastModified": "2025-04-08T18:16:02.097", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Windows Security Zone Mapping allows an unauthorized attacker to bypass a security feature locally." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en la asignaci\u00f3n de zonas de seguridad de Windows permite que un atacante no autorizado eluda una funci\u00f3n de seguridad localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27738.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27738.json index 484372de1ae..77d5d9c19bd 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27738.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27738.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27738", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:02.280", - "lastModified": "2025-04-08T18:16:02.280", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Windows Resilient File System (ReFS) allows an authorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en el Sistema de archivos resiliente de Windows (ReFS) permite que un atacante autorizado divulgue informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27739.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27739.json index 4dcf2dac482..4feff14d2c6 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27739.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27739.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27739", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:02.470", - "lastModified": "2025-04-08T18:16:02.470", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La desreferenciaci\u00f3n de punteros no confiables en el kernel de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27740.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27740.json index 5a4078e2acc..8649330e21a 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27740.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27740.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27740", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:02.653", - "lastModified": "2025-04-08T18:16:02.653", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Weak authentication in Windows Active Directory Certificate Services allows an authorized attacker to elevate privileges over a network." + }, + { + "lang": "es", + "value": "La autenticaci\u00f3n d\u00e9bil en los Servicios de certificados de Active Directory de Windows permite que un atacante autorizado eleve privilegios en una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27741.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27741.json index 8471e71b3e8..6fad813e837 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27741.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27741.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27741", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:02.833", - "lastModified": "2025-04-08T18:16:02.833", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en Windows NTFS permite que un atacante no autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27742.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27742.json index 2ce50b3c81f..e4491efca0f 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27742.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27742.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27742", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:03.040", - "lastModified": "2025-04-08T18:16:03.040", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally." + }, + { + "lang": "es", + "value": "La lectura fuera de los l\u00edmites en Windows NTFS permite que un atacante no autorizado divulgue informaci\u00f3n localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27743.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27743.json index a048d8fee51..f31b72da513 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27743.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27743.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27743", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:03.260", - "lastModified": "2025-04-08T18:16:03.260", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path in System Center allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no confiable en System Center permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27744.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27744.json index 2374884031d..3f6b980ee98 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27744.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27744.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27744", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:03.497", - "lastModified": "2025-04-08T18:16:03.497", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Microsoft Office allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en Microsoft Office permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27745.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27745.json index 606851ece7a..a8c7a06057a 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27745.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27745.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27745", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:03.670", - "lastModified": "2025-04-08T18:16:03.670", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "Use after free en Microsoft Office permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27746.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27746.json index 881be9af9ca..c0cafdca4c5 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27746.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27746.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27746", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:03.877", - "lastModified": "2025-04-08T18:16:03.877", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "Use after free en Microsoft Office permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27747.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27747.json index e14d5e9c176..5159182f20e 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27747.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27747.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27747", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:04.047", - "lastModified": "2025-04-08T18:16:04.047", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "Use after free en Microsoft Office Word permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27748.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27748.json index c624f97916e..0cdeaaaa324 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27748.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27748.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27748", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:04.213", - "lastModified": "2025-04-08T18:16:04.213", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "Use after free en Microsoft Office permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27749.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27749.json index 55788ee63ac..58fa67b13ac 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27749.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27749.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27749", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:04.370", - "lastModified": "2025-04-08T18:16:04.370", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "Use after free en Microsoft Office permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27750.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27750.json index ae37e57dd34..c67a9ebf132 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27750.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27750.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27750", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:04.520", - "lastModified": "2025-04-08T18:16:04.520", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "Use after free en Microsoft Office Excel permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27751.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27751.json index 6b7c0d8bee6..df26ea11a1a 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27751.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27751.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27751", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:04.680", - "lastModified": "2025-04-08T18:16:04.680", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "Use after free en Microsoft Office Excel permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27752.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27752.json index 1618ea701e6..787fd762929 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27752.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27752.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27752", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:04.840", - "lastModified": "2025-04-08T18:16:04.840", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "El desbordamiento del b\u00fafer basado en mont\u00f3n en Microsoft Office Excel permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-277xx/CVE-2025-27797.json b/CVE-2025/CVE-2025-277xx/CVE-2025-27797.json index 4db767d18f9..cfb246580a5 100644 --- a/CVE-2025/CVE-2025-277xx/CVE-2025-27797.json +++ b/CVE-2025/CVE-2025-277xx/CVE-2025-27797.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27797", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-04-09T09:15:16.977", - "lastModified": "2025-04-09T09:15:16.977", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability in the specific service exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, an arbitrary OS command may be executed by a remote attacker who can log in to the product." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en el servicio espec\u00edfico de Wi-Fi AP UNIT 'AC-WPS-11ac series'. Si se explota, un atacante remoto que pueda iniciar sesi\u00f3n en el producto podr\u00eda ejecutar un comando arbitrario del sistema operativo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27934.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27934.json index 6c06e598ec7..c68313b6dec 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27934.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27934.json @@ -2,13 +2,17 @@ "id": "CVE-2025-27934", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-04-09T09:15:17.153", - "lastModified": "2025-04-09T09:15:17.153", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information disclosure of authentication information in the specific service vulnerability exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a remote unauthenticated attacker may obtain the product authentication information." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de autenticaci\u00f3n en el servicio espec\u00edfico de Wi-Fi AP UNIT 'AC-WPS-11ac series'. Si se explota, un atacante remoto no autenticado podr\u00eda obtener la informaci\u00f3n de autenticaci\u00f3n del producto." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2786.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2786.json index 2bf7cd284b8..02dfb89d299 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2786.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2786.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2786", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-02T11:15:39.300", - "lastModified": "2025-04-04T14:15:22.113", + "lastModified": "2025-04-09T21:16:25.720", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:3607", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:3740", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-2786", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2842.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2842.json index 31ef2106f0a..8ada625e2f0 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2842.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2842.json @@ -2,7 +2,7 @@ "id": "CVE-2025-2842", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-02T12:15:14.677", - "lastModified": "2025-04-04T14:15:22.517", + "lastModified": "2025-04-09T21:16:25.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:3607", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:3740", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-2842", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29018.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29018.json new file mode 100644 index 00000000000..e7e7f0d5b7e --- /dev/null +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29018.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-29018", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-09T21:16:25.540", + "lastModified": "2025-04-09T21:16:25.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross-Site Scripting (XSS) vulnerability exists in the name parameter of pages_add_acc_type.php in Code Astro Internet Banking System 2.0.0." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/b1tm4r/CVE-2025-29018", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-291xx/CVE-2025-29189.json b/CVE-2025/CVE-2025-291xx/CVE-2025-29189.json index c88d1efed88..9645f33b6a2 100644 --- a/CVE-2025/CVE-2025-291xx/CVE-2025-29189.json +++ b/CVE-2025/CVE-2025-291xx/CVE-2025-29189.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29189", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-09T12:15:15.003", - "lastModified": "2025-04-09T15:16:02.413", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json index 8bcf40081bb..9ecf9a85e93 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29389.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29389", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-09T15:16:02.593", - "lastModified": "2025-04-09T19:15:47.870", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29390.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29390.json index 58fadd74d0c..495706de6da 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29390.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29390.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29390", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-09T16:15:24.260", - "lastModified": "2025-04-09T19:15:48.013", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29391.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29391.json index b7276675c76..336afd958e5 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29391.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29391.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29391", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-09T16:15:24.390", - "lastModified": "2025-04-09T19:15:48.160", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-293xx/CVE-2025-29394.json b/CVE-2025/CVE-2025-293xx/CVE-2025-29394.json index 92f00030cc7..031bbedb90e 100644 --- a/CVE-2025/CVE-2025-293xx/CVE-2025-29394.json +++ b/CVE-2025/CVE-2025-293xx/CVE-2025-29394.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29394", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-09T16:15:24.523", - "lastModified": "2025-04-09T16:15:24.523", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29791.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29791.json index 7caaa851e81..2edb2252ec3 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29791.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29791.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29791", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:05.003", - "lastModified": "2025-04-08T18:16:05.003", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "El acceso a un recurso mediante un tipo incompatible ('confusi\u00f3n de tipos') en Microsoft Office permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29792.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29792.json index b0cd5c61b80..7671046f5b9 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29792.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29792.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29792", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:05.160", - "lastModified": "2025-04-08T18:16:05.160", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "Use after free en Microsoft Office permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29793.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29793.json index aedf81ed694..c8224d81768 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29793.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29793.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29793", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:05.320", - "lastModified": "2025-04-08T18:16:05.320", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "La deserializaci\u00f3n de datos no confiables en Microsoft Office SharePoint permite que un atacante autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29794.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29794.json index 326937dd966..c493085c0d0 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29794.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29794.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29794", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:05.467", - "lastModified": "2025-04-08T18:16:05.467", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network." + }, + { + "lang": "es", + "value": "Una autorizaci\u00f3n incorrecta en Microsoft Office SharePoint permite que un atacante autorizado ejecute c\u00f3digo a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29800.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29800.json index 5152ce78642..9c9cec3f839 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29800.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29800.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29800", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:05.680", - "lastModified": "2025-04-08T18:16:05.680", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper privilege management in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La gesti\u00f3n inadecuada de privilegios en Microsoft AutoUpdate (MAU) permite que un atacante autorizado eleve los privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29801.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29801.json index 0b953dfbd9f..4358b237d2e 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29801.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29801.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29801", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:05.840", - "lastModified": "2025-04-08T18:16:05.840", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect default permissions in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "Los permisos predeterminados incorrectos en Microsoft AutoUpdate (MAU) permiten que un atacante autorizado eleve los privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29802.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29802.json index 42f1d3e4df9..8af64987cf3 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29802.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29802.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29802", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:06.017", - "lastModified": "2025-04-08T18:16:06.017", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en Visual Studio permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29804.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29804.json index 15deb0859af..81a7351962e 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29804.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29804.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29804", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:06.180", - "lastModified": "2025-04-08T18:16:06.180", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en Visual Studio permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29805.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29805.json index e6e7a53cdb2..9311e1fc786 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29805.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29805.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29805", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:06.330", - "lastModified": "2025-04-08T18:16:06.330", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of sensitive information to an unauthorized actor in Outlook for Android allows an unauthorized attacker to disclose information over a network." + }, + { + "lang": "es", + "value": "La exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en Outlook para Android permite que un atacante no autorizado divulgue informaci\u00f3n a trav\u00e9s de una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29808.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29808.json index 717f8ee7f29..69cb01773c2 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29808.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29808.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29808", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:06.483", - "lastModified": "2025-04-08T18:16:06.483", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally." + }, + { + "lang": "es", + "value": "El uso de un primitivo criptogr\u00e1fico con una implementaci\u00f3n riesgosa en los Servicios criptogr\u00e1ficos de Windows permite a un atacante autorizado divulgar informaci\u00f3n localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29809.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29809.json index fecc96eaa89..87ea09f9362 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29809.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29809.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29809", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:06.633", - "lastModified": "2025-04-08T18:16:06.633", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure storage of sensitive information in Windows Kerberos allows an authorized attacker to bypass a security feature locally." + }, + { + "lang": "es", + "value": "El almacenamiento inseguro de informaci\u00f3n confidencial en Windows Kerberos permite que un atacante autorizado eluda una funci\u00f3n de seguridad localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29810.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29810.json index 48a89da1782..28c4426bf98 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29810.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29810.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29810", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:06.797", - "lastModified": "2025-04-08T18:16:06.797", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en los Servicios de dominio de Active Directory permite que un atacante autorizado eleve privilegios en una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29811.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29811.json index 9b5531a1052..fc5ccc33dad 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29811.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29811.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29811", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:06.977", - "lastModified": "2025-04-08T18:16:06.977", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Windows Mobile Broadband allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en Windows Mobile Broadband permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29812.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29812.json index 4332b04187f..b2072b26eb8 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29812.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29812.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29812", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:07.160", - "lastModified": "2025-04-08T18:16:07.160", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted pointer dereference in Windows Kernel Memory allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": "La desreferenciaci\u00f3n de punteros no confiables en la memoria del kernel de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29816.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29816.json index 558719caa62..92ca3f47841 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29816.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29816.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29816", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:07.370", - "lastModified": "2025-04-08T18:16:07.370", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Microsoft Office Word allows an unauthorized attacker to bypass a security feature over a network." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en Microsoft Office Word permite que un atacante no autorizado eluda una funci\u00f3n de seguridad en una red." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29819.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29819.json index a6b02e95dbb..ff35a8b7817 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29819.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29819.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29819", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:07.520", - "lastModified": "2025-04-08T18:16:07.520", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "External control of file name or path in Azure Portal Windows Admin Center allows an unauthorized attacker to disclose information locally." + }, + { + "lang": "es", + "value": "El control externo del nombre o la ruta de archivo en el Centro de administraci\u00f3n de Windows del Portal de Azure permite que un atacante no autorizado divulgue informaci\u00f3n localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29820.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29820.json index 4387f0f46f6..3a41898685e 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29820.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29820.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29820", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:07.683", - "lastModified": "2025-04-08T18:16:07.683", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "Use after free en Microsoft Office Word permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29821.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29821.json index 3ca78ef568a..6506779fd2d 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29821.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29821.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29821", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:07.867", - "lastModified": "2025-04-08T18:16:07.867", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en Dynamics Business Central permite que un atacante autorizado divulgue informaci\u00f3n localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29822.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29822.json index 945fb4c8d2c..5690a3049da 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29822.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29822.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29822", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:08.023", - "lastModified": "2025-04-08T18:16:08.023", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally." + }, + { + "lang": "es", + "value": "La lista incompleta de entradas no permitidas en Microsoft Office OneNote permite que un atacante no autorizado eluda una funci\u00f3n de seguridad localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29823.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29823.json index d525ebab22e..c8318c0b3f3 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29823.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29823.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29823", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:08.190", - "lastModified": "2025-04-08T18:16:08.190", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally." + }, + { + "lang": "es", + "value": "Use after free en Microsoft Office Excel permite que un atacante no autorizado ejecute c\u00f3digo localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29824.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29824.json index 0f3d6393eb9..8392a59dae7 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29824.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29824.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29824", "sourceIdentifier": "secure@microsoft.com", "published": "2025-04-08T18:16:08.340", - "lastModified": "2025-04-09T01:00:02.927", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally." + }, + { + "lang": "es", + "value": " Use after free en el controlador del sistema de archivos de registro com\u00fan de Windows permite que un atacante autorizado eleve privilegios localmente." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-298xx/CVE-2025-29870.json b/CVE-2025/CVE-2025-298xx/CVE-2025-29870.json index acc29f1fb0f..b1f841dba55 100644 --- a/CVE-2025/CVE-2025-298xx/CVE-2025-29870.json +++ b/CVE-2025/CVE-2025-298xx/CVE-2025-29870.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29870", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2025-04-09T09:15:17.347", - "lastModified": "2025-04-09T09:15:17.347", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing authentication for critical function vulnerability exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If exploited, a remote unauthenticated attacker may obtain the product configuration information including authentication information." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de falta de autenticaci\u00f3n para funciones cr\u00edticas en Wi-Fi AP UNIT 'AC-WPS-11ac series'. Si se explota, un atacante remoto no autenticado podr\u00eda obtener la informaci\u00f3n de configuraci\u00f3n del producto, incluida la informaci\u00f3n de autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29988.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29988.json index 30ae039a4e6..17a291ee114 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29988.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29988.json @@ -2,13 +2,17 @@ "id": "CVE-2025-29988", "sourceIdentifier": "security_alert@emc.com", "published": "2025-04-09T03:15:15.737", - "lastModified": "2025-04-09T03:15:15.737", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Client Platform BIOS contains a Stack-based Buffer Overflow Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution." + }, + { + "lang": "es", + "value": "Dell Client Platform BIOS contiene una vulnerabilidad de desbordamiento de b\u00fafer basada en pila. Un atacante con privilegios elevados y acceso local podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30281.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30281.json index 16d23976af5..9ccbae105cc 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30281.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30281.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30281", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:25.670", - "lastModified": "2025-04-08T20:15:25.670", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify sensitive data without proper authorization. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la lectura arbitraria del sistema de archivos. Un atacante podr\u00eda aprovechar esta vulnerabilidad para acceder o modificar datos confidenciales sin la debida autorizaci\u00f3n. Para explotar este problema no se requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30282.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30282.json index 101c5c1842a..4044fc21b47 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30282.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30282.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30282", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:25.820", - "lastModified": "2025-04-08T20:15:25.820", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Authentication vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to bypass authentication mechanisms and execute code with the privileges of the authenticated user. Exploitation of this issue requires user interaction in that a victim must be coerced into performing actions within the application." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de autenticaci\u00f3n incorrecta que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir los mecanismos de autenticaci\u00f3n y ejecutar c\u00f3digo con los privilegios del usuario autenticado. Para explotar este problema, es necesario obligar a la v\u00edctima a realizar acciones dentro de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json index 2549d7bcffc..40b7a689acf 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30284.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30284", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:25.980", - "lastModified": "2025-04-08T20:15:25.980", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de deserializaci\u00f3n de datos no confiables que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json index 9098a87b1de..4acfc396016 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30285.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30285", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.127", - "lastModified": "2025-04-08T20:15:26.127", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de deserializaci\u00f3n de datos no confiables que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30286.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30286.json index ef0c36cc8de..5afbe21bf6b 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30286.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30286.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30286", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.273", - "lastModified": "2025-04-08T20:15:26.273", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (\u00abinyecci\u00f3n de comandos del sistema operativo\u00bb), que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario por parte de un atacante. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30287.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30287.json index 4f231d785d6..67b71cd561e 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30287.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30287.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30287", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.430", - "lastModified": "2025-04-08T20:15:26.430", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Authentication vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to bypass authentication mechanisms and execute code with the privileges of the authenticated user. Exploitation of this issue requires user interaction in that a victim must be coerced into performing actions within the application." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de autenticaci\u00f3n incorrecta que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir los mecanismos de autenticaci\u00f3n y ejecutar c\u00f3digo con los privilegios del usuario autenticado. Para explotar este problema, es necesario obligar a la v\u00edctima a realizar acciones dentro de la aplicaci\u00f3n." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30288.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30288.json index e23b088c041..c2bc0ca546f 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30288.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30288.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30288", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.583", - "lastModified": "2025-04-08T20:15:26.583", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de control de acceso inadecuado que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. Para explotar este problema no se requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30289.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30289.json index 106efa88029..4e3fdbc65a8 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30289.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30289.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30289", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.737", - "lastModified": "2025-04-08T20:15:26.737", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead in arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (\u00abinyecci\u00f3n de comandos del sistema operativo\u00bb), que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario por parte de un atacante. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json index a5bde8408e6..10800fb0758 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30290.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30290", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:26.883", - "lastModified": "2025-04-08T20:15:26.883", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to a security feature bypass. An attacker could exploit this vulnerability to access files and directories that are stored outside the intended restricted directory. Exploitation of this issue requires user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de limitaci\u00f3n incorrecta de una ruta de acceso a un directorio restringido (\u00abPath Traversal\u00bb), que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante podr\u00eda explotar esta vulnerabilidad para acceder a archivos y directorios almacenados fuera del directorio restringido previsto. Para explotar este problema, se requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json index 648a3c16451..17d08e7ee77 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30291.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30291", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:27.057", - "lastModified": "2025-04-08T20:15:27.057", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to gain access to sensitive information which could be used to further compromise the system or bypass security mechanisms. Exploitation of this issue does not require user interaction." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de exposici\u00f3n de informaci\u00f3n que podr\u00eda resultar en la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante podr\u00eda aprovechar esta vulnerabilidad para acceder a informaci\u00f3n confidencial que podr\u00eda utilizarse para comprometer a\u00fan m\u00e1s el sistema o eludir los mecanismos de seguridad. La explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json index 976ef6ad83e..1d541d4cbff 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30292.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30292", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:27.210", - "lastModified": "2025-04-08T20:15:27.210", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de Cross-Site Scripting (XSS) reflejado. Si un atacante logra convencer a una v\u00edctima para que visite una URL que referencia a una p\u00e1gina vulnerable, podr\u00eda ejecutarse contenido JavaScript malicioso en el navegador de la v\u00edctima." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30293.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30293.json index 631d3298c61..44eae50fb49 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30293.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30293.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30293", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:27.363", - "lastModified": "2025-04-08T20:15:27.363", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30294.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30294.json index 018cefc54f9..f75b694e511 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30294.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30294.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30294", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T20:15:27.527", - "lastModified": "2025-04-08T20:15:27.527", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2023.12, 2021.18, 2025.0 y anteriores de ColdFusion se ven afectadas por una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda provocar la omisi\u00f3n de una funci\u00f3n de seguridad. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir las medidas de seguridad y obtener acceso no autorizado. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30295.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30295.json index 14b5841cdfc..78456143345 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30295.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30295.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30295", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:49.453", - "lastModified": "2025-04-08T19:15:49.453", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.8, 2022.6 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer en mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30296.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30296.json index 7d61eded99c..aa98b247f66 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30296.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30296.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30296", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:49.613", - "lastModified": "2025-04-08T19:15:49.613", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.8, 2022.6 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de subdesbordamiento de enteros (wrap o wraparound) que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30297.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30297.json index eece67742ba..57602a1d735 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30297.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30297.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30297", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:49.770", - "lastModified": "2025-04-08T19:15:49.770", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.8, 2022.6 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30298.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30298.json index 152ce776e9c..d9d42d293d4 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30298.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30298.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30298", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:49.923", - "lastModified": "2025-04-08T19:15:49.923", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.8, 2022.6 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer basada en pila que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-302xx/CVE-2025-30299.json b/CVE-2025/CVE-2025-302xx/CVE-2025-30299.json index 1060e30f483..f36b3b268fd 100644 --- a/CVE-2025/CVE-2025-302xx/CVE-2025-30299.json +++ b/CVE-2025/CVE-2025-302xx/CVE-2025-30299.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30299", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:50.083", - "lastModified": "2025-04-08T19:15:50.083", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.8, 2022.6 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de desbordamiento de b\u00fafer en mont\u00f3n que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30300.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30300.json index e88a2229a09..5358e554139 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30300.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30300.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30300", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:50.240", - "lastModified": "2025-04-08T19:15:50.240", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.8, 2022.6 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de desreferencia de puntero nulo que podr\u00eda provocar una denegaci\u00f3n de servicio (DSP) en la aplicaci\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad para bloquear la aplicaci\u00f3n y provocar una DSP. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30301.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30301.json index 807dc06b9d2..1d69c46e9f3 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30301.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30301.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30301", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:50.390", - "lastModified": "2025-04-08T19:15:50.390", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.8, 2022.6 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de desreferencia de puntero nulo que podr\u00eda provocar una denegaci\u00f3n de servicio (DSP) en la aplicaci\u00f3n. Un atacante podr\u00eda explotar esta vulnerabilidad para bloquear la aplicaci\u00f3n y provocar una DSP. Para explotar este problema, es necesario que la v\u00edctima abra un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30302.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30302.json index 451b90be98c..d802efba9b4 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30302.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30302.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30302", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:50.537", - "lastModified": "2025-04-08T19:15:50.537", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.8, 2022.6 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir medidas de mitigaci\u00f3n como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30303.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30303.json index eb31dd86a05..878047f9028 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30303.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30303.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30303", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:50.693", - "lastModified": "2025-04-08T19:15:50.693", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.8, 2022.6 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir medidas de mitigaci\u00f3n como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30304.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30304.json index 8f8d9e1b50d..d06a6500097 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30304.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30304.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30304", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:50.863", - "lastModified": "2025-04-08T19:15:50.863", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2020.8, 2022.6 y anteriores de Adobe Framemaker se ven afectadas por una vulnerabilidad de escritura fuera de los l\u00edmites que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario actual. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30305.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30305.json index 1875c00a5c6..4fd35f85d6d 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30305.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30305.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30305", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:51.027", - "lastModified": "2025-04-08T19:15:51.027", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2023.12 y anteriores de XMP Toolkit se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30306.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30306.json index 02ee648c0b0..3cdbe636506 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30306.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30306.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30306", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:51.197", - "lastModified": "2025-04-08T19:15:51.197", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2023.12 y anteriores de XMP Toolkit se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30307.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30307.json index aa264d3e015..8790555255a 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30307.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30307.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30307", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:51.353", - "lastModified": "2025-04-08T19:15:51.353", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2023.12 y anteriores de XMP Toolkit se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30308.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30308.json index 5721d63916a..b0cd73e33a8 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30308.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30308.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30308", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:51.513", - "lastModified": "2025-04-08T19:15:51.513", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2023.12 y anteriores de XMP Toolkit se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-303xx/CVE-2025-30309.json b/CVE-2025/CVE-2025-303xx/CVE-2025-30309.json index 04cd01e64b6..600d53bce0a 100644 --- a/CVE-2025/CVE-2025-303xx/CVE-2025-30309.json +++ b/CVE-2025/CVE-2025-303xx/CVE-2025-30309.json @@ -2,13 +2,17 @@ "id": "CVE-2025-30309", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T19:15:51.670", - "lastModified": "2025-04-08T19:15:51.670", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 2023.12 y anteriores de XMP Toolkit se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. Para explotar este problema, la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30644.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30644.json new file mode 100644 index 00000000000..794ce684047 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30644.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30644", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:27.517", + "lastModified": "2025-04-09T20:15:27.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Heap-based Buffer Overflow vulnerability in the flexible PIC concentrator (FPC) of Juniper Networks Junos OS on EX2300, EX3400, EX4100, EX4300, EX4300MP, EX4400, EX4600, EX4650-48Y, and QFX5k Series allows an attacker to send a specific DHCP packet to the device, leading to an FPC crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\nUnder a rare timing scenario outside the attacker's control, memory corruption may be observed when DHCP Option 82 is enabled, leading to an FPC crash and affecting packet forwarding. Due to the nature of the heap-based overflow, exploitation of this vulnerability could also lead to remote code execution within the FPC, resulting in complete control of the vulnerable component.\nThis issue affects Junos OS on EX2300, EX3400, EX4100, EX4300, EX4300MP, EX4400, EX4600, EX4650-48Y, and QFX5k Series: \n\n\n\n\n * All versions before 21.4R3-S9,\u00a0\n * from 22.2 before 22.2R3-S5,\u00a0\n * from 22.4 before 22.4R3-S5,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S3,\u00a0\n * from 24.2 before 24.2R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:X/RE:M/U:Green", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NO", + "Recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "GREEN" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96453", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30645.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30645.json new file mode 100644 index 00000000000..3ccab96cce3 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30645.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30645", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:27.727", + "lastModified": "2025-04-09T20:15:27.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A NULL Pointer Dereference vulnerability in the flow daemon (flowd) of Juniper Networks Junos OS on SRX Series allows an attacker causing specific, valid control traffic to be sent out of a Dual-Stack (DS) Lite tunnel to crash the flowd process, resulting in a Denial of Service (DoS).\u00a0 Continuous triggering of specific control traffic will create a sustained Denial of Service (DoS) condition.\n\nOn all SRX platforms, when specific, valid control traffic needs to be sent out of a DS-Lite tunnel, a segmentation fault occurs within the flowd process, resulting in a network outage until the flowd process restarts.\n\nThis issue affects Junos OS on SRX Series: \n * All versions before 21.2R3-S9, \n * from 21.4 before 21.4R3-S9, \n * from 22.2 before 22.2R3-S5, \n * from 22.4 before 22.4R3-S6, \n * from 23.2 before 23.2R2-S3, \n * from 23.4 before 23.4R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:C/RE:M/U:Green", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "YES", + "Recovery": "AUTOMATIC", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "GREEN" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96455", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30646.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30646.json new file mode 100644 index 00000000000..5bb704bce7b --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30646.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30646", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:27.920", + "lastModified": "2025-04-09T20:15:27.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Signed to Unsigned Conversion Error vulnerability in the Layer 2 Control Protocol daemon (l2cpd) of Juniper Networks Junos OS and Juniper Networks Junos OS Evolved allows an unauthenticated adjacent attacker sending a specifically malformed LLDP TLV to cause the l2cpd process to crash and restart, causing a Denial of Service (DoS).\u00a0 Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.\n\nWhen an LLDP telemetry subscription is active, receipt of a specifically malformed LLDP TLV causes the l2cpd process to crash and restart.\n\n\n\nThis issue affects:\n\nJunos OS: \n\n\n * All versions before 21.2R3-S9,\u00a0\n * from 21.4 before 21.4R3-S10,\u00a0\n * from 22.2 before 22.2R3-S6,\u00a0\n * from 22.4 before 22.4R3-S6,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S4,\u00a0\n * from 24.2 before 24.2R2;\u00a0\n\n\n\n\nJunos OS Evolved:\u00a0\n\n\n\n * All versions before 21.4R3-S10-EVO,\n * from 22.2-EVO before 22.2R3-S6-EVO,\u00a0\n * from 22.4-EVO before 22.4R3-S6-EVO,\u00a0\n * from 23.2-EVO before 23.2R2-S3-EVO,\u00a0\n * from 23.4-EVO before 23.4R2-S4-EVO,\u00a0\n * from 24.2-EVO before 24.2R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:C/RE:M/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "YES", + "Recovery": "AUTOMATIC", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-195" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96456", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30647.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30647.json new file mode 100644 index 00000000000..d7473373002 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30647.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30647", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:28.103", + "lastModified": "2025-04-09T20:15:28.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Missing Release of Memory after Effective Lifetime vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS).\n\nIn a subscriber management scenario, login/logout activity triggers a memory leak, and the leaked memory gradually increments and eventually results in a\u00a0crash.\u00a0\n\u00a0 \u00a0\n\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003user@host> show chassis fpc\n\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003Temp \u2003\u2003 CPU Utilization (%) \u2003\u2003CPU Utilization (%) \u2003 Memory \u00a0 \u2003\u2003Utilization (%)\n\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003Slot State\u00a0 \u00a0 \u00a0 \u00a0(C) \u2003\u2003\u00a0 Total\u00a0 \u00a0Interrupt \u00a0 \u00a0 1min\u00a0 \u00a05min\u00a0 15min \u2003 \u2003DRAM (MB) \u2003Heap \u00a0 Buffer\n\n\u00a0 \u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u2003\u20032 Online\u00a0 \u00a0 \u00a0 \u00a0 \u00a036 \u00a0 \u2003\u2003\u2003 10 \u00a0 \u00a0 \u00a0 \u00a0 0\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 9 \u00a0 \u00a0 8 \u00a0 \u00a0 9 \u00a0 \u2003\u2003\u2003\u2003\u200332768 \u00a0 \u00a0 \u200326 \u00a0 \u00a0 \u00a0 \u00a0 0\n\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\n\nThis issue affects Junos OS on MX Series: \n * All versions before 21.2R3-S9\n * from 21.4 before 21.4R3-S10\n * from 22.2 before 22.2R3-S6\n * from 22.4 before 22.4R3-S5\n * from 23.2 before 23.2R2-S3\n * from 23.4 before 23.4R2-S3\n * from 24.2 before 24.2R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96457", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30648.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30648.json new file mode 100644 index 00000000000..6f132adec54 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30648.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30648", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:28.300", + "lastModified": "2025-04-09T20:15:28.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Input Validation vulnerability in the\u00a0Juniper DHCP Daemon (jdhcpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause the jdhcpd process to crash resulting in a Denial of Service (DoS).\n\nWhen a specifically malformed DHCP packet is received from a DHCP client, the jdhcpd process crashes, which\u00a0will lead to the unavailability of the DHCP service and thereby resulting in a sustained DoS.\u00a0The DHCP process will restart automatically to recover the service.\n\nThis issue will occur when\u00a0dhcp-security is enabled.\u00a0\nThis issue affects Junos OS:\u00a0\n\n\n\n * All versions before 21.2R3-S9,\u00a0\n * from 21.4 before 21.4R3-S10,\u00a0\n * from 22.2 before 22.2R3-S6,\u00a0\n * from 22.4 before 22.4R3-S6,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S4,\u00a0\n * from 24.2 before 24.2R2;\u00a0\n\n\n\n\nJunos OS Evolved:\u00a0 * from 22.4 before 22.4R3-S6-EVO,\u00a0\n * from 23.2 before 23.2R2-S3-EVO,\u00a0\n * from 23.4 before 23.4R2-S4-EVO,\u00a0\n * from 24.2 before 24.2R2-EVO.\n\n\n\n\n." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96458", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30649.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30649.json new file mode 100644 index 00000000000..772dd58ea03 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30649.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30649", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:28.490", + "lastModified": "2025-04-09T20:15:28.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Input Validation vulnerability in the\u00a0syslog stream TCP transport\u00a0of Juniper Networks Junos OS on MX240, MX480 and MX960 devices with MX-SPC3 Security Services Card allows an unauthenticated, network-based attacker, to send specific spoofed packets to cause a CPU Denial of Service (DoS) to the MX-SPC3 SPUs.\n\nContinued receipt and processing of these specific packets will sustain the DoS condition.\n\nThis issue affects Junos OS: * All versions before 22.2R3-S6,\n * from 22.4 before 22.4R3-S4,\n * from 23.2 before 23.2R2-S3,\n * from 23.4 before 23.4R2-S4,\n * from 24.2 before 24.2R1-S2, 24.2R2\n\n\nAn indicator of compromise will indicate the SPC3 SPUs utilization has spiked.\n\n\nFor example:\u00a0\n\u00a0 \u00a0user@device> show services service-sets summary\n Service sets CPU\n Interface configured Bytes used Session bytes used Policy bytes used utilization\n \"interface\" 1 \"bytes\" (percent%) \"sessions\" (\"percent\"%) \"bytes\" (\"percent\"%) 99.97 % OVLD <<<<<< look for high CPU usage" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Amber", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "YES", + "Recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96459", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30651.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30651.json new file mode 100644 index 00000000000..0c8f1f8140c --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30651.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30651", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:28.687", + "lastModified": "2025-04-09T20:15:28.687", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Buffer Access with Incorrect Length Value vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).\nWhen an attacker sends a specific ICMPv6 packet to an interface with \"protocols router-advertisement\" configured, rpd crashes and restarts. Continued receipt of this packet will cause a sustained DoS condition.\u00a0\n\n\n\n\nThis issue only affects systems configured with IPv6.\n\n\n\nThis issue affects Junos OS:\u00a0\n\n\n * All versions before 21.2R3-S9,\u00a0\n * from 21.4 before 21.4R3-S10, \n * from 22.2 before 22.2R3-S6, \n * from 22.4 before 22.4R3-S4, \n * from 23.2 before 23.2R2-S2, \n * from 23.4 before 23.4R2; \n\n\n\nand Junos OS Evolved: \n * All versions before 21.2R3-S9-EVO, \n * from 21.4-EVO before 21.4R3-S10-EVO, \n * from 22.2-EVO before 22.2R3-S6-EVO, \n * from 22.4-EVO before 22.4R3-S4-EVO, \n * from 23.2-EVO before 23.2R2-S2-EVO, \n * from 23.4-EVO before 23.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-805" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96461", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30652.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30652.json new file mode 100644 index 00000000000..80abc1e961f --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30652.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30652", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:28.873", + "lastModified": "2025-04-09T20:15:28.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Handling of Exceptional Conditions vulnerability in routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker executing a CLI command to cause a Denial of Service (DoS).\n\nWhen\u00a0asregex-optimized is configured and a specific \"show route as-path\"\u00a0CLI command is executed, the rpd crashes and restarts. Repeated execution of this command will cause a sustained DoS condition.\nThis issue affects Junos OS: \n\n\n * All versions before 21.2R3-S9, \n * from 21.4 before 21.4R3-S10, \n * from 22.2 before 22.2R3-S6, \n * from 22.4 before 22.4R3-S6, \n * from 23.2 before 23.2R2-S3, \n * from 23.4 before 23.4R2-S4, \n * from 24.2 before 24.2R2.\n\n\n\nand Junos OS Evolved: \n * All versions before 21.2R3-S9-EVO, \n * from 21.4-EVO before 21.4R3-S10-EVO, \n * from 22.2-EVO before 22.2R3-S6-EVO, \n * from 22.4-EVO before 22.4R3-S6-EVO, \n * from 23.2-EVO before 23.2R2-S3-EVO, \n * from 23.4-EVO before 23.4R2-S4-EVO, \n * from 24.2-EVO before 24.2R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:A/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96462", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30653.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30653.json new file mode 100644 index 00000000000..f48f46da29a --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30653.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30653", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:29.067", + "lastModified": "2025-04-09T20:15:29.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Expired Pointer Dereference vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, adjacent attacker to cause Denial of Service (DoS).On all Junos OS and Junos OS Evolved platforms, when an MPLS Label-Switched Path (LSP) is configured with node-link-protection and transport-class, and an LSP flaps, rpd crashes and restarts. Continuous flapping of LSP can cause a sustained Denial of Service (DoS) condition.\n\nThis issue affects:\n\nJunos OS:\n\n\n\n * All versions before 22.2R3-S4,\n\n * 22.4 versions before 22.4R3-S2,\n\n * 23.2 versions before 23.2R2,\n\n * 23.4 versions before 23.4R2.\n\n\n\n\n\nJunos OS Evolved:\n\n\n\n * All versions before 22.2R3-S4-EVO,\n\n * 22.4-EVO versions before 22.4R3-S2-EVO,\n\n * 23.2-EVO versions before 23.2R2-EVO,\n\n * 23.4-EVO versions before 23.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-825" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96463", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30654.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30654.json new file mode 100644 index 00000000000..d470a9cb877 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30654.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30654", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:29.233", + "lastModified": "2025-04-09T20:15:29.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the User Interface (UI) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged, authenticated attacker with access to the CLI to access sensitive information.\u00a0\n\nThrough the execution of a specific show mgd command, a user with limited permissions (e.g., a low-privileged login class user) can access sensitive information such as hashed passwords,\u00a0that can be used to further impact the system.\n\n\nThis issue affects Junos OS:\u00a0 * All versions before 21.4R3-S10,\n * from 22.2 before 22.2R3-S5,\n * from 22.4 before 22.4R3-S5,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2-S3.\n\n\n\n\n\nJunos OS Evolved:\u00a0\n\n * All versions before 21.4R3-S10-EVO,\n * from 22.2-EVO before 22.2R3-S6-EVO,\u00a0\n * from 22.4-EVO before 22.4R3-S5-EVO,\u00a0\n * from 23.2-EVO before 23.2R2-S3-EVO,\u00a0\n * from 23.4-EVO before 23.4R2-S3-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96464", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30655.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30655.json new file mode 100644 index 00000000000..e51818da6c8 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30655.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30655", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:29.417", + "lastModified": "2025-04-09T20:15:29.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Routing Protocol Daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a local, low-privileged attacker to cause a Denial-of-Service (DoS).\n\nWhen a specific \"show bgp neighbor\" CLI command\u00a0is run, the rpd cpu utilization rises and eventually causes a crash and restart. Repeated use of this command will cause a sustained DoS condition.\u00a0\n\nThe device is only affected if BGP RIB sharding and update-threading is enabled.\nThis issue affects Junos OS:\u00a0\n\n\n\n * All versions before 21.2R3-S9,\u00a0\n * from 21.4 before 21.4R3-S8,\n * from 22.2 before 22.2R3-S6,\u00a0\n * from 22.4 before 22.4R3-S2,\u00a0\n * from 23.2 before 23.2R2-S3,\u00a0\n * from 23.4 before 23.4R2.\n\n\nand Junos OS Evolved:\u00a0\n\n\n\n * All versions before 21.2R3-S9-EVO,\u00a0\n * from 21.4-EVO before 21.4R3-S8-EVO,\u00a0\n * from 22.2-EVO before 22.2R3-S6-EVO,\u00a0\n * from 22.4-EVO before 22.4R3-S2-EVO,\u00a0\n * from 23.2-EVO before 23.2R2-S3-EVO,\u00a0\n * from 23.4-EVO before 23.4R2-EVO." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96465", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30656.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30656.json new file mode 100644 index 00000000000..bb5daa6cf15 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30656.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30656", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:29.577", + "lastModified": "2025-04-09T20:15:29.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Handling of Additional Special Element vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on MX Series with MS-MPC, MS-MIC and SPC3, and SRX Series, allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nIf the SIP ALG processes specifically formatted SIP invites, a memory corruption will occur which will lead to a crash of the FPC processing these packets. Although the system will automatically recover with the restart of the FPC, subsequent SIP invites will cause the crash again and lead to a sustained DoS.\n\n\n\n\nThis issue affects Junos OS on MX Series and SRX Series:\u00a0\n\n * all versions before 21.2R3-S9,\n * 21.4 versions before 21.4R3-S10,\n * 22.2 versions before 22.2R3-S6,\n * 22.4 versions before 22.4R3-S5,\n * 23.2 versions before 23.2R2-S3,\n * 23.4 versions before 23.4R2-S3,\n * 24.2 versions before 24.2R1-S2, 24.2R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:M/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "YES", + "Recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-167" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96466", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30657.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30657.json new file mode 100644 index 00000000000..cd872cc6b26 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30657.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30657", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:29.763", + "lastModified": "2025-04-09T20:15:29.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Encoding or Escaping of Output vulnerability in the Sampling Route Record Daemon (SRRD) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nWhen a device configured for flow-monitoring receives a specific BGP update message, it is correctly processed internally by the routing protocol daemon (rpd), but when it's sent to SRRD it's encoded incorrectly which leads to a crash and momentary interruption of jflow processing until it automatically restarts. This issue does not affect traffic forwarding itself.\nThis issue affects Junos OS:\u00a0\n\n\n\n * All versions before 21.2R3-S9,\n * 21.4 versions before 21.4R3-S10,\n * 22.2 versions before 22.2R3-S6,\n * 22.4 versions before 22.4R3,\n * 23.2 versions before 23.2R1-S2, 23.2R2.\n\n\n\nThis issue does not affected Junos OS Evolved." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:M/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "YES", + "Recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96467", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30658.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30658.json new file mode 100644 index 00000000000..349affb9221 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30658.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30658", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:29.943", + "lastModified": "2025-04-09T20:15:29.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Missing Release of Memory after Effective Lifetime vulnerability in the Anti-Virus processing of Juniper Networks Junos OS on SRX Series \n\nallows an unauthenticated, network-based attacker\u00a0to cause a Denial-of-Service (DoS).\n\nOn all SRX platforms with Anti-Virus enabled, if a server sends specific content in the HTTP body of a response to a client request, these packets are queued by Anti-Virus processing in Juniper Buffers (jbufs) which are never released. When these jbufs are exhausted, the device stops forwarding all transit traffic.\n\nA jbuf memory leak can be noticed from the following logs:\n\n(.) Warning: jbuf pool id <#> utilization level (%) is above %!\n\nTo recover from this issue, the affected device needs to be manually rebooted to free the leaked jbufs.\n\n\n\n\nThis issue affects Junos OS on SRX Series:\u00a0\n\n * all versions before 21.2R3-S9,\n * 21.4 versions before 21.4R3-S10,\n * 22.2 versions before 22.2R3-S6,\n * 22.4 versions before 22.4R3-S6,\n * 23.2 versions before 23.2R2-S3,\n * 23.4 versions before 23.4R2-S3,\n * 24.2 versions before 24.2R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "YES", + "Recovery": "USER", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96469", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30659.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30659.json new file mode 100644 index 00000000000..089836b0328 --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30659.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30659", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:30.130", + "lastModified": "2025-04-09T20:15:30.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Handling of Length Parameter Inconsistency vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).\n\nWhen a device configured for Secure Vector Routing (SVR) receives a specifically malformed packet the PFE will crash and restart.\nThis issue affects Junos OS on SRX Series:\n\n\n\n * All 21.4 versions,\n * 22.2 versions before 22.2R3-S6,\n * 22.4 versions before 22.4R3-S6,\n * 23.2 versions before 23.2R2-S3,\n * 23.4 versions before 23.4R2-S4,\n * 24.2 versions before 24.2R2.\n\n\n\n\nThis issue does not affect versions before 21.4." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:M/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "YES", + "Recovery": "AUTOMATIC", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-130" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96470", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30660.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30660.json new file mode 100644 index 00000000000..3b20265912d --- /dev/null +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30660.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-30660", + "sourceIdentifier": "sirt@juniper.net", + "published": "2025-04-09T20:15:30.307", + "lastModified": "2025-04-09T20:15:30.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).When processing a high rate of specific GRE traffic destined to the device, the respective PFE will hang causing traffic forwarding to stop. \n\n\n\nWhen this issue occurs the following logs can be observed:\n\n MQSS(0): LI-3: Received a parcel with more than 512B\u00a0accompanying data \nCHASSISD_FPC_ASIC_ERROR: ASIC Error detected <...>\n\n\nThis issue affects Junos OS:\n\n * all versions before 21.2R3-S9,\n * 21.4 versions before 21.4R3-S8,\n * 22.2 versions before 22.2R3-S4,\n * 22.4 versions before 22.4R3-S5,\n * 23.2 versions before 23.2R2-S2,\n * 23.4 versions before 23.4R2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@juniper.net", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:X/V:X/RE:M/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "YES", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "sirt@juniper.net", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://supportportal.juniper.net/JSA96471", + "source": "sirt@juniper.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-306xx/CVE-2025-30677.json b/CVE-2025/CVE-2025-306xx/CVE-2025-30677.json index c29e75fc9ca..e59358f54b8 100644 --- a/CVE-2025/CVE-2025-306xx/CVE-2025-30677.json +++ b/CVE-2025/CVE-2025-306xx/CVE-2025-30677.json @@ -2,8 +2,8 @@ "id": "CVE-2025-30677", "sourceIdentifier": "security@apache.org", "published": "2025-04-09T12:15:15.363", - "lastModified": "2025-04-09T16:15:24.650", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31002.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31002.json index 1e3fb9a99eb..f2281e14b91 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31002.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31002.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31002", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:32.623", - "lastModified": "2025-04-09T17:15:32.623", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31003.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31003.json index c36f32b4ec6..4b93b2aaab5 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31003.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31003.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31003", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:32.817", - "lastModified": "2025-04-09T17:15:32.817", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31004.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31004.json index 5410c3ce62b..50e7f6bbe09 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31004.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31004.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31004", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:33.027", - "lastModified": "2025-04-09T17:15:33.027", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31005.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31005.json index 89345dfa0bb..70972cc4663 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31005.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31005.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31005", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:33.233", - "lastModified": "2025-04-09T17:15:33.233", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31008.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31008.json index cf6369ce977..760fe7a8d7e 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31008.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31008.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31008", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:33.440", - "lastModified": "2025-04-09T17:15:33.440", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31009.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31009.json index 7d6acdd95b3..b31031eb9d6 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31009.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31009.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31009", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:33.637", - "lastModified": "2025-04-09T17:15:33.637", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31012.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31012.json index 4ec963c2c8c..914ba011ef1 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31012.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31012.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31012", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:33.830", - "lastModified": "2025-04-09T17:15:33.830", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31017.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31017.json index 8e7b3ab2fd0..3eb179300b8 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31017.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31017.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31017", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:34.047", - "lastModified": "2025-04-09T17:15:34.047", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31020.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31020.json index 3e0bb0ce020..1bf0a105316 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31020.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31020.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31020", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:34.273", - "lastModified": "2025-04-09T17:15:34.273", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31023.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31023.json index 3dfcbe852e8..aafd9fd2acb 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31023.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31023.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31023", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:34.490", - "lastModified": "2025-04-09T17:15:34.490", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31026.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31026.json index 3dbf853f8de..ad2fc18384e 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31026.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31026.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31026", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:34.693", - "lastModified": "2025-04-09T17:15:34.693", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31032.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31032.json index 8b30936bf8d..71416f0733a 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31032.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31032.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31032", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:34.900", - "lastModified": "2025-04-09T17:15:34.900", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31033.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31033.json index 2c26eca6a4c..c0c808a1734 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31033.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31033.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31033", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:35.083", - "lastModified": "2025-04-09T17:15:35.083", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31034.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31034.json index 2b65182d13a..631baa44864 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31034.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31034.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31034", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:35.283", - "lastModified": "2025-04-09T17:15:35.283", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31035.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31035.json index a7f32b6d733..94ec1b9dda1 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31035.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31035.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31035", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:35.470", - "lastModified": "2025-04-09T17:15:35.470", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31036.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31036.json index 912a01c48fb..0ae94e700b3 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31036.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31036.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31036", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:35.660", - "lastModified": "2025-04-09T17:15:35.660", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31038.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31038.json index c5930b784a7..654497d2277 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31038.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31038.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31038", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:35.840", - "lastModified": "2025-04-09T17:15:35.840", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-310xx/CVE-2025-31042.json b/CVE-2025/CVE-2025-310xx/CVE-2025-31042.json index 1291c242b5d..27dcb695b62 100644 --- a/CVE-2025/CVE-2025-310xx/CVE-2025-31042.json +++ b/CVE-2025/CVE-2025-310xx/CVE-2025-31042.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31042", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:36.027", - "lastModified": "2025-04-09T17:15:36.027", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31375.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31375.json index d7b02a170ef..2721a05d8cc 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31375.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31375.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31375", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:36.227", - "lastModified": "2025-04-09T17:15:36.227", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31377.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31377.json index 72e0df4b94c..b78e628f48c 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31377.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31377.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31377", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:36.540", - "lastModified": "2025-04-09T17:15:36.540", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31382.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31382.json index 5134335aaff..1da4cbc0c8a 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31382.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31382.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31382", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:36.743", - "lastModified": "2025-04-09T17:15:36.743", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31383.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31383.json index 399cab8aa5e..de4e127c93f 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31383.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31383.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31383", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:36.940", - "lastModified": "2025-04-09T17:15:36.940", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31385.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31385.json index 3bda90b05a6..cd953d4b068 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31385.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31385.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31385", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:37.127", - "lastModified": "2025-04-09T17:15:37.127", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31388.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31388.json index f64a387d649..abf460a6379 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31388.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31388.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31388", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:37.363", - "lastModified": "2025-04-09T17:15:37.363", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31390.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31390.json index a8bd801819d..51a4f7a3ccf 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31390.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31390.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31390", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:37.543", - "lastModified": "2025-04-09T17:15:37.543", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31391.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31391.json index c7e6885c05d..8845f07e352 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31391.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31391.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31391", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:37.743", - "lastModified": "2025-04-09T17:15:37.743", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31392.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31392.json index 83a922c48d3..2fdf0aa011b 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31392.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31392.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31392", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:37.943", - "lastModified": "2025-04-09T17:15:37.943", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31393.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31393.json index 5a2397c516c..58c903347bd 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31393.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31393.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31393", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:38.130", - "lastModified": "2025-04-09T17:15:38.130", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31394.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31394.json index 43b23914742..03a28f6fdc9 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31394.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31394.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31394", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:38.303", - "lastModified": "2025-04-09T17:15:38.303", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31395.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31395.json index 1d9e1a908d6..08aa2733809 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31395.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31395.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31395", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:38.500", - "lastModified": "2025-04-09T17:15:38.500", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31399.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31399.json index 4284f315bd0..503e94e8684 100644 --- a/CVE-2025/CVE-2025-313xx/CVE-2025-31399.json +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31399.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31399", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:38.683", - "lastModified": "2025-04-09T17:15:38.683", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31400.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31400.json index 68e518347b3..5ce64a7b17e 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31400.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31400.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31400", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:38.867", - "lastModified": "2025-04-09T17:15:38.867", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31401.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31401.json index 45db371bfc8..5e4793c9549 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31401.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31401.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31401", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:39.050", - "lastModified": "2025-04-09T17:15:39.050", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31402.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31402.json index 541b993d5a6..c56a486ad50 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31402.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31402.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31402", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:39.243", - "lastModified": "2025-04-09T17:15:39.243", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31404.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31404.json index 367c6620fae..8788074a936 100644 --- a/CVE-2025/CVE-2025-314xx/CVE-2025-31404.json +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31404.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31404", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:39.423", - "lastModified": "2025-04-09T17:15:39.423", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-316xx/CVE-2025-31672.json b/CVE-2025/CVE-2025-316xx/CVE-2025-31672.json index 4ed311910e7..71e25219b5b 100644 --- a/CVE-2025/CVE-2025-316xx/CVE-2025-31672.json +++ b/CVE-2025/CVE-2025-316xx/CVE-2025-31672.json @@ -2,8 +2,8 @@ "id": "CVE-2025-31672", "sourceIdentifier": "security@apache.org", "published": "2025-04-09T12:15:15.563", - "lastModified": "2025-04-09T13:15:42.523", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3100.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3100.json index a86f108ef4a..f58f141d684 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3100.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3100.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3100", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-09T05:15:43.253", - "lastModified": "2025-04-09T05:15:43.253", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.6.22 due to insufficient input sanitization and output escaping in tasks discussion. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an Administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento WP Project Manager \u2013 Task, team, and project management plugin featuring kanban board and gantt charts para WordPress, es vulnerable a Cross-Site Scripting almacenado al subir archivos SVG en todas las versiones hasta la 2.6.22 incluida, debido a una depuraci\u00f3n de entrada insuficiente y al escape de salida en la discusi\u00f3n de tareas. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, y permisos otorgados por un administrador, inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario al archivo SVG." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json index a3803844a7d..740aee83b1b 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3114.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3114", "sourceIdentifier": "security@tibco.com", "published": "2025-04-09T18:15:50.643", - "lastModified": "2025-04-09T18:15:50.643", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3115.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3115.json index 71f368b35d6..6d44eae80e0 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3115.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3115.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3115", "sourceIdentifier": "security@tibco.com", "published": "2025-04-09T18:15:50.813", - "lastModified": "2025-04-09T19:15:49.843", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3119.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3119.json index 589215af296..dd7a711b477 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3119.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3119.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3119", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-02T22:15:20.867", - "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-09T20:29:51.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_tutor_portal:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8E03C7DC-A869-4450-A334-0DBCE3EF6A07" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/byxs0x0/SQL/blob/main/SQL4.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303010", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303010", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.524990", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/byxs0x0/SQL/blob/main/SQL4.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3131.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3131.json index 78c6633ec36..760a4bf5e9e 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3131.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3131.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3131", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-04-09T18:15:50.950", - "lastModified": "2025-04-09T19:15:50.027", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3137.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3137.json index e7c7fb87e3c..0ce81f76c13 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3137.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3137.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3137", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T04:15:39.307", - "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-09T20:28:56.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,84 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_security_guards_hiring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE6AB150-084E-4174-B203-5EE2A0E8C45A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ARPANET-cybersecurity/vuldb/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.303042", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303042", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.525264", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/ARPANET-cybersecurity/vuldb/issues/2", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3138.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3138.json index a16e176d1e9..5141d0d3062 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3138.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3138.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3138", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T04:15:39.733", - "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-09T20:17:06.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:online_security_guards_hiring_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE6AB150-084E-4174-B203-5EE2A0E8C45A" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/ARPANET-cybersecurity/vuldb/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.303043", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303043", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.525265", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/ARPANET-cybersecurity/vuldb/issues/3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3140.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3140.json index b7cc323ddaf..141901321b7 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3140.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3140.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3140", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T05:15:40.777", - "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-09T20:15:21.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_medicine_ordering_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA8DED5-CD2F-4667-A647-F56E5E0E5FC7" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Lena-lyy/SQL/blob/main/SQL1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303045", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303045", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.525308", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Lena-lyy/SQL/blob/main/SQL1.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3141.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3141.json index 0f5a0a04211..236e234f439 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3141.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3141.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3141", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-03T05:15:42.363", - "lastModified": "2025-04-07T14:18:34.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-09T20:08:13.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,32 +142,82 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_medicine_ordering_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA8DED5-CD2F-4667-A647-F56E5E0E5FC7" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Lena-lyy/SQL/blob/main/SQL2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303046", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303046", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.525309", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Lena-lyy/SQL/blob/main/SQL2.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32016.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32016.json index f9ccb0cd21b..2911c271a84 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32016.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32016.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32016", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-09T16:15:24.770", - "lastModified": "2025-04-09T16:15:24.770", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32035.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32035.json index 11f5d7a9a37..4d0a0258f85 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32035.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32035.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32035", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T18:16:08.597", - "lastModified": "2025-04-08T18:16:08.597", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 9.13.2, when uploading files (e.g. when uploading assets), the file extension is checked to see if it's an allowed file type but the actual contents of the file aren't checked. This means that it's possible to e.g. upload an executable file renamed to be a .jpg. This file could then be executed by another security vulnerability. This vulnerability is fixed in 9.13.2." + }, + { + "lang": "es", + "value": "DNN (anteriormente DotNetNuke) es una plataforma de gesti\u00f3n de contenido web (CMS) de c\u00f3digo abierto del ecosistema de Microsoft. Antes de la versi\u00f3n 9.13.2, al subir archivos (por ejemplo, al subir recursos), se comprobaba la extensi\u00f3n del archivo para ver si era un tipo permitido, pero no su contenido. Esto significa que es posible, por ejemplo, subir un archivo ejecutable renombrado a .jpg. Este archivo podr\u00eda ser ejecutado por otra vulnerabilidad de seguridad. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 9.13.2." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-320xx/CVE-2025-32036.json b/CVE-2025/CVE-2025-320xx/CVE-2025-32036.json index 8dd2a833859..4f29c9acb45 100644 --- a/CVE-2025/CVE-2025-320xx/CVE-2025-32036.json +++ b/CVE-2025/CVE-2025-320xx/CVE-2025-32036.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32036", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-08T18:16:08.750", - "lastModified": "2025-04-08T18:16:08.750", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:03:01.577", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. The algorithm used to generate the captcha image shows the least complexity of the desired image. For this reason, the created image can be easily read by OCR tools, and the intruder can send automatic requests by building a robot and using this tool. This vulnerability is fixed in 9.13.8." + }, + { + "lang": "es", + "value": "DNN (anteriormente DotNetNuke) es una plataforma de gesti\u00f3n de contenido web (CMS) de c\u00f3digo abierto del ecosistema de Microsoft. El algoritmo utilizado para generar la imagen captcha muestra la menor complejidad de la imagen deseada. Por ello, la imagen creada puede ser f\u00e1cilmente le\u00edda por herramientas de OCR, y el intruso puede enviar solicitudes autom\u00e1ticas creando un robot y utilizando esta herramienta. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 9.13.8." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32371.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32371.json index 5cb91410152..88f8166ef83 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32371.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32371.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32371", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-09T16:15:24.933", - "lastModified": "2025-04-09T16:15:24.933", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32372.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32372.json index 3aa7cc995f8..15f1449d419 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32372.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32372.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32372", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-09T16:15:25.103", - "lastModified": "2025-04-09T16:15:25.103", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32373.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32373.json index 93f5cc3a8f7..3405e792eb6 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32373.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32373.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32373", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-09T16:15:25.250", - "lastModified": "2025-04-09T16:15:25.250", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32374.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32374.json index 7a272602c75..1845f706c0f 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32374.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32374.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32374", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-09T16:15:25.410", - "lastModified": "2025-04-09T16:15:25.410", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32375.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32375.json index 5a50ca2fdb3..d252f2032a2 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32375.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32375.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32375", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-09T16:15:25.580", - "lastModified": "2025-04-09T16:15:25.580", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32378.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32378.json index 2ab7e1a0964..e6653dbdc51 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32378.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32378.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32378", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-09T16:15:25.740", - "lastModified": "2025-04-09T16:15:25.740", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32379.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32379.json index 0297b771394..a3239f3f241 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32379.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32379.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32379", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-09T16:15:25.903", - "lastModified": "2025-04-09T16:15:25.903", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32380.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32380.json index ddaf5be62c2..64f3862ef98 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32380.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32380.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32380", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-09T16:15:26.053", - "lastModified": "2025-04-09T16:15:26.053", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32381.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32381.json index 6136dd0f777..8ab73b54121 100644 --- a/CVE-2025/CVE-2025-323xx/CVE-2025-32381.json +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32381.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32381", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-09T16:15:26.210", - "lastModified": "2025-04-09T16:15:26.210", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32460.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32460.json index 66507203c90..0a880f91127 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32460.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32460.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32460", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-09T02:15:15.137", - "lastModified": "2025-04-09T02:15:15.137", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "GraphicsMagick before 8e56520 has a heap-based buffer over-read in ReadJXLImage in coders/jxl.c, related to an ImportViewPixelArea call." + }, + { + "lang": "es", + "value": "GraphicsMagick anterior a 8e56520 tiene una sobrelectura de b\u00fafer basada en mont\u00f3n en ReadJXLImage en coders/jxl.c, relacionada con una llamada ImportViewPixelArea." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32461.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32461.json index 4c8057b46a2..86f586d5882 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32461.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32461.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32461", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-09T02:15:16.253", - "lastModified": "2025-04-09T02:15:16.253", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in Tiki before 28.3 mishandles input to an eval. The fixed versions are 21.12, 24.8, 27.2, and 28.3." + }, + { + "lang": "es", + "value": "En Tiki, el wikiplugin_includetpl en lib/wiki-plugins/wikiplugin_includetpl.php antes de la versi\u00f3n 28.3 gestiona incorrectamente la entrada a una evaluaci\u00f3n. Las versiones corregidas son 21.12, 24.8, 27.2 y 28.3." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32464.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32464.json index d43f3d2ec84..1363968e9f9 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32464.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32464.json @@ -2,13 +2,17 @@ "id": "CVE-2025-32464", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-09T03:15:16.847", - "lastModified": "2025-04-09T03:15:16.847", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one." + }, + { + "lang": "es", + "value": "HAProxy 2.2 a 3.1.6, en ciertas configuraciones poco comunes, tiene un desbordamiento de b\u00fafer basado en el mont\u00f3n sample_conv_regsub debido a la gesti\u00f3n incorrecta del reemplazo de m\u00faltiples patrones cortos por uno m\u00e1s largo." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32476.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32476.json index d57dd2f0ede..55ac6ff7cfd 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32476.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32476.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32476", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:39.607", - "lastModified": "2025-04-09T17:15:39.607", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32477.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32477.json index d6ddff59533..4048d74dbd8 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32477.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32477.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32477", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:39.813", - "lastModified": "2025-04-09T17:15:39.813", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32478.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32478.json index f540c7bd206..d3dfa2c155c 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32478.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32478.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32478", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:40.037", - "lastModified": "2025-04-09T17:15:40.037", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32479.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32479.json index 9cae7d7c276..776b5c55fc8 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32479.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32479.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32479", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:40.240", - "lastModified": "2025-04-09T17:15:40.240", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32480.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32480.json index 511c49c73c2..88a9ff1f885 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32480.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32480.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32480", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:40.433", - "lastModified": "2025-04-09T17:15:40.433", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32481.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32481.json index 30aae1a1dfc..bce029e8018 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32481.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32481.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32481", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:40.617", - "lastModified": "2025-04-09T17:15:40.617", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32482.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32482.json index b5f463e53a0..8d43b41b23e 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32482.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32482.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32482", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:40.807", - "lastModified": "2025-04-09T17:15:40.807", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32483.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32483.json index f19befd966c..172ed244b30 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32483.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32483.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32483", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:41.000", - "lastModified": "2025-04-09T17:15:41.000", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32484.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32484.json index 9c57b645094..c31fe9865ce 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32484.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32484.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32484", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:41.183", - "lastModified": "2025-04-09T17:15:41.183", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32485.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32485.json index d91585a3262..d414ab355db 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32485.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32485.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32485", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:41.370", - "lastModified": "2025-04-09T17:15:41.370", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32487.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32487.json index 43f901de893..3ef289df178 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32487.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32487.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32487", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:41.550", - "lastModified": "2025-04-09T17:15:41.550", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32488.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32488.json index bd8dbe4475a..fd1ee4b975a 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32488.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32488.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32488", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:41.737", - "lastModified": "2025-04-09T17:15:41.737", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32489.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32489.json index fe42411cb94..5ea703bb142 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32489.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32489.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32489", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:41.920", - "lastModified": "2025-04-09T17:15:41.920", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32492.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32492.json index ce94fbfe0cb..1b44f92c695 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32492.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32492.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32492", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:42.100", - "lastModified": "2025-04-09T17:15:42.100", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32493.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32493.json index d18663f5694..65de8f7f1ce 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32493.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32493.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32493", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:42.303", - "lastModified": "2025-04-09T17:15:42.303", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32494.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32494.json index 49a798f0318..bdc69f57018 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32494.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32494.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32494", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:42.500", - "lastModified": "2025-04-09T17:15:42.500", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32495.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32495.json index 5fae4ba639b..bd1c0c000ed 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32495.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32495.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32495", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:42.667", - "lastModified": "2025-04-09T17:15:42.667", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32496.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32496.json index f0d6cc2b801..3b169cd8b6c 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32496.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32496.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32496", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:42.850", - "lastModified": "2025-04-09T17:15:42.850", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32497.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32497.json index eb210eee36f..e1080fd7dd5 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32497.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32497.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32497", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:43.070", - "lastModified": "2025-04-09T17:15:43.070", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32498.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32498.json index cad79894add..976ca98f922 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32498.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32498.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32498", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:43.263", - "lastModified": "2025-04-09T17:15:43.263", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-324xx/CVE-2025-32499.json b/CVE-2025/CVE-2025-324xx/CVE-2025-32499.json index eb00ae0434e..bf34f2ae55e 100644 --- a/CVE-2025/CVE-2025-324xx/CVE-2025-32499.json +++ b/CVE-2025/CVE-2025-324xx/CVE-2025-32499.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32499", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:43.440", - "lastModified": "2025-04-09T17:15:43.440", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32500.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32500.json index e3c9c8325e0..dee9e7d0c1c 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32500.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32500.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32500", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:43.630", - "lastModified": "2025-04-09T17:15:43.630", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32501.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32501.json index 006057a9b92..7ce8a1983a5 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32501.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32501.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32501", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:43.820", - "lastModified": "2025-04-09T17:15:43.820", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32502.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32502.json index 1fc1bf0ba2e..1ef24d2f3d2 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32502.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32502.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32502", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:44.010", - "lastModified": "2025-04-09T17:15:44.010", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32503.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32503.json index ce46d9e4979..0bece907e61 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32503.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32503.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32503", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:44.187", - "lastModified": "2025-04-09T17:15:44.187", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32505.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32505.json index b97d0c2863e..38e87957cff 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32505.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32505.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32505", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:44.383", - "lastModified": "2025-04-09T17:15:44.383", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32518.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32518.json index e53ecdc9ab5..4d969f30647 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32518.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32518.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32518", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:44.557", - "lastModified": "2025-04-09T17:15:44.557", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32543.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32543.json index df1d786e77d..98670909f2e 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32543.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32543.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32543", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:44.733", - "lastModified": "2025-04-09T17:15:44.733", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32547.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32547.json index 602c67f98f1..d68592c5fd2 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32547.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32547.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32547", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:44.930", - "lastModified": "2025-04-09T17:15:44.930", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32550.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32550.json index cc0ae221a01..ba142a66a7b 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32550.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32550.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32550", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:45.120", - "lastModified": "2025-04-09T17:15:45.120", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32555.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32555.json index d6c6a5306fc..f3e3df29ffa 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32555.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32555.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32555", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:45.317", - "lastModified": "2025-04-09T17:15:45.317", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32556.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32556.json index 5236c97ad0c..ab1be77c05d 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32556.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32556.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32556", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:45.593", - "lastModified": "2025-04-09T17:15:45.593", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32559.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32559.json index e09e0207963..52ac1dd3f94 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32559.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32559.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32559", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:45.827", - "lastModified": "2025-04-09T17:15:45.827", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32563.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32563.json index d5e07ee3676..1385b7072e7 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32563.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32563.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32563", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:46.030", - "lastModified": "2025-04-09T17:15:46.030", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32570.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32570.json index 3a222ff794f..322d3e6d9dd 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32570.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32570.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32570", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:46.237", - "lastModified": "2025-04-09T17:15:46.237", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32575.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32575.json index acef5629379..a4a51aeb0a2 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32575.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32575.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32575", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:46.423", - "lastModified": "2025-04-09T17:15:46.423", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32576.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32576.json index c04d05d79c1..0d781424aec 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32576.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32576.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32576", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:46.643", - "lastModified": "2025-04-09T17:15:46.643", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32580.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32580.json index c50f7720705..f1afe53d781 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32580.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32580.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32580", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:46.860", - "lastModified": "2025-04-09T17:15:46.860", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32581.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32581.json index 39f268af20d..dc60413c408 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32581.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32581.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32581", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:47.073", - "lastModified": "2025-04-09T17:15:47.073", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32584.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32584.json index e072fce1bb9..ae93d3f30a0 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32584.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32584.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32584", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:47.270", - "lastModified": "2025-04-09T17:15:47.270", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32591.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32591.json index a12db3d7ccf..e36d94694f7 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32591.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32591.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32591", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:47.510", - "lastModified": "2025-04-09T17:15:47.510", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-325xx/CVE-2025-32597.json b/CVE-2025/CVE-2025-325xx/CVE-2025-32597.json index 0e9fded0824..fe17cee3fa1 100644 --- a/CVE-2025/CVE-2025-325xx/CVE-2025-32597.json +++ b/CVE-2025/CVE-2025-325xx/CVE-2025-32597.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32597", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:47.690", - "lastModified": "2025-04-09T17:15:47.690", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32610.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32610.json index 7d0776d0730..c0820c52306 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32610.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32610.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32610", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:47.883", - "lastModified": "2025-04-09T17:15:47.883", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32612.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32612.json index 30a6aac9e06..49ff9b26135 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32612.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32612.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32612", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:48.070", - "lastModified": "2025-04-09T17:15:48.070", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32616.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32616.json index e3a87416fd9..0c0de0e9e8a 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32616.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32616.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32616", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:48.263", - "lastModified": "2025-04-09T17:15:48.263", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32617.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32617.json index 025c66f2d2f..6be0283f8e5 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32617.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32617.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32617", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:48.447", - "lastModified": "2025-04-09T17:15:48.447", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32619.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32619.json index 2ed6af31acb..f378a49accb 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32619.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32619.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32619", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:48.630", - "lastModified": "2025-04-09T17:15:48.630", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32621.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32621.json index 79f2e2d3930..086bd23c2f5 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32621.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32621.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32621", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:48.813", - "lastModified": "2025-04-09T17:15:48.813", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32623.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32623.json index 8eb5354b295..4d160ce45d1 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32623.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32623.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32623", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:49.000", - "lastModified": "2025-04-09T17:15:49.000", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32624.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32624.json index 2fa48758f6f..72d55b47d9d 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32624.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32624.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32624", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:49.170", - "lastModified": "2025-04-09T17:15:49.170", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32640.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32640.json index 79bf0f8eb99..786e45f6314 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32640.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32640.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32640", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:49.360", - "lastModified": "2025-04-09T17:15:49.360", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32641.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32641.json index 8391f8e56b9..351192fe00c 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32641.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32641.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32641", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:49.540", - "lastModified": "2025-04-09T17:15:49.540", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32642.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32642.json index 2149d9c8306..9990aa6a8ad 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32642.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32642.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32642", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:49.727", - "lastModified": "2025-04-09T17:15:49.727", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32644.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32644.json index 4d5c5d61183..b70b922d432 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32644.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32644.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32644", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:49.917", - "lastModified": "2025-04-09T17:15:49.917", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32645.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32645.json index a89fd4a5f34..32f64d8af89 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32645.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32645.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32645", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:50.120", - "lastModified": "2025-04-09T17:15:50.120", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32659.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32659.json index 941c22643c6..f5be104393f 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32659.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32659.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32659", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:50.317", - "lastModified": "2025-04-09T17:15:50.317", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32661.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32661.json index 26e1dc53f46..7e161445958 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32661.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32661.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32661", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:50.493", - "lastModified": "2025-04-09T17:15:50.493", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32664.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32664.json index 643f6c903fc..a12676dd2e4 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32664.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32664.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32664", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:50.660", - "lastModified": "2025-04-09T17:15:50.660", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32667.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32667.json index 9881dd59b47..e9260e63406 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32667.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32667.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32667", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:50.843", - "lastModified": "2025-04-09T17:15:50.843", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32669.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32669.json index 29b3c01fc22..79bf3a5dc1d 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32669.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32669.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32669", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:51.023", - "lastModified": "2025-04-09T17:15:51.023", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32673.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32673.json index 613cf4c9de4..f3b49511c49 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32673.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32673.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32673", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:51.200", - "lastModified": "2025-04-09T17:15:51.200", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32675.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32675.json index 4c996725bba..0cecc233e78 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32675.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32675.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32675", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:51.383", - "lastModified": "2025-04-09T17:15:51.383", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32676.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32676.json index 4816c2a22ac..c0774159c1a 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32676.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32676.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32676", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:51.560", - "lastModified": "2025-04-09T17:15:51.560", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32677.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32677.json index 1a920ba4bbe..59fb36b4761 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32677.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32677.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32677", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:51.730", - "lastModified": "2025-04-09T17:15:51.730", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32678.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32678.json index 300ebbf6cfc..ef8a646574d 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32678.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32678.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32678", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:51.913", - "lastModified": "2025-04-09T17:15:51.913", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32679.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32679.json index 9afa5bab788..fa53bacb526 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32679.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32679.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32679", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:52.090", - "lastModified": "2025-04-09T17:15:52.090", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32680.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32680.json index 62b5c98003f..e1f68e73db4 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32680.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32680.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32680", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:52.283", - "lastModified": "2025-04-09T17:15:52.283", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32683.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32683.json index 8a94eca2b1a..3ae2e06d07f 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32683.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32683.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32683", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:52.467", - "lastModified": "2025-04-09T17:15:52.467", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32684.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32684.json index 0e69be3d4db..8cc05db198e 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32684.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32684.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32684", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:52.640", - "lastModified": "2025-04-09T17:15:52.640", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32685.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32685.json index 666e4962432..ceaf0de29b6 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32685.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32685.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32685", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:52.817", - "lastModified": "2025-04-09T17:15:52.817", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32690.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32690.json index 0eef14477a3..ae57d9369d4 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32690.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32690.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32690", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:53.010", - "lastModified": "2025-04-09T17:15:53.010", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32691.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32691.json index 586a75b9213..057f8eecf4b 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32691.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32691.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32691", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:53.190", - "lastModified": "2025-04-09T17:15:53.190", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32692.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32692.json index ce429020193..154f14708a4 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32692.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32692.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32692", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:53.370", - "lastModified": "2025-04-09T17:15:53.370", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32693.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32693.json index de340f01676..d9a565e05e5 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32693.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32693.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32693", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:53.540", - "lastModified": "2025-04-09T17:15:53.540", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32694.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32694.json index 8fb4fa97eaf..2ee668ae880 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32694.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32694.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32694", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:53.700", - "lastModified": "2025-04-09T17:15:53.700", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-326xx/CVE-2025-32695.json b/CVE-2025/CVE-2025-326xx/CVE-2025-32695.json index 67c77592f62..a12ac0cdf3d 100644 --- a/CVE-2025/CVE-2025-326xx/CVE-2025-32695.json +++ b/CVE-2025/CVE-2025-326xx/CVE-2025-32695.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32695", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-09T17:15:53.877", - "lastModified": "2025-04-09T17:15:53.877", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3416.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3416.json index db60adeca2d..4bfa6f42b77 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3416.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3416.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3416", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-08T19:15:53.717", - "lastModified": "2025-04-08T19:15:53.717", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in OpenSSL's handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una falla en el gestionamiento del argumento de propiedades por parte de OpenSSL en ciertas funciones. Esta vulnerabilidad puede permitir la explotaci\u00f3n de la funci\u00f3n \"use after free\", lo que puede resultar en un comportamiento indefinido o un an\u00e1lisis incorrecto de las propiedades, lo que hace que OpenSSL trate la entrada como una cadena vac\u00eda." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3442.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3442.json index eb1c05f7694..0e6ca5792a0 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3442.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3442.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3442", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2025-04-09T07:15:41.210", - "lastModified": "2025-04-09T07:15:41.210", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability exists in TP-Link Tapo\u00a0H200 V1 IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad existe en el Smart Hub IoT TP-Link Tapo H200 V1 debido al almacenamiento de credenciales Wi-Fi en texto plano dentro del firmware del dispositivo. Un atacante con acceso f\u00edsico podr\u00eda explotar esto extrayendo el firmware y analizando los datos binarios para obtener las credenciales Wi-Fi almacenadas en el dispositivo vulnerable." } ], "metrics": { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3474.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3474.json index 5239fb39d09..5e704dfde4a 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3474.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3474.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3474", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-04-09T18:15:51.060", - "lastModified": "2025-04-09T19:15:50.547", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3475.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3475.json index e2036d33007..0ec13dbb1b8 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3475.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3475.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3475", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-04-09T18:15:51.170", - "lastModified": "2025-04-09T19:15:50.710", - "vulnStatus": "Received", + "lastModified": "2025-04-09T20:02:41.860", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index 65e5134b871..ab1e525b1c5 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-09T20:00:20.918230+00:00 +2025-04-09T22:00:20.581060+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-09T19:15:50.710000+00:00 +2025-04-09T21:16:25.913000+00:00 ``` ### Last Data Feed Release @@ -33,51 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -289417 +289445 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `28` -- [CVE-2025-2629](CVE-2025/CVE-2025-26xx/CVE-2025-2629.json) (`2025-04-09T19:15:48.320`) -- [CVE-2025-2630](CVE-2025/CVE-2025-26xx/CVE-2025-2630.json) (`2025-04-09T19:15:48.490`) -- [CVE-2025-3114](CVE-2025/CVE-2025-31xx/CVE-2025-3114.json) (`2025-04-09T18:15:50.643`) -- [CVE-2025-3115](CVE-2025/CVE-2025-31xx/CVE-2025-3115.json) (`2025-04-09T18:15:50.813`) -- [CVE-2025-3131](CVE-2025/CVE-2025-31xx/CVE-2025-3131.json) (`2025-04-09T18:15:50.950`) -- [CVE-2025-3474](CVE-2025/CVE-2025-34xx/CVE-2025-3474.json) (`2025-04-09T18:15:51.060`) -- [CVE-2025-3475](CVE-2025/CVE-2025-34xx/CVE-2025-3475.json) (`2025-04-09T18:15:51.170`) +- [CVE-2025-21595](CVE-2025/CVE-2025-215xx/CVE-2025-21595.json) (`2025-04-09T20:15:25.853`) +- [CVE-2025-21597](CVE-2025/CVE-2025-215xx/CVE-2025-21597.json) (`2025-04-09T20:15:26.100`) +- [CVE-2025-21601](CVE-2025/CVE-2025-216xx/CVE-2025-21601.json) (`2025-04-09T20:15:26.350`) +- [CVE-2025-2631](CVE-2025/CVE-2025-26xx/CVE-2025-2631.json) (`2025-04-09T20:15:27.183`) +- [CVE-2025-2632](CVE-2025/CVE-2025-26xx/CVE-2025-2632.json) (`2025-04-09T20:15:27.350`) +- [CVE-2025-26888](CVE-2025/CVE-2025-268xx/CVE-2025-26888.json) (`2025-04-09T20:15:26.607`) +- [CVE-2025-26901](CVE-2025/CVE-2025-269xx/CVE-2025-26901.json) (`2025-04-09T20:15:26.773`) +- [CVE-2025-26902](CVE-2025/CVE-2025-269xx/CVE-2025-26902.json) (`2025-04-09T20:15:26.950`) +- [CVE-2025-29018](CVE-2025/CVE-2025-290xx/CVE-2025-29018.json) (`2025-04-09T21:16:25.540`) +- [CVE-2025-30644](CVE-2025/CVE-2025-306xx/CVE-2025-30644.json) (`2025-04-09T20:15:27.517`) +- [CVE-2025-30645](CVE-2025/CVE-2025-306xx/CVE-2025-30645.json) (`2025-04-09T20:15:27.727`) +- [CVE-2025-30646](CVE-2025/CVE-2025-306xx/CVE-2025-30646.json) (`2025-04-09T20:15:27.920`) +- [CVE-2025-30647](CVE-2025/CVE-2025-306xx/CVE-2025-30647.json) (`2025-04-09T20:15:28.103`) +- [CVE-2025-30648](CVE-2025/CVE-2025-306xx/CVE-2025-30648.json) (`2025-04-09T20:15:28.300`) +- [CVE-2025-30649](CVE-2025/CVE-2025-306xx/CVE-2025-30649.json) (`2025-04-09T20:15:28.490`) +- [CVE-2025-30651](CVE-2025/CVE-2025-306xx/CVE-2025-30651.json) (`2025-04-09T20:15:28.687`) +- [CVE-2025-30652](CVE-2025/CVE-2025-306xx/CVE-2025-30652.json) (`2025-04-09T20:15:28.873`) +- [CVE-2025-30653](CVE-2025/CVE-2025-306xx/CVE-2025-30653.json) (`2025-04-09T20:15:29.067`) +- [CVE-2025-30654](CVE-2025/CVE-2025-306xx/CVE-2025-30654.json) (`2025-04-09T20:15:29.233`) +- [CVE-2025-30655](CVE-2025/CVE-2025-306xx/CVE-2025-30655.json) (`2025-04-09T20:15:29.417`) +- [CVE-2025-30656](CVE-2025/CVE-2025-306xx/CVE-2025-30656.json) (`2025-04-09T20:15:29.577`) +- [CVE-2025-30657](CVE-2025/CVE-2025-306xx/CVE-2025-30657.json) (`2025-04-09T20:15:29.763`) +- [CVE-2025-30658](CVE-2025/CVE-2025-306xx/CVE-2025-30658.json) (`2025-04-09T20:15:29.943`) +- [CVE-2025-30659](CVE-2025/CVE-2025-306xx/CVE-2025-30659.json) (`2025-04-09T20:15:30.130`) +- [CVE-2025-30660](CVE-2025/CVE-2025-306xx/CVE-2025-30660.json) (`2025-04-09T20:15:30.307`) ### CVEs modified in the last Commit -Recently modified CVEs: `89` +Recently modified CVEs: `403` -- [CVE-2025-22906](CVE-2025/CVE-2025-229xx/CVE-2025-22906.json) (`2025-04-09T18:44:12.040`) -- [CVE-2025-22907](CVE-2025/CVE-2025-229xx/CVE-2025-22907.json) (`2025-04-09T18:43:51.870`) -- [CVE-2025-22912](CVE-2025/CVE-2025-229xx/CVE-2025-22912.json) (`2025-04-09T18:43:27.353`) -- [CVE-2025-22913](CVE-2025/CVE-2025-229xx/CVE-2025-22913.json) (`2025-04-09T18:43:02.980`) -- [CVE-2025-22916](CVE-2025/CVE-2025-229xx/CVE-2025-22916.json) (`2025-04-09T18:42:47.473`) -- [CVE-2025-22946](CVE-2025/CVE-2025-229xx/CVE-2025-22946.json) (`2025-04-09T18:35:44.810`) -- [CVE-2025-22949](CVE-2025/CVE-2025-229xx/CVE-2025-22949.json) (`2025-04-09T18:36:01.027`) -- [CVE-2025-23036](CVE-2025/CVE-2025-230xx/CVE-2025-23036.json) (`2025-04-09T18:25:56.037`) -- [CVE-2025-23037](CVE-2025/CVE-2025-230xx/CVE-2025-23037.json) (`2025-04-09T18:25:13.337`) -- [CVE-2025-26091](CVE-2025/CVE-2025-260xx/CVE-2025-26091.json) (`2025-04-09T19:15:47.703`) -- [CVE-2025-27083](CVE-2025/CVE-2025-270xx/CVE-2025-27083.json) (`2025-04-09T18:15:44.707`) -- [CVE-2025-27084](CVE-2025/CVE-2025-270xx/CVE-2025-27084.json) (`2025-04-09T18:15:44.847`) -- [CVE-2025-27085](CVE-2025/CVE-2025-270xx/CVE-2025-27085.json) (`2025-04-09T18:15:44.980`) -- [CVE-2025-28407](CVE-2025/CVE-2025-284xx/CVE-2025-28407.json) (`2025-04-09T19:00:44.523`) -- [CVE-2025-28408](CVE-2025/CVE-2025-284xx/CVE-2025-28408.json) (`2025-04-09T19:00:22.650`) -- [CVE-2025-28409](CVE-2025/CVE-2025-284xx/CVE-2025-28409.json) (`2025-04-09T18:59:55.370`) -- [CVE-2025-28410](CVE-2025/CVE-2025-284xx/CVE-2025-28410.json) (`2025-04-09T18:53:55.197`) -- [CVE-2025-28411](CVE-2025/CVE-2025-284xx/CVE-2025-28411.json) (`2025-04-09T18:45:40.463`) -- [CVE-2025-28412](CVE-2025/CVE-2025-284xx/CVE-2025-28412.json) (`2025-04-09T18:41:48.533`) -- [CVE-2025-29389](CVE-2025/CVE-2025-293xx/CVE-2025-29389.json) (`2025-04-09T19:15:47.870`) -- [CVE-2025-29390](CVE-2025/CVE-2025-293xx/CVE-2025-29390.json) (`2025-04-09T19:15:48.013`) -- [CVE-2025-29391](CVE-2025/CVE-2025-293xx/CVE-2025-29391.json) (`2025-04-09T19:15:48.160`) -- [CVE-2025-30401](CVE-2025/CVE-2025-304xx/CVE-2025-30401.json) (`2025-04-09T18:15:45.107`) -- [CVE-2025-32017](CVE-2025/CVE-2025-320xx/CVE-2025-32017.json) (`2025-04-09T18:15:47.233`) -- [CVE-2025-3248](CVE-2025/CVE-2025-32xx/CVE-2025-3248.json) (`2025-04-09T19:15:50.270`) +- [CVE-2025-32659](CVE-2025/CVE-2025-326xx/CVE-2025-32659.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32661](CVE-2025/CVE-2025-326xx/CVE-2025-32661.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32664](CVE-2025/CVE-2025-326xx/CVE-2025-32664.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32667](CVE-2025/CVE-2025-326xx/CVE-2025-32667.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32669](CVE-2025/CVE-2025-326xx/CVE-2025-32669.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32673](CVE-2025/CVE-2025-326xx/CVE-2025-32673.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32675](CVE-2025/CVE-2025-326xx/CVE-2025-32675.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32676](CVE-2025/CVE-2025-326xx/CVE-2025-32676.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32677](CVE-2025/CVE-2025-326xx/CVE-2025-32677.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32678](CVE-2025/CVE-2025-326xx/CVE-2025-32678.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32679](CVE-2025/CVE-2025-326xx/CVE-2025-32679.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32680](CVE-2025/CVE-2025-326xx/CVE-2025-32680.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32683](CVE-2025/CVE-2025-326xx/CVE-2025-32683.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32684](CVE-2025/CVE-2025-326xx/CVE-2025-32684.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32685](CVE-2025/CVE-2025-326xx/CVE-2025-32685.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32690](CVE-2025/CVE-2025-326xx/CVE-2025-32690.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32691](CVE-2025/CVE-2025-326xx/CVE-2025-32691.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32692](CVE-2025/CVE-2025-326xx/CVE-2025-32692.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32693](CVE-2025/CVE-2025-326xx/CVE-2025-32693.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32694](CVE-2025/CVE-2025-326xx/CVE-2025-32694.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-32695](CVE-2025/CVE-2025-326xx/CVE-2025-32695.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-3416](CVE-2025/CVE-2025-34xx/CVE-2025-3416.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-3442](CVE-2025/CVE-2025-34xx/CVE-2025-3442.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-3474](CVE-2025/CVE-2025-34xx/CVE-2025-3474.json) (`2025-04-09T20:02:41.860`) +- [CVE-2025-3475](CVE-2025/CVE-2025-34xx/CVE-2025-3475.json) (`2025-04-09T20:02:41.860`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4e16caa2199..1f7850abccf 100644 --- a/_state.csv +++ b/_state.csv @@ -9,8 +9,8 @@ CVE-1999-0007,0,0,dee18e9ddebcfd5194dac91e15ddd58562ad26463fe06fdabb20ad8fdd41cb CVE-1999-0008,0,0,8cee1e28ded5125a95c60b63ea4180393457fc71ca1773c1cc05546f4bd158bc,2025-04-03T01:03:51.193000 CVE-1999-0009,0,0,c8bd1e4adf07e191fb9f35597ef052d86b088813728bdd6c6fe106d959129e69,2025-04-03T01:03:51.193000 CVE-1999-0010,0,0,d02c483f2d13b5b76127ac3b959fd522ac9afcb7afbacea2a66975b588e82d9a,2025-04-03T01:03:51.193000 -CVE-1999-0011,0,1,cba3631805af66c91f07dd17591e443ca4c5e999262c7e71658ff86dc2ce7385,2025-04-09T19:15:42.567000 -CVE-1999-0012,0,1,c1102e25eb4a43634dfc7a7419d9f55d20018cb7d148fd274c11588c686b5192,2025-04-09T19:15:43.647000 +CVE-1999-0011,0,0,cba3631805af66c91f07dd17591e443ca4c5e999262c7e71658ff86dc2ce7385,2025-04-09T19:15:42.567000 +CVE-1999-0012,0,0,c1102e25eb4a43634dfc7a7419d9f55d20018cb7d148fd274c11588c686b5192,2025-04-09T19:15:43.647000 CVE-1999-0013,0,0,4909d5a2b87a2551311331d324d292d67deb2fd50b4d3c214834661a0221f900,2025-04-03T01:03:51.193000 CVE-1999-0014,0,0,803ce2090309e4a96f88642f87f6384c3beeaa4ad4ff2b32d900856f1e814577,2025-04-03T01:03:51.193000 CVE-1999-0015,0,0,d8e36f0d55a0dc576070585599658def3aa1cc4e6543d43184ffc1d6b11deb8a,2025-04-03T01:03:51.193000 @@ -102533,7 +102533,7 @@ CVE-2017-20162,0,0,d3855a303acbaa96def4b12f7190a386c68d89bd1eb0d04e75bb0014866fa CVE-2017-20163,0,0,f0db128ad191ea2366a4eb7a29affb9b755de138f5e07ebc3a8b2111da508570,2024-11-21T03:22:46.957000 CVE-2017-20164,0,0,ac03470e6da9068981bc2bd911d9fc6b8dad51a64a39c3141ac059a0c6eaa5a2,2024-11-21T03:22:47.083000 CVE-2017-20165,0,0,2e55c05c509242205cadac59776512e73345b0bed1e7361fbc6349b4b7fed13f,2024-11-21T03:22:47.220000 -CVE-2017-20166,0,1,69ae9f01fcd3ee4e17421b7266030c651f8cc753051d9b77bc7006d7f23844ca,2025-04-09T18:15:42.910000 +CVE-2017-20166,0,0,69ae9f01fcd3ee4e17421b7266030c651f8cc753051d9b77bc7006d7f23844ca,2025-04-09T18:15:42.910000 CVE-2017-20167,0,0,1456c37be7bb40fab4f571dfc2d193377f3ac73e906a5af001ab23af248fda8a,2024-11-21T03:22:47.543000 CVE-2017-20168,0,0,3601831b9e31d64976b8d6d08831d4f5e54ed87dae119146f27da2cdf1898c1c,2024-11-21T03:22:47.710000 CVE-2017-20169,0,0,303873897bd6d7cc1304ac1b1da0e2fc266f86433ad2357501fe5604fb27bffa,2024-11-21T03:22:47.847000 @@ -102567,7 +102567,7 @@ CVE-2017-20193,0,0,78f33a28785b6834207e6952bd57c135d5a9420af5c916cc0c38f6d255c4c CVE-2017-20194,0,0,2ef68f420c7767e9da26d58c0322a3b0184d3e0f958f630f006b5a75255314e6,2024-10-30T21:00:25.973000 CVE-2017-20195,0,0,7925f7e5197d6a733d1f6ba8fe7f174063b555482c30e77dd80a7d567e532c9c,2024-10-29T14:34:04.427000 CVE-2017-20196,0,0,d3c3fc62bc8dc0302911d2c38b5ebbde54bef43021fa2fe4a124876dd95c1446,2025-01-28T15:15:08.267000 -CVE-2017-20197,0,0,4b03b1eac6fe6312ad9f150cd111e334ec7cfba96922a6e4cf52b585896a86fb,2025-04-09T11:15:40.433000 +CVE-2017-20197,0,1,0a2e86e65a28b19e51e2ca707b3a695fc95249c82a01aff178361307c132d8f4,2025-04-09T20:02:41.860000 CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000 CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000 CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000 @@ -187174,7 +187174,7 @@ CVE-2021-46854,0,0,aa00373d9c0cbbb910d324fbcf8b7b043129b3f21cfd64005dc5e6852d780 CVE-2021-46856,0,0,e07452a64257e66577e6b5598af61a191f60773045b680cb096ff5e65acad635,2024-11-21T06:34:49.010000 CVE-2021-46867,0,0,8ad83a8d226e4f8898ee1ce5bae4c42a6b3940bdcf36d2fee3012ddc586d174f,2024-11-21T06:34:49.133000 CVE-2021-46868,0,0,f0ef3dd45f64ad741bb81b50cf78f63c19bd438fd32124d2f17de81f953a66b0,2024-11-21T06:34:49.257000 -CVE-2021-46871,0,1,b16edf6318dbacf9097c58cffb8074dd1aa41ef5425a3e34f8f1316ff51e3fe2,2025-04-09T18:15:44.107000 +CVE-2021-46871,0,0,b16edf6318dbacf9097c58cffb8074dd1aa41ef5425a3e34f8f1316ff51e3fe2,2025-04-09T18:15:44.107000 CVE-2021-46872,0,0,f2a3902bc0aa13c6a2bb9306ebd70a6e810350083dc49a45ac89ae454844a495,2025-04-07T20:15:17.223000 CVE-2021-46873,0,0,ba74a23d6eb978514833a40b7527a8652ccc16dbd3b1c464beccaaf964481a35,2025-03-28T16:15:20.180000 CVE-2021-46875,0,0,cd128e15ae16beb3eef5e9c0528dea9bb7a3bcbe28dc60234951f81ea8a515de,2025-03-04T22:15:35.267000 @@ -191877,7 +191877,7 @@ CVE-2022-22075,0,0,52cd9613b67939ebc0bcfc4f56bf6fefa01232ec16b0aa3eea3acf0422d17 CVE-2022-22076,0,0,c5d715c41dfe766e4fe5708733f20fe023ac9c9d1b6efb18b2c653525c4b063b,2024-11-21T06:46:04.830000 CVE-2022-22077,0,0,479800acf886e49c96257e668565a2c67120d8bb58ccfccc60130d288b85d2d2,2024-11-21T06:46:05.573000 CVE-2022-22078,0,0,a7b1566d1d0d931fa61cfe85e5ec4ea4c8174a90282a6a9ac6b86ba0ed71ce46,2024-11-21T06:46:05.713000 -CVE-2022-22079,0,0,30b8fb4bd7e97afdbaca64c3433a328f634d0ddba6745cb2937881b03ccd4f11,2024-11-21T06:46:05.893000 +CVE-2022-22079,0,1,982589e0af8d4ec6554bfd10f13c4062c910b6761fa3543a7a78c7566c4a2074,2025-04-09T20:15:17.693000 CVE-2022-2208,0,0,e3f6a635c0ac084666578c19a9a40594e4adb31cbfd71e601eb506206c2c8f0b,2024-11-21T07:00:32.357000 CVE-2022-22080,0,0,1e66d7838fbdc5328dcfd4935adddcb3405d2c7a46c071f9225fc81c8c657a71,2024-11-21T06:46:06.083000 CVE-2022-22081,0,0,f45c07a621c236ba6a65d7832134f6b22023a61b82510945bef7ed176cfb24ed,2024-11-21T06:46:06.357000 @@ -191887,7 +191887,7 @@ CVE-2022-22084,0,0,2f7a293c142822eeff8cfe177116144c0024165bcbf66f8ab58dc9eebcb16 CVE-2022-22085,0,0,7dfe3f6c11b0f2a76f3f97a9efa991b13da9b8ac2aeb9da6b050c9f5406aa5f0,2024-11-21T06:46:07.400000 CVE-2022-22086,0,0,04f4592ad7d773218023a9e7cc1a3ee4a2d407e3bd99562f790a46c6f79afb09,2024-11-21T06:46:07.700000 CVE-2022-22087,0,0,2358642b361f7d39cf0b31dc3b2f39116868b39b40946ea4c5f28843b3a7a2a3,2024-11-21T06:46:07.940000 -CVE-2022-22088,0,0,2ef43b3e92968d53a433b4d0a3f658fb611baf0975db3d48ab054ce0c0a8fabb,2024-11-21T06:46:08.933000 +CVE-2022-22088,0,1,534b342b88773d8ece0be79cf7b93d03e1620096137b50762415f334ab0bcd3d,2025-04-09T20:15:18.523000 CVE-2022-22089,0,0,94959eb904b504e36cd5c7e457de6e75c2994ee1fbf9886f5708fdd4f3885c1a,2024-11-21T06:46:09.193000 CVE-2022-2209,0,0,3b4982ce8c24f3afd7cf76a1680ce138adc8c5f88515ae2d419a19818048a4c1,2023-11-07T03:46:17.390000 CVE-2022-22090,0,0,9451f3a0a12b01ce9381d30002754f1af0708b73e40f9892d9039658c9366b1d,2024-11-21T06:46:09.327000 @@ -195114,18 +195114,18 @@ CVE-2022-25710,0,0,ab8167bd7ad908660042eef2d5ba3b74aab5994cd0de994bf7beee1ebd9c0 CVE-2022-25711,0,0,d43859204c821c5236aa0941f23e714a116dc58e1798e3e563972b5d7d4e4fe2,2024-11-21T06:52:47.133000 CVE-2022-25712,0,0,4c68b937bfdb43e9168dffd7a412ff9d2cbbbdf5a320c0f89d59bcf722ccc2ed,2024-11-21T06:52:47.313000 CVE-2022-25713,0,0,2eb01def88eafd9148d309a0786e64e4981c38ceb94540020c811f79d0398864,2024-11-21T06:52:47.523000 -CVE-2022-25715,0,0,00170fbc162db484a8116d07d6d1e01e6ed5e169b87d51feb23d26be919a83ba,2024-11-21T06:52:47.767000 -CVE-2022-25716,0,0,61b2aecfc0d3c1fb04a8c9b11463ff0911de97be5fc52c6d5dd09b073f40c927,2024-11-21T06:52:47.973000 -CVE-2022-25717,0,0,58e507ed174997875f1ccb4ef97fe55ba6225bf9daa9fcfdb48aae9526b82d52,2024-11-21T06:52:48.150000 +CVE-2022-25715,0,1,d55a03667a87a6d0ccba042053915263e5dc9ec250af764035054991663d3417,2025-04-09T20:15:18.887000 +CVE-2022-25716,0,1,122c99dc70e24e10632624ec7205403f356c06273b0ad626d9856bb6ec2b133e,2025-04-09T20:15:19.127000 +CVE-2022-25717,0,1,56921231206440239617d03927d0736f0385f83385c316ef884f7451f61fee0d,2025-04-09T20:15:19.290000 CVE-2022-25718,0,0,cb62ad63294ba92962154e937b1aa1bf53b99a62cc5bc2a1b4388157888e3c7a,2024-11-21T06:52:48.333000 CVE-2022-25719,0,0,c93cf7fd6b4f953cb1850c90e279e38709d7d295177890bd8debe7e9b1190928,2024-11-21T06:52:48.663000 CVE-2022-2572,0,0,1edf17aa6a57234c3ea221a8b3671da3c7c33447b021873894be727bfe2cfb97,2024-11-21T07:01:16.300000 CVE-2022-25720,0,0,0e5d7c7534bed0605e86ab61a9426582a2983c42d574c472a17728d293e18986,2024-11-21T06:52:48.913000 -CVE-2022-25721,0,0,0c21359481aee41ae4e729cc7ebc0919922482457e75574774c6f1f41662fcbc,2024-11-21T06:52:49.237000 -CVE-2022-25722,0,0,f15d83b42635cac568408d72e9f8e9c2a67714e67685680a50c833260eb351b3,2024-11-21T06:52:49.407000 +CVE-2022-25721,0,1,ba05be4af35690ebfcbd7da889ae8e8c9a0e9a7c05bc1572794527d4a910d2a2,2025-04-09T21:15:41.060000 +CVE-2022-25722,0,1,9d5c2ecc1cefe9856604e7281149f8b4bce9add54ed6db64d15e8fec436e0253,2025-04-09T21:15:41.440000 CVE-2022-25723,0,0,c30728f7f3c91ddae4eb7945f2f04c21b3e1de28abb51e0b7a6165bc8ad1558c,2024-11-21T06:52:49.587000 CVE-2022-25724,0,0,e1e4026fd6a375bccdc345b6cb830ff37df8b5c2242f81c3a9f1f53b0341d990,2024-11-21T06:52:49.703000 -CVE-2022-25725,0,0,1f5348e6d2eaf1557774475c80494f08829c3f03a76e4a8192baa1ce50434ea2,2024-11-21T06:52:50.043000 +CVE-2022-25725,0,1,d4593a256753a079f0cca88931b01314263deb092c0fe3ced96c54876d44870e,2025-04-09T21:15:41.667000 CVE-2022-25726,0,0,0ac5d5d62a39dc00fbf4f40f9242f24c844588e07e6762d51ddd297a6e5bea24,2024-11-21T06:52:50.227000 CVE-2022-25727,0,0,daf1a750384aa8197c973f4512d16993fcace41ce47d615a5320c4353c6ea408,2024-11-21T06:52:50.393000 CVE-2022-25728,0,0,05869a5a2a105ad893eb96838bfc374929798f031c049ce5120538191d4e2146,2024-11-21T06:52:50.540000 @@ -195146,7 +195146,7 @@ CVE-2022-25741,0,0,f9ba47935536211561a12ef743e7d9c2e22c2f9ff7b4cc2f9facdad2f3a92 CVE-2022-25742,0,0,a746ca76cb7482f1917e968a099624d83922ad5059de4e8674ae21dcf31e23ac,2024-11-21T06:52:53.467000 CVE-2022-25743,0,0,9a8ea83b33c66f46b9e46a812c5f0513f8b2f1dcc64933ecc2ece029721e75b7,2024-11-21T06:52:53.600000 CVE-2022-25745,0,0,6b3530dcd2d5761e65a4a416e414079cc5c9d94eff282e13fe9c97c986f3bca9,2024-11-21T06:52:53.990000 -CVE-2022-25746,0,0,98c65967efdcc3af4dfd76c502ee0b09bd6fc3a93aa40ee6ae030fe99c6b25f9,2024-11-21T06:52:54.150000 +CVE-2022-25746,0,1,1339b0109eb41c909b576b280a13abfa5b79dc8b6596ed715846dadeca12c097,2025-04-09T20:15:19.507000 CVE-2022-25747,0,0,d6162e0c1f3cff3b2637f5e30d9ab762be8992ab802901e30e06f097a1cdeb2f,2024-11-21T06:52:54.397000 CVE-2022-25748,0,0,74cd85db625384b8445bd04d382db3684978640f2a50a8461a5034b5b202e9a4,2024-11-21T06:52:54.570000 CVE-2022-25749,0,0,ded76624d6fdaa69b52f424d048dbb078f59100e89548173e0ba15c9633fb2f5,2024-11-21T06:52:55.020000 @@ -201333,8 +201333,8 @@ CVE-2022-33213,0,0,ab806ebf986c98a22d1d0351d7d54b4c4863a7779b9b92cd0538d63140b8b CVE-2022-33214,0,0,9bceca3c97bffef1af67c4d660239ad07679c3d887e6488db30ad9ca5a332c79,2024-11-21T07:07:44.543000 CVE-2022-33216,0,0,3c64acf20af3de9dcdad7683d812b440d100e2079a915d85dc50f7e7efd7bcfd,2024-11-21T07:07:44.803000 CVE-2022-33217,0,0,b8c8e216a8d99538bd70ce111f59788ffa857c7222ada4dbf3a94ea8ff8bb9ee,2024-11-21T07:07:44.960000 -CVE-2022-33218,0,0,4b5deefa50fab24eb1f0fe5d43d1e05bb5b0c8e6e5de531c02528145fda7a518,2024-11-21T07:07:45.090000 -CVE-2022-33219,0,0,e05533a2d2d3bd2e8623a5930fec7c1d13672fe9e812d75486eb022938281479,2024-11-21T07:07:45.253000 +CVE-2022-33218,0,1,7fef130b5d1cf394e3d9b93924505e8f0f972b9d051a2f73a53447fa1b433c85,2025-04-09T20:15:19.797000 +CVE-2022-33219,0,1,fa19f5bb18ac89732509dcb05c9499bfc0f81a172d75d0f61d655e77e0ed68d7,2025-04-09T20:15:20.273000 CVE-2022-3322,0,0,9a99b0e2f0a3fba306ac066efd2efb7322ceb669b373f332a077601be60c153a,2024-11-21T07:19:17.633000 CVE-2022-33220,0,0,ad9929d003c9aefcca1e3e3664dee217eba187872cde77013d863e83b504dc03,2024-11-21T07:07:45.430000 CVE-2022-33221,0,0,a4774cd0f768ec4860ce83fa5b2eb6bb847c8d3c3acb9d27aaf7dc33bb2141f3,2024-11-21T07:07:45.633000 @@ -201368,8 +201368,8 @@ CVE-2022-33248,0,0,5a28a6a203ad5d64109280d1a6065abf144357524c6224ee42feb840e7fe9 CVE-2022-3325,0,0,9ea5333c75db3fa81107dd181a2dde99564cf6b1a10e62b75bdecae12f3cf3bc,2024-11-21T07:19:18.040000 CVE-2022-33250,0,0,d77f6a9584efde35ad5baea5b30300afd00522f77d7772a0c0e6fb9661b4dad5,2024-11-21T07:07:53.600000 CVE-2022-33251,0,0,eb53f9f42d45981189db35d259fce794f092c51658358e6742b83b3313e0a501,2024-11-21T07:07:53.830000 -CVE-2022-33252,0,0,2df9a8e55730ec76f097dcb4281131a533f6e5ae2a6c5a6845f54414fc52d38b,2024-11-21T07:07:54.060000 -CVE-2022-33253,0,0,0e11cf15eab397a51461bd74c169bfc3aa31c0ea6db5dddc2f7b415e84dd2855,2024-11-21T07:07:54.360000 +CVE-2022-33252,0,1,beeef6f0d5e53eb4cf3031a86498ae72ed4a27737f3dcedb43198bb155ceccc6,2025-04-09T20:15:20.450000 +CVE-2022-33253,0,1,564e1e03dae6d46105bdbf057e4fcdbbae304382d32646db89fdce50cb896416,2025-04-09T20:15:20.767000 CVE-2022-33254,0,0,c1ce675487ac037e7ab60de52d621af0b6f0df987a6abfb6a97a13aa64342318,2024-11-21T07:07:54.677000 CVE-2022-33255,0,0,cdb06d7900fc643dcff87dfcc8866bca303421a25792cf1eb723f78c05110aa3,2025-04-09T15:15:47.040000 CVE-2022-33256,0,0,2fc387215249e11ed1f95659f8fa932f9e41918554a6506e5bf93ee7c2120e1c,2024-11-21T07:07:55.137000 @@ -201381,7 +201381,7 @@ CVE-2022-33260,0,0,8c88f029c512937537c0a6320324ce786cedd6693643a113ba693a1672b23 CVE-2022-33263,0,0,91faa3ff951313f061ad0836dc9d269fc0725be6ae3e82fae4f32e9b378efd1e,2024-11-21T07:07:56.200000 CVE-2022-33264,0,0,ca9b2686263b92a0933e8fd5332d446af8fcd43ed6c66321749fd4b5921295f8,2024-11-21T07:07:56.430000 CVE-2022-33265,0,0,a414bf673f33309598f97704184579925dbc28f6c36f4403687d7b892f1e7df9,2025-04-09T15:15:47.750000 -CVE-2022-33266,0,0,910b5df149f19bced9ad5a872d830d80fca083e67b01ce2b198e7b2bf3a73db4,2024-11-21T07:07:57.137000 +CVE-2022-33266,0,1,12711c11812b1efecdc6238d61a78a6572cd2434bb5cced73c2493645b1f34d0,2025-04-09T20:15:21.087000 CVE-2022-33267,0,0,a9cca259787d01c618d74556a173e4491021166139d6c942f023dd3fce58b4c0,2024-11-21T07:07:57.400000 CVE-2022-33268,0,0,e67499947adb10825c171fce0fab9c18164316d07fad687e3adf05151c0994be,2024-11-21T07:07:57.623000 CVE-2022-33269,0,0,70ecd604cd5f23105f41ce40dbd97a985411d8da8370da3bc41d2d3ccfd43d0d,2024-11-21T07:07:57.867000 @@ -201390,9 +201390,9 @@ CVE-2022-33270,0,0,3ff5b16804f4142fd93ccd129f0648eb47cf391ab30aff38dbe5ee4abaf67 CVE-2022-33271,0,0,1cb699c74f9f00c3002dccd22bd56f335d6a2657e21157febd6816ec8f3f79ea,2024-11-21T07:07:58.313000 CVE-2022-33272,0,0,a6b0edd99f8afe96f309b29daef1b6719941890421c683013332ea2f719b28c0,2024-11-21T07:07:58.853000 CVE-2022-33273,0,0,4e9cf26ae36f96881f89549cca3f0e6939d9ed7e7e6f474a2ca8debae640e850,2024-11-21T07:07:59.047000 -CVE-2022-33274,0,0,849ffcbcbc544f6f35e4cf5ceb1ede8bf8a943a98eeb88e2d661b3835e7b5231,2024-11-21T07:07:59.323000 +CVE-2022-33274,0,1,265d3f1c5866b5d6896a6a4fce5911b4461ae07bf6eb1f9dfdc903727895641f,2025-04-09T20:15:21.370000 CVE-2022-33275,0,0,f19496d7ac9f6294e2ded3d7c392655e4227246be90898a44f7bdd751f1d8c9a,2024-11-21T07:07:59.490000 -CVE-2022-33276,0,0,e35c62dd4a1be971b01081d6e778cc79c3e7d96878312d07a41127ca79e66df8,2024-11-21T07:07:59.943000 +CVE-2022-33276,0,1,48079cf0c2ef597e53be50bcca796df79253e3ceb90a86a726c6109f32d7f7de,2025-04-09T20:15:21.543000 CVE-2022-33277,0,0,2936d8b0927b48bd4756ed0f101f23f351674417c517434aa0e87b014c6ef2b1,2024-11-21T07:08:00.227000 CVE-2022-33278,0,0,2f7d6b15a13909ee0007b1193a6fd1661f6d47abdc59b0f7c86fa1f3e89e1a7b,2024-11-21T07:08:00.637000 CVE-2022-33279,0,0,bd1ef22fa1622222b518105a5511c35b56c36008594615716803a7e7411f90da,2024-11-21T07:08:01.297000 @@ -201457,7 +201457,7 @@ CVE-2022-3339,0,0,cbffe13fb6b0e87f46c669e1b9447ed44fe8afa7993f51a3a517ffb01a6e3f CVE-2022-3340,0,0,1c0131f8ae7619409c9e22441b92c203624074cc66c5b69cd8e66b27f5cacf57,2024-11-21T07:19:19.833000 CVE-2022-3341,0,0,8b7f9d51a7c8e27555a9e1820dec79396da4e5045f1bd113de7eea34663a0963,2025-04-08T16:15:19.387000 CVE-2022-3342,0,0,6af9bb7fff5a44d311a195e4c8ab1ced801e074dcdba3c126856f176e1a38eb8,2024-11-21T07:19:20.087000 -CVE-2022-3343,0,0,ce4c17e5e846f02260324dacba72981d42dc1b147c9fe2b12acc6d4528128cba,2024-11-21T07:19:20.230000 +CVE-2022-3343,0,1,f9c25da651270d2b842bda8cea394836f31a2df4b342adf77e2dbd0330830065,2025-04-09T20:15:21.827000 CVE-2022-3344,0,0,fa8bc78ec543a940b711eaf64472386a0dae2fb0ddadc01f14718e0de068a088,2024-11-21T07:19:20.367000 CVE-2022-3346,0,0,9d5b377e8326bbcac77ea25a9253bd7e307e4ffcfa14d21f9cb382f276c1dce4,2024-11-21T07:19:20.497000 CVE-2022-3347,0,0,2d94bcba288fa449c48ee99ffc637fd68e9f8ee58aa14a53e9bca2f5e42901d3,2024-11-21T07:19:20.620000 @@ -201852,7 +201852,7 @@ CVE-2022-34156,0,0,60d25e51aa91343820b18b9194beaacd9ddbadc920687841ae4afbe7c0cf3 CVE-2022-34157,0,0,4182ff7a634fdbd3ff3c2d800464eeace9e39045aa96811bfc8b26512d3cbe87,2024-11-21T07:08:58.170000 CVE-2022-34158,0,0,84362d9f3d3d79eb3c06720c86cb3eec5259bd88b574523f301afdc65807f2d8,2024-11-21T07:08:58.297000 CVE-2022-34159,0,0,3c073d086605f05aedc66ee6e161fd3ac5409f45509a485a3b47025466cf0034,2025-01-10T21:45:07.447000 -CVE-2022-3416,0,0,7fa64d434874d36d7809cdec5e99f50fcc83f7dafd80eed34d1f5396497882dc,2024-11-21T07:19:28.253000 +CVE-2022-3416,0,1,973c340e3741606aa1438c17931894f43d8f540b569f62d34f6dcaac4f06bf22,2025-04-09T20:15:22.013000 CVE-2022-34160,0,0,3843b78f7d5c8d03f54c05ee98fd53e3248d4f9a42b34d7fcbea68b43fe81127,2024-11-21T07:08:58.403000 CVE-2022-34161,0,0,e4125618656005d4baea91e20db71bbd31b4d7c4aca7625ce759ffab249fbd70,2024-11-21T07:08:58.523000 CVE-2022-34162,0,0,631820c34541d48d56b14d9a33c682337f774928d096c91b634dadaf207654fa,2024-11-21T07:08:58.633000 @@ -201862,7 +201862,7 @@ CVE-2022-34165,0,0,b437635f101338759c227f834f1f5c4bf3a07d5de9f8eb3a25f35bbd60d74 CVE-2022-34166,0,0,5cdf5fa7ff5280583fb8f59ec4dfdfbee1afe4dae30afd75dd31311aec49576c,2024-11-21T07:08:59.157000 CVE-2022-34167,0,0,7183aae43c6ec60b1d08bd0c9b3883f98a6cafd65d408d9ee8424ab7a6294cc2,2024-11-21T07:08:59.277000 CVE-2022-34169,0,0,592015c63dfa25a69090a678962ec9ff9c7fbdda6fea58996817c29756cf36a7,2024-11-21T07:08:59.400000 -CVE-2022-3417,0,0,d9f64cbfb7e83233a70cb1155a3bb37b3b3bbbc2cb567d1df6e8c0d4149aeb00,2024-11-21T07:19:28.367000 +CVE-2022-3417,0,1,e7074ea78d27477b314030de6de4ed587627810825611cc2a3352dcbd90ebff2,2025-04-09T20:15:22.223000 CVE-2022-34170,0,0,90dbe7ddb816bc8ff850bfe9c634cace7916af7ae09c6d6c5d7abadb8b6df514,2024-11-21T07:08:59.710000 CVE-2022-34171,0,0,419048bf090929e9ce245e542806ff99a1cc42143ef3e8c0ecfb4a22e496bc09,2024-11-21T07:08:59.840000 CVE-2022-34172,0,0,10a6c4aca882d66d5dccf3bbc6fa7d0d439c7b6c0f405a96eb8a41642c3961f9,2024-11-21T07:08:59.950000 @@ -204161,7 +204161,7 @@ CVE-2022-36786,0,0,c48c622e0b29ef8a11dc1ad2b22a56e07bb7a54f27c5c1a0da9fb26911ad2 CVE-2022-36787,0,0,6f7f28f99e0c3c4f6bb926eb888446f1b976b11a2742b4d379ac80b219cc27f5,2024-11-21T07:13:44.520000 CVE-2022-36788,0,0,26fc9f480b517224d26bc7719532a9c7aabf0c2139d85d88fdc2d55a0208878e,2024-11-21T07:13:44.700000 CVE-2022-36789,0,0,2aa768f1b9c0f43b9f197368feb1b1e4a9f19cc85dc762ea32c17e4b24b60a99,2025-02-05T21:15:19.493000 -CVE-2022-3679,0,1,c736e8c58b4706d8f1a88351b4f855a8835c4d8efff022f6d0935db73472f298,2025-04-09T19:15:43.980000 +CVE-2022-3679,0,0,c736e8c58b4706d8f1a88351b4f855a8835c4d8efff022f6d0935db73472f298,2025-04-09T19:15:43.980000 CVE-2022-36791,0,0,7d57bf1b68832cf2c49149fdf0a854096467acb5efe24c63b26c5ef2b17f73d6,2024-11-21T07:13:45.123000 CVE-2022-36793,0,0,69d3ff1d098dc0836964d162cdf5e932a84c835687297360e23c896fe88e83d1,2024-11-21T07:13:45.330000 CVE-2022-36794,0,0,80e618e804b0ae269600b50b96a8da4646934b7f002de292c71aab5097d16432,2024-11-21T07:13:45.520000 @@ -205467,7 +205467,7 @@ CVE-2022-38542,0,0,8973e0e66a8b2d799d68da2bfa4765aeeb0001a458ff9c7f97942e5fc0349 CVE-2022-38545,0,0,30933a3c4e743d15204d4413dfd352d25579f8390de42dbfc17a55f48cf51b0c,2024-11-21T07:16:38.933000 CVE-2022-38546,0,0,255461b914d132592b48d44af50ee19bb660df3a1a0db81a2f3db0bcad348ac5,2024-11-21T07:16:39.073000 CVE-2022-38547,0,0,844bdda7a73bf8832b27132d0f69ed7449a354d249f7dfb6c9947ab0dc0a13b4,2024-11-21T07:16:39.203000 -CVE-2022-3855,0,1,e94644831fbc18d0a7f402b1a0150ae36743007a39cf8348c8c363b6616c6de8,2025-04-09T19:15:44.167000 +CVE-2022-3855,0,0,e94644831fbc18d0a7f402b1a0150ae36743007a39cf8348c8c363b6616c6de8,2025-04-09T19:15:44.167000 CVE-2022-38550,0,0,09df4701a8fb6210fd54739ba0d8b82f92ddabde446235cc7ee3e5558d73f0e6,2024-11-21T07:16:39.363000 CVE-2022-38553,0,0,727b920698f303d1e033fd87ac95f25d35a5ea138f6e7d883f32123c729e7f16,2024-11-21T07:16:39.510000 CVE-2022-38555,0,0,058f255f12f88e39ca7668e7b9d82527261b48cefbfe5a1d1c235d23a9eb1572,2024-11-21T07:16:39.677000 @@ -206009,7 +206009,7 @@ CVE-2022-39226,0,0,546c4d97b2972634cb77408975ed34dee1b719831c7abb375185b15446f59 CVE-2022-39227,0,0,41bccb1b2e1ac3701d16a9a84e51b42dfe6cc831749bf788581e2981c2fa1d91,2024-11-21T07:17:49.730000 CVE-2022-39228,0,0,448cf3b045604536d15c332cfa3cf8052ee741e54188dc4cefe417e6b53cb016,2024-11-21T07:17:49.883000 CVE-2022-39229,0,0,96743e4c056edebe53ac000be7bdf679db110718e237e302492007a5ac785501,2024-11-21T07:17:50.027000 -CVE-2022-3923,0,1,8a868ada3a2a4443910fb2f0d46fd88d587a4884a7ea4873d72058796a4df84f,2025-04-09T19:15:44.330000 +CVE-2022-3923,0,0,8a868ada3a2a4443910fb2f0d46fd88d587a4884a7ea4873d72058796a4df84f,2025-04-09T19:15:44.330000 CVE-2022-39230,0,0,b42aca135633cd65381a6c263eb69a45ef5721fbf5fb2dc8ffde1064cdb87ac3,2024-11-21T07:17:50.157000 CVE-2022-39231,0,0,70c4ef3b7103f14ad6c9f353261b0d0385b66bac47933bf32fa696a2db182354,2024-11-21T07:17:50.280000 CVE-2022-39232,0,0,f507e2ae72245082e21985c2c936a70aff878ef00d7798fe48ecf0e4c9758bbd,2024-11-21T07:17:50.400000 @@ -206759,7 +206759,7 @@ CVE-2022-40426,0,0,0c8b488a92ec4b6a6944698b0e2e92f90b2fb83f3f30027b8a64628c04251 CVE-2022-40427,0,0,3d7746b55b9ef009b9a7772e7190858a3c73119a44a73122826f9b56ef14a9d1,2024-11-21T07:21:23.093000 CVE-2022-40428,0,0,0e3a21b104d434c5579c680e600e64c3f7d4dd7562f810c7984cca4bbccc3ebc,2024-11-21T07:21:23.243000 CVE-2022-40429,0,0,83b07bc5c1770eff4ca19ce189573ae1da6ac4e240bc566eef3e736edf19f6b8,2024-11-21T07:21:23.393000 -CVE-2022-4043,0,0,ae0686be2d249eda236f021a5dcf37d6ac8f9327cacfd4844afbc15c105fc254,2024-11-21T07:34:30.020000 +CVE-2022-4043,0,1,2c7d69f08f9619cc9b794c6ebcdaad74a99ae7021cbd5ec6d3f5660fa4b78da6,2025-04-09T20:15:23.687000 CVE-2022-40430,0,0,310d09c5add76f593811ccc7256b2a899f5f395bc960bc9d2867bf32d059f223,2024-11-21T07:21:23.550000 CVE-2022-40431,0,0,7d181a4fe7495500ea55621afae0ce9c1f741bc868c74ee7e9197816aa1278b5,2024-11-21T07:21:23.713000 CVE-2022-40432,0,0,0c8839fc8a5caa64379f48265b8a2b73b874ec04a216c560f76c08f5b84fe75f,2024-11-21T07:21:23.880000 @@ -206816,7 +206816,7 @@ CVE-2022-40517,0,0,da6b3a5ea19081a5e1ed3f3ceb850e52b714f9d1238a7c2b52f1225c90ce9 CVE-2022-40518,0,0,f4f779c2aca489e5d78112d7d945e90db67c40b1279c46bc48c64d681247d802,2025-04-09T15:15:51.467000 CVE-2022-40519,0,0,33d98d342b4114ea9e2822f85441f834dc2abe0715a61187e451beb1765e6c4b,2025-04-09T15:15:51.793000 CVE-2022-4052,0,0,e8d4eabe978fb563bbb62c16ca4a2c3ef454a427de64e80334d01ac689526003,2024-11-21T07:34:31.007000 -CVE-2022-40520,0,0,8d46d234a37f9185836acce51855ba79357c2bf6c746c4b41af1b12b3b3f278a,2024-11-21T07:21:34.190000 +CVE-2022-40520,0,1,ae790665e671e8752234680f02ec29f9b9162031373fc3da344c58dece867159,2025-04-09T20:15:22.433000 CVE-2022-40521,0,0,dbf6aeb7e89fec0f13658e371a3853a5ce53ad8269b814b86b9bb7205a4ef902,2024-11-21T07:21:34.563000 CVE-2022-40522,0,0,b11d99fe333b41d249b4b093b048f3e90ea880d9f111d5b70ca40ae1c8fa4357,2024-11-21T07:21:35.027000 CVE-2022-40523,0,0,941d7704f628e47d32144bd1954fe697f637be54e6e91a277e665bd6fed7789f,2024-11-21T07:21:35.297000 @@ -207096,8 +207096,8 @@ CVE-2022-4082,0,0,6c9f2a779f86c723b81d667216f2cba3a80aab4e10f9bb44404a11b7ebd7f9 CVE-2022-40824,0,0,0d2c2b605c3d57ef3b9e3794d62b46c3dae693f9de2dfddf01cca9ed5d327fa5,2024-11-21T07:22:05.360000 CVE-2022-40825,0,0,6853627f0b2b9b8ea40c0f7f6603ff266ddef9cb2774d1b7eb36c76e14eede3a,2024-11-21T07:22:05.597000 CVE-2022-40826,0,0,382902183981df6e900338a91a0a81a93b8558d0d64cba3d0c8b1a5e406836f1,2024-11-21T07:22:05.740000 -CVE-2022-40827,0,1,62ba31d469899e9bb54ed3e8a4d9b00d51252dcbda06c74006d84af49cc8f68e,2025-04-09T19:15:44.507000 -CVE-2022-40828,0,1,d957e8953dc7a6dcab2658d51c256168c323127309d6c2776508a07e546fd436,2025-04-09T19:15:44.717000 +CVE-2022-40827,0,0,62ba31d469899e9bb54ed3e8a4d9b00d51252dcbda06c74006d84af49cc8f68e,2025-04-09T19:15:44.507000 +CVE-2022-40828,0,0,d957e8953dc7a6dcab2658d51c256168c323127309d6c2776508a07e546fd436,2025-04-09T19:15:44.717000 CVE-2022-40829,0,0,e88836ab85d4b44ceca1e6c08516869137371f9ddb84039e7b48a7e96088527b,2024-11-21T07:22:06.280000 CVE-2022-4083,0,0,e58000862acc2069dae4d3702570c3db9872b392a471d91d10148534a6c05b1c,2023-11-07T03:56:52.997000 CVE-2022-40830,0,0,2d10e0c428577d4f97e9874648e14f47fd0aff460f2aa22291500b5622d25a8f,2024-11-21T07:22:06.520000 @@ -207254,7 +207254,7 @@ CVE-2022-41016,0,0,8d145c796ac01ca94e935dcba183b103d57e0b44a4ae1be8e48a9c5b5fd41 CVE-2022-41017,0,0,3b98394514944195f22b24d071802cbd965b4a25fa15c1bcffa3f8d22ffbb493,2024-11-21T07:22:27.167000 CVE-2022-41018,0,0,86560fea84abf645149b2f7f0bb2bf60e8b8ccb1b757cd6ec569f811c405dc92,2024-11-21T07:22:27.283000 CVE-2022-41019,0,0,7d2fd1b89fb5f27c2d84990a6764be9f5450d675e87c1913878d6e4230ef1e1a,2024-11-21T07:22:27.403000 -CVE-2022-4102,0,1,611cd7af9a58b302eed9b4bca65c29c65c4743345c74d3647564fa8b001bf655,2025-04-09T19:15:45.093000 +CVE-2022-4102,0,0,611cd7af9a58b302eed9b4bca65c29c65c4743345c74d3647564fa8b001bf655,2025-04-09T19:15:45.093000 CVE-2022-41020,0,0,6369753573c2aa08b19ab74f9a46baf785c0912bbb79e20c77622d92670cd09a,2024-11-21T07:22:27.520000 CVE-2022-41021,0,0,544fc8adb7ecd95ccee95b3a3443fb2c4b650f689bc4c1c960bb360eb7dd6166,2024-11-21T07:22:27.640000 CVE-2022-41022,0,0,e0e03177308b4b2f04d2bc3b92d67f20e9716bbc9d8277a539e2edbc4e740c88,2024-11-21T07:22:27.767000 @@ -207443,7 +207443,7 @@ CVE-2022-41216,0,0,b12a6e54560042154b5b556b0fddcb38378ecfab3090b85871b557126c985 CVE-2022-41217,0,0,6d9aa2af14fdb601290a5a2d78768c0423ddc38c43497f360060526acbfb69e2,2024-11-21T07:22:51.097000 CVE-2022-41218,0,0,31bae3ea5cbfc8dd52dd6ee2d863ef0cc060786cc1d0412f68c875b5caa5a450,2024-11-21T07:22:51.280000 CVE-2022-4122,0,0,41a28625d75093b8185192cc27a639534f890a16e50aaf24efe1b4959312267c,2024-11-21T07:34:37.210000 -CVE-2022-41220,0,1,831f882332be54757e3abc036976b84e93fe4f9a12cf52e0aaf2b820f918bd4a,2025-04-09T19:15:44.890000 +CVE-2022-41220,0,0,831f882332be54757e3abc036976b84e93fe4f9a12cf52e0aaf2b820f918bd4a,2025-04-09T19:15:44.890000 CVE-2022-41221,0,0,1d788e62a46b3145dc2f8c2067c74a9f7096c138656e8475a2fe7d8b43e01f83,2025-01-17T16:15:28.683000 CVE-2022-41222,0,0,fbd6a19711cd9b300720e815b4d0be962776ffb964fd725ad987a249fc46d657,2024-11-21T07:22:51.743000 CVE-2022-41223,0,0,43f1184afc1fce7df6349f6f7048282cb06c0dac2a0290d024fd25d7697e1433,2025-02-07T14:53:04.327000 @@ -208866,7 +208866,7 @@ CVE-2022-42974,0,0,60d44a1087c0244703013cf3fe7a06d0af433383c6b65e39fbf8ae540fd43 CVE-2022-42975,0,0,2a269008af50bdf1969a767dad974fda4639abcd42b5c7f2bb71271ab3c171d7,2024-11-21T07:25:43.480000 CVE-2022-42977,0,0,06e1a435f136af5e7192a20f6d12a978ffaa89ce715014b5c6b03e31cdf01e73,2024-11-21T07:25:43.623000 CVE-2022-42978,0,0,5f3dd813ded3f3d313e6d9d57bf5ad8eaaff7e4dfc8eeb00569f3e0cb267bf40,2024-11-21T07:25:43.767000 -CVE-2022-42979,0,0,38bfc748cf451b72c63fe15399aa795d222db5e60c6bf0068be572c6e8659ac3,2024-11-21T07:25:43.917000 +CVE-2022-42979,0,1,d299466bb652769abe6460aec0c281dacb7f0e015ae1731494b49a7d34a29662,2025-04-09T21:15:41.887000 CVE-2022-4298,0,0,d12164f13da310869856e9a9219bff0cd99c12763fdeb070b3a18e83d1eefe31,2024-11-21T07:34:57.987000 CVE-2022-42980,0,0,62071fd533e66a82dd4e545033615354a7020c4f40fea646d400f8c6e521d08e,2024-11-21T07:25:44.080000 CVE-2022-42982,0,0,ebdbde38528726bc6106aae53e21478878d93a79b87c6155f4fcc4762d697a1d,2024-11-21T07:25:44.240000 @@ -208887,7 +208887,7 @@ CVE-2022-43000,0,0,773b4d0615f4a55783adeb35acfc02d326fee0eaf14e0bf3d6f34417e6ddd CVE-2022-43001,0,0,7d74e12671c6cd3bab4ffbef08e19a2976791cced6cb05dc5cad38eb4701fcc1,2024-11-21T07:25:46.190000 CVE-2022-43002,0,0,2b6dcdc8d34ac9404852e7c5fc9af2a16946ea383802cea4aa9c6f59427697d3,2024-11-21T07:25:46.357000 CVE-2022-43003,0,0,1cbcf8ba2aaf7e3e8052a0c0d7db2ed4c02fb9e5c0420506cf41d7fb2eaf4bff,2024-11-21T07:25:46.530000 -CVE-2022-4301,0,0,77eefc59e5a095ae331a3d7c5fcab29f55606d3d0e5413be4f383ff26184d2d4,2024-11-21T07:34:58.317000 +CVE-2022-4301,0,1,f06ef7492ee5b9bbe5a650591bc049e64201d58ad479864f8c260d9693013f2b,2025-04-09T20:15:23.860000 CVE-2022-43014,0,0,624774fb8686c366c9b28c49aa2f6d937b9ee51d10356327ed02ac4a4610d2c9,2024-11-21T07:25:46.700000 CVE-2022-43015,0,0,cc7e4ecaf5dda04bb67b938253139ea7f47478b27981a9b7f0129339cb7cd2b6,2024-11-21T07:25:46.847000 CVE-2022-43016,0,0,1ac6eaead7ae1ef0657d0075d06aee7aa24ada2eec2896d394679edc8d9de069,2024-11-21T07:25:47.007000 @@ -208950,7 +208950,7 @@ CVE-2022-43086,0,0,6a2baf73aed9ae1fcbda843fcacb4c1c2e720c1624b6fef164b3e8cdadfdb CVE-2022-4309,0,0,5bf2d01c047a68da2e75dc978452e16fa48b4902883fb5724854f2d83868ac0c,2025-04-07T17:15:35.277000 CVE-2022-43096,0,0,3af4385f345733605ad2d7308f04a0ff53f51d337ecb9a7655ec6ac89f94b36a,2024-11-21T07:25:55.033000 CVE-2022-43097,0,0,2726019d2bf903df4e0ca66bb577b48cf6878d22fee692cd4efd0d4e3975f626,2024-11-21T07:25:55.200000 -CVE-2022-4310,0,0,842494554b9eb222198a1cf3899eafab712dd90cc089dc3807f1bf6e415c527f,2024-11-21T07:34:59.600000 +CVE-2022-4310,0,1,316cd0851567879079e7e9236f16cd17e2020245edfd6d8b8e2803e6a8f4e235,2025-04-09T20:15:24.037000 CVE-2022-43101,0,0,1dc16e6403bbc38246f8ed72e79f67c6ec8a6688f5b0936fd22625c276edb1b3,2024-11-21T07:25:55.370000 CVE-2022-43102,0,0,94813f76a0d4fda5ad95b758dabb625eb4e4d0f3aa17daafa310e24a8ee15815,2024-11-21T07:25:55.537000 CVE-2022-43103,0,0,7361b8e6b6fa03cf0b1077d34b125eebced23349b6d4829d1a127427202be0cb,2024-11-21T07:25:55.697000 @@ -209038,7 +209038,7 @@ CVE-2022-43244,0,0,f7b6c4c15c4f51329d5791049d5d853f81fe6013da24d6e54601fdac38328 CVE-2022-43245,0,0,527c4485a36dc6afa461eb22cee472580e980da20abfbe120685568f753a1d70,2024-11-21T07:26:07.707000 CVE-2022-43248,0,0,621bc1f7d74c17a5deace9bcf4a215bd87f530017c2c74cb5c3f4eaa327dccd3,2024-11-21T07:26:07.880000 CVE-2022-43249,0,0,fe819c4c11e81681cb8c2e30aea06cc012783680f5c4fad904ca7bc04a224001,2024-11-21T07:26:08.060000 -CVE-2022-4325,0,1,cedeceefcc07fb8caace033699ae9e4b3d47d7ea566fa7862ecb912a2c3bc606,2025-04-09T18:15:44.297000 +CVE-2022-4325,0,0,cedeceefcc07fb8caace033699ae9e4b3d47d7ea566fa7862ecb912a2c3bc606,2025-04-09T18:15:44.297000 CVE-2022-43250,0,0,9756658b8cdef67fc65f949bb5fd0dba15927da7702f52a9859eecd0dfff7b92,2024-11-21T07:26:08.257000 CVE-2022-43252,0,0,4e886b49ef5a383c0bad2d8a702d2724fcc21b43eff65786a8e5dd385110ed54,2024-11-21T07:26:08.427000 CVE-2022-43253,0,0,bc400c4a906761448ff971f048902231175015f6c1ba8fad486e1095b0608ef7,2024-11-21T07:26:08.613000 @@ -209424,7 +209424,7 @@ CVE-2022-43673,0,0,ff29f184a6136bbd367a91b1a5291d1af24f95648331d6831e652d2383665 CVE-2022-43675,0,0,80ab6c34f00d25d42f79a1f34e98529368b7e07007d03a00563f96750ebf540d,2024-11-21T07:27:01.253000 CVE-2022-43677,0,0,64aff65a74e27acd0bceca2930f64d60e62dbcc9be739ae554e0b342381eb1fb,2024-11-21T07:27:01.420000 CVE-2022-43679,0,0,7a76485b402f05d7f1a9b6898737b65ebbc27f92b1048839fef24c5e170c6762,2024-11-21T07:27:01.600000 -CVE-2022-4368,0,1,0ef3025ba8e2b992414396fbc9a3840b017fb560c156fa45fe901a72869a0fae,2025-04-09T19:15:45.260000 +CVE-2022-4368,0,0,0ef3025ba8e2b992414396fbc9a3840b017fb560c156fa45fe901a72869a0fae,2025-04-09T19:15:45.260000 CVE-2022-43680,0,0,db6775bf1afe72bbe93e9d7fd901b2e39ed44e488bb6ed243884e95e7acc197b,2024-11-21T07:27:01.763000 CVE-2022-43681,0,0,9a663a6e2bdd34becbeaa5323326f8376a9ad7d172069d9363f15dce9c9d3ea4,2024-11-21T07:27:01.987000 CVE-2022-43684,0,0,89bdf614a62311c2fb830a62d17cac4d940f0f00bac2f48a8cf0a293acda5bc3,2025-02-13T17:15:46.027000 @@ -209611,14 +209611,14 @@ CVE-2022-43906,0,0,746117d290fcd7e9d5fbf5723fd9de1b2396360a2fd68718bd75429f2d355 CVE-2022-43907,0,0,bcda18be00d86badcb1a37073da3bea14b3a096ea5328fc702b6f4488163fb7a,2024-11-21T07:27:20.937000 CVE-2022-43908,0,0,ea1d633eff59cfaadfde6f41b6865ee9f521797421f1cd833ae072907fc17ad1,2024-11-21T07:27:21.057000 CVE-2022-43909,0,0,62485ba4ffbcaab85dee04dd0faf92fe54074b369c444135578015b98271f352,2024-11-21T07:27:21.200000 -CVE-2022-4391,0,1,7b026e1442c36ed4ce22854c9ed78a212d5a13263a799efbb2ba5929d3911103,2025-04-09T19:15:45.423000 +CVE-2022-4391,0,0,7b026e1442c36ed4ce22854c9ed78a212d5a13263a799efbb2ba5929d3911103,2025-04-09T19:15:45.423000 CVE-2022-43910,0,0,bc61d2b42779fea1fe4b3cf12606acd50183ddcf8c042f7fc0da0e38609033ae,2024-11-21T07:27:21.313000 CVE-2022-43914,0,0,3c548d12690cec58c529bd0607f14f1f9e549fb5350d977603a219363d149ed7,2024-11-21T07:27:21.437000 CVE-2022-43915,0,0,95003edebc2e438c54ea7d643af0a18ec88ff2cda62b4abb538e153c9051149a,2024-09-21T10:15:04.170000 CVE-2022-43916,0,0,3bdaedc622634bd5ec410626ea9609ece9c137e205e7fc34faae0056c29acec6,2025-02-18T19:15:10.133000 CVE-2022-43917,0,0,816f682456b6e66e0347743e10013b668c623790e5f5ce86f6345eda01d980aa,2024-11-21T07:27:21.630000 CVE-2022-43919,0,0,0180961785dd7055e92f4af184de1616827bbeafac8a7aafaa021d7e8928d765,2024-11-21T07:27:21.753000 -CVE-2022-4392,0,0,edca1725f3b5a668165560e598881401f25d1f63ae808c1a347f81e7a14b86d1,2024-11-21T07:35:11.077000 +CVE-2022-4392,0,1,ac9cefc8d619c5bb292ec03c7e4315642dc5e3cd622037c49bc78c0fb777e6de,2025-04-09T20:15:24.207000 CVE-2022-43920,0,0,4711a794d11c689a73e4b3aa0bde3038379e054334c66d8b9ccc9db1d8b4dae5,2024-11-21T07:27:21.870000 CVE-2022-43922,0,0,c33428298306042682eb4c92f9c8f554956003976a84e73bb58fe9f4f6e4691c,2025-03-26T19:15:18.533000 CVE-2022-43923,0,0,1163b00a3013de89ff0ca80fa5f96b6957671e3ef7abdb422ae943467fabceef,2024-11-21T07:27:22.107000 @@ -209636,7 +209636,7 @@ CVE-2022-43936,0,0,d042241845d1658f01c330673b9f4b4f012aaa6d153356a5039368df47c69 CVE-2022-43937,0,0,9c015eb969f3262bc156db68e5dcec70ac9a732012567c6c4915e2dd1fd79816,2025-02-04T18:19:12.883000 CVE-2022-43938,0,0,47df3cee5b7918bf1e87cbc88203ffa2d71c37d54eba38da40cd5a0a8cf140a1,2024-11-21T07:27:22.977000 CVE-2022-43939,0,0,ff5bf6b9f091ca1893d8c374690586f4ececd541ced9c928deb2e5b928e19ea4,2025-03-13T19:52:44.780000 -CVE-2022-4394,0,1,4009b379bca75f5f3c04cff2c8398228b10e4dabd330939ba2eb772e8fffba7a,2025-04-09T19:15:45.590000 +CVE-2022-4394,0,0,4009b379bca75f5f3c04cff2c8398228b10e4dabd330939ba2eb772e8fffba7a,2025-04-09T19:15:45.590000 CVE-2022-43940,0,0,ace6022fe2ee784f7ceb6a969a205b2cfca3e8c4163784c9f8045bbfd4bae4fe,2024-11-21T07:27:23.200000 CVE-2022-43941,0,0,8a95e6cc13d0318cc36cd354aca9164c4dbce8d2d470d039b2a273472126f601,2024-11-21T07:27:23.303000 CVE-2022-43942,0,0,450d4d905c5895c0889942c86d82dbc1da73dabf530c8072a01ec2c06303cd18,2023-11-07T03:54:08.840000 @@ -209764,7 +209764,7 @@ CVE-2022-44139,0,0,1ce0b3114b56adb1c2d53529ba2c36abedf455d528682fa8e52170b8ed5a1 CVE-2022-4414,0,0,131cd955a4adcfd08987debe372e31eeb06faadf097eca26a85f49f78f03ec35,2024-11-21T07:35:13.413000 CVE-2022-44140,0,0,cd729475cf8163e6a70e6b78ec8515c5e1517ac98214c3919c8123fd4c0b5bbf,2024-11-21T07:27:39.457000 CVE-2022-44147,0,0,8ef42e6aa777499901cda6c9919533fc7125e521992796ca13af5d41680901d0,2023-11-07T03:54:13.267000 -CVE-2022-44149,0,0,29a0e151dc7f7a5d4a3541234e993c8d05bc2b3ce2f7d0f1a4e7bbbf35a859bc,2024-11-21T07:27:39.617000 +CVE-2022-44149,0,1,abbc37e8d5bf575402448fd4d68f79d6e4fc8a7b7b407b050e33a4a5b3b23e11,2025-04-09T21:15:42.097000 CVE-2022-4415,0,0,5aa7a66228d5a54f2932bd5226e9325d4768b37a7b4cfcd56dfcfb03950df262,2024-11-21T07:35:13.597000 CVE-2022-44151,0,0,8784bc12a6fd23e3c172e2fd8268c2ead47eccdba3dedc6ecabdd5b286455d6a,2024-11-21T07:27:39.803000 CVE-2022-44153,0,0,833f638f3a4d3dc2fe2c43e1c500906c07fe1433ec4cf98755a448dfe15b52d7,2024-11-21T07:27:39.940000 @@ -209826,7 +209826,7 @@ CVE-2022-44256,0,0,da181429d4041457a0e34ae97a98b16f7e47212163e1d6d4d6539d4b0f85f CVE-2022-44257,0,0,e1a6d7b418c2107e46c20c9b0e2fdf92b2e83ce1691d60ab1a0db3e7d051966c,2024-11-21T07:27:47.790000 CVE-2022-44258,0,0,ccbea17770562ac5cb971d475c919af23b923d121105175599a2fc73342b9248,2024-11-21T07:27:47.940000 CVE-2022-44259,0,0,b7cf2e1b25e5bbbe129179cadd5dfb50f6419bd41ce3a9df93f0612ad4bac57f,2024-11-21T07:27:48.113000 -CVE-2022-4426,0,1,65bba5a3715fc145ecb13a0fcd3a5ea094697c46262e6cc01da274b7dddc0553,2025-04-09T19:15:45.747000 +CVE-2022-4426,0,0,65bba5a3715fc145ecb13a0fcd3a5ea094697c46262e6cc01da274b7dddc0553,2025-04-09T19:15:45.747000 CVE-2022-44260,0,0,1c4c1cc0940e46fec25a6723e5be439eb2f38d024fd9df23b3785ecf3176cf49,2024-11-21T07:27:48.263000 CVE-2022-44261,0,0,139de1fca3833524bd36dddfe32a4a9f9bbdc1d973a74d769923015d514359e4,2025-03-24T18:15:15.220000 CVE-2022-44262,0,0,df27ede15d999ecbf37f3b9915aa80f3e7bc90d6c7a750dfcb57bab9d6626612,2024-11-21T07:27:48.563000 @@ -210112,7 +210112,7 @@ CVE-2022-44676,0,0,d37bbfa4660d3f448024b8b7316587fc65eaf33b5f95b1cdd6c01921e3ddf CVE-2022-44677,0,0,5bed1b41b3576067f8603c021e5fdfbcf57377878b4478fbf5f65a58f09becca,2024-11-21T07:28:18.013000 CVE-2022-44678,0,0,2e067b974f148f17b17e345e6c86dbea203e5eae553c42a2c61bde1ceacecdc5,2024-11-21T07:28:18.147000 CVE-2022-44679,0,0,79903d711e7691a9e47f3c8584456522b55ca72957d209e1d4edac20854e537e,2024-11-21T07:28:18.297000 -CVE-2022-4468,0,1,0502eeeaf0264a56bc53bf66b692dd9af766a4dd772539f0aa957ffc0ae31e79,2025-04-09T19:15:45.917000 +CVE-2022-4468,0,0,0502eeeaf0264a56bc53bf66b692dd9af766a4dd772539f0aa957ffc0ae31e79,2025-04-09T19:15:45.917000 CVE-2022-44680,0,0,96c2ca9f8413e544591f6a484e639b25cec91d32e80ea1a2f3adb65bacb2b3b3,2024-11-21T07:28:18.437000 CVE-2022-44681,0,0,57f3559eb6ef51af1f6c5eb3e4dddbb4a15c51ee28f8ce4af6a570da4cf639dd,2024-11-21T07:28:18.570000 CVE-2022-44682,0,0,a62deeddb2a1cd2c00897e40d45d3fd2b35f9deb803674fce184b2cb008a5b70,2024-11-21T07:28:18.723000 @@ -210193,7 +210193,7 @@ CVE-2022-44786,0,0,c3469cabd05a568398b0b2e6a19e85d78035c36ebc16b96596153356f4dcf CVE-2022-44787,0,0,5f30517b47f63bbd3d741168d75f41c53465dd1ab54370df857098d0f04f728b,2024-11-21T07:28:27.093000 CVE-2022-44788,0,0,4b08c6a4c0c2d4db51048d9d22065d11283b8ad2480c008f1d538e3d39f1dec0,2024-11-21T07:28:27.227000 CVE-2022-44789,0,0,cf0072a5a5694c45561ad8842d35990f59d17f98bcf111c0eca83291d708306b,2024-11-21T07:28:27.367000 -CVE-2022-4479,0,1,531de5b4547c24cd49254e640831ce039c38e992c04d4f424d7b4a70439979c7,2025-04-09T19:15:46.080000 +CVE-2022-4479,0,0,531de5b4547c24cd49254e640831ce039c38e992c04d4f424d7b4a70439979c7,2025-04-09T19:15:46.080000 CVE-2022-44790,0,0,92bd9a9a20e4c5749ff80cc816e0f6acf9d230eebb3a381a792cd3e2e5e474fe,2024-11-21T07:28:27.517000 CVE-2022-44792,0,0,643daa38dc73f851e91540e7c05d989610268d8a325ff4bf384269768105b857,2024-11-21T07:28:27.647000 CVE-2022-44793,0,0,6073354ca5b1442bf90a252035bad3e86884cee5da2257248065b80d078704fb,2024-11-21T07:28:27.803000 @@ -210225,7 +210225,7 @@ CVE-2022-44859,0,0,4d4495ec065af6a6d53d89d34a65cdbd7834553567925e6cbbae26940af1b CVE-2022-4486,0,0,fac441dba9a0ed0c5ed5a32072617b1043ec09d6dbefb8d7c0daf0a0cabc4853,2025-04-07T18:15:44.373000 CVE-2022-44860,0,0,1a19cbab9099840b3620f05539b837739716dd3684d4222c0bcfb2211a4a8360,2024-11-21T07:28:30.677000 CVE-2022-4487,0,0,de5f6cb980849d29563e31efca9b2ddc8a25fb3efe3c2c837680ea053fd306a3,2025-04-08T20:15:18.607000 -CVE-2022-44870,0,0,f7f468e318c5da82d1ee8fc2c13b586f55dd09f449ea499e39b516d5a01137d3,2024-11-21T07:28:30.813000 +CVE-2022-44870,0,1,85309107ec6ef372d187411e83e19cd9ce9d0875a02aabefceaf00dbe48747cf,2025-04-09T21:15:42.323000 CVE-2022-44874,0,0,1808a181cce6d979b72725aa5e857314beaf695c86b695407374772cd645a684,2024-11-21T07:28:30.950000 CVE-2022-44875,0,0,fa99ed7ed2c3b217cd1ea1fedb68670bda50c91d0f8db696b625484bb5b1794a,2025-03-06T21:15:12.760000 CVE-2022-44877,0,0,167abc48a2718fbfa505946198c84dfdbf826f76a0d0d30de7dfaf553c886f73,2025-03-14T20:00:50.947000 @@ -210234,7 +210234,7 @@ CVE-2022-4489,0,0,bb7fe018f0ddef0541d111f1d005c348ecad97d486d6027cfd82d62ef07cb8 CVE-2022-44897,0,0,f2ce2222aad98b15722e805eaf7ff574143cc8421ca9aa5c80a27ceafc26bb7b,2025-03-27T15:15:38.357000 CVE-2022-44898,0,0,e598ff335afcba3db9b3c480d0a934b2f1404512710eff58974c561277ec04a2,2024-11-21T07:28:31.563000 CVE-2022-44900,0,0,4273656bcc7ff880ee5d763e12d79f06dddcceec1d544b43fdb0767b6e6abbf4,2024-11-21T07:28:31.730000 -CVE-2022-4491,0,1,7f5f8254bee14988a2744d87aaae4cbfa4cf44402a87bfb5b3dd5cd3a21468c3,2025-04-09T19:15:46.247000 +CVE-2022-4491,0,0,7f5f8254bee14988a2744d87aaae4cbfa4cf44402a87bfb5b3dd5cd3a21468c3,2025-04-09T19:15:46.247000 CVE-2022-44910,0,0,986011568a2b62abd84f72f28fb4a64463dbedc809f3a51164412282ebb3091a,2024-11-21T07:28:31.880000 CVE-2022-4492,0,0,eeb9adcb39c8c54bf51bc51faf131aeaccc620b1e27842fd0d5d7d5689789ab3,2025-03-12T15:15:38.020000 CVE-2022-44928,0,0,572ba273c786a7fe62c949e507f941e2444bd4cc8e8457464a9738e248f29990,2024-11-21T07:28:32.020000 @@ -210245,7 +210245,7 @@ CVE-2022-44931,0,0,774abbc22305319bcfbfaf4f57c9659e3c888ea85e26b0bd951db09aef411 CVE-2022-44932,0,0,25751bff2ef472d9f884bed05eabf249544aa85fe741a87c97744afcbf1ddc95,2024-11-21T07:28:32.627000 CVE-2022-44937,0,0,b21a23ce3fef68191ff20b52488115b80049e9416cfb9ad02fd1faf3f35a6a24,2024-11-21T07:28:32.773000 CVE-2022-44938,0,0,6b3923e2d1437bc460bd1802e089017f4388957316d06a36349749818388c756,2024-11-21T07:28:32.927000 -CVE-2022-44939,0,0,f65b292ebfb35894c3e7beda5436ecad18580c2c3bbf45319a88c7aa1f05a205,2024-11-21T07:28:33.073000 +CVE-2022-44939,0,1,c3bdadbca4375b62cd46bb34499c0a496ecdd72902f6042a06d7f62a44b59dd0,2025-04-09T21:15:42.533000 CVE-2022-4494,0,0,5ca116f3cf04e044bfbf882eab45e20f83382b01002983385e6a10d6f685e2c7,2024-11-21T07:35:22.483000 CVE-2022-44940,0,0,309daad9f6865f9060d69965c304d92144fe5d2e817a3a2138e2c89de3c57883,2024-11-21T07:28:33.223000 CVE-2022-44942,0,0,ecf216f29365d7162161e668bbf0a3966d21c68f41f7c313291bcb7b7bcc7e6b,2024-11-21T07:28:33.370000 @@ -210269,7 +210269,7 @@ CVE-2022-4496,0,0,93cef721d9340e9008a0624cfee0845c06778940086c8173d2422cfccf83f5 CVE-2022-44960,0,0,5c57a054c5232484ba125138b2e5ab52b6bc141f4e49d5a562f6cefb060d96f3,2024-11-21T07:28:35.707000 CVE-2022-44961,0,0,dc0026edf8d696785d4ad8685d73d54e682943337771cc165b834e50c32149f7,2024-11-21T07:28:35.863000 CVE-2022-44962,0,0,e872b1aec92c00d7b59fb3535b11b1ddc2890769fa87f1d1b3c5799210cb1ca3,2024-11-21T07:28:36.020000 -CVE-2022-4497,0,0,8a411873ba01392b8818b1d13f79bc81a482b39e873afc9015a6d4d6cf8a5322,2024-11-21T07:35:22.937000 +CVE-2022-4497,0,1,8f057a566e386ca03b2c2dc86052741f1ef0dd99c12d10206b998aa2a9aaa3bc,2025-04-09T20:15:24.373000 CVE-2022-4498,0,0,6923ad259e8f939f5c7cad8834e7a5982f6388272c37d3d6fc1afdaca4b242f1,2025-04-09T15:15:55.230000 CVE-2022-4499,0,0,ca8064d5a004cfb0f6d5489c89811780a555f4ef3649931dcbd05c31ae1f52b7,2025-04-09T14:15:26.527000 CVE-2022-45003,0,0,d1e7f705ddf829dbd640ecd7a5626782308566ef0664ccefac98b79b5e718702,2025-02-25T22:15:11.043000 @@ -210829,7 +210829,7 @@ CVE-2022-45781,0,0,af5875681fe2ee1d5531c6d8ee1f3bdb8a6d138970efb5e8ab0f5142c741d CVE-2022-45782,0,0,a59b27b99382bd10a76e661b4fe5742a9cc6b713ba3a1c1b65c94ef76a444b06,2025-03-27T17:15:37.873000 CVE-2022-45783,0,0,d4345ba368c549c8941cc412837991898ac47afef6e4aca058b917e91aa534b9,2025-03-27T17:15:38.107000 CVE-2022-45786,0,0,eceab8889b7edb80c20ab4c9d9104ec72f95bf0abb8fe81c682a71a69b413d30,2025-03-26T14:15:21.453000 -CVE-2022-45787,0,0,6e575959d3d8da9988e1c9ac769f974584e450a6f0905326025a6c024c86b8bb,2024-11-21T07:29:42.970000 +CVE-2022-45787,0,1,4e0235c4fbf956196c65996dd8645b62f2e0a0253eb2149ebab7b28360eaddec,2025-04-09T20:15:22.730000 CVE-2022-45788,0,0,f6f79d223f38261b7ad2add378e194245959512d8efa61388e7752de75a0700d,2024-11-21T07:29:43.093000 CVE-2022-45789,0,0,430fa15832d387a29a0389562bd6681c71542a481cef59c3138e1404448b57c3,2024-11-21T07:29:43.287000 CVE-2022-4579,0,0,cc9b6db2e9c2ed56c0698da4d1709dc80d90235e43f810e45f3862d428516b94,2023-11-07T03:58:12.923000 @@ -210946,9 +210946,9 @@ CVE-2022-45908,0,0,f66bf3c57fd89a02e6324f98e8c7564501d3fba0621e27512aa88dc8ba707 CVE-2022-45909,0,0,27a06a8d21568788ff9b70fcfd6461ac226caa7ec640de29e3a72b630407cc1a,2024-11-21T07:29:55.730000 CVE-2022-4591,0,0,52954a1e139a227fa4682fffa4fcfd63772796362cb288e151b58b063d73e9bc,2024-11-21T07:35:33.323000 CVE-2022-45910,0,0,ef7fdafb8922111ef31977805bb66630fe95a702f016db27dff5e82aa0160fdb,2024-11-21T07:29:55.880000 -CVE-2022-45911,0,0,3175938020bd12336122162789d6081ff107a10959c6a4bebb5310940404e250,2024-11-21T07:29:56.003000 +CVE-2022-45911,0,1,999d9d2c1810c5b42e767b18ca4661967ccd90513d92cb7feba03ef631306655,2025-04-09T21:15:42.780000 CVE-2022-45912,0,0,9123be23c45d6384dea28982a883732d92523e4e3b5d17e3788776aa6e9dde54,2024-11-21T07:29:56.210000 -CVE-2022-45913,0,0,7e5bae8df570fd2c8e941c92e3c264bd9eb5d7956e237f53e5ba35c1fe4191b4,2024-11-21T07:29:56.383000 +CVE-2022-45913,0,1,c0af5336605ed9819626e161565910ce0c716f3deae70cec43dedb44f878ef81,2025-04-09T21:15:43.030000 CVE-2022-45914,0,0,7bc1e8804475003c817350ba27d45d33740e47f2af074e644d27f9b5650d9a50,2024-11-21T07:29:56.563000 CVE-2022-45915,0,0,f18c0776fdc86e32bb63ec05d9c68b0cd8ebb6d4ebacbaa955dbb31c998b1d6c,2024-11-21T07:29:56.720000 CVE-2022-45916,0,0,d7a3f2c8279f0cf22681bd422fdbeaa4388431146edc4678a1939ff134a9abb0,2024-11-21T07:29:56.877000 @@ -211427,7 +211427,7 @@ CVE-2022-46604,0,0,de612da47cdcd1f7d9e43a25f458186e5ab8b3ce1e464294fa3bf23711bc0 CVE-2022-46609,0,0,d09923216e91d7621ef5afebe22fb939f9ebfd5f40672a2db23294481c3c6f9e,2024-11-21T07:30:48.933000 CVE-2022-4661,0,0,1e28131ba1d31dd12baeb447a6825a54498d00dd6f704d79a34fe226717d412c,2025-02-27T16:15:35.253000 CVE-2022-46610,0,0,c11ae706d9857c16b3a3b475003f80154089f09620827809bf73e838db90abeb,2025-04-09T16:15:21.600000 -CVE-2022-4662,0,1,d4f1d8186e86ae4f3074418d7e2890f4a2feccd18badd1ccdd91d2a37a3633dd,2025-04-09T19:15:46.523000 +CVE-2022-4662,0,0,d4f1d8186e86ae4f3074418d7e2890f4a2feccd18badd1ccdd91d2a37a3633dd,2025-04-09T19:15:46.523000 CVE-2022-46620,0,0,82ae0fa3f9545ae840ed1e8cfa871c0304352c04c5027028d19da993adb477e6,2023-11-07T03:55:42.210000 CVE-2022-46621,0,0,a45b5ba63c93874e741df3d6d041a2f2d089ae923b13515f82da788937f60f21,2023-11-07T03:55:42.330000 CVE-2022-46622,0,0,9cfe0b8b815e2c19a392cf79da33f11068101c28cdfe88d1a3b68a8e75b32c9f,2025-04-08T15:15:46.890000 @@ -211547,12 +211547,12 @@ CVE-2022-46754,0,0,c5069492f25b19b04c0c48636d836b82d40d554ae4195bd23e390a943ab1d CVE-2022-46755,0,0,fb1ced70bb2992d86d1bb1cb87a5d79fbc812fa4ae11a38bc125c63a548e87aa,2024-11-21T07:31:00.660000 CVE-2022-46756,0,0,507a6cbc9395275d8a2bd477712445229e76f628e8aa646749fc9a1805b3eaa0,2024-11-21T07:31:00.770000 CVE-2022-4676,0,0,0122dd8105abe151c00e3532031db922c52b9d89e8aee0ef20df9dfcc2e08696,2025-01-09T20:15:28.163000 -CVE-2022-46761,0,0,26bbc307ea537ec22bd61f07374fb956795c0c0a1434b282db94bef944971feb,2024-11-21T07:31:00.893000 -CVE-2022-46762,0,0,8e67b0260efee0dabe88958b91ab5e558ac3aea7052ca092e4dfa0959e542140,2024-11-21T07:31:01.003000 +CVE-2022-46761,0,1,2d3576a29f0dbffb0a6ab05575954d958cc9450459c2b24b41668a433b8596db,2025-04-09T21:15:43.293000 +CVE-2022-46762,0,1,77a63d9ec3534d8ef7efa19682f5892a0063fff5be11549166cae96a8a20fccc,2025-04-09T21:15:43.477000 CVE-2022-46763,0,0,e313242cf62af66c084169c0587fbf2ba6536e3732229a585d50b99557db8196,2024-11-21T07:31:01.117000 CVE-2022-46764,0,0,3f45784caccda335daccfe22e5ae50eb8fe48af2fea58dfea49da02c32c86053,2024-11-21T07:31:01.283000 CVE-2022-46768,0,0,eec52bf3a3be25e49b571453603288d392184cf83b8336813af0028f804f080a,2024-11-21T07:31:01.430000 -CVE-2022-46769,0,0,e31f47d73632fb02b971d799fe3f45562ae028b06a18f61697f6a47bc5f31c1d,2024-11-21T07:31:01.557000 +CVE-2022-46769,0,1,b54b9a4ac279a697f4a2f420eb93d6a07ecd7c64e95c29459c38619028446212,2025-04-09T20:15:22.957000 CVE-2022-4677,0,0,51b6f6d8a806d2f500d2a4b960b677f933dab59daa5bb5b535e563d1bc033f00,2025-03-25T21:15:38.963000 CVE-2022-46770,0,0,5c5c6866cef1bcd237783f59c4aaf588389fc50cb63be1f7f28e95829a968326,2024-11-21T07:31:01.677000 CVE-2022-46771,0,0,e308702c33951cef86466c282c34e1181461d2bb96e55f9f561ffc5dafacd5ce,2024-11-21T07:31:01.827000 @@ -211778,7 +211778,7 @@ CVE-2022-47091,0,0,db15f4651accf3f758fc133188e22b6d8feea29161132f964d3be0e2cd0a0 CVE-2022-47092,0,0,57a161cd1a90d36624564d6855b7761a383436d80f0225bf005d58c6b513c817,2024-11-21T07:31:29.617000 CVE-2022-47093,0,0,c2cb877abf1ea1738d9899afcbe4c8d2160b9b83bca6cbce52c2f3ad1b51f180,2024-11-21T07:31:29.773000 CVE-2022-47094,0,0,f7815f4b01e0d5dab305843107a3b618799b167cd80fddad4ed3ecf0dc71ec01,2024-11-21T07:31:29.920000 -CVE-2022-47095,0,0,9cc22a8217c2d37f2cb816c52a4a7e1ae6207859ece43af26a5e35a2e17b5a2f,2024-11-21T07:31:30.073000 +CVE-2022-47095,0,1,5e83a5179c27c28b51f63f1870723ed70e74420bf90ad9ea68db2ec716e9be21,2025-04-09T21:15:43.647000 CVE-2022-4710,0,0,7dfd8457b8ce63842c06d5f5362ebfc8ce962651da0ac74a31956bda48b86c98,2024-11-21T07:35:46.840000 CVE-2022-47100,0,0,61b44eddee8762a6a2fbc5232dfffae3bd5197feb64fe25ae2c561a5d6e94999,2025-04-02T16:15:22.980000 CVE-2022-47102,0,0,78778a4bb3d94b5726f0458f84ce7ac19358c59edaa2cb53c716b499e18add36,2025-04-08T14:15:29.520000 @@ -211823,7 +211823,7 @@ CVE-2022-47149,0,0,a0b13bdf58dc43e09251f93bafcd30c1898754189333cea0bc90f2243d62d CVE-2022-4715,0,0,45c9bbfdde12c896bfaf36e3d87353c749eb968b5985d35076985103aa3522e9,2025-04-03T20:15:18.930000 CVE-2022-47151,0,0,e0d192fc17e0e55161772ed94c0132381d0686671e8d85691fb8c07e88661cbe,2024-11-21T07:31:35.807000 CVE-2022-47152,0,0,3068a580277fc40deadab164ccf6b204891c32192002c252e684207195c422ce,2024-11-21T07:31:35.937000 -CVE-2022-47153,0,0,11db046c4f55e0a774d5bf3cc38a9bb37d9d9ac905b113c5590beaa8a037a85a,2025-03-21T12:09:23.140000 +CVE-2022-47153,0,1,b732a4ac7c3d6cee3dbb656fedf224cf94a508d56398c8814f9cfb88f004f17b,2025-04-09T20:40:28.720000 CVE-2022-47154,0,0,3107962e4957fcf0bc079347d26e745f6d9418e39438540bfe4a2e5ef5ab059f,2024-11-21T07:31:36.200000 CVE-2022-47155,0,0,e23f5aab33e62bb9d1811fc5db853683e51e347ff47823c6094f1ff39654b43d,2024-11-21T07:31:36.330000 CVE-2022-47157,0,0,239d5c47db32276a265008fedd9a9733e0ad325e4b6ff95555545de8d59220b0,2024-11-21T07:31:36.453000 @@ -212108,7 +212108,7 @@ CVE-2022-4752,0,0,30e7544de09061701b4dc60c2a7c242087a4f9966e0d1b6f0493eb46cb487e CVE-2022-47520,0,0,a2907eb9ae611539028ea4990ff7a11d5a13fabc0dc3da3f3e38a198ddf2049d,2024-11-21T07:32:08.103000 CVE-2022-47521,0,0,aaf843fad8bdb5c8958ac3f72b5eedeb608ba4f59d22de3066a02680cd0b7c6c,2024-11-21T07:32:08.273000 CVE-2022-47522,0,0,71017cfd7ed3366e0acbf531e7033d07ae3d23f62d5fc2e414ec0bf513fa8220,2025-02-06T16:15:31.443000 -CVE-2022-47523,0,0,7ac5edda3bc54db7a3017fa0d8083aa61e73ecc65634f76f5172bd443bbad5c8,2024-11-21T07:32:08.650000 +CVE-2022-47523,0,1,ad91d37ade9217ec7d7e761645430cf8cea0386deb945aa175145ea985daa9f2,2025-04-09T21:15:43.870000 CVE-2022-47524,0,0,b8614559e4a1592166acf963cdd83f391b7b09a2d062221f034d86c8aa5c3d35,2024-11-21T07:32:08.803000 CVE-2022-47525,0,0,1347ad00de62fbd8b20114fce363daee5b5e0a5392255552d1dc8f88a2afa871,2025-01-14T17:15:09.140000 CVE-2022-47526,0,0,38b4e1d27d39f9e4e7ca6d3804d8d207e407f10ef3d9c35ba7dc022138a52ca0,2025-01-14T17:15:09.320000 @@ -212194,7 +212194,7 @@ CVE-2022-4765,0,0,fefa5ad012cdc162e185c6cc3a5f7ba1c9da385f5a333cc0709cfec07db8ff CVE-2022-47653,0,0,321c6cd6d410886660d6a3766c607822c5758acf3a23b9bab39153570f2615b3,2024-11-21T07:32:18.553000 CVE-2022-47654,0,0,6fdb421cdead1d06066b38e7bdf181080b8f5af324456d5256628afdec2bd1c5,2024-11-21T07:32:18.740000 CVE-2022-47655,0,0,02737a990d497d9ffcc7fcb78716506f644d63a192ee03a45e0e978150b658b5,2024-11-21T07:32:18.913000 -CVE-2022-47656,0,0,d1e0cb1ee0206a4d2f41087d1d9e456b255f8045a49c032316e63d8701980eab,2024-11-21T07:32:19.077000 +CVE-2022-47656,0,1,32f94ac537060041aa3fcc53670007f962eeb17e5020dee21c21f5601e7ee5b6,2025-04-09T21:15:44.070000 CVE-2022-47657,0,0,7dd9457f179a79f2180130436047346665eaf4e7deb663d63a2f51bc0842ac9f,2024-11-21T07:32:19.250000 CVE-2022-47658,0,0,a8fc83b611f11e6b311e75e992082e51ca3fc19bbeb48c7df35304ee0d83cd6d,2024-11-21T07:32:19.410000 CVE-2022-47659,0,0,6edec13caac654d1472d993370aa9ffbe84100859a650c2ba59537992dae66ce,2024-11-21T07:32:19.577000 @@ -212240,7 +212240,7 @@ CVE-2022-47768,0,0,4ec676e0f91623a2888ff1eee233aefdbfbd1bea1c3c2deef11ddd4d80301 CVE-2022-47769,0,0,7bc1f047ed005e65b514ff788e59e46afd524969a91e6df5a1efaf9975a9300d,2025-03-27T16:15:17.137000 CVE-2022-4777,0,0,c5f93371e9ce5cb88a9e1efb0763a51df791fa8604b349e0cc05fe4ade247df0,2025-03-12T16:15:18.287000 CVE-2022-47770,0,0,c199f9cbc27863a6d0abdf84556f96a3a587460346814c2a5423b261add2a72f,2025-03-27T16:15:17.313000 -CVE-2022-4778,0,1,2def57159228f9c5397be3ff58d65ba1ab06747151e9a0737ef4fdbd510972a6,2025-04-09T19:15:46.857000 +CVE-2022-4778,0,0,2def57159228f9c5397be3ff58d65ba1ab06747151e9a0737ef4fdbd510972a6,2025-04-09T19:15:46.857000 CVE-2022-47780,0,0,02cc2303a5da568060c80b2863354c0d60a13a5b78df5c1ae7283dc2d64700a2,2025-03-27T15:15:40.070000 CVE-2022-4779,0,0,05356ec1a43d2ada0893495ee9cf6e818193e7057fa5d35107380d8564f8b00c,2024-11-21T07:35:55.607000 CVE-2022-47790,0,0,a65184cc859086069bbb08ee1968938c8c98c644e4bca7cd77a1c097088fc67b,2025-04-09T15:15:52.983000 @@ -212324,9 +212324,9 @@ CVE-2022-47966,0,0,5d0cb4ed26b2d01da2443efb2cd22ea52ebc23ea2fe33411205a1ad705291 CVE-2022-47967,0,0,2793000f39004c67dc1fffb725488b70c75e83182393e59dd6cbbd0ecaf93f21,2024-11-21T07:32:38.803000 CVE-2022-47968,0,0,fbfd0fc29dc6cfc00a81735c42dd0c98796d3a965d4e5b40116df9801ad9ed7e,2024-11-21T07:32:39.003000 CVE-2022-4797,0,0,a27cced6eac5a731883cbe37489a46dc85c4d0b1ecdc2a6fd51e9745d876e090,2024-11-21T07:35:57.617000 -CVE-2022-47974,0,0,e30d4e00522a6882b5de3a765916f5a731f8ac50430135a9b06c750830c9512d,2024-11-21T07:32:39.230000 -CVE-2022-47975,0,0,86be8909a1ecfda6394be45d0f15d0fa14c7028b523e1844c2b68d3383f19c23,2024-11-21T07:32:39.400000 -CVE-2022-47976,0,0,e26596b046c5cfd1502de08a717c9252dc1dab42a74527eb06f6878ffe6ef208,2024-11-21T07:32:39.573000 +CVE-2022-47974,0,1,468aa9d1bd6e84e3570dd337ca6a62c69fdc85015dc5e01657728fd243a373f4,2025-04-09T20:15:23.150000 +CVE-2022-47975,0,1,05e03be3139f2df8a54b6e5524fc8b63e495e16e8c97ac45a0d02412dab1f53e,2025-04-09T20:15:23.343000 +CVE-2022-47976,0,1,4384a197bf98a6fe327a95bd4dbad983e3659a6da0a9655c1691ccf61898735c,2025-04-09T20:15:23.523000 CVE-2022-47977,0,0,d1a9e24b194ed74f36e23bc6ea7dcfea4a1d976003db4ae8605e79221222c5ec,2024-11-21T07:32:39.713000 CVE-2022-4798,0,0,9a7fdd7c96e66f053d03f32d4700f8f6a54d08b4345dae12758f42e0722537c0,2024-11-21T07:35:57.737000 CVE-2022-47983,0,0,5fa56113e2db33f06dceb61139a45518a76260cb2166d074bbfc2e002b4fbefe,2024-11-21T07:32:39.890000 @@ -227220,7 +227220,7 @@ CVE-2023-3384,0,0,43976c80ef1dd4016470fbdde9d42c2f2727e9da019d45b7389b90b07d63de CVE-2023-33840,0,0,24c35b3cfd8bae5bbdb3a25483622775cad57e6faaeebf192f416134d4238003,2024-11-21T08:06:03.657000 CVE-2023-33842,0,0,c5bea2c8cce160a3ae2f9cc68a17addb9e24eaef27051d9b083238e0b6ac73dc,2024-11-21T08:06:03.770000 CVE-2023-33843,0,0,476c7b0a6bea17291397a04dea52b748f1966f5c2d1096ec4295c7fc521e6a5c,2024-12-10T17:46:41.013000 -CVE-2023-33844,0,0,366d44125b1dacf3f278dced2b1d5b2324c6500dd869d4c9ccea8adfdfad62b0,2025-04-09T14:15:27.527000 +CVE-2023-33844,0,1,0924f75b64a960419df9bd2ce92f69570e8a8ef4ea13e89e536fbef6c8586c7b,2025-04-09T20:02:41.860000 CVE-2023-33846,0,0,13983ff951169eadd9af866f17f0a334c05acc6a18f7269072c83cefdb2f3458,2024-11-21T08:06:03.993000 CVE-2023-33847,0,0,2e778aaa92ccd2733ae61402badf91cdc6c6046575e81a418cdfa443a705c6c9,2024-11-21T08:06:04.123000 CVE-2023-33848,0,0,f912ce44bd94a807d8ef6d7c826fd073f50b4dfaeda8b927dde92e31f68c3ba9,2024-11-21T08:06:04.250000 @@ -232143,7 +232143,7 @@ CVE-2023-40154,0,0,1fb71aa00f9320d34a133e80452b2789381653f054602d47652ad53d990fb CVE-2023-40155,0,0,92758331bbf8592f19aa602293d099fe3f0a66144b636da70b49aae15f5bb2c9,2024-11-21T08:18:53.320000 CVE-2023-40156,0,0,c13dce2c0c671a7ff3e63747832d27fec6a63b5c8855b1a4bc50a47c70ef2f83,2024-11-21T08:18:53.463000 CVE-2023-40158,0,0,dc966aaaeaeaeb0cee1c97ee67a7ae57f12c7759e6eb38c037858bbbdc68d02a,2024-11-21T08:18:53.610000 -CVE-2023-40159,0,0,46d01b597935077c3e12aaddd5a68cec495aeff5230875e3f91758e0462ba99a,2024-11-21T08:18:53.850000 +CVE-2023-40159,0,1,205b39c2dac9a7045f056cc6fdd02e9f4bba6c79c0958680bf75b0b2675490bf,2025-04-09T21:15:45.100000 CVE-2023-4016,0,0,f98ccf7aac82d8554c2782340bede1701e4904c152d3268a4fae7fd5b8280863,2024-11-21T08:34:14.073000 CVE-2023-40160,0,0,a3c00684dba35bf1cdd372689559809577746dde02642abda9cfcdc939f8c6cb,2025-03-24T21:15:16.420000 CVE-2023-40161,0,0,1d92dfc2af570bb21871ae83c8919dc49a54d9d077bc2fd579152e03e8317088,2024-11-21T08:18:54.140000 @@ -232208,7 +232208,7 @@ CVE-2023-4022,0,0,7d28cfa5cb69299ac816454a0ce6e4287487b976b7e847836ca22e4bb44c19 CVE-2023-40220,0,0,4e4c8d42b37fdc492577d4df159739563bf50d025eb5eae2e90cdd97ddf5718f,2024-11-21T08:19:01.780000 CVE-2023-40221,0,0,0f5c4c77c15a1563f65ecaa72879d46af8c8213e98a1889ade52c63df5bdb7d3,2024-11-21T08:19:01.930000 CVE-2023-40222,0,0,54888fc2350a6d17ed9c1623829e0aa81b80877096fc281d18bc6a2f5a3a1131,2025-02-04T23:15:08.413000 -CVE-2023-40223,0,0,185175f0a8b56d417cb14befd73ce4aaf44fb432028b20f2321334190e992563,2024-11-21T08:19:02.073000 +CVE-2023-40223,0,1,54401c57f0fc73ea5d17e92396eb8c666cf6336948f0b06d8a95ce48c5e6b576,2025-04-09T21:16:06.380000 CVE-2023-40224,0,0,9cd3bec58e8169eaf67cb8ce0484da56183a2fef50788503a91b137a9042fc9f,2024-11-21T08:19:02.240000 CVE-2023-40225,0,0,821a9a37066f54cbe57bb3d978f89daa73ce11405043e140b875f5eb678ef55b,2024-11-21T08:19:02.407000 CVE-2023-4023,0,0,642934cd8c061c1016864fa226c2c63d51f77968f6c30d1a99f8b39b2028e717,2024-11-21T08:34:15 @@ -232491,7 +232491,7 @@ CVE-2023-40534,0,0,38508020aa791d806b0db2e441f42af65266b829e5393d658a885d3877ea3 CVE-2023-40535,0,0,8e8e0fd8ac0502bc37524894f7d2fb204df6bc79493eb6af58eead943b84e904,2024-11-21T08:19:40.150000 CVE-2023-40536,0,0,467671447d0444b01b0f9476530dfb08c7efcb05d5faede2ae63b082b912a8e5,2024-11-21T08:19:40.263000 CVE-2023-40537,0,0,84e7b8ddf2453ee7c8779bdc4521c4c597fd65164ab59515ddf8f02a93680490,2024-11-21T08:19:40.387000 -CVE-2023-40539,0,0,f5e9255e456191604c779bc903536305cb906e83b7d33316756dd1e5afee6e34,2024-11-21T08:19:40.533000 +CVE-2023-40539,0,1,63458b879fbaf3805dcc9f9efb20a43449339e0b61ce3c7a597d24604ce6c25f,2025-04-09T21:16:15.920000 CVE-2023-4054,0,0,7fa32af01a6a0ff033f70e066c9ed88c256a3f23c131e318ee1b853a5bf2c0a3,2024-11-21T08:34:18.613000 CVE-2023-40540,0,0,c6ef2e8b76540f4c5ba5908cbf64240d05b41b0dd2f913d296b697b16f6ecf42,2024-11-21T08:19:40.680000 CVE-2023-40541,0,0,ac6d252eae252f9fdc67597cd7aa82a113face3f63a0f9e0957dfb8db809d40b,2024-11-21T08:19:40.897000 @@ -232649,7 +232649,7 @@ CVE-2023-40699,0,0,8cce2cad9a89e1de8e141d9f23a8df9af780cd94941d7d990fbd3ce17aee5 CVE-2023-4070,0,0,066e18fa8bda5a96bac47b0b24377cff1d84b43a98e9f18feedc5e13462c73f4,2024-11-21T08:34:20.670000 CVE-2023-40702,0,0,f6e0b711cac157132edaaba76aaf02927fc88286cc4c28bfd7f94b0043d618e5,2024-11-21T08:19:59.500000 CVE-2023-40703,0,0,ff6fa5949e5278d3e1ba24c3b72ba40d617aca287f01a97ae67307fff60a5b04,2024-11-21T08:19:59.620000 -CVE-2023-40704,0,0,fc4e954cba484d24fa2de8609ff984dacdf50dd560c0e7baa7d30e3a4bcdd7df,2024-11-21T08:19:59.750000 +CVE-2023-40704,0,1,65724b55bef5fb4ec3c7247b5a3662ac730889f8b107ca7a0af4b48ede7ff2a7,2025-04-09T21:16:24.990000 CVE-2023-40705,0,0,eb21f2ecf34b8a8c779833a0acd9f9c569f89107bd105251ded5b5b0ad58e5dd,2024-11-21T08:19:59.907000 CVE-2023-40706,0,0,9ba215be5a227ebdc975bdd3399c9d619e6dd89102ac4e188a05255fe0298049,2024-11-21T08:20:00.027000 CVE-2023-40707,0,0,f84a0b4dc2d57ed2421f7eb47b1505c8c9bff8d0d95b797dc69a35818b47d357,2024-11-21T08:20:00.177000 @@ -236009,7 +236009,7 @@ CVE-2023-45590,0,0,3b0423775ab73f015b64effbda4dc448c7ce5276b91608f406635648eb029 CVE-2023-45591,0,0,0e8adb595c52b5672602a93c1caa9e39e6afe79fa5e6abff07b643fb57da2a69,2025-03-03T22:17:25.743000 CVE-2023-45592,0,0,c495cde71af5c2a090a142170ed2f5843aa51787770de8a7f5df2a1cd9343de8,2025-03-03T22:29:27.443000 CVE-2023-45593,0,0,aeb080337e8a9707b49aedb4e4693734ab43b0ba0519902a592a1f4c07c34eaa,2025-03-03T22:32:00.433000 -CVE-2023-45594,0,0,715042e6dcbb11de4ffc5aafbfa438629b4fcfd1a3f7d329580140e7e5064610,2025-03-03T22:32:43.430000 +CVE-2023-45594,0,1,c6cf54503fb2fee9b6eda308fa27e7062e621945a4e26c37bb7be8dd26a40eec,2025-04-09T20:49:05.457000 CVE-2023-45595,0,0,d31a5a8326047d79131a787137b251e9db8a3596e332615d3e59fe1404f15c2e,2025-03-03T22:33:36.753000 CVE-2023-45596,0,0,dc09dd861e8c99b466aab790e39a6ed4506455a10ecd5666f3b21f2e8a1b2d1a,2025-03-03T22:34:02.150000 CVE-2023-45597,0,0,489dc9e01e8bd02edc022bb31f0be546fa2fc1e0c33e0a72e40955dfcfabebd3,2025-03-03T22:38:12.927000 @@ -241879,7 +241879,7 @@ CVE-2023-5452,0,0,8338e39c9bea30f4d3c6e96dfc6e2e3b4c6df187407a48fb4b33ab50200d74 CVE-2023-5454,0,0,dc536bf1b884214132b4124a4d0fd5485006c40e56909d4668b90f88941a12a6,2025-02-26T22:15:13.807000 CVE-2023-5455,0,0,3a160478e5901f057d75d52e868e4433cb057ea901568f6597eb8a2d6da1e1de,2024-11-21T08:41:47.993000 CVE-2023-5456,0,0,9600de0a327d09a0a3120f8fff1fb90672bb9aed81e99f8b79e95758cfc75263,2025-03-03T22:16:43.967000 -CVE-2023-5457,0,0,cdadb6d57eea4e4610e9eff07211075285fcb4c2c8b9c8b305469ad81b7e1aab,2025-03-03T22:10:10.990000 +CVE-2023-5457,0,1,e86a38878bae255f601aa63b6a7a181aba11243bf3a085f704da6ff7a1b6a98f,2025-04-09T20:34:52.100000 CVE-2023-5458,0,0,20fc50f28da8d7adf35c08f4bb3261eb3b24302a742f7974b8ff9ded92374c2c,2024-11-21T08:41:48.443000 CVE-2023-5459,0,0,5d6aabe7cc51ca5631fbb30f2c16fcd8622f11294411b02c602cb14ba70c79b8,2024-11-21T08:41:48.577000 CVE-2023-5460,0,0,a87e91b98d52cb06436a3ddc397ad0dc2193d8c8b4f5a7dee181ad1960a2754c,2024-11-21T08:41:48.760000 @@ -247032,7 +247032,7 @@ CVE-2024-12552,0,0,8443c6d0851e2c1de6fc0e2780c54c711d712f43dce29b5a9fc2e07cff55a CVE-2024-12553,0,0,cd61f311646d40093b2eea8b09f233e945a3d877e60c1a1abbe43e2cfcd9ea6a,2024-12-13T23:15:06.310000 CVE-2024-12554,0,0,03325541f88792da1f6e44f52ff0851958b98ec9e3aa0b4c7708f85287495a8a,2024-12-18T10:15:08.493000 CVE-2024-12555,0,0,2e017ff0ee33b0c8a472113c693bd6d33089424aa43829233098413c47eb605b,2024-12-14T05:15:11.827000 -CVE-2024-12556,0,0,1d5c4e0ef9e84c9b479ffc6d8eb50d2fe66045206a67ce382735ccdfdd2c0561,2025-04-08T20:15:19.420000 +CVE-2024-12556,0,1,4df8a79f806959b7742154221191ad40044aa53480928d82bccf65f41e05cda3,2025-04-09T20:02:41.860000 CVE-2024-12557,0,0,37daa206cffaab362fd4ef4709da159d811d551245b9c0c84b85613a0d36d6a7,2025-01-07T04:15:09.260000 CVE-2024-12558,0,0,ff1dd3178bf5e061322cf2e1a359f721c0d270a183cd44116b64f362a8103982,2024-12-21T10:15:08.600000 CVE-2024-12559,0,0,57ab0e0bbf049179f4bb043a31125569183e3823c6e0814b5b25df137c49ef14,2025-01-07T04:15:09.433000 @@ -248199,7 +248199,7 @@ CVE-2024-13740,0,0,7ff99f97d425424bdc9a3d1a435df988f74877e53c6e3d16169a71dec8c37 CVE-2024-13741,0,0,78f05de9655a03d53c2e8400793bb4a26c0069c47279ba1e219e404df9296757,2025-02-24T12:40:05.483000 CVE-2024-13742,0,0,aa7b21df6f3ec325db10419962054c1a324c9ebd12e6b4ba3b8ccbdda20e9f49,2025-01-30T18:38:19.663000 CVE-2024-13743,0,0,55c8dc190eb39157b66a10e1b93cb1305bc4d10ce4cb3fd182854193f3e3c946,2025-02-18T23:15:09.267000 -CVE-2024-13744,0,1,3b2fa1bf236ed36ac69e12163a356d8f31366af1c157c7d43dd509445f424c11,2025-04-09T18:09:50.180000 +CVE-2024-13744,0,0,3b2fa1bf236ed36ac69e12163a356d8f31366af1c157c7d43dd509445f424c11,2025-04-09T18:09:50.180000 CVE-2024-13746,0,0,4744ce63c95c52e5db95476dbd9a3113792c8e496a71ed5da9e5324799e177fd,2025-03-01T05:15:15.103000 CVE-2024-13747,0,0,514db0c22818e902187c8184fe95083c26656dd07b4355e7a170f454d6cd0a87,2025-03-05T10:15:14.617000 CVE-2024-13748,0,0,434305d89c46996e593a1c20227391db3e976db9a09c9806ae0372c5517d7c24,2025-02-25T20:54:55.803000 @@ -251809,7 +251809,7 @@ CVE-2024-23476,0,0,1bee5f29f6d5ec4edf446b2f4fe7627387311af4574050425a5237b7b3450 CVE-2024-23477,0,0,c045ceebbeaad772789dd3b2a638582989651608442a3e536fa869ab79e7ae31,2024-11-21T08:57:47.693000 CVE-2024-23478,0,0,dd347fc924bdb89885046aa09854e5c95b912268752747603331bf45b2d43994,2024-11-21T08:57:47.847000 CVE-2024-23479,0,0,99f077808522a9f1a27fa8dad853376b6f6e0cbb7f9cb30b0ef33107a481945e,2024-11-21T08:57:47.987000 -CVE-2024-2348,0,1,a1259cc7ad6e3a1b5447b7ab779eac9b39f8c68445667216c966ad147b205728,2025-04-09T18:13:48.787000 +CVE-2024-2348,0,0,a1259cc7ad6e3a1b5447b7ab779eac9b39f8c68445667216c966ad147b205728,2025-04-09T18:13:48.787000 CVE-2024-23480,0,0,025c7eb2d6c89195d1224a785fb401b3f275526740ca573220e73be3418a80be,2024-11-21T08:57:48.110000 CVE-2024-23482,0,0,4b389b98a808a2c0d010bfe0434e5630a4beaa7e23d705f0b8e0cfd92924ef60,2024-11-21T08:57:48.240000 CVE-2024-23483,0,0,35765b9f4b356e15e6e9871c794545e74df2d881a1951513f786aedadb918849,2024-08-07T21:23:09.080000 @@ -257570,7 +257570,7 @@ CVE-2024-31104,0,0,f6e989088a90ee4b0cc37ab1bbb0adc0c7b482c856365802f554a06fdebb8 CVE-2024-31105,0,0,810a62aec02122ae603ca9f16295df859c4a776205378e69081988125f55b412,2024-11-21T09:12:51.913000 CVE-2024-31106,0,0,b099b660d023dc5cb283ec7a506c38cd6350b2f23d368786da411011b68d020b,2024-11-21T09:12:52.027000 CVE-2024-31107,0,0,a2e5ab28d8d5a2cc3a627ed5bd8d6505e632c7b1bde5f0c382d2d4371cce50dd,2024-11-21T09:12:52.140000 -CVE-2024-31108,0,0,8c3b19ccf9c626566b0df8d298a05deadd76000a95e281b2ec50a76e84c4f19e,2025-03-21T18:57:25.717000 +CVE-2024-31108,0,1,8701162ef13bc7b14e59fbb3740fbb37d60b149ce959b267ad05aa1aba1cf50e,2025-04-09T20:39:24.993000 CVE-2024-31109,0,0,efdd9794a852f1863ba349576bc66164715c97ee7ee0ce1f857f2d6605644823,2024-11-21T09:12:52.377000 CVE-2024-3111,0,0,1c1f969f5b38a75b6a7e5c25d73fceac6eb9a56a38d7b300f910a5e4265d6382,2024-11-21T09:28:55.363000 CVE-2024-31110,0,0,3c66afe36bab5ee920b13fbf6ea6b59a6faef0fc7676edb21613a072aee7907e,2024-11-21T09:12:52.500000 @@ -260919,19 +260919,19 @@ CVE-2024-35540,0,0,7617ec41b467bc5de8aa2d05744dbd4fc53e6d5d057c21556d6cac0d34e12 CVE-2024-35545,0,0,02db918fbac72f60069537e5632986b7ee4a21fb9c9aeba0e7b604e5946e7a75,2024-11-21T09:20:25.070000 CVE-2024-35548,0,0,c1f5e4ec9cf32d40d878d31c83896e5359feac4068f2490d889f9fa67d70814c,2024-11-21T09:20:25.280000 CVE-2024-3555,0,0,cc1391dedaedebdb3e5a5d102048b53d4990bd2c7513f917530c05565b72db58,2024-11-21T09:29:52.047000 -CVE-2024-35550,0,1,b9c7a1ec35c88855cabb19911f228a9499e194537607534e168ad61feda57ae3,2025-04-09T18:21:16.130000 -CVE-2024-35551,0,1,0502e63dcad0b7ce44add9d951dff7465977c366dbb0ba3e525028781789c0af,2025-04-09T18:21:07.650000 -CVE-2024-35552,0,1,60bd8ffb523ebb8c9f1e7826e229d245bc80f9b47e599de9d5281feb6aca3dd3,2025-04-09T18:20:58.440000 -CVE-2024-35553,0,1,d9600e5ed43e017bfb6bddc9b0899bba67fea9328e6b7dfc0858e730142b86ba,2025-04-09T18:20:47.847000 -CVE-2024-35554,0,1,f36215ad36f9e70aef7941b1723509ca22c92be1b808c61d298bd14935088b83,2025-04-09T18:20:34.677000 -CVE-2024-35555,0,1,3665c89985169dee849456030e7353ad73ed9a625d54613af6dae57c41cb9c24,2025-04-09T18:20:21.197000 -CVE-2024-35556,0,1,c7492487a1a397554d7d618ae4eaa2dee5b38f6dec5ec1c32f929b4a79fdad25,2025-04-09T18:20:08.663000 -CVE-2024-35557,0,1,3889765182537dce0148b9a851a8daef7701370f0f565aa27fc6cf86c2592e7b,2025-04-09T18:19:53.267000 -CVE-2024-35558,0,1,52bd94d91f3220205e050f38ed70790f8a5590aaaa0a23f9a0381ead2f0dc9d7,2025-04-09T18:19:40.080000 -CVE-2024-35559,0,1,91f18c60703a495596330875ceeb928da8b56b1ad1a5e543a10b1a19f0e8fc57,2025-04-09T18:19:26.117000 +CVE-2024-35550,0,0,b9c7a1ec35c88855cabb19911f228a9499e194537607534e168ad61feda57ae3,2025-04-09T18:21:16.130000 +CVE-2024-35551,0,0,0502e63dcad0b7ce44add9d951dff7465977c366dbb0ba3e525028781789c0af,2025-04-09T18:21:07.650000 +CVE-2024-35552,0,0,60bd8ffb523ebb8c9f1e7826e229d245bc80f9b47e599de9d5281feb6aca3dd3,2025-04-09T18:20:58.440000 +CVE-2024-35553,0,0,d9600e5ed43e017bfb6bddc9b0899bba67fea9328e6b7dfc0858e730142b86ba,2025-04-09T18:20:47.847000 +CVE-2024-35554,0,0,f36215ad36f9e70aef7941b1723509ca22c92be1b808c61d298bd14935088b83,2025-04-09T18:20:34.677000 +CVE-2024-35555,0,0,3665c89985169dee849456030e7353ad73ed9a625d54613af6dae57c41cb9c24,2025-04-09T18:20:21.197000 +CVE-2024-35556,0,0,c7492487a1a397554d7d618ae4eaa2dee5b38f6dec5ec1c32f929b4a79fdad25,2025-04-09T18:20:08.663000 +CVE-2024-35557,0,0,3889765182537dce0148b9a851a8daef7701370f0f565aa27fc6cf86c2592e7b,2025-04-09T18:19:53.267000 +CVE-2024-35558,0,0,52bd94d91f3220205e050f38ed70790f8a5590aaaa0a23f9a0381ead2f0dc9d7,2025-04-09T18:19:40.080000 +CVE-2024-35559,0,0,91f18c60703a495596330875ceeb928da8b56b1ad1a5e543a10b1a19f0e8fc57,2025-04-09T18:19:26.117000 CVE-2024-3556,0,0,9787ca18b88896ee1584412198f4dc04ba2a937adc3d7411830de60cf4601cb2,2024-04-09T22:15:07.470000 -CVE-2024-35560,0,1,48e070e611de52eb13943365043665d1177db64be8e6318899235aa9c158ca65,2025-04-09T18:19:15.387000 -CVE-2024-35561,0,1,607cc4107c9d07166ebf3a0726e40d20f6380e6352b780fd25ad91b59b4c0dc7,2025-04-09T18:19:02.790000 +CVE-2024-35560,0,0,48e070e611de52eb13943365043665d1177db64be8e6318899235aa9c158ca65,2025-04-09T18:19:15.387000 +CVE-2024-35561,0,0,607cc4107c9d07166ebf3a0726e40d20f6380e6352b780fd25ad91b59b4c0dc7,2025-04-09T18:19:02.790000 CVE-2024-35563,0,0,5d5fb2577032a8afddffa93556e4923f3b21e76b0661ae4923c7fa2336020e28,2024-11-21T09:20:27.920000 CVE-2024-3557,0,0,8eb6b0b137d4e78ee7e29e4557ad33b22d9813f3ad7e659bee392f7698571fda,2025-02-11T15:54:54.590000 CVE-2024-35570,0,0,8afae08e8e5d5014d364cd231ef2a1ddae088a07503096b8ac4065659f43a8ca,2024-11-21T09:20:28.183000 @@ -261878,7 +261878,7 @@ CVE-2024-36604,0,0,b965b71d71fc7c5a435eae0bac282843e7c3cc24fd1379264acea5ad66aa9 CVE-2024-3661,0,0,cb02fbccc390682d89dc83335b9dfb2f478795999349088fcdae3fc2c69e43b6,2025-01-15T16:50:28.667000 CVE-2024-36610,0,0,086f8f5b46926c0d5b801e2f18812ba0aac4c04dd5f1ff997c802b3134a682c8,2024-12-24T21:15:18.280000 CVE-2024-36611,0,0,8ae1129d2c6d7f04820dc25a51b35eeb79c0ea9714d3891bb92ee90d865f9805,2024-12-03T21:15:06.783000 -CVE-2024-36612,0,1,efb11d8d6e6214c55b090e86d73bca2a8d26923f87899c7a0feb398c45158215,2025-04-09T18:54:42.280000 +CVE-2024-36612,0,0,efb11d8d6e6214c55b090e86d73bca2a8d26923f87899c7a0feb398c45158215,2025-04-09T18:54:42.280000 CVE-2024-36613,0,0,b7baf4e09e8e2e390854f7637a801321e4cf8ede9da250ff01c3b59112fc41a0,2025-01-03T21:15:13.140000 CVE-2024-36615,0,0,c3893c90b5581100f420f26ee0ccf784458a2107b295d3c77defc3849a0f0672,2024-12-03T16:15:22.197000 CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000 @@ -268176,7 +268176,7 @@ CVE-2024-44853,0,0,a3baa20da8c42d2a3d05fc0f4bf9256ac96d6eb1a5c90ec0d8f5a7b212a45 CVE-2024-44854,0,0,ea0ddc82177932ea52a0fb1acdcf49cf1038b7594c327b14b2b879711f83444d,2024-12-13T20:33:31.050000 CVE-2024-44855,0,0,d7d56e8281e5b643764e30b691f17dc1836f902a8e6698d92a60935748ce62a3,2024-12-13T20:33:16.580000 CVE-2024-44856,0,0,93c53dc8759cdffd08a4bcb1502c758eaf006cc5e92793bfbf195659c6e1da75,2024-12-13T20:30:19.047000 -CVE-2024-44859,0,1,387e37e6d48cff65fa016c266dc67442cdda96eaea13849cf63f72962e4c5921,2025-04-09T18:46:56.230000 +CVE-2024-44859,0,0,387e37e6d48cff65fa016c266dc67442cdda96eaea13849cf63f72962e4c5921,2025-04-09T18:46:56.230000 CVE-2024-4486,0,0,d95d6336818009c9b70dd65fb3d4752504bdb5c2630eed2945b4771d79bd5905,2024-11-21T09:42:55.490000 CVE-2024-44860,0,0,b57c8bd2bd66e030d28d8223c6a00765fe3018482e70feea4ac82ddd9af0ff85,2024-09-30T12:46:20.237000 CVE-2024-44866,0,0,a1a8bc66ae2cd23b8b69c798d63d5a5fe81b6698f3aa23a0272785daddf71ea3,2025-03-19T19:15:41.687000 @@ -272816,7 +272816,7 @@ CVE-2024-51111,0,0,1b60f534839740b969e5474b088b0887cce9ab6321e3570e84fbd1d3290a3 CVE-2024-51112,0,0,fb9ec1f188e1020f6eea6a788766268b99f0b03f66304006a370bc6367d7b8dc,2025-01-07T15:15:10.270000 CVE-2024-51114,0,0,bb120dee5f82301bedd52f6a870fc78612d9b471bba9079cbb07365933b729b3,2024-12-05T20:15:22.340000 CVE-2024-51115,0,0,97924e30f339bc462ccaad1ee3c55c378e15485436cb0bc88676f0cde030376a,2024-11-06T18:17:17.287000 -CVE-2024-51116,0,1,0322ed7707e20190b8dd42074a041cbeb11be4aa0674d6cff02c353320818c7c,2025-04-09T18:47:22.867000 +CVE-2024-51116,0,0,0322ed7707e20190b8dd42074a041cbeb11be4aa0674d6cff02c353320818c7c,2025-04-09T18:47:22.867000 CVE-2024-5112,0,0,04a8d98896785951673c15473be11ff0b83eb44dbda5f84eadda904d1ef4cdf8,2025-02-21T20:06:52.563000 CVE-2024-51122,0,0,032eda6ef4356c413d34ec64379012302427108464591348425bff48a082f9f1,2025-03-18T21:15:30.977000 CVE-2024-51123,0,0,7fb96633793369a89316aaa3fa097d3ce7001fefdc75c1abf4ea7cb6c1954e59,2025-03-22T14:15:15.170000 @@ -274505,10 +274505,10 @@ CVE-2024-53458,0,0,272c62d4cd0da865086472fe77a2a8ec2d99f1c833667a378d2b07e7b6c8b CVE-2024-53459,0,0,5f9e5f3a8b33fbe02bdd059bb8fe15cb2eeacdc4f602dd12944ee928044f080b,2024-12-02T18:15:11.123000 CVE-2024-5346,0,0,835e1b7230e6e33db8d8cf7bc9b64a0aa9f43b5b6335773933376ca9c2372d0c,2024-11-21T09:47:28 CVE-2024-5347,0,0,0c5671c37266d4b6415334f49ff7f9b369d4764bc9323bdb81fdb5f456d61912,2025-01-07T17:37:36.740000 -CVE-2024-53470,0,1,95cfcc5a20086a409a2a79df980d39465b61afd7e8393eaba6ead696a4b673a9,2025-04-09T18:30:08.277000 -CVE-2024-53471,0,1,60691f0a4d6df5c7823f67d185adf35c033dfe32b1f034babfc49f2a05728603,2025-04-09T18:29:58.013000 -CVE-2024-53472,0,1,4fcd12884ac7008079d0683f21b2dc04f26941b0a4f83753566773c46b5daf36,2025-04-09T18:29:44.127000 -CVE-2024-53473,0,1,8934db8a2c975692b65fa3fcf41963256fe3fe3f25c06ec8b5592c427bcff4dc,2025-04-09T18:29:29.920000 +CVE-2024-53470,0,0,95cfcc5a20086a409a2a79df980d39465b61afd7e8393eaba6ead696a4b673a9,2025-04-09T18:30:08.277000 +CVE-2024-53471,0,0,60691f0a4d6df5c7823f67d185adf35c033dfe32b1f034babfc49f2a05728603,2025-04-09T18:29:58.013000 +CVE-2024-53472,0,0,4fcd12884ac7008079d0683f21b2dc04f26941b0a4f83753566773c46b5daf36,2025-04-09T18:29:44.127000 +CVE-2024-53473,0,0,8934db8a2c975692b65fa3fcf41963256fe3fe3f25c06ec8b5592c427bcff4dc,2025-04-09T18:29:29.920000 CVE-2024-53476,0,0,445cb11a55503c7fabeb917897f4172db604756c11d8fca90e521e45b43afe37,2024-12-28T19:15:06.880000 CVE-2024-53477,0,0,3dfbb52637bb052a793d1b67a024cd50b899929ad7fee8a9366a9aa6e069e388,2024-12-11T16:15:14.150000 CVE-2024-5348,0,0,0c3454114961657672c2409af3f9f2f3bb9995c6579ea15f7d29552347b906f3,2024-11-21T09:47:28.240000 @@ -275495,7 +275495,7 @@ CVE-2024-54880,0,0,367dd3332b5c2c2a59842a69a8dd9d5af2ec23edd38ee3b651f693cd25270 CVE-2024-54887,0,0,7af3cad075b59623b7b3e30dd1983d85e5a9b2bf998f2ab9a001666a2a4fd71c,2025-01-15T21:15:13.820000 CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffabd,2024-11-21T09:47:46.807000 CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000 -CVE-2024-54907,0,1,0a20c28fd761bfa7a6390d689b37f3d0c6aae7c8bf9a3fa52e7674e763fd8865,2025-04-09T18:36:22.210000 +CVE-2024-54907,0,0,0a20c28fd761bfa7a6390d689b37f3d0c6aae7c8bf9a3fa52e7674e763fd8865,2025-04-09T18:36:22.210000 CVE-2024-54909,0,0,e09df11f9fd23515b803ba3007fd40230638945f3a2c3c6e417f7f2b8d8f42bc,2025-02-12T15:15:15.220000 CVE-2024-5491,0,0,f430fd5a631d3836b39db69c0e7e21d3595a43a4e0a9c7d9dee8bbd76daa2dff,2024-11-21T09:47:47.017000 CVE-2024-54910,0,0,6581157280a10462a6b1d5622c98ff4607d8f7315bb6a89f500333c22a07f58a,2025-01-14T16:15:32.953000 @@ -275608,6 +275608,7 @@ CVE-2024-55198,0,0,d81482838c3eda383660502c3dd8d0719792f72678809058edc3d892f7387 CVE-2024-55199,0,0,9dbaedf3926a39070909e5e303310645f833671fab2b674351cde48dbd521f5b,2025-03-10T18:15:29.757000 CVE-2024-5520,0,0,8e37f80f49d8257d789ff243b3bd23d0755293ef19b3bf396e272b6f57dd6b48,2025-03-04T17:09:25.197000 CVE-2024-5521,0,0,4b0b66f08e39251b0a2e64c4ff4668810c28769b7c19c197d3b32841431eac6d,2025-03-04T17:09:21.817000 +CVE-2024-55210,1,1,6aa0e28499e3cb4f51444b0ba85336a2399e4b857dbc26a1b4b6323bf6db574c,2025-04-09T20:15:24.633000 CVE-2024-55212,0,0,a6af1d9be1703b0f0b2501aff2d7c70911c6d2698ddb1bb1c05cdf69cfd6a11e,2025-02-12T22:15:40.263000 CVE-2024-55213,0,0,8513bb831150e9b2f9c9331f3cff5332a4c865fee2137f33d93fa35cf6585b18,2025-02-11T16:15:42.720000 CVE-2024-55214,0,0,af8f46f257d87257d4e7d9c6b3b38d6b5afbf55bb0663eeb63d8323965dbc886,2025-02-11T16:15:42.910000 @@ -275640,7 +275641,7 @@ CVE-2024-5533,0,0,6ea3c0edbbc0effb3cedc69539f40670649944720fc318b090494d3e8d8cf1 CVE-2024-55341,0,0,32b88ffcace04987952e76982ddb2fabb1fdef0b8350ead9c1b3cbef3f8f04c7,2024-12-20T20:15:23.343000 CVE-2024-55342,0,0,c1006192a9d35507b8ad981a4c836150dcbcd1afe702b76f0696b97fbea16a5c,2024-12-20T20:15:23.660000 CVE-2024-5535,0,0,b70b433a28b7d7ab0e1d2beceba590e517cc88af55d524db84cbd7ff3afa5ee3,2024-11-21T09:47:53.090000 -CVE-2024-55354,0,0,7f8f0715d1b67c083641a5324d4fedbca38de8e5802f60a2897420874048fc1b,2025-04-08T22:15:14.887000 +CVE-2024-55354,0,1,9f35cce343aee69441fa56490317ee68a293463474ae422d1bbf295b498fe2af,2025-04-09T20:02:41.860000 CVE-2024-55355,0,0,2bb36a027cfc17a18c27f2dfa7ccd1dd7e44d92fe7cc55df027cf0c874369fc4,2025-01-08T01:15:07.297000 CVE-2024-55356,0,0,24a1f90c25942035af99f5d3d7ecc4294dd5cf67c67caa2d1d5b1544ce44efca,2025-01-08T01:15:07.370000 CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c0e,2024-11-21T09:47:53.307000 @@ -276664,9 +276665,9 @@ CVE-2024-56973,0,0,12253d0e48ffb1ddb87cfc0c04c4260295d24963d70f90644e9d09df8a471 CVE-2024-56975,0,0,0071cee7474680c346b3b2fad2bfb64294423413b194d68dd676ce33bd94892e,2025-04-01T20:26:30.593000 CVE-2024-5698,0,0,44127f605325468d176f78917e01b48d4267668ec2c2568286216f422611e552,2025-03-14T02:15:15.520000 CVE-2024-5699,0,0,1730c9027af76599da8d9065a8791c28c158ddf15d1c6df442aeda60bd4e144e,2025-04-04T16:30:29.173000 -CVE-2024-56990,0,1,90cecded0a71bf0c80923b223f7ed0199d6838bdd7d486a962bdef62d3b96ecf,2025-04-09T18:33:54.980000 -CVE-2024-56997,0,1,79e740502c11325e381a724e08e4a7ca8d66b2b1d6aa2e56ffff7f985f1debb8,2025-04-09T18:34:09.567000 -CVE-2024-56998,0,1,aa65e2113b9a03167a0c13f496931bf3535db0451b27a85dc03243b4cd8759ab,2025-04-09T18:34:18.130000 +CVE-2024-56990,0,0,90cecded0a71bf0c80923b223f7ed0199d6838bdd7d486a962bdef62d3b96ecf,2025-04-09T18:33:54.980000 +CVE-2024-56997,0,0,79e740502c11325e381a724e08e4a7ca8d66b2b1d6aa2e56ffff7f985f1debb8,2025-04-09T18:34:09.567000 +CVE-2024-56998,0,0,aa65e2113b9a03167a0c13f496931bf3535db0451b27a85dc03243b4cd8759ab,2025-04-09T18:34:18.130000 CVE-2024-5700,0,0,74581d1dc6980026887eecb9624ffac50dafc887943244cfba41a9e32a84bebe,2025-04-04T14:41:15.230000 CVE-2024-57000,0,0,460306b986b7afa4a0ccfcddb0d7bb17c2025a91b33826727edbdf18f762d9e4,2025-02-14T18:15:23.743000 CVE-2024-57004,0,0,33a0b0d1e68381c2f532216bd5b0302915286f3268a0db0f05849b63a54f698f,2025-02-12T20:15:35.330000 @@ -276689,10 +276690,10 @@ CVE-2024-57024,0,0,b68346eb13facf6ee44db7ebf70e9e966b8d190ee6391caeb28473ce9be94 CVE-2024-57025,0,0,7ee55ce7519fc2774a2551d6198b8641b1cda9a767e050c87778cbf201161402,2025-04-07T18:08:31.093000 CVE-2024-57026,0,0,351026cc170164edb6000735e51d388c94af3a833f7387ea19790b1a57875de9,2025-03-03T20:15:43.733000 CVE-2024-5703,0,0,3d28349807701c555fbb2ea67def24c228f00e38f4a4f9bb2c70209ffe7ffa47,2024-11-21T09:48:12.467000 -CVE-2024-57030,0,1,392d6d779b8345b6dfe85c9d5b346d5e6a1b1802376dfeba76be3ee2b39d94e7,2025-04-09T18:24:20.647000 +CVE-2024-57030,0,0,392d6d779b8345b6dfe85c9d5b346d5e6a1b1802376dfeba76be3ee2b39d94e7,2025-04-09T18:24:20.647000 CVE-2024-57031,0,0,c4af9487ead66ef76cd4a3ea5a6eb13a975152559a6fb0087cc876fef4f78090,2025-03-24T18:15:21.287000 CVE-2024-57032,0,0,105ef0c77189f00b21a7dcb2bf17ed45ca2b598d3d026e147cb0353f40c23d49,2025-03-19T15:15:52.427000 -CVE-2024-57033,0,1,e9278fef113e9d7a12142232100472b33f21dbaad37d799ac83fb8487a1513db,2025-04-09T18:30:54.083000 +CVE-2024-57033,0,0,e9278fef113e9d7a12142232100472b33f21dbaad37d799ac83fb8487a1513db,2025-04-09T18:30:54.083000 CVE-2024-57034,0,0,f7b3013f55cfd21edbbb403e8e50ace95b494e7b749f8ed3f7d43b029f40fbbb,2025-03-14T18:15:30.897000 CVE-2024-57035,0,0,fc128f708fa5ccc76197fcb36159086bf6daf8c8d85d358c9d8bafe0fb4b387d,2025-03-18T18:15:27.960000 CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000 @@ -276862,7 +276863,7 @@ CVE-2024-57473,0,0,10a61caecb0d17d5de44d2223b17537d3d7710a14195316d52123c068dfd3 CVE-2024-57479,0,0,a4fc4c04a4d0cd0e22b8fe1e9d84faf33bcfbb80c5a2b55e9ddb9daa820188a9,2025-03-18T15:15:58.493000 CVE-2024-57480,0,0,8afd2f2509d24fb5fcd6d83f3abd7082d4bc0ce361a4921ced1cc67aa295a249,2025-03-18T18:15:28.130000 CVE-2024-57482,0,0,859c1ed6b53c872a2c976c747abee784c7f6cb88ac30b945b593d0bb4868f5bb,2025-01-23T17:15:17.677000 -CVE-2024-57483,0,1,40be0d7421be4714cd2f6c9d4f3be59b3398578d98e42f725488d9386094b55e,2025-04-09T18:32:38.667000 +CVE-2024-57483,0,0,40be0d7421be4714cd2f6c9d4f3be59b3398578d98e42f725488d9386094b55e,2025-04-09T18:32:38.667000 CVE-2024-57487,0,0,d3905e04c0b92e6f29e51a8e367282250e1d829ba7c370eeaa1326311291e976,2025-04-03T18:48:41.720000 CVE-2024-57488,0,0,a6a8d84b525a0dc3d26ba5e4142d4fd29a34b96ea53e5fe7f7129f2be99bd9e8,2025-04-03T18:44:37.930000 CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000 @@ -278307,9 +278308,9 @@ CVE-2024-6853,0,0,c32873085402b2894b4bf1b73443804566c49c5f1974bc7f522ee6bcef892a CVE-2024-6854,0,0,32c1e89716f6a1b49a203344a9f9ec397aca8e0e732a479bcba293cbe40b6523,2025-03-20T10:15:34.377000 CVE-2024-6855,0,0,90f2d13d44f8f828bf763de830744fe8eb18f3e691a5c2b2dc7b2a27fa87440f,2024-09-11T16:21:38.833000 CVE-2024-6856,0,0,1d52c3649f05c0c980b64fd1f5cab54dbc58352542fcb0edf74878935b496390,2024-09-11T16:20:45.503000 -CVE-2024-6857,0,0,189e6cf1cf24623bcff66ad5de0b00a3ee6eb4383baeec643fc8edc656d72e89,2025-04-09T06:15:39.347000 +CVE-2024-6857,0,1,8eab528fa5f4fb30d527f93c433d237511289fdfa8cef7dbb547cdc697316d85,2025-04-09T20:15:24.753000 CVE-2024-6859,0,0,99cc3843207fd338974a08448fdfdd51e73aa2b0c5e6d439886a3b34324f4c56,2024-09-11T16:19:18.517000 -CVE-2024-6860,0,0,d48441a52eca43c2807c1b7ae35a2507c213159f67b2b90b0f7e7beed0d83ef4,2025-04-09T06:15:41.177000 +CVE-2024-6860,0,1,f468c60d0aab9ab19e9e70fb66cc445abb9e53be9f80df042904324ca19b87f2,2025-04-09T20:15:24.903000 CVE-2024-6861,0,0,044736717015d06acc2491073ba6a9df1ca8940561a45316f91ac956b3ed072e,2024-11-06T18:17:17.287000 CVE-2024-6862,0,0,0b764ca2b57fb11a8ddab3d8974f90cc772246aa3fcbedf5e5f916af6152ab7d,2024-09-19T18:37:20.910000 CVE-2024-6863,0,0,6746ff85964b6fdf68b9ece5610845e7fb5a9c81952fa6356d5e94fb9ae562a9,2025-03-20T10:15:34.493000 @@ -279589,7 +279590,7 @@ CVE-2024-8239,0,0,18b394f2b5d58ff518aa61d1f84e6af22701eb55acac6cfa2d9fb37044a676 CVE-2024-8240,0,0,1934c55d8bd175d4c64cf692d01034dde01f2a9bd239d9d216b155301fabaafb,2025-02-11T02:15:36.233000 CVE-2024-8241,0,0,240ba22278e87fbb937226c292941562b9ebf07091a7db9ad5e4be808dc7ed87,2024-09-26T22:03:42.123000 CVE-2024-8242,0,0,92d0ae52b788a9098d6ea012d6ef1e1a99012f68944ecf4931a72818291dd2bf,2024-09-18T15:47:56.553000 -CVE-2024-8243,0,1,d3943022186d7a1136e49c2256bd8cc82fd03be8cf84d817f3c2f5611b35aa5e,2025-04-09T19:15:47.270000 +CVE-2024-8243,0,1,3f5aa6be2591852939aede85b45972fbac23fdb00541b2b941e70c83e66b955b,2025-04-09T20:02:41.860000 CVE-2024-8246,0,0,ea2df83409a33312ca032d3b27b5ff08f3181f1f746d560031e6109e1151a3ff,2024-09-26T14:00:09.783000 CVE-2024-8247,0,0,a04d24ec28629f0a7f3d1129eb338d89007fb8e025fca533d6d95e26c91f4a7c,2024-09-26T21:49:54.290000 CVE-2024-8248,0,0,ef9fb395d105d137f73713a418b791223ae30f031a7bb1b24390667ec7a2e014,2025-03-20T10:15:41.737000 @@ -282362,7 +282363,7 @@ CVE-2025-1762,0,0,ce8cf52bf9353db820aa11f81bcb02a3d741cedc087ff1dfa90f7c9798f2e0 CVE-2025-1764,0,0,13706f4025eae225fc3793a7e7a1fa321df281c8253d66f7993d98f6aa09100c,2025-03-14T06:15:24.860000 CVE-2025-1766,0,0,598707d3f8b19c5a3ff0b336e9bc39a76f8ffb8a9d939d0b001d5b5f979e7c65,2025-03-20T06:15:22.740000 CVE-2025-1767,0,0,db4a25182003b3801d09638d93655c86fe8651aa60672fd3a6309c07b55e200e,2025-03-13T21:15:43.127000 -CVE-2025-1768,0,0,21c4d8708441d636d3d85a241f0a7821ff945f56838f66ee7adb3147ed9da671,2025-03-07T11:15:15.653000 +CVE-2025-1768,0,1,101a8e82a70ef71552223d868f10de460a054da869dc42f7ffd13f2896bfa127,2025-04-09T20:52:13.823000 CVE-2025-1769,0,0,40a5f722c30fac35eb6f1c2b5584f1f53ecf84c5015f4b5e10367b65507f6b46,2025-03-27T16:45:27.850000 CVE-2025-1770,0,0,dabca41c99283c1e30c784be93a5fbf7941611623d961fbc22d34f6c0b873c34,2025-03-20T06:15:22.903000 CVE-2025-1771,0,0,fbe92b0fe50601c60b5583b38f822aee7d75f574ab45d98310de4f563be4c316,2025-03-28T15:05:47.470000 @@ -282525,7 +282526,7 @@ CVE-2025-1964,0,0,f3200eed952b3d7931f5b0fd0f11005bcbc09bae5c7fe934cfb0e9c7d91d2e CVE-2025-1965,0,0,0bd3ee25b34ff10ec0343650056b235e91923f04d47a256a8d005445273d6545,2025-04-02T18:32:15.230000 CVE-2025-1966,0,0,60351edbd712a588bb5881e51b130671c2f34922067bedba86f618a830ee71d2,2025-04-02T18:22:05.807000 CVE-2025-1967,0,0,3387296b9cefdd13f619d7dc051be15c030caaf40c015f755b6d694f53e6ce80,2025-04-03T13:32:47.553000 -CVE-2025-1968,0,0,2f86dbe8a3fb6030369940c835173bd717dedbab7f6e3ffc8a9caf936dab1dad,2025-04-09T14:15:27.950000 +CVE-2025-1968,0,1,a18f0f8fc8a37fc6ac439e9302793b291d85fb6fa13dde35ab029fd4119d625a,2025-04-09T20:02:41.860000 CVE-2025-1969,0,0,00a186c236826ccc3fef0cf6a93be58578d3139f3a01ea0f0842aa271ed48f15,2025-03-04T19:15:38.290000 CVE-2025-1970,0,0,c01adcaf18acac016f78895b73f7486093810b323ebc7285186e86ab961aee74,2025-03-22T12:15:25.797000 CVE-2025-1971,0,0,4a2b8144dd19911475cb202ad5b0fc41816e2274b0457fd660842d87000a8960,2025-03-22T12:15:26.250000 @@ -282716,11 +282717,11 @@ CVE-2025-20653,0,0,50d853eb215922ff4e0114da3bc24d2a38f72d15c38383615dd0616a498c1 CVE-2025-20654,0,0,4c8dfc811e7788417ed93b8b014b8790b2c64351d5337b984a9a00d1a2b8e17d,2025-04-09T15:46:21.793000 CVE-2025-20655,0,0,bebaa6240cde4949ca99b762121ae98080340f20e965c2502bb927238910c09f,2025-04-09T15:37:20.007000 CVE-2025-20656,0,0,02b48d07e913b7a66c8109a95b57b7f7711e6a047daa439250e21d994c897a18,2025-04-09T15:29:43.380000 -CVE-2025-20657,0,1,758df40762176a40244b7992db39e6ee6bf75a443b066f9a9fc076c1c3bc1ad9,2025-04-09T19:15:47.410000 +CVE-2025-20657,0,0,758df40762176a40244b7992db39e6ee6bf75a443b066f9a9fc076c1c3bc1ad9,2025-04-09T19:15:47.410000 CVE-2025-20658,0,0,48cc61399a1137f56a7e13c5419a4820632c258391c4f1a0be279a15efa0ac0c,2025-04-09T15:20:15.973000 CVE-2025-20659,0,0,c9376041388a62bbbeaaa8f6e2e502193a3be4a871ff6e16cfc657080e2155b1,2025-04-07T15:15:42.517000 CVE-2025-2066,0,0,91ff735ed7e88e4436bc7b6b6f477b59d5c22b6987e7f0098d0b58198b0d10ea,2025-03-07T05:15:17.293000 -CVE-2025-20660,0,1,9420ec05452fe26a997974ddd4112cf9ab6222cae6a669e6290ce0de00f9b5d4,2025-04-09T19:15:47.560000 +CVE-2025-20660,0,0,9420ec05452fe26a997974ddd4112cf9ab6222cae6a669e6290ce0de00f9b5d4,2025-04-09T19:15:47.560000 CVE-2025-20661,0,0,fe9cfdbc6ae98f10fa5bdd8a6f5e8f4ca14320fe2a8273d9a8ddc13a56b5b500,2025-04-07T14:17:50.220000 CVE-2025-20662,0,0,c0b15438270c5965797b9a499bc7055c1d559f4935fa3e0fe36a67cd6f622ebb,2025-04-07T14:17:50.220000 CVE-2025-20663,0,0,79f276b3bc6e96bea407375e71e21dc2b7297edb9c6bd35821311f84bc0ce25c,2025-04-07T15:15:42.660000 @@ -282815,7 +282816,7 @@ CVE-2025-20948,0,0,f6d1bd92f635cd61b4936568dbcc7fc7c1c68ca2aa8c8bd9d88e63a4019d4 CVE-2025-2095,0,0,0771dfdaa7f5a9bdaa490d5905077058ee8317ef9abf41eb456694d6c50802c2,2025-04-03T15:29:25.480000 CVE-2025-20950,0,0,0159801c9148648b8f23d2df1c89375ac3ba0e9f6699a13e4cf15a70b2ebbdb0,2025-04-08T18:13:53.347000 CVE-2025-20951,0,0,09d895bc746d2a550be66205932e05a0ff9c20cbb85bb356552015f4859a2c29,2025-04-08T18:13:53.347000 -CVE-2025-20952,0,0,70f6b8b9744da4c5578c7262604e658c6853a6dace455e3a79f22282434e0c8f,2025-04-09T08:15:16.153000 +CVE-2025-20952,0,1,95925f75c98d853ff46542d5cf462cf29e82588400c8e19da8b2988c598d2227,2025-04-09T20:02:41.860000 CVE-2025-2096,0,0,292db6447376201865fa6b6bca264868ca9268918f971bbc1b4140d2101af9d8,2025-04-03T15:24:48.847000 CVE-2025-2097,0,0,6047e39c4c31f56fb6b4d769332184afbdc9db68c4842cf97ac1d0c07798735b,2025-04-03T15:28:41.053000 CVE-2025-2098,0,0,339294206fd4d5be14c5ec0cfdf9d0429803ca53d006fc61729cc0a81c0f19c1,2025-03-27T16:45:27.850000 @@ -282884,7 +282885,7 @@ CVE-2025-21170,0,0,1450c7d6212057c0888c0725a2861d746344e735a3d98db59a493744ea82b CVE-2025-21171,0,0,5039d30bbad3c7a9ef0d4706f8bc1f73414fca568f5dd18586207d2df517e5d5,2025-02-05T20:07:01.797000 CVE-2025-21172,0,0,bacfb5c7449e528ff37d0b0dc34b744db150f394b1322d255e5475d0135374a7,2025-02-05T20:03:33.053000 CVE-2025-21173,0,0,777122bc11f0afe7d725be5fe0ce160609dbf692b0cdcf18e5e5b49ebf30a0f2,2025-02-05T18:56:08.103000 -CVE-2025-21174,0,0,d3b23eedeb7486dbd63e007d377c8f1d00bc0ade526056e5493de4539e747890,2025-04-08T18:15:44.667000 +CVE-2025-21174,0,1,32eb182fe9e109c6be2cb1b3185e11c698a6a94bc129fdf26e8805a27d58b714,2025-04-09T20:03:01.577000 CVE-2025-21176,0,0,3a95640b372fc9da2c8c06537fe18e2ab9d55d13653d370c40ea3cce98ff789d,2025-02-05T19:12:24.030000 CVE-2025-21177,0,0,4f903499a658859fcb10826be90a0ea63b63f075823c3150567dddccfd65ed77,2025-02-11T22:19:45.057000 CVE-2025-21178,0,0,2e136374627162253d0167ff97a286c63e9372c61326ec5a052e546f8d476b27,2025-01-27T18:42:39.560000 @@ -282902,19 +282903,19 @@ CVE-2025-21188,0,0,61d904ce8e6c95796300defeff9d9b6f0efbb3f96f38de375b3e31d2b7fd8 CVE-2025-21189,0,0,329c5c7b58ec66de4b6d9cd35e4d5fad7c108585bdc451001b100691c802e6da,2025-01-27T18:42:24.057000 CVE-2025-2119,0,0,ab29849c56f7541fdf0c3005b1d9da81bd8ddf06649c2a19b32dc3b60d91d4db,2025-03-09T09:15:12.560000 CVE-2025-21190,0,0,819752cd3115f7af5207de865076f72a020a9a152494989bb3b0abf4b1c0761e,2025-02-28T16:48:20.103000 -CVE-2025-21191,0,0,69c784809880f84a41cfd13aa827c127934d68a0fcd63941662c1c8935ba6533,2025-04-08T18:15:44.857000 +CVE-2025-21191,0,1,722567dfd404f9806ef24b382b5876d573b1dfb481d8f95be2ea2fcdceb93cdf,2025-04-09T20:03:01.577000 CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000 CVE-2025-21194,0,0,4cbf78ebc8712bf991c571b0aba8e62887ba280acbf4ff53a1e72f262be2e98d,2025-02-11T18:15:30.820000 -CVE-2025-21197,0,0,a0229ab24dae7a64dffa583fbad0f6b5f11bf03bfe880acafe01c7165edb1c44,2025-04-08T18:15:45.020000 +CVE-2025-21197,0,1,5adfbc1258b4d2cd917d1ec8d4a78d0801153d145efbf281e914533e131c195d,2025-04-09T20:03:01.577000 CVE-2025-21198,0,0,53f4f6f369d20143c35bfb3b5b8897af38e7b533edcc49e38792fe973cc138bb,2025-02-28T16:55:17.600000 CVE-2025-21199,0,0,176b72582a1c759b2a221af004f3d1533ed53f519d379a96b3f3fa529467e5ed,2025-03-11T17:16:19.670000 CVE-2025-2120,0,0,0933aa4b9936e187fd4f948e78df06306502f3ac542ebc510852ac5f6bc0c99c,2025-03-10T16:15:14.347000 CVE-2025-21200,0,0,bed665fd252cfd79c02f5d4dae91a80a34e04b772a3708341c7356808fa5bc3c,2025-02-28T16:55:25.900000 CVE-2025-21201,0,0,8d16d2905177160db2b6032ff92e8d3931d8e334462a39af27f84ad6f44e497a,2025-02-28T16:55:31.473000 CVE-2025-21202,0,0,ec4260bee4bd33c21d930aa9c88a20abd99a3045b6128e76b4237cf160037447,2025-01-27T18:41:27.647000 -CVE-2025-21203,0,0,b8776d2b032da31b5919ffbbd42090d315115a1a654c1aba84f97a403c6d4d9f,2025-04-08T18:15:45.190000 -CVE-2025-21204,0,0,d42d46e35add5ffc41f6a194ab231f396370ff28107dd3bb2794bd00a1531849,2025-04-08T18:15:45.343000 -CVE-2025-21205,0,0,7b4b360f7addd9ba931ad4af9510a233bd55770d62097d6b68fc1584134a1a99,2025-04-08T18:15:45.513000 +CVE-2025-21203,0,1,0d3cf8cca7e85ed57f523ac801074d27d046b9f030fe4f8f3af916ec242632b2,2025-04-09T20:03:01.577000 +CVE-2025-21204,0,1,9390cf6749876fd807d56b0fd93b62f2b7678c6fbe5cb5f0bc3a027885ff9f7d,2025-04-09T20:03:01.577000 +CVE-2025-21205,0,1,2130ec9509ae6cc9de5b6f96f81d9a4fee9199cfb989f93c50d33521e71f50c4,2025-04-09T20:03:01.577000 CVE-2025-21206,0,0,4b8246a0a9588c7114ed86965215dc66cea701cb1bb268d6282c30b2185a5b2c,2025-02-28T16:12:14.997000 CVE-2025-21207,0,0,101f5aedceeec8e95c7aa4d154c4fe35b53d1787f61e5e9c69598a5be6aa3415,2025-01-27T18:41:10.137000 CVE-2025-21208,0,0,6552aa4e080fa53d6aaa27d47aaaad081722abcef788f46ace27e1a9e0c90894,2025-02-28T16:11:22.287000 @@ -282931,8 +282932,8 @@ CVE-2025-21218,0,0,d47e4e79318ebd737fa658b56f12e5fb3e30018465210b7af2b0de06c0f4f CVE-2025-21219,0,0,424604839da721e4da825bd88d64a2416b0606f77e8b9a1190e69289c7bcf87d,2025-01-27T18:45:30.370000 CVE-2025-2122,0,0,c9ed4527a584d547462b8cd4e21e8f1b4222be6744dc90b957d2fea15b6843b8,2025-03-10T16:15:14.617000 CVE-2025-21220,0,0,82564910421308f385255df4786cde1003db7381c932ced5ca5e270285456183,2025-01-27T18:45:48.310000 -CVE-2025-21221,0,0,78658d5e549956073333c574448c0cd6deb61df7dceb225b8deaf468187a0840,2025-04-08T18:15:45.673000 -CVE-2025-21222,0,0,34d1f728b5a52a6c98dab31ed43361653d2c708781d9b80244f1d48ad42139d1,2025-04-08T18:15:45.850000 +CVE-2025-21221,0,1,8debc86dd4a4957d9d72741318a8e830d734c2a860e18313a90f938fef5421b7,2025-04-09T20:03:01.577000 +CVE-2025-21222,0,1,e7b251543bae485554a1e77028f2d8c40a397bf4974c06e88e149f2ccf84a2a8,2025-04-09T20:03:01.577000 CVE-2025-21223,0,0,60b46abe07e24569b5150fc60453c8604d1695be1750a046f165ca749c1035bc,2025-01-27T18:45:59.727000 CVE-2025-21224,0,0,e06076d4b37df15b101a61c764231d733771a75106b77973898a9e88711a2e24,2025-01-27T18:46:27.673000 CVE-2025-21225,0,0,43d8a26b699bf26bb564adf13e70126920fe623472670908dddd2c504a6cb0ee,2025-01-27T18:46:45.813000 @@ -283250,12 +283251,17 @@ CVE-2025-21570,0,0,ace167949078eb846cc68a40950678bfa282af3d76d61bcddefc7d830cafe CVE-2025-21571,0,0,bdb8c4caf4103cfe30d360ecbf83480841b6726b170ed756d9f8b563b72e6029,2025-02-04T19:15:33.230000 CVE-2025-2159,0,0,c35f74dfe08a5e5a8f4d124ff145211eb32cd2a8c33fc42587e5543591991341,2025-04-07T14:18:15.560000 CVE-2025-21590,0,0,b36ae92dc904bf55dc4028b2cedf584a24120b0d6e0ef4bd06450d9ddd9f9379,2025-03-14T20:35:13.207000 +CVE-2025-21591,1,1,c7f3fb678e05975334d6b5d6a25fe4214670547cb4b8379e0dbdf63972f4da50,2025-04-09T20:15:25.363000 CVE-2025-21592,0,0,0a84f4727dd27f622e413c24aa51afb8f8c31954e309fc604ecc75437f628076,2025-01-09T17:15:18.203000 CVE-2025-21593,0,0,e4d522ec2585fd9f462af9cacf0614ec9db94ff7e8bb2d84aad64f6482447684,2025-01-09T17:15:18.380000 +CVE-2025-21594,1,1,2b34697fa1352e530fc3ba7f8182c21062054da821352d2a4313e17ae210d23a,2025-04-09T20:15:25.620000 +CVE-2025-21595,1,1,1958e98531d52087735c78759d508fbb868222eb6e983dcac27249cfb9a82dac,2025-04-09T20:15:25.853000 CVE-2025-21596,0,0,1096071862a1a4b487a7ca6a43c6a80beba27fa305e8350c6fd445c040716495,2025-01-09T17:15:18.593000 +CVE-2025-21597,1,1,8edc59d704c0e5faf7d8fe52977fea1e341859fbe541213548a8eeae71e9f1ae,2025-04-09T20:15:26.100000 CVE-2025-21598,0,0,5c3566de5925fc00a103455df088729284ddc356b891286f5a8a7d061a4afc7d,2025-01-09T19:15:20.123000 CVE-2025-21599,0,0,9a870570f5d5bf66cd754c8a1d17f82fd90380fc87a793c8ae36c8199406c321,2025-01-09T17:15:18.770000 CVE-2025-21600,0,0,ccb13893e7de17eabc5a694789cec3336df98d94c48128502c18864542035947,2025-01-27T22:15:14.873000 +CVE-2025-21601,1,1,affd8e2fa14cd2efd77abdb5a3d1d6b2e725d93cae0acbe261aba2e4d406aa15,2025-04-09T20:15:26.350000 CVE-2025-21602,0,0,c19be4b4737359a2e4ed4f02c889d9a8f5b6a59c1e0d49883a4919ec981debf6,2025-01-09T17:15:19.150000 CVE-2025-21603,0,0,de5a98ab5a1846941043ac114cde34c932a06d56fde93bc5468f6ea62d88c11e,2025-01-08T15:15:21.320000 CVE-2025-21604,0,0,a34f469e60a5c97c37f25f38185bf1e66489153f244790f5fcee58d0e1ef98a9,2025-01-06T16:15:30.927000 @@ -283597,7 +283603,7 @@ CVE-2025-21926,0,0,9225232b74827963c0387bc5eaae8f05b23b7fd767e9dbdb7307240d3ba7f CVE-2025-21927,0,0,509e0f25ea8838eb5f991d06e4d55e56aa30f30964f5c854100fc7c1ffddc8f3,2025-04-01T20:26:01.990000 CVE-2025-21928,0,0,0ecb19a8666c3231d4ac90d6817e13f9414cb2be17ee557451d4ad652b681648,2025-04-01T20:26:01.990000 CVE-2025-21929,0,0,fc876dcec58ee23b8a04132d6c9b8380706688cecd1c62a264425350b4f35dc1,2025-04-01T20:26:01.990000 -CVE-2025-2193,0,0,01d923d32f17aa1c9d112eadc31961f031c4ac268652a6d83c98f73d55b6ef96,2025-03-11T14:15:27.630000 +CVE-2025-2193,0,1,8e5af84dde56a5d9b5155a16f15b4c6135e2277f321f17256e72c764084ccb18,2025-04-09T20:48:27.550000 CVE-2025-21930,0,0,d39730e44d2e4d8a59d7e9cc4dd9bbd97aed70afb045c3ab78e7ddf23ee6a763,2025-04-01T20:26:01.990000 CVE-2025-21931,0,0,9861dcd5c43b17158a65324822dc7d0b2a46eb92376cd070551daef3d5461da4,2025-04-01T20:26:01.990000 CVE-2025-21932,0,0,c8c24c1b95513aae9a303137920af81a2f313818387a6148a38ab1bf68167016,2025-04-01T20:26:01.990000 @@ -283608,7 +283614,7 @@ CVE-2025-21936,0,0,4b9b99feddbd5fc6a6f8311e809d5810c75e4c6e08d82a9d9494e8aad8852 CVE-2025-21937,0,0,56af79d49ea516c71425a71fc37e1051b5822f760e8160b61f62485dad72a8ae,2025-04-01T20:26:01.990000 CVE-2025-21938,0,0,80d07c88b53688ec96ee15d798b6b40def2206c228ea9a90ddb2eed49fe24dee,2025-04-01T20:26:01.990000 CVE-2025-21939,0,0,a787a16fdbfa658370f13a489dbbff6f008ee32954c421885701e640121c746b,2025-04-01T20:26:01.990000 -CVE-2025-2194,0,0,b4dd8641e77488a17259d3350a63ebf3a520330ac934daffe3522a5e1d40c805,2025-03-11T14:15:27.753000 +CVE-2025-2194,0,1,3fdb717b1bc330f1d470bef99df31cb06c8ddc496778912df85edf14f5ac3b49,2025-04-09T20:46:03.463000 CVE-2025-21940,0,0,a5ed3b073b59bf54842a5e01cf185f802b8d87deeca9ead0edcc9f04d14f4435,2025-04-01T20:26:01.990000 CVE-2025-21941,0,0,a5a3fd325d5ea41466358fb97eb527aeffbcb909864bf683e7600bdb07ea8650,2025-04-01T20:26:01.990000 CVE-2025-21942,0,0,349a2a434b71a6775457f2fe25f968468bbbe7edcf978d4717310c6f5742fede,2025-04-01T20:26:01.990000 @@ -283619,7 +283625,7 @@ CVE-2025-21946,0,0,101d1de45df09258ed1075f1f5345bc99c07194f40a478653e6aed0db05d3 CVE-2025-21947,0,0,d8e3a3008a912942cc9a0d1bd9b2caa9be3347a5579895ce14405d1d6c0c1ea7,2025-04-01T20:26:01.990000 CVE-2025-21948,0,0,e9be4f3626da5ad78025469e4a1315693ff1ead756a086ae6f021ec7b4ae184d,2025-04-01T20:26:01.990000 CVE-2025-21949,0,0,d473a99c210b0e1931c137e2fdd53ef2f8956eca79529c7797aef0b27aea84bc,2025-04-01T20:26:01.990000 -CVE-2025-2195,0,0,88be97fb77746ad354b4cacb4ede708d613024c3fc1ef6521708956b0de65094,2025-03-11T14:15:27.937000 +CVE-2025-2195,0,1,a3f28c3cebc6352ab864e3834dfd7f4a18550fa64fc8ce24cf879cfc067c7370,2025-04-09T20:45:17.083000 CVE-2025-21950,0,0,32d785759702255ad8fa71822657b10592a24cc367b7cb4edb10d7b1cfd5c6d8,2025-04-01T20:26:01.990000 CVE-2025-21951,0,0,968df8a16d9cc163ec81d169140ff29156adbe5c27bd85a102af9399a7f3d93d,2025-04-01T20:26:01.990000 CVE-2025-21952,0,0,3539418067a9eb47905c6a725aa1c4cf337f9ab2151a716be076ad0ece4851d6,2025-04-01T20:26:01.990000 @@ -283630,7 +283636,7 @@ CVE-2025-21956,0,0,3a3ba59bd054f127a646944dc64d5f0c948f5f2b95a27da2809d5dcc7815c CVE-2025-21957,0,0,009330a6bceda57b40e54381ce2c9a46a3b647b1c4e380b0a51696e0e52910ba,2025-04-01T20:26:01.990000 CVE-2025-21958,0,0,bb332d2c65fb62395d4a6a1470bdfb59200d05d98aa0097eb1832f7ac11306c8,2025-04-01T20:26:01.990000 CVE-2025-21959,0,0,e4335ca84d4f0908491088a0371eca4bf728a9bf400720ea4aab251b07406901,2025-04-01T20:26:01.990000 -CVE-2025-2196,0,0,9510c7ade92473f20d69a85eaaa107ad85d37d6676c7036cf3feceb20bb50931,2025-03-11T15:15:45.820000 +CVE-2025-2196,0,1,317a547ddec88f70f20aa753f6fa351b6d1d0bbcf3459115da9035e6aec9769d,2025-04-09T20:39:50.180000 CVE-2025-21960,0,0,deefcf69ed458179f3443ceaf1f7a13e8ad6c7428510fe7449fde80547547f6c,2025-04-01T20:26:01.990000 CVE-2025-21961,0,0,08d35fb06287d1ce6f0793f2b539daf4e1b7125cfa39134cd2d4ac956f254f23,2025-04-01T20:26:01.990000 CVE-2025-21962,0,0,31b8959c404e495e57ffebfc27eab946759064551f1a0031b8d508713834db6d,2025-04-01T20:26:01.990000 @@ -283707,15 +283713,15 @@ CVE-2025-2213,0,0,7ebf2026b9bf93eb20c6ae8c15cd12311e1e77c6d1080f4262c739f27920a2 CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000 CVE-2025-22131,0,0,d687f60b88d755b1d518a9c66760b0427f03a61d3062d460851f78a9bd1eb978,2025-03-06T14:01:10.553000 CVE-2025-22132,0,0,8f2a17f80eb849275738cca93335a0536605ff289b1fa4e5b349c43fa2cad954,2025-02-13T18:55:14.053000 -CVE-2025-22133,0,1,5286835e399a40afe2bebfb583a9ccd4923d3ab6d8367f38f19284c12373d4a5,2025-04-09T18:29:07.040000 +CVE-2025-22133,0,0,5286835e399a40afe2bebfb583a9ccd4923d3ab6d8367f38f19284c12373d4a5,2025-04-09T18:29:07.040000 CVE-2025-22134,0,0,dbfe9b8ebfd9f44fa2a57bb836536757f4af15f33d8f47d0a5b7d1fc7f6dd924,2025-03-14T10:15:16.070000 CVE-2025-22136,0,0,634fbc193eac9b6b549b16c4c220bcdd712eb02f9a611330d9d90e6e976c5d38,2025-01-08T16:15:38.770000 CVE-2025-22137,0,0,500e180482a18b49718c6495441b08426af3ad9db841f00b13a599eecbf0088e,2025-01-08T16:15:38.920000 CVE-2025-22138,0,0,8a425a959cc74fe2a708a77253bde9f3b04efd491f89c9d4d1c0231fff8dc2ab,2025-01-13T21:15:14.500000 -CVE-2025-22139,0,1,c39442d79dadf92972dd8895dfb89477b968e7b300ecefb279bdbb6f770981c5,2025-04-09T18:28:51.577000 +CVE-2025-22139,0,0,c39442d79dadf92972dd8895dfb89477b968e7b300ecefb279bdbb6f770981c5,2025-04-09T18:28:51.577000 CVE-2025-2214,0,0,e55320f52387b2185c942ea51f074b83de1d973123970d1289d9c331a310b6b8,2025-03-12T14:15:20.373000 -CVE-2025-22140,0,1,533492b8f98284beb44cdceb7487291bdf3009aa8561ef1f7fbe2f72fd0ae9de,2025-04-09T18:28:25.310000 -CVE-2025-22141,0,1,db2e35dac0332ff2342b69726a8e0211eba76057f11692df745bc6f7b0354bd9,2025-04-09T18:28:02.700000 +CVE-2025-22140,0,0,533492b8f98284beb44cdceb7487291bdf3009aa8561ef1f7fbe2f72fd0ae9de,2025-04-09T18:28:25.310000 +CVE-2025-22141,0,0,db2e35dac0332ff2342b69726a8e0211eba76057f11692df745bc6f7b0354bd9,2025-04-09T18:28:02.700000 CVE-2025-22142,0,0,e44270b2b0b98075888f9cd1dd610bf1cb68c5c6945d1cf7b65ba8c81b916b44,2025-01-13T21:15:14.640000 CVE-2025-22143,0,0,70eb9ce4d0fc8cbd43815cc434846f11a9e55c35cf469698b977c63a28b189db,2025-02-13T18:57:56.393000 CVE-2025-22144,0,0,2f16f15f32a9cfd8a06422e70249c6e88ee87fd96a7688a8c61601bc7c98563d,2025-01-13T21:15:14.737000 @@ -283749,7 +283755,7 @@ CVE-2025-22216,0,0,0647923838513073f2b0d0386ce946a85c5a3cb60aa88ae944b42a751c855 CVE-2025-22217,0,0,9cdcef52095db7e9904d6b3326fc88cf0e987f626da15eb2ecdedfea3492a01a,2025-01-28T19:15:14.640000 CVE-2025-22218,0,0,f601a81266c0cd0101089f5555d53f0c2dbff758ed8617a00f74ec5eb5ee65af,2025-03-13T16:15:26.910000 CVE-2025-22219,0,0,15a8c0ed57cde9402d747ee08a9fcb7816a0eec2ef22de5c372705a6d7374409,2025-03-13T18:15:46.553000 -CVE-2025-2222,0,0,89ac006eb47d0a2abc562b6380336160f95e75f5727db79c3adaccc9fcf91baa,2025-04-09T11:15:42.063000 +CVE-2025-2222,0,1,f33432fad33ca500b06ce505261da82dc1d9e05fd8b710e5991f6ad3d410dde3,2025-04-09T20:02:41.860000 CVE-2025-22220,0,0,a00b168f73aec469e4c78128ddc9ae91feb9fbb9ddcfb4c72ca05c1c287f029b,2025-02-06T14:15:30.510000 CVE-2025-22221,0,0,4cb947e6faf21297f90661fc0e04de33a78453bf920a147b2042bfe63f151b75,2025-03-13T14:15:35.450000 CVE-2025-22222,0,0,58fbf61f1e86261177996a1b70d050ee1228a83c36092ff3d83feec937c303a8,2025-03-13T15:15:52.450000 @@ -283758,7 +283764,7 @@ CVE-2025-22224,0,0,8a77aae7700a2228886ae679a0216a335ecf02ecf88fef5838f7708a2afdd CVE-2025-22225,0,0,9e556bc7c3e33618b4b1fd67c232b5ec5342c22fd8db1a86d6c7512033ee8606,2025-03-05T16:21:26.263000 CVE-2025-22226,0,0,d8b6281876fd003f404f7031a16d8be8c66b83496a9c80b329f6cf341e4f4e88,2025-03-05T16:22:52.433000 CVE-2025-22228,0,0,fa7f165a4b7ea7a15cc95ee04c8cc8a48940b5c217d39b7a5efd68469d6e9030,2025-03-20T18:15:18.663000 -CVE-2025-2223,0,0,1e9a1b171027344ced8b645a9c482ec29fb4ecda56a866bb6898800047150ce7,2025-04-09T11:15:42.320000 +CVE-2025-2223,0,1,16d94e880dc7cf5b8eadb9ec28bd7ef40145c0095cdb04aebcbd963af69f8b7c,2025-04-09T20:02:41.860000 CVE-2025-22230,0,0,3e91dce00139a0364993ef91e4dc70d3b6016fb8a3b6eea2cbe343e4ad228132,2025-03-27T16:45:46.410000 CVE-2025-22231,0,0,38152a3110370108b825f0fdd0a499588968be14feabeb92e601098ca54bc3ab,2025-04-01T20:26:11.547000 CVE-2025-2224,0,0,a251902d7a3f4027222d02a92ceecc551380ed3d87526ebb058f0bdbf9a04b21,2025-03-27T16:45:46.410000 @@ -284023,12 +284029,12 @@ CVE-2025-22592,0,0,f03fcd01ef66d026e28f7de006f4752785662917cd91a853528350917c3e1 CVE-2025-22593,0,0,093cea1b6014e90377f5953318ea38067198a698c0fcd047cf0a30d851148629,2025-01-07T16:15:55.627000 CVE-2025-22594,0,0,968550ed21e0d31a7010b3baeb6cd6c73db41f48ed3b2ec7133582c21723b513,2025-01-09T16:16:28.983000 CVE-2025-22595,0,0,fa050670aab4f0b0b2f6967b3375eb65e696e921ddb4c965d5d1191910703267,2025-01-09T16:16:29.160000 -CVE-2025-22596,0,1,0089eaf6dd776003df9c0810cc83a2641f248aa1924c38bc82725a8aadb089e6,2025-04-09T18:27:39.513000 -CVE-2025-22597,0,1,e529ae3c51a54e777bb8df04ec550310efc73c5234fb903ae486497eb818691d,2025-04-09T18:27:30.550000 -CVE-2025-22598,0,1,86c859ce83ca95a19f341b2836f3010e40b0c9ff1bb46b45cd214b0405da58e6,2025-04-09T18:27:19.160000 -CVE-2025-22599,0,1,31b7412bafb4ddec6e2cef9492910070dfe675a6cda8a33c10aa6974c7fea047,2025-04-09T18:27:07.707000 +CVE-2025-22596,0,0,0089eaf6dd776003df9c0810cc83a2641f248aa1924c38bc82725a8aadb089e6,2025-04-09T18:27:39.513000 +CVE-2025-22597,0,0,e529ae3c51a54e777bb8df04ec550310efc73c5234fb903ae486497eb818691d,2025-04-09T18:27:30.550000 +CVE-2025-22598,0,0,86c859ce83ca95a19f341b2836f3010e40b0c9ff1bb46b45cd214b0405da58e6,2025-04-09T18:27:19.160000 +CVE-2025-22599,0,0,31b7412bafb4ddec6e2cef9492910070dfe675a6cda8a33c10aa6974c7fea047,2025-04-09T18:27:07.707000 CVE-2025-2260,0,0,d1978b85ca1901129021ca8f2234b3a1945dde9bd49b1d5c22bbd72a60acf071,2025-04-07T14:17:50.220000 -CVE-2025-22600,0,1,0f751874e8dc9a2df5b908eb86ad6c97cf84e81c1cee1fd8e032767709dc8a83,2025-04-09T18:26:47.750000 +CVE-2025-22600,0,0,0f751874e8dc9a2df5b908eb86ad6c97cf84e81c1cee1fd8e032767709dc8a83,2025-04-09T18:26:47.750000 CVE-2025-22601,0,0,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000 CVE-2025-22602,0,0,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000 CVE-2025-22603,0,0,8ce373910594e1951a368c81481406d6851e9e14460bf79dc1cab441d40013e7,2025-03-10T19:15:39.970000 @@ -284041,7 +284047,7 @@ CVE-2025-22609,0,0,91d6b98868b458e0ff0114cf43a32dd4b63361db651576c0323b63c0e444b CVE-2025-22610,0,0,b9711a4d6751de3692c7ce2327105be5a0e44e4262bbc4ede80aed507576b24e,2025-01-24T17:15:15.237000 CVE-2025-22611,0,0,cce4f629893e4d66bd68c6fa5968c3f093b954465fd6c332d5093c60995d62f4,2025-01-24T17:15:15.410000 CVE-2025-22612,0,0,b8d5174c966f337923c6b65afa17af2fabfc5775697a1b1884b404bbb45dc7df,2025-01-24T17:15:15.570000 -CVE-2025-22613,0,1,0e8de212c2ab936fb1afb4324d5fcb7daf26df87a0f49b1a7577eb0b9854427d,2025-04-09T18:26:24.233000 +CVE-2025-22613,0,0,0e8de212c2ab936fb1afb4324d5fcb7daf26df87a0f49b1a7577eb0b9854427d,2025-04-09T18:26:24.233000 CVE-2025-22614,0,0,08842b179a4a2d5382e12055b174b60c596316194e4240adec596d8471c5d37e,2025-02-13T18:57:22.923000 CVE-2025-22615,0,0,fe8cd4dfe585e31a3119e0f2d392f01147338ff9f59c64363fb236b737551e1c,2025-02-13T18:56:57.060000 CVE-2025-22616,0,0,c9f9c24f7d3c8173c14aec457806c910ef1d27e3e076f66de2a43b1c6e40e593,2025-02-13T18:56:33.383000 @@ -284263,7 +284269,7 @@ CVE-2025-22868,0,0,e60277ea4cd9e8b52a0bc5998998d4b70d591016f1b5f98965efe1007387a CVE-2025-22869,0,0,5fcceae088032b557e3959982bed74e41a764f7c84c3726bffbbd6756b1cca25,2025-02-26T15:15:25.160000 CVE-2025-2287,0,0,867479dfcedb4cce723b7a24882e9d97da2870c741258a3b4042096664ac6f25,2025-04-08T18:13:53.347000 CVE-2025-22870,0,0,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000 -CVE-2025-22871,0,0,636404fe0af85dd0a2052e0ff5680ae1d7278c1171b415a6274f7ff62cab31ba,2025-04-08T21:15:48.173000 +CVE-2025-22871,0,1,5e0c07a56f9d9b1e220de2ed08857b9f0fb1c1919df08a2562023c832dbb7098,2025-04-09T20:02:41.860000 CVE-2025-2288,0,0,6d20448db5009c36c81fa010c5ec138daa8d6c739d9191b9c8bfd5b250732f41,2025-04-08T18:13:53.347000 CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000 CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000 @@ -284275,13 +284281,13 @@ CVE-2025-22894,0,0,099d82dc8568fb50b5dde7926f3fbb32a13311bb5c7a970a54e9828e99c29 CVE-2025-22896,0,0,cadb16b30aa07fd019cf5a31775c9c5a2a292f523d02b1c4ef2ed5d9558f302e,2025-03-04T21:25:33.663000 CVE-2025-22897,0,0,9a22b887d81fcac41848fbf55628d95a06189013b3a027c7ddc8085a3cd9eb1a,2025-03-04T17:39:48.960000 CVE-2025-2290,0,0,4f9c342ac3f078cc778b27ca93122440b9316877dedbbd45d5a29242af4367fe,2025-03-19T05:15:41.180000 -CVE-2025-22904,0,1,86b28319b40b8d7a66d7d03f157c4134653a72c10f1688103124dc640f8895a5,2025-04-09T18:44:38.387000 -CVE-2025-22905,0,1,382074945b27a096018acdb89ab8419cee5a926b55aca9b4c05298642fc660ca,2025-04-09T18:44:26.190000 -CVE-2025-22906,0,1,69174bb723d0779d45e6e8ede34109835ab1ff87db3539705d9e4fc9b2841ad7,2025-04-09T18:44:12.040000 -CVE-2025-22907,0,1,701d8d048a9d0f1c10eab35cbfbf969881f7c9b6ce36b31238765d684fa1e154,2025-04-09T18:43:51.870000 -CVE-2025-22912,0,1,63eb3ee325908f5c70e3a3241d2ce6a6044fe95095746725487ec32265008b07,2025-04-09T18:43:27.353000 -CVE-2025-22913,0,1,5ea22aa5b58555fb937c316d9be053cdd1221f4a76d9f3da9f31c00acad32a33,2025-04-09T18:43:02.980000 -CVE-2025-22916,0,1,48ec3f4c4e4ef1a7215c355c8bb61db6b7ae3ede07a20bf011c26b3a968bbbcf,2025-04-09T18:42:47.473000 +CVE-2025-22904,0,0,86b28319b40b8d7a66d7d03f157c4134653a72c10f1688103124dc640f8895a5,2025-04-09T18:44:38.387000 +CVE-2025-22905,0,0,382074945b27a096018acdb89ab8419cee5a926b55aca9b4c05298642fc660ca,2025-04-09T18:44:26.190000 +CVE-2025-22906,0,0,69174bb723d0779d45e6e8ede34109835ab1ff87db3539705d9e4fc9b2841ad7,2025-04-09T18:44:12.040000 +CVE-2025-22907,0,0,701d8d048a9d0f1c10eab35cbfbf969881f7c9b6ce36b31238765d684fa1e154,2025-04-09T18:43:51.870000 +CVE-2025-22912,0,0,63eb3ee325908f5c70e3a3241d2ce6a6044fe95095746725487ec32265008b07,2025-04-09T18:43:27.353000 +CVE-2025-22913,0,0,5ea22aa5b58555fb937c316d9be053cdd1221f4a76d9f3da9f31c00acad32a33,2025-04-09T18:43:02.980000 +CVE-2025-22916,0,0,48ec3f4c4e4ef1a7215c355c8bb61db6b7ae3ede07a20bf011c26b3a968bbbcf,2025-04-09T18:42:47.473000 CVE-2025-22917,0,0,0d72f7ff6d66913d2820416ce95685d3bc853139131a9698fa080019dc84bb06,2025-01-29T16:15:43.907000 CVE-2025-22918,0,0,34d0d301ce186de3a900525a1d20d1fc6818f460c83c7c8b34ef0ba83d9f1c2a,2025-03-18T19:15:48.183000 CVE-2025-22919,0,0,329e8b26e961cfd3a5f94c152403744377d574dcba7ab4dca039db01cbe65e83,2025-02-19T22:15:23.623000 @@ -284305,8 +284311,8 @@ CVE-2025-22939,0,0,a661d5997aed32171526427581fa69af511646df1bbe29227ac084c593f6a CVE-2025-2294,0,0,1a5e48440eae90fb3ffb2ab4246fa9a7f3a3bd6b2c08714613b5622012818910,2025-03-28T18:11:40.180000 CVE-2025-22940,0,0,4adec11a6d9ff0deea27c11a540b6675dc6d4766a97798669a96a7a71d36b799,2025-04-01T20:26:22.890000 CVE-2025-22941,0,0,b0b33902ea046bb449e13dd1563ba4eb515bff20aa45453dfdf5732bed432414,2025-04-01T20:26:22.890000 -CVE-2025-22946,0,1,8f60ec518577214b45229d7545a35c55879825b19b6c253aab60d563104c0dd8,2025-04-09T18:35:44.810000 -CVE-2025-22949,0,1,0a7be0866c6b82c18c7c0f13e28a95eb01b8c6d66c113ff800e86b319df10485,2025-04-09T18:36:01.027000 +CVE-2025-22946,0,0,8f60ec518577214b45229d7545a35c55879825b19b6c253aab60d563104c0dd8,2025-04-09T18:35:44.810000 +CVE-2025-22949,0,0,0a7be0866c6b82c18c7c0f13e28a95eb01b8c6d66c113ff800e86b319df10485,2025-04-09T18:36:01.027000 CVE-2025-2295,0,0,5afd41ba1c620aa8b1c09ed9d5c8905d7597b06ca6637c246ba28374bca35eb0,2025-03-14T22:15:11.600000 CVE-2025-22952,0,0,8738861fe1665908aa1c319a7ebce3d9ea42370b11127fd19a92e609f78fcd8e,2025-03-03T16:15:40.010000 CVE-2025-22953,0,0,317cc89665d625a02de49f69517260774d4234589f6e5e532d3b007319aea76c,2025-04-01T20:26:30.593000 @@ -284357,8 +284363,8 @@ CVE-2025-23032,0,0,585588cf58c1e2f9e94311fe0b553a8b2ca72bc0f7df37151cf52ab6013e3 CVE-2025-23033,0,0,17b742cf234c876b36dd4546218fe265af4414decc6ffd26db509dd6207c6e90,2025-02-13T19:03:39.270000 CVE-2025-23034,0,0,60c97f8bfa3a845348c574f06203480086d241e0f809bdfc40219b6984a887c3,2025-02-13T19:03:23.323000 CVE-2025-23035,0,0,82b082215459c70786bed7d7910c34f1f4db3edaf5a16c3e6a14d6584852f209,2025-02-13T19:03:01.143000 -CVE-2025-23036,0,1,2536b49c1514ca3aec129f43341d8b759149bcbc2e3f37eb9082eefe30235b0b,2025-04-09T18:25:56.037000 -CVE-2025-23037,0,1,f95a72aea82b53deac8e86bc9ea3bdcd7aaf56bd91e5adc45918ee022892f993,2025-04-09T18:25:13.337000 +CVE-2025-23036,0,0,2536b49c1514ca3aec129f43341d8b759149bcbc2e3f37eb9082eefe30235b0b,2025-04-09T18:25:56.037000 +CVE-2025-23037,0,0,f95a72aea82b53deac8e86bc9ea3bdcd7aaf56bd91e5adc45918ee022892f993,2025-04-09T18:25:13.337000 CVE-2025-23038,0,0,65d2c74c51e7582cde1953d5316f19cbfa4ea3931a18c9a8aae1940dbd15df48,2025-02-13T19:02:34.650000 CVE-2025-23039,0,0,7fc8622f059047fac19c0c3260e144f1d60b8ffa056e264de94704d62b5a89b4,2025-01-17T21:15:11.560000 CVE-2025-2304,0,0,cb35b88004cf4aaf5937037b5e2a3756c0a2b054bfcddb467003fce9cf76314a,2025-03-14T13:15:41.160000 @@ -284511,7 +284517,7 @@ CVE-2025-23402,0,0,076d51d523d07583e5d9307add68f7b55e0d82f2216daeb4d8d036f63f4d8 CVE-2025-23403,0,0,644047de2ce1ffb265b5a42cecfc2f854cd0e7552ab44d86c93242e1e0442a91,2025-02-11T11:15:16.420000 CVE-2025-23405,0,0,ddeb2b5db57c9fcee267274617b0df7ed66e371a7704cf175d824eede48f6b9a,2025-02-28T17:15:16.637000 CVE-2025-23406,0,0,38d5c87f4e786637cbc4fcb4a2f7006ad80927b3c7219b037e30cf1414c39e8c,2025-02-14T05:15:12.567000 -CVE-2025-23407,0,0,a31aa4e0a72d01985acd49402d409c773fa45d15ef9fff52363a11efec81b231,2025-04-09T09:15:15.963000 +CVE-2025-23407,0,1,db3b2804838dcc8ff22ac866be000255b5ffe784e21a184a32491071c28a1949,2025-04-09T20:02:41.860000 CVE-2025-23409,0,0,1a3520493aa68f1dcbe322db4ee95d2acadad9f2e524f892c3f32c34d0db5297,2025-03-04T17:40:38.997000 CVE-2025-2341,0,0,e2184e0d77e69b764dd326adeb67bd4992b1acda709b5fa005ceaa9a7de001c8,2025-03-16T15:15:36.523000 CVE-2025-23410,0,0,3a80115160ef99d7b702d3a18a15cf574791aa7a10fe93b7ce15f60d58877b71,2025-03-05T00:15:38.250000 @@ -285166,19 +285172,19 @@ CVE-2025-24054,0,0,d7c04592c90a944816d2b917a191db0500c456f1bd376113f331acc816b92 CVE-2025-24055,0,0,a8b8e4cdf1af85735e51c417e608db31da64b217ea9a84bbe3faa9ab9f183fac,2025-03-31T02:15:18.163000 CVE-2025-24056,0,0,5c04f556316dbd8033fde99ee6b7a7436c924957f8339e64eeff70189003a64b,2025-03-11T17:16:28.130000 CVE-2025-24057,0,0,e93c1320ebadbbf28092c6fd0ce7c31e79b375949df78d42f385ee860a69efb1,2025-03-11T17:16:28.390000 -CVE-2025-24058,0,0,115a9ba4d3aed410cd2a9e13f107bf890126a24af1a2099593723abcba0dc712,2025-04-08T18:15:46.037000 +CVE-2025-24058,0,1,fd579aaa18ebd6afaab3a96365ec2adb59d6e72c88bb4064ba6dd6813e08523c,2025-04-09T20:03:01.577000 CVE-2025-24059,0,0,f8e6ee3cf4f897c579e406829de1888b7cd9f5fbe1c2ec65ab850867bf744c50,2025-03-11T17:16:28.593000 -CVE-2025-24060,0,0,384d1174ae85dc6e577a2b597e34ef3cd0d472b46a722719ed5c0c2bc4f573f3,2025-04-08T18:15:46.193000 +CVE-2025-24060,0,1,edebb01361cd44aa2fed4f2c1d373dd48bd2d1f1c8285406bc6d4df25fbecce6,2025-04-09T20:03:01.577000 CVE-2025-24061,0,0,0ef1a7b0609ecdef4cdde81984a4fac075ad8a7c62843e2109397867e45856fc,2025-03-11T17:16:28.800000 -CVE-2025-24062,0,0,db126b16ae60ecf7c29e5ef07c8a5283a4ccf69fa12c965676122f1b7967f86f,2025-04-08T18:15:46.353000 +CVE-2025-24062,0,1,d6a081898045b458149bd51c440c1e680bbbfe9bfe6a5380a308fed6b5772bbb,2025-04-09T20:03:01.577000 CVE-2025-24064,0,0,218f6cc47ad1a62f4f0e68482476a0e2acc1cd45af444b7c3515886baa130a34,2025-03-11T17:16:29.007000 CVE-2025-24066,0,0,7e56714b7788604a5479b2369ba8b4d48cd703a737a947c93e3adca9df2d3c20,2025-03-11T17:16:29.223000 CVE-2025-24067,0,0,aa73fd19f10afa521de3cf2b4792d2be73d56b2986f2ec937d30f318fcb22400,2025-03-11T17:16:29.477000 CVE-2025-24070,0,0,b6bc3e3a54c94f29a6c44e2db055b426248044109eaf535e38be0b94634462b8,2025-03-11T17:16:29.680000 CVE-2025-24071,0,0,b373bffdd46d8f33af306b3087c59ead51ca2709820305f6f569bfd2c231fc41,2025-04-03T22:15:18.470000 CVE-2025-24072,0,0,ff866ef25ff8b4b04c0047326b73042c2b63916962841c2130bf0f0eac64effd,2025-03-11T17:16:30.070000 -CVE-2025-24073,0,0,7c30ca705d93e7b52f9862f7b1e288371a2df095a0195fb771de5dd642c8439f,2025-04-08T18:15:46.543000 -CVE-2025-24074,0,0,ba13060875588a7ba80cc6dece04024c8fd33a98cf6a666f6578296b650d8abf,2025-04-08T18:15:46.740000 +CVE-2025-24073,0,1,ac87c367938f46820db1345e116c8ffd519746a908e4923273b7daf3c92233d6,2025-04-09T20:03:01.577000 +CVE-2025-24074,0,1,b3e947d67a9186891d294f57e167f0e79db99dbb4e9ae2ce396aa91fe915ad9c,2025-04-09T20:03:01.577000 CVE-2025-24075,0,0,1937fe3a6045711fff750df57bc19b60d8487548289224ff047afdc503678158,2025-03-11T17:16:30.270000 CVE-2025-24076,0,0,5f6e02a1a3c83b4dfc5002327031bc10d5e45c77892b582ec81598e32b3dfd1c,2025-03-11T17:16:30.480000 CVE-2025-24077,0,0,2a13c5b7197d53f42fa25d514f59fcecca291e66c5abfd6d7e0aa9d7adb7e383,2025-03-11T17:16:30.657000 @@ -285397,7 +285403,7 @@ CVE-2025-24390,0,0,53fee9e5767117124ab0c247372dae1e808caf6f2871cdd5b9d8bb2222404 CVE-2025-24397,0,0,9ba22bfb54e58957b01d845dc69a58567b508933ed35160174e59b93ecc06487,2025-01-23T17:15:27.643000 CVE-2025-24398,0,0,ee9da22a13b3c2a05aba47928897e56493040057408f7bc7be29fd032a4fd24c,2025-01-23T16:15:40.920000 CVE-2025-24399,0,0,9e2b8368d79470df64393e92711907111b86a093d0c5d40914c6d8eac10d8a6a,2025-03-18T15:15:59.850000 -CVE-2025-2440,0,0,93a917d119b2a3353560c5dc9030d22af8c718bf06dd2dc6dbd0661abff6ec54,2025-04-09T11:15:42.507000 +CVE-2025-2440,0,1,b9233182f01c0d5f9eb72bac366776afd7e7588557a16cfdbfd8cd7e6b815354,2025-04-09T20:02:41.860000 CVE-2025-24400,0,0,688f55c8434b6d75b2a47eeaaca4c2596bd1613b0ce146b7759d1b11639da277,2025-03-20T14:15:23.903000 CVE-2025-24401,0,0,4fb172772de67515fa4267387a9c7f60995cf88b73e8f04e780d1435e4b66f20,2025-01-23T16:15:41.050000 CVE-2025-24402,0,0,f4550d563ce08a51c6e77d15a75001488a90ae02ca9b5c4a4edceb8828b16ab8,2025-01-23T16:15:41.190000 @@ -285406,7 +285412,7 @@ CVE-2025-24406,0,0,068a48e4f1572adc74de0ff57643978f6e37a88fcdea693efe50c23161ecd CVE-2025-24407,0,0,f9e2d5d922a79d1dcafa9e5c3e375349573d6ab49bfe76abb4de02b1a32f8e74,2025-03-17T21:15:13.677000 CVE-2025-24408,0,0,71a175d541d32cdbc570ab7f6d7c743997d1db2eb1cbb0ffc69c37b66d235758,2025-03-05T17:43:13.783000 CVE-2025-24409,0,0,76b2ba4649d51a3ba2afcc0c195fa01785d377e4f86af6c65862f9ad9d78f36d,2025-03-17T21:15:13.810000 -CVE-2025-2441,0,0,7634b170bb913a3606cbea7037689352537d83b49c2664bbbad8cfe73b46d277,2025-04-09T11:15:42.730000 +CVE-2025-2441,0,1,7b60a15597431aa358b47dbf8817ad0c1928d4d0b74ac4355c7304e60cbc2f55,2025-04-09T20:02:41.860000 CVE-2025-24410,0,0,77499aebbea770086aee3ad99a9d2ecf8c5de6e787c8d3793da4565952e1ef20,2025-03-05T17:52:47.247000 CVE-2025-24411,0,0,e25c4bce409382405396375d83e0e9c53c66f8c6ce69692ec9a84ba1ad59d214,2025-03-04T15:15:10.630000 CVE-2025-24412,0,0,c4565d9ce55656c7f149853c2a4e4e84c6bb83c88f824906603571fdf53c1637,2025-03-04T14:54:17.900000 @@ -285417,7 +285423,7 @@ CVE-2025-24416,0,0,ce608cc5041223a17b920362aa141a43f0d3fe2e5e8a01a1a2d4f56bbaa82 CVE-2025-24417,0,0,c78be8277a9889ea7b602475b2454ca1936ebe7ba8fe9c3772f12e9a5c5f89ca,2025-03-05T18:35:12.310000 CVE-2025-24418,0,0,0b9e05d200d3572fa40b73de6ce7cb0a74c0ccc71a55a2519fc8f76ce03aa909,2025-03-05T18:34:52.020000 CVE-2025-24419,0,0,c900c86ac9d8a5bac8313f5fb6dd1f23075c40c7bacdd38ef2f1761d27015b61,2025-03-05T18:34:29.317000 -CVE-2025-2442,0,0,439a8575d878f533696e0a907b499f40a9e5934c5db12875f8e6e13c94a8e734,2025-04-09T11:15:42.947000 +CVE-2025-2442,0,1,08d150b08a8da3015802ed1a9bc75b4fea8093b1165b1fb3d915e8c8b779270c,2025-04-09T20:02:41.860000 CVE-2025-24420,0,0,77ebd9638b163fbf17914118e9caeb384d5d1989e269613e437d9e3884629953,2025-03-05T18:34:06.223000 CVE-2025-24421,0,0,db5c4ec715cc202bb9a867c32d751b77d145b26c9064b0e2a0b64916fdccf681,2025-03-05T18:33:47.400000 CVE-2025-24422,0,0,03d49f26c6718cd06567b56ec7e055261ff940e94e609a27949c6dd6ad6357d4,2025-03-05T18:33:16.477000 @@ -285443,8 +285449,8 @@ CVE-2025-24442,0,0,a8f66209dff397fff7f7fdf29f96f82075d9a60307fa72b99b6f3e7ee385a CVE-2025-24443,0,0,9b387e062ed566e1e08bfc55742fe23d0bd36f63e01c70993f03b9eaee489c81,2025-04-01T19:23:33.860000 CVE-2025-24444,0,0,647636ffe7ff72b15983b0abc2a3e4aab7b2deed062acf0eb294c895b2d1ae65,2025-04-01T19:23:15.063000 CVE-2025-24445,0,0,642582fb1e4e4925eb11b91795bfa62bd7866c6426ae815f76e6742aab043e8a,2025-04-01T19:23:11.093000 -CVE-2025-24446,0,0,9d52a05d7f542637147563396945369a402f38d6ca6f3a258ab2476477485e42,2025-04-08T20:15:20.417000 -CVE-2025-24447,0,0,9eda5b5b037ea9ed748b7d0f2ab17cfee50fa1cc9c06be8a1ba3babd403bb1f6,2025-04-08T20:15:20.573000 +CVE-2025-24446,0,1,891eef20810b20f4edf6f11eb5a5ade3e7fe66a2c08e79956072f7fb358b100d,2025-04-09T20:02:41.860000 +CVE-2025-24447,0,1,6166c23a6fe1b9cd0f9c5b0c18795d98231d2fa904fd0f57e25e648388e39d8d,2025-04-09T20:02:41.860000 CVE-2025-24448,0,0,c9894e607c6af25c0a5223320edd9e364c24ced37c0a23472c8fb04e74e9c04c,2025-03-11T18:15:31.543000 CVE-2025-24449,0,0,763563f0e38ea864937173e74d87c4634bc9bc37fd9d5fccd451b509bd062a72,2025-03-11T18:15:31.700000 CVE-2025-24450,0,0,4e26fad750a72776c09947c2e64c63d7ff3746d1ed9fa038dba7553b9b78f01a,2025-03-11T18:15:31.840000 @@ -285841,12 +285847,12 @@ CVE-2025-24997,0,0,b80490d4098a0688d9be5ae2794984498208bc9fe48ed009a78a58ec5b3c3 CVE-2025-24998,0,0,97ff83c7f8c3dc3c86cf3e217ce8a9825fb5a93ab4895982732725d23057fced,2025-03-11T17:16:37.670000 CVE-2025-25000,0,0,f13ce058a093981dda2f50ac04ecc528a9285e0dfa6260a521abdf4c46e1bfcd,2025-04-07T14:18:34.453000 CVE-2025-25001,0,0,c45cc763a1547fefda7795f8d11522125ff7003c83cf07f197d3b95e585aaa2a,2025-04-07T14:18:34.453000 -CVE-2025-25002,0,0,671daf2ce19425551634732e8edb7d04386bec821d08fee78dd152e8d810aad0,2025-04-08T18:15:47.030000 +CVE-2025-25002,0,1,12f8033c4f78f1fc2a11a22d65139dde5cad0f892f0f27858d617011f4499917,2025-04-09T20:03:01.577000 CVE-2025-25003,0,0,81c7aaa0459bff03b421e5d180256f499147e53c41ab2bff8ad40b62fee74ec9,2025-03-11T17:16:38.043000 CVE-2025-25008,0,0,dd0d6b1d65c4bc3e0a08b5500a49fa40b10c2ed4de56e853cd146dcf325a2884,2025-03-11T17:16:38.483000 -CVE-2025-25013,0,0,08d422597ab2b7e59328e02e8d312659ae14ed953aeb6c68a19a7a2eec506685,2025-04-08T23:15:45.540000 +CVE-2025-25013,0,1,8b0fcb6890b87ced02ed7f1e0ef615815bf6fcf1ec3fd1005c85d59a010589fb,2025-04-09T20:02:41.860000 CVE-2025-25015,0,0,e7d4452314aabe852480668c29806de032c9b7af4ea611fa50a64f67c7b33f75,2025-04-02T17:15:45.240000 -CVE-2025-25023,0,0,7fc3a95e1ac2367cc2ebb779543a1aa4a74106b1c6618bc51106fb15403521a4,2025-04-09T14:15:28.167000 +CVE-2025-25023,0,1,f103fff258200673be4181a5f1b77ee09a9a9c82c095e77a0b73003dc6341fc9,2025-04-09T20:02:41.860000 CVE-2025-25035,0,0,65d203ab52d157361ed6d15e38d869af4da7ba9ec629455229aa56dc97f969ef,2025-03-21T19:15:45.437000 CVE-2025-25036,0,0,78fea41d7c513f964231eb9c0626e245c6bb048d564771a720806cf86a8f2b60,2025-03-21T20:15:15.293000 CVE-2025-25039,0,0,6155e71068b69a4630ff4049b1126cd719aacb06ed44ea56a73c6de4d42c8922,2025-03-28T17:37:36.690000 @@ -285854,10 +285860,10 @@ CVE-2025-25040,0,0,eef52afdc1e0cd691e9f8e58be6a79eb181268f995aedb195ab63cb8f64ca CVE-2025-25041,0,0,38e8fa4df2cdb6a93ddc945573bdc68d8f211c9cdac3d09670f4b0b980fef07e,2025-04-03T18:15:44.960000 CVE-2025-25042,0,0,5f31505452d68a678450274075e145f35ddefef408cd0b3ed1e383cb5d57fac4,2025-03-18T20:15:26.177000 CVE-2025-2505,0,0,1c5dbc559f463be147cb12740d372dacf2302c45c3ca19193c3edfdb65cecd96,2025-03-20T08:15:11.873000 -CVE-2025-25053,0,0,6f3e3e1149d8cdaa684786813f892cc37da22045c9f15050485cf761fcb6269a,2025-04-09T09:15:16.213000 +CVE-2025-25053,0,1,c2f0bd0c35598e1c1622cc448acff9a92a8848188ef19aeadaf00b0129c32cae,2025-04-09T20:02:41.860000 CVE-2025-25054,0,0,5be11f7aa8767f62986e873818aa7bafb83a58f1dfa102f5a36254246868acc6,2025-02-19T06:15:22.010000 CVE-2025-25055,0,0,715a07bb29b79c7fb7ed93b83baf8d9d3a9109839cf0cb0b13f9fa08d28e54fd,2025-02-18T00:15:21.277000 -CVE-2025-25056,0,0,23430cf22652ed6650fb125bbb2b9f3c78e7826bbe90616db2c7e158dc4c4e15,2025-04-09T09:15:16.423000 +CVE-2025-25056,0,1,2442be758ebb20af39870ce02215019e1d15b2a21bc8cfcaa6fde055126de74a,2025-04-09T20:02:41.860000 CVE-2025-25057,0,0,0f4259d66cd4a62551f5fdab8531df6e6db104a18c592bc5fdaecadf9bbe27b1,2025-04-07T14:17:50.220000 CVE-2025-25060,0,0,0a8c2b6524932cd2aa3b427f8f4980261a4c0e66f4c81723c7a600e1d7bc04fa,2025-04-02T14:58:07.527000 CVE-2025-25061,0,0,c6aafff32d7dd92169622d3756fd8e14fdd083a787d0cacea4fc235406d00f2c,2025-04-07T14:18:15.560000 @@ -286004,7 +286010,7 @@ CVE-2025-25204,0,0,119932f98cc8b58871d029f6ccd9a89a806462d1c2b6c06ee7f6d1cb510c3 CVE-2025-25205,0,0,53d346539ec5bb58856ce63a9d1fdca5438e2c859c2047a9cb707ece5a8bcbe8,2025-02-12T19:15:21.717000 CVE-2025-25206,0,0,9f668b067e3e448579721524d9498db32e90e7d300d6cfeef5961eac800c1c31,2025-02-14T17:15:19.327000 CVE-2025-25211,0,0,cc654165143e1a6a565806b2fc146b90cc33ea614905ce025bd44c72692f30c8,2025-04-01T20:26:30.593000 -CVE-2025-25213,0,0,6c026d2169175020aae54c22bf508917d8e86ab89c84435b01e4542f8d27e7be,2025-04-09T09:15:16.610000 +CVE-2025-25213,0,1,4b306f44f1e5df4d081a6c0fb4426c0cd2686db9ca8e9c6904e1b2bea864dca1,2025-04-09T20:02:41.860000 CVE-2025-25220,0,0,3e48240fbed17896ea7da609293ff3c7512ec69524229da5c9de3065be015d34,2025-03-18T09:15:13.750000 CVE-2025-25221,0,0,da7f39219236daa10c6a9a322f77562859face44f96d9c55ab9ddbe74ace6d9f,2025-02-18T01:15:09.070000 CVE-2025-25222,0,0,c2ca7e3dc29f3574e03139c7399b4994d988797dae7ad6db23b85350baa3dcf1,2025-02-18T01:15:09.210000 @@ -286177,7 +286183,7 @@ CVE-2025-2562,0,0,d71b02468cafdbce84509f67bdfaa8893fe73450f99731b0a90af791f6f728 CVE-2025-25620,0,0,2998f203d004ba2c3686a85bfd6e4a9c803d92001b76576bf7ced9c40410ee3c,2025-03-10T19:15:40.393000 CVE-2025-25621,0,0,63a694a2198c853cb02da81979b70cf80909e4f217d0ad14b5c2cf8cdc3ac35a,2025-03-17T18:15:21.593000 CVE-2025-25625,0,0,d35a53456bc87fc30424277ce00ed28d6dd49da4bed527e81b7815b9777704dd,2025-04-03T18:26:47.920000 -CVE-2025-25632,0,0,1ceebf9a7f4f0a07c0d7243ce1a1b61926f60bcdd3649b2e6df48cfbf3246b4c,2025-03-06T15:15:17.770000 +CVE-2025-25632,0,1,63a9daf8d062287fb49c86902495e07de54d2264559e40d7c6a1a7888562d43b,2025-04-09T20:56:55.750000 CVE-2025-25634,0,0,7d5efbb3a02c594499ed06a9a27e13e1f935c77ecfc5e148d76deae63172e1dc,2025-03-06T22:15:35.290000 CVE-2025-25635,0,0,beaccf1b133ae432bcedfcf1b43f20544c4e5ac5d5d33afd3d44ae08bcd8754b,2025-04-03T15:37:36.397000 CVE-2025-2565,0,0,f277f18a1d6b4f6fdad91ac7c8998a1356a20612866a1379743ae4d6e0fa80e1,2025-03-20T17:15:39.450000 @@ -286354,7 +286360,7 @@ CVE-2025-2606,0,0,443cc3352092d2b10fc06d9cda463fed58074d11c52e405e87198504ec291b CVE-2025-2607,0,0,1597ffd2cb1ffa35e1e76acba708a8bd026607d0f9e02bb3e06ecbbccfee78bd,2025-04-01T20:15:25.810000 CVE-2025-2608,0,0,6154f4c95ab9ab878289179a091133b4bdb0b1f5a3bb16758adefdabb865f57c,2025-03-21T22:15:26.250000 CVE-2025-2609,0,0,98f4e2ddc30f3944fa89ec225fed012beb586ca920ba0b78ac92c5cce135928b,2025-04-01T20:28:29.337000 -CVE-2025-26091,0,1,4549d77d1d345075f3140cb5e1ddc83fb523b2320c67bf1bce4f2fbf839cd155,2025-04-09T19:15:47.703000 +CVE-2025-26091,0,0,4549d77d1d345075f3140cb5e1ddc83fb523b2320c67bf1bce4f2fbf839cd155,2025-04-09T19:15:47.703000 CVE-2025-2610,0,0,d9535a1c139910205321aca35370cfc0b0260764ca92a5dd60f7ed3f175deffb,2025-04-01T20:28:16.643000 CVE-2025-26125,0,0,4ae7f7ba353601c45dbee82b55634f507486c612ec0e7fb0295802c5ca1a95ba,2025-03-24T13:15:25.920000 CVE-2025-26127,0,0,ff848518068745ae246227c687011816436068efa4d4914700821387766f6d15,2025-03-17T18:15:21.860000 @@ -286392,19 +286398,21 @@ CVE-2025-26264,0,0,7eeeb1b8e87d7e06484f4d071bc6d32b977cfa79c395c4fbca1cefbdfdd35 CVE-2025-26265,0,0,a1e1cddd3368455d8fc7af1822e4326b1b03402845c4f5127e6206ac1ed92a37,2025-03-28T15:15:47.830000 CVE-2025-2627,0,0,2f3ad81f65de29cf1c1820e848f840cadf0a85c3d953dd25546251d732981bcd,2025-04-02T15:46:50.193000 CVE-2025-2628,0,0,05d1547b9a4ba25743b9dcb0b6bd681f5330882c7d106990b2f631bde4178f60,2025-04-02T15:44:41.567000 -CVE-2025-2629,1,1,e3b4aa64ac9ba34f7478486890a138a2b61c28bb24ea2d0b985e61ef0f4b714a,2025-04-09T19:15:48.320000 -CVE-2025-2630,1,1,b73b1554cc47d5967786b8e621490f841e2650222aa8889ffa4fe2f5ef996db9,2025-04-09T19:15:48.490000 +CVE-2025-2629,0,1,c910d2eaf141acbcb34a1527dcbb7382cccd5675ca993fe0deaf004b466e699f,2025-04-09T20:02:41.860000 +CVE-2025-2630,0,1,be18d255795398ca987e7a48f89c629ca98a7ecb5c006b7297521c18c8e985d5,2025-04-09T20:02:41.860000 CVE-2025-26304,0,0,70c8f37d4db2054dfe1099a4a2c4b06129c826d4de254465b9316b6b41e402d7,2025-02-21T21:15:24.653000 CVE-2025-26305,0,0,1a1d603a79ab0dad9b04f449d78f3a3bb9f5de25113a59f9bb3a8e492946e3de,2025-02-21T21:15:24.803000 CVE-2025-26306,0,0,f6318b29dc3c8fcf62d8d059c582dc4ed277312d31ede047e5262baa26bd01da,2025-02-24T18:15:21.357000 CVE-2025-26307,0,0,6474cbc9c762d9c8b2b3e0146aaa641b9af33b3b574f287cd001aaae5cbd1d8e,2025-02-21T15:15:13.223000 CVE-2025-26308,0,0,69e4926ab121453dd269ecd5c4a1e680c76cfe3a7adc73ca0152c52aac5d451c,2025-02-24T18:15:21.647000 CVE-2025-26309,0,0,7ae8d8b0652f85e6f8fa255fc222f026973cab38848f066168ff295eb6f4ee31,2025-02-21T18:16:13.790000 +CVE-2025-2631,1,1,d79f87e3c7ace5723006dde999126a613c0ef966eb272a3de3cb03b470d1d50f,2025-04-09T20:15:27.183000 CVE-2025-26310,0,0,55b236dbeb9a20179e9b06fa335fdfa1062067456641081301fd898e499e9d2b,2025-02-21T18:16:17.950000 CVE-2025-26311,0,0,8f41ce6db700f92fea4726f2c9198369bec586ae5a386ba2dec789165ea39c8e,2025-02-20T21:15:25.907000 CVE-2025-26312,0,0,f394aa1aa4dfb775ebb7188f76a9b0a21eaabe1fd9b9e3fe5dc73353a18f5288,2025-03-17T16:15:25.637000 CVE-2025-26318,0,0,84d066d40995f86f82311ffc56dc1f81fd70a062203c7c5ea702e8cb9cb3ac6c,2025-04-03T14:15:31.493000 CVE-2025-26319,0,0,f00500492e7a3f0a2bff919ad8b60c606fcf031aa95c7496eeafad4b93d44cff,2025-03-05T17:15:16.340000 +CVE-2025-2632,1,1,96f0f9f4f7f851eba1c0fd78ad82e450d139d9699664c69c5779555eb966041c,2025-04-09T20:15:27.350000 CVE-2025-26320,0,0,2c7c4543047844dc51d38a0e0844ae377a705f600f7e38264bf4c89a9fa42fbb,2025-03-05T19:15:39.173000 CVE-2025-26325,0,0,f233a1914d47e95e53a6a85e3edce01b96b7b4e30f0938bdbc0790a0c40f83bd,2025-02-28T22:15:39.927000 CVE-2025-26326,0,0,a7b5315d9a8f318981baa1be6e3a967fc5e7b504545fab3a9d502474f652f3cd,2025-03-13T16:15:27.473000 @@ -286602,29 +286610,29 @@ CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000 CVE-2025-26626,0,0,832135365afe9b165e627d6f2e660894eac8d147d041aabc91e7f8de0d91e92c,2025-03-14T13:15:40.077000 CVE-2025-26627,0,0,4f3d1d8e79c6467c58c4d783e1debde01a13c4c8b3f1ff7ec91bf1fb4fe28399,2025-03-11T17:16:38.930000 -CVE-2025-26628,0,0,0a25140596edd9cc4c25b7c8a87e826d5a51f631dc2adcb59f62ab732eb1e8e0,2025-04-08T18:15:47.180000 +CVE-2025-26628,0,1,3ef9d34b1a957a131ae438f9c81a203cc837d937275f2ab779c58380b1f3f3c1,2025-04-09T20:03:01.577000 CVE-2025-26629,0,0,119651142d226de4e69d999f757c4da3db257145ca25f65863f6aa1fd4a5300b,2025-03-11T17:16:39.537000 CVE-2025-2663,0,0,aa164ffc717e67c23ae467b3f456c05b23907944ead8fb826b0b784b736528e0,2025-03-23T21:15:14.603000 CVE-2025-26630,0,0,af7d7e5fa840c887baf50d5c1735f7aa1619e17d1764c67afb65d807890e6865,2025-03-11T17:16:42.820000 CVE-2025-26631,0,0,59a2f45a7814bc8caf629a43c5f1ff123b906077fc8e25801290af954c09035d,2025-03-11T17:16:43.110000 CVE-2025-26633,0,0,5f33cb21fce2f0bb3c6b3d8a478731b982f566391108f0ab4112eea241a8777e,2025-03-13T14:27:50.300000 CVE-2025-26634,0,0,e4fd2b42e6c3227da4eabfeb027c93f3600e5512159933298b96dc2c0e6ab9dd,2025-03-11T17:16:43.743000 -CVE-2025-26635,0,0,1e615bafd50097163abb7341dcbc6abfa28336603330a7cfa9b38df7666adb11,2025-04-08T18:15:47.337000 -CVE-2025-26637,0,0,512471b59f4df2120c3514df25fcd0f843b291f092c43f3034a303b6943c5c62,2025-04-08T18:15:47.490000 -CVE-2025-26639,0,0,4f43d33ba56a4f850e53a349ce3e12998f384effef16322b790cebfc7ab5ee4b,2025-04-08T18:15:47.657000 +CVE-2025-26635,0,1,249a6a463578d8256625ed375ca12cf728f4607564d7c2e772655a051d563e2b,2025-04-09T20:03:01.577000 +CVE-2025-26637,0,1,9b5deebae24909e3943d3a6ed60afd670322f84254f9d959fa6e9784dbd57a98,2025-04-09T20:03:01.577000 +CVE-2025-26639,0,1,17fe8fa1eb116865f44428dc20c783ff77e5db660c58d29dc713260eb4501625,2025-04-09T20:03:01.577000 CVE-2025-2664,0,0,6ff0ffc262e2befcd6bc6d4bc7b0cfbc02687b745501f8524d04b60b044f64e1,2025-03-23T21:15:14.790000 -CVE-2025-26640,0,0,f8df23bd41d900fa3bf8c03c384f2638e9dbb68257a5ea9ce6bd3dd70be9e8b2,2025-04-08T18:15:47.817000 -CVE-2025-26641,0,0,7087181cb61ad99f27ed40731fef35e98e598d0fbb894c82102516cbe9fc5899,2025-04-08T18:15:47.990000 -CVE-2025-26642,0,0,f959ae117f78abfc9f7be2665e4dc08c0f0d9dc3150b75dc99664086b77a2d9e,2025-04-08T18:15:48.160000 +CVE-2025-26640,0,1,7b91eaf051a6e04878ac0f2f1513373a110835dde2872db996d2852035c38142,2025-04-09T20:03:01.577000 +CVE-2025-26641,0,1,84f768b8aa2d0888717d02fb84dfc42af40135aaff78cd9d12ccbc609c2032b9,2025-04-09T20:03:01.577000 +CVE-2025-26642,0,1,5e07a7f3f0d7f59f4e8c3ebaba862bbbdc274682741fc9b4dea1af99cbd3f3d6,2025-04-09T20:03:01.577000 CVE-2025-26643,0,0,fdd1c1937beffd124d32a1ceadd3f98e87693b9c4f7e4b7907e61b194eac7eb4,2025-03-13T17:34:08.587000 -CVE-2025-26644,0,0,e85f11a9a23f0f606fc79f7cefb1e01920b87ad4991b5d2bcfc6036cb6c2a0f4,2025-04-08T18:15:48.347000 +CVE-2025-26644,0,1,d546b9cd8d76e65a2da3522c0f23294e576c82b7978f0e7b900a75777d3c3ce5,2025-04-09T20:03:01.577000 CVE-2025-26645,0,0,c81d070a14a19f5aa832e5ee1c6a2271fc8ee18e21d17ccbca0820999b902cec,2025-03-11T17:16:44.200000 -CVE-2025-26647,0,0,fbf390df40b86f16c332c0baaf44676843933d69264d20c3cfb64cd42b538e16,2025-04-08T18:15:48.510000 -CVE-2025-26648,0,0,de4a72ce8b439a9d1b39a17691ae42e4232989decfa21af8ea6047ab4b0948ee,2025-04-08T18:15:48.667000 -CVE-2025-26649,0,0,387ed3e0c7a2e40dbda2f5eb6dbd44aeb72076a26299faa40ba800db104ea684,2025-04-08T18:15:48.843000 +CVE-2025-26647,0,1,62a98c58840a94676fcb335138b6f49474217d87e02394d83af61ed2baa4e1be,2025-04-09T20:03:01.577000 +CVE-2025-26648,0,1,7a7377ef9f275ce530cd7def9c3a65d6410252ceeffaba3ff68a21c329843654,2025-04-09T20:03:01.577000 +CVE-2025-26649,0,1,04595695627b5120538ce950e07f092f10ab794cc9d968513110bb2ba2652af8,2025-04-09T20:03:01.577000 CVE-2025-2665,0,0,374db404c8969e7c1a917201d9c10b42061053e18c1f29851f060f01a96376d4,2025-03-23T22:15:13.340000 -CVE-2025-26651,0,0,09a8b1e7a8c5b5a0239a883281f819389bc6658dce60154f26dc26f91715b603,2025-04-08T18:15:49.007000 -CVE-2025-26652,0,0,133500f3d86d9fbc17503ce3f8d24c038cc8a083b168a8c373b19c1a69858cdd,2025-04-08T18:15:49.157000 +CVE-2025-26651,0,1,0aff72fc7857936a319c01605e6981b0a9d56744f3722838a05c42a6953cbc18,2025-04-09T20:03:01.577000 +CVE-2025-26652,0,1,5ccdf8abfb98e9bfe37b209dfbe047f5206f6cad471854e7d1edb7024ad65e21,2025-04-09T20:03:01.577000 CVE-2025-26653,0,0,3d6c5ba690f95d5864e1a1e14cc21341e0ed47cac4c9c669fb0f1a40adb6989a,2025-04-08T18:13:53.347000 CVE-2025-26654,0,0,ff47e67de947e2f39763845f22e5568b1e4c59563a24fb43a67bbdcca66081cc,2025-04-08T18:13:53.347000 CVE-2025-26655,0,0,2310006db81bae09c090aa02bc791abe44ca64048768875a974f320de93200af,2025-03-11T01:15:35.230000 @@ -286634,29 +286642,29 @@ CVE-2025-26658,0,0,aedc4d0eb67f4f5f0b6a3ffda635a52c1b05624552df9e00a6801f2a11a2a CVE-2025-26659,0,0,e49bb37eae4d802d08529be287a8ee45c0a41d1e6476deffc54020440698032b,2025-03-11T01:15:35.683000 CVE-2025-26660,0,0,b711a00f5dfa32959fd3c766aaf7ba4ea22e4bae0e839f8f050152da069fcd60,2025-03-11T01:15:35.837000 CVE-2025-26661,0,0,6b07aa7e41ed32b21c57e51684aeb9e36856ccd243be242f1a25b61ed08c5995,2025-03-11T01:15:35.993000 -CVE-2025-26663,0,0,8c3100eef3dc148b9be3ab24a65eec58deaab55d175d06ffc6a8351cdc64e065,2025-04-08T18:15:49.337000 -CVE-2025-26664,0,0,afeba101e584f70177fb505e81d619cb3934fda090b055dd3861fd581767269d,2025-04-08T18:15:49.510000 -CVE-2025-26665,0,0,8fe39e7ebb6fbe257075b5fa63fc97fb8794f7bc09da46f26e468dc89d047123,2025-04-08T18:15:49.670000 -CVE-2025-26666,0,0,1ba56e839161e92f8889f1da24def40baa4de9e03b479cb1e847321b6e9b9e49,2025-04-08T18:15:49.833000 -CVE-2025-26667,0,0,aba40d8eafb560fe7f61df5e3d01471b1b930860b5bf3e560ff4fa03ef3dbd44,2025-04-08T18:15:50 -CVE-2025-26668,0,0,9f566e464683c9abc175804c8e7cb90333b49c7086abb3370aefe5e1bbcd7193,2025-04-08T18:15:50.160000 -CVE-2025-26669,0,0,557e299f2000ca166d5478c66d27776a797829319fa78fdb684e7233b5152ca0,2025-04-08T18:15:50.347000 -CVE-2025-26670,0,0,b1f955960f8c216ad798e71fb0a3519574c923b3a6143292ee036fd9db5658e8,2025-04-08T18:15:50.817000 -CVE-2025-26671,0,0,d44c685d64b37700b180ac0dc2031f04055f5e29d3498bd04995fc9e33871e36,2025-04-08T18:15:51.003000 -CVE-2025-26672,0,0,6b195e8a47dd36dc6aaf49f0af3082147661a9627cc8678f9562d951eaf530cf,2025-04-08T18:15:51.177000 -CVE-2025-26673,0,0,1cb9ecb5cde2e3a311f9c373a4b6c56fd13ef68839429a88a5da99f86bb42247,2025-04-08T18:15:51.350000 -CVE-2025-26674,0,0,12f32d15f23ae6031d0597f38ca0bb4a94b1c507a5c7a9907a691a8e513da093,2025-04-08T18:15:51.553000 -CVE-2025-26675,0,0,53bbc39b58ba2db6b6b16c3115bd31b401cb233f73b5dbe044e3c2171d999689,2025-04-08T18:15:51.757000 -CVE-2025-26676,0,0,c1bec0523ddace39dbe48b49deb438cf54154e9aebd64bd5cd4ee64177f02330,2025-04-08T18:15:52.023000 -CVE-2025-26678,0,0,0cbb43b66a6796ff64b47cd6aa62802c33e9aa183d05c4015cbf4cd72e2aa3aa,2025-04-08T18:15:52.303000 -CVE-2025-26679,0,0,f5e3404b8e4797429d49b0faf57f9b212dd0b26874281d582b507fe1da53ac68,2025-04-08T18:15:52.463000 -CVE-2025-26680,0,0,447f155105a74e8bbe5c1baad889a9f49e61873c5b20074bab2b095dbec660bc,2025-04-08T18:15:52.667000 -CVE-2025-26681,0,0,12ec253ce0d4e197605094cdfc1a2f5153f9d51fb4de0e5ae8cda8d028ee1b46,2025-04-08T18:15:52.863000 -CVE-2025-26682,0,0,dafe1d3160a6e7c5d456eeadc8fafe284a2f06f0da566b644bf0f59e1974594f,2025-04-08T18:15:53.033000 +CVE-2025-26663,0,1,6086e7733590eab72286ca8352780a1169cd1bc8ed84c48aad17700971c29cec,2025-04-09T20:03:01.577000 +CVE-2025-26664,0,1,e59d925a63747e28c577080750c0334dd4608ade75462ecd58490599230166d7,2025-04-09T20:03:01.577000 +CVE-2025-26665,0,1,a99bbbfa0350eff178d267d3c711679cbae399d5a5ff7a94f6d9359fcb81034f,2025-04-09T20:03:01.577000 +CVE-2025-26666,0,1,d164f20eb2ddae7fba2dd669948ec8ccdb7e98fe401e64a1692a5a5423d3a9b4,2025-04-09T20:03:01.577000 +CVE-2025-26667,0,1,27bb09ce4d25e4d785a0fee31f43121f18bb34ee68c6af581f626daa91b0022e,2025-04-09T20:03:01.577000 +CVE-2025-26668,0,1,8173330f11baf8e0da2e8e0be743488eb0aef9cec349cf99b63ec56f464edf49,2025-04-09T20:03:01.577000 +CVE-2025-26669,0,1,ff545d9484c40e4e1f7b143bbfbd9ad745394fef94f085c724dd54b535846d30,2025-04-09T20:03:01.577000 +CVE-2025-26670,0,1,e4f6979dcbc0027cb4d3cd1023cf67710c384014ca9e235f85a82bba968c9e7d,2025-04-09T20:03:01.577000 +CVE-2025-26671,0,1,5b48b5ff67c99cdbf691d132ac1c5e98d6aa477df0b5e702843b0d4987690cae,2025-04-09T20:03:01.577000 +CVE-2025-26672,0,1,05566af805fa02c52bef221190dae71d8ffb69bad4b7db0a049c722a5fa71fe4,2025-04-09T20:03:01.577000 +CVE-2025-26673,0,1,523296a64ab46050153766e118165204b118bd5c6a2a44779969a0647d709650,2025-04-09T20:03:01.577000 +CVE-2025-26674,0,1,32c323ba5107a8e5799b20f66e4d6e446ff93ba78a5942787045c6486aefaf70,2025-04-09T20:03:01.577000 +CVE-2025-26675,0,1,c1f6b56daa2f6eabf53a9ce93de5eada3ae979f1c7b361477e087600dd51912a,2025-04-09T20:03:01.577000 +CVE-2025-26676,0,1,9057b4f1931427751b8f383f66b1a69a1a51d8f66d86462814c582b5d1175c7b,2025-04-09T20:03:01.577000 +CVE-2025-26678,0,1,e82891ddb9f5632e37c934f539168e9c53f795b4772f0e0e54aadf2baad572a5,2025-04-09T20:03:01.577000 +CVE-2025-26679,0,1,8dcbca78b35ea6388d9786cdaf7401952f46f80d1d96c8b646aa348274f10a3d,2025-04-09T20:03:01.577000 +CVE-2025-26680,0,1,b58cea787042a9e61c39dbdb49c0088acf2de0e39f8163066c5b69f7e09d269f,2025-04-09T20:03:01.577000 +CVE-2025-26681,0,1,db7179c6ffacbe99bef0b7955f4cac68d92416cfa71ad531d829e479ac675377,2025-04-09T20:03:01.577000 +CVE-2025-26682,0,1,82c4d8ffb27ac1e0d45a1c0acd96745461f6293a94fe8e414c72c4abf4c09d26,2025-04-09T20:03:01.577000 CVE-2025-26683,0,0,87988a6d4c6dbe800d3c42a8efc2bd51a6c5fb95b5257787759fe32f886bbf37,2025-04-01T20:26:22.890000 -CVE-2025-26686,0,0,a9154db141613a7a4309d326a5465ae4cdfb83ac286c8debf93045521772b1db,2025-04-08T18:15:53.220000 -CVE-2025-26687,0,0,b416c2d37ed4ab54332b6ca2cc87c6c3786c63b129a0766e0b201bb489834648,2025-04-08T18:15:53.383000 -CVE-2025-26688,0,0,eeea8def850fed2435af9ac4c45e50a1c731d1ccb6de99d0f428e3118082c175,2025-04-08T18:15:53.550000 +CVE-2025-26686,0,1,59aaa15d9582056d83d912ee51590159a552e7f9969347f7bf417d2eacd26d1a,2025-04-09T20:03:01.577000 +CVE-2025-26687,0,1,42a13ddd8a8903bb02de8b2c4aada5094989d1d8fb32137da1955201d1274b81,2025-04-09T20:03:01.577000 +CVE-2025-26688,0,1,2b1c644c41e4dc82994a1456ac5a95785c6ccdf710791b8434576fc8762da819,2025-04-09T20:03:01.577000 CVE-2025-26689,0,0,dec5b99891737ae6a49560338e391a9fd35d35000ff58423c3aa4180c66c711d,2025-04-01T20:26:30.593000 CVE-2025-26695,0,0,f077e716806e3aa11572737cbb762272530f7e8504d9bb6d9406f576cc783416,2025-04-03T13:30:39.037000 CVE-2025-26696,0,0,b9658e1d3c0f3dd4003407283a716267ae4de824c8808025c4c0cd47206d44f0,2025-04-03T13:30:33.593000 @@ -286761,6 +286769,7 @@ CVE-2025-26884,0,0,1d074e2084c12e5387b24bf69656649d494667e7bb4c2438392c9dd96d466 CVE-2025-26885,0,0,2ef732a4cebbeb85a5dbbaf27f49124f8d762a49e8e7f3b22ab266ddbd21a44b,2025-03-03T14:15:56.360000 CVE-2025-26886,0,0,3fccb07cd6593c19d4ebd609ac67b0d6e5961e270965b650cf84c0ac5737cb12,2025-03-15T22:15:13.837000 CVE-2025-26887,0,0,d620956d3ea5625abfbc4595a1a19c4cbaf27ed3b93aec2afc55fa2fa354983d,2025-02-25T15:15:25.117000 +CVE-2025-26888,1,1,aba2867589d4abda27b718a5db7d9200b335a294472cbec4b7eaf874db9ac261,2025-04-09T20:15:26.607000 CVE-2025-2689,0,0,7def21fc4f9af6929592c74150fdb16a7f32a04a61b4c9679449b0c0f3db1408,2025-03-24T17:17:26.607000 CVE-2025-26890,0,0,7c5bd562991190453d0d95d46540e8b902fafbca311e972364b1df4ac9dc0f02,2025-03-28T18:11:40.180000 CVE-2025-26891,0,0,20d9b98fa953b2c2ae1876c761e770a063cad8d8555cb8705b5f8d6ebece6625,2025-02-25T15:15:25.253000 @@ -286772,6 +286781,8 @@ CVE-2025-26898,0,0,de5d6e76dc39902681c090ab731297bdb43aadaf64b5598bb195e3a06ac85 CVE-2025-26899,0,0,95b084e2f68809ccb6891be9923c60028fc93cee3b6a691436d8301682c70fa6,2025-03-15T22:15:14.250000 CVE-2025-2690,0,0,ba0a819c9af2cc9ef6be5031e2f922b414ad3e85f830bda091f0f98a651b600e,2025-03-24T17:15:40.917000 CVE-2025-26900,0,0,059a3c3ee3ee2a5a8549e4b2d083087d5d389f3b34374b636a32cc0884702ad8,2025-02-25T15:15:25.853000 +CVE-2025-26901,1,1,6c1f040da39d4f966cf62e1b781becaa1620063d4ef80103f2db25f9beee7dc3,2025-04-09T20:15:26.773000 +CVE-2025-26902,1,1,e90c0f4bb14e5ebc8044ed08676620f48b2515f76d5ce130a78d190f251da690,2025-04-09T20:15:26.950000 CVE-2025-26904,0,0,cab9a4c8649e54f1340a29bbdf14f52168b5cc51065c592884d99916bd742bf3,2025-02-25T15:15:25.990000 CVE-2025-26905,0,0,3fd420b5cf6d35f2394ffb7c8b96279ea5b6a88032aa4ac13abb160d4bcc3b89,2025-02-25T15:15:26.127000 CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd6460db,2025-02-25T15:15:26.263000 @@ -286868,9 +286879,9 @@ CVE-2025-27079,0,0,0b052eb5620ef6c2a33f5074d0cda212573793a5998bf08dec9ab464e47ff CVE-2025-2708,0,0,035f6de4f231540df9d0a6b0f6672e128ae938a5bee1f8e3912f75b08cd18d96,2025-03-27T16:45:46.410000 CVE-2025-27080,0,0,42e0a7d70009a70996fc58eb7f4ee4c8d798d6b5d13faea5a93ec59abf435a8f,2025-03-18T20:15:26.300000 CVE-2025-27082,0,0,bc94d7aa1707776f0018420de9eca8ff83f2f275182e2df214e9bcb4f130ccf7,2025-04-08T21:15:50.273000 -CVE-2025-27083,0,1,9973aa4b40c39d6e58e7d53f3b7d373505a0c9f34314a4dc591ed39034ea7e8c,2025-04-09T18:15:44.707000 -CVE-2025-27084,0,1,a49dd47a9f3ad17e2e49c3157e24c8752ed90f227d5203cc20e98f8211f13fff,2025-04-09T18:15:44.847000 -CVE-2025-27085,0,1,a907717a65908c20d2d3ce3360c3a9477d73ea705f674b740feb47ed06abcb1d,2025-04-09T18:15:44.980000 +CVE-2025-27083,0,0,9973aa4b40c39d6e58e7d53f3b7d373505a0c9f34314a4dc591ed39034ea7e8c,2025-04-09T18:15:44.707000 +CVE-2025-27084,0,0,a49dd47a9f3ad17e2e49c3157e24c8752ed90f227d5203cc20e98f8211f13fff,2025-04-09T18:15:44.847000 +CVE-2025-27085,0,0,a907717a65908c20d2d3ce3360c3a9477d73ea705f674b740feb47ed06abcb1d,2025-04-09T18:15:44.980000 CVE-2025-27088,0,0,fbdc36eed3cad3a0ad2022cbe7aca458560a9c5f707fbc00203d874cefc235d6,2025-02-21T22:15:13.673000 CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000 CVE-2025-2709,0,0,d6cc52b54cf9fe42db12e08a6931ac595590cbc41e2b6527b80a4b65b7cd7d63,2025-03-27T16:45:46.410000 @@ -286951,29 +286962,29 @@ CVE-2025-27178,0,0,c0d88664738e20e92964f976914afee130c9a89aa0dbea09624f6f217ab10 CVE-2025-27179,0,0,e658b366f7a3b06f1476082709f4a4e62efd35013484c2cf080c38676d042480,2025-03-11T18:15:36.353000 CVE-2025-27180,0,0,b19084cbc983aa321eeb856e49b47a1e72dbe787bf6a8284a3874ff61419d220,2025-03-11T21:15:42.463000 CVE-2025-27181,0,0,a6a9ce63b284d6ceeb21e9a4def4af91dd2ed31fd65fd783300575a45140db01,2025-03-11T21:15:42.613000 -CVE-2025-27182,0,0,10b98bb344081bbd7a7aafff3ad789d4caa2bf7a0fbe771de1edac596ab1a6a6,2025-04-08T18:15:53.740000 -CVE-2025-27183,0,0,a5825a0480ba31af25dc3747a70700a2d8e459d39d0cf34f8e5ff6c3c83edf06,2025-04-08T18:15:53.937000 -CVE-2025-27184,0,0,3055500183228bfee6cbb76c92db98ca6dcd291f749461d4e215bc90ce604346,2025-04-08T18:15:54.090000 -CVE-2025-27185,0,0,b9208d25fbe332631875bc3d1250ff6df87305662e944a4fb9bd6a9cedfcffa6,2025-04-08T18:15:54.233000 -CVE-2025-27186,0,0,be2947e6dd405aef88d33a294e3580ea77cecdb07a4e3a25d26400a7f23aba7d,2025-04-08T18:15:54.380000 -CVE-2025-27187,0,0,57f151cfe4ccfbd351acf474fa2570b4f81eafbb9e33115e42beaae9a8938b0e,2025-04-08T18:15:54.540000 -CVE-2025-27188,0,0,c748462b5da4a0e5092782e139029684515dfdba4c7eb8a22a567f67e3725fb9,2025-04-08T21:15:50.393000 -CVE-2025-27189,0,0,d0fd1c91d64241f3bd51b15bff4e6180f99d5d358fb524e1f3d45106642808f0,2025-04-08T21:15:50.567000 -CVE-2025-27190,0,0,edf7a36419ee3038a8a01e18c156c27e2af467573eab39ed4f681c772b43cbce,2025-04-08T21:15:50.727000 -CVE-2025-27191,0,0,590308dcea40f8ed9a5ed7e6edfdc0af962f4dfeb0195c7a855d890e7b3db5e5,2025-04-08T21:15:50.883000 -CVE-2025-27192,0,0,13f6e0e479f2278ebcf8b26685bf08ef0c5e2f422525448cc899564f1b094cda,2025-04-08T21:15:51.040000 -CVE-2025-27193,0,0,d661cd7214e76313a3763116228b554601c88624c0b141c0e82fe4ee82a3ef01,2025-04-08T18:15:54.687000 -CVE-2025-27194,0,0,fc43960258c9727aff4c1ad62a9440348dea06706b4cd698b947741bcd9d7b2d,2025-04-08T18:15:54.853000 -CVE-2025-27195,0,0,bc2847ea218716db92331474387eb1c775a89f64d9edd2bc214c5f2fb5970984,2025-04-08T18:15:55.027000 -CVE-2025-27196,0,0,0bc1109e04077430724ed05c2e192c8f4971d67d09d26c27c350dadcaee1b639,2025-04-08T18:15:55.170000 -CVE-2025-27198,0,0,94334ea4b134ac54f4e631b7f40bbd5e1aec2d20e2b7e3d1f09a1667075a3633,2025-04-08T18:15:55.323000 -CVE-2025-27199,0,0,c0ba8a3d5135706872f52e5315cac70e76c8f9e6437db3073559c23529819c22,2025-04-08T18:15:55.477000 +CVE-2025-27182,0,1,9a0018a7c401d663847bab9f724eb9d94471e314e9a4e7cd8c4a002a6104d94d,2025-04-09T20:03:01.577000 +CVE-2025-27183,0,1,156529aa2d2408dae4d14c301f1f92b62510b7daf0a62b75a4fd401ca8f1206f,2025-04-09T20:03:01.577000 +CVE-2025-27184,0,1,0357a627f83b2cb53b237ef03be46a7bbd5756699fe0977095210526a04ae341,2025-04-09T20:03:01.577000 +CVE-2025-27185,0,1,757d8348acc6bf33fce2a45006312bfe5c9cb5d5e50dd2d4cdd3b046754ad909,2025-04-09T20:03:01.577000 +CVE-2025-27186,0,1,d6a7c36938fb0ec4547234bdf8014d1fb8e1b54a259eba5484aa67f02804784f,2025-04-09T20:03:01.577000 +CVE-2025-27187,0,1,2f2178a3ade147e716c21308d74312136a08dde9070b126b8be0d8e574002614,2025-04-09T20:03:01.577000 +CVE-2025-27188,0,1,baa6d648ba130d0422b128128ac53208274c7a4970470bcc5c21647e49f01681,2025-04-09T20:02:41.860000 +CVE-2025-27189,0,1,7eec0359c6679ce6079037456ad2495fd960bf0ce3f801d85bafe5fc2dfe17a7,2025-04-09T20:02:41.860000 +CVE-2025-27190,0,1,f6f93c1a2aea709128307aab4dd8f7522a1d7f29cb3bdc0326949ea46ad2467a,2025-04-09T20:02:41.860000 +CVE-2025-27191,0,1,4f5df9b8c88675a85a7e789e6b2d5ccdb0b9a9567f661f6a44fa4181c1411c1b,2025-04-09T20:02:41.860000 +CVE-2025-27192,0,1,1b90b1b7a7ab4ed5119a3d35c794c4de9f8c839b7d2d708b8887e2e334fefdec,2025-04-09T20:02:41.860000 +CVE-2025-27193,0,1,1c6467db70afee0ba0b1c16935cbba3ef88a48465cb8e4a7489a8eecadb821d9,2025-04-09T20:03:01.577000 +CVE-2025-27194,0,1,86819959362a66ee53ebc7ad045568aeb6167d45c02eacba6eb4c16ffb78445e,2025-04-09T20:03:01.577000 +CVE-2025-27195,0,1,df8dfa03cce0522ebfd67bfb4a9d97c208f09c37ca77ad0fd4de691c33143d9e,2025-04-09T20:03:01.577000 +CVE-2025-27196,0,1,b846178b4e60bbb6013c32a4ad63c39e6c33b6564064379338f554d5e8a5a686,2025-04-09T20:03:01.577000 +CVE-2025-27198,0,1,ca73baf97a9b98bbe2527eb71d2355d7b51c443371d672042021cf35626dce22,2025-04-09T20:03:01.577000 +CVE-2025-27199,0,1,85b84a9fa90465e2fc71b13db246a28a071583a25d0a669599e2332978852461,2025-04-09T20:03:01.577000 CVE-2025-2720,0,0,9ae0525d8f85a05348d1159e71fc380adf3a8b9852bd68a0d6d2a49136b12cab,2025-03-27T06:15:29.720000 -CVE-2025-27200,0,0,7c335fd08050e11f5dcccef3d0aea7bc26d93cb094a340453f2003361ef0ee6e,2025-04-08T18:15:55.630000 -CVE-2025-27201,0,0,5d8225ad324bce720111eccf49407722ae92c1c4849b131f807f48a2e6733445,2025-04-08T18:15:55.787000 -CVE-2025-27202,0,0,5cee2fc48ed531473f15d62c328c72adc5c20fd086476e1e39820efe0ed386e2,2025-04-08T18:15:55.960000 -CVE-2025-27204,0,0,491d713319471072e7b63a3f7dcfd26bfe63ce804776efc640294af204a4562d,2025-04-08T18:15:56.130000 -CVE-2025-27205,0,0,5423c9a56440b3547feb4f381e48ec4ead9ed1fc4da0823a60b64d5adc485646,2025-04-08T18:15:56.290000 +CVE-2025-27200,0,1,085b07f58fcc3e1216958b3f62bed1ea807a373abda05fac0395e43392c885b1,2025-04-09T20:03:01.577000 +CVE-2025-27201,0,1,ffec04546aa387918ee8c08545976c44acb3d07f9ca4daf3c12dc56f6c9cf4e5,2025-04-09T20:03:01.577000 +CVE-2025-27202,0,1,15e42be57076f0c1c9e404b9d3e1eb44e57b9a0731ae2e7b76d325140409e3fd,2025-04-09T20:03:01.577000 +CVE-2025-27204,0,1,230cdca7659c7add4aa1499d41b0ba309b9657b79a6741a35671dae997a9f3aa,2025-04-09T20:03:01.577000 +CVE-2025-27205,0,1,b5a3be62757c631169ae6f30a73aa85000f349fef09deb61e50341f0061f73f9,2025-04-09T20:03:01.577000 CVE-2025-2721,0,0,0ea4b131912f1c1068f18b233bf30f3ee27e9289a3b0d0502eb3374bc8db710c,2025-03-27T16:45:46.410000 CVE-2025-27218,0,0,a1f84aab7c20671025069586dc6eda2e424af576b61d56df1ec2458e5aa40a25,2025-02-20T21:15:26.510000 CVE-2025-27219,0,0,daf263bc5dc335c24b10a63de4b30bc2cd803d7c7b13164f0156e1db3a4313a5,2025-03-05T14:08:20.493000 @@ -287070,7 +287081,7 @@ CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51 CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000 CVE-2025-2738,0,0,e698101b4b8baa5b6d74722f9a5a2fd56a7a9ed4b926613e8c3fa693afa80c00,2025-03-27T16:45:46.410000 CVE-2025-2739,0,0,f4fbf6446ec2451df539fdc2165d89cda075d9eb4f1c2bfad7a40ecffa8d5b9b,2025-03-27T16:45:46.410000 -CVE-2025-27391,0,0,b95192663d5fd0b0d7bf848557c1849c43732cd741b1568c9955afca24c21089,2025-04-09T17:15:32.473000 +CVE-2025-27391,0,1,51ec893078ad96b2765d588201010c9c9109efe11c8b8e02a7e4455cccf4d677,2025-04-09T20:02:41.860000 CVE-2025-27392,0,0,cc38f618c321afe34df80e0445ec795fd7a44f59e46f89b97dcd3422fa99fedc,2025-03-11T10:15:18.203000 CVE-2025-27393,0,0,9aa4954cdfb55771c6329747743598efb01c901ba627d142c3f74e9781c72c00,2025-03-11T10:15:18.367000 CVE-2025-27394,0,0,9ab042095b67e26d5f13118419be8527351f12f98ad54081c1d99788c408220c,2025-03-11T10:15:18.530000 @@ -287127,33 +287138,33 @@ CVE-2025-27441,0,0,e155e14530b453f75d9ce639c083535c2bb462e7677c02675b54cdb7ec5e7 CVE-2025-27442,0,0,590a31d2a85410cb452a92fc071cc7f6866652e66bdb0d80e7251943914c9c3a,2025-04-08T18:13:53.347000 CVE-2025-27443,0,0,7a8323fcf0a74c428934ea50aee57123e3ecf5387592ae2d2dd2c1570929e5e1,2025-04-08T18:13:53.347000 CVE-2025-2746,0,0,71c2d17f9a5c716435e405e404de90f26a63b0f3426fd27a8f85b67d8ccfbefe,2025-03-27T16:45:46.410000 -CVE-2025-27467,0,0,2a73654408d523ad18335daa555958cea5a2bcf7767ea2db76534281e2f4d418,2025-04-08T18:15:56.453000 -CVE-2025-27469,0,0,5601264d2fe4901757f920d4620d82cec568f38fa347f6a6fe97087fd5fc2c11,2025-04-08T18:15:56.613000 +CVE-2025-27467,0,1,0c83d15f349a0c2ee4cd72c18303288b3acc7a4b4d1a795b62e6a6399b0170d9,2025-04-09T20:03:01.577000 +CVE-2025-27469,0,1,bed20682aee07ef1b7310c6dcffff7cc5f1e3058869f1609d535c9a192c72a66,2025-04-09T20:03:01.577000 CVE-2025-2747,0,0,893662fb5676d31ead9a58cd136c261bd2570bf64bfceca741f28b6354fadd24,2025-03-27T16:45:46.410000 -CVE-2025-27470,0,0,ad763281c1b7c9529df4885beea0a52246049a4b25777cbeb9666a7155e8521e,2025-04-08T18:15:56.797000 -CVE-2025-27471,0,0,42689d5823dcf54a4d86e9b5112d313d6dbc537abb64984c089229b5a9d417ec,2025-04-08T18:15:56.970000 -CVE-2025-27472,0,0,921e06f420583ebd6378cf1c02afd7c01d1a736ab0fc410ba88f6f921f870105,2025-04-08T18:15:57.140000 -CVE-2025-27473,0,0,3ccae01fb477d376f5b11275b86172659ab74239026607d55b2bcff2a194b7a7,2025-04-08T18:15:57.290000 -CVE-2025-27474,0,0,2feb2f5bfa0f87f832be3fe8ff6dea419d5d3e2d78d5dd41458d205b9aa18339,2025-04-08T18:15:57.457000 -CVE-2025-27475,0,0,3dd2fed416cf7a495bf91c30ec62387eb3c43ba58244122750051207ff569f24,2025-04-08T18:15:57.620000 -CVE-2025-27476,0,0,5001e058fd1a4857f1168646bc904df7c20adb0cc000afacf0a4b0aa7f3a0886,2025-04-08T18:15:57.777000 -CVE-2025-27477,0,0,b52fada90832e5a7af0b9dc3e633c1dc5bf941efc6f4b013524d949a07370ad1,2025-04-08T18:15:57.947000 -CVE-2025-27478,0,0,5ec924fd4001bc766651eff25fc88f0ead8d28fe204f02137b02f9f02624c09e,2025-04-08T18:15:58.120000 -CVE-2025-27479,0,0,087a58c6a862c5f2eafb4e9a98a6a017dce03c6b7abf3f90fc8bf2774a71afc6,2025-04-08T18:15:58.287000 +CVE-2025-27470,0,1,3800bbe10c96b480c90080e79a37b2229e291f5eb4bce8a97b80e5b13f9a0963,2025-04-09T20:03:01.577000 +CVE-2025-27471,0,1,13072022a547229c3b677139d51e391ce1b949ccd931da8e4b15e19e9c7c970a,2025-04-09T20:03:01.577000 +CVE-2025-27472,0,1,d559df44c44a28ba90971f35753e49e8f7a519082e101f64fcc43c66453a1da0,2025-04-09T20:03:01.577000 +CVE-2025-27473,0,1,42f9462fe686194aca78a5852ebded71702545e7a0d8673a5d185bdb28af5dc4,2025-04-09T20:03:01.577000 +CVE-2025-27474,0,1,2833f6b89f965b4bcd9da5e49fe97abc2b431bf0e9a6e40d5561ec37f340b5d6,2025-04-09T20:03:01.577000 +CVE-2025-27475,0,1,d16ede5877fb26d619fea7813bc64130a43e57631002878595ca841636a1f17e,2025-04-09T20:03:01.577000 +CVE-2025-27476,0,1,454068016f0873c4cca41e8b5d04e83044924845cc514c34594f75338e99d436,2025-04-09T20:03:01.577000 +CVE-2025-27477,0,1,70c26b14c509efa3136635d966613a0d21a26c7dc40726fd73ab6c80f40b7e57,2025-04-09T20:03:01.577000 +CVE-2025-27478,0,1,e58f71fa57a5c99eaa6fe567f305e37a93cf63b8ca60b0c8f3482cb2647528ab,2025-04-09T20:03:01.577000 +CVE-2025-27479,0,1,3e6e52ce7e3d7c72cca1e8ac895770374d39acfa95f8e568191933f853eef11f,2025-04-09T20:03:01.577000 CVE-2025-2748,0,0,ebc7389a6b5f06bc936b869752f476de54bd76de60953f756ced1aea5c0e21b8,2025-03-27T16:45:46.410000 -CVE-2025-27480,0,0,90580f72d2378728bf83ee70ac86b198aa3604afa9e8c8ea5616b7953ecdd4c5,2025-04-08T18:15:58.447000 -CVE-2025-27481,0,0,d596ca48c2334b25f555332fd64880b088a4adf431f54d8cab6632bb521da0b0,2025-04-08T18:15:58.610000 -CVE-2025-27482,0,0,739d080455c3a462d5baf47ae8236dc008239608ebea6d02b0c6722d380f5182,2025-04-08T18:15:58.773000 -CVE-2025-27483,0,0,fe73ed6ac064d4488634177b0a8616d779c008b50c412253a581a94b7f16f004,2025-04-08T18:15:58.943000 -CVE-2025-27484,0,0,3a80d2a1d5161a540575a437e28454adfd44eab70917c07b50c3071d01caed82,2025-04-08T18:15:59.130000 -CVE-2025-27485,0,0,bbfe4db28a59b0f2426e10b85ea7eccf84679acbe8d55b776209b95f362a8b76,2025-04-08T18:15:59.300000 -CVE-2025-27486,0,0,3e7b6f4d737c20531961341ab324f2f29f75fc8caf8154a15c8243925de48bf5,2025-04-08T18:15:59.450000 -CVE-2025-27487,0,0,8ae780b917635121025c48e5feb92f05a7288b3c0a0fb52f61a73e03d5577c57,2025-04-08T18:15:59.620000 -CVE-2025-27489,0,0,b5dfb4b91b6c63809b4c94c94adb5b3649ac1ce7c2ecbd124b54f3370b0d5bf8,2025-04-08T18:15:59.787000 +CVE-2025-27480,0,1,3093c5335e72e9e4458eb72ac17c60113d2e73a474a683fea8d7c7ebec2fc321,2025-04-09T20:03:01.577000 +CVE-2025-27481,0,1,ab40f24b2abf208c093f5ed2bc53497fa191d7740eb13343ef2311459f137934,2025-04-09T20:03:01.577000 +CVE-2025-27482,0,1,eeadc8f44d6900c1c196e62ed08751291bde337d7b628582bfb1c86d07f701f1,2025-04-09T20:03:01.577000 +CVE-2025-27483,0,1,445caf10e469d992e30a4241855f5d7061296494b9c30a9352a2bccdd5a4c604,2025-04-09T20:03:01.577000 +CVE-2025-27484,0,1,b254e6a442655570c8fde991a4de00a7961c5fcb6dd3c4c1136d72ccb6665198,2025-04-09T20:03:01.577000 +CVE-2025-27485,0,1,044826a19f762371123a08406ad54036aaf892c48732a1963bfbde0681d9a976,2025-04-09T20:03:01.577000 +CVE-2025-27486,0,1,1263aa156e67c1d79b6e587e7524ab2caf3a3397b80cc47b927307575fecf665,2025-04-09T20:03:01.577000 +CVE-2025-27487,0,1,d83e11e05698db1fe4d133b74a1e7fdc677087eeb3e9c79dbd527cbddf59f368,2025-04-09T20:03:01.577000 +CVE-2025-27489,0,1,28dda0e4c6352bd72172506c3087a8017f1e9fba98fa4abf48f4b96de0376b08,2025-04-09T20:03:01.577000 CVE-2025-2749,0,0,d5c23d9cde9d80aa1fbed3bbb517b5bdbcccd79985234132ec9559d4ffa36ca1,2025-03-27T16:45:46.410000 -CVE-2025-27490,0,0,6db348c123dee972b3f72cd50e502cb86dce74f9b9605e620eca35e222c86d70,2025-04-08T18:15:59.953000 -CVE-2025-27491,0,0,a45e6c43bf22e9a1e5b8ec4814b14e81b13d1b147ffb40819d94be19381cd4a9,2025-04-08T18:16:00.140000 -CVE-2025-27492,0,0,3de17d8a5ec858f32a34415779040b6fbabff2f731a830fad5b3c88880310f85,2025-04-08T18:16:00.313000 +CVE-2025-27490,0,1,c9b6c6781302f2a316899f9d8c404e7c1e1a420eb4491862c0d80f8cb89106fe,2025-04-09T20:03:01.577000 +CVE-2025-27491,0,1,42207f08b9f43730a3ba68d7245ccb1e519073a6528b5235828ca72f52b41fb2,2025-04-09T20:03:01.577000 +CVE-2025-27492,0,1,cedcb022f666c23b919557da854f2a160b90ab6b67af51845d3774e6e383059b,2025-04-09T20:03:01.577000 CVE-2025-27493,0,0,5ed706f73f968eaed2a73fc0af7fc79cff24d7e3704ee418b1a94e6ee4caf2fe,2025-03-11T10:15:19.577000 CVE-2025-27494,0,0,629ff8926515d0723828ad76be68973f23d7843531167cb70ca06bf9d4ea120e,2025-03-11T10:15:19.783000 CVE-2025-27496,0,0,ccff5911af72635aa70d4fd8c0ad1b78ee109057412ec57494c2c4bd15ca4a0a,2025-03-13T19:15:52.050000 @@ -287284,33 +287295,33 @@ CVE-2025-27705,0,0,c5ff1aec7cfc8542770275a002f6e0d41571adb88f3dd40ea1ae12b57d47c CVE-2025-27715,0,0,3945a29c5f5d17f328e68afe21b406dfe2951d48ca4e13bc184b7c24d7c6efed,2025-03-27T15:01:03.360000 CVE-2025-27716,0,0,684e5dfa71a2b1140f79e97b358f07ed099609c7dc59a57e04c089cfb53857e0,2025-03-28T18:11:40.180000 CVE-2025-27718,0,0,4ae0e44d09876a5600bf40aeaeaa3445f632ff2369ef793f3100dbaf36c9c477,2025-03-28T18:11:40.180000 -CVE-2025-27722,0,0,4ef8041348e8ca5b7cef1ec579e2f6bed79d95151d947f1a9f0d2e3b818ebb39,2025-04-09T09:15:16.790000 +CVE-2025-27722,0,1,f6643ccc8a22899781482acbc064cbbf83bedfd8a0b28b0db307e860db0ae57e,2025-04-09T20:02:41.860000 CVE-2025-27726,0,0,8759c60319914b023e036c6f48a1b79eaac43e1e5a04e8c34d49c277a3332a2f,2025-03-28T18:11:40.180000 -CVE-2025-27727,0,0,d11ab7e43bf1bc90f2046ee7431eb803cf5f59a9e7485289df84f009d0ae4f5e,2025-04-08T18:16:00.477000 -CVE-2025-27728,0,0,8d8c0c0fda0f3e0bdc89b0940a872a746dfd56bb0ef5769dd2509d459ee8db2d,2025-04-08T18:16:00.653000 -CVE-2025-27729,0,0,70a328f5552cc2d11d046738553ffe3ff158b6de6f0e805765c659e94a1fdf51,2025-04-08T18:16:00.813000 -CVE-2025-27730,0,0,01cf96b9548f4d456ea2087793d81f599730a337ab688d2abe1b51d0ff1b58eb,2025-04-08T18:16:00.990000 -CVE-2025-27731,0,0,5174853f8c4bde432356f9ceb6972e5aedcf1841137ff2c87894ac0632fc9a8d,2025-04-08T18:16:01.163000 -CVE-2025-27732,0,0,212362c5fe24f76348437b7ab56a2e48a74ca2749b4ae70fdf8257e263b10603,2025-04-08T18:16:01.333000 -CVE-2025-27733,0,0,6dfa069259ed0e0eaf1b09d03ad19b4070ab35ca866efd503af0ba554b856f61,2025-04-08T18:16:01.517000 -CVE-2025-27735,0,0,35ea91096bb5f7cda696b2d73561fb9b085d8a86f81dbb874f595c540e2e165d,2025-04-08T18:16:01.697000 -CVE-2025-27736,0,0,32c9a30b90e36358a416a758b28fc60686102195b49781ef3079299d3379e4e2,2025-04-08T18:16:01.913000 -CVE-2025-27737,0,0,dbf3e595619ed2d24c761ed7c6b49a3636bafa2d5c568ab8cb980afb546ecc92,2025-04-08T18:16:02.097000 -CVE-2025-27738,0,0,3f1818d7d9efef7a27d0939fd25be21df4b6722dd55f81338738aaef253b3992,2025-04-08T18:16:02.280000 -CVE-2025-27739,0,0,4a716f08ced7199a080449bf4476e3505665d83323059b6f0df6d10b31df6f0f,2025-04-08T18:16:02.470000 -CVE-2025-27740,0,0,97a62975a2a2272bbf16d94fedaa6215c6436d9238587707e43244453f43ff15,2025-04-08T18:16:02.653000 -CVE-2025-27741,0,0,56b90e81ec810e85c5fef09120311317df8a110725991ff9c072e7868072b0d4,2025-04-08T18:16:02.833000 -CVE-2025-27742,0,0,0bb2d329c4cc61dfa016e570fdc0ba4c080cf40cd7af66d2f9ffbb49ae63864a,2025-04-08T18:16:03.040000 -CVE-2025-27743,0,0,f8bbe29c88720dbe020ea289286d198ccbdce65dd9def78a750e5d9d0aa6fedd,2025-04-08T18:16:03.260000 -CVE-2025-27744,0,0,dce8e5447f79f3550296e024b50f0dd4f407917e48b66ae88da00a5ed9c08ebd,2025-04-08T18:16:03.497000 -CVE-2025-27745,0,0,e5fbdd2331a4297014bff843f01f214136f0631d707b239b45348eaf00d73b61,2025-04-08T18:16:03.670000 -CVE-2025-27746,0,0,9f22ae375c1d81cdad52525ae9d37af6f221ed6d1b8c7a07677c034138927fec,2025-04-08T18:16:03.877000 -CVE-2025-27747,0,0,6c529adeef63d4260741c758376cf260e4f2f5c87ba396b258ec2a63d87a8ba7,2025-04-08T18:16:04.047000 -CVE-2025-27748,0,0,617afee794df0644b07e0014a928dbc83e62570ee173b50ec928b2085196a054,2025-04-08T18:16:04.213000 -CVE-2025-27749,0,0,4532344b5c02c703b8aa0070eda94695ec8b5a96d75139d5829f79449b7938e5,2025-04-08T18:16:04.370000 -CVE-2025-27750,0,0,df3fc27826f09a10fa0af74ba15f90390f3f39f518f9f03dae88aeba44194ba9,2025-04-08T18:16:04.520000 -CVE-2025-27751,0,0,ea299544869d65b39f562395b78a82f70d554de8b8237e5328263366cc284881,2025-04-08T18:16:04.680000 -CVE-2025-27752,0,0,3e76c863ee825f210f5f87029d2836969a522c0a0509a071a8a6940b63e037a7,2025-04-08T18:16:04.840000 +CVE-2025-27727,0,1,ace0dbfaf7d62ac7114b966d38f259a202ac7d9348cc93b7e5830be1c42d839e,2025-04-09T20:03:01.577000 +CVE-2025-27728,0,1,585d476f3080c8982f04eae65d3c7745d633b97127b70275f888b0823c17edaf,2025-04-09T20:03:01.577000 +CVE-2025-27729,0,1,48c86e51194852cc95bab4f1195e7a1e6a0c40c3f65e09109ba84aa16aa26e5d,2025-04-09T20:03:01.577000 +CVE-2025-27730,0,1,e35156ed20d3fc0e0cb566da7135be514c1aab293f066aeebbd8d332e0407738,2025-04-09T20:03:01.577000 +CVE-2025-27731,0,1,ec6c464a7d6e280cf0255b38b45365cc3d9aa944cc917b5654fa74e9156599ee,2025-04-09T20:03:01.577000 +CVE-2025-27732,0,1,11a4c7424f152e04122a4727dbfc0cc8a454e8b3b05f9bcb3a635b72cd73a93e,2025-04-09T20:03:01.577000 +CVE-2025-27733,0,1,cfae540c4f2210cf8d0c18a49f793db264f2d551ab5f3bbc065d2b6782fce4c3,2025-04-09T20:03:01.577000 +CVE-2025-27735,0,1,804e51d770563f60dff2b5a9d99658f26aa741b1fc549464420d80120b7b211f,2025-04-09T20:03:01.577000 +CVE-2025-27736,0,1,08b706df064ba618da614660397b0a68d5806a0f9a7d511d5f5ef50140c8fac8,2025-04-09T20:03:01.577000 +CVE-2025-27737,0,1,24dde5ed60c2a1f6fdb3652ea338ed6523f7547545e3622835dd811b668a7426,2025-04-09T20:03:01.577000 +CVE-2025-27738,0,1,6a2575f520b6cbeed35d52aa3274dd734c9323de6d21664915c30ed4d33bafe9,2025-04-09T20:03:01.577000 +CVE-2025-27739,0,1,c7188cd4f761d2658b6bc7984a8f4fc5088ec3c350c66fb4deab595a8e3d0dfb,2025-04-09T20:03:01.577000 +CVE-2025-27740,0,1,02943d50518cac06f3d2fc3aa3158726a277bbc175a207c510a45edb000c093a,2025-04-09T20:03:01.577000 +CVE-2025-27741,0,1,572272ddee1a66cc15a35c91d7f0f1c758fa616f08526965258c6e01bc9e3ff5,2025-04-09T20:03:01.577000 +CVE-2025-27742,0,1,3546a40b0303f6ae01700fe7e6162aa3ad7d368b43afefb224c08f69771c687c,2025-04-09T20:03:01.577000 +CVE-2025-27743,0,1,bde72064051c30b9a8fc324440ed5b5a7288d247bb00e0a72fc2fbedb20bc74f,2025-04-09T20:03:01.577000 +CVE-2025-27744,0,1,c0d800b51d30bb77fa8a69f483920d468590b52dab2ac1044694dd2bbad504ed,2025-04-09T20:03:01.577000 +CVE-2025-27745,0,1,6c364298b8ce8f9113300768337f972bf6271badc066cfd4788660c4df54885a,2025-04-09T20:03:01.577000 +CVE-2025-27746,0,1,b9bee07400f95ebf8d10a6fe37ac7b15a6a78af87587c8f2f97b5a43a4d4cb3a,2025-04-09T20:03:01.577000 +CVE-2025-27747,0,1,0b54b314f11717c4d2edee26e0bebad5bf5b332642fa007df40dc6d089c29de7,2025-04-09T20:03:01.577000 +CVE-2025-27748,0,1,2aa5bd2e97e6679a3fba120a205f07720278ea0490a28f8a3ddfdf27463f1388,2025-04-09T20:03:01.577000 +CVE-2025-27749,0,1,0b66f1f59807398c83df795a02ec71d7f90b989f8e97c6b5ab6ac9e2c35a99c0,2025-04-09T20:03:01.577000 +CVE-2025-27750,0,1,f1aae0b9f191d0206deeba49225f0b8139aef52c5ef86aff3d0a42beb2f30b1c,2025-04-09T20:03:01.577000 +CVE-2025-27751,0,1,2134faa003dffdf0732dfb21c4bc5f4bd3d91ad5f36962dea9bb8e272e325da5,2025-04-09T20:03:01.577000 +CVE-2025-27752,0,1,caa7d9d6d256f91e7ce8fd497e33c49528b8bcac73a88fb0620f199dd18fdfd6,2025-04-09T20:03:01.577000 CVE-2025-27760,0,0,0fe214e27ee00978be2b2db20453752d3c587e2a097907bcd7b6f52eec4fd67b,2025-03-17T23:15:17.740000 CVE-2025-27761,0,0,ccacd385546f9e849c6762c7104b07eacb4ee137232b68db7722ae4c039dd182,2025-03-17T23:15:17.807000 CVE-2025-27762,0,0,2807d546b38a9bbaac57f4b35c24d7978c6bb44d3e22ed6d6636bd10822c6fbe,2025-03-17T23:15:17.863000 @@ -287343,7 +287354,7 @@ CVE-2025-27793,0,0,8ae5ea10e12dcadd7fbe7d01abf4cd47c8df86334043c5ca8ff67abda3373 CVE-2025-27794,0,0,29af72e657ff2464b2a2937c7c4f1f9dbae6fd8fd9c8cc38aa28016fcbce1e25,2025-04-02T12:33:56.437000 CVE-2025-27795,0,0,4ff7b2f77f376cfe6fd93166198dd47ff9402055417a29c3c719e8e028d2917b,2025-03-07T16:15:40.187000 CVE-2025-27796,0,0,896c9fe3f771a2fa3519e20ae6313b458be8f4415e50a669613e7a3928ce34c1,2025-03-07T22:15:37.813000 -CVE-2025-27797,0,0,81cb9b0dc2899bdbac54bc40fed032917bcaeb9f4fd0c500056980429d8dce0c,2025-04-09T09:15:16.977000 +CVE-2025-27797,0,1,9a60543973f63e25f94999edfa3d615a1a0fe385d1f0b28469238539eafe3d42,2025-04-09T20:02:41.860000 CVE-2025-2780,0,0,8ce61193bdd5d01c360c9dde19d31cb5df8ec0c3ce67c7effda6feb1168c2491,2025-04-07T14:18:15.560000 CVE-2025-27809,0,0,acf17088263ac0454f3c19e9b5b69eee2adc10f0e02e48930b8a575ccd37ca6c,2025-03-27T16:45:46.410000 CVE-2025-2781,0,0,f71242cf9553514cc2ec12a96aa1195882b54360169109a0233e1040d7956dda,2025-04-01T20:26:30.593000 @@ -287368,7 +287379,7 @@ CVE-2025-27837,0,0,198388712cbc69d26c62c3d088f09d0e18143dea1a79e5577fb06110d422e CVE-2025-27839,0,0,2897e6016e5e328d150ac9e956e1e3698f33d754fabb81cbdb31c6766dbfb22d,2025-03-08T00:15:38.340000 CVE-2025-2784,0,0,97618b3e9443cab465a94158f3b449b9e62a13b4819b3cf85ddbf0959d2de437,2025-04-07T14:18:34.453000 CVE-2025-27840,0,0,4f077c11cd42874f9ea8d03fc4b2dba1a597eef072d62ce316763a23259bd33d,2025-03-12T14:58:54.130000 -CVE-2025-2786,0,0,c5e8b76a681b9d71929b5a590a805fc5d2deb5979544c619801dad6bbdc020e3,2025-04-04T14:15:22.113000 +CVE-2025-2786,0,1,e956eb7658768af7a71ab8b6f13dbc2bb5f58d8f62cbc9c5c71f0b357f132e17,2025-04-09T21:16:25.720000 CVE-2025-27867,0,0,706ccc11683336c438698de97765a7b785ce156810f1f1b352bcbe344a4419e0,2025-03-21T21:15:36.910000 CVE-2025-2787,0,0,4aa889cfcc070b06e1753e76a9737fc448b22e64e5347c5b1fb406395a105243,2025-03-31T07:15:18.557000 CVE-2025-27888,0,0,8a8aa5b91d5bfb492ad148fbb9efc0a6effab4f3d802fb1b2e446246bda2ee28,2025-03-20T12:15:14.563000 @@ -287385,7 +287396,7 @@ CVE-2025-27925,0,0,20d248e60598e5f95d1fae0ce2e564e286fc723b6dc1ad95ef277e933ed7c CVE-2025-27926,0,0,55eb57ada8c72239b09d3012ac06f54ef846ef608760d35a348131200e00a4d9,2025-03-10T23:15:35.670000 CVE-2025-27932,0,0,036d05ff385938ab4080533cb14ce5447e7754455506217e340766b3e6cee90a,2025-03-28T18:11:40.180000 CVE-2025-27933,0,0,93368137a33aa362057a4035ec036f1aedaefb3c8486745a8d93918e46a37c4e,2025-03-27T14:55:25.660000 -CVE-2025-27934,0,0,7ca9851eb02ddd82fdf46dcfbadc927135695655ff696b4593963c9dc78dc3c8,2025-04-09T09:15:17.153000 +CVE-2025-27934,0,1,95b3d1b020dd3defb4f0c3dbb03f408c8cd96475518f9b12ef782500b5b25703,2025-04-09T20:02:41.860000 CVE-2025-2794,0,0,1a96a5e4fced0b738085ab3d0bfc6f597f8a7a2553b0aa413b0b61c07815e82e,2025-04-01T20:26:22.890000 CVE-2025-2797,0,0,b1486c99f88bb0fe24ee44879fb68daede55b0ca436e040e01e9162820f0ca7f,2025-04-07T14:18:15.560000 CVE-2025-2798,0,0,ce50f1abf598f0e20dbb0b231565f286c9fd88d139aecf5e428c88b471d2c0d4,2025-04-07T14:18:15.560000 @@ -287438,14 +287449,14 @@ CVE-2025-28402,0,0,13867008c4fe852d96ebad3efcb46b179c76147593a963558f92ad5c35abd CVE-2025-28403,0,0,49fd630fb796b29f7daf35148d91df125dffe9524404bb29b622cbe7833f21f2,2025-04-09T16:48:22.640000 CVE-2025-28405,0,0,4cc4df86c3ede286aaed4c289fb650d032c68e0427f277d96899c3d898a2bc35,2025-04-09T16:41:21.567000 CVE-2025-28406,0,0,8a8584932ab9b30901f733e1b8a8a21e4c7b2fc672972e9d10fc1d5750215663,2025-04-09T16:32:43.710000 -CVE-2025-28407,0,1,02ff9b99320c3233f5b0003257d084563bbb73ef199de05918def25b69139a43,2025-04-09T19:00:44.523000 -CVE-2025-28408,0,1,556d1da5e4b09370d02f117a4f9eb27e5e37ca05d1c933d6571d5048adb4a027,2025-04-09T19:00:22.650000 -CVE-2025-28409,0,1,1d13bbbd37d815fb6acbd49cc553af3b39f1a6a7d080c3d5a8369d4d6c155c19,2025-04-09T18:59:55.370000 -CVE-2025-28410,0,1,390a852160bddcf2c156cf274d0d8bca8a6721ecd4d3570b30e72c83c7674ba1,2025-04-09T18:53:55.197000 -CVE-2025-28411,0,1,e9415e3b22995161cfbee07866f540247a4fae9e1d653d56761cfbbc552cd7ef,2025-04-09T18:45:40.463000 -CVE-2025-28412,0,1,e6e051343f3112a9d08b359070fea94cc6ed8af3cfe5b527f4eba28e476b3165,2025-04-09T18:41:48.533000 +CVE-2025-28407,0,0,02ff9b99320c3233f5b0003257d084563bbb73ef199de05918def25b69139a43,2025-04-09T19:00:44.523000 +CVE-2025-28408,0,0,556d1da5e4b09370d02f117a4f9eb27e5e37ca05d1c933d6571d5048adb4a027,2025-04-09T19:00:22.650000 +CVE-2025-28409,0,0,1d13bbbd37d815fb6acbd49cc553af3b39f1a6a7d080c3d5a8369d4d6c155c19,2025-04-09T18:59:55.370000 +CVE-2025-28410,0,0,390a852160bddcf2c156cf274d0d8bca8a6721ecd4d3570b30e72c83c7674ba1,2025-04-09T18:53:55.197000 +CVE-2025-28411,0,0,e9415e3b22995161cfbee07866f540247a4fae9e1d653d56761cfbbc552cd7ef,2025-04-09T18:45:40.463000 +CVE-2025-28412,0,0,e6e051343f3112a9d08b359070fea94cc6ed8af3cfe5b527f4eba28e476b3165,2025-04-09T18:41:48.533000 CVE-2025-28413,0,0,d11263870992ba692dde5c0e122e50a5c126b959967883bcfc8c0750961a0543,2025-04-09T14:58:14.340000 -CVE-2025-2842,0,0,47b6fed0afeb8764a2eae2f8cabf83dc45e6430c2005f12d42ece8f2faf4ea8d,2025-04-04T14:15:22.517000 +CVE-2025-2842,0,1,a913d80de53a4799cf4e6ca201e054ddb695ae4a80f4431e9fbf4b1a5a6395b3,2025-04-09T21:16:25.913000 CVE-2025-2846,0,0,3b5287c806e8bc80973f9baaf0ea026d933f9fa8ff940c7a3667c18ec778e524,2025-03-27T16:45:12.210000 CVE-2025-2847,0,0,432b048d8c8afdfd4c92ac64bc4ec034bc3baee4250e2624e5d27f22cf3fe391,2025-03-27T16:45:12.210000 CVE-2025-2849,0,0,aab8d1f56c075f21b703da5aa19a56b01d2820e429e86a8a01410d01a8185f9f,2025-03-27T16:45:12.210000 @@ -287567,6 +287578,7 @@ CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630 CVE-2025-28942,0,0,13661206a69e4d0b8a31139510417b818a8d6f6daa40fe60ee4e3d972c089172,2025-03-27T16:45:27.850000 CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000 CVE-2025-2901,0,0,7f4abd4b51c8613b496d04d0a5b67ccb34d26f5a58b067bb99bc921fba34ee98,2025-03-28T18:11:40.180000 +CVE-2025-29018,1,1,535d021f5fcdc8ac1fc3b2f609bce7f88c97fe96da3d958a5c6918ca744938fb,2025-04-09T21:16:25.540000 CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000 CVE-2025-29030,0,0,5c6a6bbb988d8463666139df5df874e45be8a953aa025e17f70aff541e298642,2025-03-19T19:15:47.790000 CVE-2025-29031,0,0,fc79f4214f85e8c2dc7f22a3d332d338110c9a0fc6645f125dc5ea2077bdeb39,2025-03-19T19:15:47.940000 @@ -287600,7 +287612,7 @@ CVE-2025-29149,0,0,2b30e3ef51abdd15292670ac51eb247a8a581b78085e4a43217ece3a22f27 CVE-2025-2915,0,0,85187e8b22aed42e9eeb1f1a363effb36eaf1a6d3cd252ac65b41686ac04666d,2025-03-28T18:15:17.060000 CVE-2025-2916,0,0,cf1101aece002c9c9f91d9db56eaf563d3f482cee7c458ce96f61775c54ea0ee,2025-03-28T18:11:40.180000 CVE-2025-2917,0,0,55492aad4b6e7cdb22d01e440ebe8377428ade117453b37726a2766dfd44fecc,2025-04-01T20:26:39.627000 -CVE-2025-29189,0,0,f5458f07ac8db0f3893e68130f7f3f6b257c859f1e8785c95c261bd8982184c5,2025-04-09T15:16:02.413000 +CVE-2025-29189,0,1,4c6e3a6a45d675b4010e9a1fa1370550525367f0bf3381d5f2c0bd1dd2174fa2,2025-04-09T20:02:41.860000 CVE-2025-2919,0,0,2ad34c98db4fa64ce17b50938b1437b50b851a1ccb3e30c466fb3925eab3e24f,2025-04-01T20:26:39.627000 CVE-2025-2920,0,0,2401864f099a711f30f8b2d38398a72d7195f85541e7f19ba35b8b1ff663c52a,2025-04-01T20:26:39.627000 CVE-2025-29208,0,0,dc693cfefea6bff79128010797c3b39bb99de0fca3a06b4d042b58dfd00764b0,2025-04-01T20:26:01.990000 @@ -287642,10 +287654,10 @@ CVE-2025-29384,0,0,14456271181d2a6b38eac63454e7d903bdeae2563e5fc51ec6c8692dd53ec CVE-2025-29385,0,0,f60ee6091bef3db2d6081e2edd6e0a4a37d7ecd5c70fcec7c258e2d44478f256,2025-03-19T19:15:49.280000 CVE-2025-29386,0,0,f142ce16dea374d9a9926fc7db0f8c42e7cb63baff73e2c1cd84f28fd5ff529e,2025-03-19T19:15:49.423000 CVE-2025-29387,0,0,b884feacdec450fec77e09de60b95a7b9adedf54ff8f4d0b7df747bf1bec2f45,2025-03-17T19:51:04.180000 -CVE-2025-29389,0,1,406efe7c356dbb86efc6995b764e1f0db37a31ea727ccc8976a27ab8f57c97cb,2025-04-09T19:15:47.870000 -CVE-2025-29390,0,1,6edb3d662397178e48ca0dc47de4510386d4f3ebe3d554d9eab99aad9e160abe,2025-04-09T19:15:48.013000 -CVE-2025-29391,0,1,836806e69e1970dde4303c7b23434fdc00e20e3942b433093c817535770a5bcb,2025-04-09T19:15:48.160000 -CVE-2025-29394,0,0,7ea1a26f18f1ef67e476b8cdda347b8b4e5a573c34a6041ee3c44ffdb6bdcc25,2025-04-09T16:15:24.523000 +CVE-2025-29389,0,1,88283a2b56ae439341fd2624e0fbb13adf07edc309d4c00a31b0ff58955cda4e,2025-04-09T20:02:41.860000 +CVE-2025-29390,0,1,b027115ae3c7b2da63f26890927e10c5d1f1101a17ea7a186d96d5e7a094c1ad,2025-04-09T20:02:41.860000 +CVE-2025-29391,0,1,8fee2cedf1e33999d2fd0eb01d75cd44397e35b050ceae03c2491e48902d817b,2025-04-09T20:02:41.860000 +CVE-2025-29394,0,1,37d5d23a9ed0c1b54730ba12303da3978e4f73005d07218e4414411594476735,2025-04-09T20:02:41.860000 CVE-2025-29401,0,0,58e28d32bb8e9d05a099b3459d8a1f2140d9f050ebab60871b5c42621e6014f9,2025-03-25T16:15:25.543000 CVE-2025-29405,0,0,b0b5dc47fefba80ac6689c1790abcddffbf12cf547b54f457820a149edabea55,2025-03-24T15:15:16.377000 CVE-2025-2941,0,0,2a30ba06bce9faeb159e65a42eddbce7a23fc7e73f8564bd02faf3032a157758,2025-04-07T14:17:50.220000 @@ -287739,41 +287751,41 @@ CVE-2025-29788,0,0,864c3c65f52e851c38fc6d391e926f348d1c70745c997c79fa8abde39ce5b CVE-2025-29789,0,0,55e4fc65897de45b10ba90aa15c5781d247cfaecd047ac1420d07ded7251482a,2025-03-27T16:45:46.410000 CVE-2025-2979,0,0,70faf91b6346859b7f0d1497bcf6eeac537ef02b632bd23b2e0e2ae37255bb13,2025-04-01T20:26:30.593000 CVE-2025-29790,0,0,a917e7f845d5526a877724b56a3ae7cbb2c47c308a32a65b6f3b54e65b4f8c98,2025-03-18T19:15:50.813000 -CVE-2025-29791,0,0,46e27449517fc1cf3ebd2021a08915947b602d3bc15ab63834bbe4b7b843c139,2025-04-08T18:16:05.003000 -CVE-2025-29792,0,0,7b81b68a417245b340a2a1de25df2ef70f16bda3d6c86774cbf179469fbf2a9d,2025-04-08T18:16:05.160000 -CVE-2025-29793,0,0,039925f1f08b8682dedd873d4cc11cac80bae08e16a6d4e325aee7b03e1c10a9,2025-04-08T18:16:05.320000 -CVE-2025-29794,0,0,527b4faf6928da5c73eaf2941656f4cd3912cf38388ec2d748623ed241f4f6c9,2025-04-08T18:16:05.467000 +CVE-2025-29791,0,1,683ef8de01f05239c3d69b63b73b45a656d8e4ac525540cae7adb4738586b190,2025-04-09T20:03:01.577000 +CVE-2025-29792,0,1,e1fefa30e127be13c0e170e6c713c0c0e639cb245913f2cca3c9966212ef5840,2025-04-09T20:03:01.577000 +CVE-2025-29793,0,1,5d4a493481424c6f05b63ca9133c70ab30274c0864f01d1edfcf15463f6ab7cb,2025-04-09T20:03:01.577000 +CVE-2025-29794,0,1,8d49d2642cb6d78650474b9bd88867e2757b928c706e4e51509a78bb37013142,2025-04-09T20:03:01.577000 CVE-2025-29795,0,0,6628c110a8ddfa1ddc624b3c8e04a9da92178a53d5d396807fa8edc11e306135,2025-03-23T17:15:28.920000 CVE-2025-29796,0,0,538594e52732519762324916fba3aaf079adb6c21d546750de86e44f00d4c82d,2025-04-07T14:18:34.453000 CVE-2025-2980,0,0,e90bea9fa0869a16071d3d0a033a2bb76e259b349a9a0bf9fb845593fb53ed2d,2025-04-01T20:26:30.593000 -CVE-2025-29800,0,0,b92879c7c36cae5a411523784939f14947788da8f6e75cdd51ca933bd587930a,2025-04-08T18:16:05.680000 -CVE-2025-29801,0,0,5c993ad62fa5e401e014ada450d2bd61d11f28804e6c1837ab0d4954ef85408e,2025-04-08T18:16:05.840000 -CVE-2025-29802,0,0,cbee3330fa596ad119069908cdcf7927dabe5f7c6434e232c443e6271bdfcb11,2025-04-08T18:16:06.017000 -CVE-2025-29804,0,0,aaa73ce03ab20693e9c00a19545c2630fe680f1627235e0eb85006b7381805b6,2025-04-08T18:16:06.180000 -CVE-2025-29805,0,0,04799c3a0801cc42f49ea852f54387c42defa969f17576ae35c2dc8aa00344a1,2025-04-08T18:16:06.330000 +CVE-2025-29800,0,1,aa88ac334e3cd604c62f77dfd84972dee93997f0496d3c9899d6b123738b9e7c,2025-04-09T20:03:01.577000 +CVE-2025-29801,0,1,f30e3573fbc30d148919af02cba137f289819a51d5b9eee78416badb077c0363,2025-04-09T20:03:01.577000 +CVE-2025-29802,0,1,46c6a557868779b154ff9aed262faa8bb2e5f5d0c5c9b86e54991fc1f06a6f56,2025-04-09T20:03:01.577000 +CVE-2025-29804,0,1,ca1cad07e08ecaedeb2eafb47c36614038147850e0b096fd73a494ee2f654c18,2025-04-09T20:03:01.577000 +CVE-2025-29805,0,1,7845e0d29cd139c610706039b774486523ec11a7a3670f5f227cb58b14d3c44a,2025-04-09T20:03:01.577000 CVE-2025-29806,0,0,dde4af49c411f184b167c313d22e18033ab4a12ed1db72bb3f1109ada8823750,2025-04-02T14:16:10.870000 CVE-2025-29807,0,0,530d9f651149a8b635edd48694d649666884c8d7e97fd101d5bd23cb34763719,2025-03-21T01:15:17.070000 -CVE-2025-29808,0,0,c893be1a058d01204cd15782ed2cacaf8292d0f790d97734359983a7aa754a82,2025-04-08T18:16:06.483000 -CVE-2025-29809,0,0,1a1c77b05d4b643a725ffaa66f55665c6e333b58527c1210319574edf5e9f289,2025-04-08T18:16:06.633000 +CVE-2025-29808,0,1,ca4e2887a6e3cc19fabfbd90706a9f8430f5e425fa3ececb0b65e3c7d47b4b42,2025-04-09T20:03:01.577000 +CVE-2025-29809,0,1,ba293b5a5e3d05f4df5ddc4d7ed1a9e8766ae31100926c57e9eb9d2069d7e361,2025-04-09T20:03:01.577000 CVE-2025-2981,0,0,e1592099f2c8ea306adfab1774d65aad5b1081bf2f727bd1f3845471e7bfa07c,2025-04-01T20:26:30.593000 -CVE-2025-29810,0,0,e034ccf922cd1c0cbca04f5fc340ef9404778c8e95c3a5f1ae5d9b5485464e1d,2025-04-08T18:16:06.797000 -CVE-2025-29811,0,0,32d05551a1c5a0bcd20545633b7d4cda9e3dcdb837f14d1b69f0add08a6fe76e,2025-04-08T18:16:06.977000 -CVE-2025-29812,0,0,467346a422adca94ac7668c56cc281905f7e9dc36f3294829049ffd962815145,2025-04-08T18:16:07.160000 +CVE-2025-29810,0,1,c6ce8d5a3714790ac34fade83576e2d7ca8388f61a029056e351b631eb2d4f92,2025-04-09T20:03:01.577000 +CVE-2025-29811,0,1,ca68711f7db7aa265bf18270a0a7a9e56e95ff98c6ea9a12f5a931ccf43ec055,2025-04-09T20:03:01.577000 +CVE-2025-29812,0,1,5f5315af1327d52cbeaa2b595b26bee5d15120c0fc5e1d6a5682623e7d46f575,2025-04-09T20:03:01.577000 CVE-2025-29814,0,0,435e9e17285030a77811f9738adb8ece14bf52c5a294fba746e389024996a262,2025-03-21T01:15:17.253000 CVE-2025-29815,0,0,1f4f3e8e153f17fdbb8262dd7f05d4fe97a5b776e03d0624e95ae0ccca656378,2025-04-07T14:18:34.453000 -CVE-2025-29816,0,0,385fd79ec565d6ccadd06323ba4e5e4a4855c1e765f70fd1d1ac3fb92f0051c6,2025-04-08T18:16:07.370000 -CVE-2025-29819,0,0,bd12a6dc1911b5fbf13d001b2cdba3dde95269b1ee73fe55f136044dfe877dd5,2025-04-08T18:16:07.520000 +CVE-2025-29816,0,1,0f28f4d6b062144521da93fd52e293f6ac7b0bce3b6ac97d2d45ee7d8437fc19,2025-04-09T20:03:01.577000 +CVE-2025-29819,0,1,13c5154fc859eb7884684c717d992e6b1620b6ae7f0942d5cfe5931b09754396,2025-04-09T20:03:01.577000 CVE-2025-2982,0,0,18147376cbfa81f921d40bd8f9b57eee8ed0932c2ab1d6080b91a0ef0abe19e2,2025-04-01T20:26:30.593000 -CVE-2025-29820,0,0,5ec35bd28369b6d2af9ededa8a0586b1486817ad0d8b01ea1a57c8df40b8a7f3,2025-04-08T18:16:07.683000 -CVE-2025-29821,0,0,818f2003c1963f20193cbbb651e0f410896b2eb352e8f13708858a02b44cce06,2025-04-08T18:16:07.867000 -CVE-2025-29822,0,0,91e33900f6f7da8c44a0d791a221b0849b45167ef56eb2517e373ca988d85590,2025-04-08T18:16:08.023000 -CVE-2025-29823,0,0,5e70fdb65806e5011cf8e4c2d4a700ec80eab63fde399bc708e3938f7c3d4db1,2025-04-08T18:16:08.190000 -CVE-2025-29824,0,0,5a7f782a2699500cf26ccbcb4f593ffb170c37fa62bf6b0d97cc87d3ac4f9ebf,2025-04-09T01:00:02.927000 +CVE-2025-29820,0,1,ceece2b096c5b57274d87d5eccbf5459776b2e25facea8bd356b4873a294d6fe,2025-04-09T20:03:01.577000 +CVE-2025-29821,0,1,57290d71b86115397faca996957f3a29fa63d3c86cf935b4eb0d6a787a869fac,2025-04-09T20:03:01.577000 +CVE-2025-29822,0,1,4de7dc0240419b00e77efcf43425faa5e15e299e871fbc149227db8670e830f1,2025-04-09T20:03:01.577000 +CVE-2025-29823,0,1,7020e8f361c2e1051ff80b6673ee2bc8c14b1552e575c216beb796659e5526c1,2025-04-09T20:03:01.577000 +CVE-2025-29824,0,1,25a39a55afb2d87a1c24985016d75b5b5610ad96acb368fc7162e19f1d12bda8,2025-04-09T20:03:01.577000 CVE-2025-2983,0,0,efeaa991885da11a1c8124e07f7de31c07c78c44b0bef43fd1faec4e54149319,2025-04-01T20:26:30.593000 CVE-2025-2984,0,0,3f4e6cd5cc63eeb9ae67002e32115346660333feb5923743bc7019b2dd2d5767,2025-04-01T20:26:30.593000 CVE-2025-2985,0,0,a3543a73ce62ad86efa1e3373d8316301a2f3bab41174741e4e7d45e59a2160e,2025-04-01T20:26:30.593000 CVE-2025-29868,0,0,b549bea27689f8ec31d97608d045e5258e6e40661fe0e205d7dadbdc0eb69eae,2025-04-02T22:15:19.670000 -CVE-2025-29870,0,0,f7a812a80d6dad15496c7280771385ab60e843cdf2e9dc000c02ee1fcfc0b656,2025-04-09T09:15:17.347000 +CVE-2025-29870,0,1,94e3b8ab8d7fbdb6f03f28530f0ba477688ec414baa8650bbb887d85a3f03a2f,2025-04-09T20:02:41.860000 CVE-2025-2989,0,0,45a6c1ba1e6cd2d5c62dcb10c0528d36d57eceee6f8ab3df2269f6315f9c7634,2025-04-07T14:15:04.880000 CVE-2025-29891,0,0,752eb7db0cd8cf51c6f0df1d0540c6e0a94cdab3ef9ff768e6ace10510ce6968,2025-04-02T20:37:07.073000 CVE-2025-2990,0,0,63b80882efd0082cd3dd0dd95bad15058c1aab581ab83abc6f91191eb5a71efd,2025-04-07T14:14:41.947000 @@ -287811,7 +287823,7 @@ CVE-2025-29982,0,0,23affa7daecc4825576e77403823b6557774b9426b2d4d0f7cba7e9e66506 CVE-2025-29985,0,0,2aeb5a8f8ec35aa18845c0d4af21956a36a7c943d3b098b90b6c6bf8f695e5ce,2025-04-08T18:13:53.347000 CVE-2025-29986,0,0,99c178153f6bbbad7e209292a65a7c4e43cf8706f8ea6bc3168202624c16c250,2025-04-08T18:13:53.347000 CVE-2025-29987,0,0,962644397d15823d289c2ad8de7be5eae2dfe8787c0957eaa9f9d8409e9ed1a4,2025-04-07T14:18:34.453000 -CVE-2025-29988,0,0,55bacafb376b01dc4d16039d43fd7743ecd0a2c985d6dd6d151ce353f48232bd,2025-04-09T03:15:15.737000 +CVE-2025-29988,0,1,fffff8af5716bb267ee4d5abcd24a0f0916ef33883d34ffbf12f21ae885514a4,2025-04-09T20:02:41.860000 CVE-2025-2999,0,0,81444588dd7906e6c8cac51c6c8e57e7e231b44db369bc45695ecb3a2d560ed4,2025-04-01T20:26:22.890000 CVE-2025-29991,0,0,40bf08e0cf4babdcbf62be0cd1c52dbd14323391ac7d7ab9cf689de3abb126a1,2025-04-07T14:18:34.453000 CVE-2025-29993,0,0,5a3aa3d216416e2fe2b892d0a3793dacda985a3191a3f3e25b8b0846fab45986,2025-03-27T16:45:27.850000 @@ -287938,36 +287950,36 @@ CVE-2025-3026,0,0,1ccfc3db3fa998e9ff1cdb0d3328ce5e8b50ad41edf4870aec75e9db46dbd3 CVE-2025-3027,0,0,9355f1632bf438848aed82af6cf484da7a1ad46dac5db96331cc9a677136537c,2025-04-01T20:26:30.593000 CVE-2025-3028,0,0,b4904bcbef402a86d26a68f36c89c0f13bdfe9f0b82a73bc5473d3a54339d650,2025-04-07T13:31:38.947000 CVE-2025-30280,0,0,f3a0fe0b5085fe68096ebf708df029adbd9c722eb332cc6a18adecd63633310b,2025-04-08T18:13:53.347000 -CVE-2025-30281,0,0,b4c863e490b30334c7d8cbf2d494f6ecf7f3785e406c104c38c85dc637acbf0c,2025-04-08T20:15:25.670000 -CVE-2025-30282,0,0,845c513ff18fa34e80b3b2e0ddeb11e1ed7436469efd867cfddf97f1b329b2e0,2025-04-08T20:15:25.820000 -CVE-2025-30284,0,0,87aeefd235ac147ac74132e32e43273217e3796bce41d7a26045d5c71b5b19b8,2025-04-08T20:15:25.980000 -CVE-2025-30285,0,0,5d4fdf2c0a255de6821c6fcffb091d0db9360929607ae619d3c5849e329afb14,2025-04-08T20:15:26.127000 -CVE-2025-30286,0,0,6f15c134909f28b481ba8f90c6595a773271fd7e7caf012d4f55d55f0d0e4ace,2025-04-08T20:15:26.273000 -CVE-2025-30287,0,0,7287edccc12b203df0b1ffbb5be35b73e16b5d24b8912f6afbbdc8153d6c8ae0,2025-04-08T20:15:26.430000 -CVE-2025-30288,0,0,2c1aae633caca86508d87b7220a76055cbed6f43238cdab5c1d531c0c92c4932,2025-04-08T20:15:26.583000 -CVE-2025-30289,0,0,e0dd0f9ce5c8ec06636e7068bd3750587daac6d3b983ea08287a3c4958efd41c,2025-04-08T20:15:26.737000 +CVE-2025-30281,0,1,2dec1c832fffa187130084e6cb83715a38793905c1f714d3b105c90a7c21fef9,2025-04-09T20:02:41.860000 +CVE-2025-30282,0,1,134c9e9371309ef607568f2ab29a5bb556b6d5ea08bd0d11d7351b30c81aa3a4,2025-04-09T20:02:41.860000 +CVE-2025-30284,0,1,efdc875862cd4020f426e186b7051ad0a744a4672e3858c9842b562858198414,2025-04-09T20:02:41.860000 +CVE-2025-30285,0,1,c69aa71c77686b2fb775e161c96dbb81c1d8e0221a26ca569d8fc53737c1c4b7,2025-04-09T20:02:41.860000 +CVE-2025-30286,0,1,227d34a181e790a3bd139bf54adb257bcefb5f8cdf3a4a218d5d78d4967b19a7,2025-04-09T20:02:41.860000 +CVE-2025-30287,0,1,4ab102af63f836feb1ee1361f4f626c74b8bfc1da6a5d613099bf34c7892806e,2025-04-09T20:02:41.860000 +CVE-2025-30288,0,1,fab9d4b6be3f11ddde174ef1c0ba5ea1b5cfe019120fc4f75d0164bbfa3239da,2025-04-09T20:02:41.860000 +CVE-2025-30289,0,1,f03f870fbab21604b7e9c47b051493357e365754f01d12cb8fac9619db593f3f,2025-04-09T20:02:41.860000 CVE-2025-3029,0,0,4233f9fe2c15ae070846afc464376435b2c22dc54bb1ae100ef75b468d792887,2025-04-07T13:31:33.743000 -CVE-2025-30290,0,0,30efd6c5ae3d382c8cfe6ebd53dd1389489eb55b9e03cfb3558a0dffce986fc1,2025-04-08T20:15:26.883000 -CVE-2025-30291,0,0,dfc643fc0875f348c02ce6c45b2be99062ee23fb5f36f41daf253939a0994f0f,2025-04-08T20:15:27.057000 -CVE-2025-30292,0,0,5a11c3b243fd095e42db2b68ba542ad44c7df682d39d72eb8805ba3c95625a0a,2025-04-08T20:15:27.210000 -CVE-2025-30293,0,0,b884229bc92a06fd607293f9791c5ba35f3bb5200cb332f33f704b15e05cb4bc,2025-04-08T20:15:27.363000 -CVE-2025-30294,0,0,82916bdfe17c82dd12193811108396d17ba9c1b1bf4a700fc7b048eec4def875,2025-04-08T20:15:27.527000 -CVE-2025-30295,0,0,2e596017a5b470a392645372c6eea247b5e7fcf0d4d2ca35d8ad663d0795c497,2025-04-08T19:15:49.453000 -CVE-2025-30296,0,0,489e728388c5a71d004d8b69e8b4ec2265bcd8e89df41c99d23b08339a8498a4,2025-04-08T19:15:49.613000 -CVE-2025-30297,0,0,76b18551d702511bf85a39db59e80a090846c80174546afc0c5cad9f6577b6e1,2025-04-08T19:15:49.770000 -CVE-2025-30298,0,0,4df83a322a3d53862c90e7cd17cb2f026916b6250991d240802ce303d2013552,2025-04-08T19:15:49.923000 -CVE-2025-30299,0,0,d3c1ff0fb70362ff45b6777381bdcefef3dd6b3e60f940321a11bf7cf2992466,2025-04-08T19:15:50.083000 +CVE-2025-30290,0,1,c9fbfdf7b09a23e3abdc69e3f9166828f476bf7ab3116d5596fc23559c524311,2025-04-09T20:02:41.860000 +CVE-2025-30291,0,1,549c7c5b5b489dcea9c22b20b069fa41e1e04b9627f1574bbaaed2c9b99d8ed9,2025-04-09T20:02:41.860000 +CVE-2025-30292,0,1,86ef09882910daed67835ac808d17e7dc317d1c9f957e4b07d29c02a8d504f99,2025-04-09T20:02:41.860000 +CVE-2025-30293,0,1,b311e9fe96b82f01487abc0294a5add4e0dd8281c76ff0bee8eac4d09d1c5e68,2025-04-09T20:02:41.860000 +CVE-2025-30294,0,1,1c1d4be9eef830b01998b304e3d2775dbb6c21ca67f52442de7dd9c8e8ed8d76,2025-04-09T20:02:41.860000 +CVE-2025-30295,0,1,a188ddfc47eb598dd56737263809383900b981921ba2f00e3aa3f42e90af135b,2025-04-09T20:03:01.577000 +CVE-2025-30296,0,1,308a4d7327d29fc87aefb528622d2f0877b19f014265f9406c6797ddef39b703,2025-04-09T20:03:01.577000 +CVE-2025-30297,0,1,e32598748ecba02394ff44c3ab139095d99b6dc2347b80a72f34ec2178d059c3,2025-04-09T20:03:01.577000 +CVE-2025-30298,0,1,97f7340125af17b85197ce2b77db3fa5590e55c3b6f6256a222f923e43913447,2025-04-09T20:02:41.860000 +CVE-2025-30299,0,1,60f37c0316d959d8e55a0ca62e3a0ebaa27ecdb1cb1dfb2fa582f1a397b3be7d,2025-04-09T20:02:41.860000 CVE-2025-3030,0,0,6c5a3267936101701b471cc1e9319d0624c399611df44e115f8b7cc82dfb076c,2025-04-07T13:31:26.793000 -CVE-2025-30300,0,0,505b4c383bfe9d4f061c60b9a0fcd97858fc02ebc48748f222fcc60b2e44a2df,2025-04-08T19:15:50.240000 -CVE-2025-30301,0,0,4d466a322fb152bc49c42f1f4714f93dacca4d7f8bafdac4e5fd268728c5dc04,2025-04-08T19:15:50.390000 -CVE-2025-30302,0,0,ce4ca10a4cf6c4e7cd059e73812ef0773c93863a0588341eef8c82ca6f5d2c6b,2025-04-08T19:15:50.537000 -CVE-2025-30303,0,0,b4dd7bc7652d580165fac69896390b7d32dd5aa0b6efcf885c30c9b574e1478a,2025-04-08T19:15:50.693000 -CVE-2025-30304,0,0,4cf13ec87a48c2951c7f0bc17032a847a571566df5f8a0b6a20ca902e6e1702a,2025-04-08T19:15:50.863000 -CVE-2025-30305,0,0,9d15440d4d35927d5b9f024492d70859c0563744487b32cda46eecda5f410187,2025-04-08T19:15:51.027000 -CVE-2025-30306,0,0,8fc8c9c97de3668cc7724aa20a50fada343c1a25e6cab01fff06c651bb7315a0,2025-04-08T19:15:51.197000 -CVE-2025-30307,0,0,26e2e0699969ee1e095daba53253c82fbca1e6ae383f102f1047db2ef79183ff,2025-04-08T19:15:51.353000 -CVE-2025-30308,0,0,98c67f03b42c3895b19261b31629aaceb4330612c0ddda17a5585b59374993c2,2025-04-08T19:15:51.513000 -CVE-2025-30309,0,0,60786bc9366dd9f96ee7944cb22ec8735fecf7b260a6797239545f649519fe1a,2025-04-08T19:15:51.670000 +CVE-2025-30300,0,1,9a51ef346ae7c5b3a4e0ed2ccee8400cc28af871483962217da2d943fc78986a,2025-04-09T20:02:41.860000 +CVE-2025-30301,0,1,6e27b103fac8d44a44097e20ad75b44f4b11357efbe0a4c146df3e3202f97d5b,2025-04-09T20:02:41.860000 +CVE-2025-30302,0,1,7532850546187203efadd272e41a0671994af8240863632c4bc459b5dd029196,2025-04-09T20:02:41.860000 +CVE-2025-30303,0,1,236fb3466bf65144e3d2c5ddc346cea41df137b15632eba77cff82660005edc0,2025-04-09T20:02:41.860000 +CVE-2025-30304,0,1,a8f8a023fbeef99c7747997cd761f9082753b6b3f1ad8baa3fbffa24cedd2712,2025-04-09T20:02:41.860000 +CVE-2025-30305,0,1,34ff5074bab5dba97242719b38babd09cd0b1111f0e9dc308a9b4ee965d7a4fc,2025-04-09T20:02:41.860000 +CVE-2025-30306,0,1,1b7811d3bdba0cb1c6f8386196ed1910e90baa1b43bf81eab1c0aa9ee36ce849,2025-04-09T20:02:41.860000 +CVE-2025-30307,0,1,8145444335c53ad94864b93694e8f25c22f2afb08986a92881322d15cf0c62d5,2025-04-09T20:02:41.860000 +CVE-2025-30308,0,1,c09d772ba0d841d197961f4b21b2b1636d3bde654b631d2c0c557fbfedc58940,2025-04-09T20:02:41.860000 +CVE-2025-30309,0,1,17e705fa074922598098a220c78021dfbc3e88e02b9d7b8cb6e877ce366a30d4,2025-04-09T20:02:41.860000 CVE-2025-3031,0,0,5d60434c3fd1b9eb0ecabc1c274e22b04626361f427f9c196b8950f8f03f9539,2025-04-07T13:31:10.027000 CVE-2025-3032,0,0,f8b4ab2f73ff457fe82cca4d434a54ce5e1088aad2e6e70e30f2847b41780fdf,2025-04-07T13:31:04.710000 CVE-2025-3033,0,0,8def21998c2b2d3712dcfd8c779587a6dd338f31829b8436a6e15945baec01a3,2025-04-07T13:30:59.570000 @@ -288008,7 +288020,7 @@ CVE-2025-30373,0,0,9fd9207fa251f338adafa2796470af71155f3a2c3aa1274f47f5a29012656 CVE-2025-3038,0,0,22534a6e99d8435c0e3640274e43279290c0824de864795a486909ffa65e03da,2025-04-01T20:26:11.547000 CVE-2025-3039,0,0,8412b53044798e7429c2f1e43b2eaff144fc88ee266808028d00fb7035e9ff90,2025-04-01T20:26:11.547000 CVE-2025-3040,0,0,274892af91b4ed207c6fb8d845fb283c63d995b076d284b90cfd8062dbb59a9e,2025-04-01T20:26:11.547000 -CVE-2025-30401,0,1,6094c4851d69a90cee16f3fcc3e38848db3a7882816e567c1d58e4520154798e,2025-04-09T18:15:45.107000 +CVE-2025-30401,0,0,6094c4851d69a90cee16f3fcc3e38848db3a7882816e567c1d58e4520154798e,2025-04-09T18:15:45.107000 CVE-2025-30406,0,0,37f47a971968188d0a6c2c84ea5b7df90f6c42c16e1345ea4bb8e705af3c38f4,2025-04-09T01:00:02.927000 CVE-2025-30407,0,0,5398c42f506ff0cf746668f38c343a54dfb5c3e8151c8cfb451ea4e82909416d,2025-03-27T16:45:27.850000 CVE-2025-3041,0,0,d9fe1e53f2cdd91c8975c5476eceec361ea81e0c3d05a42ad90016292a4f1e02,2025-04-01T20:26:11.547000 @@ -288168,14 +288180,30 @@ CVE-2025-30622,0,0,797c397d49f77f00a276d4088c4e3466e59efa0b6ce4fa17d94546d3a32ca CVE-2025-30623,0,0,a8e0620fa0eff69e53f34c91bac6562d90d04f91188fb9d1c9bfa47d4c96dabd,2025-03-27T16:44:44.143000 CVE-2025-3063,0,0,2e45f7e85b76c34e4c90c66b657feb85dadfe8fb2002194cf56059b20b804015,2025-04-02T14:58:07.527000 CVE-2025-3064,0,0,f53e9a492cac40f0d95465aad0a29118d38f50ea14aaad499bc5a6be35199190,2025-04-08T18:13:53.347000 +CVE-2025-30644,1,1,1780f18a4a2b290812d8cc8d941675c27e76620e0e13ddc85f8f50824a5c8b15,2025-04-09T20:15:27.517000 +CVE-2025-30645,1,1,e5528a2864021e15029f49c1bdfad52c052b8a9b1c3ceca443504e30336c9f64,2025-04-09T20:15:27.727000 +CVE-2025-30646,1,1,ed2e0f1a937da77f8afe8ba6922129c07c112bbe10cff320ce14821a83cbf4de,2025-04-09T20:15:27.920000 +CVE-2025-30647,1,1,139639bcf68d61e3aa6c21c37cd9d6dfe7c3bdf02d0f76fb0de954a40302e98d,2025-04-09T20:15:28.103000 +CVE-2025-30648,1,1,f73b198c83936bef6f9ebe17bf14ba3a92b07dc41794806cf09164fec22d883c,2025-04-09T20:15:28.300000 +CVE-2025-30649,1,1,7b36e7659c7eaa9e402c0b46dde18968dabc3c4aaaef0dd2ef0e379f623d2ae0,2025-04-09T20:15:28.490000 +CVE-2025-30651,1,1,4621602e0b13c612ec97a330dfd48282d49f594eaa3c81ad0a78aa3d91579764,2025-04-09T20:15:28.687000 +CVE-2025-30652,1,1,afe850add0a958f23e9a40789e812a61e28604a6fa222f0dc7655bf06cf26407,2025-04-09T20:15:28.873000 +CVE-2025-30653,1,1,4f5137b2c804664a9faa2c9124e7902f74335dd16d13ae11fece7d0d87c0de87,2025-04-09T20:15:29.067000 +CVE-2025-30654,1,1,55a7c1a56ec21eae62d5e9e36c84e6a3d1a5fb0a38b5b2f61bfb1632dc1d7376,2025-04-09T20:15:29.233000 +CVE-2025-30655,1,1,109dd77c6803bd500bc2259a723dc35a97eba651be7f12007b74813abd2ecf5e,2025-04-09T20:15:29.417000 +CVE-2025-30656,1,1,49399620bb99a062c81ef97573db6279282157cae8153b5a97e16e952c3da8d3,2025-04-09T20:15:29.577000 +CVE-2025-30657,1,1,e3399895a8dc469e0a396aedb67ace573c8073a24c627bef1aef76d757356214,2025-04-09T20:15:29.763000 +CVE-2025-30658,1,1,c3e2fed5d513ba42fe8d0b2e09d5f9fb6bf11e729dce0e22790cf0c585c12e48,2025-04-09T20:15:29.943000 +CVE-2025-30659,1,1,0cadac0affa46532ac71fb2986c37e192e47ff89bae19c89f9d8365691355619,2025-04-09T20:15:30.130000 CVE-2025-3066,0,0,b20f0dbbbb99ed64b3ca9de6a47602b0bc04611f1e234de1623fef6949f9ef45,2025-04-08T20:15:28.200000 +CVE-2025-30660,1,1,5ab466428d49ebb4eb37c0d175e2b050ee545a3384d6d4605b6e1ad3fa9be5e9,2025-04-09T20:15:30.307000 CVE-2025-3067,0,0,7d3b2e645511578005abbbeacbec82fc74b74b6c63aa21cac1f18b360c60a63c,2025-04-08T14:03:21.997000 CVE-2025-30670,0,0,33871fc914d81802954876c8654de6ba21fb316b8751c5736304878f0da0654c,2025-04-08T18:13:53.347000 CVE-2025-30671,0,0,d126e406e2609b2da4208844ed1e95f6b0e14bd3da567ffa49ec098f1a51b8cd,2025-04-08T18:13:53.347000 CVE-2025-30672,0,0,3ded266990ba9009f55577f3f5d04302a5c6b8450014b92c80b83398ad23d15e,2025-04-01T20:26:11.547000 CVE-2025-30673,0,0,1cf76211fcfa10ad4c1393e8c6dafbf3bed92def83ca793b34e5eea95c528365,2025-04-01T20:26:11.547000 CVE-2025-30676,0,0,708f03a86f4c884ecda3f7ec1e5552de291778e3e25b801a6e5af963ebcc884a,2025-04-02T22:15:20.260000 -CVE-2025-30677,0,0,afd9bf9db50b4688c57167708deb1059e17876f51e74e36815cf4486e4a3af85,2025-04-09T16:15:24.650000 +CVE-2025-30677,0,1,428096c529adf8e05b28521d8a741203edf8b1bb8a98820c834db818e3e23ea8,2025-04-09T20:02:41.860000 CVE-2025-3068,0,0,de66f3afaa7fd4a67fa9d3ab57331fb0ab9491ba6c44d88f9dc6104a16396311,2025-04-07T13:30:02.277000 CVE-2025-3069,0,0,c275422f91841fbe2892e1b63afd1da88d5376102ceba230e87a55bfbdd7bb13,2025-04-07T13:28:15.670000 CVE-2025-3070,0,0,389eca2715a25e0502dfee20fa689abffda48144e371016d21a2980b0deeba8c,2025-04-07T13:28:06.423000 @@ -288362,30 +288390,30 @@ CVE-2025-30971,0,0,92b14f174c92599de02a891c3fcb3bebb1869a41eef00ab5d9b6626db1c99 CVE-2025-3098,0,0,ce95a008105100dc05dac96d60492ad8c2a1a9010656c6a251be6a7755736abb,2025-04-02T14:58:07.527000 CVE-2025-30987,0,0,1ddeca9f293b13339e82c187149d285418438fc60231797e7c68c5fcad6fe64b,2025-04-01T20:26:30.593000 CVE-2025-3099,0,0,9e53ac247011e5c9d18381ea42caceb1c07bbbabd16a29680a8aab5d54621675,2025-04-02T14:58:07.527000 -CVE-2025-3100,0,0,b54d4c37e8adb05fbf9af87aa5f70a2392a159113dc9f8c80daee2c68af64123,2025-04-09T05:15:43.253000 +CVE-2025-3100,0,1,d223f6bdad24adad7bfeb8d8433bb786f4e26245258914a6d5f9c277f321f0fd,2025-04-09T20:02:41.860000 CVE-2025-31001,0,0,4265bbb6e115d79eef571dbbe3c6c20ebe4772d8a6b0bb96964817d20c125ddf,2025-04-01T20:26:11.547000 -CVE-2025-31002,0,0,5a7cd15696bf03d507688033087d96dc603dda2671b7b8cee9d0137347b982cd,2025-04-09T17:15:32.623000 -CVE-2025-31003,0,0,6c782fe29319ab3ec7e6feb6e2f6bb1f02a72356b64d46f951e8db3064438372,2025-04-09T17:15:32.817000 -CVE-2025-31004,0,0,b39ef4d365f52dc84913734a794a3e027e481c83e6282b28b637e88bdf45203a,2025-04-09T17:15:33.027000 -CVE-2025-31005,0,0,08df0ca0e5a8a8436f85c6cb058be484f3c162a62162fcfe6eb1c79a6bf5199f,2025-04-09T17:15:33.233000 -CVE-2025-31008,0,0,e79526c76ef31488c54aeed02d2328518507ef00cd93ba0ed87d921d67a31ed2,2025-04-09T17:15:33.440000 -CVE-2025-31009,0,0,ef63bd5bfa14e3447ebdb38177db1ae3b77ec580e44189e20c5b997d12b7ad65,2025-04-09T17:15:33.637000 +CVE-2025-31002,0,1,88f569f1709020dc294992faf94d9bba8f9d390194eeb3150900a443b02c803d,2025-04-09T20:02:41.860000 +CVE-2025-31003,0,1,f194dea39b8cdc9b58148d69902a45e8e3c6eba95aa5c64d2425c4ccdfdea1d8,2025-04-09T20:02:41.860000 +CVE-2025-31004,0,1,8ffa553a256c0bcda23bc14a63500dd2d79a7682c240d6114d1fad98892722f1,2025-04-09T20:02:41.860000 +CVE-2025-31005,0,1,b1efbc523457634c30a0a9849009d1745b45d633c451ccb7bdbc41a86cd090f1,2025-04-09T20:02:41.860000 +CVE-2025-31008,0,1,76d3aa622de53ca6dd0eb79a24c5fde85c488d10155b7a553e54a8b6cf7d360b,2025-04-09T20:02:41.860000 +CVE-2025-31009,0,1,e9b11ef91313e83a2c5f00146ae964456d89a3cb219ccff5c37419bfd5ba24d8,2025-04-09T20:02:41.860000 CVE-2025-31010,0,0,2eedda8f330a9beae819a4cd9d50315b7c3705aef34f39a70e86c91cbd492554,2025-03-28T18:11:40.180000 -CVE-2025-31012,0,0,0a60dc63682948f5d9859aca85d583be933fadd8348b85aa60423a146a2d5230,2025-04-09T17:15:33.830000 +CVE-2025-31012,0,1,21f03eb3af6d9b3bb51a2a0fcf9624a753c1fc6babd21259e4b8c500780eb98c,2025-04-09T20:02:41.860000 CVE-2025-31016,0,0,9f9353b55280d52026be79b202ae8bc2b442e0024607fdee2a6c539bec9857cb,2025-04-01T20:26:30.593000 -CVE-2025-31017,0,0,967d84f7c16666e3d118f189603bab133b9986b1a233e3a331e24f49a96e6709,2025-04-09T17:15:34.047000 -CVE-2025-31020,0,0,cc7b5bc4a8542d33d7bf5267825849c5e8c615f5e31d1b3122efd48f6c59a9d8,2025-04-09T17:15:34.273000 -CVE-2025-31023,0,0,af92e20273f66ee74775370e403fcbca708538627fb3fece8ce651b962990808,2025-04-09T17:15:34.490000 +CVE-2025-31017,0,1,b56a44652605d8eeed3d64b16f1dab34aa789f93a1221cc3bdf4b45f393886c0,2025-04-09T20:02:41.860000 +CVE-2025-31020,0,1,daa9e1981c03ac81dbf536cdee43874fa54a803f7000d9e16ed8ebb44cdf19dd,2025-04-09T20:02:41.860000 +CVE-2025-31023,0,1,dfa96669063a1f3955fe0e1aab8c8bfa43477b027538a93d222fb97048f80625,2025-04-09T20:02:41.860000 CVE-2025-31024,0,0,f27fb13571b9dddbe1b515b7ab2184082954eb269d62d89f6a6c625e2c4c4385,2025-04-01T20:26:11.547000 -CVE-2025-31026,0,0,82ef8dfa243f17f074219d4c1da9e324fd9c82698ed1f8e7f30a015cd927690c,2025-04-09T17:15:34.693000 +CVE-2025-31026,0,1,110923d78d570a4dd4efff2a47da0efd3f170aac2374a5da2e6fd53e6d352a2d,2025-04-09T20:02:41.860000 CVE-2025-31031,0,0,168f44010a9f1d1f02e128d4aa188c4843365dadbda135ce003254626d8a07a2,2025-03-28T18:11:40.180000 -CVE-2025-31032,0,0,124191cd51e68dda5749edae93bac8b16d5c30a849cfcf5e042a727e6c2337fd,2025-04-09T17:15:34.900000 -CVE-2025-31033,0,0,9cfd85d660e6314a6a0f3d51c7e7a6495eb271c6bb29c4626f743164a17a1f6c,2025-04-09T17:15:35.083000 -CVE-2025-31034,0,0,5830a15d7054b54bba5c2c96a2b0317e6b2e6d26b4404c84dacdd2bd88f87b3c,2025-04-09T17:15:35.283000 -CVE-2025-31035,0,0,df2072693421a6f4e8f09a8ff06b7036714858beceab1ab91de89ea544b9c41d,2025-04-09T17:15:35.470000 -CVE-2025-31036,0,0,bbb020baf3fdabcef5b1a8bb5fb001b2fdf32f9a9c4f3fe6f2725f24f248afdf,2025-04-09T17:15:35.660000 -CVE-2025-31038,0,0,22750e9ca8d2ddc62b999bc138e850fc0963bda0adb519261709a99b88e90b4f,2025-04-09T17:15:35.840000 -CVE-2025-31042,0,0,2091ac04c9f1496bbf3d289fd91a9dccd891c40d3030a8e21c2557ac68a6fec1,2025-04-09T17:15:36.027000 +CVE-2025-31032,0,1,6ee56cfbfa29ee841356b3cf210c65776fcfb1d107d1a9ba3f9a16bc11bd75d7,2025-04-09T20:02:41.860000 +CVE-2025-31033,0,1,c794537ee0b5f69607f27e241596ab4e43a486acff4e1440b6412367d3c90c07,2025-04-09T20:02:41.860000 +CVE-2025-31034,0,1,8c9adc6115c4b92fd480b9eaf53ae5796f65cf796d88440a46ea7968ae4b94f3,2025-04-09T20:02:41.860000 +CVE-2025-31035,0,1,a43aa2d0e1ff08b29f133dbbdb5406bef17c4ec3bce3f996fc125f85cb494856,2025-04-09T20:02:41.860000 +CVE-2025-31036,0,1,cc456760a875d1bf2c4e28d271430d48fc855351e73e4e33c11aab9d54f1974d,2025-04-09T20:02:41.860000 +CVE-2025-31038,0,1,9fb6143bac9687c0ce18cf1b30e0c01f378e4d2f968ce8a3716360d9dca9e86d,2025-04-09T20:02:41.860000 +CVE-2025-31042,0,1,246018d907231149fc29347b3eeb3029c728b92e6f229e944fea16da771e00ca,2025-04-09T20:02:41.860000 CVE-2025-31043,0,0,2b40a96fc4b8eaf20a7a30e77b072b27918475850ebb17c34a51d56b785169bd,2025-04-01T20:26:30.593000 CVE-2025-3105,0,0,7655f789901fca3e90cb57cc3d3b5f5846f175abac5b5dbf4ae81b8a278e336a,2025-04-07T14:18:15.560000 CVE-2025-31073,0,0,e055d10b35c7f1d19592c754caac0fe0b296e12dee12b2987368c5a10e4343d1,2025-03-28T18:11:40.180000 @@ -288447,10 +288475,10 @@ CVE-2025-31135,0,0,c29646479a81ed688aa2c7dba2e194b8b12ec18ec185c562b74cf6cab4701 CVE-2025-31137,0,0,aa5cb365eeb8f1ccf4d4e02b2375f9788bb7b8b918887cbc536481f36524d9de,2025-04-01T20:26:01.990000 CVE-2025-31138,0,0,082239a994f84f895f28ca91baa1d97931f8adb4927719990c0f96236ec2630c,2025-04-08T18:14:17.307000 CVE-2025-31139,0,0,f77a452b5e1edddf158af71a264cde2428ac6b657f8dcbc921a40f17dadbb16d,2025-03-27T16:45:12.210000 -CVE-2025-3114,1,1,82746494666cec594ac0f9dd691eebc38bd2a4d67023c4fd7936fb3c76e540d0,2025-04-09T18:15:50.643000 +CVE-2025-3114,0,1,eb0cc8026e9d326295de785426bf79375fb5e9c37472192f18f24a4f7ec13390,2025-04-09T20:02:41.860000 CVE-2025-31140,0,0,b5354da0d0be6641b36fd62d7ae5da72fa26945541a5950d6dcb5ec04d83adab,2025-03-27T16:45:12.210000 CVE-2025-31141,0,0,406867c864568f6048dee1b7cffcd596f08f273e12b98bc9b9a899fec211a190,2025-03-27T16:45:12.210000 -CVE-2025-3115,1,1,47cba9a41f2abea6ccb3947acc8ac81a0b1cf3247cc07f7f86b278ed696bd9bd,2025-04-09T19:15:49.843000 +CVE-2025-3115,0,1,1b9ced13ea75f4aa49a649badc0373af21a5d6193b7340b126ef12441a29f16b,2025-04-09T20:02:41.860000 CVE-2025-31160,0,0,c6ed6d0cefcf860ce239e0955556eee41726f134fd4b83b02d780bf30460df3c,2025-03-31T13:15:46.050000 CVE-2025-31161,0,0,a5cff012c6715e6d7cdf36222e1d08dbc62300c22c1d4fecfefc68e4ec1dd101,2025-04-08T15:30:22.440000 CVE-2025-31162,0,0,cfeafc9944d79e10529164231b0943be3a87194c4053baabeebe9b961989cbf3,2025-04-01T20:26:39.627000 @@ -288474,7 +288502,7 @@ CVE-2025-31183,0,0,c73e164beb072dcd317fc78fa989ca1bf3b077c5b2036ca05764e7542a151 CVE-2025-31184,0,0,9de93f9df79c2c2852be383e54b5da8ce2ffda4a32e49580a9cc8195cd97be7f,2025-04-07T19:15:56.553000 CVE-2025-31187,0,0,a6105b8146b15b371ec11e675e56d0f333e59f34cafc14af70a8938c57646155,2025-04-04T18:14:40.860000 CVE-2025-31188,0,0,5852a61e373623c1026b0e444244a9e20948fe242d3806415f4bc53ee664b6d1,2025-04-07T19:15:56.760000 -CVE-2025-3119,0,0,97fe51cb8021e6d31b181cbf7f0b1ed0f132444740edad51a197724a611d7815,2025-04-07T14:18:34.453000 +CVE-2025-3119,0,1,fb28a13fa5f6c3ec2d64e255d291586b142600588109911726796634ee9c18f3,2025-04-09T20:29:51.413000 CVE-2025-31191,0,0,5c887fe6f1a981b5941578aba17f50355dc847fd896dda368980895a9fb92d49,2025-04-04T18:14:34.590000 CVE-2025-31192,0,0,7592453ba1ec969e1c33159c4b526124f89adec761e1812d1595bac9e2f595e6,2025-04-07T13:31:45.807000 CVE-2025-31194,0,0,03f4d110302543c66a4fd7a7b9480fc20da220403b3309cb642a2155d37d36c6,2025-04-04T18:14:27.780000 @@ -288489,7 +288517,7 @@ CVE-2025-31285,0,0,c76aee62b0e63406ce2bba4eb6cc45c049f27ae73b357eac3652593406911 CVE-2025-31286,0,0,e856201c9b42834f1c9528734a2606281893fc23418757a05099912d18c27fb4,2025-04-07T14:18:49.830000 CVE-2025-3129,0,0,222a3d9c8714652d0d6ba97391c55e31cbb028a8923d2de4eeec30cd2a04c719,2025-04-07T14:18:34.453000 CVE-2025-3130,0,0,2fc34a21e49634629835e2bfdad21b63fabf65952307e6d85abb2208a8a72837,2025-04-07T14:18:34.453000 -CVE-2025-3131,1,1,cc05ae18e7860fe5c46233bb0ed391e744ecf12ff76ef2371cba7dcb68cf9642,2025-04-09T19:15:50.027000 +CVE-2025-3131,0,1,56c41c7a3abd5fee2ef9d2e92ed9bee398a4642831d4279a84cabdb8aeb4c04f,2025-04-09T20:02:41.860000 CVE-2025-31330,0,0,9b648c9ab2cbfab0d4ac3a100d1bd1b8fecdcaefd29ce618613bbd2f9e42ddfd,2025-04-08T18:13:53.347000 CVE-2025-31331,0,0,48d6dcadbd283a08a1842391c0c9e47ce4c05f71de3f97bfd6b5e3101a4dda56,2025-04-08T18:13:53.347000 CVE-2025-31332,0,0,3f108a9ac0319835d7c708da67bba48806ba6d1b5dc051eae9a5717ffd8b5266,2025-04-08T18:13:53.347000 @@ -288502,45 +288530,45 @@ CVE-2025-3136,0,0,80636d1eff19bdca2f7e3675f7eceb70040c1df75b8bc383cc4d01584e4433 CVE-2025-31367,0,0,85cd14db2ac76f9194e6a05115a520fe93ce77ad125f659bc4b1625771b812eb,2025-03-29T04:15:24.037000 CVE-2025-31368,0,0,07c9f19a54136c020ece5afe45106551d4106a87fecd0821fbb57cd0575c1b58,2025-03-29T04:15:29.740000 CVE-2025-31369,0,0,25ade6a3774203ee6fdcd4321ce56e82b90112f6538ef50e396382d43bc53a60,2025-03-29T04:15:38.600000 -CVE-2025-3137,0,0,c2072671a4df5565b453887dd84547bc9bb1c7622043ada7336f8574764dbfdd,2025-04-07T14:18:34.453000 +CVE-2025-3137,0,1,dda8a44b69c5bb0797e2164a1d160f483a15b9426bfdd575c615f64df1e46851,2025-04-09T20:28:56.800000 CVE-2025-31370,0,0,79fdc8cf1348d46f7b63d37f6025aae5b5fea7041ff8807c4f3c14cdafc4bc61,2025-03-29T04:15:38.677000 CVE-2025-31371,0,0,cd370f88c92ee402d4c5aaef8baeb9e083693b4c18cd5565fe7e097d1b4221e1,2025-03-29T04:15:38.813000 CVE-2025-31372,0,0,7a7a683873bc962dfe6aa91ab7aa77a42948f5cb58f2a30db9c2fe953aee9559,2025-03-29T04:15:38.950000 CVE-2025-31373,0,0,f9071278a14d544e1d638810d17e35e9b3cf783fa438c6415cfa720de050a0f8,2025-03-29T04:15:39.090000 CVE-2025-31374,0,0,a0063074d97edd2d0b6a359f9337f2fbc025fc83f5ab0917de6d943a4c010e45,2025-03-29T04:15:39.340000 -CVE-2025-31375,0,0,e437b10f29b60f52747ca1091b4579d4525ca13238efc8882bbd91f5621391e3,2025-04-09T17:15:36.227000 +CVE-2025-31375,0,1,d40d58526a82fb163d06e606eb98cef9164c7aee4c60bf356c1ca3ba6396b825,2025-04-09T20:02:41.860000 CVE-2025-31376,0,0,b701b7ba661f1762215842f01eaab352e5cec0fffbde18b5aedc908f1c5af508,2025-04-01T20:26:30.593000 -CVE-2025-31377,0,0,a7ca4d202ec9185d1a00ffc78ac89349fc7b298bdc7c5861286921aee26c852b,2025-04-09T17:15:36.540000 -CVE-2025-3138,0,0,6ef0ed58a2cde5781796ad6903665077fc5f2d452ce7e9fa156884d5367b119f,2025-04-07T14:18:34.453000 +CVE-2025-31377,0,1,f0876c1370382f7938641dfce85161c18044561c007e6734f92876f9ff97935c,2025-04-09T20:02:41.860000 +CVE-2025-3138,0,1,3a391b3973806b7c959b34db1fd6ebd0ddc97a57ffcf6e3917f0522b59cc1954,2025-04-09T20:17:06.037000 CVE-2025-31381,0,0,ef752b2c9c7c29a3c84fb86d4ef143cb9b4c68b6405ca16b3456144622287ed5,2025-04-07T14:18:15.560000 -CVE-2025-31382,0,0,0b245001024f6ddc3b3d8276e040f6b344ffa2e27b95fe2e7812339f3247b2a2,2025-04-09T17:15:36.743000 -CVE-2025-31383,0,0,4698f386449490138ee361adb92e6d2837136df71a67806ced38209cf80be425,2025-04-09T17:15:36.940000 +CVE-2025-31382,0,1,2129389b54b4c5fdf51b41c80cc79ed9dc6b314dee3b0f9848e2dd7f9952ce24,2025-04-09T20:02:41.860000 +CVE-2025-31383,0,1,02c952aaf2086764ae7d30a36c2c8c6960b5aeedf4313811c1ec214922f78142,2025-04-09T20:02:41.860000 CVE-2025-31384,0,0,2a0625ad103a2675f34c0efb54ef3d69c044c393961b9c9bd9a02a1b91b69579,2025-04-07T14:18:15.560000 -CVE-2025-31385,0,0,e6a8fd63a577401e80a3661c808fc7dd7928bef1d556d157afe9671299c4aefb,2025-04-09T17:15:37.127000 +CVE-2025-31385,0,1,9ccdef04f711df1c6e05c21729531afd25432ec9220653c3a1dcc7dea45e7677,2025-04-09T20:02:41.860000 CVE-2025-31386,0,0,42df843cc2ac2bb87523fa10c4b86c9cfeca984ee6e6907b70f825251fac8592,2025-04-01T20:26:30.593000 CVE-2025-31387,0,0,efeeafd47dcaa2c1fe833b1f78eecd6f90d244213e2c3fd9dadef428bb8988f8,2025-04-01T20:26:30.593000 -CVE-2025-31388,0,0,8041170b56e2e9f4f9324d75b1200d90251f67e7ae4b818a72a024c121a2b7fd,2025-04-09T17:15:37.363000 +CVE-2025-31388,0,1,0500b5961e72058b1e5a2c84fc6e0c6b4bad5d8c527cad156e5fa1ef4ecb2bf2,2025-04-09T20:02:41.860000 CVE-2025-31389,0,0,c325abee254c046e90cc0113c3621986fa2d592e9234eae84e1d157fe75d1db4,2025-04-07T14:18:15.560000 CVE-2025-3139,0,0,d92b12075ce31c570013300fcf491334322f593740e5b2fe9c7d0ed59a1c1c36,2025-04-07T14:18:34.453000 -CVE-2025-31390,0,0,a4e586040692d320a7f846eb17232c7f5a839af4e376be62e639397adf356bd3,2025-04-09T17:15:37.543000 -CVE-2025-31391,0,0,c2f35305acc14b60349e021c8e0251e007ec97223e515b6f30cddacc07ae9163,2025-04-09T17:15:37.743000 -CVE-2025-31392,0,0,9532df066c136e98fda37ff7f1dc822e69c153aa77b4e73868f141e676b1ae07,2025-04-09T17:15:37.943000 -CVE-2025-31393,0,0,18c1fe504234483eb178d7b1b44faa5893a8991a37848ec8df582091563ca0d4,2025-04-09T17:15:38.130000 -CVE-2025-31394,0,0,4c35473b9a4895520cf69da4ec4b9c6303a80b5e46a18dc00880a519e53cc5a3,2025-04-09T17:15:38.303000 -CVE-2025-31395,0,0,1a3f5f68ea4f30d647d6a0c7886332d387e2bd2744dec0e31d63632b199fcc56,2025-04-09T17:15:38.500000 -CVE-2025-31399,0,0,67c596a30af7b4cb9f1c0b6d8da406f5ed0da11a1566870a049a27687c5f7de1,2025-04-09T17:15:38.683000 -CVE-2025-3140,0,0,84421f57a3f310ae54c70f09d7f7c824f920551e38d41f0b162e13a6ce2ad8cb,2025-04-07T14:18:34.453000 -CVE-2025-31400,0,0,676ecb71ef1ca9b1d3d5b2e39897c2c385e090b764882c7ae2e7469ceb63855e,2025-04-09T17:15:38.867000 -CVE-2025-31401,0,0,9e9a118ad5f5df2f616c79435bf3042a989c2234d7c7ebea2055b014e6dfcc0b,2025-04-09T17:15:39.050000 -CVE-2025-31402,0,0,ac89b8168a50fff0b504db09a7fd3e96cdcc088675c4df7d97246ef9480565be,2025-04-09T17:15:39.243000 +CVE-2025-31390,0,1,cfd30c39babd3471f35ebfa432daf7a3db2b35b83d6763a41c0c854bee1d83c7,2025-04-09T20:02:41.860000 +CVE-2025-31391,0,1,d797c804f848cd96788e7850352c8f2615036b1f78cc451834891b5940864554,2025-04-09T20:02:41.860000 +CVE-2025-31392,0,1,ffc520a6d0085b72f83d7dc9ed796d9e35563e699da05361f89fceb4290fb1e9,2025-04-09T20:02:41.860000 +CVE-2025-31393,0,1,ef61af60ecb6f42a599d6b28e8170f2409615c82a8f52290758b793897fbbee8,2025-04-09T20:02:41.860000 +CVE-2025-31394,0,1,35bcd5eb6b0051edfb7c45978aaa6a986235f7b243bc199de6d67c5fda75e8fe,2025-04-09T20:02:41.860000 +CVE-2025-31395,0,1,d6518399a22fb7f0117d5a7d13fd307885677a68bbee3703c8cdc091384e34d5,2025-04-09T20:02:41.860000 +CVE-2025-31399,0,1,252cb400501f8ad233f443884efb7de3e08293c24e02f5ab3a3bac7e9594eb71,2025-04-09T20:02:41.860000 +CVE-2025-3140,0,1,5e4447ac4f353309a204c953780c9aab222b7aa274e4ff45d2062480543744c2,2025-04-09T20:15:21.987000 +CVE-2025-31400,0,1,4b2d32de686d320674e0e3313204d55f14f4ac8a319bb99dda5ee206b909a906,2025-04-09T20:02:41.860000 +CVE-2025-31401,0,1,afe2a22a63b02354c3b88b26f9f1ba6e4feb76f3aa550b234034b6104f74f484,2025-04-09T20:02:41.860000 +CVE-2025-31402,0,1,33249c66684bf6e8d1b4dcb9facff0459de7eee1dcaf41ef4847dbe694ea0198,2025-04-09T20:02:41.860000 CVE-2025-31403,0,0,af1f518a4f5460aa40054e837ffc06f3751aeeac2cbece905fe20a0cbc0bbcc3,2025-04-07T14:18:15.560000 -CVE-2025-31404,0,0,5054227de6e810b0c93efcdb3e35ab48a8eaddb81faa0fa2fab8bc8d084ef906,2025-04-09T17:15:39.423000 +CVE-2025-31404,0,1,6d6333de86d45edc9b4ad168811a0b8ebf846f591f657f54f5db90643927abd0,2025-04-09T20:02:41.860000 CVE-2025-31405,0,0,befb9a9b701000631169f19b9525a9147c2b7768599e630ea62d53298ff2847e,2025-04-07T14:18:15.560000 CVE-2025-31406,0,0,5912a412471ff3d877945941ec5dfa793f9b328130992797be8d7429384326a2,2025-04-01T20:26:30.593000 CVE-2025-31407,0,0,eb92c69f68b38eede8347f8bf26ad4aad6be3a22acff41ba3845769a0915f40f,2025-04-07T14:18:15.560000 CVE-2025-31408,0,0,4bce0889fff07e9d2af0109421fe58b7234ee5ebf9fa6560ab95ff15e16d923e,2025-04-01T20:26:11.547000 CVE-2025-31409,0,0,82dbb111649d8cf9e26a4c460fca8cf167c66dfbe7749d633be5ad71c1f22147,2025-04-01T20:26:11.547000 -CVE-2025-3141,0,0,c895e61d3288be46239303e82fe9b1e03d0315074ff2a24f50f13398dfc65427,2025-04-07T14:18:34.453000 +CVE-2025-3141,0,1,8360183ec4fba0da13c3410bb9d4443e65e196b85f2b1133d2249c2215248c03,2025-04-09T20:08:13.613000 CVE-2025-31410,0,0,d2744125929669a0550251c0ca1a9221dc78cee85634e7974f1b02dfdfbfe3ca,2025-04-01T20:26:30.593000 CVE-2025-31412,0,0,f2a3a75101b5fbb687e484fbb151373c9b65c031636af9fa6343c10e46f352fd,2025-04-01T20:26:30.593000 CVE-2025-31414,0,0,c7c8b152028249fcda3808d41ed059a882fd165da9cc6176d922213c7f3b4129,2025-04-01T20:26:30.593000 @@ -288748,7 +288776,7 @@ CVE-2025-3164,0,0,524d9769a71affe8b81690c3ed0b562fd00f5c5232f9c0d91b2d9be6cf9796 CVE-2025-3165,0,0,2e02105ce99f3564dd878406ce8c0b7835d84010bc4a7c0c3ba88c3a6192f2c5,2025-04-07T14:18:34.453000 CVE-2025-3166,0,0,17028d9ea804572df4baaaae9408352ee57c738220a3aec0680e295f0ee3c81b,2025-04-08T19:54:38.830000 CVE-2025-3167,0,0,b34599c040918980d6f606e5670b68090d1729d06d9c44998cbb7c2b6c7b9e52,2025-04-08T13:50:05.433000 -CVE-2025-31672,0,0,c69b4a6328e6e37849758de080bc1e28fad8d7e24052909bdf197e4162860b00,2025-04-09T13:15:42.523000 +CVE-2025-31672,0,1,175a7785fc20706c9519c996ab32c6a67f731c76b352e083bc2b7a4c50ed9eff,2025-04-09T20:02:41.860000 CVE-2025-31673,0,0,4d87be6269b25250eebf5a9fce7cb9a2b88c94e00b9796d1018bcbd1dcf3b9cf,2025-04-01T20:26:22.890000 CVE-2025-31674,0,0,4c83b8fc56b3a5cdd09f994e999ba9d59f2e5140397359adac70c0dab25f825d,2025-04-03T18:15:47.417000 CVE-2025-31675,0,0,49c705166752735d64cb862d463bc2edf7315c17b8526bfff696b889b2b4e1b7,2025-04-01T20:26:22.890000 @@ -288999,8 +289027,8 @@ CVE-2025-3198,0,0,9ea9a8c586fb27cd4141f26bc5f53c6d47512dda4a6f8f32123c47190f4934 CVE-2025-3199,0,0,b2c8a0f552e5c66b559702403ed11bd1140ca56173e2c4b53e84f8a9895b6f6e,2025-04-07T14:18:15.560000 CVE-2025-32013,0,0,b9e014f5fd31f7e573b509bf40d04ff5548b21d354f26d5a5266036bb938dc7e,2025-04-08T18:54:07.337000 CVE-2025-32014,0,0,af089ef047d3ce8d7747406914b66a9d22daea2274c66b4c0d88bc73728bf977,2025-04-08T18:14:17.307000 -CVE-2025-32016,0,0,524c4a4ce5e5059e3e427e03abbf23d28aa49f10848d6c866a48769693d6b1a7,2025-04-09T16:15:24.770000 -CVE-2025-32017,0,1,8a0f7f2a3dc0f318bf58248c4fe2f160ba48033de9c615edbc9d5ce3722cce81,2025-04-09T18:15:47.233000 +CVE-2025-32016,0,1,5e6a0e269d4967bb9ce20bdc4b65ab6bf216e566f732ab5842eba9a6ceff7cfc,2025-04-09T20:02:41.860000 +CVE-2025-32017,0,0,8a0f7f2a3dc0f318bf58248c4fe2f160ba48033de9c615edbc9d5ce3722cce81,2025-04-09T18:15:47.233000 CVE-2025-32018,0,0,1844fc30427a0e5f1340a0d4b2b491b8b816d80738a0411934b5070b71fc43ae,2025-04-08T18:13:53.347000 CVE-2025-3202,0,0,b5df9a4f10b6a094526640bce151f74d263fe1512b1e3334f9249ec0e5e39a5f,2025-04-07T14:18:15.560000 CVE-2025-32020,0,0,ed835337550d1af022a25ead8719b48fd0278920ca3f4a50f9110c3e9fc9d9d5,2025-04-08T18:13:53.347000 @@ -289015,8 +289043,8 @@ CVE-2025-32031,0,0,37bea72547c945a8f2fab8d4fe45ae9ecf4433fff6973ea168be636247219 CVE-2025-32032,0,0,5b77537ccfb570130b57fff80bdbb7f541b48375f7843cd509fa4385f2610730,2025-04-08T18:13:53.347000 CVE-2025-32033,0,0,40b3b208d052d7879d2f8f3adb9e51b46b4a05b975f75dca712aaefa23ec792f,2025-04-08T18:13:53.347000 CVE-2025-32034,0,0,39b72df89785b876c4ffe3d85c99f5c70d32cc05dfbbbe1938fd282aa04ebea9,2025-04-08T18:13:53.347000 -CVE-2025-32035,0,0,3f3d5f9ed898bf76e3a14041e3570c3faf8576d7968db15a0822c0faa92a311f,2025-04-08T18:16:08.597000 -CVE-2025-32036,0,0,0fd2282afa05e98d8e89dee8d907037426741db3162238fbd41aa4e0d606b135,2025-04-08T18:16:08.750000 +CVE-2025-32035,0,1,70a6888bf34d8ab81fb00f2d46e41bf70535bbafb3937f8df2bfd461f8a5aab1,2025-04-09T20:03:01.577000 +CVE-2025-32036,0,1,392ced4a7ceffb3860fa36c03a132228e0c351b485f1983727787214d9a82a67,2025-04-09T20:03:01.577000 CVE-2025-3204,0,0,64fef00d821c113b4de0943d2e5e3bd619275d50a2fe970529a1c3d6f3f5b1d7,2025-04-07T14:18:15.560000 CVE-2025-32049,0,0,4a492d3e48b4caa699bbe628c5401d02fd93365e9cd0841713ed46afaee15215,2025-04-07T14:18:34.453000 CVE-2025-3205,0,0,51e3f14857d78569279198f5dc30e56ea630bb12580d37bc688ca7f3b09b35a0,2025-04-07T14:18:15.560000 @@ -289181,16 +289209,16 @@ CVE-2025-32366,0,0,3fc866e724427b581d8cf53af242eabcde3cd158e37af4ae19225f3e0a4ff CVE-2025-32369,0,0,96d402924571180f1e04aec6a92f212002710a79eaea9c3eabbe3a90881f80a2,2025-04-08T17:27:42.950000 CVE-2025-3237,0,0,5eb23ae150e778d4e0e8512099269eb9b19a07bb05f106ae634562ab1cde60d7,2025-04-07T14:18:15.560000 CVE-2025-32370,0,0,52539d7c5e40c96e3c6580caaac756c4f836d7993783b3dbdb4c110f6e19f5e4,2025-04-08T18:54:51.523000 -CVE-2025-32371,0,0,91e78c7481ecb84a746600ca04d1d6d4f3db7472b1f8ad348a41d58d7fdfc325,2025-04-09T16:15:24.933000 -CVE-2025-32372,0,0,1eddb8b1ab7c0cee43d13fbfe4796c8ba66f855e114801e39f61bea21c7e018c,2025-04-09T16:15:25.103000 -CVE-2025-32373,0,0,c491c497792be1095c5263bf75d2d3f4915c678d8d8ed6951fb569528040222b,2025-04-09T16:15:25.250000 -CVE-2025-32374,0,0,a1cbaf333dee6df7ed23a4e4776b60027bc2b631a19c34b205d55cf3869b9ec2,2025-04-09T16:15:25.410000 -CVE-2025-32375,0,0,dd825be9afcbd3b838c4733632177153786c8bf8a74a69c10f5daff1208013d4,2025-04-09T16:15:25.580000 -CVE-2025-32378,0,0,6249c1a44be59a3d6f9dc310eeb62b3222f0efa3f686b4e8df22815414ecbc71,2025-04-09T16:15:25.740000 -CVE-2025-32379,0,0,b70928eb14e6e172aa2ebd39b63c4be77508b65b02c5190c79032c8f02489e16,2025-04-09T16:15:25.903000 +CVE-2025-32371,0,1,0ee3f04e31cfe56c2f8efd86690152691b8d0638c7f6c7c7d01bbc1165685192,2025-04-09T20:02:41.860000 +CVE-2025-32372,0,1,dfffb29d11c95a90c1826c739313bb2882a5ba128e8b426dc0090d95a2b51084,2025-04-09T20:02:41.860000 +CVE-2025-32373,0,1,d7eebdf6268acdaab9f11077d8581e25221c7d3302f5a8f6e69ef9b68b8be512,2025-04-09T20:02:41.860000 +CVE-2025-32374,0,1,8f128e24eba61344d987b2fd40118501756fd43974bfa07586abcdd92affdffb,2025-04-09T20:02:41.860000 +CVE-2025-32375,0,1,57aa23969c6f6c30c22c2fc60981fa50740929b50174f07696426f015b423dbc,2025-04-09T20:02:41.860000 +CVE-2025-32378,0,1,2b3ad40544f3cc860a964750b8b0cd83606548c3a50e6a8f2faeaffcc0a85f25,2025-04-09T20:02:41.860000 +CVE-2025-32379,0,1,7f1cfe7e309f09c759a83cd8df33cd9a42ad7618497c3490f3bf29b730cfa592,2025-04-09T20:02:41.860000 CVE-2025-3238,0,0,273f0c8b3980a53c04674d23c4dc81b848f12a18d8a02a7425c58d0764474f6e,2025-04-07T14:18:15.560000 -CVE-2025-32380,0,0,86596b70fe5c1ebc60e834b59d118f0513b3ffc50be7aba2e8802fc675a64ab2,2025-04-09T16:15:26.053000 -CVE-2025-32381,0,0,0ad5c3202d2d0fe217903ac46cdc2d959b6e559b25783129942ee5ddf61e9e11,2025-04-09T16:15:26.210000 +CVE-2025-32380,0,1,3b67cd7140a780880cd9a365fb7c65e3844121c9df502fb9e347277a2990b10e,2025-04-09T20:02:41.860000 +CVE-2025-32381,0,1,706776f7375b65e6513a0234be6a05508bb5b72755cc79b008c9277f6ea13ecf,2025-04-09T20:02:41.860000 CVE-2025-3239,0,0,d82817b34dd7b66d6aa65a93073be6dc4033b0ef23e651c8d1c7428dd5441e76,2025-04-07T14:18:15.560000 CVE-2025-3240,0,0,fd4ee2fdb38ac17ffaee2ac6e70f3a2f5dcccf28e2968d4be2b86fe7dc62212e,2025-04-07T14:18:15.560000 CVE-2025-32406,0,0,c36ab6ae7e1e7303aa3eb42ed946f7d4900320595ae089bfc4f9d1df0d82382a,2025-04-08T18:16:08.917000 @@ -289202,101 +289230,101 @@ CVE-2025-3242,0,0,7a3796558c3172b29f1754f0aa43f7d570abcefa6f88716250c661d5fd24e2 CVE-2025-3243,0,0,b05341f12b748941f8ca2dc4c2b8a53c07658570f17c96676f3c5904a6066c66,2025-04-07T14:18:15.560000 CVE-2025-3244,0,0,a20bb1d848a28a44d0b8d510e43cbe068220041e655dcf96cf8633b9bc977caf,2025-04-07T14:18:15.560000 CVE-2025-3245,0,0,396ea3bbe154112d349f915c8c28a6610578699cecf486191d9d012a69d9c5b9,2025-04-07T14:18:15.560000 -CVE-2025-32460,0,0,c21410b5e6e36877989fe1b65ff9455675dc9eddeeaf1356945ec843be766230,2025-04-09T02:15:15.137000 -CVE-2025-32461,0,0,777383737583a36a93f808b62fdcd270b508ef3c699e07ca333b0a9cbd41b015,2025-04-09T02:15:16.253000 -CVE-2025-32464,0,0,4a2efd97c1d0568588269f1b8e568d51d9c1e6fe9587f46f6410a701df9deda8,2025-04-09T03:15:16.847000 -CVE-2025-32476,0,0,eedea1f6730fa21738b7f3f3ddf7dfeca214331046c25a60549bf3773109397e,2025-04-09T17:15:39.607000 -CVE-2025-32477,0,0,3edacc75f9d92c019bf14e7980af2a7a1e01b6c202381e047ba84443bebf4822,2025-04-09T17:15:39.813000 -CVE-2025-32478,0,0,b6f4d719b8f75ea0869f67f85db0537da92152fd4befbba1f5b885926e1142ff,2025-04-09T17:15:40.037000 -CVE-2025-32479,0,0,f0b76cbc5c517b3501d92f5911adf972908670d4a965a703d7d7cb7130d3dfb5,2025-04-09T17:15:40.240000 -CVE-2025-3248,0,1,9c54239426075f54251b799b9a99dbcd0f6c85534f10393ee8caadd1da693a4b,2025-04-09T19:15:50.270000 -CVE-2025-32480,0,0,1b1d4d531dde61ad8eb5db9ce69b2b941fda80a307758527a0772dbe6da20992,2025-04-09T17:15:40.433000 -CVE-2025-32481,0,0,f334deef041353f38711b82ea38c9db078db3eff5db1f25876cd058d770b0ff3,2025-04-09T17:15:40.617000 -CVE-2025-32482,0,0,95018dba91d9b626452230641abc51209488e5624566cdbedb3f8ca18edc2266,2025-04-09T17:15:40.807000 -CVE-2025-32483,0,0,14033cbb642c17b64c02222f7456f3261695900781435926a87e3e8908bf36e4,2025-04-09T17:15:41 -CVE-2025-32484,0,0,da09680108654b6e404f04a6e9ecaa14f5d34fc13dacc20be76a1d8203241bd7,2025-04-09T17:15:41.183000 -CVE-2025-32485,0,0,0483c694abc9673dcf19c100c4be6b391e878a7770d5bec92085cd2aef83d5e8,2025-04-09T17:15:41.370000 -CVE-2025-32487,0,0,b93e081a31ca6369b631f0cc8fe241251fb31345d156122d90a13e7e3d9b0f5d,2025-04-09T17:15:41.550000 -CVE-2025-32488,0,0,915a5d955a7a869d5747aba935904d8b4573c4c88879f49be8cdc0c06ff3a223,2025-04-09T17:15:41.737000 -CVE-2025-32489,0,0,447c712e899c964a246757f7c77cececa74b9603776c72a74ef19777de698d56,2025-04-09T17:15:41.920000 +CVE-2025-32460,0,1,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000 +CVE-2025-32461,0,1,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000 +CVE-2025-32464,0,1,90ecf00992aa935a1ec172382a80a6a814adef224b6842ca8a80c5ebbf6d56cf,2025-04-09T20:02:41.860000 +CVE-2025-32476,0,1,5077fb066a1c1c8bd9222909c968e14fd4e05051500fab6d3c97e3ed88ca42bc,2025-04-09T20:02:41.860000 +CVE-2025-32477,0,1,653ba5ea3f1c64a147a1553af930c1d9312cfe68ea1d995bb35b3b9219d44291,2025-04-09T20:02:41.860000 +CVE-2025-32478,0,1,e490ccdec3bf2c78f22a036d0b09662eed3f438e6c23329b9ba391430e6ba44e,2025-04-09T20:02:41.860000 +CVE-2025-32479,0,1,5ec6bdc32de22ea3d7b88d0ccd2113c6208d77dc2db5f48b33eb3ba8300d5e1a,2025-04-09T20:02:41.860000 +CVE-2025-3248,0,0,9c54239426075f54251b799b9a99dbcd0f6c85534f10393ee8caadd1da693a4b,2025-04-09T19:15:50.270000 +CVE-2025-32480,0,1,cfe85bc52cfe7ad5fdb76001c653227d3a5d99df83228f680be0e60560b9bcf1,2025-04-09T20:02:41.860000 +CVE-2025-32481,0,1,e942ad882c51c591ee613921cd1a9a1795676db067a94f784141b097127b16e0,2025-04-09T20:02:41.860000 +CVE-2025-32482,0,1,3b3100d2765d5d76303b6bdadc1b635a18c1484b146318d260d032eec70ad40e,2025-04-09T20:02:41.860000 +CVE-2025-32483,0,1,ad93c95b302b29f0161f9decb1ea373c597a6910d456a14bcfa21edc59bd6fba,2025-04-09T20:02:41.860000 +CVE-2025-32484,0,1,3c90cd6a78a98d7f2572377f9b1d46a55b3296e08f716132f46dfd5592abbe0f,2025-04-09T20:02:41.860000 +CVE-2025-32485,0,1,2802ece458b896d61f0030494366937925f28be40e6f137da7c0165a0e10cd5f,2025-04-09T20:02:41.860000 +CVE-2025-32487,0,1,6c7e404f6c15f5cdf956927cb37117332e2b269da382e2ed0077d8185a63fea3,2025-04-09T20:02:41.860000 +CVE-2025-32488,0,1,aefa035fd17c341716a8c7e9d520f0198e450069edec2b49945c682ada9be9fb,2025-04-09T20:02:41.860000 +CVE-2025-32489,0,1,fb078ca96e031d3703e1f27ddde042653dc6e6024daf7470ff250f3687b5a66d,2025-04-09T20:02:41.860000 CVE-2025-3249,0,0,733737203692403dc364c9398a90d84cb34e7925fec94f7c4725b719e6f271e1,2025-04-07T14:18:15.560000 -CVE-2025-32492,0,0,2f2c1d19a4b5c7e17d9caf215be7a423987fe0b3a2e10df4c0e46b934cc1c08b,2025-04-09T17:15:42.100000 -CVE-2025-32493,0,0,355a5de2921a453724997cc66c477c37f504e1a323457d718ddb64832d7d5af4,2025-04-09T17:15:42.303000 -CVE-2025-32494,0,0,17d0f90ef8746b3b0abe41a15c546784cc81c5475f0000c92f6ee977c375ec73,2025-04-09T17:15:42.500000 -CVE-2025-32495,0,0,efa73e19e31149da65b7383399e36ff0d641b90a719e61aa7a2e4ae0165adf07,2025-04-09T17:15:42.667000 -CVE-2025-32496,0,0,96ff7ac4ef60fdccd05097570ba324e5df9d57ef2fcdf5f369778eafb2dd3482,2025-04-09T17:15:42.850000 -CVE-2025-32497,0,0,ceee16d41b778c82e0ba63276e029c8566782ddfebf04c4f936287bfef1e7833,2025-04-09T17:15:43.070000 -CVE-2025-32498,0,0,d0af7da60635b8274142fe87ce71e3a7b73593e7cd48eab96e9817f2c555c812,2025-04-09T17:15:43.263000 -CVE-2025-32499,0,0,21f05cfe7f587b953f671ec10bbf7b963e7561e674a8eebe1d72aed2ad16fdee,2025-04-09T17:15:43.440000 +CVE-2025-32492,0,1,756f9d07d7543ee222468be0478471694a667ef162bcb28350837eb0c5457083,2025-04-09T20:02:41.860000 +CVE-2025-32493,0,1,4053ee93b878da03862c6141a6281b14f478df2a009e97175cd70cb475f97b50,2025-04-09T20:02:41.860000 +CVE-2025-32494,0,1,136b57298ca329f22955e29f943bd3b1cbc01a50d39c9f29352726f6fab0a369,2025-04-09T20:02:41.860000 +CVE-2025-32495,0,1,b92cdc09e508db77f634ee99b6a99f5b8ee1c036a79f1e74bae860c85c0b2271,2025-04-09T20:02:41.860000 +CVE-2025-32496,0,1,905faacd5bf5b6daa2eb467826fa593d2adc13a9c6c748d7b21f4f72aa7ff930,2025-04-09T20:02:41.860000 +CVE-2025-32497,0,1,4e988f8def0287676145b1f57e23a9b47aa009995fafb709f11681069fbabed7,2025-04-09T20:02:41.860000 +CVE-2025-32498,0,1,6a3795728c73d64a38affd426accec1968e05e568746c5b25901d07bfe9fc143,2025-04-09T20:02:41.860000 +CVE-2025-32499,0,1,d6b35d212528672601278047e460ffdbae215ed7e8d1514b87311df5124cf4d0,2025-04-09T20:02:41.860000 CVE-2025-3250,0,0,86c9421f263345a046bec996216d445d7aebcf0cefe445ca2d4279fffb4f74bd,2025-04-07T14:18:15.560000 -CVE-2025-32500,0,0,a4642ce0f048bad102b1fb3bcc097b0b1f2d4601aa7fa219cb816cd71fbf7070,2025-04-09T17:15:43.630000 -CVE-2025-32501,0,0,e6834c2b25cdc5f3631bf2ffcc03564433b6a9e9df92adcb99c0caa597270b7e,2025-04-09T17:15:43.820000 -CVE-2025-32502,0,0,131e0ff987284f3638d2dcf83dd8a5ccdb99ad845aa9fea1f4ba217fe8b745bd,2025-04-09T17:15:44.010000 -CVE-2025-32503,0,0,30ff37bb6f5573b35c75d77c3bbbbead67909479e22bd199fba7e33ec7f0100f,2025-04-09T17:15:44.187000 -CVE-2025-32505,0,0,160eca42fe868da5cb18a1df7f3398067c80e3ed881e7a5c8db2eb9562c459db,2025-04-09T17:15:44.383000 +CVE-2025-32500,0,1,8df233addabd7d4196349af7e2b2f0c3d3f8b39e6bccb4323b831cca6c44453a,2025-04-09T20:02:41.860000 +CVE-2025-32501,0,1,07737988125e9e8f84b77b372f79992963b0761a09f5e541596fc263f6b01a41,2025-04-09T20:02:41.860000 +CVE-2025-32502,0,1,768476dfa7328187554c7b85d7c9fe637dc8582e78ce1476481027c918967626,2025-04-09T20:02:41.860000 +CVE-2025-32503,0,1,c150b47bddeebc4c8156e564db72d2f6acc04877f2b60e3a35be4348580d8520,2025-04-09T20:02:41.860000 +CVE-2025-32505,0,1,e0b07056e3460165faf62951ad016097d119ec9fcd8c147e24c58e19a40af4a0,2025-04-09T20:02:41.860000 CVE-2025-3251,0,0,40d0b8ce477fd906963245c3f47c46ed7c4260a43feb20789c6a6db271395106,2025-04-07T14:18:15.560000 -CVE-2025-32518,0,0,deee914cfa8aefa35b4aaaa956e3008fd1147334d230330702b4cb56d7e46c94,2025-04-09T17:15:44.557000 +CVE-2025-32518,0,1,614c71891568de0829ec63430eeb590167a08493c6cb7dac774f07bab3f9bdc2,2025-04-09T20:02:41.860000 CVE-2025-3252,0,0,4c10de8b3cb60d5dfb9be1c6a515e4b2cff1e60b913ad0965a444629ee6bbad5,2025-04-07T14:17:50.220000 CVE-2025-3253,0,0,d3540ac43febefad545d964abd58e6d161a99b9640be648524f895f9994fc100,2025-04-07T14:17:50.220000 CVE-2025-3254,0,0,48928c45868aa81d54aac82548f85d57c79f7bb7f98d123408d27256cf914e0c,2025-04-07T14:17:50.220000 -CVE-2025-32543,0,0,24e7d852a317ad4d905eeb7cfdb31736a0dc4c308e9f971b70954157a6757397,2025-04-09T17:15:44.733000 -CVE-2025-32547,0,0,c08cffa253c9da354aa62d7201f3798abc4f4adcf02bd5d6661cf2dc2a1457ef,2025-04-09T17:15:44.930000 +CVE-2025-32543,0,1,d050165252e86d2799dc53e2bbb81b0dbc85fef67b19a057fbeded735059c568,2025-04-09T20:02:41.860000 +CVE-2025-32547,0,1,972184e533faca4526064acb0f983957804491440de409b5f8309b7935acb12d,2025-04-09T20:02:41.860000 CVE-2025-3255,0,0,d5353c58983edc47cfd68b6813d92152b05623ed0e06ed0dacfb65f3d812b06b,2025-04-07T14:17:50.220000 -CVE-2025-32550,0,0,b003694e4e16a781eadac5b79cd2c5d15d3d1d892ebd795b18d10a576471d8e0,2025-04-09T17:15:45.120000 -CVE-2025-32555,0,0,67fdd2b07eeb290174a672cb149a636721158d0d2e2381819fc9c99a3ca97116,2025-04-09T17:15:45.317000 -CVE-2025-32556,0,0,d9e617268d705ff80a8ebe5e97eba46fb467c50371ec289215a867c80bbb8c53,2025-04-09T17:15:45.593000 -CVE-2025-32559,0,0,c89930ed66395930799404a4020683775bf758a051e95db7c92fb2ea0e5218eb,2025-04-09T17:15:45.827000 +CVE-2025-32550,0,1,6aab19aaca5b164fcc7407dac1e301c7e2f368ae8071ceee7d76d49c266c8de3,2025-04-09T20:02:41.860000 +CVE-2025-32555,0,1,7b60a026f07761c55d85498959f4cabb90b525fe6170c9e9d5a3be4d0a275575,2025-04-09T20:02:41.860000 +CVE-2025-32556,0,1,03611315d89a49c9f0dc81909f7355075f5c2265ddd38852e3def659a3349a29,2025-04-09T20:02:41.860000 +CVE-2025-32559,0,1,33ee8b4fb18181edb7883dffbe83974b2747e59c0f49de6506d018442da457b1,2025-04-09T20:02:41.860000 CVE-2025-3256,0,0,cba4962816ca9028f309f7d49dc62bb1e7562a0c6842a2b632328c7e8082b66d,2025-04-07T14:17:50.220000 -CVE-2025-32563,0,0,7c563b0f1f4763e617c00bccad715b0a6100d93d2f04328f8038a0ff99e30f83,2025-04-09T17:15:46.030000 +CVE-2025-32563,0,1,264f345e68fed8749b434a4a100ada5d461e24ca5b313797841acb8034263428,2025-04-09T20:02:41.860000 CVE-2025-3257,0,0,d0dbe0934bee18c46d2eb221ac503819fe8076798dceb149ed2cab72d50f437a,2025-04-07T14:17:50.220000 -CVE-2025-32570,0,0,d1c3b8275eef62294be9802a59a6f6ff80efa2d3ef6187f89631ba9c136a7dad,2025-04-09T17:15:46.237000 -CVE-2025-32575,0,0,41091208573572cd07ab0fbb603306043954cfb0dea427f353d6a0d75996e002,2025-04-09T17:15:46.423000 -CVE-2025-32576,0,0,5ad9962bd80baa4977e1c764e430c6ea6aa587a31756a6a5b78c7fc9c313a784,2025-04-09T17:15:46.643000 +CVE-2025-32570,0,1,d5b4bad5227b9367d571ddbd1949a2129504ddec547daadd7701c137e8cece46,2025-04-09T20:02:41.860000 +CVE-2025-32575,0,1,d95070275bcada3e610fc9640cb9f32fd604c0f6173f8dd48dda009e662c3d47,2025-04-09T20:02:41.860000 +CVE-2025-32576,0,1,c1d6c7191b747d748a6f450876322eab79ad2a3ef2f5dff3705a78cb7af3f3c1,2025-04-09T20:02:41.860000 CVE-2025-3258,0,0,3615f8f7ebcf8c8b7786ba6b57f5dc9d63bf8e77b09fe3537a64410ab7050162,2025-04-07T14:17:50.220000 -CVE-2025-32580,0,0,b913d0000a3f862300f748c5fa02bceed5fd7196351d6a3e0967065dfb56478b,2025-04-09T17:15:46.860000 -CVE-2025-32581,0,0,932a8d82e15399d3a21aeb112db777d83aa94d17c13e45c42de6cd306ba5d2bd,2025-04-09T17:15:47.073000 -CVE-2025-32584,0,0,0884984fa72694ff39f2be0eda62c3d6de8d3e510dc1b952614db8fa9fd5b743,2025-04-09T17:15:47.270000 +CVE-2025-32580,0,1,0779c4c7545a37afcd019dc542da5b02685fe4074b6ae465584500bd9c455251,2025-04-09T20:02:41.860000 +CVE-2025-32581,0,1,0ff013e49ea00af2fc95f87c588af9630af6553a43356251b5a5af26809b4656,2025-04-09T20:02:41.860000 +CVE-2025-32584,0,1,68bb00ee489509d942d41ed89905597661ec4f3a38d32988bef35836216f2de3,2025-04-09T20:02:41.860000 CVE-2025-3259,0,0,e705e50caf2174f59dfb699e4aa759ceb69dcda3b3d546c93e1b05690cc687ca,2025-04-07T18:19:20.090000 -CVE-2025-32591,0,0,437c0e853866c12dea0078db24be3141061ed34a663f2a7eb181589b4b52d285,2025-04-09T17:15:47.510000 -CVE-2025-32597,0,0,5379d4089636a23c5367d6e0e7ef641c9725f959cf0dbdcc98ca71607941b606,2025-04-09T17:15:47.690000 -CVE-2025-32610,0,0,8f2a4db16518b8c4e281ee2f3050d24c5614c254759c251d4e9518ffb0d16676,2025-04-09T17:15:47.883000 -CVE-2025-32612,0,0,c9ed3fa0d4004f09e3586a95df31bae2752a31026e905705cdc21ad5c599be64,2025-04-09T17:15:48.070000 -CVE-2025-32616,0,0,a5859af39f6abc5900afd86b3a75ecce500539889165cceb157a8326068d9307,2025-04-09T17:15:48.263000 -CVE-2025-32617,0,0,f34983aab3781254790847303a189eb48e32dda40987cdefa8a89afc0dae1e1a,2025-04-09T17:15:48.447000 -CVE-2025-32619,0,0,6a78e52ad15b821a99dcd093eb2fe9fa1ccddc14f6d996d8246d152d25b81577,2025-04-09T17:15:48.630000 -CVE-2025-32621,0,0,55c027b26fefa853a8966c80a25ae5030c82234d681bcd4393a35d2ba79482b8,2025-04-09T17:15:48.813000 -CVE-2025-32623,0,0,87e59521f3b9fcb521330cde42b3283c096f20982f53f356335a079470427b4e,2025-04-09T17:15:49 -CVE-2025-32624,0,0,2f2bbc05e593b85c48b6e3a4e07ce6a79e03eb2b851bb0800110a92e9e979b8c,2025-04-09T17:15:49.170000 -CVE-2025-32640,0,0,984190e89ea15a919f5a9dce7538820abea6c34e67f9fc5f771ebb3dabb125b1,2025-04-09T17:15:49.360000 -CVE-2025-32641,0,0,6ae5a03b7881f42ebabd725b2ca0c12bae2cd7e82f00fe875903f9b3859e8be6,2025-04-09T17:15:49.540000 -CVE-2025-32642,0,0,900f36f1e8c39fc097a74535ad0e89aaea66562155d323b6ff05d6fee1349fa1,2025-04-09T17:15:49.727000 -CVE-2025-32644,0,0,3a952b83a7bcc122319819221aabf917631b95f68603a965fdf41f2d5d63b850,2025-04-09T17:15:49.917000 -CVE-2025-32645,0,0,664fe98ceb9a56798bbe921fdfb444e4bb613eb799c2c00f34422108e1ee3d37,2025-04-09T17:15:50.120000 +CVE-2025-32591,0,1,fd8ba4bf1a72e360674a8fe6204340fb9d6c3440cb5ce780c7835f0636ef0487,2025-04-09T20:02:41.860000 +CVE-2025-32597,0,1,96fc415ce2407738ed408ad01b04109f892c8ebeb7179dfc5cf7363ebc87d494,2025-04-09T20:02:41.860000 +CVE-2025-32610,0,1,dc9fb659de83670c7c33be214fe09b7737ca428457ab3f71ece1458f518c12f6,2025-04-09T20:02:41.860000 +CVE-2025-32612,0,1,2ca59969dacb02baf4d8154f1c272d9b1103df0b2ef0d4006fa6af5914c3c1a2,2025-04-09T20:02:41.860000 +CVE-2025-32616,0,1,2e563f58b0e6b0772785bac3eaa9ec9a78ae954484a2c3aa1fb02d6e868b4cb6,2025-04-09T20:02:41.860000 +CVE-2025-32617,0,1,71d3ec745715f4618004af83a345c1e36da6cc1017adbb46f67d801506ef1931,2025-04-09T20:02:41.860000 +CVE-2025-32619,0,1,40a399def20506b990a5b9b8ca489d44c848da1caa4928159d10d8cdbf1d7bcc,2025-04-09T20:02:41.860000 +CVE-2025-32621,0,1,9d88f036911502a4d01b04e887bdfff30790926c188434148672296f334eb2ce,2025-04-09T20:02:41.860000 +CVE-2025-32623,0,1,9c4a61b53a0aad0c6b2024143a2f6f05bbee238508cc7a45df54750e9078afdf,2025-04-09T20:02:41.860000 +CVE-2025-32624,0,1,bdf1e4504695fcf5573bf65f3a823ba2ad5adfc364b0a8a82084be8af29ad9d3,2025-04-09T20:02:41.860000 +CVE-2025-32640,0,1,4faaa8e90e12217c66a4114327933133c6f08418147e1ef08f8b2d3b9f259249,2025-04-09T20:02:41.860000 +CVE-2025-32641,0,1,a7e875658bf04002a0f0ff2d8ed205c3e62723306ba92b913fa8b3da4737f4b4,2025-04-09T20:02:41.860000 +CVE-2025-32642,0,1,7ada1176e299944cf4984e04ec32597fcad8956fb8b07508c19b98987a43b7e5,2025-04-09T20:02:41.860000 +CVE-2025-32644,0,1,8d77ffb90d6541e311c07c2f45ed6a06f20b0ee590798253e68c0a42396292a1,2025-04-09T20:02:41.860000 +CVE-2025-32645,0,1,fb62da3f3a1988bda24134062715132c5261d9674bf6f1734f8b456b41a59035,2025-04-09T20:02:41.860000 CVE-2025-3265,0,0,1b08405cf7862a0d70f0211001bee004fe3d504e775eb888b6c2102dc0c554e7,2025-04-07T18:19:07.777000 -CVE-2025-32659,0,0,6e0a4721c397770ef14054152a835e7b5caf36443b796b0560987a7306bfb700,2025-04-09T17:15:50.317000 +CVE-2025-32659,0,1,717c5d0222a54fd481e76a076103445f1121d11434ddfac7ba32fd0a96b70d87,2025-04-09T20:02:41.860000 CVE-2025-3266,0,0,72c61d5f89eeb94b30f634ae19d189745b893dd05829140f6047e84fafa81bf8,2025-04-07T18:18:56.247000 -CVE-2025-32661,0,0,2030c884151e4f0958169797068cb703e3cd28c85d838336095d0b7c6c4ada2a,2025-04-09T17:15:50.493000 -CVE-2025-32664,0,0,a77518faf1838200461d4e5d22b57f4de74b8ba9a79584d44fd0d3584b05a7fa,2025-04-09T17:15:50.660000 -CVE-2025-32667,0,0,3ccfc125d6a4e2b3d049c93dd93ecaba751dc1d5d26dca09661d69d9f4360ca8,2025-04-09T17:15:50.843000 -CVE-2025-32669,0,0,f9a085693da1afd8222d50b302daf9ac9c4a9916f1c056f74b165fce21a0b0b1,2025-04-09T17:15:51.023000 +CVE-2025-32661,0,1,9129275d86d90732365a50f1fd023acf25687ca6a30d36ee8767c87e6ef69f25,2025-04-09T20:02:41.860000 +CVE-2025-32664,0,1,2223730a60ed1fe558c38ad32fdbcf8b25e2266ff023b63d74e71a84be192208,2025-04-09T20:02:41.860000 +CVE-2025-32667,0,1,67342f2d09edcff434d9d589fa729388e7a3fdaf31499c98da4542746ee22eef,2025-04-09T20:02:41.860000 +CVE-2025-32669,0,1,5ee4004046a9925c22bcdaa7275b534b428fe00ab9efd060f46d22bf87b484fd,2025-04-09T20:02:41.860000 CVE-2025-3267,0,0,5957e45c3f258189da3aec49a626cf5736069fd66df3c72b04267cdc97a2b74c,2025-04-07T18:18:41.523000 -CVE-2025-32673,0,0,0b988fa1a912d0a4de5110534e8cd70865594f207d9033dc9faaac6c8a0ea7e3,2025-04-09T17:15:51.200000 -CVE-2025-32675,0,0,640a2c0e713fa5931733815e1e8be7c49764c334ec3819328e44121ff5e97419,2025-04-09T17:15:51.383000 -CVE-2025-32676,0,0,924e0212a5179382d60480a90fdfe4f7b2ba8247efd7c9455ed531e38408edfb,2025-04-09T17:15:51.560000 -CVE-2025-32677,0,0,c67ad87a2d3101b1a11dbfb552b11e11c3b657bbc1a5368eb8da70e4da1365e4,2025-04-09T17:15:51.730000 -CVE-2025-32678,0,0,801ba4ad188efe6ad35a410c977b884ea73d77f5c975d04368d7d95e9a86f270,2025-04-09T17:15:51.913000 -CVE-2025-32679,0,0,2270a76ac15d909539bb48a51b36afec66769d5b90a79a13597e11b60ea3d1dc,2025-04-09T17:15:52.090000 +CVE-2025-32673,0,1,e04e543b05b99f72995e2bef56793f9632a1f3cc90a21636a75204e2e23934f5,2025-04-09T20:02:41.860000 +CVE-2025-32675,0,1,548891b87ee449854d51f60483cb5815736a358fddef98f05bd38028cd885ffe,2025-04-09T20:02:41.860000 +CVE-2025-32676,0,1,b937d2c54242c8d4db371f528e52df43f1a969973b2fcf2bf1151a558909c315,2025-04-09T20:02:41.860000 +CVE-2025-32677,0,1,714496a2814bb30411c1b1c295f32ec45c02266f4dd014f4906b4fca99468be7,2025-04-09T20:02:41.860000 +CVE-2025-32678,0,1,f90148935e7dcdc424e798fece0ab3f8bdaea00a714a9915675ffbcdcf79ca1f,2025-04-09T20:02:41.860000 +CVE-2025-32679,0,1,88e5b85177a720ee5de776ab05d453dd5eb26275ea535d4b5fa355cb9dc18099,2025-04-09T20:02:41.860000 CVE-2025-3268,0,0,13ebb75f155606fc18a6c469dfd2e1dc92481b7d2a4b4f437c20095a77a45083,2025-04-07T16:15:26.430000 -CVE-2025-32680,0,0,66543baa3f769070978b2011ba0a5759da008aa6d82e2ea9dc66023ee838bb10,2025-04-09T17:15:52.283000 -CVE-2025-32683,0,0,e6f7ded084843a6d3620930af2f35423bdd42910eb29a99fecdf4944e06d8e17,2025-04-09T17:15:52.467000 -CVE-2025-32684,0,0,171b82ab56a118248d6a1dacd74596ac389c6acd428d3f1fc1912aef049fbb4b,2025-04-09T17:15:52.640000 -CVE-2025-32685,0,0,32127899d2a162801f868cb5bd1e0e1c19fbdcb3b32dfe980c01ac57cf99c2f2,2025-04-09T17:15:52.817000 -CVE-2025-32690,0,0,4b27a1052804eeef0eabf39fa0ec2c6da2a7cfaef687a8fa809f93ad2e74ab51,2025-04-09T17:15:53.010000 -CVE-2025-32691,0,0,5bf3b6148911663eed6a4f3da4d208a235686d8fa5be674a9f97511329ff70ed,2025-04-09T17:15:53.190000 -CVE-2025-32692,0,0,12232413082376c4d1f68fb63882b60ff94d59c45dffc8ad31222bfd7bae2cc3,2025-04-09T17:15:53.370000 -CVE-2025-32693,0,0,d1adf94f384b785465d8ed18402e1c2f22a86ef721d367127ecca2100ff3c9e0,2025-04-09T17:15:53.540000 -CVE-2025-32694,0,0,0a1f6ecb53e413cf0db491ed99615eeaf20dc0e3632122b8e2bca2cb20dc8d4a,2025-04-09T17:15:53.700000 -CVE-2025-32695,0,0,fbdb345137aee06e95c1fd41219f9d0bf102250819bb342ede79e4b1ebd32f93,2025-04-09T17:15:53.877000 +CVE-2025-32680,0,1,7e83253b789e22794ff15c175ac5222320ee1d5aeead675a8299f4d4dd7a8e97,2025-04-09T20:02:41.860000 +CVE-2025-32683,0,1,4737dc851cbc361679102d01731ea65b5abe3ae9073ec363ee786b4e1a2533bb,2025-04-09T20:02:41.860000 +CVE-2025-32684,0,1,2dfb6a557da23140d893ceefbb39bc58555bc5e6d1a5fd6ac3c564f83604d2e7,2025-04-09T20:02:41.860000 +CVE-2025-32685,0,1,e1edc9c0eeffd8569f1c3dee56fbb2ffc492f927f4ddc538006bdbf6674bc433,2025-04-09T20:02:41.860000 +CVE-2025-32690,0,1,9edd7544f6a091be113393618bac31b1cd15577e02926d3aa7e1339374d574da,2025-04-09T20:02:41.860000 +CVE-2025-32691,0,1,1d87e27bae4facbf51601864f542f033bf644476eb77714ce66a203bf74ea09d,2025-04-09T20:02:41.860000 +CVE-2025-32692,0,1,c5377d751270c75bb15d28fe8902897bceed087aac59fc72b43d33627d1568b0,2025-04-09T20:02:41.860000 +CVE-2025-32693,0,1,8b4c3ca6e5f78d8e905f61115dad2c0f8bfcead7073e277a4dfe0246c8f181ec,2025-04-09T20:02:41.860000 +CVE-2025-32694,0,1,c5323b32f99e8c9fc8ccc9989da14785a02c4cec59717fdc95787034e559d1d1,2025-04-09T20:02:41.860000 +CVE-2025-32695,0,1,d37a7a3802052ba2b179b04e772474f69fbfbf6cedd0f20f3383706ffa54c144,2025-04-09T20:02:41.860000 CVE-2025-3285,0,0,e28a4e88da7ffb77ad01de08bcfd2b4a71d41180820a080f587b6350c35f9e48,2025-04-08T18:13:53.347000 CVE-2025-3286,0,0,c247e4e94cc04e66afe391d63c6254a128435a66f18dde665fe78a6cdb0ab317,2025-04-08T18:13:53.347000 CVE-2025-3287,0,0,bff258a343cd08a61757791ae0246a98daa5f12cd52be7d2e4f1314c24254af2,2025-04-08T18:13:53.347000 @@ -289400,7 +289428,7 @@ CVE-2025-3410,0,0,c70ad1f10853e4bee6dfe4932ecd12d3acdcade7cac158141968cc85be8d2f CVE-2025-3411,0,0,8cff3e75ab7d8c8c3df6b9fa01111f95a8fb7002f322628e53333c48f3625fa7,2025-04-08T18:13:53.347000 CVE-2025-3412,0,0,25a3c2ab8fa0aef3dfffc2c9723b43f279f3600f9f3d1f7632095f66cdc52ea3,2025-04-08T18:13:53.347000 CVE-2025-3413,0,0,e9ae6f9ee954dc0b39e2e9a8b6ad41f6cbd8628b2d84dff62138fbf7e2823b11,2025-04-08T18:13:53.347000 -CVE-2025-3416,0,0,5e690857a8d0eabfdc23066555ef98f8c89a927c4d4b5328d6e1b4b0c107df9c,2025-04-08T19:15:53.717000 +CVE-2025-3416,0,1,52d35af283afef5bb6d8cccc38fa0eb8d4ad3029b21142a4de9837a0c397cd70,2025-04-09T20:02:41.860000 CVE-2025-3424,0,0,e4a6bd7e6ff2128bc5d939729449d80241551339ad344ad915f9387ff36da19c,2025-04-08T18:14:17.307000 CVE-2025-3425,0,0,89b52021ac9535b7bfcd710ad3a41c5d483f876e564b2bf8efc340d7efdcfbdf,2025-04-08T18:14:17.307000 CVE-2025-3426,0,0,90dd23ef26990db1fdca18c825634f92c9798fac280599ec08ba6ebce934ed6c,2025-04-08T18:14:17.307000 @@ -289413,6 +289441,6 @@ CVE-2025-3432,0,0,32b4909a605e3dc15d41b2069e1ead14c30bcbe2dfa78debc747a89be022e4 CVE-2025-3433,0,0,46dd66c57af291abbb1b77326145823e13d716692eb68902a18c25a048a17397,2025-04-08T18:13:53.347000 CVE-2025-3436,0,0,350fe0ab040ca88ca01e6b9c153bc7bb9c0c6c278cf5357b8d0cb98bb355f464,2025-04-08T18:13:53.347000 CVE-2025-3437,0,0,e73b4884af1e4c5b90938b61853540dd90f98780db8cdd9f4d702d9b75697db1,2025-04-08T18:13:53.347000 -CVE-2025-3442,0,0,ad72e2ebf864daeef8312c2c3c83d3aa4c0ecdada76f6977f0159713eb09e6d2,2025-04-09T07:15:41.210000 -CVE-2025-3474,1,1,49ea378b3abb02b5783aa9553c5be0c06fe14f9cfd14ea4b0ee5b867e7ac83a5,2025-04-09T19:15:50.547000 -CVE-2025-3475,1,1,1135757e1ad1a614eaaa6d43e402a6b6b476f18cb463f3e5bc51d3b4f6bcccf4,2025-04-09T19:15:50.710000 +CVE-2025-3442,0,1,2a59e6aeb9a7ce85db231c9e4252568faabc9932311aa3489ec1af959c55a52f,2025-04-09T20:02:41.860000 +CVE-2025-3474,0,1,f8e71c46703e14cca85d8e407ff995fe29213506f600ff4c3b6065d1079e537c,2025-04-09T20:02:41.860000 +CVE-2025-3475,0,1,bb4bc227f15a0b277f9580dd5137093b362fd6a8b2970e4968b5dd8302443ad1,2025-04-09T20:02:41.860000